How to Set Up the Network Monitoring Environment

This task describes how to prepare your environment for network monitoring.

  1. Prerequisites

    To enable network monitoring, you must install the LoadRunner agent on the source machine. You do not have to install the LoadRunner agent on the destination machine.

    To run the Network monitor, you must have administrator privileges on the Windows source machine (unless you are using the ICMP protocol).

  2. Configure the Linux source machine - optional

    You can run the Network monitor on Linux source machines, using UDP or ICMP. Before running the Network monitor from a Linux source machine, configure the source machine. For task details, see How to Configure the Linux Source Machine for Network Monitoring.

  3. Configure the firewall between the source and destination machines - Optional

    If you are monitoring a network in which there are firewalls between the source and the destination machines, you must configure the firewalls to allow the network data packets to reach their destinations.

    • If you are using the TCP protocol, the firewall that protects the destination machine should not block outgoing ICMP_TIMEEXCEEDED packets (packets that are sent outside the firewall from the machine). In addition, the firewall protecting the source machine should allow ICMP_TIMEEXCEEDED packets to enter, as well as TCP packets to exit.

    • If you are using the ICMP protocol, the destination machine's firewall should not block incoming ICMP_ECHO_REQUEST packets, or outgoing ICMP_ECHO_REPLY and ICMP_ECHO_TIMEEXCEEDED packets. In addition, the firewall protecting the source machine should allow ICMP_ECHO_REPLY and ICMP_ECHO_TIMEEXCEEDED packets to enter, and ICMP_ECHO_REQUEST packets to exit.

    • If you are using the UDP protocol, ensure that the UDP protocol can access the destination machine from the source machine. The destination machine's firewall should not block outgoing ICMP_DEST_UNREACHABLE and ICMP_ECHO_TIMEEXCEEDED packets. In addition, the firewall protecting the source machine should allow ICMP_DEST_UNREACHABLE and ICMP_ECHO_TIMEEXCEEDED packets to enter.

    • Note: To run the Network Delay monitor when there are firewalls between the Controller and the source machine, you must configure the LoadRunner agent, MI Listener, and Network Delay monitor for monitoring over a firewall.

  4. Specify the network monitor paths

    In the Controller Run tab graph tree view, select the Network Delay Time graph and drag it into the right pane. Right-click the graph and select Add Measurements. Define the paths using the following three dialog boxes:

    1. Add source and destinations machines. For details, see the Network Delay Time Dialog Box.

    2. Define the network monitor path. For details, see the Adding Destination Machines for Network Delay Monitoring Dialog Box.

    3. Configure the monitor settings for the defined path. For details, see the Network Monitor Settings for Defined Path Dialog Box.

Back to top