October 31, 2019

Empower your analysis teams with capture profile management!

Empower your analysis teams with capture profile management!

CloudShark capture profiles are one of the most powerful ways to tailor your analysis view, significantly decreasing the time it takes to solve problems. Your column choices, decode rules, and decryption settings all apply towards making your job easier. In CloudShark 3.7, the new profile manager not only lets you fine-tune your own work, but revolutionizes how your team works with captures - building a curated base of expert profiles that evolves over time and helping all of your analysts and engineers.


Join Tom for a special webinar highlighting profile management in CloudShark.

October 29, 2019

Monitoring Encrypted Traffic to Ensure Efficiency and Availability - Webinar

To attend - Click here to register!

Your speaker - Erik Hjelmstad

In order to ensure networks are efficient, we need to monitor all traffic flowing through the wire. There are many tools to help, but they all rely on being able to read and decode network traffic. When the network traffic is encrypted, these tools provide limited value.

 

Monitoring Encrypted Traffic to Ensure Efficiency and Availability - Webinar

With the nGenius Decryption Appliance (nDA), you get full visibility into all of the traffic across your network, and the ability to send that traffic to just the tools that need to see it.


In the Webcast, you will learn about:

October 25, 2019

Network Visibility Basics Video!

 Join this NDP-TV podcast to learn what a visibility architecture and packet broker are and how they can help you optimize network data capture and analysis.

Free - Network Visibility Basics Video!

Summary:

Network visibility is an often overlooked but critically important activity for IT.

Visibility is what enables you to quickly isolate security threats and resolve performance issues; ultimately ensuring the best possible end-user experience.

A proper visibility architecture addresses the strategic end-to-end monitoring goals of the network, whether they are physical, virtual, out-of-band, or inline security visibility.

Join this podcast to learn what a visibility architecture and packet broker are and how they can help you optimize network data capture and analysis.

Here is the online video



Key Points:

  • A Visibility Architecture is an end-to-end infrastructure which enables physical and virtual network, application, and security visibility

  • The basis of a visibility architecture starts with creating a plan. Instead of just adding components as you need them at sporadic intervals (i.e. crisis points), step back and take a larger view of where you are and what you want to achieve.

  • A visibility architecture typically yields immediate benefits such as the following: eliminating blind spots, reducing costs while maximizing ROI, and simplifying data control

There are four keys areas of a visibility architecture:

  1. Proper access to the data you need using taps, virtual taps, and bypass switches

  2. Filtering capability to maximize the flow of relevant information to your monitoring tools. NPBs are enable: data aggregation, filtering, deduplication, and load balancing of Layer 2 through 4 (of the OSI model) packet data.

  3. Application intelligence functionality allows additional filtering and analysis at the application layer, i.e. Layer 7 of the OSI stack. These capabilities give you quick access to information about your network and help to maximize the efficiency of your tools.

  4. The final layer is made up of your security and monitoring tools. These devices are typically special purpose tools (e.g. IPS, firewall, sniffer, APM, etc.) that are designed to analyze specific data. The output from these tools is typically used by network engineers to make their decisions

Follow-up Information:

  • Download the whitepaper Best Practices for Network Monitoring from the Resources page on www.ixiacom.com

  • Download the ebook the ABCs of Network Visibility from the Resources page on www.ixiacom.com

  • Download the ebook the ABCs of Network Visibility – Vol. 2 from the Resources page on www.ixiacom.com

  • Download the ebook The Definitive Guide to Visibility Use Cases from the Resources page on www.ixiacom.com

  • Download the whitepaper on deduplication best practices from the Resources page on www.ixiacom.com

Visit Out-of-Band Visibility solutions page at https://www.ixiacom.com/solutions/out-band-monitoring or contact Ixia for a demonstration of well it works and how easy it is to use.

Free - Network Visibility Basics Video!

