Hi,
We are using DHCP SNOOPING in our network for HP.
IN PRTG we have one sensor which should monitoring on which vlan Snooping is enabled.
Switch reported string in hex
Example 80-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-40-00-00-00-01-E0-00-80-00-00-00-01-00
Each octet means something, is it any way to translate this for example 80 means VLAN 1.
We received this string in message
Article Comments
Dear Kromal,
this kind of result processing is not possible in PRTG. While some sensors offer to use a custom regular expression to extract a numerical value, and then use a custom lookup in order to interpret it further, this approach would still not provide what you are looking for.
In case you can get the string via an exe/script sensor, you could process the result in the script as well and return according information to PRTG.
Jun, 2018 - Permalink
Dear Kromal,
this kind of result processing is not possible in PRTG. While some sensors offer to use a custom regular expression to extract a numerical value, and then use a custom lookup in order to interpret it further, this approach would still not provide what you are looking for.
In case you can get the string via an exe/script sensor, you could process the result in the script as well and return according information to PRTG.
Jun, 2018 - Permalink