Skip to main contentSkip to search
Powered by Zoomin Software. For more details please contactZoomin
Progress DocumentationProgress Documentation
Progress Documentation
  • Home
  • Home
  • EnglishČeštinaDeutsch (Germany)Español (Spain)Français (France)Italiano (Italy)Português (Brasil)日本語Русский (Russia)中文 (简体) (China)中文 (繁體, 台灣) (Taiwan)ar-AR
  • Login

WhatsUp Gold 2024.0.2 User Help

Network Traffic Analysis Settings

Save PDF
Save selected topicSave selected topic and subtopicsSave all topics
Share
Share to emailCopy topic URL
Print
Table of Contents
  • Introduction to WhatsUp Gold
    • Welcome
    • Navigating the WhatsUp Gold User Interface
    • WhatsUp Gold Live
    • Device list
    • Searching WhatsUp Gold
    • Getting Started
    • Getting help and additional information
  • Discovery
    • Getting the Most from Your Scan
      • Discovering Virtual Devices
        • Discover VMware Hosts Managed by vCenter
        • Discover Standalone VMware Hosts
        • Discover Hyper-V Hosts
      • Credentials for Top-Down Discovery
      • Ensure SNMP/WMI Capability on Monitored Devices
      • Cloud-based Wireless LAN Controllers
      • Discovering Storage Devices
        • Installing the SMI-S Agent for use with WhatsUp Gold
      • Discovering and Monitoring Cloud-Managed Devices
    • Initiating a Discovery Scan
      • Hosts File Format
    • Handling Shared Addresses
      • Typical Uses of Shared Addressing
      • Device Merge Reason Categories
    • Exclude a List of IP Addresses
    • Using Saved Discovery Scan Settings
    • Adding Discovered Devices
  • Device Roles
    • About Device Roles
    • Device Roles (Detecting Categories)
    • Fit Default Roles with Custom Monitors
    • Create a Custom Device Role
      • Clone a Device Role
      • Refine Scan Rules
      • Check Logic Between Rule Groups
    • Device Templates
      • Roles/Sub Roles New/Edit Wizard
        • General
        • Defining Device Scan Rules for Device Detection
          • Available Scan Rules
          • Querying Management Objects and Infosets
        • Applied Sub Roles
        • Attributes
          • Custom Attributes
        • Custom Links (role wizard)
        • Monitors
          • Filter Library
          • Add/Edit an Interface Filter
        • Action Policy
        • Tasks
      • Importing and Exporting Roles
  • Credentials
    • Creating credentials
    • Working with credentials
    • Tips for applying credentials
    • Assigning credentials
    • Available Credentials
    • SNMPv1
    • SNMPv2
    • SNMPv3
    • Windows
    • ADO
    • Telnet
    • SSH
    • VMware
    • JMX
    • SMIS Credential
      • Installing the SMI-S Agent for use with WhatsUp Gold
      • Monitoring Dell Compellent Storage Environments
      • Monitoring Dell EMC Storage Environments
    • AWS
      • Creating AWS Access Keys
    • Azure
      • Create an Application Access Key with the Azure Management Portal
      • Azure Tenant Credential Fields
    • Meraki Cloud
      • Generating a Meraki API Key
    • REST API
      • Configuring a REST API credential for monitoring Flowmon appliances
      • Configuring a REST API credential for sending emails using OAuth2.0 authentication
    • Redfish
  • Maps
    • Discovered Network
    • My Network
    • Icons and annotations
    • Map filtering
    • Device information cards
    • Addressing Web Alarms
    • Creating links between devices
    • Customizing your map view
  • Devices
    • Device Status
    • Device Properties
    • Device Management Actions
    • Device Groups
      • Device Group Management Actions
      • Editing Device Group Properties
        • Dynamic Groups
          • Using the Dynamic Group Filter Editor
        • Layer 2 Dynamic Groups
  • Monitors
    • Monitors Library
      • Importing Trap Definitions
    • Monitor Types
    • Assigning Monitors
    • Critical Active Monitors
    • Active Monitors
      • Active Script (Active)
      • APC UPS (Active)
      • BGP Peer Status
      • Cloud Resource Monitor
      • DNS
      • Email
      • Exchange 2003
      • Exchange
      • Fan
      • File Content
      • File Properties
      • Folder
      • FTP
      • HTTP Content
      • JMX (Active)
      • Meraki Device Status Active Monitor
      • Network Statistics
      • Ping
      • Ping Interarrival Jitter
      • Power Supply
      • PowerShell
      • Printer
