|
This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than port numbers . Also includes step-by-step instructions for checking for Gnutella, Morpheus, and iMesh traffic regardless of the port the users/servers are using! This book includes step-by-step instructions for importing sample filters into EtherPeek and Sniffer. About the Author Laura Chappell, Sr. Protocol Analyst, is a highly-energetic speaker and author who has trained thousands of LAN/WAN administrators, engineers, technicians and developers. She admittedly ‘lives, eats and breathes’ packets and packet-level communications. She analyzes and documents network performance by providing onsite and offsite network analysis, troubleshooting and optimization services. Her international client base ranges from governments to health care to financial/banking institutions. Ms. Chappell is the author of “Introduction to Network Analysis,” “Advanced Network Analysis,” “TCP/IP Analysis and Troubleshooting” (podbooks.com), “Novell’s Guide to LAN/WAN Analysis: IPX/SPX,” “Novell’s Guide to Internet Access Solutions,” and “Novell’s Guide to Multiprotocol Internetworking” (Novell Press/IDG Books/Sybex Books). Ms. Chappell has also edited three Cisco Press titles, “Introduction to Cisco Router Configuration,” “Advanced Cisco Router Configuration,” and “Cisco Internetwork Troubleshooting” (Cisco Press/Macmillan Technical Publishing). |