R
R
rapida2010-11-05 17:50:09
Traffic analysis
rapida, 2010-11-05 17:50:09

Network traffic monitoring?

There are 10 computers in the office. Sometimes the network and the Internet starts to slow down terribly. We suspect that someone either turns on the torrent, or someone has a virus that clogs the entire channel. It is necessary to install a network traffic monitoring program for everyone, which displays the results of its work in a publicly accessible place and, it is imperative that it shows that the program is not running on this computer. For example, someone knocked her out on purpose to shake her.

Answer the question

In order to leave comments, you need to log in

7 answer(s)
R
rapida, 2010-11-05
@rapida

The network is distributed via Wi-fi through the ASUS DSL-N13 ADSL router.
Everyone has Win computers.

L
LProf, 2010-11-05
@LProf

In general, in this case, I would probably install some kind of firewall on all machines, a) it will not allow viruses to hollow out the network b) it will keep statistics of network activity c) in some it seems there is a web muzzle by which you can check logs remotely, whether it is running, etc. .d. d) those who refuse to voluntarily set speed limits on torrents can access the firewall remotely and block applications for torrents.

B
BasilioCat, 2010-11-05
@BasilioCat

Insert a normal flashable ASUS WL-500gpv2 (or Dlink DIR-320) in front of your asus, plug a flash drive into it and flash it. Set up traffic counting on iptables, issue IP computers based on the MAC address, set up a filter by known mac addresses and the problem with traffic will be solved. After that, with the experience gained, you retrain as unix admins;)

P
prox, 2010-11-05
@prox

alternatively, if the switch is "smart", you can analyze the traffic at the peak and determine the problem

A
amarao, 2010-11-06
@amarao

A smart solution is netflow. Supported by both hardware and software routers.

K
kdaniel, 2010-11-06
@kdaniel

Why a bicycle? You can also mitigate traffic using a switch, or, if the switch does not support such a function, using an ancient hub, to a machine running wireshark and see what is coming from where.

M
mace-ftl, 2014-12-25
@mace-ftl

file.php?id=165&sid=1088c7be4e5127532d93

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question