What is this?

This knowledgebase contains questions and answers about PRTG Network Monitor and network monitoring in general.

Learn more

PRTG Network Monitor

Intuitive to Use. Easy to manage.
More than 500,000 users rely on Paessler PRTG every day. Find out how you can reduce cost, increase QoS and ease planning, as well.

Free Download

Top Tags

View all Tags





We are using DHCP SNOOPING in our network for HP.

IN PRTG we have one sensor which should monitoring on which vlan Snooping is enabled.

Switch reported string in hex Example 80-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-40-00-00-00-01-E0-00-80-00-00-00-01-00

Each octet means something, is it any way to translate this for example 80 means VLAN 1.

We received this string in message

dhcp-snooping prtg snmp

Created on Jun 14, 2018 1:13:47 PM

1 Reply



Dear Kromal,

this kind of result processing is not possible in PRTG. While some sensors offer to use a custom regular expression to extract a numerical value, and then use a custom lookup in order to interpret it further, this approach would still not provide what you are looking for.

In case you can get the string via an exe/script sensor, you could process the result in the script as well and return according information to PRTG.

Created on Jun 15, 2018 12:40:33 PM by  Arne Seifert [Paessler Support]

Disclaimer: The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.