Solved

Network Packet Analyzer Solar Winds

Posted on 2016-11-20
3
123 Views
Last Modified: 2016-11-27
Hi All,

Has anyone tested the Network Packet Analyzer , with Solar Winds. Could you kindly help with steps , if we need to set up monitoring based on different protocols ?

Thanks,
T
0
Comment
Question by:TiazfaD
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 9

Assisted Solution

by:Tomas Valenta
Tomas Valenta earned 250 total points
ID: 41895531
I am using Wireshark packet analyzer (www.wireshark.org) which is free and well documented. Available in Windows or Linux binaries.
I can help you with configuration.
1
 
LVL 22

Accepted Solution

by:
eeRoot earned 250 total points
ID: 41899179
Packet Analyzer is an add-on tool that works with NPM (Network Performance Monitor).  Once you have NPM up and running, you add the Packet Analyzer to it.  Check out this video and blog from SolarWinds.


http://www.solarwinds.com/resources/videos/deploying-packet-analysis-sensors-in-solarwinds-network-performance-monitor.html


https://thwack.solarwinds.com/community/solarwinds-community/product-blog/blog/2014/07/16/npm-11--packet-analysis-sensor-deployment-considerations
0
 

Author Closing Comment

by:TiazfaD
ID: 41902855
Thank you eeRoot and Tomas for your inputs.  The links were truly helpful!

Regards,
T
0

Featured Post

Percona Live Europe 2017 | Sep 25 - 27, 2017

The Percona Live Open Source Database Conference Europe 2017 is the premier event for the diverse and active European open source database community, as well as businesses that develop and use open source database software.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many network operators, engineers, and administrators do not take several factors into consideration when troubleshooting network throughput and latency issues.  They often  measure the throughput by performing a measurement  by transferring a large…
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question