If you look under the endpoints in question, you can see what protocols they're using. If you can navigate to the layer-3 interface (vlan, etc) the end-users in question are using, you can see what the most used protocols are.
↧
If you look under the endpoints in question, you can see what protocols they're using. If you can navigate to the layer-3 interface (vlan, etc) the end-users in question are using, you can see what the most used protocols are.