<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://allegro-packets.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ralf</id>
	<title>Allegro Network Multimeter Manual - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://allegro-packets.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ralf"/>
	<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/Special:Contributions/Ralf"/>
	<updated>2026-04-06T18:27:30Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.13</generator>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Path_measurement&amp;diff=5204</id>
		<title>Path measurement</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Path_measurement&amp;diff=5204"/>
		<updated>2025-08-27T09:56:25Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Path measurement ==&lt;br /&gt;
&lt;br /&gt;
The path measurement module allows to passively measure the packet loss and latency at two measurement points. These can be between two Allegro Network Multimeter installations, or on a single device with traffic from two different locations.  &lt;br /&gt;
&lt;br /&gt;
For example, a network connection (line/link) between the main office and a remote office can be analyzed by installing one Allegro Network Multimeter at the main office and another Allegro Network Multimeter at the remote office.  &lt;br /&gt;
&lt;br /&gt;
Only network traffic (packets) passing through both Allegro Network Multimeters can be analyzed. The packet loss and two-way-latency thereof is measured and shown in graphs. &lt;br /&gt;
&lt;br /&gt;
The time synchronization setting (e.g. NTP/PTP or OFF) should be the same on both devices for the best results.&lt;br /&gt;
&lt;br /&gt;
It is also possible to use a single device to measure the traffic delay/losses between two different [[Virtual Link Group functionality|virtual link groups]]. In this mode, the primary device is used as a client too.&lt;br /&gt;
&lt;br /&gt;
Two pcap capture files can be compared to do an offline path measurement with previously captured files in two different locations.&lt;br /&gt;
&lt;br /&gt;
=== Live analysis ===&lt;br /&gt;
In live analysis mode, the packets are either gathered from the local device and a configured remote Allegro Network Multimeter, or from two different sources on the same local devices (different interfaces, different VLAN tags, or similar parameters available through virtual link group configuration).&lt;br /&gt;
&lt;br /&gt;
=== PCAP analysis ===&lt;br /&gt;
In PCAP mode, two PCAP files are processed the matching packets are used to determine the delay and possible loss between both files. For best results, the file should be recorded on the same device (by running two captures simultaneously from different sources), or from two devices with good time synchronization. &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The main device captures packet meta data from the remote (or client) device which takes only a fraction of the total traffic. Approximately 5% additional bandwidth is required for this capture connection. So for fully loaded 100 Mbit/s connection to the remote location an additional load of ~5 Mbit/s is required to get packet information to the main device.&lt;br /&gt;
&lt;br /&gt;
The measurement connection can be a separate line or can be run over the line that is measured, the capture connection will be automatically ignored for the measurement.&lt;br /&gt;
&lt;br /&gt;
The measurement module must be configured with a maximum packet delay.  This delay describes the amount of time the main device waits for packet information to arrive from the remote device. The delay must be large enough to cover the actual latency of the connection and delay of the capture connection. Typical values are between 2 and 5 seconds. Larger values requires more memory to buffer packet meta data so very large values might only be selectable on larger Multimeter devices (Allegro 1000 or greater).&lt;br /&gt;
== Configuration live measurement ==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; &lt;br /&gt;
|-           &lt;br /&gt;
|[[File:Ap-mm-path-measurement-1.png|600px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Settings ===&lt;br /&gt;
&lt;br /&gt;
* Enable analysis: This will disable or enable the path measurement feature. When disabled, no additional memory is used. When enabled, memory for the packet buffer is used which cannot be used for other analyzing modules thus reducing the maximum time the device can go back in time.&lt;br /&gt;
Primary device settings:&lt;br /&gt;
* Description of this main device: This field is only used for informational purposes to identify the main device. It can be freely chosen, for example to the location the device is installed. This field can also be left empty to use the default name &#039;&#039;&#039;main&#039;&#039;&#039;.&lt;br /&gt;
* &#039;&#039;&#039;Primary device VLG filter:&#039;&#039;&#039; It is possible to limit the amount of data analyzed by any configured virtual link group. Often, the primary device is located at a central network point and thus sees a lot of traffic that is not actually going to the remote device. The algorithm will automatically take this into account, but using a filter will reduce the processing overhead as well as the amount of data that needs to be buffered.&lt;br /&gt;
&lt;br /&gt;
The following &#039;&#039;&#039;Client device&#039;&#039;&#039; configuration section configures the access to the remote device:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Device to use&#039;&#039;&#039;: To use a remote device for path measurement, you first need to add that device as a remote device to the list of [[Multi-device settings]]. It does not matter if the device is active or not.  You can select the device from the list of known multi-devices. You can also select the primary device as a client to analyze the traffic between two different virtual link groups.&lt;br /&gt;
* &#039;&#039;&#039;Device description&#039;&#039;&#039;: Similar to the description of the main device, this field is for informational purpose only and has no other effect than helping identifying the remote device in the statistics. Usually the location of the remote device is entered.&lt;br /&gt;
* &#039;&#039;&#039;Client device VLG filter&#039;&#039;&#039;: The traffic used for comparison at the main device can be filtered to any virtual link group defined at the client device. There are two main purposes for this setting:&lt;br /&gt;
*# reduce the amount of data required to be transferred to the main device. The path measurement only considers connections seen on both devices, but the client device of course cannot know if any connection it sees also is visible on the main device. If only traffic of a specific virtual link group (VLG) actually reaches the main device, using this filter can reduce the amount of data transferred and later dismissed.&lt;br /&gt;
*# filter duplicate traffic: If, for some reason, traffic is seen multiple times, it can create wrong results as the number of occurrences differs from main to client devices. A VLG filter can fix this problem by only considering one part of the total traffic.&lt;br /&gt;
* &#039;&#039;&#039;GNSS-synchronized clocks&#039;&#039;&#039; (Firmware &amp;gt;= 4.5): If the selected device is a remote device and both primary and client device have GNSS time synchronization enabled, this option can be enabled to generate one-way latency instead of regular two-way latency.&lt;br /&gt;
&lt;br /&gt;
Measurement settings:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum packet delay&#039;&#039;&#039;: This field describes the maximum amount of seconds to wait for packet information from the remote device.&lt;br /&gt;
: It basically means that the main devices waits for this number of seconds before deciding if a packet has been lost or not. If the data from the remote device arrives before those number of seconds, the path measurement can account the packet loss, if any and the two-way latency. This value must be at least as large as the worst-case latency between both measurement sites.&lt;br /&gt;
: Usually 3 seconds are more than enough but when the network in between can have a very long delay, you can increase the value. This will, however, use more main memory for the packet buffer.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum original packet rate:&#039;&#039;&#039; This field defines the maximum packet rate that is to be expected. It directly defines the necessary amount of memory for storing packet information for the defined packet delay. The field can be left empty (or zero) to use the maximum supported packet rate of the device. This value usually only has to be adjusted if the debug information about &amp;quot;Packets processed too early&amp;quot; is non-zero which indicates that the packet rate exceeded the assumed packet rate limit.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Ignore IP identification field&#039;&#039;&#039;: This option can be enabled if the IP identification field in the IPv4 header is modified by some component in the network. Often it remains constant for a single packet so this option should be left disabled as it will also increase the chance of reporting duplicate packets. But if you notice symmetrical packet loss you can enable this option to see if this helps.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Ignore VLAN tags for connection matching&#039;&#039;&#039;: The path measurement only calculate loss and latency for connections seen on both devices. Usually the connection ID takes the IP pairs, port ports and possible VLAN tags into account. If a VLAN is different on both machines for the some connection, then this option must be enabled to be able to correlate the connection and calculate correct statistics.&lt;br /&gt;
* &#039;&#039;&#039;Account latency also per IP connection&#039;&#039;&#039;: Enabling this option will let the path measurement also store the latency for each individual IP connection, which of course increases the memory usage.&lt;br /&gt;
* &#039;&#039;&#039;Enable NAT mode&#039;&#039;&#039; (Firmware &amp;gt;= 4.3): This feature will enable support for Network-Address-Translation setup (typical for firewalls or internet uplink routers).&lt;br /&gt;
** &#039;&#039;&#039;NAT Private subnet/mask:&#039;&#039;&#039; This value describes the internal IP addresses that gets translated into an external IP address. An example value is &amp;quot;192.168.1.0/24&amp;quot; if all internal devices uses IP addresses in the range 192.168.1.0-192.168.1.255.&lt;br /&gt;
** &#039;&#039;&#039;NAT Public subnet/mask:&#039;&#039;&#039; This value defines the external IP address that internal IPs of the private subnet are translated to. It can also be an IP subnet (for example, if multiple external IP addresses are used). An example value is &amp;quot;10.1.2.3&amp;quot; if the NAT router is using the external IP 10.1.2.3 and all its internal clients are visible under this IP.&lt;br /&gt;
** &#039;&#039;&#039;Account unmatched flows:&#039;&#039;&#039; This option allows to monitor also connections there are not seen on the other measurement side. This is useful to see blocked connections in firewall setups.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum packet length for lost packets PCAP&#039;&#039;&#039;: If a lost packet capture is running this setting configures the packet length for these packets. Keep this number as low as possible for optimal memory consumption. Each packet will be stored in memory until it is either confirmed by the client device (considered as not lost) or the maximum packet delay is over and the packet is considered lost and written to the PCAP.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Threshold for high latency packets PCAP&#039;&#039;&#039;: This is the threshold for a high latency PCAP. This is applied for single device measurement only. Packets with a larger time difference in their configured VLGs as this threshold can be captured. The latency value must not be larger than the maximum packet delay.&lt;br /&gt;
&lt;br /&gt;
The settings must be saved but to actually take effect, a restart of the packet processing is necessary. If this step is required, a notification will tell so at the bottom of the page under &#039;&#039;&#039;Required actions&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== Parameters currently in use ===&lt;br /&gt;
&lt;br /&gt;
This section shows the current state of the measurement engine. The engine might be inactive even if the feature is enabled. Usually a restart is required to actually make it active. If active, the current packet delay is shown. It might be different from the selected value in the configuration above, but if so a note appears that a restart is required.&lt;br /&gt;
&lt;br /&gt;
=== Required actions ===&lt;br /&gt;
&lt;br /&gt;
An info box appears if the a restart of the packet processing is required. The shown link leads to the page &#039;&#039;&#039;Settings → Administration&#039;&#039;&#039; where the restart can be triggered. The device itself does not need to be rebooted, only the packet processing must be restarted which usually takes only a few seconds.&lt;br /&gt;
&lt;br /&gt;
== Configuration PCAP measurement ==&lt;br /&gt;
[[File:Path-measurement-pcap-settings.png|border|660x660px]]&lt;br /&gt;
&lt;br /&gt;
The path measurement can also be done based on two capture files created from two different network locations. The separate configuration tab &amp;quot;Configuration PCAP Analysis&amp;quot;  allows to select two files from attached storage devices.&lt;br /&gt;
&lt;br /&gt;
The files are replayed based on the packet time stamps within each file, in chronological order. Matching packets are only recognized if they are within the maximum packet delay. If the difference of the timestamps is larger, a time-delta adjustment value can be entered which will be added to the timestamp of the client packets. Negative values are possible as well to be able to adjust the time in both directions. If the time difference is too large, a lot of packet loss are reported, or even a &amp;quot;network setup problem&amp;quot; note is shown in the overview tab. If the time delta between both files is not known, a test run can be enabled to calculate the approximate difference. When both files are fully processed in this test run, the result is shown in the overview tab and this value can be used for the actual analysis. &lt;br /&gt;
&lt;br /&gt;
The settings are similar to the live measurement. VLG filter can be applied to both files, but an option also allows to disable the use of the configured virtual link groups, or use separate groups for each file. In contrast to live mode, a VLG does not need to be used to differentiate traffic since it is clear from the selected file which one is the primary traffic and which one is the client traffic. But of course VLG can be used to filter out traffic that should not be part of the analysis.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Measurement settings&amp;quot; contains all settings from the live measurement plus three options only applicable in PCAP mode.&lt;br /&gt;
&lt;br /&gt;
* Virtual link group mode: Select to either use:&lt;br /&gt;
** Use global VLG settings: Use the VLG configuration configured globally on this device.&lt;br /&gt;
** Use separate VLG per file: Create a temporary VLG for each file so all statistics can be accessed for each individual file regardless of the configuration of the regular virtual link groups.&lt;br /&gt;
** Disable use of VLGs: Disable all VLG configurations and use one common view of all data.&lt;br /&gt;
* Run analysis in main memory: The analysis requires a relatively large amount of memory depending on the setting values for packet delay and packet rate. In live mode, this data is always kept in main memory for performance reasons, but in PCAP mode the data  is stored on a local storage device by default. This is slower but does not require a lot of additional memory reserved, especially when parallel pcap analysis is enabled.&lt;br /&gt;
* Storage device to use: If a storage device is available, the first one is selected by default. Otherwise the system disc is used to store the packet comparison information. The approximate amount of storage space required is shown below the selection box.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;IMPORTANT NOTE 1:&amp;lt;/u&amp;gt; The configuration values for packet rate and packet delay can be adjusted to reflect the actual parameters of the given PCAP files. The values are in relation to packet time of the PCAP files, not real time. So the packet rate does not correlate with the actual processing speed (which might be higher or lower than the packet rate within the PCAP files). The packet rate should be adjusted if the debug value &amp;quot;Packets processed too early&amp;quot; is non-zero. The default packet delay is set to 1 second to reduce the amount of memory required but should be adjusted to the expected maximum delay within the PCAP recording.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;IMPORTANT NOTE 2:&amp;lt;/u&amp;gt; If time stamp adjustment is used, all time stamps from the client file are adjusted which affects the analysis, but also the capture of these packets. So when doing a capture from that client file data, the packet time stamps are no longer the original timestamps but adjusted by the configured time delta.&lt;br /&gt;
&lt;br /&gt;
== Measurement statistics ==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; &lt;br /&gt;
|-           &lt;br /&gt;
|[[File:Ap-mm-path-measurement-2.png|600px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Measurement ===&lt;br /&gt;
The &#039;&#039;&#039;measurement&#039;&#039;&#039; tab show the real-time results of the ongoing measurement.&lt;br /&gt;
At the top the current state of the measurement engine and the remote connection is shown. &lt;br /&gt;
The measurement status can be &#039;&#039;&#039;not running&#039;&#039;&#039; if it is disabled, &#039;&#039;&#039;warming up&#039;&#039;&#039; if the engine waits for synchronization with remote device, and &#039;&#039;&#039;running&#039;&#039;&#039; if it actually measures data.&lt;br /&gt;
The &#039;&#039;&#039;remote client status&#039;&#039;&#039; indicates if the connection to the remote device is established. &lt;br /&gt;
Since the packet information are gathered real regular capturing from the remote device, the capture connection is visible in the capture section of the remote device and might be stopped there. &lt;br /&gt;
If the measurement connection is stopped or stopped working for other reasons (remote device unavailable, etc), the status box will turn red and a button appears to reconnect to the remote device. &lt;br /&gt;
If the reconnect fails, an error message appears with detailed information what was going wrong.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; Typical errors are:&#039;&#039;&#039;&lt;br /&gt;
*remote device inaccessible (are the IP and port settings correct?)&lt;br /&gt;
* authentication error (invalid credentials?) When both boxes are green, the measurement is running and the four graphs show the real-time results.&lt;br /&gt;
* Insufficient memory: Usually may only appear in PCAP analysis mode indicating that the values for packet delay and packet rate are too large. Either reduce the values or use a larger storage devices capable of storing the required data (amount shown in the configuration section)&lt;br /&gt;
&lt;br /&gt;
==== Two-Way-Latency ====&lt;br /&gt;
&lt;br /&gt;
The first graph shows the latency measured from the main device to the remote device and back. &lt;br /&gt;
It cannot (due to asynchronous local time sources) measure the one-way latency of a single packet but only the duration of packets going in both directions.&lt;br /&gt;
Example: Assume a packet A is seen from main to remote device and another packet B is seen from remote to main device.&lt;br /&gt;
The time difference when packet A is seen on main and on remote device plus the time difference of packet B being seen on remote and main device is taken into account to determine the two-way latency. Packet A and packet B do not need to be related in any way.&lt;br /&gt;
If traffic is going only in one direction, the measurement will not show any time result (even though packet loss is still visible).&lt;br /&gt;
For each second, the average, minimum, and maximum two-way-latency is accounted and shown in the graph. &lt;br /&gt;
To the left of the graph the statistics for the visible time range is shown, changing the zoom level or time interval will update the values accordingly.&lt;br /&gt;
&lt;br /&gt;
==== One-Way-Latency ====&lt;br /&gt;
If the path measurement is used on a single device (by selecting the primary device as client device too), the one-way latency is shown for each direction instead of the two-way-latency. PCAP buttons are available for a capture of high latency packets that exceeds the configured threshold.&lt;br /&gt;
&lt;br /&gt;
==== Lost packets ====&lt;br /&gt;
&lt;br /&gt;
The second and third graph show the number of lost packets in each direction. Lost packets are only accounted for connections that have been seen on both devices.&lt;br /&gt;
&lt;br /&gt;
Depending on the installation point and routing setup, connections might be not be routed to the second device on purpose. These connections are not accounted as loss on the other device. &lt;br /&gt;
&lt;br /&gt;
The second graph accounts all packets that have been seen on the remote device, but are missed on the main device. That means that those packets got loss on its way to the main device.&lt;br /&gt;
&lt;br /&gt;
Accordingly, the third graph accounts all packets that have been seen on the main device, but are missed on the remote device. An additional counter &amp;quot;&#039;&#039;&#039;Client packet drop due to overload&#039;&#039;&#039;&amp;quot; indicates if some packets could not have been captured on the client device so they are missing for comparison at the main device.  If this value is not zero, those packets are accounted as packet loss even though it might not be actually losses. For correct measurements, make sure the graph for remote packet drops is never non-zero. These drops may happen due to several reasons:&lt;br /&gt;
&lt;br /&gt;
A capture button for lost packets is available for capturing packets seen on main device but considered as lost on the remote device. The capture is available for live mode only, i.e. if a time interval is selected in the Allegro Network Multimeter it will be ignored. When starting the capture, the path measurement engine will store all packets on the main device with the configured length and write them after the packet delay timeout into the PCAP. Only packets of the main device are considered (packets lost on main device but seen on remote device will &#039;&#039;&#039;not&#039;&#039;&#039; be captured). For a single device measurement between different VLGs the lost packets PCAP buttons are available for both directions (main to remote or remote to main).&lt;br /&gt;
&lt;br /&gt;
#System capture overload: If multiple captures are running in parallel, the CPU might be overloaded. Check the &#039;&#039;&#039;All&#039;&#039;&#039; tab in the Capture page to see how many captures are running.  In best case there is only the one capturing connection to the main device.&lt;br /&gt;
#The capturing connection is encrypted with SSL. The small Allegro 200 has a limited encryption capacity so for large traffic this can be a bottleneck. The only solution is to use a more powerful Allegro Network Multimeter.&lt;br /&gt;
#Capture drops can also occur if the network connection is not capable of transferring the data fast enough. Rule of thumb is that approximately 5% of the total traffic is used for the measurement connection. For example, if the traffic is 500 MBit/s, the measurement requires ~25 MBit/s of bandwidth on the management port.&lt;br /&gt;
&lt;br /&gt;
==== Monitored packet rate ====&lt;br /&gt;
The fourth graph shows all packets that are monitored for the path measurement. This will cover all connections that have been seen on both devices.&lt;br /&gt;
&lt;br /&gt;
==== NAT collision packet rate ====&lt;br /&gt;
This graph shows the number of packets per second that appeared in connections with colliding IP addresses/ports in NAT setups. This happens if matching packets are seen on both sides for more than two connections (the internal and the external connection). Since this is only relevant for matching packets within the defined timeout, it may help to reduce the timeout if possible.&lt;br /&gt;
&lt;br /&gt;
=== IP addresses ===&lt;br /&gt;
&lt;br /&gt;
The second tab shows packet loss information for each pair of [[Common table columns#IP|IP addresses]]. This statistic covers all IP connections that has been seen on both measurement sides. The table shows the number of packets that have been counted for each communication pair. Additionally the number of packets seen on the main device and the corresponding packet loss is shown. The same statistics are shown for the client device too. You can click on the IP address to go to the detailed statistics of the IP module to check which kind of traffic was happening for that IP. Two graphs are shown for each IP pair which shows the packet loss for both direction on one graph and the total packets in the second graph.&lt;br /&gt;
There is also a capture button to capture traffic for the IP pair.  The captured traffic is only the traffic seen on the main device, it will not contain any packet from the client device as the main device does not have the packet data information available. To capture traffic from the client device, you have to go to the web interface of the client device and start a capture on that device.&lt;br /&gt;
&lt;br /&gt;
The IP pair table also show the two-way latencies for the traffic of each IP pair, if the corresponding toggle is selected above the table. In single-device mode, also the one-way latency is shown.&lt;br /&gt;
&lt;br /&gt;
For each IP, there is also a link to the IP connections. If enabled, each individual IP connection also stores the latencies for more detailed view.&lt;br /&gt;
&lt;br /&gt;
==== Switching graph modes ====&lt;br /&gt;
&lt;br /&gt;
The toggle buttons above the graphs allow to switch the graph modes from absolute values to relative values. This setting will show the lost packets in relation to the total (monitored) traffic.  The second option allows to show Mbit/s throughput instead of the packet rate.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
There are some limitations about the path measurement:&lt;br /&gt;
&lt;br /&gt;
# Due to technical reasons, large clock adjustments cannot be filtered out. So in such cases, a very large two-way-latency is measured. Both devices need not be time synchronized per se, however, considerable time differentiation must be avoided. This means that time synchronization (e.g. NTP/PTP) should either be enabled or disabled on both devices for best results. Clock differentiation miss-measurements are however one-time events, and will not lead to false values for the following packets.&lt;br /&gt;
# The maximum supported packet size for the path measurement is currently 2048 bytes. Larger packets are truncated for the measurement.&lt;br /&gt;
# WAN optimizer and similar devices which rewrite some of the traffic are not supported either. If packet data is changed (like modifying the TCP header, adding TCP options, etc) the flow will account packet loss on both sides as the original packets are not seen on the other side. If the device in between also modifies the IP addresses or ports, the flows will be accounted as unmonitored.&lt;br /&gt;
# The global setting for the packet length accounting should be set to the same value on both devices. Otherwise identical packets might be considered different because of different length and the bandwidth information will be inconsistent.&lt;br /&gt;
# (Only firmware &amp;lt; 4.3): NAT setups and different VLAN combinations on main and client are not supported at the moment. Such flows will be accounted as unmonitored flows in the debug view.&lt;br /&gt;
&lt;br /&gt;
== Typical use cases==&lt;br /&gt;
&lt;br /&gt;
See [[Analyze connections between remote sites]] to get a detailed overview of use cases and device setup.&lt;br /&gt;
&lt;br /&gt;
==  Debug information ==&lt;br /&gt;
&lt;br /&gt;
The debug information tab shows additional statistics which are usually only relevant for identifying problems in the path measurement, either program errors or test setup errors.&lt;br /&gt;
&lt;br /&gt;
#&#039;&#039;&#039;Monitored flows seen on both devices:&#039;&#039;&#039;The monitored flows describes all IPv4 and IPv6 connections that have been seen on both devices and are used for calculating the latency and packet loss. Only this traffic can be considered for the actual measurement. In a working setup, the value must be non-zero.&lt;br /&gt;
#&#039;&#039;&#039;Flows seen on both devices without matching packets:&#039;&#039;&#039; If a flow is seen on both devices but not a single packet matches on both sides, it indicates a potential network setup problem. This probably means the packet is somehow modified by a device in between both measurement points. This setup is not supported. Usually this value should be zero. Small non-zero values can be ok, if the first number of monitored flows is much larger.&lt;br /&gt;
#&#039;&#039;&#039;Unmonitored flows seen only on &#039;&#039;main&#039;&#039;:&#039;&#039;&#039; This counter shows the number of IP connections that are only visible at the main device. It means that for those connections no matching client packet has been received. If the main device also sees network traffic that is not routed to the client device, this value can be non-zero.&lt;br /&gt;
#&#039;&#039;&#039;Unmonitored flows seen only on &#039;&#039;client&#039;&#039;&#039;&#039;&#039;: This is the same counter as for the main device, but counting the connections on the client device that have not been seen on the main. Again, if the client device sees traffic that is not routed to the main, it is fine to see non-zero values here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Possible problematic scenarios:&lt;br /&gt;
&lt;br /&gt;
* There is a device between main and client that modifies the traffic (like a WAN optimizer): You will notice a larger value for counter 2 (flow without matching packets),almost zero value for counter 1 (flows seen on both devices).&lt;br /&gt;
&lt;br /&gt;
* There is a device between main and client that changes ports and IP addresses (a NAT): &lt;br /&gt;
&lt;br /&gt;
You will notice almost zero values for counter 1 and 2, but high values for counter 3 and 4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Both scenarios are not supported by the path measurement.  &lt;br /&gt;
&lt;br /&gt;
Please adjust the test setup to disable any device modifying the network as described above.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The table below shows the following counters for the main and remote device:&lt;br /&gt;
&lt;br /&gt;
#The counter about packets seen on all devices measures the total amount of packets monitored and considered for the analysis.&lt;br /&gt;
#The packets seen only on one devices indicates how much packets are lost on the other devices.&lt;br /&gt;
#Duplicated packets: This counter includes packets that are duplicated or have the same checksum. It is valid to see non-zero values here. Some protocols like broadcast actually do not differ in the payload so the packet checksum will be identical. If those packets appear within the packet delay time window, it is accounted as a duplicate to the previous one.&lt;br /&gt;
#Failed to process on main device: This counter indicates that packets from the client have been discarded due to overload of the main device. The main device was not fast enough to process client packets. This usually means the local packet rate (at the main device) is too high. &lt;br /&gt;
# Ignored on main device: These packets are ignored because the flow is unknown to the main devices. This happens when the packet checksum is received from the client but no connection information for that packet is known by the main device. This value should always be zero. Otherwise it means that the number of active flows is too high.&lt;br /&gt;
#Packets processed too early: This counter covers packets that packets could not be stored long enough to hit the configured packet delay limit.  This happens when the packet rate is higher than the supported packet rate of the main device.&lt;br /&gt;
#NAT collision packets: This counter counts all packets that are seen on both sides for multiple connections so the Network Address Translation could not be reversed for connection tracking.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Below the table, two graphs showing time drift information are visible. &lt;br /&gt;
The first graph shows the &#039;&#039;&#039;packet delay&#039;&#039;&#039;. It is the time between a matching packet from the main device and the client. &lt;br /&gt;
This value describes for how long the main device needed to wait to get a matching packet from the client. &lt;br /&gt;
This value should always be much lower than the maximum packet delay configured in the path measurement configuration. &lt;br /&gt;
The value cannot be larger than the maximum as then packets can no longer be matched. If the value keeps reaching the maximum, two problems are possible:&lt;br /&gt;
&lt;br /&gt;
#The delay between main device and client is large due to generic network delay. For example, if a high-latency connection is used for path measurement, it can even take a few seconds for a packet info to arrive. Configure a larger maximum packet delay.&lt;br /&gt;
#The bandwidth of the connection from the client (the client’s upload speed) is too small to satisfy the requirement for the checksum connection. This problem can be identified if even increasing the maximum packet delay does not help. If the bandwidth is too small, the packet will hit the maximum delay for any value configured, it will just take a little longer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In this case try to use an alternative network connection to connect to the client device.&lt;br /&gt;
&lt;br /&gt;
The second graph shows the time drift between the main device and client device. &lt;br /&gt;
Usually there will always be a drift between the clocks of both devices (if they are not synchronized by some mean). Even large drifts (hours, days, etc) are typically not a problem as the two-way latency zero-out the drift. &lt;br /&gt;
But if the drift increased dramatically (like multiple seconds) constantly over a large period of time, it usually indicates a bandwidth overload just like the first graph.&lt;br /&gt;
&lt;br /&gt;
== FAQ ==&lt;br /&gt;
# What does the note &#039;&#039;&#039;Network setup problem detected: Packet modification or complete loss&#039;&#039;&#039; means?&lt;br /&gt;
#:This message box appears if flows have been identified for which not a single packet could be seen on both sides. Usually this means that there is some device in between both measurement points that modifies the packet. This can be WAN optimizer which rewrite TCP connection for improved network performance. Such setup is not supported.&lt;br /&gt;
#: It can also mean that some other packet field is modified at some point in the network. One field that is known for modification is the IP identification field in the IPv4 header. For this case an additional option can be enabled to ignore this field.&lt;br /&gt;
#: When using the PCAP analysis mode, this error can also appear if the files are not time synchronized. In this case, a time adjustment value must be entered to synchronize both files. A test run can be used to calculate a possible value.&lt;br /&gt;
# What does the note &#039;&#039;&#039;VLAN tag mismatch detected for matching packets on main device and client&#039;&#039;&#039; means?&lt;br /&gt;
#:This message indicates that matching packets have been seen on both devices but the used VLAN tag is different. Depending on the measurement setup, this may indicate an error as for connection matching the IP addresses, ports, and VLAN tags are used unless the option to ignore the VLAN tag is enabled. Therefore, the identical packets will be accounted for two different connections often resulting in shown packet loss.&lt;br /&gt;
#: Often, the recommended solution is to enable the configuration option &#039;&#039;&#039;Ignore VLAN tags for connection matching&#039;&#039;&#039;.&lt;br /&gt;
# What kind of packet information is used to determine latency and packet loss?&lt;br /&gt;
#:Both measurement devices calculate checksums starting from the layer 3 packet data to compare packet information on both sides.  This means for IPv4 and IPv6 traffic, the Ethernet header including possible VLAN tags is ignored. For non-IP traffic, the complete layer 2 packet is used so this traffic can only be analyzed in switched networks.&lt;br /&gt;
# What can I do if I think the packet loss is wrong?&lt;br /&gt;
#: Often, incorrect loss is reported because there is some kind of packet modification that is not support. See the list of limitations above if any of those apply to your setup. Also, try the configuration options to ignore some packet fields to see if that makes any difference.&lt;br /&gt;
#: You can contact [[Reaching Allegro Support|our support]] and if possible provide a small capture from both network sides that cover the same traffic. This will help us to find the reason for the shown packet loss.&lt;br /&gt;
# How can I distinguish between real packet loss and reported packet loss due to packet modifications?&lt;br /&gt;
#: Packet loss is reported when a packet checksum does not match any other checksum reported by the other side within the configured maximum packet delay timeout. Reasons for such an event are&lt;br /&gt;
## Actual loss&lt;br /&gt;
##: The packet have been seen on one side but not the other. In this event the loss graph is usually different between the main device and remote device.&lt;br /&gt;
## Packet modification&lt;br /&gt;
##: Some component modifies the packet in some way. Since such a modification is usually done in both direction (sender and receiver), the packet loss is visible on both sides. Therefore the loss graph is symmetrical.&lt;br /&gt;
## Overloaded management connection&lt;br /&gt;
##: The management connection is used to get packet checksum from the remote device. If the connection is not fast enough to transmit the checksum within the configured maximum packet delay time, the packets are then reported as loss.&lt;br /&gt;
##: This can be verified by looking at the debug graph &#039;&#039;&#039;Packet delay between local and remote packets&#039;&#039;&#039;. In this event, the time will always be at the top limit that is the maximum packet delay time.&lt;br /&gt;
## Temporary network failure&lt;br /&gt;
##: In this event the packets are really lost on both directions so the loss graph may also look similar. However, since no packet can be transmitted to the other side, you will also see no entries in the two-way-latency graph.&lt;br /&gt;
# How is the two-way latency calculated?&lt;br /&gt;
#:The system monitors individual IP connections and stores the time difference between the occurrence of the same checksum on both the main and client devices. Since this time difference contains the unknown time drift between both systems, it cannot be used directly as a latency value. Instead, the system waits until a packet from the opposite direction has been seen on both systems. Both time differences for direction A-&amp;gt;B and B-&amp;gt;A build the actual two-way latency. Since both packets may not be directly related, it is not directly comparable with a round-trip time. It gives however an accurate view on how long data took transmitting back and forth during each individual time segment.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=5199</id>
		<title>Longterm DB</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=5199"/>
		<updated>2025-08-14T09:55:56Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
The Long-term DB feature (in firmware &amp;gt;= 4.3) uses an attached storage devices to store traffic information of IP addresses and Layer 7 protocols with low resolution for a much longer time than the live statistics.&lt;br /&gt;
&lt;br /&gt;
The elements stored in the long-term DB are as follows, graph data is available in 5 minute resolution: &lt;br /&gt;
&lt;br /&gt;
* MAC addresses (in firmware &amp;gt;= 4.5)&lt;br /&gt;
*# activity time&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
*# global statistics&lt;br /&gt;
* IP addresses&lt;br /&gt;
*# activity time&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
*# global statistics  (in firmware &amp;gt;= 4.5)&lt;br /&gt;
*# IP peers and their traffic (in firmware &amp;gt;= 4.6)&lt;br /&gt;
*IP groups (in firmware &amp;gt;= 4.5)&lt;br /&gt;
*# activity time&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
* Global IP pairs (in firmware &amp;gt;= 4.6)&lt;br /&gt;
*# List of IP pairs and their traffic&lt;br /&gt;
* Layer 7 protocols&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
&lt;br /&gt;
The storage is used similar to a swap file mechanism. The long-term data needs to be written in a format readable by new versions. Since firmware version 4.5, this is done automatically on restarts. An option allows to write the DB back into a persisted format on a daily basis. &lt;br /&gt;
&lt;br /&gt;
==Usage==&lt;br /&gt;
[[File:Longterm DB dashboard.png|alt=Long-term DB activated dashboard|thumb|Long-term DB activated dashboard]]If this feature is enabled, a view toggle button appears in the top menu bar. This button allows to switch between the real time &amp;quot;RT&amp;quot; view and the long-term (&amp;quot;LT&amp;quot;) view.&lt;br /&gt;
&lt;br /&gt;
In the long-term view, the IP address information contain only information about the traffic amount in 5 minute resolution.&lt;br /&gt;
&lt;br /&gt;
The navigation menu in the long-term view only contains those modules which are available in this view.&lt;br /&gt;
&lt;br /&gt;
If the long-term view is activated on module pages which do not support long-term data, a corresponding info box is shown.&lt;br /&gt;
&lt;br /&gt;
==Setting==&lt;br /&gt;
The configuration can be found in the global settings page in the &amp;quot;Long-term DB and persistence&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
* To enable this feature, select a storage device to be used, enable the feature and enter a file size. The &amp;quot;required storage space&amp;quot; field shows how much memory is actually used which is usually at least double the configuration long-term DB size (due to additional space required for data persistence).&lt;br /&gt;
* The option &amp;quot;Data persistence mode&amp;quot; allows to select an alternative mode which also dumps parts of the live database onto disc. This increases the amount of space and time required to write the data and is usually not necessary.&lt;br /&gt;
* The long-term data base can be persisted once per day by enabling the corresponding option and selecting a time of day where the dump should happen. It is recommended to enable this option and to choose a time with less traffic then usual to avoid system overload during the dump time.&lt;br /&gt;
&lt;br /&gt;
Once enabled, the utilization of the file is shown and the [[System Info Page]] contains information about how long the data can be kept.&lt;br /&gt;
&lt;br /&gt;
Tip: Since the amount of information stored in the long-term DB is limited by the graph resolution, the file size usually don&#039;t need to be similar sized as the main memory. 10 GByte is a good starting point.&lt;br /&gt;
&lt;br /&gt;
The size can be increase but it requires a restart of the packet processing.&lt;br /&gt;
&lt;br /&gt;
[[File:DB persistence settings.png|thumb|Long-term DB settings]]&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
Recommended storage device types:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Storage device&lt;br /&gt;
!Note&lt;br /&gt;
|-&lt;br /&gt;
|NMVe based SSD&lt;br /&gt;
|recommended&lt;br /&gt;
|-&lt;br /&gt;
|SATA based SSD&lt;br /&gt;
|can be used for moderate traffic, check system load for high system utilization&lt;br /&gt;
|-&lt;br /&gt;
|USB based SSD&lt;br /&gt;
|not recommended, but might be useful for small systems (Allegro 200/500/510)&lt;br /&gt;
|-&lt;br /&gt;
|HDD&lt;br /&gt;
|not recommended, should not be used&lt;br /&gt;
|}&lt;br /&gt;
It is also not recommended to place the long-term DB on the same storage device that is used a packet ring buffer as it will deteriorate the performance of both features.&lt;br /&gt;
&lt;br /&gt;
The feature can be disabled temporarily and the last snapshot of persisted data is still kept. To remove this data permanently, use the delete buttons at the bottom of the configuration page.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
# The data in the long-term DB is limited to a selected subset of the data in the In-Memory-DB. See above for an exact list of elements available.&lt;br /&gt;
# The data is written into the long-term DB in variable intervals depending on traffic and system load. It takes up to 10 minutes (two graph intervals) until the data appears in the graph. Therefore, the last 5-10 minutes appear empty or with less traffic than in live view.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=List_of_Supported_Transceiver_Modules&amp;diff=5198</id>
		<title>List of Supported Transceiver Modules</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=List_of_Supported_Transceiver_Modules&amp;diff=5198"/>
		<updated>2025-08-08T09:27:32Z</updated>

		<summary type="html">&lt;p&gt;Ralf: /* List of tested third-party modules */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== DISCLAIMER ==&lt;br /&gt;
&lt;br /&gt;
Allegro Packets allows you to use third-party vendor modules in its appliances but guarantees only warranty and support for transceiver modules sold by Allegro Packets. Any malfunction or configuration issue with third-party modules are NOT covered by the warranty.&lt;br /&gt;
&lt;br /&gt;
Allegro Packets does not restrict the use of third-party SFP+ modules for the devices. However, some hardware limitations apply which are described as follows:&lt;br /&gt;
&lt;br /&gt;
== Built-in ports vs. expansion cards ==&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter 800/810/1000/1010/1200/3000/3010/3200/x310/x410 series have two on-board SFP+ ports which are restricted to original or branded &#039;&#039;&#039;Intel modules&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
All non built-in ports are &#039;&#039;&#039;not&#039;&#039;&#039; vendor locked and can accept all transceiver modules. However, there are modules that do not work because of specific vendor extensions within the modules. This applies for all ports of the Allegro Network Multimeter x300, x310, x400, x410, x500 and x510 series and all expansion cards for the Allegro Network Multimeter 810/1000/1010/1200/3000/3010/3200.&lt;br /&gt;
&lt;br /&gt;
The following table shows which kind of modules are supported by Allegro by&lt;br /&gt;
port type:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Port type !!original or branded Intel modules    !! non-Intel branded modules &lt;br /&gt;
|-           &lt;br /&gt;
| built-in SFP+ ports  || x || -&lt;br /&gt;
|-&lt;br /&gt;
| SFP+ expansion|| x || x&lt;br /&gt;
|-&lt;br /&gt;
| SFP28 expansion|| x || x&lt;br /&gt;
|-&lt;br /&gt;
| QSFP expansion|| x|| x&lt;br /&gt;
|-&lt;br /&gt;
| QSFP28 expansion|| x || x&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The use of Intel branded  modules is mandatory for the built-in SFP+ ports. These restrictions do not apply to the additional network expansion cards (2 port and 4 port SFP+, high precision GPS card, etc.) that are available for the Allegro Network Multimeter 1000 and 3000 series. These ports accept generic modules from a wide range of vendors.&lt;br /&gt;
&lt;br /&gt;
Since auto-negotiation is often not available on 1G/10G SFP+ interfaces, it may be necessary to manually set the correct speed in the `Interface Stats` section of the user interface.&lt;br /&gt;
&lt;br /&gt;
QSFP+ breakout cables are NOT supported.&lt;br /&gt;
&lt;br /&gt;
== List of tested third-party modules ==&lt;br /&gt;
&lt;br /&gt;
The following list of modules have been either tested by Allegro Packets or customers and have been reported to operate &lt;br /&gt;
&lt;br /&gt;
NOTE: Please be aware that this can change due new module revisions. Specific module (firmware) settings may also be required to make modules work. &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Optics/Copper Module !! Transceiver P/N !! Media Type &lt;br /&gt;
!Connector&lt;br /&gt;
!Speed!! Remarks&lt;br /&gt;
|-&lt;br /&gt;
|SFP&lt;br /&gt;
|Flexoptix T.C12.02.A&lt;br /&gt;
|Copper&lt;br /&gt;
| RJ45&lt;br /&gt;
|10/100/1000M&lt;br /&gt;
|not supported in builtin ports in model 810/1000/1010/1200/3000/3010/3200, only in expansion slots,&lt;br /&gt;
|-&lt;br /&gt;
|SFP&lt;br /&gt;
|Finisar FCLF8521P2BTL&lt;br /&gt;
|Copper&lt;br /&gt;
|RJ45&lt;br /&gt;
|10/100/1000M&lt;br /&gt;
|not supported in builtin ports in model 810/1000/1010/1200/3000/3010/3200, only in expansion slots, &lt;br /&gt;
|-&lt;br /&gt;
|SFP&lt;br /&gt;
|Flexoptix S.1312.10.D&lt;br /&gt;
|Fiber (LR)&lt;br /&gt;
|LC&lt;br /&gt;
|1G&lt;br /&gt;
|not supported in onboard Allegro 810/1000/1010/1200/3000/3010/3200 SFP+ ports&lt;br /&gt;
supported in Allegro 800 and any SFP+ expansion card&lt;br /&gt;
|-&lt;br /&gt;
|SFP&lt;br /&gt;
|Flexoptix S.8512.02.D&lt;br /&gt;
|Fiber (SR)&lt;br /&gt;
|LC&lt;br /&gt;
|1G&lt;br /&gt;
|not supported in onboard Allegro 810/1000/1010/1200/3000/3010/3200 SFP+ ports&lt;br /&gt;
supported in Allegro 800 and any SFP+ expansion card&lt;br /&gt;
|-&lt;br /&gt;
|SFP&lt;br /&gt;
|Flexoptix S.B1312.10.DL&lt;br /&gt;
Flexoptix S.B1512.10.DL&lt;br /&gt;
|Fiber (LR, BiDi)&lt;br /&gt;
|LC&lt;br /&gt;
|1G&lt;br /&gt;
|not supported in onboard Allegro 810/1000/1010/1200/3000/3010/3200 SFP+ ports&lt;br /&gt;
&lt;br /&gt;
supported in Allegro 800 and any SFP+ expansion card&lt;br /&gt;
&lt;br /&gt;
requires Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || Intel E10GSFPSR || Fiber (SR)&lt;br /&gt;
| &lt;br /&gt;
|1G/10G|| &lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || Intel E10GSFPLR || Fiber (LR)&lt;br /&gt;
| &lt;br /&gt;
|1G/10G|| &lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || Intel XDACBL1M, XDACBL3M or XDACBL5M|| DA(Copper, Passive)&lt;br /&gt;
|  -&lt;br /&gt;
| 10G&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || Flexoptix P.8596.02 || Fiber (SR)&lt;br /&gt;
|LC&lt;br /&gt;
|1G/10G|| requires Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || Flexoptix P.1396.10 || Fiber (LR)&lt;br /&gt;
|LC&lt;br /&gt;
|1G/10G|| requires Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || fs.com 36431 || Fiber (SR)&lt;br /&gt;
|LC&lt;br /&gt;
|10G|| requires Intel branding, supports only 10G operation, 1G does NOT work&lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || fs.com 36432 || Fiber (LR)&lt;br /&gt;
|LC&lt;br /&gt;
|10G|| requires Intel branding, supports only 10G operation, 1G does NOT work&lt;br /&gt;
|-&lt;br /&gt;
| SFP28 || Flexoptix P.8525G.01 || Fiber (SR)&lt;br /&gt;
|LC&lt;br /&gt;
|25G|| recommended with Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| SFP28 || Flexoptix P.1325G.10 || Fiber (LR)&lt;br /&gt;
|LC&lt;br /&gt;
|25G|| recommended with Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| SFP28 || fs.com 68000 || Fiber (SR)&lt;br /&gt;
|LC&lt;br /&gt;
|25G|| requires Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || Flexoptix Q.8540G.02 || Fiber (SR4)&lt;br /&gt;
|MPO&lt;br /&gt;
|40G|| recommended with Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || Flexoptix Q.1640G.10 || Fiber (LR4)&lt;br /&gt;
|LC&lt;br /&gt;
|40G|| recommended with Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || FINISAR FTL4C1QE1C || Fiber (LR4)&lt;br /&gt;
| &lt;br /&gt;
|40G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || FINISAR FTL410QD2C || Fiber (SR4)&lt;br /&gt;
| &lt;br /&gt;
|40G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || FINISAR FTL410QE1C || Fiber (SR4)&lt;br /&gt;
| &lt;br /&gt;
|40G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || FINISAR FTL410QE2C || Fiber (SR4)&lt;br /&gt;
| &lt;br /&gt;
|40G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || FINISAR FTL410QE3C || Fiber (SR4)&lt;br /&gt;
| &lt;br /&gt;
|40G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || Amphenol 603020002, 603020005 || DA(Copper, Passive)&lt;br /&gt;
|  -&lt;br /&gt;
|40G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || fs.com 36281 || Fiber (SR4)&lt;br /&gt;
|MPO&lt;br /&gt;
|40G|| requires Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| QSFP28 || Flexoptix Q.851HG.02 || Fiber (SR4)&lt;br /&gt;
|MPO&lt;br /&gt;
|100G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP28 || Flexoptix Q.161HG.10 || Fiber (LR4)&lt;br /&gt;
|LC&lt;br /&gt;
|100G||only works in High-Speed-100G card (A-P-2xQSFP28H) due to power budget limit&lt;br /&gt;
|-&lt;br /&gt;
| QSFP28 || fs.com 75308 || Fiber (SR4)&lt;br /&gt;
|MPO&lt;br /&gt;
|100G|| &lt;br /&gt;
|-&lt;br /&gt;
| QSFP28 || Cisco QSFP-100G-CU (1M, 2M, 3M, 5M) || DA(Copper, Passive)&lt;br /&gt;
|  -&lt;br /&gt;
|100G|| &lt;br /&gt;
|-&lt;br /&gt;
|QSFP28&lt;br /&gt;
|QSFP28-100G-LR4-IX&lt;br /&gt;
|Fiber (LR4)&lt;br /&gt;
|LC&lt;br /&gt;
|100G&lt;br /&gt;
|only works in High-Speed-100G card (A-P-2xQSFP28H) due to power budget limit&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Limited support ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Optics/Copper Module !! Transceiver P/N !! Media Type &lt;br /&gt;
!Connector&lt;br /&gt;
!Speed!! Remarks&lt;br /&gt;
|-&lt;br /&gt;
|QSFP28&lt;br /&gt;
|QSFP28-100G-LR4-IX&lt;br /&gt;
|Fiber (LR4)&lt;br /&gt;
|LC&lt;br /&gt;
|100G&lt;br /&gt;
|only works in High-Speed-100G card (A-P-2xQSFP28H) due to power budget limit&lt;br /&gt;
|-&lt;br /&gt;
|QSFP+ 40G SR BG&lt;br /&gt;
|Cisco qsfp-40g-sr-bg P/N: 191402&lt;br /&gt;
|Fiber (SR4)&lt;br /&gt;
|&lt;br /&gt;
|40G&lt;br /&gt;
|only partial support, modules must be (re-) inserted after power up&lt;br /&gt;
|-&lt;br /&gt;
|QSFP+ 40G SR4&lt;br /&gt;
|Cisco qsfp-40g-sr4 P/N: 186602&lt;br /&gt;
|Fiber (SR4)&lt;br /&gt;
|&lt;br /&gt;
|40G&lt;br /&gt;
|only partial support, modules must be (re-) inserted after power up&lt;br /&gt;
|-&lt;br /&gt;
|QSFP+ 40G AOC&lt;br /&gt;
|Cisco qsfp-h40g-aoc10m P/N: 187627&lt;br /&gt;
|Fiber (SR)&lt;br /&gt;
|&lt;br /&gt;
|40G&lt;br /&gt;
|only partial support, modules must be (re-) inserted after power up&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Non-working modules ==&lt;br /&gt;
&lt;br /&gt;
Original Cisco modules have many issues working in the Allegro Network Multimeter. Allegro Packets got the feedback from multiple customers that they have issues with Cisco modules.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Optics/Copper Module !! Transceiver P/N !! Media Type !! Remarks&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ 40/100 SRBD || Cisco qsfp-40/100-srbd P/N: 199804 || Fiber (SR) || does &#039;&#039;&#039;NOT&#039;&#039;&#039; work&lt;br /&gt;
|-&lt;br /&gt;
| QSFP28 || Cisco QSFP-100G-SM-SR || Fiber (LR4 lite) || may work&lt;br /&gt;
|-&lt;br /&gt;
|QSFP28&lt;br /&gt;
|Innolight QSFP28 MSA LR4 P/N: TR-FC13R-N00&lt;br /&gt;
|Fiber (LR4)&lt;br /&gt;
|does &#039;&#039;&#039;NOT&#039;&#039;&#039; work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Link status issues with different network equipment ==&lt;br /&gt;
&lt;br /&gt;
=== Problem: 1G link is not coming up with 1G/10G SFP+ fiber modules ===&lt;br /&gt;
There is a known incompatibility with our 1G/10G SFP+ fiber modules when used with some Cisco equipment, such as a Cisco Nexus or Catalyst switch with 1G connectivity.&lt;br /&gt;
&lt;br /&gt;
The solution is as follows:&lt;br /&gt;
&lt;br /&gt;
* Disable auto-negotiation for the Cisco switch port which is connected to the Allegro device.&lt;br /&gt;
* Manually set speed to 1G for the Cisco switch port&lt;br /&gt;
&lt;br /&gt;
Example configuration for Nexus:&lt;br /&gt;
 configure terminal&lt;br /&gt;
 interface ethernet x/yy&lt;br /&gt;
 speed 1000&lt;br /&gt;
 no negotiate auto&lt;br /&gt;
Actual commands depends on the Cisco model. Alternative commands are:&lt;br /&gt;
 speed nonegotiates&lt;br /&gt;
 set port speed 1000&lt;br /&gt;
Combinations known to work for 1G connectivity:&lt;br /&gt;
&lt;br /&gt;
* Our 1G/10G SFP+ SR module in an Allegro SFP port (article number 700)&lt;br /&gt;
* Cisco GLC-SX-MMD in a Cisco switch&lt;br /&gt;
* Cisco switch settings applied as described above&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=List_of_Supported_Transceiver_Modules&amp;diff=5197</id>
		<title>List of Supported Transceiver Modules</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=List_of_Supported_Transceiver_Modules&amp;diff=5197"/>
		<updated>2025-08-08T09:25:53Z</updated>

		<summary type="html">&lt;p&gt;Ralf: /* List of tested third-party modules */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== DISCLAIMER ==&lt;br /&gt;
&lt;br /&gt;
Allegro Packets allows you to use third-party vendor modules in its appliances but guarantees only warranty and support for transceiver modules sold by Allegro Packets. Any malfunction or configuration issue with third-party modules are NOT covered by the warranty.&lt;br /&gt;
&lt;br /&gt;
Allegro Packets does not restrict the use of third-party SFP+ modules for the devices. However, some hardware limitations apply which are described as follows:&lt;br /&gt;
&lt;br /&gt;
== Built-in ports vs. expansion cards ==&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter 800/810/1000/1010/1200/3000/3010/3200/x310/x410 series have two on-board SFP+ ports which are restricted to original or branded &#039;&#039;&#039;Intel modules&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
All non built-in ports are &#039;&#039;&#039;not&#039;&#039;&#039; vendor locked and can accept all transceiver modules. However, there are modules that do not work because of specific vendor extensions within the modules. This applies for all ports of the Allegro Network Multimeter x300, x310, x400, x410, x500 and x510 series and all expansion cards for the Allegro Network Multimeter 810/1000/1010/1200/3000/3010/3200.&lt;br /&gt;
&lt;br /&gt;
The following table shows which kind of modules are supported by Allegro by&lt;br /&gt;
port type:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Port type !!original or branded Intel modules    !! non-Intel branded modules &lt;br /&gt;
|-           &lt;br /&gt;
| built-in SFP+ ports  || x || -&lt;br /&gt;
|-&lt;br /&gt;
| SFP+ expansion|| x || x&lt;br /&gt;
|-&lt;br /&gt;
| SFP28 expansion|| x || x&lt;br /&gt;
|-&lt;br /&gt;
| QSFP expansion|| x|| x&lt;br /&gt;
|-&lt;br /&gt;
| QSFP28 expansion|| x || x&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The use of Intel branded  modules is mandatory for the built-in SFP+ ports. These restrictions do not apply to the additional network expansion cards (2 port and 4 port SFP+, high precision GPS card, etc.) that are available for the Allegro Network Multimeter 1000 and 3000 series. These ports accept generic modules from a wide range of vendors.&lt;br /&gt;
&lt;br /&gt;
Since auto-negotiation is often not available on 1G/10G SFP+ interfaces, it may be necessary to manually set the correct speed in the `Interface Stats` section of the user interface.&lt;br /&gt;
&lt;br /&gt;
QSFP+ breakout cables are NOT supported.&lt;br /&gt;
&lt;br /&gt;
== List of tested third-party modules ==&lt;br /&gt;
&lt;br /&gt;
The following list of modules have been either tested by Allegro Packets or customers and have been reported to operate. Please be aware that this can change due new module revisions. &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Optics/Copper Module !! Transceiver P/N !! Media Type &lt;br /&gt;
!Connector&lt;br /&gt;
!Speed!! Remarks&lt;br /&gt;
|-&lt;br /&gt;
|SFP&lt;br /&gt;
|Flexoptix T.C12.02.A&lt;br /&gt;
|Copper&lt;br /&gt;
| RJ45&lt;br /&gt;
|10/100/1000M&lt;br /&gt;
|not supported in builtin ports in model 810/1000/1010/1200/3000/3010/3200, only in expansion slots,&lt;br /&gt;
|-&lt;br /&gt;
|SFP&lt;br /&gt;
|Finisar FCLF8521P2BTL&lt;br /&gt;
|Copper&lt;br /&gt;
|RJ45&lt;br /&gt;
|10/100/1000M&lt;br /&gt;
|not supported in builtin ports in model 810/1000/1010/1200/3000/3010/3200, only in expansion slots, &lt;br /&gt;
|-&lt;br /&gt;
|SFP&lt;br /&gt;
|Flexoptix S.1312.10.D&lt;br /&gt;
|Fiber (LR)&lt;br /&gt;
|LC&lt;br /&gt;
|1G&lt;br /&gt;
|not supported in onboard Allegro 810/1000/1010/1200/3000/3010/3200 SFP+ ports&lt;br /&gt;
supported in Allegro 800 and any SFP+ expansion card&lt;br /&gt;
|-&lt;br /&gt;
|SFP&lt;br /&gt;
|Flexoptix S.8512.02.D&lt;br /&gt;
|Fiber (SR)&lt;br /&gt;
|LC&lt;br /&gt;
|1G&lt;br /&gt;
|not supported in onboard Allegro 810/1000/1010/1200/3000/3010/3200 SFP+ ports&lt;br /&gt;
supported in Allegro 800 and any SFP+ expansion card&lt;br /&gt;
|-&lt;br /&gt;
|SFP&lt;br /&gt;
|Flexoptix S.B1312.10.DL&lt;br /&gt;
Flexoptix S.B1512.10.DL&lt;br /&gt;
|Fiber (LR, BiDi)&lt;br /&gt;
|LC&lt;br /&gt;
|1G&lt;br /&gt;
|not supported in onboard Allegro 810/1000/1010/1200/3000/3010/3200 SFP+ ports&lt;br /&gt;
&lt;br /&gt;
supported in Allegro 800 and any SFP+ expansion card&lt;br /&gt;
&lt;br /&gt;
requires Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || Intel E10GSFPSR || Fiber (SR)&lt;br /&gt;
| &lt;br /&gt;
|1G/10G|| &lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || Intel E10GSFPLR || Fiber (LR)&lt;br /&gt;
| &lt;br /&gt;
|1G/10G|| &lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || Intel XDACBL1M, XDACBL3M or XDACBL5M|| DA(Copper, Passive)&lt;br /&gt;
|  -&lt;br /&gt;
| 10G&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || Flexoptix P.8596.02 || Fiber (SR)&lt;br /&gt;
|LC&lt;br /&gt;
|1G/10G|| requires Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || Flexoptix P.1396.10 || Fiber (LR)&lt;br /&gt;
|LC&lt;br /&gt;
|1G/10G|| requires Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || fs.com 36431 || Fiber (SR)&lt;br /&gt;
|LC&lt;br /&gt;
|10G|| requires Intel branding, supports only 10G operation, 1G does NOT work&lt;br /&gt;
|-&lt;br /&gt;
| SFP+ || fs.com 36432 || Fiber (LR)&lt;br /&gt;
|LC&lt;br /&gt;
|10G|| requires Intel branding, supports only 10G operation, 1G does NOT work&lt;br /&gt;
|-&lt;br /&gt;
| SFP28 || Flexoptix P.8525G.01 || Fiber (SR)&lt;br /&gt;
|LC&lt;br /&gt;
|25G|| recommended with Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| SFP28 || Flexoptix P.1325G.10 || Fiber (LR)&lt;br /&gt;
|LC&lt;br /&gt;
|25G|| recommended with Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| SFP28 || fs.com 68000 || Fiber (SR)&lt;br /&gt;
|LC&lt;br /&gt;
|25G|| requires Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || Flexoptix Q.8540G.02 || Fiber (SR4)&lt;br /&gt;
|MPO&lt;br /&gt;
|40G|| recommended with Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || Flexoptix Q.1640G.10 || Fiber (LR4)&lt;br /&gt;
|LC&lt;br /&gt;
|40G|| recommended with Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || FINISAR FTL4C1QE1C || Fiber (LR4)&lt;br /&gt;
| &lt;br /&gt;
|40G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || FINISAR FTL410QD2C || Fiber (SR4)&lt;br /&gt;
| &lt;br /&gt;
|40G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || FINISAR FTL410QE1C || Fiber (SR4)&lt;br /&gt;
| &lt;br /&gt;
|40G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || FINISAR FTL410QE2C || Fiber (SR4)&lt;br /&gt;
| &lt;br /&gt;
|40G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || FINISAR FTL410QE3C || Fiber (SR4)&lt;br /&gt;
| &lt;br /&gt;
|40G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || Amphenol 603020002, 603020005 || DA(Copper, Passive)&lt;br /&gt;
|  -&lt;br /&gt;
|40G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ || fs.com 36281 || Fiber (SR4)&lt;br /&gt;
|MPO&lt;br /&gt;
|40G|| requires Intel branding&lt;br /&gt;
|-&lt;br /&gt;
| QSFP28 || Flexoptix Q.851HG.02 || Fiber (SR4)&lt;br /&gt;
|MPO&lt;br /&gt;
|100G||&lt;br /&gt;
|-&lt;br /&gt;
| QSFP28 || Flexoptix Q.161HG.10 || Fiber (LR4)&lt;br /&gt;
|LC&lt;br /&gt;
|100G||only works in High-Speed-100G card (A-P-2xQSFP28H) due to power budget limit&lt;br /&gt;
|-&lt;br /&gt;
| QSFP28 || fs.com 75308 || Fiber (SR4)&lt;br /&gt;
|MPO&lt;br /&gt;
|100G|| &lt;br /&gt;
|-&lt;br /&gt;
| QSFP28 || Cisco QSFP-100G-CU (1M, 2M, 3M, 5M) || DA(Copper, Passive)&lt;br /&gt;
|  -&lt;br /&gt;
|100G|| &lt;br /&gt;
|-&lt;br /&gt;
|QSFP28&lt;br /&gt;
|QSFP28-100G-LR4-IX&lt;br /&gt;
|Fiber (LR4)&lt;br /&gt;
|LC&lt;br /&gt;
|100G&lt;br /&gt;
|only works in High-Speed-100G card (A-P-2xQSFP28H) due to power budget limit&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Limited support ==&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Optics/Copper Module !! Transceiver P/N !! Media Type &lt;br /&gt;
!Connector&lt;br /&gt;
!Speed!! Remarks&lt;br /&gt;
|-&lt;br /&gt;
|QSFP28&lt;br /&gt;
|QSFP28-100G-LR4-IX&lt;br /&gt;
|Fiber (LR4)&lt;br /&gt;
|LC&lt;br /&gt;
|100G&lt;br /&gt;
|only works in High-Speed-100G card (A-P-2xQSFP28H) due to power budget limit&lt;br /&gt;
|-&lt;br /&gt;
|QSFP+ 40G SR BG&lt;br /&gt;
|Cisco qsfp-40g-sr-bg P/N: 191402&lt;br /&gt;
|Fiber (SR4)&lt;br /&gt;
|&lt;br /&gt;
|40G&lt;br /&gt;
|only partial support, modules must be (re-) inserted after power up&lt;br /&gt;
|-&lt;br /&gt;
|QSFP+ 40G SR4&lt;br /&gt;
|Cisco qsfp-40g-sr4 P/N: 186602&lt;br /&gt;
|Fiber (SR4)&lt;br /&gt;
|&lt;br /&gt;
|40G&lt;br /&gt;
|only partial support, modules must be (re-) inserted after power up&lt;br /&gt;
|-&lt;br /&gt;
|QSFP+ 40G AOC&lt;br /&gt;
|Cisco qsfp-h40g-aoc10m P/N: 187627&lt;br /&gt;
|Fiber (SR)&lt;br /&gt;
|&lt;br /&gt;
|40G&lt;br /&gt;
|only partial support, modules must be (re-) inserted after power up&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Non-working modules ==&lt;br /&gt;
&lt;br /&gt;
Original Cisco modules have many issues working in the Allegro Network Multimeter. Allegro Packets got the feedback from multiple customers that they have issues with Cisco modules.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Optics/Copper Module !! Transceiver P/N !! Media Type !! Remarks&lt;br /&gt;
|-&lt;br /&gt;
| QSFP+ 40/100 SRBD || Cisco qsfp-40/100-srbd P/N: 199804 || Fiber (SR) || does &#039;&#039;&#039;NOT&#039;&#039;&#039; work&lt;br /&gt;
|-&lt;br /&gt;
| QSFP28 || Cisco QSFP-100G-SM-SR || Fiber (LR4 lite) || may work&lt;br /&gt;
|-&lt;br /&gt;
|QSFP28&lt;br /&gt;
|Innolight QSFP28 MSA LR4 P/N: TR-FC13R-N00&lt;br /&gt;
|Fiber (LR4)&lt;br /&gt;
|does &#039;&#039;&#039;NOT&#039;&#039;&#039; work&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Link status issues with different network equipment ==&lt;br /&gt;
&lt;br /&gt;
=== Problem: 1G link is not coming up with 1G/10G SFP+ fiber modules ===&lt;br /&gt;
There is a known incompatibility with our 1G/10G SFP+ fiber modules when used with some Cisco equipment, such as a Cisco Nexus or Catalyst switch with 1G connectivity.&lt;br /&gt;
&lt;br /&gt;
The solution is as follows:&lt;br /&gt;
&lt;br /&gt;
* Disable auto-negotiation for the Cisco switch port which is connected to the Allegro device.&lt;br /&gt;
* Manually set speed to 1G for the Cisco switch port&lt;br /&gt;
&lt;br /&gt;
Example configuration for Nexus:&lt;br /&gt;
 configure terminal&lt;br /&gt;
 interface ethernet x/yy&lt;br /&gt;
 speed 1000&lt;br /&gt;
 no negotiate auto&lt;br /&gt;
Actual commands depends on the Cisco model. Alternative commands are:&lt;br /&gt;
 speed nonegotiates&lt;br /&gt;
 set port speed 1000&lt;br /&gt;
Combinations known to work for 1G connectivity:&lt;br /&gt;
&lt;br /&gt;
* Our 1G/10G SFP+ SR module in an Allegro SFP port (article number 700)&lt;br /&gt;
* Cisco GLC-SX-MMD in a Cisco switch&lt;br /&gt;
* Cisco switch settings applied as described above&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Global_settings&amp;diff=5183</id>
		<title>Global settings</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Global_settings&amp;diff=5183"/>
		<updated>2025-07-28T09:23:05Z</updated>

		<summary type="html">&lt;p&gt;Ralf: /* External original packet lengths */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Global settings section contains parameters for adjusting the behavior of the system.&lt;br /&gt;
The settings are split among multiple tabs, described as follows.&lt;br /&gt;
&lt;br /&gt;
== Generic settings ==&lt;br /&gt;
&lt;br /&gt;
=== Packet processing mode ===&lt;br /&gt;
&lt;br /&gt;
This section allows for configuring the main packet processing mode:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Bridge mode&#039;&#039;&#039;: In Bridge mode A.K.A. In-Line mode, all received packets will be transmitted between corresponding port pairs (e.g. 1+2, 3+4 on Allegro 500/510) so that the Allegro Network Multimeter can be placed in-line between any network component.&amp;lt;br/ &amp;gt;The device will operate transparent and will not modify network traffic in any way. The additional latency will be typically around or less than 1 millisecond.&amp;lt;br&amp;gt;In Bridge mode it is also possible to process network traffic from a mirror port or Tap. However, &amp;quot;only&amp;quot; half of the total available ports on each respective Allegro Network Multimeter model can be used to operate in this way.  For example on a 4-port Allegro model 500, you can conveniently leave the unit in bridge mode and connect up to two mirror ports on interfaces 1 and 3 respectively. Aforementioned interfaces are physically separated and not an (in-line) interface pair.&amp;lt;br /&amp;gt;Always avoid connecting mirror port traffic on an Allegro Network Multimeter interface pair (e.g. 1+2, 3+4 on Allegro 500/510), as this will result in TX traffic in the direction of a mirror port which if highly undesirable.&amp;lt;br /&amp;gt;[[File:Inline mode.jpg|800px|Allegro in brigde mode (in-line)]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Sink mode&#039;&#039;&#039;: In Sink mode, the Allegro Network Multimeter will operate &amp;quot;receive only&amp;quot;.&amp;lt;br /&amp;gt;Packets are not forwarded and there&#039;s no bi-directional traffic on any of the monitoring ports. This operation mode allows for installation at a Mirror port of a Switch or when using a network Tap to access the network traffic.&amp;lt;br /&amp;gt;[[File:Sink mode1.jpg|800px|Allegro in Sink mode on Mirror port or Tap]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Mixed bridge/sink mode:&#039;&#039;&#039; This mode enables to configure the packet processing mode for each interface pair. Interface pairs default to Bridge mode but the mode can be permanently changed in the [[interface statistics]].&lt;br /&gt;
&lt;br /&gt;
The packet processing mode can be changed during runtime.&lt;br /&gt;
 &lt;br /&gt;
Attention: Please always keep in mind, that while in bridge mode (Allegro Network Multimeter = in-line), a Link will be (shortly) interrupted when switching processing mode or/and rebooting the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
=== Endpoint mode ===&lt;br /&gt;
&lt;br /&gt;
If the endpoint mode is enabled for an interface, this interface will only process packets sent to the configured IP address (and potentially the port). If the system is running in bridge packet processing mode, links with an interface configured for endpoint mode will not forward traffic. The following types of traffic are supported:&lt;br /&gt;
&lt;br /&gt;
* Ethernet packets encapsulated in GRE or GRE+ERSPAN and targeted for the configured IP address.&amp;lt;br /&amp;gt;The system will process the packets as if only the inner encapsulated packet is seen and any traffic captures will only contain the encapsulated packet.&lt;br /&gt;
* UDP packets to specific port (packets will be analyzed as is).&lt;br /&gt;
&lt;br /&gt;
An interface with endpoint mode enabled will respond to ARP requests and to ICMP echo requests so it is possible to use ping to verify that the interface is reachable under the configured IP address.&lt;br /&gt;
&lt;br /&gt;
It must be noted that if the system is running in bridge packet processing mode, any links with an interface configured for endpoint mode will not forward traffic.&lt;br /&gt;
&lt;br /&gt;
VLAN tag handling is not supported. The Allegro Network Multimeter will accept ARP and ICMP requests with any VLAN tags but will send replies without VLAN tagging.&lt;br /&gt;
&lt;br /&gt;
Note: In versions 3.0 or older, the mode was named &amp;quot;l3 tunnel mode&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Webshark support ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter allows having a preview of packets, directly in the browser. This is the so called Webshark. To support Webshark previewing, the Allegro Network Multimeter needs to reserve an amount of system memory.&lt;br /&gt;
&lt;br /&gt;
This reserved amount of memory (RAM) is configurable and will not be available for the In-Memory database, thus the history of stored statistics in the dashboard becomes a little shorter. If this is not desired, it is possible to disable the Webshark support.&lt;br /&gt;
&lt;br /&gt;
Multiple parallel sessions/instances of Webshark previewing within one Allegro Network Multimeter is possible. The number of simultaneous Webshark instances and max. preview file size (e.g. 5MB) are configurable but may vary depending on Allegro model and installed RAM.&lt;br /&gt;
&lt;br /&gt;
Changing Webshark parameters requires a restart of the processing.&lt;br /&gt;
&lt;br /&gt;
[[File:Webshark.jpg|900px|Built in Webshark - Allegro Network Multimeter ]]&lt;br /&gt;
&lt;br /&gt;
=== Snort analysis===&lt;br /&gt;
{{Warning|title=Beta Feature|This feature is still in active development and is therefore subject to changes in the future. There may be bugs or unexpected behavior when using this feature.}}The Allegro Network Multimeter is able to perform intrusion detection based on the [https://www.snort.org/ Snort] software project. The detection can be performed on live traffic or ring buffer traffic. This analysis is invoked via the capture dialog on any page and respects the same capture filter expressions as a normal traffic capture.&lt;br /&gt;
[[File:Snort Settings.png|thumb|Snort section in the global settings]]&lt;br /&gt;
This feature is disabled by default, to enable it navigate to Global Settings &amp;gt; Snort Analysis and enable it via the toggle switch. Once enabled a new setting will appear to regulate the allowed memory usage by the intrusion detection as well as the rules and configs used by Snort. The user is able to set a hard maximum limit on the usable memory, and if the Snort process exceeds this limit it will be killed by the OOM-Manager. Additionally, another soft memory limit will be installed just below the hard maximum, and if the process reaches this limit it will be throttled heavily. If your intrusion analysis appears to get stuck or is unusually slow, a good troubleshooting step is to increase the memory limit. It is generally not recommended to keep the memory limit below 200MB. &lt;br /&gt;
&lt;br /&gt;
A more detailed guide on how to use the rule and config editors can be found [[Snort|here]]. &lt;br /&gt;
&lt;br /&gt;
===Detail of traffic analysis===&lt;br /&gt;
&lt;br /&gt;
Limit module processing, allows you to configure which OSI-layers (2,3,4,7) are actively processed and analyzed by the Allegro Network Multimeter. With this setting, the performance of the Allegro Network Multimeter can be significantly improved and allows for higher throughput when disabling some analysis modules.&lt;br /&gt;
&lt;br /&gt;
For both realtime and offline parallel analysis, the following modes are possible :&lt;br /&gt;
&lt;br /&gt;
*Only capturing: Only interface statistics and the capture module is provided. Capture filters are supported without Layer 7 protocol specification/recognition.&lt;br /&gt;
*Capturing and protocol detection: Additionally Layer 7 protocol specification in Capture filters will now work.&lt;br /&gt;
*Up to Layer 2: Additionally all Layer 2 related modules are active such as MAC, MAC protocols, ARP and Burst Analysis.&lt;br /&gt;
*Up to Layer 3: Additionally all Layer 3 related modules are active such as IP and DHCP statistics.&lt;br /&gt;
*Up to Layer 4: Additionally all Layer 4 related modules are active such as TCP and Layer 4 server ports.&lt;br /&gt;
*Unlimited: All Allegro Network Multimeter modules are active.&lt;br /&gt;
&lt;br /&gt;
When switching to another mode you need to restart the processing in order to activate the new settings.&lt;br /&gt;
&lt;br /&gt;
NOTE: The data recorded to/stored in the Packet Ring buffer, will NOT be affected by any of the above settings. Packet ring buffer capture rules may be configured under &amp;quot;Generic - Packet Ring Buffer&amp;quot;, further explained in our wiki here https://allegro-packets.com/wiki/Packet_ring_buffer#Packet_ring_buffer_snapshot_length_filter&lt;br /&gt;
&lt;br /&gt;
====Enable single flow load balancing====&lt;br /&gt;
When the &#039;&#039;Limit module processing&#039;&#039; slider is turned to &#039;&#039;Only capturing&#039;&#039; the option to enable &#039;&#039;single flow load balancing&#039;&#039; appears. If this option is enabled, even a single flow is load-balanced to different analyzer threads.&lt;br /&gt;
&lt;br /&gt;
This is only recommended when there are very few flows and there is an imbalance in the load of the analyzers. As the packets of a single flow are processed by different analyzers the packets of the flow may be stored out-of-order in the Packet Ring Buffer and a larger amount of memory may be required to reorder the packets when capturing from the Packet Ring Buffer (see [[Capture module#Configuration settings|Capture module]] configuration settings). &lt;br /&gt;
&lt;br /&gt;
===Graph detail settings===&lt;br /&gt;
&lt;br /&gt;
It is possible to modify the detail level of all graphs in the interface. This settings allow you to see a more detailed view (with higher time resolution) or to reduce the detail level so more data can be stored on the device. Changing the default values has an impact on the performance and memory usage. Changing a slider to the left increases the detail level of graphs, but increases memory usage and decreases performance.&lt;br /&gt;
&lt;br /&gt;
*Best graph resolution: This option configures how detailed the graph information are shown in the best case (the latest information). The default value is one second which means that a graph sample point represents a second of packet time. You can change the resolution up to 1 millisecond which gives a detailed sub-second representation of the traffic. You can also decide to decrease the resolution which enables the Allegro Network Multimeter to store more data for a longer period of time.&lt;br /&gt;
&lt;br /&gt;
*Reduce graph resolution of old data by up to: The resolution of older graph data is automatically reduced to save memory and to allow a longer view into the traffic history. This option allows you to change this behaviour. With a reduction factor of 1/1 no reduction is done at all which means the selected graph resolution is available for the complete time.&lt;br /&gt;
:This reduces the time period to see historical data. You can choose to increase the reduction factor to store more data for a longer period. The time printed in parentheses represents the worst-case graph resolution based on the chosen resolution and reduction factor. The reduction is done in multiple steps up to this limit. The newest data always has the highest resolution defined by the &amp;quot;Best graph resolution&amp;quot; setting above. Between 60 and 120 data points are stored at a minimum, so with default resolution of 1 second, between one and two minutes are available in the highest resolution. Due to internal compression, the exact number of data points cannot be foreseen but 60 data points are always available at least, usually much more.  Once the limit is reached, data is reduced by a factor of two thus doubling the amount of time available in half resolution (2 to 4 minutes in 2 second resolution). When the next limit is reached, the data is halved again thus doubling the time again, until the configured reduction limit is reached.  With default settings of one second resolution and reduction limit of 1/6, the worst resolution of 64 seconds (or 1 minute and 4 seconds) is reached not before 2 hours into the past.  The drop down menu in graph view gives an exact number about the available graph resolution in the given time period.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note: Regardless of these settings, the graph values are always converted to represent a value per second (when applicable). For example, the packets per second for an IP addresses will always be a value literally per second even if the resolution is larger or smaller than one second. The displayed value is scaled to match this view. Especially with sub-second resolution this might be misleading.&lt;br /&gt;
&lt;br /&gt;
For instance, if there is a network element sending one packet per second and the resolution is set to 100 milliseconds, the &amp;lt;u&amp;gt;value shown in the graph&amp;lt;/u&amp;gt; might be shown as 10 packets per second as each sample point is scaled to represent an value per second.&amp;lt;br&amp;gt;For a detailed investigation it is recommended to always select a specific time interval and look at the (packet) counters shown in all statistics since these are unscaled and represent the actual values.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Performance implications: The performance degradation and memory usage depends on the actual network traffic and is not exactly predictable. &lt;br /&gt;
&lt;br /&gt;
Here are some examples for reference on a Allegro 1000 series with different configuration values (under ideal test conditions):&lt;br /&gt;
&lt;br /&gt;
* 1 second resolution, 1/1 reduction factor: 90% of default performance&lt;br /&gt;
*100 millisecond resolution, 1/1 reduction factor: 50% of default performance,&lt;br /&gt;
*10 millisecond resolution, 1/1 reduction factor: 15% of default performance&lt;br /&gt;
*1 millisecond resolution, 1/1 reduction factor: 10% of default performance&lt;br /&gt;
&lt;br /&gt;
=== PCAP parallel analysis===&lt;br /&gt;
&lt;br /&gt;
The PCAP parallel analysis feature allows to analyse PCAP files or the&lt;br /&gt;
packet ring buffer in parallel to the live measurement. The settings&lt;br /&gt;
allow to enable the feature and choose how much memory of the main&lt;br /&gt;
memory is used for parallel analysis and how many parallel slots can&lt;br /&gt;
be used. Detailed description of the configuration values are&lt;br /&gt;
described [[parallel packet processing|here]].&lt;br /&gt;
&lt;br /&gt;
==IPFIX settings ==&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter may be running as an IPFIX exporter. These settings allows for reporting configuration. When enabled, the following settings are possible:&lt;br /&gt;
&lt;br /&gt;
*IP address: Address of IPFIX collector.&lt;br /&gt;
*Port: Corresponding port.&lt;br /&gt;
*Protocol: TCP or UDP.&lt;br /&gt;
*Update interval: Interval in seconds for sending a status update of flows.&lt;br /&gt;
*UDP resend interval: Interval in seconds for resending IPFIX templates for UDP connections.&lt;br /&gt;
* TCP reconnect timeout: When TCP connections could not be established, wait for this time period until the next attempt to establish a connection.&lt;br /&gt;
&lt;br /&gt;
Individual IPFIX messages can be enabled or disabled by toggling corresponding options. See the [[NetFlow/IPFIX interface]] documentation for details about the message types.&lt;br /&gt;
&lt;br /&gt;
==Time settings==&lt;br /&gt;
&lt;br /&gt;
The Time settings were moved to [[Time settings]].&lt;br /&gt;
&lt;br /&gt;
== Email notification==&lt;br /&gt;
&lt;br /&gt;
The Email notification settings were moved to [[Administration]].&lt;br /&gt;
&lt;br /&gt;
==Long-term DB and persistence (BETA) ==&lt;br /&gt;
These two features allow to use a storage device as additional memory for long-term statistics of selected values, and to use a storage device to store and restore measurement data between restarts. See [[Longterm DB]] for more details.&lt;br /&gt;
&lt;br /&gt;
== Expert settings==&lt;br /&gt;
&lt;br /&gt;
The Expert settings contains parameter which are only necessary to change in rare installation scenarios or some specific need for a different operation mode.&lt;br /&gt;
&lt;br /&gt;
===Packet length accounting===&lt;br /&gt;
&lt;br /&gt;
This setting allows you to configure which packet length is used for all traffic counters and incidents. The following modes are possible:&lt;br /&gt;
&lt;br /&gt;
*Layer 1: Packet length is accounted on Layer 1 including preamble (7 Byte), SFD (1 Byte) and inter-frame gap (12 Bytes)&lt;br /&gt;
*Layer 2 without frame check sequence (default): Packet length is accounted on Layer 2 without a frame check sequence (4 Bytes)&lt;br /&gt;
*Layer 2 with frame check sequence: Account packet length on Layer 2 with frame check sequence (4 Bytes) When switching to another mode, it will only be applied on new packets. Older packet size statistics will not be changed.&lt;br /&gt;
&lt;br /&gt;
===VLAN handling ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter can &#039;&#039;&#039;ignore VLAN tags&#039;&#039;&#039; for connection tracking. Enabling this option may be necessary if network traffic is seen on the Allegro Network Multimeter that contains changing VLAN tags for the same connection. For example, depending on the configuration of the Mirror Port to which the Allegro Network Multimeter is connected, incoming traffic could contain a VLAN tag while outgoing traffic does not. In this example, a connection would appear twice in the statistics which often is desired behaviour to be able to identify a network misconfiguration. In some cases however, such &amp;quot;duplicate&amp;quot; data in the dashboard may be misleading, and the user would want to see only one connection. In these scenarios the option ignore VLAN tags may be enabled.&lt;br /&gt;
&lt;br /&gt;
===Tunnel view mode===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter can decapsulate GRE, VXLAN, ERSPAN type II and type III, GENEVE, CAPWAP as well as L2TPv3 data traffic. Depending on this option either the outer tunnel or the inner content is shown in all analysis modules.&lt;br /&gt;
&lt;br /&gt;
There are three possible modes:&lt;br /&gt;
&lt;br /&gt;
* don&#039;t decapsulate traffic (default)&lt;br /&gt;
*decapsulate tunnel traffic, discard non-encapsulated traffic&lt;br /&gt;
*decapsulate tunnel traffic, process also non-encapsulated traffic&lt;br /&gt;
&lt;br /&gt;
Optionally, a filter can be set to limit decapsulation on specific packets with a certain IP address, IP ranges or interfaces. If the filter is empty, all packets will be decapsulated.&lt;br /&gt;
&lt;br /&gt;
In case the mode is active with discarding non-encapsulated traffic, on the Dashboard a dropped counter will display dropped non-encapsulated packets.&lt;br /&gt;
&lt;br /&gt;
When capturing, packets with complete outer Layer 2, Layer 3, GRE, ERSPAN, GENEVE, CAPWAP and L2TPv3 headers will be stored as seen on the wire.&lt;br /&gt;
&lt;br /&gt;
===Database mode settings===&lt;br /&gt;
&lt;br /&gt;
The database mode is a special analysis mode for high-performance Allegro Network Multimeters with multiple processors to increase the performance on such systems. It is normally enabled automatically but depending on the actual network traffic and system usage, some parameter tweak might be necessary to improve overall system performance. &lt;br /&gt;
You should only change these parameters in discussion with the Allegro Packets support department.&lt;br /&gt;
These settings are only visible if your Allegro Network Multimeter is capable of running this mode.&lt;br /&gt;
&lt;br /&gt;
You can read more about the meaning of the settings [[DB mode|here]].&lt;br /&gt;
&lt;br /&gt;
===Network performance ===&lt;br /&gt;
&lt;br /&gt;
There are several network performance settings available to improve performance on high-performance systems in case of packet drops during very high incoming bandwidth. They are only visible if your Allegro Network Multimeter is capable of changing these settings.&lt;br /&gt;
&lt;br /&gt;
*Max RX queues per socket: This setting specifies the quantity of threads dedicated to read and write interactions with the network interface controllers. By increasing this value, network receive bandwidth can be increased before packet drops occur. By decreasing this value, data analysis will improve. The default setting of 2 RX queues is suitable for most configurations since data analysis typically needs much more processing ressources.&lt;br /&gt;
*Use Hyper-Threading for RX queues: This setting allows enabling or disabling Hyper-Threading for the threads dedicated to read and write interactions with the network interface controllers. By disabling it, network performance can be improved as the RX queues will be distributed to physical CPU cores only. By enabling it, RX queues will also be distributed to virtual Hyper-Threading CPU cores which is not as efficient as physical CPU cores. By using Hyper-Threading, data analysis will improve since there are more CPU cores available for these tasks. Hyper-Threading is used by default. This is suitable for most configurations as data analysis typically needs much more processing ressources.&lt;br /&gt;
*Preferred Network interface controller: This setting allows fine tuning of network and data analysis performance for dedicated network controllers. The selected set of network controllers will be preferred over others. Usually the fastest or the network controller with the most traffic should be preferred. The &#039;&#039;&#039;Auto&#039;&#039;&#039; setting is used by default, preferring the fastest network controller.&lt;br /&gt;
&lt;br /&gt;
You should only change these parameters in discussion with the Allegro Packets support department.&lt;br /&gt;
&lt;br /&gt;
===Processing performance===&lt;br /&gt;
&lt;br /&gt;
Processing performance may be modified on high-performance systems. This is only visible if your Allegro Network Multimeter is capable of changing this setting.&lt;br /&gt;
&lt;br /&gt;
*Processing performance mode: This setting allows for fine tuning processing performance. By using &#039;&#039;&#039;Analysing&#039;&#039;&#039;, as much processing ressources on all CPUs as possible are used for data analysis. By using &#039;&#039;&#039;Capturing&#039;&#039;&#039;, the focus will be on high data throughput and low latency for capturing purposes by using only the CPU where the preferred network controller is attached to. This has an impact on data analysis performance. &#039;&#039;&#039;Analysing&#039;&#039;&#039; is used by default.&lt;br /&gt;
You should only change this parameter in discussion with the Allegro Packets support department.&lt;br /&gt;
&lt;br /&gt;
===Packet ring buffer timeouts===&lt;br /&gt;
&lt;br /&gt;
Two timeout settings related to the packet ring buffer can be adjusted.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Long timeout&#039;&#039;&#039; controls after which maximum amount of time, a packet is actually written to the packet ring buffer. A lower value may decrease the time difference by which packets are stored out of their order in the packet ring buffer but it may increase the amount of unused overhead data in the packet ring buffer.&lt;br /&gt;
*&#039;&#039;&#039;Short timeout&#039;&#039;&#039; controls after which amount of time smaller batches of packets are written to the packet ring buffer, even if waiting for more packets would result in a more efficient operation. A lower value may decrease the time difference by which packets are stored out of their order in the packet ring buffer, but it may also decrease the performance of the packet ring buffer.&lt;br /&gt;
&lt;br /&gt;
===Data retention timeout===&lt;br /&gt;
&lt;br /&gt;
When the data retention timeout is set to a value greater than 0, data will be removed everywhere throughout the system after the given number of minutes. This means that entities like IPs, which have been inactive for longer than the timeout, will be removed. History graph data for entities that are still active will be truncated to cover only the given timespan, while the absolute values for the whole runtime will be retained. When a packet ring buffer is active, packets which are older than the timeout will be discarded.&lt;br /&gt;
&lt;br /&gt;
===Multithreaded capture analysis ===&lt;br /&gt;
&lt;br /&gt;
This option enables the use of multiple CPUs for capture analysis like when&lt;br /&gt;
analyzing a pcap capture file or analyzing the packet ring buffer. Depending&lt;br /&gt;
on the number of available CPUs this can significantly speed up the analysis.&lt;br /&gt;
&lt;br /&gt;
It is possible to dedicate a number of CPUs exclusively to capture analysis.&lt;br /&gt;
Since these CPUs are not available for live packet processing the performance of&lt;br /&gt;
live traffic analysis may be lower.&lt;br /&gt;
When set to 0 a lower priority is used for capture analysis than for live analysis&lt;br /&gt;
but it cannot be ruled out that the performance of the live processing is&lt;br /&gt;
affected.&lt;br /&gt;
&lt;br /&gt;
===Load balancing===&lt;br /&gt;
&lt;br /&gt;
This option select the load distribution method. By default, network&lt;br /&gt;
traffic is balanced among all processing threads based on the IP&lt;br /&gt;
addresses. This is fast and usually the best way for efficient load&lt;br /&gt;
balancing.&lt;br /&gt;
&lt;br /&gt;
If the network traffic only occurs between a few IP addresses, this&lt;br /&gt;
method can lead to a load imbalance so that some threads are doing more&lt;br /&gt;
work while other threads may be idle. In this scenario, &amp;quot;flow based&lt;br /&gt;
balancing&amp;quot; can be enabled to distribute the traffic based on the IP&lt;br /&gt;
and port information. This will lead to better utilization of all&lt;br /&gt;
processing threads.&lt;br /&gt;
&lt;br /&gt;
Since this option induces additional processing overhead per packet&lt;br /&gt;
and additional memory for all internal IP statistics, it should only&lt;br /&gt;
be enabled in cases of significant load imbalance.&lt;br /&gt;
&lt;br /&gt;
===Ingress packet memory===&lt;br /&gt;
&lt;br /&gt;
This slider allows to configure the amount of memory which is used to buffer received packets. A larger amount of ingress packet memory may help in processing bursts of high bandwidth traffic without packet drops but it also decreases the amount of memory available for statistics. It is important to know that a restart of the processing does not suffice to make changes to this setting active. A full reboot of the device is required for that. See [[Performance Optimization Guide]].&lt;br /&gt;
&lt;br /&gt;
===Jumbo frame mode===&lt;br /&gt;
This options allows to set how jumbo frames are handled by the system.&lt;br /&gt;
&lt;br /&gt;
Three settings are available and the &#039;&#039;&#039;normal&#039;&#039;&#039; mode, which is also the default, is the mode that was used before this configuration option was introduced:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Normal&#039;&#039;&#039;: the default mode offers the best balance of full support for jumbo frames with an efficient usage of the ingress packet memory. This mode uses efficiently sized packet buffers and splits larger packets over multiple packet buffers.&lt;br /&gt;
*&#039;&#039;&#039;Large buffers&#039;&#039;&#039;: this mode uses a single large buffer for each packet which may improve the performance but does not use the ingress packet memory as efficiently and limits the maximum jumbo frame size to 9kB.&lt;br /&gt;
*&#039;&#039;&#039;Disabled&#039;&#039;&#039;: this mode disables support for jumbo frames and offers the best performance and efficient usage of the ingress packet memory. Jumbo frames will be discarded by the network interface.&lt;br /&gt;
&lt;br /&gt;
===Hardware packet timestamping===&lt;br /&gt;
This option allows to enable the use of high-precision hardware packet timestamps on supported interfaces. If an interface is supported, it has the “Hardware Timestamps” feature in the interface statistics (firmware &amp;gt;= 4.4).&lt;br /&gt;
&lt;br /&gt;
This feature will require approximately 30% more load in the I/O threads. The load increase can be reduced to about 10% by using the jumbo frame mode &amp;quot;Large buffers&amp;quot; or &amp;quot;Disabled&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
When enabled, packets received on supported interfaces will carry a timestamp with nanosecond resolution instead of microsecond resolution.&lt;br /&gt;
&lt;br /&gt;
====== Time synchronization for hardware packet timestamping ======&lt;br /&gt;
Except when the network interface supports GNSS/GPS time synchronization and this has been selected as type of time synchronization (see [[Administration]] time settings) the internal clock of the interface is synchronized to the main device system clock. Even when no time synchronization method is chosen (&amp;quot;none&amp;quot;) the system clock is free-running and the internal clock of the interface will be regularly synced to the system clock.&lt;br /&gt;
&lt;br /&gt;
The synchronization to the system time happens roughly every 5 seconds. When the interface clock deviates more than 500ms from the system clock (should only happen at startup or when there is a big jump in the system time e.g. when changing the time synchronization method) the interface time is immediately reset to the system time. If there is a smaller deviation from the system clock the frequency of the interface clock is gradually adjusted to make the clock anneal to the system time so to avoid any discontinuous jumps of the packet timestamps.&lt;br /&gt;
&lt;br /&gt;
When &amp;quot;GNSS/GPS&amp;quot; time synchronization has been configured and the interface is receiving a valid GNSS/GPS time signal the interface clock is directly disciplined to the GNSS/GPS time signal and the system clock is synchronized to the GNSS/GPS time. Information of the synchronistation status is display on the System Info page. Interfaces with hardware packet timestamping but without a GNSS/GPS connection will continue to be synchronized to the system time (which is now running much closer to the global GNSS/GPS time).&lt;br /&gt;
&lt;br /&gt;
===External timestamps===&lt;br /&gt;
When this option is enabled, the system will use timestamps contained in the packet data instead of timestamps measured at packet arrival. Currently the Arista and Ixia/Keysight as well as the SRCMAC timestamp formats are supported.&lt;br /&gt;
&lt;br /&gt;
If the Ixia/Keysight or Arista type is selected, packets without an external timestamp will not be analyzed. The current number of packets that are dropped because they do not contain an external timestamp is displayed in the active interface overview table of the top-user dashboard. If there are no packets with external timestamps arriving the time of the packet processing will effectively stand still and most graphs will not make progress in live-mode.&lt;br /&gt;
&lt;br /&gt;
If one of the SRCMAC options is selected, all packets will be analyzed with all-zero MAC addresses.&lt;br /&gt;
&lt;br /&gt;
=== External original packet lengths ===&lt;br /&gt;
This option allows to enable the use of original packet length information contained in the packet data instead of the length of the packet as received. This is especially useful if truncated packets are received and the traffic statistics should still show the original traffic amount.&lt;br /&gt;
&lt;br /&gt;
At this time only the Ixia/Keysight original packet length trailer format is supported. In firmware version &amp;gt;= 4.6, the length in the IP header can also be used as information about the original packet length. A type selector allows to choose the corresponding format.&lt;br /&gt;
&lt;br /&gt;
This feature can also be used in combination with the &#039;&#039;External timestamps&#039;&#039; option to support packets that contain a Ixia/Keysight trailer with both timestamp and original length information.&lt;br /&gt;
&lt;br /&gt;
===Memory utilization limit===&lt;br /&gt;
This option allows to reduce the limit until old data is removed from the in-memory database. By default the system tries to target 90% memory utilization. In some case, the load might be too high to match this limit. A smaller limit may enable the system to keep the target memory utilization and perform better in general.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Capture_module&amp;diff=5173</id>
		<title>Capture module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Capture_module&amp;diff=5173"/>
		<updated>2025-07-25T07:03:55Z</updated>

