Example 3
Scenario:
Monitor and count the IP traffic from a
specific computer (e.g., 192.168.1.2) and from a specific application
(e.g., Microsoft Internet Explorer) to any web-server. Let's assume that this browser
generates HTTP requests only to standard TCP port 80 and to secure TCP port 443.
Solution:
Let us create one filter. This filter is intended only for monitoring outbound and
inbound HTTP traffic (standard and secure) simultaneously from the specific computer 192.168.1.2 to any host.
Filter No. 1.
Name: HTTP/HTTPS traffic from my computer to any host.
Rules of the filter: | |||||||
N | Mirrored flag |
Protocol type |
Source address |
Source port |
Destination address |
Destination port |
|
1 | Yes | TCP | 192.168.1.2 | Any | Any IP address | 80 | |
2 | Yes | TCP | 192.168.1.2 | Any | Any IP address | 443 |
The outbound HTTP traffic (standard and secure) corresponds to the sent bytes counter and the inbound HTTP traffic (standard and secure) corresponds to the received bytes counter.