      • Process
      • REST API (Active)
      • Service
      • SMI-S
      • SNMP Extended
      • SNMP (Active)
      • SNMP Table Monitor (template)
      • SQL Query (Active)
        • Choose Credential
      • SQL Server
      • SSH (Active)
      • SSL Certificate
      • Storage Controller Health monitor
      • Storage File System
      • Storage Disk Drives
      • Storage LUN
      • Storage Pool
      • TCPIP
        • Script Syntax
      • Telnet
      • Temperature
      • VoIP
      • WAP Radio
      • WMI Formatted
      • WMI
        • Advanced WMI Monitor Properties
        • Configuring the firewall to allow WMI traffic
    • Passive Monitors
      • Syslog
      • Windows Event Log (monitor)
        • WinEvent Conditions
      • SNMP Trap
    • Performance Monitors
      • Active Script (Performance)
        • Using Reference Variables with Script Monitors
        • Add New Reference Variable
        • Using the context object with Performance Monitors
      • APC UPS (Performance)
      • AWS CloudWatch (Performance)
        • How to monitor billing and usage using the AWS Cloudwatch Performance Monitor
      • Azure Cloud (Performance)
      • Azure Cloud (Billing Usage)
      • CPU Utilization (Performance)
      • PowerShell Scripting
      • Disk Utilization (Performance)
      • Printer Ink/Toner Performance Monitor
      • Hyper-V Virtual Machine Disk Activity
      • JMX (Performance)
      • Interface Utilization (monitor)
      • Memory Utilization (Performance)
      • Ping Latency and Availability
      • REST API (Performance)
      • SNMP (Performance)
      • SQL Query (Performance)
      • SSH (Performance)
      • VMware Datastore IOPS
      • Windows Performance Counter
      • Configuring WMI Formatted Counter monitors
      • WMI Performance Monitor
      • Hyper-V Event Log Monitor
      • Hyper-V Host Virtual Machines Monitor
    • Changing performance monitor properties in bulk
    • Rules Expression Editor
    • Advanced settings: performance monitor collection
    • Configure Memory Threshold
    • Configure Disk Performance threshold
    • Adding Custom Thresholds
    • Ping Advanced Settings
    • Active Monitor Advanced Properties
    • Advanced Settings
  • Dashboards
    • Dashboard Creation
    • Custom Dashboards
    • Dashboards
      • Home Dashboard
      • Overview
      • Device Status
      • Alert Center
        • Alert Center Item Details
      • User Permissions Dashboard
      • WhatsUp Gold Live Activity
    • Performance
      • TOP 10
      • CPU Utilization
      • Disk Utilization
      • Memory Utilization
      • Custom Performance Monitor
    • Network
      • Interface Utilization (report)
      • Ping Availability (Packet Loss)
      • Ping Response Time
      • Interface Errors
      • Interface Discards
      • Interface Traffic
    • Device
      • Active Monitor Availability
      • Active Monitor Outages
      • Alert Center Items
      • Credentials
      • Devices in Maintenance
      • Device Health
      • Device Uptime
      • Device Utilization Summary report
      • Down Active Monitors
      • Down Interfaces
      • Monitors Applied
      • Quarterly Availability Summary
      • State Change Acknowledgment Report
      • State Change Timeline
      • Device State Summary
      • Web Alarms
    • Alerts and Actions
      • Actions Applied
      • Action Policies Applied
      • Alert Center
      • Alert Center Items
      • Alert Center Log View
    • Inventory
      • Asset Inventory
      • Asset Details Report
      • Refresh Summary Report
      • Installed Software
      • Address Summary Report
      • IP/MAC Addresses Report
      • Device Connectivity
      • Switch Port Utilization
      • VLAN View
      • Subnet View
      • Computer Systems
      • BIOS
      • Software Updates
      • Windows Services
    • Logs
    • Tools
    • Application Monitoring
      • Application Monitoring
    • Configuration Management
      • Configuration Archives
    • Log Management
      • Log Management Dashboard
      • Log Viewer (Full Page Report)
      • Log Management Server Status
    • Network Traffic Analysis
      • Traffic Analysis Dashboard
        • NTA Home Dashboard
        • NTA Senders and Receivers
        • NTA Troubleshooting
        • Time Window Control
        • Choose Source
      • Traffic Overview
    • Virtual Monitoring
      • Virtual Monitoring
    • Wireless
      • Wireless Monitoring
      • Rogues Dashboard
    • NTA+
      • Network Operations Dashboard
      • NTA+ Events
    • Critical Activity
    • Storage Monitoring
    • Unclassified Traffic
  • NOC Viewer
    • About the NOC Viewer
    • Navigating the NOC Viewer Interface
    • Working with slide decks
    • Working with individual slides
  • Actions and Alerts
    • Creating Actions and Action Policies
      • Built-in Action Types
        • Active Script Action
        • Beeper Action
          • Setting Modem Connection Preferences
        • Configuration Management Action
        • Create ServiceNow Incident
        • Email Action
        • Log to Text File Action
        • OpsGenie Alert Management Action
        • Pager Action
        • Post To IFTTT Action
        • Post To MS Teams Action
        • Post To Slack Action
        • PowerShell Script Action
        • Program Action
        • SMS Action
        • SMS Direct action
        • SNMP Set Action
        • SSH Action
        • Service Restart Action
        • Sound Action
        • Syslog action
        • Text to Speech Action
        • VMware Action
        • Web Alarm Action
        • Windows Event Log Action
        • Select Action and State
        • Select a State Change
      • Guidelines for Creating Action Policies
      • Percent Variables
      • Recurring Action Library
        • Adding and editing a Recurring Action
  • Alert Center Libraries
    • About Alert Center
    • Working with Notifications, Notification Policies, and Thresholds
      • Alert Center Notifications
      • Notification Policies
      • Thresholds
        • Log Management Filter Frequency Threshold
          • Configuring a Log Management Filter Frequency Threshold
        • CPU Threshold
          • Configuring a CPU Utilization Threshold
        • Custom Threshold
          • Configuring a Custom Performance Monitor Threshold
        • Disk Utilization Threshold
          • Configuring a Disk Utilization Threshold
        • Interface Threshold
          • Configuring an Interface Utilization Threshold
        • Interface Errors and Discard Threshold
          • Configuring Interface Errors and Discards Threshold
        • Memory Threshold
          • Configuring a Memory Utilization Threshold
        • Ping Availability Threshold
          • Configuring a Ping Availability Threshold
        • Ping Response Time Threshold
          • Configuring a Ping Response Time Threshold
        • SNMP Trap Threshold
          • Configuring an SNMP Trap Threshold
        • Windows Event Log Threshold
          • Configuring a Windows Event Log Threshold
        • Syslog Threshold
          • Configuring a Syslog Threshold
        • Hyper-V Event Threshold
          • WUG19.2-THRESHOLD-EDIT-CONFIG-HYPER_V
        • VMware Threshold
          • Configuring a VMWare Threshold
        • Blackout Summary Threshold
          • Configuring a Blackout Summary Threshold
        • Failover Threshold
          • Configuring a Failover Threshold
        • WhatsUpHealth Threshold
          • Configuring a WhatsUp Health Threshold
        • Conversation Partners Threshold
          • Configuring a Conversation Partners Threshold
        • Network Traffic Analyzer Custom Threshold
          • Configuring a Network Traffic Analyzer Custom Threshold
        • Failed Connections
          • Configuring a Failed Connections Threshold
        • Interface Traffic Threshold
          • Configuring an Interface Traffic Threshold
        • Top Sender/Receiver
          • Configuring a Top Sender/Receiver Threshold
          • Threshold Hosts
        • Suspicious Connections Threshold
          • Configuring Suspicious Connections Threshold
        • Access Point Memory Threshold
          • Configuring a Wireless Memory Utilization threshold
        • Access Point CPU Threshold
          • Configuring a Wireless CPU Utilization threshold
        • Banned Client MAC Threshold
          • Configuring a Wireless Banned Client MAC Address threshold
        • Device Over Subscription Threshold
          • Configuring a Wireless Access Point Over Subscription Threshold
        • Excessive Rogue Threshold
          • Using Alert Center Notification Policy options
          • Configuring a Wireless Excessive Rogues threshold
        • Rogue Access Point MAC Address Threshold