		<summary type="html">&lt;p&gt;Ralf: /* Configuration settings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Capture module == &lt;br /&gt;
The Allegro Network Multimeter allows direct capturing of network traffic as a HTTP download to your computer. No packet data is stored on the device itself. Traffic can be directly filtered for specific packets, only the relevant packets will be captured. In addition, it is also possible to capture network traffic to an attached storage device, see the settings section below for details. Capturing network traffic is usually started by clicking on a PCAP button in a certain module. These buttons allow capturing specific traffic, for example for a certain IP address or a network protocol. The capture module allows to configure filter for traffic that has not even started right now, for example for an IP address that is not in use at the moment but might be used later. The capture module page displays all currently running captures and allows starting new captures with specific filters.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
|[[File:Generic modules.png|800px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Current captures ===&lt;br /&gt;
The first part of the page displays all downloads running for the current user session, and all downloads running for other user sessions (like when a download has been started outside the browser by directly using command line tools such as wget or curl).&lt;br /&gt;
The list contains the client IP and port of the user running the download. &lt;br /&gt;
&lt;br /&gt;
The next three counters describe: &lt;br /&gt;
&lt;br /&gt;
* the number of packets captured for the corresponding filter. &lt;br /&gt;
* the number of packets dropped by the capturing module.   Packet drops can appear when doing live capture and more packets are captured than can be transferred via HTTP to the client, or the storage is not capable of storing all matching packets. During live capture, the drop counter is the exact number of packets matching the filter but were dropped because of the reasons mentioned previously.   Packet drops are also accounted when capturing from the past out of the ring buffer. It happens when the ring buffer dropped packets during the capture interval due to insufficient bandwidth available on the storage devices. In retrospective capturing, the drop counter only indicates that some packets may have been missed. The counter is the total amount of packets not available in the ring buffer, which are not necessarily part of the capture filter. &lt;br /&gt;
* the number of ignored packets. Ignored packets do not match the given capture filter. &lt;br /&gt;
&lt;br /&gt;
The following columns list the applied filter criteria. The last column contains a button to stop the corresponding download. Downloads can also be stopped by clicking the same capture button that started the capture in the corresponding module. If multiple devices have been configured, the list also contains all captures from all multi-devices which can be stopped individually. &lt;br /&gt;
&lt;br /&gt;
==== Finished captures ====&lt;br /&gt;
This list shows the last captures that have finished. It shows up to 100 entries while the oldest entries are discarded when the list is full. For each entry the following information is displayed:&lt;br /&gt;
&lt;br /&gt;
* the packet capturing mode&lt;br /&gt;
* the type of capture&lt;br /&gt;
* the start- and end-time of the capture (the actual real-time when the capture was initiated and ended)&lt;br /&gt;
* the number of captured/dropped/ignored packets during the capture&lt;br /&gt;
* the amount of data generated for the capture (along with the average throughput of e.g. the capture download)&lt;br /&gt;
* the capture filter which was used for the capture&lt;br /&gt;
* the finishing reason of the capture job (e.g. completed normally, stopped by user or aborted due to no space left on storage)&lt;br /&gt;
&lt;br /&gt;
The button &#039;&#039;&#039;Delete list of finished captures&#039;&#039;&#039; will delete all entries from this list.&lt;br /&gt;
&lt;br /&gt;
==== Recent filters ====&lt;br /&gt;
This list shows the most recently used capture filters for the current user. The most recent capture filter is displayed on the top. Next to each capture filter there is a button to permanently save this capture filter as a favorite as well as a button to simply start a capture with this filter again. The &#039;&#039;&#039;Use as expert filter&#039;&#039;&#039; button will copy the capture filter into the expert filter input field and allows for customizing the capture. The button &#039;&#039;&#039;Delete list of recent filters&#039;&#039;&#039; will delete all entries from this list.&lt;br /&gt;
&lt;br /&gt;
==== Favorites ====&lt;br /&gt;
This list shows favorite capture expressions. A capture can be marked as a favorite either in the capture dialog by clicking on the star button in the top right corner or by marking it as a favorite in the &#039;&#039;&#039;Recently captured&#039;&#039;&#039; list. A description can be given and will be displayed in this list. For each favorite capture a PCAP button is available to simply start this capture again. The &#039;&#039;&#039;Remove favorites&#039;&#039;&#039; button allows for cleaning the list. The &#039;&#039;&#039;Use as expert filter&#039;&#039;&#039; button will copy the capture filter into the expert filter input field and allows for customizing the capture.&lt;br /&gt;
&lt;br /&gt;
==== Planned captures ====&lt;br /&gt;
On this tab captures to a storage device can be planned ahead of time and these captures can even be set to repeat automatically. A click on the &#039;&#039;&#039;Add planned capture&#039;&#039;&#039; button opens a dialog where the planned capture can be configured. This includes settings like the storage device to use, the start date and time of the capture, the duration of the capture, if a capture should repeat and the filter expression used during the capture. It is important to know that planned captures will not function if the chosen storage device is not active.&lt;br /&gt;
&lt;br /&gt;
==== Capture profiles ====&lt;br /&gt;
[[File:Capture profiles config.png|thumb|600x600px|Capture profile configuration]]&lt;br /&gt;
[[File:Capture profiles edit profile.png|thumb|600x600px|Edit capture profile]]&lt;br /&gt;
Capture profiles can be used in the capture dialog for custom packet truncation rules. Such profiles defines custom rules for packet snapshot length similar to ring buffer filters. This allows to use a different snapshot length for specific layer 7 protocols, if for example traffic of one protocol shall be captured completely while for another protocol only the IP header shall be captured. Such a capture profile can be selected in the capture dialog in the &amp;quot;Truncate packet length&amp;quot; select box.&lt;br /&gt;
&lt;br /&gt;
Up to 10 different profiles can be configured by clicking at the &amp;quot;Add profile&amp;quot; button. The add/edit dialog allows to enter a profile name and up to 10 rules for snapshot length. Similar to [[Packet ring buffer#Packet ring buffer snapshot length filter|ring buffer filters]], the first rule that matches for the selected type is used to decide for the snapshot length of the actual packet.&lt;br /&gt;
&lt;br /&gt;
To restrict the capture possibilities of an user it is possible to choose an &#039;restricting profile&#039;. This allows the administrator to stop the user from capturing other sensitive data like SIP- and RTP-Packages.&lt;br /&gt;
&lt;br /&gt;
==== PCAP anonymization profile ====&lt;br /&gt;
&lt;br /&gt;
Anonymization profiles can be used in capture dialog to allow for quickly switch between rules to anonymize aspects of the generated PCAPs.&lt;br /&gt;
&lt;br /&gt;
When enabled, following options are available (more than one option is possible):&lt;br /&gt;
* MAC addresses on L2&lt;br /&gt;
:MAC addresses on L2 will be replaced by random addresses octet-wise. Multicast/broadcast addresses will not be randomized.&lt;br /&gt;
* IP addresses on L3&lt;br /&gt;
:IP addresses on L3 will be replaced by random addresses octet-wise for IPv4 and hextet-wise for IPv6. Multicast/broadcast addresses will not be randomized. The octets of the IP address will have the same length in textual representation (e.g. 100.20.3.40 -&amp;gt; 105.31.6.41). For IPv6 address short notation will be considered and the randomized result will also have the same textual length. &lt;br /&gt;
* IP addresses on L7&lt;br /&gt;
:IPv4 and IPv6 addresses in textual representation in L7 payload will be randomized similar to L3.&lt;br /&gt;
* Mapped IP addresses in STUN packets on L7&lt;br /&gt;
:STUN payload IP addresses will be randomized similar to L3.&lt;br /&gt;
* Phone numbers, name and Call ID in SIP packets on L7&lt;br /&gt;
: SIP payload data is masked with &#039;xxx&#039; values for the names and phone numbers in the fields &amp;quot;From&amp;quot;, &amp;quot;To&amp;quot;, &amp;quot;Contact&amp;quot;, &amp;quot;P-Asserted-Identity&amp;quot;, &amp;quot;P-Preferred-Identity&amp;quot;. Call IDs, usernames and sip.instance values are also replaced. IP addresses are not touched, if they shall be anonymized, please use option &amp;quot;IP addresses on L7&amp;quot;.&lt;br /&gt;
* URLs and HTTP hostnames on L7&lt;br /&gt;
: URLs and HTTP hostnames in L7 payload are masked with &#039;xxx&#039; values. The length of the masked name/URL will stay the same and line feeds won&#039;t be touched.&lt;br /&gt;
:: Examples:&lt;br /&gt;
:: &#039;GET /website.html?param1=value HTTP/1.1\r\n&#039; will be changed to &#039;GET xxxxxxxxxxxxxxxxxxxxxxxxxx HTTP/1.1\r\n&#039; &lt;br /&gt;
:: &#039;Host: allegro-packets.com\r\n&#039; will be changed to &#039;Host: xxxxxxxxxxxxxxxxxxx\r\n&#039;&lt;br /&gt;
:: https://www.allegro-packets.com/en/ will be completely masked &lt;br /&gt;
&lt;br /&gt;
Within an anonymization profile it is also possible to define MAC and IP lists with entries that should be anonymized or that should be excluded from anonymization. The proper L2/L3 anonymization option &#039;&#039;&#039;must be turned on&#039;&#039;&#039; in order to have an effect!&lt;br /&gt;
&lt;br /&gt;
The amount of SIP phone numbers last hidden digits can be configured, e.g. with a setting of 4 last hidden digits a phone number +49123456789 becomes +4912345xxxx.&lt;br /&gt;
&lt;br /&gt;
Address anonymization is stable for the whole PCAP, i.e. the same addresses will be replaced by the same random addresses. As an example, if both randomization of IP addresses on L3 and L7 is active and a SIP call with RTP is captured, both IP addresses in L3 and SIP SDP payload are replaced by the same values so that the correlation of the RTP stream is still intact.&lt;br /&gt;
&lt;br /&gt;
Checksums of the changed packets are &#039;&#039;&#039;not&#039;&#039;&#039; being recalculated.&lt;br /&gt;
&lt;br /&gt;
A privileged user may enforce an anonymization profile that is being used for all users that do not have the unrestrictive capture permission in a role. This profile will always be taken into account and the unprivileged user may only add additional anonymizations on top of it for captures (but the user can&#039;t overwrite it with less restrictive settings).&lt;br /&gt;
&lt;br /&gt;
==== SFTP server ====&lt;br /&gt;
Credentials and upload directories for a SFTP server can be configured here. They can be selected in the capture dialog later when choosing &amp;quot;Capture to SFTP server&amp;quot; as capture type. It is possible to either configure a user and password or use authentication with a public key. In the latter case, the displayed SSH public key needs to be inserted in the authorized hosts list on the SFTP server.&lt;br /&gt;
&lt;br /&gt;
=== Simple capture ===&lt;br /&gt;
The second section of the capture page allow to select some fields to filter network traffic for. By default, only the IP field is visible, the other fields can be enabled by clicking on the corresponding toggle switch. Each line allows to enter a filter criterion for the corresponding network traffic element. To start the capture with the entered filter criteria just click at the &#039;&#039;&#039;Start capture&#039;&#039;&#039; button. For reference, the expert filter expression is shown at the end of the section so it can be used to copy and paste&lt;br /&gt;
the string into the expert filter section.&lt;br /&gt;
&lt;br /&gt;
=== Using expert filters to start captures ===&lt;br /&gt;
The third part of the page allows for starting a download for any criterion combination using complex filter expressions. A capture filter is defined in a C-style syntax and supports combination of AND/OR operators, precedence order with parentheses and equal/not equal comparisons. If the filter exp Session can be evaluated to true, the packet is&lt;br /&gt;
captured.&lt;br /&gt;
If a value contains a space, the whole value must be quoted with “”.&lt;br /&gt;
Following operators are supported:&lt;br /&gt;
* &#039;&#039;&#039;and&#039;&#039;&#039;, &#039;&#039;&#039;&amp;amp;&amp;amp;&#039;&#039;&#039; : AND operator. The filter expression will match if all operands could be evaluated to true.&lt;br /&gt;
* &#039;&#039;&#039;or&#039;&#039;&#039;, &#039;&#039;&#039;||&#039;&#039;&#039;: OR operator. The filter expression will match if any operand can be evaluated to true.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Following comparison operators are supported:&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;==&#039;&#039;&#039;: Will evaluate expression to true if left and right operand are equal.&lt;br /&gt;
* &#039;&#039;&#039;!=&#039;&#039;&#039;: Will evaluate expression to true if left and right operand are not equal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Following operands are supported:&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;&#039;ip&#039;&#039;&#039;: An IP address. The packet is captured if either source or destination IP address of the packet match. A netmask and a port can also be specified. For IPv6 addresses with a specific port, the address must be written in brackets. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
|  &lt;br /&gt;
ip == 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
ip == ff02::1:3&lt;br /&gt;
&lt;br /&gt;
ip == 10.0/16&lt;br /&gt;
&lt;br /&gt;
ip == 10.0.0.1:1234&lt;br /&gt;
&lt;br /&gt;
ip == [2a02:810a:1340:1292:1c6b:e58d:6ebc:6cd2]:123&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;ip.src, ip.dst&#039;&#039;&#039;: The source or destination IP address.&lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
|  &lt;br /&gt;
ip.src == 10.0.0.1/8 and ip.dst == 10.0.0.1/8&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
: This will match traffic only within 10.0.0.1/8 subnet. If src/dst is omitted, also in or outbound traffic from or to other subnets is captured!&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;mac&#039;&#039;&#039;: A MAC address. The packet is captured if either source or destination MAC address of the packet match. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
|  mac == 12:34: :56:78:90:ab&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;port&#039;&#039;&#039;: A TCP or UDP port. The packet is captured if either source or destination port match. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-         &lt;br /&gt;
| port == 80&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;portrange&#039;&#039;&#039;: A TCP or UDP port range. The range can be a single number or a comma separated list of values or value ranges. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-                     &lt;br /&gt;
| portrange == 80,100-120,-10,65000-&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;serverport&#039;&#039;&#039;: A TCP or UDP port of a server. The packet is captured if the given port is a port of the server and not of a client. The range can be a single number or a comma separated list of values or value ranges.&lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| serverport == 80,100-120,-10,65000-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;macProtocol&#039;&#039;&#039;: A MAC protocol such as IPv4 or IPv6. For all seen MAC protocols, please consult the MAC Protocol Statistics module. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| macProtocol == IPv4&lt;br /&gt;
macProtocol == &amp;quot;Non IP&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;l4Protocol&#039;&#039;&#039;: A layer 4 protocol such as TCP or UDP or any IP protocol number. Protocols can also be OR combined as a comma seperated list. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| l4Protocol == ICMP,ICMPv6&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;l7Protocol&#039;&#039;&#039; or &#039;&#039;&#039;dpiProtocol&#039;&#039;&#039;: A layer 7 protocol. Protocols can also be OR combined as a comma seperated list. For all seen protocols please consult the Layer 7 protocols module.&lt;br /&gt;
* &#039;&#039;&#039;countryCode&#039;&#039;&#039;: A country code such as US. For all seen country codes please consult the Geolocation module.&lt;br /&gt;
* &#039;&#039;&#039;arpip&#039;&#039;&#039;: An IP address within an ARP request or response.&lt;br /&gt;
* &#039;&#039;&#039;vlan&#039;&#039;&#039;: A VLAN tag of an outer or inner VLAN. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;outervlan&#039;&#039;&#039;: A VLAN tag of an outer VLAN. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;innervlan&#039;&#039;&#039;: A VLAN tag of an inner VLAN. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;multicastGroup&#039;&#039;&#039;: A multicast IP address or any. The filter will match all IGMP or MLD negotiation packets related to that multicast IP address.&lt;br /&gt;
* &#039;&#039;&#039;rtpPayloadType&#039;&#039;&#039;: The RTP payload type such as PCMU or MP2T. This filter will match all RTP packets with the given payload type.&lt;br /&gt;
* &#039;&#039;&#039;interface.name&#039;&#039;&#039; or &#039;&#039;&#039;namedInterface&#039;&#039;&#039;: The physical interface. This can be the name or interface number (as printed on the device). For interface ids please consult the Interface stats page. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| &amp;lt;nowiki&amp;gt;interface.name == uplink || interface.name == 3&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;interface.rawid&#039;&#039;&#039;: This is the raw internal ID of interfaces. It starts from 0. The interface stats page also shows the raw ID.&lt;br /&gt;
* &#039;&#039;&#039;link&#039;&#039;&#039;: The link pair of two interfaces as stated in Interface stats. A single link number can be given.&lt;br /&gt;
* &#039;&#039;&#039;pppoeProtocol&#039;&#039;&#039;: A specific PPPoE protocol (by name or by ID), or &amp;quot;none&amp;quot;/&amp;quot;any&amp;quot;&lt;br /&gt;
* &#039;&#039;&#039;pppoeAuthentication&#039;&#039;&#039;: An authentication state of a PPPoE session&lt;br /&gt;
* &#039;&#039;&#039;pppoeLinkConfiguration&#039;&#039;&#039;: A link configuration state of a PPPoE session&lt;br /&gt;
* &#039;&#039;&#039;ptpMsgType&#039;&#039;&#039;: A specific PTP message type number or any for the whole PTP traffic.&lt;br /&gt;
* &#039;&#039;&#039;profinetFrameId&#039;&#039;&#039;: A specific Profinet frame ID.&lt;br /&gt;
* &#039;&#039;&#039;profinetCmOpnum&#039;&#039;&#039;: A specific operation number for Profinet CM (Context Manager) requests or responses. Can also be any for every operation number. Following values are used:&lt;br /&gt;
:#connect&lt;br /&gt;
:#release&lt;br /&gt;
:#read&lt;br /&gt;
:#write&lt;br /&gt;
:#control&lt;br /&gt;
:#read implicit&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;mpls&#039;&#039;&#039;: A label of an outer or inner MPLS. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;outerMpls&#039;&#039;&#039;: A label of an outer MPLS. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;innerMpls&#039;&#039;&#039;: A label of an inner MPLS. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;qosIpDscp&#039;&#039;&#039;: The DSCP value in the IP header. May be a number.&lt;br /&gt;
* &#039;&#039;&#039;qosMplsTc&#039;&#039;&#039;: The traffic class value in the outermost MPLS label stack entry.&lt;br /&gt;
* &#039;&#039;&#039;qosVlanPcp&#039;&#039;&#039;: The priority code point value in the outermost VLAN tag.&lt;br /&gt;
* &#039;&#039;&#039;group&#039;&#039;&#039;: The name of a configured group or ‘default’. If the name contains whitespaces, the name must be enclosed in quotes.&lt;br /&gt;
* &#039;&#039;&#039;badCRC&#039;&#039;&#039;: The value of this operand will be 1 for packets with a CRC error and will be 0 for good packets. Capturing packets with bad CRC is currently only supported on 1Gb interfaces.&lt;br /&gt;
* &#039;&#039;&#039;icmpType&#039;&#039;&#039;: The value of a certain ICMP type (e.g. Echo request 8, Echo reply 0).&lt;br /&gt;
* &#039;&#039;&#039;dhcpMessageType&#039;&#039;&#039;: The value of a certain DHCP message type (e.g. Request 3, ACK 5).&lt;br /&gt;
* &#039;&#039;&#039;tcpFlags&#039;&#039;&#039;: A single TCP flag or a list of TCP flags joined by the ‘+’ sign. If a list of flags is given, all flags must be present in the packet. Supported TCP flags are syn, ack, fin, rst, psh and urg.&lt;br /&gt;
* &#039;&#039;&#039;callId&#039;&#039;&#039;: The string value of a SIP call ID or similar identifier (e.g. P-Palladion-ID)&lt;br /&gt;
* &#039;&#039;&#039;ipFragment&#039;&#039;&#039;: If set to 1 all IPv4 fragments will be captured (i.e. packets having the &#039;More fragments&#039; flag and &#039;Fragment offset&#039; set). If set to 0 all packets without IPv4 fragmentation will be captured.&lt;br /&gt;
* &#039;&#039;&#039;regexp&#039;&#039;&#039;: The packet payload matches the quoted regular expression (RegEx) to the other side of the == operator or does not match the regular expression to the other side of the != operator. In case of IP packets the matching will be performed on the L7 payload of the packet. In case of non-IP packets the matching will be performed on the whole packet except the Ethernet header. Regular expressions largely support the pattern syntax used by the PCRE library with the exception of certain constructs. An invalid pattern will produce a descriptive error message and prevent the capture from being started.&lt;br /&gt;
* &#039;&#039;&#039;ipDoNotFragment&#039;&#039;&#039;: The value of this operand will be 1 for IPv4 packets that are marked as to not be fragmented (packets which have the &#039;do not fragment&#039; flag set).&lt;br /&gt;
* &#039;&#039;&#039;mactype&#039;&#039;&#039;: The type of the packets destination MAC address. Allowed values are &#039;unicast, &#039;broadcast&#039; and &#039;multicast&#039;.&lt;br /&gt;
* &#039;&#039;&#039;slowSubtype&#039;&#039;&#039;: The subtype of packets with the macProtocol == SLOW (e.g. 1 for LACP).&lt;br /&gt;
* &#039;&#039;&#039;wifiFrequency&#039;&#039;&#039;: The frequency (channel) of a WiFi packet in MHz.&lt;br /&gt;
* &#039;&#039;&#039;wifiBssid&#039;&#039;&#039;: The BSS ID participating in a WiFi packet. This is similar to a MAC address.&lt;br /&gt;
* &#039;&#039;&#039;callNumber&#039;&#039;&#039;: SIP caller (SIP from tag) or callee (SIP to tag) number (firmware &amp;gt;= 4.5) &lt;br /&gt;
* &#039;&#039;&#039;callerNumber&#039;&#039;&#039;: SIP caller (SIP from tag) number (firmware &amp;gt;= 4.5) &lt;br /&gt;
* &#039;&#039;&#039;calleeNumber&#039;&#039;&#039;: SIP callee (SIP to tag) number (firmware &amp;gt;= 4.5)&lt;br /&gt;
&lt;br /&gt;
For a specific precedence you may use parentheses &#039;&#039;&#039;(&#039;&#039;&#039;/&#039;&#039;&#039;)&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Examples:&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| ip == 10.0.0.1:1234 and ip == 10.1.0.1:9876&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match a connection from 10.0.0.1 to 10.1.0.1 or vice versa with the ports 1234 and 9876 involved.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| ip == 10.0.0.1 and ip != 10.0.0.2&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match packets having 10.0.0.1 either as source or destination. If a communication peer of 10.0.0.1 is 10.0.0.2 the packets will not be captured.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| l4Protocol == ICMP,ICMPv6&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match packets with ICMP or ICMPv6 layer 4 protocols.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| portrange == 80,443&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match packets to or from port 80 or 443.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == &amp;quot;allegr[o,a]&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;HTTP&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will case sensitive match packets that contain the string(s) &#039;allegro&#039; and/or &#039;allegra&#039; and/or &#039;HTTP&#039; anywhere in the payload.&lt;br /&gt;
:NOTE: The use of regexp is CASE sensitive. You must use the (?i) modifier to enable case insensitive filtering.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == &amp;quot;(?i)allegro&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;http&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will case insensitive match packets that contain the string(s) &#039;allegro&#039; and/or &#039;http&#039; anywhere in the payload.&lt;br /&gt;
:NOTE: The use of regexp is CASE sensitive. You must use the (?i) modifier to enable case insensitive filtering.&lt;br /&gt;
&lt;br /&gt;
Of course the Allegro Network Multimeter regular expression (RegEx) capture filter, can also be used in combination with our other capture expressions.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == “allegro&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;analyzer” and l7protocol == &amp;quot;dns&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:Will case sensitive match and capture &amp;lt;u&amp;gt;only DNS packets&amp;lt;/u&amp;gt; containing the string(s) “allegro” and/or “analyzer.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == “allegro&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;analyzer” and l7protocol != &amp;quot;dns&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:Will case sensitive match and capture all (except DNS) packets containing the string(s) “allegro” and/or “analyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Whenever you are unsure about the outcome of RegEx based packet capturing, you can pre-test the outcome of your expressions on https://pythex.org/. &lt;br /&gt;
While pre-testing on https://pythex.org/, avoid using the “IGNORECASE” button. Instead use the (?i) modifier for constructing case insensitive expressions, as mentioned above.&lt;br /&gt;
PCRE/Python based expression examples and explanations you&#039;ll find on https://www.programiz.com/python-programming/regex&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All captures can be limited to any amount of time or bytes, for example to capture only one minute or one megabyte of traffic.&lt;br /&gt;
&lt;br /&gt;
Below the list of filter criteria, you will find the button to actually start (or stop) the capture. In case the filter expression is invalid, the button is disabled.&lt;br /&gt;
&lt;br /&gt;
====Layer 7 protocol capture====&lt;br /&gt;
Layer 7 protocol detection engine may need several packets to recognize the currently used protocol. For these captures all not yet recognized packets will be skipped. As soon as the protocol recognition is finished, all packets matching the protocol filter will be captured.&lt;br /&gt;
&lt;br /&gt;
=== Configuration settings ===&lt;br /&gt;
By clicking on the gear button on the top right of the Capture web page, you can access the configuration section.&lt;br /&gt;
&lt;br /&gt;
*The maximum number of concurrent capture sessions&lt;br /&gt;
:Per default out-of-box setting (factory default), all Allegro Network Multimeter models allow up to 4 concurrent captures. As of FW ≥ V3.4, the number of allowed concurrent captures, can be increased up to 64, depending on model and available RAM. Note, that Increasing the number of allowed parallel/concurrent captures will decrease memory capacity for the in-memory DB, therewith decreasing the maximum timeframe of statistics held and presented in the web-interface. If the memory usage is too high, the number of parallel captures might be lower/limited by the Allegro itself.&lt;br /&gt;
&lt;br /&gt;
*Split PCAP file after this size&lt;br /&gt;
: This option can be used to limit the size of the PCAP file when storing to an attached device. Once the captured traffic would exceed this threshold, a new PCAP file with the current time stamp is created and the traffic is written to the new file. If the time stamp is still the same, an index is attached to the filename.&lt;br /&gt;
: When set to 0, no splitting will be done.&lt;br /&gt;
&lt;br /&gt;
*Split PCAP file after this duration&lt;br /&gt;
:This option can be used to limit the duration of the PCAP file when storing to an attached device. The duration starts counting with the start of the capture. Once the captured traffic would exceed the duration, a new PCAP file with the current time stamp is created and the traffic is written to the new file.&lt;br /&gt;
:When set to 0, no splitting will be done.&lt;br /&gt;
:Both split parameters can be combined. The PCAP file will be split as soon as one threshold has been reached.&lt;br /&gt;
&lt;br /&gt;
*The maximum number of concurrent packet ring buffers&lt;br /&gt;
:This option is used to specify how many cluster packet ring buffers can run in parallel.&lt;br /&gt;
:Be aware that each cluster will have it&#039;s own queue in memory and therefore the memory required is the number of cluster packet ring buffers multiplied by the setting of &#039;&#039;&#039;The size in MB for the queue of the packet ring buffer&#039;&#039;&#039;.&lt;br /&gt;
:A reboot of the device or a restart of the processing is needed for a change to this option to take effect. The maximum number of concurrent packet ring buffers is 8.&lt;br /&gt;
&lt;br /&gt;
*The size in MB for the queue of the packet ring buffer&lt;br /&gt;
: This option allows to configure the size of the queue that holds processed packets before they are written to the packet ring buffer. Increasing the size of this queue may help if the disk used for the packet ring buffer cannot keep up with bursts of traffic so that packet drops occur in the packet ring buffer.&lt;br /&gt;
:Be aware that memory allocated to this queue is not available for storing statistics and metadata so that choosing a large value for this queue reduces the overall data storage time.&lt;br /&gt;
:Most users will not need to change this value from the default value.&lt;br /&gt;
:A reboot of the device or a restart of the processing is needed for a change to this option to take effect.&lt;br /&gt;
&lt;br /&gt;
*The maximum size in MB for the packet reorder buffer when capturing from the packet ring buffer&lt;br /&gt;
:This setting allows to choose the maximum size that the packet reorder buffer may grow to. For performance reasons the packet ring buffer does not ensure a total order of packets when storing them on disk. The packet reorder buffer is used to restore the correct order of packets in a capture when capturing from the packet ring buffer. A larger packet reorder buffer makes it more likely that the packet order can be restored for all packets. The actual amount of memory used for the packet reorder buffer depends on this setting but also on the amount of free memory in the system so that the effectively used amount of memory may be less than this setting indicates.&lt;br /&gt;
&lt;br /&gt;
=== Capture settings dialog ===&lt;br /&gt;
[[File:Choose capture settings.png|none|thumb|600x600px]]&lt;br /&gt;
This dialog appears after a capture button has been clicked. Following settings are possible:&lt;br /&gt;
*Start time and end time&lt;br /&gt;
:By clicking on the input field or on the calendar icon you can choose the start and end time of the capture. The input field is also editable with keyboard and allows entering a time on a second basis.&lt;br /&gt;
: If the start time is in the past, the complete capture is performed on the stored data of the capture ring buffer. When the capture reaches the newest packets it still continues to read from the capture ring buffer. The dialog will limit the start time input to the earliest data of the capture ring buffer. Be aware, that a possible capture ring buffer filter was applied on the past data and is also applied on future data in this mode.&lt;br /&gt;
: The start time may also be in the future. The capture is scheduled and starts as soon as a packet is received with a time later than the start time.&lt;br /&gt;
:If the whole time input field is marked and deleted, the start or end time will reset back to the default value. The default value for start time is &#039;&#039;&#039;now&#039;&#039;&#039;, the capture will start with pushing the &#039;&#039;&#039;Start capturing&#039;&#039;&#039; button. The default value of the end time is &#039;&#039;&#039;unlimited&#039;&#039;&#039;, the capture will not stop unless stopped manually by clicking on the stop button.&lt;br /&gt;
:Eight buttons offer quick selection of often used time settings.&lt;br /&gt;
&lt;br /&gt;
*Packet ring buffer&lt;br /&gt;
:If multiple packet ring buffer clusters are active this dropdown menu allows to choose from which cluster the packets should be captured.&lt;br /&gt;
&lt;br /&gt;
*Capture type&lt;br /&gt;
: This drop down menu allows to choose the method how packets are captured. The last successful setting is persistently stored per user. Following methods are available:&lt;br /&gt;
&lt;br /&gt;
:*HTTP download&lt;br /&gt;
::This is the default method. The capture will start a HTTP download of a PCAP file directly in the browser.&lt;br /&gt;
:: Available HTTP download options:&lt;br /&gt;
::*Set file name: allow to configure a custom file name for the capture file&lt;br /&gt;
::*Download as zip archive: Download the capture file as a compressed zip archive&lt;br /&gt;
:*Disk&lt;br /&gt;
::This method is only visible if at least one storage device is active and has some amount of free storage space. The capture will create a PCAP file on the selected storage device.&lt;br /&gt;
::If PCAP export via SFTP is enabled, an additional checkbox is displayed to store the capture file in the export directory, slated for upload according the SFTP export settings.&lt;br /&gt;
&lt;br /&gt;
:*Interface&lt;br /&gt;
::This mode will transmit the captured packets on a physical network interface. It is not available when the system is analyzing a PCAP file or is analyzing the packet ring buffer. The speed of the replay can be chosen below to real-time or specific speed or unlimited speed. The actual achievable speed depends on factors like the speed of the storage device. The maximum speed is typically &amp;lt;= 5 Gbps/400 kpps (also depending on the interface speed).&lt;br /&gt;
&lt;br /&gt;
:* ERSPAN&lt;br /&gt;
::This mode will transmit the captured packets encapsulated in a GRE + ERSPAN header on the management interface to a given target IP address. On the target system the   traffic can be   selectively captured using the filter &#039;&#039;&#039;ip proto 0x2f&#039;&#039;&#039; when using an application like Wireshark or tcpdump.&lt;br /&gt;
&lt;br /&gt;
:* Capture to SFTP server&lt;br /&gt;
::This mode will stream the PCAP to the selected SFTP server using the given credentials. SFTP servers can be configured on the Capture page&lt;br /&gt;
&lt;br /&gt;
*Storage device&lt;br /&gt;
:If the &#039;disk&#039; capture type is chosen, this drop-down menu allows to choose one of the active storage devices. The capture will be stored on the selected device.&lt;br /&gt;
&lt;br /&gt;
*File name&lt;br /&gt;
:If browser download or disk storage has been chosen and the &amp;quot;Set file name&amp;quot; checkbox has been selected, the file name of the created capture file can be set in this field. The default value shows the filename with date wildcards and the capture filter. The date wildcards are then replaced by the start time of the capture. &lt;br /&gt;
:Date format specifier can be used as supported by strftime() function call. Some common specifier:&lt;br /&gt;
:*%Y for year&lt;br /&gt;
:*%m for month&lt;br /&gt;
:* %d for day&lt;br /&gt;
:*%H for hours&lt;br /&gt;
:*%M for minutes&lt;br /&gt;
:*%S for seconds&lt;br /&gt;
:Filenames are remembered when the dialog is closed and reopened. Clicking the circular arrow resets the filename to its default.&lt;br /&gt;
&lt;br /&gt;
*Storage directory&lt;br /&gt;
:If disk storage has been chosen, the target directory on the storage device can be set in this field. Sub-directories on the storage device can be created and inspected on the [[Storage#Working with storage contents|Storage]] page.&lt;br /&gt;
&lt;br /&gt;
* Zip options&lt;br /&gt;
:If browser download has been chosen and the zip download option is selected, the file size can be configured after which the pcap files within the archive is spit into additional files&lt;br /&gt;
:The number is entered in megabytes. 0 means no splitting.&lt;br /&gt;
&lt;br /&gt;
*Interface to transmit on&lt;br /&gt;
:This dropdown menu is only shown when Capture type is Interface. Here the physical interface on which to transmit captured packets can be selected.&lt;br /&gt;
&lt;br /&gt;
* ERSPAN target address&lt;br /&gt;
:This section is only shown when Capture type is ERSPAN. Here the target IP address or hostname for the ERSPAN encapsulated packets must be specified.&lt;br /&gt;
&lt;br /&gt;
*ERSPAN session ID&lt;br /&gt;
:This section is only shown when Capture type is ERSPAN. The ERSPAN session ID can be used to differentiate between multiple capture session on the ERSPAN target.&lt;br /&gt;
&lt;br /&gt;
*Transmit speed&lt;br /&gt;
: This dropdown menu is only shown when the Capture type is either Interface or ERSPAN and the start time is in the past so that packets are captured from the packet ring buffer. Here the limiting mode can be chosen which controls how fast captured packets are transmitted. Following modes are available:&lt;br /&gt;
&lt;br /&gt;
:*none&lt;br /&gt;
::No limit will be applied and the packets are transmitted as fast as the network interface and the packet ring buffer allow.&lt;br /&gt;
&lt;br /&gt;
:*limit to bandwidth&lt;br /&gt;
::A bandwidth limit will be applied so that the given bandwidth in Mbps is not exceeded. The bandwidth can be given as a decimal so that e.g. 500kbps can be configured with a value of 0.5.&lt;br /&gt;
&lt;br /&gt;
:*realtime factor&lt;br /&gt;
:: Packets will be transmitted based on their recorded timing information. This means that with a real time factor of 1.0 packets will be transmitted approximately with the same timing as they were originally received. Using for example a real time factor of 2.0 would transmit the packets with twice the speed than they were received.&lt;br /&gt;
&lt;br /&gt;
* Transmit bandwidth in Mbps&lt;br /&gt;
:This is only shown when limit to bandwidth has been selected in the Transmit speed dropdown menu. The meaning of this value is explained in the Transmit speed section.&lt;br /&gt;
&lt;br /&gt;
*Transmit realtime factor&lt;br /&gt;
:This is only shown when realtime factor has been selected in the Transmit speed dropdown menu. The meaning of this value is explained in the :Transmit speed section.&lt;br /&gt;
&lt;br /&gt;
*Truncate packet length:&lt;br /&gt;
:This dropdown menu is only shown when the Capture type is either HTTP or disk. You can truncate captured Packets with this setting. All packets will be captured, but truncated to the given length if they are longer than this setting. The length setting is applied on layer 2 without frame check sequence.&lt;br /&gt;
:Possible values are:&lt;br /&gt;
:*Full length&lt;br /&gt;
:*64 Bytes&lt;br /&gt;
:*1500 Bytes&lt;br /&gt;
:*Custom length with an input field for inserting any length between 64 and 15378 Bytes&lt;br /&gt;
:*Capture profile: select a configured capture profile which defines rules about how many bytes are saved depending on the configured rules.&lt;br /&gt;
&lt;br /&gt;
*PCAP compatibility:&lt;br /&gt;
:This section is only shown when the Capture type is either HTTP or disk.&lt;br /&gt;
:*Omit interface ID&lt;br /&gt;
::Enabling this option will generate a PCAP file that only contains a single interface and treats all packets as if they arrived on that interface. This may improve compatibility with third party software that cannot handle PCAPs with multiple interfaces IDs.&lt;br /&gt;
&lt;br /&gt;
*PCAP comment:&lt;br /&gt;
:Allows to add a user defined comment to the generated PCAP file.&lt;br /&gt;
:*Add device information to comment&lt;br /&gt;
::Enabling this option will insert additional device information such as name, serial, memory size or capture filter into he PCAP comment.&lt;br /&gt;
&lt;br /&gt;
*PCAP packet type:&lt;br /&gt;
:This dropdown menu allows to choose the datalink packet type of the PCAP file. It is possible to choose between capturing regular Ethernet packets or raw Radiotap IEEE 802.11 WiFi packets in some places.&lt;br /&gt;
:Possible values are:&lt;br /&gt;
:*Ethernet&lt;br /&gt;
:*Radiotap&lt;br /&gt;
&lt;br /&gt;
* Anonymization&lt;br /&gt;
: This option allows enabling or disabling anonymization of the downloaded PCAP file by either apply generic settings or choosing a custom anonymization profile.&lt;br /&gt;
: See [[Capture_module#PCAP_anonymization_profile|PCAP anonymization]] for details.&lt;br /&gt;
&lt;br /&gt;
After pushing the &#039;&#039;&#039;Start capture&#039;&#039;&#039; button, the capture starts.&lt;br /&gt;
&lt;br /&gt;
=== Webshark ===&lt;br /&gt;
The Allegro Nework Multimeter has a preview mode to see the first Megabyte of captured packets directly in the browser. By clicking the Webshark preview button in the capture dialog, the first Megabyte of the requested packets will be extracted. If this is extraction is finished, a modal dialog will open showing the captured packets similar to Wireshark. The capture can be moved from the modal dialog to a separate window by pressing the button in the upper right corner next to the close button.&lt;br /&gt;
&lt;br /&gt;
=== Snort ===&lt;br /&gt;
The Allegro Network Multimeter is able to run a Snort analysis on the capture output and display the analysis output in the web browser. To do this, enable the feature in the [https://allegro-packets.com/wiki/Global_settings#Snort_analysis Global settings] and configure it accordingly. The Snort analysis button can be found at the bottom right of the capture modal.&lt;br /&gt;
&lt;br /&gt;
=== Capture URL === &lt;br /&gt;
It is possible to use an external tool like &#039;&#039;&#039;curl&#039;&#039;&#039; for creating and storing a PCAP.&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| curl -k -u USER:PASSWORD &#039;https://allegro-mm-XXXX/API/data/modules/capture?startTime=1517306266000000&amp;amp;endTime=1517309267000000&amp;amp;expression=l7Protocol==HTTP&amp;amp;snapPacketLength=65535&amp;amp;fromCaptureBuffer=true&#039; &amp;gt; path_to/capture.pcap&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
The user name, password and hostname similar to the access of the web interface have to be used.&lt;br /&gt;
Following parameters are possible:&lt;br /&gt;
&lt;br /&gt;
* startTime: The start time of the capture. The first packet with exactly this or a later time will start the capture. The time format must be microseconds after January, 1st 1970 UTC (Unix time, epoch). If the start time is in the past, make sure you set fromCaptureBuffer parameter accordingly.&lt;br /&gt;
*endTime: The end time of the capture. The first packet with exactly this or a later time will stop the capture. The time format must be microseconds after January, 1st 1970 UTC (Unix time, epoch).&lt;br /&gt;
*expression: The filter expression. There are no whitespaces allowed. You may use ‘%20’ instead.&lt;br /&gt;
*snapPacketLength: The max size of a packet applied on layer 2 without frame check sequence. If a packet is larger than this value, it is truncated. Use 65535 for unlimited size.&lt;br /&gt;
* fromCaptureBuffer: Whether to extract data from the packet ring buffer or just live traffic.&lt;br /&gt;
*captureToMedia: Whether to store PCAP on external storage device or download with your browser on your computer.&lt;br /&gt;
* useSingleInterface: Whether to store only a single interface in the PCAP and treat all packets as if they arrived on that interface. This may improve compatibility with third party software that cannot handle PCAPs with multiple interfaces IDs.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Process_traffic_capture_from_remote_device&amp;diff=5169</id>
		<title>Process traffic capture from remote device</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Process_traffic_capture_from_remote_device&amp;diff=5169"/>
		<updated>2025-07-18T13:29:59Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
The Allegro Network Multimeter can also be switched into a special mode to receive pcap stream via TCP from any remote device. &lt;br /&gt;
It is possible to process plain pcap files or use an additional tool to capture traffic and send it to the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
This mode can be enabled or disabled, and if enabled, the port for receive packet streams can be configured. Be aware that this port is plain unencrypted TCP!&lt;br /&gt;
&lt;br /&gt;
If changes to these settings are made, a restart of the measurement application is required, which can be done in the Administration page.&lt;br /&gt;
&lt;br /&gt;
Every pcap file streamed to the TCP socket will be processed as it would be analysed locally from a connected storage device. &lt;br /&gt;
Up to 16 connections can be used simultaneously. &lt;br /&gt;
Since the internal clock depends on the packet time, all clocks of the sources should be (almost) synchronous (for example by using NTP time synchronization). &lt;br /&gt;
&lt;br /&gt;
To analyze a bunch of files chronologically, stream the files one at a time to the Multimeter.&lt;br /&gt;
The timestamps of the actual packets are used for the internal time clock of the Allegro Network Multimeter so network problems and events can be traced back to the actual time they happened.&lt;br /&gt;
&lt;br /&gt;
The clock of multiple files should not run backwards, i.e. when a file from an older capture time is processed after a file from a newer capture time. &lt;br /&gt;
If such files need to be analyzed, the measurement core should be started via the Administration page.&lt;br /&gt;
&lt;br /&gt;
The [[System Info Page]] shows the current packet processing mode, indicating whether live traffic from local network interface is processed, live traffic from the TCP port, or a pcap file from the storage device is analyzed.&lt;br /&gt;
&lt;br /&gt;
===== Parallel remote packets =====&lt;br /&gt;
Starting with version 4.3 there is now the option to run the remote packet processing in parallel to the live analysis just like a parallel PCAP analysis or parallel Packet Ring Buffer analysis. For this to work the PCAP parallel analysis feature must be enabled (see [[PCAP parallel analysis]]).&lt;br /&gt;
&lt;br /&gt;
In the tab &#039;&#039;Parallel remote packets&#039;&#039; the following parameters can be set:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Port number:&#039;&#039;&#039; the port on which this parallel remote packet processing should listen for incoming connections&lt;br /&gt;
* &#039;&#039;&#039;Name:&#039;&#039;&#039; a name displayed on the Top User Dashboard when the replay slot is selected (optional)&lt;br /&gt;
* &#039;&#039;&#039;Description:&#039;&#039;&#039; a description displayed on the Top User Dashboard when the replay slot is selected  (optional)&lt;br /&gt;
* &#039;&#039;&#039;Analysis Profile:&#039;&#039;&#039; a settings profile to be used for the parallel remote packet processing (see [[Pcap analysis module]])&lt;br /&gt;
* &#039;&#039;&#039;Replay Slot:&#039;&#039;&#039; the replay slot to be used for the  parallel remote packet processing&lt;br /&gt;
&lt;br /&gt;
A checkbox &#039;&#039;Use a temporary Packet Ring Buffer for the parallel remote packets analysis&#039;&#039; can be enabled to let the the parallel remote packet analysis use a Packet Ring Buffer on the selected storage device. This Packet Ring Buffer and all its contents will be deleted once the remote packets analysis ends. Selecting this checkbox shows the following additional settings:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Storage device:&#039;&#039;&#039; the storage device on which to create the temporary Packet Ring Buffer&lt;br /&gt;
* &#039;&#039;&#039;Ring buffer size in MB:&#039;&#039;&#039; the size of the temporary Packet Ring Buffer in MB&lt;br /&gt;
&lt;br /&gt;
Once the &#039;&#039;Start parallel remote packets&#039;&#039; button is pressed the user interface can be switched between the parallel remote packets analysis and live analysis just like with the parallel PCAP analysis by selecting the respective replay slot. The processing can be stopped in the &#039;&#039;Parallel remote packets&#039;&#039; tab or on the Top user dashboard when the replay slot is selected.&lt;br /&gt;
&lt;br /&gt;
==  Receive packets from remote capture device ==&lt;br /&gt;
&lt;br /&gt;
=== Example uses ===&lt;br /&gt;
&lt;br /&gt;
The capturing tool can be downloaded from the &#039;&#039;&#039;Remote packets&#039;&#039;&#039; page in the &#039;&#039;&#039;Generic&#039;&#039;&#039; section.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[File:Process traffic capture from remote device.png|600px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The tool allows to capture packets from any or a specific network device, and also to stream a file to the Allegro Network Manager:&lt;br /&gt;
&lt;br /&gt;
* Processing a local pcap file:&lt;br /&gt;
&lt;br /&gt;
 ./ap_capture_to_remote -f trace.pcap allegro-mm-abcd 8001&lt;br /&gt;
&lt;br /&gt;
* Live-capture from eth0:&lt;br /&gt;
&lt;br /&gt;
 sudo ./ap_capture_to_remote -i eth0 allegro-mm-abcd 8001&lt;br /&gt;
    &lt;br /&gt;
or permit access to network interfaces only instead of full root permissions:&lt;br /&gt;
    &lt;br /&gt;
 sudo setcap cap_net_raw=ep ap_capture_to_remote&lt;br /&gt;
 ./ap_capture_to_remote -i eth0 allegro-mm-abcd 8001&lt;br /&gt;
&lt;br /&gt;
* Live-capture from all network devices:&lt;br /&gt;
 sudo ./ap_capture_to_remote allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
In all examples, host and port number must be set according to the actual Allegro Network Multimeter device and the configured port number.&lt;br /&gt;
&lt;br /&gt;
To see all available options, execute the program with the argument &amp;quot;-h&amp;quot;&lt;br /&gt;
 ./ap_capture_to_remote -h&lt;br /&gt;
&lt;br /&gt;
=== Additional notes ===&lt;br /&gt;
&lt;br /&gt;
* The tool automatically applies a filter to not capture the connection to the remote Allegro Network Multimeter to avoid running a loop when the remote connection is visible on the captured interface. That means no additional actions need to be made to skip the remote capture connection.&lt;br /&gt;
* Not all interface types are supported for capturing. The interface must provide either Ethernet frames or WiFi frames.&lt;br /&gt;
&lt;br /&gt;
===Alternative tools===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter also accepts plain pcap files on the configured port. &lt;br /&gt;
That means it is possible to stream files to the device or use tcpdump with additional filters.&lt;br /&gt;
&lt;br /&gt;
Example uses are:&lt;br /&gt;
&lt;br /&gt;
*Processing a local pcap file:&lt;br /&gt;
&lt;br /&gt;
 cat trace.pcap | netcat allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
*Live-capture via tcpdump:&lt;br /&gt;
 &lt;br /&gt;
 sudo tcpdump -i eth0 -s 0 -U -w /dev/stdout | netcat allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
==Remote capture via ERSPAN==&lt;br /&gt;
&lt;br /&gt;
The capturing tool also supports sending the packets as ERSPAN-wrapped packets. In this mode, the remote capture feature must be &#039;&#039;&#039;disabled&#039;&#039;&#039; and instead the regular live mode is used with an endpoint mode enabled interface.&lt;br /&gt;
&lt;br /&gt;
This mode is used with the `-e` flag (which needs an ERSPAN session ID as a parameter). If this mode is used, the port doesn&#039;t need to be specified anymore.&lt;br /&gt;
 sudo ./ap_capture_to_remote -e 123 1.2.3.4&lt;br /&gt;
In this mode, the [[ERSPAN Installation|endpopint mode for ERSPAN]] must be enabled and configured for the same IP as used in the ap_capture_to_remote command line argument.&lt;br /&gt;
&lt;br /&gt;
Note that the IP address used is NOT the address or name of the management, but the separate IP address that is only valid on the interface for which the endpoint mode is configured.&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=FAQ&amp;diff=5145</id>
		<title>FAQ</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=FAQ&amp;diff=5145"/>
		<updated>2025-07-07T10:47:45Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Setup == &lt;br /&gt;
==== What is the difference between the Monitor interfaces and the Management interfaces? ==== &lt;br /&gt;
&lt;br /&gt;
The Monitor interfaces are used to passively analyze traffic and cannot be used for management functions such as accessing&lt;br /&gt;
the user interface. These interfaces do not generate any traffic apart from forwarding traffic received on the adjacent&lt;br /&gt;
interface if configured to Bridge mode.&lt;br /&gt;
The Management interface on the other hand, is dedicated for management functions like accessing the user interface,&lt;br /&gt;
downloading and uploading pcaps, streaming captured data to the device for analysis and so on. The Management&lt;br /&gt;
interface actively participates in the network it is connected to.&lt;br /&gt;
&lt;br /&gt;
==== How can I monitor the traffic of a single computer? ====&lt;br /&gt;
&lt;br /&gt;
The easiest way of monitoring and analyzing the traffic of a single device like a computer is to configure the&lt;br /&gt;
Allegro Network Multimeter in Bridge mode. The device to be monitored is connected to one interface of a bridged pair&lt;br /&gt;
of interfaces on the Allegro Network Multimeter. The other interface of the bridged pair is connected to the&lt;br /&gt;
network to which the device would normally be directly connected.&lt;br /&gt;
&lt;br /&gt;
In a setup like this, the Allegro Network Multimeter transparently forwards traffic between the device and the&lt;br /&gt;
network while providing full insight into the traffic between the device and the network.&lt;br /&gt;
&lt;br /&gt;
==== What is the difference between Bridge mode and Sink mode? ====&lt;br /&gt;
&lt;br /&gt;
If the Allegro Network Multimeter is configured to Sink mode, all Monitor interfaces act in a similar way in that they &lt;br /&gt;
receive traffic which is then analyzed by the appliance but not forwarded. The appliance acts as a traffic&lt;br /&gt;
sink, as it receives packets, analyzes them and discards them. This mode is ideally suited for situations&lt;br /&gt;
where traffic is already a copy; for example, on a Mirror Port of a Switch or on a network traffic Tap.&lt;br /&gt;
&lt;br /&gt;
If configured in Bridge mode, the Allegro Network Multimeter transparently forwards all traffic between adjacent Monitor&lt;br /&gt;
interfaces while simultaneously analyzing the forwarded traffic. The appliance acts as a network Bridge and can &lt;br /&gt;
be connected between two network devices which would normally be connected directly to each other. This mode&lt;br /&gt;
is suited for inserting the Allegro Network Multimeter directly into a point of the network without the need of a separate network&lt;br /&gt;
Tap or other means of providing a copy of the network traffic.&lt;br /&gt;
&lt;br /&gt;
==== I have used the LAN Management interface but I do not know the leased IP. How can I get the assigned IP address? ====&lt;br /&gt;
&lt;br /&gt;
===== DHCP server =====&lt;br /&gt;
&lt;br /&gt;
If the selected DHCP server provides some kind of log output or an overview of devices for which IP address leases have&lt;br /&gt;
been granted, it might help to search for a device with a hostname that starts with &#039;&#039;&#039;allegro-mm-&#039;&#039;&#039; followed by a four&lt;br /&gt;
digit hexadecimal number. The Allegro Network Multimeter announces itself with this hostname when it requests a&lt;br /&gt;
DHCP lease and should be traceable in the DHCP server info.&lt;br /&gt;
&lt;br /&gt;
===== WI-FI =====&lt;br /&gt;
&lt;br /&gt;
Every Allegro Network Multimeter comes with an USB to Wi-Fi adapter. In the factory default configuration the adapter will&lt;br /&gt;
create a wi-Fi Access Point when connected to the appliance. This Access Point shows up as &#039;&#039;&#039;allegro-mm-xxxx&#039;&#039;&#039; where the&lt;br /&gt;
&#039;&#039;&#039;xxxx&#039;&#039;&#039; part consists of a hexadecimal number which is unique to the device. In factory default settings the password&lt;br /&gt;
for the Wi-Fi network is &#039;&#039;&#039;Allegro-MM&#039;&#039;&#039; (without the quotes). As soon as there is a connection to Wi-Fi, the user&lt;br /&gt;
interface of the device can be accessed by either browsing to https://allegro or https://192.168.4.1.&lt;br /&gt;
When access to the user interface is established, the IP address of the LAN Management interface can be found under&lt;br /&gt;
&#039;&#039;&#039;Settings&#039;&#039;&#039; -&amp;gt; &#039;&#039;&#039;Management interface settings&#039;&#039;&#039; in the &#039;&#039;&#039;Active interfaces&#039;&#039;&#039; section.&lt;br /&gt;
&lt;br /&gt;
===== Display =====&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter 200 comes with a HDMI connector and&lt;br /&gt;
the 1000 and 3000 series come with a VGA connector.  When a compatible&lt;br /&gt;
display is connected, the console displays information about the running&lt;br /&gt;
Firmware version along with information on the configured&lt;br /&gt;
management network IP addresses. On the 200 model the&lt;br /&gt;
display must be connected before starting the appliance to obtain the output.&lt;br /&gt;
&lt;br /&gt;
===== KVM =====&lt;br /&gt;
&lt;br /&gt;
The video output of the device displaying the management IP addresses can be viewed over the network using the [[IPMI KVM on Allegro series 1000+|KVM/IPMI management module of the 1000 or 3000 series]]. Please see the FAQ entry &#039;&#039;&#039;What can I do with the integrated KVM port?&#039;&#039;&#039; on how to get started.&lt;br /&gt;
&lt;br /&gt;
==== What can I do with the integrated KVM port? ====&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter 1000 and 3000 series devices contain a KVM/IPMI management module from Supermicro by&lt;br /&gt;
which several hardware management functions like powering the device on and off, system health messages and much&lt;br /&gt;
more can be accessed. It is also possible to view the video output of the device over the network from which the&lt;br /&gt;
current active management IP addresses can be retrieved.&lt;br /&gt;
&lt;br /&gt;
By default the KVM/IPMI management module will obtain an IP address through DHCP and the default user name as well&lt;br /&gt;
as default password is &#039;&#039;&#039;ADMIN&#039;&#039;&#039; (without the quotes).&lt;br /&gt;
&lt;br /&gt;
See [[IPMI KVM on Allegro series 1000+]] for additional information.&lt;br /&gt;
&lt;br /&gt;
==== I do not have a Wi-Fi client and I do not have a DHCP server. How can I access the Allegro Network Multimeter? ==== &lt;br /&gt;
&lt;br /&gt;
It is possible to make the Allegro Network Multimeter set a temporary static address on the LAN management interface.&lt;br /&gt;
It will return to the configured behavior for the LAN management interface following the next restart.&lt;br /&gt;
&lt;br /&gt;
To enable the temporary static IP address, a USB keyboard is needed. When the keyboard is attached to one of the USB&lt;br /&gt;
ports of the Allegro Network Multimeter, start the device. Wait for two minutes to make sure that the device is fully operational.&lt;br /&gt;
Then press and hold the &#039;&#039;&#039;shift&#039;&#039;&#039; key while pressing the &#039;&#039;&#039;s&#039;&#039;&#039; key. After this procedure the device will be configured to&lt;br /&gt;
use the IP address &#039;&#039;&#039;192.168.0.1&#039;&#039;&#039; on the LAN management interface. It is now possible to e.g. connect another&lt;br /&gt;
computer to the LAN management interface with an IP address statically configured to e.g. &#039;&#039;&#039;192.168.0.100&#039;&#039;&#039; and from&lt;br /&gt;
that computer the user interface of the Allegro Network Multimeter is accessible at https://192.168.0.1.&lt;br /&gt;
If for some reason the IP address &#039;&#039;&#039;192.168.0.1&#039;&#039;&#039; is already used in the network, the Allegro Network Multimeter will try to&lt;br /&gt;
set another IP address in the range of &#039;&#039;&#039;192.168.0.2&#039;&#039;&#039; - &#039;&#039;&#039;192.168.0.10&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Once access to the user interface is established, a static IP address can be configured under &#039;&#039;&#039;Settings&#039;&#039;&#039; -&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Management interface settings&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==  Data protection ==&lt;br /&gt;
&lt;br /&gt;
==== What kind of user data is stored on the Allegro Network Multimeter ====&lt;br /&gt;
&lt;br /&gt;
All metadata and statistics are stored in the device&#039;s main memory and are deleted as soon as the device is rebooted,&lt;br /&gt;
powered off, or packet processing is restarted. Any user data that can be derived from these statistics is therefore&lt;br /&gt;
only stored for the duration of continuous operation. If, however, reports are generated and stored on the device, these&lt;br /&gt;
reports exist until manually deleted or until a device configuration reset is performed.&lt;br /&gt;
&lt;br /&gt;
Raw packet data in the packet ring buffer or in stored pcap capture files will persist on the internal or external&lt;br /&gt;
storage until overwritten or deleted. If it is important that captured or deleted data must not be retrieved by someone&lt;br /&gt;
with physical access to the storage devices, it is possible to format the storage device with industry-standard full&lt;br /&gt;
disk encryption.&lt;br /&gt;
&lt;br /&gt;
==== How can I reset the Allegro Network Multimeter to a default configuration? ====&lt;br /&gt;
&lt;br /&gt;
There are two ways to reset the configuration of the appliance.&lt;br /&gt;
&lt;br /&gt;
The first option is to use the &#039;&#039;&#039;Reset System Configuration&#039;&#039;&#039; button which can be found under &#039;&#039;&#039;Settings&#039;&#039;&#039; -&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Administration&#039;&#039;&#039; in the user interface. After confirmation, this will trigger a restart of the system and afterward the&lt;br /&gt;
appliance will revert to the factory default settings.&lt;br /&gt;
&lt;br /&gt;
If, for some reason, the user interface is not accessible, a configuration reset can be performed by attaching&lt;br /&gt;
a USB keyboard and a HDMI/VGA display to the appliance. When booting the device, there is a short period when a GNU GRUB&lt;br /&gt;
menu is displayed. The arrow up and arrow down keys can be used to select an entry and the selected entry can be chosen&lt;br /&gt;
by pressing the &#039;&#039;&#039;enter&#039;&#039;&#039; key. Below the default &#039;&#039;&#039;multimeter&#039;&#039;&#039; entry, there is a &#039;&#039;&#039;configuration-reset&#039;&#039;&#039; option which will&lt;br /&gt;
perform a reset to default configuration and then reboot the appliance.&lt;br /&gt;
&lt;br /&gt;
Keep in mind that a reset to the default configuration does not delete any&lt;br /&gt;
packet ring buffer data or captured files from internal or external&lt;br /&gt;
storage.&lt;br /&gt;
&lt;br /&gt;
== System behavior ==&lt;br /&gt;
&lt;br /&gt;
==== Where does the Allegro Network Multimeter display L1 issues like bad CRC frames? ====&lt;br /&gt;
&lt;br /&gt;
Issues like these are accounted for the Monitoring interface on which the issue was encountered and the respective&lt;br /&gt;
statistics are available on the &#039;&#039;&#039;Interface stats&#039;&#039;&#039; page in the &#039;&#039;&#039;Errors&#039;&#039;&#039; column. For an explanation of the error&lt;br /&gt;
counters, refer to the [[Interface_statistics|Interface statistics]] manual page.&lt;br /&gt;
&lt;br /&gt;
==== What happens in the case of a system overload? ====&lt;br /&gt;
&lt;br /&gt;
In the case of a system overload, a prominent warning is displayed at the top of the user interface for a few seconds&lt;br /&gt;
and this warning and the time when the error occurred can be reviewed on the &#039;&#039;&#039;Info&#039;&#039;&#039; -&amp;gt; &#039;&#039;&#039;Status&#039;&#039;&#039; page. As long as there are&lt;br /&gt;
still notifications on the &#039;&#039;&#039;Info&#039;&#039;&#039; -&amp;gt; &#039;&#039;&#039;Status&#039;&#039;&#039; page, this is indicated by colored icons at the top of the user interface.&lt;br /&gt;
&lt;br /&gt;
If a system overload occurs and not all packets can be analyzed, these packets are accounted at the Monitoring&lt;br /&gt;
interface on which they were received. The counter can be found on the &#039;&#039;&#039;Interface stats&#039;&#039;&#039; page in the &#039;&#039;&#039;Errors&#039;&#039;&#039; column&lt;br /&gt;
under the &#039;&#039;&#039;Not processed&#039;&#039;&#039; section and titled &#039;&#039;&#039;due to overload&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
When the Allegro Network Multimeter is operating in Bridge mode and packets cannot be processed due to a system&lt;br /&gt;
overload, a software bypass will ensure that these packets are still forwarded to the adjacent Monitoring interface.&lt;br /&gt;
&lt;br /&gt;
==== What happens if the maximum number of stored connections has been reached? ====&lt;br /&gt;
&lt;br /&gt;
In this case, the Allegro Network Multimeter will start freeing up memory by removing historic statistical data which&lt;br /&gt;
lies before a certain point in time. This cut-off time is constantly adjusted to provide the best possible use of the&lt;br /&gt;
available memory. For how far back-in-time historical statistics are currently available, can be reviewed on the&lt;br /&gt;
&#039;&#039;&#039;Info&#039;&#039;&#039; -&amp;gt; &#039;&#039;&#039;System Info&#039;&#039;&#039; page.&lt;br /&gt;
&lt;br /&gt;
==== I can only see the traffic of the last day. How can I increase this period? ====&lt;br /&gt;
&lt;br /&gt;
If the system does not provide a sufficient look back-in-time with the given traffic, it may help to deactivate certain&lt;br /&gt;
features that provide very detailed information but also consume a large amount of memory. Features that typically&lt;br /&gt;
fit into this category are different settings of the &#039;&#039;&#039;IP statistics&#039;&#039;&#039;. These settings can be accessed by navigating to&lt;br /&gt;
&#039;&#039;&#039;IP&#039;&#039;&#039; -&amp;gt; &#039;&#039;&#039;IP Statistics&#039;&#039;&#039; and clicking the &#039;&#039;&#039;Settings&#039;&#039;&#039; button at the top of the page. Especially turning off the &#039;&#039;&#039;Store connection information for every IP&#039;&#039;&#039; and &#039;&#039;&#039;Store traffic history graph for IP peers&#039;&#039;&#039; settings can help saving&lt;br /&gt;
a lot of memory.&lt;br /&gt;
&lt;br /&gt;
==== What happens to the data after shutdown, reboot, or restart processing? ====&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter uses an In-Memory database to store the&lt;br /&gt;
metadata of the packets it processes. This metadata will be lost when the&lt;br /&gt;
processing is stopped (shutdown, reboot, restart processing). This metadata&lt;br /&gt;
is also lost in case of an unexpected power loss.&lt;br /&gt;
&lt;br /&gt;
When using a packet ring buffer (see  [[Storage|storage]]), the packets will be&lt;br /&gt;
stored on the attached hard disk drive. This data is not lost after the&lt;br /&gt;
processing is stopped. It is possible to reanalyze the packet ring buffer, but&lt;br /&gt;
this will interrupt the &#039;&#039;&#039;live&#039;&#039;&#039; mode, so no new packets will be processed when this is in operation.&lt;br /&gt;
&lt;br /&gt;
==== Why am I not seeing (expected) statistics or graphs in the web-interface? ====&lt;br /&gt;
There are several reasons why, the Allegro Network Multimeter may not show you the traffic that you are expecting. Here we will go into each and everyone of them.&lt;br /&gt;
&lt;br /&gt;
First and foremost, always start out by verifying that (the expected amount of) network traffic is actually received by the Allegro Network Multimeter. This is done via the left menu, under &amp;quot;Interface stats&amp;quot;. Another more global way for checking this, is via the Top Users dashboard, where the top graph &amp;quot;active interface overview&amp;quot; should display network traffic. If this is not the case, please (re)check all of the physical connections and span, tap, or endpoint-mode configurations in relation to the measurement/monitoring setup. &lt;br /&gt;
&lt;br /&gt;
In a working setup, verifiable as described above, the &amp;quot;active interface overview&amp;quot; graph on the Top Users screen should display traffic. Here are several reasons why, the Allegro Network Multimeter may still not show you the traffic that you are expecting: &lt;br /&gt;
&lt;br /&gt;
* Span/Mirror misconfiguration — When hooking up span/mirror port to your Allegro Network Multimeter, make sure that the traffic you want to see is actually incorporated in the configured span/mirror port.&lt;br /&gt;
* Virtual Link Group — If you have configured any virtual Link Groups, make sure that you are looking at the correct Link Group. I.e. the &amp;quot;local - default&amp;quot; Link Group will not plot any statistics, if all of the network traffic matches one ore more configured Link Group(s).&lt;br /&gt;
* Limited analysis — The &amp;quot;Detail of Traffic Analysis&amp;quot; (settings &amp;gt; global settings &amp;gt; middle of the page) may have been lowered. Factory default, this is set to &amp;quot;unlimited&amp;quot;.&lt;br /&gt;
* Ingress filtering — Active ingress filtering (settings &amp;gt; ingress filter) will prevent partial or all network traffic from being analyzed by the Allegro Network Multimeter.   A notification, indicating active filters, will show up in the top bar on the right.&lt;br /&gt;
&lt;br /&gt;
[[File:Active Filter(s) Notification.png|550x550px]]&lt;br /&gt;
&lt;br /&gt;
Important note: Filters do NOT have an effect on network Live traffic, which will be forwarded uninterrupted and fully transparently. &lt;br /&gt;
&lt;br /&gt;
== Allegro Network Multimeter hardware ==&lt;br /&gt;
&lt;br /&gt;
==== What types of SFP modules are supported? ====&lt;br /&gt;
&lt;br /&gt;
See [[List_of_Supported_Transceiver_Modules|List of supported transceiver modules]] for details.&lt;br /&gt;
&lt;br /&gt;
==  Bypass ==&lt;br /&gt;
&lt;br /&gt;
==== What bypass options are available? ====&lt;br /&gt;
&lt;br /&gt;
Two bypass options are available:&lt;br /&gt;
&lt;br /&gt;
* a quad-port RJ45 1Gbps copper option supporting 1000BaseT and 100BaseT speeds. Each pair of interfaces makes up a bridged link with bypass.&lt;br /&gt;
* a dual-port 10Gbps fiber option with built in SR transceivers and LC connectors. The two interfaces make up a bridged link with bypass.&lt;br /&gt;
&lt;br /&gt;
==== How does the bypass work? ====&lt;br /&gt;
&lt;br /&gt;
If the Allegro Network Multimeter contains a bypass option, it is only active when the device is configured to operate&lt;br /&gt;
in Bridge mode. The bypass activates when the device is powered off, when the device is starting but is not yet&lt;br /&gt;
processing traffic or when an unexpected failure like a crash or a power loss occurs. If the bypass is active, the&lt;br /&gt;
two interfaces that make up a bypass link will be physically connected to each other so that devices connected on&lt;br /&gt;
either side will always find a working link.&lt;br /&gt;
&lt;br /&gt;
If the device is operating in Sink mode, the bypass interfaces will act just like all the other interfaces on the device&lt;br /&gt;
and the bypass will never be activated.&lt;br /&gt;
&lt;br /&gt;
==  User interface ==&lt;br /&gt;
&lt;br /&gt;
==== What does the question mark on packets/bytes counters mean? ====&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter stores historical traffic data in different time resolutions depending on the age of the data.&lt;br /&gt;
&lt;br /&gt;
When zooming into a specific time window, packet and byte counters are shown for this specific time interval only. Since the time resolution available internally might be coarser than the selected zoom level, the shown packet and byte values might not exactly represent the time interval.&lt;br /&gt;
&lt;br /&gt;
If this is the case, the actual interval time is shown in square brackets (for example [120s]). This means that the value represents the time in seconds between the first and last data point used to calculate the displayed value.&lt;br /&gt;
&lt;br /&gt;
This value is shown to avoid confusion about unexpected values due to interactive graph zooming.&lt;br /&gt;
&lt;br /&gt;
==== How can I print statistics? ====&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter web interface can be printed by using&lt;br /&gt;
the built-in printing support of your browser. Navigate to the desired&lt;br /&gt;
statistics and click on the printing button (Ctrl+P in most browsers). The pages&lt;br /&gt;
are optimized for printing. Tabs, pcap and navigation buttons are hidden in&lt;br /&gt;
print mode.&lt;br /&gt;
&lt;br /&gt;
If the browser is truncating the page in print preview, you can try the&lt;br /&gt;
&#039;&#039;&#039;Shrink to fit&#039;&#039;&#039; option (Firefox) or use a smaller scaling than 100% (Chrome).&lt;br /&gt;
You can also use another page orientation and change between &#039;&#039;&#039;landscape&#039;&#039;&#039; or &#039;&#039;&#039;portrait&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
==  Packet ring buffer ==&lt;br /&gt;
&lt;br /&gt;
==== Which time stamps are used during packet ring buffer replay? ==== &lt;br /&gt;
&lt;br /&gt;
Packet ring buffer replay will use the original time stamps of the packets as they were captured. Therefore the replay&lt;br /&gt;
recreates the original sequence and timing of packets in the displayed statistics.&lt;br /&gt;
&lt;br /&gt;
==  Capturing ==&lt;br /&gt;
&lt;br /&gt;
==== How many captures can be used in parallel? ====&lt;br /&gt;
&lt;br /&gt;
Per default out-of-box setting (factory default), all Allegro Network Multimeter models allow up to 4 parallel captures. The number of allowed parallel captures, can be increased up to 64, depending on model and available RAM. Note, that Increasing the number of allowed parallel captures will decrease memory capacity for the in-memory DB, therewith decrease the maximum timeframe of statistics held and presented in the web-interface. If the memory&lt;br /&gt;
usage is too high, the number of parallel captures might be lower/limited by the Allegro Network Multimeter  itself.&lt;br /&gt;
&lt;br /&gt;
To change the number of allowed parallel captures, go to &amp;quot;Generic -&amp;gt; Capture traffic -&amp;gt; settings&amp;quot; or go to &amp;quot;Settings -&amp;gt; Module settings -&amp;gt; Caption: Capture traffic&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==  Protocols ==&lt;br /&gt;
&lt;br /&gt;
==== What protocols are recognized by the Allegro Network Multimeter ====&lt;br /&gt;
&lt;br /&gt;
As an advanced packet-based network analysis and (performance) troubleshooting solution, Allegro Packets is capable of recognizing a long list of protocols to be found in various Ethernet-based network types. Apart from the actual recognition, Allegro Network Multimeter also features extensive individual decoding and graphical representation for quite a lot of commonly seen communication protocols such as TCP, SSL, SIP, RTP, DNS, DHCP, IEC 60870-5-104, PROFINET and many more.&lt;br /&gt;
A full list of protocols supported and recognized by the Allegro Network Multimeter can be found on the page -&amp;gt; [[Supported protocols]]&lt;br /&gt;
&lt;br /&gt;
== TLS certificates ==&lt;br /&gt;
&lt;br /&gt;
=== I get the message &amp;quot;Your TLS Certificate is about to expire soon. Please renew your certificate.&amp;quot;, how can I renew it? ===&lt;br /&gt;
By default, the Allegro Network Multimeter uses a self-signed certificate that expires after 10 years. 2 weeks before expiration, this dialog appears to inform the user.&lt;br /&gt;
&lt;br /&gt;
How to solve the issue:&lt;br /&gt;
&lt;br /&gt;
# To create a new self-signed certificate, go to Settings -&amp;gt; [[Administration#TLS/SSL certificate|Administration]] and the TLS certificate section. Click on &amp;quot;Reset TLS certificate configuration&amp;quot; to delete the old, expiring certificate and a new certificate is created automatically.&lt;br /&gt;
# Reload the browser window, accept the new certificate to finalize the step.&lt;br /&gt;
&lt;br /&gt;
For higher security, CA signed certificate can be uploaded manually or via ACME.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Incidents&amp;diff=5144</id>
		<title>Incidents</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Incidents&amp;diff=5144"/>
		<updated>2025-07-04T11:16:27Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[[File:Incidents_list.png|alt=|none|thumb|800x800px|Incident page]]&lt;br /&gt;
Incidents are used to alarm the user when configured network events occur, usually for traffic based rules, but also for system-specific events. These notifications can be viewed in the web GUI and may also be delivered on various notification channels. Repeating incidents are counted as such and the time of the first and last occurrence of an incident is remembered. This feature can be disabled for some incidents. What makes an incident unique depends on the type of incident. &lt;br /&gt;
&lt;br /&gt;
The incident feature allows to define rules which are checked on the configured trigger point, like when a connection ends, a SIP call ends, or for checks on ongoing traffic. When such a trigger hits, configurable traffic attributes will be checked and if all attributes of a rule match, an incident is created.&lt;br /&gt;
&lt;br /&gt;
Occurred incidents can be seen in the web interface, additionally reporting via the following notification channels is possible:&lt;br /&gt;
* email&lt;br /&gt;
* Apache Kafka&lt;br /&gt;
* SNMP trap&lt;br /&gt;
* syslog&lt;br /&gt;
&lt;br /&gt;
The first occurrence of a medium or high severity incident will also trigger a status notification which is visible at the top right of the web GUI.&lt;br /&gt;
&lt;br /&gt;
A configurable number of incidents will be remembered by the system and if the limit is exceeded the oldest incidents will be discarded [fixed number of 1000 incidents in firmware &amp;lt; 4.1].&lt;br /&gt;
&lt;br /&gt;
== Rule configuration ==&lt;br /&gt;
[[File:Incidents rules.png|thumb|600x600px|Rule configuration]]&lt;br /&gt;
Incident rules can be defined in the Incident rules&amp;quot; tab in the menu &amp;quot;Generic -&amp;gt; Incidents&amp;quot;. All changes to the rule configuration will only take effect after saving the current configuration by clicking on the save button at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
The page shows a table containing the existing rules and their configuration.&lt;br /&gt;
&lt;br /&gt;
Each existing rule can be modified by clicking on the pencil symbol, or deleted by clicking on the &amp;quot;minus&amp;quot; symbol.&lt;br /&gt;
&lt;br /&gt;
New rules can be added by clicking on the &amp;quot;Add rule&amp;quot; button. A dialog appears allowing for configuration of the rule. The same dialog is used when modifying an existing rule.&lt;br /&gt;
&lt;br /&gt;
=== Add/modify a rule ===&lt;br /&gt;
[[File:Incidents add rule.png|thumb|600x600px|Add rule dialog]]&lt;br /&gt;
A rule is defined by the following settings:&lt;br /&gt;
&lt;br /&gt;
* Rule name: This is an arbitrary text describing the purpose of the rule. This text is shown in the incident list and email/Kafka/SNMP trap/syslog ouptut.&lt;br /&gt;
* Severity: three different severity values &amp;quot;low&amp;quot;, &amp;quot;medium&amp;quot;, and &amp;quot;high&amp;quot; can be used to group more important and less important incidents. Reporting channels can be configured to only report incidents of a minimum severity level.  A rule can also be disabled by choosing the severity level &amp;quot;disabled&amp;quot;. It will not be evaluated and can be enabled later at will.&lt;br /&gt;
* Trigger: The trigger defines when a rule is evaluated. For each available trigger, a description is shown next to it giving more details about the trigger.  Some triggers are evaluated at a very specific time, like when a VoIP call ends, or are evaluated regularly like for throughput triggers of IP traffic which can be configured to be checked periodically.  See list below for a detailed description of the available triggers.&lt;br /&gt;
* Attributes: Attributes are used to make actual comparison of expected values vs. actual values.&lt;br /&gt;
** Each trigger has a different set of attributes which can be checked for, and some triggers don&#039;t need to have an attribute at all.  See list below for a detailed description of the available attributes&lt;br /&gt;
** Up to four attributes can be added by clicking on the &amp;quot;Add attribute&amp;quot; button.&lt;br /&gt;
** Multiple attributes must all match at the same time to let the rule create an incident.&lt;br /&gt;
** Each attribute can be compared to a specific value, so that the actual value is lower, equal, or greater than a defined value.&lt;br /&gt;
** Some attributes have an additional parameter, like a time span which defines how the attribute value is calculated.&lt;br /&gt;
* Virtual link group: The rule can be limited to a selected [[Virtual Link Group functionality|virtual link group]] or to be applied for any group.  Some triggers cannot be limited to a virtual link group so the configuration will be hidden.&lt;br /&gt;
* IP filter: Depending on the selected trigger, the rule can be limited to a specific IP address. The IP filter can also be an IP subnet in the format IP/mask-length (Example: 10.0.0.0/8)&lt;br /&gt;
* IP group: Depending on the selected trigger, the rule can be applied to an IP group instead of an individual IP address.&lt;br /&gt;
* Virtual link group, IP and IP filter can also be used inversely by using the != comparator&lt;br /&gt;
* Report channel: Incidents are always visible in the web interface, but can also be reported via multiple channels which can be configured separately in the tab &amp;quot;Notification channels&amp;quot;.  Up to ten channels can be selected so that the incident for this rule is reported on each channel.  Also, no channel can be configured so the incident is only accessible on the web interface.&lt;br /&gt;
* Aggregation of recurring Incidents: Incidents are aggregated by default. This means the table only shows the number of incidents of the type and the timestamps of the first and the last  incident. This can be disabled for most of the incidents, so that you are able to see every indent of the incident-type.&lt;br /&gt;
* Time Profiles: You are able to set a profile which defines the active time of an incident rule.&lt;br /&gt;
* Traffic capturing: If supported by the trigger, the rule can be configured to capture the network traffic triggering the rule, including some extra time before and after the incident.&lt;br /&gt;
** Possible options:&lt;br /&gt;
*** Disabled: capturing is disabled for this rule&lt;br /&gt;
*** Live traffic: capturing happens only for live network traffic&lt;br /&gt;
*** Replay traffic: capturing happens only for replayed network traffic (from PCAP files)&lt;br /&gt;
*** Always: capturing happens in all traffic processing types.&lt;br /&gt;
** Extra capture time: configure the number of seconds before the start of the incident and after the end of the incident.&lt;br /&gt;
*** If a time span parameter is used for attributes, the capture time includes this time duration as well.&lt;br /&gt;
** The traffic is automatically filtered to only contain the traffic that actually triggered the rule, i.e., an IP address or an IP group for IP rules.&lt;br /&gt;
* Trigger cooldown: Depending on the selected trigger, once the incident was activated and finished, the trigger will wait for this cooldown period before the next incident may be triggered again. Each rule will have a seperate cooldown timer. The cooldown period may be configured in seconds.&lt;br /&gt;
&lt;br /&gt;
=== Available triggers ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Trigger name&lt;br /&gt;
!Description&lt;br /&gt;
!Attributes&lt;br /&gt;
!Attribute usage&lt;br /&gt;
|-&lt;br /&gt;
|ARP: MAC change for an IP&amp;lt;br&amp;gt;&lt;br /&gt;
(arp_ip_mac_changed)&lt;br /&gt;
|This trigger is checked on an ARP response and MAC address changed for a requested IP.&lt;br /&gt;
|time_since_last_mac&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|DNS: Server is not responding&amp;lt;br&amp;gt;&lt;br /&gt;
(dns_server_not_responding)&lt;br /&gt;
|This trigger is checked when a DNS server is not responding for some time. A server is considered unresponsive when more than 3 requests to the DNS server went unanswered for a period of more than 5 seconds. Such a server must have answered at least two requests previously.&lt;br /&gt;
|time_since_first_unanswered_request&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|DNS: Server response error&amp;lt;br&amp;gt;&lt;br /&gt;
(dns_server_response_error)&lt;br /&gt;
|This trigger is checked when a DNS server responds a configured error of type format error, server failure or non-existing domain&lt;br /&gt;
|error_type&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Connection start&amp;lt;br&amp;gt;&lt;br /&gt;
(global_new_connection)&lt;br /&gt;
|This trigger is checked continuously at connection start. It can be used to report new connections with a certain layer 4 protocol and a given port range.&lt;br /&gt;
|l4_protocol, port_range, since_start_time&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: GPS synchronization status change&amp;lt;br&amp;gt;&lt;br /&gt;
(global_gps_sync_status_change)&lt;br /&gt;
|This trigger is checked when the GPS clock synchronization status changes.&lt;br /&gt;
|gps_sync_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Number of connections&amp;lt;br&amp;gt;&lt;br /&gt;
(global_connections)&lt;br /&gt;
|This trigger is checked continuously whether the amount of newly created connections exceeds a threshold. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|new_connections&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Regular expressions&amp;lt;br&amp;gt;&lt;br /&gt;
(global_regex_match)&lt;br /&gt;
|This trigger allows to configure a list of regular expressions and is checked for each packet whose L7 data matches one of the regular expressions in the list. Since there are no attributes associated with this trigger, this effectively means that any packet which matches one of the regular expressions will result in an incident. The incident also contains information about which connection this packet belongs to as well as which of the regular expressions matches the packet.&lt;br /&gt;
The expressions are  [[wikipedia:Perl_Compatible_Regular_Expressions|Perl Compatible Regular Expressions (PCRE)]]&lt;br /&gt;
|&lt;br /&gt;
|no attributes are available for this trigger&lt;br /&gt;
|-&lt;br /&gt;
|Global: Ring buffer&amp;lt;br&amp;gt;&lt;br /&gt;
(global_ring_buffer)&lt;br /&gt;
|This trigger is checked continuously to report changes in the ring buffer.&lt;br /&gt;
|used_size, bytes_captured, bytes_dropped&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Global: Speed change of an interface&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_speed_change)&lt;br /&gt;
|This trigger is checked when the speed of an interfaces changes.&lt;br /&gt;
|interface_speed&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Speed mismatch for an interface pair&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_speed_mismatch)&lt;br /&gt;
|This trigger is checked when the status or speed of an interfaces changes and mismatches the speed of corresponding interface of a link.&lt;br /&gt;
|link_speed_difference&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Status change of an interface&amp;lt;br&amp;gt;&lt;br /&gt;
(global_interface_status_change)&lt;br /&gt;
|This trigger is checked when the status of an interfaces changes.&lt;br /&gt;
|interface_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|Global: Traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(global_traffic)&lt;br /&gt;
|This trigger is checked continuously for the total traffic of the device. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput, throughput_increase, packet_rate, packet_rate_increase&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IEC 61850 - GOOSE: State number change&amp;lt;br&amp;gt;&lt;br /&gt;
(iec61850_goose_state_change)&lt;br /&gt;
|This trigger is checked when a change in the state number of GOOSE packets is detected.&lt;br /&gt;
|GoCBRef&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IEC104: Response times&amp;lt;br&amp;gt;&lt;br /&gt;
(iec104_response_times)&lt;br /&gt;
|This trigger is checked whenever an IEC104 ACTCON reply for an ACT has been seen.&lt;br /&gt;
|response_time&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IEC104: Traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(iec104_traffic)&lt;br /&gt;
|This trigger is checked continuously for each IEC104 connection. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|percent_loss, absolute_loss, not_in_order&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Connection end&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_flow_end)&lt;br /&gt;
|This trigger checks the attributes whenever an IP flow ended.&lt;br /&gt;
|total_packets, total_bytes, tcp_handshake_time, percent_retransmissions, zero_window_packets, duration, l7_protocol, l4_port, l4_client_port, l4_server_port&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Connection start&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_flow_start)&lt;br /&gt;
|This trigger checks the attributes whenever an IP flow starts.&lt;br /&gt;
|new_connections, geolocation&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Local IP with multiple MAC addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_local_ip_multiple_macs)&lt;br /&gt;
|This trigger is checked on each new flow of a local IP address and more than one MAC address uses this IP.&lt;br /&gt;
|mac_count&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: New local IP address&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_new_local_ip)&lt;br /&gt;
|This trigger is checked once for each new IP belonging to a private network address range.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: New L7 protocol&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_new_l7_protocol)&lt;br /&gt;
|This trigger is checked once for each new l7 protocol used by an IP.&lt;br /&gt;
|since_start_time, local_ip, l7_protocol&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|IP: TCP handshake&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_tcp_handshake)&lt;br /&gt;
|This trigger is checked after successful TCP handshake or at connection end if handshake failed.&lt;br /&gt;
|handshake_time, server_handshake_time, client_handshake_time, handshake_failed, l4_port, l4_server_port, l4_client_port, l7_protocol&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: Traffic on IP addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active IP or IP group. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput, throughput_increase, packet_rate, packet_rate_increase, total_packets, total_bytes, retransmission_ratio, zero_window_packets, tcp_syn_packets, tcp_fin_packets, tcp_rst_packets&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|IP: TTL change&amp;lt;br&amp;gt;&lt;br /&gt;
(ip_ttl_change)&lt;br /&gt;
|This trigger is checked continuously for each active IP.&lt;br /&gt;
|ttl_change&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|LACP: Status change of a channel&amp;lt;br&amp;gt;&lt;br /&gt;
(lacp_channel_status_change)&lt;br /&gt;
|This trigger is checked when the status of a LACP port channel changes.&lt;br /&gt;
|channel_status&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: New L7 protocol&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_new_l7_protocol)&lt;br /&gt;
|This trigger is checked when a unicast MAC address uses a l7 protocol for the first time.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: New MAC address&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_new_address)&lt;br /&gt;
|This trigger is checked once when a new unicast MAC address appears for the first time.&lt;br /&gt;
|since_start_time&lt;br /&gt;
|optional&lt;br /&gt;
|-&lt;br /&gt;
|MAC: Traffic on MAC addresses&amp;lt;br&amp;gt;&lt;br /&gt;
(mac_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active MAC address. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|broadcast_packet_rate&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|PPPoE: PPPoE Discovery traffic&amp;lt;br&amp;gt;&lt;br /&gt;
(pppoe_discovery_traffic)&lt;br /&gt;
|This trigger is checked continuously for PPPoE discovery traffic. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|pppoe_discovery_packets&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|Profinet: Traffic of Profinet devices&amp;lt;br&amp;gt;&lt;br /&gt;
(profinet_traffic)&lt;br /&gt;
|This trigger is checked continuously for Profinet traffic. For max jitter, the update interval is defined by the timespan parameter of the attributes. All other attributes will be checked upon event.&lt;br /&gt;
|alarms_low, alarms_high, errors, frames_lost, frames_repeated, frames_wrong_sequence, max_jitter&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|PTP: Timestamp packet&amp;lt;br&amp;gt;&lt;br /&gt;
(ptp_timestamp_packet)&lt;br /&gt;
|This trigger is checked when a PTP packet containing a valid timestamp is seen.&lt;br /&gt;
|time_offset&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|QOS: Traffic on QoS classes&amp;lt;br&amp;gt;&lt;br /&gt;
(qos_traffic)&lt;br /&gt;
|This trigger is checked continuously for each active QoS class. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|throughput&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|RTP: Traffic for RTP connections&amp;lt;br&amp;gt;&lt;br /&gt;
(rtp_traffic)&lt;br /&gt;
|This trigger is checked continuously for traffic of each RTP connection. The update interval is defined by the timespan parameter of the attributes.&lt;br /&gt;
|jitter, percent_loss&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|SIP: Call end&amp;lt;br&amp;gt;&lt;br /&gt;
(sip_call_end)&lt;br /&gt;
|This trigger is checked when a SIP call ended.&lt;br /&gt;
|duration, status, mos, percent_loss, jitter, total_packets, total_bytes, total_caller_packets, total_callee_packets, total_caller_bytes, total_callee_bytes&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|SMB: SMB1 negotiation&amp;lt;br&amp;gt;&lt;br /&gt;
(smb_version_negotiation,&lt;br /&gt;
&lt;br /&gt;
prior to 4.3: &amp;lt;s&amp;gt;smb_v1_negotiation&amp;lt;/s&amp;gt;)&lt;br /&gt;
|This trigger is executed at the beginning of each SMB connection and checks whether insecure SMB1 has been negotiated (until firmware 4.3).&lt;br /&gt;
|&lt;br /&gt;
|none&lt;br /&gt;
|-&lt;br /&gt;
|SMB: SMB version negotiation&amp;lt;br&amp;gt;&lt;br /&gt;
(smb_version_negotiation)&lt;br /&gt;
|This trigger is executed at the beginning of each SMB connection and checks for a given SMB version (starting with firmware 4.4).&lt;br /&gt;
|version&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|TLS: first data packet&lt;br /&gt;
(tls_handshake_first_data)&lt;br /&gt;
|This trigger is checked when receiving the first data packet of each TLS connection.&lt;br /&gt;
|tls_first_data_time_ms&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|TLS: Handshake&amp;lt;br&amp;gt;&lt;br /&gt;
(tls_handshake,&lt;br /&gt;
&lt;br /&gt;
prior to 4.4: &amp;lt;s&amp;gt;ssl_handshake&amp;lt;/s&amp;gt;)&lt;br /&gt;
|This trigger is checked during handshake of each TLS connection.&lt;br /&gt;
|certificate_expires, tls_alert_level&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|TLS: TLS Handshake Server Hello&lt;br /&gt;
(tls_handshake_server_hello, &lt;br /&gt;
&lt;br /&gt;
prior to 4.4: &amp;lt;s&amp;gt;tls_version&amp;lt;/s&amp;gt;)&lt;br /&gt;
|This trigger is checked when receiving the Server Hello message of each TLS connection.&lt;br /&gt;
|used_tls_version, tls_handshake_time_ms&lt;br /&gt;
|mandatory&lt;br /&gt;
|-&lt;br /&gt;
|WiFi: Handshake failure&lt;br /&gt;
(wifi_handshake_failure)&lt;br /&gt;
|This trigger is checked during certain parts of a WiFi handshake when a client tries to join a network. &lt;br /&gt;
|handshake_failure_type&lt;br /&gt;
|mandatory&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Special trigger properties ====&lt;br /&gt;
Some triggers are checked continuously every configured time span period, so the incidents are generated differently than for fixed event specific triggers like a call end.&lt;br /&gt;
&lt;br /&gt;
# Repeating incidents:  The following triggers will be evaluated every configured time span and will be re-issued whenever the configured attributes match.&lt;br /&gt;
## ip_traffic&lt;br /&gt;
## mac_traffic&lt;br /&gt;
## qos_traffic&lt;br /&gt;
## rtp_traffic&lt;br /&gt;
# Start/stop incidents:  The following triggers are reported once the configured attributes match and for a second time when the attributes no longer match.&lt;br /&gt;
## global_traffic&lt;br /&gt;
&lt;br /&gt;
So for repeating incidents you will get repeated incidents for the same attribute every time span. For example, if an IP address has traffic of 100 Mbit/s for 2 minutes and a rule checks for more than 50 Mbit/s over 30 seconds, the rule will hit 4 times. There will be one incident which will contain the exact number of repetitions for reference.&lt;br /&gt;
&lt;br /&gt;
For start/stop incidents, you will only see two rule hits and the incident description will state the start and stop time.&lt;br /&gt;
&lt;br /&gt;
=== Available attributes ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;absolute_loss&#039;&#039;&#039;: Count of lost packets for IEC104 connection.&lt;br /&gt;
* &#039;&#039;&#039;alarms_low&#039;&#039;&#039;, &#039;&#039;&#039;alarms_high&#039;&#039;&#039;: Whether an low/high alarm occurred for a Profinet device.&lt;br /&gt;
* &#039;&#039;&#039;broadcast_packet_rate&#039;&#039;&#039;: The attribute is the number of packets per second on average over the configured timespan for MAC broadcast packets.&lt;br /&gt;
* &#039;&#039;&#039;bytes_captured&#039;&#039;&#039;: The amount of bytes captured by a ring buffer in the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;bytes_dropped&#039;&#039;&#039;: The amount of bytes dropped by a ring buffer in the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;certificate_expires&#039;&#039;&#039;: This is the number of days until the certificate expires. If the certificate is already expired, the value is &amp;lt;= 0.&lt;br /&gt;
* &#039;&#039;&#039;channel_status&#039;&#039;&#039;: 0 means that the LACP port channel is not synchronized, 1 means that the LACP port channel is synchronized.&lt;br /&gt;
* &#039;&#039;&#039;duration&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The time between first and last packet of the flow.&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;: The call duration.&lt;br /&gt;
* &#039;&#039;&#039;errors&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;Profinet: Traffic of Profinet devices: Whether errors occured.&lt;br /&gt;
* &#039;&#039;&#039;error_type&#039;&#039;&#039;: equal or not equal to:&lt;br /&gt;
** Format Error: DNS responds a format error.&lt;br /&gt;
** Non-existent Domain: DNS could not find queried domain name.&lt;br /&gt;
** Server Failure: DNS responds server failure.&lt;br /&gt;
* &#039;&#039;&#039;frames_lost&#039;&#039;&#039;, &#039;&#039;&#039;frames_repeated&#039;&#039;&#039;, &#039;&#039;&#039;frames_wrong_sequence&#039;&#039;&#039;: Whether Profinet frames have been seen with problems in sequence. For loss the count of lost frames is calculated.&lt;br /&gt;
* &#039;&#039;&#039;geolocation&#039;&#039;&#039;: checks if a country is part of the connection&lt;br /&gt;
** &#039;&#039;&#039;Direction&#039;&#039;&#039;: The direction of traffic&lt;br /&gt;
*** &#039;&#039;from&#039;&#039;: Traffic is coming &#039;&#039;from the&#039;&#039; specified country&lt;br /&gt;
*** &#039;&#039;to&#039;&#039;: Traffic is going &#039;&#039;to&#039;&#039; the specified country&lt;br /&gt;
*** &#039;&#039;any:&#039;&#039; The specified country is on either side of the connection, or on neither side if the inequality is selected.&lt;br /&gt;
* &#039;&#039;&#039;GoCBRef&#039;&#039;&#039;, The GOOSE control block reference name of the device to filter.&lt;br /&gt;
* &#039;&#039;&#039;gps_sync_status&#039;&#039;&#039;: 0 means that the GPS clock in not synchronized, 1 means that the GPS clock is synchronized.&lt;br /&gt;
* &#039;&#039;&#039;handshake_failed&#039;&#039;&#039;: Whether TCP handshake failed, i.e. one packet of SYN, SYN-ACK, ACK sequence is missing. If no handshake is seen at all but data (e.g. Allegro was started in the middle of a connection), no incident is generated.&lt;br /&gt;
* &#039;&#039;&#039;handshake_failure_type&#039;&#039;&#039;: The type of failure that occured during a WiFi handshake&lt;br /&gt;
** &#039;&#039;&#039;Erroneous handshake&#039;&#039;&#039;: The handshake violated the protocol laid out by IEEE802.11. This is not an authentication failure, this is a technical issue with a network device, or an issue with signal strength at the multimeter.&lt;br /&gt;
** &#039;&#039;&#039;Failure to authenticate&#039;&#039;&#039; &#039;&#039;&#039;(WPA)&#039;&#039;&#039;: A client attempted to join a network but failed to authenticate via WPA2 or WPA3. This indicates a problem during the EAPOL key derivation (most likely invalid credentials).&lt;br /&gt;
** &#039;&#039;&#039;Failure to authenticate (WEP)&#039;&#039;&#039;: A client attempted to join a network but failed to authenticate via WEP. This indicates a general authentication failure in an authentication frame. More information can be found in the details panel of the offending authentication frame on the handshake details page.&lt;br /&gt;
** &#039;&#039;&#039;Failure to (re)associate&#039;&#039;&#039;: A client attempted to join a network, succeeded authentication but ultimately failed to associate with the network. More information can be found in the details panel of the offending (re)association response frame on the handshake details page. Note that association happens &#039;&#039;after&#039;&#039; successful WEP authentication, but &#039;&#039;before&#039;&#039; WPA authentication.&lt;br /&gt;
* &#039;&#039;&#039;handshake_time&#039;&#039;&#039;: The TCP handshake time between the first SYN packet and the ACK packet for the SYN/ACK packet of the server.&lt;br /&gt;
** &#039;&#039;&#039;client_handshake_time&#039;&#039;&#039;: The TCP handshake time between the SYN/ACK packet of the server and the ACK packet of the client.&lt;br /&gt;
** &#039;&#039;&#039;server_handshake_time&#039;&#039;&#039;: The TCP handshake time between the first SYN packet of the client and the SYN/ACK packet of the server.&lt;br /&gt;
* &#039;&#039;&#039;interface_speed&#039;&#039;&#039;: The current speed of the interface in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;interface_status&#039;&#039;&#039;: 0 means interface is down, 1 means interface is up.&lt;br /&gt;
* &#039;&#039;&#039;jitter&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;: The average jitter of the call, using the maximum value of both call sides.&lt;br /&gt;
** &#039;&#039;RTP: Traffic for RTP connections&#039;&#039;: The average jitter of the RTP connection for the given timespan, using the maximum value of both directions.&lt;br /&gt;
* &#039;&#039;&#039;l4_port&#039;&#039;&#039;: The layer 4 port number, will be compared against both sides of a connection.&lt;br /&gt;
* &#039;&#039;&#039;l4_client_port&#039;&#039;&#039;: The layer 4 port number of the client side of a connection.&lt;br /&gt;
* &#039;&#039;&#039;l4_server_port&#039;&#039;&#039;: The layer 4 port number of the server side of a connection.&lt;br /&gt;
* &#039;&#039;&#039;l4_protocol&#039;&#039;&#039;: The layer 4 protocol. Can be TCP, UDP or other.&lt;br /&gt;
* &#039;&#039;&#039;l7_protocol&#039;&#039;&#039;: The layer 7 protocol short name. Can also be a list, e.g. &amp;quot;HTTP, SSH, DHCP&amp;quot;&lt;br /&gt;
* &#039;&#039;&#039;local_ip&#039;&#039;&#039;: Whether the IP is local (10/8, 172.16/12, 192.168/16, 169.254/16, fe80::/10, fc00::/7)&lt;br /&gt;
* &#039;&#039;&#039;link_speed_difference&#039;&#039;&#039;: This is the absolute difference between the speeds of both interface of a link in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;mac_count&#039;&#039;&#039;: The number of different MAC addresses for the corresponding IP address.&lt;br /&gt;
* &#039;&#039;&#039;max_jitter&#039;&#039;&#039;: The max jitter value for a Profinet device in % in a given timespan.&lt;br /&gt;
* &#039;&#039;&#039;mos&#039;&#039;&#039;: The average MOS quality value of the call, using the minimum of both call sides.&lt;br /&gt;
* &#039;&#039;&#039;new_connections&#039;&#039;&#039;: The amount of newly created connections (TCP and UDP) for the given timespan.&lt;br /&gt;
* &#039;&#039;&#039;not_in_order&#039;&#039;&#039;: Count of not in order packets for IEC104 connection. The sequence number could be too high, too low or repeated.&lt;br /&gt;
* &#039;&#039;&#039;packet_rate&#039;&#039;&#039;: The packet rate in packets per second on average during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;packet_rate_increase&#039;&#039;&#039;: The packet rate increase in % during the configured timespan compared to the average packet rate of the given baseline timespan. The noise can be configured to allow deviations that should not lead to trigger the incident.&lt;br /&gt;
* &#039;&#039;&#039;percent_loss&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;SIP: Call end&#039;&#039;:  The percentage of RTP packet loss for the call, accounting packets from both directions.&lt;br /&gt;
** &#039;&#039;RTP: Traffic for RTP connections&#039;&#039;: The percentage of RTP packet loss for the given timespan, accounting packets from both directions of the RTP connection.&lt;br /&gt;
** &#039;&#039;IEC104: Traffic for IEC104 connections&#039;&#039;: The percentage of IEC104 packet loss for the given timespan, accounting packets from both directions of the IEC104 connection.&lt;br /&gt;
* &#039;&#039;&#039;percent_transmissions&#039;&#039;&#039;: The amount of TCP retransmission as a percentage of the total bytes.&lt;br /&gt;
* &#039;&#039;&#039;port_range&#039;&#039;&#039;: The TCP or UDP port. Can be also a range, e.g. 80,443,8443-8445&lt;br /&gt;
* &#039;&#039;&#039;pppoe_discovery_packets&#039;&#039;&#039;: The number of PPPoE discovery packets seen during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;response_time&#039;&#039;&#039;: The response time of IEC104 ACT requests and ACTCON replies.&lt;br /&gt;
* &#039;&#039;&#039;retransmission_ratio&#039;&#039;&#039;: The TCP retransmission ratio seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;since_start_time&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;MAC: New L7 protocol&#039;&#039;: This is the number of seconds after packet processing start when a new Layer-7 protocol for the MAC address appeared.&lt;br /&gt;
** &#039;&#039;MAC: New MAC address&#039;&#039;:  This is the number of seconds after packet processing start when the MAC address appeared. This is useful to only report new MAC address after some learning time.&lt;br /&gt;
** &#039;&#039;IP: New local IP address&#039;&#039;: This is the number of seconds after packet processing start when the IP address appeared. This is useful to only report new IP address after some learning time.&lt;br /&gt;
** &#039;&#039;IP: New local L7 protocol&#039;&#039;: This is the number of seconds after packet processing start when the Layer-7 protocol for the IP address appeared.&lt;br /&gt;
** &#039;&#039;Global: Connection start&#039;&#039;: This is the number of seconds after packet processing start when the connection hast been started. This is useful to only report new connections after some learning time.&lt;br /&gt;
* &#039;&#039;&#039;status&#039;&#039;&#039;: The call status code (a three digit number, like 200 for Success)&lt;br /&gt;
* &#039;&#039;&#039;tcp_handshake_time&#039;&#039;&#039;: The TCP handshake time.&lt;br /&gt;
* &#039;&#039;&#039;tcp_fin_packets&#039;&#039;&#039;: The number of TCP FIN packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;tcp_rst_packets&#039;&#039;&#039;: The number of TCP RST packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;tcp_syn_packets&#039;&#039;&#039;: The number of TCP SYN packets (RX + TX) seen in the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;throughput&#039;&#039;&#039;: The throughput bandwidth in bit/s on average during the configured timespan.&lt;br /&gt;
* &#039;&#039;&#039;throughput_increase&#039;&#039;&#039;: The throughput bandwidth increase in % during the configured timespan compared to the average throughput of the given baseline timespan. The noise can be configured to allow deviations that should not lead to trigger the incident.&lt;br /&gt;
* &#039;&#039;&#039;time_offset&#039;&#039;&#039;: The time offset between the local time and the timestamp seen in the PTP packet.&lt;br /&gt;
* &#039;&#039;&#039;time_since_first_unanswered_request&#039;&#039;&#039;: This is the time span between when the trigger is checked and the first DNS request that has not been answered by the DNS server.&lt;br /&gt;
* &#039;&#039;&#039;time_since_last_mac&#039;&#039;&#039;: This is the number of seconds between changed MAC addresses. If, for examples, dynamic IP assignment is used, changing MAC addresses is normal so the test can be limited to only a certain amount of time.&lt;br /&gt;
* &#039;&#039;&#039;tls_alert_level&#039;&#039;&#039;: The alert level of a TLS alert packet. Can be &#039;fatal&#039;, &#039;warning&#039; or &#039;unknown&#039;. A fatal alert will be sent if e.g. TLS handshake failed and connection shall be closed.&lt;br /&gt;
* &#039;&#039;&#039;tls_handshake_time_ms:&#039;&#039;&#039; The [[TLS module|TLS handshake response time]] of the TLS handshake.&lt;br /&gt;
* &#039;&#039;&#039;tls_handshake_first_data:&#039;&#039;&#039; The [[TLS module|TLS data response time]] of the TLS handshake.&lt;br /&gt;
* &#039;&#039;&#039;total_bytes&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The total number of bytes seen for both directions of the flow.&lt;br /&gt;
** &#039;&#039;IP: Traffic on IP addresses&#039;&#039;, &#039;&#039;QOS: Traffic on QoS classes&#039;&#039;, &#039;&#039;SIP: Call end&#039;&#039;: The number of bytes seen in the configured timespan.&lt;br /&gt;
** &#039;&#039;&#039;total_callee_bytes&#039;&#039;&#039;: The number of bytes seen for the callee of the call.&lt;br /&gt;
** &#039;&#039;&#039;total_caller_bytes&#039;&#039;&#039;: The number of bytes seen for the caller of the call.&lt;br /&gt;
* &#039;&#039;&#039;total_packets&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;IP: Connection end&#039;&#039;: The total number of packets seen for both directions of the flow.&lt;br /&gt;
** &#039;&#039;IP: Traffic on IP addresses&#039;&#039;, &#039;&#039;QOS: Traffic on QoS classes&#039;&#039;, &#039;&#039;SIP: Call end&#039;&#039;: The number of packets seen in the configured timespan.&lt;br /&gt;
** &#039;&#039;&#039;total_callee_packets&#039;&#039;&#039;: The number of packets seen for the callee of the call.&lt;br /&gt;
** &#039;&#039;&#039;total_caller_packets&#039;&#039;&#039;: The number of packets seen for the caller of the call.&lt;br /&gt;
* &#039;&#039;&#039;ttl_change&#039;&#039;&#039;: Whether TTL or hop limit has changed.&lt;br /&gt;
* &#039;&#039;&#039;type&#039;&#039;&#039;: The type of PPPoE discovery packet (PADI, PADO, PADR, PADS, PADT or any).&lt;br /&gt;
* &#039;&#039;&#039;used_size&#039;&#039;&#039;: The percentage of the ring buffer that needs to be filled.&lt;br /&gt;
* &#039;&#039;&#039;used_tls_version&#039;&#039;&#039;: The TLS version (SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2 or TLS 1.3)&lt;br /&gt;
* &#039;&#039;&#039;version&#039;&#039;&#039;:&lt;br /&gt;
** &#039;&#039;SMB: SMB version negotiation&#039;&#039;: The SMB version SMB1 or SMB2/3&lt;br /&gt;
* &#039;&#039;&#039;window_below_mss&#039;&#039;&#039;: Whether the smallest announced TCP window was below the TCP MSS value. An additional offset is available, to check whether window was smaller than MSS + x bytes.&lt;br /&gt;
* &#039;&#039;&#039;zero_window_packets&#039;&#039;&#039;: The number of packets with a TCP window of 0 for both directions of the flow.&lt;br /&gt;
* &#039;&#039;&#039;zero_window_packets&#039;&#039;&#039;: The number of zero window packets seen in the configured timespan.&lt;br /&gt;
&lt;br /&gt;
=== Capture settings ===&lt;br /&gt;
It is possible to automatically capture traffic for occurred incidents. These global settings control where capture files are stored and the capturing itself can be enabled for each rule separately.&lt;br /&gt;
&lt;br /&gt;
The incident capture feature requires an active packet ring buffer since the packets are extracted from the buffer at the end of the incident period.&lt;br /&gt;
&lt;br /&gt;
Available settings:&lt;br /&gt;
&lt;br /&gt;
* Capture cooldown period: For each rule a cooldown period prevents multiple captures from happening in fast succession. By default, new captures happen firstly after 5 seconds, but any other value of at least 1 second can be configured. The cooldown is applied to each rule separately, but for each individual rule it does not matter if the same or a different entity triggers an incident. The incident is still reported within the cooldown period, but no additional capture is started.&lt;br /&gt;
* Storage device: Select the storage device where the captures should be stored on.&lt;br /&gt;
* Storage directory: Enter the directory where capture files should be stored or leave empty to use the top level directory.&lt;br /&gt;
* Select packet ring buffer to capture from: if multiple ring buffer cluster are in use, you can select which ring buffer to use for extraction.&lt;br /&gt;
* Capture profile: A capture profile can be configured to apply packet truncation rules to the capture file. If unset, the complete packets are captured (if the ring buffer uses separate truncation rules, truncated packets might still be within the capture file).&lt;br /&gt;
&lt;br /&gt;
== Time Profiles ==&lt;br /&gt;
Incident rules can be active configured to be active in configured time spans (time profiles).&lt;br /&gt;
&lt;br /&gt;
Every time profile allows the user to define one or more time spans per day of the week in which a rule should be active. After saving the user is able select the time profile when editing the rule.&lt;br /&gt;
&lt;br /&gt;
Notes: Overlapping time spans will be merged. The earliest a time span is allowed to start is 0 and the latest end is 24, minutes are not allowed. The rule is not active for a day if there is no time span defined for the day.&lt;br /&gt;
&lt;br /&gt;
== Channel configuration ==&lt;br /&gt;
[[File:Incidents channels.png|thumb|600x600px|Channel configuration]]&lt;br /&gt;
Incidents can be reported on different channels. The configuration allows to add new channels so they can be selected in the rule configuration described above.&lt;br /&gt;
&lt;br /&gt;
Each channel can be of type:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;email&#039;&#039;&#039; Incidents will be sent to the email address configured in the [[Global settings]].&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;kafka&#039;&#039;&#039; The incidents are sent to a topic on the configured Apache Kafka server. The message is the same as for syslog.&lt;br /&gt;
* Bootstrap Server: hostname/ip:port of a Kafka Broker or multiple Brokers separated by comma&lt;br /&gt;
* Protocol: Plaintext (no authentication, no encryption), SASL Paintext (Plain authentication, no encryption), SASL SSL (Plain authentication, TLS/SSL encryption), mTLS (firmware &amp;gt;= 4.4)&lt;br /&gt;
* Ignore TLS Certificate: Ignore the TLS Certificate of the Brokers (only SASL SSL)&lt;br /&gt;
* Username: Broker Login (only SASL)&lt;br /&gt;
* Password: Broker Login (only SASL)&lt;br /&gt;
* Topic: The name of the topic into which the Incidents are sent.&lt;br /&gt;
* Partitioner (firmware &amp;gt;= 4.5)&lt;br /&gt;
** Random: Choose random partition on Kafka server (default)&lt;br /&gt;
** Consistent: Choose partition based on CRC32 hash of the multimeter hostname&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;snmp_trap&#039;&#039;&#039; Incidents will be sent to the configured SNMP trap receiver. A MIB file with the Allegro Network Multimeter SNMP trap definitions is available for download in the channel configuration dialog.&lt;br /&gt;
* Version: Supported SNMP version of the trap receiver (SNMP v2c or SNMP v3)&lt;br /&gt;
* Trap receiver (manager) hostname/IP: The trap receiver hostname or IP address&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SNMP v2c&#039;&#039;:&lt;br /&gt;
* Community name: SNMP community name expected by the trap receiver&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;SNMP v3&#039;&#039;:&lt;br /&gt;
* Authentication protocol: Protocol for authenticated messages (MD5, SHA, SHA-224, SHA-256, SHA-384, SHA-512)&lt;br /&gt;
* Authentication password: Pass phrase for authenticated messages&lt;br /&gt;
* Privacy protocol: Protocol for message encryption (AES, DES)&lt;br /&gt;
* Privacy password: Pass phrase for message encryption&lt;br /&gt;
* Security name: Security name for authenticated SNMP messages&lt;br /&gt;
* Security level: Security level for SNMP messages (noAuthNoPriv, authNoPriv, authPriv)&lt;br /&gt;
* Engine ID: Authoritative (security) engineID (hexadecimal number of an even amount of 10 to 64 hexadecimal digits, optionally prefixed with &amp;quot;0x&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;syslog&#039;&#039;&#039; Incidents will be sent to the configured syslog server via TCP on any TCP or UDP port.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:Incidents add channel.png|thumb|alt=|none|Adding a new channel]]&lt;br /&gt;
Each channel also uses a minimum severity setting, so only incidents are reported which are of at least that severity.&lt;br /&gt;
&lt;br /&gt;
Each channel can be configured to only handle incidents from live traffic or from replayed traffic.&lt;br /&gt;
&lt;br /&gt;
Some incidents cannot be configured via rules and you can choose to get those incidents also via email by enabling the settings at the lower part of the settings page.&lt;br /&gt;
&lt;br /&gt;
After saving the configuration, a test message can be sent to the target system.&lt;br /&gt;
&lt;br /&gt;
== Other settings ==&lt;br /&gt;
&lt;br /&gt;
=== Interface burst incident ===&lt;br /&gt;
[[File:Incidents others.png|thumb|600x600px|Other incidents]]&lt;br /&gt;
Burst incidents with milli-second resolution can be generated when the interface throughput exceeds a configurable threshold. The incident contains a graph of traffic for that interface with some data points before and after the threshold has been exceeded depending on the measurement interval. A PCAP link for capturing from the packet ring buffer is shown. For further investigation of that incident, the button &amp;quot;Use as global time range&amp;quot; can be used to set the global range to the start and end of the incident graph (at least 5 seconds) so that all modules of the Allegro Network Multimeter show that time span.&lt;br /&gt;
&lt;br /&gt;
The incident generation can be configured in the &amp;quot;Other settings&amp;quot; tab as follows:&lt;br /&gt;
* &#039;&#039;&#039;Report &amp;quot;throughput threshold exceeded&amp;quot; with severity&#039;&#039;&#039;: report an incident with the selected severity level if the throughput of any network interface exceeded.&lt;br /&gt;
* &#039;&#039;&#039;Throughput threshold (Mbit/s)&#039;&#039;&#039;: The threshold is configured in Mbit/s.&lt;br /&gt;
* &#039;&#039;&#039;How long throughput must be above threshold to generate incident (in milliseconds)&#039;&#039;&#039;: The throughput must exceed the threshold for this duration in order to generate the incident. If set to zero (default) the incident is generated immediately after the threshold has been exceeded.&lt;br /&gt;
* &#039;&#039;&#039;Throughput cool-down period between two incidents in milliseconds&#039;&#039;&#039;: Defines the time after an incident where no new incident is generated even if the threshold is exceeded. If this period is passed, throughput incidents could be generated again.&lt;br /&gt;
Since each burst incidents stores the high resolution traffic graph, this feature uses a significant amount of memory. The actual amount is shown below and also depends on the maximum number of incidents configured in the section below.&lt;br /&gt;
&lt;br /&gt;
=== Generic incident settings ===&lt;br /&gt;
This section allows to modify generic settings regarding the incident feature:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum number of stored incidents&#039;&#039;&#039;: This value defines how many incidents are stored before old incidents are removed.  Increasing this value also increased the amount of memory reserved for this feature.&amp;lt;br&amp;gt;The corresponding value for the active setting is shown below, changing the configuration value requires a restart of the packet processing to take affect.&lt;br /&gt;
&lt;br /&gt;
== Occured incidents ==&lt;br /&gt;
This page shows up to the last incidents occurred on the system. The table can be filtered for specific severity levels, as well as for specific trigger sources by selecting the trigger from the drop down menu.&lt;br /&gt;
[[File:Incidents list filter.png|thumb|600x600px|Filter incidents by severity or trigger]]&lt;br /&gt;
The list can also be filtered for the subject of the incident.&lt;br /&gt;
&lt;br /&gt;
Individual incidents can be viewed in detail by clicking on the subject. The details page shows detailed information including links to the relevant measurement page.&lt;br /&gt;
&lt;br /&gt;
Incidents can be deleted individually by clicking on the delete button next to the incident, or all incidents can be deleted by clicking on the button on the top right of the page.&lt;br /&gt;
&lt;br /&gt;
The number of incidents available in this view is limited by a configurable number (firmware &amp;lt;4.1 was limited to 1000), the configuration as available in the &amp;quot;Other settings&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
== Incident statistics ==&lt;br /&gt;
[[File:Incidents stats.png|thumb|600x600px|Statistics about rules]]&lt;br /&gt;
This page shows graphs about how often each rule has been hit both in absolute numbers as well as relatively to how often the rule has been checked.&lt;br /&gt;
&lt;br /&gt;
== Incident list per measurement modules ==&lt;br /&gt;
Since incidents are triggered by different measurement modules (as indicate by the prefix of the trigger name, like the mac or ip module), the list of incidents from that specific module can also be seen in the corresponding tab of the measurement module for quicker access. This per-module view only lists those incidents coming from that module, all other potential incidents are hidden and must be accessed in their corresponding module page, or in the global view in the &amp;quot;Generic -&amp;gt; Incident&amp;quot; menu.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
Some technical limitations apply:&lt;br /&gt;
&lt;br /&gt;
* continuously checked triggers like &amp;quot;IP traffic&amp;quot; are only evaluated if there was at least one packet in the corresponding time interval. Therefore, rules check for zero packet count or throughput will never match.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Administration&amp;diff=5136</id>
		<title>Administration</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Administration&amp;diff=5136"/>
		<updated>2025-06-30T08:33:15Z</updated>

