PRTG For Linux




PRTG (Paessler Router Traffic Grapher) is an easy to use software to monitor bandwidth usage and many other network parameters through SNMP, Packet Sniffing or NetFlow Cisco that allows for the measurement of traffic based on IP address or Protocol. SNMP-based measurements only based on port. The software also allows to rapidly prepare and run a monitoring process to a specific network.

With PRTG is then easily able to figure out a number of data flowing through devices such as routers and monitor the use of the PC as well as analyze the traffic that can be categorized into several types of protocols. PRTG Traffic Grapher is running on a Windows machine on the network for 24 hours every day and constantly records the network usage parameters.



With PRTG Traffic Grapher is able to monitor all aspects of the types of protocols ranging from the type of network protocols FTP, HTTP, HTTPS, SMTP, POP3, DNS, ICMP, SNMP and more. Here it can be seen how much of the bandwidth usage on the respective protocol. Features – Basic Features
  • The ability to perform monitoring on the network used by more than 80,000 users per day.
  • Data collection can be via SNMP, Packet sniffing or NetFlow protocol simultaneously in a single window.
  • Classifying network traffic into parameters such as IP address, Protocol and others.
  • It can work with most network devices such as kan switches, routers, firewalls and others which varies according to the company.
  • The monitoring engine is able to perform monitoring of some (even thousands) of sensors simultaneously.
PRTG (Paessler Router Traphic Grapher) also is a software for monitoring the resource network that can take advantage of SNMP (Simple Network Management Protocol), Packet Sniffing, WMI (Windows Management Instrumentation), or NetFlow.
  • Broadly speaking, PRTG can be used also to do things:
  • Keep an eye towards resource-resource connection on the network
  • Monitor and measure bandwidth usage on the device-device network
  • Search and find and access device-device that exists on a network
  • Detect activities that should not be (suspicious and malicious) from either user or device that is present in the network
  • Keep an eye on usage against the resource system, such as CPU usage, memory consumption, the rest of the drive capacity is available, etc.
  • classify the packets passing on traffic based on the source (source) and goal (destination)
 



Next
Previous
Click here for Comments

0 comments: