cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
335
Views
0
Helpful
3
Replies

monitoring Traffic

vidaluzarista
Level 1
Level 1

Hi All

I have a Pix, int he inside I hve two private networks, and I have two global and two NAT as:

global outside 1 200.9.172.2

global outside 2 200.9.172.3

nat (inside) 2 192.168.0.0 255.255.255.0 0 0

nat (inside) 1 10.24.54.0. 255.255.255.0 0 0

I have a router-switch 3550, this router is the gateway of the pix, I have a interface fastethernet for this pix.

interface fasethernet0/23

Description PIX-Facultad1

ip address 200.9.172.1

duplex full

speed 10

Now I need to know the traffic for each network, how can i do it?

Regards

3 Replies 3

paddyxdoyle
Level 6
Level 6

Do you mean you need to know the traffic utilisation on your interfaces?

If so then you need to enable SNMP on both devices with community strings.

If you have a server that you will be using for SNMP polling then you should use an access-list within SNMP permitting requests from your specific server ONLY.

Then you need to configure network management software such as Cisco works, HP Openview or MRTG stats.

If i am on the right line let me know and i can go into more detail if you require.

Rgds

Paddy

Hi Paddy

I need to know The traffic for each IP, for the IP 200.9.172.2 and IP 200.9.172.3, this IP are global for my two private networks.

I have enable SNMP in my router 3550, I work with mrtg, but I only can see the total traffic in my interface, I need a method to see the traffic for each IP.

Thanks in Advanced,

Regards.

I don't think you can do that on a PIX.

You would need some kind of RMON capabilities or TOPn reports.

You can view the number of connections going through the PIX using "show conn", the PIX also has a built in packet capture that you can tie down to specific IPs.

(http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_62/config/sysmgmt.htm#wp1038055)

You can also generate syslog messages each time a packet matches an access-list by using the log keyword at the end of your acl statements

..but not sure if this really helps you!

Rgds

Paddy

Review Cisco Networking for a $25 gift card