		<summary type="html">&lt;p&gt;Ralf: /* TLS/SSL certificate */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The administration page allows the following actions:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|- &lt;br /&gt;
| [[File:Administration.png|800px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Power ===&lt;br /&gt;
&lt;br /&gt;
Reboot or power off the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
After clicking on the buttons, a confirmation dialogue will appear. Most of the time, rebooting is not necessary since it takes a significant time. If packet processing needs to be restarted because some options cannot be changed during runtime, the next option is a better choice since it minimizes downtime.&lt;br /&gt;
&lt;br /&gt;
=== Processing ===&lt;br /&gt;
&lt;br /&gt;
Restart the Allegro Network Multimeter processing software. This will reset all measured statistics.&lt;br /&gt;
&lt;br /&gt;
Choosing this option will stop packet processing but the machine and its web interface is still available as the device itself is not rebooted. The packet processing core is restarted with the current settings and will begin processing packets after a few seconds.&lt;br /&gt;
&lt;br /&gt;
=== Configuration ===&lt;br /&gt;
&lt;br /&gt;
By clicking on the &#039;&#039;&#039;Reset System Configuration&#039;&#039;&#039; button a dialog is displayed that allows to reset all settings, including the network configuration, to factory defaults and the system will be restarted. As of version 3.4 the dialog allows to keep certain settings (management interface settings, users and passwords, disk and packet ring buffer cluster settings including optional random device-specific encryption keys) while setting the rest of the system configuration to defaults.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Export System Configuration&#039;&#039;&#039; button allows you to export the entire configuration of the *Allegro Network Multimeter*. A zip compressed file can be downloaded and used for import.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Import System Configuration&#039;&#039;&#039; button allows you to select several configuration items:&lt;br /&gt;
&lt;br /&gt;
* Core settings: All settings of global settings, module settings, incident settings, user defined names, virtual link groups, ingress (NIC) filter and IP groups, excluding management interface settings, multi-device settings, and user settings. Some core settings (network interfaces, virtual link groups, incidents and time synchronization) can also be retained during import. Simply uncheck the global core setting checkbox und check the child checkboxes for settings to be imported and overwritten.&lt;br /&gt;
* Management interface settings: All settings of the management interface (e.g. Wi-Fi, LAN, hostname).&lt;br /&gt;
* Multi device settings: All settings on the configured remote devices.&lt;br /&gt;
* User and roles: All users and their passwords. The admin user cannot be changed and cannot be deleted by a configuration import.&lt;br /&gt;
* User settings: All user settings (such as search history or dashboard configuration)&lt;br /&gt;
It is possible to import the selected settings to all configured remote devices by selecting the last check box.&lt;br /&gt;
&lt;br /&gt;
The button &#039;&#039;&#039;Save current system configuration on Multimeter&#039;&#039;&#039; will store the current configuration as a file on the device itself (in contrast to the export feature, which will download the file the user&#039;s computer).&lt;br /&gt;
&lt;br /&gt;
When there are saved configuration available, any of them can be selected and load onto the system again. It is also possible to delete the configuration.&lt;br /&gt;
&lt;br /&gt;
=== CORS Configuration ===&lt;br /&gt;
With version 4.1 the option to configure the &amp;quot;Cross-Origin Resource Sharing&amp;quot; (CORS) settings was introduced.&lt;br /&gt;
&lt;br /&gt;
You can learn about CORS on the MDN Web docs[https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS].&lt;br /&gt;
&lt;br /&gt;
=== Access Control ===&lt;br /&gt;
Since version 4.1 there is the the option to limit the access to the multimeter api, the web interface and some other services like the sftp-server to specific subnets.&lt;br /&gt;
&lt;br /&gt;
If you enable the access control, you have the option to specify the subnets from which people are allowed to access the multimeter.&lt;br /&gt;
&lt;br /&gt;
If you want to allow the access for the clients in the subnet in which the multimeter is deployed you are able to allow that with ticking &amp;quot;Allow local access&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== TLS/SSL certificate ===&lt;br /&gt;
&lt;br /&gt;
The appliance comes with a pre-installed generic TLS certificate but a custom certificate can be uploaded, generated or downloaded from a Certificate Authority via ACME.&lt;br /&gt;
&lt;br /&gt;
==== Modes ====&lt;br /&gt;
The following modes are supported:&lt;br /&gt;
* &#039;&#039;&#039;Legacy&#039;&#039;&#039;: The default certificates the appliance got shipped with will be used if the appliance got shipped with an older firmware than 3.6. You won&#039;t be able to switch back to this option and it will be hidden if it is not selected.&lt;br /&gt;
* &#039;&#039;&#039;ACME&#039;&#039;&#039;: The Certificates will be downloaded from the specified Certificate Authority&lt;br /&gt;
* &#039;&#039;&#039;Upload&#039;&#039;&#039;: You are able to upload a X.509 certificate file and a (unencrypted) key file in the .pem-file format. Upon successful upload, this certificate will be used to serve the user interface. The .pem-file should contain the full certificate chain to trust the certificate: If there is an intermediate CA, its certificate should also be in the file.&lt;br /&gt;
* &#039;&#039;&#039;Self-Signed&#039;&#039;&#039;: Generate self-signed certificates with a custom host-name. They will be valid for 10 years and replace the legacy certificates for devices shipped with firmware version 3.6 or older.&lt;br /&gt;
The Default Mode is always the fall-back if the process does not work.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Reset to default SSL certificate&#039;&#039;&#039; button will remove any user-provided SSL certificate and the user interface will be served using the default SSL certificate.&lt;br /&gt;
&lt;br /&gt;
==== HSTS ====&lt;br /&gt;
With the version 4.2 the option to enable HTTP Strict Transport Security (HSTS) for the multimeter was added. HSTS stops users from trying to access the multimeter via unencrypted HTTP or ignoring invalid certificates for the multimeter.&lt;br /&gt;
&lt;br /&gt;
If the administrator locked themselves out by enabling HSTS there are multiple options:&lt;br /&gt;
&lt;br /&gt;
* If HSTS was already activated and the certificates were changed on purpose after that, they have to remove information about the site from their browser.&lt;br /&gt;
* If HSTS was already activated and the certificates were changed accidental, they are able to connect to the multimeter via a private window or  via the ip address.&lt;br /&gt;
&lt;br /&gt;
=== Certificate Authority ===&lt;br /&gt;
&lt;br /&gt;
Some features also connect to external SSL services, for instance when sending email notifications via SMTP or when searching for [[Firmware update|firmware updates]]. Usually these SSL connections are verified with the built-in CA certificate pool. It is also possible to upload one or many own CA certificates which are used additionally to the system ones.&lt;br /&gt;
&lt;br /&gt;
The button &amp;quot;Install SSL CA certificates&amp;quot; opens a dialoug where the file can be selected and uploaded. This file must contain certificates in the PEM format. It may contain multiple certificates. &lt;br /&gt;
&lt;br /&gt;
Before version 3.6 uploading new certificates will replace the existing ones. The button &amp;quot;Remove SSL CA certificates&amp;quot; will delete the previously installed custom CA certificates so that only  the system CA pool is used again for certificate verification.&lt;br /&gt;
&lt;br /&gt;
With version 3.6 uploading a new certificate adds to the old one. You can delete all by pressing the &amp;quot;Remove all CA certificates&amp;quot; and also remove separate certificates.&lt;br /&gt;
&lt;br /&gt;
=== Time Settings ===&lt;br /&gt;
The Allegro Network Multimeter can be configured to use a time synchronization service. NTP is supported for all variants of the Allegro Network Multimeter. PTP service may be used if management interface supports hardware time stamping. If a GNSS/GPS-capable extension card is available, GNSS/GPS time synchronization is available and the antenna cable delay in nanoseconds can be configured.&lt;br /&gt;
&lt;br /&gt;
To enable a time service, switch to the desired type in the dropdown box. The time service field will show whether the selected service is running or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NTP&#039;&#039;&#039; - For active NTP time retrieval, you can specify and edit dedicated NTP servers the Allegro Network Multimeter should communicate with. If you do not specify a NTP server, a set of predefined NTP servers will be automatically selected.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NTP from data plane&#039;&#039;&#039; - For passive time retrieval, NTP from data plane can be used to retrieve the time to be synchronized passively from NTP packets within  the traffic that is analyzed. The IP address of a desired NTP server must be set. As soon as a NTP server packet is seen, the system time of the Allegro Network Multimeter will be set. The wait period field can be used to set a time period where subsequent updates are ignored. If set to 0, every time packet of that server will be used. NTP from data plane is ideal in situation where the Allegro Network Multimeter MGT interface can not or may not actively connect to the network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;PTP&#039;&#039;&#039; - For PTP time retrieval, the PTP grandmaster clock identity is shown. This is usually an EUI-64 address. The first and last set of octets of the identity represent the (EUI-48) MAC address of the grandmaster.&lt;br /&gt;
&lt;br /&gt;
The following settings are possible for PTP and should match the settings of the PTP grandmaster:&lt;br /&gt;
*Delay mechanism: Use end-to-end (E2E), peer-to-peer (P2P) or automatic delay measurement. In case automatic measurement is selected, E2E is used at the beginning and switched to P2P when a peer delay request is received. Default is &#039;&#039;&#039;Auto&#039;&#039;&#039;.&lt;br /&gt;
*Network transport: Use UDPv4, UDPv6 or Layer 2 as network transport. Default is &#039;&#039;&#039;UDPv4&#039;&#039;&#039;.&lt;br /&gt;
*Domain number: The domain number of the grandmaster. This is used to define logical groups of synchronized clocks.&lt;br /&gt;
&#039;&#039;&#039;GNSS/GPS&#039;&#039;&#039; - The GNSS/GPS time synchronization option will become available when a GNSS/GPS-capable extension card is installed in the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
If no time synchronization mechanism is selected the date and time of the device can be manually configured by entering a properly formatted date and time description. Below the time synchronization settings, the time zone used by the device can be configured. The drop-down list provides a list of cities grouped by world regions to select the appropriate time zone.&lt;br /&gt;
&lt;br /&gt;
When a nanosecond-resolution capture card with support for &#039;&#039;&#039;PPS&#039;&#039;&#039;-synchronization is installed, the toggle &#039;&#039;Enable PPS synchronization&#039;&#039; can be used to enable this type of synchronization. It is only shown when the time service chosen is not &#039;&#039;GPS&#039;&#039; as those two modes cannot be used simultaneously. The time offset in nanoseconds is also configurable allowing to compensate for the PPS connection cable length. This feature should only be enabled when it is made sure that a proper PPS signal is provided to the network adapter. Otherwise the packet timestamps may be incorrect.&lt;br /&gt;
&lt;br /&gt;
To make any of the above changes take effect, click on the Save settings button at the bottom of the page. To reload the stored settings, click on Reload settings.&lt;br /&gt;
&lt;br /&gt;
====== Changes of the system time and packet timestamping ======&lt;br /&gt;
The packet processing uses a monotonically increasing time for software packet timestamping and statistics calculation (see &#039;&#039;Hardware packet timestamping&#039;&#039; in [[Global settings]] for information about packet timestamps on interfaces with hardware packet timestamping enabled) . If the clock for some reason jumps forward in time (e.g. changing the time synchronization method or manually changing the time) the same will happen with the statistics and the packet timestamps and there may be a gap in the statistics. If the system clock jumps backwards in time the packet processing cannot jump back. In this case a warning &amp;quot;problematic change of system time detected (core restart recommended)&amp;quot; is displayed. While the packet processing time is ahead of the system clock the packet processing time will run at a speed of 75% of real-time so that the system clock will eventually catch up. This can e.g. lead to statistics that show higher traffic bandwidth than there actually is. A restart of the packet processing is always recommended in this case.&lt;br /&gt;
&lt;br /&gt;
=== Email notification ===&lt;br /&gt;
Certain modules support the sending of email notifications. The following settings are used to globally configure the SMTP server used  and the target email address that will receive the notifications:&lt;br /&gt;
*Enable email notifications: globally enables or disables the sending of email notifications.&lt;br /&gt;
*SMTP server address: the address of the SMTP server that will be used to send notification emails.&lt;br /&gt;
*SMTP server port: the TCP port on which the SMTP server is listening.&lt;br /&gt;
*SMTP server uses SSL: must be set to On if the SMTP server expects an SSL connection from the very start. If the SMTP server uses no SSL or STARTTLS this setting must be set to Off.&lt;br /&gt;
*Ignore certificate errors: if the SSL certificate should not be validated because e.g. it is a self-signed certificate this setting can be used to turn off certificate validation.&lt;br /&gt;
*Allow unencrypted connections: if an unencrypted connection must be allowed because e.g. a legacy SMTP server does not support it this setting can be used.&lt;br /&gt;
*Username: the username used to log in to the SMTP server.&lt;br /&gt;
*Password: the password used to log in to the SMTP server.&lt;br /&gt;
*From email address: the email address from which incident notifications will be sent.&lt;br /&gt;
*Target email address: the email address to which incident notifications will be sent.&lt;br /&gt;
*Email links base URL: this base URL will be used to generate the HTML links in notification emails. Since the device cannot by itself determine the proper address by which it is visible to the email recipient this setting can be used to set the correct URL prefix for links sent with the notification emails.&lt;br /&gt;
*Send periodic system status mail: if set to hourly or daily, a periodic system status report email will be sent to the configured target address with the selected frequency. It will contain basic system information and system health status, management interface configuration and a list of detected LLDP neighbours if the management LLDP feature is enabled.&lt;br /&gt;
The Send test email button can be used to verify that the entered settings are working.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Global_settings&amp;diff=5135</id>
		<title>Global settings</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Global_settings&amp;diff=5135"/>
		<updated>2025-06-26T06:46:26Z</updated>

		<summary type="html">&lt;p&gt;Ralf: /* IPFIX settings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Global settings section contains parameters for adjusting the behavior of the system.&lt;br /&gt;
The settings are split among multiple tabs, described as follows.&lt;br /&gt;
&lt;br /&gt;
== Generic settings ==&lt;br /&gt;
&lt;br /&gt;
=== Packet processing mode ===&lt;br /&gt;
&lt;br /&gt;
This section allows for configuring the main packet processing mode:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Bridge mode&#039;&#039;&#039;: In Bridge mode A.K.A. In-Line mode, all received packets will be transmitted between corresponding port pairs (e.g. 1+2, 3+4 on Allegro 500/510) so that the Allegro Network Multimeter can be placed in-line between any network component.&amp;lt;br/ &amp;gt;The device will operate transparent and will not modify network traffic in any way. The additional latency will be typically around or less than 1 millisecond.&amp;lt;br&amp;gt;In Bridge mode it is also possible to process network traffic from a mirror port or Tap. However, &amp;quot;only&amp;quot; half of the total available ports on each respective Allegro Network Multimeter model can be used to operate in this way.  For example on a 4-port Allegro model 500, you can conveniently leave the unit in bridge mode and connect up to two mirror ports on interfaces 1 and 3 respectively. Aforementioned interfaces are physically separated and not an (in-line) interface pair.&amp;lt;br /&amp;gt;Always avoid connecting mirror port traffic on an Allegro Network Multimeter interface pair (e.g. 1+2, 3+4 on Allegro 500/510), as this will result in TX traffic in the direction of a mirror port which if highly undesirable.&amp;lt;br /&amp;gt;[[File:Inline mode.jpg|800px|Allegro in brigde mode (in-line)]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Sink mode&#039;&#039;&#039;: In Sink mode, the Allegro Network Multimeter will operate &amp;quot;receive only&amp;quot;.&amp;lt;br /&amp;gt;Packets are not forwarded and there&#039;s no bi-directional traffic on any of the monitoring ports. This operation mode allows for installation at a Mirror port of a Switch or when using a network Tap to access the network traffic.&amp;lt;br /&amp;gt;[[File:Sink mode1.jpg|800px|Allegro in Sink mode on Mirror port or Tap]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Mixed bridge/sink mode:&#039;&#039;&#039; This mode enables to configure the packet processing mode for each interface pair. Interface pairs default to Bridge mode but the mode can be permanently changed in the [[interface statistics]].&lt;br /&gt;
&lt;br /&gt;
The packet processing mode can be changed during runtime.&lt;br /&gt;
 &lt;br /&gt;
Attention: Please always keep in mind, that while in bridge mode (Allegro Network Multimeter = in-line), a Link will be (shortly) interrupted when switching processing mode or/and rebooting the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
=== Endpoint mode ===&lt;br /&gt;
&lt;br /&gt;
If the endpoint mode is enabled for an interface, this interface will only process packets sent to the configured IP address (and potentially the port). If the system is running in bridge packet processing mode, links with an interface configured for endpoint mode will not forward traffic. The following types of traffic are supported:&lt;br /&gt;
&lt;br /&gt;
* Ethernet packets encapsulated in GRE or GRE+ERSPAN and targeted for the configured IP address.&amp;lt;br /&amp;gt;The system will process the packets as if only the inner encapsulated packet is seen and any traffic captures will only contain the encapsulated packet.&lt;br /&gt;
* UDP packets to specific port (packets will be analyzed as is).&lt;br /&gt;
&lt;br /&gt;
An interface with endpoint mode enabled will respond to ARP requests and to ICMP echo requests so it is possible to use ping to verify that the interface is reachable under the configured IP address.&lt;br /&gt;
&lt;br /&gt;
It must be noted that if the system is running in bridge packet processing mode, any links with an interface configured for endpoint mode will not forward traffic.&lt;br /&gt;
&lt;br /&gt;
VLAN tag handling is not supported. The Allegro Network Multimeter will accept ARP and ICMP requests with any VLAN tags but will send replies without VLAN tagging.&lt;br /&gt;
&lt;br /&gt;
Note: In versions 3.0 or older, the mode was named &amp;quot;l3 tunnel mode&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Webshark support ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter allows having a preview of packets, directly in the browser. This is the so called Webshark. To support Webshark previewing, the Allegro Network Multimeter needs to reserve an amount of system memory.&lt;br /&gt;
&lt;br /&gt;
This reserved amount of memory (RAM) is configurable and will not be available for the In-Memory database, thus the history of stored statistics in the dashboard becomes a little shorter. If this is not desired, it is possible to disable the Webshark support.&lt;br /&gt;
&lt;br /&gt;
Multiple parallel sessions/instances of Webshark previewing within one Allegro Network Multimeter is possible. The number of simultaneous Webshark instances and max. preview file size (e.g. 5MB) are configurable but may vary depending on Allegro model and installed RAM.&lt;br /&gt;
&lt;br /&gt;
Changing Webshark parameters requires a restart of the processing.&lt;br /&gt;
&lt;br /&gt;
[[File:Webshark.jpg|900px|Built in Webshark - Allegro Network Multimeter ]]&lt;br /&gt;
&lt;br /&gt;
=== Snort analysis===&lt;br /&gt;
{{Warning|title=Beta Feature|This feature is still in active development and is therefore subject to changes in the future. There may be bugs or unexpected behavior when using this feature.}}&lt;br /&gt;
The Allegro Network Multimeter is able to perform intrusion detection based on the [https://www.snort.org/ Snort] software project. The detection can be performed on live traffic or ring buffer traffic. This analysis is invoked via the capture dialog on any page and respects the same capture filter expressions as a normal traffic capture. &lt;br /&gt;
[[File:Snort Analysis Results.png|thumb|Snort Analysis Results]]&lt;br /&gt;
This feature is disabled by default, to enable it navigate to Global Settings &amp;gt; Snort Analysis and enable it via the toggle switch. Once enabled a new setting will appear to regulate the allowed memory usage by the intrusion detection. The user is able to set a hard maximum limit on the usable memory, and if the Snort process exceeds this limit it will be killed by the OOM-Manager. Additionally, another soft memory limit will be installed just below the hard maximum, and if the process reaches this limit it will be throttled heavily. If your intrusion analysis appears to get stuck or is unusually slow, a good troubleshooting step is to increase the memory limit. It is generally not recommended to keep the memory limit below 200MB. &lt;br /&gt;
&lt;br /&gt;
When invoking the analysis a new modal will open which displays the results of the analysis. The result modal is a list of detected incidents, sorted by order of appearance. An entry in this list has the following structure: &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Severity&lt;br /&gt;
!Time&lt;br /&gt;
!Classification&lt;br /&gt;
!Message&lt;br /&gt;
!Connection&lt;br /&gt;
|-&lt;br /&gt;
|This is denoted by the color on the left hand side of the row.&lt;br /&gt;
|The packet timestamp of the offending packet.&lt;br /&gt;
|A normalized name for the type of incident that occured.&lt;br /&gt;
|A more detailed description of the incident&lt;br /&gt;
|A diagram of the connection in which the incident occured. The IPs can be clicked to go to the IP detail page, and on the right there is an &amp;quot;external link&amp;quot; icon that opens the connection details page in a new tab.&lt;br /&gt;
|}&lt;br /&gt;
Additionally, on the right hand side of the modal is another color band that serves as a rough overview over all incidents. The band is static and roughly aligned with the scroll bar to make it easier to navigate to specific severity incidents.&lt;br /&gt;
&lt;br /&gt;
Snort works by reading a rule file which contains a list of rules used to match packets against. These rules can match subnet, direction, protocol, payload contents, and more (see the Snort documentation for more information on rules), and are given a classification, message and priority, which are displayed in the analysis results. Internally this feature uses a community rule set which is available for free and receives periodic updates. &#039;&#039;&#039;Note:&#039;&#039;&#039; The Allegro Network Multimeter (currently) does NOT automatically update this rule set. We are deploying the same rule set to all devices independent of the date of installation. Thus the analysis may not be able to detect zero day exploits and should not be relied on when trying to detect recently discovered attack vectors.&lt;br /&gt;
&lt;br /&gt;
At the moment, only critical and severe incidents are reported (Snort priorities 0 and 1). The classification and message strings are taken directly from the rule that triggered this incidents.&lt;br /&gt;
&lt;br /&gt;
===Detail of traffic analysis===&lt;br /&gt;
&lt;br /&gt;
Limit module processing, allows you to configure which OSI-layers (2,3,4,7) are actively processed and analyzed by the Allegro Network Multimeter. With this setting, the performance of the Allegro Network Multimeter can be significantly improved and allows for higher throughput when disabling some analysis modules.&lt;br /&gt;
&lt;br /&gt;
For both realtime and offline parallel analysis, the following modes are possible :&lt;br /&gt;
&lt;br /&gt;
*Only capturing: Only interface statistics and the capture module is provided. Capture filters are supported without Layer 7 protocol specification/recognition.&lt;br /&gt;
*Capturing and protocol detection: Additionally Layer 7 protocol specification in Capture filters will now work.&lt;br /&gt;
*Up to Layer 2: Additionally all Layer 2 related modules are active such as MAC, MAC protocols, ARP and Burst Analysis.&lt;br /&gt;
*Up to Layer 3: Additionally all Layer 3 related modules are active such as IP and DHCP statistics.&lt;br /&gt;
*Up to Layer 4: Additionally all Layer 4 related modules are active such as TCP and Layer 4 server ports.&lt;br /&gt;
*Unlimited: All Allegro Network Multimeter modules are active.&lt;br /&gt;
&lt;br /&gt;
When switching to another mode you need to restart the processing in order to activate the new settings.&lt;br /&gt;
&lt;br /&gt;
NOTE: The data recorded to/stored in the Packet Ring buffer, will NOT be affected by any of the above settings. Packet ring buffer capture rules may be configured under &amp;quot;Generic - Packet Ring Buffer&amp;quot;, further explained in our wiki here https://allegro-packets.com/wiki/Packet_ring_buffer#Packet_ring_buffer_snapshot_length_filter&lt;br /&gt;
&lt;br /&gt;
====Enable single flow load balancing====&lt;br /&gt;
When the &#039;&#039;Limit module processing&#039;&#039; slider is turned to &#039;&#039;Only capturing&#039;&#039; the option to enable &#039;&#039;single flow load balancing&#039;&#039; appears. If this option is enabled, even a single flow is load-balanced to different analyzer threads.&lt;br /&gt;
&lt;br /&gt;
This is only recommended when there are very few flows and there is an imbalance in the load of the analyzers. As the packets of a single flow are processed by different analyzers the packets of the flow may be stored out-of-order in the Packet Ring Buffer and a larger amount of memory may be required to reorder the packets when capturing from the Packet Ring Buffer (see [[Capture module#Configuration settings|Capture module]] configuration settings). &lt;br /&gt;
&lt;br /&gt;
===Graph detail settings===&lt;br /&gt;
&lt;br /&gt;
It is possible to modify the detail level of all graphs in the interface. This settings allow you to see a more detailed view (with higher time resolution) or to reduce the detail level so more data can be stored on the device. Changing the default values has an impact on the performance and memory usage. Changing a slider to the left increases the detail level of graphs, but increases memory usage and decreases performance.&lt;br /&gt;
&lt;br /&gt;
*Best graph resolution: This option configures how detailed the graph information are shown in the best case (the latest information). The default value is one second which means that a graph sample point represents a second of packet time. You can change the resolution up to 1 millisecond which gives a detailed sub-second representation of the traffic. You can also decide to decrease the resolution which enables the Allegro Network Multimeter to store more data for a longer period of time.&lt;br /&gt;
&lt;br /&gt;
*Reduce graph resolution of old data by up to: The resolution of older graph data is automatically reduced to save memory and to allow a longer view into the traffic history. This option allows you to change this behaviour. With a reduction factor of 1/1 no reduction is done at all which means the selected graph resolution is available for the complete time.&lt;br /&gt;
:This reduces the time period to see historical data. You can choose to increase the reduction factor to store more data for a longer period. The time printed in parentheses represents the worst-case graph resolution based on the chosen resolution and reduction factor. The reduction is done in multiple steps up to this limit. The newest data always has the highest resolution defined by the &amp;quot;Best graph resolution&amp;quot; setting above. Between 60 and 120 data points are stored at a minimum, so with default resolution of 1 second, between one and two minutes are available in the highest resolution. Due to internal compression, the exact number of data points cannot be foreseen but 60 data points are always available at least, usually much more.  Once the limit is reached, data is reduced by a factor of two thus doubling the amount of time available in half resolution (2 to 4 minutes in 2 second resolution). When the next limit is reached, the data is halved again thus doubling the time again, until the configured reduction limit is reached.  With default settings of one second resolution and reduction limit of 1/6, the worst resolution of 64 seconds (or 1 minute and 4 seconds) is reached not before 2 hours into the past.  The drop down menu in graph view gives an exact number about the available graph resolution in the given time period.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note: Regardless of these settings, the graph values are always converted to represent a value per second (when applicable). For example, the packets per second for an IP addresses will always be a value literally per second even if the resolution is larger or smaller than one second. The displayed value is scaled to match this view. Especially with sub-second resolution this might be misleading.&lt;br /&gt;
&lt;br /&gt;
For instance, if there is a network element sending one packet per second and the resolution is set to 100 milliseconds, the &amp;lt;u&amp;gt;value shown in the graph&amp;lt;/u&amp;gt; might be shown as 10 packets per second as each sample point is scaled to represent an value per second.&amp;lt;br&amp;gt;For a detailed investigation it is recommended to always select a specific time interval and look at the (packet) counters shown in all statistics since these are unscaled and represent the actual values.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Performance implications: The performance degradation and memory usage depends on the actual network traffic and is not exactly predictable. &lt;br /&gt;
&lt;br /&gt;
Here are some examples for reference on a Allegro 1000 series with different configuration values (under ideal test conditions):&lt;br /&gt;
&lt;br /&gt;
* 1 second resolution, 1/1 reduction factor: 90% of default performance&lt;br /&gt;
*100 millisecond resolution, 1/1 reduction factor: 50% of default performance,&lt;br /&gt;
*10 millisecond resolution, 1/1 reduction factor: 15% of default performance&lt;br /&gt;
*1 millisecond resolution, 1/1 reduction factor: 10% of default performance&lt;br /&gt;
&lt;br /&gt;
=== PCAP parallel analysis===&lt;br /&gt;
&lt;br /&gt;
The PCAP parallel analysis feature allows to analyse PCAP files or the&lt;br /&gt;
packet ring buffer in parallel to the live measurement. The settings&lt;br /&gt;
allow to enable the feature and choose how much memory of the main&lt;br /&gt;
memory is used for parallel analysis and how many parallel slots can&lt;br /&gt;
be used. Detailed description of the configuration values are&lt;br /&gt;
described [[parallel packet processing|here]].&lt;br /&gt;
&lt;br /&gt;
==IPFIX settings ==&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter may be running as an IPFIX exporter. These settings allows for reporting configuration. When enabled, the following settings are possible:&lt;br /&gt;
&lt;br /&gt;
*IP address: Address of IPFIX collector.&lt;br /&gt;
*Port: Corresponding port.&lt;br /&gt;
*Protocol: TCP or UDP.&lt;br /&gt;
*Update interval: Interval in seconds for sending a status update of flows.&lt;br /&gt;
*UDP resend interval: Interval in seconds for resending IPFIX templates for UDP connections.&lt;br /&gt;
* TCP reconnect timeout: When TCP connections could not be established, wait for this time period until the next attempt to establish a connection.&lt;br /&gt;
&lt;br /&gt;
Individual IPFIX messages can be enabled or disabled by toggling corresponding options. See the [[NetFlow/IPFIX interface]] documentation for details about the message types.&lt;br /&gt;
&lt;br /&gt;
==Time settings==&lt;br /&gt;
&lt;br /&gt;
The Time settings were moved to [[Administration]].&lt;br /&gt;
&lt;br /&gt;
== Email notification==&lt;br /&gt;
&lt;br /&gt;
The Email notification settings were moved to [[Administration]].&lt;br /&gt;
&lt;br /&gt;
==Long-term DB and persistence (BETA) ==&lt;br /&gt;
These two features allow to use a storage device as additional memory for long-term statistics of selected values, and to use a storage device to store and restore measurement data between restarts. See [[Longterm DB]] for more details.&lt;br /&gt;
&lt;br /&gt;
== Expert settings==&lt;br /&gt;
&lt;br /&gt;
The Expert settings contains parameter which are only necessary to change in rare installation scenarios or some specific need for a different operation mode.&lt;br /&gt;
&lt;br /&gt;
===Packet length accounting===&lt;br /&gt;
&lt;br /&gt;
This setting allows you to configure which packet length is used for all traffic counters and incidents. The following modes are possible:&lt;br /&gt;
&lt;br /&gt;
*Layer 1: Packet length is accounted on Layer 1 including preamble (7 Byte), SFD (1 Byte) and inter-frame gap (12 Bytes)&lt;br /&gt;
*Layer 2 without frame check sequence (default): Packet length is accounted on Layer 2 without a frame check sequence (4 Bytes)&lt;br /&gt;
*Layer 2 with frame check sequence: Account packet length on Layer 2 with frame check sequence (4 Bytes) When switching to another mode, it will only be applied on new packets. Older packet size statistics will not be changed.&lt;br /&gt;
&lt;br /&gt;
===VLAN handling ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter can &#039;&#039;&#039;ignore VLAN tags&#039;&#039;&#039; for connection tracking. Enabling this option may be necessary if network traffic is seen on the Allegro Network Multimeter that contains changing VLAN tags for the same connection. For example, depending on the configuration of the Mirror Port to which the Allegro Network Multimeter is connected, incoming traffic could contain a VLAN tag while outgoing traffic does not. In this example, a connection would appear twice in the statistics which often is desired behaviour to be able to identify a network misconfiguration. In some cases however, such &amp;quot;duplicate&amp;quot; data in the dashboard may be misleading, and the user would want to see only one connection. In these scenarios the option ignore VLAN tags may be enabled.&lt;br /&gt;
&lt;br /&gt;
===Tunnel view mode===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter can decapsulate GRE, VXLAN, ERSPAN type II and type III, GENEVE, CAPWAP as well as L2TPv3 data traffic. Depending on this option either the outer tunnel or the inner content is shown in all analysis modules.&lt;br /&gt;
&lt;br /&gt;
There are three possible modes:&lt;br /&gt;
&lt;br /&gt;
* don&#039;t decapsulate traffic (default)&lt;br /&gt;
*decapsulate tunnel traffic, discard non-encapsulated traffic&lt;br /&gt;
*decapsulate tunnel traffic, process also non-encapsulated traffic&lt;br /&gt;
&lt;br /&gt;
Optionally, a filter can be set to limit decapsulation on specific packets with a certain IP address, IP ranges or interfaces. If the filter is empty, all packets will be decapsulated.&lt;br /&gt;
&lt;br /&gt;
In case the mode is active with discarding non-encapsulated traffic, on the Dashboard a dropped counter will display dropped non-encapsulated packets.&lt;br /&gt;
&lt;br /&gt;
When capturing, packets with complete outer Layer 2, Layer 3, GRE, ERSPAN, GENEVE, CAPWAP and L2TPv3 headers will be stored as seen on the wire.&lt;br /&gt;
&lt;br /&gt;
===Database mode settings===&lt;br /&gt;
&lt;br /&gt;
The database mode is a special analysis mode for high-performance Allegro Network Multimeters with multiple processors to increase the performance on such systems. It is normally enabled automatically but depending on the actual network traffic and system usage, some parameter tweak might be necessary to improve overall system performance. &lt;br /&gt;
You should only change these parameters in discussion with the Allegro Packets support department.&lt;br /&gt;
These settings are only visible if your Allegro Network Multimeter is capable of running this mode.&lt;br /&gt;
&lt;br /&gt;
You can read more about the meaning of the settings [[DB mode|here]].&lt;br /&gt;
&lt;br /&gt;
===Network performance ===&lt;br /&gt;
&lt;br /&gt;
There are several network performance settings available to improve performance on high-performance systems in case of packet drops during very high incoming bandwidth. They are only visible if your Allegro Network Multimeter is capable of changing these settings.&lt;br /&gt;
&lt;br /&gt;
*Max RX queues per socket: This setting specifies the quantity of threads dedicated to read and write interactions with the network interface controllers. By increasing this value, network receive bandwidth can be increased before packet drops occur. By decreasing this value, data analysis will improve. The default setting of 2 RX queues is suitable for most configurations since data analysis typically needs much more processing ressources.&lt;br /&gt;
*Use Hyper-Threading for RX queues: This setting allows enabling or disabling Hyper-Threading for the threads dedicated to read and write interactions with the network interface controllers. By disabling it, network performance can be improved as the RX queues will be distributed to physical CPU cores only. By enabling it, RX queues will also be distributed to virtual Hyper-Threading CPU cores which is not as efficient as physical CPU cores. By using Hyper-Threading, data analysis will improve since there are more CPU cores available for these tasks. Hyper-Threading is used by default. This is suitable for most configurations as data analysis typically needs much more processing ressources.&lt;br /&gt;
*Preferred Network interface controller: This setting allows fine tuning of network and data analysis performance for dedicated network controllers. The selected set of network controllers will be preferred over others. Usually the fastest or the network controller with the most traffic should be preferred. The &#039;&#039;&#039;Auto&#039;&#039;&#039; setting is used by default, preferring the fastest network controller.&lt;br /&gt;
&lt;br /&gt;
You should only change these parameters in discussion with the Allegro Packets support department.&lt;br /&gt;
&lt;br /&gt;
===Processing performance===&lt;br /&gt;
&lt;br /&gt;
Processing performance may be modified on high-performance systems. This is only visible if your Allegro Network Multimeter is capable of changing this setting.&lt;br /&gt;
&lt;br /&gt;
*Processing performance mode: This setting allows for fine tuning processing performance. By using &#039;&#039;&#039;Analysing&#039;&#039;&#039;, as much processing ressources on all CPUs as possible are used for data analysis. By using &#039;&#039;&#039;Capturing&#039;&#039;&#039;, the focus will be on high data throughput and low latency for capturing purposes by using only the CPU where the preferred network controller is attached to. This has an impact on data analysis performance. &#039;&#039;&#039;Analysing&#039;&#039;&#039; is used by default.&lt;br /&gt;
You should only change this parameter in discussion with the Allegro Packets support department.&lt;br /&gt;
&lt;br /&gt;
===Packet ring buffer timeouts===&lt;br /&gt;
&lt;br /&gt;
Two timeout settings related to the packet ring buffer can be adjusted.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Long timeout&#039;&#039;&#039; controls after which maximum amount of time, a packet is actually written to the packet ring buffer. A lower value may decrease the time difference by which packets are stored out of their order in the packet ring buffer but it may increase the amount of unused overhead data in the packet ring buffer.&lt;br /&gt;
*&#039;&#039;&#039;Short timeout&#039;&#039;&#039; controls after which amount of time smaller batches of packets are written to the packet ring buffer, even if waiting for more packets would result in a more efficient operation. A lower value may decrease the time difference by which packets are stored out of their order in the packet ring buffer, but it may also decrease the performance of the packet ring buffer.&lt;br /&gt;
&lt;br /&gt;
===Data retention timeout===&lt;br /&gt;
&lt;br /&gt;
When the data retention timeout is set to a value greater than 0, data will be removed everywhere throughout the system after the given number of minutes. This means that entities like IPs, which have been inactive for longer than the timeout, will be removed. History graph data for entities that are still active will be truncated to cover only the given timespan, while the absolute values for the whole runtime will be retained. When a packet ring buffer is active, packets which are older than the timeout will be discarded.&lt;br /&gt;
&lt;br /&gt;
===Multithreaded capture analysis ===&lt;br /&gt;
&lt;br /&gt;
This option enables the use of multiple CPUs for capture analysis like when&lt;br /&gt;
analyzing a pcap capture file or analyzing the packet ring buffer. Depending&lt;br /&gt;
on the number of available CPUs this can significantly speed up the analysis.&lt;br /&gt;
&lt;br /&gt;
It is possible to dedicate a number of CPUs exclusively to capture analysis.&lt;br /&gt;
Since these CPUs are not available for live packet processing the performance of&lt;br /&gt;
live traffic analysis may be lower.&lt;br /&gt;
When set to 0 a lower priority is used for capture analysis than for live analysis&lt;br /&gt;
but it cannot be ruled out that the performance of the live processing is&lt;br /&gt;
affected.&lt;br /&gt;
&lt;br /&gt;
===Load balancing===&lt;br /&gt;
&lt;br /&gt;
This option select the load distribution method. By default, network&lt;br /&gt;
traffic is balanced among all processing threads based on the IP&lt;br /&gt;
addresses. This is fast and usually the best way for efficient load&lt;br /&gt;
balancing.&lt;br /&gt;
&lt;br /&gt;
If the network traffic only occurs between a few IP addresses, this&lt;br /&gt;
method can lead to a load imbalance so that some threads are doing more&lt;br /&gt;
work while other threads may be idle. In this scenario, &amp;quot;flow based&lt;br /&gt;
balancing&amp;quot; can be enabled to distribute the traffic based on the IP&lt;br /&gt;
and port information. This will lead to better utilization of all&lt;br /&gt;
processing threads.&lt;br /&gt;
&lt;br /&gt;
Since this option induces additional processing overhead per packet&lt;br /&gt;
and additional memory for all internal IP statistics, it should only&lt;br /&gt;
be enabled in cases of significant load imbalance.&lt;br /&gt;
&lt;br /&gt;
===Ingress packet memory===&lt;br /&gt;
&lt;br /&gt;
This slider allows to configure the amount of memory which is used to buffer received packets. A larger amount of ingress packet memory may help in processing bursts of high bandwidth traffic without packet drops but it also decreases the amount of memory available for statistics. It is important to know that a restart of the processing does not suffice to make changes to this setting active. A full reboot of the device is required for that. See [[Performance Optimization Guide]].&lt;br /&gt;
&lt;br /&gt;
===Jumbo frame mode===&lt;br /&gt;
This options allows to set how jumbo frames are handled by the system.&lt;br /&gt;
&lt;br /&gt;
Three settings are available and the &#039;&#039;&#039;normal&#039;&#039;&#039; mode, which is also the default, is the mode that was used before this configuration option was introduced:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Normal&#039;&#039;&#039;: the default mode offers the best balance of full support for jumbo frames with an efficient usage of the ingress packet memory. This mode uses efficiently sized packet buffers and splits larger packets over multiple packet buffers.&lt;br /&gt;
*&#039;&#039;&#039;Large buffers&#039;&#039;&#039;: this mode uses a single large buffer for each packet which may improve the performance but does not use the ingress packet memory as efficiently and limits the maximum jumbo frame size to 9kB.&lt;br /&gt;
*&#039;&#039;&#039;Disabled&#039;&#039;&#039;: this mode disables support for jumbo frames and offers the best performance and efficient usage of the ingress packet memory. Jumbo frames will be discarded by the network interface.&lt;br /&gt;
&lt;br /&gt;
===Hardware packet timestamping===&lt;br /&gt;
This option allows to enable the use of high-precision hardware packet timestamps on supported interfaces. If an interface is supported, it has the “Hardware Timestamps” feature in the interface statistics (firmware &amp;gt;= 4.4).&lt;br /&gt;
&lt;br /&gt;
This feature will require approximately 30% more load in the I/O threads. The load increase can be reduced to about 10% by using the jumbo frame mode &amp;quot;Large buffers&amp;quot; or &amp;quot;Disabled&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
When enabled, packets received on supported interfaces will carry a timestamp with nanosecond resolution instead of microsecond resolution.&lt;br /&gt;
&lt;br /&gt;
====== Time synchronization for hardware packet timestamping ======&lt;br /&gt;
Except when the network interface supports GNSS/GPS time synchronization and this has been selected as type of time synchronization (see [[Administration]] time settings) the internal clock of the interface is synchronized to the main device system clock. Even when no time synchronization method is chosen (&amp;quot;none&amp;quot;) the system clock is free-running and the internal clock of the interface will be regularly synced to the system clock.&lt;br /&gt;
&lt;br /&gt;
The synchronization to the system time happens roughly every 5 seconds. When the interface clock deviates more than 500ms from the system clock (should only happen at startup or when there is a big jump in the system time e.g. when changing the time synchronization method) the interface time is immediately reset to the system time. If there is a smaller deviation from the system clock the frequency of the interface clock is gradually adjusted to make the clock anneal to the system time so to avoid any discontinuous jumps of the packet timestamps.&lt;br /&gt;
&lt;br /&gt;
When &amp;quot;GNSS/GPS&amp;quot; time synchronization has been configured and the interface is receiving a valid GNSS/GPS time signal the interface clock is directly disciplined to the GNSS/GPS time signal and the system clock is synchronized to the GNSS/GPS time. Information of the synchronistation status is display on the System Info page. Interfaces with hardware packet timestamping but without a GNSS/GPS connection will continue to be synchronized to the system time (which is now running much closer to the global GNSS/GPS time).&lt;br /&gt;
&lt;br /&gt;
===External timestamps===&lt;br /&gt;
When this option is enabled, the system will use timestamps contained in the packet data instead of timestamps measured at packet arrival. Currently the Arista and Ixia/Keysight as well as the SRCMAC timestamp formats are supported.&lt;br /&gt;
&lt;br /&gt;
If the Ixia/Keysight or Arista type is selected, packets without an external timestamp will not be analyzed. The current number of packets that are dropped because they do not contain an external timestamp is displayed in the active interface overview table of the top-user dashboard. If there are no packets with external timestamps arriving the time of the packet processing will effectively stand still and most graphs will not make progress in live-mode.&lt;br /&gt;
&lt;br /&gt;
If one of the SRCMAC options is selected, all packets will be analyzed with all-zero MAC addresses.&lt;br /&gt;
&lt;br /&gt;
=== External original packet lengths ===&lt;br /&gt;
This option allows to enable the use of original packet length information contained in the packet data instead of the length of the packet as received. At this time only the Ixia/Keysight original packet length trailer format is supported.&lt;br /&gt;
&lt;br /&gt;
This feature can also be used in combination with the &#039;&#039;External timestamps&#039;&#039; option to support packets that contain a Ixia/Keysight trailer with both timestamp and original length information.&lt;br /&gt;
&lt;br /&gt;
===Memory utilization limit===&lt;br /&gt;
This option allows to reduce the limit until old data is removed from the in-memory database. By default the system tries to target 90% memory utilization. In some case, the load might be too high to match this limit. A smaller limit may enable the system to keep the target memory utilization and perform better in general.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Path_measurement&amp;diff=5134</id>
		<title>Path measurement</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Path_measurement&amp;diff=5134"/>
		<updated>2025-06-25T06:42:56Z</updated>

		<summary type="html">&lt;p&gt;Ralf: /* Settings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Path measurement ==&lt;br /&gt;
&lt;br /&gt;
The path measurement module allows to passively measure the packet loss and latency between two Allegro Network Multimeter installations.  &lt;br /&gt;
&lt;br /&gt;
For example, a network connection (line/link) between the main office and a remote office can be analyzed by installing one Allegro Network Multimeter at the main office and another Allegro Network Multimeter at the remote office.  &lt;br /&gt;
&lt;br /&gt;
Only network traffic (packets) passing through both Allegro Network Multimeters can be analyzed. The packet loss and two-way-latency thereof is measured and shown in graphs. &lt;br /&gt;
&lt;br /&gt;
The time synchronization setting (e.g. NTP/PTP or OFF) should be the same on both devices for the best results.&lt;br /&gt;
&lt;br /&gt;
It is also possible to use a single device to measure the traffic delay/losses between two different [[Virtual Link Group functionality|virtual link groups]]. In this mode, the primary device is used as a client too.&lt;br /&gt;
&lt;br /&gt;
Two pcap capture files can be compared to do an offline path measurement with previously captured files in two different locations.&lt;br /&gt;
&lt;br /&gt;
=== Live analysis ===&lt;br /&gt;
In live analysis mode, the packets are either gathered from the local device and a configured remote Allegro Network Multimeter, or from two different sources on the same local devices (different interfaces, different VLAN tags, or similar parameters available through virtual link group configuration).&lt;br /&gt;
&lt;br /&gt;
=== PCAP analysis ===&lt;br /&gt;
In PCAP mode, two PCAP files are processed the matching packets are used to determine the delay and possible loss between both files. For best results, the file should be recorded on the same device (by running two captures simultaneously from different sources), or from two devices with good time synchronization. &lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
The main device captures packet meta data from the remote (or client) device which takes only a fraction of the total traffic. Approximately 5% additional bandwidth is required for this capture connection. So for fully loaded 100 Mbit/s connection to the remote location an additional load of ~5 Mbit/s is required to get packet information to the main device.&lt;br /&gt;
&lt;br /&gt;
The measurement connection can be a separate line or can be run over the line that is measured, the capture connection will be automatically ignored for the measurement.&lt;br /&gt;
&lt;br /&gt;
The measurement module must be configured with a maximum packet delay.  This delay describes the amount of time the main device waits for packet information to arrive from the remote device. The delay must be large enough to cover the actual latency of the connection and delay of the capture connection. Typical values are between 2 and 5 seconds. Larger values requires more memory to buffer packet meta data so very large values might only be selectable on larger Multimeter devices (Allegro 1000 or greater).&lt;br /&gt;
== Configuration live measurement ==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; &lt;br /&gt;
|-           &lt;br /&gt;
|[[File:Ap-mm-path-measurement-1.png|600px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Settings ===&lt;br /&gt;
&lt;br /&gt;
* Enable analysis: This will disable or enable the path measurement feature. When disabled, no additional memory is used. When enabled, memory for the packet buffer is used which cannot be used for other analyzing modules thus reducing the maximum time the device can go back in time.&lt;br /&gt;
Primary device settings:&lt;br /&gt;
* Description of this main device: This field is only used for informational purposes to identify the main device. It can be freely chosen, for example to the location the device is installed. This field can also be left empty to use the default name &#039;&#039;&#039;main&#039;&#039;&#039;.&lt;br /&gt;
* &#039;&#039;&#039;Primary device VLG filter:&#039;&#039;&#039; It is possible to limit the amount of data analyzed by any configured virtual link group. Often, the primary device is located at a central network point and thus sees a lot of traffic that is not actually going to the remote device. The algorithm will automatically take this into account, but using a filter will reduce the processing overhead as well as the amount of data that needs to be buffered.&lt;br /&gt;
&lt;br /&gt;
The following &#039;&#039;&#039;Client device&#039;&#039;&#039; configuration section configures the access to the remote device:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Device to use&#039;&#039;&#039;: To use a remote device for path measurement, you first need to add that device as a remote device to the list of [[Multi-device settings]]. It does not matter if the device is active or not.  You can select the device from the list of known multi-devices. You can also select the primary device as a client to analyze the traffic between two different virtual link groups.&lt;br /&gt;
* &#039;&#039;&#039;Device description&#039;&#039;&#039;: Similar to the description of the main device, this field is for informational purpose only and has no other effect than helping identifying the remote device in the statistics. Usually the location of the remote device is entered.&lt;br /&gt;
* &#039;&#039;&#039;Client device VLG filter&#039;&#039;&#039;: The traffic used for comparison at the main device can be filtered to any virtual link group defined at the client device. There are two main purposes for this setting:&lt;br /&gt;
*# reduce the amount of data required to be transferred to the main device. The path measurement only considers connections seen on both devices, but the client device of course cannot know if any connection it sees also is visible on the main device. If only traffic of a specific virtual link group (VLG) actually reaches the main device, using this filter can reduce the amount of data transferred and later dismissed.&lt;br /&gt;
*# filter duplicate traffic: If, for some reason, traffic is seen multiple times, it can create wrong results as the number of occurrences differs from main to client devices. A VLG filter can fix this problem by only considering one part of the total traffic.&lt;br /&gt;
* &#039;&#039;&#039;GNSS-synchronized clocks&#039;&#039;&#039; (Firmware &amp;gt;= 4.5): If the selected device is a remote device and both primary and client device have GNSS time synchronization enabled, this option can be enabled to generate one-way latency instead of regular two-way latency.&lt;br /&gt;
&lt;br /&gt;
Measurement settings:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum packet delay&#039;&#039;&#039;: This field describes the maximum amount of seconds to wait for packet information from the remote device.&lt;br /&gt;
: It basically means that the main devices waits for this number of seconds before deciding if a packet has been lost or not. If the data from the remote device arrives before those number of seconds, the path measurement can account the packet loss, if any and the two-way latency. This value must be at least as large as the worst-case latency between both measurement sites.&lt;br /&gt;
: Usually 3 seconds are more than enough but when the network in between can have a very long delay, you can increase the value. This will, however, use more main memory for the packet buffer.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum original packet rate:&#039;&#039;&#039; This field defines the maximum packet rate that is to be expected. It directly defines the necessary amount of memory for storing packet information for the defined packet delay. The field can be left empty (or zero) to use the maximum supported packet rate of the device. This value usually only has to be adjusted if the debug information about &amp;quot;Packets processed too early&amp;quot; is non-zero which indicates that the packet rate exceeded the assumed packet rate limit.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Ignore IP identification field&#039;&#039;&#039;: This option can be enabled if the IP identification field in the IPv4 header is modified by some component in the network. Often it remains constant for a single packet so this option should be left disabled as it will also increase the chance of reporting duplicate packets. But if you notice symmetrical packet loss you can enable this option to see if this helps.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Ignore VLAN tags for connection matching&#039;&#039;&#039;: The path measurement only calculate loss and latency for connections seen on both devices. Usually the connection ID takes the IP pairs, port ports and possible VLAN tags into account. If a VLAN is different on both machines for the some connection, then this option must be enabled to be able to correlate the connection and calculate correct statistics.&lt;br /&gt;
* &#039;&#039;&#039;Account latency also per IP connection&#039;&#039;&#039;: Enabling this option will let the path measurement also store the latency for each individual IP connection, which of course increases the memory usage.&lt;br /&gt;
* &#039;&#039;&#039;Enable NAT mode&#039;&#039;&#039; (Firmware &amp;gt;= 4.3): This feature will enable support for Network-Address-Translation setup (typical for firewalls or internet uplink routers).&lt;br /&gt;
** &#039;&#039;&#039;NAT Private subnet/mask:&#039;&#039;&#039; This value describes the internal IP addresses that gets translated into an external IP address. An example value is &amp;quot;192.168.1.0/24&amp;quot; if all internal devices uses IP addresses in the range 192.168.1.0-192.168.1.255.&lt;br /&gt;
** &#039;&#039;&#039;NAT Public subnet/mask:&#039;&#039;&#039; This value defines the external IP address that internal IPs of the private subnet are translated to. It can also be an IP subnet (for example, if multiple external IP addresses are used). An example value is &amp;quot;10.1.2.3&amp;quot; if the NAT router is using the external IP 10.1.2.3 and all its internal clients are visible under this IP.&lt;br /&gt;
** &#039;&#039;&#039;Account unmatched flows:&#039;&#039;&#039; This option allows to monitor also connections there are not seen on the other measurement side. This is useful to see blocked connections in firewall setups.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Maximum packet length for lost packets PCAP&#039;&#039;&#039;: If a lost packet capture is running this setting configures the packet length for these packets. Keep this number as low as possible for optimal memory consumption. Each packet will be stored in memory until it is either confirmed by the client device (considered as not lost) or the maximum packet delay is over and the packet is considered lost and written to the PCAP.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Threshold for high latency packets PCAP&#039;&#039;&#039;: This is the threshold for a high latency PCAP. This is applied for single device measurement only. Packets with a larger time difference in their configured VLGs as this threshold can be captured. The latency value must not be larger than the maximum packet delay.&lt;br /&gt;
&lt;br /&gt;
The settings must be saved but to actually take effect, a restart of the packet processing is necessary. If this step is required, a notification will tell so at the bottom of the page under &#039;&#039;&#039;Required actions&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== Parameters currently in use ===&lt;br /&gt;
&lt;br /&gt;
This section shows the current state of the measurement engine. The engine might be inactive even if the feature is enabled. Usually a restart is required to actually make it active. If active, the current packet delay is shown. It might be different from the selected value in the configuration above, but if so a note appears that a restart is required.&lt;br /&gt;
&lt;br /&gt;
=== Required actions ===&lt;br /&gt;
&lt;br /&gt;
An info box appears if the a restart of the packet processing is required. The shown link leads to the page &#039;&#039;&#039;Settings → Administration&#039;&#039;&#039; where the restart can be triggered. The device itself does not need to be rebooted, only the packet processing must be restarted which usually takes only a few seconds.&lt;br /&gt;
&lt;br /&gt;
== Configuration PCAP measurement ==&lt;br /&gt;
[[File:Path-measurement-pcap-settings.png|border|660x660px]]&lt;br /&gt;
&lt;br /&gt;
The path measurement can also be done based on two capture files created from two different network locations. The separate configuration tab &amp;quot;Configuration PCAP Analysis&amp;quot;  allows to select two files from attached storage devices.&lt;br /&gt;
&lt;br /&gt;
The files are replayed based on the packet time stamps within each file, in chronological order. Matching packets are only recognized if they are within the maximum packet delay. If the difference of the timestamps is larger, a time-delta adjustment value can be entered which will be added to the timestamp of the client packets. Negative values are possible as well to be able to adjust the time in both directions. If the time difference is too large, a lot of packet loss are reported, or even a &amp;quot;network setup problem&amp;quot; note is shown in the overview tab. If the time delta between both files is not known, a test run can be enabled to calculate the approximate difference. When both files are fully processed in this test run, the result is shown in the overview tab and this value can be used for the actual analysis. &lt;br /&gt;
&lt;br /&gt;
The settings are similar to the live measurement. VLG filter can be applied to both files, but an option also allows to disable the use of the configured virtual link groups, or use separate groups for each file. In contrast to live mode, a VLG does not need to be used to differentiate traffic since it is clear from the selected file which one is the primary traffic and which one is the client traffic. But of course VLG can be used to filter out traffic that should not be part of the analysis.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Measurement settings&amp;quot; contains all settings from the live measurement plus three options only applicable in PCAP mode.&lt;br /&gt;
&lt;br /&gt;
* Virtual link group mode: Select to either use:&lt;br /&gt;
** Use global VLG settings: Use the VLG configuration configured globally on this device.&lt;br /&gt;
** Use separate VLG per file: Create a temporary VLG for each file so all statistics can be accessed for each individual file regardless of the configuration of the regular virtual link groups.&lt;br /&gt;
** Disable use of VLGs: Disable all VLG configurations and use one common view of all data.&lt;br /&gt;
* Run analysis in main memory: The analysis requires a relatively large amount of memory depending on the setting values for packet delay and packet rate. In live mode, this data is always kept in main memory for performance reasons, but in PCAP mode the data  is stored on a local storage device by default. This is slower but does not require a lot of additional memory reserved, especially when parallel pcap analysis is enabled.&lt;br /&gt;
* Storage device to use: If a storage device is available, the first one is selected by default. Otherwise the system disc is used to store the packet comparison information. The approximate amount of storage space required is shown below the selection box.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;IMPORTANT NOTE 1:&amp;lt;/u&amp;gt; The configuration values for packet rate and packet delay can be adjusted to reflect the actual parameters of the given PCAP files. The values are in relation to packet time of the PCAP files, not real time. So the packet rate does not correlate with the actual processing speed (which might be higher or lower than the packet rate within the PCAP files). The packet rate should be adjusted if the debug value &amp;quot;Packets processed too early&amp;quot; is non-zero. The default packet delay is set to 1 second to reduce the amount of memory required but should be adjusted to the expected maximum delay within the PCAP recording.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;IMPORTANT NOTE 2:&amp;lt;/u&amp;gt; If time stamp adjustment is used, all time stamps from the client file are adjusted which affects the analysis, but also the capture of these packets. So when doing a capture from that client file data, the packet time stamps are no longer the original timestamps but adjusted by the configured time delta.&lt;br /&gt;
&lt;br /&gt;
== Measurement statistics ==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable sortable&amp;quot; &lt;br /&gt;
|-           &lt;br /&gt;
|[[File:Ap-mm-path-measurement-2.png|600px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Measurement ===&lt;br /&gt;
The &#039;&#039;&#039;measurement&#039;&#039;&#039; tab show the real-time results of the ongoing measurement.&lt;br /&gt;
At the top the current state of the measurement engine and the remote connection is shown. &lt;br /&gt;
The measurement status can be &#039;&#039;&#039;not running&#039;&#039;&#039; if it is disabled, &#039;&#039;&#039;warming up&#039;&#039;&#039; if the engine waits for synchronization with remote device, and &#039;&#039;&#039;running&#039;&#039;&#039; if it actually measures data.&lt;br /&gt;
The &#039;&#039;&#039;remote client status&#039;&#039;&#039; indicates if the connection to the remote device is established. &lt;br /&gt;
Since the packet information are gathered real regular capturing from the remote device, the capture connection is visible in the capture section of the remote device and might be stopped there. &lt;br /&gt;
If the measurement connection is stopped or stopped working for other reasons (remote device unavailable, etc), the status box will turn red and a button appears to reconnect to the remote device. &lt;br /&gt;
If the reconnect fails, an error message appears with detailed information what was going wrong.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039; Typical errors are:&#039;&#039;&#039;&lt;br /&gt;
*remote device inaccessible (are the IP and port settings correct?)&lt;br /&gt;
* authentication error (invalid credentials?) When both boxes are green, the measurement is running and the four graphs show the real-time results.&lt;br /&gt;
* Insufficient memory: Usually may only appear in PCAP analysis mode indicating that the values for packet delay and packet rate are too large. Either reduce the values or use a larger storage devices capable of storing the required data (amount shown in the configuration section)&lt;br /&gt;
&lt;br /&gt;
==== Two-Way-Latency ====&lt;br /&gt;
&lt;br /&gt;
The first graph shows the latency measured from the main device to the remote device and back. &lt;br /&gt;
It cannot (due to asynchronous local time sources) measure the one-way latency of a single packet but only the duration of packets going in both directions.&lt;br /&gt;
Example: Assume a packet A is seen from main to remote device and another packet B is seen from remote to main device.&lt;br /&gt;
The time difference when packet A is seen on main and on remote device plus the time difference of packet B being seen on remote and main device is taken into account to determine the two-way latency. Packet A and packet B do not need to be related in any way.&lt;br /&gt;
If traffic is going only in one direction, the measurement will not show any time result (even though packet loss is still visible).&lt;br /&gt;
For each second, the average, minimum, and maximum two-way-latency is accounted and shown in the graph. &lt;br /&gt;
To the left of the graph the statistics for the visible time range is shown, changing the zoom level or time interval will update the values accordingly.&lt;br /&gt;
&lt;br /&gt;
==== One-Way-Latency ====&lt;br /&gt;
If the path measurement is used on a single device (by selecting the primary device as client device too), the one-way latency is shown for each direction instead of the two-way-latency. PCAP buttons are available for a capture of high latency packets that exceeds the configured threshold.&lt;br /&gt;
&lt;br /&gt;
==== Lost packets ====&lt;br /&gt;
&lt;br /&gt;
The second and third graph show the number of lost packets in each direction. Lost packets are only accounted for connections that have been seen on both devices.&lt;br /&gt;
&lt;br /&gt;
Depending on the installation point and routing setup, connections might be not be routed to the second device on purpose. These connections are not accounted as loss on the other device. &lt;br /&gt;
&lt;br /&gt;
The second graph accounts all packets that have been seen on the remote device, but are missed on the main device. That means that those packets got loss on its way to the main device.&lt;br /&gt;
&lt;br /&gt;
Accordingly, the third graph accounts all packets that have been seen on the main device, but are missed on the remote device. An additional counter &amp;quot;&#039;&#039;&#039;Client packet drop due to overload&#039;&#039;&#039;&amp;quot; indicates if some packets could not have been captured on the client device so they are missing for comparison at the main device.  If this value is not zero, those packets are accounted as packet loss even though it might not be actually losses. For correct measurements, make sure the graph for remote packet drops is never non-zero. These drops may happen due to several reasons:&lt;br /&gt;
&lt;br /&gt;
A capture button for lost packets is available for capturing packets seen on main device but considered as lost on the remote device. The capture is available for live mode only, i.e. if a time interval is selected in the Allegro Network Multimeter it will be ignored. When starting the capture, the path measurement engine will store all packets on the main device with the configured length and write them after the packet delay timeout into the PCAP. Only packets of the main device are considered (packets lost on main device but seen on remote device will &#039;&#039;&#039;not&#039;&#039;&#039; be captured). For a single device measurement between different VLGs the lost packets PCAP buttons are available for both directions (main to remote or remote to main).&lt;br /&gt;
&lt;br /&gt;
#System capture overload: If multiple captures are running in parallel, the CPU might be overloaded. Check the &#039;&#039;&#039;All&#039;&#039;&#039; tab in the Capture page to see how many captures are running.  In best case there is only the one capturing connection to the main device.&lt;br /&gt;
#The capturing connection is encrypted with SSL. The small Allegro 200 has a limited encryption capacity so for large traffic this can be a bottleneck. The only solution is to use a more powerful Allegro Network Multimeter.&lt;br /&gt;
#Capture drops can also occur if the network connection is not capable of transferring the data fast enough. Rule of thumb is that approximately 5% of the total traffic is used for the measurement connection. For example, if the traffic is 500 MBit/s, the measurement requires ~25 MBit/s of bandwidth on the management port.&lt;br /&gt;
&lt;br /&gt;
==== Monitored packet rate ====&lt;br /&gt;
The fourth graph shows all packets that are monitored for the path measurement. This will cover all connections that have been seen on both devices.&lt;br /&gt;
&lt;br /&gt;
==== NAT collision packet rate ====&lt;br /&gt;
This graph shows the number of packets per second that appeared in connections with colliding IP addresses/ports in NAT setups. This happens if matching packets are seen on both sides for more than two connections (the internal and the external connection). Since this is only relevant for matching packets within the defined timeout, it may help to reduce the timeout if possible.&lt;br /&gt;
&lt;br /&gt;
=== IP addresses ===&lt;br /&gt;
&lt;br /&gt;
The second tab shows packet loss information for each pair of [[Common table columns#IP|IP addresses]]. This statistic covers all IP connections that has been seen on both measurement sides. The table shows the number of packets that have been counted for each communication pair. Additionally the number of packets seen on the main device and the corresponding packet loss is shown. The same statistics are shown for the client device too. You can click on the IP address to go to the detailed statistics of the IP module to check which kind of traffic was happening for that IP. Two graphs are shown for each IP pair which shows the packet loss for both direction on one graph and the total packets in the second graph.&lt;br /&gt;
There is also a capture button to capture traffic for the IP pair.  The captured traffic is only the traffic seen on the main device, it will not contain any packet from the client device as the main device does not have the packet data information available. To capture traffic from the client device, you have to go to the web interface of the client device and start a capture on that device.&lt;br /&gt;
&lt;br /&gt;
The IP pair table also show the two-way latencies for the traffic of each IP pair, if the corresponding toggle is selected above the table. In single-device mode, also the one-way latency is shown.&lt;br /&gt;
&lt;br /&gt;
For each IP, there is also a link to the IP connections. If enabled, each individual IP connection also stores the latencies for more detailed view.&lt;br /&gt;
&lt;br /&gt;
==== Switching graph modes ====&lt;br /&gt;
&lt;br /&gt;
The toggle buttons above the graphs allow to switch the graph modes from absolute values to relative values. This setting will show the lost packets in relation to the total (monitored) traffic.  The second option allows to show Mbit/s throughput instead of the packet rate.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
There are some limitations about the path measurement:&lt;br /&gt;
&lt;br /&gt;
# Due to technical reasons, large clock adjustments cannot be filtered out. So in such cases, a very large two-way-latency is measured. Both devices need not be time synchronized per se, however, considerable time differentiation must be avoided. This means that time synchronization (e.g. NTP/PTP) should either be enabled or disabled on both devices for best results. Clock differentiation miss-measurements are however one-time events, and will not lead to false values for the following packets.&lt;br /&gt;
# The maximum supported packet size for the path measurement is currently 2048 bytes. Larger packets are truncated for the measurement.&lt;br /&gt;
# WAN optimizer and similar devices which rewrite some of the traffic are not supported either. If packet data is changed (like modifying the TCP header, adding TCP options, etc) the flow will account packet loss on both sides as the original packets are not seen on the other side. If the device in between also modifies the IP addresses or ports, the flows will be accounted as unmonitored.&lt;br /&gt;
# The global setting for the packet length accounting should be set to the same value on both devices. Otherwise identical packets might be considered different because of different length and the bandwidth information will be inconsistent.&lt;br /&gt;
# (Only firmware &amp;lt; 4.3): NAT setups and different VLAN combinations on main and client are not supported at the moment. Such flows will be accounted as unmonitored flows in the debug view.&lt;br /&gt;
&lt;br /&gt;
== Typical use cases==&lt;br /&gt;
&lt;br /&gt;
See [[Analyze connections between remote sites]] to get a detailed overview of use cases and device setup.&lt;br /&gt;
&lt;br /&gt;
==  Debug information ==&lt;br /&gt;
&lt;br /&gt;
The debug information tab shows additional statistics which are usually only relevant for identifying problems in the path measurement, either program errors or test setup errors.&lt;br /&gt;
&lt;br /&gt;
#&#039;&#039;&#039;Monitored flows seen on both devices:&#039;&#039;&#039;The monitored flows describes all IPv4 and IPv6 connections that have been seen on both devices and are used for calculating the latency and packet loss. Only this traffic can be considered for the actual measurement. In a working setup, the value must be non-zero.&lt;br /&gt;
#&#039;&#039;&#039;Flows seen on both devices without matching packets:&#039;&#039;&#039; If a flow is seen on both devices but not a single packet matches on both sides, it indicates a potential network setup problem. This probably means the packet is somehow modified by a device in between both measurement points. This setup is not supported. Usually this value should be zero. Small non-zero values can be ok, if the first number of monitored flows is much larger.&lt;br /&gt;
#&#039;&#039;&#039;Unmonitored flows seen only on &#039;&#039;main&#039;&#039;:&#039;&#039;&#039; This counter shows the number of IP connections that are only visible at the main device. It means that for those connections no matching client packet has been received. If the main device also sees network traffic that is not routed to the client device, this value can be non-zero.&lt;br /&gt;
#&#039;&#039;&#039;Unmonitored flows seen only on &#039;&#039;client&#039;&#039;&#039;&#039;&#039;: This is the same counter as for the main device, but counting the connections on the client device that have not been seen on the main. Again, if the client device sees traffic that is not routed to the main, it is fine to see non-zero values here.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Possible problematic scenarios:&lt;br /&gt;
&lt;br /&gt;
* There is a device between main and client that modifies the traffic (like a WAN optimizer): You will notice a larger value for counter 2 (flow without matching packets),almost zero value for counter 1 (flows seen on both devices).&lt;br /&gt;
&lt;br /&gt;
* There is a device between main and client that changes ports and IP addresses (a NAT): &lt;br /&gt;
&lt;br /&gt;
You will notice almost zero values for counter 1 and 2, but high values for counter 3 and 4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Both scenarios are not supported by the path measurement.  &lt;br /&gt;
&lt;br /&gt;
Please adjust the test setup to disable any device modifying the network as described above.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The table below shows the following counters for the main and remote device:&lt;br /&gt;
&lt;br /&gt;
#The counter about packets seen on all devices measures the total amount of packets monitored and considered for the analysis.&lt;br /&gt;
#The packets seen only on one devices indicates how much packets are lost on the other devices.&lt;br /&gt;
#Duplicated packets: This counter includes packets that are duplicated or have the same checksum. It is valid to see non-zero values here. Some protocols like broadcast actually do not differ in the payload so the packet checksum will be identical. If those packets appear within the packet delay time window, it is accounted as a duplicate to the previous one.&lt;br /&gt;
#Failed to process on main device: This counter indicates that packets from the client have been discarded due to overload of the main device. The main device was not fast enough to process client packets. This usually means the local packet rate (at the main device) is too high. &lt;br /&gt;
# Ignored on main device: These packets are ignored because the flow is unknown to the main devices. This happens when the packet checksum is received from the client but no connection information for that packet is known by the main device. This value should always be zero. Otherwise it means that the number of active flows is too high.&lt;br /&gt;
#Packets processed too early: This counter covers packets that packets could not be stored long enough to hit the configured packet delay limit.  This happens when the packet rate is higher than the supported packet rate of the main device.&lt;br /&gt;
#NAT collision packets: This counter counts all packets that are seen on both sides for multiple connections so the Network Address Translation could not be reversed for connection tracking.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Below the table, two graphs showing time drift information are visible. &lt;br /&gt;
The first graph shows the &#039;&#039;&#039;packet delay&#039;&#039;&#039;. It is the time between a matching packet from the main device and the client. &lt;br /&gt;
This value describes for how long the main device needed to wait to get a matching packet from the client. &lt;br /&gt;
This value should always be much lower than the maximum packet delay configured in the path measurement configuration. &lt;br /&gt;
The value cannot be larger than the maximum as then packets can no longer be matched. If the value keeps reaching the maximum, two problems are possible:&lt;br /&gt;
&lt;br /&gt;
#The delay between main device and client is large due to generic network delay. For example, if a high-latency connection is used for path measurement, it can even take a few seconds for a packet info to arrive. Configure a larger maximum packet delay.&lt;br /&gt;
#The bandwidth of the connection from the client (the client’s upload speed) is too small to satisfy the requirement for the checksum connection. This problem can be identified if even increasing the maximum packet delay does not help. If the bandwidth is too small, the packet will hit the maximum delay for any value configured, it will just take a little longer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In this case try to use an alternative network connection to connect to the client device.&lt;br /&gt;
&lt;br /&gt;
The second graph shows the time drift between the main device and client device. &lt;br /&gt;
Usually there will always be a drift between the clocks of both devices (if they are not synchronized by some mean). Even large drifts (hours, days, etc) are typically not a problem as the two-way latency zero-out the drift. &lt;br /&gt;
But if the drift increased dramatically (like multiple seconds) constantly over a large period of time, it usually indicates a bandwidth overload just like the first graph.&lt;br /&gt;
&lt;br /&gt;
== FAQ ==&lt;br /&gt;
# What does the note &#039;&#039;&#039;Network setup problem detected: Packet modification or complete loss&#039;&#039;&#039; means?&lt;br /&gt;
#:This message box appears if flows have been identified for which not a single packet could be seen on both sides. Usually this means that there is some device in between both measurement points that modifies the packet. This can be WAN optimizer which rewrite TCP connection for improved network performance. Such setup is not supported.&lt;br /&gt;
#: It can also mean that some other packet field is modified at some point in the network. One field that is known for modification is the IP identification field in the IPv4 header. For this case an additional option can be enabled to ignore this field.&lt;br /&gt;
#: When using the PCAP analysis mode, this error can also appear if the files are not time synchronized. In this case, a time adjustment value must be entered to synchronize both files. A test run can be used to calculate a possible value.&lt;br /&gt;
# What does the note &#039;&#039;&#039;VLAN tag mismatch detected for matching packets on main device and client&#039;&#039;&#039; means?&lt;br /&gt;
#:This message indicates that matching packets have been seen on both devices but the used VLAN tag is different. Depending on the measurement setup, this may indicate an error as for connection matching the IP addresses, ports, and VLAN tags are used unless the option to ignore the VLAN tag is enabled. Therefore, the identical packets will be accounted for two different connections often resulting in shown packet loss.&lt;br /&gt;
#: Often, the recommended solution is to enable the configuration option &#039;&#039;&#039;Ignore VLAN tags for connection matching&#039;&#039;&#039;.&lt;br /&gt;
# What kind of packet information is used to determine latency and packet loss?&lt;br /&gt;
#:Both measurement devices calculate checksums starting from the layer 3 packet data to compare packet information on both sides.  This means for IPv4 and IPv6 traffic, the Ethernet header including possible VLAN tags is ignored. For non-IP traffic, the complete layer 2 packet is used so this traffic can only be analyzed in switched networks.&lt;br /&gt;
# What can I do if I think the packet loss is wrong?&lt;br /&gt;
#: Often, incorrect loss is reported because there is some kind of packet modification that is not support. See the list of limitations above if any of those apply to your setup. Also, try the configuration options to ignore some packet fields to see if that makes any difference.&lt;br /&gt;
#: You can contact [[Reaching Allegro Support|our support]] and if possible provide a small capture from both network sides that cover the same traffic. This will help us to find the reason for the shown packet loss.&lt;br /&gt;
# How can I distinguish between real packet loss and reported packet loss due to packet modifications?&lt;br /&gt;
#: Packet loss is reported when a packet checksum does not match any other checksum reported by the other side within the configured maximum packet delay timeout. Reasons for such an event are&lt;br /&gt;
## Actual loss&lt;br /&gt;
##: The packet have been seen on one side but not the other. In this event the loss graph is usually different between the main device and remote device.&lt;br /&gt;
## Packet modification&lt;br /&gt;
##: Some component modifies the packet in some way. Since such a modification is usually done in both direction (sender and receiver), the packet loss is visible on both sides. Therefore the loss graph is symmetrical.&lt;br /&gt;
## Overloaded management connection&lt;br /&gt;
##: The management connection is used to get packet checksum from the remote device. If the connection is not fast enough to transmit the checksum within the configured maximum packet delay time, the packets are then reported as loss.&lt;br /&gt;
##: This can be verified by looking at the debug graph &#039;&#039;&#039;Packet delay between local and remote packets&#039;&#039;&#039;. In this event, the time will always be at the top limit that is the maximum packet delay time.&lt;br /&gt;
## Temporary network failure&lt;br /&gt;
##: In this event the packets are really lost on both directions so the loss graph may also look similar. However, since no packet can be transmitted to the other side, you will also see no entries in the two-way-latency graph.&lt;br /&gt;
# How is the two-way latency calculated?&lt;br /&gt;
#:The system monitors individual IP connections and stores the time difference between the occurrence of the same checksum on both the main and client devices. Since this time difference contains the unknown time drift between both systems, it cannot be used directly as a latency value. Instead, the system waits until a packet from the opposite direction has been seen on both systems. Both time differences for direction A-&amp;gt;B and B-&amp;gt;A build the actual two-way latency. Since both packets may not be directly related, it is not directly comparable with a round-trip time. It gives however an accurate view on how long data took transmitting back and forth during each individual time segment.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=5084</id>
		<title>Longterm DB</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=5084"/>
		<updated>2025-05-14T10:06:57Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
The Long-term DB feature (in firmware &amp;gt;= 4.3) uses an attached storage devices to store traffic information of IP addresses and Layer 7 protocols with low resolution for a much longer time than the live statistics.&lt;br /&gt;
&lt;br /&gt;
The elements stored in the long-term DB are as follows, graph data is available in 5 minute resolution: &lt;br /&gt;
&lt;br /&gt;
* IP addresses&lt;br /&gt;
*# activity time&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
* Layer 7 protocols&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
&lt;br /&gt;
The storage is used similar to a swap file mechanism. The long-term data needs to be written in a format readable by new versions. Since firmware version 4.5, this is done automatically on restarts. An option allows to write the DB back into a persisted format on a daily basis. &lt;br /&gt;
&lt;br /&gt;
==Usage==&lt;br /&gt;
[[File:Longterm DB dashboard.png|alt=Long-term DB activated dashboard|thumb|Long-term DB activated dashboard]]If this feature is enabled, a view toggle button appears in the top menu bar. This button allows to switch between the real time &amp;quot;RT&amp;quot; view and the long-term (&amp;quot;LT&amp;quot;) view.&lt;br /&gt;
&lt;br /&gt;
In the long-term view, the IP address information contain only information about the traffic amount in 5 minute resolution.&lt;br /&gt;
&lt;br /&gt;
The navigation menu in the long-term view only contains those modules which are available in this view.&lt;br /&gt;
&lt;br /&gt;
If the long-term view is activated on module pages which do not support long-term data, a corresponding info box is shown.&lt;br /&gt;
&lt;br /&gt;
==Setting==&lt;br /&gt;
The configuration can be found in the global settings page in the &amp;quot;Long-term DB and persistence&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
* To enable this feature, select a storage device to be used, enable the feature and enter a file size. The &amp;quot;required storage space&amp;quot; field shows how much memory is actually used which is usually at least double the configuration long-term DB size (due to additional space required for data persistence).&lt;br /&gt;
* The option &amp;quot;Data persistence mode&amp;quot; allows to select an alternative mode which also dumps parts of the live database onto disc. This increases the amount of space and time required to write the data and is usually not necessary.&lt;br /&gt;
* The long-term data base can be persisted once per day by enabling the corresponding option and selecting a time of day where the dump should happen. It is recommended to enable this option and to choose a time with less traffic then usual to avoid system overload during the dump time.&lt;br /&gt;
&lt;br /&gt;
Once enabled, the utilization of the file is shown and the [[System Info Page]] contains information about how long the data can be kept.&lt;br /&gt;
&lt;br /&gt;
Tip: Since the amount of information stored in the long-term DB is limited by the graph resolution, the file size usually don&#039;t need to be similar sized as the main memory. 10 GByte is a good starting point.&lt;br /&gt;
&lt;br /&gt;
The size can be increase but it requires a restart of the packet processing.&lt;br /&gt;
&lt;br /&gt;
[[File:DB persistence settings.png|thumb|Long-term DB settings]]&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
Recommended storage device types:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Storage device&lt;br /&gt;
!Note&lt;br /&gt;
|-&lt;br /&gt;
|NMVe based SSD&lt;br /&gt;
|recommended&lt;br /&gt;
|-&lt;br /&gt;
|SATA based SSD&lt;br /&gt;
|can be used for moderate traffic, check system load for high system utilization&lt;br /&gt;
|-&lt;br /&gt;
|USB based SSD&lt;br /&gt;
|not recommended, but might be useful for small systems (Allegro 200/500/510)&lt;br /&gt;
|-&lt;br /&gt;
|HDD&lt;br /&gt;
|not recommended, should not be used&lt;br /&gt;
|}&lt;br /&gt;
It is also not recommended to place the long-term DB on the same storage device that is used a packet ring buffer as it will deteriorate the performance of both features.&lt;br /&gt;
&lt;br /&gt;
The feature can be disabled temporarily and the last snapshot of persisted data is still kept. To remove this data permanently, use the delete buttons at the bottom of the configuration page.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
# The data in the long-term DB is limited to a selected subset of the data in the In-Memory-DB. See above for an exact list of elements available.&lt;br /&gt;
# The data is written into the long-term DB in variable intervals depending on traffic and system load. It takes up to 10 minutes (two graph intervals) until the data appears in the graph. Therefore, the last 5-10 minutes appear empty or with less traffic than in live view.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=DB_persistence&amp;diff=5083</id>
		<title>DB persistence</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=DB_persistence&amp;diff=5083"/>
		<updated>2025-05-14T10:04:56Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Note: Since firmware version 4.5, this feature is merged with the long-term DB feature and no separate configuration is required anymore.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The DB persistence feature (in firmware &amp;gt;= 4.2) can write parts of the In-Memory database onto an selected storage device when stopping the packet processing (either manually or when rebooting the device). On restart, the stored data is imported again to make some data available again after restart.&lt;br /&gt;
&lt;br /&gt;
The stored data comprises:&lt;br /&gt;
[[File:DB persistence settings.png|thumb|DB persistence settings]]&lt;br /&gt;
* the list of MAC addresses and their direct graphs, not including the per-element tables.&lt;br /&gt;
* the list of IP addresses and their direct graphs (traffic, retransmissions and other TCP stats for that IP address), not including the per-element tables.&lt;br /&gt;
* the IP groups data (same elements as the IP addresses).&lt;br /&gt;
* the Layer 7 protocol traffic graphs.&lt;br /&gt;
&lt;br /&gt;
The feature must be enabled in the global settings in the &amp;quot;Long-term DB and persistence&amp;quot; tab. The storage device must be selected and should be reasonable fast. We recommend using SSD storage only as it can take a few seconds to a few minutes on such fast disc but much longer on slower spinning discs.&lt;br /&gt;
&lt;br /&gt;
The configuration sections shows the estimated required space on the storage device. Since the amount of data stored depends on the actual number elements (IP addresses etc), it may vary and the process will use less memory if possible or try to use more memory if necessary.&lt;br /&gt;
&lt;br /&gt;
The processing restart dialog will allow to disable dump and/or restoration for one time.&lt;br /&gt;
&lt;br /&gt;
The dialog also shows progress during restart which also to cancel the operation.&lt;br /&gt;
&lt;br /&gt;
The configuration dialog also shows the size of the persisted data and allow to remove it.&lt;br /&gt;
&lt;br /&gt;
=== Additional options ===&lt;br /&gt;
&lt;br /&gt;
* With longterm DB, skip writing live data onto storage device (reduces dump/restore time): Since Firmware version 4.3, the [[Longterm DB]] is also stored on the SSD. To reduce the amount of time needed for dump and restore, the dump of the live data can be disabled since this is usually much more data and it might not be necessary to write this as well.&lt;br /&gt;
* Since firmware version 4.5, it is also possible to enable a periodic dump once per day. In case of unexpected loss of power or other restarts, the last dump will be automatically read in on restart. The configuration settings allows to select any full hour of the day. It is recommended to choose an hour with less traffic then usual as the dump process increases the load of the system.&lt;br /&gt;
&lt;br /&gt;
=== Limitations ===&lt;br /&gt;
&lt;br /&gt;
* Data dump and restoration works between the same firmware version and also between different firmware version but due to increasing feature set, importing data from a newer firmware (when downgrading) may not work always. In this case the import will be only partial and normal operation continues.&lt;br /&gt;
* Some setting changes will make the import of some data impossible:&lt;br /&gt;
** Changing the resolution of graph data is not supported for the DB persistence feature. The import will skip data from written with different settings.&lt;br /&gt;
* As with all data on storage devices, the configuration of factory reset will not delete the persisted DB data and it must be removed manually by either selecting the button in the configuration dialog or by formatting the storage device.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Global_settings&amp;diff=5082</id>
		<title>Global settings</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Global_settings&amp;diff=5082"/>
		<updated>2025-05-14T10:03:08Z</updated>

