Articles tagged with nbar
Chance asked me to post
the Perl script I've been using to collect and graph protocol specific usage
information in MRTG. Below, you will find a link to the zip file containing the
You can put this script where you like, but you will need to reference it …
I've written a lot of posts about various methods for blocking
</acronym> traffic, especially with Cisco's Network Based Application Recognition (NBAR). Although these posts are probably of interest to smallish Internet Service Providers and administrators of business networks, they don't have much use for the average …
I've talked about using Cisco
<acronym title="Network-Based Application Recognition">NBAR
</acronym> frequently (check the Related Posts section below for more articles). One thing I've never pointed out is that not all versions of Cisco
<acronym title="Internetwork Operating System">IOS
</acronym> come with all protocol descriptions built in.
The following are the Peer-to-Peer (P2P) protocols recognized by Cisco's NBAR Protocol Discovery.
If I've missed any, leave a comment below or use the Slaptijack Contact Form to update me.
I recently wrote a Perl script for MRTG that collects the bytes that Cisco NBAR Protocol Discovery has counted and graphs them against the total traffic seen by the interface. (Note: Leave a comment if you want me to publish the script on this site.)
I thought I'd go ahead …
Ars Technica recently discussed the effect YouTube
has had on the
popularity of P2P networking.
According to a study done by Ellacoya Networks, HTTP traffic has surpassed P2P
protocols as the dominant form of Internet downloads for the first time in four
years. Considering my recent discussion of the
Is your network bandwidth being consumed by Peer-to-Peer (P2P) traffic? (Hint: If you don't know, it's time to fire up NBAR and do a little investigating.) One way to stop P2P traffic is to use an access-list to block traffic on the well-know P2P ports. Unfortunately, many P2P technologies no …
I recently wrote about using Cisco's NBAR to investigate what protocols were in use on your network. I thought it might be interesting to take a look at the top 10 protocols on a residential broadband network. If you're running a large network, or planning a large network, perhaps this …
Many network administrators already know how to use tools like Cacti or MRTG to monitor the usage on their network links. (If you don't, let me know and I'll show you how.) Unfortunately, those tools only reveal part of the story. They show you how much traffic is traversing a …