          • Configuring a Wireless Rogue Access Point MAC Address Threshold
        • Rogue Hidden SSID Threshold
          • Configuring a Wireless Rogue Hidden SSID Threshold
          • Threshold Devices
        • Rogue Specific SSID Threshold
          • Configuring a Wireless Rogue Specific SSID Threshold
        • Rogue Unknown SSID Threshold
          • Configuring a Wireless Rogue Unknown SSID Threshold
        • Wireless Access Point RSSI Threshold
          • Configuring a Wireless Access Point RSSI Threshold
        • Wireless Clients Bandwidth Threshold
          • Configuring a Wireless Client Bandwidth Threshold
      • Notification Blackout Policies
        • Blackout Policies
          • Add/Edit Blackout Policy
          • Example: On Call Rotation
      • Alert Center Percent Variables
  • Reports
    • Reporting Performance, Inventory, and Uptime
    • Reporting Quick Start
    • Application Monitoring
      • Application Event Log
      • Application State Summary
      • Running Action Policy Report
      • Instance Summary
      • Hourly Availability Over Time
    • Custom Content
      • Custom Links
    • Devices
      • Active Monitor Availability
      • Attributes
      • Current Device States
      • Dependencies
      • Device Active Monitor States
      • Device Custom Links
      • Group Status
      • Device Information and Status
      • Device SNMP Details
      • Devices in Maintenance
      • Enabled Active Monitors
      • Interface Details
      • WhatsUp Gold Live Activity
      • Map View
      • Monitors Applied
      • Notes
      • Performance Monitor Summary
      • Device State Summary
      • SNMP Details
      • Active Monitor Outages
      • Alert Center Items
      • Device Uptime
      • Device Health
      • Start vs. Run
    • Log Management
      • Log Activity
      • Log Management Server Status
      • Log Source Statistics
      • Top 10 Devices with Critical Windows Security Events
      • Top 10 Devices with Critical Windows Application Events
      • Top 10 Devices with Critical Windows System Events
      • Top 10 Devices with Critical Syslog Issues
    • Network Traffic
      • Working with NTA reports using the world map
      • Receivers
        • Top Receivers
        • Top Receiver ASN
        • Top Receiver Cities
        • Top Receiver Domains
        • Top Receiver Groups
        • Top Receiver TLDs
        • Top Receivers with the Most Conversation Partners
        • Top Receivers with the Most Failed Connections
        • Top Receiver Countries
      • Senders
        • Top Senders
        • Top Sender ASN
        • Top Sender Cities
        • Top Sender Domains
        • Top Sender Groups
        • Top Sender TLDs
        • Top Senders with the Most Conversation Partners
        • Top Senders with the Most Failed Connections
        • Top Sender Countries
      • Top Cities
      • WUG19.2-Top Conversations Between Cities
      • Interface Usage
      • NBAR Applications - Flow Details
      • NBAR Applications - Interface Totals
      • Types of Services
      • Suspicious Connections Report
      • Packet Size Distribution
      • Top Ports
      • Top Protocols
      • Top Applications
      • Top Conversations
      • Top Endpoint Groups
      • Top Endpoints
      • ICMP Types
      • Top Interfaces by Traffic
      • Top Interfaces by Utilization
      • Top Sources with Interfaces
      • Traffic Totals
      • Unclassified Traffic
      • Class-Based QoS Usage
    • Performance
      • CPU Utilization
      • Custom Performance Monitor
      • Device Utilization Summary report
      • Disk Free Space
      • Disk Utilization
      • Interface Discards
      • Interface Errors
      • Interface Traffic
      • Interface Utilization (report)
      • Memory Utilization
      • Ping Availability (Packet Loss)
      • Ping Packet Loss
      • Ping Response Time
    • System Info
      • Inventory
        • Virtual
          • Host List
          • Virtual Server
          • Virtual Host Attributes
          • Virtual Machine Attributes
        • Asset Inventory
        • Installed Software
        • Device Connectivity
        • Switch Port Utilization
        • VLAN View
        • Subnet View
        • Computer Systems
        • BIOS
        • Software Updates
        • Windows Services
        • Warranty Information
        • Element Count
