Support
 
Support Get Quote
 
 
 
 

Monitoring router traffic

Router traffic analysis

Routers are critical network infrastructure components that need to be monitored at all times. Regularly monitoring routers helps administrators make sure that routers are communicating properly. Routine monitoring also sheds light on the traffic that passes through the network. Analyzing router traffic lets security admins identify possible network incidents early on, therefore avoiding downtime.

At a bare minimum, there are few simple but essential router details admins need to know. Basic router traffic data include:

  • Denied and allowed traffic based on source and destination.
  • Protocol-based traffic like TCP, UDP, and ICMP.
  • Denied ARPs and permitted ARPs.
  • Denied traffic based on DHCP snooping.

EventLog Analyzer is an ideal router traffic analyzer and allows you to monitor router traffic in real-time, extract useful information from router syslogs. Router traffic log reports are categorized into the following sections: 

Router traffic report by protocol

Conduct an in-depth traffic audit and obtain a complete overview of all the traffic that passes through a router. Track router traffic based on different protocols such as TCP, UDP, and ICMP, including the top traffic connections based on protocol and source. 

Router traffic errors

Keep track of router transmission errors, such as when there are too many fragments, when fragments overlap, or when a fragment length is invalid. View reports for permitted and allowed ARPs or denied traffic based on DHCP snooping.

Router accepted connections

Reports on router connection logs allow you to review accepted connections to visualize the kind of traffic navigating through your network. View information on all successful connections based on authorization, source, destination, protocol, and trend.

Router denied connections

Look up denied router connections to see what kind of traffic wants to enter your network and detect anomalies. Audit all denied connections based on source, destination, protocol, and trend. 

 
Customer Speaks
  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
     
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
     
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
     
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • I love the alerts feature of the product. We are able to send immediate alerts based on pretty much anything we can think of. We send alerts when certain accounts login, or when groups are changed, etc. That has been very helpful. Also the automatic archive of the log files has been very helpful and has taken the worry out of keeping old logs. The “Ask Me” function is very nice as well. It is great to have some natural language queries built in where you can just click a button and get an answer.
     
    Jim Earnshaw
    Senior Computer Specialist
    Department of Chemistry
    University of Washington
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
     
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

EventLog Analyzer Trusted By

A Single Pane of Glass for Comprehensive Threat Management