Protocol Analysis, Data Recorder, CALEA, Lawful Intercept, Application Performance, User Experience, Industrial Ethernet, Data Loss Prevention, Deep Packet Inspection, NetFlow, SOX, HIPAA and PCI Compliance, Switching and Routing, Forensics, VoIP, IPTV ... etc.
Live Event Time: Wednesday, October 29. 2014 - 9:30 AM PST
In keeping with the holiday spirit, this week we have invited Brad Reinboldt to present the top ten scary nightmares for network professionals.
10) CEO says my email went down over the weekend.
9) Any product with the word “virtualization” or “abstraction” in its description
8) Rogue users or an unsecured jump drive.
7) CIO wants to rollout new VoIP, video, or UC initiative
6) Anything to do with service orchestration or dynamic user “self-service” provisioning.
5) Unauthorized changes to the network infrastructure
4) Sunday evening (or off-hour) major network updates—the frantic “day-after back-track”.
3) Do-it-yourself cloud/application rollouts by non-IT groups.
2) New product rollout from Cisco or VMWare
1) Meet the server virtualization team.
In addition, if time permits, Brad would segway into a conversation regarding some of the real pressure points or trends network professionals are facing that we see on the street, or are brought to us to help solve.
Brad has worked in the computing, networking and storage sectors for more than 20 years in various development and technical management roles. He holds a Master’s degree in Electrical Engineering, as well as an MBA in management. In addition to being a Senior Product Marketing Manager, he also serves as an Adjunct Instructor at the University of St. Thomas School of Engineering.
Wireshark and GeoIP, now you’ll know where traffic is coming from.
How would you like to see where the traffic is coming from that is getting onto your network? How about what Autonomous System? Would you like to be able to filter on any of those fields? Wireshark lets you just that for both IPv4 and IPv6 addresses. All you have to do is download the databases from MaxMind and configure Wireshark to use them. Here are the steps:
First you’ll need to download the databases from http://dev.maxmind.com/geoip/legacy/geolite/. MaxMind distributes these for free and gets their information from ARIN. Be sure to download from the binary/gzip column, highlighted in red below. Wireshark cannot read csv files.
Live Event Time: Wednesday, October 22, 2014 - 9:30 AM PST
This week we shall interview +Tom Tosh of Chi-Metrix, who is a fellow network technologist and entrepreneur.
Tom founded Chi-Metrix in 2007 which was originally a consulting company (aka Triage Report). In 2009, Tom started to develop EZ-Trace which was a proprietary network analysis tool purpose designed for his clients. With Version 2.5 which has been installed in hundreds of endpoints in North America, Europe, Australia and Asia,
We would like to invite you to this special show where Tom will be announcing EZ-Trace to the World.
Prior to establishing Chi-Metrix, Tom was a Senior Network Performance Consultant for Network General, the company that produced the original Sniffer. In that position, Thomas traveled the globe to help clients isolate the causes of the most challenging performance issues.
Prior to joining Network General, Tom worked for Honeywell Corporation, where he would help in the design and implementation of business networks that could communicate with a plant’s traditional automation and process control networks. His clients included major oil, petro-chemical, pharmaceutical, and food and paper processing manufacturers.
Over the years, Tom has built a reputation for being an expert who specializes in using network analysis tools to baseline and troubleshoot networks prior to redesign, and conduct post-implementation network certification and health-checks.
Live Event Time: Wednesday, October 8th, 2014 - 9:30 AM PST
In this week's show, +Paul Offord will run through a case study regarding mobile banking that shows how a basic understanding of the HTTPS protocol was key in determining the cause of a performance problem affecting iOS 8 iPhones.
Author Profile: Paul is the co-founder and CTO of Advance7 and has had a 36-year career in the IT industry that includes roles in hardware engineering, software engineering and network management. Prior to founding Advance7, he worked for IBM, National Semiconductor and Hitachi Data Systems.
Paul and the problem analysts at Advance7 help IT support teams in many business sectors to troubleshoot difficult performance and stability problems. Paul played a key role in the development of the RPR problem diagnosis method and is currently leading a project to explore new ways to help IT support people learn troubleshooting skills.
Some say that metadata is data that describes other data. It summarizes basic information about data like the name of a file or a website address. It is the footprint that's left behind by users on a network after they connect to servers or services.
Using metadata analysis bridges the gap between conventional tools and raw packet analysis. Traditional tools which use SNMP or flow data as a source typically lack detail when you need it to troubleshoot a problem or address a security problem. Raw packet analysis will have an incredible level of detail but you need lots of storage and most people only use it after an event has occurred.
As an example I captured around 20 seconds of packets going to and from my laptop using Wireshark. The result was a 12.7MB file which is a treasure trove of data if you know what you are looking for.
See below for some of the metadata that was contained within it. Some of it was sensitive so I blacked it out, MAC addresses which are unique to my network. From the metadata I can see IP addresses, MAC addresses, file names, browser types, website addresses and protocol types.