        • Total Actions Applied by Type
        • Active Monitors by Type
        • Devices by Type
        • Devices with a Specific Attribute
        • Total Devices by Role
        • Passive Monitors by Type
        • Total Performance Monitors by Type
      • NTA
        • Archive Database Size
      • Database Size
      • Database Table Usage
      • Poller Health
      • Network Coverage
      • Device Role Composition
    • Troubleshooting
      • Specific Device
        • State Change Timeline
        • Down Active Monitors
        • Down Interfaces
        • Interface Discards
        • Availability Summary
        • Interface Errors
        • Interface Errors and Discards
        • Action Activity Log
        • Tail of Passive Monitor Error Log
        • Tail of SNMP Trap Log
        • Tail of Syslog
        • Tail of Windows Event Log
        • Web Alarms
      • Actions Fired
      • Completely Down Devices
      • Device Group Mini Status
      • State Change Timeline - Device
      • Down Active Monitors
      • Devices with Down Critical Monitors
      • Down Interfaces
      • Summary Counts
      • State Change Acknowledgment Report
      • Action Activity Log
      • Tail of Passive Monitor Error Log
      • Tail of SNMP Trap Log
      • Tail of State Change Log
      • Tail of Syslog
      • Tail of Windows Event Log
      • Unacknowledged Devices
      • Down Active Monitors
    • Virtual Reporting
      • Virtual Machines CPU Utilization
      • Virtual Machines Disk Activity
      • Virtual Machines Interface Utilization
      • Virtual Machines Memory Utilization
      • VMware Virtual Machines Datastore IOPS
      • VMware Device Datastore IOPS
    • Wireless Reporting
      • Aironet Current Active Clients
      • Aironet Current Details
      • Aironet Current Errors
      • Aironet Current Syslog Messages
      • Wireless Bandwidth Utilization
      • Bandwidth Summary
      • Wireless CPU Utilization
      • Client Count
      • Wireless
      • Wireless Memory Utilization
      • RSSI
      • Rogue Count
      • Signal to Noise Ratio
      • Wireless System Summary
      • Wireless Clients
      • Wireless Clients: Specific Client
        • Wireless Session Details
        • Client Bandwidth
        • Client Associations
        • Wireless Client Session Details
        • Wireless Client Signal Quality
        • Wireless Client Bandwidth (Specific Client)
      • Free Form Text/HTML
    • Alerts
      • Device Thresholds
      • Threshold Summary
      • Alert Center Items
      • Alert Center Item History
    • Remote System Info
      • Remote Group List
      • Remote Site Overview
      • Remote Sites Licensing Usage
      • Remote Site List
      • Remote Sites Status
      • Remote Sites Error Log
    • Viewing Performance Real Time
      • RealTime Performance Monitor Report
  • Logs
    • About Logs
    • Logging Quick Start
    • Survey of Frequently Used Logs
    • Consolidated Logs
    • Action Log
    • Activity Log
    • Alert Center Log View
    • Blackout Summary Log
    • Scan History
    • General Error Log
    • Hyper-V Event Log
    • Logger Health Messages
    • Passive Monitor Error Log
    • Performance Monitor Error Log
    • Policy Audit
    • Recurring Action Log
    • Scheduled Report Log
    • SNMP Trap Log
    • Syslog
    • VMware Event Log
    • Web User Activity Log
    • Windows Event Log
    • Network Traffic Analyzer Logs
      • NTA Log
      • Unclassified Traffic
    • Applications State Change Log
    • APM-Resolved Items Log
  • Log Management
    • About Log Management
    • Configure a Log Source
    • Log Management Settings
    • Creating filters
    • Configuring a Log Management Filter Frequency Threshold
    • Log Management Dashboard
    • Log Viewer (Full Page Report)
    • About Log Management data archiving
    • Using the Archived Logs interface
  • WhatsUp Gold Agents
    • WhatsUp Gold Agent Overview
    • Important Considerations and Planning for WhatsUp Gold Agent Deployment and Usage
      • About Using Agents with the Log Management Database
    • Configuring WhatsUp Gold Agent General Settings
      • About the Certificate Common Name
    • Deploying a WhatsUp Gold Agent to a log data source
  • Wireless
    • Monitoring Wireless
    • Mapping Wireless
    • Wireless Settings
    • Global Wireless Settings
    • Wireless Client Groups
