Packet analysis of flow list entries

The right-click procedure for packet analysis allows you to analyze packet-level information for a host, host pair, port, protocol, or flow reported anywhere in the NetProfiler user interface. However, an additional shortcut is provided for analyzing traffic flows at the packet level.

The Reports > Traffic pages have a report format option for displaying flow lists. The first column in the table listing traffic flows displays a row number for each flow listed. This can be clicked to analyze a traffic flow using the Packet Analyzer, as follows.  

  1. Left-click the flow list row number to display the "Analyze in Packet Analyzer" popup window. This window has a drop-down list of NetShark appliances classified as relevant and not relevant to the selected flow.

  2. Choose the NetShark appliance that you want to use as the source of the packet details you want to analyze. (The relevant NetShark appliance is pre-selected.)

  3. Click the link for the capture job on that NetShark appliance that you want Packet Analyzer to analyze.

  4. The NetProfiler generates a Packet Analyzer script file based on the NetProfiler report criteria and the NetShark capture job parameters. Click the link to launch Packet Analyzer with the script file.

  5. If required, Packet Analyzer displays a popup for you to enter the login credentials for the NetShark that you have selected.

  6. Enter the login credentials and click OK. This opens the main window of Packet Analyzer. The capture job you specified is listed in both the Devices and Files panels. In the Files panel you can use the trace clip created for the selection in the NetProfiler report. You can then apply views to the trace clip as necessary to analyze traffic at the packet level.

Refer to the Packet Analyzer documentation for descriptions of the features available for analyzing the traffic.

Packet analysis with Packet Analyzer

Packet-level reporting