Exchange Tools 05-network Monitor 3.4

Source: Internet
Author: User
Tags microsoft download center

Network Monitor 3.4 is a free grab kit from Microsoft that assists administrators in crawling client or server-side access and interaction information to help troubleshoot problems.

This article shares how this tool gets, installs, and grabs the package.

First of all, this tool can be downloaded from Microsoft's website, as follows.

Download Microsoft Network Monitor 3.4 (archive) from official Microsoft Download Center
http://www.microsoft.com/en-us/download/details.aspx?id=4865

In the download details, you can view the version that can be downloaded, and the list of operating systems that fit into the installation.

650) this.width=650; "title=" f89eba1ef8bc41d484f2be17bb7300ea "style=" border-top:0px;border-right:0px; background-image:none;border-bottom:0px;padding-top:0px;padding-left:0px;border-left:0px;padding-right:0px; " Border= "0" alt= "f89eba1ef8bc41d484f2be17bb7300ea" src= "http://s3.51cto.com/wyfs02/M01/72/93/ Wkiom1xm1foz41bmaagnl-6z8ou497.jpg "height=" 484 "/>

We choose Download to download and then let us select the version to download.

If it's a 64-bit system, then we'll choose x64.

650) this.width=650; "title=" 9e24b1b1800949eb8185b6602e18d559 "style=" border-top:0px;border-right:0px; background-image:none;border-bottom:0px;padding-top:0px;padding-left:0px;border-left:0px;padding-right:0px; " Border= "0" alt= "9e24b1b1800949eb8185b6602e18d559" src= "http://s3.51cto.com/wyfs02/M02/72/93/ Wkiom1xm1fpqey0eaabp07s1e68460.jpg "height=" 262 "/>

When the download is complete, double-click to run the installation.

Here's how to use this.

We chose to start--Program--microsoft Network Monitor 3.4 to open the tool.

650) this.width=650; "title=" e380db46b7b4447181d1e919b0353f2a "style=" border-top:0px;border-right:0px; background-image:none;border-bottom:0px;padding-top:0px;padding-left:0px;border-left:0px;padding-right:0px; " Border= "0" alt= "e380db46b7b4447181d1e919b0353f2a" src= "http://s3.51cto.com/wyfs02/M00/72/93/ Wkiom1xm1fprgbyxaahhktxey7m827.jpg "height=" 340 "/>

Before the formal capture of the package, we can configure, to crawl the network card, you can choose in the lower left corner.

650) this.width=650; "title=" F1397be97fe0404b89db3b69d6ed1fa7 "style=" border-top:0px;border-right:0px; background-image:none;border-bottom:0px;padding-top:0px;padding-left:0px;border-left:0px;padding-right:0px; " Border= "0" alt= "f1397be97fe0404b89db3b69d6ed1fa7" src= "http://s3.51cto.com/wyfs02/M01/72/93/ Wkiom1xm1fobkuhjaagtifdavhg788.jpg "height=" 262 "/>

Then do not need to do other configuration, we select the new capture in the upper left corner, of course, if you want to open the grab file that has been grasped before, you can choose open capture files.

650) this.width=650; "title=" 39e65006c3904a5aa26b38bb4939293e "style=" border-top:0px;border-right:0px; background-image:none;border-bottom:0px;padding-top:0px;padding-left:0px;border-left:0px;padding-right:0px; " Border= "0" alt= "39e65006c3904a5aa26b38bb4939293e" src= "http://s3.51cto.com/wyfs02/M02/72/93/ Wkiom1xm1ftysqcqaadbluvwiji895.jpg "height=" 433 "/>

After selecting new capture, we open the Crawl packet interface and select start to start grabbing the packet.

650) this.width=650; "title=" ce10435cfdf0447eb3a93e127b9cdb2e "style=" border-top:0px;border-right:0px; background-image:none;border-bottom:0px;padding-top:0px;padding-left:0px;border-left:0px;padding-right:0px; " Border= "0" alt= "ce10435cfdf0447eb3a93e127b9cdb2e" src= "http://s3.51cto.com/wyfs02/M00/72/93/ Wkiom1xm1ftrs9zlaad-nhyyvnw588.jpg "height=" 315 "/>

You can then see the real-time captured information in the left pane.

650) this.width=650; "title=" 066cebf6d4274c49a639b468e8df497c "style=" border-top:0px;border-right:0px; background-image:none;border-bottom:0px;padding-top:0px;padding-left:0px;border-left:0px;padding-right:0px; " Border= "0" alt= "066cebf6d4274c49a639b468e8df497c" src= "http://s3.51cto.com/wyfs02/M01/72/93/ Wkiom1xm1ftru3v5aahmqbesrtm742.jpg "height=" 399 "/>

As you can see, Netmon can capture the Web Access and application access traffic that flows through the network card.

When the crawl is complete, we select Stop.

650) this.width=650; "title=" 4487e1d8112440469fa85fbc6b7f0a84 "style=" border-top:0px;border-right:0px; background-image:none;border-bottom:0px;padding-top:0px;padding-left:0px;border-left:0px;padding-right:0px; " Border= "0" alt= "4487e1d8112440469fa85fbc6b7f0a84" src= "http://s3.51cto.com/wyfs02/M02/72/93/ Wkiom1xm1ftgbp5paae9gpo6iju520.jpg "height=" 213 "/>

After we stop grasping the packet, we choose Save As, which can save the captured information for analysis.

650) this.width=650; "title=" B5d9c537c0c54d6d84d45a17dfb59cf2 "style=" border-top:0px;border-right:0px; background-image:none;border-bottom:0px;padding-top:0px;padding-left:0px;border-left:0px;padding-right:0px; " Border= "0" alt= "b5d9c537c0c54d6d84d45a17dfb59cf2" src= "http://s3.51cto.com/wyfs02/M00/72/93/ Wkiom1xm1ftgzpygaahpzldr1rq926.jpg "height=" 484 "/>

In the capture interface, you can see the details of the traffic, such as the source and destination, the protocols that are taken, and so on.

650) this.width=650; "title=" Fe690abc71aa45c49ca7f343e93fe1e3 "style=" border-top:0px;border-right:0px; background-image:none;border-bottom:0px;padding-top:0px;padding-left:0px;border-left:0px;padding-right:0px; " Border= "0" alt= "fe690abc71aa45c49ca7f343e93fe1e3" src= "http://s3.51cto.com/wyfs02/M02/72/90/ Wkiol1xm1naxqqwcaac0kdpfdfi869.jpg "height=" 169 "/>

In the parsers interface, you can see the details of the corresponding protocol.

650) this.width=650; "title=" edd6090035754d04bce403a68c53e15c "style=" border-top:0px;border-right:0px; background-image:none;border-bottom:0px;padding-top:0px;padding-left:0px;border-left:0px;padding-right:0px; " Border= "0" alt= "edd6090035754d04bce403a68c53e15c" src= "http://s3.51cto.com/wyfs02/M01/72/93/ Wkiom1xm1fxjd9wkaah1bjyffgs339.jpg "height=" 374 "/>

For Netmon to form the capture package file, we can also use other capture tools for analysis, such as if you are more familiar with Wireshark, then you can use the Wireshark to open the Netmo crawled file for analysis view.

This article from "Zeng Hung Xin Technical column" blog, declined to reprint!

Exchange Tools 05-network Monitor 3.4

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.