Wednesday, March 4, 2020
Tuesday, February 18, 2020
Wireshark Interfaces and File List Tip
Networkdatapedia.com has been asking for material that focus on knowing your network and/or knowing your tools.
Sounds pretty simple but trust me this is anything but simple or obvious. When you use the same tool and it becomes your ‘favorite’ or ‘go to tool’ you might be resistant to trying new tools.
Great example is back in the early 90’s when I was using Network General Sniffer products. I was getting very comfortable with it and was actually solving issues with no training. Through the years I heard of Lanalyzer, Capsa, Cinco, NetXRAY, Observer, Microsoft Network monitor, Protocol Inspector and of course Ethereal (aka Wireshark) as well as ton, I’ve probably forgotten.
I remember showing my Sniffer sales person Microsoft Network Analyzer and Ethereal explaining some if the features I liked. His response is “don’t waste your time on that free stuff”, followed up with “how good can it possibly be when its free”.
I soon figured out that every tool has its pluses and minuses and figuring out what works best for you is the toughest part. When you find that tool that you always reach for first, you need to take the time to learn all the nuances and what features new versions may bring – or break ;)
In this video I spend a few minutes showing you how to clear your ‘most recently used file list’ and how to hide network interfaces you won’t be using. Its important to note that hiding the interfaces does not delete, disable or affect them directly.
For example, if you hide your WiFi adapter in Wireshark, you can still use it to surf, ping, etc.. it will just be hidden from the available adapter list in Wireshark.
Enjoy.
Monday, February 10, 2020
Determining ARP Refresh Rate With Wireshark
There have been more than a few times where I had to illustrate that ARP was an issue.
When a suspected ARP issue, or you just need to understand how often a device ARP’s, or you need a good challenge when using your favorite packet analyzer, this is a great exercise.
There are 2 basic goals to this video:
Always learn how to configure your tools for the task at hand. In this specific example I turn off my colors, disable my bytes view and configure my time format.
Protocol analysis is largely an exercise in pattern recognition, using the correct display and filters allow you to see that pattern. Even if you are just learning, this is a great way to figure things out.
In this specific example, I was chatting with someone about ARP timeouts and mentioned that I only had up to Windows XP figured out and documented, then he asked “what about windows 8 and 10?” to which I responded, “I’ll show you how to do it so you can figure it out yourself.
Now you can figure out the ARP behavior of any device regardless if it’s a computer, appliance IOT device, etc..
In this video, I measure how often my windows 8 laptop refreshed its ARP cache while pinging my default gateway. Funny thing, as soon as we figure it out – which took about 5 minutes because we had to wait for the packets and ARP refresh, he asked “Is it different when you use TCP?”. I laughed and said “well you know how to do it, figure it out”
Tony Fortunato
Sr Network Performance Specialist
The Technology Firm
https://www.thetechfirm.com
Getting things to work better - bit by bit-
Tuesday, February 4, 2020
DNS Client Issues
In this video I wanted to show you an issue that I encounter quite often. DNS is one of those protocols we all take for granted and most people believe that if its working, you can’t do much to tune it.
There are many things you can do to improve DNS performance. One of the more common techniques is to configure a device as a local DNS server, cache or relay for those scenarios where you might have slow internet connections.
I want to focus on the client configuration. I’ve seen DNS server entries (manual or DHCP assigned) that are problematic. For example, DNS servers that no longer exist, typos, slow DNS servers or DNS servers that are located on slow links or paths.In this case I highlighted what your packet trace will look like when you attempt to use a device as a DNS server that is not a DNS server. I also explain why the ICMP packets are important in this process.
Big take away is to review your DNS or any name server configurations every so often to ensure there isn’t any issues.
.
Popular post
-
I just wanted to take a few minutes to share the results of some of the "Capture Limit" testing I have been doing in my lab. These...
-
From Betty's Linkedin post I've updated my profiles! I've now got over 300 hashtag # Wireshark display filters to share. I had...
-
Everyone loves a reference sheet and this one is very helpful since GREP is so under utilized Found this on www.sysxplore.com my favori...