    • Wireless Excluded Rogues
  • Virtual
    • Monitoring Virtual
    • Mapping Virtual
    • Virtual Settings
  • Applications
    • Monitoring Applications
    • Application Monitoring Terminology
    • Application Profile Library
    • Preparing to Monitor Applications
    • Discovering Applications
    • Mapping Applications
    • Working with Application Profiles
    • Working with Monitored Applications
    • Components, Critical Component Groups, and Discrete Applications
      • Cloud Monitoring for Azure
      • Cloud Monitoring for AWS
      • CPU Utilization
      • Database Query
      • Disk Utilization
      • File Content
      • HTTP Content Check
      • Interface Statistics
      • JMX Performance Check
      • Memory Utilization
      • Network Port Check
      • Process Check
      • REST API Active (Application)
      • REST API Performance (Application)
      • Scripting (PowerShell)
      • Service Check
      • SNMP
      • SSH
      • WMI
      • Windows Performance Counter
    • About Critical Component Groups
    • About Action Policies, Actions, and Blackout Policies and WhatsUp Gold Application Monitoring
    • Application Monitoring Actions
    • Application Monitoring Blackout Policies
    • Application Monitoring Action Policies
    • Configuring an Application Monitoring Action Policy
    • Application Attributes
    • Application Monitoring Settings
  • Storage and Cloud
    • Discovering and Monitoring Cloud-Managed Devices
  • Network Traffic Analysis
    • Start Analyzing Your Network!
    • Before You Begin
      • Check for Active Sources
      • What is Flow Data?
    • NTA Features and Advantages
    • Choosing NTA Sources
      • SNMP Timeout and Retry
      • Credentials Used for Network Traffic Analyzer
    • Configuring and Enabling Collection on Sources
      • Enable and View Flow Collection Status
        • NTA Sources Library
        • View, Edit, Delete, and Enable Flow Sources
          • Edit Flow Source Properties
          • Edit Interface Properties
        • Add NBAR Source
        • Get SNMP Traffic Totals
        • Scope User Access to NTA Traffic Data
        • NTA Data Quick Access
      • Configure Flow Export on Source Devices
        • Configure Flow Export
        • Configure sFlow Export on HP Devices
        • Configuring Flexible NetFlow on a Cisco Device
        • Configuring NetFlow for Meraki
        • Configuring NetFlow for Aruba
    • Creating Aggregate Sources
    • Aggregating Sources
    • Grouping Traffic
    • Classifying Traffic by Port Number (NTA Applications)
    • Adding Custom Labels for Type of Service (ToS) IDs
    • Reduce and Analyze Traffic with Advanced Filtering
    • Network Traffic Analysis Settings
    • IP Reputation Library
    • Listener Port, Collection, and Retention Settings
  • Configuration Management
    • Configuration Management
      • Configuration Management System Overview
      • Using Task Scripts
        • Using the Task Script Library
        • Creating and Editing a Task Script
        • Configuring Custom Task Scripts
        • Importing and Exporting Task Scripts
        • Debugging Task Scripts
        • Run Now
      • Using Tasks
        • Task Library
        • Configuring Password Tasks
        • Configuring Schedulable Tasks
        • Assigning a Task to a Device
        • Running a Task Immediately
      • Using Device Properties
        • Viewing Configuration Management Tasks in Device Properties
        • Associating Tasks with Devices
        • Viewing Archived Configuration Files
        • Comparing Archived Configuration Files
        • Modifying Archived Configuration Files
        • Importing Archived Configuration Files
        • Exporting Archived Configuration Files
        • Removing Tasks from Devices
        • Restoring Archived Configurations
        • Deleting Archived Configuration Files
      • Using Policies
        • Configuration Management Policy Library
        • Configuring a Configuration Management policy
        • Auditing a policy
        • Viewing Archive Policy Audit Results
      • Using Templates
        • Capture and Add Templates
        • Generating and Applying Templates
        • Importing and Exporting Templates
        • Using the Template Library
      • Leveraging and Customizing System Scripts
        • System Script Library
        • Configuring System Scripts
