<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: trafic monitoring on pix in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trafic-monitoring-on-pix/m-p/328625#M549508</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check out Etherape to.  It gives you a good graphical display that you can walk up to at any given time and visually identify who is using a lot of bandwidth.  It's also a Linux app.  The graph is interesting to watch.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 Jun 2005 13:25:11 GMT</pubDate>
    <dc:creator>craigb</dc:creator>
    <dc:date>2005-06-16T13:25:11Z</dc:date>
    <item>
      <title>trafic monitoring on pix</title>
      <link>https://community.cisco.com/t5/network-security/trafic-monitoring-on-pix/m-p/328620#M549464</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;our internet line to internet is all day at 100% trafic on outside interface /somebody is downloading some big files/. can I find out who is it? I tried set up log, syslog /kiwi/, etc., but there are too many messages.&lt;/P&gt;&lt;P&gt;I need find out WHO is downloader. Is in possible on Pix or I'll need third-party solution? &lt;/P&gt;&lt;P&gt;thanx&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:04:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trafic-monitoring-on-pix/m-p/328620#M549464</guid>
      <dc:creator>milan.zmarzlak</dc:creator>
      <dc:date>2020-02-21T08:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: trafic monitoring on pix</title>
      <link>https://community.cisco.com/t5/network-security/trafic-monitoring-on-pix/m-p/328621#M549469</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A quick way is to do a show conn on the pix, and look for large connection sizes. This will help if it is one file. If someone is making tons of small connetions (i.e, downloading mp3s), you might want to look for who has the most open connections&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Apr 2005 18:10:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trafic-monitoring-on-pix/m-p/328621#M549469</guid>
      <dc:creator>mostiguy</dc:creator>
      <dc:date>2005-04-11T18:10:15Z</dc:date>
    </item>
    <item>
      <title>Re: trafic monitoring on pix</title>
      <link>https://community.cisco.com/t5/network-security/trafic-monitoring-on-pix/m-p/328622#M549476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can setup Websense as url-server, additionally you can setup Proxy for http/https/ftp traffic inside you LAN and redirect all traffic thru this proxy.&lt;/P&gt;&lt;P&gt;It depends on your PIx config also. For example - If you allow all inside users to go outside (to Internet) Proxy solutions can be not enough.&lt;/P&gt;&lt;P&gt;Fast solution:&lt;/P&gt;&lt;P&gt;- all http/https/ftp traffic should go thru Proxy (default gw for LAN users),&lt;/P&gt;&lt;P&gt;- only Proxy can go directly to Internet&lt;/P&gt;&lt;P&gt;If you have Proxy (eg. Squid + Squiduard or Cisco ContentEngine) you can control traffic on high layers, eg. filter some url.&lt;/P&gt;&lt;P&gt;Additionally you can try update your PIX soft to 7.x and apply some QoS rules, but first you still need identify problematic traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Apr 2005 20:19:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trafic-monitoring-on-pix/m-p/328622#M549476</guid>
      <dc:creator>spasternacki</dc:creator>
      <dc:date>2005-04-11T20:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: trafic monitoring on pix</title>
      <link>https://community.cisco.com/t5/network-security/trafic-monitoring-on-pix/m-p/328623#M549489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Another good tool to analyse real time traffic is NTOP.&lt;/P&gt;&lt;P&gt;This helps to figure out who is downloading and with what protocol, port ... top 20 host ... and much more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Opensource for Linux, but unfortunently not for Windows. See:&lt;A class="jive-link-custom" href="http://www.ntop.org/ntop.html" target="_blank"&gt;http://www.ntop.org/ntop.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to place that host on a Monitoring port on the switch so that it can see all traffic that is going to the PIX Firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is always the "Capture" command available but to figure out who is usinf the bandwith you need another tool as NTOP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example for capture:&lt;/P&gt;&lt;P&gt;access-list ftp permit tcp 192.168.1.0 255.255.255.0 any eq ftp&lt;/P&gt;&lt;P&gt;capture ftpcap access-list ftp interface inside &lt;/P&gt;&lt;P&gt;show capture ftpcap detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to remove:&lt;/P&gt;&lt;P&gt;no capture ftpcap access-list 120 interface inside&lt;/P&gt;&lt;P&gt;no capture ftpcap &lt;/P&gt;&lt;P&gt;no access-list ftp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Apr 2005 22:26:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trafic-monitoring-on-pix/m-p/328623#M549489</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-04-11T22:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: trafic monitoring on pix</title>
      <link>https://community.cisco.com/t5/network-security/trafic-monitoring-on-pix/m-p/328624#M549499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Milan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the past, I've used RnR Report generator for PIX.  It is a good utility that can give you quick top tens.  All you need to do is take a copy of your syslog.  I know these can get huge, but take a sampling of an hour or so when you're pretty sure the spike is happening.  Save the syslog sample out and feed it into RnR.  This will tell you who's using what.  It only reports in IP, not DNS, but you should be able to work your way back using your DHCP records (if it's inside) or identify the IP and ask your ISP to locate the external offender to find out who the culprit is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jun 2005 12:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trafic-monitoring-on-pix/m-p/328624#M549499</guid>
      <dc:creator>dwalsh</dc:creator>
      <dc:date>2005-06-16T12:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: trafic monitoring on pix</title>
      <link>https://community.cisco.com/t5/network-security/trafic-monitoring-on-pix/m-p/328625#M549508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check out Etherape to.  It gives you a good graphical display that you can walk up to at any given time and visually identify who is using a lot of bandwidth.  It's also a Linux app.  The graph is interesting to watch.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jun 2005 13:25:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trafic-monitoring-on-pix/m-p/328625#M549508</guid>
      <dc:creator>craigb</dc:creator>
      <dc:date>2005-06-16T13:25:11Z</dc:date>
    </item>
  </channel>
</rss>

