TamoSoft: Network Analysis Tools & Security Software
Contents

Promiscuous Monitoring in Ethernet and Wi-Fi Networks

 
Best Practices


While all of the network layouts described above can be used for network monitoring, not all of them are equally good in terms of network performance and security. We recommend considering the following when selecting your network layout:

·Use a dedicated computer for monitoring. Monitoring a busy network is a CPU-intensive task that should not be performed on a computer running other CPU-intensive processes, especially on an application server, such as Web or FTP server. Doing so may seriously degrade server performance. Use a computer with a fast CPU and at least 512 Megabytes of RAM.  
·Use managed switches rather than hubs whenever possible. Switches provide better performance and replicate packets to a single port only, thus diminishing risks of promiscuous mode monitoring from unauthorized workstations.