

Network Watcher’s packet capture feature allows you to capture the data necessary to perform network forensics and better understand your network traffic. Visit to learn more about all CapAnalysis' capabilities. For example, you can choose to filter the data by protocol to gain specific insights on that subset of traffic. You can select highlighted countries/regions to view additional flow statistics such as the proportion of data sent and received from IPs in that country/region.ĬapAnalysis provides a set of filters for quick analysis of specific packets. This pane provides you with a map view of your network traffic, with colors scaling to the volume of traffic from each country/region. This pane allows you to view network traffic statistics – bytes sent and received from source and destination IPs, flows for each of the source and destination IPs, protocol used for various flows, and the duration of flows. This pane allows you to quickly see the distribution of network traffic over the various protocols and geographies. This table gives you the list of flows in the packet data, the time stamp associated with the flows and the various protocols associated with the flow, as well as source and destination IP. A few of these features are shown in the following list: With these visual summaries, you can understand your network traffic trends and quickly spot any unusual activity. The resulting URL will look something like the following URL: Analyzing packet capturesĬapAnalysis offers various options to visualize your packet capture, each providing analysis from a different perspective. You can then append the SAS token to the packet capture storage blob URL. To do this, navigate to Shared access signature from the storage account, designate the allowed permissions, and press the Generate SAS button to create a token. When providing a link to CapAnalysis, make sure to append a SAS token to the storage blob URL. You can directly upload a packet capture taken by network watcher using the “Import from URL” tab and providing a link to the storage blob where the packet capture is stored. A packet capture can be stored in a storage blob to be accessed by CapAnalysis.

You can refer to the instructions at Manage packet captures with Network Watcher to start a packet capture session. Network Watcher allows you to capture packets to track traffic in and out of a virtual machine. Once the rule has been successfully added, you should be able to access CapAnalysis from Use Azure Network Watcher to start a packet capture session For more about creating rules in Network Security Groups, refer to Create rules in an existing NSG. In order access CapAnalysis remotely, you need to open port 9877 on your VM by adding a new inbound security rule.
Packet capture tool install#
To install CapAnalysis on a virtual machine, you can refer to the official instructions here. CapAnalysis can then ingest the packet capture directly from the storage blob and visualize its contents. With Network Watcher, you can obtain a packet capture of your network environment and directly store it on your storage account. You have a simple web application deployed on a VM in Azure want to use open-source tools to visualize its network traffic to quickly identify flow patterns and any possible anomalies.
Packet capture tool how to#
This article, provides a walk through of how to visualize and gain insights from packet captures using CapAnalysis with Network Watcher. Visualizations also provide a means of sharing such insights in an easily consumable manner.Īzure’s Network Watcher provides you the ability to capture data by allowing you to perform packet captures on your network. Visualizing packet capture data is a valuable way to quickly derive insights on patterns and anomalies within your network.

One such tool is CapAnalysis, an open-source packet capture visualization tool. There are many opens source tools you can use to analyze packet captures to gain insights about your network. Packet captures contain network data that allow you to perform network forensics and deep packet inspection.