		<summary type="html">&lt;p&gt;Ralf: /* Long-term DB and persistence (BETA) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Global settings section contains parameters for adjusting the behavior of the system.&lt;br /&gt;
The settings are split among multiple tabs, described as follows.&lt;br /&gt;
&lt;br /&gt;
== Generic settings ==&lt;br /&gt;
&lt;br /&gt;
=== Packet processing mode ===&lt;br /&gt;
&lt;br /&gt;
This section allows for configuring the main packet processing mode:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Bridge mode&#039;&#039;&#039;: In Bridge mode A.K.A. In-Line mode, all received packets will be transmitted between corresponding port pairs (e.g. 1+2, 3+4 on Allegro 500/510) so that the Allegro Network Multimeter can be placed in-line between any network component.&amp;lt;br/ &amp;gt;The device will operate transparent and will not modify network traffic in any way. The additional latency will be typically around or less than 1 millisecond.&amp;lt;br&amp;gt;In Bridge mode it is also possible to process network traffic from a mirror port or Tap. However, &amp;quot;only&amp;quot; half of the total available ports on each respective Allegro Network Multimeter model can be used to operate in this way.  For example on a 4-port Allegro model 500, you can conveniently leave the unit in bridge mode and connect up to two mirror ports on interfaces 1 and 3 respectively. Aforementioned interfaces are physically separated and not an (in-line) interface pair.&amp;lt;br /&amp;gt;Always avoid connecting mirror port traffic on an Allegro Network Multimeter interface pair (e.g. 1+2, 3+4 on Allegro 500/510), as this will result in TX traffic in the direction of a mirror port which if highly undesirable.&amp;lt;br /&amp;gt;[[File:Inline mode.jpg|800px|Allegro in brigde mode (in-line)]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Sink mode&#039;&#039;&#039;: In Sink mode, the Allegro Network Multimeter will operate &amp;quot;receive only&amp;quot;.&amp;lt;br /&amp;gt;Packets are not forwarded and there&#039;s no bi-directional traffic on any of the monitoring ports. This operation mode allows for installation at a Mirror port of a Switch or when using a network Tap to access the network traffic.&amp;lt;br /&amp;gt;[[File:Sink mode1.jpg|800px|Allegro in Sink mode on Mirror port or Tap]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Mixed bridge/sink mode:&#039;&#039;&#039; This mode enables to configure the packet processing mode for each interface pair. Interface pairs default to Bridge mode but the mode can be permanently changed in the [[interface statistics]].&lt;br /&gt;
&lt;br /&gt;
The packet processing mode can be changed during runtime.&lt;br /&gt;
 &lt;br /&gt;
Attention: Please always keep in mind, that while in bridge mode (Allegro Network Multimeter = in-line), a Link will be (shortly) interrupted when switching processing mode or/and rebooting the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
=== Endpoint mode ===&lt;br /&gt;
&lt;br /&gt;
If the endpoint mode is enabled for an interface, this interface will only process packets sent to the configured IP address (and potentially the port). If the system is running in bridge packet processing mode, links with an interface configured for endpoint mode will not forward traffic. The following types of traffic are supported:&lt;br /&gt;
&lt;br /&gt;
* Ethernet packets encapsulated in GRE or GRE+ERSPAN and targeted for the configured IP address.&amp;lt;br /&amp;gt;The system will process the packets as if only the inner encapsulated packet is seen and any traffic captures will only contain the encapsulated packet.&lt;br /&gt;
* UDP packets to specific port (packets will be analyzed as is).&lt;br /&gt;
&lt;br /&gt;
An interface with endpoint mode enabled will respond to ARP requests and to ICMP echo requests so it is possible to use ping to verify that the interface is reachable under the configured IP address.&lt;br /&gt;
&lt;br /&gt;
It must be noted that if the system is running in bridge packet processing mode, any links with an interface configured for endpoint mode will not forward traffic.&lt;br /&gt;
&lt;br /&gt;
VLAN tag handling is not supported. The Allegro Network Multimeter will accept ARP and ICMP requests with any VLAN tags but will send replies without VLAN tagging.&lt;br /&gt;
&lt;br /&gt;
Note: In versions 3.0 or older, the mode was named &amp;quot;l3 tunnel mode&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Webshark support ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter allows having a preview of packets, directly in the browser. This is the so called Webshark. To support Webshark previewing, the Allegro Network Multimeter needs to reserve an amount of system memory.&lt;br /&gt;
&lt;br /&gt;
This reserved amount of memory (RAM) is configurable and will not be available for the In-Memory database, thus the history of stored statistics in the dashboard becomes a little shorter. If this is not desired, it is possible to disable the Webshark support.&lt;br /&gt;
&lt;br /&gt;
Multiple parallel sessions/instances of Webshark previewing within one Allegro Network Multimeter is possible. The number of simultaneous Webshark instances and max. preview file size (e.g. 5MB) are configurable but may vary depending on Allegro model and installed RAM.&lt;br /&gt;
&lt;br /&gt;
Changing Webshark parameters requires a restart of the processing.&lt;br /&gt;
&lt;br /&gt;
[[File:Webshark.jpg|900px|Built in Webshark - Allegro Network Multimeter ]]&lt;br /&gt;
&lt;br /&gt;
=== Snort analysis===&lt;br /&gt;
{{Warning|title=Beta Feature|This feature is still in active development and is therefore subject to changes in the future. There may be bugs or unexpected behavior when using this feature.}}&lt;br /&gt;
The Allegro Network Multimeter is able to perform intrusion detection based on the [https://www.snort.org/ Snort] software project. The detection can be performed on live traffic or ring buffer traffic. This analysis is invoked via the capture dialog on any page and respects the same capture filter expressions as a normal traffic capture. &lt;br /&gt;
[[File:Snort Analysis Results.png|thumb|Snort Analysis Results]]&lt;br /&gt;
This feature is disabled by default, to enable it navigate to Global Settings &amp;gt; Snort Analysis and enable it via the toggle switch. Once enabled a new setting will appear to regulate the allowed memory usage by the intrusion detection. The user is able to set a hard maximum limit on the usable memory, and if the Snort process exceeds this limit it will be killed by the OOM-Manager. Additionally, another soft memory limit will be installed just below the hard maximum, and if the process reaches this limit it will be throttled heavily. If your intrusion analysis appears to get stuck or is unusually slow, a good troubleshooting step is to increase the memory limit. It is generally not recommended to keep the memory limit below 200MB. &lt;br /&gt;
&lt;br /&gt;
When invoking the analysis a new modal will open which displays the results of the analysis. The result modal is a list of detected incidents, sorted by order of appearance. An entry in this list has the following structure: &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Severity&lt;br /&gt;
!Time&lt;br /&gt;
!Classification&lt;br /&gt;
!Message&lt;br /&gt;
!Connection&lt;br /&gt;
|-&lt;br /&gt;
|This is denoted by the color on the left hand side of the row.&lt;br /&gt;
|The packet timestamp of the offending packet.&lt;br /&gt;
|A normalized name for the type of incident that occured.&lt;br /&gt;
|A more detailed description of the incident&lt;br /&gt;
|A diagram of the connection in which the incident occured. The IPs can be clicked to go to the IP detail page, and on the right there is an &amp;quot;external link&amp;quot; icon that opens the connection details page in a new tab.&lt;br /&gt;
|}&lt;br /&gt;
Additionally, on the right hand side of the modal is another color band that serves as a rough overview over all incidents. The band is static and roughly aligned with the scroll bar to make it easier to navigate to specific severity incidents.&lt;br /&gt;
&lt;br /&gt;
Snort works by reading a rule file which contains a list of rules used to match packets against. These rules can match subnet, direction, protocol, payload contents, and more (see the Snort documentation for more information on rules), and are given a classification, message and priority, which are displayed in the analysis results. Internally this feature uses a community rule set which is available for free and receives periodic updates. &#039;&#039;&#039;Note:&#039;&#039;&#039; The Allegro Network Multimeter (currently) does NOT automatically update this rule set. We are deploying the same rule set to all devices independent of the date of installation. Thus the analysis may not be able to detect zero day exploits and should not be relied on when trying to detect recently discovered attack vectors.&lt;br /&gt;
&lt;br /&gt;
At the moment, only critical and severe incidents are reported (Snort priorities 0 and 1). The classification and message strings are taken directly from the rule that triggered this incidents.&lt;br /&gt;
&lt;br /&gt;
===Detail of traffic analysis===&lt;br /&gt;
&lt;br /&gt;
Limit module processing, allows you to configure which OSI-layers (2,3,4,7) are actively processed and analyzed by the Allegro Network Multimeter. With this setting, the performance of the Allegro Network Multimeter can be significantly improved and allows for higher throughput when disabling some analysis modules.&lt;br /&gt;
&lt;br /&gt;
For both realtime and offline parallel analysis, the following modes are possible :&lt;br /&gt;
&lt;br /&gt;
*Only capturing: Only interface statistics and the capture module is provided. Capture filters are supported without Layer 7 protocol specification/recognition.&lt;br /&gt;
*Capturing and protocol detection: Additionally Layer 7 protocol specification in Capture filters will now work.&lt;br /&gt;
*Up to Layer 2: Additionally all Layer 2 related modules are active such as MAC, MAC protocols, ARP and Burst Analysis.&lt;br /&gt;
*Up to Layer 3: Additionally all Layer 3 related modules are active such as IP and DHCP statistics.&lt;br /&gt;
*Up to Layer 4: Additionally all Layer 4 related modules are active such as TCP and Layer 4 server ports.&lt;br /&gt;
*Unlimited: All Allegro Network Multimeter modules are active.&lt;br /&gt;
&lt;br /&gt;
When switching to another mode you need to restart the processing in order to activate the new settings.&lt;br /&gt;
&lt;br /&gt;
NOTE: The data recorded to/stored in the Packet Ring buffer, will NOT be affected by any of the above settings. Packet ring buffer capture rules may be configured under &amp;quot;Generic - Packet Ring Buffer&amp;quot;, further explained in our wiki here https://allegro-packets.com/wiki/Packet_ring_buffer#Packet_ring_buffer_snapshot_length_filter&lt;br /&gt;
&lt;br /&gt;
====Enable single flow load balancing====&lt;br /&gt;
When the &#039;&#039;Limit module processing&#039;&#039; slider is turned to &#039;&#039;Only capturing&#039;&#039; the option to enable &#039;&#039;single flow load balancing&#039;&#039; appears. If this option is enabled, even a single flow is load-balanced to different analyzer threads.&lt;br /&gt;
&lt;br /&gt;
This is only recommended when there are very few flows and there is an imbalance in the load of the analyzers. As the packets of a single flow are processed by different analyzers the packets of the flow may be stored out-of-order in the Packet Ring Buffer and a larger amount of memory may be required to reorder the packets when capturing from the Packet Ring Buffer (see [[Capture module#Configuration settings|Capture module]] configuration settings). &lt;br /&gt;
&lt;br /&gt;
===Graph detail settings===&lt;br /&gt;
&lt;br /&gt;
It is possible to modify the detail level of all graphs in the interface. This settings allow you to see a more detailed view (with higher time resolution) or to reduce the detail level so more data can be stored on the device. Changing the default values has an impact on the performance and memory usage. Changing a slider to the left increases the detail level of graphs, but increases memory usage and decreases performance.&lt;br /&gt;
&lt;br /&gt;
*Best graph resolution: This option configures how detailed the graph information are shown in the best case (the latest information). The default value is one second which means that a graph sample point represents a second of packet time. You can change the resolution up to 1 millisecond which gives a detailed sub-second representation of the traffic. You can also decide to decrease the resolution which enables the Allegro Network Multimeter to store more data for a longer period of time.&lt;br /&gt;
&lt;br /&gt;
*Reduce graph resolution of old data by up to: The resolution of older graph data is automatically reduced to save memory and to allow a longer view into the traffic history. This option allows you to change this behaviour. With a reduction factor of 1/1 no reduction is done at all which means the selected graph resolution is available for the complete time.&lt;br /&gt;
:This reduces the time period to see historical data. You can choose to increase the reduction factor to store more data for a longer period. The time printed in parentheses represents the worst-case graph resolution based on the chosen resolution and reduction factor. The reduction is done in multiple steps up to this limit. The newest data always has the highest resolution defined by the &amp;quot;Best graph resolution&amp;quot; setting above. Between 60 and 120 data points are stored at a minimum, so with default resolution of 1 second, between one and two minutes are available in the highest resolution. Due to internal compression, the exact number of data points cannot be foreseen but 60 data points are always available at least, usually much more.  Once the limit is reached, data is reduced by a factor of two thus doubling the amount of time available in half resolution (2 to 4 minutes in 2 second resolution). When the next limit is reached, the data is halved again thus doubling the time again, until the configured reduction limit is reached.  With default settings of one second resolution and reduction limit of 1/6, the worst resolution of 64 seconds (or 1 minute and 4 seconds) is reached not before 2 hours into the past.  The drop down menu in graph view gives an exact number about the available graph resolution in the given time period.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note: Regardless of these settings, the graph values are always converted to represent a value per second (when applicable). For example, the packets per second for an IP addresses will always be a value literally per second even if the resolution is larger or smaller than one second. The displayed value is scaled to match this view. Especially with sub-second resolution this might be misleading.&lt;br /&gt;
&lt;br /&gt;
For instance, if there is a network element sending one packet per second and the resolution is set to 100 milliseconds, the &amp;lt;u&amp;gt;value shown in the graph&amp;lt;/u&amp;gt; might be shown as 10 packets per second as each sample point is scaled to represent an value per second.&amp;lt;br&amp;gt;For a detailed investigation it is recommended to always select a specific time interval and look at the (packet) counters shown in all statistics since these are unscaled and represent the actual values.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Performance implications: The performance degradation and memory usage depends on the actual network traffic and is not exactly predictable. &lt;br /&gt;
&lt;br /&gt;
Here are some examples for reference on a Allegro 1000 series with different configuration values (under ideal test conditions):&lt;br /&gt;
&lt;br /&gt;
* 1 second resolution, 1/1 reduction factor: 90% of default performance&lt;br /&gt;
*100 millisecond resolution, 1/1 reduction factor: 50% of default performance,&lt;br /&gt;
*10 millisecond resolution, 1/1 reduction factor: 15% of default performance&lt;br /&gt;
*1 millisecond resolution, 1/1 reduction factor: 10% of default performance&lt;br /&gt;
&lt;br /&gt;
=== PCAP parallel analysis===&lt;br /&gt;
&lt;br /&gt;
The PCAP parallel analysis feature allows to analyse PCAP files or the&lt;br /&gt;
packet ring buffer in parallel to the live measurement. The settings&lt;br /&gt;
allow to enable the feature and choose how much memory of the main&lt;br /&gt;
memory is used for parallel analysis and how many parallel slots can&lt;br /&gt;
be used. Detailed description of the configuration values are&lt;br /&gt;
described [[parallel packet processing|here]].&lt;br /&gt;
&lt;br /&gt;
==IPFIX settings ==&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter may be running as an IPFIX exporter. These settings allows for reporting configuration. When enabled, the following settings are possible:&lt;br /&gt;
&lt;br /&gt;
*IP address: Address of IPFIX collector.&lt;br /&gt;
*Port: Corresponding port.&lt;br /&gt;
*Protocol: TCP or UDP.&lt;br /&gt;
*Update interval: Interval in seconds for sending a status update of flows.&lt;br /&gt;
*UDP resend interval: Interval in seconds for resending IPFIX templates for UDP connections.&lt;br /&gt;
* TCP reconnect timeout: When TCP connections could not be established, wait for this time period until the next attempt to establish a connection.&lt;br /&gt;
&lt;br /&gt;
Individual IPFIX messages can be enabled or disabled by toggling corresponding options. See the NetFlow/IPFIX interface documentation for details about the message types.&lt;br /&gt;
&lt;br /&gt;
==Time settings==&lt;br /&gt;
&lt;br /&gt;
The Time settings were moved to [[Administration]].&lt;br /&gt;
&lt;br /&gt;
== Email notification==&lt;br /&gt;
&lt;br /&gt;
The Email notification settings were moved to [[Administration]].&lt;br /&gt;
&lt;br /&gt;
==Long-term DB and persistence (BETA) ==&lt;br /&gt;
These two features allow to use a storage device as additional memory for long-term statistics of selected values, and to use a storage device to store and restore measurement data between restarts. See [[Longterm DB]] for more details.&lt;br /&gt;
&lt;br /&gt;
== Expert settings==&lt;br /&gt;
&lt;br /&gt;
The Expert settings contains parameter which are only necessary to change in rare installation scenarios or some specific need for a different operation mode.&lt;br /&gt;
&lt;br /&gt;
===Packet length accounting===&lt;br /&gt;
&lt;br /&gt;
This setting allows you to configure which packet length is used for all traffic counters and incidents. The following modes are possible:&lt;br /&gt;
&lt;br /&gt;
*Layer 1: Packet length is accounted on Layer 1 including preamble (7 Byte), SFD (1 Byte) and inter-frame gap (12 Bytes)&lt;br /&gt;
*Layer 2 without frame check sequence (default): Packet length is accounted on Layer 2 without a frame check sequence (4 Bytes)&lt;br /&gt;
*Layer 2 with frame check sequence: Account packet length on Layer 2 with frame check sequence (4 Bytes) When switching to another mode, it will only be applied on new packets. Older packet size statistics will not be changed.&lt;br /&gt;
&lt;br /&gt;
===VLAN handling ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter can &#039;&#039;&#039;ignore VLAN tags&#039;&#039;&#039; for connection tracking. Enabling this option may be necessary if network traffic is seen on the Allegro Network Multimeter that contains changing VLAN tags for the same connection. For example, depending on the configuration of the Mirror Port to which the Allegro Network Multimeter is connected, incoming traffic could contain a VLAN tag while outgoing traffic does not. In this example, a connection would appear twice in the statistics which often is desired behaviour to be able to identify a network misconfiguration. In some cases however, such &amp;quot;duplicate&amp;quot; data in the dashboard may be misleading, and the user would want to see only one connection. In these scenarios the option ignore VLAN tags may be enabled.&lt;br /&gt;
&lt;br /&gt;
===Tunnel view mode===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter can decapsulate GRE, VXLAN, ERSPAN type II and type III, GENEVE, CAPWAP as well as L2TPv3 data traffic. Depending on this option either the outer tunnel or the inner content is shown in all analysis modules.&lt;br /&gt;
&lt;br /&gt;
There are three possible modes:&lt;br /&gt;
&lt;br /&gt;
* don&#039;t decapsulate traffic (default)&lt;br /&gt;
*decapsulate tunnel traffic, discard non-encapsulated traffic&lt;br /&gt;
*decapsulate tunnel traffic, process also non-encapsulated traffic&lt;br /&gt;
&lt;br /&gt;
Optionally, a filter can be set to limit decapsulation on specific packets with a certain IP address, IP ranges or interfaces. If the filter is empty, all packets will be decapsulated.&lt;br /&gt;
&lt;br /&gt;
In case the mode is active with discarding non-encapsulated traffic, on the Dashboard a dropped counter will display dropped non-encapsulated packets.&lt;br /&gt;
&lt;br /&gt;
When capturing, packets with complete outer Layer 2, Layer 3, GRE, ERSPAN, GENEVE, CAPWAP and L2TPv3 headers will be stored as seen on the wire.&lt;br /&gt;
&lt;br /&gt;
===Database mode settings===&lt;br /&gt;
&lt;br /&gt;
The database mode is a special analysis mode for high-performance Allegro Network Multimeters with multiple processors to increase the performance on such systems. It is normally enabled automatically but depending on the actual network traffic and system usage, some parameter tweak might be necessary to improve overall system performance. &lt;br /&gt;
You should only change these parameters in discussion with the Allegro Packets support department.&lt;br /&gt;
These settings are only visible if your Allegro Network Multimeter is capable of running this mode.&lt;br /&gt;
&lt;br /&gt;
You can read more about the meaning of the settings [[DB mode|here]].&lt;br /&gt;
&lt;br /&gt;
===Network performance ===&lt;br /&gt;
&lt;br /&gt;
There are several network performance settings available to improve performance on high-performance systems in case of packet drops during very high incoming bandwidth. They are only visible if your Allegro Network Multimeter is capable of changing these settings.&lt;br /&gt;
&lt;br /&gt;
*Max RX queues per socket: This setting specifies the quantity of threads dedicated to read and write interactions with the network interface controllers. By increasing this value, network receive bandwidth can be increased before packet drops occur. By decreasing this value, data analysis will improve. The default setting of 2 RX queues is suitable for most configurations since data analysis typically needs much more processing ressources.&lt;br /&gt;
*Use Hyper-Threading for RX queues: This setting allows enabling or disabling Hyper-Threading for the threads dedicated to read and write interactions with the network interface controllers. By disabling it, network performance can be improved as the RX queues will be distributed to physical CPU cores only. By enabling it, RX queues will also be distributed to virtual Hyper-Threading CPU cores which is not as efficient as physical CPU cores. By using Hyper-Threading, data analysis will improve since there are more CPU cores available for these tasks. Hyper-Threading is used by default. This is suitable for most configurations as data analysis typically needs much more processing ressources.&lt;br /&gt;
*Preferred Network interface controller: This setting allows fine tuning of network and data analysis performance for dedicated network controllers. The selected set of network controllers will be preferred over others. Usually the fastest or the network controller with the most traffic should be preferred. The &#039;&#039;&#039;Auto&#039;&#039;&#039; setting is used by default, preferring the fastest network controller.&lt;br /&gt;
&lt;br /&gt;
You should only change these parameters in discussion with the Allegro Packets support department.&lt;br /&gt;
&lt;br /&gt;
===Processing performance===&lt;br /&gt;
&lt;br /&gt;
Processing performance may be modified on high-performance systems. This is only visible if your Allegro Network Multimeter is capable of changing this setting.&lt;br /&gt;
&lt;br /&gt;
*Processing performance mode: This setting allows for fine tuning processing performance. By using &#039;&#039;&#039;Analysing&#039;&#039;&#039;, as much processing ressources on all CPUs as possible are used for data analysis. By using &#039;&#039;&#039;Capturing&#039;&#039;&#039;, the focus will be on high data throughput and low latency for capturing purposes by using only the CPU where the preferred network controller is attached to. This has an impact on data analysis performance. &#039;&#039;&#039;Analysing&#039;&#039;&#039; is used by default.&lt;br /&gt;
You should only change this parameter in discussion with the Allegro Packets support department.&lt;br /&gt;
&lt;br /&gt;
===Packet ring buffer timeouts===&lt;br /&gt;
&lt;br /&gt;
Two timeout settings related to the packet ring buffer can be adjusted.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Long timeout&#039;&#039;&#039; controls after which maximum amount of time, a packet is actually written to the packet ring buffer. A lower value may decrease the time difference by which packets are stored out of their order in the packet ring buffer but it may increase the amount of unused overhead data in the packet ring buffer.&lt;br /&gt;
*&#039;&#039;&#039;Short timeout&#039;&#039;&#039; controls after which amount of time smaller batches of packets are written to the packet ring buffer, even if waiting for more packets would result in a more efficient operation. A lower value may decrease the time difference by which packets are stored out of their order in the packet ring buffer, but it may also decrease the performance of the packet ring buffer.&lt;br /&gt;
&lt;br /&gt;
===Data retention timeout===&lt;br /&gt;
&lt;br /&gt;
When the data retention timeout is set to a value greater than 0, data will be removed everywhere throughout the system after the given number of minutes. This means that entities like IPs, which have been inactive for longer than the timeout, will be removed. History graph data for entities that are still active will be truncated to cover only the given timespan, while the absolute values for the whole runtime will be retained. When a packet ring buffer is active, packets which are older than the timeout will be discarded.&lt;br /&gt;
&lt;br /&gt;
===Multithreaded capture analysis ===&lt;br /&gt;
&lt;br /&gt;
This option enables the use of multiple CPUs for capture analysis like when&lt;br /&gt;
analyzing a pcap capture file or analyzing the packet ring buffer. Depending&lt;br /&gt;
on the number of available CPUs this can significantly speed up the analysis.&lt;br /&gt;
&lt;br /&gt;
It is possible to dedicate a number of CPUs exclusively to capture analysis.&lt;br /&gt;
Since these CPUs are not available for live packet processing the performance of&lt;br /&gt;
live traffic analysis may be lower.&lt;br /&gt;
When set to 0 a lower priority is used for capture analysis than for live analysis&lt;br /&gt;
but it cannot be ruled out that the performance of the live processing is&lt;br /&gt;
affected.&lt;br /&gt;
&lt;br /&gt;
===Load balancing===&lt;br /&gt;
&lt;br /&gt;
This option select the load distribution method. By default, network&lt;br /&gt;
traffic is balanced among all processing threads based on the IP&lt;br /&gt;
addresses. This is fast and usually the best way for efficient load&lt;br /&gt;
balancing.&lt;br /&gt;
&lt;br /&gt;
If the network traffic only occurs between a few IP addresses, this&lt;br /&gt;
method can lead to a load imbalance so that some threads are doing more&lt;br /&gt;
work while other threads may be idle. In this scenario, &amp;quot;flow based&lt;br /&gt;
balancing&amp;quot; can be enabled to distribute the traffic based on the IP&lt;br /&gt;
and port information. This will lead to better utilization of all&lt;br /&gt;
processing threads.&lt;br /&gt;
&lt;br /&gt;
Since this option induces additional processing overhead per packet&lt;br /&gt;
and additional memory for all internal IP statistics, it should only&lt;br /&gt;
be enabled in cases of significant load imbalance.&lt;br /&gt;
&lt;br /&gt;
===Ingress packet memory===&lt;br /&gt;
&lt;br /&gt;
This slider allows to configure the amount of memory which is used to buffer received packets. A larger amount of ingress packet memory may help in processing bursts of high bandwidth traffic without packet drops but it also decreases the amount of memory available for statistics. It is important to know that a restart of the processing does not suffice to make changes to this setting active. A full reboot of the device is required for that. See [[Performance Optimization Guide]].&lt;br /&gt;
&lt;br /&gt;
===Jumbo frame mode===&lt;br /&gt;
This options allows to set how jumbo frames are handled by the system.&lt;br /&gt;
&lt;br /&gt;
Three settings are available and the &#039;&#039;&#039;normal&#039;&#039;&#039; mode, which is also the default, is the mode that was used before this configuration option was introduced:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Normal&#039;&#039;&#039;: the default mode offers the best balance of full support for jumbo frames with an efficient usage of the ingress packet memory. This mode uses efficiently sized packet buffers and splits larger packets over multiple packet buffers.&lt;br /&gt;
*&#039;&#039;&#039;Large buffers&#039;&#039;&#039;: this mode uses a single large buffer for each packet which may improve the performance but does not use the ingress packet memory as efficiently and limits the maximum jumbo frame size to 9kB.&lt;br /&gt;
*&#039;&#039;&#039;Disabled&#039;&#039;&#039;: this mode disables support for jumbo frames and offers the best performance and efficient usage of the ingress packet memory. Jumbo frames will be discarded by the network interface.&lt;br /&gt;
&lt;br /&gt;
===Hardware packet timestamping===&lt;br /&gt;
This option allows to enable the use of high-precision hardware packet timestamps on supported interfaces. If an interface is supported, it has the “Hardware Timestamps” feature in the interface statistics (firmware &amp;gt;= 4.4).&lt;br /&gt;
&lt;br /&gt;
This feature will require approximately 30% more load in the I/O threads. The load increase can be reduced to about 10% by using the jumbo frame mode &amp;quot;Large buffers&amp;quot; or &amp;quot;Disabled&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
When enabled, packets received on supported interfaces will carry a timestamp with nanosecond resolution instead of microsecond resolution.&lt;br /&gt;
&lt;br /&gt;
====== Time synchronization for hardware packet timestamping ======&lt;br /&gt;
Except when the network interface supports GNSS/GPS time synchronization and this has been selected as type of time synchronization (see [[Administration]] time settings) the internal clock of the interface is synchronized to the main device system clock. Even when no time synchronization method is chosen (&amp;quot;none&amp;quot;) the system clock is free-running and the internal clock of the interface will be regularly synced to the system clock.&lt;br /&gt;
&lt;br /&gt;
The synchronization to the system time happens roughly every 5 seconds. When the interface clock deviates more than 500ms from the system clock (should only happen at startup or when there is a big jump in the system time e.g. when changing the time synchronization method) the interface time is immediately reset to the system time. If there is a smaller deviation from the system clock the frequency of the interface clock is gradually adjusted to make the clock anneal to the system time so to avoid any discontinuous jumps of the packet timestamps.&lt;br /&gt;
&lt;br /&gt;
When &amp;quot;GNSS/GPS&amp;quot; time synchronization has been configured and the interface is receiving a valid GNSS/GPS time signal the interface clock is directly disciplined to the GNSS/GPS time signal and the system clock is synchronized to the GNSS/GPS time. Information of the synchronistation status is display on the System Info page. Interfaces with hardware packet timestamping but without a GNSS/GPS connection will continue to be synchronized to the system time (which is now running much closer to the global GNSS/GPS time).&lt;br /&gt;
&lt;br /&gt;
===External timestamps===&lt;br /&gt;
When this option is enabled, the system will use timestamps contained in the packet data instead of timestamps measured at packet arrival. Currently the Arista and Ixia/Keysight as well as the SRCMAC timestamp formats are supported.&lt;br /&gt;
&lt;br /&gt;
If the Ixia/Keysight or Arista type is selected, packets without an external timestamp will not be analyzed. The current number of packets that are dropped because they do not contain an external timestamp is displayed in the active interface overview table of the top-user dashboard. If there are no packets with external timestamps arriving the time of the packet processing will effectively stand still and most graphs will not make progress in live-mode.&lt;br /&gt;
&lt;br /&gt;
If one of the SRCMAC options is selected, all packets will be analyzed with all-zero MAC addresses.&lt;br /&gt;
&lt;br /&gt;
=== External original packet lengths ===&lt;br /&gt;
This option allows to enable the use of original packet length information contained in the packet data instead of the length of the packet as received. At this time only the Ixia/Keysight original packet length trailer format is supported.&lt;br /&gt;
&lt;br /&gt;
This feature can also be used in combination with the &#039;&#039;External timestamps&#039;&#039; option to support packets that contain a Ixia/Keysight trailer with both timestamp and original length information.&lt;br /&gt;
&lt;br /&gt;
===Memory utilization limit===&lt;br /&gt;
This option allows to reduce the limit until old data is removed from the in-memory database. By default the system tries to target 90% memory utilization. In some case, the load might be too high to match this limit. A smaller limit may enable the system to keep the target memory utilization and perform better in general.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=5081</id>
		<title>Longterm DB</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=5081"/>
		<updated>2025-05-14T10:02:11Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
The Long-term DB feature (in firmware &amp;gt;= 4.3) uses an attached storage devices to store traffic information of IP addresses and Layer 7 protocols with low resolution for a much longer time than the live statistics.&lt;br /&gt;
&lt;br /&gt;
The elements stored in the long-term DB are as follows, graph data is available in 5 minute resolution: &lt;br /&gt;
&lt;br /&gt;
* IP addresses&lt;br /&gt;
*# activity time&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
* Layer 7 protocols&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
&lt;br /&gt;
The storage is used similar to a swap file mechanism. The long-term data needs to be written in a format readable by new versions. Since firmware version 4.5, this is done automatically on restarts. An option allows to write the DB back into a persisted format on a daily basis. &lt;br /&gt;
&lt;br /&gt;
==Usage==&lt;br /&gt;
[[File:Longterm DB dashboard.png|alt=Long-term DB activated dashboard|thumb|Long-term DB activated dashboard]]If this feature is enabled, a view toggle button appears in the top menu bar. This button allows to switch between the real time &amp;quot;RT&amp;quot; view and the long-term (&amp;quot;LT&amp;quot;) view.&lt;br /&gt;
&lt;br /&gt;
In the long-term view, the IP address information contain only information about the traffic amount in 5 minute resolution.&lt;br /&gt;
&lt;br /&gt;
The navigation menu in the long-term view only contains those modules which are available in this view.&lt;br /&gt;
&lt;br /&gt;
If the long-term view is activated on module pages which do not support long-term data, a corresponding info box is shown.&lt;br /&gt;
&lt;br /&gt;
==Setting==&lt;br /&gt;
The configuration can be found in the global settings page in the &amp;quot;Long-term DB and persistence&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
To enable this feature, select a storage device to be used, enable the feature and enter a file size. &lt;br /&gt;
&lt;br /&gt;
The option &amp;quot;Data persistence mode&amp;quot; allows to select an alternative mode which also dumps parts of the live database onto disc. This increases the amount of space and time required to write the data and is usually not necessary. &lt;br /&gt;
&lt;br /&gt;
The long-term data base can be persisted once per day by enabling the corresponding option and selecting a time of day where the dump should happen. It is recommended to enable this option and to choose a time with less traffic then usual to avoid system overload during the dump time.&lt;br /&gt;
&lt;br /&gt;
Once enabled, the utilization of the file is shown and the [[System Info Page]] contains information about how long the data can be kept.&lt;br /&gt;
&lt;br /&gt;
Tip: Since the amount of information stored in the long-term DB is limited by the graph resolution, the file size usually don&#039;t need to be similar sized as the main memory. 10 GByte is a good starting point.&lt;br /&gt;
&lt;br /&gt;
The size can be increase but it requires a restart of the packet processing.&lt;br /&gt;
&lt;br /&gt;
[[File:DB persistence settings.png|thumb|Long-term DB settings]]&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
Recommended storage device types:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Storage device&lt;br /&gt;
!Note&lt;br /&gt;
|-&lt;br /&gt;
|NMVe based SSD&lt;br /&gt;
|recommended&lt;br /&gt;
|-&lt;br /&gt;
|SATA based SSD&lt;br /&gt;
|can be used for moderate traffic, check system load for high system utilization&lt;br /&gt;
|-&lt;br /&gt;
|USB based SSD&lt;br /&gt;
|not recommended, but might be useful for small systems (Allegro 200/500/510)&lt;br /&gt;
|-&lt;br /&gt;
|HDD&lt;br /&gt;
|not recommended, should not be used&lt;br /&gt;
|}&lt;br /&gt;
It is also not recommended to place the long-term DB on the same storage device that is used a packet ring buffer as it will deteriorate the performance of both features.&lt;br /&gt;
&lt;br /&gt;
The feature can be disabled temporarily and the last snapshot of persisted data is still kept. To remove this data permanently, use the delete buttons at the bottom of the configuration page.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
# The data in the long-term DB is limited to a selected subset of the data in the In-Memory-DB. See above for an exact list of elements available.&lt;br /&gt;
# The data is written into the long-term DB in variable intervals depending on traffic and system load. It takes up to 10 minutes (two graph intervals) until the data appears in the graph. Therefore, the last 5-10 minutes appear empty or with less traffic than in live view.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Capture_module&amp;diff=5013</id>
		<title>Capture module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Capture_module&amp;diff=5013"/>
		<updated>2025-04-09T14:31:25Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Capture module == &lt;br /&gt;
The Allegro Network Multimeter allows direct capturing of network traffic as a HTTP download to your computer. No packet data is stored on the device itself. Traffic can be directly filtered for specific packets, only the relevant packets will be captured. In addition, it is also possible to capture network traffic to an attached storage device, see the settings section below for details. Capturing network traffic is usually started by clicking on a PCAP button in a certain module. These buttons allow capturing specific traffic, for example for a certain IP address or a network protocol. The capture module allows to configure filter for traffic that has not even started right now, for example for an IP address that is not in use at the moment but might be used later. The capture module page displays all currently running captures and allows starting new captures with specific filters.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
|[[File:Generic modules.png|800px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Current captures ===&lt;br /&gt;
The first part of the page displays all downloads running for the current user session, and all downloads running for other user sessions (like when a download has been started outside the browser by directly using command line tools such as wget or curl).&lt;br /&gt;
The list contains the client IP and port of the user running the download. &lt;br /&gt;
&lt;br /&gt;
The next three counters describe: &lt;br /&gt;
&lt;br /&gt;
* the number of packets captured for the corresponding filter. &lt;br /&gt;
* the number of packets dropped by the capturing module.   Packet drops can appear when doing live capture and more packets are captured than can be transferred via HTTP to the client, or the storage is not capable of storing all matching packets. During live capture, the drop counter is the exact number of packets matching the filter but were dropped because of the reasons mentioned previously.   Packet drops are also accounted when capturing from the past out of the ring buffer. It happens when the ring buffer dropped packets during the capture interval due to insufficient bandwidth available on the storage devices. In retrospective capturing, the drop counter only indicates that some packets may have been missed. The counter is the total amount of packets not available in the ring buffer, which are not necessarily part of the capture filter. &lt;br /&gt;
* the number of ignored packets. Ignored packets do not match the given capture filter. &lt;br /&gt;
&lt;br /&gt;
The following columns list the applied filter criteria. The last column contains a button to stop the corresponding download. Downloads can also be stopped by clicking the same capture button that started the capture in the corresponding module. If multiple devices have been configured, the list also contains all captures from all multi-devices which can be stopped individually. &lt;br /&gt;
&lt;br /&gt;
==== Finished captures ====&lt;br /&gt;
This list shows the last captures that have finished. It shows up to 100 entries while the oldest entries are discarded when the list is full. For each entry the following information is displayed:&lt;br /&gt;
&lt;br /&gt;
* the packet capturing mode&lt;br /&gt;
* the type of capture&lt;br /&gt;
* the start- and end-time of the capture (the actual real-time when the capture was initiated and ended)&lt;br /&gt;
* the number of captured/dropped/ignored packets during the capture&lt;br /&gt;
* the amount of data generated for the capture (along with the average throughput of e.g. the capture download)&lt;br /&gt;
* the capture filter which was used for the capture&lt;br /&gt;
* the finishing reason of the capture job (e.g. completed normally, stopped by user or aborted due to no space left on storage)&lt;br /&gt;
&lt;br /&gt;
The button &#039;&#039;&#039;Delete list of finished captures&#039;&#039;&#039; will delete all entries from this list.&lt;br /&gt;
&lt;br /&gt;
==== Recent filters ====&lt;br /&gt;
This list shows the most recently used capture filters for the current user. The most recent capture filter is displayed on the top. Next to each capture filter there is a button to permanently save this capture filter as a favorite as well as a button to simply start a capture with this filter again. The &#039;&#039;&#039;Use as expert filter&#039;&#039;&#039; button will copy the capture filter into the expert filter input field and allows for customizing the capture. The button &#039;&#039;&#039;Delete list of recent filters&#039;&#039;&#039; will delete all entries from this list.&lt;br /&gt;
&lt;br /&gt;
==== Favorites ====&lt;br /&gt;
This list shows favorite capture expressions. A capture can be marked as a favorite either in the capture dialog by clicking on the star button in the top right corner or by marking it as a favorite in the &#039;&#039;&#039;Recently captured&#039;&#039;&#039; list. A description can be given and will be displayed in this list. For each favorite capture a PCAP button is available to simply start this capture again. The &#039;&#039;&#039;Remove favorites&#039;&#039;&#039; button allows for cleaning the list. The &#039;&#039;&#039;Use as expert filter&#039;&#039;&#039; button will copy the capture filter into the expert filter input field and allows for customizing the capture.&lt;br /&gt;
&lt;br /&gt;
==== Planned captures ====&lt;br /&gt;
On this tab captures to a storage device can be planned ahead of time and these captures can even be set to repeat automatically. A click on the &#039;&#039;&#039;Add planned capture&#039;&#039;&#039; button opens a dialog where the planned capture can be configured. This includes settings like the storage device to use, the start date and time of the capture, the duration of the capture, if a capture should repeat and the filter expression used during the capture. It is important to know that planned captures will not function if the chosen storage device is not active.&lt;br /&gt;
&lt;br /&gt;
==== Capture profiles ====&lt;br /&gt;
[[File:Capture profiles config.png|thumb|600x600px|Capture profile configuration]]&lt;br /&gt;
[[File:Capture profiles edit profile.png|thumb|600x600px|Edit capture profile]]&lt;br /&gt;
Capture profiles can be used in the capture dialog for custom packet truncation rules. Such profiles defines custom rules for packet snapshot length similar to ring buffer filters. This allows to use a different snapshot length for specific layer 7 protocols, if for example traffic of one protocol shall be captured completely while for another protocol only the IP header shall be captured. Such a capture profile can be selected in the capture dialog in the &amp;quot;Truncate packet length&amp;quot; select box.&lt;br /&gt;
&lt;br /&gt;
Up to 10 different profiles can be configured by clicking at the &amp;quot;Add profile&amp;quot; button. The add/edit dialog allows to enter a profile name and up to 10 rules for snapshot length. Similar to [[Packet ring buffer#Packet ring buffer snapshot length filter|ring buffer filters]], the first rule that matches for the selected type is used to decide for the snapshot length of the actual packet.&lt;br /&gt;
&lt;br /&gt;
To restrict the capture possibilities of an user it is possible to choose an &#039;restricting profile&#039;. This allows the administrator to stop the user from capturing other sensitive data like SIP- and RTP-Packages.&lt;br /&gt;
&lt;br /&gt;
==== PCAP anonymization profile ====&lt;br /&gt;
&lt;br /&gt;
Anonymization profiles can be used in capture dialog to allow for quickly switch between rules to anonymize aspects of the generated PCAPs.&lt;br /&gt;
&lt;br /&gt;
When enabled, following options are available (more than one option is possible):&lt;br /&gt;
* MAC addresses on L2&lt;br /&gt;
:MAC addresses on L2 will be replaced by random addresses octet-wise. Multicast/broadcast addresses will not be randomized.&lt;br /&gt;
* IP addresses on L3&lt;br /&gt;
:IP addresses on L3 will be replaced by random addresses octet-wise for IPv4 and hextet-wise for IPv6. Multicast/broadcast addresses will not be randomized. The octets of the IP address will have the same length in textual representation (e.g. 100.20.3.40 -&amp;gt; 105.31.6.41). For IPv6 address short notation will be considered and the randomized result will also have the same textual length. &lt;br /&gt;
* IP addresses on L7&lt;br /&gt;
:IPv4 and IPv6 addresses in textual representation in L7 payload will be randomized similar to L3.&lt;br /&gt;
* Mapped IP addresses in STUN packets on L7&lt;br /&gt;
:STUN payload IP addresses will be randomized similar to L3.&lt;br /&gt;
* Phone numbers, name and Call ID in SIP packets on L7&lt;br /&gt;
: SIP payload data is masked with &#039;xxx&#039; values for the names and phone numbers in the fields &amp;quot;From&amp;quot;, &amp;quot;To&amp;quot;, &amp;quot;Contact&amp;quot;, &amp;quot;P-Asserted-Identity&amp;quot;. Call Ids are also replaced. IP addresses are not touched, if they shall be anonymized, please use option &amp;quot;IP addresses on L7&amp;quot;.&lt;br /&gt;
* URLs and HTTP hostnames on L7&lt;br /&gt;
: URLs and HTTP hostnames in L7 payload are masked with &#039;xxx&#039; values. The length of the masked name/URL will stay the same and line feeds won&#039;t be touched.&lt;br /&gt;
:: Examples:&lt;br /&gt;
:: &#039;GET /website.html?param1=value HTTP/1.1\r\n&#039; will be changed to &#039;GET xxxxxxxxxxxxxxxxxxxxxxxxxx HTTP/1.1\r\n&#039; &lt;br /&gt;
:: &#039;Host: allegro-packets.com\r\n&#039; will be changed to &#039;Host: xxxxxxxxxxxxxxxxxxx\r\n&#039;&lt;br /&gt;
:: https://www.allegro-packets.com/en/ will be completely masked &lt;br /&gt;
&lt;br /&gt;
Within an anonymization profile it is also possible to define MAC and IP lists with entries that should be anonymized or that should be excluded from anonymization. The proper L2/L3 anonymization option &#039;&#039;&#039;must be turned on&#039;&#039;&#039; in order to have an effect!&lt;br /&gt;
&lt;br /&gt;
The amount of SIP phone numbers last hidden digits can be configured, e.g. with a setting of 4 last hidden digits a phone number +49123456789 becomes +4912345xxxx.&lt;br /&gt;
&lt;br /&gt;
Address anonymization is stable for the whole PCAP, i.e. the same addresses will be replaced by the same random addresses. As an example, if both randomization of IP addresses on L3 and L7 is active and a SIP call with RTP is captured, both IP addresses in L3 and SIP SDP payload are replaced by the same values so that the correlation of the RTP stream is still intact.&lt;br /&gt;
&lt;br /&gt;
Checksums of the changed packets are &#039;&#039;&#039;not&#039;&#039;&#039; being recalculated.&lt;br /&gt;
&lt;br /&gt;
A privileged user may enforce an anonymization profile that is being used for all users that do not have the unrestrictive capture permission in a role. This profile will always be taken into account and the unprivileged user may only add additional anonymizations on top of it for captures (but the user can&#039;t overwrite it with less restrictive settings).&lt;br /&gt;
&lt;br /&gt;
==== SFTP server ====&lt;br /&gt;
Credentials and upload directories for a SFTP server can be configured here. They can be selected in the capture dialog later when choosing &amp;quot;Capture to SFTP server&amp;quot; as capture type. It is possible to either configure a user and password or use authentication with a public key. In the latter case, the displayed SSH public key needs to be inserted in the authorized hosts list on the SFTP server.&lt;br /&gt;
&lt;br /&gt;
=== Simple capture ===&lt;br /&gt;
The second section of the capture page allow to select some fields to filter network traffic for. By default, only the IP field is visible, the other fields can be enabled by clicking on the corresponding toggle switch. Each line allows to enter a filter criterion for the corresponding network traffic element. To start the capture with the entered filter criteria just click at the &#039;&#039;&#039;Start capture&#039;&#039;&#039; button. For reference, the expert filter expression is shown at the end of the section so it can be used to copy and paste&lt;br /&gt;
the string into the expert filter section.&lt;br /&gt;
&lt;br /&gt;
=== Using expert filters to start captures ===&lt;br /&gt;
The third part of the page allows for starting a download for any criterion combination using complex filter expressions. A capture filter is defined in a C-style syntax and supports combination of AND/OR operators, precedence order with parentheses and equal/not equal comparisons. If the filter exp Session can be evaluated to true, the packet is&lt;br /&gt;
captured.&lt;br /&gt;
If a value contains a space, the whole value must be quoted with “”.&lt;br /&gt;
Following operators are supported:&lt;br /&gt;
* &#039;&#039;&#039;and&#039;&#039;&#039;, &#039;&#039;&#039;&amp;amp;&amp;amp;&#039;&#039;&#039; : AND operator. The filter expression will match if all operands could be evaluated to true.&lt;br /&gt;
* &#039;&#039;&#039;or&#039;&#039;&#039;, &#039;&#039;&#039;||&#039;&#039;&#039;: OR operator. The filter expression will match if any operand can be evaluated to true.&lt;br /&gt;
&lt;br /&gt;
Following comparison operators are supported:&lt;br /&gt;
* &#039;&#039;&#039;==&#039;&#039;&#039;: Will evaluate expression to true if left and right operand are equal.&lt;br /&gt;
* &#039;&#039;&#039;!=&#039;&#039;&#039;: Will evaluate expression to true if left and right operand are not equal.&lt;br /&gt;
&lt;br /&gt;
Following operands are supported:&lt;br /&gt;
* &#039;&#039;&#039;ip&#039;&#039;&#039;: An IP address. The packet is captured if either source or destination IP address of the packet match. A netmask and a port can also be specified. For IPv6 addresses with a specific port, the address must be written in brackets. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
|  &lt;br /&gt;
ip == 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
ip == ff02::1:3&lt;br /&gt;
&lt;br /&gt;
ip == 10.0/16&lt;br /&gt;
&lt;br /&gt;
ip == 10.0.0.1:1234&lt;br /&gt;
&lt;br /&gt;
ip == [2a02:810a:1340:1292:1c6b:e58d:6ebc:6cd2]:123&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;ip.src, ip.dst&#039;&#039;&#039;: The source or destination IP address.&lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
|  &lt;br /&gt;
ip.src == 10.0.0.1/8 and ip.dst == 10.0.0.1/8&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
: This will match traffic only within 10.0.0.1/8 subnet. If src/dst is omitted, also in or outbound traffic from or to other subnets is captured!&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;mac&#039;&#039;&#039;: A MAC address. The packet is captured if either source or destination MAC address of the packet match. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
|  mac == 12:34: :56:78:90:ab&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;port&#039;&#039;&#039;: A TCP or UDP port. The packet is captured if either source or destination port match. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-         &lt;br /&gt;
| port == 80&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;portrange&#039;&#039;&#039;: A TCP or UDP port range. The range can be a single number or a comma separated list of values or value ranges. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-                     &lt;br /&gt;
| portrange == 80,100-120,-10,65000-&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;serverport&#039;&#039;&#039;: A TCP or UDP port of a server. The packet is captured if the given port is a port of the server and not of a client. The range can be a single number or a comma separated list of values or value ranges.&lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| serverport == 80,100-120,-10,65000-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;macProtocol&#039;&#039;&#039;: A MAC protocol such as IPv4 or IPv6. For all seen MAC protocols, please consult the MAC Protocol Statistics module. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| macProtocol == IPv4&lt;br /&gt;
macProtocol == &amp;quot;Non IP&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;l4Protocol&#039;&#039;&#039;: A layer 4 protocol such as TCP or UDP or any IP protocol number. Protocols can also be OR combined as a comma seperated list. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| l4Protocol == ICMP,ICMPv6&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;l7Protocol&#039;&#039;&#039; or &#039;&#039;&#039;dpiProtocol&#039;&#039;&#039;: A layer 7 protocol. Protocols can also be OR combined as a comma seperated list. For all seen protocols please consult the Layer 7 protocols module.&lt;br /&gt;
* &#039;&#039;&#039;countryCode&#039;&#039;&#039;: A country code such as US. For all seen country codes please consult the Geolocation module.&lt;br /&gt;
* &#039;&#039;&#039;arpip&#039;&#039;&#039;: An IP address within an ARP request or response.&lt;br /&gt;
* &#039;&#039;&#039;vlan&#039;&#039;&#039;: A VLAN tag of an outer or inner VLAN. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;outervlan&#039;&#039;&#039;: A VLAN tag of an outer VLAN. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;innervlan&#039;&#039;&#039;: A VLAN tag of an inner VLAN. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;multicastGroup&#039;&#039;&#039;: A multicast IP address or any. The filter will match all IGMP or MLD negotiation packets related to that multicast IP address.&lt;br /&gt;
* &#039;&#039;&#039;rtpPayloadType&#039;&#039;&#039;: The RTP payload type such as PCMU or MP2T. This filter will match all RTP packets with the given payload type.&lt;br /&gt;
* &#039;&#039;&#039;interface.name&#039;&#039;&#039; or &#039;&#039;&#039;namedInterface&#039;&#039;&#039;: The physical interface. This can be the name or interface number (as printed on the device). For interface ids please consult the Interface stats page. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| &amp;lt;nowiki&amp;gt;interface.name == uplink || interface.name == 3&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;interface.rawid&#039;&#039;&#039;: This is the raw internal ID of interfaces. It starts from 0. The interface stats page also shows the raw ID.&lt;br /&gt;
* &#039;&#039;&#039;link&#039;&#039;&#039;: The link pair of two interfaces as stated in Interface stats. A single link number can be given.&lt;br /&gt;
* &#039;&#039;&#039;pppoeProtocol&#039;&#039;&#039;: A specific PPPoE protocol (by name or by ID), or &amp;quot;none&amp;quot;/&amp;quot;any&amp;quot;&lt;br /&gt;
* &#039;&#039;&#039;pppoeAuthentication&#039;&#039;&#039;: An authentication state of a PPPoE session&lt;br /&gt;
* &#039;&#039;&#039;pppoeLinkConfiguration&#039;&#039;&#039;: A link configuration state of a PPPoE session&lt;br /&gt;
* &#039;&#039;&#039;ptpMsgType&#039;&#039;&#039;: A specific PTP message type number or any for the whole PTP traffic.&lt;br /&gt;
* &#039;&#039;&#039;profinetFrameId&#039;&#039;&#039;: A specific Profinet frame ID.&lt;br /&gt;
* &#039;&#039;&#039;profinetCmOpnum&#039;&#039;&#039;: A specific operation number for Profinet CM (Context Manager) requests or responses. Can also be any for every operation number. Following values are used:&lt;br /&gt;
:#connect&lt;br /&gt;
:#release&lt;br /&gt;
:#read&lt;br /&gt;
:#write&lt;br /&gt;
:#control&lt;br /&gt;
:#read implicit&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;mpls&#039;&#039;&#039;: A label of an outer or inner MPLS. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;outerMpls&#039;&#039;&#039;: A label of an outer MPLS. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;innerMpls&#039;&#039;&#039;: A label of an inner MPLS. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;qosIpDscp&#039;&#039;&#039;: The DSCP value in the IP header. May be a number.&lt;br /&gt;
* &#039;&#039;&#039;qosMplsTc&#039;&#039;&#039;: The traffic class value in the outermost MPLS label stack entry.&lt;br /&gt;
* &#039;&#039;&#039;qosVlanPcp&#039;&#039;&#039;: The priority code point value in the outermost VLAN tag.&lt;br /&gt;
* &#039;&#039;&#039;group&#039;&#039;&#039;: The name of a configured group or ‘default’. If the name contains whitespaces, the name must be enclosed in quotes.&lt;br /&gt;
* &#039;&#039;&#039;badCRC&#039;&#039;&#039;: The value of this operand will be 1 for packets with a CRC error and will be 0 for good packets. Capturing packets with bad CRC is currently only supported on 1Gb interfaces.&lt;br /&gt;
* &#039;&#039;&#039;icmpType&#039;&#039;&#039;: The value of a certain ICMP type (e.g. Echo request 8, Echo reply 0).&lt;br /&gt;
* &#039;&#039;&#039;dhcpMessageType&#039;&#039;&#039;: The value of a certain DHCP message type (e.g. Request 3, ACK 5).&lt;br /&gt;
* &#039;&#039;&#039;tcpFlags&#039;&#039;&#039;: A single TCP flag or a list of TCP flags joined by the ‘+’ sign. If a list of flags is given, all flags must be present in the packet. Supported TCP flags are syn, ack, fin, rst, psh and urg.&lt;br /&gt;
* &#039;&#039;&#039;callId&#039;&#039;&#039;: The string value of a SIP call ID or similar identifier (e.g. P-Palladion-ID)&lt;br /&gt;
* &#039;&#039;&#039;ipFragment&#039;&#039;&#039;: If set to 1 all IPv4 fragments will be captured (i.e. packets having the &#039;More fragments&#039; flag and &#039;Fragment offset&#039; set). If set to 0 all packets without IPv4 fragmentation will be captured.&lt;br /&gt;
* &#039;&#039;&#039;regexp&#039;&#039;&#039;: The packet payload matches the quoted regular expression (RegEx) to the other side of the == operator or does not match the regular expression to the other side of the != operator. In case of IP packets the matching will be performed on the L7 payload of the packet. In case of non-IP packets the matching will be performed on the whole packet except the Ethernet header. Regular expressions largely support the pattern syntax used by the PCRE library with the exception of certain constructs. An invalid pattern will produce a descriptive error message and prevent the capture from being started.&lt;br /&gt;
* &#039;&#039;&#039;ipDoNotFragment&#039;&#039;&#039;: The value of this operand will be 1 for IPv4 packets that are marked as to not be fragmented (packets which have the &#039;do not fragment&#039; flag set).&lt;br /&gt;
* &#039;&#039;&#039;mactype&#039;&#039;&#039;: The type of the packets destination MAC address. Allowed values are &#039;unicast, &#039;broadcast&#039; and &#039;multicast&#039;.&lt;br /&gt;
* &#039;&#039;&#039;slowSubtype&#039;&#039;&#039;: The subtype of packets with the macProtocol == SLOW (e.g. 1 for LACP).&lt;br /&gt;
* &#039;&#039;&#039;wifiFrequency&#039;&#039;&#039;: The frequency (channel) of a WiFi packet in MHz.&lt;br /&gt;
* &#039;&#039;&#039;wifiBssid&#039;&#039;&#039;: The BSS ID participating in a WiFi packet. This is similar to a MAC address.&lt;br /&gt;
&lt;br /&gt;
For a specific precedence you may use parentheses &#039;&#039;&#039;(&#039;&#039;&#039;/&#039;&#039;&#039;)&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Examples:&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| ip == 10.0.0.1:1234 and ip == 10.1.0.1:9876&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match a connection from 10.0.0.1 to 10.1.0.1 or vice versa with the ports 1234 and 9876 involved.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| ip == 10.0.0.1 and ip != 10.0.0.2&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match packets having 10.0.0.1 either as source or destination. If a communication peer of 10.0.0.1 is 10.0.0.2 the packets will not be captured.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| l4Protocol == ICMP,ICMPv6&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match packets with ICMP or ICMPv6 layer 4 protocols.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| portrange == 80,443&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match packets to or from port 80 or 443.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == &amp;quot;allegr[o,a]&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;HTTP&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will case sensitive match packets that contain the string(s) &#039;allegro&#039; and/or &#039;allegra&#039; and/or &#039;HTTP&#039; anywhere in the payload.&lt;br /&gt;
:NOTE: The use of regexp is CASE sensitive. You must use the (?i) modifier to enable case insensitive filtering.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == &amp;quot;(?i)allegro&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;http&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will case insensitive match packets that contain the string(s) &#039;allegro&#039; and/or &#039;http&#039; anywhere in the payload.&lt;br /&gt;
:NOTE: The use of regexp is CASE sensitive. You must use the (?i) modifier to enable case insensitive filtering.&lt;br /&gt;
&lt;br /&gt;
Of course the Allegro Network Multimeter regular expression (RegEx) capture filter, can also be used in combination with our other capture expressions.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == “allegro&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;analyzer” and l7protocol == &amp;quot;dns&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:Will case sensitive match and capture &amp;lt;u&amp;gt;only DNS packets&amp;lt;/u&amp;gt; containing the string(s) “allegro” and/or “analyzer.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == “allegro&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;analyzer” and l7protocol != &amp;quot;dns&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:Will case sensitive match and capture all (except DNS) packets containing the string(s) “allegro” and/or “analyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Whenever you are unsure about the outcome of RegEx based packet capturing, you can pre-test the outcome of your expressions on https://pythex.org/. &lt;br /&gt;
While pre-testing on https://pythex.org/, avoid using the “IGNORECASE” button. Instead use the (?i) modifier for constructing case insensitive expressions, as mentioned above.&lt;br /&gt;
PCRE/Python based expression examples and explanations you&#039;ll find on https://www.programiz.com/python-programming/regex&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All captures can be limited to any amount of time or bytes, for example to capture only one minute or one megabyte of traffic.&lt;br /&gt;
&lt;br /&gt;
Below the list of filter criteria, you will find the button to actually start (or stop) the capture. In case the filter expression is invalid, the button is disabled.&lt;br /&gt;
&lt;br /&gt;
====Layer 7 protocol capture====&lt;br /&gt;
Layer 7 protocol detection engine may need several packets to recognize the currently used protocol. For these captures all not yet recognized packets will be skipped. As soon as the protocol recognition is finished, all packets matching the protocol filter will be captured.&lt;br /&gt;
&lt;br /&gt;
=== Configuration settings ===&lt;br /&gt;
By clicking on the gear button on the top right of the Capture web page, you can access the configuration section.&lt;br /&gt;
&lt;br /&gt;
*The maximum number of concurrent capture sessions&lt;br /&gt;
:Per default out-of-box setting (factory default), all Allegro Network Multimeter models allow up to 4 concurrent captures. As of FW ≥ V3.4, the number of allowed concurrent captures, can be increased up to 64, depending on model and available RAM. Note, that Increasing the number of allowed parallel/concurrent captures will decrease memory capacity for the in-memory DB, therewith decreasing the maximum timeframe of statistics held and presented in the web-interface. If the memory usage is too high, the number of parallel captures might be lower/limited by the Allegro itself.&lt;br /&gt;
&lt;br /&gt;
*Split PCAP file after this size&lt;br /&gt;
: This option can be used to limit the size of the PCAP file when storing to an attached device. Once the captured traffic would exceed this threshold, a new PCAP file with the current time stamp is created and the traffic is written to the new file. If the time stamp is still the same, an index is attached to the filename.&lt;br /&gt;
: When set to 0, no splitting will be done.&lt;br /&gt;
&lt;br /&gt;
*Split PCAP file after this duration&lt;br /&gt;
:This option can be used to limit the duration of the PCAP file when storing to an attached device. The duration starts counting with the start of the capture. Once the captured traffic would exceed the duration, a new PCAP file with the current time stamp is created and the traffic is written to the new file.&lt;br /&gt;
:When set to 0, no splitting will be done.&lt;br /&gt;
:Both split parameters can be combined. The PCAP file will be split as soon as one threshold has been reached.&lt;br /&gt;
&lt;br /&gt;
*The maximum number of concurrent packet ring buffers&lt;br /&gt;
:This option is used to specify how many cluster packet ring buffers can run in parallel.&lt;br /&gt;
:Be aware that each cluster will have it&#039;s own queue in memory and therefore the memory required is the number of cluster packet ring buffers multiplied by the setting of &#039;&#039;&#039;The size in MB for the queue of the packet ring buffer&#039;&#039;&#039;.&lt;br /&gt;
:A reboot of the device or a restart of the processing is needed for a change to this option to take effect.&lt;br /&gt;
&lt;br /&gt;
*The size in MB for the queue of the packet ring buffer&lt;br /&gt;
: This option allows to configure the size of the queue that holds processed packets before they are written to the packet ring buffer. Increasing the size of this queue may help if the disk used for the packet ring buffer cannot keep up with bursts of traffic so that packet drops occur in the packet ring buffer.&lt;br /&gt;
:Be aware that memory allocated to this queue is not available for storing statistics and metadata so that choosing a large value for this queue reduces the overall data storage time.&lt;br /&gt;
:Most users will not need to change this value from the default value.&lt;br /&gt;
:A reboot of the device or a restart of the processing is needed for a change to this option to take effect.&lt;br /&gt;
&lt;br /&gt;
*The maximum size in MB for the packet reorder buffer when capturing from the packet ring buffer&lt;br /&gt;
:This setting allows to choose the maximum size that the packet reorder buffer may grow to. For performance reasons the packet ring buffer does not ensure a total order of packets when storing them on disk. The packet reorder buffer is used to restore the correct order of packets in a capture when capturing from the packet ring buffer. A larger packet reorder buffer makes it more likely that the packet order can be restored for all packets. The actual amount of memory used for the packet reorder buffer depends on this setting but also on the amount of free memory in the system so that the effectively used amount of memory may be less than this setting indicates.&lt;br /&gt;
&lt;br /&gt;
=== Capture settings dialog ===&lt;br /&gt;
[[File:Choose capture settings.png|none|thumb|600x600px]]&lt;br /&gt;
This dialog appears after a capture button has been clicked. Following settings are possible:&lt;br /&gt;
*Start time and end time&lt;br /&gt;
:By clicking on the input field or on the calendar icon you can choose the start and end time of the capture. The input field is also editable with keyboard and allows entering a time on a second basis.&lt;br /&gt;
: If the start time is in the past, the complete capture is performed on the stored data of the capture ring buffer. When the capture reaches the newest packets it still continues to read from the capture ring buffer. The dialog will limit the start time input to the earliest data of the capture ring buffer. Be aware, that a possible capture ring buffer filter was applied on the past data and is also applied on future data in this mode.&lt;br /&gt;
: The start time may also be in the future. The capture is scheduled and starts as soon as a packet is received with a time later than the start time.&lt;br /&gt;
:If the whole time input field is marked and deleted, the start or end time will reset back to the default value. The default value for start time is &#039;&#039;&#039;now&#039;&#039;&#039;, the capture will start with pushing the &#039;&#039;&#039;Start capturing&#039;&#039;&#039; button. The default value of the end time is &#039;&#039;&#039;unlimited&#039;&#039;&#039;, the capture will not stop unless stopped manually by clicking on the stop button.&lt;br /&gt;
:Eight buttons offer quick selection of often used time settings.&lt;br /&gt;
&lt;br /&gt;
*Packet ring buffer&lt;br /&gt;
:If multiple packet ring buffer clusters are active this dropdown menu allows to choose from which cluster the packets should be captured.&lt;br /&gt;
&lt;br /&gt;
*Capture type&lt;br /&gt;
: This drop down menu allows to choose the method how packets are captured. The last successful setting is persistently stored per user. Following methods are available:&lt;br /&gt;
&lt;br /&gt;
:*HTTP download&lt;br /&gt;
::This is the default method. The capture will start a HTTP download of a PCAP file directly in the browser.&lt;br /&gt;
:: Available HTTP download options:&lt;br /&gt;
::*Set file name: allow to configure a custom file name for the capture file&lt;br /&gt;
::*Download as zip archive: Download the capture file as a compressed zip archive&lt;br /&gt;
:*Disk&lt;br /&gt;
::This method is only visible if at least one storage device is active and has some amount of free storage space. The capture will create a PCAP file on the selected storage device.&lt;br /&gt;
::If PCAP export via SFTP is enabled, an additional checkbox is displayed to store the capture file in the export directory, slated for upload according the SFTP export settings.&lt;br /&gt;
&lt;br /&gt;
:*Interface&lt;br /&gt;
::This mode will transmit the captured packets on a physical network interface. It is not available when the system is analyzing a PCAP file or is analyzing the packet ring buffer. The speed of the replay can be chosen below to real-time or specific speed or unlimited speed. The actual achievable speed depends on factors like the speed of the storage device. The maximum speed is typically &amp;lt;= 5 Gbps/400 kpps (also depending on the interface speed).&lt;br /&gt;
&lt;br /&gt;
:* ERSPAN&lt;br /&gt;
::This mode will transmit the captured packets encapsulated in a GRE + ERSPAN header on the management interface to a given target IP address. On the target system the   traffic can be   selectively captured using the filter &#039;&#039;&#039;ip proto 0x2f&#039;&#039;&#039; when using an application like Wireshark or tcpdump.&lt;br /&gt;
&lt;br /&gt;
:* Capture to SFTP server&lt;br /&gt;
::This mode will stream the PCAP to the selected SFTP server using the given credentials. SFTP servers can be configured on the Capture page&lt;br /&gt;
&lt;br /&gt;
*Storage device&lt;br /&gt;
:If the &#039;disk&#039; capture type is chosen, this drop-down menu allows to choose one of the active storage devices. The capture will be stored on the selected device.&lt;br /&gt;
&lt;br /&gt;
*File name&lt;br /&gt;
:If browser download or disk storage has been chosen and the &amp;quot;Set file name&amp;quot; checkbox has been selected, the file name of the created capture file can be set in this field. The default value shows the filename with date wildcards and the capture filter. The date wildcards are then replaced by the start time of the capture. &lt;br /&gt;
:Date format specifier can be used as supported by strftime() function call. Some common specifier:&lt;br /&gt;
:*%Y for year&lt;br /&gt;
:*%m for month&lt;br /&gt;
:* %d for day&lt;br /&gt;
:*%H for hours&lt;br /&gt;
:*%M for minutes&lt;br /&gt;
:*%S for seconds&lt;br /&gt;
:Filenames are remembered when the dialog is closed and reopened. Clicking the circular arrow resets the filename to its default.&lt;br /&gt;
&lt;br /&gt;
*Storage directory&lt;br /&gt;
:If disk storage has been chosen, the target directory on the storage device can be set in this field. Sub-directories on the storage device can be created and inspected on the [[Storage#Working with storage contents|Storage]] page.&lt;br /&gt;
&lt;br /&gt;
* Zip options&lt;br /&gt;
:If browser download has been chosen and the zip download option is selected, the file size can be configured after which the pcap files within the archive is spit into additional files&lt;br /&gt;
:The number is entered in megabytes. 0 means no splitting.&lt;br /&gt;
&lt;br /&gt;
*Interface to transmit on&lt;br /&gt;
:This dropdown menu is only shown when Capture type is Interface. Here the physical interface on which to transmit captured packets can be selected.&lt;br /&gt;
&lt;br /&gt;
* ERSPAN target address&lt;br /&gt;
:This section is only shown when Capture type is ERSPAN. Here the target IP address or hostname for the ERSPAN encapsulated packets must be specified.&lt;br /&gt;
&lt;br /&gt;
*ERSPAN session ID&lt;br /&gt;
:This section is only shown when Capture type is ERSPAN. The ERSPAN session ID can be used to differentiate between multiple capture session on the ERSPAN target.&lt;br /&gt;
&lt;br /&gt;
*Transmit speed&lt;br /&gt;
: This dropdown menu is only shown when the Capture type is either Interface or ERSPAN and the start time is in the past so that packets are captured from the packet ring buffer. Here the limiting mode can be chosen which controls how fast captured packets are transmitted. Following modes are available:&lt;br /&gt;
&lt;br /&gt;
:*none&lt;br /&gt;
::No limit will be applied and the packets are transmitted as fast as the network interface and the packet ring buffer allow.&lt;br /&gt;
&lt;br /&gt;
:*limit to bandwidth&lt;br /&gt;
::A bandwidth limit will be applied so that the given bandwidth in Mbps is not exceeded. The bandwidth can be given as a decimal so that e.g. 500kbps can be configured with a value of 0.5.&lt;br /&gt;
&lt;br /&gt;
:*realtime factor&lt;br /&gt;
:: Packets will be transmitted based on their recorded timing information. This means that with a real time factor of 1.0 packets will be transmitted approximately with the same timing as they were originally received. Using for example a real time factor of 2.0 would transmit the packets with twice the speed than they were received.&lt;br /&gt;
&lt;br /&gt;
* Transmit bandwidth in Mbps&lt;br /&gt;
:This is only shown when limit to bandwidth has been selected in the Transmit speed dropdown menu. The meaning of this value is explained in the Transmit speed section.&lt;br /&gt;
&lt;br /&gt;
*Transmit realtime factor&lt;br /&gt;
:This is only shown when realtime factor has been selected in the Transmit speed dropdown menu. The meaning of this value is explained in the :Transmit speed section.&lt;br /&gt;
&lt;br /&gt;
*Truncate packet length:&lt;br /&gt;
:This dropdown menu is only shown when the Capture type is either HTTP or disk. You can truncate captured Packets with this setting. All packets will be captured, but truncated to the given length if they are longer than this setting. The length setting is applied on layer 2 without frame check sequence.&lt;br /&gt;
:Possible values are:&lt;br /&gt;
:*Full length&lt;br /&gt;
:*64 Bytes&lt;br /&gt;
:*1500 Bytes&lt;br /&gt;
:*Custom length with an input field for inserting any length between 64 and 15378 Bytes&lt;br /&gt;
:*Capture profile: select a configured capture profile which defines rules about how many bytes are saved depending on the configured rules.&lt;br /&gt;
&lt;br /&gt;
*PCAP compatibility:&lt;br /&gt;
:This section is only shown when the Capture type is either HTTP or disk.&lt;br /&gt;
:*Omit interface ID&lt;br /&gt;
::Enabling this option will generate a PCAP file that only contains a single interface and treats all packets as if they arrived on that interface. This may improve compatibility with third party software that cannot handle PCAPs with multiple interfaces IDs.&lt;br /&gt;
&lt;br /&gt;
*PCAP comment:&lt;br /&gt;
:Allows to add a user defined comment to the generated PCAP file.&lt;br /&gt;
:*Add device information to comment&lt;br /&gt;
::Enabling this option will insert additional device information such as name, serial, memory size or capture filter into he PCAP comment.&lt;br /&gt;
&lt;br /&gt;
*PCAP packet type:&lt;br /&gt;
:This dropdown menu allows to choose the datalink packet type of the PCAP file. It is possible to choose between capturing regular Ethernet packets or raw Radiotap IEEE 802.11 WiFi packets in some places.&lt;br /&gt;
:Possible values are:&lt;br /&gt;
:*Ethernet&lt;br /&gt;
:*Radiotap&lt;br /&gt;
&lt;br /&gt;
* Anonymization&lt;br /&gt;
: This option allows enabling or disabling anonymization of the downloaded PCAP file by either apply generic settings or choosing a custom anonymization profile.&lt;br /&gt;
: See [[Capture_module#PCAP_anonymization_profile|PCAP anonymization]] for details.&lt;br /&gt;
&lt;br /&gt;
After pushing the &#039;&#039;&#039;Start capture&#039;&#039;&#039; button, the capture starts.&lt;br /&gt;
&lt;br /&gt;
=== Webshark ===&lt;br /&gt;
The Allegro Nework Multimeter has a preview mode to see the first Megabyte of captured packets directly in the browser. By clicking the Webshark preview button in the capture dialog, the first Megabyte of the requested packets will be extracted. If this is extraction is finished, a modal dialog will open showing the captured packets similar to Wireshark. The capture can be moved from the modal dialog to a separate window by pressing the button in the upper right corner next to the close button.&lt;br /&gt;
&lt;br /&gt;
=== Snort ===&lt;br /&gt;
The Allegro Network Multimeter is able to run a Snort analysis on the capture output and display the analysis output in the web browser. To do this, enable the feature in the [https://allegro-packets.com/wiki/Global_settings#Snort_analysis Global settings] and configure it accordingly. The Snort analysis button can be found at the bottom right of the capture modal.&lt;br /&gt;
&lt;br /&gt;
=== Capture URL === &lt;br /&gt;
It is possible to use an external tool like &#039;&#039;&#039;curl&#039;&#039;&#039; for creating and storing a PCAP.&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| curl -k -u USER:PASSWORD &#039;https://allegro-mm-XXXX/API/data/modules/capture?startTime=1517306266000000&amp;amp;endTime=1517309267000000&amp;amp;expression=l7Protocol==HTTP&amp;amp;snapPacketLength=65535&amp;amp;fromCaptureBuffer=true&#039; &amp;gt; path_to/capture.pcap&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
The user name, password and hostname similar to the access of the web interface have to be used.&lt;br /&gt;
Following parameters are possible:&lt;br /&gt;
&lt;br /&gt;
* startTime: The start time of the capture. The first packet with exactly this or a later time will start the capture. The time format must be microseconds after January, 1st 1970 UTC (Unix time, epoch). If the start time is in the past, make sure you set fromCaptureBuffer parameter accordingly.&lt;br /&gt;
*endTime: The end time of the capture. The first packet with exactly this or a later time will stop the capture. The time format must be microseconds after January, 1st 1970 UTC (Unix time, epoch).&lt;br /&gt;
*expression: The filter expression. There are no whitespaces allowed. You may use ‘%20’ instead.&lt;br /&gt;
*snapPacketLength: The max size of a packet applied on layer 2 without frame check sequence. If a packet is larger than this value, it is truncated. Use 65535 for unlimited size.&lt;br /&gt;
* fromCaptureBuffer: Whether to extract data from the packet ring buffer or just live traffic.&lt;br /&gt;
*captureToMedia: Whether to store PCAP on external storage device or download with your browser on your computer.&lt;br /&gt;
* useSingleInterface: Whether to store only a single interface in the PCAP and treat all packets as if they arrived on that interface. This may improve compatibility with third party software that cannot handle PCAPs with multiple interfaces IDs.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=DB_persistence&amp;diff=5009</id>
		<title>DB persistence</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=DB_persistence&amp;diff=5009"/>
		<updated>2025-03-25T08:20:12Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The DB persistence feature (in firmware &amp;gt;= 4.2) can write parts of the In-Memory database onto an selected storage device when stopping the packet processing (either manually or when rebooting the device). On restart, the stored data is imported again to make some data available again after restart.&lt;br /&gt;
&lt;br /&gt;
The stored data comprises:&lt;br /&gt;
[[File:DB persistence settings.png|thumb|DB persistence settings]]&lt;br /&gt;
* the list of MAC addresses and their direct graphs, not including the per-element tables.&lt;br /&gt;
* the list of IP addresses and their direct graphs (traffic, retransmissions and other TCP stats for that IP address), not including the per-element tables.&lt;br /&gt;
* the IP groups data (same elements as the IP addresses).&lt;br /&gt;
* the Layer 7 protocol traffic graphs.&lt;br /&gt;
&lt;br /&gt;
The feature must be enabled in the global settings in the &amp;quot;Long-term DB and persistence&amp;quot; tab. The storage device must be selected and should be reasonable fast. We recommend using SSD storage only as it can take a few seconds to a few minutes on such fast disc but much longer on slower spinning discs.&lt;br /&gt;
&lt;br /&gt;
The configuration sections shows the estimated required space on the storage device. Since the amount of data stored depends on the actual number elements (IP addresses etc), it may vary and the process will use less memory if possible or try to use more memory if necessary.&lt;br /&gt;
&lt;br /&gt;
The processing restart dialog will allow to disable dump and/or restoration for one time.&lt;br /&gt;
&lt;br /&gt;
The dialog also shows progress during restart which also to cancel the operation.&lt;br /&gt;
&lt;br /&gt;
The configuration dialog also shows the size of the persisted data and allow to remove it.&lt;br /&gt;
&lt;br /&gt;
=== Additional options ===&lt;br /&gt;
&lt;br /&gt;
* With longterm DB, skip writing live data onto storage device (reduces dump/restore time): Since Firmware version 4.3, the [[Longterm DB]] is also stored on the SSD. To reduce the amount of time needed for dump and restore, the dump of the live data can be disabled since this is usually much more data and it might not be necessary to write this as well.&lt;br /&gt;
* Since firmware version 4.5, it is also possible to enable a periodic dump once per day. In case of unexpected loss of power or other restarts, the last dump will be automatically read in on restart. The configuration settings allows to select any full hour of the day. It is recommended to choose an hour with less traffic then usual as the dump process increases the load of the system.&lt;br /&gt;
&lt;br /&gt;
=== Limitations ===&lt;br /&gt;
&lt;br /&gt;
* Data dump and restoration works between the same firmware version and also between different firmware version but due to increasing feature set, importing data from a newer firmware (when downgrading) may not work always. In this case the import will be only partial and normal operation continues.&lt;br /&gt;
* Some setting changes will make the import of some data impossible:&lt;br /&gt;
** Changing the resolution of graph data is not supported for the DB persistence feature. The import will skip data from written with different settings.&lt;br /&gt;
* As with all data on storage devices, the configuration of factory reset will not delete the persisted DB data and it must be removed manually by either selecting the button in the configuration dialog or by formatting the storage device.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Back-in-Time_functionality&amp;diff=4972</id>
		<title>Back-in-Time functionality</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Back-in-Time_functionality&amp;diff=4972"/>
		<updated>2025-02-18T15:00:32Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Allegro Network Multimeter allows for accessing older data to debug network issues that happen sporadically or are already over. &lt;br /&gt;
&lt;br /&gt;
On the top bar you see either a green &#039;&#039;&#039;LIVE&#039;&#039;&#039; box or a red &#039;&#039;&#039;back-in-time&#039;&#039;&#039; box indicate whether live data is shown are (fixed) data from the past. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|&lt;br /&gt;
: [[File:time_dropdown_unselected.png|430px|Selecting time span|border]] :[[File:time_dropdown_set.png|500px|Selecting time span|border]]&lt;br /&gt;
|}&lt;br /&gt;
In the latter mode, the start and end time is shown as well.&lt;br /&gt;
&lt;br /&gt;
You can click into any history graph shown in the web interface to go back to the corresponding time under the mouse pointer. &lt;br /&gt;
&lt;br /&gt;
The time window is also halved on every click to be able to zoom into specific network events.&lt;br /&gt;
&lt;br /&gt;
A lot of data is available for any specific time frame, such as the amount of traffic processed for an IP address. &lt;br /&gt;
&lt;br /&gt;
But not every single data set is available in the &#039;&#039;&#039;back-in-time&#039;&#039;&#039; view due to memory constraints to store all data. &lt;br /&gt;
&lt;br /&gt;
Also, the resolution of data decreases with new data arriving. &lt;br /&gt;
&lt;br /&gt;
For instance, data for the last minute is always available in one second resolution, while older data might be only available in two second resolution or larger. &lt;br /&gt;
&lt;br /&gt;
Network problems within smaller time spans can still be debugged since absolute counters will still show any network traffic happened between time intervals.&lt;br /&gt;
&lt;br /&gt;
The time constraints applied depend on the context of the data. For instance, IP lists are filtered so that only IPs that had activity before and after the time window. &lt;br /&gt;
&lt;br /&gt;
IPs that are not active during the time window are not shown.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;back-in-time&#039;&#039;&#039; mode can be exited by clicking on the red &#039;&#039;&#039;back-in-time&#039;&#039;&#039; box on the top of the web interface. The Allegro Network Multimeter will switch back to the live view.&lt;br /&gt;
&lt;br /&gt;
Note that even in &#039;&#039;&#039;back-in-time&#039;&#039;&#039; mode, the device still measures every packet going through it so you will not miss any data.&lt;br /&gt;
&lt;br /&gt;
=== Difference Live and Back-In-Time Mode ===&lt;br /&gt;
One notable difference between Live and Back-In-Time mode is the presentation of numerical counters. Counters in live mode are always from start of measurement (or last reset), while counters in back-in-time mode a relative counters within the active time interval.&lt;br /&gt;
&lt;br /&gt;
That means that regardless of the zoom level, in live mode the counters are always the shown since start of the measurement, not start of the zoom level interval.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!&lt;br /&gt;
!LIVE&lt;br /&gt;
!Back-In-Time&lt;br /&gt;
|-&lt;br /&gt;
|Traffic counter&lt;br /&gt;
|Total counter from start or last reset&lt;br /&gt;
Example: &amp;quot;packets&amp;quot; are packets since start&lt;br /&gt;
|Relative counters during time interval&lt;br /&gt;
Example: &amp;quot;packets&amp;quot; are number of packets in interval&lt;br /&gt;
|-&lt;br /&gt;
|Graph data&lt;br /&gt;
|Traffic data within time interval&lt;br /&gt;
|Traffic data within time interval&lt;br /&gt;
|-&lt;br /&gt;
|Capturing&lt;br /&gt;
|Data source is live traffic (no need for ring buffer).&lt;br /&gt;
Exception: Manual time range override in capture dialog&lt;br /&gt;
|Date source is ring buffer&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Use cases: ====&lt;br /&gt;
&lt;br /&gt;
# Task: Check the traffic within the last hour of the IP addresses with the most traffic overall. Solution: Choose &amp;quot;1 hour live&amp;quot; display and sort the IP table for bytes. The first IP is the IP with the most bytes overall. The graph contains the activity within the last one hour. Use case: you want to check if multiple backup servers which usually have a lot of traffic had activity within the last hour. Sort for bytes is an easy way to identify those and with live view you can still see the activity within that interval.&lt;br /&gt;
# Task: Which IP had the most traffic within the last hour? Solution: Choose &amp;quot;Last hour&amp;quot; display and sort the IP table for bytes. The first IP is the IP with the most bytes within the last one hour.&lt;br /&gt;
&lt;br /&gt;
=== Data not available in back-in-time mode ===&lt;br /&gt;
Some data is not available for a specific time period in the back-in-time mode, but only as a total value since the start of the measurement.&lt;br /&gt;
&lt;br /&gt;
The web interface highlights all data that is not available with a Gray background. &lt;br /&gt;
&lt;br /&gt;
This allows to still read the data while still knowing which data is from the time window and which data comes from the latest measurements.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;u&amp;gt;Example:&amp;lt;/u&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The global TCP handshake in the [[TCP module]] reflects the total average in live mode, while it shows the average during the selected time period in back-in-time mode. But the server classification into high/normal/low is only available as a total value for the whole runtime and is there shown in gray.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=4966</id>
		<title>Longterm DB</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=4966"/>
		<updated>2025-02-11T12:20:39Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
The Long-term DB feature (in firmware &amp;gt;= 4.3) uses an attached storage devices to store traffic information of IP addresses and Layer 7 protocols with low resolution for a much longer time than the live statistics.&lt;br /&gt;
&lt;br /&gt;
The elements stored in the long-term DB are as follows, graph data is available in 5 minute resolution: &lt;br /&gt;
&lt;br /&gt;
* IP addresses&lt;br /&gt;
*# activity time&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
* Layer 7 protocols&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
&lt;br /&gt;
The storage is used similar to a swap file mechanism so the long-term data is not kept between restart unless the [[DB persistence]] feature is enabled too, which is recommended when using the long-term feature. To reduce the amount of time to dump/restore, the DB persistence configuration allow to skip storing live data. &lt;br /&gt;
&lt;br /&gt;
==Usage==&lt;br /&gt;
[[File:Longterm DB dashboard.png|alt=Long-term DB activated dashboard|thumb|Long-term DB activated dashboard]]If this feature is enabled, a view toggle button appears in the top menu bar. This button allows to switch between the real time &amp;quot;RT&amp;quot; view and the long-term (&amp;quot;LT&amp;quot;) view.&lt;br /&gt;
&lt;br /&gt;
In the long-term view, the IP address information contain only information about the traffic amount in 5 minute resolution.&lt;br /&gt;
&lt;br /&gt;
The navigation menu in the long-term view only contains those modules which are available in this view.&lt;br /&gt;
&lt;br /&gt;
If the long-term view is activated on module pages which do not support long-term data, a corresponding info box is shown.&lt;br /&gt;
&lt;br /&gt;
==Setting==&lt;br /&gt;
The configuration can be found in the global settings page in the &amp;quot;Long-term DB and persistence&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
To enable this feature, select a storage device to be used, enable the feature and enter a file size. &lt;br /&gt;
&lt;br /&gt;
It is recommended to also enable the [[DB persistence]] feature to be able to save and restore the long-term DB data during restarts.&lt;br /&gt;
&lt;br /&gt;
Once enabled, the utilization of the file is shown and the [[System Info Page]] contains information about how long the data can be kept.&lt;br /&gt;
&lt;br /&gt;
Tip: Since the amount of information stored in the long-term DB is limited by the graph resolution, the file size usually don&#039;t need to be similar sized as the main memory. 10 GByte is a good starting point.&lt;br /&gt;
&lt;br /&gt;
The size can be increase but it requires a restart of the packet processing.&lt;br /&gt;
&lt;br /&gt;
[[File:DB persistence settings.png|thumb|Long-term DB settings]]&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
Recommended storage device types:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Storage device&lt;br /&gt;
!Note&lt;br /&gt;
|-&lt;br /&gt;
|NMVe based SSD&lt;br /&gt;
|recommended&lt;br /&gt;
|-&lt;br /&gt;
|SATA based SSD&lt;br /&gt;
|can be used for moderate traffic, check system load for high system utilization&lt;br /&gt;
|-&lt;br /&gt;
|USB based SSD&lt;br /&gt;
|not recommended, but might be useful for small systems (Allegro 200/500)&lt;br /&gt;
|-&lt;br /&gt;
|HDD&lt;br /&gt;
|not recommended, should not be used&lt;br /&gt;
|}&lt;br /&gt;
It is also not recommended to place the long-term DB on the same storage device that is used a packet ring buffer as it will deteriorate the performance of both features.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
# The data in the long-term DB is limited to a selected subset of the data in the In-Memory-DB. See above for an exact list of elements available.&lt;br /&gt;
# The data is written into the long-term DB in variable intervals depending on traffic and system load. It takes up to 10 minutes (two graph intervals) until the data appears in the graph. Therefore, the last 5-10 minutes appear empty or with less traffic than in live view.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=4965</id>
		<title>Longterm DB</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=4965"/>
		<updated>2025-02-11T12:19:11Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
The Long-term DB feature (in firmware &amp;gt;= 4.3) uses an attached storage devices to store traffic information of IP addresses and Layer 7 protocols with low resolution for a much longer time than the live statistics.&lt;br /&gt;
&lt;br /&gt;
The elements stored in the long-term DB are as follows, graph data is available in 5 minute resolution: &lt;br /&gt;
&lt;br /&gt;
* IP addresses&lt;br /&gt;
*# activity time&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
* Layer 7 protocols&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
&lt;br /&gt;
The storage is used similar to a swap file mechanism so the long-term data is not kept between restart unless the [[DB persistence]] feature is enabled too, which is recommended when using the long-term feature. To reduce the amount of time to dump/restore, the DB persistence configuration allow to skip storing live data. &lt;br /&gt;
&lt;br /&gt;
==Usage==&lt;br /&gt;
[[File:Longterm DB dashboard.png|alt=Longterm DB activated dashboard|thumb|Longterm DB activated dashboard]]If this feature is enabled, a view toggle button appears in the top menu bar. This button allows to switch between the real time &amp;quot;RT&amp;quot; view and the long-term (&amp;quot;LT&amp;quot;) view.&lt;br /&gt;
&lt;br /&gt;
In the long-term view, the IP address information contain only information about the traffic amount in 5 minute resolution.&lt;br /&gt;
&lt;br /&gt;
The navigation menu in the long-term view only contains those modules which are available in this view.&lt;br /&gt;
&lt;br /&gt;
If the long-term view is activated on module pages which do not support long-term data, a corresponding info box is shown.&lt;br /&gt;
&lt;br /&gt;
==Setting==&lt;br /&gt;
The configuration can be found in the global settings page in the &amp;quot;Long-term DB and persistence&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
To enable this feature, select a storage device to be used, enable the feature and enter a file size. &lt;br /&gt;
&lt;br /&gt;
It is recommended to also enable the [[DB persistence]] feature to be able to save and restore the long-term DB data during restarts.&lt;br /&gt;
&lt;br /&gt;
Once enabled, the utilization of the file is shown and the [[System Info Page]] contains information about how long the data can be kept.&lt;br /&gt;
&lt;br /&gt;
Tip: Since the amount of information stored in the long-term DB is limited by the graph resolution, the file size usually don&#039;t need to be similar sized as the main memory. 10 GByte is a good starting point.&lt;br /&gt;
&lt;br /&gt;
The size can be increase but it requires a restart of the packet processing.&lt;br /&gt;
&lt;br /&gt;
[[File:Longterm db settings.png|thumb|Longterm DB settings]]&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
Recommended storage device types:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Storage device&lt;br /&gt;
!Note&lt;br /&gt;
|-&lt;br /&gt;
|NMVe based SSD&lt;br /&gt;
|recommended&lt;br /&gt;
|-&lt;br /&gt;
|SATA based SSD&lt;br /&gt;
|can be used for moderate traffic, check system load for high system utilization&lt;br /&gt;
|-&lt;br /&gt;
|USB based SSD&lt;br /&gt;
|not recommended, but might be useful for small systems (Allegro 200/500)&lt;br /&gt;
|-&lt;br /&gt;
|HDD&lt;br /&gt;
|not recommended, should not be used&lt;br /&gt;
|}&lt;br /&gt;
It is also not recommended to place the long-term DB on the same storage device that is used a packet ring buffer as it will deteriorate the performance of both features.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
# The data in the long-term DB is limited to a selected subset of the data in the In-Memory-DB. See above for an exact list of elements available.&lt;br /&gt;
# The data is written into the long-term DB in variable intervals depending on traffic and system load. It takes up to 10 minutes (two graph intervals) until the data appears in the graph. Therefore, the last 5-10 minutes appear empty or with less traffic than in live view.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=DB_persistence&amp;diff=4964</id>
		<title>DB persistence</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=DB_persistence&amp;diff=4964"/>
		<updated>2025-02-11T12:17:22Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The DB persistence feature (in firmware &amp;gt;= 4.2) can write parts of the In-Memory database onto an selected storage device when stopping the packet processing (either manually or when rebooting the device). On restart, the stored data is imported again to make some data available again after restart.&lt;br /&gt;
&lt;br /&gt;
The stored data comprises:&lt;br /&gt;
[[File:DB persistence settings.png|thumb|DB persistence settings]]&lt;br /&gt;
* the list of MAC addresses and their direct graphs, not including the per-element tables.&lt;br /&gt;
* the list of IP addresses and their direct graphs (traffic, retransmissions and other TCP stats for that IP address), not including the per-element tables.&lt;br /&gt;
* the IP groups data (same elements as the IP addresses).&lt;br /&gt;
* the Layer 7 protocol traffic graphs.&lt;br /&gt;
&lt;br /&gt;
The feature must be enabled in the global settings in the &amp;quot;Long-term DB and persistence&amp;quot; tab. The storage device must be selected and should be reasonable fast. We recommend using SSD storage only as it can take a few seconds to a few minutes on such fast disc but much longer on slower spinning discs.&lt;br /&gt;
&lt;br /&gt;
The configuration sections shows the estimated required space on the storage device. Since the amount of data stored depends on the actual number elements (IP addresses etc), it may vary and the process will use less memory if possible or try to use more memory if necessary.&lt;br /&gt;
&lt;br /&gt;
The processing restart dialog will allow to disable dump and/or restoration for one time.&lt;br /&gt;
&lt;br /&gt;
The dialog also shows progress during restart which also to cancel the operation.&lt;br /&gt;
&lt;br /&gt;
The configuration dialog also shows the size of the persisted data and allow to remove it.&lt;br /&gt;
&lt;br /&gt;
=== Additional options ===&lt;br /&gt;
&lt;br /&gt;
* With longterm DB, skip writing live data onto storage device (reduces dump/restore time): Since Firmware version 4.3, the [[Longterm DB]] is also stored on the SSD. To reduce the amount of time needed for dump and restore, the dump of the live data can be disabled since this is usually much more data and it might not be necessary to write this as well.&lt;br /&gt;
&lt;br /&gt;
=== Limitations ===&lt;br /&gt;
&lt;br /&gt;
* Data dump and restoration works between the same firmware version and also between different firmware version but due to increasing feature set, importing data from a newer firmware (when downgrading) may not work always. In this case the import will be only partial and normal operation continues.&lt;br /&gt;
* Some setting changes will make the import of some data impossible:&lt;br /&gt;
** Changing the resolution of graph data is not supported for the DB persistence feature. The import will skip data from written with different settings.&lt;br /&gt;
* As with all data on storage devices, the configuration of factory reset will not delete the persisted DB data and it must be removed manually by either selecting the button in the configuration dialog or by formatting the storage device.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Global_settings&amp;diff=4963</id>
		<title>Global settings</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Global_settings&amp;diff=4963"/>
		<updated>2025-02-11T11:59:18Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Global settings section contains parameters for adjusting the behavior of the system.&lt;br /&gt;
The settings are split among multiple tabs, described as follows.&lt;br /&gt;
&lt;br /&gt;
== Generic settings ==&lt;br /&gt;
&lt;br /&gt;
=== Packet processing mode ===&lt;br /&gt;
&lt;br /&gt;
This section allows for configuring the main packet processing mode:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Bridge mode&#039;&#039;&#039;: In Bridge mode A.K.A. In-Line mode, all received packets will be transmitted between corresponding port pairs (e.g. 1+2, 3+4 on Allegro 500) so that the Allegro Network Multimeter can be placed in-line between any network component.&amp;lt;br/ &amp;gt;The device will operate transparent and will not modify network traffic in any way. The additional latency will be typically around or less than 1 millisecond.&amp;lt;br&amp;gt;In Bridge mode it is also possible to process network traffic from a mirror port or Tap. However, &amp;quot;only&amp;quot; half of the total available ports on each respective Allegro Network Multimeter model can be used to operate in this way.  For example on a 4-port Allegro model 500, you can conveniently leave the unit in bridge mode and connect up to two mirror ports on interfaces 1 and 3 respectively. Aforementioned interfaces are physically separated and not an (in-line) interface pair.&amp;lt;br /&amp;gt;Always avoid connecting mirror port traffic on an Allegro Network Multimeter interface pair (e.g. 1+2, 3+4 on Allegro 500), as this will result in TX traffic in the direction of a mirror port which if highly undesirable.&amp;lt;br /&amp;gt;[[File:Inline mode.jpg|800px|Allegro in brigde mode (in-line)]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Sink mode&#039;&#039;&#039;: In Sink mode, the Allegro Network Multimeter will operate &amp;quot;receive only&amp;quot;.&amp;lt;br /&amp;gt;Packets are not forwarded and there&#039;s no bi-directional traffic on any of the monitoring ports. This operation mode allows for installation at a Mirror port of a Switch or when using a network Tap to access the network traffic.&amp;lt;br /&amp;gt;[[File:Sink mode1.jpg|800px|Allegro in Sink mode on Mirror port or Tap]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Mixed bridge/sink mode:&#039;&#039;&#039; This mode enables to configure the packet processing mode for each interface pair. Interface pairs default to Bridge mode but the mode can be permanently changed in the [[interface statistics]].&lt;br /&gt;
&lt;br /&gt;
The packet processing mode can be changed during runtime.&lt;br /&gt;
 &lt;br /&gt;
Attention: Please always keep in mind, that while in bridge mode (Allegro Network Multimeter = in-line), a Link will be (shortly) interrupted when switching processing mode or/and rebooting the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
=== Endpoint mode ===&lt;br /&gt;
&lt;br /&gt;
If the endpoint mode is enabled for an interface, this interface will only process packets sent to the configured IP address (and potentially the port). If the system is running in bridge packet processing mode, links with an interface configured for endpoint mode will not forward traffic. The following types of traffic are supported:&lt;br /&gt;
&lt;br /&gt;
* Ethernet packets encapsulated in GRE or GRE+ERSPAN and targeted for the configured IP address.&amp;lt;br /&amp;gt;The system will process the packets as if only the inner encapsulated packet is seen and any traffic captures will only contain the encapsulated packet.&lt;br /&gt;
* UDP packets to specific port (packets will be analyzed as is).&lt;br /&gt;
&lt;br /&gt;
An interface with endpoint mode enabled will respond to ARP requests and to ICMP echo requests so it is possible to use ping to verify that the interface is reachable under the configured IP address.&lt;br /&gt;
&lt;br /&gt;
It must be noted that if the system is running in bridge packet processing mode, any links with an interface configured for endpoint mode will not forward traffic.&lt;br /&gt;
&lt;br /&gt;
VLAN tag handling is not supported. The Allegro Network Multimeter will accept ARP and ICMP requests with any VLAN tags but will send replies without VLAN tagging.&lt;br /&gt;
&lt;br /&gt;
Note: In versions 3.0 or older, the mode was named &amp;quot;l3 tunnel mode&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Webshark support ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter allows having a preview of packets, directly in the browser. This is the so called Webshark. To support Webshark previewing, the Allegro Network Multimeter needs to reserve an amount of system memory.&lt;br /&gt;
&lt;br /&gt;
This reserved amount of memory (RAM) is configurable and will not be available for the In-Memory database, thus the history of stored statistics in the dashboard becomes a little shorter. If this is not desired, it is possible to disable the Webshark support.&lt;br /&gt;
&lt;br /&gt;
Multiple parallel sessions/instances of Webshark previewing within one Allegro Network Multimeter is possible. The number of simultaneous Webshark instances and max. preview file size (e.g. 5MB) are configurable but may vary depending on Allegro model and installed RAM.&lt;br /&gt;
&lt;br /&gt;
Changing Webshark parameters requires a restart of the processing.&lt;br /&gt;
&lt;br /&gt;
[[File:Webshark.jpg|900px|Built in Webshark - Allegro Network Multimeter ]]&lt;br /&gt;
&lt;br /&gt;
=== Snort analysis===&lt;br /&gt;
{{Warning|title=Beta Feature|This feature is still in active development and is therefore subject to changes in the future. There may be bugs or unexpected behavior when using this feature.}}&lt;br /&gt;
The Allegro Network Multimeter is able to perform intrusion detection based on the [https://www.snort.org/ Snort] software project. The detection can be performed on live traffic or ring buffer traffic. This analysis is invoked via the capture dialog on any page and respects the same capture filter expressions as a normal traffic capture. &lt;br /&gt;
[[File:Snort Analysis Results.png|thumb|Snort Analysis Results]]&lt;br /&gt;
This feature is disabled by default, to enable it navigate to Global Settings &amp;gt; Snort Analysis and enable it via the toggle switch. Once enabled a new setting will appear to regulate the allowed memory usage by the intrusion detection. The user is able to set a hard maximum limit on the usable memory, and if the Snort process exceeds this limit it will be killed by the OOM-Manager. Additionally, another soft memory limit will be installed just below the hard maximum, and if the process reaches this limit it will be throttled heavily. If your intrusion analysis appears to get stuck or is unusually slow, a good troubleshooting step is to increase the memory limit. It is generally not recommended to keep the memory limit below 200MB. &lt;br /&gt;
&lt;br /&gt;
When invoking the analysis a new modal will open which displays the results of the analysis. The result modal is a list of detected incidents, sorted by order of appearance. An entry in this list has the following structure: &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Severity&lt;br /&gt;
!Time&lt;br /&gt;
!Classification&lt;br /&gt;
!Message&lt;br /&gt;
!Connection&lt;br /&gt;
|-&lt;br /&gt;
|This is denoted by the color on the left hand side of the row.&lt;br /&gt;
|The packet timestamp of the offending packet.&lt;br /&gt;
|A normalized name for the type of incident that occured.&lt;br /&gt;
|A more detailed description of the incident&lt;br /&gt;
|A diagram of the connection in which the incident occured. The IPs can be clicked to go to the IP detail page, and on the right there is an &amp;quot;external link&amp;quot; icon that opens the connection details page in a new tab.&lt;br /&gt;
|}&lt;br /&gt;
Additionally, on the right hand side of the modal is another color band that serves as a rough overview over all incidents. The band is static and roughly aligned with the scroll bar to make it easier to navigate to specific severity incidents.&lt;br /&gt;
&lt;br /&gt;
Snort works by reading a rule file which contains a list of rules used to match packets against. These rules can match subnet, direction, protocol, payload contents, and more (see the Snort documentation for more information on rules), and are given a classification, message and priority, which are displayed in the analysis results. Internally this feature uses a community rule set which is available for free and receives periodic updates. &#039;&#039;&#039;Note:&#039;&#039;&#039; The Allegro Network Multimeter (currently) does NOT automatically update this rule set. We are deploying the same rule set to all devices independent of the date of installation. Thus the analysis may not be able to detect zero day exploits and should not be relied on when trying to detect recently discovered attack vectors.&lt;br /&gt;
&lt;br /&gt;
At the moment, only critical and severe incidents are reported (Snort priorities 0 and 1). The classification and message strings are taken directly from the rule that triggered this incidents.&lt;br /&gt;
&lt;br /&gt;
===Detail of traffic analysis===&lt;br /&gt;
&lt;br /&gt;
Limit module processing, allows you to configure which OSI-layers (2,3,4,7) are actively processed and analyzed by the Allegro Network Multimeter. With this setting, the performance of the Allegro Network Multimeter can be significantly improved and allows for higher throughput when disabling some analysis modules.&lt;br /&gt;
&lt;br /&gt;
For both realtime and offline parallel analysis, the following modes are possible :&lt;br /&gt;
&lt;br /&gt;
*Only capturing: Only interface statistics and the capture module is provided. Capture filters are supported without Layer 7 protocol specification/recognition.&lt;br /&gt;
*Capturing and protocol detection: Additionally Layer 7 protocol specification in Capture filters will now work.&lt;br /&gt;
*Up to Layer 2: Additionally all Layer 2 related modules are active such as MAC, MAC protocols, ARP and Burst Analysis.&lt;br /&gt;
*Up to Layer 3: Additionally all Layer 3 related modules are active such as IP and DHCP statistics.&lt;br /&gt;
*Up to Layer 4: Additionally all Layer 4 related modules are active such as TCP and Layer 4 server ports.&lt;br /&gt;
*Unlimited: All Allegro Network Multimeter modules are active.&lt;br /&gt;
&lt;br /&gt;
When switching to another mode you need to restart the processing in order to activate the new settings.&lt;br /&gt;
&lt;br /&gt;
NOTE: The data recorded to/stored in the Packet Ring buffer, will NOT be affected by any of the above settings. Packet ring buffer capture rules may be configured under &amp;quot;Generic - Packet Ring Buffer&amp;quot;, further explained in our wiki here https://allegro-packets.com/wiki/Packet_ring_buffer#Packet_ring_buffer_snapshot_length_filter&lt;br /&gt;
&lt;br /&gt;
====Enable single flow load balancing====&lt;br /&gt;
When the &#039;&#039;Limit module processing&#039;&#039; slider is turned to &#039;&#039;Only capturing&#039;&#039; the option to enable &#039;&#039;single flow load balancing&#039;&#039; appears. If this option is enabled, even a single flow is load-balanced to different analyzer threads.&lt;br /&gt;
&lt;br /&gt;
This is only recommended when there are very few flows and there is an imbalance in the load of the analyzers. As the packets of a single flow are processed by different analyzers the packets of the flow may be stored out-of-order in the Packet Ring Buffer and a larger amount of memory may be required to reorder the packets when capturing from the Packet Ring Buffer (see [[Capture module#Configuration settings|Capture module]] configuration settings). &lt;br /&gt;
&lt;br /&gt;
===Graph detail settings===&lt;br /&gt;
&lt;br /&gt;
It is possible to modify the detail level of all graphs in the interface. This settings allow you to see a more detailed view (with higher time resolution) or to reduce the detail level so more data can be stored on the device. Changing the default values has an impact on the performance and memory usage. Changing a slider to the left increases the detail level of graphs, but increases memory usage and decreases performance.&lt;br /&gt;
&lt;br /&gt;
*Best graph resolution: This option configures how detailed the graph information are shown in the best case (the latest information). The default value is one second which means that a graph sample point represents a second of packet time. You can change the resolution up to 1 millisecond which gives a detailed sub-second representation of the traffic. You can also decide to decrease the resolution which enables the Allegro Network Multimeter to store more data for a longer period of time.&lt;br /&gt;
&lt;br /&gt;
*Reduce graph resolution of old data by up to: The resolution of older graph data is automatically reduced to save memory and to allow a longer view into the traffic history. This option allows you to change this behaviour. With a reduction factor of 1/1 no reduction is done at all which means the selected graph resolution is available for the complete time.&lt;br /&gt;
:This reduces the time period to see historical data. You can choose to increase the reduction factor to store more data for a longer period. The time printed in parentheses represents the worst-case graph resolution based on the chosen resolution and reduction factor. The reduction is done in multiple steps up to this limit. The newest data always has the highest resolution defined by the &amp;quot;Best graph resolution&amp;quot; setting above. Between 60 and 120 data points are stored at a minimum, so with default resolution of 1 second, between one and two minutes are available in the highest resolution. Due to internal compression, the exact number of data points cannot be foreseen but 60 data points are always available at least, usually much more.  Once the limit is reached, data is reduced by a factor of two thus doubling the amount of time available in half resolution (2 to 4 minutes in 2 second resolution). When the next limit is reached, the data is halved again thus doubling the time again, until the configured reduction limit is reached.  With default settings of one second resolution and reduction limit of 1/6, the worst resolution of 64 seconds (or 1 minute and 4 seconds) is reached not before 2 hours into the past.  The drop down menu in graph view gives an exact number about the available graph resolution in the given time period.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note: Regardless of these settings, the graph values are always converted to represent a value per second (when applicable). For example, the packets per second for an IP addresses will always be a value literally per second even if the resolution is larger or smaller than one second. The displayed value is scaled to match this view. Especially with sub-second resolution this might be misleading.&lt;br /&gt;
&lt;br /&gt;
For instance, if there is a network element sending one packet per second and the resolution is set to 100 milliseconds, the &amp;lt;u&amp;gt;value shown in the graph&amp;lt;/u&amp;gt; might be shown as 10 packets per second as each sample point is scaled to represent an value per second.&amp;lt;br&amp;gt;For a detailed investigation it is recommended to always select a specific time interval and look at the (packet) counters shown in all statistics since these are unscaled and represent the actual values.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Performance implications: The performance degradation and memory usage depends on the actual network traffic and is not exactly predictable. &lt;br /&gt;
&lt;br /&gt;
Here are some examples for reference on a Allegro 1000 series with different configuration values (under ideal test conditions):&lt;br /&gt;
&lt;br /&gt;
* 1 second resolution, 1/1 reduction factor: 90% of default performance&lt;br /&gt;
*100 millisecond resolution, 1/1 reduction factor: 50% of default performance,&lt;br /&gt;
*10 millisecond resolution, 1/1 reduction factor: 15% of default performance&lt;br /&gt;
*1 millisecond resolution, 1/1 reduction factor: 10% of default performance&lt;br /&gt;
&lt;br /&gt;
=== PCAP parallel analysis===&lt;br /&gt;
&lt;br /&gt;
The PCAP parallel analysis feature allows to analyse PCAP files or the&lt;br /&gt;
packet ring buffer in parallel to the live measurement. The settings&lt;br /&gt;
allow to enable the feature and choose how much memory of the main&lt;br /&gt;
memory is used for parallel analysis and how many parallel slots can&lt;br /&gt;
be used. Detailed description of the configuration values are&lt;br /&gt;
described [[parallel packet processing|here]].&lt;br /&gt;
&lt;br /&gt;
==IPFIX settings ==&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter may be running as an IPFIX exporter. These settings allows for reporting configuration. When enabled, the following settings are possible:&lt;br /&gt;
&lt;br /&gt;
*IP address: Address of IPFIX collector.&lt;br /&gt;
*Port: Corresponding port.&lt;br /&gt;
*Protocol: TCP or UDP.&lt;br /&gt;
*Update interval: Interval in seconds for sending a status update of flows.&lt;br /&gt;
*UDP resend interval: Interval in seconds for resending IPFIX templates for UDP connections.&lt;br /&gt;
* TCP reconnect timeout: When TCP connections could not be established, wait for this time period until the next attempt to establish a connection.&lt;br /&gt;
&lt;br /&gt;
Individual IPFIX messages can be enabled or disabled by toggling corresponding options. See the NetFlow/IPFIX interface documentation for details about the message types.&lt;br /&gt;
&lt;br /&gt;
==Time settings==&lt;br /&gt;
&lt;br /&gt;
The Time settings were moved to [[Administration]].&lt;br /&gt;
&lt;br /&gt;
== Email notification==&lt;br /&gt;
&lt;br /&gt;
The Email notification settings were moved to [[Administration]].&lt;br /&gt;
&lt;br /&gt;
==Long-term DB and persistence (BETA) ==&lt;br /&gt;
These two features allow to use a storage device as additional memory for long-term statistics of selected values, and to use a storage device to store and restore measurement data between restarts. See [[DB persistence]] for details about the persistence and [[Longterm DB]] for details about the long-term feature.&lt;br /&gt;
&lt;br /&gt;
== Expert settings==&lt;br /&gt;
&lt;br /&gt;
The Expert settings contains parameter which are only necessary to change in rare installation scenarios or some specific need for a different operation mode.&lt;br /&gt;
&lt;br /&gt;
===Packet length accounting===&lt;br /&gt;
&lt;br /&gt;
This setting allows you to configure which packet length is used for all traffic counters and incidents. The following modes are possible:&lt;br /&gt;
&lt;br /&gt;
*Layer 1: Packet length is accounted on Layer 1 including preamble (7 Byte), SFD (1 Byte) and inter-frame gap (12 Bytes)&lt;br /&gt;
*Layer 2 without frame check sequence (default): Packet length is accounted on Layer 2 without a frame check sequence (4 Bytes)&lt;br /&gt;
*Layer 2 with frame check sequence: Account packet length on Layer 2 with frame check sequence (4 Bytes) When switching to another mode, it will only be applied on new packets. Older packet size statistics will not be changed.&lt;br /&gt;
&lt;br /&gt;
===VLAN handling ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter can &#039;&#039;&#039;ignore VLAN tags&#039;&#039;&#039; for connection tracking. Enabling this option may be necessary if network traffic is seen on the Allegro Network Multimeter that contains changing VLAN tags for the same connection. For example, depending on the configuration of the Mirror Port to which the Allegro Network Multimeter is connected, incoming traffic could contain a VLAN tag while outgoing traffic does not. In this example, a connection would appear twice in the statistics which often is desired behaviour to be able to identify a network misconfiguration. In some cases however, such &amp;quot;duplicate&amp;quot; data in the dashboard may be misleading, and the user would want to see only one connection. In these scenarios the option ignore VLAN tags may be enabled.&lt;br /&gt;
&lt;br /&gt;
===Tunnel view mode===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter can decapsulate GRE, VXLAN, ERSPAN type II and type III, GENEVE, CAPWAP as well as L2TPv3 data traffic. Depending on this option either the outer tunnel or the inner content is shown in all analysis modules.&lt;br /&gt;
&lt;br /&gt;
There are three possible modes:&lt;br /&gt;
&lt;br /&gt;
* don&#039;t decapsulate traffic (default)&lt;br /&gt;
*decapsulate tunnel traffic, discard non-encapsulated traffic&lt;br /&gt;
*decapsulate tunnel traffic, process also non-encapsulated traffic&lt;br /&gt;
&lt;br /&gt;
Optionally, a filter can be set to limit decapsulation on specific packets with a certain IP address, IP ranges or interfaces. If the filter is empty, all packets will be decapsulated.&lt;br /&gt;
&lt;br /&gt;
In case the mode is active with discarding non-encapsulated traffic, on the Dashboard a dropped counter will display dropped non-encapsulated packets.&lt;br /&gt;
&lt;br /&gt;
When capturing, packets with complete outer Layer 2, Layer 3, GRE, ERSPAN, GENEVE, CAPWAP and L2TPv3 headers will be stored as seen on the wire.&lt;br /&gt;
&lt;br /&gt;
===Database mode settings===&lt;br /&gt;
&lt;br /&gt;
The database mode is a special analysis mode for high-performance Allegro Network Multimeters with multiple processors to increase the performance on such systems. It is normally enabled automatically but depending on the actual network traffic and system usage, some parameter tweak might be necessary to improve overall system performance. &lt;br /&gt;
You should only change these parameters in discussion with the Allegro Packets support department.&lt;br /&gt;
These settings are only visible if your Allegro Network Multimeter is capable of running this mode.&lt;br /&gt;
&lt;br /&gt;
You can read more about the meaning of the settings [[DB mode|here]].&lt;br /&gt;
&lt;br /&gt;
===Network performance ===&lt;br /&gt;
&lt;br /&gt;
There are several network performance settings available to improve performance on high-performance systems in case of packet drops during very high incoming bandwidth. They are only visible if your Allegro Network Multimeter is capable of changing these settings.&lt;br /&gt;
&lt;br /&gt;
*Max RX queues per socket: This setting specifies the quantity of threads dedicated to read and write interactions with the network interface controllers. By increasing this value, network receive bandwidth can be increased before packet drops occur. By decreasing this value, data analysis will improve. The default setting of 2 RX queues is suitable for most configurations since data analysis typically needs much more processing ressources.&lt;br /&gt;
*Use Hyper-Threading for RX queues: This setting allows enabling or disabling Hyper-Threading for the threads dedicated to read and write interactions with the network interface controllers. By disabling it, network performance can be improved as the RX queues will be distributed to physical CPU cores only. By enabling it, RX queues will also be distributed to virtual Hyper-Threading CPU cores which is not as efficient as physical CPU cores. By using Hyper-Threading, data analysis will improve since there are more CPU cores available for these tasks. Hyper-Threading is used by default. This is suitable for most configurations as data analysis typically needs much more processing ressources.&lt;br /&gt;
*Preferred Network interface controller: This setting allows fine tuning of network and data analysis performance for dedicated network controllers. The selected set of network controllers will be preferred over others. Usually the fastest or the network controller with the most traffic should be preferred. The &#039;&#039;&#039;Auto&#039;&#039;&#039; setting is used by default, preferring the fastest network controller.&lt;br /&gt;
&lt;br /&gt;
You should only change these parameters in discussion with the Allegro Packets support department.&lt;br /&gt;
&lt;br /&gt;
===Processing performance===&lt;br /&gt;
&lt;br /&gt;
Processing performance may be modified on high-performance systems. This is only visible if your Allegro Network Multimeter is capable of changing this setting.&lt;br /&gt;
&lt;br /&gt;
*Processing performance mode: This setting allows for fine tuning processing performance. By using &#039;&#039;&#039;Analysing&#039;&#039;&#039;, as much processing ressources on all CPUs as possible are used for data analysis. By using &#039;&#039;&#039;Capturing&#039;&#039;&#039;, the focus will be on high data throughput and low latency for capturing purposes by using only the CPU where the preferred network controller is attached to. This has an impact on data analysis performance. &#039;&#039;&#039;Analysing&#039;&#039;&#039; is used by default.&lt;br /&gt;
You should only change this parameter in discussion with the Allegro Packets support department.&lt;br /&gt;
&lt;br /&gt;
===Packet ring buffer timeouts===&lt;br /&gt;
&lt;br /&gt;
Two timeout settings related to the packet ring buffer can be adjusted.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Long timeout&#039;&#039;&#039; controls after which maximum amount of time, a packet is actually written to the packet ring buffer. A lower value may decrease the time difference by which packets are stored out of their order in the packet ring buffer but it may increase the amount of unused overhead data in the packet ring buffer.&lt;br /&gt;
*&#039;&#039;&#039;Short timeout&#039;&#039;&#039; controls after which amount of time smaller batches of packets are written to the packet ring buffer, even if waiting for more packets would result in a more efficient operation. A lower value may decrease the time difference by which packets are stored out of their order in the packet ring buffer, but it may also decrease the performance of the packet ring buffer.&lt;br /&gt;
&lt;br /&gt;
===Data retention timeout===&lt;br /&gt;
&lt;br /&gt;
When the data retention timeout is set to a value greater than 0, data will be removed everywhere throughout the system after the given number of minutes. This means that entities like IPs, which have been inactive for longer than the timeout, will be removed. History graph data for entities that are still active will be truncated to cover only the given timespan, while the absolute values for the whole runtime will be retained. When a packet ring buffer is active, packets which are older than the timeout will be discarded.&lt;br /&gt;
&lt;br /&gt;
===Multithreaded capture analysis ===&lt;br /&gt;
&lt;br /&gt;
This option enables the use of multiple CPUs for capture analysis like when&lt;br /&gt;
analyzing a pcap capture file or analyzing the packet ring buffer. Depending&lt;br /&gt;
on the number of available CPUs this can significantly speed up the analysis.&lt;br /&gt;
&lt;br /&gt;
It is possible to dedicate a number of CPUs exclusively to capture analysis.&lt;br /&gt;
Since these CPUs are not available for live packet processing the performance of&lt;br /&gt;
live traffic analysis may be lower.&lt;br /&gt;
When set to 0 a lower priority is used for capture analysis than for live analysis&lt;br /&gt;
but it cannot be ruled out that the performance of the live processing is&lt;br /&gt;
affected.&lt;br /&gt;
&lt;br /&gt;
===Load balancing===&lt;br /&gt;
&lt;br /&gt;
This option select the load distribution method. By default, network&lt;br /&gt;
traffic is balanced among all processing threads based on the IP&lt;br /&gt;
addresses. This is fast and usually the best way for efficient load&lt;br /&gt;
balancing.&lt;br /&gt;
&lt;br /&gt;
If the network traffic only occurs between a few IP addresses, this&lt;br /&gt;
method can lead to a load imbalance so that some threads are doing more&lt;br /&gt;
work while other threads may be idle. In this scenario, &amp;quot;flow based&lt;br /&gt;
balancing&amp;quot; can be enabled to distribute the traffic based on the IP&lt;br /&gt;
and port information. This will lead to better utilization of all&lt;br /&gt;
processing threads.&lt;br /&gt;
&lt;br /&gt;
Since this option induces additional processing overhead per packet&lt;br /&gt;
and additional memory for all internal IP statistics, it should only&lt;br /&gt;
be enabled in cases of significant load imbalance.&lt;br /&gt;
&lt;br /&gt;
===Ingress packet memory===&lt;br /&gt;
&lt;br /&gt;
This slider allows to configure the amount of memory which is used to buffer received packets. A larger amount of ingress packet memory may help in processing bursts of high bandwidth traffic without packet drops but it also decreases the amount of memory available for statistics. It is important to know that a restart of the processing does not suffice to make changes to this setting active. A full reboot of the device is required for that. See [[Performance Optimization Guide]].&lt;br /&gt;
&lt;br /&gt;
===Jumbo frame mode===&lt;br /&gt;
This options allows to set how jumbo frames are handled by the system.&lt;br /&gt;
&lt;br /&gt;
Three settings are available and the &#039;&#039;&#039;normal&#039;&#039;&#039; mode, which is also the default, is the mode that was used before this configuration option was introduced:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Normal&#039;&#039;&#039;: the default mode offers the best balance of full support for jumbo frames with an efficient usage of the ingress packet memory. This mode uses efficiently sized packet buffers and splits larger packets over multiple packet buffers.&lt;br /&gt;
*&#039;&#039;&#039;Large buffers&#039;&#039;&#039;: this mode uses a single large buffer for each packet which may improve the performance but does not use the ingress packet memory as efficiently and limits the maximum jumbo frame size to 9kB.&lt;br /&gt;
*&#039;&#039;&#039;Disabled&#039;&#039;&#039;: this mode disables support for jumbo frames and offers the best performance and efficient usage of the ingress packet memory. Jumbo frames will be discarded by the network interface.&lt;br /&gt;
&lt;br /&gt;
===Hardware packet timestamping===&lt;br /&gt;
This option allows to enable the use of high-precision hardware packet timestamps on supported interfaces. If an interface is supported, it has the “Hardware Timestamps” feature in the interface statistics (firmware &amp;gt;= 4.4).&lt;br /&gt;
&lt;br /&gt;
This feature will require approximately 30% more load in the I/O threads. The load increase can be reduced to about 10% by using the jumbo frame mode &amp;quot;Large buffers&amp;quot; or &amp;quot;Disabled&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
When enabled, packets received on supported interfaces will carry a timestamp with nanosecond resolution instead of microsecond resolution.&lt;br /&gt;
&lt;br /&gt;
===External timestamps===&lt;br /&gt;
When this option is enabled, the system will use timestamps contained in the packet data instead of timestamps measured at packet arrival. Currently the Arista and Ixia/Keysight as well as the SRCMAC timestamp formats are supported.&lt;br /&gt;
&lt;br /&gt;
If the Ixia/Keysight or Arista type is selected, packets without an external timestamp will not be analyzed. The current number of packets that are dropped because they do not contain an external timestamp is displayed in the active interface overview table of the top-user dashboard. If there are no packets with external timestamps arriving the time of the packet processing will effectively stand still and most graphs will not make progress in live-mode.&lt;br /&gt;
&lt;br /&gt;
If one of the SRCMAC options is selected, all packets will be analyzed with all-zero MAC addresses.&lt;br /&gt;
&lt;br /&gt;
=== External original packet lengths ===&lt;br /&gt;
This option allows to enable the use of original packet length information contained in the packet data instead of the length of the packet as received. At this time only the Ixia/Keysight original packet length trailer format is supported.&lt;br /&gt;
&lt;br /&gt;
This feature can also be used in combination with the &#039;&#039;External timestamps&#039;&#039; option to support packets that contain a Ixia/Keysight trailer with both timestamp and original length information.&lt;br /&gt;
&lt;br /&gt;
===Memory utilization limit===&lt;br /&gt;
This option allows to reduce the limit until old data is removed from the in-memory database. By default the system tries to target 90% memory utilization. In some case, the load might be too high to match this limit. A smaller limit may enable the system to keep the target memory utilization and perform better in general.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=DB_persistence&amp;diff=4958</id>
		<title>DB persistence</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=DB_persistence&amp;diff=4958"/>
		<updated>2025-02-10T14:32:45Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The DB persistence feature (in firmware &amp;gt;= 4.2) can write parts of the In-Memory database onto an selected storage device when stopping the packet processing (either manually or when rebooting the device). On restart, the stored data is imported again to make some data available again after restart.&lt;br /&gt;
&lt;br /&gt;
The stored data comprises:&lt;br /&gt;
[[File:DB persistence settings.png|thumb|DB persistence settings]]&lt;br /&gt;
* the list of MAC addresses and their direct graphs, not including the per-element tables.&lt;br /&gt;
* the list of IP addresses and their direct graphs (traffic, retransmissions and other TCP stats for that IP address), not including the per-element tables.&lt;br /&gt;
* the IP groups data (same elements as the IP addresses).&lt;br /&gt;
* the Layer 7 protocol traffic graphs.&lt;br /&gt;
&lt;br /&gt;
The feature must be enabled in the global settings in the &amp;quot;DB persistence&amp;quot; tab. The storage device must be selected and should be reasonable fast. We recommend using SSD storage only as it can take a few seconds to a few minutes on such fast disc but much longer on slower spinning discs.&lt;br /&gt;
&lt;br /&gt;
The processing restart dialog will allow to disable dump and/or restoration for one time.&lt;br /&gt;
&lt;br /&gt;
The dialog also shows progress during restart which also to cancel the operation.&lt;br /&gt;
&lt;br /&gt;
The configuration dialog also shows the size of the persisted data and allow to remove it.&lt;br /&gt;
&lt;br /&gt;
=== Additional options ===&lt;br /&gt;
&lt;br /&gt;
* With longterm DB, skip writing live data onto storage device (reduces dump/restore time): Since Firmware version 4.3, the [[Longterm DB]] is also stored on the SSD. To reduce the amount of time needed for dump and restore, the dump of the live data can be disabled since this is usually much more data and it might not be necessary to write this as well.&lt;br /&gt;
&lt;br /&gt;
=== Limitations ===&lt;br /&gt;
&lt;br /&gt;
* Data dump and restoration works between the same firmware version and also between different firmware version but due to increasing feature set, importing data from a newer firmware (when downgrading) may not work always. In this case the import will be only partial and normal operation continues.&lt;br /&gt;
* Some setting changes will make the import of some data impossible:&lt;br /&gt;
** Changing the resolution of graph data is not supported for the DB persistence feature. The import will skip data from written with different settings.&lt;br /&gt;
* As with all data on storage devices, the configuration of factory reset will not delete the persisted DB data and it must be removed manually by either selecting the button in the configuration dialog or by formatting the storage device.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Live_filtering_of_tables&amp;diff=4940</id>
		<title>Live filtering of tables</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Live_filtering_of_tables&amp;diff=4940"/>
		<updated>2025-01-24T12:39:42Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== General ==&lt;br /&gt;
Multiple measuring statistics show all entries in tables with different columns for all measured values, which can be sorted individually. &lt;br /&gt;
&lt;br /&gt;
Since often there are a lot of entries, the Allegro Network Multimeter allows for filtering those tables to quickly find the relevant information.&lt;br /&gt;
&lt;br /&gt;
All search text areas show a hint about for what kind of information the table can be filtered. Once entered, the table is updated immediately while still updating the measured values for the visible entries. &lt;br /&gt;
&lt;br /&gt;
This live filtering allows for viewing live data only for the entries that are currently important for the investigation of a network problem.&lt;br /&gt;
&lt;br /&gt;
== Single word matching == &lt;br /&gt;
It is always possible the enter a single word for filtering. &lt;br /&gt;
&lt;br /&gt;
In this case the Allegro Network Multimeter will match any possible field for the given text.&lt;br /&gt;
&lt;br /&gt;
For instance, in the IP statistics, the IP will be matched if a number representation is entered, with an optional subnet mask length (1.2.3.4/8). &lt;br /&gt;
&lt;br /&gt;
The known alternative names are also matched, so it is possible to enter a host name and the list will show only those entries which contain the string in the DHCP name, DNS name, HTTP name, or any other name field.&lt;br /&gt;
&lt;br /&gt;
== Complex filter expressions == &lt;br /&gt;
Some tables allow for using more complex expressions for flexible live filtering. &lt;br /&gt;
&lt;br /&gt;
The support of filter expressions is indicated by the hint text in the search area, which informs that the entered string must start with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
In this mode it is possible to enter expressions in the form of &#039;&#039;&#039;keyword == value&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The keyword depends on the actual context of the search field, often &#039;&#039;&#039;name&#039;&#039;&#039;, &#039;&#039;&#039;ip&#039;&#039;&#039;, or &#039;&#039;&#039;packets&#039;&#039;&#039; is possible. &lt;br /&gt;
&lt;br /&gt;
The web interface will give hints about all possible keywords in the current context which usually directly correlate with the available columns.&lt;br /&gt;
&lt;br /&gt;
Also, the comparison operator can be &#039;&#039;&#039;==&#039;&#039;&#039; or &#039;&#039;&#039;!=&#039;&#039;&#039; for equal or unequal compare, but for numbers &#039;&#039;&#039;&amp;lt;&#039;&#039;&#039;, &#039;&#039;&#039;&amp;gt;=&#039;&#039;&#039;, etc can be used too.&lt;br /&gt;
&lt;br /&gt;
Multiple expressions can be combined with boolean operators &#039;&#039;&#039;and&#039;&#039;&#039; or &#039;&#039;&#039;or&#039;&#039;&#039; (or equivalent &#039;&#039;&#039;&amp;amp;&amp;amp;&#039;&#039;&#039; / &#039;&#039;&#039;||&#039;&#039;&#039;). Also, parentheses can be used to enter even more complex expressions.&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
&lt;br /&gt;
# Show all IPs with at least 100 packets, that have been active within the last minute:&lt;br /&gt;
#: &amp;lt;code&amp;gt;(packets &amp;gt; 100 and lasttime &amp;lt; 60)&amp;lt;/code&amp;gt;&lt;br /&gt;
# Show all IPs that showed up not more than 24 hours ago and have an associated name of alice or bob:&lt;br /&gt;
#: &amp;lt;code&amp;gt;( (firsttime &amp;lt; 86400 and ( name == alice or name == bob ))&amp;lt;/code&amp;gt;&lt;br /&gt;
#: 86400 is the number of seconds in 24 hours (24 * 60 * 60)&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
 &lt;br /&gt;
* It is possible to enter values in quotes if they contain reserved characters used for the expressions (&amp;lt;,=,&amp;amp;,(, etc).&lt;br /&gt;
* Under the search text area, the interface will show all valid values for the last element entered in the expression.&lt;br /&gt;
* A green check mark indicates if the entered expression has been successfully parsed.&lt;br /&gt;
&lt;br /&gt;
== Available keywords ==&lt;br /&gt;
&lt;br /&gt;
The available keywords vary depending on the web interface section.&lt;br /&gt;
&lt;br /&gt;
The web interface will always show the available keywords in the specific context. The following table contains all keywords:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Keyword !! Description  &lt;br /&gt;
|-           &lt;br /&gt;
|name || any name information (DNS, DHCP, SSL, HTTP, custom names, etc)&lt;br /&gt;
|-           &lt;br /&gt;
|name.dns || DNS name information only for IPs and IP connections&lt;br /&gt;
|-&lt;br /&gt;
|category ||the category of a custom name&lt;br /&gt;
|-&lt;br /&gt;
|ip ||the IP address of the client or server side&lt;br /&gt;
|-&lt;br /&gt;
|ipgroup ||  the name(s) of the matching IP groups if configured&lt;br /&gt;
|-&lt;br /&gt;
|clientip || the IP address of the client&lt;br /&gt;
|-&lt;br /&gt;
|serverip || the IP address of the server&lt;br /&gt;
|-&lt;br /&gt;
|packets || the number of packets (received and transmitted combined)&lt;br /&gt;
|-&lt;br /&gt;
|rxpackets ||  the number of received packets&lt;br /&gt;
|-&lt;br /&gt;
|txpackets ||  the number of transmitted packets&lt;br /&gt;
|-&lt;br /&gt;
|clientpackets ||  the number of packets sent by the client&lt;br /&gt;
|-&lt;br /&gt;
|serverpackets ||  the number of packets sent by the server&lt;br /&gt;
|-&lt;br /&gt;
|bytes || the number of bytes (received and transmitted combined)&lt;br /&gt;
|-&lt;br /&gt;
|rxbytes ||  the number of received bytes&lt;br /&gt;
|-&lt;br /&gt;
|txbytes || the number of transmitted bytes&lt;br /&gt;
|-&lt;br /&gt;
|clientbytes ||  the number of bytes sent by the client&lt;br /&gt;
|-&lt;br /&gt;
|serverbytes ||  the number of bytes sent by the server&lt;br /&gt;
|-&lt;br /&gt;
|pps ||  the packets per second value&lt;br /&gt;
|-&lt;br /&gt;
|rxpps||the received packets per second value&lt;br /&gt;
|-&lt;br /&gt;
|txpps|| the transmitted packets per second value&lt;br /&gt;
|-&lt;br /&gt;
| bps ||the bits per second value&lt;br /&gt;
|-&lt;br /&gt;
|rxbps ||the received bits per second value&lt;br /&gt;
|-&lt;br /&gt;
|txbps||the transmitted bits per second value&lt;br /&gt;
|-&lt;br /&gt;
|firsttime||the time of the first activity&lt;br /&gt;
|-&lt;br /&gt;
|lasttime || the time of the last activity&lt;br /&gt;
|-&lt;br /&gt;
|tcppackets||the number of TCP packets (received and transmitted combined)&lt;br /&gt;
|-&lt;br /&gt;
|udppackets|| the number of UDP packets (received and transmitted combined)&lt;br /&gt;
|-&lt;br /&gt;
|tcppayload||the amount of bytes processed as TCP payload&lt;br /&gt;
|-&lt;br /&gt;
|tcpRetrans||the amount of payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
|tcpRetransRx||the amount of received payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
|tcpRetransTx||the amount of transmitted payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
| tcpRetransClient||the amount of client payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
|tcpRetransServer ||the amount of server payload bytes retransmitted&lt;br /&gt;
|-&lt;br /&gt;
|mac||the MAC address of the client or server&lt;br /&gt;
|-&lt;br /&gt;
|port||the layer 4 port of the client or server (a number or range)&lt;br /&gt;
|-&lt;br /&gt;
|clientport||the layer 4 port of the client (a number or range)&lt;br /&gt;
|-&lt;br /&gt;
|serverport||the layer 4 port of the server (a number or range)&lt;br /&gt;
|-&lt;br /&gt;
|l4protocol|| the layer 4 protocol name (tcp, udp, icmp, etc)&lt;br /&gt;
|-&lt;br /&gt;
|l7protocol||the layer 7 protocol name (http, dns, etc)&lt;br /&gt;
|-&lt;br /&gt;
|tcpend ||the ending reason of a TCP connection (open, fin, rst, timeout)&lt;br /&gt;
|-&lt;br /&gt;
|tcpstate ||the state of a TCP connection (valid, invalid, unknown)&lt;br /&gt;
|-&lt;br /&gt;
|tcpclienthandshake||the TCP handshake time in milliseconds for the client (time to answer the server&#039;s syn packet)&lt;br /&gt;
|-&lt;br /&gt;
|tcpserverhandshake||the TCP handshake time in milliseconds for the server (time to answer the client&#039;s syn packet)&lt;br /&gt;
|-&lt;br /&gt;
|tcpdataresponseavg||the average TCP data response time in milliseconds of the connection&lt;br /&gt;
|-&lt;br /&gt;
|tcpdataresponsemax||the max TCP data response time in milliseconds of the connection (any direction)&lt;br /&gt;
|-&lt;br /&gt;
|httpresponse ||the HTTP response time for a request&lt;br /&gt;
|-&lt;br /&gt;
|httpstatus||the HTTP status code of the response&lt;br /&gt;
|-&lt;br /&gt;
|sslhandshake||the SSL handshake time (time for the server to answer the SSL setup)&lt;br /&gt;
|-&lt;br /&gt;
|packetratio||the client/server packet ratio as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| vlan ||the VLAN tag (a tag or &#039;none&#039;), both outer and inner VLAN will be considered&lt;br /&gt;
|-&lt;br /&gt;
|outervlan||the outer VLAN tag (a tag or &#039;none&#039;)&lt;br /&gt;
|-&lt;br /&gt;
| innervlan||the inner VLAN tag (a tag or &#039;none&#039;)&lt;br /&gt;
|-&lt;br /&gt;
|interface.name||the interface name or ID (starting at 1)&lt;br /&gt;
|-&lt;br /&gt;
|interface.rawid&lt;br /&gt;
|the raw interface ID (starting at 0)&lt;br /&gt;
|-&lt;br /&gt;
|validconnections||the number of valid TCP connections&lt;br /&gt;
|-&lt;br /&gt;
|invalidconnections|| the number of invalid TCP connections&lt;br /&gt;
|-&lt;br /&gt;
| profinetFrameId||the number of a Profinet frame ID&lt;br /&gt;
|-&lt;br /&gt;
| minCallerJitter||the minimum jitter of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| avgCallerJitter|| the average jitter of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| maxCallerJitter||the maximum jitter of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| minCalleeJitter|| the minimum jitter of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgCalleeJitter ||the average jitter of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxCalleeJitter||the maximum jitter of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minJitter ||the minimum jitter of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| avgJitter || the average jitter of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxJitter||the maximum jitter of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minCallerMos||the minimum MOS of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgCallerMos ||the average MOS of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxCallerMos||the maximum MOS of the caller as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minCalleeMos ||the minimum MOS of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgCalleeMos || the average MOS of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxCalleeMos||the maximum MOS of the callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
| minMos||the minimum MOS of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgMos||the average MOS of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxMos||the maximum MOS of the caller or callee as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minClientJitter ||the minimum jitter of the client as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxClientJitter ||the maximum jitter of the client as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgClientJitter ||the average jitter of the client as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|minServerJitter ||the minimum jitter of the server as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|maxServerJitter||the maximum jitter of the server as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|avgServerJitter||the average jitter of the server as a floating point number&lt;br /&gt;
|-&lt;br /&gt;
|statusCode||the number of a status code&lt;br /&gt;
|-&lt;br /&gt;
|mpls||the MPLS label (a label or &#039;none&#039;), both outer and inner MPLS label will be considered&lt;br /&gt;
|-&lt;br /&gt;
| outermpls||the outer MPLS label (a label or &#039;none&#039;)&lt;br /&gt;
|-&lt;br /&gt;
|innermpls|| the inner MPLS label (a label or &#039;none&#039;)&lt;br /&gt;
|-&lt;br /&gt;
|qos||Filter for presence or absence of QoS. May be &#039;any&#039; or &#039;none&#039;.&lt;br /&gt;
|-&lt;br /&gt;
|qosIpDscp||the DSCP value in the IP header&lt;br /&gt;
|-&lt;br /&gt;
|qosMplsTc|| the traffic class value in the outermost MPLS label stack entry&lt;br /&gt;
|-&lt;br /&gt;
|qosVlanPcp||the priority code point in the outermost VLAN tag&lt;br /&gt;
|-&lt;br /&gt;
|usedCipherSuite||the negotiated SSL/TLS cipher suite name&lt;br /&gt;
|-&lt;br /&gt;
|usedTlsVersion&lt;br /&gt;
|the negotiated SSL/TLS version&lt;br /&gt;
|-&lt;br /&gt;
|pppoeSessionId||the PPPoE session ID (in hexadecimal or decimal representation)&lt;br /&gt;
|-&lt;br /&gt;
|mtu||the MTU value in bytes&lt;br /&gt;
|-&lt;br /&gt;
|rxMtu ||the MTU value of the RX direction in bytes&lt;br /&gt;
|-&lt;br /&gt;
|txMtu||the MTU value of the TX direction in bytes&lt;br /&gt;
|-&lt;br /&gt;
|clientMtu||the MTU value of the sent direction of the client in bytes&lt;br /&gt;
|-&lt;br /&gt;
|serverMtu||the MTU value of the sent direction of the server in bytes&lt;br /&gt;
|-&lt;br /&gt;
|callId|| the string value of a SIP call ID or similar identifier (e.g. P-Palladion-ID)&lt;br /&gt;
|-&lt;br /&gt;
| dnsresponse|| the DNS response time (for DNS connections)&lt;br /&gt;
|-&lt;br /&gt;
| dnsstatus||matches DNS response status (either a DNS reply code, e.g, 0 for success, or noanswer for unanswered DNS connections&lt;br /&gt;
|-&lt;br /&gt;
|dnsname||the requested DNS name&lt;br /&gt;
|-&lt;br /&gt;
|callerRtpPacketLoss || the amount of lost packets of the RTP flow of the caller&lt;br /&gt;
|-&lt;br /&gt;
| calleeRtpPacketLoss||the amount of lost packets of the RTP flow of the callee&lt;br /&gt;
|-&lt;br /&gt;
| rtpPacketLoss || the amount of lost packets of the RTP flow of the caller or callee&lt;br /&gt;
|-&lt;br /&gt;
| clientRtpPacketLoss ||the amount of lost packets of the RTP flow of the client&lt;br /&gt;
|-&lt;br /&gt;
|serverRtpPacketLoss||the amount of lost packets of the RTP flow of the server&lt;br /&gt;
|-&lt;br /&gt;
|callerRtpJitterBufferExceeded || the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the caller&lt;br /&gt;
|-&lt;br /&gt;
| calleeRtpJitterBufferExceeded||the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the callee&lt;br /&gt;
|-&lt;br /&gt;
| rtpJitterBufferExceeded || the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the caller or callee&lt;br /&gt;
|-&lt;br /&gt;
| clientRtpJitterBufferExceeded ||the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the client&lt;br /&gt;
|-&lt;br /&gt;
|serverRtpJitterBufferExceeded||the amount of packets with jitter above configured max jitter buffer threshold (default 50ms) of the RTP flow of the server&lt;br /&gt;
|-&lt;br /&gt;
| callerRtpPayloadType||the payload type of the RTP flow of the caller as a string, will match also parts of the name e.g. G.711&lt;br /&gt;
|-&lt;br /&gt;
|calleeRtpPayloadType|| the payload type of the RTP flow of the callee as a string, will match also parts of the name e.g. G.711&lt;br /&gt;
|-&lt;br /&gt;
|rtpPayloadType||the payload type of the RTP flow of the caller or callee as a string, will match also parts of the name e.g. G.711&lt;br /&gt;
|-&lt;br /&gt;
|duration, sipDuration ||the duration of a connection or a SIP call, amount of seconds&lt;br /&gt;
|-&lt;br /&gt;
|callerDuration|| the duration of a SIP call of the caller, amount of seconds&lt;br /&gt;
|-&lt;br /&gt;
|calleeDuration||the duration of a SIP call of the callee, amount of seconds&lt;br /&gt;
|-&lt;br /&gt;
|diffRtpSipDuration||the difference between the duration of a SIP call and its RTP connection, amount of seconds&lt;br /&gt;
|-&lt;br /&gt;
|sipQos||Filter for presence or absence of QoS in SIP calls. May be &#039;any&#039; or &#039;none&#039;.&lt;br /&gt;
|-&lt;br /&gt;
|sipQosIpDscp||the DSCP value in the IP header of SIP packets&lt;br /&gt;
|-&lt;br /&gt;
| sipQosMplsTc|| the traffic class value in the outermost MPLS label stack entry of SIP packets&lt;br /&gt;
|-&lt;br /&gt;
|sipQosVlanPcp||the priority code point in the outermost VLAN tag of SIP packets&lt;br /&gt;
|-&lt;br /&gt;
|rtpQos||Filter for presence or absence of QoS in RTP streams. May be &#039;any&#039; or &#039;none&#039;.&lt;br /&gt;
|-&lt;br /&gt;
|rtpQosIpDscp ||the DSCP value in the IP header of RTP packets&lt;br /&gt;
|-&lt;br /&gt;
|rtpQosMplsTc||the traffic class value in the outermost MPLS label stack entry of RTP packets&lt;br /&gt;
|-&lt;br /&gt;
|rtpQosVlanPcp||the priority code point in the outermost VLAN tag of RTP packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindow || the number of TCP zero window packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindowRx||the number of TCP zero window packets in RX direction&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindowTx|| the number of TCP zero window packets in TX direction&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindowClient||the number of TCP zero window packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpZeroWindowServer ||the number of TCP zero window packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowSize||the value of the announced TCP window size in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowSizeClient||the value of the announced TCP window size of the client in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowSizeServer|| the value of the announced TCP window size of the server in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpSmallestWindowSize|| the smallest announced TCP window in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpSmallestWindowSizeClient|| the smallest announced TCP window of the client in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpSmallestWindowSizeServer|| the smallest announced TCP window of the server in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowScale&lt;br /&gt;
|the value of the announced TCP window scale&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowScaleClient&lt;br /&gt;
|the value of the announced TCP window scale of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpWindowScaleServer&lt;br /&gt;
|the value of the announced TCP window scale of the server&lt;br /&gt;
|-&lt;br /&gt;
| tcpUsedWindowSize||the value of the actual used TCP window in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpUsedWindowSizeClient||the value of the actual used TCP window of the client in bytes&lt;br /&gt;
|-&lt;br /&gt;
| tcpUsedWindowSizeServer||the value of the actual used TCP window of the server in bytes&lt;br /&gt;
|-&lt;br /&gt;
|tcpSyn||the number of TCP SYN packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynClient||the number of TCP SYN packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynServer||the number of TCP SYN packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynRx||the number of received TCP SYN packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynTx||the number of transmitted TCP SYN packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynAck||the number of TCP SYN-ACK packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynAckClient||the number of TCP SYN-ACK packets of the client&lt;br /&gt;
|-&lt;br /&gt;
| tcpSynAckServer||the number of TCP SYN-ACK packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynAckRx||the number of received TCP SYN-ACK packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpSynAckTx||the number of transmitted TCP SYN-ACK packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpRst||the number of TCP RST packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpRstClient||the number of TCP RST packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpRstServer ||the number of TCP RST packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpRstRx||the number of received TCP RST packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpRstTx||the number of transmitted TCP RST packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpFin || the number of TCP FIN packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpFinClient||the number of TCP FIN packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpFinServer||the number of TCP FIN packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpFinRx||the number of received TCP FIN packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpFinTx||the number of transmitted TCP FIN packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAck || the number of TCP DUP ACK packets&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAckClient||the number of TCP DUP ACK packets of the client&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAckServer||the number of TCP DUP ACK packets of the server&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAckRx||the number of received TCP DUP ACK packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpDupAckTx||the number of transmitted TCP DUP ACK packets of an IP&lt;br /&gt;
|-&lt;br /&gt;
|tcpMissedData||the estimated amount of TCP bytes to not see&lt;br /&gt;
|-&lt;br /&gt;
|tcpDataTransferTime&lt;br /&gt;
|the data transfer time in milliseconds (TCP applications times)&lt;br /&gt;
|-&lt;br /&gt;
|tcpFirstDataResponseTime&lt;br /&gt;
|first data response time in milliseconds (TCP applications times)&lt;br /&gt;
|-&lt;br /&gt;
|tcpTotalRequestResponseTransferTime&lt;br /&gt;
|total request response transfer time in milliseconds (TCP applications times)&lt;br /&gt;
|-&lt;br /&gt;
|traceroute||the IP or host name of a traceroute network hop&lt;br /&gt;
|-&lt;br /&gt;
|tracerouteHostname||the host name of a traceroute network hop&lt;br /&gt;
|-&lt;br /&gt;
|tracerouteIp||the IP of a traceroute network hop&lt;br /&gt;
|-&lt;br /&gt;
|tlsAlert||the description of TLS alert messages (see RFC8446 section 6 for a full list)&lt;br /&gt;
|-&lt;br /&gt;
|tlsAlertLevel||the TLS alert level (can be warning, fatal or unknown)&lt;br /&gt;
|-&lt;br /&gt;
|supportedTlsVersion&lt;br /&gt;
|the announced TLS version&lt;br /&gt;
|-&lt;br /&gt;
|supportedCipherSuite&lt;br /&gt;
| the announced SSL/TLS cipher suite name&lt;br /&gt;
|-&lt;br /&gt;
|spi||IPSec SPI (security parameter index), a number in hexadecimal or decimal representation&lt;br /&gt;
|-&lt;br /&gt;
|number||The phone number of the caller or callee of a SIP call. Extracted from &#039;From&#039;, &#039;To&#039;, &#039;Contact&#039;, &#039;P-Asserted-Identity&#039;, or &#039;P-Preferred-Identity&#039; field or request URI.&lt;br /&gt;
|-&lt;br /&gt;
|callerNumber||The phone number of the caller of a SIP call. Extracted from &#039;From&#039; field.&lt;br /&gt;
|-&lt;br /&gt;
|calleeNumber||The phone number of the callee of a SIP call. Extracted from &#039;To&#039; field.&lt;br /&gt;
|-&lt;br /&gt;
|packetTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max). This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|callerPacketTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max) of the caller. This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|calleePacketTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max) of the callee. This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|clientPacketTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max) of the client. This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|serverPacketTimeDelta min/avg/max || The RTP packet time delta in milliseconds (min, average or max) of the server. This is the delta of arrival time between two subsequent packets.&lt;br /&gt;
|-&lt;br /&gt;
|serverMaxPacketLossBurst || The longest RTP packet loss in a row of the server.&lt;br /&gt;
|-&lt;br /&gt;
|clientMaxPacketLossBurst || The longest RTP packet loss in a row of the client.&lt;br /&gt;
|-&lt;br /&gt;
|callerMaxPacketLossBurst || The longest RTP packet loss in a row of the caller.&lt;br /&gt;
|-&lt;br /&gt;
|calleeMaxPacketLossBurst || The longest RTP packet loss in a row of the callee.&lt;br /&gt;
|-&lt;br /&gt;
|maxPacketLossBurst || The longest RTP packet loss in a row of either client/server or caller/callee.&lt;br /&gt;
|-&lt;br /&gt;
|peerRole || The peer role. Could be either client or server.&lt;br /&gt;
|-&lt;br /&gt;
|ssrc || The RTP synchronization source value of either client or server. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|clientSsrc || The RTP synchronization source value of the client. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|serverSsrc || The RTP synchronization source value of the server. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|callerSsrc || The RTP synchronization source value of the caller. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|calleeSsrc || The RTP synchronization source value of the callee. It can also be used in hexadecimal notation.&lt;br /&gt;
|-&lt;br /&gt;
|peers || The amount of peers of an IP address.&lt;br /&gt;
|-&lt;br /&gt;
|sipCallerIp || The IP address of the SIP caller, usually the sender of SIP Invite packet.&lt;br /&gt;
|-&lt;br /&gt;
|sipCalleeIp || The IP address of the SIP callee, usually the receiver of SIP Invite packet.&lt;br /&gt;
|-&lt;br /&gt;
|minTtl || The min value of TTL for IPv4 or hop limit for IPv6.&lt;br /&gt;
|-&lt;br /&gt;
|maxTtl || The max value of TTL for IPv4 or hop limit for IPv6.&lt;br /&gt;
|-&lt;br /&gt;
|avgTtl || The avg value of TTL for IPv4 or hop limit for IPv6.&lt;br /&gt;
|}&lt;br /&gt;
There are some additional keywords to support some limited set of wireshark compatible filter expressions:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Keyword&lt;br /&gt;
!Description&lt;br /&gt;
!Available in firmware version&lt;br /&gt;
|-&lt;br /&gt;
|ip.addr&lt;br /&gt;
|the IPv4 address (either source or destination)&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
| ip.src&lt;br /&gt;
| the IPv4 source address&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|ip.dst&lt;br /&gt;
|the IPv4 destination address&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|ipv6.addr&lt;br /&gt;
|the IPv6 address (either source or destination)&lt;br /&gt;
| 3.4&lt;br /&gt;
|-&lt;br /&gt;
|ipv6.src&lt;br /&gt;
|the IPv6 source address&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|ipv6.dst&lt;br /&gt;
|the IPv6 destination address&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|tcp.port&lt;br /&gt;
|the source or destination port of a TCP connection&lt;br /&gt;
| 3.4&lt;br /&gt;
|-&lt;br /&gt;
|tcp.srcport&lt;br /&gt;
|the source port of a TCP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|tcp.dstport&lt;br /&gt;
|the destination port of a TCP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|udp.port&lt;br /&gt;
|the source or destination port of a UDP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|udp.srcport&lt;br /&gt;
|the source port of a UDP connection&lt;br /&gt;
| 3.4&lt;br /&gt;
|-&lt;br /&gt;
|udp.dstport&lt;br /&gt;
|the destination port of a UDP connection&lt;br /&gt;
|3.4&lt;br /&gt;
|-&lt;br /&gt;
|smb.shareName&lt;br /&gt;
|the Name of the smb share&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.connectionEncrypted&lt;br /&gt;
|if the connection between a client and a server is encrypted (possible values are: &amp;quot;encrypted&amp;quot; and &amp;quot;unencrypted&amp;quot;&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.negotiationState&lt;br /&gt;
|the negotiation state of a connection&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.successfulConnects / smb.failedConnects&lt;br /&gt;
|number of successful/failed connects to a smb share&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.successfulDisconnects / smb.failedDisconnects&lt;br /&gt;
|number of successful/failed disconnects to a smb share&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.dialect&lt;br /&gt;
|the used dialects of a smb server&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.dialectReq&lt;br /&gt;
|the dialects requested by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.dialectUsed&lt;br /&gt;
|the dialects used by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.failedOpens / smb.successfulOpens&lt;br /&gt;
|the number of successful/failed opens of a file by a client of a file&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.failedOpens / smb.successfulOpens&lt;br /&gt;
|the number of successful/failed opens of a file by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.failedCloses / smb.successfulCloses&lt;br /&gt;
|the number of successful/failed closes of a file by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.failedDeletes / smb.successfulDeletes&lt;br /&gt;
|the number of successful/failed deletes of a file by a client&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.firstOpen / smb.lastOpen&lt;br /&gt;
|time since the first/last open&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.lastClose&lt;br /&gt;
|time since the file got closed the last time&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.lastDelete&lt;br /&gt;
|time since  the file got deleted the last time&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
|smb.bytesWritten / smb.bytesRead&lt;br /&gt;
|the number of bytes written to/read from the file&lt;br /&gt;
|4.1&lt;br /&gt;
|-&lt;br /&gt;
| icmp.pingLatencyMin&lt;br /&gt;
| the ping latency (min) in ms for ICMP ping request/replies tuples of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| icmp.pingLatencyAvg&lt;br /&gt;
| the ping latency (average) in ms for ICMP ping request/replies tuples of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| icmp.pingLatencyMax&lt;br /&gt;
| the ping latency (max) in ms for ICMP ping request/replies tuples of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| icmp.requests&lt;br /&gt;
| the number of ICMP ping requests of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| icmp.replies&lt;br /&gt;
| the number of ICMP ping replies of one connection&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| ip.ttl.min / max / avg&lt;br /&gt;
| the min / max / avg TTL value of an IPv4&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| ipv6.hlim.min / max / avg&lt;br /&gt;
| the min / max / avg hop limit value of an IPv6&lt;br /&gt;
|4.2&lt;br /&gt;
|-&lt;br /&gt;
| tds.loginack.tdsversion&lt;br /&gt;
| the used TDS version as negotiated during the login process&lt;br /&gt;
|4.3&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Wireshark filter syntax==&lt;br /&gt;
Wireshark uses a filter syntax that is not directly compatible to the filter syntax in the Allegro Network Multimeter as it is more strict regarding the expression and also supports many packet header related fields.&lt;br /&gt;
&lt;br /&gt;
However, Wireshark conversion filters for IPV4, IPV6, TCP, and UDP can be used directly:&lt;br /&gt;
&lt;br /&gt;
*Example: The filter &amp;quot;(ip.addr eq 1.2.3.4 and ip.addr eq 2.3.4.5) and (tcp.port eq 80 and tcp.port eq 1234)&amp;quot; is a valid filter expression. The corresponding native expression is:  &amp;quot;ip == 1.2.3.4 and ip == 2.3.4.5 and port == 80 and port == 1234 and l4protocol == TCP&amp;quot; (the last part about the l4protocol can be left out since most of the time there is only one connection matching the port portion).&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Capture_module&amp;diff=4939</id>
		<title>Capture module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Capture_module&amp;diff=4939"/>
		<updated>2025-01-24T12:38:13Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Capture module == &lt;br /&gt;
The Allegro Network Multimeter allows direct capturing of network traffic as a HTTP download to your computer. No packet data is stored on the device itself. Traffic can be directly filtered for specific packets, only the relevant packets will be captured. In addition, it is also possible to capture network traffic to an attached storage device, see the settings section below for details. Capturing network traffic is usually started by clicking on a PCAP button in a certain module. These buttons allow capturing specific traffic, for example for a certain IP address or a network protocol. The capture module allows to configure filter for traffic that has not even started right now, for example for an IP address that is not in use at the moment but might be used later. The capture module page displays all currently running captures and allows starting new captures with specific filters.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
|[[File:Generic modules.png|800px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Current captures ===&lt;br /&gt;
The first part of the page displays all downloads running for the current user session, and all downloads running for other user sessions (like when a download has been started outside the browser by directly using command line tools such as wget or curl).&lt;br /&gt;
The list contains the client IP and port of the user running the download. &lt;br /&gt;
&lt;br /&gt;
The next three counters describe: &lt;br /&gt;
&lt;br /&gt;
* the number of packets captured for the corresponding filter. &lt;br /&gt;
* the number of packets dropped by the capturing module.   Packet drops can appear when doing live capture and more packets are captured than can be transferred via HTTP to the client, or the storage is not capable of storing all matching packets. During live capture, the drop counter is the exact number of packets matching the filter but were dropped because of the reasons mentioned previously.   Packet drops are also accounted when capturing from the past out of the ring buffer. It happens when the ring buffer dropped packets during the capture interval due to insufficient bandwidth available on the storage devices. In retrospective capturing, the drop counter only indicates that some packets may have been missed. The counter is the total amount of packets not available in the ring buffer, which are not necessarily part of the capture filter. &lt;br /&gt;
* the number of ignored packets. Ignored packets do not match the given capture filter. &lt;br /&gt;
&lt;br /&gt;
The following columns list the applied filter criteria. The last column contains a button to stop the corresponding download. Downloads can also be stopped by clicking the same capture button that started the capture in the corresponding module. If multiple devices have been configured, the list also contains all captures from all multi-devices which can be stopped individually. &lt;br /&gt;
&lt;br /&gt;
==== Finished captures ====&lt;br /&gt;
This list shows the last captures that have finished. It shows up to 100 entries while the oldest entries are discarded when the list is full. For each entry the following information is displayed:&lt;br /&gt;
&lt;br /&gt;
* the packet capturing mode&lt;br /&gt;
* the type of capture&lt;br /&gt;
* the start- and end-time of the capture (the actual real-time when the capture was initiated and ended)&lt;br /&gt;
* the number of captured/dropped/ignored packets during the capture&lt;br /&gt;
* the amount of data generated for the capture (along with the average throughput of e.g. the capture download)&lt;br /&gt;
* the capture filter which was used for the capture&lt;br /&gt;
* the finishing reason of the capture job (e.g. completed normally, stopped by user or aborted due to no space left on storage)&lt;br /&gt;
&lt;br /&gt;
The button &#039;&#039;&#039;Delete list of finished captures&#039;&#039;&#039; will delete all entries from this list.&lt;br /&gt;
&lt;br /&gt;
==== Recent filters ====&lt;br /&gt;
This list shows the most recently used capture filters for the current user. The most recent capture filter is displayed on the top. Next to each capture filter there is a button to permanently save this capture filter as a favorite as well as a button to simply start a capture with this filter again. The &#039;&#039;&#039;Use as expert filter&#039;&#039;&#039; button will copy the capture filter into the expert filter input field and allows for customizing the capture. The button &#039;&#039;&#039;Delete list of recent filters&#039;&#039;&#039; will delete all entries from this list.&lt;br /&gt;
&lt;br /&gt;
==== Favorites ====&lt;br /&gt;
This list shows favorite capture expressions. A capture can be marked as a favorite either in the capture dialog by clicking on the star button in the top right corner or by marking it as a favorite in the &#039;&#039;&#039;Recently captured&#039;&#039;&#039; list. A description can be given and will be displayed in this list. For each favorite capture a PCAP button is available to simply start this capture again. The &#039;&#039;&#039;Remove favorites&#039;&#039;&#039; button allows for cleaning the list. The &#039;&#039;&#039;Use as expert filter&#039;&#039;&#039; button will copy the capture filter into the expert filter input field and allows for customizing the capture.&lt;br /&gt;
&lt;br /&gt;
==== Planned captures ====&lt;br /&gt;
On this tab captures to a storage device can be planned ahead of time and these captures can even be set to repeat automatically. A click on the &#039;&#039;&#039;Add planned capture&#039;&#039;&#039; button opens a dialog where the planned capture can be configured. This includes settings like the storage device to use, the start date and time of the capture, the duration of the capture, if a capture should repeat and the filter expression used during the capture. It is important to know that planned captures will not function if the chosen storage device is not active.&lt;br /&gt;
&lt;br /&gt;
==== Capture profiles ====&lt;br /&gt;
[[File:Capture profiles config.png|thumb|600x600px|Capture profile configuration]]&lt;br /&gt;
[[File:Capture profiles edit profile.png|thumb|600x600px|Edit capture profile]]&lt;br /&gt;
Capture profiles can be used in the capture dialog for custom packet truncation rules. Such profiles defines custom rules for packet snapshot length similar to ring buffer filters. This allows to use a different snapshot length for specific layer 7 protocols, if for example traffic of one protocol shall be captured completely while for another protocol only the IP header shall be captured. Such a capture profile can be selected in the capture dialog in the &amp;quot;Truncate packet length&amp;quot; select box.&lt;br /&gt;
&lt;br /&gt;
Up to 10 different profiles can be configured by clicking at the &amp;quot;Add profile&amp;quot; button. The add/edit dialog allows to enter a profile name and up to 10 rules for snapshot length. Similar to [[Packet ring buffer#Packet ring buffer snapshot length filter|ring buffer filters]], the first rule that matches for the selected type is used to decide for the snapshot length of the actual packet.&lt;br /&gt;
&lt;br /&gt;
To restrict the capture possibilities of an user it is possible to choose an &#039;restricting profile&#039;. This allows the administrator to stop the user from capturing other sensitive data like SIP- and RTP-Packages.&lt;br /&gt;
&lt;br /&gt;
==== PCAP anonymization profile ====&lt;br /&gt;
&lt;br /&gt;
Anonymization profiles can be used in capture dialog to allow for quickly switch between rules to anonymize aspects of the generated PCAPs.&lt;br /&gt;
&lt;br /&gt;
When enabled, following options are available (more than one option is possible):&lt;br /&gt;
* MAC addresses on L2&lt;br /&gt;
:MAC addresses on L2 will be replaced by random addresses octet-wise. Multicast/broadcast addresses will not be randomized.&lt;br /&gt;
* IP addresses on L3&lt;br /&gt;
:IP addresses on L3 will be replaced by random addresses octet-wise for IPv4 and hextet-wise for IPv6. Multicast/broadcast addresses will not be randomized. The octets of the IP address will have the same length in textual representation (e.g. 100.20.3.40 -&amp;gt; 105.31.6.41). For IPv6 address short notation will be considered and the randomized result will also have the same textual length. &lt;br /&gt;
* IP addresses on L7&lt;br /&gt;
:IPv4 and IPv6 addresses in textual representation in L7 payload will be randomized similar to L3.&lt;br /&gt;
* Mapped IP addresses in STUN packets on L7&lt;br /&gt;
:STUN payload IP addresses will be randomized similar to L3.&lt;br /&gt;
* Phone numbers, name and Call ID in SIP packets on L7&lt;br /&gt;
: SIP payload data is masked with &#039;xxx&#039; values for the names and phone numbers in the fields &amp;quot;From&amp;quot;, &amp;quot;To&amp;quot;, &amp;quot;Contact&amp;quot;, &amp;quot;P-Asserted-Identity&amp;quot;. Call Ids are also replaced. IP addresses are not touched, if they shall be anonymized, please use option &amp;quot;IP addresses on L7&amp;quot;.&lt;br /&gt;
* URLs and HTTP hostnames on L7&lt;br /&gt;
: URLs and HTTP hostnames in L7 payload are masked with &#039;xxx&#039; values. The length of the masked name/URL will stay the same and line feeds won&#039;t be touched.&lt;br /&gt;
:: Examples:&lt;br /&gt;
:: &#039;GET /website.html?param1=value HTTP/1.1\r\n&#039; will be changed to &#039;GET xxxxxxxxxxxxxxxxxxxxxxxxxx HTTP/1.1\r\n&#039; &lt;br /&gt;
:: &#039;Host: allegro-packets.com\r\n&#039; will be changed to &#039;Host: xxxxxxxxxxxxxxxxxxx\r\n&#039;&lt;br /&gt;
:: https://www.allegro-packets.com/en/ will be completely masked &lt;br /&gt;
&lt;br /&gt;
Within an anonymization profile it is also possible to define MAC and IP lists with entries that should be anonymized or that should be excluded from anonymization. The proper L2/L3 anonymization option &#039;&#039;&#039;must be turned on&#039;&#039;&#039; in order to have an effect!&lt;br /&gt;
&lt;br /&gt;
The amount of SIP phone numbers last hidden digits can be configured, e.g. with a setting of 4 last hidden digits a phone number +49123456789 becomes +4912345xxxx.&lt;br /&gt;
&lt;br /&gt;
Address anonymization is stable for the whole PCAP, i.e. the same addresses will be replaced by the same random addresses. As an example, if both randomization of IP addresses on L3 and L7 is active and a SIP call with RTP is captured, both IP addresses in L3 and SIP SDP payload are replaced by the same values so that the correlation of the RTP stream is still intact.&lt;br /&gt;
&lt;br /&gt;
Checksums of the changed packets are &#039;&#039;&#039;not&#039;&#039;&#039; being recalculated.&lt;br /&gt;
&lt;br /&gt;
A privileged user may enforce an anonymization profile that is being used for all users that do not have the unrestrictive capture permission in a role. This profile will always be taken into account and the unprivileged user may only add additional anonymizations on top of it for captures (but the user can&#039;t overwrite it with less restrictive settings).&lt;br /&gt;
&lt;br /&gt;
==== SFTP server ====&lt;br /&gt;
Credentials and upload directories for a SFTP server can be configured here. They can be selected in the capture dialog later when choosing &amp;quot;Capture to SFTP server&amp;quot; as capture type. It is possible to either configure a user and password or use authentication with a public key. In the latter case, the displayed SSH public key needs to be inserted in the authorized hosts list on the SFTP server.&lt;br /&gt;
&lt;br /&gt;
=== Simple capture ===&lt;br /&gt;
The second section of the capture page allow to select some fields to filter network traffic for. By default, only the IP field is visible, the other fields can be enabled by clicking on the corresponding toggle switch. Each line allows to enter a filter criterion for the corresponding network traffic element. To start the capture with the entered filter criteria just click at the &#039;&#039;&#039;Start capture&#039;&#039;&#039; button. For reference, the expert filter expression is shown at the end of the section so it can be used to copy and paste&lt;br /&gt;
the string into the expert filter section.&lt;br /&gt;
&lt;br /&gt;
=== Using expert filters to start captures ===&lt;br /&gt;
The third part of the page allows for starting a download for any criterion combination using complex filter expressions. A capture filter is defined in a C-style syntax and supports combination of AND/OR operators, precedence order with parentheses and equal/not equal comparisons. If the filter exp Session can be evaluated to true, the packet is&lt;br /&gt;
captured.&lt;br /&gt;
If a value contains a space, the whole value must be quoted with “”.&lt;br /&gt;
Following operators are supported:&lt;br /&gt;
* &#039;&#039;&#039;and&#039;&#039;&#039;, &#039;&#039;&#039;&amp;amp;&amp;amp;&#039;&#039;&#039; : AND operator. The filter expression will match if all operands could be evaluated to true.&lt;br /&gt;
* &#039;&#039;&#039;or&#039;&#039;&#039;, &#039;&#039;&#039;||&#039;&#039;&#039;: OR operator. The filter expression will match if any operand can be evaluated to true.&lt;br /&gt;
&lt;br /&gt;
Following comparison operators are supported:&lt;br /&gt;
* &#039;&#039;&#039;==&#039;&#039;&#039;: Will evaluate expression to true if left and right operand are equal.&lt;br /&gt;
* &#039;&#039;&#039;!=&#039;&#039;&#039;: Will evaluate expression to true if left and right operand are not equal.&lt;br /&gt;
&lt;br /&gt;
Following operands are supported:&lt;br /&gt;
* &#039;&#039;&#039;ip&#039;&#039;&#039;: An IP address. The packet is captured if either source or destination IP address of the packet match. A netmask and a port can also be specified. For IPv6 addresses with a specific port, the address must be written in brackets. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
|  &lt;br /&gt;
ip == 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
ip == ff02::1:3&lt;br /&gt;
&lt;br /&gt;
ip == 10.0/16&lt;br /&gt;
&lt;br /&gt;
ip == 10.0.0.1:1234&lt;br /&gt;
&lt;br /&gt;
ip == [2a02:810a:1340:1292:1c6b:e58d:6ebc:6cd2]:123&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;ip.src, ip.dst&#039;&#039;&#039;: The source or destination IP address.&lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
|  &lt;br /&gt;
ip.src == 10.0.0.1/8 and ip.dst == 10.0.0.1/8&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
: This will match traffic only within 10.0.0.1/8 subnet. If src/dst is omitted, also in or outbound traffic from or to other subnets is captured!&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;mac&#039;&#039;&#039;: A MAC address. The packet is captured if either source or destination MAC address of the packet match. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
|  mac == 12:34: :56:78:90:ab&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;port&#039;&#039;&#039;: A TCP or UDP port. The packet is captured if either source or destination port match. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-         &lt;br /&gt;
| port == 80&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;portrange&#039;&#039;&#039;: A TCP or UDP port range. The range can be a single number or a comma separated list of values or value ranges. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-                     &lt;br /&gt;
| portrange == 80,100-120,-10,65000-&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;serverport&#039;&#039;&#039;: A TCP or UDP port of a server. The packet is captured if the given port is a port of the server and not of a client. The range can be a single number or a comma separated list of values or value ranges.&lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| serverport == 80,100-120,-10,65000-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;macProtocol&#039;&#039;&#039;: A MAC protocol such as IPv4 or IPv6. For all seen MAC protocols, please consult the MAC Protocol Statistics module. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| macProtocol == IPv4&lt;br /&gt;
macProtocol == &amp;quot;Non IP&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;l4Protocol&#039;&#039;&#039;: A layer 4 protocol such as TCP or UDP or any IP protocol number. Protocols can also be OR combined as a comma seperated list. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| l4Protocol == ICMP,ICMPv6&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;l7Protocol&#039;&#039;&#039; or &#039;&#039;&#039;dpiProtocol&#039;&#039;&#039;: A layer 7 protocol. Protocols can also be OR combined as a comma seperated list. For all seen protocols please consult the Layer 7 protocols module.&lt;br /&gt;
* &#039;&#039;&#039;countryCode&#039;&#039;&#039;: A country code such as US. For all seen country codes please consult the Geolocation module.&lt;br /&gt;
* &#039;&#039;&#039;arpip&#039;&#039;&#039;: An IP address within an ARP request or response.&lt;br /&gt;
* &#039;&#039;&#039;vlan&#039;&#039;&#039;: A VLAN tag of an outer or inner VLAN. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;outervlan&#039;&#039;&#039;: A VLAN tag of an outer VLAN. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;innervlan&#039;&#039;&#039;: A VLAN tag of an inner VLAN. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;multicastGroup&#039;&#039;&#039;: A multicast IP address or any. The filter will match all IGMP or MLD negotiation packets related to that multicast IP address.&lt;br /&gt;
* &#039;&#039;&#039;rtpPayloadType&#039;&#039;&#039;: The RTP payload type such as PCMU or MP2T. This filter will match all RTP packets with the given payload type.&lt;br /&gt;
* &#039;&#039;&#039;interface.name&#039;&#039;&#039; or &#039;&#039;&#039;namedInterface&#039;&#039;&#039;: The physical interface. This can be the name or interface number (as printed on the device). For interface ids please consult the Interface stats page. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| &amp;lt;nowiki&amp;gt;interface.name == uplink || interface.name == 3&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;interface.rawid&#039;&#039;&#039;: This is the raw internal ID of interfaces. It starts from 0. The interface stats page also shows the raw ID.&lt;br /&gt;
* &#039;&#039;&#039;link&#039;&#039;&#039;: The link pair of two interfaces as stated in Interface stats. A single link number can be given.&lt;br /&gt;
* &#039;&#039;&#039;pppoeProtocol&#039;&#039;&#039;: A specific PPPoE protocol (by name or by ID), or &amp;quot;none&amp;quot;/&amp;quot;any&amp;quot;&lt;br /&gt;
* &#039;&#039;&#039;pppoeAuthentication&#039;&#039;&#039;: An authentication state of a PPPoE session&lt;br /&gt;
* &#039;&#039;&#039;pppoeLinkConfiguration&#039;&#039;&#039;: A link configuration state of a PPPoE session&lt;br /&gt;
* &#039;&#039;&#039;ptpMsgType&#039;&#039;&#039;: A specific PTP message type number or any for the whole PTP traffic.&lt;br /&gt;
* &#039;&#039;&#039;profinetFrameId&#039;&#039;&#039;: A specific Profinet frame ID.&lt;br /&gt;
* &#039;&#039;&#039;profinetCmOpnum&#039;&#039;&#039;: A specific operation number for Profinet CM (Context Manager) requests or responses. Can also be any for every operation number. Following values are used:&lt;br /&gt;
:#connect&lt;br /&gt;
:#release&lt;br /&gt;
:#read&lt;br /&gt;
:#write&lt;br /&gt;
:#control&lt;br /&gt;
:#read implicit&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;mpls&#039;&#039;&#039;: A label of an outer or inner MPLS. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;outerMpls&#039;&#039;&#039;: A label of an outer MPLS. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;innerMpls&#039;&#039;&#039;: A label of an inner MPLS. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;qosIpDscp&#039;&#039;&#039;: The DSCP value in the IP header. May be a number.&lt;br /&gt;
* &#039;&#039;&#039;qosMplsTc&#039;&#039;&#039;: The traffic class value in the outermost MPLS label stack entry.&lt;br /&gt;
* &#039;&#039;&#039;qosVlanPcp&#039;&#039;&#039;: The priority code point value in the outermost VLAN tag.&lt;br /&gt;
* &#039;&#039;&#039;group&#039;&#039;&#039;: The name of a configured group or ‘default’. If the name contains whitespaces, the name must be enclosed in quotes.&lt;br /&gt;
* &#039;&#039;&#039;badCRC&#039;&#039;&#039;: The value of this operand will be 1 for packets with a CRC error and will be 0 for good packets. Capturing packets with bad CRC is currently only supported on 1Gb interfaces.&lt;br /&gt;
* &#039;&#039;&#039;icmpType&#039;&#039;&#039;: The value of a certain ICMP type (e.g. Echo request 8, Echo reply 0).&lt;br /&gt;
* &#039;&#039;&#039;dhcpMessageType&#039;&#039;&#039;: The value of a certain DHCP message type (e.g. Request 3, ACK 5).&lt;br /&gt;
* &#039;&#039;&#039;tcpFlags&#039;&#039;&#039;: A single TCP flag or a list of TCP flags joined by the ‘+’ sign. If a list of flags is given, all flags must be present in the packet. Supported TCP flags are syn, ack, fin, rst, psh and urg.&lt;br /&gt;
* &#039;&#039;&#039;callId&#039;&#039;&#039;: The string value of a SIP call ID or similar identifier (e.g. P-Palladion-ID)&lt;br /&gt;
* &#039;&#039;&#039;ipFragment&#039;&#039;&#039;: If set to 1 all IPv4 fragments will be captured (i.e. packets having the &#039;More fragments&#039; flag and &#039;Fragment offset&#039; set). If set to 0 all packets without IPv4 fragmentation will be captured.&lt;br /&gt;
* &#039;&#039;&#039;regexp&#039;&#039;&#039;: The packet payload matches the quoted regular expression (RegEx) to the other side of the == operator or does not match the regular expression to the other side of the != operator. In case of IP packets the matching will be performed on the L7 payload of the packet. In case of non-IP packets the matching will be performed on the whole packet except the Ethernet header. Regular expressions largely support the pattern syntax used by the PCRE library with the exception of certain constructs. An invalid pattern will produce a descriptive error message and prevent the capture from being started.&lt;br /&gt;
* &#039;&#039;&#039;ipDoNotFragment&#039;&#039;&#039;: The value of this operand will be 1 for IPv4 packets that are marked as to not be fragmented (packets which have the &#039;do not fragment&#039; flag set).&lt;br /&gt;
* &#039;&#039;&#039;mactype&#039;&#039;&#039;: The type of the packets destination MAC address. Allowed values are &#039;unicast, &#039;broadcast&#039; and &#039;multicast&#039;.&lt;br /&gt;
* &#039;&#039;&#039;slowSubtype&#039;&#039;&#039;: The subtype of packets with the macProtocol == SLOW (e.g. 1 for LACP).&lt;br /&gt;
* &#039;&#039;&#039;wifiFrequency&#039;&#039;&#039;: The frequency (channel) of a WiFi packet in MHz.&lt;br /&gt;
* &#039;&#039;&#039;wifiBssid&#039;&#039;&#039;: The BSS ID participating in a WiFi packet. This is similar to a MAC address.&lt;br /&gt;
&lt;br /&gt;
For a specific precedence you may use parentheses &#039;&#039;&#039;(&#039;&#039;&#039;/&#039;&#039;&#039;)&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Examples:&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| ip == 10.0.0.1:1234 and ip == 10.1.0.1:9876&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match a connection from 10.0.0.1 to 10.1.0.1 or vice versa with the ports 1234 and 9876 involved.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| ip == 10.0.0.1 and ip != 10.0.0.2&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match packets having 10.0.0.1 either as source or destination. If a communication peer of 10.0.0.1 is 10.0.0.2 the packets will not be captured.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| l4Protocol == ICMP,ICMPv6&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match packets with ICMP or ICMPv6 layer 4 protocols.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| portrange == 80,443&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match packets to or from port 80 or 443.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == &amp;quot;allegr[o,a]&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;HTTP&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will case sensitive match packets that contain the string(s) &#039;allegro&#039; and/or &#039;allegra&#039; and/or &#039;HTTP&#039; anywhere in the payload.&lt;br /&gt;
:NOTE: The use of regexp is CASE sensitive. You must use the (?i) modifier to enable case insensitive filtering.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == &amp;quot;(?i)allegro&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;http&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will case insensitive match packets that contain the string(s) &#039;allegro&#039; and/or &#039;http&#039; anywhere in the payload.&lt;br /&gt;
:NOTE: The use of regexp is CASE sensitive. You must use the (?i) modifier to enable case insensitive filtering.&lt;br /&gt;
&lt;br /&gt;
Of course the Allegro Network Multimeter regular expression (RegEx) capture filter, can also be used in combination with our other capture expressions.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == “allegro&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;analyzer” and l7protocol == &amp;quot;dns&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:Will case sensitive match and capture &amp;lt;u&amp;gt;only DNS packets&amp;lt;/u&amp;gt; containing the string(s) “allegro” and/or “analyzer.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == “allegro&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;analyzer” and l7protocol != &amp;quot;dns&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:Will case sensitive match and capture all (except DNS) packets containing the string(s) “allegro” and/or “analyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Whenever you are unsure about the outcome of RegEx based packet capturing, you can pre-test the outcome of your expressions on https://pythex.org/. &lt;br /&gt;
While pre-testing on https://pythex.org/, avoid using the “IGNORECASE” button. Instead use the (?i) modifier for constructing case insensitive expressions, as mentioned above.&lt;br /&gt;
PCRE/Python based expression examples and explanations you&#039;ll find on https://www.programiz.com/python-programming/regex&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All captures can be limited to any amount of time or bytes, for example to capture only one minute or one megabyte of traffic.&lt;br /&gt;
&lt;br /&gt;
Below the list of filter criteria, you will find the button to actually start (or stop) the capture. In case the filter expression is invalid, the button is disabled.&lt;br /&gt;
&lt;br /&gt;
====Layer 7 protocol capture====&lt;br /&gt;
Layer 7 protocol detection engine may need several packets to recognize the currently used protocol. For these captures all not yet recognized packets will be skipped. As soon as the protocol recognition is finished, all packets matching the protocol filter will be captured.&lt;br /&gt;
&lt;br /&gt;
=== Configuration settings ===&lt;br /&gt;
By clicking on the gear button on the top right of the Capture web page, you can access the configuration section.&lt;br /&gt;
&lt;br /&gt;
*The maximum number of concurrent capture sessions&lt;br /&gt;
:Per default out-of-box setting (factory default), all Allegro Network Multimeter models allow up to 4 concurrent captures. As of FW ≥ V3.4, the number of allowed concurrent captures, can be increased up to 64, depending on model and available RAM. Note, that Increasing the number of allowed parallel/concurrent captures will decrease memory capacity for the in-memory DB, therewith decreasing the maximum timeframe of statistics held and presented in the web-interface. If the memory usage is too high, the number of parallel captures might be lower/limited by the Allegro itself.&lt;br /&gt;
&lt;br /&gt;
*Split PCAP file after this size&lt;br /&gt;
: This option can be used to limit the size of the PCAP file when storing to an attached device. Once the captured traffic would exceed this threshold, a new PCAP file with the current time stamp is created and the traffic is written to the new file. If the time stamp is still the same, an index is attached to the filename.&lt;br /&gt;
: When set to 0, no splitting will be done.&lt;br /&gt;
&lt;br /&gt;
*Split PCAP file after this duration&lt;br /&gt;
:This option can be used to limit the duration of the PCAP file when storing to an attached device. The duration starts counting with the start of the capture. Once the captured traffic would exceed the duration, a new PCAP file with the current time stamp is created and the traffic is written to the new file.&lt;br /&gt;
:When set to 0, no splitting will be done.&lt;br /&gt;
:Both split parameters can be combined. The PCAP file will be split as soon as one threshold has been reached.&lt;br /&gt;
&lt;br /&gt;
*The maximum number of concurrent packet ring buffers&lt;br /&gt;
:This option is used to specify how many cluster packet ring buffers can run in parallel.&lt;br /&gt;
:Be aware that each cluster will have it&#039;s own queue in memory and therefore the memory required is the number of cluster packet ring buffers multiplied by the setting of &#039;&#039;&#039;The size in MB for the queue of the packet ring buffer&#039;&#039;&#039;.&lt;br /&gt;
:A reboot of the device or a restart of the processing is needed for a change to this option to take effect.&lt;br /&gt;
&lt;br /&gt;
*The size in MB for the queue of the packet ring buffer&lt;br /&gt;
: This option allows to configure the size of the queue that holds processed packets before they are written to the packet ring buffer. Increasing the size of this queue may help if the disk used for the packet ring buffer cannot keep up with bursts of traffic so that packet drops occur in the packet ring buffer.&lt;br /&gt;
:Be aware that memory allocated to this queue is not available for storing statistics and metadata so that choosing a large value for this queue reduces the overall data storage time.&lt;br /&gt;
:Most users will not need to change this value from the default value.&lt;br /&gt;
:A reboot of the device or a restart of the processing is needed for a change to this option to take effect.&lt;br /&gt;
&lt;br /&gt;
*The maximum size in MB for the packet reorder buffer when capturing from the packet ring buffer&lt;br /&gt;
:This setting allows to choose the maximum size that the packet reorder buffer may grow to. For performance reasons the packet ring buffer does not ensure a total order of packets when storing them on disk. The packet reorder buffer is used to restore the correct order of packets in a capture when capturing from the packet ring buffer. A larger packet reorder buffer makes it more likely that the packet order can be restored for all packets. The actual amount of memory used for the packet reorder buffer depends on this setting but also on the amount of free memory in the system so that the effectively used amount of memory may be less than this setting indicates.&lt;br /&gt;
&lt;br /&gt;
=== Capture settings dialog ===&lt;br /&gt;
[[File:Choose capture settings.png|none|thumb|600x600px]]&lt;br /&gt;
This dialog appears after a capture button has been clicked. Following settings are possible:&lt;br /&gt;
*Start time and end time&lt;br /&gt;
:By clicking on the input field or on the calendar icon you can choose the start and end time of the capture. The input field is also editable with keyboard and allows entering a time on a second basis.&lt;br /&gt;
: If the start time is in the past, the complete capture is performed on the stored data of the capture ring buffer. When the capture reaches the newest packets it still continues to read from the capture ring buffer. The dialog will limit the start time input to the earliest data of the capture ring buffer. Be aware, that a possible capture ring buffer filter was applied on the past data and is also applied on future data in this mode.&lt;br /&gt;
: The start time may also be in the future. The capture is scheduled and starts as soon as a packet is received with a time later than the start time.&lt;br /&gt;
:If the whole time input field is marked and deleted, the start or end time will reset back to the default value. The default value for start time is &#039;&#039;&#039;now&#039;&#039;&#039;, the capture will start with pushing the &#039;&#039;&#039;Start capturing&#039;&#039;&#039; button. The default value of the end time is &#039;&#039;&#039;unlimited&#039;&#039;&#039;, the capture will not stop unless stopped manually by clicking on the stop button.&lt;br /&gt;
:Eight buttons offer quick selection of often used time settings.&lt;br /&gt;
&lt;br /&gt;
*Packet ring buffer&lt;br /&gt;
:If multiple packet ring buffer clusters are active this dropdown menu allows to choose from which cluster the packets should be captured.&lt;br /&gt;
&lt;br /&gt;
*Capture type&lt;br /&gt;
: This drop down menu allows to choose the method how packets are captured. The last successful setting is persistently stored per user. Following methods are available:&lt;br /&gt;
&lt;br /&gt;
:*HTTP download&lt;br /&gt;
::This is the default method. The capture will start a HTTP download of a PCAP file directly in the browser.&lt;br /&gt;
:: Available HTTP download options:&lt;br /&gt;
::*Set file name: allow to configure a custom file name for the capture file&lt;br /&gt;
::*Download as zip archive: Download the capture file as a compressed zip archive&lt;br /&gt;
:*Disk&lt;br /&gt;
::This method is only visible if at least one storage device is active and has some amount of free storage space. The capture will create a PCAP file on the selected storage device.&lt;br /&gt;
::If PCAP export via SFTP is enabled, an additional checkbox is displayed to store the capture file in the export directory, slated for upload according the SFTP export settings.&lt;br /&gt;
&lt;br /&gt;
:*Interface&lt;br /&gt;
::This mode will transmit the captured packets on a physical network interface. It is not available when the system is analyzing a PCAP file or is analyzing the packet ring buffer.&lt;br /&gt;
&lt;br /&gt;
:* ERSPAN&lt;br /&gt;
::This mode will transmit the captured packets encapsulated in a GRE + ERSPAN header on the management interface to a given target IP address. On the target system the   traffic can be   selectively captured using the filter &#039;&#039;&#039;ip proto 0x2f&#039;&#039;&#039; when using an application like Wireshark or tcpdump.&lt;br /&gt;
&lt;br /&gt;
:* Capture to SFTP server&lt;br /&gt;
::This mode will stream the PCAP to the selected SFTP server using the given credentials. SFTP servers can be configured on the Capture page&lt;br /&gt;
&lt;br /&gt;
*Storage device&lt;br /&gt;
:If the &#039;disk&#039; capture type is chosen, this drop-down menu allows to choose one of the active storage devices. The capture will be stored on the selected device.&lt;br /&gt;
&lt;br /&gt;
*File name&lt;br /&gt;
:If browser download or disk storage has been chosen and the &amp;quot;Set file name&amp;quot; checkbox has been selected, the file name of the created capture file can be set in this field. The default value shows the filename with date wildcards and the capture filter. The date wildcards are then replaced by the start time of the capture. &lt;br /&gt;
:Date format specifier can be used as supported by strftime() function call. Some common specifier:&lt;br /&gt;
:*%Y for year&lt;br /&gt;
:*%m for month&lt;br /&gt;
:* %d for day&lt;br /&gt;
:*%H for hours&lt;br /&gt;
:*%M for minutes&lt;br /&gt;
:*%S for seconds&lt;br /&gt;
:Filenames are remembered when the dialog is closed and reopened. Clicking the circular arrow resets the filename to its default.&lt;br /&gt;
&lt;br /&gt;
*Storage directory&lt;br /&gt;
:If disk storage has been chosen, the target directory on the storage device can be set in this field. Sub-directories on the storage device can be created and inspected on the [[Storage#Working with storage contents|Storage]] page.&lt;br /&gt;
&lt;br /&gt;
* Zip options&lt;br /&gt;
:If browser download has been chosen and the zip download option is selected, the file size can be configured after which the pcap files within the archive is spit into additional files&lt;br /&gt;
:The number is entered in megabytes. 0 means no splitting.&lt;br /&gt;
&lt;br /&gt;
*Interface to transmit on&lt;br /&gt;
:This dropdown menu is only shown when Capture type is Interface. Here the physical interface on which to transmit captured packets can be selected.&lt;br /&gt;
&lt;br /&gt;
* ERSPAN target address&lt;br /&gt;
:This section is only shown when Capture type is ERSPAN. Here the target IP address or hostname for the ERSPAN encapsulated packets must be specified.&lt;br /&gt;
&lt;br /&gt;
*ERSPAN session ID&lt;br /&gt;
:This section is only shown when Capture type is ERSPAN. The ERSPAN session ID can be used to differentiate between multiple capture session on the ERSPAN target.&lt;br /&gt;
&lt;br /&gt;
*Transmit speed&lt;br /&gt;
: This dropdown menu is only shown when the Capture type is either Interface or ERSPAN and the start time is in the past so that packets are captured from the packet ring buffer. Here the limiting mode can be chosen which controls how fast captured packets are transmitted. Following modes are available:&lt;br /&gt;
&lt;br /&gt;
:*none&lt;br /&gt;
::No limit will be applied and the packets are transmitted as fast as the network interface and the packet ring buffer allow.&lt;br /&gt;
&lt;br /&gt;
:*limit to bandwidth&lt;br /&gt;
::A bandwidth limit will be applied so that the given bandwidth in Mbps is not exceeded. The bandwidth can be given as a decimal so that e.g. 500kbps can be configured with a value of 0.5.&lt;br /&gt;
&lt;br /&gt;
:*realtime factor&lt;br /&gt;
:: Packets will be transmitted based on their recorded timing information. This means that with a real time factor of 1.0 packets will be transmitted approximately with the same timing as they were originally received. Using for example a real time factor of 2.0 would transmit the packets with twice the speed than they were received.&lt;br /&gt;
&lt;br /&gt;
* Transmit bandwidth in Mbps&lt;br /&gt;
:This is only shown when limit to bandwidth has been selected in the Transmit speed dropdown menu. The meaning of this value is explained in the Transmit speed section.&lt;br /&gt;
&lt;br /&gt;
*Transmit realtime factor&lt;br /&gt;
:This is only shown when realtime factor has been selected in the Transmit speed dropdown menu. The meaning of this value is explained in the :Transmit speed section.&lt;br /&gt;
&lt;br /&gt;
*Truncate packet length:&lt;br /&gt;
:This dropdown menu is only shown when the Capture type is either HTTP or disk. You can truncate captured Packets with this setting. All packets will be captured, but truncated to the given length if they are longer than this setting. The length setting is applied on layer 2 without frame check sequence.&lt;br /&gt;
:Possible values are:&lt;br /&gt;
:*Full length&lt;br /&gt;
:*64 Bytes&lt;br /&gt;
:*1500 Bytes&lt;br /&gt;
:*Custom length with an input field for inserting any length between 64 and 15378 Bytes&lt;br /&gt;
:*Capture profile: select a configured capture profile which defines rules about how many bytes are saved depending on the configured rules.&lt;br /&gt;
&lt;br /&gt;
*PCAP compatibility:&lt;br /&gt;
:This section is only shown when the Capture type is either HTTP or disk.&lt;br /&gt;
:*Omit interface ID&lt;br /&gt;
::Enabling this option will generate a PCAP file that only contains a single interface and treats all packets as if they arrived on that interface. This may improve compatibility with third party software that cannot handle PCAPs with multiple interfaces IDs.&lt;br /&gt;
&lt;br /&gt;
*PCAP comment:&lt;br /&gt;
:Allows to add a user defined comment to the generated PCAP file.&lt;br /&gt;
:*Add device information to comment&lt;br /&gt;
::Enabling this option will insert additional device information such as name, serial, memory size or capture filter into he PCAP comment.&lt;br /&gt;
&lt;br /&gt;
*PCAP packet type:&lt;br /&gt;
:This dropdown menu allows to choose the datalink packet type of the PCAP file. It is possible to choose between capturing regular Ethernet packets or raw Radiotap IEEE 802.11 WiFi packets in some places.&lt;br /&gt;
:Possible values are:&lt;br /&gt;
:*Ethernet&lt;br /&gt;
:*Radiotap&lt;br /&gt;
&lt;br /&gt;
* Anonymization&lt;br /&gt;
: This option allows enabling or disabling anonymization of the downloaded PCAP file by either apply generic settings or choosing a custom anonymization profile.&lt;br /&gt;
: See [[Capture_module#PCAP_anonymization_profile|PCAP anonymization]] for details.&lt;br /&gt;
&lt;br /&gt;
After pushing the &#039;&#039;&#039;Start capture&#039;&#039;&#039; button, the capture starts.&lt;br /&gt;
&lt;br /&gt;
=== Webshark ===&lt;br /&gt;
The Allegro Nework Multimeter has a preview mode to see the first Megabyte of captured packets directly in the browser. By clicking the Webshark preview button in the capture dialog, the first Megabyte of the requested packets will be extracted. If this is extraction is finished, a modal dialog will open showing the captured packets similar to Wireshark. The capture can be moved from the modal dialog to a separate window by pressing the button in the upper right corner next to the close button.&lt;br /&gt;
&lt;br /&gt;
=== Capture URL === &lt;br /&gt;
It is possible to use an external tool like &#039;&#039;&#039;curl&#039;&#039;&#039; for creating and storing a PCAP.&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| curl -k -u USER:PASSWORD &#039;https://allegro-mm-XXXX/API/data/modules/capture?startTime=1517306266000000&amp;amp;endTime=1517309267000000&amp;amp;expression=l7Protocol==HTTP&amp;amp;snapPacketLength=65535&amp;amp;fromCaptureBuffer=true&#039; &amp;gt; path_to/capture.pcap&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
The user name, password and hostname similar to the access of the web interface have to be used.&lt;br /&gt;
Following parameters are possible:&lt;br /&gt;
&lt;br /&gt;
* startTime: The start time of the capture. The first packet with exactly this or a later time will start the capture. The time format must be microseconds after January, 1st 1970 UTC (Unix time, epoch). If the start time is in the past, make sure you set fromCaptureBuffer parameter accordingly.&lt;br /&gt;
*endTime: The end time of the capture. The first packet with exactly this or a later time will stop the capture. The time format must be microseconds after January, 1st 1970 UTC (Unix time, epoch).&lt;br /&gt;
*expression: The filter expression. There are no whitespaces allowed. You may use ‘%20’ instead.&lt;br /&gt;
*snapPacketLength: The max size of a packet applied on layer 2 without frame check sequence. If a packet is larger than this value, it is truncated. Use 65535 for unlimited size.&lt;br /&gt;
* fromCaptureBuffer: Whether to extract data from the packet ring buffer or just live traffic.&lt;br /&gt;
*captureToMedia: Whether to store PCAP on external storage device or download with your browser on your computer.&lt;br /&gt;
* useSingleInterface: Whether to store only a single interface in the PCAP and treat all packets as if they arrived on that interface. This may improve compatibility with third party software that cannot handle PCAPs with multiple interfaces IDs.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Management_interface_settings&amp;diff=4917</id>
		<title>Management interface settings</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Management_interface_settings&amp;diff=4917"/>
		<updated>2024-12-16T07:46:38Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Access to the web interface of the Allegro Network Multimeter is handled by an out-of-band network connection separately connected to the device via a wired connection or wireless.&lt;br /&gt;
This section allows to configure the settings of the wireless and the wired access. The configuration of the  [[Management interface settings on console]] is possible, too.&lt;br /&gt;
&lt;br /&gt;
=== Wireless management interface ===&lt;br /&gt;
&lt;br /&gt;
The wireless access can be disabled or enabled, regardless of a connected Wi-Fi device since such a device can be connected later at any time.&lt;br /&gt;
The wireless management interface can operate in two modes:&lt;br /&gt;
&lt;br /&gt;
* Manage own network: In this mode (default), the Allegro Network Multimeter will setup its own Access Point so you can connect a laptop or smartphone directly to the device and access the management interface. In this mode, the web interface can be accessed by entering the URL &#039;&#039;&#039;https://allegro/&#039;&#039;&#039; into a web browser.&lt;br /&gt;
* Join existing network: In this mode, the Allegro Network Multimeter will connect to an existing Wi-Fi network. To do so, enter the name (SSID) of the network and the password. The Wi-Fi Access Point or controller should list the IP it has assigned to the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Additionally, two other options are available under Wireless management interface settings:&lt;br /&gt;
&lt;br /&gt;
* Channel: a fixed Wi-Fi channel can be selected so the Access Point only uses this channel instead of automatically choosing the best available channel.&lt;br /&gt;
* Disable default gateway: If enabled, the Access Point will not announce to be the default gateway/route for this network. If so, the device can only be accessed by using the IP address 192.168.4.1. If this option is disabled, the name server running on the device will also resolve the name &#039;&#039;&#039;allegro/&#039;&#039;&#039; to make it easier to access to the device. This option is useful if there is still another active connection which should still be used, such as a mobile connection or the internal company network.&lt;br /&gt;
&lt;br /&gt;
=== LAN management interface ===&lt;br /&gt;
&lt;br /&gt;
For wired connections there are three operation modes:&lt;br /&gt;
&lt;br /&gt;
* Join existing network: in this mode the Allegro Network Multimeter obtains an IP address (DHCP) from the network connected to the management port. The Router or DHCP server in the network should list the Allegro Network Multimeter IP address.&lt;br /&gt;
* Manage own network: In this mode, the Allegro Network Multimeter will run a DHCP server on the management port, enabling you to connect another computer via a cable to the system. Be aware that in this mode, the management port should not be connected to the main network, since running multiple DHCP servers will disturb the network. In this mode, the web interface can be accessed by entering the URL &#039;&#039;&#039;https://allegro/&#039;&#039;&#039; into a web browser.&lt;br /&gt;
* Use static IP: It is also possible to configure a fixed IP address for the wired management port. You can enter any IP address for the port. The IP address must end with a slash followed by the subnet size. Example: /24 stands for a subnet mask of 255.255.255.0. Optionally you can enter the IP address of your gateway computer and the IP address of the DNS server. You can leave them empty if you want to directly connect the device to another computer with no Router involved. In this mode, the web interface can be reached by the static IP address you configured.&lt;br /&gt;
&lt;br /&gt;
=== Secondary management interface ===&lt;br /&gt;
&lt;br /&gt;
You can attach a USB Ethernet adapter to any USB port of the Allegro Network Multimeter and use this as an additional management interface. Also, in models with multiple management interfaces, those can be configured as secondary management interfaces, too.&lt;br /&gt;
&lt;br /&gt;
Such a secondary management interface can be operated with a static IP address or in DHCP client mode. In the address input field, enter the IP address followed by a slash and the subnet size. Optionally you can enter the IP address of your gateway computer and the IP address of the DNS server. You can leave them empty if you want to directly connect the device to another computer with no Router involved.&lt;br /&gt;
&lt;br /&gt;
A secondary management interface can be restricted to a specific device by selecting the MAC address from the corresponding drop down menu. By default, any available interface is selected that is not used for data plane measurements.&lt;br /&gt;
&lt;br /&gt;
=== IPMI interface ===&lt;br /&gt;
Most Allegro Network Multimeter support an IPMI interface to access a separate Base Management Controller (BMC) ([[IPMI KVM on Allegro series 1000+]]). The IPMI can be configured via a separate web interface of the BMC, but basic IP settings can be applied here too.&lt;br /&gt;
&lt;br /&gt;
By default, the dedicated port is configured to do DHCP to get a dynamic IP address, but it can be reconfigured to use a static IP.&lt;br /&gt;
&lt;br /&gt;
=== Host name ===&lt;br /&gt;
&lt;br /&gt;
By default, the host name is in the format &#039;&#039;&#039;allegro-mm-xxxx&#039;&#039;&#039; where the last four characters depend on the actual device. Because of this, multiple Allegro Network Multimeters can be used in the same network. &lt;br /&gt;
It is however, possible to choose your own host name. Enter a new name and save the changes. If the name field is empty, the default name will be used again following the next reboot.&lt;br /&gt;
&lt;br /&gt;
=== LLDP ===&lt;br /&gt;
&lt;br /&gt;
If enabled, the Allegro Network Multimeter will transmit LLDP (Link Layer Discovery Protocol) information for the management MAC and IP addresses on the management interface.&lt;br /&gt;
The LLDP system name will contain the hostname of the Allegro Network Multimeter and the LLDP system description will contain the platform type (e.g. Allegro-200-rev1) and the currently installed Firmware version.&lt;br /&gt;
&lt;br /&gt;
=== Huawei E8372 | E3372 LTE Wingle ===&lt;br /&gt;
&lt;br /&gt;
Allegro Network Multimeter 500 and upwards allow for one Management Interface to be connected via LTE through a Huawei E8372 or E3372 LTE Wingle. This setup allows for a remote management connection through the [https://allegro-packets.com/wiki/Using_the_Allegro_Remote_Service Allegro Remote Service] without a local internet connectivity. In order to do this, connect your USB Wingle to your Computer and follow Huawei&#039;s instructions to set up your LTE connection. Afterwards connect the Huawei Wingle to one of the USB ports on your Allegro Network Multimeter and go to &#039;&#039;&#039;Settings&#039;&#039;&#039;-&amp;gt;&#039;&#039;&#039;Management Interfaces&#039;&#039;&#039;. Activate &#039;&#039;&#039;Use optional management interface&#039;&#039;&#039; and configure an available IP address (e.g. 192.168.8.2/24), gateway IP (e.g. 192.168.8.1) and name server (e.g. 192.168.8.1).&lt;br /&gt;
&lt;br /&gt;
[[File:Secondary_lan_management.png|900px]]&lt;br /&gt;
&lt;br /&gt;
=== iPerf3 Server Settings ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter Firmware provides an optional iPerf3-Server. iPerf3 helps measuring the maximum achievable bandwidth between a machine and your Allegro Network Multimeter. &lt;br /&gt;
It is turned off by default. You are able to start the server and configure the used port. The Management interface is used as interface.&lt;br /&gt;
&lt;br /&gt;
The documentation for iPerf3 and the client-download can be found [[https://iperf.fr/ here]].&lt;br /&gt;
&lt;br /&gt;
If the ip adress of your Allegro Network Multimeter is 10.0.1.1 and the configured port is 5201 you can run iperf3 against your Allegro Network Multimeter with:&lt;br /&gt;
&lt;br /&gt;
 iperf3 -c 10.0.1.1 -p 5201&lt;br /&gt;
&lt;br /&gt;
=== Hawkeye/IxChariot Settings ===&lt;br /&gt;
The version 4.1 of the Allegro Multimeter Firmware adds an optional Hawkeye/IxChariot endpoint. You are able to enable the client in the management interface settings.&lt;br /&gt;
&lt;br /&gt;
The Hawkeye/IxChariot enables the user to actively measure the network performance between endpoints . A license for the Hawkeye server is required.&lt;br /&gt;
&lt;br /&gt;
=== Proxy Server Settings/Updating behind a proxy ===&lt;br /&gt;
&lt;br /&gt;
A Proxy Server can be used to check for firmware updates. If you are behind a proxy you are able to configure it in the Management Interface Settings. At the moment SOCKSv5-, HTTP- and HTTPS-Proxies are supported.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Proxy URL examples&lt;br /&gt;
!scheme&lt;br /&gt;
!with port&lt;br /&gt;
!with default port&lt;br /&gt;
!default port&lt;br /&gt;
|-&lt;br /&gt;
|http&lt;br /&gt;
|&amp;lt;nowiki&amp;gt;http://10.0.0.1:8080/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|&amp;lt;nowiki&amp;gt;http://10.0.0.1/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|80&lt;br /&gt;
|-&lt;br /&gt;
|https&lt;br /&gt;
|&amp;lt;nowiki&amp;gt;https://10.0.0.1:8443/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|&amp;lt;nowiki&amp;gt;https://10.0.0.1/&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|443&lt;br /&gt;
|-&lt;br /&gt;
|socks5&lt;br /&gt;
|socks5://10.0.0.1:9999/&lt;br /&gt;
|socks5://10.0.0.1/&lt;br /&gt;
|1080&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Global_settings&amp;diff=4916</id>
		<title>Global settings</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Global_settings&amp;diff=4916"/>
		<updated>2024-12-06T12:09:58Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Global settings section contains parameters for adjusting the behavior of the system.&lt;br /&gt;
The settings are split among multiple tabs, described as follows.&lt;br /&gt;
&lt;br /&gt;
== Generic settings ==&lt;br /&gt;
&lt;br /&gt;
=== Packet processing mode ===&lt;br /&gt;
&lt;br /&gt;
This section allows for configuring the main packet processing mode:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Bridge mode&#039;&#039;&#039;: In Bridge mode A.K.A. In-Line mode, all received packets will be transmitted between corresponding port pairs (e.g. 1+2, 3+4 on Allegro 500) so that the Allegro Network Multimeter can be placed in-line between any network component.&amp;lt;br/ &amp;gt;The device will operate transparent and will not modify network traffic in any way. The additional latency will be typically around or less than 1 millisecond.&amp;lt;br&amp;gt;In Bridge mode it is also possible to process network traffic from a mirror port or Tap. However, &amp;quot;only&amp;quot; half of the total available ports on each respective Allegro Network Multimeter model can be used to operate in this way.  For example on a 4-port Allegro model 500, you can conveniently leave the unit in bridge mode and connect up to two mirror ports on interfaces 1 and 3 respectively. Aforementioned interfaces are physically separated and not an (in-line) interface pair.&amp;lt;br /&amp;gt;Always avoid connecting mirror port traffic on an Allegro Network Multimeter interface pair (e.g. 1+2, 3+4 on Allegro 500), as this will result in TX traffic in the direction of a mirror port which if highly undesirable.&amp;lt;br /&amp;gt;[[File:Inline mode.jpg|800px|Allegro in brigde mode (in-line)]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Sink mode&#039;&#039;&#039;: In Sink mode, the Allegro Network Multimeter will operate &amp;quot;receive only&amp;quot;.&amp;lt;br /&amp;gt;Packets are not forwarded and there&#039;s no bi-directional traffic on any of the monitoring ports. This operation mode allows for installation at a Mirror port of a Switch or when using a network Tap to access the network traffic.&amp;lt;br /&amp;gt;[[File:Sink mode1.jpg|800px|Allegro in Sink mode on Mirror port or Tap]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Mixed bridge/sink mode:&#039;&#039;&#039; This mode enables to configure the packet processing mode for each interface pair. Interface pairs default to Bridge mode but the mode can be permanently changed in the [[interface statistics]].&lt;br /&gt;
&lt;br /&gt;
The packet processing mode can be changed during runtime.&lt;br /&gt;
 &lt;br /&gt;
Attention: Please always keep in mind, that while in bridge mode (Allegro Network Multimeter = in-line), a Link will be (shortly) interrupted when switching processing mode or/and rebooting the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
=== Endpoint mode ===&lt;br /&gt;
&lt;br /&gt;
If the endpoint mode is enabled for an interface, this interface will only process packets sent to the configured IP address (and potentially the port). If the system is running in bridge packet processing mode, links with an interface configured for endpoint mode will not forward traffic. The following types of traffic are supported:&lt;br /&gt;
&lt;br /&gt;
* Ethernet packets encapsulated in GRE or GRE+ERSPAN and targeted for the configured IP address.&amp;lt;br /&amp;gt;The system will process the packets as if only the inner encapsulated packet is seen and any traffic captures will only contain the encapsulated packet.&lt;br /&gt;
* UDP packets to specific port (packets will be analyzed as is).&lt;br /&gt;
&lt;br /&gt;
An interface with endpoint mode enabled will respond to ARP requests and to ICMP echo requests so it is possible to use ping to verify that the interface is reachable under the configured IP address.&lt;br /&gt;
&lt;br /&gt;
It must be noted that if the system is running in bridge packet processing mode, any links with an interface configured for endpoint mode will not forward traffic.&lt;br /&gt;
&lt;br /&gt;
VLAN tag handling is not supported. The Allegro Network Multimeter will accept ARP and ICMP requests with any VLAN tags but will send replies without VLAN tagging.&lt;br /&gt;
&lt;br /&gt;
Note: In versions 3.0 or older, the mode was named &amp;quot;l3 tunnel mode&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== Webshark support ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter allows having a preview of packets, directly in the browser. This is the so called Webshark. To support Webshark previewing, the Allegro Network Multimeter needs to reserve an amount of system memory.&lt;br /&gt;
&lt;br /&gt;
This reserved amount of memory (RAM) is configurable and will not be available for the In-Memory database, thus the history of stored statistics in the dashboard becomes a little shorter. If this is not desired, it is possible to disable the Webshark support.&lt;br /&gt;
&lt;br /&gt;
Multiple parallel sessions/instances of Webshark previewing within one Allegro Network Multimeter is possible. The number of simultaneous Webshark instances and max. preview file size (e.g. 5MB) are configurable but may vary depending on Allegro model and installed RAM.&lt;br /&gt;
&lt;br /&gt;
Changing Webshark parameters requires a restart of the processing.&lt;br /&gt;
&lt;br /&gt;
[[File:Webshark.jpg|900px|Built in Webshark - Allegro Network Multimeter ]]&lt;br /&gt;
&lt;br /&gt;
=== Snort analysis===&lt;br /&gt;
{{Warning|title=Beta Feature|This feature is still in active development and is therefore subject to changes in the future. There may be bugs or unexpected behavior when using this feature.}}&lt;br /&gt;
The Allegro Network Multimeter is able to perform intrusion detection based on the [https://www.snort.org/ Snort] software project. The detection can be performed on live traffic or ring buffer traffic. This analysis is invoked via the capture dialog on any page and respects the same capture filter expressions as a normal traffic capture. &lt;br /&gt;
[[File:Snort Analysis Results.png|thumb|Snort Analysis Results]]&lt;br /&gt;
This feature is disabled by default, to enable it navigate to Global Settings &amp;gt; Snort Analysis and enable it via the toggle switch. Once enabled a new setting will appear to regulate the allowed memory usage by the intrusion detection. The user is able to set a hard maximum limit on the usable memory, and if the Snort process exceeds this limit it will be killed by the OOM-Manager. Additionally, another soft memory limit will be installed just below the hard maximum, and if the process reaches this limit it will be throttled heavily. If your intrusion analysis appears to get stuck or is unusually slow, a good troubleshooting step is to increase the memory limit. It is generally not recommended to keep the memory limit above around 200MB. &lt;br /&gt;
&lt;br /&gt;
When invoking the analysis a new modal will open which displays the results of the analysis. The result modal is a list of detected incidents, sorted by order of appearance. An entry in this list has the following structure: &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Severity&lt;br /&gt;
!Time&lt;br /&gt;
!Classification&lt;br /&gt;
!Message&lt;br /&gt;
!Connection&lt;br /&gt;
|-&lt;br /&gt;
|This is denoted by the color on the left hand side of the row.&lt;br /&gt;
|The packet timestamp of the offending packet.&lt;br /&gt;
|A normalized name for the type of incident that occured.&lt;br /&gt;
|A more detailed description of the incident&lt;br /&gt;
|A diagram of the connection in which the incident occured. The IPs can be clicked to go to the IP detail page, and on the right there is an &amp;quot;external link&amp;quot; icon that opens the connection details page in a new tab.&lt;br /&gt;
|}&lt;br /&gt;
Additionally, on the right hand side of the modal is another color band that serves as a rough overview over all incidents. The band is static and roughly aligned with the scroll bar to make it easier to navigate to specific severity incidents.&lt;br /&gt;
&lt;br /&gt;
Snort works by reading a rule file which contains a list of rules used to match packets against. These rules can match subnet, direction, protocol, payload contents, and more (see the Snort documentation for more information on rules), and are given a classification, message and priority, which are displayed in the analysis results. Internally this feature uses a community rule set which is available for free and receives periodic updates. &#039;&#039;&#039;Note:&#039;&#039;&#039; The Allegro Network Multimeter does NOT automatically update this rule set. We are deploying the same rule set to all devices independent of the date of installation. Thus the analysis may not be able to detect zero day exploits and should not be relied on when trying to detect recently discovered attack vectors.&lt;br /&gt;
&lt;br /&gt;
At the moment, only critical and severe incidents are reported (Snort priorities 0 and 1). The classification and message strings are taken directly from the rule that triggered this incidents.&lt;br /&gt;
&lt;br /&gt;
===Detail of traffic analysis===&lt;br /&gt;
&lt;br /&gt;
Limit module processing, allows you to configure which OSI-layers (2,3,4,7) are actively processed and analyzed by the Allegro Network Multimeter. With this setting, the performance of the Allegro Network Multimeter can be significantly improved and allows for higher throughput when disabling some analysis modules.&lt;br /&gt;
&lt;br /&gt;
For both realtime and offline parallel analysis, the following modes are possible :&lt;br /&gt;
&lt;br /&gt;
*Only capturing: Only interface statistics and the capture module is provided. Capture filters are supported without Layer 7 protocol specification/recognition.&lt;br /&gt;
*Capturing and protocol detection: Additionally Layer 7 protocol specification in Capture filters will now work.&lt;br /&gt;
*Up to Layer 2: Additionally all Layer 2 related modules are active such as MAC, MAC protocols, ARP and Burst Analysis.&lt;br /&gt;
*Up to Layer 3: Additionally all Layer 3 related modules are active such as IP and DHCP statistics.&lt;br /&gt;
*Up to Layer 4: Additionally all Layer 4 related modules are active such as TCP and Layer 4 server ports.&lt;br /&gt;
*Unlimited: All Allegro Network Multimeter modules are active.&lt;br /&gt;
&lt;br /&gt;
When switching to another mode you need to restart the processing in order to activate the new settings.&lt;br /&gt;
&lt;br /&gt;
NOTE: The data recorded to/stored in the Packet Ring buffer, will NOT be affected by any of the above settings. Packet ring buffer capture rules may be configured under &amp;quot;Generic - Packet Ring Buffer&amp;quot;, further explained in our wiki here https://allegro-packets.com/wiki/Packet_ring_buffer#Packet_ring_buffer_snapshot_length_filter&lt;br /&gt;
&lt;br /&gt;
====Enable single flow load balancing====&lt;br /&gt;
When the &#039;&#039;Limit module processing&#039;&#039; slider is turned to &#039;&#039;Only capturing&#039;&#039; the option to enable &#039;&#039;single flow load balancing&#039;&#039; appears. If this option is enabled, even a single flow is load-balanced to different analyzer threads.&lt;br /&gt;
&lt;br /&gt;
This is only recommended when there are very few flows and there is an imbalance in the load of the analyzers. As the packets of a single flow are processed by different analyzers the packets of the flow may be stored out-of-order in the Packet Ring Buffer and a larger amount of memory may be required to reorder the packets when capturing from the Packet Ring Buffer (see [[Capture module#Configuration settings|Capture module]] configuration settings). &lt;br /&gt;
&lt;br /&gt;
===Graph detail settings===&lt;br /&gt;
&lt;br /&gt;
It is possible to modify the detail level of all graphs in the interface. This settings allow you to see a more detailed view (with higher time resolution) or to reduce the detail level so more data can be stored on the device. Changing the default values has an impact on the performance and memory usage. Changing a slider to the left increases the detail level of graphs, but increases memory usage and decreases performance.&lt;br /&gt;
&lt;br /&gt;
*Best graph resolution: This option configures how detailed the graph information are shown in the best case (the latest information). The default value is one second which means that a graph sample point represents a second of packet time. You can change the resolution up to 1 millisecond which gives a detailed sub-second representation of the traffic. You can also decide to decrease the resolution which enables the Allegro Network Multimeter to store more data for a longer period of time.&lt;br /&gt;
&lt;br /&gt;
*Reduce graph resolution of old data by up to: The resolution of older graph data is automatically reduced to save memory and to allow a longer view into the traffic history. This option allows you to change this behaviour. With a reduction factor of 1/1 no reduction is done at all which means the selected graph resolution is available for the complete time.&lt;br /&gt;
:This reduces the time period to see historical data. You can choose to increase the reduction factor to store more data for a longer period. The time printed in parentheses represents the worst-case graph resolution based on the chosen resolution and reduction factor. The reduction is done in multiple steps up to this limit. The newest data always has the highest resolution defined by the &amp;quot;Best graph resolution&amp;quot; setting above. Between 60 and 120 data points are stored at a minimum, so with default resolution of 1 second, between one and two minutes are available in the highest resolution. Due to internal compression, the exact number of data points cannot be foreseen but 60 data points are always available at least, usually much more.  Once the limit is reached, data is reduced by a factor of two thus doubling the amount of time available in half resolution (2 to 4 minutes in 2 second resolution). When the next limit is reached, the data is halved again thus doubling the time again, until the configured reduction limit is reached.  With default settings of one second resolution and reduction limit of 1/6, the worst resolution of 64 seconds (or 1 minute and 4 seconds) is reached not before 2 hours into the past.  The drop down menu in graph view gives an exact number about the available graph resolution in the given time period.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Note: Regardless of these settings, the graph values are always converted to represent a value per second (when applicable). For example, the packets per second for an IP addresses will always be a value literally per second even if the resolution is larger or smaller than one second. The displayed value is scaled to match this view. Especially with sub-second resolution this might be misleading.&lt;br /&gt;
&lt;br /&gt;
For instance, if there is a network element sending one packet per second and the resolution is set to 100 milliseconds, the &amp;lt;u&amp;gt;value shown in the graph&amp;lt;/u&amp;gt; might be shown as 10 packets per second as each sample point is scaled to represent an value per second.&amp;lt;br&amp;gt;For a detailed investigation it is recommended to always select a specific time interval and look at the (packet) counters shown in all statistics since these are unscaled and represent the actual values.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Performance implications: The performance degradation and memory usage depends on the actual network traffic and is not exactly predictable. &lt;br /&gt;
&lt;br /&gt;
Here are some examples for reference on a Allegro 1000 series with different configuration values (under ideal test conditions):&lt;br /&gt;
&lt;br /&gt;
* 1 second resolution, 1/1 reduction factor: 90% of default performance&lt;br /&gt;
*100 millisecond resolution, 1/1 reduction factor: 50% of default performance,&lt;br /&gt;
*10 millisecond resolution, 1/1 reduction factor: 15% of default performance&lt;br /&gt;
*1 millisecond resolution, 1/1 reduction factor: 10% of default performance&lt;br /&gt;
&lt;br /&gt;
=== PCAP parallel analysis===&lt;br /&gt;
&lt;br /&gt;
The PCAP parallel analysis feature allows to analyse PCAP files or the&lt;br /&gt;
packet ring buffer in parallel to the live measurement. The settings&lt;br /&gt;
allow to enable the feature and choose how much memory of the main&lt;br /&gt;
memory is used for parallel analysis and how many parallel slots can&lt;br /&gt;
be used. Detailed description of the configuration values are&lt;br /&gt;
described [[parallel packet processing|here]].&lt;br /&gt;
&lt;br /&gt;
==IPFIX settings ==&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter may be running as an IPFIX exporter. These settings allows for reporting configuration. When enabled, the following settings are possible:&lt;br /&gt;
&lt;br /&gt;
*IP address: Address of IPFIX collector.&lt;br /&gt;
*Port: Corresponding port.&lt;br /&gt;
*Protocol: TCP or UDP.&lt;br /&gt;
*Update interval: Interval in seconds for sending a status update of flows.&lt;br /&gt;
*UDP resend interval: Interval in seconds for resending IPFIX templates for UDP connections.&lt;br /&gt;
* TCP reconnect timeout: When TCP connections could not be established, wait for this time period until the next attempt to establish a connection.&lt;br /&gt;
&lt;br /&gt;
Individual IPFIX messages can be enabled or disabled by toggling corresponding options. See the NetFlow/IPFIX interface documentation for details about the message types.&lt;br /&gt;
&lt;br /&gt;
==Time settings==&lt;br /&gt;
&lt;br /&gt;
The Time settings were moved to [[Administration]].&lt;br /&gt;
&lt;br /&gt;
== Email notification==&lt;br /&gt;
&lt;br /&gt;
The Email notification settings were moved to [[Administration]].&lt;br /&gt;
&lt;br /&gt;
==DB persistance (BETA) ==&lt;br /&gt;
See [[DB persistence]] for details about this feature.&lt;br /&gt;
&lt;br /&gt;
==Longterm DB (BETA)==&lt;br /&gt;
See [[Longterm DB]] for details about this feature.&lt;br /&gt;
&lt;br /&gt;
== Expert settings==&lt;br /&gt;
&lt;br /&gt;
The Expert settings contains parameter which are only necessary to change in rare installation scenarios or some specific need for a different operation mode.&lt;br /&gt;
&lt;br /&gt;
===Packet length accounting===&lt;br /&gt;
&lt;br /&gt;
This setting allows you to configure which packet length is used for all traffic counters and incidents. The following modes are possible:&lt;br /&gt;
&lt;br /&gt;
*Layer 1: Packet length is accounted on Layer 1 including preamble (7 Byte), SFD (1 Byte) and inter-frame gap (12 Bytes)&lt;br /&gt;
*Layer 2 without frame check sequence (default): Packet length is accounted on Layer 2 without a frame check sequence (4 Bytes)&lt;br /&gt;
*Layer 2 with frame check sequence: Account packet length on Layer 2 with frame check sequence (4 Bytes) When switching to another mode, it will only be applied on new packets. Older packet size statistics will not be changed.&lt;br /&gt;
&lt;br /&gt;
===VLAN handling ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter can &#039;&#039;&#039;ignore VLAN tags&#039;&#039;&#039; for connection tracking. Enabling this option may be necessary if network traffic is seen on the Allegro Network Multimeter that contains changing VLAN tags for the same connection. For example, depending on the configuration of the Mirror Port to which the Allegro Network Multimeter is connected, incoming traffic could contain a VLAN tag while outgoing traffic does not. In this example, a connection would appear twice in the statistics which often is desired behaviour to be able to identify a network misconfiguration. In some cases however, such &amp;quot;duplicate&amp;quot; data in the dashboard may be misleading, and the user would want to see only one connection. In these scenarios the option ignore VLAN tags may be enabled.&lt;br /&gt;
&lt;br /&gt;
===Tunnel view mode===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter can decapsulate GRE, VXLAN, ERSPAN type II and type III, GENEVE, CAPWAP as well as L2TPv3 data traffic. Depending on this option either the outer tunnel or the inner content is shown in all analysis modules.&lt;br /&gt;
&lt;br /&gt;
There are three possible modes:&lt;br /&gt;
&lt;br /&gt;
* don&#039;t decapsulate traffic (default)&lt;br /&gt;
*decapsulate tunnel traffic, discard non-encapsulated traffic&lt;br /&gt;
*decapsulate tunnel traffic, process also non-encapsulated traffic&lt;br /&gt;
&lt;br /&gt;
Optionally, a filter can be set to limit decapsulation on specific packets with a certain IP address, IP ranges or interfaces. If the filter is empty, all packets will be decapsulated.&lt;br /&gt;
&lt;br /&gt;
In case the mode is active with discarding non-encapsulated traffic, on the Dashboard a dropped counter will display dropped non-encapsulated packets.&lt;br /&gt;
&lt;br /&gt;
When capturing, packets with complete outer Layer 2, Layer 3, GRE, ERSPAN, GENEVE, CAPWAP and L2TPv3 headers will be stored as seen on the wire.&lt;br /&gt;
&lt;br /&gt;
===Database mode settings===&lt;br /&gt;
&lt;br /&gt;
The database mode is a special analysis mode for high-performance Allegro Network Multimeters with multiple processors to increase the performance on such systems. It is normally enabled automatically but depending on the actual network traffic and system usage, some parameter tweak might be necessary to improve overall system performance. &lt;br /&gt;
You should only change these parameters in discussion with the Allegro Packets support department.&lt;br /&gt;
These settings are only visible if your Allegro Network Multimeter is capable of running this mode.&lt;br /&gt;
&lt;br /&gt;
You can read more about the meaning of the settings [[DB mode|here]].&lt;br /&gt;
&lt;br /&gt;
===Network performance ===&lt;br /&gt;
&lt;br /&gt;
There are several network performance settings available to improve performance on high-performance systems in case of packet drops during very high incoming bandwidth. They are only visible if your Allegro Network Multimeter is capable of changing these settings.&lt;br /&gt;
&lt;br /&gt;
*Max RX queues per socket: This setting specifies the quantity of threads dedicated to read and write interactions with the network interface controllers. By increasing this value, network receive bandwidth can be increased before packet drops occur. By decreasing this value, data analysis will improve. The default setting of 2 RX queues is suitable for most configurations since data analysis typically needs much more processing ressources.&lt;br /&gt;
*Use Hyper-Threading for RX queues: This setting allows enabling or disabling Hyper-Threading for the threads dedicated to read and write interactions with the network interface controllers. By disabling it, network performance can be improved as the RX queues will be distributed to physical CPU cores only. By enabling it, RX queues will also be distributed to virtual Hyper-Threading CPU cores which is not as efficient as physical CPU cores. By using Hyper-Threading, data analysis will improve since there are more CPU cores available for these tasks. Hyper-Threading is used by default. This is suitable for most configurations as data analysis typically needs much more processing ressources.&lt;br /&gt;
*Preferred Network interface controller: This setting allows fine tuning of network and data analysis performance for dedicated network controllers. The selected set of network controllers will be preferred over others. Usually the fastest or the network controller with the most traffic should be preferred. The &#039;&#039;&#039;Auto&#039;&#039;&#039; setting is used by default, preferring the fastest network controller.&lt;br /&gt;
&lt;br /&gt;
You should only change these parameters in discussion with the Allegro Packets support department.&lt;br /&gt;
&lt;br /&gt;
===Processing performance===&lt;br /&gt;
&lt;br /&gt;
Processing performance may be modified on high-performance systems. This is only visible if your Allegro Network Multimeter is capable of changing this setting.&lt;br /&gt;
&lt;br /&gt;
*Processing performance mode: This setting allows for fine tuning processing performance. By using &#039;&#039;&#039;Analysing&#039;&#039;&#039;, as much processing ressources on all CPUs as possible are used for data analysis. By using &#039;&#039;&#039;Capturing&#039;&#039;&#039;, the focus will be on high data throughput and low latency for capturing purposes by using only the CPU where the preferred network controller is attached to. This has an impact on data analysis performance. &#039;&#039;&#039;Analysing&#039;&#039;&#039; is used by default.&lt;br /&gt;
You should only change this parameter in discussion with the Allegro Packets support department.&lt;br /&gt;
&lt;br /&gt;
===Packet ring buffer timeouts===&lt;br /&gt;
&lt;br /&gt;
Two timeout settings related to the packet ring buffer can be adjusted.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Long timeout&#039;&#039;&#039; controls after which maximum amount of time, a packet is actually written to the packet ring buffer. A lower value may decrease the time difference by which packets are stored out of their order in the packet ring buffer but it may increase the amount of unused overhead data in the packet ring buffer.&lt;br /&gt;
*&#039;&#039;&#039;Short timeout&#039;&#039;&#039; controls after which amount of time smaller batches of packets are written to the packet ring buffer, even if waiting for more packets would result in a more efficient operation. A lower value may decrease the time difference by which packets are stored out of their order in the packet ring buffer, but it may also decrease the performance of the packet ring buffer.&lt;br /&gt;
&lt;br /&gt;
===Data retention timeout===&lt;br /&gt;
&lt;br /&gt;
When the data retention timeout is set to a value greater than 0, data will be removed everywhere throughout the system after the given number of minutes. This means that entities like IPs, which have been inactive for longer than the timeout, will be removed. History graph data for entities that are still active will be truncated to cover only the given timespan, while the absolute values for the whole runtime will be retained. When a packet ring buffer is active, packets which are older than the timeout will be discarded.&lt;br /&gt;
&lt;br /&gt;
===Multithreaded capture analysis ===&lt;br /&gt;
&lt;br /&gt;
This option enables the use of multiple CPUs for capture analysis like when&lt;br /&gt;
analyzing a pcap capture file or analyzing the packet ring buffer. Depending&lt;br /&gt;
on the number of available CPUs this can significantly speed up the analysis.&lt;br /&gt;
&lt;br /&gt;
It is possible to dedicate a number of CPUs exclusively to capture analysis.&lt;br /&gt;
Since these CPUs are not available for live packet processing the performance of&lt;br /&gt;
live traffic analysis may be lower.&lt;br /&gt;
When set to 0 a lower priority is used for capture analysis than for live analysis&lt;br /&gt;
but it cannot be ruled out that the performance of the live processing is&lt;br /&gt;
affected.&lt;br /&gt;
&lt;br /&gt;
===Load balancing===&lt;br /&gt;
&lt;br /&gt;
This option select the load distribution method. By default, network&lt;br /&gt;
traffic is balanced among all processing threads based on the IP&lt;br /&gt;
addresses. This is fast and usually the best way for efficient load&lt;br /&gt;
balancing.&lt;br /&gt;
&lt;br /&gt;
If the network traffic only occurs between a few IP addresses, this&lt;br /&gt;
method can lead to a load imbalance so that some threads are doing more&lt;br /&gt;
work while other threads may be idle. In this scenario, &amp;quot;flow based&lt;br /&gt;
balancing&amp;quot; can be enabled to distribute the traffic based on the IP&lt;br /&gt;
and port information. This will lead to better utilization of all&lt;br /&gt;
processing threads.&lt;br /&gt;
&lt;br /&gt;
Since this option induces additional processing overhead per packet&lt;br /&gt;
and additional memory for all internal IP statistics, it should only&lt;br /&gt;
be enabled in cases of significant load imbalance.&lt;br /&gt;
&lt;br /&gt;
===Ingress packet memory===&lt;br /&gt;
&lt;br /&gt;
This slider allows to configure the amount of memory which is used to buffer received packets. A larger amount of ingress packet memory may help in processing bursts of high bandwidth traffic without packet drops but it also decreases the amount of memory available for statistics. It is important to know that a restart of the processing does not suffice to make changes to this setting active. A full reboot of the device is required for that. See [[Performance Optimization Guide]].&lt;br /&gt;
&lt;br /&gt;
===Jumbo frame mode===&lt;br /&gt;
This options allows to set how jumbo frames are handled by the system.&lt;br /&gt;
&lt;br /&gt;
Three settings are available and the &#039;&#039;&#039;normal&#039;&#039;&#039; mode, which is also the default, is the mode that was used before this configuration option was introduced:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Normal&#039;&#039;&#039;: the default mode offers the best balance of full support for jumbo frames with an efficient usage of the ingress packet memory. This mode uses efficiently sized packet buffers and splits larger packets over multiple packet buffers.&lt;br /&gt;
*&#039;&#039;&#039;Large buffers&#039;&#039;&#039;: this mode uses a single large buffer for each packet which may improve the performance but does not use the ingress packet memory as efficiently and limits the maximum jumbo frame size to 9kB.&lt;br /&gt;
*&#039;&#039;&#039;Disabled&#039;&#039;&#039;: this mode disables support for jumbo frames and offers the best performance and efficient usage of the ingress packet memory. Jumbo frames will be discarded by the network interface.&lt;br /&gt;
&lt;br /&gt;
===Hardware packet timestamping===&lt;br /&gt;
This option allows to enable the use of high-precision hardware packet timestamps on supported interfaces. If an interface is supported, it has the “Hardware Timestamps” feature in the interface statistics (firmware &amp;gt;= 4.4).&lt;br /&gt;
&lt;br /&gt;
This feature will require approximately 30% more load in the I/O threads. The load increase can be reduced to about 10% by using the jumbo frame mode &amp;quot;Large buffers&amp;quot; or &amp;quot;Disabled&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
When enabled, packets received on supported interfaces will carry a timestamp with nanosecond resolution instead of microsecond resolution.&lt;br /&gt;
&lt;br /&gt;
===External timestamps===&lt;br /&gt;
When this option is enabled, the system will use timestamps contained in the packet data instead of timestamps measured at packet arrival. Currently the Arista and Ixia/Keysight as well as the SRCMAC timestamp formats are supported.&lt;br /&gt;
&lt;br /&gt;
If the Ixia/Keysight or Arista type is selected, packets without an external timestamp will not be analyzed. The current number of packets that are dropped because they do not contain an external timestamp is displayed in the active interface overview table of the top-user dashboard. If there are no packets with external timestamps arriving the time of the packet processing will effectively stand still and most graphs will not make progress in live-mode.&lt;br /&gt;
&lt;br /&gt;
If one of the SRCMAC options is selected, all packets will be analyzed with all-zero MAC addresses.&lt;br /&gt;
&lt;br /&gt;
=== External original packet lengths ===&lt;br /&gt;
This option allows to enable the use of original packet length information contained in the packet data instead of the length of the packet as received. At this time only the Ixia/Keysight original packet length trailer format is supported.&lt;br /&gt;
&lt;br /&gt;
This feature can also be used in combination with the &#039;&#039;External timestamps&#039;&#039; option to support packets that contain a Ixia/Keysight trailer with both timestamp and original length information.&lt;br /&gt;
&lt;br /&gt;
===Memory utilization limit===&lt;br /&gt;
This option allows to reduce the limit until old data is removed from the in-memory database. By default the system tries to target 90% memory utilization. In some case, the load might be too high to match this limit. A smaller limit may enable the system to keep the target memory utilization and perform better in general.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Memory_extension&amp;diff=4915</id>
		<title>Memory extension</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Memory_extension&amp;diff=4915"/>
		<updated>2024-12-06T12:09:36Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;NOTE: This feature was available in firmware version 3.3 up to 4.2 and was removed in later versions.&lt;br /&gt;
&lt;br /&gt;
Some old statistical data can be stored on an attached flash based storage device to extend the amount of time for historical data. When enabled, the system will automatically swap out old history data onto the flash device making more room in the main memory to increase history data.&lt;br /&gt;
&lt;br /&gt;
This is a BETA feature which is subject to change in future firmware versions. It is only recommended to be used for very fast flash based storage devices and devices with low load.&lt;br /&gt;
&lt;br /&gt;
The configuration dialog allows to check the speed of an active storage device.&lt;br /&gt;
&lt;br /&gt;
*Excellent performance: this result can only be reached on very fast U.2 or PCIe flash devices, such as Intel Optane storage. This class of devices can be used for low to medium traffic load.&lt;br /&gt;
*Acceptable performance: this result can be reached by fast U.2 or SATA flash devices. It can be used for low traffic load.&lt;br /&gt;
*Low performance: the speed is usually too slow to be used effectively for this feature. In very low traffic load situations it might still be usable.&lt;br /&gt;
&lt;br /&gt;
Spinning hard disc drives are in general not recommended to be used for this feature.&lt;br /&gt;
&lt;br /&gt;
The configuration dialog allows to choose the storage device to use and the size of the memory extension. Larger values does not automatically increase the history time, as only part of the historical data ca be swapped out. As long as the usage is not reaching 100%, there is no need to increase the memory extension.&lt;br /&gt;
&lt;br /&gt;
Recommended size values:&lt;br /&gt;
&lt;br /&gt;
*Use at least 1 GB of memory.&lt;br /&gt;
*If possible use 1-2 times the amount of main memory.&lt;br /&gt;
&lt;br /&gt;
Saving the settings will activate the memory extension immediately.&lt;br /&gt;
&lt;br /&gt;
To disable the memory extension, first disable the feature and then restart the packet processing in the administration menu.&lt;br /&gt;
&lt;br /&gt;
Note: The used storage device cannot be deactivated as long as the memory extension is enabled. &lt;br /&gt;
&lt;br /&gt;
Tip: Since only data that is no longer changing can be swapped out onto the storage device, the graph detail settings can be adjusted to make more information available for external memory. The graph resolution reduction can be adjusted to lower values. It will however also make showing graph data slower for larger time periods so the best value depends on the actual amount of data stored and the use case. It is possible to start with a value of 1/1 for the reduction parameter and increase it, if the overall performance is not good enough.&lt;br /&gt;
&lt;br /&gt;
=== Recommended SSD devices ===&lt;br /&gt;
We recommend to use sever-grade high speed SSDs with low access times and high I/O ops.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Speed&lt;br /&gt;
!Model&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|High&lt;br /&gt;
|[https://www.intel.com/content/www/us/en/products/details/memory-storage/data-center-ssds/optane-dc-ssd-series.html Intel Optane SSD DC P5800X series]&lt;br /&gt;
|Recommended for low to medium traffic load, statistic output is slower than usual&lt;br /&gt;
|-&lt;br /&gt;
|Average&lt;br /&gt;
|[https://www.micron.com/products/ssd/product-lines/9300 Micron 9300 MAX SSD]&lt;br /&gt;
|Use for low traffic load only, statistic output is slower too&lt;br /&gt;
|-&lt;br /&gt;
|Low&lt;br /&gt;
|Other U.2/SATA/USB SSDs&lt;br /&gt;
|might be used for low traffic scenarios, access to statistics will be significantly slower as well&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Process_traffic_capture_from_remote_device&amp;diff=4871</id>
		<title>Process traffic capture from remote device</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Process_traffic_capture_from_remote_device&amp;diff=4871"/>
		<updated>2024-09-20T08:54:56Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
The Allegro Network Multimeter can also be switched into a special mode to receive pcap stream via TCP from any remote device. &lt;br /&gt;
It is possible to process plain pcap files or use an additional tool to capture traffic and send it to the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
This mode can be enabled or disabled, and if enabled, the port for receive packet streams can be configured. Be aware that this port is plain unencrypted TCP!&lt;br /&gt;
&lt;br /&gt;
If changes to these settings are made, a restart of the measurement application is required, which can be done in the Administration page.&lt;br /&gt;
&lt;br /&gt;
Every pcap file streamed to the TCP socket will be processed as it would be analysed locally from a connected storage device. &lt;br /&gt;
Up to 16 connections can be used simultaneously. &lt;br /&gt;
Since the internal clock depends on the packet time, all clocks of the sources should be (almost) synchronous (for example by using NTP time synchronization). &lt;br /&gt;
&lt;br /&gt;
To analyze a bunch of files chronologically, stream the files one at a time to the Multimeter.&lt;br /&gt;
The timestamps of the actual packets are used for the internal time clock of the Allegro Network Multimeter so network problems and events can be traced back to the actual time they happened.&lt;br /&gt;
&lt;br /&gt;
The clock of multiple files should not run backwards, i.e. when a file from an older capture time is processed after a file from a newer capture time. &lt;br /&gt;
If such files need to be analyzed, the measurement core should be started via the Administration page.&lt;br /&gt;
&lt;br /&gt;
The [[System Info Page]] shows the current packet processing mode, indicating whether live traffic from local network interface is processed, live traffic from the TCP port, or a pcap file from the storage device is analyzed.&lt;br /&gt;
&lt;br /&gt;
===== Parallel remote packets =====&lt;br /&gt;
Starting with version 4.3 there is now the option to run the remote packet processing in parallel to the live analysis just like a parallel PCAP analysis or parallel Packet Ring Buffer analysis. For this to work the PCAP parallel analysis feature must be enabled (see [[PCAP parallel analysis]]).&lt;br /&gt;
&lt;br /&gt;
In the tab &#039;&#039;Parallel remote packets&#039;&#039; the following parameters can be set:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Port number:&#039;&#039;&#039; the port on which this parallel remote packet processing should listen for incoming connections&lt;br /&gt;
* &#039;&#039;&#039;Name:&#039;&#039;&#039; a name displayed on the Top User Dashboard when the replay slot is selected (optional)&lt;br /&gt;
* &#039;&#039;&#039;Description:&#039;&#039;&#039; a description displayed on the Top User Dashboard when the replay slot is selected  (optional)&lt;br /&gt;
* &#039;&#039;&#039;Analysis Profile:&#039;&#039;&#039; a settings profile to be used for the parallel remote packet processing (see [[Pcap analysis module]])&lt;br /&gt;
* &#039;&#039;&#039;Replay Slot:&#039;&#039;&#039; the replay slot to be used for the  parallel remote packet processing&lt;br /&gt;
&lt;br /&gt;
A checkbox &#039;&#039;Use a temporary Packet Ring Buffer for the parallel remote packets analysis&#039;&#039; can be enabled to let the the parallel remote packet analysis use a Packet Ring Buffer on the selected storage device. This Packet Ring Buffer and all its contents will be deleted once the remote packets analysis ends. Selecting this checkbox shows the following additional settings:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Storage device:&#039;&#039;&#039; the storage device on which to create the temporary Packet Ring Buffer&lt;br /&gt;
* &#039;&#039;&#039;Ring buffer size in MB:&#039;&#039;&#039; the size of the temporary Packet Ring Buffer in MB&lt;br /&gt;
&lt;br /&gt;
Once the &#039;&#039;Start parallel remote packets&#039;&#039; button is pressed the user interface can be switched between the parallel remote packets analysis and live analysis just like with the parallel PCAP analysis by selecting the respective replay slot. The processing can be stopped in the &#039;&#039;Parallel remote packets&#039;&#039; tab or on the Top user dashboard when the replay slot is selected.&lt;br /&gt;
&lt;br /&gt;
==  Receive packets from remote capture device ==&lt;br /&gt;
&lt;br /&gt;
=== Example uses ===&lt;br /&gt;
&lt;br /&gt;
The capturing tool can be downloaded from the &#039;&#039;&#039;Remote packets&#039;&#039;&#039; page in the &#039;&#039;&#039;Generic&#039;&#039;&#039; section.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[File:Process traffic capture from remote device.png|600px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The tool allows to capture packets from any or a specific network device, and also to stream a file to the Allegro Network Manager:&lt;br /&gt;
&lt;br /&gt;
* Processing a local pcap file:&lt;br /&gt;
&lt;br /&gt;
 ./ap_capture_to_remote -f trace.pcap allegro-mm-abcd 8001&lt;br /&gt;
&lt;br /&gt;
* Live-capture from eth0:&lt;br /&gt;
&lt;br /&gt;
 sudo ./ap_capture_to_remote -i eth0 allegro-mm-abcd 8001&lt;br /&gt;
    &lt;br /&gt;
or permit access to network interfaces only instead of full root permissions:&lt;br /&gt;
    &lt;br /&gt;
 sudo setcap cap_net_raw=ep ap_capture_to_remote&lt;br /&gt;
 ./ap_capture_to_remote -i eth0 allegro-mm-abcd 8001&lt;br /&gt;
&lt;br /&gt;
* Live-capture from all network devices:&lt;br /&gt;
 sudo ./ap_capture_to_remote allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
In all examples, host and port number must be set according to the actual Allegro Network Multimeter device and the configured port number.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[File:Process traffic capture from remote device1.png|1000px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Additional notes ===&lt;br /&gt;
&lt;br /&gt;
* The tool automatically applies a filter to not capture the connection to the remote Allegro Network Multimeter to avoid running a loop when the remote connection is visible on the captured interface. That means no additional actions need to be made to skip the remote capture connection.&lt;br /&gt;
* Not all interface types are supported for capturing. The interface must provide either Ethernet frames or WiFi frames.&lt;br /&gt;
&lt;br /&gt;
===Alternative tools===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter also accepts plain pcap files on the configured port. &lt;br /&gt;
That means it is possible to stream files to the device or use tcpdump with additional filters.&lt;br /&gt;
&lt;br /&gt;
Example uses are:&lt;br /&gt;
&lt;br /&gt;
*Processing a local pcap file:&lt;br /&gt;
&lt;br /&gt;
 cat trace.pcap | netcat allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
*Live-capture via tcpdump:&lt;br /&gt;
 &lt;br /&gt;
 sudo tcpdump -i eth0 -s 0 -U -w /dev/stdout | netcat allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
==Remote capture via ERSPAN==&lt;br /&gt;
&lt;br /&gt;
The capturing tool also supports sending the packets as ERSPAN-wrapped packets. This mode is used with the `-e` flag (which needs an ERSPAN session ID as a parameter). If this mode is used, the port doesn&#039;t need to be specified anymore.&lt;br /&gt;
 sudo ./ap_capture_to_remote -e 123 1.2.3.4&lt;br /&gt;
In this mode, the [[ERSPAN Installation|endpopint mode for ERSPAN]] must be enabled and configured for the same IP as used in the ap_capture_to_remote command line argument.&lt;br /&gt;
&lt;br /&gt;
Note that the IP address used is NOT the address or name of the management, but the separate IP address that is only valid on the interface for which the endpoint mode is configured.&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Main_Page&amp;diff=4850</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Main_Page&amp;diff=4850"/>
		<updated>2024-08-28T07:09:39Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
{|&lt;br /&gt;
|[[Image:Combination mark transparent.png|300px|link=https://www.allegro-packets.com]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;This is the Allegro Network Multimeter manual. Please visit the website of [https://allegro-packets.com Allegro Packets] for more information about the product.&#039;&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;color:black; background-color:#ffdda3;&amp;quot;&lt;br /&gt;
|Translation: Document language is English, but you can use [https://translate.google.com/translate?u=allegro-packets.com/wiki automatic Google translation] into your language!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;mainpage_row&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
=== Installation ===&lt;br /&gt;
* [[Generic Allegro Network Multimeter installation|Generic Allegro Network Multimeter installation guides]]&lt;br /&gt;
* Additional installation notes for specific devices:&lt;br /&gt;
** [[Allegro 200 series]]&lt;br /&gt;
* [[Management interface settings|Configure Management IP address]]&lt;br /&gt;
* [[IPMI KVM on Allegro series 1000+]]&lt;br /&gt;
* [[User Management|Multi users and permissions]]&lt;br /&gt;
* [[Firmware update]]&lt;br /&gt;
* [[Performing a factory reset or configuration reset]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Typical Installation Setups ===&lt;br /&gt;
* [[In-Line Installation|In-Line Installation Guide]]&lt;br /&gt;
* [[Mirror Port, TAP and Packet Broker Installation|Mirror Port, TAP and Packet Broker Installation Guide]]&lt;br /&gt;
* [[ERSPAN Installation|ERSPAN Installation Guide]]&lt;br /&gt;
* [[VMWare Workstation Player/Pro Installation Guide]]&lt;br /&gt;
* [[VMWare ESXI Installation Guide]]&lt;br /&gt;
* [[Hyper-V Installation Guide]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
=== Configuration Guides ===&lt;br /&gt;
* [[Ring Buffer Configuration Guide]] &amp;lt;br/&amp;gt; ( Single Storage Device, Multiple Disks,... )&lt;br /&gt;
* [[Parallel packet processing|Parallel Packet Processing Configuration Guide]]&lt;br /&gt;
* [[Virtual Link Group Configuration Guide]]&lt;br /&gt;
* [[Multi-device settings|Multi-Allegro Configuration]]&lt;br /&gt;
&amp;lt;!-- * [[Remote Capture Configuration]] --&amp;gt;&lt;br /&gt;
* [[Performance Optimization Guide]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;mainpage_row&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Web Interface / Dashboard Manual ===&lt;br /&gt;
* [[Introduction]] &lt;br /&gt;
* [[Quickstart]] &lt;br /&gt;
* [[Usage]] &lt;br /&gt;
* [[Measurement modules]]&lt;br /&gt;
* [[Info Menu]]&lt;br /&gt;
* [[Settings]] &lt;br /&gt;
* [[User Profile Settings]]&lt;br /&gt;
* [[FAQ|FAQ - Frequently Asked Questions]]&lt;br /&gt;
* [[Error descriptions]]&lt;br /&gt;
* [[Feature documentation]] &lt;br /&gt;
* [[Reports]] &lt;br /&gt;
* [[Speedtest]] &lt;br /&gt;
* [[Longterm DB]] &lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Use Cases ===&lt;br /&gt;
* [[Investigate Network Load ]]&lt;br /&gt;
* [[Forensic pcap Analysis ]]&lt;br /&gt;
* [[Find Profinet problems]]&lt;br /&gt;
* [[Network Burst Analysis]]&lt;br /&gt;
* [[Burst analysis on a Mirror or Packet Broker input]]&lt;br /&gt;
* [[Capturing]]&lt;br /&gt;
* [[Analyze connections between remote sites]]&lt;br /&gt;
* [[Debugging Skype Traffic|Troubleshooting Microsoft Teams and Skype]]&lt;br /&gt;
* [[USB Presenter Capture]]&lt;br /&gt;
* [[VoIP monitoring and troubleshooting]]&lt;br /&gt;
* [[Generic troubleshooting processes|Generic troubleshooting process]]&lt;br /&gt;
* [[Process traffic capture from remote device]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Data export and third-party tools===&lt;br /&gt;
* [[REST API description]]&lt;br /&gt;
*[[Statistics Export via POST]]&lt;br /&gt;
*[[SNMP]]&lt;br /&gt;
*[[NetFlow/IPFIX interface]]&lt;br /&gt;
*[[Public limited statistics]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;mainpage_row&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remote access===&lt;br /&gt;
&lt;br /&gt;
*[[Using the Allegro Remote Service]]&lt;br /&gt;
*[[Self-hosted SSH Proxy]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
===Settings ===&lt;br /&gt;
&lt;br /&gt;
*[[ Global settings]]&lt;br /&gt;
*[[ Module settings]]&lt;br /&gt;
* [[ User defined names]]&lt;br /&gt;
* [[ Management interface settings]]&lt;br /&gt;
*[[ Multi-device settings]]&lt;br /&gt;
*[[ Virtual_Link_Group_functionality | Virtual link groups]]&lt;br /&gt;
*[[ Administration]]&lt;br /&gt;
*[[ Ingress filter]]&lt;br /&gt;
* [[ Remote access and export]]&lt;br /&gt;
* [[WiFi]]&lt;br /&gt;
*[[ User Management]]&lt;br /&gt;
*[[ Firmware update]]&lt;br /&gt;
*[[ License upload]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Getting support===&lt;br /&gt;
&lt;br /&gt;
*[[Reaching Allegro Packets Support]]&lt;br /&gt;
*[[Reporting Bugs]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;mainpage_row&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Support of third-party hardware===&lt;br /&gt;
&lt;br /&gt;
*[[List of Supported Transceiver Modules]]&lt;br /&gt;
*[[Supported Storage Devices for x300/x400/x500 Series]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Additional resources===&lt;br /&gt;
*[[Device icons|Pictograms/Icons/Stencils for all Allegro models]]&lt;br /&gt;
*[[Supported protocols]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=4849</id>
		<title>Longterm DB</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=4849"/>
		<updated>2024-08-28T07:08:45Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
The Longterm DB feature (in firmware &amp;gt;= 4.3) uses an attached storage devices to store traffic information of IP addresses and Layer 7 protocols with low resolution for a much longer time than the live statistics.&lt;br /&gt;
&lt;br /&gt;
The elements stored in the longterm DB are as follows, graph data is available in 5 minute resolution: &lt;br /&gt;
&lt;br /&gt;
* IP addresses&lt;br /&gt;
*# activity time&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
* Layer 7 protocols&lt;br /&gt;
*# traffic graph in 5 minute resolution&lt;br /&gt;
&lt;br /&gt;
The storage is used similar to a swap file mechanism so the longterm data is not kept between restart unless the [[DB persistence]] feature is enabled too, which is recommended when using the longterm feature. To reduce the amount of time to dump/restore, the DB persistence configuration allow to skip storing live data. &lt;br /&gt;
&lt;br /&gt;
==Usage==&lt;br /&gt;
[[File:Longterm DB dashboard.png|alt=Longterm DB activated dashboard|thumb|Longterm DB activated dashboard]]If this feature is enabled, a view toggle button appears in the top menu bar. This button allows to switch between the real time &amp;quot;RT&amp;quot; view and the longterm (&amp;quot;LT&amp;quot;) view.&lt;br /&gt;
&lt;br /&gt;
In the longterm view, the IP address information contain only information about the traffic amount in 5 minute resolution.&lt;br /&gt;
&lt;br /&gt;
The navigation menu in the longterm view only contains those modules which are available in this view.&lt;br /&gt;
&lt;br /&gt;
If the longterm view is activated on module pages which do not support longterm data, a corresponding info box is shown.&lt;br /&gt;
&lt;br /&gt;
==Setting==&lt;br /&gt;
The configuration can be found in the global settings page in the &amp;quot;Longterm DB&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
To enable this feature, select a storage device to be used, enable the feature and enter a file size. &lt;br /&gt;
&lt;br /&gt;
It is recommended to also enable the [[DB persistence]] feature to be able to save and restore the longterm DB data during restarts.&lt;br /&gt;
&lt;br /&gt;
Once enabled, the utilization of the file is shown and the [[System Info Page]] contains information about how long the data can be kept.&lt;br /&gt;
&lt;br /&gt;
Tip: Since the amount of information stored in the longterm DB is limited by the graph resolution, the file size usually don&#039;t need to be similar sized as the main memory. 10 GByte is a good starting point.&lt;br /&gt;
&lt;br /&gt;
The size can be increase but it requires a restart of the packet processing.&lt;br /&gt;
&lt;br /&gt;
[[File:Longterm db settings.png|thumb|Longterm DB settings]]&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
Recommended storage device types:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Storage device&lt;br /&gt;
!Note&lt;br /&gt;
|-&lt;br /&gt;
|NMVe based SSD&lt;br /&gt;
|recommended&lt;br /&gt;
|-&lt;br /&gt;
|SATA based SSD&lt;br /&gt;
|can be used for moderate traffic, check system load for high system utilization&lt;br /&gt;
|-&lt;br /&gt;
|USB based SSD&lt;br /&gt;
|not recommended, but might be useful for small systems (Allegro 200/500)&lt;br /&gt;
|-&lt;br /&gt;
|HDD&lt;br /&gt;
|not recommended, should not be used&lt;br /&gt;
|}&lt;br /&gt;
It is also not recommended to place the longterm DB on the same storage device that is used a packet ring buffer as it will deteriorate the performance of both features.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
# The data in the longterm DB is limited to a selected subset of the data in the In-Memory-DB. See above for an exact list of elements available.&lt;br /&gt;
# The data is written into the longterm DB in variable intervals depending on traffic and system load. It takes up to 10 minutes (two graph intervals) until the data appears in the graph. Therefore, the last 5-10 minutes appear empty or with less traffic than in live view.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=4844</id>
		<title>Longterm DB</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=4844"/>
		<updated>2024-08-16T14:17:18Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
The Longterm DB feature (in firmware &amp;gt;= 4.3) uses an attached storage devices to store traffic information of IP addresses with low resolution for a much longer time than the live statistics.&lt;br /&gt;
&lt;br /&gt;
The stored data comprises the IP addresses and their traffic data in graphical representation with 5 minutes resolution. &lt;br /&gt;
&lt;br /&gt;
The storage is used similar to a swap file mechanism so the longterm data is not kept between restart unless the [[DB persistence]] feature is enabled too, which is recommended when using the longterm feature. To reduce the amount of time to dump/restore, the DB persistence configuration allow to skip storing live data. &lt;br /&gt;
&lt;br /&gt;
==Usage==&lt;br /&gt;
[[File:Longterm DB dashboard.png|alt=Longterm DB activated dashboard|thumb|Longterm DB activated dashboard]]If this feature is enabled, a view toggle button appears in the top menu bar. This button allows to switch between the real time &amp;quot;RT&amp;quot; view and the longterm (&amp;quot;LT&amp;quot;) view.&lt;br /&gt;
&lt;br /&gt;
In the longterm view, the IP address information contain only information about the traffic amount in 5 minute resolution.&lt;br /&gt;
&lt;br /&gt;
The navigation menu in the longterm view only contains those modules which are available in this view.&lt;br /&gt;
&lt;br /&gt;
If the longterm view is activated on module pages which do not support longterm data, a corresponding info box is shown.&lt;br /&gt;
&lt;br /&gt;
==Setting==&lt;br /&gt;
The configuration can be found in the global settings page in the &amp;quot;Longterm DB&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
To enable this feature, select a storage device to be used, enable the feature and enter a file size. &lt;br /&gt;
&lt;br /&gt;
It is recommended to also enable the [[DB persistence]] feature to be able to save and restore the longterm DB data during restarts.&lt;br /&gt;
&lt;br /&gt;
Once enabled, the utilization of the file is shown and the [[System Info Page]] contains information about how long the data can be kept.&lt;br /&gt;
&lt;br /&gt;
Tip: Since the amount of information stored in the longterm DB is limited by the graph resolution, the file size usually don&#039;t need to be similar sized as the main memory. 10 GByte is a good starting point.&lt;br /&gt;
&lt;br /&gt;
The size can be increase but it requires a restart of the packet processing.&lt;br /&gt;
&lt;br /&gt;
[[File:Longterm db settings.png|thumb|Longterm DB settings]]&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
Recommended storage device types:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Storage device&lt;br /&gt;
!Note&lt;br /&gt;
|-&lt;br /&gt;
|NMVe based SSD&lt;br /&gt;
|recommended&lt;br /&gt;
|-&lt;br /&gt;
|SATA based SSD&lt;br /&gt;
|can be used for moderate traffic, check system load for high system utilization&lt;br /&gt;
|-&lt;br /&gt;
|USB based SSD&lt;br /&gt;
|not recommended, but might be useful for small systems (Allegro 200/500)&lt;br /&gt;
|-&lt;br /&gt;
|HDD&lt;br /&gt;
|not recommended, should not be used&lt;br /&gt;
|}&lt;br /&gt;
It is also not recommended to place the longterm DB on the same storage device that is used a packet ring buffer as it will deteriorate the performance of both features.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
# The data in the longterm DB comprises the following information:&lt;br /&gt;
## IP addresses&lt;br /&gt;
### activity time&lt;br /&gt;
### traffic graph in 5 minute resolution&lt;br /&gt;
# The data is written into the longterm DB in variable intervals depending on traffic and system load. It takes up to 10 minutes (two graph intervals) until the data appears in the graph. Therefore, the last 5-10 minutes appear empty or with less traffic than in live view.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4842</id>
		<title>IP module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4842"/>
		<updated>2024-08-09T13:35:04Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The IP module operates on layer 3 of the network stack. It stores information about all IPv4 and IPv6 addresses.&lt;br /&gt;
For every address, the corresponding network traffic is accounted, the used protocols and their individual traffic.&lt;br /&gt;
The communication peers are stored as well as the traffic between both IP addresses. Every connection and its amount of traffic and the protocol can be accessed too.&lt;br /&gt;
&lt;br /&gt;
== Web interface ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[File:IP statistics.png|800px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== IP addresses tab ===&lt;br /&gt;
&lt;br /&gt;
The IP addresses tab shows the complete list of all IP addresses seen by the system. The button row allows for select specific information to be shown or hidden so that only the relevant information fit on the screen. &lt;br /&gt;
By clicking on &#039;&#039;&#039;Counters (combined)&#039;&#039;&#039; the table toggles between sent and received bytes and packets displayed in either one column or in separate columns for sorting purposes.&lt;br /&gt;
For each address, the table contains the following information:&lt;br /&gt;
&lt;br /&gt;
* IP&lt;br /&gt;
:See [[Common table columns#IP|Common table columns - IP]].&lt;br /&gt;
&lt;br /&gt;
* Alternative names&lt;br /&gt;
:See [[Common table columns#Alternative names|Common table columns - Alternative names]].&lt;br /&gt;
:The name information are also used when filtering the table for some entered string.&lt;br /&gt;
&lt;br /&gt;
* Traceroute&lt;br /&gt;
:A traceroute for the IP can be requested or updated using the available button. When traceroute information is available for the IP, brief information about each found network hop (IP, hostname, ping response time) is displayed. Since this list of hops can get very long, the view can be toggled to show all found hops or just the last one by clicking on the traceroute header.&lt;br /&gt;
&lt;br /&gt;
* First (recent) activity&lt;br /&gt;
:See [[Common table columns#First (recent) activity|Common table columns - First (recent) activity]].&lt;br /&gt;
&lt;br /&gt;
* Last activity&lt;br /&gt;
:See [[Common table columns#Last activity|Common table columns - Last activity]].&lt;br /&gt;
&lt;br /&gt;
* Packets and Bytes&lt;br /&gt;
:See [[Common table columns#Packets|Common table columns - Packets]] and [[Common table columns#Bytes|Common table columns - Bytes]].&lt;br /&gt;
&lt;br /&gt;
* Packets/s and Bit/s&lt;br /&gt;
:See [[Common table columns#Packets/s|Common table columns - Packets/s]] and [[Common table columns#Bit/s|Common table columns - Bit/s]].&lt;br /&gt;
&lt;br /&gt;
* Peers&lt;br /&gt;
: This shows the amount of peers of this IP. This counter is an all time only value and does not consider a selected interval.&lt;br /&gt;
&lt;br /&gt;
* TTL&lt;br /&gt;
: This shows the min, max and average TTL value (or hop limit in case of IPv6) of TCP/UDP traffic of an IP address. Non-UDP and non-TCP traffic as well as multicast traffic is ignored as e.g. ICMP packets likely have very high TTL values of 255 at the sender. &lt;br /&gt;
&lt;br /&gt;
* MTU&lt;br /&gt;
: The maximum transmission unit (i.e. layer 2 payload) is calculated for both receive and send direction. The maximum values are displayed.&lt;br /&gt;
&lt;br /&gt;
* TCP packets and UDP packets&lt;br /&gt;
:This is the number of TCP and UDP packets that have been seen for this IP.&lt;br /&gt;
&lt;br /&gt;
* TCP handshake time and TCP data response time&lt;br /&gt;
: The average time for a handshake as a TCP client and/or a TCP server is displayed as well as the average time the IP takes to acknowledge TCP data.&lt;br /&gt;
&lt;br /&gt;
* TCP application time&lt;br /&gt;
: The [[TCP application time|TCP application times]] are shown as aggregated values from each connection.&lt;br /&gt;
&lt;br /&gt;
* TCP payload and retransmissions&lt;br /&gt;
:These two columns show the number of bytes transmitted as TCP payload and how many bytes have been retransmitted, indicating a bad connection quality.&lt;br /&gt;
&lt;br /&gt;
* Graph&lt;br /&gt;
:See [[Common table columns#Graph|Common table columns - Graph]].&lt;br /&gt;
:Available data sources are load (bps or packets/s), TCP statistics or connections.&lt;br /&gt;
&lt;br /&gt;
* PCAP&lt;br /&gt;
:See [[Common table columns#PCAP|Common table columns - PCAP]]&lt;br /&gt;
&lt;br /&gt;
When multiple pages are available, there will be a control field for switching pages.&lt;br /&gt;
The IP search bar allows to enter IP addresses or names to see only those element for which the entered string is part of the IP address or name. &lt;br /&gt;
Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for a detailed description about how to use this feature.&lt;br /&gt;
The columns can be sorted also, for example to easily spot the IP addresses with the most bytes, or the highest current throughput.&lt;br /&gt;
&lt;br /&gt;
Below the table a CSV download button provides the ability to download the whole table contents in CSV format.&lt;br /&gt;
Sorting and filtering are applied as selected for the table but all IPs in the table are exported, not only the currently visible page.&lt;br /&gt;
&lt;br /&gt;
=== Global IP statistics tab ===&lt;br /&gt;
&lt;br /&gt;
The global IP statistics shows global sums about the processed IPv4 and IPv6 traffic and often used layer 4 protocols.&lt;br /&gt;
Non-IP packets such as ARP packets are indicated as other traffic and are not covered by this module.&lt;br /&gt;
The available information is:&lt;br /&gt;
* Layer 3 protocols (IPv4, IPv6 and non-IP traffic, its distribution over time and a history graph)&lt;br /&gt;
* Layer 4 protocols (TCP, UDP and traffic for other often used layer 4 protocols, its distribution over time and a history graph)&lt;br /&gt;
* Number of IPv4 fragmented packets (distribution over time and a history graph)&lt;br /&gt;
&lt;br /&gt;
For layer 3 and layer 4 protocols, traffic can be downloaded by clicking on the PCAP download button. The captured packets are not stored on the system but they are directly sent over the HTTP connection to your computer. &lt;br /&gt;
To stop capture, click on the same button again (which turned to a STOP symbol), or go to the capture traffic page in the generic section and stop the corresponding download.&lt;br /&gt;
&lt;br /&gt;
=== Top IP statistics ===&lt;br /&gt;
&lt;br /&gt;
On this page pie charts are shown with the top 10 sending and receiving IP addresses. By clicking on a pie chart section the related IP detail page is opened.&lt;br /&gt;
&lt;br /&gt;
=== Per IP statistics ===&lt;br /&gt;
&lt;br /&gt;
It is possible to select an IP from the list of IP addresses and get an more detailed view of the information stored about that IP.&lt;br /&gt;
The headline of the page includes three buttons.&lt;br /&gt;
The first left arrow button navigates back to the complete IP overview. &lt;br /&gt;
The second download button allows to download the traffic for the current IP address. &lt;br /&gt;
The third button allows for opening this manual section.&lt;br /&gt;
Below the buttons there are two graphs for the packets and bytes sent and received by the IP address.&lt;br /&gt;
The third section contains six tabs for various information about the selected IP.&lt;br /&gt;
&lt;br /&gt;
==== Overview tab ====&lt;br /&gt;
&lt;br /&gt;
This tab summarizes all the standard information from the main IP view, such as&lt;br /&gt;
* the alternative names,&lt;br /&gt;
* the packet and bytes counters, and&lt;br /&gt;
* the current throughput.&lt;br /&gt;
&lt;br /&gt;
Additionally, the top DPI protocols are printed both in the table as well as a pie chart at the bottom of the page.&lt;br /&gt;
The last line in the table shows the MAC addresses seen for this IP address. &lt;br /&gt;
There can be multiple MAC addresses for the same IP, for example if the DHCP reuse the IP address after some time. &lt;br /&gt;
The last new connection time is the start time of the last connection seen for this IP.&lt;br /&gt;
There is also a download button to capture the traffic for the specific IP and MAC address pair.&lt;br /&gt;
The final two rows shows all VLAN tags that have been seen for the given IP. An IP address might be visible in multiple VLANs.&lt;br /&gt;
If the Allegro Network Multimeter is installed at a mirror port of a switch which also modifies the VLAN tag, it might happen that an IP address is seen without a VLAN tag (none) and a specific VLAN tag. &lt;br /&gt;
This setup will decrease the quality of the results as connections use the VLAN information too to distinguish connections. &lt;br /&gt;
The measurement results can be improved if the mirror port is reconfigured to only see traffic with VLAN or completely without VLAN tags.&lt;br /&gt;
The last row shows the devices interfaces at which the IP has been seen. &lt;br /&gt;
The displayed interface always considers the sender side of an IP connection. &lt;br /&gt;
This information helps especially in bridge mode to determine at which side of an link the IP address is visible as sender of packets.&lt;br /&gt;
&lt;br /&gt;
==== Layer 3 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen IP DSCP values for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown DSCP class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific DSCP value.&lt;br /&gt;
&lt;br /&gt;
==== Layer 2 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen MPLS traffic classes and VLAN priority code points for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. &lt;br /&gt;
A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown QoS class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific QoS.&lt;br /&gt;
&lt;br /&gt;
==== Protocols tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists the DPI protocols for the current IP. The download button allows to capture the traffic for the IP and protocol pair.&lt;br /&gt;
&lt;br /&gt;
==== Peers tab ====&lt;br /&gt;
&lt;br /&gt;
The Peers tab shows all communication peers the current IP address has talked to. The table contains the [[Common table columns#IP|IP address]] which can be clicked to see the statistics for that IP.&lt;br /&gt;
The alternative names are shown, depending on which data is available (DNS name, DHCP name, NIC vendor name).&lt;br /&gt;
The packets and bytes columns show the total amount of data transferred between those two IP addresses.&lt;br /&gt;
The list of peers can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Layer 4 endpoints ====&lt;br /&gt;
&lt;br /&gt;
The layer 4 endpoint tab shows all peers of the current IP address and the used server port. If the peer is the server, the port of the peer is shown. If the peer is the client, the other port is shown.&lt;br /&gt;
&lt;br /&gt;
The table shows [[Common table columns#IP|IP addresses]] with port number, whether the peer acts as a server or client, alternative names, layer 4 protocol and byte and packet counters. If there were multiple connection between the IP address and the peer with the same port, the counters will show aggregated data.&lt;br /&gt;
&lt;br /&gt;
When clicking on &amp;quot;Peer connections&amp;quot; the connection tab is opened with the filter set to match that particular endpoint.&lt;br /&gt;
&lt;br /&gt;
==== Connections tab ====&lt;br /&gt;
&lt;br /&gt;
The connection tabs lists all connections which involves the current IP. The button rows allow to select which kind of information should be shown.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Column&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|Client IP/port&lt;br /&gt;
|Client side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Server IP/port&lt;br /&gt;
|Server side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Layer 4 protocol&lt;br /&gt;
|TCP, UDP, or others&lt;br /&gt;
|-&lt;br /&gt;
|Go to&lt;br /&gt;
|allows to go to the connection details page which shows all information in more detail.&lt;br /&gt;
|-&lt;br /&gt;
|Start time&lt;br /&gt;
|The start time is the time of the first packet for that connection.&lt;br /&gt;
|-&lt;br /&gt;
|Last activity&lt;br /&gt;
|shows the time of the last packet seen so far for the connection&lt;br /&gt;
|-&lt;br /&gt;
|Duration&lt;br /&gt;
|Difference between last activity and start time.&lt;br /&gt;
|-&lt;br /&gt;
|Packets&lt;br /&gt;
|Number of packets&lt;br /&gt;
|-&lt;br /&gt;
|Bytes&lt;br /&gt;
|Number of bytes&lt;br /&gt;
|-&lt;br /&gt;
|Packets/s&lt;br /&gt;
|Packet rate&lt;br /&gt;
|-&lt;br /&gt;
|Bit/s&lt;br /&gt;
|Bit rate&lt;br /&gt;
|-&lt;br /&gt;
|MTU&lt;br /&gt;
|The maximum transmission unit (i.e. layer 2 payload) is calculated for both directions.&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 protocol&lt;br /&gt;
|shows the detect application layer 7 protocol.&lt;br /&gt;
|-&lt;br /&gt;
|TCP handshake time&lt;br /&gt;
|The time between SYN and ACK.&lt;br /&gt;
|-&lt;br /&gt;
|TCP response time (max/avg)&lt;br /&gt;
|contains response times for TCP data&lt;br /&gt;
|-&lt;br /&gt;
|TCP application time&lt;br /&gt;
|Performance metrics for L7 applications (see [[TCP application time]] for details)&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 response time&lt;br /&gt;
|contains response times for the maximum HTTP response for HTTP connections, or the SSL response times for SSL connections. The column also contains a score for this connection and this IP, based on the average response times of the server. See HTTP module and SSL module for additional information. When sorting the column and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
|-&lt;br /&gt;
|TCP retransmissions/TCP restransmission %&lt;br /&gt;
|shows the number of bytes that have been retransmitted on TCP layer because of packet loss. High percentage indicate connection problems for this communication pair.&lt;br /&gt;
|-&lt;br /&gt;
|TCP DUP ACKs&lt;br /&gt;
|Number of DUP ACK packets&lt;br /&gt;
|-&lt;br /&gt;
|TCP missed data&lt;br /&gt;
|shows the estimated amount of TCP data not seen for this connection. See [[TCP module#Missed data|TCP module]] for details about missed data.&lt;br /&gt;
|-&lt;br /&gt;
|TCP SYNs/SYN-ACKs/FINs/RSTs&lt;br /&gt;
|shows the amount of TCP SYN, SYN-ACK, FIN and RST packets per direction. Up to 255 packets can be accounted, if more were seen, &amp;gt;= 255 will be displayed.&lt;br /&gt;
|-&lt;br /&gt;
|TCP end termination reason&lt;br /&gt;
|Connection end can be regular FIN, RST, or timeout if no termination is seen at all&lt;br /&gt;
|-&lt;br /&gt;
|TCP MSS&lt;br /&gt;
|The TCP maximum segment size may be announced by the peers using a TCP option during connection negotiation. If the option is not announced, default values will be used. The values represents the payload capacity of TCP packets sent by the peer.&lt;br /&gt;
|-&lt;br /&gt;
|Max announced TCP window size&lt;br /&gt;
|shows the size of the biggest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Min announced TCP window size&lt;br /&gt;
|shows the size of the smallest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Max TCP bytes in flight&lt;br /&gt;
|shows how much of the TCP receive window of the corresponding direction has been used at max during the lifetime of the connection, in other words this is the bytes in flight of the opposite, sending direction.&lt;br /&gt;
|-&lt;br /&gt;
|Announced TCP window size limit&lt;br /&gt;
|The TCP window size limit columns show the maximum possible value that could be used for the TCP receive window size. This is calculated from the announced TCP window scale option for each direction of a connection. The raw window scale (ws) shift count value is displayed in parentheses next to the byte value.&lt;br /&gt;
|-&lt;br /&gt;
|TCP window limit usage&lt;br /&gt;
|show the ratio of the TCP max window size values compared to the TCP window size limit values in percent.&lt;br /&gt;
|-&lt;br /&gt;
|TCP zero window packets&lt;br /&gt;
|Number of TCP zero window packets indicated full receive buffer.&lt;br /&gt;
|-&lt;br /&gt;
|Client announced TLS versions/Negotiated TLS version, Client announced cipher suites/Negotiated cipher suite&lt;br /&gt;
|shows the TLS versions and all supported cipher suites announced by the client during a SSL client hello. In the negotiated columns the currently used TLS version and cipher suite is shown as indicated by the SSL server hello. As the client announced cipher suite list can be quite long, it is possible expand or minimize the list by click on it.&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert level&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Validity&lt;br /&gt;
|Connections are counted as valid if the handshake succeeded or at least some data is transferred. &lt;br /&gt;
|-&lt;br /&gt;
|Meta data&lt;br /&gt;
|may contain additional information that could be retrieved depending on the protocol. For instance, for HTTP traffic this column shows the request URL and response code for the last transaction seen in the corresponding connection.&lt;br /&gt;
|-&lt;br /&gt;
|Outer VLANs&lt;br /&gt;
|shows which VLAN tags has been seen for a specific connection.&lt;br /&gt;
|-&lt;br /&gt;
|Inner VLANs&lt;br /&gt;
|shows which inner VLAN tags has been seen for a specific connection in QinQ setups.&lt;br /&gt;
|-&lt;br /&gt;
|PPPoE session ID&lt;br /&gt;
|shows the PPPoE session ID which has been seen for packets of that specific connection. If a PPPoE session ID changes at any time while the connection is active, a &#039;changed&#039; indication is given. In this case the latter session ID is displayed.&lt;br /&gt;
|-&lt;br /&gt;
|MPLS labels&lt;br /&gt;
|shows all seen MPLS labels for every direction of the connection. The full label stack is shown. A &#039;&#039;&#039;no label&#039;&#039;&#039; indication is given, if no MPLS labels have been used. If a MPLS label changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter MPLS labels are displayed.&lt;br /&gt;
|-&lt;br /&gt;
|QoS&lt;br /&gt;
|shows all seen QoS service classes for every direction of the connection. IP DSCP, outermost MPLS traffic classes and outermost VLAN priority code points may be detected and displayed. If a QoS class changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter QoS service classes are displayed. TCP RST packets will be ignored, as that packet may be less important and is indicated by a QoS class with lower priority than the previous packets with data.&lt;br /&gt;
|-&lt;br /&gt;
|Interfaces&lt;br /&gt;
|shows at which interface the connection has been established. This is especially helpful in bridge mode to determine at which side of link the connection has been established.&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency avg interval&lt;br /&gt;
|[[Path measurement#Measurement_statistics|Statistics from the path measurement]]&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency avg interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Graph&lt;br /&gt;
|shows the historical throughput for each connection, it is possible to select the displayed graph from multiple different statistics (see [[Common table columns#Graph|Common table columns - Graph]]). Some may only be available if module options has been enabled, as it will increase the overall memory usage. Some statistics like the path latency is only available, if the path measurement module is active (and the corresponding option to store latencies per connection is enabled)&lt;br /&gt;
|-&lt;br /&gt;
|PCAP&lt;br /&gt;
|allows for capturing the specific connection (see [[Common table columns#PCAP|Common table columns - PCAP]])&lt;br /&gt;
|}&lt;br /&gt;
The list of connections can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
[[File:IP connection details.png|thumb|600x600px|Connection detail view]]&lt;br /&gt;
A detailed connection view can be accessed by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
===== CSV download =====&lt;br /&gt;
&lt;br /&gt;
The connection list can also be downloaded as a CSV document by clicking at the CSV download button. The current filter and sort order is used when creating the CSV file.&lt;br /&gt;
&lt;br /&gt;
The CSV file can also be accessed without using the web interface by getting the following URL:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/API/stats/modules/ip/ips/x.x.x.x/connections?csv=true&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
x.x.x.x must be replaced with the actual IP address. Additional URL parameters can be used to choose a time span, applying filters, etc. See [[REST API description]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Open TCP server ports ====&lt;br /&gt;
&lt;br /&gt;
This tab shows the list of ports for which the IP address has accessed incoming connections.  &lt;br /&gt;
It shows which service is (usually) behind the port. &lt;br /&gt;
Additionally, the first and last connection time is shown as well. &lt;br /&gt;
Also, there is button to capture traffic for the current IP and the corresponding port.&lt;br /&gt;
&lt;br /&gt;
==== TCP statistics ====&lt;br /&gt;
&lt;br /&gt;
This web page shows statistics about the response time of TCP connection handshake of all TCP connections of the current IP address. Also, the amount of data retransmitted due to packet loss is shown on the right side of the page. When TCP data has not been seen for TCP connections, the estimated amount is shown as well (see [[TCP module#Missed data|TCP module]] for details).&lt;br /&gt;
&lt;br /&gt;
The graphs below show the historical data for each TCP handshake. The data point is the average handshake time and the vertical line shows the min and max handshake time for that specific time window (depending on the zoom level). Up to two graphs might be visible, one for data when the IP connected other IPs as a client, and another graph for data when the IP has been connected from other IPs as a server.&lt;br /&gt;
&lt;br /&gt;
The TCP application times show info about data packets being transferred between the clients and server.&lt;br /&gt;
For each TCP connection, the following key attributes are measured and reported:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Transactions:&#039;&#039;&#039; This metric indicates the count of data transaction cycles, allowing you to track the volume of activity over time.&lt;br /&gt;
* &#039;&#039;&#039;Data Transfer Time:&#039;&#039;&#039; This measures the time interval from the first data packet to the last consecutive data packet sent from the same side, giving you a clear picture of the data flow duration.&lt;br /&gt;
* &#039;&#039;&#039;First Data Response Time:&#039;&#039;&#039; This tracks the time between the last data packet sent and the first data packet received from the other peer, marking the conclusion of a transaction cycle&lt;br /&gt;
* &#039;&#039;&#039;Total Request-Response Time:&#039;&#039;&#039; This attribute captures the time interval from the first client data packet to the last server data packet during the entire request-response cycle, offering a comprehensive view of transaction latency.&lt;br /&gt;
&lt;br /&gt;
 It’s essential to understand that the values provided by the TCP application times feature are correlated through TCP packets containing data. This analysis is performed without decrypting the packets themselves, relying on observed patterns rather than the actual content of the packets. As such, the reported metrics are considered &#039;&#039;&#039;heuristics&#039;&#039;&#039;—meaning they offer insights based on empirical data rather than direct measurements of specific transactions. This approach allows for efficient monitoring while maintaining data integrity and privacy.&lt;br /&gt;
[[File:IP details application times.png|thumb|327x327px|TCP application time per IP]]&lt;br /&gt;
See [[TCP application time]] for more details about these values.&lt;br /&gt;
&lt;br /&gt;
The connection table below shows a subset of the main connection table only for TCP connections for this IP. When sorting the handshake and response time columns and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
&lt;br /&gt;
==== HTTP server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all HTTP requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* HTTP server names: All host names are shown that have been used to contact the HTTP server on this IP.&lt;br /&gt;
* Sent HTTP responses: This is the total number of requests/responses that have been seen on the network.&lt;br /&gt;
* Average response time: This is the average response time in milliseconds for all servers.&lt;br /&gt;
* Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
* Minimum response time: This is the smallest response time seen on the network.&lt;br /&gt;
* Maximum response time: This is the largest response time seen on the network.&lt;br /&gt;
&lt;br /&gt;
The graph shows the historical data for all responses.&lt;br /&gt;
Below the graph, the number of response codes for each main code family is shown together with the last URL requested.&lt;br /&gt;
&lt;br /&gt;
==== SSL server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SSL requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* SSL server names: All host names are shown that have been used to contact the SSL server on this IP.&lt;br /&gt;
* Response time for SSL handshake&lt;br /&gt;
** Number of handshake: This is the total number of SSL requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
* Response time for SSL data&lt;br /&gt;
** Number of first data responses: This is the total number of initial SSL data requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
&lt;br /&gt;
The graphs shows the historical data for all handshakes and SSL first data responses&lt;br /&gt;
&lt;br /&gt;
==== SSL/TLS infos ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all negotiated SSL/TLS versions and cipher suites used by the current IP address either as server or client.&lt;br /&gt;
&lt;br /&gt;
In case of an SSL/TLS client this tab will also show the supported SSL/TLS versions and cipher suites that have been announced by this client IP address.&lt;br /&gt;
&lt;br /&gt;
==== SIP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SIP request methods, all SIP response types as well as all SIP request/response pairs sent or received by the current IP address.&lt;br /&gt;
&lt;br /&gt;
==== RTP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all RTP connections which involve the current IP address as either client or server.&lt;br /&gt;
A list shows all connections with client and server [[Common table columns#IP|IP addresses]] and ports. The RTP payload type is shown as well as timing informations and counters, jitter, packet time delta, MOS and R values and SSRC (synchronization source) of both client and server.&lt;br /&gt;
The min and max audio levels (decibel relative to full scale, dBFS) per direction are shown if G.711 A-Law or μ-Law is used. &lt;br /&gt;
For calculation, raw A-Law or μ-Law values are converted to 16 bit PCM values. Those values are then converted to dbFS:&lt;br /&gt;
&lt;br /&gt;
  value_dBFS = 20 * log10(abs(pcm_value) / 32768)&lt;br /&gt;
  Values range from 0 dBFS (loudest) to -96 dBFS (absolute silence).&lt;br /&gt;
&lt;br /&gt;
Graphs per connection show packets and packet loss, jitter, packet time delta, MOS, R value and the max audio level of client and server over time.&lt;br /&gt;
A PCAP button allows for PCAP capturing. If a proper codec is used, audio capture buttons for both directions are available allowing downloads in MP3 format.&lt;br /&gt;
Following codecs are supported for audio extraction:&lt;br /&gt;
&lt;br /&gt;
* G.711 A-Law and μ-Law&lt;br /&gt;
* G.722&lt;br /&gt;
* G.729&lt;br /&gt;
&lt;br /&gt;
==== Ping/Traceroute ====&lt;br /&gt;
&lt;br /&gt;
A traceroute to the IP can be started or updated by clicking the Traceroute/Update button. Available traceroute data is shown in a table, containing details of each discovered network hop.&lt;br /&gt;
The following hop information may be displayed:&lt;br /&gt;
&lt;br /&gt;
* IP address&lt;br /&gt;
* host name&lt;br /&gt;
* round trip time (average, minimum, maximum)&lt;br /&gt;
* rate of received responses to sent requests&lt;br /&gt;
* dropped packets count&lt;br /&gt;
* country&lt;br /&gt;
* city&lt;br /&gt;
* link to watch the location in online map services Google Maps or OpenStreetMaps&lt;br /&gt;
&lt;br /&gt;
A button is available to easily navigate to the traceroute configuration section.&lt;br /&gt;
&lt;br /&gt;
=== IP connection details ===&lt;br /&gt;
The connection detail view shows connection information in a single page. The view can be accessed in the list of IP connection (or the global connection list) by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
The page shows all data in a tabular format as well all graphs that are available for the connection.&lt;br /&gt;
&lt;br /&gt;
A capture button at the right hand side can be used to capture packets of that connection.&lt;br /&gt;
&lt;br /&gt;
The zoom button select the time range in which the connection was active.&lt;br /&gt;
&lt;br /&gt;
For TCP connections a [[TCP flow chart]] can be calculated by clicking on the corresponding button:&lt;br /&gt;
[[File:TCP flow graph start.png|none|thumb|614x614px|Start TCP flow graph analysis]]See also [[IP connection details]].&lt;br /&gt;
&lt;br /&gt;
== Configuration settings ==&lt;br /&gt;
&lt;br /&gt;
By clicking on the gear button on the top right of the IP statistics web page, you can access the configuration section.&lt;br /&gt;
&lt;br /&gt;
* Store connection information for every IP This option is enabled by default. &lt;br /&gt;
:When enabled, the IP measurement module stores every connection for each IP. &lt;br /&gt;
:This includes historical packet counter so you can see for individual connection at which time the connection transferred which amount of data. &lt;br /&gt;
:Connection data will be stored as long as possible regarding the total memory usage.&lt;br /&gt;
:Disabling this option will increase the minimum storage time significantly.&lt;br /&gt;
&lt;br /&gt;
* Store layer 7 protocol information for every IP The network protocols and their historical traffic data is stored for each IP if this option is enabled.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Track number of new connections for every IP &lt;br /&gt;
:When This option is enabled, TCP connections per IP will be tracked. &lt;br /&gt;
:Connections are divided into valid and invalid connections for server and client direction and the amount is shown.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store traffic history graph for IP peers &lt;br /&gt;
:This option allows enabling or disabling the traffic history graph that is shown per peer in the &#039;&#039;&#039;Peers&#039;&#039;&#039; tab for an IP.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store RTP performance information per IP and connection&lt;br /&gt;
:This option allows enabling or disabling of RTP related statistics that are shown in the &#039;&#039;&#039;RTP statistics&#039;&#039;&#039; tab for an IP. &lt;br /&gt;
:Jitter, packet time delta and MOS calculation in the [[SIP_module|SIP module]] also depends on this switch since it partially shows information stored at the IP address of RTP senders/receivers.&lt;br /&gt;
:Disabling this option will reduce the memory utilization and therefor increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store QoS information for every IP&lt;br /&gt;
:This option enables or disables to storage of Quality of Service information per IP. &lt;br /&gt;
:These information require additional memory so if these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store SSL/TLS information for every connection&lt;br /&gt;
:This option enables or disables to storage of SSL/TLS information per IP. This includes used and announced&lt;br /&gt;
:encryption ciphers which can take additional memory per IP connection. If these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store detailed TCP statistics for every connection&lt;br /&gt;
:This option allows to store detailed TCP statistics per connection, such as TCP retransmissions or TCP response time. The graph type can be selected in the IP connection tab to access these information.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of IP groups&lt;br /&gt;
:This option configures how many IP groups can be defined. The minimum (and default) value is 32 IP groups.&lt;br /&gt;
:The maximum value is 65535 IP groups. A new configuration value only takes effect after restarting the packet processing in the Administration menu.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of HTTP requests per connection&lt;br /&gt;
:This options configures how many HTTP request/response tuples are stored by default. The default is 1.&lt;br /&gt;
:On global and IP detail connection page it is possible to download CSV file with either the last or all HTTP request/responses per connection. In the latter case each connection line is duplicated with another HTTP request/response in chronological order.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4841</id>
		<title>IP module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4841"/>
		<updated>2024-08-09T13:34:13Z</updated>