Author - Keith Bromley - is a senior product management and marketing professional at Ixia, a Keysight business, with over 25 years of high tech software and hardware experience. In his role, he is responsible for thought leadership, product management and marketing activities for network monitoring, network security, VoIP and unified communications (UC) for enterprise and carrier solutions. Keith is a E.E. and a dedicated technologist. Keith has many articles on www.NetworkDataPedia.com

October 15, 2019

Best If Used By 12-25-1995 (by Paul W. Smith)

 

Network Visibility Basics Video!

When you consider the dreadful truth about food poisoning, you would expect a government-mandate for labeling the stuff we eat. There isn’t one. The FDA does require that baby formula have a “Use by…” date, but once you’re off the bottle, you’re on your own.

The lack of a legal requirement hasn’t kept food manufacturers from dating their products, but the systems they use, and the motives behind them, have only created confusion. If I purchase a can of tuna the day before the “Sell By” date, is it safe to eat for another day, or another month? “Best If Used By” feels like a suggestion related to quality, while “Use By” sounds like an imperative with dire and yet ambiguous consequences. Some of us fear health dangers lurk if we don’t adhere strictly to these dates. Others suspect that dates are a ploy by manufacturers to get us to feed their bottom line instead of ourselves. The FDA has only one thing to say about this – “use common sense” – which unfortunately isn’t all that common.

There is more to food than just avoiding sickness and everyone benefits when food items are consumed at their peak of flavor and nutrition. Retailers will customarily discard products by whatever date is on them, effectively putting the burden on the consumer. Those of us who throw things out once they pass that printed date might feel smugly safe from sickness, but how do you know the yogurt that doesn’t “expire” until next week didn’t sit on a loading dock at 110 deg for 5 hours before arriving at your local market?

October 14, 2019

The power of the command line - Using Microsoft netsh


The power of the command line - Using Microsoft’s netsh

Note: I just tested, and this still works in windows 11 

I always encourage technical staff to get comfortable at the command line. This is for a lot of reasons: 

  • More efficient than a gui  
  • Learn about the device operation  
  • Many times you can get information not available in the gui  
  • A lot faster when working remotely over slow links  
  • You can script common tasks 

A great example is when teaching Wireshark, I spend time on tshark/dumpcap at the command line.

In this article I will spend some time on Microsoft’s netsh that I use regularly to modify my IPv4 settings. The reason is quite simple, if I have to make the same change multiple times, it is far more efficient to do it at the command line or in a batch file rather than navigate through 4 or 5 menus/screens.


Referencing the examples provided in the video, you can easily create a batch file that will accept input instead of statically assigning values. Here is a summary of the commands in the video:
Display usage options and syntax netsh /? List of adapters netsh interface ipv4 show interfaces netsh interface ipv4 show config netsh interface ipv4 show address Show IPV4 global info netsh interface ipv4 show global To disable my Ethernet adapter labeled Killer netsh int set int name=“Killer" admin=disabled To enable my Ethernet adapter labeled Killer netsh int set int name=“Killer" admin=enabled Display TCP or UDP connections netsh interface ipv4 show tcpconnections netsh interface ipv4 show udpconnections Set a static IP Address (10.44.10.22), Subnet Mask (255.255.255.0) and Gateway (10.44.10.1) on a specific interface (Killer) permanently (persistent) Use “” around your interface name if it has spaces in it. netsh interface ipv4 set address name=Killer static 10.44.10.22 255.255.255.0 10.44.10.1 store=persistent Set DNS Servers without a DNS check, the set dnsservers command supports only one server as argument netsh interface ipv4 set dnsservers name=Killer source=static “8.8.8.8" primary Set your adapter IPV4 and DSN back to DHCP netsh interface ipv4 set address name=Killer source=dhcp netsh interface ipv4 set dnsservers name=Killer source=dhcp Enjoy



The integration of artificial intelligence (AI) into the operational frameworks of cybercriminals has accelerated at an unprecedented rate, creating a more dangerous and accessible threat landscape.

Artificial Intelligence Transforms Cybercrime


Popular post in the past 30 days