What is this?

This knowledgebase contains questions and answers about PRTG Network Monitor and network monitoring in general.

Learn more

PRTG Network Monitor

Intuitive to Use. Easy to manage.
More than 500,000 users rely on Paessler PRTG every day. Find out how you can reduce cost, increase QoS and ease planning, as well.

Free Download

Top Tags


View all Tags

How do I set up flow filters to separate ingress and egress traffic on the same interface?

Votes:

0

I would like to monitor ingress and egress traffic on a port separately. How do I get individual data for inBound and outBound traffic with PRTG?

egress filter flow ingress netflow prtg stream traffic xflow

Created on Nov 19, 2014 5:25:50 PM by  Gerald Schoch [Paessler Support]



1 Reply

Accepted Answer

Votes:

0

This article applies to PRTG Network Monitor 14 or later

Separating Ingress and Egress Traffic

To separate the ingress and egress traffic on a port, set up a flow sensor for each interface. Particularly define an Include Filter for each sensor:

InboundInterface[interface-number]

-or-

OutboundInterface[interface_number]

Note: The interface number must be the interface number that appears inside the flow, which is not the same as the interface number that appears in the CLI (Command Line Interface) of the switch.

The interface_number can only be a single integer number, with no alphabet or special characters. So, you must use a number like “12” rather than “gi0/0/10”.

The interface numbers that appear inside the flow are not standardized and differ from model to model, also between models from the same vendor. They are often the same or similar to the interface index numbers that appear in SNMP counters, but this cannot be guaranteed.

How to Find Out the Interface Numbers

You have two options to determine the interface numbers for your model, either via the log file of a NetFlow sensor, or with the NetFlow Tester.

Finding Out Interface Numbers with the NetFlow Tester (V9/IPFIX ONLY)

You can use our free NetFlow Tester to get the correct interface numbers. Follow the instructions on the NetFlow Tester page to get flow data with the tool and analyze the Decoded Flows section. Find the interface numbers for inbound and outbound traffic next to the IF/OF entry (in the screenshot below, these are "3" and "2" for common flows, and "65535" internal traffic).

IF vs OF
Click here to enlarge.

Finding Out Interface Numbers with the Log File

  1. Set up a flow sensor, with no filtering, so that it includes all flows.
  2. In the sensor settings, enable Log Stream Data to Disk, and select the option All Stream Data.
  3. Run the logging long enough to be sure that you have both ingress and egress traffic on the interface captured in the log file.
  4. Disable the logging again, because stream logging can generate very large files on your PRTG server.
  5. You can find the resulting stream log file in the \StreamLog subfolder of your PRTG data folder.
  6. Open the log file and search for traffic that you know was ingress or egress on the interface you are interested in.
  7. Use the numbers in the columns InboundInterface and OutboundInterface in the include filter of your flow sensors.

Filtering over IP Ranges

Depending on the configuration of your router, inbound and outbound interfaces might not be useful for your use case. An alternative approach to this would be to filter over IP ranges.

Usually, internal IP addresses can be identified easily by filtering with a hostmask. Then you can create filters accordingly, for example inbound: (not sourceip[<intern_ip_range>]) and destinationip[<intern_ip_range>]

The filter for outbound would then be vice versa.

Created on Nov 19, 2014 5:44:20 PM by  Gerald Schoch [Paessler Support]

Last change on Aug 17, 2015 11:52:26 AM by  Luciano Lingnau [Paessler]




Disclaimer: The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.