        • Importing and Exporting System Scripts
      • Managing CLI and Remote Shell Settings
        • CLI Settings Library
        • CLI Settings Profile
        • Configuring CLI settings
        • Importing and exporting CLI settings
        • Remote Client Settings
      • Archive Search
        • Understanding Configuration Archives
        • Performing an Archive Search
        • Applying Regular Expressions
          • Pattern Range (IP Address)
          • Pattern Exclusion
      • Using the Configuration Management VLAN Manager
        • Configuring VLAN trunks
        • Writing Custom VLAN Scripts
      • Setting Log Expiration
    • Configuration Management Settings
      • Configuring File Transfer Settings
  • Tools
    • Using Tools in WhatsUp Gold
    • Connecting directly to a monitored device through the WhatsUp Gold interface
  • Settings
    • WhatsUp Gold Settings
    • Using the Top Menu Navigation Admin Features
    • System Services
    • System Settings
      • About the Auto-Login feature
      • About WMI Authentication Protocol
    • Scheduling Activities
    • Accessing WhatsUp Gold Libraries
    • Customizing web alarm behavior
    • Applying System Tasks
      • Using WhatsUp Gold System Tasks
      • Changing Log Persistence Settings
  • MIBs
    • Manage SNMP MIBs
    • View MIB Definitions
    • Import MIB Definitions
    • Handling MIB Syntax or Dependency Errors
  • Users and User Groups
    • Administering Users and User Groups
      • Device Group Access Rights
    • Managing User Accounts and User Groups
      • Setting Active Directory/LDAP credentials
      • Setting Cisco ACS credentials
      • Configuring External Authentication using OpenID Connect
    • Adding New User and User Rights
    • Password Expiration and Retry Policies
  • Admin Console
    • Using the WhatsUp Gold Console Application
    • Using Device Types
    • About Device Properties - General
    • About Device Properties - Menus
    • Adding/Editing a Menu Item
    • Operating WhatsUp Gold in FIPS 140-2 Mode
    • Using WhatsUp Gold Database Utilities
    • Importing Trap Definitions
    • Monitoring VoIP IP SLA
  • Scalability Pollers
    • Poller Configuration
    • Using Scalability Pollers with WhatsUp Gold
    • Installing the Scalability Poller Application on a Remote Machine
    • Configuring Scalability Pollers in WhatsUp Gold
    • Using Scalability Pollers with Failover and Distributed
  • Extending WhatsUp Gold with scripting
    • Context Object and Percent Variable Quick Reference
    • Scripting Active Monitors
      • Using the context object with active monitors
      • Example active script active monitors
    • Scripting Performance Monitors
      • Using the context object with Performance Monitors
      • Example active script performance monitors
    • Scripting Actions
      • Using the context object with actions
      • Example active script actions
    • Scripting PowerShell Actions
      • Using the context object with PowerShell actions
      • Example PowerShell actions
    • Scripting PowerShell Active Monitors
      • Using the context object with PowerShell active monitors
      • Example PowerShell active monitors
    • Using the SNMP API
      • CoreAsp.SnmpRqst
      • CoreAsp.ComResult
      • CoreAsp.ComSnmpResponse
      • Example scripts using the SNMP API
      • Troubleshooting the SNMP API
  • Failover
    • About WhatsUp Gold Failover Edition
    • Configuring Failover Options
    • About the WhatsUp Gold Failover Console
  • Distributed
    • About WhatsUp Gold Distributed Edition
    • Configuring WhatsUp Gold Distributed Edition
  • Copyright notice
Table of Contents

Network Traffic Analysis Settings

Save PDF
Save selected topicSave selected topic and subtopicsSave all topics
Share
Share to emailCopy topic URL
Print
  • Last Updated: December 11, 2024
  • 1 minute read
    • WhatsUp Gold
    • Version 2024

Access database and application settings specific to Network Traffic Analysis by selecting either of the following from the SETTINGS menu:

  • SETTINGS > Network Traffic Analysis > NTA Settings. For flow listener port, collection interval, and retention settings.
Note: For details that show how to use WhatsUp Gold Network Traffic Analysis and leverage its capabilities, see Traffic Analysis.
TitleResults for “How to create a CRG?”Also Available inAlert