		<summary type="html">&lt;p&gt;Ralf: /* IP addresses tab */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The IP module operates on layer 3 of the network stack. It stores information about all IPv4 and IPv6 addresses.&lt;br /&gt;
For every address, the corresponding network traffic is accounted, the used protocols and their individual traffic.&lt;br /&gt;
The communication peers are stored as well as the traffic between both IP addresses. Every connection and its amount of traffic and the protocol can be accessed too.&lt;br /&gt;
&lt;br /&gt;
== Web interface ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[File:IP statistics.png|800px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== IP addresses tab ===&lt;br /&gt;
&lt;br /&gt;
The IP addresses tab shows the complete list of all IP addresses seen by the system. The button row allows for select specific information to be shown or hidden so that only the relevant information fit on the screen. &lt;br /&gt;
By clicking on &#039;&#039;&#039;Counters (combined)&#039;&#039;&#039; the table toggles between sent and received bytes and packets displayed in either one column or in separate columns for sorting purposes.&lt;br /&gt;
For each address, the table contains the following information:&lt;br /&gt;
&lt;br /&gt;
* IP&lt;br /&gt;
:See [[Common table columns#IP|Common table columns - IP]].&lt;br /&gt;
&lt;br /&gt;
* Alternative names&lt;br /&gt;
:See [[Common table columns#Alternative names|Common table columns - Alternative names]].&lt;br /&gt;
:The name information are also used when filtering the table for some entered string.&lt;br /&gt;
&lt;br /&gt;
* Traceroute&lt;br /&gt;
:A traceroute for the IP can be requested or updated using the available button. When traceroute information is available for the IP, brief information about each found network hop (IP, hostname, ping response time) is displayed. Since this list of hops can get very long, the view can be toggled to show all found hops or just the last one by clicking on the traceroute header.&lt;br /&gt;
&lt;br /&gt;
* First (recent) activity&lt;br /&gt;
:See [[Common table columns#First (recent) activity|Common table columns - First (recent) activity]].&lt;br /&gt;
&lt;br /&gt;
* Last activity&lt;br /&gt;
:See [[Common table columns#Last activity|Common table columns - Last activity]].&lt;br /&gt;
&lt;br /&gt;
* Packets and Bytes&lt;br /&gt;
:See [[Common table columns#Packets|Common table columns - Packets]] and [[Common table columns#Bytes|Common table columns - Bytes]].&lt;br /&gt;
&lt;br /&gt;
* Packets/s and Bit/s&lt;br /&gt;
:See [[Common table columns#Packets/s|Common table columns - Packets/s]] and [[Common table columns#Bit/s|Common table columns - Bit/s]].&lt;br /&gt;
&lt;br /&gt;
* Peers&lt;br /&gt;
: This shows the amount of peers of this IP. This counter is an all time only value and does not consider a selected interval.&lt;br /&gt;
&lt;br /&gt;
* TTL&lt;br /&gt;
: This shows the min, max and average TTL value (or hop limit in case of IPv6) of TCP/UDP traffic of an IP address. Non-UDP and non-TCP traffic as well as multicast traffic is ignored as e.g. ICMP packets likely have very high TTL values of 255 at the sender. &lt;br /&gt;
&lt;br /&gt;
* MTU&lt;br /&gt;
: The maximum transmission unit (i.e. layer 2 payload) is calculated for both receive and send direction. The maximum values are displayed.&lt;br /&gt;
&lt;br /&gt;
* TCP packets and UDP packets&lt;br /&gt;
:This is the number of TCP and UDP packets that have been seen for this IP.&lt;br /&gt;
&lt;br /&gt;
* TCP handshake time and TCP data response time&lt;br /&gt;
: The average time for a handshake as a TCP client and/or a TCP server is displayed as well as the average time the IP takes to acknowledge TCP data.&lt;br /&gt;
&lt;br /&gt;
* TCP application time&lt;br /&gt;
: The TCP application times are shown as aggregated values from each connection.&lt;br /&gt;
&lt;br /&gt;
* TCP payload and retransmissions&lt;br /&gt;
:These two columns show the number of bytes transmitted as TCP payload and how many bytes have been retransmitted, indicating a bad connection quality.&lt;br /&gt;
&lt;br /&gt;
* Graph&lt;br /&gt;
:See [[Common table columns#Graph|Common table columns - Graph]].&lt;br /&gt;
:Available data sources are load (bps or packets/s), TCP statistics or connections.&lt;br /&gt;
&lt;br /&gt;
* PCAP&lt;br /&gt;
:See [[Common table columns#PCAP|Common table columns - PCAP]]&lt;br /&gt;
&lt;br /&gt;
When multiple pages are available, there will be a control field for switching pages.&lt;br /&gt;
The IP search bar allows to enter IP addresses or names to see only those element for which the entered string is part of the IP address or name. &lt;br /&gt;
Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for a detailed description about how to use this feature.&lt;br /&gt;
The columns can be sorted also, for example to easily spot the IP addresses with the most bytes, or the highest current throughput.&lt;br /&gt;
&lt;br /&gt;
Below the table a CSV download button provides the ability to download the whole table contents in CSV format.&lt;br /&gt;
Sorting and filtering are applied as selected for the table but all IPs in the table are exported, not only the currently visible page.&lt;br /&gt;
&lt;br /&gt;
=== Global IP statistics tab ===&lt;br /&gt;
&lt;br /&gt;
The global IP statistics shows global sums about the processed IPv4 and IPv6 traffic and often used layer 4 protocols.&lt;br /&gt;
Non-IP packets such as ARP packets are indicated as other traffic and are not covered by this module.&lt;br /&gt;
The available information is:&lt;br /&gt;
* Layer 3 protocols (IPv4, IPv6 and non-IP traffic, its distribution over time and a history graph)&lt;br /&gt;
* Layer 4 protocols (TCP, UDP and traffic for other often used layer 4 protocols, its distribution over time and a history graph)&lt;br /&gt;
* Number of IPv4 fragmented packets (distribution over time and a history graph)&lt;br /&gt;
&lt;br /&gt;
For layer 3 and layer 4 protocols, traffic can be downloaded by clicking on the PCAP download button. The captured packets are not stored on the system but they are directly sent over the HTTP connection to your computer. &lt;br /&gt;
To stop capture, click on the same button again (which turned to a STOP symbol), or go to the capture traffic page in the generic section and stop the corresponding download.&lt;br /&gt;
&lt;br /&gt;
=== Top IP statistics ===&lt;br /&gt;
&lt;br /&gt;
On this page pie charts are shown with the top 10 sending and receiving IP addresses. By clicking on a pie chart section the related IP detail page is opened.&lt;br /&gt;
&lt;br /&gt;
=== Per IP statistics ===&lt;br /&gt;
&lt;br /&gt;
It is possible to select an IP from the list of IP addresses and get an more detailed view of the information stored about that IP.&lt;br /&gt;
The headline of the page includes three buttons.&lt;br /&gt;
The first left arrow button navigates back to the complete IP overview. &lt;br /&gt;
The second download button allows to download the traffic for the current IP address. &lt;br /&gt;
The third button allows for opening this manual section.&lt;br /&gt;
Below the buttons there are two graphs for the packets and bytes sent and received by the IP address.&lt;br /&gt;
The third section contains six tabs for various information about the selected IP.&lt;br /&gt;
&lt;br /&gt;
==== Overview tab ====&lt;br /&gt;
&lt;br /&gt;
This tab summarizes all the standard information from the main IP view, such as&lt;br /&gt;
* the alternative names,&lt;br /&gt;
* the packet and bytes counters, and&lt;br /&gt;
* the current throughput.&lt;br /&gt;
&lt;br /&gt;
Additionally, the top DPI protocols are printed both in the table as well as a pie chart at the bottom of the page.&lt;br /&gt;
The last line in the table shows the MAC addresses seen for this IP address. &lt;br /&gt;
There can be multiple MAC addresses for the same IP, for example if the DHCP reuse the IP address after some time. &lt;br /&gt;
The last new connection time is the start time of the last connection seen for this IP.&lt;br /&gt;
There is also a download button to capture the traffic for the specific IP and MAC address pair.&lt;br /&gt;
The final two rows shows all VLAN tags that have been seen for the given IP. An IP address might be visible in multiple VLANs.&lt;br /&gt;
If the Allegro Network Multimeter is installed at a mirror port of a switch which also modifies the VLAN tag, it might happen that an IP address is seen without a VLAN tag (none) and a specific VLAN tag. &lt;br /&gt;
This setup will decrease the quality of the results as connections use the VLAN information too to distinguish connections. &lt;br /&gt;
The measurement results can be improved if the mirror port is reconfigured to only see traffic with VLAN or completely without VLAN tags.&lt;br /&gt;
The last row shows the devices interfaces at which the IP has been seen. &lt;br /&gt;
The displayed interface always considers the sender side of an IP connection. &lt;br /&gt;
This information helps especially in bridge mode to determine at which side of an link the IP address is visible as sender of packets.&lt;br /&gt;
&lt;br /&gt;
==== Layer 3 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen IP DSCP values for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown DSCP class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific DSCP value.&lt;br /&gt;
&lt;br /&gt;
==== Layer 2 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen MPLS traffic classes and VLAN priority code points for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. &lt;br /&gt;
A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown QoS class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific QoS.&lt;br /&gt;
&lt;br /&gt;
==== Protocols tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists the DPI protocols for the current IP. The download button allows to capture the traffic for the IP and protocol pair.&lt;br /&gt;
&lt;br /&gt;
==== Peers tab ====&lt;br /&gt;
&lt;br /&gt;
The Peers tab shows all communication peers the current IP address has talked to. The table contains the [[Common table columns#IP|IP address]] which can be clicked to see the statistics for that IP.&lt;br /&gt;
The alternative names are shown, depending on which data is available (DNS name, DHCP name, NIC vendor name).&lt;br /&gt;
The packets and bytes columns show the total amount of data transferred between those two IP addresses.&lt;br /&gt;
The list of peers can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Layer 4 endpoints ====&lt;br /&gt;
&lt;br /&gt;
The layer 4 endpoint tab shows all peers of the current IP address and the used server port. If the peer is the server, the port of the peer is shown. If the peer is the client, the other port is shown.&lt;br /&gt;
&lt;br /&gt;
The table shows [[Common table columns#IP|IP addresses]] with port number, whether the peer acts as a server or client, alternative names, layer 4 protocol and byte and packet counters. If there were multiple connection between the IP address and the peer with the same port, the counters will show aggregated data.&lt;br /&gt;
&lt;br /&gt;
When clicking on &amp;quot;Peer connections&amp;quot; the connection tab is opened with the filter set to match that particular endpoint.&lt;br /&gt;
&lt;br /&gt;
==== Connections tab ====&lt;br /&gt;
&lt;br /&gt;
The connection tabs lists all connections which involves the current IP. The button rows allow to select which kind of information should be shown.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Column&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|Client IP/port&lt;br /&gt;
|Client side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Server IP/port&lt;br /&gt;
|Server side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Layer 4 protocol&lt;br /&gt;
|TCP, UDP, or others&lt;br /&gt;
|-&lt;br /&gt;
|Go to&lt;br /&gt;
|allows to go to the connection details page which shows all information in more detail.&lt;br /&gt;
|-&lt;br /&gt;
|Start time&lt;br /&gt;
|The start time is the time of the first packet for that connection.&lt;br /&gt;
|-&lt;br /&gt;
|Last activity&lt;br /&gt;
|shows the time of the last packet seen so far for the connection&lt;br /&gt;
|-&lt;br /&gt;
|Duration&lt;br /&gt;
|Difference between last activity and start time.&lt;br /&gt;
|-&lt;br /&gt;
|Packets&lt;br /&gt;
|Number of packets&lt;br /&gt;
|-&lt;br /&gt;
|Bytes&lt;br /&gt;
|Number of bytes&lt;br /&gt;
|-&lt;br /&gt;
|Packets/s&lt;br /&gt;
|Packet rate&lt;br /&gt;
|-&lt;br /&gt;
|Bit/s&lt;br /&gt;
|Bit rate&lt;br /&gt;
|-&lt;br /&gt;
|MTU&lt;br /&gt;
|The maximum transmission unit (i.e. layer 2 payload) is calculated for both directions.&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 protocol&lt;br /&gt;
|shows the detect application layer 7 protocol.&lt;br /&gt;
|-&lt;br /&gt;
|TCP handshake time&lt;br /&gt;
|The time between SYN and ACK.&lt;br /&gt;
|-&lt;br /&gt;
|TCP response time (max/avg)&lt;br /&gt;
|contains response times for TCP data&lt;br /&gt;
|-&lt;br /&gt;
|TCP application time&lt;br /&gt;
|Performance metrics for L7 applications (see [[TCP application time]] for details)&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 response time&lt;br /&gt;
|contains response times for the maximum HTTP response for HTTP connections, or the SSL response times for SSL connections. The column also contains a score for this connection and this IP, based on the average response times of the server. See HTTP module and SSL module for additional information. When sorting the column and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
|-&lt;br /&gt;
|TCP retransmissions/TCP restransmission %&lt;br /&gt;
|shows the number of bytes that have been retransmitted on TCP layer because of packet loss. High percentage indicate connection problems for this communication pair.&lt;br /&gt;
|-&lt;br /&gt;
|TCP DUP ACKs&lt;br /&gt;
|Number of DUP ACK packets&lt;br /&gt;
|-&lt;br /&gt;
|TCP missed data&lt;br /&gt;
|shows the estimated amount of TCP data not seen for this connection. See [[TCP module#Missed data|TCP module]] for details about missed data.&lt;br /&gt;
|-&lt;br /&gt;
|TCP SYNs/SYN-ACKs/FINs/RSTs&lt;br /&gt;
|shows the amount of TCP SYN, SYN-ACK, FIN and RST packets per direction. Up to 255 packets can be accounted, if more were seen, &amp;gt;= 255 will be displayed.&lt;br /&gt;
|-&lt;br /&gt;
|TCP end termination reason&lt;br /&gt;
|Connection end can be regular FIN, RST, or timeout if no termination is seen at all&lt;br /&gt;
|-&lt;br /&gt;
|TCP MSS&lt;br /&gt;
|The TCP maximum segment size may be announced by the peers using a TCP option during connection negotiation. If the option is not announced, default values will be used. The values represents the payload capacity of TCP packets sent by the peer.&lt;br /&gt;
|-&lt;br /&gt;
|Max announced TCP window size&lt;br /&gt;
|shows the size of the biggest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Min announced TCP window size&lt;br /&gt;
|shows the size of the smallest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Max TCP bytes in flight&lt;br /&gt;
|shows how much of the TCP receive window of the corresponding direction has been used at max during the lifetime of the connection, in other words this is the bytes in flight of the opposite, sending direction.&lt;br /&gt;
|-&lt;br /&gt;
|Announced TCP window size limit&lt;br /&gt;
|The TCP window size limit columns show the maximum possible value that could be used for the TCP receive window size. This is calculated from the announced TCP window scale option for each direction of a connection. The raw window scale (ws) shift count value is displayed in parentheses next to the byte value.&lt;br /&gt;
|-&lt;br /&gt;
|TCP window limit usage&lt;br /&gt;
|show the ratio of the TCP max window size values compared to the TCP window size limit values in percent.&lt;br /&gt;
|-&lt;br /&gt;
|TCP zero window packets&lt;br /&gt;
|Number of TCP zero window packets indicated full receive buffer.&lt;br /&gt;
|-&lt;br /&gt;
|Client announced TLS versions/Negotiated TLS version, Client announced cipher suites/Negotiated cipher suite&lt;br /&gt;
|shows the TLS versions and all supported cipher suites announced by the client during a SSL client hello. In the negotiated columns the currently used TLS version and cipher suite is shown as indicated by the SSL server hello. As the client announced cipher suite list can be quite long, it is possible expand or minimize the list by click on it.&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert level&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Validity&lt;br /&gt;
|Connections are counted as valid if the handshake succeeded or at least some data is transferred. &lt;br /&gt;
|-&lt;br /&gt;
|Meta data&lt;br /&gt;
|may contain additional information that could be retrieved depending on the protocol. For instance, for HTTP traffic this column shows the request URL and response code for the last transaction seen in the corresponding connection.&lt;br /&gt;
|-&lt;br /&gt;
|Outer VLANs&lt;br /&gt;
|shows which VLAN tags has been seen for a specific connection.&lt;br /&gt;
|-&lt;br /&gt;
|Inner VLANs&lt;br /&gt;
|shows which inner VLAN tags has been seen for a specific connection in QinQ setups.&lt;br /&gt;
|-&lt;br /&gt;
|PPPoE session ID&lt;br /&gt;
|shows the PPPoE session ID which has been seen for packets of that specific connection. If a PPPoE session ID changes at any time while the connection is active, a &#039;changed&#039; indication is given. In this case the latter session ID is displayed.&lt;br /&gt;
|-&lt;br /&gt;
|MPLS labels&lt;br /&gt;
|shows all seen MPLS labels for every direction of the connection. The full label stack is shown. A &#039;&#039;&#039;no label&#039;&#039;&#039; indication is given, if no MPLS labels have been used. If a MPLS label changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter MPLS labels are displayed.&lt;br /&gt;
|-&lt;br /&gt;
|QoS&lt;br /&gt;
|shows all seen QoS service classes for every direction of the connection. IP DSCP, outermost MPLS traffic classes and outermost VLAN priority code points may be detected and displayed. If a QoS class changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter QoS service classes are displayed. TCP RST packets will be ignored, as that packet may be less important and is indicated by a QoS class with lower priority than the previous packets with data.&lt;br /&gt;
|-&lt;br /&gt;
|Interfaces&lt;br /&gt;
|shows at which interface the connection has been established. This is especially helpful in bridge mode to determine at which side of link the connection has been established.&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency avg interval&lt;br /&gt;
|[[Path measurement#Measurement_statistics|Statistics from the path measurement]]&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency avg interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Graph&lt;br /&gt;
|shows the historical throughput for each connection, it is possible to select the displayed graph from multiple different statistics (see [[Common table columns#Graph|Common table columns - Graph]]). Some may only be available if module options has been enabled, as it will increase the overall memory usage. Some statistics like the path latency is only available, if the path measurement module is active (and the corresponding option to store latencies per connection is enabled)&lt;br /&gt;
|-&lt;br /&gt;
|PCAP&lt;br /&gt;
|allows for capturing the specific connection (see [[Common table columns#PCAP|Common table columns - PCAP]])&lt;br /&gt;
|}&lt;br /&gt;
The list of connections can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
[[File:IP connection details.png|thumb|600x600px|Connection detail view]]&lt;br /&gt;
A detailed connection view can be accessed by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
===== CSV download =====&lt;br /&gt;
&lt;br /&gt;
The connection list can also be downloaded as a CSV document by clicking at the CSV download button. The current filter and sort order is used when creating the CSV file.&lt;br /&gt;
&lt;br /&gt;
The CSV file can also be accessed without using the web interface by getting the following URL:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/API/stats/modules/ip/ips/x.x.x.x/connections?csv=true&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
x.x.x.x must be replaced with the actual IP address. Additional URL parameters can be used to choose a time span, applying filters, etc. See [[REST API description]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Open TCP server ports ====&lt;br /&gt;
&lt;br /&gt;
This tab shows the list of ports for which the IP address has accessed incoming connections.  &lt;br /&gt;
It shows which service is (usually) behind the port. &lt;br /&gt;
Additionally, the first and last connection time is shown as well. &lt;br /&gt;
Also, there is button to capture traffic for the current IP and the corresponding port.&lt;br /&gt;
&lt;br /&gt;
==== TCP statistics ====&lt;br /&gt;
&lt;br /&gt;
This web page shows statistics about the response time of TCP connection handshake of all TCP connections of the current IP address. Also, the amount of data retransmitted due to packet loss is shown on the right side of the page. When TCP data has not been seen for TCP connections, the estimated amount is shown as well (see [[TCP module#Missed data|TCP module]] for details).&lt;br /&gt;
&lt;br /&gt;
The graphs below show the historical data for each TCP handshake. The data point is the average handshake time and the vertical line shows the min and max handshake time for that specific time window (depending on the zoom level). Up to two graphs might be visible, one for data when the IP connected other IPs as a client, and another graph for data when the IP has been connected from other IPs as a server.&lt;br /&gt;
&lt;br /&gt;
The TCP application times show info about data packets being transferred between the clients and server.&lt;br /&gt;
For each TCP connection, the following key attributes are measured and reported:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Transactions:&#039;&#039;&#039; This metric indicates the count of data transaction cycles, allowing you to track the volume of activity over time.&lt;br /&gt;
* &#039;&#039;&#039;Data Transfer Time:&#039;&#039;&#039; This measures the time interval from the first data packet to the last consecutive data packet sent from the same side, giving you a clear picture of the data flow duration.&lt;br /&gt;
* &#039;&#039;&#039;First Data Response Time:&#039;&#039;&#039; This tracks the time between the last data packet sent and the first data packet received from the other peer, marking the conclusion of a transaction cycle&lt;br /&gt;
* &#039;&#039;&#039;Total Request-Response Time:&#039;&#039;&#039; This attribute captures the time interval from the first client data packet to the last server data packet during the entire request-response cycle, offering a comprehensive view of transaction latency.&lt;br /&gt;
&lt;br /&gt;
 It’s essential to understand that the values provided by the TCP application times feature are correlated through TCP packets containing data. This analysis is performed without decrypting the packets themselves, relying on observed patterns rather than the actual content of the packets. As such, the reported metrics are considered &#039;&#039;&#039;heuristics&#039;&#039;&#039;—meaning they offer insights based on empirical data rather than direct measurements of specific transactions. This approach allows for efficient monitoring while maintaining data integrity and privacy.&lt;br /&gt;
[[File:IP details application times.png|thumb|327x327px|TCP application time per IP]]&lt;br /&gt;
See [[TCP application time]] for more details about these values.&lt;br /&gt;
&lt;br /&gt;
The connection table below shows a subset of the main connection table only for TCP connections for this IP. When sorting the handshake and response time columns and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
&lt;br /&gt;
==== HTTP server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all HTTP requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* HTTP server names: All host names are shown that have been used to contact the HTTP server on this IP.&lt;br /&gt;
* Sent HTTP responses: This is the total number of requests/responses that have been seen on the network.&lt;br /&gt;
* Average response time: This is the average response time in milliseconds for all servers.&lt;br /&gt;
* Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
* Minimum response time: This is the smallest response time seen on the network.&lt;br /&gt;
* Maximum response time: This is the largest response time seen on the network.&lt;br /&gt;
&lt;br /&gt;
The graph shows the historical data for all responses.&lt;br /&gt;
Below the graph, the number of response codes for each main code family is shown together with the last URL requested.&lt;br /&gt;
&lt;br /&gt;
==== SSL server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SSL requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* SSL server names: All host names are shown that have been used to contact the SSL server on this IP.&lt;br /&gt;
* Response time for SSL handshake&lt;br /&gt;
** Number of handshake: This is the total number of SSL requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
* Response time for SSL data&lt;br /&gt;
** Number of first data responses: This is the total number of initial SSL data requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
&lt;br /&gt;
The graphs shows the historical data for all handshakes and SSL first data responses&lt;br /&gt;
&lt;br /&gt;
==== SSL/TLS infos ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all negotiated SSL/TLS versions and cipher suites used by the current IP address either as server or client.&lt;br /&gt;
&lt;br /&gt;
In case of an SSL/TLS client this tab will also show the supported SSL/TLS versions and cipher suites that have been announced by this client IP address.&lt;br /&gt;
&lt;br /&gt;
==== SIP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SIP request methods, all SIP response types as well as all SIP request/response pairs sent or received by the current IP address.&lt;br /&gt;
&lt;br /&gt;
==== RTP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all RTP connections which involve the current IP address as either client or server.&lt;br /&gt;
A list shows all connections with client and server [[Common table columns#IP|IP addresses]] and ports. The RTP payload type is shown as well as timing informations and counters, jitter, packet time delta, MOS and R values and SSRC (synchronization source) of both client and server.&lt;br /&gt;
The min and max audio levels (decibel relative to full scale, dBFS) per direction are shown if G.711 A-Law or μ-Law is used. &lt;br /&gt;
For calculation, raw A-Law or μ-Law values are converted to 16 bit PCM values. Those values are then converted to dbFS:&lt;br /&gt;
&lt;br /&gt;
  value_dBFS = 20 * log10(abs(pcm_value) / 32768)&lt;br /&gt;
  Values range from 0 dBFS (loudest) to -96 dBFS (absolute silence).&lt;br /&gt;
&lt;br /&gt;
Graphs per connection show packets and packet loss, jitter, packet time delta, MOS, R value and the max audio level of client and server over time.&lt;br /&gt;
A PCAP button allows for PCAP capturing. If a proper codec is used, audio capture buttons for both directions are available allowing downloads in MP3 format.&lt;br /&gt;
Following codecs are supported for audio extraction:&lt;br /&gt;
&lt;br /&gt;
* G.711 A-Law and μ-Law&lt;br /&gt;
* G.722&lt;br /&gt;
* G.729&lt;br /&gt;
&lt;br /&gt;
==== Ping/Traceroute ====&lt;br /&gt;
&lt;br /&gt;
A traceroute to the IP can be started or updated by clicking the Traceroute/Update button. Available traceroute data is shown in a table, containing details of each discovered network hop.&lt;br /&gt;
The following hop information may be displayed:&lt;br /&gt;
&lt;br /&gt;
* IP address&lt;br /&gt;
* host name&lt;br /&gt;
* round trip time (average, minimum, maximum)&lt;br /&gt;
* rate of received responses to sent requests&lt;br /&gt;
* dropped packets count&lt;br /&gt;
* country&lt;br /&gt;
* city&lt;br /&gt;
* link to watch the location in online map services Google Maps or OpenStreetMaps&lt;br /&gt;
&lt;br /&gt;
A button is available to easily navigate to the traceroute configuration section.&lt;br /&gt;
&lt;br /&gt;
=== IP connection details ===&lt;br /&gt;
The connection detail view shows connection information in a single page. The view can be accessed in the list of IP connection (or the global connection list) by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
The page shows all data in a tabular format as well all graphs that are available for the connection.&lt;br /&gt;
&lt;br /&gt;
A capture button at the right hand side can be used to capture packets of that connection.&lt;br /&gt;
&lt;br /&gt;
The zoom button select the time range in which the connection was active.&lt;br /&gt;
&lt;br /&gt;
For TCP connections a [[TCP flow chart]] can be calculated by clicking on the corresponding button:&lt;br /&gt;
[[File:TCP flow graph start.png|none|thumb|614x614px|Start TCP flow graph analysis]]See also [[IP connection details]].&lt;br /&gt;
&lt;br /&gt;
== Configuration settings ==&lt;br /&gt;
&lt;br /&gt;
By clicking on the gear button on the top right of the IP statistics web page, you can access the configuration section.&lt;br /&gt;
&lt;br /&gt;
* Store connection information for every IP This option is enabled by default. &lt;br /&gt;
:When enabled, the IP measurement module stores every connection for each IP. &lt;br /&gt;
:This includes historical packet counter so you can see for individual connection at which time the connection transferred which amount of data. &lt;br /&gt;
:Connection data will be stored as long as possible regarding the total memory usage.&lt;br /&gt;
:Disabling this option will increase the minimum storage time significantly.&lt;br /&gt;
&lt;br /&gt;
* Store layer 7 protocol information for every IP The network protocols and their historical traffic data is stored for each IP if this option is enabled.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Track number of new connections for every IP &lt;br /&gt;
:When This option is enabled, TCP connections per IP will be tracked. &lt;br /&gt;
:Connections are divided into valid and invalid connections for server and client direction and the amount is shown.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store traffic history graph for IP peers &lt;br /&gt;
:This option allows enabling or disabling the traffic history graph that is shown per peer in the &#039;&#039;&#039;Peers&#039;&#039;&#039; tab for an IP.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store RTP performance information per IP and connection&lt;br /&gt;
:This option allows enabling or disabling of RTP related statistics that are shown in the &#039;&#039;&#039;RTP statistics&#039;&#039;&#039; tab for an IP. &lt;br /&gt;
:Jitter, packet time delta and MOS calculation in the [[SIP_module|SIP module]] also depends on this switch since it partially shows information stored at the IP address of RTP senders/receivers.&lt;br /&gt;
:Disabling this option will reduce the memory utilization and therefor increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store QoS information for every IP&lt;br /&gt;
:This option enables or disables to storage of Quality of Service information per IP. &lt;br /&gt;
:These information require additional memory so if these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store SSL/TLS information for every connection&lt;br /&gt;
:This option enables or disables to storage of SSL/TLS information per IP. This includes used and announced&lt;br /&gt;
:encryption ciphers which can take additional memory per IP connection. If these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store detailed TCP statistics for every connection&lt;br /&gt;
:This option allows to store detailed TCP statistics per connection, such as TCP retransmissions or TCP response time. The graph type can be selected in the IP connection tab to access these information.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of IP groups&lt;br /&gt;
:This option configures how many IP groups can be defined. The minimum (and default) value is 32 IP groups.&lt;br /&gt;
:The maximum value is 65535 IP groups. A new configuration value only takes effect after restarting the packet processing in the Administration menu.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of HTTP requests per connection&lt;br /&gt;
:This options configures how many HTTP request/response tuples are stored by default. The default is 1.&lt;br /&gt;
:On global and IP detail connection page it is possible to download CSV file with either the last or all HTTP request/responses per connection. In the latter case each connection line is duplicated with another HTTP request/response in chronological order.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4840</id>
		<title>IP module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4840"/>
		<updated>2024-08-09T13:33:05Z</updated>

		<summary type="html">&lt;p&gt;Ralf: /* TCP statistics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The IP module operates on layer 3 of the network stack. It stores information about all IPv4 and IPv6 addresses.&lt;br /&gt;
For every address, the corresponding network traffic is accounted, the used protocols and their individual traffic.&lt;br /&gt;
The communication peers are stored as well as the traffic between both IP addresses. Every connection and its amount of traffic and the protocol can be accessed too.&lt;br /&gt;
&lt;br /&gt;
== Web interface ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[File:IP statistics.png|800px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== IP addresses tab ===&lt;br /&gt;
&lt;br /&gt;
The IP addresses tab shows the complete list of all IP addresses seen by the system. The button row allows for select specific information to be shown or hidden so that only the relevant information fit on the screen. &lt;br /&gt;
By clicking on &#039;&#039;&#039;Counters (combined)&#039;&#039;&#039; the table toggles between sent and received bytes and packets displayed in either one column or in separate columns for sorting purposes.&lt;br /&gt;
For each address, the table contains the following information:&lt;br /&gt;
&lt;br /&gt;
* IP&lt;br /&gt;
:See [[Common table columns#IP|Common table columns - IP]].&lt;br /&gt;
&lt;br /&gt;
* Alternative names&lt;br /&gt;
:See [[Common table columns#Alternative names|Common table columns - Alternative names]].&lt;br /&gt;
:The name information are also used when filtering the table for some entered string.&lt;br /&gt;
&lt;br /&gt;
* Traceroute&lt;br /&gt;
:A traceroute for the IP can be requested or updated using the available button. When traceroute information is available for the IP, brief information about each found network hop (IP, hostname, ping response time) is displayed. Since this list of hops can get very long, the view can be toggled to show all found hops or just the last one by clicking on the traceroute header.&lt;br /&gt;
&lt;br /&gt;
* First (recent) activity&lt;br /&gt;
:See [[Common table columns#First (recent) activity|Common table columns - First (recent) activity]].&lt;br /&gt;
&lt;br /&gt;
* Last activity&lt;br /&gt;
:See [[Common table columns#Last activity|Common table columns - Last activity]].&lt;br /&gt;
&lt;br /&gt;
* Packets and Bytes&lt;br /&gt;
:See [[Common table columns#Packets|Common table columns - Packets]] and [[Common table columns#Bytes|Common table columns - Bytes]].&lt;br /&gt;
&lt;br /&gt;
* Packets/s and Bit/s&lt;br /&gt;
:See [[Common table columns#Packets/s|Common table columns - Packets/s]] and [[Common table columns#Bit/s|Common table columns - Bit/s]].&lt;br /&gt;
&lt;br /&gt;
* Peers&lt;br /&gt;
: This shows the amount of peers of this IP. This counter is an all time only value and does not consider a selected interval.&lt;br /&gt;
&lt;br /&gt;
* TTL&lt;br /&gt;
: This shows the min, max and average TTL value (or hop limit in case of IPv6) of TCP/UDP traffic of an IP address. Non-UDP and non-TCP traffic as well as multicast traffic is ignored as e.g. ICMP packets likely have very high TTL values of 255 at the sender. &lt;br /&gt;
&lt;br /&gt;
* MTU&lt;br /&gt;
: The maximum transmission unit (i.e. layer 2 payload) is calculated for both receive and send direction. The maximum values are displayed.&lt;br /&gt;
&lt;br /&gt;
* TCP packets and UDP packets&lt;br /&gt;
:This is the number of TCP and UDP packets that have been seen for this IP.&lt;br /&gt;
&lt;br /&gt;
* TCP handshake time and TCP data response time&lt;br /&gt;
: The average time for a handshake as a TCP client and/or a TCP server is displayed as well as the average time the IP takes to acknowledge TCP data.&lt;br /&gt;
&lt;br /&gt;
* TCP payload and retransmissions&lt;br /&gt;
:These two columns show the number of bytes transmitted as TCP payload and how many bytes have been retransmitted, indicating a bad connection quality.&lt;br /&gt;
&lt;br /&gt;
* Graph&lt;br /&gt;
:See [[Common table columns#Graph|Common table columns - Graph]].&lt;br /&gt;
:Available data sources are load (bps or packets/s), TCP statistics or connections.&lt;br /&gt;
&lt;br /&gt;
* PCAP&lt;br /&gt;
:See [[Common table columns#PCAP|Common table columns - PCAP]]&lt;br /&gt;
&lt;br /&gt;
When multiple pages are available, there will be a control field for switching pages.&lt;br /&gt;
The IP search bar allows to enter IP addresses or names to see only those element for which the entered string is part of the IP address or name. &lt;br /&gt;
Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for a detailed description about how to use this feature.&lt;br /&gt;
The columns can be sorted also, for example to easily spot the IP addresses with the most bytes, or the highest current throughput.&lt;br /&gt;
&lt;br /&gt;
Below the table a CSV download button provides the ability to download the whole table contents in CSV format.&lt;br /&gt;
Sorting and filtering are applied as selected for the table but all IPs in the table are exported, not only the currently visible page.&lt;br /&gt;
&lt;br /&gt;
=== Global IP statistics tab ===&lt;br /&gt;
&lt;br /&gt;
The global IP statistics shows global sums about the processed IPv4 and IPv6 traffic and often used layer 4 protocols.&lt;br /&gt;
Non-IP packets such as ARP packets are indicated as other traffic and are not covered by this module.&lt;br /&gt;
The available information is:&lt;br /&gt;
* Layer 3 protocols (IPv4, IPv6 and non-IP traffic, its distribution over time and a history graph)&lt;br /&gt;
* Layer 4 protocols (TCP, UDP and traffic for other often used layer 4 protocols, its distribution over time and a history graph)&lt;br /&gt;
* Number of IPv4 fragmented packets (distribution over time and a history graph)&lt;br /&gt;
&lt;br /&gt;
For layer 3 and layer 4 protocols, traffic can be downloaded by clicking on the PCAP download button. The captured packets are not stored on the system but they are directly sent over the HTTP connection to your computer. &lt;br /&gt;
To stop capture, click on the same button again (which turned to a STOP symbol), or go to the capture traffic page in the generic section and stop the corresponding download.&lt;br /&gt;
&lt;br /&gt;
=== Top IP statistics ===&lt;br /&gt;
&lt;br /&gt;
On this page pie charts are shown with the top 10 sending and receiving IP addresses. By clicking on a pie chart section the related IP detail page is opened.&lt;br /&gt;
&lt;br /&gt;
=== Per IP statistics ===&lt;br /&gt;
&lt;br /&gt;
It is possible to select an IP from the list of IP addresses and get an more detailed view of the information stored about that IP.&lt;br /&gt;
The headline of the page includes three buttons.&lt;br /&gt;
The first left arrow button navigates back to the complete IP overview. &lt;br /&gt;
The second download button allows to download the traffic for the current IP address. &lt;br /&gt;
The third button allows for opening this manual section.&lt;br /&gt;
Below the buttons there are two graphs for the packets and bytes sent and received by the IP address.&lt;br /&gt;
The third section contains six tabs for various information about the selected IP.&lt;br /&gt;
&lt;br /&gt;
==== Overview tab ====&lt;br /&gt;
&lt;br /&gt;
This tab summarizes all the standard information from the main IP view, such as&lt;br /&gt;
* the alternative names,&lt;br /&gt;
* the packet and bytes counters, and&lt;br /&gt;
* the current throughput.&lt;br /&gt;
&lt;br /&gt;
Additionally, the top DPI protocols are printed both in the table as well as a pie chart at the bottom of the page.&lt;br /&gt;
The last line in the table shows the MAC addresses seen for this IP address. &lt;br /&gt;
There can be multiple MAC addresses for the same IP, for example if the DHCP reuse the IP address after some time. &lt;br /&gt;
The last new connection time is the start time of the last connection seen for this IP.&lt;br /&gt;
There is also a download button to capture the traffic for the specific IP and MAC address pair.&lt;br /&gt;
The final two rows shows all VLAN tags that have been seen for the given IP. An IP address might be visible in multiple VLANs.&lt;br /&gt;
If the Allegro Network Multimeter is installed at a mirror port of a switch which also modifies the VLAN tag, it might happen that an IP address is seen without a VLAN tag (none) and a specific VLAN tag. &lt;br /&gt;
This setup will decrease the quality of the results as connections use the VLAN information too to distinguish connections. &lt;br /&gt;
The measurement results can be improved if the mirror port is reconfigured to only see traffic with VLAN or completely without VLAN tags.&lt;br /&gt;
The last row shows the devices interfaces at which the IP has been seen. &lt;br /&gt;
The displayed interface always considers the sender side of an IP connection. &lt;br /&gt;
This information helps especially in bridge mode to determine at which side of an link the IP address is visible as sender of packets.&lt;br /&gt;
&lt;br /&gt;
==== Layer 3 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen IP DSCP values for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown DSCP class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific DSCP value.&lt;br /&gt;
&lt;br /&gt;
==== Layer 2 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen MPLS traffic classes and VLAN priority code points for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. &lt;br /&gt;
A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown QoS class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific QoS.&lt;br /&gt;
&lt;br /&gt;
==== Protocols tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists the DPI protocols for the current IP. The download button allows to capture the traffic for the IP and protocol pair.&lt;br /&gt;
&lt;br /&gt;
==== Peers tab ====&lt;br /&gt;
&lt;br /&gt;
The Peers tab shows all communication peers the current IP address has talked to. The table contains the [[Common table columns#IP|IP address]] which can be clicked to see the statistics for that IP.&lt;br /&gt;
The alternative names are shown, depending on which data is available (DNS name, DHCP name, NIC vendor name).&lt;br /&gt;
The packets and bytes columns show the total amount of data transferred between those two IP addresses.&lt;br /&gt;
The list of peers can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Layer 4 endpoints ====&lt;br /&gt;
&lt;br /&gt;
The layer 4 endpoint tab shows all peers of the current IP address and the used server port. If the peer is the server, the port of the peer is shown. If the peer is the client, the other port is shown.&lt;br /&gt;
&lt;br /&gt;
The table shows [[Common table columns#IP|IP addresses]] with port number, whether the peer acts as a server or client, alternative names, layer 4 protocol and byte and packet counters. If there were multiple connection between the IP address and the peer with the same port, the counters will show aggregated data.&lt;br /&gt;
&lt;br /&gt;
When clicking on &amp;quot;Peer connections&amp;quot; the connection tab is opened with the filter set to match that particular endpoint.&lt;br /&gt;
&lt;br /&gt;
==== Connections tab ====&lt;br /&gt;
&lt;br /&gt;
The connection tabs lists all connections which involves the current IP. The button rows allow to select which kind of information should be shown.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Column&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|Client IP/port&lt;br /&gt;
|Client side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Server IP/port&lt;br /&gt;
|Server side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Layer 4 protocol&lt;br /&gt;
|TCP, UDP, or others&lt;br /&gt;
|-&lt;br /&gt;
|Go to&lt;br /&gt;
|allows to go to the connection details page which shows all information in more detail.&lt;br /&gt;
|-&lt;br /&gt;
|Start time&lt;br /&gt;
|The start time is the time of the first packet for that connection.&lt;br /&gt;
|-&lt;br /&gt;
|Last activity&lt;br /&gt;
|shows the time of the last packet seen so far for the connection&lt;br /&gt;
|-&lt;br /&gt;
|Duration&lt;br /&gt;
|Difference between last activity and start time.&lt;br /&gt;
|-&lt;br /&gt;
|Packets&lt;br /&gt;
|Number of packets&lt;br /&gt;
|-&lt;br /&gt;
|Bytes&lt;br /&gt;
|Number of bytes&lt;br /&gt;
|-&lt;br /&gt;
|Packets/s&lt;br /&gt;
|Packet rate&lt;br /&gt;
|-&lt;br /&gt;
|Bit/s&lt;br /&gt;
|Bit rate&lt;br /&gt;
|-&lt;br /&gt;
|MTU&lt;br /&gt;
|The maximum transmission unit (i.e. layer 2 payload) is calculated for both directions.&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 protocol&lt;br /&gt;
|shows the detect application layer 7 protocol.&lt;br /&gt;
|-&lt;br /&gt;
|TCP handshake time&lt;br /&gt;
|The time between SYN and ACK.&lt;br /&gt;
|-&lt;br /&gt;
|TCP response time (max/avg)&lt;br /&gt;
|contains response times for TCP data&lt;br /&gt;
|-&lt;br /&gt;
|TCP application time&lt;br /&gt;
|Performance metrics for L7 applications (see [[TCP application time]] for details)&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 response time&lt;br /&gt;
|contains response times for the maximum HTTP response for HTTP connections, or the SSL response times for SSL connections. The column also contains a score for this connection and this IP, based on the average response times of the server. See HTTP module and SSL module for additional information. When sorting the column and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
|-&lt;br /&gt;
|TCP retransmissions/TCP restransmission %&lt;br /&gt;
|shows the number of bytes that have been retransmitted on TCP layer because of packet loss. High percentage indicate connection problems for this communication pair.&lt;br /&gt;
|-&lt;br /&gt;
|TCP DUP ACKs&lt;br /&gt;
|Number of DUP ACK packets&lt;br /&gt;
|-&lt;br /&gt;
|TCP missed data&lt;br /&gt;
|shows the estimated amount of TCP data not seen for this connection. See [[TCP module#Missed data|TCP module]] for details about missed data.&lt;br /&gt;
|-&lt;br /&gt;
|TCP SYNs/SYN-ACKs/FINs/RSTs&lt;br /&gt;
|shows the amount of TCP SYN, SYN-ACK, FIN and RST packets per direction. Up to 255 packets can be accounted, if more were seen, &amp;gt;= 255 will be displayed.&lt;br /&gt;
|-&lt;br /&gt;
|TCP end termination reason&lt;br /&gt;
|Connection end can be regular FIN, RST, or timeout if no termination is seen at all&lt;br /&gt;
|-&lt;br /&gt;
|TCP MSS&lt;br /&gt;
|The TCP maximum segment size may be announced by the peers using a TCP option during connection negotiation. If the option is not announced, default values will be used. The values represents the payload capacity of TCP packets sent by the peer.&lt;br /&gt;
|-&lt;br /&gt;
|Max announced TCP window size&lt;br /&gt;
|shows the size of the biggest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Min announced TCP window size&lt;br /&gt;
|shows the size of the smallest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Max TCP bytes in flight&lt;br /&gt;
|shows how much of the TCP receive window of the corresponding direction has been used at max during the lifetime of the connection, in other words this is the bytes in flight of the opposite, sending direction.&lt;br /&gt;
|-&lt;br /&gt;
|Announced TCP window size limit&lt;br /&gt;
|The TCP window size limit columns show the maximum possible value that could be used for the TCP receive window size. This is calculated from the announced TCP window scale option for each direction of a connection. The raw window scale (ws) shift count value is displayed in parentheses next to the byte value.&lt;br /&gt;
|-&lt;br /&gt;
|TCP window limit usage&lt;br /&gt;
|show the ratio of the TCP max window size values compared to the TCP window size limit values in percent.&lt;br /&gt;
|-&lt;br /&gt;
|TCP zero window packets&lt;br /&gt;
|Number of TCP zero window packets indicated full receive buffer.&lt;br /&gt;
|-&lt;br /&gt;
|Client announced TLS versions/Negotiated TLS version, Client announced cipher suites/Negotiated cipher suite&lt;br /&gt;
|shows the TLS versions and all supported cipher suites announced by the client during a SSL client hello. In the negotiated columns the currently used TLS version and cipher suite is shown as indicated by the SSL server hello. As the client announced cipher suite list can be quite long, it is possible expand or minimize the list by click on it.&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert level&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Validity&lt;br /&gt;
|Connections are counted as valid if the handshake succeeded or at least some data is transferred. &lt;br /&gt;
|-&lt;br /&gt;
|Meta data&lt;br /&gt;
|may contain additional information that could be retrieved depending on the protocol. For instance, for HTTP traffic this column shows the request URL and response code for the last transaction seen in the corresponding connection.&lt;br /&gt;
|-&lt;br /&gt;
|Outer VLANs&lt;br /&gt;
|shows which VLAN tags has been seen for a specific connection.&lt;br /&gt;
|-&lt;br /&gt;
|Inner VLANs&lt;br /&gt;
|shows which inner VLAN tags has been seen for a specific connection in QinQ setups.&lt;br /&gt;
|-&lt;br /&gt;
|PPPoE session ID&lt;br /&gt;
|shows the PPPoE session ID which has been seen for packets of that specific connection. If a PPPoE session ID changes at any time while the connection is active, a &#039;changed&#039; indication is given. In this case the latter session ID is displayed.&lt;br /&gt;
|-&lt;br /&gt;
|MPLS labels&lt;br /&gt;
|shows all seen MPLS labels for every direction of the connection. The full label stack is shown. A &#039;&#039;&#039;no label&#039;&#039;&#039; indication is given, if no MPLS labels have been used. If a MPLS label changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter MPLS labels are displayed.&lt;br /&gt;
|-&lt;br /&gt;
|QoS&lt;br /&gt;
|shows all seen QoS service classes for every direction of the connection. IP DSCP, outermost MPLS traffic classes and outermost VLAN priority code points may be detected and displayed. If a QoS class changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter QoS service classes are displayed. TCP RST packets will be ignored, as that packet may be less important and is indicated by a QoS class with lower priority than the previous packets with data.&lt;br /&gt;
|-&lt;br /&gt;
|Interfaces&lt;br /&gt;
|shows at which interface the connection has been established. This is especially helpful in bridge mode to determine at which side of link the connection has been established.&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency avg interval&lt;br /&gt;
|[[Path measurement#Measurement_statistics|Statistics from the path measurement]]&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency avg interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Graph&lt;br /&gt;
|shows the historical throughput for each connection, it is possible to select the displayed graph from multiple different statistics (see [[Common table columns#Graph|Common table columns - Graph]]). Some may only be available if module options has been enabled, as it will increase the overall memory usage. Some statistics like the path latency is only available, if the path measurement module is active (and the corresponding option to store latencies per connection is enabled)&lt;br /&gt;
|-&lt;br /&gt;
|PCAP&lt;br /&gt;
|allows for capturing the specific connection (see [[Common table columns#PCAP|Common table columns - PCAP]])&lt;br /&gt;
|}&lt;br /&gt;
The list of connections can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
[[File:IP connection details.png|thumb|600x600px|Connection detail view]]&lt;br /&gt;
A detailed connection view can be accessed by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
===== CSV download =====&lt;br /&gt;
&lt;br /&gt;
The connection list can also be downloaded as a CSV document by clicking at the CSV download button. The current filter and sort order is used when creating the CSV file.&lt;br /&gt;
&lt;br /&gt;
The CSV file can also be accessed without using the web interface by getting the following URL:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/API/stats/modules/ip/ips/x.x.x.x/connections?csv=true&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
x.x.x.x must be replaced with the actual IP address. Additional URL parameters can be used to choose a time span, applying filters, etc. See [[REST API description]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Open TCP server ports ====&lt;br /&gt;
&lt;br /&gt;
This tab shows the list of ports for which the IP address has accessed incoming connections.  &lt;br /&gt;
It shows which service is (usually) behind the port. &lt;br /&gt;
Additionally, the first and last connection time is shown as well. &lt;br /&gt;
Also, there is button to capture traffic for the current IP and the corresponding port.&lt;br /&gt;
&lt;br /&gt;
==== TCP statistics ====&lt;br /&gt;
&lt;br /&gt;
This web page shows statistics about the response time of TCP connection handshake of all TCP connections of the current IP address. Also, the amount of data retransmitted due to packet loss is shown on the right side of the page. When TCP data has not been seen for TCP connections, the estimated amount is shown as well (see [[TCP module#Missed data|TCP module]] for details).&lt;br /&gt;
&lt;br /&gt;
The graphs below show the historical data for each TCP handshake. The data point is the average handshake time and the vertical line shows the min and max handshake time for that specific time window (depending on the zoom level). Up to two graphs might be visible, one for data when the IP connected other IPs as a client, and another graph for data when the IP has been connected from other IPs as a server.&lt;br /&gt;
&lt;br /&gt;
The TCP application times show info about data packets being transferred between the clients and server.&lt;br /&gt;
For each TCP connection, the following key attributes are measured and reported:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Transactions:&#039;&#039;&#039; This metric indicates the count of data transaction cycles, allowing you to track the volume of activity over time.&lt;br /&gt;
* &#039;&#039;&#039;Data Transfer Time:&#039;&#039;&#039; This measures the time interval from the first data packet to the last consecutive data packet sent from the same side, giving you a clear picture of the data flow duration.&lt;br /&gt;
* &#039;&#039;&#039;First Data Response Time:&#039;&#039;&#039; This tracks the time between the last data packet sent and the first data packet received from the other peer, marking the conclusion of a transaction cycle&lt;br /&gt;
* &#039;&#039;&#039;Total Request-Response Time:&#039;&#039;&#039; This attribute captures the time interval from the first client data packet to the last server data packet during the entire request-response cycle, offering a comprehensive view of transaction latency.&lt;br /&gt;
&lt;br /&gt;
 It’s essential to understand that the values provided by the TCP application times feature are correlated through TCP packets containing data. This analysis is performed without decrypting the packets themselves, relying on observed patterns rather than the actual content of the packets. As such, the reported metrics are considered &#039;&#039;&#039;heuristics&#039;&#039;&#039;—meaning they offer insights based on empirical data rather than direct measurements of specific transactions. This approach allows for efficient monitoring while maintaining data integrity and privacy.&lt;br /&gt;
[[File:IP details application times.png|thumb|327x327px|TCP application time per IP]]&lt;br /&gt;
See [[TCP application time]] for more details about these values.&lt;br /&gt;
&lt;br /&gt;
The connection table below shows a subset of the main connection table only for TCP connections for this IP. When sorting the handshake and response time columns and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
&lt;br /&gt;
==== HTTP server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all HTTP requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* HTTP server names: All host names are shown that have been used to contact the HTTP server on this IP.&lt;br /&gt;
* Sent HTTP responses: This is the total number of requests/responses that have been seen on the network.&lt;br /&gt;
* Average response time: This is the average response time in milliseconds for all servers.&lt;br /&gt;
* Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
* Minimum response time: This is the smallest response time seen on the network.&lt;br /&gt;
* Maximum response time: This is the largest response time seen on the network.&lt;br /&gt;
&lt;br /&gt;
The graph shows the historical data for all responses.&lt;br /&gt;
Below the graph, the number of response codes for each main code family is shown together with the last URL requested.&lt;br /&gt;
&lt;br /&gt;
==== SSL server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SSL requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* SSL server names: All host names are shown that have been used to contact the SSL server on this IP.&lt;br /&gt;
* Response time for SSL handshake&lt;br /&gt;
** Number of handshake: This is the total number of SSL requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
* Response time for SSL data&lt;br /&gt;
** Number of first data responses: This is the total number of initial SSL data requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
&lt;br /&gt;
The graphs shows the historical data for all handshakes and SSL first data responses&lt;br /&gt;
&lt;br /&gt;
==== SSL/TLS infos ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all negotiated SSL/TLS versions and cipher suites used by the current IP address either as server or client.&lt;br /&gt;
&lt;br /&gt;
In case of an SSL/TLS client this tab will also show the supported SSL/TLS versions and cipher suites that have been announced by this client IP address.&lt;br /&gt;
&lt;br /&gt;
==== SIP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SIP request methods, all SIP response types as well as all SIP request/response pairs sent or received by the current IP address.&lt;br /&gt;
&lt;br /&gt;
==== RTP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all RTP connections which involve the current IP address as either client or server.&lt;br /&gt;
A list shows all connections with client and server [[Common table columns#IP|IP addresses]] and ports. The RTP payload type is shown as well as timing informations and counters, jitter, packet time delta, MOS and R values and SSRC (synchronization source) of both client and server.&lt;br /&gt;
The min and max audio levels (decibel relative to full scale, dBFS) per direction are shown if G.711 A-Law or μ-Law is used. &lt;br /&gt;
For calculation, raw A-Law or μ-Law values are converted to 16 bit PCM values. Those values are then converted to dbFS:&lt;br /&gt;
&lt;br /&gt;
  value_dBFS = 20 * log10(abs(pcm_value) / 32768)&lt;br /&gt;
  Values range from 0 dBFS (loudest) to -96 dBFS (absolute silence).&lt;br /&gt;
&lt;br /&gt;
Graphs per connection show packets and packet loss, jitter, packet time delta, MOS, R value and the max audio level of client and server over time.&lt;br /&gt;
A PCAP button allows for PCAP capturing. If a proper codec is used, audio capture buttons for both directions are available allowing downloads in MP3 format.&lt;br /&gt;
Following codecs are supported for audio extraction:&lt;br /&gt;
&lt;br /&gt;
* G.711 A-Law and μ-Law&lt;br /&gt;
* G.722&lt;br /&gt;
* G.729&lt;br /&gt;
&lt;br /&gt;
==== Ping/Traceroute ====&lt;br /&gt;
&lt;br /&gt;
A traceroute to the IP can be started or updated by clicking the Traceroute/Update button. Available traceroute data is shown in a table, containing details of each discovered network hop.&lt;br /&gt;
The following hop information may be displayed:&lt;br /&gt;
&lt;br /&gt;
* IP address&lt;br /&gt;
* host name&lt;br /&gt;
* round trip time (average, minimum, maximum)&lt;br /&gt;
* rate of received responses to sent requests&lt;br /&gt;
* dropped packets count&lt;br /&gt;
* country&lt;br /&gt;
* city&lt;br /&gt;
* link to watch the location in online map services Google Maps or OpenStreetMaps&lt;br /&gt;
&lt;br /&gt;
A button is available to easily navigate to the traceroute configuration section.&lt;br /&gt;
&lt;br /&gt;
=== IP connection details ===&lt;br /&gt;
The connection detail view shows connection information in a single page. The view can be accessed in the list of IP connection (or the global connection list) by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
The page shows all data in a tabular format as well all graphs that are available for the connection.&lt;br /&gt;
&lt;br /&gt;
A capture button at the right hand side can be used to capture packets of that connection.&lt;br /&gt;
&lt;br /&gt;
The zoom button select the time range in which the connection was active.&lt;br /&gt;
&lt;br /&gt;
For TCP connections a [[TCP flow chart]] can be calculated by clicking on the corresponding button:&lt;br /&gt;
[[File:TCP flow graph start.png|none|thumb|614x614px|Start TCP flow graph analysis]]See also [[IP connection details]].&lt;br /&gt;
&lt;br /&gt;
== Configuration settings ==&lt;br /&gt;
&lt;br /&gt;
By clicking on the gear button on the top right of the IP statistics web page, you can access the configuration section.&lt;br /&gt;
&lt;br /&gt;
* Store connection information for every IP This option is enabled by default. &lt;br /&gt;
:When enabled, the IP measurement module stores every connection for each IP. &lt;br /&gt;
:This includes historical packet counter so you can see for individual connection at which time the connection transferred which amount of data. &lt;br /&gt;
:Connection data will be stored as long as possible regarding the total memory usage.&lt;br /&gt;
:Disabling this option will increase the minimum storage time significantly.&lt;br /&gt;
&lt;br /&gt;
* Store layer 7 protocol information for every IP The network protocols and their historical traffic data is stored for each IP if this option is enabled.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Track number of new connections for every IP &lt;br /&gt;
:When This option is enabled, TCP connections per IP will be tracked. &lt;br /&gt;
:Connections are divided into valid and invalid connections for server and client direction and the amount is shown.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store traffic history graph for IP peers &lt;br /&gt;
:This option allows enabling or disabling the traffic history graph that is shown per peer in the &#039;&#039;&#039;Peers&#039;&#039;&#039; tab for an IP.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store RTP performance information per IP and connection&lt;br /&gt;
:This option allows enabling or disabling of RTP related statistics that are shown in the &#039;&#039;&#039;RTP statistics&#039;&#039;&#039; tab for an IP. &lt;br /&gt;
:Jitter, packet time delta and MOS calculation in the [[SIP_module|SIP module]] also depends on this switch since it partially shows information stored at the IP address of RTP senders/receivers.&lt;br /&gt;
:Disabling this option will reduce the memory utilization and therefor increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store QoS information for every IP&lt;br /&gt;
:This option enables or disables to storage of Quality of Service information per IP. &lt;br /&gt;
:These information require additional memory so if these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store SSL/TLS information for every connection&lt;br /&gt;
:This option enables or disables to storage of SSL/TLS information per IP. This includes used and announced&lt;br /&gt;
:encryption ciphers which can take additional memory per IP connection. If these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store detailed TCP statistics for every connection&lt;br /&gt;
:This option allows to store detailed TCP statistics per connection, such as TCP retransmissions or TCP response time. The graph type can be selected in the IP connection tab to access these information.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of IP groups&lt;br /&gt;
:This option configures how many IP groups can be defined. The minimum (and default) value is 32 IP groups.&lt;br /&gt;
:The maximum value is 65535 IP groups. A new configuration value only takes effect after restarting the packet processing in the Administration menu.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of HTTP requests per connection&lt;br /&gt;
:This options configures how many HTTP request/response tuples are stored by default. The default is 1.&lt;br /&gt;
:On global and IP detail connection page it is possible to download CSV file with either the last or all HTTP request/responses per connection. In the latter case each connection line is duplicated with another HTTP request/response in chronological order.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=TCP_module&amp;diff=4839</id>
		<title>TCP module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=TCP_module&amp;diff=4839"/>
		<updated>2024-08-09T13:31:08Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The TCP module measures the time taken to receive the first response to a TCP connection setup packet. This time is influenced by the network round-trip time and the load of the server to be able to response to a connection request.&lt;br /&gt;
A score value is calculated based on a scoring algorithm. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Web interface&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|- &lt;br /&gt;
|[[File:TCP module.png|1000px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== TCP handshake ==&lt;br /&gt;
&lt;br /&gt;
This web page of the TCP module shows global statistics about the response time of TCP connection handshake of all TCP connections and a list of all servers for which response times could be calculated.&lt;br /&gt;
&lt;br /&gt;
The global statistics contains:&lt;br /&gt;
&lt;br /&gt;
* Number of TCP handshakes: This is the total number of TCP connections for which the handshake has been seen. It may be less than the number of all connections if connections have been established before the system has been started.&lt;br /&gt;
* Average handshake time: This is the average time between first TCP SYN packet and its response in milliseconds for all servers.&lt;br /&gt;
* Standard deviation: This value shows the variation of the handshake times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
* Minimum handshake time: This is the smallest handshake time seen on the network.&lt;br /&gt;
* Maximum handshake time: This is the largest handshake time seen on the network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Next to the global statistics, there is a summary about the number of servers with good, bad, or medium handshake quality. The table is split to local servers (those within private networks) and global servers (all the rest).&lt;br /&gt;
The green plus symbol contains all servers with a quality score of 4 or more, the orange symbol covers all servers with a quality score between 3 and 4, and the red minus symbol covers all servers with a quality score of less than 3. The&lt;br /&gt;
list of servers below can be sorted for the quality value to view the relevant servers from each category.&lt;br /&gt;
Below the global statistics, there are up to two graphs showing the historical data for TCP handshakes. &lt;br /&gt;
Each data point shows the average handshake time for the time span (depending on the zoom factor), and the min and max time. One graph is for handshake times for the server (that is the time between the first SYN packet and the server&lt;br /&gt;
response) and the second graph shows the data for the client time (that is the time between the server response packet and the client acknowledgment).&lt;br /&gt;
Below the graph there is the list of all servers with the following columns:&lt;br /&gt;
&lt;br /&gt;
* IP (see [[Common table columns#IP|Common table columns - IP]]): The server IP. Clicking on &#039;&#039;TCP statistics&#039;&#039; leads to the IP module subpage listing all TCP connections.&lt;br /&gt;
* No of handshake: The number of TCP requests/responses seen for this IP address.&lt;br /&gt;
* Avg handshake time: This is the average handshake time for this IP address.&lt;br /&gt;
* Deviation: This is the standard deviation for all handshake times of this IP address.&lt;br /&gt;
* Min handshake time: The minimum handshake time in milliseconds.&lt;br /&gt;
* Max handshake time: The maximum handshake time in milliseconds.&lt;br /&gt;
* Score: The score is a value between 1 and 5 describing the quality of the TCP handshake times. 1 means the worst quality, 5 means the best quality. The value is calculated based on a [[Scoring of response times|scoring algorithm]]. The score allows to quickly sort for quality and identify bad performing servers or servers with high round-trip time.&lt;br /&gt;
* Alternative names: The column contains other names for this IP address, from whatever name source that is available (DNS, DHCP, ...).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Per IP statistics ===&lt;br /&gt;
&lt;br /&gt;
It is possible to select an IP from the list of IP addresses and get an more detailed view of the information stored about that IP.&lt;br /&gt;
The link leads to the TCP statistics page of that specific IP. Additional information can be found in the IP module.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== TCP response time ==&lt;br /&gt;
&lt;br /&gt;
This tab shows the continuous measurement of TCP response times. The time measured is the interval between a transfer of data and the respective acknowledgement.&lt;br /&gt;
&lt;br /&gt;
The graph on the top shows a minimum, maximum and average response time over all TCP connections observed.&lt;br /&gt;
&lt;br /&gt;
The IP list below shows the minimum, maximum and average response time for each IP address.&lt;br /&gt;
&lt;br /&gt;
== TCP application time ==&lt;br /&gt;
The application time measures the time of TCP transactions, that is consecutive data packets sent by the client, followed by a server response of consecutive data packets.&lt;br /&gt;
[[File:TCP module application times.png|none|thumb|550x550px|TCP application time]]&lt;br /&gt;
See [[TCP application time]] for more details about the measured values.&lt;br /&gt;
== TCP retransmissions ==&lt;br /&gt;
&lt;br /&gt;
This tab shows all IP addresses with TCP traffic and the aggregated amount of TCP payload sent and received and the amount of data that needed to be retransmitted due to packet loss.&lt;br /&gt;
&lt;br /&gt;
=== Garbage bytes ===&lt;br /&gt;
Garbage bytes are single bytes sent as part of TCP keep alive packets that have already been acknowledged before by the receiver the data. Some TCP implementations send single bytes as keep alive packets instead of just empty ACK packets. The retransmitted byte has already been acknowledge and may be the same or different as the original byte of the same sequence number. The TCP stack of the receiver will discard this byte. Technically it is a retransmitted byte, but since it is already acknowledged and will be discarded, we account this byte as a garbage byte to not show as part of regular retransmissions.&lt;br /&gt;
&lt;br /&gt;
=== Missed data ===&lt;br /&gt;
&lt;br /&gt;
Additionally to retransmission data, there is also a graph for the number of bytes not seen by the Allegro Network Multimeter. This can happen if for example a mirror/SPAN port is incapable of sending all packets to the Allegro.&amp;lt;br&amp;gt;&lt;br /&gt;
So the data was actually sent over the network, but only part of it was sent to the Allegro Network Multimeter for analysis.&lt;br /&gt;
In WireShark, such &amp;quot;missed data&amp;quot; events will be displayed with the &#039;&#039;additional protocol information&#039;&#039; [TCP ACKed unseen segment].&lt;br /&gt;
&lt;br /&gt;
Example: &lt;br /&gt;
&lt;br /&gt;
If there is a transfer of 500 Mbit/s going in the network but the mirror port only outputs 100 Mbit/s, the Allegro Network Multimeter of course can only account those 100 Mbit/s. But based on the TCP sequence numbers, we can estimate that the remaining 400 Mbit/s has been missed. This portion is visible in the missed data graph.&lt;br /&gt;
&lt;br /&gt;
Usually one can expect to see no missed data at all, especially in inline mode, but it can still happen that there is a small amount of bytes not seen due to multiple reason. One reason is corrupt data where TCP sequence numbers are wrong on purpose. There can also be situations where TCP packets are not seen but actually sent, for example, if they are dropped in some other network component.&lt;br /&gt;
&lt;br /&gt;
== TCP server with invalid connections ==&lt;br /&gt;
&lt;br /&gt;
Here a list of all servers with invalid connections is shown. Connections are counted as invalid if the handshake fails or no data is transferred at all. &lt;br /&gt;
&lt;br /&gt;
Each line shows the number of invalid connections and the number of valid connections for a certain TCP server.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;invalid connection factor&amp;quot; is the ratio of invalid connections vs valid connection (invalid/(valid+1)). A higher value means more invalid connections and therefore indicates problematic IPs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== TCP flags ==&lt;br /&gt;
&lt;br /&gt;
This tab shows the occurence of certain TCP flags. Packets with the following flags are counted:&lt;br /&gt;
&lt;br /&gt;
* TCP SYNs: TCP packets where the SYN flag is set but not the ACK flag&lt;br /&gt;
* TCP SYN-ACKs: TCP packets where the SYN flag and the ACK flag is set&lt;br /&gt;
* TCP FINs: TCP packets where the FIN flag is set&lt;br /&gt;
* TCP RSTs: TCP packets where the RST flag is set&lt;br /&gt;
&lt;br /&gt;
A graph shows the number of packets for each tracked flag type over time. The IP list below the graph shows the number of sent and received TCP packets for each tracked flag type per IP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== TCP zero window ==&lt;br /&gt;
&lt;br /&gt;
This tab shows the occurence of TCP packets that signal a window size of zero. This usually means that the TCP receive buffer of the system sending the zero window packet is filled up and the system cannot receive any more data for that connection.&lt;br /&gt;
A graph shows the global number or TCP zero window packets over time. The [[Common table columns#IP|IP list]] below the graph shows the number of sent and received TCP zero window packets for each IP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Configuration settings ==&lt;br /&gt;
&lt;br /&gt;
The TCP connection information rely on the IP module to store connections for each IP address. This feature takes significant amount of memory and can be disabled in the IP module configuration. &lt;br /&gt;
The button at the bottom of the page leads to the corresponding configuration section.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4838</id>
		<title>IP module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4838"/>
		<updated>2024-08-09T13:28:35Z</updated>

		<summary type="html">&lt;p&gt;Ralf: /* Connections tab */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The IP module operates on layer 3 of the network stack. It stores information about all IPv4 and IPv6 addresses.&lt;br /&gt;
For every address, the corresponding network traffic is accounted, the used protocols and their individual traffic.&lt;br /&gt;
The communication peers are stored as well as the traffic between both IP addresses. Every connection and its amount of traffic and the protocol can be accessed too.&lt;br /&gt;
&lt;br /&gt;
== Web interface ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[File:IP statistics.png|800px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== IP addresses tab ===&lt;br /&gt;
&lt;br /&gt;
The IP addresses tab shows the complete list of all IP addresses seen by the system. The button row allows for select specific information to be shown or hidden so that only the relevant information fit on the screen. &lt;br /&gt;
By clicking on &#039;&#039;&#039;Counters (combined)&#039;&#039;&#039; the table toggles between sent and received bytes and packets displayed in either one column or in separate columns for sorting purposes.&lt;br /&gt;
For each address, the table contains the following information:&lt;br /&gt;
&lt;br /&gt;
* IP&lt;br /&gt;
:See [[Common table columns#IP|Common table columns - IP]].&lt;br /&gt;
&lt;br /&gt;
* Alternative names&lt;br /&gt;
:See [[Common table columns#Alternative names|Common table columns - Alternative names]].&lt;br /&gt;
:The name information are also used when filtering the table for some entered string.&lt;br /&gt;
&lt;br /&gt;
* Traceroute&lt;br /&gt;
:A traceroute for the IP can be requested or updated using the available button. When traceroute information is available for the IP, brief information about each found network hop (IP, hostname, ping response time) is displayed. Since this list of hops can get very long, the view can be toggled to show all found hops or just the last one by clicking on the traceroute header.&lt;br /&gt;
&lt;br /&gt;
* First (recent) activity&lt;br /&gt;
:See [[Common table columns#First (recent) activity|Common table columns - First (recent) activity]].&lt;br /&gt;
&lt;br /&gt;
* Last activity&lt;br /&gt;
:See [[Common table columns#Last activity|Common table columns - Last activity]].&lt;br /&gt;
&lt;br /&gt;
* Packets and Bytes&lt;br /&gt;
:See [[Common table columns#Packets|Common table columns - Packets]] and [[Common table columns#Bytes|Common table columns - Bytes]].&lt;br /&gt;
&lt;br /&gt;
* Packets/s and Bit/s&lt;br /&gt;
:See [[Common table columns#Packets/s|Common table columns - Packets/s]] and [[Common table columns#Bit/s|Common table columns - Bit/s]].&lt;br /&gt;
&lt;br /&gt;
* Peers&lt;br /&gt;
: This shows the amount of peers of this IP. This counter is an all time only value and does not consider a selected interval.&lt;br /&gt;
&lt;br /&gt;
* TTL&lt;br /&gt;
: This shows the min, max and average TTL value (or hop limit in case of IPv6) of TCP/UDP traffic of an IP address. Non-UDP and non-TCP traffic as well as multicast traffic is ignored as e.g. ICMP packets likely have very high TTL values of 255 at the sender. &lt;br /&gt;
&lt;br /&gt;
* MTU&lt;br /&gt;
: The maximum transmission unit (i.e. layer 2 payload) is calculated for both receive and send direction. The maximum values are displayed.&lt;br /&gt;
&lt;br /&gt;
* TCP packets and UDP packets&lt;br /&gt;
:This is the number of TCP and UDP packets that have been seen for this IP.&lt;br /&gt;
&lt;br /&gt;
* TCP handshake time and TCP data response time&lt;br /&gt;
: The average time for a handshake as a TCP client and/or a TCP server is displayed as well as the average time the IP takes to acknowledge TCP data.&lt;br /&gt;
&lt;br /&gt;
* TCP payload and retransmissions&lt;br /&gt;
:These two columns show the number of bytes transmitted as TCP payload and how many bytes have been retransmitted, indicating a bad connection quality.&lt;br /&gt;
&lt;br /&gt;
* Graph&lt;br /&gt;
:See [[Common table columns#Graph|Common table columns - Graph]].&lt;br /&gt;
:Available data sources are load (bps or packets/s), TCP statistics or connections.&lt;br /&gt;
&lt;br /&gt;
* PCAP&lt;br /&gt;
:See [[Common table columns#PCAP|Common table columns - PCAP]]&lt;br /&gt;
&lt;br /&gt;
When multiple pages are available, there will be a control field for switching pages.&lt;br /&gt;
The IP search bar allows to enter IP addresses or names to see only those element for which the entered string is part of the IP address or name. &lt;br /&gt;
Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for a detailed description about how to use this feature.&lt;br /&gt;
The columns can be sorted also, for example to easily spot the IP addresses with the most bytes, or the highest current throughput.&lt;br /&gt;
&lt;br /&gt;
Below the table a CSV download button provides the ability to download the whole table contents in CSV format.&lt;br /&gt;
Sorting and filtering are applied as selected for the table but all IPs in the table are exported, not only the currently visible page.&lt;br /&gt;
&lt;br /&gt;
=== Global IP statistics tab ===&lt;br /&gt;
&lt;br /&gt;
The global IP statistics shows global sums about the processed IPv4 and IPv6 traffic and often used layer 4 protocols.&lt;br /&gt;
Non-IP packets such as ARP packets are indicated as other traffic and are not covered by this module.&lt;br /&gt;
The available information is:&lt;br /&gt;
* Layer 3 protocols (IPv4, IPv6 and non-IP traffic, its distribution over time and a history graph)&lt;br /&gt;
* Layer 4 protocols (TCP, UDP and traffic for other often used layer 4 protocols, its distribution over time and a history graph)&lt;br /&gt;
* Number of IPv4 fragmented packets (distribution over time and a history graph)&lt;br /&gt;
&lt;br /&gt;
For layer 3 and layer 4 protocols, traffic can be downloaded by clicking on the PCAP download button. The captured packets are not stored on the system but they are directly sent over the HTTP connection to your computer. &lt;br /&gt;
To stop capture, click on the same button again (which turned to a STOP symbol), or go to the capture traffic page in the generic section and stop the corresponding download.&lt;br /&gt;
&lt;br /&gt;
=== Top IP statistics ===&lt;br /&gt;
&lt;br /&gt;
On this page pie charts are shown with the top 10 sending and receiving IP addresses. By clicking on a pie chart section the related IP detail page is opened.&lt;br /&gt;
&lt;br /&gt;
=== Per IP statistics ===&lt;br /&gt;
&lt;br /&gt;
It is possible to select an IP from the list of IP addresses and get an more detailed view of the information stored about that IP.&lt;br /&gt;
The headline of the page includes three buttons.&lt;br /&gt;
The first left arrow button navigates back to the complete IP overview. &lt;br /&gt;
The second download button allows to download the traffic for the current IP address. &lt;br /&gt;
The third button allows for opening this manual section.&lt;br /&gt;
Below the buttons there are two graphs for the packets and bytes sent and received by the IP address.&lt;br /&gt;
The third section contains six tabs for various information about the selected IP.&lt;br /&gt;
&lt;br /&gt;
==== Overview tab ====&lt;br /&gt;
&lt;br /&gt;
This tab summarizes all the standard information from the main IP view, such as&lt;br /&gt;
* the alternative names,&lt;br /&gt;
* the packet and bytes counters, and&lt;br /&gt;
* the current throughput.&lt;br /&gt;
&lt;br /&gt;
Additionally, the top DPI protocols are printed both in the table as well as a pie chart at the bottom of the page.&lt;br /&gt;
The last line in the table shows the MAC addresses seen for this IP address. &lt;br /&gt;
There can be multiple MAC addresses for the same IP, for example if the DHCP reuse the IP address after some time. &lt;br /&gt;
The last new connection time is the start time of the last connection seen for this IP.&lt;br /&gt;
There is also a download button to capture the traffic for the specific IP and MAC address pair.&lt;br /&gt;
The final two rows shows all VLAN tags that have been seen for the given IP. An IP address might be visible in multiple VLANs.&lt;br /&gt;
If the Allegro Network Multimeter is installed at a mirror port of a switch which also modifies the VLAN tag, it might happen that an IP address is seen without a VLAN tag (none) and a specific VLAN tag. &lt;br /&gt;
This setup will decrease the quality of the results as connections use the VLAN information too to distinguish connections. &lt;br /&gt;
The measurement results can be improved if the mirror port is reconfigured to only see traffic with VLAN or completely without VLAN tags.&lt;br /&gt;
The last row shows the devices interfaces at which the IP has been seen. &lt;br /&gt;
The displayed interface always considers the sender side of an IP connection. &lt;br /&gt;
This information helps especially in bridge mode to determine at which side of an link the IP address is visible as sender of packets.&lt;br /&gt;
&lt;br /&gt;
==== Layer 3 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen IP DSCP values for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown DSCP class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific DSCP value.&lt;br /&gt;
&lt;br /&gt;
==== Layer 2 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen MPLS traffic classes and VLAN priority code points for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. &lt;br /&gt;
A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown QoS class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific QoS.&lt;br /&gt;
&lt;br /&gt;
==== Protocols tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists the DPI protocols for the current IP. The download button allows to capture the traffic for the IP and protocol pair.&lt;br /&gt;
&lt;br /&gt;
==== Peers tab ====&lt;br /&gt;
&lt;br /&gt;
The Peers tab shows all communication peers the current IP address has talked to. The table contains the [[Common table columns#IP|IP address]] which can be clicked to see the statistics for that IP.&lt;br /&gt;
The alternative names are shown, depending on which data is available (DNS name, DHCP name, NIC vendor name).&lt;br /&gt;
The packets and bytes columns show the total amount of data transferred between those two IP addresses.&lt;br /&gt;
The list of peers can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Layer 4 endpoints ====&lt;br /&gt;
&lt;br /&gt;
The layer 4 endpoint tab shows all peers of the current IP address and the used server port. If the peer is the server, the port of the peer is shown. If the peer is the client, the other port is shown.&lt;br /&gt;
&lt;br /&gt;
The table shows [[Common table columns#IP|IP addresses]] with port number, whether the peer acts as a server or client, alternative names, layer 4 protocol and byte and packet counters. If there were multiple connection between the IP address and the peer with the same port, the counters will show aggregated data.&lt;br /&gt;
&lt;br /&gt;
When clicking on &amp;quot;Peer connections&amp;quot; the connection tab is opened with the filter set to match that particular endpoint.&lt;br /&gt;
&lt;br /&gt;
==== Connections tab ====&lt;br /&gt;
&lt;br /&gt;
The connection tabs lists all connections which involves the current IP. The button rows allow to select which kind of information should be shown.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Column&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|Client IP/port&lt;br /&gt;
|Client side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Server IP/port&lt;br /&gt;
|Server side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Layer 4 protocol&lt;br /&gt;
|TCP, UDP, or others&lt;br /&gt;
|-&lt;br /&gt;
|Go to&lt;br /&gt;
|allows to go to the connection details page which shows all information in more detail.&lt;br /&gt;
|-&lt;br /&gt;
|Start time&lt;br /&gt;
|The start time is the time of the first packet for that connection.&lt;br /&gt;
|-&lt;br /&gt;
|Last activity&lt;br /&gt;
|shows the time of the last packet seen so far for the connection&lt;br /&gt;
|-&lt;br /&gt;
|Duration&lt;br /&gt;
|Difference between last activity and start time.&lt;br /&gt;
|-&lt;br /&gt;
|Packets&lt;br /&gt;
|Number of packets&lt;br /&gt;
|-&lt;br /&gt;
|Bytes&lt;br /&gt;
|Number of bytes&lt;br /&gt;
|-&lt;br /&gt;
|Packets/s&lt;br /&gt;
|Packet rate&lt;br /&gt;
|-&lt;br /&gt;
|Bit/s&lt;br /&gt;
|Bit rate&lt;br /&gt;
|-&lt;br /&gt;
|MTU&lt;br /&gt;
|The maximum transmission unit (i.e. layer 2 payload) is calculated for both directions.&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 protocol&lt;br /&gt;
|shows the detect application layer 7 protocol.&lt;br /&gt;
|-&lt;br /&gt;
|TCP handshake time&lt;br /&gt;
|The time between SYN and ACK.&lt;br /&gt;
|-&lt;br /&gt;
|TCP response time (max/avg)&lt;br /&gt;
|contains response times for TCP data&lt;br /&gt;
|-&lt;br /&gt;
|TCP application time&lt;br /&gt;
|Performance metrics for L7 applications (see [[TCP application time]] for details)&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 response time&lt;br /&gt;
|contains response times for the maximum HTTP response for HTTP connections, or the SSL response times for SSL connections. The column also contains a score for this connection and this IP, based on the average response times of the server. See HTTP module and SSL module for additional information. When sorting the column and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
|-&lt;br /&gt;
|TCP retransmissions/TCP restransmission %&lt;br /&gt;
|shows the number of bytes that have been retransmitted on TCP layer because of packet loss. High percentage indicate connection problems for this communication pair.&lt;br /&gt;
|-&lt;br /&gt;
|TCP DUP ACKs&lt;br /&gt;
|Number of DUP ACK packets&lt;br /&gt;
|-&lt;br /&gt;
|TCP missed data&lt;br /&gt;
|shows the estimated amount of TCP data not seen for this connection. See [[TCP module#Missed data|TCP module]] for details about missed data.&lt;br /&gt;
|-&lt;br /&gt;
|TCP SYNs/SYN-ACKs/FINs/RSTs&lt;br /&gt;
|shows the amount of TCP SYN, SYN-ACK, FIN and RST packets per direction. Up to 255 packets can be accounted, if more were seen, &amp;gt;= 255 will be displayed.&lt;br /&gt;
|-&lt;br /&gt;
|TCP end termination reason&lt;br /&gt;
|Connection end can be regular FIN, RST, or timeout if no termination is seen at all&lt;br /&gt;
|-&lt;br /&gt;
|TCP MSS&lt;br /&gt;
|The TCP maximum segment size may be announced by the peers using a TCP option during connection negotiation. If the option is not announced, default values will be used. The values represents the payload capacity of TCP packets sent by the peer.&lt;br /&gt;
|-&lt;br /&gt;
|Max announced TCP window size&lt;br /&gt;
|shows the size of the biggest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Min announced TCP window size&lt;br /&gt;
|shows the size of the smallest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Max TCP bytes in flight&lt;br /&gt;
|shows how much of the TCP receive window of the corresponding direction has been used at max during the lifetime of the connection, in other words this is the bytes in flight of the opposite, sending direction.&lt;br /&gt;
|-&lt;br /&gt;
|Announced TCP window size limit&lt;br /&gt;
|The TCP window size limit columns show the maximum possible value that could be used for the TCP receive window size. This is calculated from the announced TCP window scale option for each direction of a connection. The raw window scale (ws) shift count value is displayed in parentheses next to the byte value.&lt;br /&gt;
|-&lt;br /&gt;
|TCP window limit usage&lt;br /&gt;
|show the ratio of the TCP max window size values compared to the TCP window size limit values in percent.&lt;br /&gt;
|-&lt;br /&gt;
|TCP zero window packets&lt;br /&gt;
|Number of TCP zero window packets indicated full receive buffer.&lt;br /&gt;
|-&lt;br /&gt;
|Client announced TLS versions/Negotiated TLS version, Client announced cipher suites/Negotiated cipher suite&lt;br /&gt;
|shows the TLS versions and all supported cipher suites announced by the client during a SSL client hello. In the negotiated columns the currently used TLS version and cipher suite is shown as indicated by the SSL server hello. As the client announced cipher suite list can be quite long, it is possible expand or minimize the list by click on it.&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert level&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Validity&lt;br /&gt;
|Connections are counted as valid if the handshake succeeded or at least some data is transferred. &lt;br /&gt;
|-&lt;br /&gt;
|Meta data&lt;br /&gt;
|may contain additional information that could be retrieved depending on the protocol. For instance, for HTTP traffic this column shows the request URL and response code for the last transaction seen in the corresponding connection.&lt;br /&gt;
|-&lt;br /&gt;
|Outer VLANs&lt;br /&gt;
|shows which VLAN tags has been seen for a specific connection.&lt;br /&gt;
|-&lt;br /&gt;
|Inner VLANs&lt;br /&gt;
|shows which inner VLAN tags has been seen for a specific connection in QinQ setups.&lt;br /&gt;
|-&lt;br /&gt;
|PPPoE session ID&lt;br /&gt;
|shows the PPPoE session ID which has been seen for packets of that specific connection. If a PPPoE session ID changes at any time while the connection is active, a &#039;changed&#039; indication is given. In this case the latter session ID is displayed.&lt;br /&gt;
|-&lt;br /&gt;
|MPLS labels&lt;br /&gt;
|shows all seen MPLS labels for every direction of the connection. The full label stack is shown. A &#039;&#039;&#039;no label&#039;&#039;&#039; indication is given, if no MPLS labels have been used. If a MPLS label changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter MPLS labels are displayed.&lt;br /&gt;
|-&lt;br /&gt;
|QoS&lt;br /&gt;
|shows all seen QoS service classes for every direction of the connection. IP DSCP, outermost MPLS traffic classes and outermost VLAN priority code points may be detected and displayed. If a QoS class changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter QoS service classes are displayed. TCP RST packets will be ignored, as that packet may be less important and is indicated by a QoS class with lower priority than the previous packets with data.&lt;br /&gt;
|-&lt;br /&gt;
|Interfaces&lt;br /&gt;
|shows at which interface the connection has been established. This is especially helpful in bridge mode to determine at which side of link the connection has been established.&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency avg interval&lt;br /&gt;
|[[Path measurement#Measurement_statistics|Statistics from the path measurement]]&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency avg interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Graph&lt;br /&gt;
|shows the historical throughput for each connection, it is possible to select the displayed graph from multiple different statistics (see [[Common table columns#Graph|Common table columns - Graph]]). Some may only be available if module options has been enabled, as it will increase the overall memory usage. Some statistics like the path latency is only available, if the path measurement module is active (and the corresponding option to store latencies per connection is enabled)&lt;br /&gt;
|-&lt;br /&gt;
|PCAP&lt;br /&gt;
|allows for capturing the specific connection (see [[Common table columns#PCAP|Common table columns - PCAP]])&lt;br /&gt;
|}&lt;br /&gt;
The list of connections can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
[[File:IP connection details.png|thumb|600x600px|Connection detail view]]&lt;br /&gt;
A detailed connection view can be accessed by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
===== CSV download =====&lt;br /&gt;
&lt;br /&gt;
The connection list can also be downloaded as a CSV document by clicking at the CSV download button. The current filter and sort order is used when creating the CSV file.&lt;br /&gt;
&lt;br /&gt;
The CSV file can also be accessed without using the web interface by getting the following URL:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/API/stats/modules/ip/ips/x.x.x.x/connections?csv=true&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
x.x.x.x must be replaced with the actual IP address. Additional URL parameters can be used to choose a time span, applying filters, etc. See [[REST API description]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Open TCP server ports ====&lt;br /&gt;
&lt;br /&gt;
This tab shows the list of ports for which the IP address has accessed incoming connections.  &lt;br /&gt;
It shows which service is (usually) behind the port. &lt;br /&gt;
Additionally, the first and last connection time is shown as well. &lt;br /&gt;
Also, there is button to capture traffic for the current IP and the corresponding port.&lt;br /&gt;
&lt;br /&gt;
==== TCP statistics ====&lt;br /&gt;
&lt;br /&gt;
This web page shows statistics about the response time of TCP connection handshake of all TCP connections of the current IP address. Also, the amount of data retransmitted due to packet loss is shown on the right side of the page. When TCP data has not been seen for TCP connections, the estimated amount is shown as well (see [[TCP module#Missed data|TCP module]] for details).&lt;br /&gt;
&lt;br /&gt;
The graphs below show the historical data for each TCP handshake. The data point is the average handshake time and the vertical line shows the min and max handshake time for that specific time window (depending on the zoom level). Up to two graphs might be visible, one for data when the IP connected other IPs as a client, and another graph for data when the IP has been connected from other IPs as a server.&lt;br /&gt;
&lt;br /&gt;
The TCP application times show info about data packets being transferred between the clients and server.&lt;br /&gt;
For each TCP connection, the following key attributes are measured and reported:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Transactions:&#039;&#039;&#039; This metric indicates the count of data transaction cycles, allowing you to track the volume of activity over time.&lt;br /&gt;
* &#039;&#039;&#039;Data Transfer Time:&#039;&#039;&#039; This measures the time interval from the first data packet to the last consecutive data packet sent from the same side, giving you a clear picture of the data flow duration.&lt;br /&gt;
* &#039;&#039;&#039;First Data Response Time:&#039;&#039;&#039; This tracks the time between the last data packet sent and the first data packet received from the other peer, marking the conclusion of a transaction cycle&lt;br /&gt;
* &#039;&#039;&#039;Total Request-Response Time:&#039;&#039;&#039; This attribute captures the time interval from the first client data packet to the last server data packet during the entire request-response cycle, offering a comprehensive view of transaction latency.&lt;br /&gt;
&lt;br /&gt;
 It’s essential to understand that the values provided by the TCP application times feature are correlated through TCP packets containing data. This analysis is performed without decrypting the packets themselves, relying on observed patterns rather than the actual content of the packets. As such, the reported metrics are considered &#039;&#039;&#039;heuristics&#039;&#039;&#039;—meaning they offer insights based on empirical data rather than direct measurements of specific transactions. This approach allows for efficient monitoring while maintaining data integrity and privacy.&lt;br /&gt;
&lt;br /&gt;
See [[TCP application time]] for more details about these values.&lt;br /&gt;
&lt;br /&gt;
The connection table below shows a subset of the main connection table only for TCP connections for this IP. When sorting the handshake and response time columns and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
&lt;br /&gt;
==== HTTP server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all HTTP requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* HTTP server names: All host names are shown that have been used to contact the HTTP server on this IP.&lt;br /&gt;
* Sent HTTP responses: This is the total number of requests/responses that have been seen on the network.&lt;br /&gt;
* Average response time: This is the average response time in milliseconds for all servers.&lt;br /&gt;
* Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
* Minimum response time: This is the smallest response time seen on the network.&lt;br /&gt;
* Maximum response time: This is the largest response time seen on the network.&lt;br /&gt;
&lt;br /&gt;
The graph shows the historical data for all responses.&lt;br /&gt;
Below the graph, the number of response codes for each main code family is shown together with the last URL requested.&lt;br /&gt;
&lt;br /&gt;
==== SSL server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SSL requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* SSL server names: All host names are shown that have been used to contact the SSL server on this IP.&lt;br /&gt;
* Response time for SSL handshake&lt;br /&gt;
** Number of handshake: This is the total number of SSL requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
* Response time for SSL data&lt;br /&gt;
** Number of first data responses: This is the total number of initial SSL data requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
&lt;br /&gt;
The graphs shows the historical data for all handshakes and SSL first data responses&lt;br /&gt;
&lt;br /&gt;
==== SSL/TLS infos ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all negotiated SSL/TLS versions and cipher suites used by the current IP address either as server or client.&lt;br /&gt;
&lt;br /&gt;
In case of an SSL/TLS client this tab will also show the supported SSL/TLS versions and cipher suites that have been announced by this client IP address.&lt;br /&gt;
&lt;br /&gt;
==== SIP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SIP request methods, all SIP response types as well as all SIP request/response pairs sent or received by the current IP address.&lt;br /&gt;
&lt;br /&gt;
==== RTP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all RTP connections which involve the current IP address as either client or server.&lt;br /&gt;
A list shows all connections with client and server [[Common table columns#IP|IP addresses]] and ports. The RTP payload type is shown as well as timing informations and counters, jitter, packet time delta, MOS and R values and SSRC (synchronization source) of both client and server.&lt;br /&gt;
The min and max audio levels (decibel relative to full scale, dBFS) per direction are shown if G.711 A-Law or μ-Law is used. &lt;br /&gt;
For calculation, raw A-Law or μ-Law values are converted to 16 bit PCM values. Those values are then converted to dbFS:&lt;br /&gt;
&lt;br /&gt;
  value_dBFS = 20 * log10(abs(pcm_value) / 32768)&lt;br /&gt;
  Values range from 0 dBFS (loudest) to -96 dBFS (absolute silence).&lt;br /&gt;
&lt;br /&gt;
Graphs per connection show packets and packet loss, jitter, packet time delta, MOS, R value and the max audio level of client and server over time.&lt;br /&gt;
A PCAP button allows for PCAP capturing. If a proper codec is used, audio capture buttons for both directions are available allowing downloads in MP3 format.&lt;br /&gt;
Following codecs are supported for audio extraction:&lt;br /&gt;
&lt;br /&gt;
* G.711 A-Law and μ-Law&lt;br /&gt;
* G.722&lt;br /&gt;
* G.729&lt;br /&gt;
&lt;br /&gt;
==== Ping/Traceroute ====&lt;br /&gt;
&lt;br /&gt;
A traceroute to the IP can be started or updated by clicking the Traceroute/Update button. Available traceroute data is shown in a table, containing details of each discovered network hop.&lt;br /&gt;
The following hop information may be displayed:&lt;br /&gt;
&lt;br /&gt;
* IP address&lt;br /&gt;
* host name&lt;br /&gt;
* round trip time (average, minimum, maximum)&lt;br /&gt;
* rate of received responses to sent requests&lt;br /&gt;
* dropped packets count&lt;br /&gt;
* country&lt;br /&gt;
* city&lt;br /&gt;
* link to watch the location in online map services Google Maps or OpenStreetMaps&lt;br /&gt;
&lt;br /&gt;
A button is available to easily navigate to the traceroute configuration section.&lt;br /&gt;
&lt;br /&gt;
=== IP connection details ===&lt;br /&gt;
The connection detail view shows connection information in a single page. The view can be accessed in the list of IP connection (or the global connection list) by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
The page shows all data in a tabular format as well all graphs that are available for the connection.&lt;br /&gt;
&lt;br /&gt;
A capture button at the right hand side can be used to capture packets of that connection.&lt;br /&gt;
&lt;br /&gt;
The zoom button select the time range in which the connection was active.&lt;br /&gt;
&lt;br /&gt;
For TCP connections a [[TCP flow chart]] can be calculated by clicking on the corresponding button:&lt;br /&gt;
[[File:TCP flow graph start.png|none|thumb|614x614px|Start TCP flow graph analysis]]See also [[IP connection details]].&lt;br /&gt;
&lt;br /&gt;
== Configuration settings ==&lt;br /&gt;
&lt;br /&gt;
By clicking on the gear button on the top right of the IP statistics web page, you can access the configuration section.&lt;br /&gt;
&lt;br /&gt;
* Store connection information for every IP This option is enabled by default. &lt;br /&gt;
:When enabled, the IP measurement module stores every connection for each IP. &lt;br /&gt;
:This includes historical packet counter so you can see for individual connection at which time the connection transferred which amount of data. &lt;br /&gt;
:Connection data will be stored as long as possible regarding the total memory usage.&lt;br /&gt;
:Disabling this option will increase the minimum storage time significantly.&lt;br /&gt;
&lt;br /&gt;
* Store layer 7 protocol information for every IP The network protocols and their historical traffic data is stored for each IP if this option is enabled.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Track number of new connections for every IP &lt;br /&gt;
:When This option is enabled, TCP connections per IP will be tracked. &lt;br /&gt;
:Connections are divided into valid and invalid connections for server and client direction and the amount is shown.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store traffic history graph for IP peers &lt;br /&gt;
:This option allows enabling or disabling the traffic history graph that is shown per peer in the &#039;&#039;&#039;Peers&#039;&#039;&#039; tab for an IP.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store RTP performance information per IP and connection&lt;br /&gt;
:This option allows enabling or disabling of RTP related statistics that are shown in the &#039;&#039;&#039;RTP statistics&#039;&#039;&#039; tab for an IP. &lt;br /&gt;
:Jitter, packet time delta and MOS calculation in the [[SIP_module|SIP module]] also depends on this switch since it partially shows information stored at the IP address of RTP senders/receivers.&lt;br /&gt;
:Disabling this option will reduce the memory utilization and therefor increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store QoS information for every IP&lt;br /&gt;
:This option enables or disables to storage of Quality of Service information per IP. &lt;br /&gt;
:These information require additional memory so if these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store SSL/TLS information for every connection&lt;br /&gt;
:This option enables or disables to storage of SSL/TLS information per IP. This includes used and announced&lt;br /&gt;
:encryption ciphers which can take additional memory per IP connection. If these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store detailed TCP statistics for every connection&lt;br /&gt;
:This option allows to store detailed TCP statistics per connection, such as TCP retransmissions or TCP response time. The graph type can be selected in the IP connection tab to access these information.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of IP groups&lt;br /&gt;
:This option configures how many IP groups can be defined. The minimum (and default) value is 32 IP groups.&lt;br /&gt;
:The maximum value is 65535 IP groups. A new configuration value only takes effect after restarting the packet processing in the Administration menu.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of HTTP requests per connection&lt;br /&gt;
:This options configures how many HTTP request/response tuples are stored by default. The default is 1.&lt;br /&gt;
:On global and IP detail connection page it is possible to download CSV file with either the last or all HTTP request/responses per connection. In the latter case each connection line is duplicated with another HTTP request/response in chronological order.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4837</id>
		<title>IP module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4837"/>
		<updated>2024-08-09T13:27:14Z</updated>

