I've been testing PRTG as a packet sniffer and one challenge I'm facing is how to actually view the captured packets. As it stands, all I can see is a pretty graph, but I can't see any relevant information like any clients responsible for generating the traffic or what protocols/data is actually generating the bandwidth. It may be something obvious I'm missing, but I would like to know how to get this information.
How to analyze captured packets from the sniffer?
Modified on 2025-06-10 13:55:58 +0200
Disclaimer:
The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.
The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.
If you would want to set this sensor up to show the traffic you are looking for, you would need to set up a custom Packet Sniffing sensor with filters. PRTG handles packet sniffing data by receiving the data and then breaking it down and displaying it in the tables and graphs. The original data sent by the device or received by PRTG is discarded after it is processed.
Feb, 2014 - Permalink