What is this?

This knowledgebase contains questions and answers about PRTG Network Monitor and network monitoring in general. You are invited to get involved by asking and answering questions!

Learn more

PRTG Network Monitor

Intuitive to Use. Easy to manage.
More than 500,000 users rely on Paessler PRTG every day. Find out how you can reduce cost, increase QoS and ease planning, as well.

Free Download

Top Tags


View all Tags

What Data is Sent Across Probe-to-Core Connections?

Votes:

0

Your Vote:

Up

Down

Would you be able to give more detail on exactly what type of file is sent from the probe to the core server? One of our probes is on a very high security network and I cant get the firewall flows approved withought this kind of detailed information.

connection core probe probes

Created on Feb 1, 2011 10:37:40 PM by  Dirk Paessler [Founder Paessler AG] (10,984) 3 5



1 Reply

Accepted Answer

Votes:

0

Your Vote:

Up

Down

I do not have a concise list of the whole communication for you, but I can say this:

  • The connection is a TCP connection initiated by the probe
  • The data is transferred securely using SSL3.0/TLS encryption
  • The core sends monitoring "jobs" to the probe, including sensor type, IPs, target DNS names, sensor configuration, passwords
  • The probe sends back monitoring results for each sensor for every interval
  • During sensor creation and auto discovery so called "meta requests" are used to scan network devices for available sensor points
  • When a new version of PRTG is installed the installer EXE for the remote probe is transferred so the probe can be updated

Plus various other communications that keep everything running (including keep-alive and heartbeat packets).

Created on Feb 1, 2011 10:40:49 PM by  Dirk Paessler [Founder Paessler AG] (10,984) 3 5

Last change on Feb 1, 2011 11:00:10 PM by  Dirk Paessler [Founder Paessler AG] (10,984) 3 5



Please log in or register to enter your reply.


Disclaimer: The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.