![]() ![]() However, when capturing with a packet analyzer in promiscuous mode on a port on a network switch, not all of the traffic traveling through the switch will necessarily be sent to the port on which the capture is being done. So capturing in promiscuous mode will not necessarily be sufficient to see all traffic on the network. ![]() Port mirroring or various network taps extend capture to any point on net. ![]() Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog.The most powerful display filters in the industry.Can browse the captured network data via a GUI, or via the TTY-mode TShark utility.Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others Deep inspection of hundreds of protocols, with more being added all the time.Simple passive taps are extremely resistant to malware tampering. Microsoft Network Monitor, Network General Sniffer, Sniffer Pro, and NetXray. Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others Also Network Instruments Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |