<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://allegro-packets.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Simon</id>
	<title>Allegro Network Multimeter Manual - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://allegro-packets.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Simon"/>
	<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/Special:Contributions/Simon"/>
	<updated>2026-04-22T11:33:51Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.13</generator>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4805</id>
		<title>IP module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4805"/>
		<updated>2024-07-15T11:50:43Z</updated>

		<summary type="html">&lt;p&gt;Simon: /* TCP statistics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The IP module operates on layer 3 of the network stack. It stores information about all IPv4 and IPv6 addresses.&lt;br /&gt;
For every address, the corresponding network traffic is accounted, the used protocols and their individual traffic.&lt;br /&gt;
The communication peers are stored as well as the traffic between both IP addresses. Every connection and its amount of traffic and the protocol can be accessed too.&lt;br /&gt;
&lt;br /&gt;
== Web interface ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[File:IP statistics.png|800px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== IP addresses tab ===&lt;br /&gt;
&lt;br /&gt;
The IP addresses tab shows the complete list of all IP addresses seen by the system. The button row allows for select specific information to be shown or hidden so that only the relevant information fit on the screen. &lt;br /&gt;
By clicking on &#039;&#039;&#039;Counters (combined)&#039;&#039;&#039; the table toggles between sent and received bytes and packets displayed in either one column or in separate columns for sorting purposes.&lt;br /&gt;
For each address, the table contains the following information:&lt;br /&gt;
&lt;br /&gt;
* IP&lt;br /&gt;
:See [[Common table columns#IP|Common table columns - IP]].&lt;br /&gt;
&lt;br /&gt;
* Alternative names&lt;br /&gt;
:See [[Common table columns#Alternative names|Common table columns - Alternative names]].&lt;br /&gt;
:The name information are also used when filtering the table for some entered string.&lt;br /&gt;
&lt;br /&gt;
* Traceroute&lt;br /&gt;
:A traceroute for the IP can be requested or updated using the available button. When traceroute information is available for the IP, brief information about each found network hop (IP, hostname, ping response time) is displayed. Since this list of hops can get very long, the view can be toggled to show all found hops or just the last one by clicking on the traceroute header.&lt;br /&gt;
&lt;br /&gt;
* First (recent) activity&lt;br /&gt;
:See [[Common table columns#First (recent) activity|Common table columns - First (recent) activity]].&lt;br /&gt;
&lt;br /&gt;
* Last activity&lt;br /&gt;
:See [[Common table columns#Last activity|Common table columns - Last activity]].&lt;br /&gt;
&lt;br /&gt;
* Packets and Bytes&lt;br /&gt;
:See [[Common table columns#Packets|Common table columns - Packets]] and [[Common table columns#Bytes|Common table columns - Bytes]].&lt;br /&gt;
&lt;br /&gt;
* Packets/s and Bit/s&lt;br /&gt;
:See [[Common table columns#Packets/s|Common table columns - Packets/s]] and [[Common table columns#Bit/s|Common table columns - Bit/s]].&lt;br /&gt;
&lt;br /&gt;
* Peers&lt;br /&gt;
: This shows the amount of peers of this IP. This counter is an all time only value and does not consider a selected interval.&lt;br /&gt;
&lt;br /&gt;
* TTL&lt;br /&gt;
: This shows the min, max and average TTL value (or hop limit in case of IPv6) of TCP/UDP traffic of an IP address. Non-UDP and non-TCP traffic as well as multicast traffic is ignored as e.g. ICMP packets likely have very high TTL values of 255 at the sender. &lt;br /&gt;
&lt;br /&gt;
* MTU&lt;br /&gt;
: The maximum transmission unit (i.e. layer 2 payload) is calculated for both receive and send direction. The maximum values are displayed.&lt;br /&gt;
&lt;br /&gt;
* TCP packets and UDP packets&lt;br /&gt;
:This is the number of TCP and UDP packets that have been seen for this IP.&lt;br /&gt;
&lt;br /&gt;
* TCP handshake time and TCP data response time&lt;br /&gt;
: The average time for a handshake as a TCP client and/or a TCP server is displayed as well as the average time the IP takes to acknowledge TCP data.&lt;br /&gt;
&lt;br /&gt;
* TCP payload and retransmissions&lt;br /&gt;
:These two columns show the number of bytes transmitted as TCP payload and how many bytes have been retransmitted, indicating a bad connection quality.&lt;br /&gt;
&lt;br /&gt;
* Graph&lt;br /&gt;
:See [[Common table columns#Graph|Common table columns - Graph]].&lt;br /&gt;
:Available data sources are load (bps or packets/s), TCP statistics or connections.&lt;br /&gt;
&lt;br /&gt;
* PCAP&lt;br /&gt;
:See [[Common table columns#PCAP|Common table columns - PCAP]]&lt;br /&gt;
&lt;br /&gt;
When multiple pages are available, there will be a control field for switching pages.&lt;br /&gt;
The IP search bar allows to enter IP addresses or names to see only those element for which the entered string is part of the IP address or name. &lt;br /&gt;
Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for a detailed description about how to use this feature.&lt;br /&gt;
The columns can be sorted also, for example to easily spot the IP addresses with the most bytes, or the highest current throughput.&lt;br /&gt;
&lt;br /&gt;
Below the table a CSV download button provides the ability to download the whole table contents in CSV format.&lt;br /&gt;
Sorting and filtering are applied as selected for the table but all IPs in the table are exported, not only the currently visible page.&lt;br /&gt;
&lt;br /&gt;
=== Global IP statistics tab ===&lt;br /&gt;
&lt;br /&gt;
The global IP statistics shows global sums about the processed IPv4 and IPv6 traffic and often used layer 4 protocols.&lt;br /&gt;
Non-IP packets such as ARP packets are indicated as other traffic and are not covered by this module.&lt;br /&gt;
The available information is:&lt;br /&gt;
* Layer 3 protocols (IPv4, IPv6 and non-IP traffic, its distribution over time and a history graph)&lt;br /&gt;
* Layer 4 protocols (TCP, UDP and traffic for other often used layer 4 protocols, its distribution over time and a history graph)&lt;br /&gt;
* Number of IPv4 fragmented packets (distribution over time and a history graph)&lt;br /&gt;
&lt;br /&gt;
For layer 3 and layer 4 protocols, traffic can be downloaded by clicking on the PCAP download button. The captured packets are not stored on the system but they are directly sent over the HTTP connection to your computer. &lt;br /&gt;
To stop capture, click on the same button again (which turned to a STOP symbol), or go to the capture traffic page in the generic section and stop the corresponding download.&lt;br /&gt;
&lt;br /&gt;
=== Top IP statistics ===&lt;br /&gt;
&lt;br /&gt;
On this page pie charts are shown with the top 10 sending and receiving IP addresses. By clicking on a pie chart section the related IP detail page is opened.&lt;br /&gt;
&lt;br /&gt;
=== Per IP statistics ===&lt;br /&gt;
&lt;br /&gt;
It is possible to select an IP from the list of IP addresses and get an more detailed view of the information stored about that IP.&lt;br /&gt;
The headline of the page includes three buttons.&lt;br /&gt;
The first left arrow button navigates back to the complete IP overview. &lt;br /&gt;
The second download button allows to download the traffic for the current IP address. &lt;br /&gt;
The third button allows for opening this manual section.&lt;br /&gt;
Below the buttons there are two graphs for the packets and bytes sent and received by the IP address.&lt;br /&gt;
The third section contains six tabs for various information about the selected IP.&lt;br /&gt;
&lt;br /&gt;
==== Overview tab ====&lt;br /&gt;
&lt;br /&gt;
This tab summarizes all the standard information from the main IP view, such as&lt;br /&gt;
* the alternative names,&lt;br /&gt;
* the packet and bytes counters, and&lt;br /&gt;
* the current throughput.&lt;br /&gt;
&lt;br /&gt;
Additionally, the top DPI protocols are printed both in the table as well as a pie chart at the bottom of the page.&lt;br /&gt;
The last line in the table shows the MAC addresses seen for this IP address. &lt;br /&gt;
There can be multiple MAC addresses for the same IP, for example if the DHCP reuse the IP address after some time. &lt;br /&gt;
The last new connection time is the start time of the last connection seen for this IP.&lt;br /&gt;
There is also a download button to capture the traffic for the specific IP and MAC address pair.&lt;br /&gt;
The final two rows shows all VLAN tags that have been seen for the given IP. An IP address might be visible in multiple VLANs.&lt;br /&gt;
If the Allegro Network Multimeter is installed at a mirror port of a switch which also modifies the VLAN tag, it might happen that an IP address is seen without a VLAN tag (none) and a specific VLAN tag. &lt;br /&gt;
This setup will decrease the quality of the results as connections use the VLAN information too to distinguish connections. &lt;br /&gt;
The measurement results can be improved if the mirror port is reconfigured to only see traffic with VLAN or completely without VLAN tags.&lt;br /&gt;
The last row shows the devices interfaces at which the IP has been seen. &lt;br /&gt;
The displayed interface always considers the sender side of an IP connection. &lt;br /&gt;
This information helps especially in bridge mode to determine at which side of an link the IP address is visible as sender of packets.&lt;br /&gt;
&lt;br /&gt;
==== Layer 3 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen IP DSCP values for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown DSCP class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific DSCP value.&lt;br /&gt;
&lt;br /&gt;
==== Layer 2 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen MPLS traffic classes and VLAN priority code points for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. &lt;br /&gt;
A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown QoS class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific QoS.&lt;br /&gt;
&lt;br /&gt;
==== Protocols tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists the DPI protocols for the current IP. The download button allows to capture the traffic for the IP and protocol pair.&lt;br /&gt;
&lt;br /&gt;
==== Peers tab ====&lt;br /&gt;
&lt;br /&gt;
The Peers tab shows all communication peers the current IP address has talked to. The table contains the [[Common table columns#IP|IP address]] which can be clicked to see the statistics for that IP.&lt;br /&gt;
The alternative names are shown, depending on which data is available (DNS name, DHCP name, NIC vendor name).&lt;br /&gt;
The packets and bytes columns show the total amount of data transferred between those two IP addresses.&lt;br /&gt;
The list of peers can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Layer 4 endpoints ====&lt;br /&gt;
&lt;br /&gt;
The layer 4 endpoint tab shows all peers of the current IP address and the used server port. If the peer is the server, the port of the peer is shown. If the peer is the client, the other port is shown.&lt;br /&gt;
&lt;br /&gt;
The table shows [[Common table columns#IP|IP addresses]] with port number, whether the peer acts as a server or client, alternative names, layer 4 protocol and byte and packet counters. If there were multiple connection between the IP address and the peer with the same port, the counters will show aggregated data.&lt;br /&gt;
&lt;br /&gt;
When clicking on &amp;quot;Peer connections&amp;quot; the connection tab is opened with the filter set to match that particular endpoint.&lt;br /&gt;
&lt;br /&gt;
==== Connections tab ====&lt;br /&gt;
&lt;br /&gt;
The connection tabs lists all connections which involves the current IP. The button rows allow to select which kind of information should be shown.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Column&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|Client IP/port&lt;br /&gt;
|Client side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Server IP/port&lt;br /&gt;
|Server side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Layer 4 protocol&lt;br /&gt;
|TCP, UDP, or others&lt;br /&gt;
|-&lt;br /&gt;
|Go to&lt;br /&gt;
|allows to go to the connection details page which shows all information in more detail.&lt;br /&gt;
|-&lt;br /&gt;
|Start time&lt;br /&gt;
|The start time is the time of the first packet for that connection.&lt;br /&gt;
|-&lt;br /&gt;
|Last activity&lt;br /&gt;
|shows the time of the last packet seen so far for the connection&lt;br /&gt;
|-&lt;br /&gt;
|Duration&lt;br /&gt;
|Difference between last activity and start time.&lt;br /&gt;
|-&lt;br /&gt;
|Packets&lt;br /&gt;
|Number of packets&lt;br /&gt;
|-&lt;br /&gt;
|Bytes&lt;br /&gt;
|Number of bytes&lt;br /&gt;
|-&lt;br /&gt;
|Packets/s&lt;br /&gt;
|Packet rate&lt;br /&gt;
|-&lt;br /&gt;
|Bit/s&lt;br /&gt;
|Bit rate&lt;br /&gt;
|-&lt;br /&gt;
|MTU&lt;br /&gt;
|The maximum transmission unit (i.e. layer 2 payload) is calculated for both directions.&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 protocol&lt;br /&gt;
|shows the detect application layer 7 protocol.&lt;br /&gt;
|-&lt;br /&gt;
|TCP handshake time&lt;br /&gt;
|The time between SYN and ACK.&lt;br /&gt;
|-&lt;br /&gt;
|TCP response time (max/avg)&lt;br /&gt;
|contains response times for TCP data&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 response time&lt;br /&gt;
|contains response times for the maximum HTTP response for HTTP connections, or the SSL response times for SSL connections. The column also contains a score for this connection and this IP, based on the average response times of the server. See HTTP module and SSL module for additional information. When sorting the column and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
|-&lt;br /&gt;
|TCP retransmissions/TCP restransmission %&lt;br /&gt;
|shows the number of bytes that have been retransmitted on TCP layer because of packet loss. High percentage indicate connection problems for this communication pair.&lt;br /&gt;
|-&lt;br /&gt;
|TCP DUP ACKs&lt;br /&gt;
|Number of DUP ACK packets&lt;br /&gt;
|-&lt;br /&gt;
|TCP missed data&lt;br /&gt;
|shows the estimated amount of TCP data not seen for this connection. See [[TCP module#Missed data|TCP module]] for details about missed data.&lt;br /&gt;
|-&lt;br /&gt;
|TCP SYNs/SYN-ACKs/FINs/RSTs&lt;br /&gt;
|shows the amount of TCP SYN, SYN-ACK, FIN and RST packets per direction. Up to 255 packets can be accounted, if more were seen, &amp;gt;= 255 will be displayed.&lt;br /&gt;
|-&lt;br /&gt;
|TCP end termination reason&lt;br /&gt;
|Connection end can be regular FIN, RST, or timeout if no termination is seen at all&lt;br /&gt;
|-&lt;br /&gt;
|TCP MSS&lt;br /&gt;
|The TCP maximum segment size may be announced by the peers using a TCP option during connection negotiation. If the option is not announced, default values will be used. The values represents the payload capacity of TCP packets sent by the peer.&lt;br /&gt;
|-&lt;br /&gt;
|Max announced TCP window size&lt;br /&gt;
|shows the size of the biggest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Min announced TCP window size&lt;br /&gt;
|shows the size of the smallest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Max TCP bytes in flight&lt;br /&gt;
|shows how much of the TCP receive window of the corresponding direction has been used at max during the lifetime of the connection, in other words this is the bytes in flight of the opposite, sending direction.&lt;br /&gt;
|-&lt;br /&gt;
|Announced TCP window size limit&lt;br /&gt;
|The TCP window size limit columns show the maximum possible value that could be used for the TCP receive window size. This is calculated from the announced TCP window scale option for each direction of a connection. The raw window scale (ws) shift count value is displayed in parentheses next to the byte value.&lt;br /&gt;
|-&lt;br /&gt;
|TCP window limit usage&lt;br /&gt;
|show the ratio of the TCP max window size values compared to the TCP window size limit values in percent.&lt;br /&gt;
|-&lt;br /&gt;
|TCP zero window packets&lt;br /&gt;
|Number of TCP zero window packets indicated full receive buffer.&lt;br /&gt;
|-&lt;br /&gt;
|Client announced TLS versions/Negotiated TLS version, Client announced cipher suites/Negotiated cipher suite&lt;br /&gt;
|shows the TLS versions and all supported cipher suites announced by the client during a SSL client hello. In the negotiated columns the currently used TLS version and cipher suite is shown as indicated by the SSL server hello. As the client announced cipher suite list can be quite long, it is possible expand or minimize the list by click on it.&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert level&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Validity&lt;br /&gt;
|Connections are counted as valid if the handshake succeeded or at least some data is transferred. &lt;br /&gt;
|-&lt;br /&gt;
|Meta data&lt;br /&gt;
|may contain additional information that could be retrieved depending on the protocol. For instance, for HTTP traffic this column shows the request URL and response code for the last transaction seen in the corresponding connection.&lt;br /&gt;
|-&lt;br /&gt;
|Outer VLANs&lt;br /&gt;
|shows which VLAN tags has been seen for a specific connection.&lt;br /&gt;
|-&lt;br /&gt;
|Inner VLANs&lt;br /&gt;
|shows which inner VLAN tags has been seen for a specific connection in QinQ setups.&lt;br /&gt;
|-&lt;br /&gt;
|PPPoE session ID&lt;br /&gt;
|shows the PPPoE session ID which has been seen for packets of that specific connection. If a PPPoE session ID changes at any time while the connection is active, a &#039;changed&#039; indication is given. In this case the latter session ID is displayed.&lt;br /&gt;
|-&lt;br /&gt;
|MPLS labels&lt;br /&gt;
|shows all seen MPLS labels for every direction of the connection. The full label stack is shown. A &#039;&#039;&#039;no label&#039;&#039;&#039; indication is given, if no MPLS labels have been used. If a MPLS label changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter MPLS labels are displayed.&lt;br /&gt;
|-&lt;br /&gt;
|QoS&lt;br /&gt;
|shows all seen QoS service classes for every direction of the connection. IP DSCP, outermost MPLS traffic classes and outermost VLAN priority code points may be detected and displayed. If a QoS class changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter QoS service classes are displayed. TCP RST packets will be ignored, as that packet may be less important and is indicated by a QoS class with lower priority than the previous packets with data.&lt;br /&gt;
|-&lt;br /&gt;
|Interfaces&lt;br /&gt;
|shows at which interface the connection has been established. This is especially helpful in bridge mode to determine at which side of link the connection has been established.&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency avg interval&lt;br /&gt;
|[[Path measurement#Measurement_statistics|Statistics from the path measurement]]&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency avg interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Graph&lt;br /&gt;
|shows the historical throughput for each connection, it is possible to select the displayed graph from multiple different statistics (see [[Common table columns#Graph|Common table columns - Graph]]). Some may only be available if module options has been enabled, as it will increase the overall memory usage. Some statistics like the path latency is only available, if the path measurement module is active (and the corresponding option to store latencies per connection is enabled)&lt;br /&gt;
|-&lt;br /&gt;
|PCAP&lt;br /&gt;
|allows for capturing the specific connection (see [[Common table columns#PCAP|Common table columns - PCAP]])&lt;br /&gt;
|}&lt;br /&gt;
The list of connections can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
[[File:IP connection details.png|thumb|600x600px|Connection detail view]]&lt;br /&gt;
A detailed connection view can be accessed by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
===== CSV download =====&lt;br /&gt;
&lt;br /&gt;
The connection list can also be downloaded as a CSV document by clicking at the CSV download button. The current filter and sort order is used when creating the CSV file.&lt;br /&gt;
&lt;br /&gt;
The CSV file can also be accessed without using the web interface by getting the following URL:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/API/stats/modules/ip/ips/x.x.x.x/connections?csv=true&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
x.x.x.x must be replaced with the actual IP address. Additional URL parameters can be used to choose a time span, applying filters, etc. See [[REST API description]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Open TCP server ports ====&lt;br /&gt;
&lt;br /&gt;
This tab shows the list of ports for which the IP address has accessed incoming connections.  &lt;br /&gt;
It shows which service is (usually) behind the port. &lt;br /&gt;
Additionally, the first and last connection time is shown as well. &lt;br /&gt;
Also, there is button to capture traffic for the current IP and the corresponding port.&lt;br /&gt;
&lt;br /&gt;
==== TCP statistics ====&lt;br /&gt;
&lt;br /&gt;
This web page shows statistics about the response time of TCP connection handshake of all TCP connections of the current IP address. Also, the amount of data retransmitted due to packet loss is shown on the right side of the page. When TCP data has not been seen for TCP connections, the estimated amount is shown as well (see [[TCP module#Missed data|TCP module]] for details).&lt;br /&gt;
&lt;br /&gt;
The graphs below show the historical data for each TCP handshake. The data point is the average handshake time and the vertical line shows the min and max handshake time for that specific time window (depending on the zoom level). Up to two graphs might be visible, one for data when the IP connected other IPs as a client, and another graph for data when the IP has been connected from other IPs as a server.&lt;br /&gt;
&lt;br /&gt;
The TCP application times show info about data packets being transferred between the clients and server.&lt;br /&gt;
For each TCP connection, the following key attributes are measured and reported:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Transactions:&#039;&#039;&#039; This metric indicates the count of data transaction cycles, allowing you to track the volume of activity over time.&lt;br /&gt;
* &#039;&#039;&#039;Data Transfer Time:&#039;&#039;&#039; This measures the time interval from the first data packet to the last consecutive data packet sent from the same side, giving you a clear picture of the data flow duration.&lt;br /&gt;
* &#039;&#039;&#039;First Data Response Time:&#039;&#039;&#039; This tracks the time between the last data packet sent and the first data packet received from the other peer, marking the conclusion of a transaction cycle&lt;br /&gt;
* &#039;&#039;&#039;Total Request-Response Time:&#039;&#039;&#039; This attribute captures the time interval from the first client data packet to the last server data packet during the entire request-response cycle, offering a comprehensive view of transaction latency.&lt;br /&gt;
&lt;br /&gt;
 It’s essential to understand that the values provided by the TCP application times feature are correlated through TCP packets containing data. This analysis is performed without decrypting the packets themselves, relying on observed patterns rather than the actual content of the packets. As such, the reported metrics are considered &#039;&#039;&#039;heuristics&#039;&#039;&#039;—meaning they offer insights based on empirical data rather than direct measurements of specific transactions. This approach allows for efficient monitoring while maintaining data integrity and privacy.&lt;br /&gt;
&lt;br /&gt;
The connection table below shows a subset of the main connection table only for TCP connections for this IP. When sorting the handshake and response time columns and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
&lt;br /&gt;
==== HTTP server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all HTTP requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* HTTP server names: All host names are shown that have been used to contact the HTTP server on this IP.&lt;br /&gt;
* Sent HTTP responses: This is the total number of requests/responses that have been seen on the network.&lt;br /&gt;
* Average response time: This is the average response time in milliseconds for all servers.&lt;br /&gt;
* Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
* Minimum response time: This is the smallest response time seen on the network.&lt;br /&gt;
* Maximum response time: This is the largest response time seen on the network.&lt;br /&gt;
&lt;br /&gt;
The graph shows the historical data for all responses.&lt;br /&gt;
Below the graph, the number of response codes for each main code family is shown together with the last URL requested.&lt;br /&gt;
&lt;br /&gt;
==== SSL server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SSL requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* SSL server names: All host names are shown that have been used to contact the SSL server on this IP.&lt;br /&gt;
* Response time for SSL handshake&lt;br /&gt;
** Number of handshake: This is the total number of SSL requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
* Response time for SSL data&lt;br /&gt;
** Number of first data responses: This is the total number of initial SSL data requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
&lt;br /&gt;
The graphs shows the historical data for all handshakes and SSL first data responses&lt;br /&gt;
&lt;br /&gt;
==== SSL/TLS infos ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all negotiated SSL/TLS versions and cipher suites used by the current IP address either as server or client.&lt;br /&gt;
&lt;br /&gt;
In case of an SSL/TLS client this tab will also show the supported SSL/TLS versions and cipher suites that have been announced by this client IP address.&lt;br /&gt;
&lt;br /&gt;
==== SIP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SIP request methods, all SIP response types as well as all SIP request/response pairs sent or received by the current IP address.&lt;br /&gt;
&lt;br /&gt;
==== RTP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all RTP connections which involve the current IP address as either client or server.&lt;br /&gt;
A list shows all connections with client and server [[Common table columns#IP|IP addresses]] and ports. The RTP payload type is shown as well as timing informations and counters, jitter, packet time delta, MOS and R values and SSRC (synchronization source) of both client and server.&lt;br /&gt;
The min and max audio levels (decibel relative to full scale, dBFS) per direction are shown if G.711 A-Law or μ-Law is used. &lt;br /&gt;
For calculation, raw A-Law or μ-Law values are converted to 16 bit PCM values. Those values are then converted to dbFS:&lt;br /&gt;
&lt;br /&gt;
  value_dBFS = 20 * log10(abs(pcm_value) / 32768)&lt;br /&gt;
  Values range from 0 dBFS (loudest) to -96 dBFS (absolute silence).&lt;br /&gt;
&lt;br /&gt;
Graphs per connection show packets and packet loss, jitter, packet time delta, MOS, R value and the max audio level of client and server over time.&lt;br /&gt;
A PCAP button allows for PCAP capturing. If a proper codec is used, audio capture buttons for both directions are available allowing downloads in MP3 format.&lt;br /&gt;
Following codecs are supported for audio extraction:&lt;br /&gt;
&lt;br /&gt;
* G.711 A-Law and μ-Law&lt;br /&gt;
* G.722&lt;br /&gt;
* G.729&lt;br /&gt;
&lt;br /&gt;
==== Ping/Traceroute ====&lt;br /&gt;
&lt;br /&gt;
A traceroute to the IP can be started or updated by clicking the Traceroute/Update button. Available traceroute data is shown in a table, containing details of each discovered network hop.&lt;br /&gt;
The following hop information may be displayed:&lt;br /&gt;
&lt;br /&gt;
* IP address&lt;br /&gt;
* host name&lt;br /&gt;
* round trip time (average, minimum, maximum)&lt;br /&gt;
* rate of received responses to sent requests&lt;br /&gt;
* dropped packets count&lt;br /&gt;
* country&lt;br /&gt;
* city&lt;br /&gt;
* link to watch the location in online map services Google Maps or OpenStreetMaps&lt;br /&gt;
&lt;br /&gt;
A button is available to easily navigate to the traceroute configuration section.&lt;br /&gt;
&lt;br /&gt;
=== IP connection details ===&lt;br /&gt;
The connection detail view shows connection information in a single page. The view can be accessed in the list of IP connection (or the global connection list) by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
The page shows all data in a tabular format as well all graphs that are available for the connection.&lt;br /&gt;
&lt;br /&gt;
A capture button at the right hand side can be used to capture packets of that connection.&lt;br /&gt;
&lt;br /&gt;
The zoom button select the time range in which the connection was active.&lt;br /&gt;
&lt;br /&gt;
For TCP connections a [[TCP flow chart]] can be calculated by clicking on the corresponding button:&lt;br /&gt;
[[File:TCP flow graph start.png|none|thumb|614x614px|Start TCP flow graph analysis]]See also [[IP connection details]].&lt;br /&gt;
&lt;br /&gt;
== Configuration settings ==&lt;br /&gt;
&lt;br /&gt;
By clicking on the gear button on the top right of the IP statistics web page, you can access the configuration section.&lt;br /&gt;
&lt;br /&gt;
* Store connection information for every IP This option is enabled by default. &lt;br /&gt;
:When enabled, the IP measurement module stores every connection for each IP. &lt;br /&gt;
:This includes historical packet counter so you can see for individual connection at which time the connection transferred which amount of data. &lt;br /&gt;
:Connection data will be stored as long as possible regarding the total memory usage.&lt;br /&gt;
:Disabling this option will increase the minimum storage time significantly.&lt;br /&gt;
&lt;br /&gt;
* Store layer 7 protocol information for every IP The network protocols and their historical traffic data is stored for each IP if this option is enabled.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Track number of new connections for every IP &lt;br /&gt;
:When This option is enabled, TCP connections per IP will be tracked. &lt;br /&gt;
:Connections are divided into valid and invalid connections for server and client direction and the amount is shown.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store traffic history graph for IP peers &lt;br /&gt;
:This option allows enabling or disabling the traffic history graph that is shown per peer in the &#039;&#039;&#039;Peers&#039;&#039;&#039; tab for an IP.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store RTP performance information per IP and connection&lt;br /&gt;
:This option allows enabling or disabling of RTP related statistics that are shown in the &#039;&#039;&#039;RTP statistics&#039;&#039;&#039; tab for an IP. &lt;br /&gt;
:Jitter, packet time delta and MOS calculation in the [[SIP_module|SIP module]] also depends on this switch since it partially shows information stored at the IP address of RTP senders/receivers.&lt;br /&gt;
:Disabling this option will reduce the memory utilization and therefor increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store QoS information for every IP&lt;br /&gt;
:This option enables or disables to storage of Quality of Service information per IP. &lt;br /&gt;
:These information require additional memory so if these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store SSL/TLS information for every connection&lt;br /&gt;
:This option enables or disables to storage of SSL/TLS information per IP. This includes used and announced&lt;br /&gt;
:encryption ciphers which can take additional memory per IP connection. If these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store detailed TCP statistics for every connection&lt;br /&gt;
:This option allows to store detailed TCP statistics per connection, such as TCP retransmissions or TCP response time. The graph type can be selected in the IP connection tab to access these information.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of IP groups&lt;br /&gt;
:This option configures how many IP groups can be defined. The minimum (and default) value is 32 IP groups.&lt;br /&gt;
:The maximum value is 65535 IP groups. A new configuration value only takes effect after restarting the packet processing in the Administration menu.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of HTTP requests per connection&lt;br /&gt;
:This options configures how many HTTP request/response tuples are stored by default. The default is 1.&lt;br /&gt;
:On global and IP detail connection page it is possible to download CSV file with either the last or all HTTP request/responses per connection. In the latter case each connection line is duplicated with another HTTP request/response in chronological order.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4804</id>
		<title>IP module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=IP_module&amp;diff=4804"/>
		<updated>2024-07-15T11:49:56Z</updated>

		<summary type="html">&lt;p&gt;Simon: /* TCP statistics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The IP module operates on layer 3 of the network stack. It stores information about all IPv4 and IPv6 addresses.&lt;br /&gt;
For every address, the corresponding network traffic is accounted, the used protocols and their individual traffic.&lt;br /&gt;
The communication peers are stored as well as the traffic between both IP addresses. Every connection and its amount of traffic and the protocol can be accessed too.&lt;br /&gt;
&lt;br /&gt;
== Web interface ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[File:IP statistics.png|800px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== IP addresses tab ===&lt;br /&gt;
&lt;br /&gt;
The IP addresses tab shows the complete list of all IP addresses seen by the system. The button row allows for select specific information to be shown or hidden so that only the relevant information fit on the screen. &lt;br /&gt;
By clicking on &#039;&#039;&#039;Counters (combined)&#039;&#039;&#039; the table toggles between sent and received bytes and packets displayed in either one column or in separate columns for sorting purposes.&lt;br /&gt;
For each address, the table contains the following information:&lt;br /&gt;
&lt;br /&gt;
* IP&lt;br /&gt;
:See [[Common table columns#IP|Common table columns - IP]].&lt;br /&gt;
&lt;br /&gt;
* Alternative names&lt;br /&gt;
:See [[Common table columns#Alternative names|Common table columns - Alternative names]].&lt;br /&gt;
:The name information are also used when filtering the table for some entered string.&lt;br /&gt;
&lt;br /&gt;
* Traceroute&lt;br /&gt;
:A traceroute for the IP can be requested or updated using the available button. When traceroute information is available for the IP, brief information about each found network hop (IP, hostname, ping response time) is displayed. Since this list of hops can get very long, the view can be toggled to show all found hops or just the last one by clicking on the traceroute header.&lt;br /&gt;
&lt;br /&gt;
* First (recent) activity&lt;br /&gt;
:See [[Common table columns#First (recent) activity|Common table columns - First (recent) activity]].&lt;br /&gt;
&lt;br /&gt;
* Last activity&lt;br /&gt;
:See [[Common table columns#Last activity|Common table columns - Last activity]].&lt;br /&gt;
&lt;br /&gt;
* Packets and Bytes&lt;br /&gt;
:See [[Common table columns#Packets|Common table columns - Packets]] and [[Common table columns#Bytes|Common table columns - Bytes]].&lt;br /&gt;
&lt;br /&gt;
* Packets/s and Bit/s&lt;br /&gt;
:See [[Common table columns#Packets/s|Common table columns - Packets/s]] and [[Common table columns#Bit/s|Common table columns - Bit/s]].&lt;br /&gt;
&lt;br /&gt;
* Peers&lt;br /&gt;
: This shows the amount of peers of this IP. This counter is an all time only value and does not consider a selected interval.&lt;br /&gt;
&lt;br /&gt;
* TTL&lt;br /&gt;
: This shows the min, max and average TTL value (or hop limit in case of IPv6) of TCP/UDP traffic of an IP address. Non-UDP and non-TCP traffic as well as multicast traffic is ignored as e.g. ICMP packets likely have very high TTL values of 255 at the sender. &lt;br /&gt;
&lt;br /&gt;
* MTU&lt;br /&gt;
: The maximum transmission unit (i.e. layer 2 payload) is calculated for both receive and send direction. The maximum values are displayed.&lt;br /&gt;
&lt;br /&gt;
* TCP packets and UDP packets&lt;br /&gt;
:This is the number of TCP and UDP packets that have been seen for this IP.&lt;br /&gt;
&lt;br /&gt;
* TCP handshake time and TCP data response time&lt;br /&gt;
: The average time for a handshake as a TCP client and/or a TCP server is displayed as well as the average time the IP takes to acknowledge TCP data.&lt;br /&gt;
&lt;br /&gt;
* TCP payload and retransmissions&lt;br /&gt;
:These two columns show the number of bytes transmitted as TCP payload and how many bytes have been retransmitted, indicating a bad connection quality.&lt;br /&gt;
&lt;br /&gt;
* Graph&lt;br /&gt;
:See [[Common table columns#Graph|Common table columns - Graph]].&lt;br /&gt;
:Available data sources are load (bps or packets/s), TCP statistics or connections.&lt;br /&gt;
&lt;br /&gt;
* PCAP&lt;br /&gt;
:See [[Common table columns#PCAP|Common table columns - PCAP]]&lt;br /&gt;
&lt;br /&gt;
When multiple pages are available, there will be a control field for switching pages.&lt;br /&gt;
The IP search bar allows to enter IP addresses or names to see only those element for which the entered string is part of the IP address or name. &lt;br /&gt;
Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for a detailed description about how to use this feature.&lt;br /&gt;
The columns can be sorted also, for example to easily spot the IP addresses with the most bytes, or the highest current throughput.&lt;br /&gt;
&lt;br /&gt;
Below the table a CSV download button provides the ability to download the whole table contents in CSV format.&lt;br /&gt;
Sorting and filtering are applied as selected for the table but all IPs in the table are exported, not only the currently visible page.&lt;br /&gt;
&lt;br /&gt;
=== Global IP statistics tab ===&lt;br /&gt;
&lt;br /&gt;
The global IP statistics shows global sums about the processed IPv4 and IPv6 traffic and often used layer 4 protocols.&lt;br /&gt;
Non-IP packets such as ARP packets are indicated as other traffic and are not covered by this module.&lt;br /&gt;
The available information is:&lt;br /&gt;
* Layer 3 protocols (IPv4, IPv6 and non-IP traffic, its distribution over time and a history graph)&lt;br /&gt;
* Layer 4 protocols (TCP, UDP and traffic for other often used layer 4 protocols, its distribution over time and a history graph)&lt;br /&gt;
* Number of IPv4 fragmented packets (distribution over time and a history graph)&lt;br /&gt;
&lt;br /&gt;
For layer 3 and layer 4 protocols, traffic can be downloaded by clicking on the PCAP download button. The captured packets are not stored on the system but they are directly sent over the HTTP connection to your computer. &lt;br /&gt;
To stop capture, click on the same button again (which turned to a STOP symbol), or go to the capture traffic page in the generic section and stop the corresponding download.&lt;br /&gt;
&lt;br /&gt;
=== Top IP statistics ===&lt;br /&gt;
&lt;br /&gt;
On this page pie charts are shown with the top 10 sending and receiving IP addresses. By clicking on a pie chart section the related IP detail page is opened.&lt;br /&gt;
&lt;br /&gt;
=== Per IP statistics ===&lt;br /&gt;
&lt;br /&gt;
It is possible to select an IP from the list of IP addresses and get an more detailed view of the information stored about that IP.&lt;br /&gt;
The headline of the page includes three buttons.&lt;br /&gt;
The first left arrow button navigates back to the complete IP overview. &lt;br /&gt;
The second download button allows to download the traffic for the current IP address. &lt;br /&gt;
The third button allows for opening this manual section.&lt;br /&gt;
Below the buttons there are two graphs for the packets and bytes sent and received by the IP address.&lt;br /&gt;
The third section contains six tabs for various information about the selected IP.&lt;br /&gt;
&lt;br /&gt;
==== Overview tab ====&lt;br /&gt;
&lt;br /&gt;
This tab summarizes all the standard information from the main IP view, such as&lt;br /&gt;
* the alternative names,&lt;br /&gt;
* the packet and bytes counters, and&lt;br /&gt;
* the current throughput.&lt;br /&gt;
&lt;br /&gt;
Additionally, the top DPI protocols are printed both in the table as well as a pie chart at the bottom of the page.&lt;br /&gt;
The last line in the table shows the MAC addresses seen for this IP address. &lt;br /&gt;
There can be multiple MAC addresses for the same IP, for example if the DHCP reuse the IP address after some time. &lt;br /&gt;
The last new connection time is the start time of the last connection seen for this IP.&lt;br /&gt;
There is also a download button to capture the traffic for the specific IP and MAC address pair.&lt;br /&gt;
The final two rows shows all VLAN tags that have been seen for the given IP. An IP address might be visible in multiple VLANs.&lt;br /&gt;
If the Allegro Network Multimeter is installed at a mirror port of a switch which also modifies the VLAN tag, it might happen that an IP address is seen without a VLAN tag (none) and a specific VLAN tag. &lt;br /&gt;
This setup will decrease the quality of the results as connections use the VLAN information too to distinguish connections. &lt;br /&gt;
The measurement results can be improved if the mirror port is reconfigured to only see traffic with VLAN or completely without VLAN tags.&lt;br /&gt;
The last row shows the devices interfaces at which the IP has been seen. &lt;br /&gt;
The displayed interface always considers the sender side of an IP connection. &lt;br /&gt;
This information helps especially in bridge mode to determine at which side of an link the IP address is visible as sender of packets.&lt;br /&gt;
&lt;br /&gt;
==== Layer 3 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen IP DSCP values for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown DSCP class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific DSCP value.&lt;br /&gt;
&lt;br /&gt;
==== Layer 2 QoS tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists all seen MPLS traffic classes and VLAN priority code points for the current IP. &lt;br /&gt;
Several traffic counters are displayed and a history graph of the traffic over time. &lt;br /&gt;
A PCAP button allows for capturing the specific QoS tagged traffic for that IP.&lt;br /&gt;
By clicking on the shown QoS class name you will be redirected to the &#039;&#039;&#039;Connection&#039;&#039;&#039; tab with a filter active that only shows connections for that specific QoS.&lt;br /&gt;
&lt;br /&gt;
==== Protocols tab ====&lt;br /&gt;
&lt;br /&gt;
This tab lists the DPI protocols for the current IP. The download button allows to capture the traffic for the IP and protocol pair.&lt;br /&gt;
&lt;br /&gt;
==== Peers tab ====&lt;br /&gt;
&lt;br /&gt;
The Peers tab shows all communication peers the current IP address has talked to. The table contains the [[Common table columns#IP|IP address]] which can be clicked to see the statistics for that IP.&lt;br /&gt;
The alternative names are shown, depending on which data is available (DNS name, DHCP name, NIC vendor name).&lt;br /&gt;
The packets and bytes columns show the total amount of data transferred between those two IP addresses.&lt;br /&gt;
The list of peers can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Layer 4 endpoints ====&lt;br /&gt;
&lt;br /&gt;
The layer 4 endpoint tab shows all peers of the current IP address and the used server port. If the peer is the server, the port of the peer is shown. If the peer is the client, the other port is shown.&lt;br /&gt;
&lt;br /&gt;
The table shows [[Common table columns#IP|IP addresses]] with port number, whether the peer acts as a server or client, alternative names, layer 4 protocol and byte and packet counters. If there were multiple connection between the IP address and the peer with the same port, the counters will show aggregated data.&lt;br /&gt;
&lt;br /&gt;
When clicking on &amp;quot;Peer connections&amp;quot; the connection tab is opened with the filter set to match that particular endpoint.&lt;br /&gt;
&lt;br /&gt;
==== Connections tab ====&lt;br /&gt;
&lt;br /&gt;
The connection tabs lists all connections which involves the current IP. The button rows allow to select which kind of information should be shown.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Column&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|Client IP/port&lt;br /&gt;
|Client side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Server IP/port&lt;br /&gt;
|Server side IP information (see [[Common table columns#IP|Common table columns - IP]])&lt;br /&gt;
|-&lt;br /&gt;
|Layer 4 protocol&lt;br /&gt;
|TCP, UDP, or others&lt;br /&gt;
|-&lt;br /&gt;
|Go to&lt;br /&gt;
|allows to go to the connection details page which shows all information in more detail.&lt;br /&gt;
|-&lt;br /&gt;
|Start time&lt;br /&gt;
|The start time is the time of the first packet for that connection.&lt;br /&gt;
|-&lt;br /&gt;
|Last activity&lt;br /&gt;
|shows the time of the last packet seen so far for the connection&lt;br /&gt;
|-&lt;br /&gt;
|Duration&lt;br /&gt;
|Difference between last activity and start time.&lt;br /&gt;
|-&lt;br /&gt;
|Packets&lt;br /&gt;
|Number of packets&lt;br /&gt;
|-&lt;br /&gt;
|Bytes&lt;br /&gt;
|Number of bytes&lt;br /&gt;
|-&lt;br /&gt;
|Packets/s&lt;br /&gt;
|Packet rate&lt;br /&gt;
|-&lt;br /&gt;
|Bit/s&lt;br /&gt;
|Bit rate&lt;br /&gt;
|-&lt;br /&gt;
|MTU&lt;br /&gt;
|The maximum transmission unit (i.e. layer 2 payload) is calculated for both directions.&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 protocol&lt;br /&gt;
|shows the detect application layer 7 protocol.&lt;br /&gt;
|-&lt;br /&gt;
|TCP handshake time&lt;br /&gt;
|The time between SYN and ACK.&lt;br /&gt;
|-&lt;br /&gt;
|TCP response time (max/avg)&lt;br /&gt;
|contains response times for TCP data&lt;br /&gt;
|-&lt;br /&gt;
|Layer 7 response time&lt;br /&gt;
|contains response times for the maximum HTTP response for HTTP connections, or the SSL response times for SSL connections. The column also contains a score for this connection and this IP, based on the average response times of the server. See HTTP module and SSL module for additional information. When sorting the column and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
|-&lt;br /&gt;
|TCP retransmissions/TCP restransmission %&lt;br /&gt;
|shows the number of bytes that have been retransmitted on TCP layer because of packet loss. High percentage indicate connection problems for this communication pair.&lt;br /&gt;
|-&lt;br /&gt;
|TCP DUP ACKs&lt;br /&gt;
|Number of DUP ACK packets&lt;br /&gt;
|-&lt;br /&gt;
|TCP missed data&lt;br /&gt;
|shows the estimated amount of TCP data not seen for this connection. See [[TCP module#Missed data|TCP module]] for details about missed data.&lt;br /&gt;
|-&lt;br /&gt;
|TCP SYNs/SYN-ACKs/FINs/RSTs&lt;br /&gt;
|shows the amount of TCP SYN, SYN-ACK, FIN and RST packets per direction. Up to 255 packets can be accounted, if more were seen, &amp;gt;= 255 will be displayed.&lt;br /&gt;
|-&lt;br /&gt;
|TCP end termination reason&lt;br /&gt;
|Connection end can be regular FIN, RST, or timeout if no termination is seen at all&lt;br /&gt;
|-&lt;br /&gt;
|TCP MSS&lt;br /&gt;
|The TCP maximum segment size may be announced by the peers using a TCP option during connection negotiation. If the option is not announced, default values will be used. The values represents the payload capacity of TCP packets sent by the peer.&lt;br /&gt;
|-&lt;br /&gt;
|Max announced TCP window size&lt;br /&gt;
|shows the size of the biggest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Min announced TCP window size&lt;br /&gt;
|shows the size of the smallest TCP receive window announced for each direction of a connection.&lt;br /&gt;
|-&lt;br /&gt;
|Max TCP bytes in flight&lt;br /&gt;
|shows how much of the TCP receive window of the corresponding direction has been used at max during the lifetime of the connection, in other words this is the bytes in flight of the opposite, sending direction.&lt;br /&gt;
|-&lt;br /&gt;
|Announced TCP window size limit&lt;br /&gt;
|The TCP window size limit columns show the maximum possible value that could be used for the TCP receive window size. This is calculated from the announced TCP window scale option for each direction of a connection. The raw window scale (ws) shift count value is displayed in parentheses next to the byte value.&lt;br /&gt;
|-&lt;br /&gt;
|TCP window limit usage&lt;br /&gt;
|show the ratio of the TCP max window size values compared to the TCP window size limit values in percent.&lt;br /&gt;
|-&lt;br /&gt;
|TCP zero window packets&lt;br /&gt;
|Number of TCP zero window packets indicated full receive buffer.&lt;br /&gt;
|-&lt;br /&gt;
|Client announced TLS versions/Negotiated TLS version, Client announced cipher suites/Negotiated cipher suite&lt;br /&gt;
|shows the TLS versions and all supported cipher suites announced by the client during a SSL client hello. In the negotiated columns the currently used TLS version and cipher suite is shown as indicated by the SSL server hello. As the client announced cipher suite list can be quite long, it is possible expand or minimize the list by click on it.&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|TLS alert level&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Validity&lt;br /&gt;
|Connections are counted as valid if the handshake succeeded or at least some data is transferred. &lt;br /&gt;
|-&lt;br /&gt;
|Meta data&lt;br /&gt;
|may contain additional information that could be retrieved depending on the protocol. For instance, for HTTP traffic this column shows the request URL and response code for the last transaction seen in the corresponding connection.&lt;br /&gt;
|-&lt;br /&gt;
|Outer VLANs&lt;br /&gt;
|shows which VLAN tags has been seen for a specific connection.&lt;br /&gt;
|-&lt;br /&gt;
|Inner VLANs&lt;br /&gt;
|shows which inner VLAN tags has been seen for a specific connection in QinQ setups.&lt;br /&gt;
|-&lt;br /&gt;
|PPPoE session ID&lt;br /&gt;
|shows the PPPoE session ID which has been seen for packets of that specific connection. If a PPPoE session ID changes at any time while the connection is active, a &#039;changed&#039; indication is given. In this case the latter session ID is displayed.&lt;br /&gt;
|-&lt;br /&gt;
|MPLS labels&lt;br /&gt;
|shows all seen MPLS labels for every direction of the connection. The full label stack is shown. A &#039;&#039;&#039;no label&#039;&#039;&#039; indication is given, if no MPLS labels have been used. If a MPLS label changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter MPLS labels are displayed.&lt;br /&gt;
|-&lt;br /&gt;
|QoS&lt;br /&gt;
|shows all seen QoS service classes for every direction of the connection. IP DSCP, outermost MPLS traffic classes and outermost VLAN priority code points may be detected and displayed. If a QoS class changes at any time while the connection is active, a &#039;&#039;&#039;changed&#039;&#039;&#039; indication is given. In this case the latter QoS service classes are displayed. TCP RST packets will be ignored, as that packet may be less important and is indicated by a QoS class with lower priority than the previous packets with data.&lt;br /&gt;
|-&lt;br /&gt;
|Interfaces&lt;br /&gt;
|shows at which interface the connection has been established. This is especially helpful in bridge mode to determine at which side of link the connection has been established.&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency avg interval&lt;br /&gt;
|[[Path measurement#Measurement_statistics|Statistics from the path measurement]]&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Two-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency avg interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency min interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|One-way latency max interval&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|Graph&lt;br /&gt;
|shows the historical throughput for each connection, it is possible to select the displayed graph from multiple different statistics (see [[Common table columns#Graph|Common table columns - Graph]]). Some may only be available if module options has been enabled, as it will increase the overall memory usage. Some statistics like the path latency is only available, if the path measurement module is active (and the corresponding option to store latencies per connection is enabled)&lt;br /&gt;
|-&lt;br /&gt;
|PCAP&lt;br /&gt;
|allows for capturing the specific connection (see [[Common table columns#PCAP|Common table columns - PCAP]])&lt;br /&gt;
|}&lt;br /&gt;
The list of connections can be filtered by entering a string into the text area. Also, complex filter expressions are possible, if the string starts with an open parenthesis &#039;&#039;&#039;(&#039;&#039;&#039;. See [[Live_filtering_of_tables|Live filtering of tables]] for details.&lt;br /&gt;
[[File:IP connection details.png|thumb|600x600px|Connection detail view]]&lt;br /&gt;
A detailed connection view can be accessed by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
===== CSV download =====&lt;br /&gt;
&lt;br /&gt;
The connection list can also be downloaded as a CSV document by clicking at the CSV download button. The current filter and sort order is used when creating the CSV file.&lt;br /&gt;
&lt;br /&gt;
The CSV file can also be accessed without using the web interface by getting the following URL:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;/API/stats/modules/ip/ips/x.x.x.x/connections?csv=true&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
x.x.x.x must be replaced with the actual IP address. Additional URL parameters can be used to choose a time span, applying filters, etc. See [[REST API description]] for details.&lt;br /&gt;
&lt;br /&gt;
==== Open TCP server ports ====&lt;br /&gt;
&lt;br /&gt;
This tab shows the list of ports for which the IP address has accessed incoming connections.  &lt;br /&gt;
It shows which service is (usually) behind the port. &lt;br /&gt;
Additionally, the first and last connection time is shown as well. &lt;br /&gt;
Also, there is button to capture traffic for the current IP and the corresponding port.&lt;br /&gt;
&lt;br /&gt;
==== TCP statistics ====&lt;br /&gt;
&lt;br /&gt;
This web page shows statistics about the response time of TCP connection handshake of all TCP connections of the current IP address. Also, the amount of data retransmitted due to packet loss is shown on the right side of the page. When TCP data has not been seen for TCP connections, the estimated amount is shown as well (see [[TCP module#Missed data|TCP module]] for details).&lt;br /&gt;
&lt;br /&gt;
The graphs below show the historical data for each TCP handshake. The data point is the average handshake time and the vertical line shows the min and max handshake time for that specific time window (depending on the zoom level). Up to two graphs might be visible, one for data when the IP connected other IPs as a client, and another graph for data when the IP has been connected from other IPs as a server.&lt;br /&gt;
&lt;br /&gt;
The TCP application times show info about data packets being transferred between the clients and server.&lt;br /&gt;
For each TCP connection, the following key attributes are measured and reported:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Transactions:&#039;&#039;&#039; This metric indicates the count of data transaction cycles, allowing you to track the volume of activity over time.&lt;br /&gt;
* &#039;&#039;&#039;Data Transfer Time:&#039;&#039;&#039; This measures the time interval from the first data packet to the last consecutive data packet sent from the same side, giving you a clear picture of the data flow duration.&lt;br /&gt;
* &#039;&#039;&#039;First Data Response Time:&#039;&#039;&#039; This tracks the time between the last data packet sent and the first data packet received from the other peer, marking the conclusion of a transaction cycle&lt;br /&gt;
* &#039;&#039;&#039;Total Request-Response Time:&#039;&#039;&#039; This attribute captures the time interval from the first client data packet to the last server data packet during the entire request-response cycle, offering a comprehensive view of transaction latency.&lt;br /&gt;
&lt;br /&gt;
  It’s essential to understand that the values provided by the TCP Application Times feature are correlated through TCP packets containing data. This analysis is performed without decrypting the packets themselves, relying on observed patterns rather than the actual content of the packets. As such, the reported metrics are considered &#039;&#039;&#039;heuristics&#039;&#039;&#039;—meaning they offer insights based on empirical data rather than direct measurements of specific transactions. This approach allows for efficient monitoring while maintaining data integrity and privacy.&lt;br /&gt;
&lt;br /&gt;
The connection table below shows a subset of the main connection table only for TCP connections for this IP. When sorting the handshake and response time columns and more than one time value is shown in a field, the maximum of all time values of that field is taken into account.&lt;br /&gt;
&lt;br /&gt;
==== HTTP server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all HTTP requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* HTTP server names: All host names are shown that have been used to contact the HTTP server on this IP.&lt;br /&gt;
* Sent HTTP responses: This is the total number of requests/responses that have been seen on the network.&lt;br /&gt;
* Average response time: This is the average response time in milliseconds for all servers.&lt;br /&gt;
* Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
* Minimum response time: This is the smallest response time seen on the network.&lt;br /&gt;
* Maximum response time: This is the largest response time seen on the network.&lt;br /&gt;
&lt;br /&gt;
The graph shows the historical data for all responses.&lt;br /&gt;
Below the graph, the number of response codes for each main code family is shown together with the last URL requested.&lt;br /&gt;
&lt;br /&gt;
==== SSL server statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SSL requests handled by the current IP address.&lt;br /&gt;
The statistics contains:&lt;br /&gt;
&lt;br /&gt;
* SSL server names: All host names are shown that have been used to contact the SSL server on this IP.&lt;br /&gt;
* Response time for SSL handshake&lt;br /&gt;
** Number of handshake: This is the total number of SSL requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
* Response time for SSL data&lt;br /&gt;
** Number of first data responses: This is the total number of initial SSL data requests/responses that have been seen for this IP.&lt;br /&gt;
** Average response time: This is the average response time in milliseconds.&lt;br /&gt;
** Standard deviation: This value shows the variation of the response times (https://en.wikipedia.org/wiki/Standard_deviation)&lt;br /&gt;
** Minimum response time: This is the smallest response time.&lt;br /&gt;
** Maximum response time: This is the largest response time.&lt;br /&gt;
&lt;br /&gt;
The graphs shows the historical data for all handshakes and SSL first data responses&lt;br /&gt;
&lt;br /&gt;
==== SSL/TLS infos ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all negotiated SSL/TLS versions and cipher suites used by the current IP address either as server or client.&lt;br /&gt;
&lt;br /&gt;
In case of an SSL/TLS client this tab will also show the supported SSL/TLS versions and cipher suites that have been announced by this client IP address.&lt;br /&gt;
&lt;br /&gt;
==== SIP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all SIP request methods, all SIP response types as well as all SIP request/response pairs sent or received by the current IP address.&lt;br /&gt;
&lt;br /&gt;
==== RTP statistics ====&lt;br /&gt;
&lt;br /&gt;
This tab shows statistics (if available) of all RTP connections which involve the current IP address as either client or server.&lt;br /&gt;
A list shows all connections with client and server [[Common table columns#IP|IP addresses]] and ports. The RTP payload type is shown as well as timing informations and counters, jitter, packet time delta, MOS and R values and SSRC (synchronization source) of both client and server.&lt;br /&gt;
The min and max audio levels (decibel relative to full scale, dBFS) per direction are shown if G.711 A-Law or μ-Law is used. &lt;br /&gt;
For calculation, raw A-Law or μ-Law values are converted to 16 bit PCM values. Those values are then converted to dbFS:&lt;br /&gt;
&lt;br /&gt;
  value_dBFS = 20 * log10(abs(pcm_value) / 32768)&lt;br /&gt;
  Values range from 0 dBFS (loudest) to -96 dBFS (absolute silence).&lt;br /&gt;
&lt;br /&gt;
Graphs per connection show packets and packet loss, jitter, packet time delta, MOS, R value and the max audio level of client and server over time.&lt;br /&gt;
A PCAP button allows for PCAP capturing. If a proper codec is used, audio capture buttons for both directions are available allowing downloads in MP3 format.&lt;br /&gt;
Following codecs are supported for audio extraction:&lt;br /&gt;
&lt;br /&gt;
* G.711 A-Law and μ-Law&lt;br /&gt;
* G.722&lt;br /&gt;
* G.729&lt;br /&gt;
&lt;br /&gt;
==== Ping/Traceroute ====&lt;br /&gt;
&lt;br /&gt;
A traceroute to the IP can be started or updated by clicking the Traceroute/Update button. Available traceroute data is shown in a table, containing details of each discovered network hop.&lt;br /&gt;
The following hop information may be displayed:&lt;br /&gt;
&lt;br /&gt;
* IP address&lt;br /&gt;
* host name&lt;br /&gt;
* round trip time (average, minimum, maximum)&lt;br /&gt;
* rate of received responses to sent requests&lt;br /&gt;
* dropped packets count&lt;br /&gt;
* country&lt;br /&gt;
* city&lt;br /&gt;
* link to watch the location in online map services Google Maps or OpenStreetMaps&lt;br /&gt;
&lt;br /&gt;
A button is available to easily navigate to the traceroute configuration section.&lt;br /&gt;
&lt;br /&gt;
=== IP connection details ===&lt;br /&gt;
The connection detail view shows connection information in a single page. The view can be accessed in the list of IP connection (or the global connection list) by clicking on the magnifying glass symbol in the client IP column.&lt;br /&gt;
&lt;br /&gt;
The page shows all data in a tabular format as well all graphs that are available for the connection.&lt;br /&gt;
&lt;br /&gt;
A capture button at the right hand side can be used to capture packets of that connection.&lt;br /&gt;
&lt;br /&gt;
The zoom button select the time range in which the connection was active.&lt;br /&gt;
&lt;br /&gt;
For TCP connections a [[TCP flow chart]] can be calculated by clicking on the corresponding button:&lt;br /&gt;
[[File:TCP flow graph start.png|none|thumb|614x614px|Start TCP flow graph analysis]]See also [[IP connection details]].&lt;br /&gt;
&lt;br /&gt;
== Configuration settings ==&lt;br /&gt;
&lt;br /&gt;
By clicking on the gear button on the top right of the IP statistics web page, you can access the configuration section.&lt;br /&gt;
&lt;br /&gt;
* Store connection information for every IP This option is enabled by default. &lt;br /&gt;
:When enabled, the IP measurement module stores every connection for each IP. &lt;br /&gt;
:This includes historical packet counter so you can see for individual connection at which time the connection transferred which amount of data. &lt;br /&gt;
:Connection data will be stored as long as possible regarding the total memory usage.&lt;br /&gt;
:Disabling this option will increase the minimum storage time significantly.&lt;br /&gt;
&lt;br /&gt;
* Store layer 7 protocol information for every IP The network protocols and their historical traffic data is stored for each IP if this option is enabled.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Track number of new connections for every IP &lt;br /&gt;
:When This option is enabled, TCP connections per IP will be tracked. &lt;br /&gt;
:Connections are divided into valid and invalid connections for server and client direction and the amount is shown.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store traffic history graph for IP peers &lt;br /&gt;
:This option allows enabling or disabling the traffic history graph that is shown per peer in the &#039;&#039;&#039;Peers&#039;&#039;&#039; tab for an IP.&lt;br /&gt;
:Disabling this option will increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store RTP performance information per IP and connection&lt;br /&gt;
:This option allows enabling or disabling of RTP related statistics that are shown in the &#039;&#039;&#039;RTP statistics&#039;&#039;&#039; tab for an IP. &lt;br /&gt;
:Jitter, packet time delta and MOS calculation in the [[SIP_module|SIP module]] also depends on this switch since it partially shows information stored at the IP address of RTP senders/receivers.&lt;br /&gt;
:Disabling this option will reduce the memory utilization and therefor increase the minimum storage time slightly.&lt;br /&gt;
&lt;br /&gt;
* Store QoS information for every IP&lt;br /&gt;
:This option enables or disables to storage of Quality of Service information per IP. &lt;br /&gt;
:These information require additional memory so if these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store SSL/TLS information for every connection&lt;br /&gt;
:This option enables or disables to storage of SSL/TLS information per IP. This includes used and announced&lt;br /&gt;
:encryption ciphers which can take additional memory per IP connection. If these information are not necessary, memory can be save to increase global data storage time.&lt;br /&gt;
&lt;br /&gt;
* Store detailed TCP statistics for every connection&lt;br /&gt;
:This option allows to store detailed TCP statistics per connection, such as TCP retransmissions or TCP response time. The graph type can be selected in the IP connection tab to access these information.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of IP groups&lt;br /&gt;
:This option configures how many IP groups can be defined. The minimum (and default) value is 32 IP groups.&lt;br /&gt;
:The maximum value is 65535 IP groups. A new configuration value only takes effect after restarting the packet processing in the Administration menu.&lt;br /&gt;
&lt;br /&gt;
* Maximum number of HTTP requests per connection&lt;br /&gt;
:This options configures how many HTTP request/response tuples are stored by default. The default is 1.&lt;br /&gt;
:On global and IP detail connection page it is possible to download CSV file with either the last or all HTTP request/responses per connection. In the latter case each connection line is duplicated with another HTTP request/response in chronological order.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=QUIC_module&amp;diff=4755</id>
		<title>QUIC module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=QUIC_module&amp;diff=4755"/>
		<updated>2024-04-17T12:01:48Z</updated>

		<summary type="html">&lt;p&gt;Simon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The QUIC Analysis Module provides insights into QUIC (Quick UDP Internet Connections) traffic, a modern transport protocol developed by Google and designed to improve upon traditional TCP connections. This module offers detailed information on various aspects of QUIC traffic, enabling users to understand and analyze communication patterns and data exchanges. QUIC is currently utilized in various applications such as web browsing, video streaming, and online gaming, offering enhanced performance and security benefits over traditional protocols. The QUIC protocol is described in detail in [https://datatracker.ietf.org/doc/html/rfc9000 RFC 9000] (V1) and [https://datatracker.ietf.org/doc/rfc9369/ RFC 9369] (V2).&lt;br /&gt;
&lt;br /&gt;
This module supports QUIC initial decoding for the draft protocol versions 29, 31, and 32, as well as version 1 and 2 to read TLS information if the option &amp;quot;&#039;&#039;&#039;Decode server name from handshakes&#039;&#039;&#039;&amp;quot; is enabled in the &amp;quot;&#039;&#039;&#039;Module Settings&#039;&#039;&#039;&amp;quot; tab. This functionality allows users to delve deeper into the cryptographic properties and security features of QUIC connections, providing a comprehensive analysis experience.&lt;br /&gt;
&lt;br /&gt;
== QUIC TLS Server ==&lt;br /&gt;
[[File:Quic server.png|thumb|Overview of the QUIC TLS server tab]]&lt;br /&gt;
The first tab &amp;quot;QUIC TLS Server&amp;quot; presents a comprehensive overview of all QUIC server IP addresses that have been requested by a client along with their corresponding server names. This data is extracted from the server_name extension of the TLS client hello, which is present in the QUIC initial packets.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Quic_server.png&amp;diff=4754</id>
		<title>File:Quic server.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Quic_server.png&amp;diff=4754"/>
		<updated>2024-04-17T12:01:20Z</updated>

		<summary type="html">&lt;p&gt;Simon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Overview of the QUIC TLS server tab&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=QUIC_module&amp;diff=4753</id>
		<title>QUIC module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=QUIC_module&amp;diff=4753"/>
		<updated>2024-04-17T10:58:49Z</updated>

		<summary type="html">&lt;p&gt;Simon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The QUIC Analysis Module provides insights into QUIC (Quick UDP Internet Connections) traffic, a modern transport protocol developed by Google and designed to improve upon traditional TCP connections. This module offers detailed information on various aspects of QUIC traffic, enabling users to understand and analyze communication patterns and data exchanges. QUIC is currently utilized in various applications such as web browsing, video streaming, and online gaming, offering enhanced performance and security benefits over traditional protocols. The QUIC protocol is described in detail in [https://datatracker.ietf.org/doc/html/rfc9000 RFC 9000] (V1) and [https://datatracker.ietf.org/doc/rfc9369/ RFC 9369] (V2).&lt;br /&gt;
&lt;br /&gt;
This module supports QUIC initial decoding for the draft protocol versions 29, 31, and 32, as well as version 1 and 2 to read TLS information if the option &amp;quot;&#039;&#039;&#039;Decode server name from handshakes&#039;&#039;&#039;&amp;quot; is enabled in the &amp;quot;&#039;&#039;&#039;Module Settings&#039;&#039;&#039;&amp;quot; tab. This functionality allows users to delve deeper into the cryptographic properties and security features of QUIC connections, providing a comprehensive analysis experience.&lt;br /&gt;
&lt;br /&gt;
== QUIC TLS Server ==&lt;br /&gt;
The first tab &amp;quot;QUIC TLS Server&amp;quot; presents a comprehensive overview of all QUIC server IP addresses that have been requested by a client along with their corresponding server names. This data is extracted from the server_name extension of the TLS client hello, which is present in the QUIC initial packets.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Measurement_modules&amp;diff=4752</id>
		<title>Measurement modules</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Measurement_modules&amp;diff=4752"/>
		<updated>2024-04-17T10:10:50Z</updated>

		<summary type="html">&lt;p&gt;Simon: /* L7 - Application Layer */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Allegro Network Multimeter provides a number of network measurement modules for different use cases. Here&lt;br /&gt;
you can find a list of modules and a short description and see the specific module for detailed documentation. &lt;br /&gt;
&lt;br /&gt;
== Generic modules ==&lt;br /&gt;
&lt;br /&gt;
* [[Capture_module|Capture module]]&lt;br /&gt;
:The Capture module lists all running captures which were started interactively in any other module. &lt;br /&gt;
:It also allows for starting new captures with specific filters.&lt;br /&gt;
&lt;br /&gt;
* [[Path_measurement|Path measurement]]&lt;br /&gt;
:This module allows you to measure packet loss and latency between two Allegro Network Multimeter installations.&lt;br /&gt;
&lt;br /&gt;
* [[Packet_ring_buffer|Packet ring buffer]]&lt;br /&gt;
:The packet ring buffer feature allows you to create a buffer of fixed size on an external storage device to which all processed packets will be recorded. If the fixed size buffer is full, the oldest packets in the buffer will be replaced with new packets in a round-robin fashion.&lt;br /&gt;
&lt;br /&gt;
* [[PCAP#Pcap_analysis_module|Pcap analysis module]]&lt;br /&gt;
:The Pcap analysis module allows for the analysis of Pcap files by sending them to the appliance. After analyzing a Pcap, the web interface displays all the metadata as if the packets are live traffic at the time of the Pcap recording.&lt;br /&gt;
&lt;br /&gt;
* [[Incidents#Incidents_module|Incidents module]]&lt;br /&gt;
:The Incidents module allows for notifications to be created when specific network incidents are detected.&lt;br /&gt;
&lt;br /&gt;
== L2 - WiFi ==&lt;br /&gt;
&lt;br /&gt;
* [[WiFi module]]&lt;br /&gt;
:This module analyse wireless frames forwarded by access points.&lt;br /&gt;
&lt;br /&gt;
== L2 - Ethernet Layer ==&lt;br /&gt;
&lt;br /&gt;
* [[MAC_module|MAC module]]&lt;br /&gt;
:The MAC module gathers information about all captured MAC addresses, including the protocols used, traffic, communication peers and MAC/IP mappings.&lt;br /&gt;
&lt;br /&gt;
* [[QoS module]]&lt;br /&gt;
:The QoS module processes and displays traffic with QoS tags VLAN PCP and MPLS TC on Layer 2 (and IP DSCP on Layer 3).&lt;br /&gt;
&lt;br /&gt;
* [[Packet_size_module|Packet size module]]&lt;br /&gt;
:The packet size module accounts the size of all packets (Layer 2 with CRC) and shows packet size distribution.&lt;br /&gt;
&lt;br /&gt;
* [[ARP_module|ARP module]]&lt;br /&gt;
:The ARP module monitors ARP packets for tracking MAC addresses and announced IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[VLAN_module|VLAN module]]&lt;br /&gt;
:The VLAN module accounts traffic per VLAN tag seen on the network.&lt;br /&gt;
&lt;br /&gt;
* [[MAC_protocols_module|MAC protocols module]]&lt;br /&gt;
:The MAC protocols module accounts traffic of all different MAC protocols.&lt;br /&gt;
&lt;br /&gt;
* [[STP_module|STP module]]&lt;br /&gt;
:The stp module analyzes STP traffic and shows a history of the identified root Bridges with their configurations.&lt;br /&gt;
&lt;br /&gt;
* [[MPLS_module|MPLS module]]&lt;br /&gt;
:The MPLS module displays information about all identified MPLS labels (single label and double-stacked).&lt;br /&gt;
&lt;br /&gt;
* [[LLDP_module|LLDP module]]&lt;br /&gt;
:The LLDP module extracts information from LLDP (Link Layer Discovery Protocol) messages and correlates this information to the respective MAC and IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[PPPoE module]]&lt;br /&gt;
:The PPPoE module displays all PPPoE sessions and traffic within a specific session.&lt;br /&gt;
&lt;br /&gt;
* [[Burst_analysis|Burst analysis]]&lt;br /&gt;
:The Burst analysis module measures throughput per interface or MAC address and displays utilization graphs for fast burst recognition.&lt;br /&gt;
&lt;br /&gt;
== L3 - IP Layer ==&lt;br /&gt;
* [[IP_module|IP module]]&lt;br /&gt;
:The IP module gathers information about all captured IPv4 and IPv6 addresses including the protocol used, traffic, communication peers, and connections.&lt;br /&gt;
&lt;br /&gt;
* [[IP_groups|IP groups]]&lt;br /&gt;
:The IP groups module gathers information for groups of IP addresses. Any IP subnet can be configured to be used as a group.&lt;br /&gt;
&lt;br /&gt;
* [[IP_pairs|IP pairs]]&lt;br /&gt;
:The IP pairs module shows traffic information between pairs of IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[QoS_module|QoS module]]&lt;br /&gt;
:The QoS module processes and displays traffic with QoS tags for IP DSCP on Layer 3 and VLAN PCP (and MPLS TC on Layer 2).&lt;br /&gt;
&lt;br /&gt;
* [[Geolocation_statistics|Geolocation statistics]]&lt;br /&gt;
:The Allegro Network Multimeter uses a geolocation library to identify the IP addresses of individual countries. The country information is shown in other modules; however, this web page lists all countries and their corresponding amount of traffic. It also shows detailed statistics per country including all IP addresses seen for that country.&lt;br /&gt;
&lt;br /&gt;
* [[DHCP_module|DHCP module]]&lt;br /&gt;
:The DHCP module tracks requests and responses for dynamic IP assignments in networks.&lt;br /&gt;
&lt;br /&gt;
* [[DNS_module|DNS module]]&lt;br /&gt;
:DNS name resolving is handled passively by processing all DNS requests and responses captured by the system. &lt;br /&gt;
:This module lists all IP addresses and names known by the system. This information is used by other modules to look up names.&lt;br /&gt;
&lt;br /&gt;
* [[NetBIOS_module|NetBIOS module]]&lt;br /&gt;
:The NetBIOS module monitors NetBIOS packets for tracking announced host names for IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[ICMP_module|ICMP module]]&lt;br /&gt;
:The ICMP module shows information about ICMP traffic and specific packet types.&lt;br /&gt;
&lt;br /&gt;
* [[Multicast_statistics|Multicast statistics]]&lt;br /&gt;
:The multicast module analyzes IGMP traffic and displays detailed information on multicast groups and members.&lt;br /&gt;
&lt;br /&gt;
== L4 - Transport Layer ==&lt;br /&gt;
&lt;br /&gt;
* [[Connections_module|Connections module]]&lt;br /&gt;
:The Connections module provides access to a list of connections of all IPs aggregated together based on selected sort and filter parameters.&lt;br /&gt;
&lt;br /&gt;
* [[TCP_module|TCP module]]&lt;br /&gt;
:The TCP module measures the TCP handshake time for connection setup. It allows you to identify slow responding servers in a network.&lt;br /&gt;
&lt;br /&gt;
* [[Layer_4_server_ports_module|Layer 4 server ports module]]&lt;br /&gt;
:The Layer 4 server ports module measures traffic per TCP and UDP server port.&lt;br /&gt;
&lt;br /&gt;
* [[IPSec_module|IPSec module]]&lt;br /&gt;
:The IPSec module shows information about IPSec ESP traffic and sequence counter correctness.&lt;br /&gt;
&lt;br /&gt;
== L7 - Application Layer ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[SSL_module|SSL module]]&lt;br /&gt;
:The SSL module keeps track of SSL server names and common names in SSL/TLS encrypted traffic. It enables you to get the name resolved even if no DNS has been seen.&lt;br /&gt;
&lt;br /&gt;
* [[HTTP_module|HTTP module]]&lt;br /&gt;
:The HTTP module keeps track of HTTP host names requested in HTTP connections. It allows you to get the name resolved even if no DNS has been seen and to see which virtual host is handled by a given server.&lt;br /&gt;
&lt;br /&gt;
* [[L7_module|L7 module]]&lt;br /&gt;
:The L7 module gathers information about all supported Layer 7 protocols. This includes information on how much traffic was seen for each protocol for each IPv4 and IPv6 address.&lt;br /&gt;
&lt;br /&gt;
* [[Response_time_analysis|Response time analysis]]&lt;br /&gt;
:The response-time analysis module allows you to define your own protocol request and response pattern and measure the response time and request/response loss.&lt;br /&gt;
&lt;br /&gt;
* [[SMB_statistics|SMB statistics]]&lt;br /&gt;
:The SMB module gathers information about all SMB servers handling unencrypted traffic. It shows which shares have been accessed and which files in those shares have been read or written to, together with detailed statistics per file.&lt;br /&gt;
&lt;br /&gt;
* [[SIP_module|SIP module]]&lt;br /&gt;
:The SIP statistics includes all SIP calls and their associated metadata.&lt;br /&gt;
&lt;br /&gt;
* [[NTP_module|NTP module]]&lt;br /&gt;
:The NTP module shows detailed information about Network Time Protocol servers selected and their corresponding network clients.&lt;br /&gt;
&lt;br /&gt;
* [[PTP_module|PTP module]]&lt;br /&gt;
:The PTP module stores the PTP members and their associated metadata like the PTP version.&lt;br /&gt;
&lt;br /&gt;
* [[Profinet_module|Profinet module]]&lt;br /&gt;
:The Profinet module analyzes Profinet RT cyclic and acyclic traffic and displays details on all devices and their communication relationships.&lt;br /&gt;
&lt;br /&gt;
* [[OPC-UA_module|OPC-UA module]]&lt;br /&gt;
:The OPC-UA module displays information about OPC-UA binary protocol traffic and performs response-time measurement.&lt;br /&gt;
&lt;br /&gt;
* [[IEC_60870-5-104_module|IEC 60870-5-104 module]]&lt;br /&gt;
:The IEC 60870-5-104 module shows information about IEC 60870-5-104 traffic, sequence counter correctness and response times.&lt;br /&gt;
&lt;br /&gt;
* [[Fix_module|FIX module]]&lt;br /&gt;
:The FIX module shows information about &#039;&#039;&#039;F&#039;&#039;&#039;inancial &#039;&#039;&#039;I&#039;&#039;&#039;nformation e&#039;&#039;&#039;X&#039;&#039;&#039;change traffic.&lt;br /&gt;
&lt;br /&gt;
* [[TETRA_module|TETRA module]]&lt;br /&gt;
:The TETRA module shows detailed information about &#039;&#039;&#039;Te&#039;&#039;&#039;rrestrial &#039;&#039;&#039;T&#039;&#039;&#039;runked &#039;&#039;&#039;Ra&#039;&#039;&#039;dio traffic.&lt;br /&gt;
&lt;br /&gt;
* [[QUIC module]]&lt;br /&gt;
:The QUIC Analysis Module provides comprehensive insights into &#039;&#039;&#039;Q&#039;&#039;&#039;uick &#039;&#039;&#039;U&#039;&#039;&#039;DP &#039;&#039;&#039;I&#039;&#039;&#039;nternet &#039;&#039;&#039;C&#039;&#039;&#039;onnections traffic.&lt;br /&gt;
&lt;br /&gt;
* [[RTP_statistics|RTP statistics]]&lt;br /&gt;
:The RTP module shows detailed information about RTP codecs used.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Measurement_modules&amp;diff=4751</id>
		<title>Measurement modules</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Measurement_modules&amp;diff=4751"/>
		<updated>2024-04-17T10:10:04Z</updated>

		<summary type="html">&lt;p&gt;Simon: /* L7 - Application Layer */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Allegro Network Multimeter provides a number of network measurement modules for different use cases. Here&lt;br /&gt;
you can find a list of modules and a short description and see the specific module for detailed documentation. &lt;br /&gt;
&lt;br /&gt;
== Generic modules ==&lt;br /&gt;
&lt;br /&gt;
* [[Capture_module|Capture module]]&lt;br /&gt;
:The Capture module lists all running captures which were started interactively in any other module. &lt;br /&gt;
:It also allows for starting new captures with specific filters.&lt;br /&gt;
&lt;br /&gt;
* [[Path_measurement|Path measurement]]&lt;br /&gt;
:This module allows you to measure packet loss and latency between two Allegro Network Multimeter installations.&lt;br /&gt;
&lt;br /&gt;
* [[Packet_ring_buffer|Packet ring buffer]]&lt;br /&gt;
:The packet ring buffer feature allows you to create a buffer of fixed size on an external storage device to which all processed packets will be recorded. If the fixed size buffer is full, the oldest packets in the buffer will be replaced with new packets in a round-robin fashion.&lt;br /&gt;
&lt;br /&gt;
* [[PCAP#Pcap_analysis_module|Pcap analysis module]]&lt;br /&gt;
:The Pcap analysis module allows for the analysis of Pcap files by sending them to the appliance. After analyzing a Pcap, the web interface displays all the metadata as if the packets are live traffic at the time of the Pcap recording.&lt;br /&gt;
&lt;br /&gt;
* [[Incidents#Incidents_module|Incidents module]]&lt;br /&gt;
:The Incidents module allows for notifications to be created when specific network incidents are detected.&lt;br /&gt;
&lt;br /&gt;
== L2 - WiFi ==&lt;br /&gt;
&lt;br /&gt;
* [[WiFi module]]&lt;br /&gt;
:This module analyse wireless frames forwarded by access points.&lt;br /&gt;
&lt;br /&gt;
== L2 - Ethernet Layer ==&lt;br /&gt;
&lt;br /&gt;
* [[MAC_module|MAC module]]&lt;br /&gt;
:The MAC module gathers information about all captured MAC addresses, including the protocols used, traffic, communication peers and MAC/IP mappings.&lt;br /&gt;
&lt;br /&gt;
* [[QoS module]]&lt;br /&gt;
:The QoS module processes and displays traffic with QoS tags VLAN PCP and MPLS TC on Layer 2 (and IP DSCP on Layer 3).&lt;br /&gt;
&lt;br /&gt;
* [[Packet_size_module|Packet size module]]&lt;br /&gt;
:The packet size module accounts the size of all packets (Layer 2 with CRC) and shows packet size distribution.&lt;br /&gt;
&lt;br /&gt;
* [[ARP_module|ARP module]]&lt;br /&gt;
:The ARP module monitors ARP packets for tracking MAC addresses and announced IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[VLAN_module|VLAN module]]&lt;br /&gt;
:The VLAN module accounts traffic per VLAN tag seen on the network.&lt;br /&gt;
&lt;br /&gt;
* [[MAC_protocols_module|MAC protocols module]]&lt;br /&gt;
:The MAC protocols module accounts traffic of all different MAC protocols.&lt;br /&gt;
&lt;br /&gt;
* [[STP_module|STP module]]&lt;br /&gt;
:The stp module analyzes STP traffic and shows a history of the identified root Bridges with their configurations.&lt;br /&gt;
&lt;br /&gt;
* [[MPLS_module|MPLS module]]&lt;br /&gt;
:The MPLS module displays information about all identified MPLS labels (single label and double-stacked).&lt;br /&gt;
&lt;br /&gt;
* [[LLDP_module|LLDP module]]&lt;br /&gt;
:The LLDP module extracts information from LLDP (Link Layer Discovery Protocol) messages and correlates this information to the respective MAC and IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[PPPoE module]]&lt;br /&gt;
:The PPPoE module displays all PPPoE sessions and traffic within a specific session.&lt;br /&gt;
&lt;br /&gt;
* [[Burst_analysis|Burst analysis]]&lt;br /&gt;
:The Burst analysis module measures throughput per interface or MAC address and displays utilization graphs for fast burst recognition.&lt;br /&gt;
&lt;br /&gt;
== L3 - IP Layer ==&lt;br /&gt;
* [[IP_module|IP module]]&lt;br /&gt;
:The IP module gathers information about all captured IPv4 and IPv6 addresses including the protocol used, traffic, communication peers, and connections.&lt;br /&gt;
&lt;br /&gt;
* [[IP_groups|IP groups]]&lt;br /&gt;
:The IP groups module gathers information for groups of IP addresses. Any IP subnet can be configured to be used as a group.&lt;br /&gt;
&lt;br /&gt;
* [[IP_pairs|IP pairs]]&lt;br /&gt;
:The IP pairs module shows traffic information between pairs of IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[QoS_module|QoS module]]&lt;br /&gt;
:The QoS module processes and displays traffic with QoS tags for IP DSCP on Layer 3 and VLAN PCP (and MPLS TC on Layer 2).&lt;br /&gt;
&lt;br /&gt;
* [[Geolocation_statistics|Geolocation statistics]]&lt;br /&gt;
:The Allegro Network Multimeter uses a geolocation library to identify the IP addresses of individual countries. The country information is shown in other modules; however, this web page lists all countries and their corresponding amount of traffic. It also shows detailed statistics per country including all IP addresses seen for that country.&lt;br /&gt;
&lt;br /&gt;
* [[DHCP_module|DHCP module]]&lt;br /&gt;
:The DHCP module tracks requests and responses for dynamic IP assignments in networks.&lt;br /&gt;
&lt;br /&gt;
* [[DNS_module|DNS module]]&lt;br /&gt;
:DNS name resolving is handled passively by processing all DNS requests and responses captured by the system. &lt;br /&gt;
:This module lists all IP addresses and names known by the system. This information is used by other modules to look up names.&lt;br /&gt;
&lt;br /&gt;
* [[NetBIOS_module|NetBIOS module]]&lt;br /&gt;
:The NetBIOS module monitors NetBIOS packets for tracking announced host names for IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[ICMP_module|ICMP module]]&lt;br /&gt;
:The ICMP module shows information about ICMP traffic and specific packet types.&lt;br /&gt;
&lt;br /&gt;
* [[Multicast_statistics|Multicast statistics]]&lt;br /&gt;
:The multicast module analyzes IGMP traffic and displays detailed information on multicast groups and members.&lt;br /&gt;
&lt;br /&gt;
== L4 - Transport Layer ==&lt;br /&gt;
&lt;br /&gt;
* [[Connections_module|Connections module]]&lt;br /&gt;
:The Connections module provides access to a list of connections of all IPs aggregated together based on selected sort and filter parameters.&lt;br /&gt;
&lt;br /&gt;
* [[TCP_module|TCP module]]&lt;br /&gt;
:The TCP module measures the TCP handshake time for connection setup. It allows you to identify slow responding servers in a network.&lt;br /&gt;
&lt;br /&gt;
* [[Layer_4_server_ports_module|Layer 4 server ports module]]&lt;br /&gt;
:The Layer 4 server ports module measures traffic per TCP and UDP server port.&lt;br /&gt;
&lt;br /&gt;
* [[IPSec_module|IPSec module]]&lt;br /&gt;
:The IPSec module shows information about IPSec ESP traffic and sequence counter correctness.&lt;br /&gt;
&lt;br /&gt;
== L7 - Application Layer ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[SSL_module|SSL module]]&lt;br /&gt;
:The SSL module keeps track of SSL server names and common names in SSL/TLS encrypted traffic. It enables you to get the name resolved even if no DNS has been seen.&lt;br /&gt;
&lt;br /&gt;
* [[HTTP_module|HTTP module]]&lt;br /&gt;
:The HTTP module keeps track of HTTP host names requested in HTTP connections. It allows you to get the name resolved even if no DNS has been seen and to see which virtual host is handled by a given server.&lt;br /&gt;
&lt;br /&gt;
* [[L7_module|L7 module]]&lt;br /&gt;
:The L7 module gathers information about all supported Layer 7 protocols. This includes information on how much traffic was seen for each protocol for each IPv4 and IPv6 address.&lt;br /&gt;
&lt;br /&gt;
* [[Response_time_analysis|Response time analysis]]&lt;br /&gt;
:The response-time analysis module allows you to define your own protocol request and response pattern and measure the response time and request/response loss.&lt;br /&gt;
&lt;br /&gt;
* [[SMB_statistics|SMB statistics]]&lt;br /&gt;
:The SMB module gathers information about all SMB servers handling unencrypted traffic. It shows which shares have been accessed and which files in those shares have been read or written to, together with detailed statistics per file.&lt;br /&gt;
&lt;br /&gt;
* [[SIP_module|SIP module]]&lt;br /&gt;
:The SIP statistics includes all SIP calls and their associated metadata.&lt;br /&gt;
&lt;br /&gt;
* [[NTP_module|NTP module]]&lt;br /&gt;
:The NTP module shows detailed information about Network Time Protocol servers selected and their corresponding network clients.&lt;br /&gt;
&lt;br /&gt;
* [[PTP_module|PTP module]]&lt;br /&gt;
:The PTP module stores the PTP members and their associated metadata like the PTP version.&lt;br /&gt;
&lt;br /&gt;
* [[Profinet_module|Profinet module]]&lt;br /&gt;
:The Profinet module analyzes Profinet RT cyclic and acyclic traffic and displays details on all devices and their communication relationships.&lt;br /&gt;
&lt;br /&gt;
* [[OPC-UA_module|OPC-UA module]]&lt;br /&gt;
:The OPC-UA module displays information about OPC-UA binary protocol traffic and performs response-time measurement.&lt;br /&gt;
&lt;br /&gt;
* [[IEC_60870-5-104_module|IEC 60870-5-104 module]]&lt;br /&gt;
:The IEC 60870-5-104 module shows information about IEC 60870-5-104 traffic, sequence counter correctness and response times.&lt;br /&gt;
&lt;br /&gt;
* [[Fix_module|FIX module]]&lt;br /&gt;
:The FIX module shows information about &#039;&#039;&#039;F&#039;&#039;&#039;inancial &#039;&#039;&#039;I&#039;&#039;&#039;nformation e&#039;&#039;&#039;X&#039;&#039;&#039;change traffic.&lt;br /&gt;
&lt;br /&gt;
* [[TETRA_module|TETRA module]]&lt;br /&gt;
:The TETRA module shows detailed information about &#039;&#039;&#039;Te&#039;&#039;&#039;rrestrial &#039;&#039;&#039;T&#039;&#039;&#039;runked &#039;&#039;&#039;Ra&#039;&#039;&#039;dio traffic.&lt;br /&gt;
&lt;br /&gt;
* [[QUIC module]]The QUIC Analysis Module provides comprehensive insights into &#039;&#039;&#039;Q&#039;&#039;&#039;uick &#039;&#039;&#039;U&#039;&#039;&#039;DP &#039;&#039;&#039;I&#039;&#039;&#039;nternet &#039;&#039;&#039;C&#039;&#039;&#039;onnections traffic.&lt;br /&gt;
* [[RTP_statistics|RTP statistics]]&lt;br /&gt;
:The RTP module shows detailed information about RTP codecs used.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Measurement_modules&amp;diff=4750</id>
		<title>Measurement modules</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Measurement_modules&amp;diff=4750"/>
		<updated>2024-04-17T10:09:39Z</updated>

		<summary type="html">&lt;p&gt;Simon: Add quic&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Allegro Network Multimeter provides a number of network measurement modules for different use cases. Here&lt;br /&gt;
you can find a list of modules and a short description and see the specific module for detailed documentation. &lt;br /&gt;
&lt;br /&gt;
== Generic modules ==&lt;br /&gt;
&lt;br /&gt;
* [[Capture_module|Capture module]]&lt;br /&gt;
:The Capture module lists all running captures which were started interactively in any other module. &lt;br /&gt;
:It also allows for starting new captures with specific filters.&lt;br /&gt;
&lt;br /&gt;
* [[Path_measurement|Path measurement]]&lt;br /&gt;
:This module allows you to measure packet loss and latency between two Allegro Network Multimeter installations.&lt;br /&gt;
&lt;br /&gt;
* [[Packet_ring_buffer|Packet ring buffer]]&lt;br /&gt;
:The packet ring buffer feature allows you to create a buffer of fixed size on an external storage device to which all processed packets will be recorded. If the fixed size buffer is full, the oldest packets in the buffer will be replaced with new packets in a round-robin fashion.&lt;br /&gt;
&lt;br /&gt;
* [[PCAP#Pcap_analysis_module|Pcap analysis module]]&lt;br /&gt;
:The Pcap analysis module allows for the analysis of Pcap files by sending them to the appliance. After analyzing a Pcap, the web interface displays all the metadata as if the packets are live traffic at the time of the Pcap recording.&lt;br /&gt;
&lt;br /&gt;
* [[Incidents#Incidents_module|Incidents module]]&lt;br /&gt;
:The Incidents module allows for notifications to be created when specific network incidents are detected.&lt;br /&gt;
&lt;br /&gt;
== L2 - WiFi ==&lt;br /&gt;
&lt;br /&gt;
* [[WiFi module]]&lt;br /&gt;
:This module analyse wireless frames forwarded by access points.&lt;br /&gt;
&lt;br /&gt;
== L2 - Ethernet Layer ==&lt;br /&gt;
&lt;br /&gt;
* [[MAC_module|MAC module]]&lt;br /&gt;
:The MAC module gathers information about all captured MAC addresses, including the protocols used, traffic, communication peers and MAC/IP mappings.&lt;br /&gt;
&lt;br /&gt;
* [[QoS module]]&lt;br /&gt;
:The QoS module processes and displays traffic with QoS tags VLAN PCP and MPLS TC on Layer 2 (and IP DSCP on Layer 3).&lt;br /&gt;
&lt;br /&gt;
* [[Packet_size_module|Packet size module]]&lt;br /&gt;
:The packet size module accounts the size of all packets (Layer 2 with CRC) and shows packet size distribution.&lt;br /&gt;
&lt;br /&gt;
* [[ARP_module|ARP module]]&lt;br /&gt;
:The ARP module monitors ARP packets for tracking MAC addresses and announced IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[VLAN_module|VLAN module]]&lt;br /&gt;
:The VLAN module accounts traffic per VLAN tag seen on the network.&lt;br /&gt;
&lt;br /&gt;
* [[MAC_protocols_module|MAC protocols module]]&lt;br /&gt;
:The MAC protocols module accounts traffic of all different MAC protocols.&lt;br /&gt;
&lt;br /&gt;
* [[STP_module|STP module]]&lt;br /&gt;
:The stp module analyzes STP traffic and shows a history of the identified root Bridges with their configurations.&lt;br /&gt;
&lt;br /&gt;
* [[MPLS_module|MPLS module]]&lt;br /&gt;
:The MPLS module displays information about all identified MPLS labels (single label and double-stacked).&lt;br /&gt;
&lt;br /&gt;
* [[LLDP_module|LLDP module]]&lt;br /&gt;
:The LLDP module extracts information from LLDP (Link Layer Discovery Protocol) messages and correlates this information to the respective MAC and IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[PPPoE module]]&lt;br /&gt;
:The PPPoE module displays all PPPoE sessions and traffic within a specific session.&lt;br /&gt;
&lt;br /&gt;
* [[Burst_analysis|Burst analysis]]&lt;br /&gt;
:The Burst analysis module measures throughput per interface or MAC address and displays utilization graphs for fast burst recognition.&lt;br /&gt;
&lt;br /&gt;
== L3 - IP Layer ==&lt;br /&gt;
* [[IP_module|IP module]]&lt;br /&gt;
:The IP module gathers information about all captured IPv4 and IPv6 addresses including the protocol used, traffic, communication peers, and connections.&lt;br /&gt;
&lt;br /&gt;
* [[IP_groups|IP groups]]&lt;br /&gt;
:The IP groups module gathers information for groups of IP addresses. Any IP subnet can be configured to be used as a group.&lt;br /&gt;
&lt;br /&gt;
* [[IP_pairs|IP pairs]]&lt;br /&gt;
:The IP pairs module shows traffic information between pairs of IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[QoS_module|QoS module]]&lt;br /&gt;
:The QoS module processes and displays traffic with QoS tags for IP DSCP on Layer 3 and VLAN PCP (and MPLS TC on Layer 2).&lt;br /&gt;
&lt;br /&gt;
* [[Geolocation_statistics|Geolocation statistics]]&lt;br /&gt;
:The Allegro Network Multimeter uses a geolocation library to identify the IP addresses of individual countries. The country information is shown in other modules; however, this web page lists all countries and their corresponding amount of traffic. It also shows detailed statistics per country including all IP addresses seen for that country.&lt;br /&gt;
&lt;br /&gt;
* [[DHCP_module|DHCP module]]&lt;br /&gt;
:The DHCP module tracks requests and responses for dynamic IP assignments in networks.&lt;br /&gt;
&lt;br /&gt;
* [[DNS_module|DNS module]]&lt;br /&gt;
:DNS name resolving is handled passively by processing all DNS requests and responses captured by the system. &lt;br /&gt;
:This module lists all IP addresses and names known by the system. This information is used by other modules to look up names.&lt;br /&gt;
&lt;br /&gt;
* [[NetBIOS_module|NetBIOS module]]&lt;br /&gt;
:The NetBIOS module monitors NetBIOS packets for tracking announced host names for IP addresses.&lt;br /&gt;
&lt;br /&gt;
* [[ICMP_module|ICMP module]]&lt;br /&gt;
:The ICMP module shows information about ICMP traffic and specific packet types.&lt;br /&gt;
&lt;br /&gt;
* [[Multicast_statistics|Multicast statistics]]&lt;br /&gt;
:The multicast module analyzes IGMP traffic and displays detailed information on multicast groups and members.&lt;br /&gt;
&lt;br /&gt;
== L4 - Transport Layer ==&lt;br /&gt;
&lt;br /&gt;
* [[Connections_module|Connections module]]&lt;br /&gt;
:The Connections module provides access to a list of connections of all IPs aggregated together based on selected sort and filter parameters.&lt;br /&gt;
&lt;br /&gt;
* [[TCP_module|TCP module]]&lt;br /&gt;
:The TCP module measures the TCP handshake time for connection setup. It allows you to identify slow responding servers in a network.&lt;br /&gt;
&lt;br /&gt;
* [[Layer_4_server_ports_module|Layer 4 server ports module]]&lt;br /&gt;
:The Layer 4 server ports module measures traffic per TCP and UDP server port.&lt;br /&gt;
&lt;br /&gt;
* [[IPSec_module|IPSec module]]&lt;br /&gt;
:The IPSec module shows information about IPSec ESP traffic and sequence counter correctness.&lt;br /&gt;
&lt;br /&gt;
== L7 - Application Layer ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[SSL_module|SSL module]]&lt;br /&gt;
:The SSL module keeps track of SSL server names and common names in SSL/TLS encrypted traffic. It enables you to get the name resolved even if no DNS has been seen.&lt;br /&gt;
&lt;br /&gt;
* [[HTTP_module|HTTP module]]&lt;br /&gt;
:The HTTP module keeps track of HTTP host names requested in HTTP connections. It allows you to get the name resolved even if no DNS has been seen and to see which virtual host is handled by a given server.&lt;br /&gt;
&lt;br /&gt;
* [[L7_module|L7 module]]&lt;br /&gt;
:The L7 module gathers information about all supported Layer 7 protocols. This includes information on how much traffic was seen for each protocol for each IPv4 and IPv6 address.&lt;br /&gt;
&lt;br /&gt;
* [[Response_time_analysis|Response time analysis]]&lt;br /&gt;
:The response-time analysis module allows you to define your own protocol request and response pattern and measure the response time and request/response loss.&lt;br /&gt;
&lt;br /&gt;
* [[SMB_statistics|SMB statistics]]&lt;br /&gt;
:The SMB module gathers information about all SMB servers handling unencrypted traffic. It shows which shares have been accessed and which files in those shares have been read or written to, together with detailed statistics per file.&lt;br /&gt;
&lt;br /&gt;
* [[SIP_module|SIP module]]&lt;br /&gt;
:The SIP statistics includes all SIP calls and their associated metadata.&lt;br /&gt;
&lt;br /&gt;
* [[NTP_module|NTP module]]&lt;br /&gt;
:The NTP module shows detailed information about Network Time Protocol servers selected and their corresponding network clients.&lt;br /&gt;
&lt;br /&gt;
* [[PTP_module|PTP module]]&lt;br /&gt;
:The PTP module stores the PTP members and their associated metadata like the PTP version.&lt;br /&gt;
&lt;br /&gt;
* [[Profinet_module|Profinet module]]&lt;br /&gt;
:The Profinet module analyzes Profinet RT cyclic and acyclic traffic and displays details on all devices and their communication relationships.&lt;br /&gt;
&lt;br /&gt;
* [[OPC-UA_module|OPC-UA module]]&lt;br /&gt;
:The OPC-UA module displays information about OPC-UA binary protocol traffic and performs response-time measurement.&lt;br /&gt;
&lt;br /&gt;
* [[IEC_60870-5-104_module|IEC 60870-5-104 module]]&lt;br /&gt;
:The IEC 60870-5-104 module shows information about IEC 60870-5-104 traffic, sequence counter correctness and response times.&lt;br /&gt;
&lt;br /&gt;
* [[Fix_module|FIX module]]&lt;br /&gt;
:The FIX module shows information about &#039;&#039;&#039;F&#039;&#039;&#039;inancial &#039;&#039;&#039;I&#039;&#039;&#039;nformation e&#039;&#039;&#039;X&#039;&#039;&#039;change traffic.&lt;br /&gt;
&lt;br /&gt;
* [[TETRA_module|TETRA module]]&lt;br /&gt;
:The TETRA module shows detailed information about &#039;&#039;&#039;Te&#039;&#039;&#039;rrestrial &#039;&#039;&#039;T&#039;&#039;&#039;runked &#039;&#039;&#039;Ra&#039;&#039;&#039;dio traffic.&lt;br /&gt;
&lt;br /&gt;
* [[QUIC module]]The QUIC Analysis Module provides comprehensive insights into &#039;&#039;&#039;Q&#039;&#039;&#039;uick &#039;&#039;&#039;U&#039;&#039;&#039;DP &#039;&#039;&#039;I&#039;&#039;&#039;nternet &#039;&#039;&#039;C&#039;&#039;&#039;onnections traffic.&lt;br /&gt;
&lt;br /&gt;
* [[RTP_statistics|RTP statistics]]&lt;br /&gt;
:The RTP module shows detailed information about RTP codecs used.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=QUIC_module&amp;diff=4749</id>
		<title>QUIC module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=QUIC_module&amp;diff=4749"/>
		<updated>2024-04-17T10:05:19Z</updated>

		<summary type="html">&lt;p&gt;Simon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The QUIC Analysis Module provides insights into QUIC (Quick UDP Internet Connections) traffic, a modern transport protocol developed by Google and designed to improve upon traditional TCP connections. This module offers detailed information on various aspects of QUIC traffic, enabling users to understand and analyze communication patterns and data exchanges. QUIC is currently utilized in various applications such as web browsing, video streaming, and online gaming, offering enhanced performance and security benefits over traditional protocols. The QUIC protocol is described in detail in [https://datatracker.ietf.org/doc/html/rfc9000 RFC 9000] (V1) and [https://datatracker.ietf.org/doc/rfc9369/ RFC 9369] (V2).&lt;br /&gt;
&lt;br /&gt;
This module supports QUIC initial decoding for the draft protocol versions 29, 31, and 32, as well as version 1 and 2 to read TLS information if the option &amp;quot;&#039;&#039;&#039;Decode server name from handshakes&#039;&#039;&#039;&amp;quot; is enabled in the &amp;quot;&#039;&#039;&#039;Module Settings&#039;&#039;&#039;&amp;quot; tab. This functionality allows users to delve deeper into the cryptographic properties and security features of QUIC connections, providing a comprehensive analysis experience.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=QUIC_module&amp;diff=4748</id>
		<title>QUIC module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=QUIC_module&amp;diff=4748"/>
		<updated>2024-04-17T10:04:48Z</updated>

		<summary type="html">&lt;p&gt;Simon: Created page with &amp;quot;The QUIC Analysis Module provides insights into QUIC (Quick UDP Internet Connections) traffic, a modern transport protocol developed by Google and designed to improve upon traditional TCP connections. This module offers detailed information on various aspects of QUIC traffic, enabling users to understand and analyze communication patterns and data exchanges. QUIC is currently utilized in various applications such as web browsing, video streaming, and online gaming, offer...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The QUIC Analysis Module provides insights into QUIC (Quick UDP Internet Connections) traffic, a modern transport protocol developed by Google and designed to improve upon traditional TCP connections. This module offers detailed information on various aspects of QUIC traffic, enabling users to understand and analyze communication patterns and data exchanges. QUIC is currently utilized in various applications such as web browsing, video streaming, and online gaming, offering enhanced performance and security benefits over traditional protocols. The QUIC protocol is described in detail in [https://datatracker.ietf.org/doc/html/rfc9000 RFC 9000] (V1) and [https://datatracker.ietf.org/doc/rfc9369/ RFC 9369].&lt;br /&gt;
&lt;br /&gt;
This module supports QUIC initial decoding for the draft protocol versions 29, 31, and 32, as well as version 1 and 2 to read TLS information if the option &amp;quot;&#039;&#039;&#039;Decode server name from handshakes&#039;&#039;&#039;&amp;quot; is enabled in the &amp;quot;&#039;&#039;&#039;Module Settings&#039;&#039;&#039;&amp;quot; tab. This functionality allows users to delve deeper into the cryptographic properties and security features of QUIC connections, providing a comprehensive analysis experience.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=REST_API_description&amp;diff=4142</id>
		<title>REST API description</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=REST_API_description&amp;diff=4142"/>
		<updated>2023-01-17T12:17:33Z</updated>

		<summary type="html">&lt;p&gt;Simon: /* REST API Examples */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page describes how to access and use the REST API. It allows to post-process data with 3rd party systems. The Allegro Network Multimeter web interface is itself based on this REST API and all displayed statistics can be extracted from the Allegro Network Multimeter with this API.&lt;br /&gt;
&lt;br /&gt;
== General API Setup ==&lt;br /&gt;
&lt;br /&gt;
=== REST API Interface ===&lt;br /&gt;
&lt;br /&gt;
All Allegro Network Multimeter statistics are derived from HTTPS requests and provided as JSON objects.&lt;br /&gt;
The requests are stateless, i.e. there are no prerequisites and there is no fixed sequence of requests necessary.&lt;br /&gt;
Example requests related to a specific module and statistics can be seen in the web interface by opening the browser development console (Ctrl+Shift+I for Chrome and Firefox, F12 for Edge).&lt;br /&gt;
&lt;br /&gt;
Here an example of the structured JSON data for the IP overview. This data has been extracted with the Google Chrome developer console while accessing the IP statistics page.&lt;br /&gt;
&lt;br /&gt;
[[File:Rest api chrome console.png|800px]]&lt;br /&gt;
&lt;br /&gt;
=== Credentials === &lt;br /&gt;
&lt;br /&gt;
The credentials are the same as for the web interface. The admin user allows to access all APIs. A non-admin user has read access to most of the statistics. If you have enabled the pcap role, the capture URL is also possible for the API.&lt;br /&gt;
&lt;br /&gt;
Allegro Packets recommends to set up a separate non-admin user with or without the pcap role for the REST API of only statistics shall be gathered. This will prevent to accidentally shut down or change any configuration by calling the REST API.&lt;br /&gt;
&lt;br /&gt;
== Useful shell commands and their parameters  ==&lt;br /&gt;
&lt;br /&gt;
=== Curl ===&lt;br /&gt;
&lt;br /&gt;
Most examples are written for curl [https://en.wikipedia.org/wiki/CURL]. Curl is available as for many operating systems like Linux or Windows. Curl needs a few parameters for the access of the Allegro Network Multimeter:&lt;br /&gt;
&lt;br /&gt;
The parameter &#039;&#039;&#039;-u&#039;&#039;&#039; allows you to set a user name and password for the request. &lt;br /&gt;
&lt;br /&gt;
The parameter &#039;&#039;&#039;-k&#039;&#039;&#039; will allow self-signed certificates.&lt;br /&gt;
&lt;br /&gt;
The parameter &#039;&#039;&#039;-s&#039;&#039;&#039; or &#039;&#039;&#039;--silent&#039;&#039;&#039; mutes any debugging output.&lt;br /&gt;
&lt;br /&gt;
The URL of the API call is the first argument. It is recommended to enclose the API call with the character &#039; to avoid replacing the argument ( unless you need to replace parts of it )&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl --silent -k -u USER:PASSWORD &#039;https://allegro-mm-XXXX/...&#039;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that you might need to use &amp;lt;code&amp;gt;curl.exe&amp;lt;/code&amp;gt; in windows.&lt;br /&gt;
&lt;br /&gt;
=== PowerShell ===&lt;br /&gt;
&lt;br /&gt;
The Integrated Windows PowerShell can be used to access the REST API. This guide requires at least PowerShell v6.&lt;br /&gt;
&lt;br /&gt;
The command to call a REST API is &#039;&#039;&#039;Invoke-RestMethod&#039;&#039;&#039; [https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.utility/invoke-restmethod].&lt;br /&gt;
Invoke-RestMethod on the PowerShell needs a few parameters for the access of the Allegro Network Multimeter:&lt;br /&gt;
&lt;br /&gt;
To set the user name for basic authorization, use the &#039;&#039;&#039;-Headers&#039;&#039;&#039; parameter:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;-Headers @{Authorization = (&amp;quot;Basic {0}&amp;quot; -f [Convert]::ToBase64String([Text.Encoding]::ASCII.GetBytes((&amp;quot;{0}:{1}&amp;quot; -f &#039;USER&#039;, &#039;PASSWORD&#039;))))}&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You also need to announce that you accept JSON as response with:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;-ContentType&#039;application/json; charset=utf-8&#039;&amp;lt;/pre&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To disable the certificate check, use:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;-SkipCertificateCheck&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The URL must be passed with the parameter &#039;&#039;&#039;-Uri&#039;&#039;&#039;, so the full command is:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;Invoke-RestMethod -Uri &#039;https://allegro-mm-XXXX/...&#039; -Headers @{Authorization = (&amp;quot;Basic {0}&amp;quot; -f [Convert]::ToBase64String([Text.Encoding]::ASCII.GetBytes((&amp;quot;{0}:{1}&amp;quot; -f &#039;USER&#039;, &#039;PASSWORD&#039;))))} -ContentType&#039;application/json; charset=utf-8&#039; -Method &#039;Get&#039; -SkipCertificateCheck&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== jq ===&lt;br /&gt;
&lt;br /&gt;
jq ([https://stedolan.github.io/jq/]) is a powerful tool to extract parameters from a json document. If called without parameters, jq formats the JSON output into a readable format with indenting and new lines. It also allows to select specific values and do basic operations like addition with this values.&lt;br /&gt;
Please read the jq documentation for more information.&lt;br /&gt;
&lt;br /&gt;
== API hierarchy ==&lt;br /&gt;
&lt;br /&gt;
=== Query available URIs with OPTIONS ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter REST API has the fixed URI &amp;lt;code&amp;gt;API/stats&amp;lt;/code&amp;gt; for statistics. To see all possible subtrees of a specific request, use the &#039;&#039;&#039;OPTIONS&#039;&#039;&#039; request instead of &#039;&#039;&#039;GET&#039;&#039;&#039;. It can be set with the parameter &amp;lt;code&amp;gt;-X OPTIONS&amp;lt;/code&amp;gt; for curl.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ curl --silent -k -u USER:PASSWORD &#039;https://allegro-mm/API/stats&#039; -X OPTIONS&lt;br /&gt;
{&lt;br /&gt;
  &amp;quot;subResources&amp;quot;: [&lt;br /&gt;
    &amp;quot;modules&amp;quot;,&lt;br /&gt;
    &amp;quot;reports&amp;quot;,&lt;br /&gt;
    &amp;quot;incidentReporting&amp;quot;,&lt;br /&gt;
    &amp;quot;time&amp;quot;,&lt;br /&gt;
    &amp;quot;ringBufferReplay&amp;quot;,&lt;br /&gt;
    &amp;quot;pcap&amp;quot;,&lt;br /&gt;
    &amp;quot;reset&amp;quot;,&lt;br /&gt;
    &amp;quot;interfacesError&amp;quot;,&lt;br /&gt;
    &amp;quot;interfaces&amp;quot;,&lt;br /&gt;
    &amp;quot;load&amp;quot;,&lt;br /&gt;
    &amp;quot;processing&amp;quot;&lt;br /&gt;
  ]&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This allows you to query for example for all modules that are available for a specific release of the Allegro Network Multimeter:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ curl --silent -k -u USER:PASSWORD &#039;https://allegro-mm/API/stats/modules&#039; -X OPTIONS&lt;br /&gt;
{&lt;br /&gt;
  &amp;quot;subResources&amp;quot;: [&lt;br /&gt;
    &amp;quot;pppoe&amp;quot;,&lt;br /&gt;
    &amp;quot;lldp&amp;quot;,&lt;br /&gt;
    &amp;quot;groups&amp;quot;,&lt;br /&gt;
    &amp;quot;mpls&amp;quot;,&lt;br /&gt;
    &amp;quot;opc_ua&amp;quot;,&lt;br /&gt;
    &amp;quot;quality&amp;quot;,&lt;br /&gt;
    &amp;quot;ipsec&amp;quot;,&lt;br /&gt;
    &amp;quot;profinet&amp;quot;,&lt;br /&gt;
    &amp;quot;multicast&amp;quot;,&lt;br /&gt;
    &amp;quot;burst_analysis&amp;quot;,&lt;br /&gt;
    &amp;quot;global_incidents&amp;quot;,&lt;br /&gt;
    &amp;quot;ptp&amp;quot;,&lt;br /&gt;
    &amp;quot;ntp&amp;quot;,&lt;br /&gt;
    &amp;quot;icmp&amp;quot;,&lt;br /&gt;
    &amp;quot;stp&amp;quot;,&lt;br /&gt;
    &amp;quot;sip&amp;quot;,&lt;br /&gt;
    &amp;quot;smb&amp;quot;,&lt;br /&gt;
    &amp;quot;dpa&amp;quot;,&lt;br /&gt;
    &amp;quot;l4_ports&amp;quot;,&lt;br /&gt;
    &amp;quot;netbios&amp;quot;,&lt;br /&gt;
    &amp;quot;crt&amp;quot;,&lt;br /&gt;
    &amp;quot;dpi&amp;quot;,&lt;br /&gt;
    &amp;quot;http&amp;quot;,&lt;br /&gt;
    &amp;quot;ssl&amp;quot;,&lt;br /&gt;
    &amp;quot;dns&amp;quot;,&lt;br /&gt;
    &amp;quot;dhcp&amp;quot;,&lt;br /&gt;
    &amp;quot;location&amp;quot;,&lt;br /&gt;
    &amp;quot;qos&amp;quot;,&lt;br /&gt;
    &amp;quot;ip&amp;quot;,&lt;br /&gt;
    &amp;quot;mac_protocols&amp;quot;,&lt;br /&gt;
    &amp;quot;vlan&amp;quot;,&lt;br /&gt;
    &amp;quot;arp&amp;quot;,&lt;br /&gt;
    &amp;quot;packet_size&amp;quot;,&lt;br /&gt;
    &amp;quot;mac&amp;quot;,&lt;br /&gt;
    &amp;quot;capture&amp;quot;&lt;br /&gt;
  ]&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== URI content parameters ===&lt;br /&gt;
&lt;br /&gt;
Some modules allow to use a parameter as part of the URI like the IP or Mac address. The path &amp;lt;code&amp;gt;API/stats/modules/ip/ips&amp;lt;/code&amp;gt; allows you to use an IP address as next uri element&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ curl --silent -k -u USER:PASSWORD &#039;https://allegro-mm/API/stats/modules/ip/ips&#039; -X OPTIONS&lt;br /&gt;
{&lt;br /&gt;
  &amp;quot;subResources&amp;quot;: [&lt;br /&gt;
    &amp;quot;protocol&amp;quot;,&lt;br /&gt;
    &amp;quot;:ip&amp;quot;&lt;br /&gt;
  ]&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The path of an IP address shows all further available elements:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ curl --silent -k -u USER:PASSWORD &#039;https://allegro-mm/API/stats/modules/ip/ips/10.0.54.254&#039; -X OPTIONS&lt;br /&gt;
{&lt;br /&gt;
  &amp;quot;subResources&amp;quot;: [&lt;br /&gt;
    &amp;quot;sip_request_responses&amp;quot;,&lt;br /&gt;
    &amp;quot;peers_ports&amp;quot;,&lt;br /&gt;
    &amp;quot;sip_responses&amp;quot;,&lt;br /&gt;
    &amp;quot;sip_requests&amp;quot;,&lt;br /&gt;
    &amp;quot;qos&amp;quot;,&lt;br /&gt;
    &amp;quot;ports&amp;quot;,&lt;br /&gt;
    &amp;quot;connections&amp;quot;,&lt;br /&gt;
    &amp;quot;protocols&amp;quot;,&lt;br /&gt;
    &amp;quot;macs&amp;quot;,&lt;br /&gt;
    &amp;quot;peers&amp;quot;,&lt;br /&gt;
    &amp;quot;tcpStats&amp;quot;&lt;br /&gt;
  ]&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== JSON output traffic counters ==&lt;br /&gt;
&lt;br /&gt;
All counters are aggregated counters, either for the selected time interval or since the processing start of the Allegro Network Multimeter. Many traffic counters have 4 separate values. These traffic counters are represented as a JSON array with at least 4 lines. The structure is as follows:&lt;br /&gt;
* line 1: &#039;&#039;&#039;received packets&#039;&#039;&#039;, extraction example: jq .lastSecond[0]&lt;br /&gt;
* line 2: &#039;&#039;&#039;received bytes&#039;&#039;&#039;, extraction example: jq .lastSecond[1]&lt;br /&gt;
* line 3: &#039;&#039;&#039;transmitted packets&#039;&#039;&#039;, extraction example: jq .lastSecond[2]&lt;br /&gt;
* line 4: &#039;&#039;&#039;transmitted bytes&#039;&#039;&#039;, extraction example: jq .lastSecond[3]&lt;br /&gt;
* additional lines are module specific&lt;br /&gt;
&lt;br /&gt;
The following counters exist for many REST APIs like IP, MAC, l4 protocol, l7 protocol and many more:&lt;br /&gt;
* &#039;&#039;&#039;interval&#039;&#039;&#039;: Values of the selected time interval. If no interval is specified, this is similar to lastSecond.&lt;br /&gt;
* &#039;&#039;&#039;allTime&#039;&#039;&#039;: Values since start of the Allegro Network Multimeter.&lt;br /&gt;
* &#039;&#039;&#039;lastSecond&#039;&#039;&#039;: Values of the last second.&lt;br /&gt;
* &#039;&#039;&#039;intervalPerSecond&#039;&#039;&#039;: Average per second value of the selected time interval. If no interval is specified, this is similar to lastSecond.&lt;br /&gt;
&lt;br /&gt;
Please note that all counters are byte counters, not bit counters. You need to multiply the counters by 8 to get the bitrate.&lt;br /&gt;
&lt;br /&gt;
This example extracts the received bytes of the last second of a specific IP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl --silent -k -u USER:PASSWORD &#039;https://allegro-mm/API/stats/modules/ip/ips/10.1.2.3&#039; | jq .lastSecond[1]&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This example extracts received and transmitted bytes of the last second of a specific IP.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl --silent -k -u USER:PASSWORD &#039;https://allegro-mm/API/stats/modules/ip/ips/10.1.2.3&#039; | jq &#039;.lastSecond[1] + .lastSecond[3]&#039;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== API parameters ==&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter REST API has a number of query parameters that can be added to modify the request. By default, the API will display the real time counters since the last restart of the processing unit.&lt;br /&gt;
&lt;br /&gt;
This example extracts the amount of received and transmitted bytes for an IP address since the processing start of the Allegro Network Multimeter. It queries via the REST API the JSON and then adds the values second value  ( row 1, rx bytes ) and 4th value ( row 3, tx bytes ) of the interval counters together. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ curl --silent -k -u USER:PASSWORD &amp;quot;https://allegro-mm/API/stats/modules/ip/ips/10.54.0.254&amp;quot; | jq &#039;.interval[1] + .interval[3]&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Time interval selection ===&lt;br /&gt;
&lt;br /&gt;
Requests can be given a time interval. If present, the &#039;&#039;&#039;interval&#039;&#039;&#039; counters are adjusted to this interval.  The following GET parameters are necessary:&lt;br /&gt;
* &#039;&#039;&#039;starttime&#039;&#039;&#039;, &#039;&#039;&#039;endtime&#039;&#039;&#039;: Start and end time of the interval. Format: seconds since 1970/01/01 UTC (Unix time, epoch). You can use &amp;lt;code&amp;gt;date +%s&amp;lt;/code&amp;gt; on your machine to adjust to the best interval. Please consult the man page of date for more parameters.&lt;br /&gt;
* &#039;&#039;&#039;skiphistorydata&#039;&#039;&#039;: shall the JSON include the history data without datasets, this reduces the amount of transferred bytes if datasets are required to render a graph, can be false/true default: false&lt;br /&gt;
* &#039;&#039;&#039;timespan&#039;&#039;&#039;: required resolution for the graph dataset&lt;br /&gt;
&lt;br /&gt;
This example extracts the amount of received and transmitted bytes for an IP address for the last 24 hours.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ curl --silent -k -u USER:PASSWORD &amp;quot;https://allegro-mm/API/stats/modules/ip/ips/10.54.0.254?starttime=$(date --date=&amp;quot;1 day ago&amp;quot; +%s)&amp;amp;endtime=$(date +%s)&amp;amp;skiphistorydata=true&amp;quot; | jq &#039;.interval[1] + .interval[3]&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== List queries ===&lt;br /&gt;
&lt;br /&gt;
List queries are requested with pagination parameters to reduce the size of the resulting JSON objects and to increase performance. In the resulting JSON object, the list elements are stored in the displayedItems array.&lt;br /&gt;
The following list parameters are possible:&lt;br /&gt;
&lt;br /&gt;
* sort: Sorting criteria for the list. Following criteria&#039;s are supported for most lists:&lt;br /&gt;
** bytes: Received and transmitted bytes (either in selected time interval or since start of the Allegro Network Multimeter).&lt;br /&gt;
** rxbytes: Received bytes.&lt;br /&gt;
** txbytes: Transmitted bytes.&lt;br /&gt;
** bps: Received and transmitted bytes per second (either average per second value of the selected time interval or last second, if no interval is specified).&lt;br /&gt;
** rxbps: Received bytes per second.&lt;br /&gt;
** txbps: Transmitted bytes per second.&lt;br /&gt;
* reverse: Sort ascending (= false) or descending (= true).&lt;br /&gt;
* page: Requested page.&lt;br /&gt;
* count: Amount of entries in the list. Maximum is 100.&lt;br /&gt;
* values: Amount of maximal values in history object(s).&lt;br /&gt;
&lt;br /&gt;
This example shows IP address with the highest amount of traffic&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl --silent -k -u USER:PASSWORD &#039;https://allegro-mm/API/stats/modules/ip/ips_paged?sort=bps&amp;amp;reverse=true&amp;amp;page=0&amp;amp;count=1&#039; | jq .displayedItems[0].ip&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This example shows up to 9999 peers of a specific IP address:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl --silent -k -u USER:PASSWORD &#039;https://allegro-mm/API/stats/modules/ip/ips/10.1.2.3/peers?sort=bytes&amp;amp;reverse=true&amp;amp;page=0&amp;amp;count=9999&amp;amp;timespan=60&amp;amp;values=100&#039; | jq &#039;.displayedItems[].ip&#039;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Pcap extraction ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter allows to extract the raw packets with the REST API with the special capture URI &amp;lt;code&amp;gt;/API/data/modules/capture&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl -k -u USER:PASSWORD &#039;https://allegro-mm/API/data/modules/capture?expression=ip==10.1.2.3&#039; &amp;gt; path_to/capture.pcap&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The available parameters are:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;startTime&#039;&#039;&#039;: The start time of the capture. The first packet with exactly this or a later time will start the capture. The time format must be microseconds after January, 1st 1970 UTC (Unix time, epoch). If the start time is in the past, make sure you set fromCaptureBuffer parameter accordingly. If not specified, the current time will be used.&lt;br /&gt;
* &#039;&#039;&#039;endTime&#039;&#039;&#039;: The end time of the capture. The first packet with exactly this or a later time will stop the capture. The time format must be microseconds after January, 1st 1970 UTC (Unix time, epoch). If not specified,  unlimited will be used. The end time can also be set to &#039;now&#039;, in this case the timespan parameter will be taken and the corresponding start time will be calculated.&lt;br /&gt;
* &#039;&#039;&#039;timespan&#039;&#039;&#039;: The time span in seconds. Will be used if no startTime but endTime with &#039;now&#039; is set.&lt;br /&gt;
* &#039;&#039;&#039;expression&#039;&#039;&#039;: The filter expression. There are no whitespaces allowed. You may use ‘%20’ instead. See [[Capture module]] for available expressions.&lt;br /&gt;
* &#039;&#039;&#039;snapPacketLength&#039;&#039;&#039;: The maximum size of a packet applied on Layer 2 without frame check sequence. If a packet is larger than this value, it is truncated. Use 65535 for unlimited size.&lt;br /&gt;
* &#039;&#039;&#039;fromCaptureBuffer&#039;&#039;&#039;: Whether to extract data from the packet ring buffer (= true) or just live traffic (= false).&lt;br /&gt;
* &#039;&#039;&#039;captureBufferSlotId&#039;&#039;&#039;: In case a cluster packet ring buffer is used, the id of the ring buffer must be given. The id of the first ring buffer is 0. If this parameter is omitted, 0 will be taken as default value.&lt;br /&gt;
* &#039;&#039;&#039;captureToMedia&#039;&#039;&#039;: Whether to store a pcap on an external storage device (= true) or download to your computer (= false).&lt;br /&gt;
* &#039;&#039;&#039;mm-id&#039;&#039;&#039;: If you are extracting a Pcap from a parallel Pcap analysis job or a multi device connected Allegro Network Multimeter, you have to specify the device and the slot where to get the data from. The syntax is: &amp;lt;code&amp;gt;mm-id=&amp;lt;device name&amp;gt;:&amp;lt;slot id&amp;gt;&amp;lt;/code&amp;gt;. If the capture shall be performed on the local device, the device name can be omited (e.g. mm-id=:1 for the first replay slot on the local device).&lt;br /&gt;
&lt;br /&gt;
Example to capture everything from now on:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl -k -u USER:PASSWORD &#039;https://allegro-mm/API/data/modules/capture&#039; &amp;gt; path_to/capture.pcap&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Example to capture a specific IP of the last hour&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl -k -u USER:PASSWORD &amp;quot;https://allegro-mm/API/data/modules/capture?expression=ip==10.1.2.3&amp;amp;starttime=$(($(date --date=&amp;quot;1 hour ago&amp;quot; +%s%N)/1000))&amp;amp;endtime=$(($(date +%s%N)/1000))&amp;amp;fromCaptureBuffer=true&amp;quot; &amp;gt; path_to/capture.pcap&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Example to capture a specific IP of a given time span of the first parallel Pcap analysis slot&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl -k -u USER:PASSWORD &amp;quot;https://allegro-mm/API/data/modules/capture?expression=ip==10.1.2.3&amp;amp;starttime=$(($(date --date=&amp;quot;2020-07-15 08:55:00&amp;quot; +%s%N)/1000))&amp;amp;endtime=$(($(date --date=&amp;quot;2020-07-15 09:55:00&amp;quot; +%s%N)/1000))&amp;amp;fromCaptureBuffer=true&amp;amp;mm-id=:1&amp;quot; &amp;gt; path_to/capture.pcap&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Pcap upload and analysis ===&lt;br /&gt;
&lt;br /&gt;
Pcap upload and analysis can also be done via API calls.&lt;br /&gt;
&lt;br /&gt;
The PCAP upload is split into 3 commands. First, the replay is being initialized. Then the analyzing is started. In the last step the PCAP is streamed to the Allegro Network Multimeter. Depending on the size of the PCAP the third step could take some time, but the Allegro Network Multimeter already allows access to the statistics of the already analyzed packets via web/API.&lt;br /&gt;
&lt;br /&gt;
The example assumes that PCAP parallel analysis is enabled in the global settings, so the PCAP analysis will be done in slot 1 and a dedicated ring buffer is available.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
curl -k -u USER:PASSWORD &amp;quot;https://allegro-mm/API/system/replay/upload&amp;quot; -d &#039;{&amp;quot;fileName&amp;quot;: &amp;quot;abc.pcapng&amp;quot;, &amp;quot;fileSize&amp;quot;: &#039;$(stat -c %s abc.pcapng)&#039;, &amp;quot;replaySlotID&amp;quot;: 1, &amp;quot;forceSlotID&amp;quot;: true, &amp;quot;useReplayBuffer&amp;quot;: true}&#039;&lt;br /&gt;
curl -k -u USER:PASSWORD &amp;quot;https://allegro-mm/API/data/pcap?mm-id=:1&amp;quot; -d &#039;{&amp;quot;command&amp;quot;:&amp;quot;start&amp;quot;}&#039;&lt;br /&gt;
curl -F &#039;name=file&#039; -F &#039;filename=abc.pcapng&#039; -F &#039;file=@path_to/abc.pcapng&#039; -k -u USER:PASSWORD &amp;quot;https://allegro-mm/API/system/analyze-pcap?replaySlotID=1&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Virtual Link Groups ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter REST API allows to access all link groups by the parameter &#039;&#039;&#039;group&#039;&#039;&#039;. The group index starts at zero, which is the default value. If a virtual link group is enabled. &lt;br /&gt;
&lt;br /&gt;
This example extracts the traffic of the IP 10.54.0.254 from the second virtual link group ( index 1 ).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ curl --silent -k -u USER:PASSWORD &amp;quot;https://allegro-mm/API/stats/modules/ip/ips/10.54.0.254?group=1&amp;quot; | jq &#039;.interval[1] + .interval[3]&#039;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Parallel pcap analysis ===&lt;br /&gt;
&lt;br /&gt;
The Allegro Network Multimeter can process in parallel offline traffic like a pcap file or a ring buffer. In case a parallel PCAP analysis is running, the API call must be given either the additional header field &amp;lt;code&amp;gt;&amp;quot;X-AllegroPackets-Multimeter-ID: :1&amp;quot;&amp;lt;/code&amp;gt; or the parameter mm-id with the PCAP instance ID.&lt;br /&gt;
&lt;br /&gt;
This allows to extract information of automated pcap uploads.&lt;br /&gt;
&lt;br /&gt;
=== Multi-device analysis ===&lt;br /&gt;
&lt;br /&gt;
If the Allegro Network Multimeter is configured as a gateway for multiple Allegro devices by the [[Multi-device settings]], you need to add either the additional header field &amp;lt;code&amp;gt;&amp;quot;X-AllegroPackets-Multimeter-ID: hostname&amp;quot;&amp;lt;/code&amp;gt; or the parameter mm-id where the hostname must be the same as configured in the multi-device settings.&lt;br /&gt;
&lt;br /&gt;
== REST API Examples ==&lt;br /&gt;
&lt;br /&gt;
==== MAC statistics ====&lt;br /&gt;
&lt;br /&gt;
Extract the packets per second statistic of the MAC broadcast address&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl --silent -k -u USER:PASSWORD &#039;https://allegro-mm/API/stats/modules/mac/macs/ff:ff:ff:ff:ff:ff&#039;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== IP statistics ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl --silent -k -u USER:PASSWORD &#039;https://allegro-mm/API/stats/modules/ip/ips/10.1.2.3&#039;&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Pretty displaying JSON output with jq ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl --silent -k -u USER:PASSWORD &#039;https://allegro-mm-XXXX/API/stats/modules/ip/ips/10.1.2.3&#039; | jq&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Capture a specific IP ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl -k -u USER:PASSWORD &#039;https://allegro-mm-XXXX/API/data/modules/capture?expression=ip==10.1.2.3&#039; &amp;gt; path_to/capture.pcap&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Capture two IP addresses with ports on a specific Layer 4 protocol ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;curl -k -u USER:PASSWORD &#039;https://allegro-mm-XXXX/API/data/modules/capture?expression=IP==10.1.2.3:62887 and IP==10.1.2.100:548 and l4Protocol==TCP&#039; &amp;gt; path_to/capture.pcap&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Output IP Table as CSV file ====&lt;br /&gt;
&amp;lt;pre&amp;gt;curl -k -u USER:PASSWORD &#039;https://allegro-mm-XXXX/API/stats/modules/ip/ips_paged?csv=true&#039; &amp;gt; path_to/file.csv&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Output Connection Table as CSV file ====&lt;br /&gt;
&amp;lt;pre&amp;gt;curl -k -u USER:PASSWORD &#039;https://allegro-mm-XXXX/API/stats/modules/ip/globalConnections/csv?csv=true&#039; &amp;gt; path_to/file.csv&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Multi-device Capture Python Script Example ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#! /usr/bin/python3&lt;br /&gt;
&lt;br /&gt;
&amp;quot;&amp;quot;&amp;quot; This example script starts a parallel download-capture for each &#039;multi-device&#039; of a given allegro packets multimeter. &amp;quot;&amp;quot;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import threading&lt;br /&gt;
import datetime&lt;br /&gt;
import shutil&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
def start_capture_download(host: str, device: dict, duration: int):&lt;br /&gt;
    start = datetime.datetime.now()&lt;br /&gt;
    end = start + datetime.timedelta(seconds=duration)&lt;br /&gt;
    file = device[&amp;quot;host&amp;quot;] + start.strftime(&amp;quot;%m-%d-%Y_%H-%M-%S&amp;quot;) + &amp;quot;.pcap&amp;quot;&lt;br /&gt;
    params = {&lt;br /&gt;
        &amp;quot;mm-id&amp;quot;: device[&amp;quot;id&amp;quot;],&lt;br /&gt;
        &amp;quot;endTime&amp;quot;: int(end.timestamp() * 1000000),&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    with session.get(host + &amp;quot;/API/data/modules/capture&amp;quot;, params=params, stream=True) as resp:&lt;br /&gt;
        with open(file, &amp;quot;wb&amp;quot;) as fh:&lt;br /&gt;
            shutil.copyfileobj(resp.raw, fh)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
host = &amp;quot;https://allegro-mm-xxxx&amp;quot;&lt;br /&gt;
session = requests.Session()&lt;br /&gt;
session.auth = (&amp;quot;user&amp;quot;, &amp;quot;password&amp;quot;)&lt;br /&gt;
# session.verify = False  # disable ssl verification&lt;br /&gt;
&lt;br /&gt;
with session.get(host + &amp;quot;/API/system/multidevice/devices&amp;quot;) as resp:&lt;br /&gt;
    devices = resp.json()&lt;br /&gt;
&lt;br /&gt;
active_devices = []&lt;br /&gt;
for device in devices:&lt;br /&gt;
    if device[&amp;quot;active&amp;quot;]:&lt;br /&gt;
        active_devices.append(device)&lt;br /&gt;
&lt;br /&gt;
threads = []&lt;br /&gt;
for device in active_devices:&lt;br /&gt;
    t = threading.Thread(target=start_capture_download, args=(host, device, 30))&lt;br /&gt;
    t.start()&lt;br /&gt;
    threads.append(t)&lt;br /&gt;
&lt;br /&gt;
for t in threads:&lt;br /&gt;
    t.join()&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Ingress_filter&amp;diff=4086</id>
		<title>Ingress filter</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Ingress_filter&amp;diff=4086"/>
		<updated>2022-09-09T11:17:14Z</updated>

		<summary type="html">&lt;p&gt;Simon: /* Statistics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Ingress (NIC) filter ===&lt;br /&gt;
&lt;br /&gt;
The ingress (NIC) filter page, allows setting allow/deny filters for live traffic preprocessing. Filtered out/denied traffic, will NOT become available throughout the dashboard nor the packet ring buffer. Filtered out/denied traffic will be irretrievable for (post) analysis.&lt;br /&gt;
&lt;br /&gt;
Filters can be applied for:&lt;br /&gt;
&lt;br /&gt;
* IP addresses (with possible subnet mask).&lt;br /&gt;
* pairs of IP addresses (with possible subnet mask).&lt;br /&gt;
* MAC addresses.&lt;br /&gt;
* VLAN tags (or none for no VLAN tag).&lt;br /&gt;
* specific TCP/UDP ports.&lt;br /&gt;
* physical interface IDs (as listed in Interface statistics).&lt;br /&gt;
* duplicate packets.&lt;br /&gt;
&lt;br /&gt;
They can all be set to either deny list or allow list mode. &lt;br /&gt;
Filtering will be evaluated for every packet in tab order. &lt;br /&gt;
The more restrictive filter will be applied. &lt;br /&gt;
For instance if no IP address is denied but a specific MAC address is on the deny list, no traffic for that MAC address will be processed.&lt;br /&gt;
&lt;br /&gt;
NOTE: The ingress (NIC) filter is applied to live traffic only, i.e. the traffic sent to the monitoring interfaces of an Allegro Network Multimeter. When replaying data from the ring buffer, loading a pcap or using the remote traffic capture feature, filtering is not used and/or applied.&lt;br /&gt;
&lt;br /&gt;
NOTE: The data recorded to/stored in the Packet Ring buffer, is of course also affected by the Ingress filter. Additional ring buffer capture rules may be configured under &amp;quot;Generic - Packet Ring Buffer&amp;quot;, further explained in our wiki here [[Packet ring buffer#Packet%20ring%20buffer%20snapshot%20length%20filter|https://allegro-packets.com/wiki/Packet_ring_buffer#Packet_ring_buffer_snapshot_length_filter]]&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[File:NIC filter.png|1000px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== IP filters ===&lt;br /&gt;
&lt;br /&gt;
In the IP filter/IP pair filter, IP addresses and IP ranges can be entered with their respective subnet mask.&lt;br /&gt;
* /32 subnet mask: 192.168.1.1/32 means the filter will deny/allow IP 192.168.1.1  &lt;br /&gt;
* /24 subnet mask: 192.168.1.0/24 means the filter will deny/allow IP range 192.168.1.0 - 192.168.1.255&lt;br /&gt;
* /16 subnet mask: 192.168.0.0/16 means the filter will deny/allow IP range 192.168.0.0 - 192.168.255.255&lt;br /&gt;
&lt;br /&gt;
The IP filter/IP pair filter allows for importing an IP list in the following format:&lt;br /&gt;
&lt;br /&gt;
 #A line with a comment&lt;br /&gt;
 1.2.3.1&lt;br /&gt;
 1.2.3.2&lt;br /&gt;
 1.2.3.3&lt;br /&gt;
&lt;br /&gt;
By clicking on &#039;&#039;&#039;Import list&#039;&#039;&#039; a dialogue box will be opened where you can choose to download such a list from a given URL or specify a file from your system. The IP addresses are added to the existing ones up to a maximum of 10000 addresses.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Export list&#039;&#039;&#039; button allows for exporting the IP filter list in the same format as the import.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Delete all&#039;&#039;&#039; button allows for deleting all IP addresses from the filter list.&lt;br /&gt;
&lt;br /&gt;
=== Packet deduplication ===&lt;br /&gt;
&lt;br /&gt;
Packet deduplication provides the ability to filter packets from live traffic which have already been seen. This feature creates a hash from significant parts of the packet and stores the hash for a certain amount of time and within the configured memory limit. If for a second packet (or possibly further packets) the same hash value is calculated this packet is discarded and will not be analyzed by the system. The feature provides several options for configuring which parts of a packets are regarded as significant for duplicate detection.&lt;br /&gt;
&lt;br /&gt;
It is also possible to capture packets which have been detected as duplicates but since these packets are excluded from further processing as well as the packet ring buffer it is only possible to create a live capture. Also, since only hash values are stored, the first packet of a series of duplicates will not be part of the duplicate capture, but it can be captured with the regular capture feature as it is part of the packet processing.&lt;br /&gt;
&lt;br /&gt;
==== Statistics ====&lt;br /&gt;
&lt;br /&gt;
The top graph and counter show how many packets have been discarded as duplicates.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Memory used&#039;&#039;&#039; graph shows how much of the memory which has been configured for use by the packet deduplication is actually consumed. If the value is very high it is possible that the configured amount of memory is not sufficient for the actual traffic. Insufficient memory results in reduction of the packet timeout.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Oldest packet age&#039;&#039;&#039; graph shows how old the oldest packet known to the packet deduplication is. If this value is significantly lower than the configured &#039;&#039;&#039;Packet timeout&#039;&#039;&#039; value the configured amount of memory may not be sufficient for the actual traffic.&lt;br /&gt;
&lt;br /&gt;
==== Settings ====&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Option !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Enabled || Turns the packet deduplication filter on and off.&lt;br /&gt;
|-&lt;br /&gt;
| Reserved memory (MB) || Controls how much memory in megabytes is reserved for packet deduplication. This memory then cannot be used for other statistics. Changes to this value will need a restart of the processing to take effect.&lt;br /&gt;
|-&lt;br /&gt;
| Packet timeout (ms) || The time in milliseconds after which a packet hash is removed from the packet deduplication. If the time is between identical packets is longer than this value the packets will not be detected as duplicates.&lt;br /&gt;
|-&lt;br /&gt;
| Compare starting at layer || Here it is possible to choose where the packet deduplication will start to analyze the packet. If e.g. &#039;Layer 3&#039; is chosen it is possible for two packets to have different MAC addresses and still be detected as duplicates.&lt;br /&gt;
|-&lt;br /&gt;
| Layer 7 length limit for compare (bytes) || This value controls how many bytes of the application payload are actually used for the hash calculation. A very high value may affect the performance while a very low value may increase the risk of false positives.&lt;br /&gt;
|-&lt;br /&gt;
| Ignore VLAN || The VLAN tag will not be used by the packet deduplication so that two packets from different VLANs can still be detected as duplicates.&lt;br /&gt;
|-&lt;br /&gt;
| Ignore IP TOS and traffic class || The IP &#039;type of service&#039; and &#039;traffic class&#039; fields will not be used by the packet deduplication so that two packets with different values in these fields can still be detected as duplicates.&lt;br /&gt;
|-&lt;br /&gt;
| Ignore IP TTL and HOP || The IP &#039;time to live&#039; and &#039;hop counter&#039; fields will not be used by the packet deduplication so that two packets with different values in these fields can still be detected as duplicates.&lt;br /&gt;
|-&lt;br /&gt;
| Ignore TCP SEQ and ACK numbers || The TCP sequence and acknowledgement numbers will not be used by the packet deduplication so that two packets with different TCP sequence and acknowledgement numbers can still be detected as duplicates.&lt;br /&gt;
|-&lt;br /&gt;
| Ignore TCP options || Any TCP options will not be used by the packet deduplication so that two packets with different TCP options can still be detected as duplicates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Limitations ====&lt;br /&gt;
&lt;br /&gt;
# In some circumstances, real duplicates cannot be distinguished from retransmissions. For example, for TCP in IPv6 traffic a retransmitted ACK packet might be byte-wise identical to the original ACK packet. The IPv6 header does not have an IP-ID field by default so it is identical and the TCP header is identical too if both the sequence and acknowledge number are the same and no timestamp option header is used. In this case it might help to decrease the packet timeout in the deduplication configuration since real duplicates in a network setup usually appear much faster than actual retransmissions.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Ingress_filter&amp;diff=4085</id>
		<title>Ingress filter</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Ingress_filter&amp;diff=4085"/>
		<updated>2022-09-09T11:16:59Z</updated>

		<summary type="html">&lt;p&gt;Simon: /* Limitations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Ingress (NIC) filter ===&lt;br /&gt;
&lt;br /&gt;
The ingress (NIC) filter page, allows setting allow/deny filters for live traffic preprocessing. Filtered out/denied traffic, will NOT become available throughout the dashboard nor the packet ring buffer. Filtered out/denied traffic will be irretrievable for (post) analysis.&lt;br /&gt;
&lt;br /&gt;
Filters can be applied for:&lt;br /&gt;
&lt;br /&gt;
* IP addresses (with possible subnet mask).&lt;br /&gt;
* pairs of IP addresses (with possible subnet mask).&lt;br /&gt;
* MAC addresses.&lt;br /&gt;
* VLAN tags (or none for no VLAN tag).&lt;br /&gt;
* specific TCP/UDP ports.&lt;br /&gt;
* physical interface IDs (as listed in Interface statistics).&lt;br /&gt;
* duplicate packets.&lt;br /&gt;
&lt;br /&gt;
They can all be set to either deny list or allow list mode. &lt;br /&gt;
Filtering will be evaluated for every packet in tab order. &lt;br /&gt;
The more restrictive filter will be applied. &lt;br /&gt;
For instance if no IP address is denied but a specific MAC address is on the deny list, no traffic for that MAC address will be processed.&lt;br /&gt;
&lt;br /&gt;
NOTE: The ingress (NIC) filter is applied to live traffic only, i.e. the traffic sent to the monitoring interfaces of an Allegro Network Multimeter. When replaying data from the ring buffer, loading a pcap or using the remote traffic capture feature, filtering is not used and/or applied.&lt;br /&gt;
&lt;br /&gt;
NOTE: The data recorded to/stored in the Packet Ring buffer, is of course also affected by the Ingress filter. Additional ring buffer capture rules may be configured under &amp;quot;Generic - Packet Ring Buffer&amp;quot;, further explained in our wiki here [[Packet ring buffer#Packet%20ring%20buffer%20snapshot%20length%20filter|https://allegro-packets.com/wiki/Packet_ring_buffer#Packet_ring_buffer_snapshot_length_filter]]&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[File:NIC filter.png|1000px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== IP filters ===&lt;br /&gt;
&lt;br /&gt;
In the IP filter/IP pair filter, IP addresses and IP ranges can be entered with their respective subnet mask.&lt;br /&gt;
* /32 subnet mask: 192.168.1.1/32 means the filter will deny/allow IP 192.168.1.1  &lt;br /&gt;
* /24 subnet mask: 192.168.1.0/24 means the filter will deny/allow IP range 192.168.1.0 - 192.168.1.255&lt;br /&gt;
* /16 subnet mask: 192.168.0.0/16 means the filter will deny/allow IP range 192.168.0.0 - 192.168.255.255&lt;br /&gt;
&lt;br /&gt;
The IP filter/IP pair filter allows for importing an IP list in the following format:&lt;br /&gt;
&lt;br /&gt;
 #A line with a comment&lt;br /&gt;
 1.2.3.1&lt;br /&gt;
 1.2.3.2&lt;br /&gt;
 1.2.3.3&lt;br /&gt;
&lt;br /&gt;
By clicking on &#039;&#039;&#039;Import list&#039;&#039;&#039; a dialogue box will be opened where you can choose to download such a list from a given URL or specify a file from your system. The IP addresses are added to the existing ones up to a maximum of 10000 addresses.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Export list&#039;&#039;&#039; button allows for exporting the IP filter list in the same format as the import.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Delete all&#039;&#039;&#039; button allows for deleting all IP addresses from the filter list.&lt;br /&gt;
&lt;br /&gt;
=== Packet deduplication ===&lt;br /&gt;
&lt;br /&gt;
Packet deduplication provides the ability to filter packets from live traffic which have already been seen. This feature creates a hash from significant parts of the packet and stores the hash for a certain amount of time and within the configured memory limit. If for a second packet (or possibly further packets) the same hash value is calculated this packet is discarded and will not be analyzed by the system. The feature provides several options for configuring which parts of a packets are regarded as significant for duplicate detection.&lt;br /&gt;
&lt;br /&gt;
It is also possible to capture packets which have been detected as duplicates but since these packets are excluded from further processing as well as the packet ring buffer it is only possible to create a live capture. Also, since only hash values are stored, the first packet of a series of duplicates will not be part of the duplicate capture, but it can be captured with the regular capture feature as it is part of the packet processing.&lt;br /&gt;
&lt;br /&gt;
==== Statistics ====&lt;br /&gt;
&lt;br /&gt;
The top graph and counter show how many packets have been discarded as duplicates.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Memory used&#039;&#039;&#039; graph shows how much of the memory which has been configured for use by the packet deduplication is actually consumed. If the value is very high it is possible that the configured amount of memory is not sufficient for the actual traffic. Insufficient memory results in reduction of the Packet timeout.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Oldest packet age&#039;&#039;&#039; graph shows how old the oldest packet known to the packet deduplication is. If this value is significantly lower than the configured &#039;&#039;&#039;Packet timeout&#039;&#039;&#039; value the configured amount of memory may not be sufficient for the actual traffic.&lt;br /&gt;
&lt;br /&gt;
==== Settings ====&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Option !! Description&lt;br /&gt;
|-&lt;br /&gt;
| Enabled || Turns the packet deduplication filter on and off.&lt;br /&gt;
|-&lt;br /&gt;
| Reserved memory (MB) || Controls how much memory in megabytes is reserved for packet deduplication. This memory then cannot be used for other statistics. Changes to this value will need a restart of the processing to take effect.&lt;br /&gt;
|-&lt;br /&gt;
| Packet timeout (ms) || The time in milliseconds after which a packet hash is removed from the packet deduplication. If the time is between identical packets is longer than this value the packets will not be detected as duplicates.&lt;br /&gt;
|-&lt;br /&gt;
| Compare starting at layer || Here it is possible to choose where the packet deduplication will start to analyze the packet. If e.g. &#039;Layer 3&#039; is chosen it is possible for two packets to have different MAC addresses and still be detected as duplicates.&lt;br /&gt;
|-&lt;br /&gt;
| Layer 7 length limit for compare (bytes) || This value controls how many bytes of the application payload are actually used for the hash calculation. A very high value may affect the performance while a very low value may increase the risk of false positives.&lt;br /&gt;
|-&lt;br /&gt;
| Ignore VLAN || The VLAN tag will not be used by the packet deduplication so that two packets from different VLANs can still be detected as duplicates.&lt;br /&gt;
|-&lt;br /&gt;
| Ignore IP TOS and traffic class || The IP &#039;type of service&#039; and &#039;traffic class&#039; fields will not be used by the packet deduplication so that two packets with different values in these fields can still be detected as duplicates.&lt;br /&gt;
|-&lt;br /&gt;
| Ignore IP TTL and HOP || The IP &#039;time to live&#039; and &#039;hop counter&#039; fields will not be used by the packet deduplication so that two packets with different values in these fields can still be detected as duplicates.&lt;br /&gt;
|-&lt;br /&gt;
| Ignore TCP SEQ and ACK numbers || The TCP sequence and acknowledgement numbers will not be used by the packet deduplication so that two packets with different TCP sequence and acknowledgement numbers can still be detected as duplicates.&lt;br /&gt;
|-&lt;br /&gt;
| Ignore TCP options || Any TCP options will not be used by the packet deduplication so that two packets with different TCP options can still be detected as duplicates.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Limitations ====&lt;br /&gt;
&lt;br /&gt;
# In some circumstances, real duplicates cannot be distinguished from retransmissions. For example, for TCP in IPv6 traffic a retransmitted ACK packet might be byte-wise identical to the original ACK packet. The IPv6 header does not have an IP-ID field by default so it is identical and the TCP header is identical too if both the sequence and acknowledge number are the same and no timestamp option header is used. In this case it might help to decrease the packet timeout in the deduplication configuration since real duplicates in a network setup usually appear much faster than actual retransmissions.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Pcap_analysis_module&amp;diff=4070</id>
		<title>Pcap analysis module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Pcap_analysis_module&amp;diff=4070"/>
		<updated>2022-08-31T09:40:36Z</updated>

		<summary type="html">&lt;p&gt;Simon: Add screenshots to analysis profiles&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The pcap analysis module allows analyzing pcap files by sending them to the device. After analyzing the pcap, the web interface shows all the metadata as if the packets are live traffic at the time of the pcap recording.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Web Interface&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[File:Pcap.png|1000px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Notes====&lt;br /&gt;
Starting pcap analyze will stop the network ports and thus the normal packet processing and forwarding is disabled. The network connections of the devices connected to the Allegro Network Multimeter will stop working.&lt;br /&gt;
&lt;br /&gt;
==== Start new Upload====&lt;br /&gt;
To select a file to analyze, simply drag a file from your file manager to the drop zone. The second option is to click into the drop zone. After a click, a file selection dialog will open.&lt;br /&gt;
After selecting a file, the name and the size of the pcap will be displayed in the drop zone box. &lt;br /&gt;
&lt;br /&gt;
To proceed, press the &#039;&#039;&#039;Upload and analyze pcap&#039;&#039;&#039; button. A modal dialog will open.&lt;br /&gt;
&lt;br /&gt;
* A warning will be shown if the device is in bridge mode, since no more packets will be forwarded when starting pcap analyze mode.&lt;br /&gt;
* If a storage device is active, it is possible to buffer the packets on it. This allows simple extraction of packets as in live packet processing.&lt;br /&gt;
&lt;br /&gt;
The pcap file itself will not be stored on the storage of the Allegro Network Multimeter (except in the packet ring buffer, if activated in the upload modal dialog).&lt;br /&gt;
&lt;br /&gt;
==== Analysis profiles ====&lt;br /&gt;
Profiles allow for some processing relevant settings to be changed on an per analysis level. If no analysis profile is selected those settings will be equal to the globally configured settings of the multimeter.&lt;br /&gt;
[[File:Analysis profile selector.png|none|thumb|687x687px|Select an analysis profile for your pcap analysis]]&lt;br /&gt;
&lt;br /&gt;
Currently profiles influence the following settings:&lt;br /&gt;
&lt;br /&gt;
* [[Complex_filter|Complex ingress filter]]&lt;br /&gt;
* [[Global_settings#Packet_length_accounting|Packet length accounting]]&lt;br /&gt;
* [[Global_settings#Tunnel_view_mode|Tunnel view mode]]&lt;br /&gt;
* [[Global_settings#VLAN_handling|VLAN handling]]&lt;br /&gt;
* [[Global_settings#External_timestamps|External timestamps]]&lt;br /&gt;
* [[Global_settings#Detail_of_traffic_analysis|Detail of traffic analysis]]&lt;br /&gt;
* [[Global_settings#Graph_detail_settings|Graph detail settings]]&lt;br /&gt;
Useres without admin privileges can not edit or create analysis profiles but can select and see which settings they change.&lt;br /&gt;
[[File:Analysis profile view.png|none|thumb|418x418px|View analysis profile]]&lt;br /&gt;
&lt;br /&gt;
==== PCAP analysis statistics====&lt;br /&gt;
After the upload started, a progress section will be displayed. This includes a progress bar and the time of the last&lt;br /&gt;
processed packet. When viewing the progress bar on a different tab or on a different browser, the progress bar&lt;br /&gt;
will not show the correct value.&lt;br /&gt;
&lt;br /&gt;
==== Viewing the pcap metadata====&lt;br /&gt;
During and after the upload of the file, all modules will show the metadata produced by analyzing the packets in the pcap file.&lt;br /&gt;
&lt;br /&gt;
==== Resuming normal operation====&lt;br /&gt;
After finishing the analysis, the processing can be set back to live mode by clicking the &#039;&#039;&#039;Resume normal operation&#039;&#039;&#039; button at the bottom of the page.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Analysis_profile_view.png&amp;diff=4069</id>
		<title>File:Analysis profile view.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Analysis_profile_view.png&amp;diff=4069"/>
		<updated>2022-08-31T09:24:47Z</updated>

		<summary type="html">&lt;p&gt;Simon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Analysis_profile_selector.png&amp;diff=4068</id>
		<title>File:Analysis profile selector.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Analysis_profile_selector.png&amp;diff=4068"/>
		<updated>2022-08-31T09:24:46Z</updated>

		<summary type="html">&lt;p&gt;Simon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Analysis_profile_edit.png&amp;diff=4067</id>
		<title>File:Analysis profile edit.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Analysis_profile_edit.png&amp;diff=4067"/>
		<updated>2022-08-31T09:24:44Z</updated>

		<summary type="html">&lt;p&gt;Simon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Pcap_analysis_module&amp;diff=4066</id>
		<title>Pcap analysis module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Pcap_analysis_module&amp;diff=4066"/>
		<updated>2022-08-29T15:40:14Z</updated>

		<summary type="html">&lt;p&gt;Simon: /* Analysis profiles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The pcap analysis module allows analyzing pcap files by sending them to the device. After analyzing the pcap, the web interface shows all the metadata as if the packets are live traffic at the time of the pcap recording.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Web Interface&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[File:Pcap.png|1000px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Notes====&lt;br /&gt;
Starting pcap analyze will stop the network ports and thus the normal packet processing and forwarding is disabled. The network connections of the devices connected to the Allegro Network Multimeter will stop working.&lt;br /&gt;
&lt;br /&gt;
==== Start new Upload====&lt;br /&gt;
To select a file to analyze, simply drag a file from your file manager to the drop zone. The second option is to click into the drop zone. After a click, a file selection dialog will open.&lt;br /&gt;
After selecting a file, the name and the size of the pcap will be displayed in the drop zone box. &lt;br /&gt;
&lt;br /&gt;
To proceed, press the &#039;&#039;&#039;Upload and analyze pcap&#039;&#039;&#039; button. A modal dialog will open.&lt;br /&gt;
&lt;br /&gt;
* A warning will be shown if the device is in bridge mode, since no more packets will be forwarded when starting pcap analyze mode.&lt;br /&gt;
* If a storage device is active, it is possible to buffer the packets on it. This allows simple extraction of packets as in live packet processing.&lt;br /&gt;
&lt;br /&gt;
The pcap file itself will not be stored on the storage of the Allegro Network Multimeter (except in the packet ring buffer, if activated in the upload modal dialog).&lt;br /&gt;
&lt;br /&gt;
==== Analysis profiles ====&lt;br /&gt;
Profiles allow for some processing relevant settings to be changed on an per Analysis level. If no analysis profile is selected those settings will be equal to the globally configured settings of the multimeter.&lt;br /&gt;
&lt;br /&gt;
Currently profiles influence the following settings:&lt;br /&gt;
&lt;br /&gt;
* [[Complex_filter|Complex ingress filter]]&lt;br /&gt;
* [[Global_settings#Packet_length_accounting|Packet length accounting]]&lt;br /&gt;
* [[Global_settings#Tunnel_view_mode|Tunnel view mode]]&lt;br /&gt;
* [[Global_settings#VLAN_handling|VLAN handling]]&lt;br /&gt;
* [[Global_settings#External_timestamps|External timestamps]]&lt;br /&gt;
* [[Global_settings#Detail_of_traffic_analysis|Detail of traffic analysis]]&lt;br /&gt;
* [[Global_settings#Graph_detail_settings|Graph detail settings]]&lt;br /&gt;
&lt;br /&gt;
==== PCAP analysis statistics====&lt;br /&gt;
After the upload started, a progress section will be displayed. This includes a progress bar and the time of the last&lt;br /&gt;
processed packet. When viewing the progress bar on a different tab or on a different browser, the progress bar&lt;br /&gt;
will not show the correct value.&lt;br /&gt;
&lt;br /&gt;
==== Viewing the pcap metadata====&lt;br /&gt;
During and after the upload of the file, all modules will show the metadata produced by analyzing the packets in the pcap file.&lt;br /&gt;
&lt;br /&gt;
==== Resuming normal operation====&lt;br /&gt;
After finishing the analysis, the processing can be set back to live mode by clicking the &#039;&#039;&#039;Resume normal operation&#039;&#039;&#039; button at the bottom of the page.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Pcap_analysis_module&amp;diff=4065</id>
		<title>Pcap analysis module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Pcap_analysis_module&amp;diff=4065"/>
		<updated>2022-08-29T15:39:23Z</updated>

		<summary type="html">&lt;p&gt;Simon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The pcap analysis module allows analyzing pcap files by sending them to the device. After analyzing the pcap, the web interface shows all the metadata as if the packets are live traffic at the time of the pcap recording.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Web Interface&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[File:Pcap.png|1000px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Notes====&lt;br /&gt;
Starting pcap analyze will stop the network ports and thus the normal packet processing and forwarding is disabled. The network connections of the devices connected to the Allegro Network Multimeter will stop working.&lt;br /&gt;
&lt;br /&gt;
==== Start new Upload====&lt;br /&gt;
To select a file to analyze, simply drag a file from your file manager to the drop zone. The second option is to click into the drop zone. After a click, a file selection dialog will open.&lt;br /&gt;
After selecting a file, the name and the size of the pcap will be displayed in the drop zone box. &lt;br /&gt;
&lt;br /&gt;
To proceed, press the &#039;&#039;&#039;Upload and analyze pcap&#039;&#039;&#039; button. A modal dialog will open.&lt;br /&gt;
&lt;br /&gt;
* A warning will be shown if the device is in bridge mode, since no more packets will be forwarded when starting pcap analyze mode.&lt;br /&gt;
* If a storage device is active, it is possible to buffer the packets on it. This allows simple extraction of packets as in live packet processing.&lt;br /&gt;
&lt;br /&gt;
The pcap file itself will not be stored on the storage of the Allegro Network Multimeter (except in the packet ring buffer, if activated in the upload modal dialog).&lt;br /&gt;
&lt;br /&gt;
==== Analysis profiles ====&lt;br /&gt;
Profiles allow for some processing relevant settings to be changed on an per Analysis level. If no analysis profile is selected those settings will be equal to the globally configured settings of the multimeter.&lt;br /&gt;
&lt;br /&gt;
Currently profiles influence the following settings:&lt;br /&gt;
&lt;br /&gt;
* Complex ingress filter&lt;br /&gt;
* [[Global_settings#Packet_length_accounting|Packet length accounting]]&lt;br /&gt;
* [[Global_settings#Tunnel_view_mode|Tunnel view mode]]&lt;br /&gt;
* [[Global_settings#VLAN_handling|VLAN handling]]&lt;br /&gt;
* [[Global_settings#External_timestamps|External timestamps]]&lt;br /&gt;
* [[Global_settings#Detail_of_traffic_analysis|Detail of traffic analysis]]&lt;br /&gt;
* [[Global_settings#Graph_detail_settings|Graph detail settings]]&lt;br /&gt;
&lt;br /&gt;
==== PCAP analysis statistics====&lt;br /&gt;
After the upload started, a progress section will be displayed. This includes a progress bar and the time of the last&lt;br /&gt;
processed packet. When viewing the progress bar on a different tab or on a different browser, the progress bar&lt;br /&gt;
will not show the correct value.&lt;br /&gt;
&lt;br /&gt;
==== Viewing the pcap metadata====&lt;br /&gt;
During and after the upload of the file, all modules will show the metadata produced by analyzing the packets in the pcap file.&lt;br /&gt;
&lt;br /&gt;
==== Resuming normal operation====&lt;br /&gt;
After finishing the analysis, the processing can be set back to live mode by clicking the &#039;&#039;&#039;Resume normal operation&#039;&#039;&#039; button at the bottom of the page.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Pcap_analysis_module&amp;diff=4064</id>
		<title>Pcap analysis module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Pcap_analysis_module&amp;diff=4064"/>
		<updated>2022-08-29T15:36:24Z</updated>

		<summary type="html">&lt;p&gt;Simon: Add analysis profiles to the pcap analysis module&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The pcap analysis module allows analyzing pcap files by sending them to the device. After analyzing the pcap, the web interface shows all the metadata as if the packets are live traffic at the time of the pcap recording.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Web Interface&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
[[File:Pcap.png|1000px|none]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
====Notes====&lt;br /&gt;
Starting pcap analyze will stop the network ports and thus the normal packet processing and forwarding is disabled. The network connections of the devices connected to the Allegro Network Multimeter will stop working.&lt;br /&gt;
&lt;br /&gt;
==== Start new Upload====&lt;br /&gt;
To select a file to analyze, simply drag a file from your file manager to the drop zone. The second option is to click into the drop zone. After a click, a file selection dialog will open.&lt;br /&gt;
After selecting a file, the name and the size of the pcap will be displayed in the drop zone box. &lt;br /&gt;
&lt;br /&gt;
To proceed, press the &#039;&#039;&#039;Upload and analyze pcap&#039;&#039;&#039; button. A modal dialog will open.&lt;br /&gt;
&lt;br /&gt;
* A warning will be shown if the device is in bridge mode, since no more packets will be forwarded when starting pcap analyze mode.&lt;br /&gt;
* If a storage device is active, it is possible to buffer the packets on it. This allows simple extraction of packets as in live packet processing.&lt;br /&gt;
&lt;br /&gt;
The pcap file itself will not be stored on the storage of the Allegro Network Multimeter (except in the packet ring buffer, if activated in the upload modal dialog).&lt;br /&gt;
&lt;br /&gt;
==== Analysis profiles ====&lt;br /&gt;
Profiles allow for some processing relevant settings to be changed on an per Analysis level. If no analysis profile is selected those settings will be equal to the globally configured settings of the multimeter.&lt;br /&gt;
&lt;br /&gt;
Currently profiles influence the following settings:&lt;br /&gt;
&lt;br /&gt;
* Complex ingress filter&lt;br /&gt;
* Packet length accounting&lt;br /&gt;
* Tunnel view mode&lt;br /&gt;
* VLAN handling&lt;br /&gt;
* External timestamps&lt;br /&gt;
* Detail of traffic analysis&lt;br /&gt;
* Graph detail settings&lt;br /&gt;
&lt;br /&gt;
==== PCAP analysis statistics====&lt;br /&gt;
After the upload started, a progress section will be displayed. This includes a progress bar and the time of the last&lt;br /&gt;
processed packet. When viewing the progress bar on a different tab or on a different browser, the progress bar&lt;br /&gt;
will not show the correct value.&lt;br /&gt;
&lt;br /&gt;
==== Viewing the pcap metadata====&lt;br /&gt;
During and after the upload of the file, all modules will show the metadata produced by analyzing the packets in the pcap file.&lt;br /&gt;
&lt;br /&gt;
==== Resuming normal operation====&lt;br /&gt;
After finishing the analysis, the processing can be set back to live mode by clicking the &#039;&#039;&#039;Resume normal operation&#039;&#039;&#039; button at the bottom of the page.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Custom_dashboards&amp;diff=4039</id>
		<title>Custom dashboards</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Custom_dashboards&amp;diff=4039"/>
		<updated>2022-08-11T09:05:18Z</updated>

		<summary type="html">&lt;p&gt;Simon: Fix typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It is possible to define customized dashboards and display configurable widgets that can show different aspects such as the whole traffic, a certain IP group or a particular IP address. By using custom dashboards you can create an overview page of a certain server or an IP group in a certain virtual link group or how it was seen on different remote Allegro Network Multimeter. &lt;br /&gt;
&lt;br /&gt;
[[File:Custom dashboard 2.png|frameless|800x800px]]&lt;br /&gt;
&lt;br /&gt;
To create a custom dashboard click on the &amp;quot;Add new dashboard&amp;quot; menu item in the &amp;quot;Dashboard&amp;quot; section. A dialog will be displayed that allows you to set a name, description and a group. Dashboards of the same group will form a section in the menu. Dashboards are defined per user session, however, it is possible to publish them as a template so that also other users can use them. Simply click on &amp;quot;Add dashboard to templates&amp;quot; and it will be placed in the template list and can be selected. Export and import as a file is possible, too. The dashboard configuration dialog can also be opened by clicking on &amp;quot;Configure dashboard&amp;quot; in the top right corner.&lt;br /&gt;
&lt;br /&gt;
[[File:Create a custom dashboard.png|frameless|800x800px]]&lt;br /&gt;
&lt;br /&gt;
After creating the dashboard, you will be redirected to the new, empty dashboard.&lt;br /&gt;
&lt;br /&gt;
[[File:Empty dashboard.png|frameless|800x800px]]&lt;br /&gt;
&lt;br /&gt;
By clicking on the field &amp;quot;Click to select a widget&amp;quot; or &amp;quot;Add widget&amp;quot; a dialog is shown and allows to select a widget from the list. Following widgets are available and are grouped by OSI layer:&lt;br /&gt;
* Generic&lt;br /&gt;
** Text: This is a widget that allows showing user defined text. Can be useful to structuring the dashboard with captions.&lt;br /&gt;
** Textbox: This widget allows typing and storing a text.&lt;br /&gt;
** Traffic graph: The graph will show interface throughput or PCAP traffic.&lt;br /&gt;
** Virtual link group: This will show traffic of a certain virtual link group.&lt;br /&gt;
* Layer 2&lt;br /&gt;
** Burst analysis: Displays utilization graphs for fast recognition of bursts per interface or MAC address. Virtual link groups can be used to monitor multiple interfaces.&lt;br /&gt;
** Global MAC statistics: Shows global statistics about the analysed MAC traffic. Available statistics are: total-, unicast- , broadcast- and multicast traffic.&lt;br /&gt;
** QoS: Shows statistics about a selected quality of service class. See [[QoS module]] for more infromation about QoS.&lt;br /&gt;
** Top MACs: A list of Top 5 Macs is shown. By clicking on the icon to the right of the caption, the display can be toggled between list or graph.&lt;br /&gt;
** VLAN: Show statistics about a specified VLAN. Traffic can be filtered by inner and outer VLAN tags.&lt;br /&gt;
* Layer 3&lt;br /&gt;
** Country: This widget shows traffic in- and outbound traffic statistics about a specific country.&lt;br /&gt;
** DNS server: Show statics about certain DNS server as graph or table. Available statistics are: requests/replies, reply codes and response times.&lt;br /&gt;
** IP: This widget displays graph or text information about a certain IP address. The IP address can either be filtered through the dashboards global filter fields or configured per widget. Traffic, TCP, connection, MTU, Layer 7 protocol counters and graphs are available.&lt;br /&gt;
** IP group: The IP group widget allows displaying graph or text information of a certain IP group.&lt;br /&gt;
** Multicast group: Shows statistics about IGMP and MLD multicast management packets of a specified multicast group as graph or table. See [[Multicast statistics]] for more information about the analysed management message types.&lt;br /&gt;
** Multicast overview: Show the same statistics as the mutlicast group widget but without a multicast group filter applied.&lt;br /&gt;
** QoS: Shows statistics about a selected quality of service class. See [[QoS module]] for more infromation about QoS.&lt;br /&gt;
** Top IPs: A list of Top 5 IP addresses is shown and can be toggled between list and graph representation.&lt;br /&gt;
* Layer 4&lt;br /&gt;
** Layer 4 server port: Shows statistics about a layer 4 server port filtered by layer 4 protocols.&lt;br /&gt;
** TCP statistics overview: Shows global TCP statistics as graph or table. Available statistics are: handshake times, response times, TCP retransmissions, TCP flags and zero window statistics.&lt;br /&gt;
* Layer 7&lt;br /&gt;
** HTTP overview: Shows global HTTP statistics as graph or table. Available statistics are: response times and response codes.&lt;br /&gt;
** RTP overview: Global statistics about RTP traffic. Available statistics are: Traffic, jitter, packet loss, max audio level and RMS.&lt;br /&gt;
** SIP overview: Global statistics about SIP traffic. Available statistics are: Concurrent calls and response codes.&lt;br /&gt;
** SSL overview: Global statistics about SSL traffic. Available statistics are: SSL hello handshake times and first data.&lt;br /&gt;
** Layer 7 protocol: Shows global statistics about a certain layer 7 protocol as graph or table.&lt;br /&gt;
** Top layer 7 protocols: A list of top layer 7 protocols is shown. It can be toggled between list and graph representation.&lt;br /&gt;
There is a search bar on top of the dialog that allows for fast searching of certain widgets.&lt;br /&gt;
&lt;br /&gt;
After selecting a widget, the configuration dialog is shown. The widget configuration dialog can also be opened by clicking on the small wrench icon to the right of the widget.&lt;br /&gt;
&lt;br /&gt;
The widget can be configured as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Configure widget.png|frameless|800x800px]]&lt;br /&gt;
&lt;br /&gt;
* Caption: The caption displayed on the dashboard&lt;br /&gt;
* Width: Either one column width or the whole page (two columns)&lt;br /&gt;
* Device and group: A dedicated virtual link group from the local or a remote device can be selected. By default the globally selected virtual link group from the top menu bar is used.&lt;br /&gt;
* Direction: Either RX or TX direction where applicable.&lt;br /&gt;
* Mode: Whether the widget may be toggled between list and graph representation&lt;br /&gt;
* Use filter: Several widgets allow filtering for e.g. an IP address or even a complex filter similar to the filter bar in the corresponding module. The filter can be either used globally so that it can be used for several widgets or locally configured for that particular widget.&lt;br /&gt;
* Display: Allows selecting different aspects such as traffic or TCP counters&lt;br /&gt;
&lt;br /&gt;
Widgets can be moved with drag and drop simply by clicking on the two double arrows,dragging it around and dropping it on a drop zone.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Custom_dashboards&amp;diff=4038</id>
		<title>Custom dashboards</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Custom_dashboards&amp;diff=4038"/>
		<updated>2022-08-11T09:04:11Z</updated>

		<summary type="html">&lt;p&gt;Simon: Adds some missing widget descriptions&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It is possible to define customized dashboards and display configurable widgets that can show different aspects such as the whole traffic, a certain IP group or a particular IP address. By using custom dashboards you can create an overview page of a certain server or an IP group in a certain virtual link group or how it was seen on different remote Allegro Network Multimeter. &lt;br /&gt;
&lt;br /&gt;
[[File:Custom dashboard 2.png|frameless|800x800px]]&lt;br /&gt;
&lt;br /&gt;
To create a custom dashboard click on the &amp;quot;Add new dashboard&amp;quot; menu item in the &amp;quot;Dashboard&amp;quot; section. A dialog will be displayed that allows you to set a name, description and a group. Dashboards of the same group will form a section in the menu. Dashboards are defined per user session, however, it is possible to publish them as a template so that also other users can use them. Simply click on &amp;quot;Add dashboard to templates&amp;quot; and it will be placed in the template list and can be selected. Export and import as a file is possible, too. The dashboard configuration dialog can also be opened by clicking on &amp;quot;Configure dashboard&amp;quot; in the top right corner.&lt;br /&gt;
&lt;br /&gt;
[[File:Create a custom dashboard.png|frameless|800x800px]]&lt;br /&gt;
&lt;br /&gt;
After creating the dashboard, you will be redirected to the new, empty dashboard.&lt;br /&gt;
&lt;br /&gt;
[[File:Empty dashboard.png|frameless|800x800px]]&lt;br /&gt;
&lt;br /&gt;
By clicking on the field &amp;quot;Click to select a widget&amp;quot; or &amp;quot;Add widget&amp;quot; a dialog is shown and allows to select a widget from the list. Following widgets are available and are grouped by OSI layer:&lt;br /&gt;
* Generic&lt;br /&gt;
** Text: This is a widget that allows showing user defined text. Can be useful to structuring the dashboard with captions.&lt;br /&gt;
** Textbox: This widget allows typing and storing a text.&lt;br /&gt;
** Traffic graph: The graph will show interface throughput or PCAP traffic.&lt;br /&gt;
** Virtual link group: This will show traffic of a certain virtual link group.&lt;br /&gt;
* Layer 2&lt;br /&gt;
** Burst analysis: Displays utilization graphs for fast recognition of bursts per interface or MAC address. Virtual link groups can be used to monitor multiple interfaces.&lt;br /&gt;
** Global MAC statistics: Shows global statistics about the analysed MAC traffic. Available statistics are: total-, unicast- , broadcast- and multicast traffic.&lt;br /&gt;
** QoS: Shows statistics about a selected quality of service class. See [[QoS module]] for more infromation about QoS.&lt;br /&gt;
** Top MACs: A list of Top 5 Macs is shown. By clicking on the icon to the right of the caption, the display can be toggled between list or graph.&lt;br /&gt;
** VLAN: Show statistics about a specified VLAN. Traffic can be filtered by inner and outer VLAN tags.&lt;br /&gt;
* Layer 3&lt;br /&gt;
** Country: This widget shows traffic in- and outbound traffic statistics about a specific country.&lt;br /&gt;
** DNS server: Show statics about certain DNS server as graph or table. Available statistics are: requests/replies, reply codes and response times.&lt;br /&gt;
** IP: This widget displays graph or text information about a certain IP address. The IP address can either be filtered through the dashboards global filter fields or configured per widget. Traffic, TCP, connection, MTU, Layer 7 protocol counters and graphs are available.&lt;br /&gt;
** IP group: The IP group widget allows displaying graph or text information of a certain IP group.&lt;br /&gt;
** Multicast group: Shows statistics about IGMP and MLD multicast management packets of a specified multicast group as graph or table. See [[Multicast statistics]] for more information about the analysed management message types.&lt;br /&gt;
** Multicast overview: Show the same statistics as the mutlicast group widget but without a multicast group filter applied.&lt;br /&gt;
** QoS: Shows statistics about a selected quality of service class. See [[QoS module]] for more infromation about QoS.&lt;br /&gt;
** Top IPs: A list of Top 5 IP addresses is shown and can be toggled between list and graph representation.&lt;br /&gt;
* Layer 4&lt;br /&gt;
** Layer 4 server port: Shows statistics about a layer 4 server port filtered by layer 4 protocols.&lt;br /&gt;
** TCP statistics overview: Shows global TCP statistics as graph or table. Available statistics are: handshake times, response times, TCP retransmissions, TCP flags and zero window statistics.&lt;br /&gt;
* Layer 7&lt;br /&gt;
** HTTP overview: Shows global HTTP statistics as graph or table. Available statistics are: response times and response codes.&lt;br /&gt;
** RTP overview: Global statistics about RTP traffic. Available statistics are: Traffic, jitter, packet loss, max audio level and RMS.&lt;br /&gt;
** SIP overview: Global statistics about SIP traffic. Available statistics are: Concurrent calls and response codes.&lt;br /&gt;
** SSL overview: Global statistics about SSL traffic. Available statistics are: SSL hello handshake times and first data.&lt;br /&gt;
** Layer 7 protocol: Shows global statistics about a certain layer 7 protocol as graph or table.&lt;br /&gt;
** Top layer 7 protocols: A list of Top layer 7 protocols is shown. It can be toggled between list and graph representation.&lt;br /&gt;
There is a search bar on top of the dialog that allows for fast searching of certain widgets.&lt;br /&gt;
&lt;br /&gt;
After selecting a widget, the configuration dialog is shown. The widget configuration dialog can also be opened by clicking on the small wrench icon to the right of the widget.&lt;br /&gt;
&lt;br /&gt;
The widget can be configured as follows:&lt;br /&gt;
&lt;br /&gt;
[[File:Configure widget.png|frameless|800x800px]]&lt;br /&gt;
&lt;br /&gt;
* Caption: The caption displayed on the dashboard&lt;br /&gt;
* Width: Either one column width or the whole page (two columns)&lt;br /&gt;
* Device and group: A dedicated virtual link group from the local or a remote device can be selected. By default the globally selected virtual link group from the top menu bar is used.&lt;br /&gt;
* Direction: Either RX or TX direction where applicable.&lt;br /&gt;
* Mode: Whether the widget may be toggled between list and graph representation&lt;br /&gt;
* Use filter: Several widgets allow filtering for e.g. an IP address or even a complex filter similar to the filter bar in the corresponding module. The filter can be either used globally so that it can be used for several widgets or locally configured for that particular widget.&lt;br /&gt;
* Display: Allows selecting different aspects such as traffic or TCP counters&lt;br /&gt;
&lt;br /&gt;
Widgets can be moved with drag and drop simply by clicking on the two double arrows,dragging it around and dropping it on a drop zone.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Custom_dashboards&amp;diff=4037</id>
		<title>Custom dashboards</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Custom_dashboards&amp;diff=4037"/>
		<updated>2022-08-11T07:31:30Z</updated>

		<summary type="html">&lt;p&gt;Simon: Fix typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It is possible to define customized dashboards and display configurable widgets that can show different aspects such as the whole traffic, a certain IP group or a particular IP address. By using custom dashboards you can create an overview page of a certain server or an IP group in a certain virtual link group or how it was seen on different remote Allegro Network Multimeter. &lt;br /&gt;
&lt;br /&gt;
[[File:Custom dashboard 2.png|frameless|800x800px]]&lt;br /&gt;
&lt;br /&gt;
To create a custom dashboard click on the &amp;quot;Add new dashboard&amp;quot; menu item in the &amp;quot;Dashboard&amp;quot; section. A dialog will be displayed that allows you to set a name, description and a group. Dashboards of the same group will form a section in the menu. Dashboards are defined per user session, however, it is possible to publish them as a template so that also other users can use them. Simply click on &amp;quot;Add dashboard to templates&amp;quot; and it will be placed in the template list and can be selected. Export and import as a file is possible, too. The dashboard configuration dialog can also be opened by clicking on &amp;quot;Configure dashboard&amp;quot; in the top right corner.&lt;br /&gt;
&lt;br /&gt;
[[File:Create a custom dashboard.png|frameless|800x800px]]&lt;br /&gt;
&lt;br /&gt;
After creating the dashboard, you will be redirected to the new, empty dashboard.&lt;br /&gt;
&lt;br /&gt;
[[File:Empty dashboard.png|frameless|800x800px]]&lt;br /&gt;
&lt;br /&gt;
By clicking on the field &amp;quot;Click to select a widget&amp;quot; or &amp;quot;Add widget&amp;quot; a dialog is shown and allows to select a widget from the list. Following widgets are available and are grouped by OSI layer:&lt;br /&gt;
&lt;br /&gt;
* Generic&lt;br /&gt;
** Text: This is a widget that allows showing user defined text. Can be useful to structuring the dashboard with captions.&lt;br /&gt;
** Textbox: This widget allows typing and storing a text.&lt;br /&gt;
** Traffic graph: The graph will show interface throughput or PCAP traffic.&lt;br /&gt;
** Virtual link group: This will show traffic of a certain virtual link group.&lt;br /&gt;
* Layer 2&lt;br /&gt;
** Top MACs: A list of Top 5 Macs is shown. By clicking on the icon to the right of the caption, the display can be toggled between list or graph.&lt;br /&gt;
* Layer 3&lt;br /&gt;
** IP: This widget displays graph or text information about a certain IP address. The IP address can either be filtered through the dashboards global filter fields or configured per widget. Traffic, TCP, connection, MTU, Layer 7 protocol counters and graphs are available.&lt;br /&gt;
** IP groups: The IP group widget allows displaying graph or text information of a certain IP group.&lt;br /&gt;
** Top IPs: A list of Top 5 IP addresses is shown and can be toggled between list and graph representation.&lt;br /&gt;
* Layer 7&lt;br /&gt;
** Top layer 7 protocols: A list of Top layer 7 protocols is shown. It can be toggled between list and graph representation.&lt;br /&gt;
There is a search bar on top of the dialog that allows for fast searching of certain widgets.&lt;br /&gt;
&lt;br /&gt;
After selecting a widget, the configuration dialog is shown. The widget configuration dialog can also be opened by clicking on the small wrench icon to the right of the widget.&lt;br /&gt;
&lt;br /&gt;
[[File:Configure widget.png|frameless|800x800px]]&lt;br /&gt;
&lt;br /&gt;
The widget can be configured as follows:&lt;br /&gt;
&lt;br /&gt;
* Caption: The caption displayed on the dashboard&lt;br /&gt;
* Width: Either one column width or the whole page (two columns)&lt;br /&gt;
* Device and group: A dedicated virtual link group from the local or a remote device can be selected. By default the globally selected virtual link group from the top menu bar is used.&lt;br /&gt;
* Direction: Either RX or TX direction where applicable.&lt;br /&gt;
* Mode: Whether the widget may be toggled between list and graph representation&lt;br /&gt;
* Use filter: Several widgets allow filtering for e.g. an IP address or even a complex filter similar to the filter bar in the corresponding module. The filter can be either used globally so that it can be used for several widgets or locally configured for that particular widget.&lt;br /&gt;
* Display: Allows selecting different aspects such as traffic or TCP counters&lt;br /&gt;
&lt;br /&gt;
Widgets can be moved with drag and drop simply by clicking on the two double arrows,dragging it around and dropping it on a drop zone.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Incidents_add_channel.png&amp;diff=4004</id>
		<title>File:Incidents add channel.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Incidents_add_channel.png&amp;diff=4004"/>
		<updated>2022-05-12T12:20:43Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Incidents add channel.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Add channel&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Skype_rtp_statistics_ip_detailed.png&amp;diff=4003</id>
		<title>File:Skype rtp statistics ip detailed.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Skype_rtp_statistics_ip_detailed.png&amp;diff=4003"/>
		<updated>2022-05-12T12:18:31Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Skype rtp statistics ip detailed.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;KD&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Skype_response_time.png&amp;diff=4002</id>
		<title>File:Skype response time.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Skype_response_time.png&amp;diff=4002"/>
		<updated>2022-05-12T12:18:18Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Skype response time.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;KD&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Sip_dashboard.png&amp;diff=4001</id>
		<title>File:Sip dashboard.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Sip_dashboard.png&amp;diff=4001"/>
		<updated>2022-05-12T12:18:07Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Sip dashboard.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Sip dashboard&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Ring_buffer_rule_create_ssl_after_handshake.png&amp;diff=4000</id>
		<title>File:Ring buffer rule create ssl after handshake.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Ring_buffer_rule_create_ssl_after_handshake.png&amp;diff=4000"/>
		<updated>2022-05-12T12:17:31Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Ring buffer rule create ssl after handshake.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Ring buffer rule create ssl after handshake&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:RTP_connections.png&amp;diff=3999</id>
		<title>File:RTP connections.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:RTP_connections.png&amp;diff=3999"/>
		<updated>2022-05-12T12:16:47Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:RTP connections.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Profinet_Overview.png&amp;diff=3998</id>
		<title>File:Profinet Overview.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Profinet_Overview.png&amp;diff=3998"/>
		<updated>2022-05-12T12:16:31Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Profinet Overview.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Profinet Overview&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Multi_IP_view1.png&amp;diff=3997</id>
		<title>File:Multi IP view1.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Multi_IP_view1.png&amp;diff=3997"/>
		<updated>2022-05-12T12:15:30Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Multi IP view1.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Multi IP view1&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Incidents_module.png&amp;diff=3996</id>
		<title>File:Incidents module.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Incidents_module.png&amp;diff=3996"/>
		<updated>2022-05-12T12:15:03Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Incidents module.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Incidents module&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:IP_statistics.png&amp;diff=3995</id>
		<title>File:IP statistics.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:IP_statistics.png&amp;diff=3995"/>
		<updated>2022-05-12T12:14:51Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:IP statistics.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;IP statistics&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Firmware_update.png&amp;diff=3994</id>
		<title>File:Firmware update.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Firmware_update.png&amp;diff=3994"/>
		<updated>2022-05-12T12:13:59Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Firmware update.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Firmware update&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Empty_dashboard.png&amp;diff=3993</id>
		<title>File:Empty dashboard.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Empty_dashboard.png&amp;diff=3993"/>
		<updated>2022-05-12T12:13:20Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Empty dashboard.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Empty dashboard&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Dns_servers.png&amp;diff=3992</id>
		<title>File:Dns servers.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Dns_servers.png&amp;diff=3992"/>
		<updated>2022-05-12T12:13:12Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Dns servers.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;List of DNS servers&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Dns_server_response_time.png&amp;diff=3991</id>
		<title>File:Dns server response time.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Dns_server_response_time.png&amp;diff=3991"/>
		<updated>2022-05-12T12:13:04Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Dns server response time.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;DNS server response time&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Dns_server_reply_codes.png&amp;diff=3990</id>
		<title>File:Dns server reply codes.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Dns_server_reply_codes.png&amp;diff=3990"/>
		<updated>2022-05-12T12:12:57Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Dns server reply codes.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;DNS server reply codes&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Dns_server_names.png&amp;diff=3989</id>
		<title>File:Dns server names.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Dns_server_names.png&amp;diff=3989"/>
		<updated>2022-05-12T12:12:44Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Dns server names.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;DNS names and lookup times&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Dns_server_details.png&amp;diff=3988</id>
		<title>File:Dns server details.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Dns_server_details.png&amp;diff=3988"/>
		<updated>2022-05-12T12:12:33Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Dns server details.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;DNS server details&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Dns_resolved_names.png&amp;diff=3987</id>
		<title>File:Dns resolved names.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Dns_resolved_names.png&amp;diff=3987"/>
		<updated>2022-05-12T12:11:06Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Dns resolved names.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;List of resolved DNS names&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Dns_record_types.png&amp;diff=3986</id>
		<title>File:Dns record types.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Dns_record_types.png&amp;diff=3986"/>
		<updated>2022-05-12T12:10:31Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Dns record types.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;DNS record types&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Ap-mm-time-select-1-day.png&amp;diff=3985</id>
		<title>File:Ap-mm-time-select-1-day.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Ap-mm-time-select-1-day.png&amp;diff=3985"/>
		<updated>2022-05-12T12:09:03Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Ap-mm-time-select-1-day.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Investigate Network Load&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Advanced_filter.png&amp;diff=3984</id>
		<title>File:Advanced filter.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Advanced_filter.png&amp;diff=3984"/>
		<updated>2022-05-12T12:07:43Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:Advanced filter.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Advanced filter&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:ARP.png&amp;diff=3983</id>
		<title>File:ARP.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:ARP.png&amp;diff=3983"/>
		<updated>2022-05-12T12:06:57Z</updated>

		<summary type="html">&lt;p&gt;Simon: Simon uploaded a new version of File:ARP.png&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;ARP&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Management_interface_settings&amp;diff=3777</id>
		<title>Management interface settings</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Management_interface_settings&amp;diff=3777"/>
		<updated>2021-12-02T09:13:01Z</updated>

		<summary type="html">&lt;p&gt;Simon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Access to the web interface of the Allegro Network Multimeter is handled by an out-of-band network connection separately connected to the device via a wired connection or wireless.&lt;br /&gt;
This section allows to configure the settings of the wireless and the wired access. The configuration of the  [[Management interface settings on console]] is possible, too.&lt;br /&gt;
&lt;br /&gt;
=== Wireless management interface ===&lt;br /&gt;
&lt;br /&gt;
The wireless access can be disabled or enabled, regardless of a connected Wi-Fi device since such a device can be connected later at any time.&lt;br /&gt;
The wireless management interface can operate in two modes:&lt;br /&gt;
&lt;br /&gt;
* Manage own network: In this mode (default), the Allegro will setup its own Access Point so you can connect a laptop or smartphone directly to the device and access the management interface. In this mode, the web interface can be accessed by entering the URL &#039;&#039;&#039;https://allegro/&#039;&#039;&#039; into a web browser.&lt;br /&gt;
* Join existing network: In this mode, the Allegro Network Multimeter will connect to an existing Wi-Fi network. To do so, enter the name (SSID) of the network and the password. The Wi-Fi Access Point or controller should list the IP it has assigned to the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Additionally, two other options are available under Wireless management interface settings:&lt;br /&gt;
&lt;br /&gt;
* Channel: a fixed Wi-Fi channel can be selected so the Access Point only uses this channel instead of automatically choosing the best available channel.&lt;br /&gt;
* Disable default gateway: If enabled, the Access Point will not announce to be the default gateway/route for this network. If so, the device can only be accessed by using the IP address 192.168.4.1. If this option is disabled, the name server running on the device will also resolve the name &#039;&#039;&#039;allegro/&#039;&#039;&#039; to make it easier to access to the device. This option is useful if there is still another active connection which should still be used, such as a mobile connection or the internal company network.&lt;br /&gt;
&lt;br /&gt;
=== LAN management interface ===&lt;br /&gt;
&lt;br /&gt;
For wired connections there are three operation modes:&lt;br /&gt;
&lt;br /&gt;
* Join existing network: in this mode the Allegro obtains an IP address (DHCP) from the network connected to the management port. The Router or DHCP server in the network should list the Allegro Network Multimeter IP address.&lt;br /&gt;
* Manage own network: In this mode, the Allegro will run a DHCP server on the management port, enabling you to connect another computer via a cable to the system. Be aware that in this mode, the management port should not be connected to the main network, since running multiple DHCP servers will disturb the network. In this mode, the web interface can be accessed by entering the URL &#039;&#039;&#039;https://allegro/&#039;&#039;&#039; into a web browser.&lt;br /&gt;
* Use static IP: It is also possible to configure a fixed IP address for the wired management port. You can enter any IP address for the port. The IP address must end with a slash followed by the subnet size. Example: /24 stands for a subnet mask of 255.255.255.0. Optionally you can enter the IP address of your gateway computer and the IP address of the DNS server. You can leave them empty if you want to directly connect the device to another computer with no Router involved. In this mode, the web interface can be reached by the static IP address you configured.&lt;br /&gt;
&lt;br /&gt;
=== Secondary management interface ===&lt;br /&gt;
&lt;br /&gt;
You can attach a USB Ethernet adapter to any USB port of the Allegro Network Multimeter and use this as an additional management interface. This management interface can be operated with a static IP address only. In the address input field, enter the IP address followed by a slash and the subnet size. Optionally you can enter the IP address of your gateway computer and the IP address of the DNS server. You can leave them empty if you want to directly connect the device to another computer with no Router involved. This feature is not supported by the Allegro 200.&lt;br /&gt;
&lt;br /&gt;
=== Host name ===&lt;br /&gt;
&lt;br /&gt;
By default, the host name is in the format &#039;&#039;&#039;allegro-mm-xxxx&#039;&#039;&#039; where the last four characters depend on the actual device. Because of this, multiple Allegro Network Multimeters can be used in the same network. &lt;br /&gt;
It is however, possible to choose your own host name. Enter a new name and save the changes. If the name field is empty, the default name will be used again following the next reboot.&lt;br /&gt;
&lt;br /&gt;
=== LLDP ===&lt;br /&gt;
&lt;br /&gt;
If enabled, the Allegro Network Multimeter will transmit LLDP (Link Layer Discovery Protocol) information for the management MAC and IP addresses on the management interface.&lt;br /&gt;
The LLDP system name will contain the hostname of the Allegro Network Multimeter and the LLDP system description will contain the platform type (e.g. Allegro-200-rev1) and the currently installed Firmware version.&lt;br /&gt;
&lt;br /&gt;
=== Huawei E8372 | E3372 LTE Wingle ===&lt;br /&gt;
&lt;br /&gt;
Allegro Network Multimeter 500 and upwards allow for one Management Interface to be connected via LTE through a Huawei E8372 or E3372 LTE Wingle. This setup allows for a remote management connection through the [https://allegro-packets.com/wiki/Using_the_Allegro_Remote_Service Allegro Remote Service] without a local internet connectivity. In order to do this, connect your USB Wingle to your Computer and follow Huawei&#039;s instructions to set up your LTE connection. Afterwards connect the Huawei Wingle to one of the USB ports on your Allegro Network Multimeter and go to &#039;&#039;&#039;Settings&#039;&#039;&#039;-&amp;gt;&#039;&#039;&#039;Management Interfaces&#039;&#039;&#039;. Activate &#039;&#039;&#039;Use optional management interface&#039;&#039;&#039; and configure an available IP address (e.g. 192.168.8.2/24), gateway IP (e.g. 192.168.8.1) and name server (e.g. 192.168.8.1).&lt;br /&gt;
&lt;br /&gt;
[[File:Secondary_lan_management.png|900px]]&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Management_interface_settings&amp;diff=3776</id>
		<title>Management interface settings</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Management_interface_settings&amp;diff=3776"/>
		<updated>2021-12-01T16:22:40Z</updated>

		<summary type="html">&lt;p&gt;Simon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Access to the web interface of the Allegro Network Multimeter is handled by an out-of-band network connection separately connected to the device via a wired connection or wireless.&lt;br /&gt;
This section allows to configure the settings of the wireless and the wired access. The configuration of the  [[Management interface settings on console]] is possible, too.&lt;br /&gt;
&lt;br /&gt;
=== Wireless management interface ===&lt;br /&gt;
&lt;br /&gt;
The wireless access can be disabled or enabled, regardless of a connected Wi-Fi device since such a device can be connected later at any time.&lt;br /&gt;
The wireless management interface can operate in two modes:&lt;br /&gt;
&lt;br /&gt;
* Manage own network: In this mode (default), the Allegro will setup its own Access Point so you can connect a laptop or smartphone directly to the device and access the management interface. In this mode, the web interface can be accessed by entering the URL &#039;&#039;&#039;https://allegro/&#039;&#039;&#039; into a web browser.&lt;br /&gt;
* Join existing network: In this mode, the Allegro Network Multimeter will connect to an existing Wi-Fi network. To do so, enter the name (SSID) of the network and the password. The Wi-Fi Access Point or controller should list the IP it has assigned to the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Additionally, two other options are available under Wireless management interface settings:&lt;br /&gt;
&lt;br /&gt;
* Channel: a fixed Wi-Fi channel can be selected so the Access Point only uses this channel instead of automatically choosing the best available channel.&lt;br /&gt;
* Disable default gateway: If enabled, the Access Point will not announce to be the default gateway/route for this network. If so, the device can only be accessed by using the IP address 192.168.4.1. If this option is disabled, the name server running on the device will also resolve the name &#039;&#039;&#039;allegro/&#039;&#039;&#039; to make it easier to access to the device. This option is useful if there is still another active connection which should still be used, such as a mobile connection or the internal company network.&lt;br /&gt;
&lt;br /&gt;
=== LAN management interface ===&lt;br /&gt;
&lt;br /&gt;
For wired connections there are three operation modes:&lt;br /&gt;
&lt;br /&gt;
* Join existing network: in this mode the Allegro obtains an IP address (DHCP) from the network connected to the management port. The Router or DHCP server in the network should list the Allegro Network Multimeter IP address.&lt;br /&gt;
* Manage own network: In this mode, the Allegro will run a DHCP server on the management port, enabling you to connect another computer via a cable to the system. Be aware that in this mode, the management port should not be connected to the main network, since running multiple DHCP servers will disturb the network. In this mode, the web interface can be accessed by entering the URL &#039;&#039;&#039;https://allegro/&#039;&#039;&#039; into a web browser.&lt;br /&gt;
* Use static IP: It is also possible to configure a fixed IP address for the wired management port. You can enter any IP address for the port. The IP address must end with a slash followed by the subnet size. Example: /24 stands for a subnet mask of 255.255.255.0. Optionally you can enter the IP address of your gateway computer and the IP address of the DNS server. You can leave them empty if you want to directly connect the device to another computer with no Router involved. In this mode, the web interface can be reached by the static IP address you configured.&lt;br /&gt;
&lt;br /&gt;
=== Secondary management interface ===&lt;br /&gt;
&lt;br /&gt;
You can attach a USB Ethernet adapter to any USB port of the Allegro Network Multimeter and use this as an additional management interface. This management interface can be operated with a static IP address only. In the address input field, enter the IP address followed by a slash and the subnet size. Optionally you can enter the IP address of your gateway computer and the IP address of the DNS server. You can leave them empty if you want to directly connect the device to another computer with no Router involved. This feature is not supported by the Allegro 200.&lt;br /&gt;
&lt;br /&gt;
=== Host name ===&lt;br /&gt;
&lt;br /&gt;
By default, the host name is in the format &#039;&#039;&#039;allegro-mm-xxxx&#039;&#039;&#039; where the last four characters depend on the actual device. Because of this, multiple Allegro Network Multimeters can be used in the same network. &lt;br /&gt;
It is however, possible to choose your own host name. Enter a new name and save the changes. If the name field is empty, the default name will be used again following the next reboot.&lt;br /&gt;
&lt;br /&gt;
=== LLDP ===&lt;br /&gt;
&lt;br /&gt;
If enabled, the Allegro Network Multimeter will transmit LLDP (Link Layer Discovery Protocol) information for the management MAC and IP addresses on the management interface.&lt;br /&gt;
The LLDP system name will contain the hostname of the Allegro Network Multimeter and the LLDP system description will contain the platform type (e.g. Allegro-200-rev1) and the currently installed Firmware version.&lt;br /&gt;
&lt;br /&gt;
=== Huawei E8372 LTE Wingle ===&lt;br /&gt;
&lt;br /&gt;
Allegro Network Multimeter 500 and upwards allow for one Management Interface to be connected via LTE through a Huawei E8372 LTE Wingle. This setup allows for a remote management connection through the [https://allegro-packets.com/wiki/Using_the_Allegro_Remote_Service Allegro Remote Service] without a local internet connectivity. In order to do this, connect your USB Wingle to your Computer and follow Huawei&#039;s instructions to set up your LTE connection. Afterwards connect the Huawei Wingle to one of the USB ports on your Allegro Network Multimeter and go to &#039;&#039;&#039;Settings&#039;&#039;&#039;-&amp;gt;&#039;&#039;&#039;Management Interfaces&#039;&#039;&#039;. Activate &#039;&#039;&#039;Use optional management interface&#039;&#039;&#039; and configure an available IP address (e.g. 192.168.8.2/24), gateway IP (e.g. 192.168.8.1) and name server (e.g. 192.168.8.1).&lt;br /&gt;
&lt;br /&gt;
[[File:Secondary_lan_management.png|900px]]&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Management_interface_settings&amp;diff=3775</id>
		<title>Management interface settings</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Management_interface_settings&amp;diff=3775"/>
		<updated>2021-12-01T16:22:26Z</updated>

		<summary type="html">&lt;p&gt;Simon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Access to the web interface of the Allegro Network Multimeter is handled by an out-of-band network connection separately connected to the device via a wired connection or wireless.&lt;br /&gt;
This section allows to configure the settings of the wireless and the wired access. The configuration of the  [[Management interface settings on console]] is possible, too.&lt;br /&gt;
&lt;br /&gt;
=== Wireless management interface ===&lt;br /&gt;
&lt;br /&gt;
The wireless access can be disabled or enabled, regardless of a connected Wi-Fi device since such a device can be connected later at any time.&lt;br /&gt;
The wireless management interface can operate in two modes:&lt;br /&gt;
&lt;br /&gt;
* Manage own network: In this mode (default), the Allegro will setup its own Access Point so you can connect a laptop or smartphone directly to the device and access the management interface. In this mode, the web interface can be accessed by entering the URL &#039;&#039;&#039;https://allegro/&#039;&#039;&#039; into a web browser.&lt;br /&gt;
* Join existing network: In this mode, the Allegro Network Multimeter will connect to an existing Wi-Fi network. To do so, enter the name (SSID) of the network and the password. The Wi-Fi Access Point or controller should list the IP it has assigned to the Allegro Network Multimeter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Additionally, two other options are available under Wireless management interface settings:&lt;br /&gt;
&lt;br /&gt;
* Channel: a fixed Wi-Fi channel can be selected so the Access Point only uses this channel instead of automatically choosing the best available channel.&lt;br /&gt;
* Disable default gateway: If enabled, the Access Point will not announce to be the default gateway/route for this network. If so, the device can only be accessed by using the IP address 192.168.4.1. If this option is disabled, the name server running on the device will also resolve the name &#039;&#039;&#039;allegro/&#039;&#039;&#039; to make it easier to access to the device. This option is useful if there is still another active connection which should still be used, such as a mobile connection or the internal company network.&lt;br /&gt;
&lt;br /&gt;
=== LAN management interface ===&lt;br /&gt;
&lt;br /&gt;
For wired connections there are three operation modes:&lt;br /&gt;
&lt;br /&gt;
* Join existing network: in this mode the Allegro obtains an IP address (DHCP) from the network connected to the management port. The Router or DHCP server in the network should list the Allegro Network Multimeter IP address.&lt;br /&gt;
* Manage own network: In this mode, the Allegro will run a DHCP server on the management port, enabling you to connect another computer via a cable to the system. Be aware that in this mode, the management port should not be connected to the main network, since running multiple DHCP servers will disturb the network. In this mode, the web interface can be accessed by entering the URL &#039;&#039;&#039;https://allegro/&#039;&#039;&#039; into a web browser.&lt;br /&gt;
* Use static IP: It is also possible to configure a fixed IP address for the wired management port. You can enter any IP address for the port. The IP address must end with a slash followed by the subnet size. Example: /24 stands for a subnet mask of 255.255.255.0. Optionally you can enter the IP address of your gateway computer and the IP address of the DNS server. You can leave them empty if you want to directly connect the device to another computer with no Router involved. In this mode, the web interface can be reached by the static IP address you configured.&lt;br /&gt;
&lt;br /&gt;
=== Secondary management interface ===&lt;br /&gt;
&lt;br /&gt;
You can attach a USB Ethernet adapter to any USB port of the Allegro Network Multimeter and use this as an additional management interface. This management interface can be operated with a static IP address only. In the address input field, enter the IP address followed by a slash and the subnet size. Optionally you can enter the IP address of your gateway computer and the IP address of the DNS server. You can leave them empty if you want to directly connect the device to another computer with no Router involved. This feature is not supported by the Allegro 200.&lt;br /&gt;
&lt;br /&gt;
=== Host name ===&lt;br /&gt;
&lt;br /&gt;
By default, the host name is in the format &#039;&#039;&#039;allegro-mm-xxxx&#039;&#039;&#039; where the last four characters depend on the actual device. Because of this, multiple Allegro Network Multimeters can be used in the same network. &lt;br /&gt;
It is however, possible to choose your own host name. Enter a new name and save the changes. If the name field is empty, the default name will be used again following the next reboot.&lt;br /&gt;
&lt;br /&gt;
=== LLDP ===&lt;br /&gt;
&lt;br /&gt;
If enabled, the Allegro Network Multimeter will transmit LLDP (Link Layer Discovery Protocol) information for the management MAC and IP addresses on the management interface.&lt;br /&gt;
The LLDP system name will contain the hostname of the Allegro Network Multimeter and the LLDP system description will contain the platform type (e.g. Allegro-200-rev1) and the currently installed Firmware version.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Huawei E8372 LTE Wingle ===&lt;br /&gt;
&lt;br /&gt;
Allegro Network Multimeter 500 and upwards allow for one Management Interface to be connected via LTE through a Huawei E8372 LTE Wingle. This setup allows for a remote management connection through the [https://allegro-packets.com/wiki/Using_the_Allegro_Remote_Service Allegro Remote Service] without a local internet connectivity. In order to do this, connect your USB Wingle to your Computer and follow Huawei&#039;s instructions to set up your LTE connection. Afterwards connect the Huawei Wingle to one of the USB ports on your Allegro Network Multimeter and go to &#039;&#039;&#039;Settings&#039;&#039;&#039;-&amp;gt;&#039;&#039;&#039;Management Interfaces&#039;&#039;&#039;. Activate &#039;&#039;&#039;Use optional management interface&#039;&#039;&#039; and configure an available IP address (e.g. 192.168.8.2/24), gateway IP (e.g. 192.168.8.1) and name server (e.g. 192.168.8.1).&lt;br /&gt;
&lt;br /&gt;
[[File:Secondary_lan_management.png|900px]]&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=File:Secondary_lan_management.png&amp;diff=3774</id>
		<title>File:Secondary lan management.png</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=File:Secondary_lan_management.png&amp;diff=3774"/>
		<updated>2021-12-01T16:16:15Z</updated>

		<summary type="html">&lt;p&gt;Simon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
	<entry>
		<id>https://allegro-packets.com/wiki/index.php?title=Capture_module&amp;diff=3670</id>
		<title>Capture module</title>
		<link rel="alternate" type="text/html" href="https://allegro-packets.com/wiki/index.php?title=Capture_module&amp;diff=3670"/>
		<updated>2021-09-15T09:17:38Z</updated>

		<summary type="html">&lt;p&gt;Simon: /* Using expert filters to start captures */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Capture module == &lt;br /&gt;
The Network Multimeter allows direct capturing of network traffic as a HTTP download to your computer. No packet data is stored on the device itself. Traffic can be directly filtered for specific packets, only the relevant packets will be captured. In addition, it is also possible to capture network traffic to an attached storage device, see the settings section below for details. Capturing network traffic is usually started by clicking on a PCAP button in a certain module. These buttons allow&lt;br /&gt;
capturing specific traffic, for example for an certain IP address or a network protocol. The capture module allows to configure filter for traffic that has not even started right now, for example for an IP address that is not in use at the moment but later might be used. The capture module page displays all currently running captures and allows starting new captures with specific filters.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
|[[File:Generic modules.png|800px|none|right]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Current captures ====&lt;br /&gt;
The first part of the page displays all downloads running for the current user session, and all downloads running for other user sessions (like when a download has been started outside the browser by directly using command line tools such as wget or curl).&lt;br /&gt;
The list contains the client IP and port of the user running the download. The next three counters describe the number of packets captured for the corresponding filter, the number of packets dropped by the capturing module, and the number of ignored packets. Packet drops happen when more packets are captured than can be transferred via HTTP to the client. Ignored packets do not match the given capture filter. The following columns list the applied filter criteria. The last column contains a button to stop the corresponding download. Downloads can also be stopped by clicking the same capture button that started the capture in the corresponding module. If multiple devices have been configured, the list also contains all captures from all multi-devices which can be stopped individually. &lt;br /&gt;
&lt;br /&gt;
==== Recently captured ====&lt;br /&gt;
This list shows the most recently performed captures for the current user. The most recent capture is displayed on the top. Next to each capture there is a button to permanently save this capture as a favorite as well as a button to simply start this capture again. The &#039;&#039;&#039;Use as expert filter&#039;&#039;&#039; button will copy the capture filter into the expert filter input field and allows for customizing the capture. The button &#039;&#039;&#039;Delete list of recent captures&#039;&#039;&#039; will delete all entries from this list.&lt;br /&gt;
&lt;br /&gt;
==== Favorites ====&lt;br /&gt;
This list shows favorite capture expressions. A capture can be marked as a favorite either in the capture dialog by clicking on the star button in the top right corner or by marking it as a favorite in the &#039;&#039;&#039;Recently captured&#039;&#039;&#039; list. A description can be given and will be displayed in this list. For each favorite capture a PCAP button is available to simply start this capture again. The &#039;&#039;&#039;Remove favorites&#039;&#039;&#039; button allows for cleaning the list. The &#039;&#039;&#039;Use as expert filter&#039;&#039;&#039; button will copy the capture filter into the expert filter input field and allows for customizing the capture.&lt;br /&gt;
&lt;br /&gt;
==== Planned captures ====&lt;br /&gt;
On this tab captures to the storage device can be planned ahead of time and these captures can even be set to repeat automatically. A click on the &#039;&#039;&#039;Add planned capture&#039;&#039;&#039; button opens a dialog where the planned capture can be configured. This includes settings like the start date and time of the capture, the duration of the capture, if a capture should repeat and the filter expression used during the capture. It is important to know that planned captures are always stored on the active storage device and thus will not function if no storage device is active.&lt;br /&gt;
&lt;br /&gt;
==== Capture profiles ====&lt;br /&gt;
[[File:Capture profiles config.png|thumb|600x600px|Capture profile configuration]]&lt;br /&gt;
[[File:Capture profiles edit profile.png|thumb|600x600px|Edit capture profile]]&lt;br /&gt;
Capture profiles can be used in the capture dialog for custom packet truncation rules. Such profiles defines custom rules for packet snapshot length similar to ring buffer filters. This allows to use a different snapshot length for specific layer 7 protocols, if for example traffic of one protocol shall be captured completely while for another protocol only the IP header shall be captured. Such a capture profile can be selected in the capture dialog in the &amp;quot;Truncate packet length&amp;quot; select box.&lt;br /&gt;
&lt;br /&gt;
Up to 10 different profiles can be configured by clicking at the &amp;quot;Add profile&amp;quot; button. The add/edit dialog allows to enter a profile name and up to 10 rules for snapshot length. Similar to [[Packet ring buffer#Packet ring buffer snapshot length filter|ring buffer filters]], the first rule that matches for the selected type is used to decide for the snapshot length of the actual packet.&lt;br /&gt;
&lt;br /&gt;
==== Simple capture ====&lt;br /&gt;
The second section of the capture page allow to select some fields to filter network traffic for. By default, only the IP field is visible, the other fields can be enabled by clicking on the corresponding toggle switch. Each line allows to enter a filter criterion for the corresponding network traffic element. To start the capture with the entered filter criteria just click at the &#039;&#039;&#039;Start capture&#039;&#039;&#039; button. For reference, the expert filter expression is shown at the end of the section so it can be used to copy and paste&lt;br /&gt;
the string into the expert filter section.&lt;br /&gt;
&lt;br /&gt;
==== Using expert filters to start captures ====&lt;br /&gt;
The third part of the page allows for starting a download for any criterion combination using complex filter expressions. A capture filter is defined in a C-style syntax and supports combination of AND/OR operators, precedence order with parentheses and equal/not equal comparisons. If the filter exp Session can be evaluated to true, the packet is&lt;br /&gt;
captured.&lt;br /&gt;
If a value contains a space, the whole value must be quoted with “”.&lt;br /&gt;
Following operators are supported:&lt;br /&gt;
* &#039;&#039;&#039;and&#039;&#039;&#039;, &#039;&#039;&#039;&amp;amp;&amp;amp;&#039;&#039;&#039; : AND operator. The filter expression will match if all operands could be evaluated to true.&lt;br /&gt;
* &#039;&#039;&#039;or&#039;&#039;&#039;, &#039;&#039;&#039;||&#039;&#039;&#039;: OR operator. The filter expression will match if any operand can be evaluated to true.&lt;br /&gt;
&lt;br /&gt;
Following comparison operators are supported:&lt;br /&gt;
* &#039;&#039;&#039;==&#039;&#039;&#039;: Will evaluate expression to true if left and right operand are equal.&lt;br /&gt;
* &#039;&#039;&#039;!=&#039;&#039;&#039;: Will evaluate expression to true if left and right operand are not equal.&lt;br /&gt;
&lt;br /&gt;
Following operands are supported:&lt;br /&gt;
* &#039;&#039;&#039;ip&#039;&#039;&#039;: An IP address. The packet is captured if either source or destination IP address of the packet match. A netmask and a port can also be specified. For IPv6 addresses with a specific port, the address must be written in brackets. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
|  &lt;br /&gt;
ip == 10.0.0.1&lt;br /&gt;
&lt;br /&gt;
ip == ff02::1:3&lt;br /&gt;
&lt;br /&gt;
ip == 10.0/16&lt;br /&gt;
&lt;br /&gt;
ip == 10.0.0.1:1234&lt;br /&gt;
&lt;br /&gt;
ip == [2a02:810a:1340:1292:1c6b:e58d:6ebc:6cd2]:123&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;mac&#039;&#039;&#039;: A MAC address. The packet is captured if either source or destination MAC address of the packet match. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
|  mac == 12:34: :56:78:90:ab&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;port&#039;&#039;&#039;: A TCP or UDP port. The packet is captured if either source or destination port match. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-         &lt;br /&gt;
| port == 80&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;portrange&#039;&#039;&#039;: A TCP or UDP port range. The range can be a single number or a comma separated list of values or value ranges. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-                     &lt;br /&gt;
| portrange == 80,100-120,-10,65000-&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;serverport&#039;&#039;&#039;: A TCP or UDP port of a server. The packet is captured if the given port is a port of the server and not of a client. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| serverport == 80&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;macProtocol&#039;&#039;&#039;: A MAC protocol such as IPv4 or IPv6. For all seen MAC protocols, please consult the MAC Protocol Statistics module. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| macProtocol == IPv4&lt;br /&gt;
macProtocol == &amp;quot;Non IP&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;l4Protocol&#039;&#039;&#039;: A layer 4 protocol such as TCP or UDP or any IP protocol number. Protocols can also be OR combined as a comma seperated list. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| l4Protocol == ICMP,ICMPv6&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;l7Protocol&#039;&#039;&#039; or &#039;&#039;&#039;dpiProtocol&#039;&#039;&#039;: A layer 7 protocol. Protocols can also be OR combined as a comma seperated list. For all seen protocols please consult the Layer 7 protocols module.&lt;br /&gt;
* &#039;&#039;&#039;countryCode&#039;&#039;&#039;: A country code such as US. For all seen country codes please consult the Geolocation module.&lt;br /&gt;
* &#039;&#039;&#039;arpip&#039;&#039;&#039;: An IP address within an ARP request or response.&lt;br /&gt;
* &#039;&#039;&#039;vlan&#039;&#039;&#039;: A VLAN tag of an outer or inner VLAN. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;outervlan&#039;&#039;&#039;: A VLAN tag of an outer VLAN. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;innervlan&#039;&#039;&#039;: A VLAN tag of an inner VLAN. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;multicastGroup&#039;&#039;&#039;: A multicast IP address or any. The filter will match all IGMP or MLD negotiation packets related to that multicast IP address.&lt;br /&gt;
* &#039;&#039;&#039;rtpPayloadType&#039;&#039;&#039;: The RTP payload type such as PCMU or MP2T. This filter will match all RTP packets with the given payload type.&lt;br /&gt;
* &#039;&#039;&#039;interface&#039;&#039;&#039;: The physical interface. This can be a single number or a range. For interface ids please consult the Interface stats page. &lt;br /&gt;
:Example:&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| interface == 1,3-5&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;link&#039;&#039;&#039;: The link pair of two interfaces as stated in Interface stats. A single link number can be given.&lt;br /&gt;
* &#039;&#039;&#039;ptpMsgType&#039;&#039;&#039;: A specific PTP message type number or any for the whole PTP traffic.&lt;br /&gt;
* &#039;&#039;&#039;profinetFrameId&#039;&#039;&#039;: A specific Profinet frame ID.&lt;br /&gt;
* &#039;&#039;&#039;profinetCmOpnum&#039;&#039;&#039;: A specific operation number for Profinet CM (Context Manager) requests or responses. Can also be any for every operation number. Following values are used:&lt;br /&gt;
:#connect&lt;br /&gt;
:#release&lt;br /&gt;
:#read&lt;br /&gt;
:#write&lt;br /&gt;
:#control&lt;br /&gt;
:#read implicit&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;mpls&#039;&#039;&#039;: A label of an outer or inner MPLS. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;outerMpls&#039;&#039;&#039;: A label of an outer MPLS. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;innerMpls&#039;&#039;&#039;: A label of an inner MPLS. May be a number or none or any.&lt;br /&gt;
* &#039;&#039;&#039;qosIpDscp&#039;&#039;&#039;: The DSCP value in the IP header. May be a number.&lt;br /&gt;
* &#039;&#039;&#039;qosMplsTc&#039;&#039;&#039;: The traffic class value in the outermost MPLS label stack entry.&lt;br /&gt;
* &#039;&#039;&#039;qosVlanPcp&#039;&#039;&#039;: The priority code point value in the outermost VLAN tag.&lt;br /&gt;
* &#039;&#039;&#039;group&#039;&#039;&#039;: The name of a configured group or ‘default’. If the name contains whitespaces, the name must be enclosed in quotes.&lt;br /&gt;
* &#039;&#039;&#039;badCRC&#039;&#039;&#039;: The value of this operand will be 1 for packets with a CRC error and will be 0 for good packets. Capturing packets with bad CRC is currently only supported on 1Gb interfaces.&lt;br /&gt;
* &#039;&#039;&#039;icmpType&#039;&#039;&#039;: The value of a certain ICMP type (e.g. Echo request 8, Echo reply 0).&lt;br /&gt;
* &#039;&#039;&#039;tcpFlags&#039;&#039;&#039;: A single TCP flag or a list of TCP flags joined by the ‘+’ sign. If a list of flags is given, all flags must be present in the packet. Supported TCP flags are syn, ack, fin, rst, psh and urg.&lt;br /&gt;
* &#039;&#039;&#039;callId&#039;&#039;&#039;: The string value of a SIP call ID or similar identifier (e.g. P-Palladion-ID)&lt;br /&gt;
* &#039;&#039;&#039;ipFragment&#039;&#039;&#039;: If set to 1 all IPv4 fragments will be captured (i.e. packets having the &#039;More fragments&#039; flag and &#039;Fragment offset&#039; set). If set to 0 all packets without IPv4 fragmentation will be captured.&lt;br /&gt;
* &#039;&#039;&#039;regexp&#039;&#039;&#039;: The packet payload matches the quoted regular expression (RegEx) to the other side of the == operator or does not match the regular expression to the other side of the != operator. In case of IP packets the matching will be performed on the L7 payload of the packet. In case of non-IP packets the matching will be performed on the whole packet except the Ethernet header. Regular expressions largely support the pattern syntax used by the PCRE library with the exception of certain constructs. An invalid pattern will produce a descriptive error message and prevent the capture from being started.&lt;br /&gt;
&lt;br /&gt;
For a specific precedence you may use parentheses &#039;&#039;&#039;(&#039;&#039;&#039;/&#039;&#039;&#039;)&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Examples:&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| ip == 10.0.0.1:1234 and ip == 10.1.0.1:9876&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match a connection from 10.0.0.1 to 10.1.0.1 or vice versa with the ports 1234 and 9876 involved.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| ip == 10.0.0.1 and ip != 10.0.0.2&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match packets having 10.0.0.1 either as source or destination. If a communication peer of 10.0.0.1 is 10.0.0.2 the packets will not be captured.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| l4Protocol == ICMP,ICMPv6&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match packets with ICMP or ICMPv6 layer 4 protocols.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| portrange == 80,443&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will match packets to or from port 80 or 443.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == &amp;quot;allegr[o,a]&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;HTTP&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will case sensitive match packets that contain the string(s) &#039;allegro&#039; and/or &#039;allegra&#039; and/or &#039;HTTP&#039; anywhere in the payload.&lt;br /&gt;
:NOTE: The use of regexp is CASE sensitive. You must use the (?i) modifier to enable case insensitive filtering.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == &amp;quot;(?i)allegro&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;http&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:will case insensitive match packets that contain the string(s) &#039;allegro&#039; and/or &#039;http&#039; anywhere in the payload.&lt;br /&gt;
:NOTE: The use of regexp is CASE sensitive. You must use the (?i) modifier to enable case insensitive filtering.&lt;br /&gt;
&lt;br /&gt;
Of course the Allegro Network Multimeter regular expression (RegEx) capture filter, can also be used in combination with our other capture expressions.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == “allegro&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;analyzer” and l7protocol == &amp;quot;dns&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:Will case sensitive match and capture &amp;lt;u&amp;gt;only DNS packets&amp;lt;/u&amp;gt; containing the string(s) “allegro” and/or “analyzer.&lt;br /&gt;
&lt;br /&gt;
* The expression&lt;br /&gt;
:{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| regexp == “allegro&#039;&#039;&#039;&amp;lt;nowiki&amp;gt;|&amp;lt;/nowiki&amp;gt;&#039;&#039;&#039;analyzer” and l7protocol != &amp;quot;dns&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
:Will case sensitive match and capture all (except DNS) packets containing the string(s) “allegro” and/or “analyzer.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Whenever you are unsure about the outcome of RegEx based packet capturing, you can pre-test the outcome of your expressions on https://pythex.org/. &lt;br /&gt;
While pre-testing on https://pythex.org/, avoid using the “IGNORECASE” button. Instead use the (?i) modifier for constructing case insensitive expressions, as mentioned above.&lt;br /&gt;
PCRE/Python based expression examples and explanations you&#039;ll find on https://www.programiz.com/python-programming/regex&amp;lt;/i&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All captures can be limited to any amount of time or bytes, for example to capture only one minute or one megabyte of traffic.&lt;br /&gt;
&lt;br /&gt;
Below the list of filter criteria, you will find the button to actually start (or stop) the capture. In case the filter expression is invalid, the button is disabled.&lt;br /&gt;
&lt;br /&gt;
====Layer 7 protocol capture====&lt;br /&gt;
Layer 7 protocol detection engine may need several packets to recognize the currently used protocol. For these captures all not yet recognized packets will be skipped. As soon as the protocol recognition is finished, all packets matching the protocol filter will be captured.&lt;br /&gt;
&lt;br /&gt;
====Configuration settings====&lt;br /&gt;
By clicking on the gear button on the top right of the Capture web page, you can access the configuration section.&lt;br /&gt;
&lt;br /&gt;
*Split PCAP file after this size&lt;br /&gt;
: This option can be used to limit the size of the PCAP file when storing to an attached device. Once the captured traffic would exceed this threshold, a new PCAP file with the current time stamp is created and the traffic is written to the new file. If the time stamp is still the same, an index is attached to the filename.&lt;br /&gt;
: When set to 0, no splitting will be done.&lt;br /&gt;
&lt;br /&gt;
*Split PCAP file after this duration&lt;br /&gt;
:This option can be used to limit the duration of the PCAP file when storing to an attached device. The duration starts counting with the start of the capture. Once the captured traffic would exceed the duration, a new PCAP file with the current time stamp is created and the traffic is written to the new file.&lt;br /&gt;
:When set to 0, no splitting will be done.&lt;br /&gt;
:Both split parameters can be combined. The PCAP file will be split as soon as one threshold has been reached.&lt;br /&gt;
&lt;br /&gt;
*The maximum number of concurrent packet ring buffers&lt;br /&gt;
:This option is used to specify how many cluster packet ring buffers can run in parallel.&lt;br /&gt;
:Be aware that each cluster will have it&#039;s own queue in memory and therefore the memory required is the number of cluster packet ring buffers multiplied by the setting of &#039;&#039;&#039;The size in MB for the queue of the packet ring buffer&#039;&#039;&#039;.&lt;br /&gt;
:A reboot of the device or a restart of the processing is needed for a change to this option to take effect.&lt;br /&gt;
&lt;br /&gt;
*The size in MB for the queue of the packet ring buffer&lt;br /&gt;
: This option allows to configure the size of the queue that holds processed packets before they are written to the packet ring buffer. Increasing the size of this queue may help if the disk used for the packet ring buffer cannot keep up with bursts of traffic so that packet drops occur in the packet ring buffer.&lt;br /&gt;
:Be aware that memory allocated to this queue is not available for storing statistics and metadata so that choosing a large value for this queue reduces the overall data storage time.&lt;br /&gt;
:Most users will not need to change this value from the default value.&lt;br /&gt;
:A reboot of the device or a restart of the processing is needed for a change to this option to take effect.&lt;br /&gt;
&lt;br /&gt;
*The maximum size in MB for the packet reorder buffer when capturing from the packet ring buffer&lt;br /&gt;
:This setting allows to choose the maximum size that the packet reorder buffer may grow to. For performance reasons the packet ring buffer does not ensure a total order of packets when storing them on disk. The packet reorder buffer is used to restore the correct order of packets in a capture when capturing from the packet ring buffer. A larger packet reorder buffer makes it more likely that the packet order can be restored for all packets. The actual amount of memory used for the packet reorder buffer depends on this setting but also on the amount of free memory in the system so that the effectively used amount of memory may be less than this setting indicates.&lt;br /&gt;
&lt;br /&gt;
====Capture settings dialog====&lt;br /&gt;
[[File:Choose capture settings.png|none|thumb|600x600px]]&lt;br /&gt;
This dialog appears after a capture button has been clicked. Following settings are possible:&lt;br /&gt;
*Start time and end time&lt;br /&gt;
:By clicking on the input field or on the calendar icon you can choose the start and end time of the capture. The input field is also editable with keyboard and allows entering a time on a second basis.&lt;br /&gt;
: If the start time is in the past, the complete capture is performed on the stored data of the capture ring buffer. When the capture reaches the newest packets it still continues to read from the capture ring buffer. The dialog will limit the start time input to the earliest data of the capture ring buffer. Be aware, that a possible capture ring buffer filter was applied on the past data and is also applied on future data in this mode.&lt;br /&gt;
: The start time may also be in the future. The capture is scheduled and starts as soon as a packet is received with a time later than the start time.&lt;br /&gt;
:If the whole time input field is marked and deleted, the start or end time will reset back to the default value. The default value for start time is &#039;&#039;&#039;now&#039;&#039;&#039;, the capture will start with pushing the &#039;&#039;&#039;Start capturing&#039;&#039;&#039; button. The default value of the end time is &#039;&#039;&#039;unlimited&#039;&#039;&#039;, the capture will not stop unless stopped manually by clicking on the stop button.&lt;br /&gt;
:Eight buttons offer quick selection of often used time settings.&lt;br /&gt;
&lt;br /&gt;
*Packet ring buffer&lt;br /&gt;
:If multiple packet ring buffer clusters are active this dropdown menu allows to choose from which cluster the packets should be captured.&lt;br /&gt;
&lt;br /&gt;
*Capture type&lt;br /&gt;
: This drop down menu allows to choose the method how packets are captured. The last successful setting is persistently stored per user. Following methods are available:&lt;br /&gt;
&lt;br /&gt;
:*HTTP download&lt;br /&gt;
::This is the default method. The capture will start a HTTP download of a PCAP file directly in the browser.&lt;br /&gt;
:: Available HTTP download options:&lt;br /&gt;
::*Set file name: allow to configure a custom file name for the capture file&lt;br /&gt;
::*Download as zip archive: Download the capture file as a compressed zip archive &#039;&#039;&#039;[New in version 3.0]&#039;&#039;&#039;&lt;br /&gt;
:*Disk&lt;br /&gt;
::This method is only visible if a storage device is active and has some amount of free storage space. The capture will create a PCAP file on the storage device.&lt;br /&gt;
::If PCAP export via SFTP is enabled, an additional checkbox is displayed to store the capture file in the export directory, slated for upload according the SFTP export settings.&lt;br /&gt;
&lt;br /&gt;
:*Interface&lt;br /&gt;
::This mode will transmit the captured packets on a physical network interface. It is not available when the system is analyzing a PCAP file or is analyzing the packet ring buffer.&lt;br /&gt;
&lt;br /&gt;
:* ERSPAN&lt;br /&gt;
::This mode will transmit the captured packets encapsulated in a GRE + ERSPAN header on the management interface to a given target IP address. On the target system the   traffic can be   selectively captured using the filter &#039;&#039;&#039;ip proto 0x2f&#039;&#039;&#039; when using an application like Wireshark or tcpdump.&lt;br /&gt;
&lt;br /&gt;
*File name&lt;br /&gt;
:If browser download or disk storage has been chosen, the file name of the created capture file can be set in this field. The default value shows the filename with date wildcards and the capture filter. The date wildcards are then replaced by the start time of the capture.&lt;br /&gt;
:Date format specifier can be used as supported by strftime() function call. Some common specifier:&lt;br /&gt;
:*%Y for year&lt;br /&gt;
:*%m for month&lt;br /&gt;
:* %d for day&lt;br /&gt;
:*%H for hours&lt;br /&gt;
:*%M for minutes&lt;br /&gt;
:*%S for seconds&lt;br /&gt;
&lt;br /&gt;
*Storage directory&lt;br /&gt;
:If disk storage has been chosen, the target directory on the storage device can be set in this field. Sub-directories on the storage device can be created and inspected on the [[Storage#Working with storage contents|Storage]] page.&lt;br /&gt;
&lt;br /&gt;
* Zip options &#039;&#039;&#039;[New in version 3.0]&#039;&#039;&#039;&lt;br /&gt;
:If browser download has been chosen and the zip download option is selected, the file size can be configured after which the pcap files within the archive is spit into additional files&lt;br /&gt;
:The number is entered in megabytes. 0 means no splitting.&lt;br /&gt;
&lt;br /&gt;
*Interface to transmit on&lt;br /&gt;
:This dropdown menu is only shown when Capture type is Interface. Here the physical interface on which to transmit captured packets can be selected.&lt;br /&gt;
&lt;br /&gt;
* ERSPAN target address&lt;br /&gt;
:This section is only shown when Capture type is ERSPAN. Here the target IP address or hostname for the ERSPAN encapsulated packets must be specified.&lt;br /&gt;
&lt;br /&gt;
*ERSPAN session ID&lt;br /&gt;
:This section is only shown when Capture type is ERSPAN. The ERSPAN session ID can be used to differentiate between multiple capture session on the ERSPAN target.&lt;br /&gt;
&lt;br /&gt;
*Transmit speed&lt;br /&gt;
: This dropdown menu is only shown when the Capture type is either Interface or ERSPAN and the start time is in the past so that packets are captured from the packet ring buffer. Here the limiting mode can be chosen which controls how fast captured packets are transmitted. Following modes are available:&lt;br /&gt;
&lt;br /&gt;
:*none&lt;br /&gt;
::No limit will be applied and the packets are transmitted as fast as the network interface and the packet ring buffer allow.&lt;br /&gt;
&lt;br /&gt;
:*limit to bandwidth&lt;br /&gt;
::A bandwidth limit will be applied so that the given bandwidth in Mbps is not exceeded. The bandwidth can be given as a decimal so that e.g. 500kbps can be configured with a value of 0.5.&lt;br /&gt;
&lt;br /&gt;
:*realtime factor&lt;br /&gt;
:: Packets will be transmitted based on their recorded timing information. This means that with a real time factor of 1.0 packets will be transmitted approximately with the same timing as they were originally received. Using for example a real time factor of 2.0 would transmit the packets with twice the speed than they were received.&lt;br /&gt;
&lt;br /&gt;
* Transmit bandwidth in Mbps&lt;br /&gt;
:This is only shown when limit to bandwidth has been selected in the Transmit speed dropdown menu. The meaning of this value is explained in the Transmit speed section.&lt;br /&gt;
&lt;br /&gt;
*Transmit realtime factor&lt;br /&gt;
:This is only shown when realtime factor has been selected in the Transmit speed dropdown menu. The meaning of this value is explained in the :Transmit speed section.&lt;br /&gt;
&lt;br /&gt;
*Truncate packet length:&lt;br /&gt;
:This dropdown menu is only shown when the Capture type is either HTTP or disk. You can truncate captured Packets with this setting. All packets will be captured, but truncated to the given length if they are longer than this setting. The length setting is applied on layer 2 without frame check sequence.&lt;br /&gt;
:Possible values are:&lt;br /&gt;
:*Full length&lt;br /&gt;
:*64 Bytes&lt;br /&gt;
:*1500 Bytes&lt;br /&gt;
:*Custom length with an input field for inserting any length between 64 and 15378 Bytes&lt;br /&gt;
:*Capture profile: select a configured capture profile which defines rules about how many bytes are saved depending on the configured rules.&lt;br /&gt;
&lt;br /&gt;
*PCAP compatibility:&lt;br /&gt;
:This section is only shown when the Capture type is either HTTP or disk.&lt;br /&gt;
:*Omit interface ID&lt;br /&gt;
::Enabling this option will generate a PCAP file that only contains a single interface and treats all packets as if they arrived on that interface. This may improve compatibility with third party software that cannot handle PCAPs with multiple interfaces IDs.&lt;br /&gt;
&lt;br /&gt;
*PCAP comment:&lt;br /&gt;
:Allows to add a user defined comment to the generated PCAP file.&lt;br /&gt;
:*Add device information to comment&lt;br /&gt;
::Enabling this option will insert additional device information such as name, serial, memory size or capture filter into he PCAP comment.&lt;br /&gt;
&lt;br /&gt;
After pushing the &#039;&#039;&#039;Start capture&#039;&#039;&#039; button, the capture starts.&lt;br /&gt;
&lt;br /&gt;
====Webshark====&lt;br /&gt;
The Allegro Nework Multimeter has a preview mode to see the first Megabyte of captured packets directly in the browser. By clicking the Webshark preview button in the capture dialog, the first Megabyte of the requested packets will be extracted. If this is extraction is finished, a modal dialog will open showing the captured packets similar to Wireshark. The capture can be moved from the modal dialog to a separate window by pressing the button in the upper right corner next to the close button.&lt;br /&gt;
&lt;br /&gt;
====Capture URL==== &lt;br /&gt;
It is possible to use an external tool like &#039;&#039;&#039;curl&#039;&#039;&#039; for creating and storing a PCAP.&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;  &lt;br /&gt;
|-           &lt;br /&gt;
| curl -k -u USER:PASSWORD &#039;https://allegro-mm-XXXX/API/data/modules/capture?startTime=1517306266000000&amp;amp;endTime=1517309267000000&amp;amp;expression=l7Protocol==HTTP&amp;amp;snapPacketLength=65535&amp;amp;fromCaptureBuffer=true&#039; &amp;gt; path_to/capture.pcap&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
The user name, password and hostname similar to the access of the web interface have to be used.&lt;br /&gt;
Following parameters are possible:&lt;br /&gt;
&lt;br /&gt;
* startTime: The start time of the capture. The first packet with exactly this or a later time will start the capture. The time format must be microseconds after January, 1st 1970 UTC (Unix time, epoch). If the start time is in the past, make sure you set fromCaptureBuffer parameter accordingly.&lt;br /&gt;
*endTime: The end time of the capture. The first packet with exactly this or a later time will stop the capture. The time format must be microseconds after January, 1st 1970 UTC (Unix time, epoch).&lt;br /&gt;
*expression: The filter expression. There are no whitespaces allowed. You may use ‘%20’ instead.&lt;br /&gt;
*snapPacketLength: The max size of a packet applied on layer 2 without frame check sequence. If a packet is larger than this value, it is truncated. Use 65535 for unlimited size.&lt;br /&gt;
* fromCaptureBuffer: Whether to extract data from the packet ring buffer or just live traffic.&lt;br /&gt;
*captureToMedia: Whether to store PCAP on external storage device or download with your browser on your computer.&lt;br /&gt;
* useSingleInterface: Whether to store only a single interface in the PCAP and treat all packets as if they arrived on that interface. This may improve compatibility with third party software that cannot handle PCAPs with multiple interfaces IDs.&lt;/div&gt;</summary>
		<author><name>Simon</name></author>
	</entry>
</feed>