		<summary type="html">&lt;p&gt;Ralf: /* TCP statistics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The IP module operates on layer 3 of the network stack. It stores information about all IPv4 and IPv6 addresses.&lt;br /&gt;
For every address, the corresponding network traffic is accounted, the used protocols and their individual traffic.&lt;br /&gt;
The communication peers are stored as well as the traffic between both IP addresses. Every connection and its amount of traffic and the protocol can be accessed too.&lt;br /&gt;
&lt;br /&gt;
== Web interface ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[File:IP statistics.png|800px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== IP addresses tab ===&lt;br /&gt;
&lt;br /&gt;
The IP addresses tab shows the complete list of all IP addresses seen by the system. The button row allows for select specific information to be shown or hidden so that only the relevant information fit on the screen. &lt;br /&gt;
By clicking on &#039;&#039;&#039;Counters (combined)&#039;&#039;&#039; the table toggles between sent and received bytes and packets displayed in either one column or in separate columns for sorting purposes.&lt;br /&gt;
For each address, the table contains the following information:&lt;br /&gt;
&lt;br /&gt;
* IP&lt;br /&gt;
:See [[Common table columns#IP|Common table columns - IP]].&lt;br /&gt;
&lt;br /&gt;
* Alternative names&lt;br /&gt;
:See [[Common table columns#Alternative names|Common table columns - Alternative names]].&lt;br /&gt;
:The name information are also used when filtering the table for some entered string.&lt;br /&gt;
&lt;br /&gt;
* Traceroute&lt;br /&gt;
:A traceroute for the IP can be requested or updated using the available button. When traceroute information is available for the IP, brief information about each found network hop (IP, hostname, ping response time) is displayed. Since this list of hops can get very long, the view can be toggled to show all found hops or just the last one by clicking on the traceroute header.&lt;br /&gt;
&lt;br /&gt;
* First (recent) activity&lt;br /&gt;
:See [[Common table columns#First (recent) activity|Common table columns - First (recent) activity]].&lt;br /&gt;
&lt;br /&gt;
* Last activity&lt;br /&gt;
:See [[Common table columns#Last activity|Common table columns - Last activity]].&lt;br /&gt;
&lt;br /&gt;
* Packets and Bytes&lt;br /&gt;
:See [[Common table columns#Packets|Common table columns - Packets]] and [[Common table columns#Bytes|Common table columns - Bytes]].&lt;br /&gt;
&lt;br /&gt;
* Packets/s and Bit/s&lt;br /&gt;
:See [[Common table columns#Packets/s|Common table columns - Packets/s]] and [[Common table columns#Bit/s|Common table columns - Bit/s]].&lt;br /&gt;
&lt;br /&gt;
* Peers&lt;br /&gt;
: This shows the amount of peers of this IP. This counter is an all time only value and does not consider a selected interval.&lt;br /&gt;
&lt;br /&gt;
* TTL&lt;br /&gt;
: This shows the min, max and average TTL value (or hop limit in case of IPv6) of TCP/UDP traffic of an IP address. Non-UDP and non-TCP traffic as well as multicast traffic is ignored as e.g. ICMP packets likely have very high TTL values of 255 at the sender. &lt;br /&gt;
&lt;br /&gt;
* MTU&lt;br /&gt;
: The maximum transmission unit (i.e. layer 2 payload) is calculated for both receive and send direction. The maximum values are displayed.&lt;br /&gt;
&lt;br /&gt;
* TCP packets and UDP packets&lt;br /&gt;
:This is the number of TCP and UDP packets that have been seen for this IP.&lt;br /&gt;
&lt;br /&gt;
* TCP handshake time and TCP data response time&lt;br /&gt;
: The average time for a handshake as a TCP client and/or a TCP server is displayed as well as the average time the IP takes to acknowledge TCP data.&lt;br /&gt;
&lt;br /&gt;
* TCP payload and retransmissions&lt;br /&gt;
:These two columns show the number of bytes transmitted as TCP payload and how many bytes have been retransmitted, indicating a bad connection quality.&lt;br /&gt;
&lt;br /&gt;
* Graph&lt;br /&gt;
:See [[Common table columns#Graph|Common table columns - Graph]].&lt;br /&gt;
:Available data sources are load (bps or packets/s), TCP statistics or connections.&lt;br /&gt;
&lt;br /&gt;
* PCAP&lt;br /&gt;
:See [[Common table columns#PCAP|Common table columns - PCAP]]&lt;br /&gt;
&lt;br /&gt;
When multiple pages are available, there will be a control field for switching pages.&lt;br /&gt;
The IP search bar allows to enter IP addresses or names to see only those element for which the entered string is part of the IP address or name. &lt;br /&gt;
Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for a detailed description about how to use this feature.&lt;br /&gt;
The columns can be sorted also, for example to easily spot the IP addresses with the most bytes, or the highest current throughput.&lt;br /&gt;
&lt;br /&gt;
Below the table a CSV download button provides the ability to download the whole table contents in CSV format.&lt;br /&gt;
Sorting and filtering are applied as selected for the table but all IPs in the table are exported, not only the currently visible page.&lt;br /&gt;
&lt;br /&gt;
=== Global IP statistics tab ===&lt;br /&gt;
&lt;br /&gt;
The global IP statistics shows global sums about the processed IPv4 and IPv6 traffic and often used layer 4 protocols.&lt;br /&gt;
Non-IP packets such as ARP packets are indicated as other traffic and are not covered by this module.&lt;br /&gt;
The available information is:&lt;br /&gt;
* Layer 3 protocols (IPv4, IPv6 and non-IP traffic, its distribution over time and a history graph)&lt;br /&gt;
* Layer 4 protocols (TCP, UDP and traffic for other often used layer 4 protocols, its distribution over time and a history graph)&lt;br /&gt;
* Number of IPv4 fragmented packets (distribution over time and a history graph)&lt;br /&gt;
&lt;br /&gt;
For layer 3 and layer 4 protocols, traffic can be downloaded by clicking on the PCAP download button. The captured packets are not stored on the system but they are directly sent over the HTTP connection to your computer. &lt;br /&gt;
To stop capture, click on the same button again (which turned to a STOP symbol), or go to the capture traffic page in the generic section and stop the corresponding download.&lt;br /&gt;
&lt;br /&gt;
=== Top IP statistics ===&lt;br /&gt;
&lt;br /&gt;
On this page pie charts are shown with the top 10 sending and receiving IP addresses. By clicking on a pie chart section the related IP detail page is opened.&lt;br /&gt;
&lt;br /&gt;
=== Per IP statistics ===&lt;br /&gt;
&lt;br /&gt;
It is possible to select an IP from the list of IP addresses and get an more detailed view of the information stored about that IP.&lt;br /&gt;
The headline of the page includes three buttons.&lt;br /&gt;
The first left arrow button navigates back to the complete IP overview. &lt;br /&gt;
The second download button allows to download the traffic for the current IP address. &lt;br /&gt;
The third button allows for opening this manual section.&lt;br /&gt;
Below the buttons there are two graphs for the packets and bytes sent and received by the IP address.&lt;br /&gt;
The third section contains six tabs for various information about the selected IP.&lt;br /&gt;
&lt;br /&gt;
==== Overview tab ====&lt;br /&gt;
&lt;br /&gt;
This tab summarizes all the standard information from the main IP view, such as&lt;br /&gt;
* the alternative names,&lt;br /&gt;
* the packet and bytes counters, and&lt;br /&gt;
* the current throughput.&lt;br /&gt;
&lt;br /&gt;
Additionally, the top DPI protocols are printed both in the table as well as a pie chart at the bottom of the page.&lt;br /&gt;
The last line in the table shows the MAC addresses seen for this IP address. &lt;br /&gt;
There can be multiple MAC addresses for the same IP, for example if the DHCP reuse the IP address after some time. &lt;br /&gt;
The last new connection time is the start time of the last connection seen for this IP.&lt;br /&gt;
There is also a download button to capture the traffic for the specific IP and MAC address pair.&lt;br /&gt;
The final two rows shows all VLAN tags that have been seen for the given IP. An IP address might be visible in multiple VLANs.&lt;br /&gt;
If the Allegro Network Multimeter is installed at a mirror port of a switch which also modifies the VLAN tag, it might happen that an IP address is seen without a VLAN tag (none) and a specific VLAN tag. &lt;br /&gt;
This setup will decrease the quality of the results as connections use the VLAN information too to distinguish connections. &lt;br /&gt;
The measurement results can be improved if the mirror port is reconfigured to only see traffic with VLAN or completely without VLAN tags.&lt;br /&gt;
The last row shows the devices interfaces at which the IP has been seen. &lt;br /&gt;
The displayed interface always considers the sender side of an IP connection. &lt;br /&gt;
This information helps especially in bridge mode to determine at which side of an link the IP address is visible as sender of packets.&lt;br /&gt;
&lt;br /&gt;
==== Layer 3 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen IP DSCP values for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown DSCP class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific DSCP value.&lt;br /&gt;
&lt;br /&gt;
==== Layer 2 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen MPLS traffic classes and VLAN priority code points for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. &lt;br /&gt;
A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown QoS class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific QoS.&lt;br /&gt;
&lt;br /&gt;
==== Protocols tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists the DPI protocols for the current IP. The download button allows to capture the traffic for the IP and protocol pair.&lt;br /&gt;
&lt;br /&gt;
==== Peers tab ====&lt;br /&gt;
&lt;br /&gt;
The Peers tab shows all communication peers the current IP address has talked to. The table contains the [[Common table columns#IP|IP address]] which can be clicked to see the statistics for that IP.&lt;br /&gt;
The alternative names are shown, depending on which data is available (DNS name, DHCP name, NIC vendor name).&lt;br /&gt;
The packets and bytes columns show the total amount of data transferred between those two IP addresses.&lt;br /&gt;
The list of peers can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Layer 4 endpoints ====&lt;br /&gt;
&lt;br /&gt;
The layer 4 endpoint tab shows all peers of the current IP address and the used server port. If the peer is the server, the port of the peer is shown. If the peer is the client, the other port is shown.&lt;br /&gt;
&lt;br /&gt;
The table shows [[Common table columns#IP|IP addresses]] with port number, whether the peer acts as a server or client, alternative names, layer 4 protocol and byte and packet counters. If there were multiple connection between the IP address and the peer with the same port, the counters will show aggregated data.&lt;br /&gt;
&lt;br /&gt;
When clicking on &amp;quot;Peer connections&amp;quot; the connection tab is opened with the filter set to match that particular endpoint.&lt;br /&gt;
&lt;br /&gt;
==== Connections tab ====&lt;br /&gt;
&lt;br /&gt;
The connection tabs lists all connections which involves the current IP. The button rows allow to select which kind of information should be shown.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Column&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|Client IP/port&lt;br /&gt;
|Client side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Server IP/port&lt;br /&gt;
|Server side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Layer 4 protocol&lt;br /&gt;
|TCP, UDP, or others&lt;br /&gt;
|-&lt;br /&gt;
|Go to&lt;br /&gt;
|allows to go to the connection details page which shows all information in more detail.&lt;br /&gt;
|-&lt;br /&gt;
|Start time&lt;br /&gt;
|The start time is the time of the first packet for that connection.&lt;br /&gt;
|-&lt;br /&gt;
|Last activity&lt;br /&gt;
|shows the time of the last packet seen so far for the connection&lt;br /&gt;
|-&lt;br /&gt;
|Duration&lt;br /&gt;
|Difference between last activity and start time.&lt;br /&gt;
|-&lt;br /&gt;
|Packets&lt;br /&gt;
|Number of packets&lt;br /&gt;
|-&lt;br /&gt;
|Bytes&lt;br /&gt;
|Number of bytes&lt;br /&gt;
|-&lt;br /&gt;
|Packets/s&lt;br /&gt;
|Packet rate&lt;br /&gt;
|-&lt;br /&gt;
|Bit/s&lt;br /&gt;
|Bit rate&lt;br /&gt;
|-&lt;br /&gt;
|MTU&lt;br /&gt;
|The maximum transmission unit (i.e. layer 2 payload) is calculated for both directions.&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 protocol&lt;br /&gt;
|shows the detect application layer 7 protocol.&lt;br /&gt;
|-&lt;br /&gt;
|TCP handshake time&lt;br /&gt;
|The time between SYN and ACK.&lt;br /&gt;
|-&lt;br /&gt;
|TCP response time (max/avg)&lt;br /&gt;
|contains response times for TCP data&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 response time&lt;br /&gt;
|contains response times for the maximum HTTP response for HTTP connections, or the SSL response times for SSL connections. The column also contains a score for this connection and this IP, based on the average response times of the server. See HTTP module and SSL module for additional information. When sorting the column and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
|-&lt;br /&gt;
|TCP retransmissions/TCP restransmission %&lt;br /&gt;
|shows the number of bytes that have been retransmitted on TCP layer because of packet loss. High percentage indicate connection problems for this communication pair.&lt;br /&gt;
|-&lt;br /&gt;
|TCP DUP ACKs&lt;br /&gt;
|Number of DUP ACK packets&lt;br /&gt;
|-&lt;br /&gt;
|TCP missed data&lt;br /&gt;
|shows the estimated amount of TCP data not seen for this connection. See [[TCP module#Missed data|TCP module]] for details about missed data.&lt;br /&gt;
|-&lt;br /&gt;
|TCP SYNs/SYN-ACKs/FINs/RSTs&lt;br /&gt;
|shows the amount of TCP SYN, SYN-ACK, FIN and RST packets per direction. Up to 255 packets can be accounted, if more were seen, &amp;gt;= 255 will be displayed.&lt;br /&gt;
|-&lt;br /&gt;
|TCP end termination reason&lt;br /&gt;
|Connection end can be regular FIN, RST, or timeout if no termination is seen at all&lt;br /&gt;
|-&lt;br /&gt;
|TCP MSS&lt;br /&gt;
|The TCP maximum segment size may be announced by the peers using a TCP option during connection negotiation. If the option is not announced, default values will be used. The values represents the payload capacity of TCP packets sent by the peer.&lt;br /&gt;
|-&lt;br /&gt;
|Max announced TCP window size&lt;br /&gt;
|shows the size of the biggest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Min announced TCP window size&lt;br /&gt;
|shows the size of the smallest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Max TCP bytes in flight&lt;br /&gt;
|shows how much of the TCP receive window of the corresponding direction has been used at max during the lifetime of the connection, in other words this is the bytes in flight of the opposite, sending direction.&lt;br /&gt;
|-&lt;br /&gt;
|Announced TCP window size limit&lt;br /&gt;
|The TCP window size limit columns show the maximum possible value that could be used for the TCP receive window size. This is calculated from the announced TCP window scale option for each direction of a connection. The raw window scale (ws) shift count value is displayed in parentheses next to the byte value.&lt;br /&gt;
|-&lt;br /&gt;
|TCP window limit usage&lt;br /&gt;
|show the ratio of the TCP max window size values compared to the TCP window size limit values in percent.&lt;br /&gt;
|-&lt;br /&gt;
|TCP zero window packets&lt;br /&gt;
|Number of TCP zero window packets indicated full receive buffer.&lt;br /&gt;
|-&lt;br /&gt;
|Client announced TLS versions/Negotiated TLS version, Client announced cipher suites/Negotiated cipher suite&lt;br /&gt;
|shows the TLS versions and all supported cipher suites announced by the client during a SSL client hello. In the negotiated columns the currently used TLS version and cipher suite is shown as indicated by the SSL server hello. As the client announced cipher suite list can be quite long, it is possible expand or minimize the list by click on it.&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert level&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Validity&lt;br /&gt;
|Connections are counted as valid if the handshake succeeded or at least some data is transferred. &lt;br /&gt;
|-&lt;br /&gt;
|Meta data&lt;br /&gt;
|may contain additional information that could be retrieved depending on the protocol. For instance, for HTTP traffic this column shows the request URL and response code for the last transaction seen in the corresponding connection.&lt;br /&gt;
|-&lt;br /&gt;
|Outer VLANs&lt;br /&gt;
|shows which VLAN tags has been seen for a specific connection.&lt;br /&gt;
|-&lt;br /&gt;
|Inner VLANs&lt;br /&gt;
|shows which inner VLAN tags has been seen for a specific connection in QinQ setups.&lt;br /&gt;
|-&lt;br /&gt;
|PPPoE session ID&lt;br /&gt;
|shows the PPPoE session ID which has been seen for packets of that specific connection. If a PPPoE session ID changes at any time while the connection is active, a &#039;changed&#039; indication is given. In this case the latter session ID is displayed.&lt;br /&gt;
|-&lt;br /&gt;
|MPLS labels&lt;br /&gt;
|shows all seen MPLS labels for every direction of the connection. The full label stack is shown. A &#039;&#039;&#039;no label&#039;&#039;&#039; indication is given, if no MPLS labels have been used. If a MPLS label changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter MPLS labels are displayed.&lt;br /&gt;
|-&lt;br /&gt;
|QoS&lt;br /&gt;
|shows all seen QoS service classes for every direction of the connection. IP DSCP, outermost MPLS traffic classes and outermost VLAN priority code points may be detected and displayed. If a QoS class changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter QoS service classes are displayed. TCP RST packets will be ignored, as that packet may be less important and is indicated by a QoS class with lower priority than the previous packets with data.&lt;br /&gt;
|-&lt;br /&gt;
|Interfaces&lt;br /&gt;
|shows at which interface the connection has been established. This is especially helpful in bridge mode to determine at which side of link the connection has been established.&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency avg interval&lt;br /&gt;
|[[Path measurement#Measurement_statistics|Statistics from the path measurement]]&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency avg interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Graph&lt;br /&gt;
|shows the historical throughput for each connection, it is possible to select the displayed graph from multiple different statistics (see [[Common table columns#Graph|Common table columns - Graph]]). Some may only be available if module options has been enabled, as it will increase the overall memory usage. Some statistics like the path latency is only available, if the path measurement module is active (and the corresponding option to store latencies per connection is enabled)&lt;br /&gt;
|-&lt;br /&gt;
|PCAP&lt;br /&gt;
|allows for capturing the specific connection (see [[Common table columns#PCAP|Common table columns - PCAP]])&lt;br /&gt;
|}&lt;br /&gt;
The list of connections can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
[[File:IP connection details.png|thumb|600x600px|Connection detail view]]&lt;br /&gt;
A detailed connection view can be accessed by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
===== CSV download =====&lt;br /&gt;
&lt;br /&gt;
The connection list can also be downloaded as a CSV document by clicking at the CSV download button. The current filter and sort order is used when creating the CSV file.&lt;br /&gt;
&lt;br /&gt;
The CSV file can also be accessed without using the web interface by getting the following URL:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/API/stats/modules/ip/ips/x.x.x.x/connections?csv=true&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
x.x.x.x must be replaced with the actual IP address. Additional URL parameters can be used to choose a time span, applying filters, etc. See [[REST API description]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Open TCP server ports ====&lt;br /&gt;
&lt;br /&gt;
This tab shows the list of ports for which the IP address has accessed incoming connections.  &lt;br /&gt;
It shows which service is (usually) behind the port. &lt;br /&gt;
Additionally, the first and last connection time is shown as well. &lt;br /&gt;
Also, there is button to capture traffic for the current IP and the corresponding port.&lt;br /&gt;
&lt;br /&gt;
==== TCP statistics ====&lt;br /&gt;
&lt;br /&gt;
This web page shows statistics about the response time of TCP connection handshake of all TCP connections of the current IP address. Also, the amount of data retransmitted due to packet loss is shown on the right side of the page. When TCP data has not been seen for TCP connections, the estimated amount is shown as well (see [[TCP module#Missed data|TCP module]] for details).&lt;br /&gt;
&lt;br /&gt;
The graphs below show the historical data for each TCP handshake. The data point is the average handshake time and the vertical line shows the min and max handshake time for that specific time window (depending on the zoom level). Up to two graphs might be visible, one for data when the IP connected other IPs as a client, and another graph for data when the IP has been connected from other IPs as a server.&lt;br /&gt;
&lt;br /&gt;
The TCP application times show info about data packets being transferred between the clients and server.&lt;br /&gt;
For each TCP connection, the following key attributes are measured and reported:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Transactions:&#039;&#039;&#039; This metric indicates the count of data transaction cycles, allowing you to track the volume of activity over time.&lt;br /&gt;
* &#039;&#039;&#039;Data Transfer Time:&#039;&#039;&#039; This measures the time interval from the first data packet to the last consecutive data packet sent from the same side, giving you a clear picture of the data flow duration.&lt;br /&gt;
* &#039;&#039;&#039;First Data Response Time:&#039;&#039;&#039; This tracks the time between the last data packet sent and the first data packet received from the other peer, marking the conclusion of a transaction cycle&lt;br /&gt;
* &#039;&#039;&#039;Total Request-Response Time:&#039;&#039;&#039; This attribute captures the time interval from the first client data packet to the last server data packet during the entire request-response cycle, offering a comprehensive view of transaction latency.&lt;br /&gt;
&lt;br /&gt;
 It’s essential to understand that the values provided by the TCP application times feature are correlated through TCP packets containing data. This analysis is performed without decrypting the packets themselves, relying on observed patterns rather than the actual content of the packets. As such, the reported metrics are considered &#039;&#039;&#039;heuristics&#039;&#039;&#039;—meaning they offer insights based on empirical data rather than direct measurements of specific transactions. This approach allows for efficient monitoring while maintaining data integrity and privacy.&lt;br /&gt;
&lt;br /&gt;
See [[TCP application time]] for more details about these values.&lt;br /&gt;
&lt;br /&gt;
The connection table below shows a subset of the main connection table only for TCP connections for this IP. When sorting the handshake and response time columns and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
&lt;br /&gt;
==== HTTP server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all HTTP requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* HTTP server names: All host names are shown that have been used to contact the HTTP server on this IP.&lt;br /&gt;
* Sent HTTP responses: This is the total number of requests/responses that have been seen on the network.&lt;br /&gt;
* Average response time: This is the average response time in milliseconds for all servers.&lt;br /&gt;
* Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
* Minimum response time: This is the smallest response time seen on the network.&lt;br /&gt;
* Maximum response time: This is the largest response time seen on the network.&lt;br /&gt;
&lt;br /&gt;
The graph shows the historical data for all responses.&lt;br /&gt;
Below the graph, the number of response codes for each main code family is shown together with the last URL requested.&lt;br /&gt;
&lt;br /&gt;
==== SSL server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SSL requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* SSL server names: All host names are shown that have been used to contact the SSL server on this IP.&lt;br /&gt;
* Response time for SSL handshake&lt;br /&gt;
** Number of handshake: This is the total number of SSL requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
* Response time for SSL data&lt;br /&gt;
** Number of first data responses: This is the total number of initial SSL data requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
&lt;br /&gt;
The graphs shows the historical data for all handshakes and SSL first data responses&lt;br /&gt;
&lt;br /&gt;
==== SSL/TLS infos ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all negotiated SSL/TLS versions and cipher suites used by the current IP address either as server or client.&lt;br /&gt;
&lt;br /&gt;
In case of an SSL/TLS client this tab will also show the supported SSL/TLS versions and cipher suites that have been announced by this client IP address.&lt;br /&gt;
&lt;br /&gt;
==== SIP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SIP request methods, all SIP response types as well as all SIP request/response pairs sent or received by the current IP address.&lt;br /&gt;
&lt;br /&gt;
==== RTP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all RTP connections which involve the current IP address as either client or server.&lt;br /&gt;
A list shows all connections with client and server [[Common table columns#IP|IP addresses]] and ports. The RTP payload type is shown as well as timing informations and counters, jitter, packet time delta, MOS and R values and SSRC (synchronization source) of both client and server.&lt;br /&gt;
The min and max audio levels (decibel relative to full scale, dBFS) per direction are shown if G.711 A-Law or μ-Law is used. &lt;br /&gt;
For calculation, raw A-Law or μ-Law values are converted to 16 bit PCM values. Those values are then converted to dbFS:&lt;br /&gt;
&lt;br /&gt;
  value_dBFS = 20 * log10(abs(pcm_value) / 32768)&lt;br /&gt;
  Values range from 0 dBFS (loudest) to -96 dBFS (absolute silence).&lt;br /&gt;
&lt;br /&gt;
Graphs per connection show packets and packet loss, jitter, packet time delta, MOS, R value and the max audio level of client and server over time.&lt;br /&gt;
A PCAP button allows for PCAP capturing. If a proper codec is used, audio capture buttons for both directions are available allowing downloads in MP3 format.&lt;br /&gt;
Following codecs are supported for audio extraction:&lt;br /&gt;
&lt;br /&gt;
* G.711 A-Law and μ-Law&lt;br /&gt;
* G.722&lt;br /&gt;
* G.729&lt;br /&gt;
&lt;br /&gt;
==== Ping/Traceroute ====&lt;br /&gt;
&lt;br /&gt;
A traceroute to the IP can be started or updated by clicking the Traceroute/Update button. Available traceroute data is shown in a table, containing details of each discovered network hop.&lt;br /&gt;
The following hop information may be displayed:&lt;br /&gt;
&lt;br /&gt;
* IP address&lt;br /&gt;
* host name&lt;br /&gt;
* round trip time (average, minimum, maximum)&lt;br /&gt;
* rate of received responses to sent requests&lt;br /&gt;
* dropped packets count&lt;br /&gt;
* country&lt;br /&gt;
* city&lt;br /&gt;
* link to watch the location in online map services Google Maps or OpenStreetMaps&lt;br /&gt;
&lt;br /&gt;
A button is available to easily navigate to the traceroute configuration section.&lt;br /&gt;
&lt;br /&gt;
=== IP connection details ===&lt;br /&gt;
The connection detail view shows connection information in a single page. The view can be accessed in the list of IP connection (or the global connection list) by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
The page shows all data in a tabular format as well all graphs that are available for the connection.&lt;br /&gt;
&lt;br /&gt;
A capture button at the right hand side can be used to capture packets of that connection.&lt;br /&gt;
&lt;br /&gt;
The zoom button select the time range in which the connection was active.&lt;br /&gt;
&lt;br /&gt;
For TCP connections a [[TCP flow chart]] can be calculated by clicking on the corresponding button:&lt;br /&gt;
[[File:TCP flow graph start.png|none|thumb|614x614px|Start TCP flow graph analysis]]See also [[IP connection details]].&lt;br /&gt;
&lt;br /&gt;
== Configuration settings ==&lt;br /&gt;
&lt;br /&gt;
By clicking on the gear button on the top right of the IP statistics web page, you can access the configuration section.&lt;br /&gt;
&lt;br /&gt;
* Store connection information for every IP This option is enabled by default. &lt;br /&gt;
:When enabled, the IP measurement module stores every connection for each IP. &lt;br /&gt;
:This includes historical packet counter so you can see for individual connection at which time the connection transferred which amount of data. &lt;br /&gt;
:Connection data will be stored as long as possible regarding the total memory usage.&lt;br /&gt;
:Disabling this option will increase the minimum storage time significantly.&lt;br /&gt;
&lt;br /&gt;
* Store layer 7 protocol information for every IP The network protocols and their historical traffic data is stored for each IP if this option is enabled.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Track number of new connections for every IP &lt;br /&gt;
:When This option is enabled, TCP connections per IP will be tracked. &lt;br /&gt;
:Connections are divided into valid and invalid connections for server and client direction and the amount is shown.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store traffic history graph for IP peers &lt;br /&gt;
:This option allows enabling or disabling the traffic history graph that is shown per peer in the &#039;&#039;&#039;Peers&#039;&#039;&#039; tab for an IP.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store RTP performance information per IP and connection&lt;br /&gt;
:This option allows enabling or disabling of RTP related statistics that are shown in the &#039;&#039;&#039;RTP statistics&#039;&#039;&#039; tab for an IP. &lt;br /&gt;
:Jitter, packet time delta and MOS calculation in the [[SIP_module|SIP module]] also depends on this switch since it partially shows information stored at the IP address of RTP senders/receivers.&lt;br /&gt;
:Disabling this option will reduce the memory utilization and therefor increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store QoS information for every IP&lt;br /&gt;
:This option enables or disables to storage of Quality of Service information per IP. &lt;br /&gt;
:These information require additional memory so if these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store SSL/TLS information for every connection&lt;br /&gt;
:This option enables or disables to storage of SSL/TLS information per IP. This includes used and announced&lt;br /&gt;
:encryption ciphers which can take additional memory per IP connection. If these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store detailed TCP statistics for every connection&lt;br /&gt;
:This option allows to store detailed TCP statistics per connection, such as TCP retransmissions or TCP response time. The graph type can be selected in the IP connection tab to access these information.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of IP groups&lt;br /&gt;
:This option configures how many IP groups can be defined. The minimum (and default) value is 32 IP groups.&lt;br /&gt;
:The maximum value is 65535 IP groups. A new configuration value only takes effect after restarting the packet processing in the Administration menu.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of HTTP requests per connection&lt;br /&gt;
:This options configures how many HTTP request/response tuples are stored by default. The default is 1.&lt;br /&gt;
:On global and IP detail connection page it is possible to download CSV file with either the last or all HTTP request/responses per connection. In the latter case each connection line is duplicated with another HTTP request/response in chronological order.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=TCP_application_time&amp;diff=4836</id>
		<title>TCP application time</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=TCP_application_time&amp;diff=4836"/>
		<updated>2024-08-09T13:25:07Z</updated>

		<summary type="html">&lt;p&gt;Ralf: Created page with &amp;quot;== Overview == The TCP module measures applications times by monitoring TCP transactions to indicate, if a server takes too long to answer, or takes too long to transfer its response, and similar application problems. TCP application time results  == Description of measured data ==  === Definition of values === {| class=&amp;quot;wikitable&amp;quot; |+ !Value !Description |- |Transaction |A transaction is defined as a sequence...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
The TCP module measures applications times by monitoring TCP transactions to indicate, if a server takes too long to answer, or takes too long to transfer its response, and similar application problems.&lt;br /&gt;
[[File:TCP module application times.png|none|thumb|871x871px|TCP application time results]]&lt;br /&gt;
&lt;br /&gt;
== Description of measured data ==&lt;br /&gt;
&lt;br /&gt;
=== Definition of values ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Value&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|Transaction&lt;br /&gt;
|A transaction is defined as a sequence of TCP data packets sent by the client, followed by a sequence of TCP data packets sent as a response by the server.&lt;br /&gt;
Each change in direction &amp;quot;Client -&amp;gt; Server -&amp;gt; Client&amp;quot; is considered one transaction.&lt;br /&gt;
|-&lt;br /&gt;
|Data transfer time&lt;br /&gt;
|This is the amount of time took to transfer all consecutive TCP data packets as part of the TCP transaction in either client or server direction.&lt;br /&gt;
Note, that there is no duration for transactions with only a single TCP data packet for a transaction direction.&lt;br /&gt;
|-&lt;br /&gt;
|First data response time&lt;br /&gt;
|This time describes how long the server took to send the first data packet as a response to client request.&lt;br /&gt;
|-&lt;br /&gt;
|Total request response transfer time&lt;br /&gt;
|This time is sum of the client data transfer, the first data response time, and the server data transfer time.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Measured values ===&lt;br /&gt;
&lt;br /&gt;
* For individual connections, each transaction &amp;quot;Client request, Server response&amp;quot; is measured. Each connection stores:&lt;br /&gt;
** Number of transactions&lt;br /&gt;
** Maximum time for client data transfer&lt;br /&gt;
** Maximum time for first data response of the server&lt;br /&gt;
** Maximum time for server data transfer&lt;br /&gt;
** Maximum time for the total request response transfer time&lt;br /&gt;
* Each IP aggregates the per connection values:&lt;br /&gt;
** Number of transactions executed as a client of a transaction&lt;br /&gt;
** Number of transactions executed as a server of a transaction&lt;br /&gt;
** Duration of the data transfers as a client&lt;br /&gt;
** Duration of the data transfers as a server&lt;br /&gt;
** The first data response time when acting as a server&lt;br /&gt;
** Duration of the total request response transfer&lt;br /&gt;
&lt;br /&gt;
== Web interface ==&lt;br /&gt;
The TCP application time results can be found in multiple places depending on the context.&lt;br /&gt;
&lt;br /&gt;
# [[TCP module|L4 TCP statistics]]In this module, the list of IP addresses is shown with their TCP application time values, including various graphs for historical values&lt;br /&gt;
# [[IP module#IP addresses tab|IP list]]The IP list can show the TCP application times as well by enabling the corresponding column&lt;br /&gt;
# [[IP module#TCP statistics|IP details]]The TCP tab in the IP details page for a specific IP shows all available data in one place.&lt;br /&gt;
# [[IP module#Connections tab|IP connection]]The IP connection list also shows the application time values for each individual connection, summarized as a maximum of each value in case multiple transactions happen within a connection&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
# The TCP application time is only measured for TCP connections with TCP handshake. That means, connections for which no handshake has been seen, no results are available.&lt;br /&gt;
# Data transfer times can only be measured for at least two consecutive data packets. So for single packet request/responses, no data transfer time is available, yet the total request response time will still cover the whole time between request and response.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Back-in-Time_functionality&amp;diff=4830</id>
		<title>Back-in-Time functionality</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Back-in-Time_functionality&amp;diff=4830"/>
		<updated>2024-08-08T10:49:50Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Allegro Network Multimeter allows for accessing older data to debug network issues that happen sporadically or are already over. &lt;br /&gt;
&lt;br /&gt;
On the top bar you see either a green &#039;&#039;&#039;LIVE&#039;&#039;&#039; box or a red &#039;&#039;&#039;back-in-time&#039;&#039;&#039; box indicate whether live data is shown are (fixed) data from the past. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|&lt;br /&gt;
: [[File:time_dropdown_unselected.png|430px|Selecting time span|border]] :[[File:time_dropdown_set.png|500px|Selecting time span|border]]&lt;br /&gt;
|}&lt;br /&gt;
In the latter mode, the start and end time is shown as well.&lt;br /&gt;
&lt;br /&gt;
You can click into any history graph shown in the web interface to go back to the corresponding time under the mouse pointer. &lt;br /&gt;
&lt;br /&gt;
The time window is also halved on every click to be able to zoom into specific network events.&lt;br /&gt;
&lt;br /&gt;
A lot of data is available for any specific time frame, such as the amount of traffic processed for an IP address. &lt;br /&gt;
&lt;br /&gt;
But not every single data set is available in the &#039;&#039;&#039;back-in-time&#039;&#039;&#039; view due to memory constraints to store all data. &lt;br /&gt;
&lt;br /&gt;
Also, the resolution of data decreases with new data arriving. &lt;br /&gt;
&lt;br /&gt;
For instance, data for the last minute is always available in one second resolution, while older data might be only available in two second resolution or larger. &lt;br /&gt;
&lt;br /&gt;
Network problems within smaller time spans can still be debugged since absolute counters will still show any network traffic happened between time intervals.&lt;br /&gt;
&lt;br /&gt;
The time constraints applied depend on the context of the data. For instance, IP lists are filtered so that only IPs that had activity before and after the time window. &lt;br /&gt;
&lt;br /&gt;
IPs that are not active during the time window are not shown.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;back-in-time&#039;&#039;&#039; mode can be exited by clicking on the red &#039;&#039;&#039;back-in-time&#039;&#039;&#039; box on the top of the web interface. The Allegro Network Multimeter will switch back to the live view.&lt;br /&gt;
&lt;br /&gt;
Note that even in &#039;&#039;&#039;back-in-time&#039;&#039;&#039; mode, the device still measures every packet going through it so you will not miss any data.&lt;br /&gt;
&lt;br /&gt;
=== Data not available in back-in-time mode ===&lt;br /&gt;
Some data is not available for a specific time period in the back-in-time mode, but only as a total value since the start of the measurement.&lt;br /&gt;
&lt;br /&gt;
The web interface highlights all data that is not available with a Gray background. &lt;br /&gt;
&lt;br /&gt;
This allows to still read the data while still knowing which data is from the time window and which data comes from the latest measurements.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&amp;lt;u&amp;gt;Example:&amp;lt;/u&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The global TCP handshake in the [[TCP module]] reflects the total average in live mode, while it shows the average during the selected time period in back-in-time mode. But the server classification into high/normal/low is only available as a total value for the whole runtime and is there shown in gray.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Back-in-Time_functionality&amp;diff=4829</id>
		<title>Back-in-Time functionality</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Back-in-Time_functionality&amp;diff=4829"/>
		<updated>2024-08-08T10:45:38Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Allegro Network Multimeter allows for accessing older data to debug network issues that happen sporadically or are already over. &lt;br /&gt;
&lt;br /&gt;
On the top bar you see either a green &#039;&#039;&#039;LIVE&#039;&#039;&#039; box or a red &#039;&#039;&#039;back-in-time&#039;&#039;&#039; box indicate whether live data is shown are (fixed) data from the past. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|&lt;br /&gt;
: [[File:time_dropdown_unselected.png|430px|Selecting time span|border]] :[[File:time_dropdown_set.png|500px|Selecting time span|border]]&lt;br /&gt;
|}&lt;br /&gt;
In the latter mode, the start and end time is shown as well.&lt;br /&gt;
&lt;br /&gt;
You can click into any history graph shown in the web interface to go back to the corresponding time under the mouse pointer. &lt;br /&gt;
&lt;br /&gt;
The time window is also halved on every click to be able to zoom into specific network events.&lt;br /&gt;
&lt;br /&gt;
A lot of data is available for any specific time frame, such as the amount of traffic processed for an IP address. &lt;br /&gt;
&lt;br /&gt;
But not every single data set is available in the &#039;&#039;&#039;back-in-time&#039;&#039;&#039; view due to memory constraints to store all data. &lt;br /&gt;
&lt;br /&gt;
Also, the resolution of data decreases with new data arriving. &lt;br /&gt;
&lt;br /&gt;
For instance, data for the last minute is always available in one second resolution, while older data might be only available in two second resolution or larger. &lt;br /&gt;
&lt;br /&gt;
Network problems within smaller time spans can still be debugged since absolute counters will still show any network traffic happened between time intervals.&lt;br /&gt;
&lt;br /&gt;
The time constraints applied depend on the context of the data. For instance, IP lists are filtered so that only IPs that had activity before and after the time window. &lt;br /&gt;
&lt;br /&gt;
IPs that are not active during the time window are not shown.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;back-in-time&#039;&#039;&#039; mode can be exited by clicking on the red &#039;&#039;&#039;back-in-time&#039;&#039;&#039; box on the top of the web interface. The Allegro Network Multimeter will switch back to the live view.&lt;br /&gt;
&lt;br /&gt;
Note that even in &#039;&#039;&#039;back-in-time&#039;&#039;&#039; mode, the device still measures every packet going through it so you will not miss any data.&lt;br /&gt;
&lt;br /&gt;
=== Data not available in back-in-time mode ===&lt;br /&gt;
Some data is not available for a specific time period in the back-in-time mode, but only as a total value since the start of the measurement.&lt;br /&gt;
&lt;br /&gt;
The web interface highlights all data that is not available with a Gray background. &lt;br /&gt;
&lt;br /&gt;
This allows to still read the data while still knowing which data is from the time window and which data comes from the latest measurements.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=4827</id>
		<title>Longterm DB</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Longterm_DB&amp;diff=4827"/>
		<updated>2024-08-06T07:22:24Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Description==&lt;br /&gt;
The Longterm DB feature (in firmware &amp;gt;= 4.3) uses an attached storage devices to store traffic information of IP addresses with low resolution for a much longer time than the live statistics.&lt;br /&gt;
&lt;br /&gt;
The stored data comprises the IP addresses and their traffic data in graphical representation with 5 minutes resolution. &lt;br /&gt;
&lt;br /&gt;
The storage is used similar to a swap file mechanism so the longterm data is not kept between restart unless the [[DB persistence]] feature is enabled too, which is recommended when using the longterm feature. To reduce the amount of time to dump/restore, the DB persistence configuration allow to skip storing live data. &lt;br /&gt;
&lt;br /&gt;
==Usage==&lt;br /&gt;
[[File:Longterm DB dashboard.png|alt=Longterm DB activated dashboard|thumb|Longterm DB activated dashboard]]If this feature is enabled, a view toggle button appears in the top menu bar. This button allows to switch between the &amp;quot;LIVE&amp;quot; view and the longterm (&amp;quot;LT&amp;quot;) view.&lt;br /&gt;
&lt;br /&gt;
In the longterm view, the IP address information contain only information about the traffic amount in 5 minute resolution.&lt;br /&gt;
&lt;br /&gt;
Other data is still shown if available from the live data base. To highlight the difference, the live graphs are shown in light gray background (and a larger gray background indicates the limit of back-in-time view in the live data).&lt;br /&gt;
&lt;br /&gt;
The example screenshot to the right shows the differences. The IP addresses are available for multiple days, while the MAC address and L7 protocol data comes from the live data and is only available for a few hours.&lt;br /&gt;
&lt;br /&gt;
Having both data views available at the same time helps to navigate through the time and directly see which kind of data is available.&lt;br /&gt;
&lt;br /&gt;
==Setting==&lt;br /&gt;
The configuration can be found in the global settings page in the &amp;quot;Longterm DB&amp;quot; tab.&lt;br /&gt;
&lt;br /&gt;
To enable this feature, select a storage device to be used, enable the feature and enter a file size. &lt;br /&gt;
&lt;br /&gt;
It is recommended to also enable the [[DB persistence]] feature to be able to save and restore the longterm DB data during restarts.&lt;br /&gt;
&lt;br /&gt;
Once enabled, the utilization of the file is shown and the [[System Info Page]] contains information about how long the data can be kept.&lt;br /&gt;
&lt;br /&gt;
Tip: Since the amount of information stored in the longterm DB is limited by the graph resolution, the file size usually don&#039;t need to be similar sized as the main memory. 10 GByte is a good starting point.&lt;br /&gt;
&lt;br /&gt;
The size can be increase but it requires a restart of the packet processing.&lt;br /&gt;
&lt;br /&gt;
[[File:Longterm db settings.png|thumb|Longterm DB settings]]&lt;br /&gt;
&lt;br /&gt;
== Notes ==&lt;br /&gt;
Recommended storage device types:&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Storage device&lt;br /&gt;
!Note&lt;br /&gt;
|-&lt;br /&gt;
|NMVe based SSD&lt;br /&gt;
|recommended&lt;br /&gt;
|-&lt;br /&gt;
|SATA based SSD&lt;br /&gt;
|can be used for moderate traffic, check system load for high system utilization&lt;br /&gt;
|-&lt;br /&gt;
|USB based SSD&lt;br /&gt;
|not recommended, but might be useful for small systems (Allegro 200/500)&lt;br /&gt;
|-&lt;br /&gt;
|HDD&lt;br /&gt;
|not recommended, should not be used&lt;br /&gt;
|}&lt;br /&gt;
It is also not recommended to place the longterm DB on the same storage device that is used a packet ring buffer as it will deteriorate the performance of both features.&lt;br /&gt;
&lt;br /&gt;
== Limitations ==&lt;br /&gt;
&lt;br /&gt;
# The data in the longterm DB comprises the following information:&lt;br /&gt;
## IP addresses&lt;br /&gt;
### activity time&lt;br /&gt;
### traffic graph in 5 minute resolution&lt;br /&gt;
# The data is written into the longterm DB in variable intervals depending on traffic and system load. It takes up to 10 minutes (two graph intervals) until the data appears in the graph. Therefore, the last 5-10 minutes appear empty or with less traffic than in live view.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Main_Page&amp;diff=4826</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Main_Page&amp;diff=4826"/>
		<updated>2024-08-06T06:54:02Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
{|&lt;br /&gt;
|[[Image:Combination mark transparent.png|300px|link=https://www.allegro-packets.com]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;This is the Allegro Network Multimeter manual. Please visit the website of [https://allegro-packets.com Allegro Packets] for more information about the product.&#039;&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;color:black; background-color:#ffdda3;&amp;quot;&lt;br /&gt;
|Translation: Document language is English, but you can use [https://translate.google.com/translate?u=allegro-packets.com/wiki automatic Google translation] into your language!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;mainpage_row&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
=== Installation ===&lt;br /&gt;
* [[Generic Allegro Network Multimeter installation|Generic Allegro Network Multimeter installation guides]]&lt;br /&gt;
* Additional installation notes for specific devices:&lt;br /&gt;
** [[Allegro 200 series]]&lt;br /&gt;
* [[Management interface settings|Configure Management IP address]]&lt;br /&gt;
* [[IPMI KVM on Allegro series 1000+]]&lt;br /&gt;
* [[User Management|Multi users and permissions]]&lt;br /&gt;
* [[Firmware update]]&lt;br /&gt;
* [[Performing a factory reset or configuration reset]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Typical Installation Setups ===&lt;br /&gt;
* [[In-Line Installation|In-Line Installation Guide]]&lt;br /&gt;
* [[Mirror Port, TAP and Packet Broker Installation|Mirror Port, TAP and Packet Broker Installation Guide]]&lt;br /&gt;
* [[ERSPAN Installation|ERSPAN Installation Guide]]&lt;br /&gt;
* [[VMWare Workstation Player/Pro Installation Guide]]&lt;br /&gt;
* [[VMWare ESXI Installation Guide]]&lt;br /&gt;
* [[Hyper-V Installation Guide]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
=== Configuration Guides ===&lt;br /&gt;
* [[Ring Buffer Configuration Guide]] &amp;lt;br/&amp;gt; ( Single Storage Device, Multiple Disks,... )&lt;br /&gt;
* [[Parallel packet processing|Parallel Packet Processing Configuration Guide]]&lt;br /&gt;
* [[Virtual Link Group Configuration Guide]]&lt;br /&gt;
* [[Multi-device settings|Multi-Allegro Configuration]]&lt;br /&gt;
&amp;lt;!-- * [[Remote Capture Configuration]] --&amp;gt;&lt;br /&gt;
* [[Performance Optimization Guide]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;mainpage_row&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Web Interface / Dashboard Manual ===&lt;br /&gt;
* [[Introduction]] &lt;br /&gt;
* [[Quickstart]] &lt;br /&gt;
* [[Usage]] &lt;br /&gt;
* [[Measurement modules]]&lt;br /&gt;
* [[Info Menu]]&lt;br /&gt;
* [[Settings]] &lt;br /&gt;
* [[User Profile Settings]]&lt;br /&gt;
* [[FAQ|FAQ - Frequently Asked Questions]]&lt;br /&gt;
* [[Error descriptions]]&lt;br /&gt;
* [[Feature documentation]] &lt;br /&gt;
* [[Reports]] &lt;br /&gt;
* [[Speedtest]] &lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Use Cases ===&lt;br /&gt;
* [[Investigate Network Load ]]&lt;br /&gt;
* [[Forensic pcap Analysis ]]&lt;br /&gt;
* [[Find Profinet problems]]&lt;br /&gt;
* [[Network Burst Analysis]]&lt;br /&gt;
* [[Burst analysis on a Mirror or Packet Broker input]]&lt;br /&gt;
* [[Capturing]]&lt;br /&gt;
* [[Analyze connections between remote sites]]&lt;br /&gt;
* [[Debugging Skype Traffic|Troubleshooting Microsoft Teams and Skype]]&lt;br /&gt;
* [[USB Presenter Capture]]&lt;br /&gt;
* [[VoIP monitoring and troubleshooting]]&lt;br /&gt;
* [[Generic troubleshooting processes|Generic troubleshooting process]]&lt;br /&gt;
* [[Process traffic capture from remote device]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Data export and third-party tools===&lt;br /&gt;
* [[REST API description]]&lt;br /&gt;
*[[Statistics Export via POST]]&lt;br /&gt;
*[[SNMP]]&lt;br /&gt;
*[[NetFlow/IPFIX interface]]&lt;br /&gt;
*[[Public limited statistics]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;mainpage_row&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remote access===&lt;br /&gt;
&lt;br /&gt;
*[[Using the Allegro Remote Service]]&lt;br /&gt;
*[[Self-hosted SSH Proxy]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
===Settings ===&lt;br /&gt;
&lt;br /&gt;
*[[ Global settings]]&lt;br /&gt;
*[[ Module settings]]&lt;br /&gt;
* [[ User defined names]]&lt;br /&gt;
* [[ Management interface settings]]&lt;br /&gt;
*[[ Multi-device settings]]&lt;br /&gt;
*[[ Virtual_Link_Group_functionality | Virtual link groups]]&lt;br /&gt;
*[[ Administration]]&lt;br /&gt;
*[[ Ingress filter]]&lt;br /&gt;
* [[ Remote access and export]]&lt;br /&gt;
* [[WiFi]]&lt;br /&gt;
*[[ User Management]]&lt;br /&gt;
*[[ Firmware update]]&lt;br /&gt;
*[[ License upload]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Getting support===&lt;br /&gt;
&lt;br /&gt;
*[[Reaching Allegro Packets Support]]&lt;br /&gt;
*[[Reporting Bugs]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;mainpage_row&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Support of third-party hardware===&lt;br /&gt;
&lt;br /&gt;
*[[List of Supported Transceiver Modules]]&lt;br /&gt;
*[[Supported Storage Devices for x300/x400/x500 Series]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Additional resources===&lt;br /&gt;
*[[Device icons|Pictograms/Icons/Stencils for all Allegro models]]&lt;br /&gt;
*[[Supported protocols]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Process_traffic_capture_from_remote_device&amp;diff=4825</id>
		<title>Process traffic capture from remote device</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Process_traffic_capture_from_remote_device&amp;diff=4825"/>
		<updated>2024-08-06T06:52:55Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
The Allegro Network Multimeter can also be switched into a special mode to receive pcap stream via TCP from any remote device. &lt;br /&gt;
It is possible to process plain pcap files or use an additional tool to capture traffic and send it to the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
This mode can be enabled or disabled, and if enabled, the port for receive packet streams can be configured. Be aware that this port is plain unencrypted TCP!&lt;br /&gt;
&lt;br /&gt;
If changes to these settings are made, a restart of the measurement application is required, which can be done in the Administration page.&lt;br /&gt;
&lt;br /&gt;
Every pcap file streamed to the TCP socket will be processed as it would be analysed locally from a connected storage device. &lt;br /&gt;
Up to 16 connections can be used simultaneously. &lt;br /&gt;
Since the internal clock depends on the packet time, all clocks of the sources should be (almost) synchronous (for example by using NTP time synchronization). &lt;br /&gt;
&lt;br /&gt;
To analyze a bunch of files chronologically, stream the files one at a time to the Multimeter.&lt;br /&gt;
The timestamps of the actual packets are used for the internal time clock of the Allegro Network Multimeter so network problems and events can be traced back to the actual time they happened.&lt;br /&gt;
&lt;br /&gt;
The clock of multiple files should not run backwards, i.e. when a file from an older capture time is processed after a file from a newer capture time. &lt;br /&gt;
If such files need to be analyzed, the measurement core should be started via the Administration page.&lt;br /&gt;
&lt;br /&gt;
The [[System Info Page]] shows the current packet processing mode, indicating whether live traffic from local network interface is processed, live traffic from the TCP port, or a pcap file from the storage device is analyzed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Web Interface&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[File:Process traffic capture from remote device.png|600px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==  Receive packets from remote capture device ==&lt;br /&gt;
&lt;br /&gt;
=== Example uses ===&lt;br /&gt;
&lt;br /&gt;
The capturing tool can be downloaded from the &#039;&#039;&#039;Remote packets&#039;&#039;&#039; page in the &#039;&#039;&#039;Generic&#039;&#039;&#039; section. The tool allows to capture packets from any or a specific network device, and also to stream a file to the Allegro Network Manager:&lt;br /&gt;
&lt;br /&gt;
* Processing a local pcap file:&lt;br /&gt;
&lt;br /&gt;
 ./ap_capture_to_remote -f trace.pcap allegro-mm-abcd 8001&lt;br /&gt;
&lt;br /&gt;
* Live-capture from eth0:&lt;br /&gt;
&lt;br /&gt;
 sudo ./ap_capture_to_remote -i eth0 allegro-mm-abcd 8001&lt;br /&gt;
    &lt;br /&gt;
or permit access to network interfaces only instead of full root permissions:&lt;br /&gt;
    &lt;br /&gt;
 sudo setcap cap_net_raw=ep ap_capture_to_remote&lt;br /&gt;
 ./ap_capture_to_remote -i eth0 allegro-mm-abcd 8001&lt;br /&gt;
&lt;br /&gt;
* Live-capture from all network devices:&lt;br /&gt;
 sudo ./ap_capture_to_remote allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
In all examples, host and port number must be set according to the actual Allegro Network Multimeter device and the configured port number.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[File:Process traffic capture from remote device1.png|1000px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Alternative tools===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter also accepts plain pcap files on the configured port. &lt;br /&gt;
That means it is possible to stream files to the device or use tcpdump with additional filters.&lt;br /&gt;
&lt;br /&gt;
Example uses are:&lt;br /&gt;
&lt;br /&gt;
*Processing a local pcap file:&lt;br /&gt;
&lt;br /&gt;
 cat trace.pcap | netcat allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
*Live-capture via tcpdump:&lt;br /&gt;
 &lt;br /&gt;
 sudo tcpdump -i eth0 -s 0 -U -w /dev/stdout | netcat allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
==Remote capture via ERSPAN==&lt;br /&gt;
&lt;br /&gt;
The capturing tool also supports sending the packets as ERSPAN-wrapped packets. This mode is used with the `-e` flag (which needs an ERSPAN session ID as a parameter). If this mode is used, the port doesn&#039;t need to be specified anymore.&lt;br /&gt;
 sudo ./ap_capture_to_remote -e 123 1.2.3.4&lt;br /&gt;
In this mode, the [[ERSPAN Installation|endpopint mode for ERSPAN]] must be enabled and configured for the same IP as used in the ap_capture_to_remote command line argument.&lt;br /&gt;
&lt;br /&gt;
Note that the IP address used is NOT the address or name of the management, but the separate IP address that is only valid on the interface for which the endpoint mode is configured.&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Process_traffic_capture_from_remote_device&amp;diff=4824</id>
		<title>Process traffic capture from remote device</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Process_traffic_capture_from_remote_device&amp;diff=4824"/>
		<updated>2024-08-06T06:51:58Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Allegro Network Multimeter can also be switched into a special mode to receive pcap stream via TCP from any remote device. &lt;br /&gt;
It is possible to process plain pcap files or use an additional tool to capture traffic and send it to the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
This mode can be enabled or disabled, and if enabled, the port for receive packet streams can be configured. Be aware that this port is plain unencrypted TCP!&lt;br /&gt;
&lt;br /&gt;
If changes to these settings are made, a restart of the measurement application is required, which can be done in the Administration page.&lt;br /&gt;
&lt;br /&gt;
Every pcap file streamed to the TCP socket will be processed as it would be analysed locally from a connected storage device. &lt;br /&gt;
Up to 16 connections can be used simultaneously. &lt;br /&gt;
Since the internal clock depends on the packet time, all clocks of the sources should be (almost) synchronous (for example by using NTP time synchronization). &lt;br /&gt;
&lt;br /&gt;
To analyze a bunch of files chronologically, stream the files one at a time to the Multimeter.&lt;br /&gt;
The timestamps of the actual packets are used for the internal time clock of the Allegro Network Multimeter so network problems and events can be traced back to the actual time they happened.&lt;br /&gt;
&lt;br /&gt;
The clock of multiple files should not run backwards, i.e. when a file from an older capture time is processed after a file from a newer capture time. &lt;br /&gt;
If such files need to be analyzed, the measurement core should be started via the Administration page.&lt;br /&gt;
&lt;br /&gt;
The [[System Info Page]] shows the current packet processing mode, indicating whether live traffic from local network interface is processed, live traffic from the TCP port, or a pcap file from the storage device is analyzed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Web Interface&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[File:Process traffic capture from remote device.png|600px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==  Receive packets from remote capture device ==&lt;br /&gt;
&lt;br /&gt;
=== Example uses ===&lt;br /&gt;
&lt;br /&gt;
The capturing tool can be downloaded from the &#039;&#039;&#039;Remote packets&#039;&#039;&#039; page in the &#039;&#039;&#039;Generic&#039;&#039;&#039; section. The tool allows to capture packets from any or a specific network device, and also to stream a file to the Allegro Network Manager:&lt;br /&gt;
&lt;br /&gt;
* Processing a local pcap file:&lt;br /&gt;
&lt;br /&gt;
 ./ap_capture_to_remote -f trace.pcap allegro-mm-abcd 8001&lt;br /&gt;
&lt;br /&gt;
* Live-capture from eth0:&lt;br /&gt;
&lt;br /&gt;
 sudo ./ap_capture_to_remote -i eth0 allegro-mm-abcd 8001&lt;br /&gt;
    &lt;br /&gt;
or permit access to network interfaces only instead of full root permissions:&lt;br /&gt;
    &lt;br /&gt;
 sudo setcap cap_net_raw=ep ap_capture_to_remote&lt;br /&gt;
 ./ap_capture_to_remote -i eth0 allegro-mm-abcd 8001&lt;br /&gt;
&lt;br /&gt;
* Live-capture from all network devices:&lt;br /&gt;
 sudo ./ap_capture_to_remote allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
In all examples, host and port number must be set according to the actual Allegro Network Multimeter device and the configured port number.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[File:Process traffic capture from remote device1.png|1000px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Alternative tools===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter also accepts plain pcap files on the configured port. &lt;br /&gt;
That means it is possible to stream files to the device or use tcpdump with additional filters.&lt;br /&gt;
&lt;br /&gt;
Example uses are:&lt;br /&gt;
&lt;br /&gt;
*Processing a local pcap file:&lt;br /&gt;
&lt;br /&gt;
 cat trace.pcap | netcat allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
*Live-capture via tcpdump:&lt;br /&gt;
 &lt;br /&gt;
 sudo tcpdump -i eth0 -s 0 -U -w /dev/stdout | netcat allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
==Remote capture via ERSPAN==&lt;br /&gt;
&lt;br /&gt;
The capturing tool also supports sending the packets as ERSPAN-wrapped packets. This mode is used with the `-e` flag (which needs an ERSPAN session ID as a parameter). If this mode is used, the port doesn&#039;t need to be specified anymore.&lt;br /&gt;
 sudo ./ap_capture_to_remote -e 123 1.2.3.4&lt;br /&gt;
In this mode, the [[ERSPAN Installation|endpopint mode for ERSPAN]] must be enabled and configured for the same IP as used in the ap_capture_to_remote command line argument.&lt;br /&gt;
&lt;br /&gt;
Note that the IP address used is NOT the address or name of the management, but the separate IP address that is only valid on the interface for which the endpoint mode is configured.&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Process_traffic_capture_from_remote_device&amp;diff=4823</id>
		<title>Process traffic capture from remote device</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Process_traffic_capture_from_remote_device&amp;diff=4823"/>
		<updated>2024-08-06T06:51:24Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Allegro Network Multimeter can also be switched into a special mode to receive pcap stream via TCP from any remote device. &lt;br /&gt;
It is possible to process plain pcap files or use an additional tool to capture traffic and send it to the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
This mode can be enabled or disabled, and if enabled, the port for receive packet streams can be configured. Be aware that this port is plain unencrypted TCP!&lt;br /&gt;
&lt;br /&gt;
If changes to these settings are made, a restart of the measurement application is required, which can be done in the Administration page.&lt;br /&gt;
&lt;br /&gt;
Every pcap file streamed to the TCP socket will be processed as it would be analysed locally from a connected storage device. &lt;br /&gt;
Up to 16 connections can be used simultaneously. &lt;br /&gt;
Since the internal clock depends on the packet time, all clocks of the sources should be (almost) synchronous (for example by using NTP time synchronization). &lt;br /&gt;
&lt;br /&gt;
To analyze a bunch of files chronologically, stream the files one at a time to the Multimeter.&lt;br /&gt;
The timestamps of the actual packets are used for the internal time clock of the Allegro Network Multimeter so network problems and events can be traced back to the actual time they happened.&lt;br /&gt;
&lt;br /&gt;
The clock of multiple files should not run backwards, i.e. when a file from an older capture time is processed after a file from a newer capture time. &lt;br /&gt;
If such files need to be analyzed, the measurement core should be started via the Administration page.&lt;br /&gt;
&lt;br /&gt;
The [[System Info Page]] shows the current packet processing mode, indicating whether live traffic from local network interface is processed, live traffic from the TCP port, or a pcap file from the storage device is analyzed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Web Interface&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[File:Process traffic capture from remote device.png|600px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==  Receive packets from remote capture device ==&lt;br /&gt;
&lt;br /&gt;
=== Example uses ===&lt;br /&gt;
&lt;br /&gt;
The capturing tool can be downloaded from the &#039;&#039;&#039;Remote packets&#039;&#039;&#039; page in the &#039;&#039;&#039;Generic&#039;&#039;&#039; section. The tool allows to capture packets from any or a specific network device, and also to stream a file to the Allegro Network Manager:&lt;br /&gt;
&lt;br /&gt;
* Processing a local pcap file:&lt;br /&gt;
&lt;br /&gt;
 ./ap_capture_to_remote -f trace.pcap allegro-mm-abcd 8001&lt;br /&gt;
&lt;br /&gt;
* Live-capture from eth0:&lt;br /&gt;
&lt;br /&gt;
 sudo ./ap_capture_to_remote -i eth0 allegro-mm-abcd 8001&lt;br /&gt;
    &lt;br /&gt;
or permit access to network interfaces only instead of full root permissions:&lt;br /&gt;
    &lt;br /&gt;
 sudo setcap cap_net_raw=ep ap_capture_to_remote&lt;br /&gt;
 ./ap_capture_to_remote -i eth0 allegro-mm-abcd 8001&lt;br /&gt;
&lt;br /&gt;
* Live-capture from all network devices:&lt;br /&gt;
 sudo ./ap_capture_to_remote allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
In all examples, host and port number must be set according to the actual Allegro Network Multimeter device and the configured port number.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[File:Process traffic capture from remote device1.png|1000px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Alternative tools===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter also accepts plain pcap files on the configured port. &lt;br /&gt;
That means it is possible to stream files to the device or use tcpdump with additional filters.&lt;br /&gt;
&lt;br /&gt;
Example uses are:&lt;br /&gt;
&lt;br /&gt;
*Processing a local pcap file:&lt;br /&gt;
&lt;br /&gt;
 cat trace.pcap | netcat allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
*Live-capture via tcpdump:&lt;br /&gt;
 &lt;br /&gt;
 sudo tcpdump -i eth0 -s 0 -U -w /dev/stdout | netcat allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
==Remote capture via ERSPAN==&lt;br /&gt;
&lt;br /&gt;
The capturing tool also supports sending the packets as ERSPAN-wrapped packets. This mode is used with the `-e` flag (which needs an ERSPAN session ID as a parameter). If this mode is used, the port doesn&#039;t need to be specified anymore.&lt;br /&gt;
 sudo ./ap_capture_to_remote -e 123 1.2.3.4&lt;br /&gt;
In this mode, the [[ERSPAN Installation|endpopint mode for ERSPAN]] must be enabled and configured for the same IP as used in the ap_capture_to_remote command line argument.&lt;br /&gt;
&lt;br /&gt;
Note that the IP address used is NOT the address or name of the management, but the separate IP address that is only valid on the interface for which the endpoint mode is configured.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Process_traffic_capture_from_remote_device&amp;diff=4822</id>
		<title>Process traffic capture from remote device</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Process_traffic_capture_from_remote_device&amp;diff=4822"/>
		<updated>2024-08-06T06:48:58Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Allegro Network Multimeter can also be switched into a special mode to receive pcap stream via TCP from any remote device. &lt;br /&gt;
It is possible to process plain pcap files or use an additional tool to capture traffic and send it to the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
This mode can be enabled or disabled, and if enabled, the port for receive packet streams can be configured. Be aware that this port is plain unencrypted TCP!&lt;br /&gt;
&lt;br /&gt;
If changes to these settings are made, a restart of the measurement application is required, which can be done in the Administration page.&lt;br /&gt;
&lt;br /&gt;
Every pcap file streamed to the TCP socket will be processed as it would be analysed locally from a connected storage device. &lt;br /&gt;
Up to 16 connections can be used simultaneously. &lt;br /&gt;
Since the internal clock depends on the packet time, all clocks of the sources should be (almost) synchronous (for example by using NTP time synchronization). &lt;br /&gt;
&lt;br /&gt;
To analyze a bunch of files chronologically, stream the files one at a time to the Multimeter.&lt;br /&gt;
The timestamps of the actual packets are used for the internal time clock of the Allegro Network Multimeter so network problems and events can be traced back to the actual time they happened.&lt;br /&gt;
&lt;br /&gt;
The clock of multiple files should not run backwards, i.e. when a file from an older capture time is processed after a file from a newer capture time. &lt;br /&gt;
If such files need to be analyzed, the measurement core should be started via the Administration page.&lt;br /&gt;
&lt;br /&gt;
The [[System Info Page]] shows the current packet processing mode, indicating whether live traffic from local network interface is processed, live traffic from the TCP port, or a pcap file from the storage device is analyzed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Web Interface&#039;&#039;&#039;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[File:Process traffic capture from remote device.png|600px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==  Receive packets from remote capture device ==&lt;br /&gt;
&lt;br /&gt;
=== Example uses ===&lt;br /&gt;
&lt;br /&gt;
The capturing tool can be downloaded from the &#039;&#039;&#039;Remote packets&#039;&#039;&#039; page in the &#039;&#039;&#039;Generic&#039;&#039;&#039; section. The tool allows to capture packets from any or a specific network device, and also to stream a file to the Allegro Network Manager:&lt;br /&gt;
&lt;br /&gt;
* Processing a local pcap file:&lt;br /&gt;
&lt;br /&gt;
 ./ap_capture_to_remote -f trace.pcap allegro-mm-abcd 8001&lt;br /&gt;
&lt;br /&gt;
* Live-capture from eth0:&lt;br /&gt;
&lt;br /&gt;
 sudo ./ap_capture_to_remote -i eth0 allegro-mm-abcd 8001&lt;br /&gt;
    &lt;br /&gt;
or permit access to network interfaces only instead of full root permissions:&lt;br /&gt;
    &lt;br /&gt;
 sudo setcap cap_net_raw=ep ap_capture_to_remote&lt;br /&gt;
 ./ap_capture_to_remote -i eth0 allegro-mm-abcd 8001&lt;br /&gt;
&lt;br /&gt;
* Live-capture from all network devices:&lt;br /&gt;
 sudo ./ap_capture_to_remote allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
In all examples, host and port number must be set according to the actual Allegro Network Multimeter device and the configured port number.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[File:Process traffic capture from remote device1.png|1000px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Alternative tools===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter also accepts plain pcap files on the configured port. &lt;br /&gt;
That means it is possible to stream files to the device or use tcpdump with additional filters.&lt;br /&gt;
&lt;br /&gt;
Example uses are:&lt;br /&gt;
&lt;br /&gt;
*Processing a local pcap file:&lt;br /&gt;
&lt;br /&gt;
 cat trace.pcap | netcat allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
*Live-capture via tcpdump:&lt;br /&gt;
 &lt;br /&gt;
 sudo tcpdump -i eth0 -s 0 -U -w /dev/stdout | netcat allegro-mm-abcd 1234&lt;br /&gt;
&lt;br /&gt;
==Remote capture via ERSPAN==&lt;br /&gt;
&lt;br /&gt;
The capturing tool also supports sending the packets as ERSPAN-wrapped packets. This mode is used with the `-e` flag (which needs an ERSPAN session ID as a parameter). If this mode is used, the port doesn&#039;t need to be specified anymore.&lt;br /&gt;
 sudo ./ap_capture_to_remote -e 123 1.2.3.4&lt;br /&gt;
In this mode, the [[ERSPAN Installation|endpopint mode for ERSPAN]] must be enabled and configured for the same IP as used in the ap_capture_to_remote command line argument.&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Main_Page&amp;diff=4821</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Main_Page&amp;diff=4821"/>
		<updated>2024-08-05T11:34:59Z</updated>

		<summary type="html">&lt;p&gt;Ralf: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
{|&lt;br /&gt;
|[[Image:Combination mark transparent.png|300px|link=https://www.allegro-packets.com]]&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;This is the Allegro Network Multimeter manual. Please visit the website of [https://allegro-packets.com Allegro Packets] for more information about the product.&#039;&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;color:black; background-color:#ffdda3;&amp;quot;&lt;br /&gt;
|Translation: Document language is English, but you can use [https://translate.google.com/translate?u=allegro-packets.com/wiki automatic Google translation] into your language!&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;mainpage_row&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
=== Installation ===&lt;br /&gt;
* [[Generic Allegro Network Multimeter installation|Generic Allegro Network Multimeter installation guides]]&lt;br /&gt;
* Additional installation notes for specific devices:&lt;br /&gt;
** [[Allegro 200 series]]&lt;br /&gt;
* [[Management interface settings|Configure Management IP address]]&lt;br /&gt;
* [[IPMI KVM on Allegro series 1000+]]&lt;br /&gt;
* [[User Management|Multi users and permissions]]&lt;br /&gt;
* [[Firmware update]]&lt;br /&gt;
* [[Performing a factory reset or configuration reset]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Typical Installation Setups ===&lt;br /&gt;
* [[In-Line Installation|In-Line Installation Guide]]&lt;br /&gt;
* [[Mirror Port, TAP and Packet Broker Installation|Mirror Port, TAP and Packet Broker Installation Guide]]&lt;br /&gt;
* [[ERSPAN Installation|ERSPAN Installation Guide]]&lt;br /&gt;
* [[VMWare Workstation Player/Pro Installation Guide]]&lt;br /&gt;
* [[VMWare ESXI Installation Guide]]&lt;br /&gt;
* [[Hyper-V Installation Guide]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
=== Configuration Guides ===&lt;br /&gt;
* [[Ring Buffer Configuration Guide]] &amp;lt;br/&amp;gt; ( Single Storage Device, Multiple Disks,... )&lt;br /&gt;
* [[Parallel packet processing|Parallel Packet Processing Configuration Guide]]&lt;br /&gt;
* [[Virtual Link Group Configuration Guide]]&lt;br /&gt;
* [[Multi-device settings|Multi-Allegro Configuration]]&lt;br /&gt;
&amp;lt;!-- * [[Remote Capture Configuration]] --&amp;gt;&lt;br /&gt;
* [[Performance Optimization Guide]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;mainpage_row&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Web Interface / Dashboard Manual ===&lt;br /&gt;
* [[Introduction]] &lt;br /&gt;
* [[Quickstart]] &lt;br /&gt;
* [[Usage]] &lt;br /&gt;
* [[Measurement modules]]&lt;br /&gt;
* [[Info Menu]]&lt;br /&gt;
* [[Settings]] &lt;br /&gt;
* [[User Profile Settings]]&lt;br /&gt;
* [[FAQ|FAQ - Frequently Asked Questions]]&lt;br /&gt;
* [[Error descriptions]]&lt;br /&gt;
* [[Feature documentation]] &lt;br /&gt;
* [[Reports]] &lt;br /&gt;
* [[Speedtest]] &lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Use Cases ===&lt;br /&gt;
* [[Investigate Network Load ]]&lt;br /&gt;
* [[Forensic pcap Analysis ]]&lt;br /&gt;
* [[Find Profinet problems]]&lt;br /&gt;
* [[Network Burst Analysis]]&lt;br /&gt;
* [[Burst analysis on a Mirror or Packet Broker input]]&lt;br /&gt;
* [[Capturing]]&lt;br /&gt;
* [[Analyze connections between remote sites]]&lt;br /&gt;
* [[Debugging Skype Traffic|Troubleshooting Microsoft Teams and Skype]]&lt;br /&gt;
* [[USB Presenter Capture]]&lt;br /&gt;
* [[VoIP monitoring and troubleshooting]]&lt;br /&gt;
* [[Generic troubleshooting processes|Generic troubleshooting process]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Data export and third-party tools===&lt;br /&gt;
* [[REST API description]]&lt;br /&gt;
*[[Statistics Export via POST]]&lt;br /&gt;
*[[SNMP]]&lt;br /&gt;
*[[NetFlow/IPFIX interface]]&lt;br /&gt;
*[[Public limited statistics]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;mainpage_row&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Remote access===&lt;br /&gt;
&lt;br /&gt;
*[[Using the Allegro Remote Service]]&lt;br /&gt;
*[[Self-hosted SSH Proxy]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
===Settings ===&lt;br /&gt;
&lt;br /&gt;
*[[ Global settings]]&lt;br /&gt;
*[[ Module settings]]&lt;br /&gt;
* [[ User defined names]]&lt;br /&gt;
* [[ Management interface settings]]&lt;br /&gt;
*[[ Multi-device settings]]&lt;br /&gt;
*[[ Virtual_Link_Group_functionality | Virtual link groups]]&lt;br /&gt;
*[[ Administration]]&lt;br /&gt;
*[[ Ingress filter]]&lt;br /&gt;
* [[ Remote access and export]]&lt;br /&gt;
* [[WiFi]]&lt;br /&gt;
*[[ User Management]]&lt;br /&gt;
*[[ Firmware update]]&lt;br /&gt;
*[[ License upload]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Getting support===&lt;br /&gt;
&lt;br /&gt;
*[[Reaching Allegro Packets Support]]&lt;br /&gt;
*[[Reporting Bugs]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;mainpage_row&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Support of third-party hardware===&lt;br /&gt;
&lt;br /&gt;
*[[List of Supported Transceiver Modules]]&lt;br /&gt;
*[[Supported Storage Devices for x300/x400/x500 Series]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;mainpage_box&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Additional resources===&lt;br /&gt;
*[[Device icons|Pictograms/Icons/Stencils for all Allegro models]]&lt;br /&gt;
*[[Supported protocols]]&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=System_Info_Page&amp;diff=4820</id>
		<title>System Info Page</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=System_Info_Page&amp;diff=4820"/>
		<updated>2024-08-05T11:34:27Z</updated>

		<summary type="html">&lt;p&gt;Ralf: Ralf moved page System Info Page to Info Menu&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Info Menu]]&lt;/div&gt;</summary>
		<author><name>Ralf</name></author>
	</entry>
</feed>