-
I remember doing this before:
The virtualbox network is set to bridging, the working mode of AnyView is set to bypass mode (remember as if it was in option-working mode), and then in the virtual machine.
AnyView can detect the traffic of other hosts.
-
Introduce you to a good monitoring software.
As far as I know, most of the companies in China are now using the "network ghost" monitoring software, which can easily realize QQ, MSN chat content monitoring, Internet record monitoring, email content monitoring, screen monitoring, desktop monitoring, etc., but also filter the blacklist, prohibit the operation of game entertainment software, manage the use of mobile hard disks, USB flash drives, break through the restrictions of various ARP firewalls to control the network speed and traffic of any machine in the network, etc. Monitoring is as simple as that, and managing your network is so easy. It can be said that it is the most professional and easiest network management software in China!!
-
Well, that network ghost dog is really good, our company has been using it for several years, it is very powerful and practical!
-
You can install a P2P software where you can view and control the traffic of members of the entire LAN, which is very simple to use.
-
You can view it directly on the router, why bother looking for software, now many routes are monitored by themselves, you use software to monitor, unless other machines are installed on the controlled end, otherwise use anti-P2P software, what software control you have no effect.
-
P2P Terminator, a software that views traffic and controls it.
-
It is best to use the monitoring software through the bypass monitoring mode to manage the traffic, the super sniffer dog network monitoring software has a real-time traffic monitoring function, and can generate different reports according to different needs, such as according to the date, according to the number of people, etc.
-
Open Layer 2 SNMP, CCATI is an excellent traffic monitoring tool.
-
Use IP-Guard to control all computers in the LAN, deploy the client, console, and server, and set the control policies of the client host through the console, such as traffic control policies, to monitor the traffic usage of all LAN computers.
In addition, IP-Guard also has other functions that can be used to control Internet behavior, which allows you to understand what employees do with the computer when they go to work, and then carry out targeted control.
-
1.The most direct way to view the network traffic of each computer in the LAN is to enter the view through the router management interface. First of all, we log in to the router management interface through the login information on the back of the router. As shown in Fig
2.In its router management interface, through the "Broadband Rate Limiting" ->"View Traffic" item to get the current network usage of each computer on the LAN. For Wi-Fi cards, you can also check it through the "Wi-Fi Status" - >More" item.
4.Run the program, create or select the network segment to be monitored in the pop-up "Monitoring Network Segment Configuration" interface, and click the "Start Monitoring" button to enable the monitoring function.
5.In the main interface of the program that opens later, click the "Enable Monitoring" button, and the LAN speed monitoring function will be officially turned on.
-
Your wireless router has the features you need.
-
Buy a router with Internet Behavior Controls.
-
If there are less than 20 office computers, you can handle them as follows.
1.It is necessary to set a password, and it is WPA2, and the signal within 300 meters of the current network rubbing equipment can be received, and it is estimated that it has been rubbed into the net.
2.Enable firewall MAC filtering, and only allow computers that need to access the Internet in the office.
3.Disabling the DHCP function, manually assigning IP to each machine, and binding MAC addresses can effectively prevent mobile phones and iPads from accessing.
4.If IP rate limiting is enabled, the maximum bandwidth is set to 1024KB according to the IP segment, that is, each machine can use a maximum of 1M
-
It depends on whether your router has that kind of function.
-
Install the next SNIFFER PRO, and the very professional protocol analysis software is satisfied with the adoption! With the popularity of ARP firewalls, software such as P2P terminators and polysheng network management are no longer very effective...
My software is a professional protocol analysis software, which can analyze traffic according to packets of different protocols and ports, which is very intuitive.
-
AnyView (network police) is the best LAN monitoring software, including all the functions of Internet monitoring and intranet monitoring, and can also do protocol package auditing, but if it is only for monitoring protocol packages and not for behavior monitoring, then such as Sniffer Pro, IRIS, and Ethereal will be more suitable; But you need to know the network protocol very well, otherwise you won't be able to understand it;
-
This requires setting up a mirror port on your switch, then connecting your computer to this port, and then using most LAN packet capture software and monitoring software such as Netmon and Ethereal.
-
Wireshark is OK, a professional packet capture software.
-
Ordinary router commands can't do that.
You can use P2Pover to view or throttle your network speed in real time.
-
Use Start — Run ping -t to see your own traffic, not to others.
-
To view the real-time traffic of all computers, you need to go to the relevant function items in the router.
Find a computer, log in to the router management interface with web login, enter the authorized user account, and enter the configuration interface.
Depending on the router, you can find the system status or the intranet monitoring in the system tool to view the real-time traffic and total traffic of any computer in the intranet, as well as the number of web pages visited.
-
Then you can use your Jusheng network management back.
-
LAN traffic control and management has always been a challenge for network management.
In general, there are two solutions to monitoring restrictions on LAN traffic:
1.Traffic distribution in series mode. Traffic control in the Linux operating system can be achieved by creating a queue at the output port.
By using a Linux gateway, you can set the traffic for each machine. There are also corresponding products (generally hardware products) on the market that can do traffic distribution.
The key to this solution is that it is necessary to use the connection method of gateway or bridge, so it will have a certain impact on the network speed.
In addition, fixed traffic distribution is relatively rigid to use, and does not allow for efficient use of Internet bandwidth. For example, when the Internet bandwidth is very idle, the client can still only use the allocated traffic, resulting in a waste of bandwidth resources.
The advantage is that the flow can be precisely distributed.
2.Traffic limits in bypass mode. If it is not necessary to distribute the traffic accurately, the traffic can also be monitored by bypassing.
In the bypass monitoring mode, the port mirroring function of the switch is used to analyze and restore data. It is also possible to monitor the Internet traffic of each machine and disable the use of P2P software. The advantage of the bypass method is that it is easy to deploy and does not affect the network speed.
The disadvantage is that the flow cannot be accurately distributed.
Taking Super Sniffer Dog as an example, the following functions can be achieved in terms of flow control:
1.Real-time traffic monitoring, which monitors the real-time traffic of each computer.
3.Prohibit certain computers from accessing the Internet during peak traffic hours. For example, when the real-time Internet bandwidth reaches 80% of the total bandwidth, some computers are prohibited from accessing the Internet.
3.Utilizing Super Sniffer Dog Monitoring Software for Traffic Management? Super Sniffer Dog only needs to be installed on a single computer to manage the entire LAN. Here's how to do it:
A virtual machine is a complete computer system running in a completely isolated environment with full hardware system functions simulated by software. Each virtual machine has its own CMOS, hard disk, and operating system, and can be operated on the virtual machine as if it were a physical machine.
The virtual machine is just a software, the same as QQ, it is not a system, but it simulates an environment. >>>More
If you are using the original XP system, it will automatically connect to the network settings, and you don't need to set up any ACE templates. >>>More
Open VirtualBox and click the New button.
Give your virtual machine a name. Type: Set to Linux, version: ubuntu 64-bit. Then click on the Continue button. >>>More
After execution, the system theme will look like xp.