Making packet capture analysis accessible
Yes, sometimes I still look at these packets longingly, like an old friend.

Making packet capture analysis accessible

In network troubleshooting, testing, and cybersecurity, understanding packet captures (pcaps) is both an art and a science - a skill that is as critical as it is rare. Having honed my pcap skills at the UNH InterOperability Lab and later at QA Cafe , I've come to appreciate the complexity of packet analysis and its indispensable value in diagnosing and resolving network issues. Packet captures contain the raw truth of what is happening within a network. Learning to navigate this complex data was like learning a new language - daunting at first but immensely rewarding.

In my latest Epik Mellon podcast with Tim Winters , we discussed what we learned while doing customer discovery for Packet Viewer. One of the biggest takeaways was that while many of our customers wished they could get away from packet captures, they all agreed that they couldn’t - and that they’d always be necessary.

Consequently, the number of professionals trained to interpret them is surprisingly small. The learning curve is steep, and traditionally, tools like Wireshark have been the gatekeepers of this arcane knowledge. While Wireshark is an incredibly powerful tool, its complexity can be a barrier for those new to network analysis. The challenge, then, is to make pcap analysis more accessible to a broader audience without sacrificing the depth of information they offer.

PCAP analysis is an esoteric skillset for a critically important resource

Why will packet captures always be necessary? Like Betty DuBois often says: "The Packets Never Lie." They are the most granular method of understanding network events. In a world where networks are increasingly complex and security threats more sophisticated, the ability to delve into the minutiae of network traffic is indispensable. Whether it's pinpointing the source of a network slowdown or confirming a suspected data breach, pcaps offer the definitive evidence that network professionals need to ensure reliability and security.

However, if the skill set remains niche, how do we bridge the gap? The answer lies in developing better tools that simplify the complexity of pcap analysis while providing the depth of data necessary for advanced troubleshooting. This is where innovations like Packet Viewer come into play. Integrating pcap analysis seamlessly into cloud-managed networks and cybersecurity platforms, Packet Viewer represents a step forward in making this vital technology accessible to more users.

We can do this by making pcaps accessible

Packet Viewer is designed with both the seasoned analyst and the newbie in mind, adding to the "single pane of glass" experience that solution vendors seek without intimidating users but actually empowering them. Users can engage with the tool within their existing work environments, making the learning process more intuitive. By embedding deep packet analysis capabilities directly into user-friendly applications, we not only expand the pool of professionals capable of conducting sophisticated network diagnostics but also enhance the overall security posture of organizations.

As networks grow in complexity and the stakes of network management continue to rise, the need for comprehensive packet capture analysis becomes more acute. Tools like Packet Viewer are crucial in democratizing access to this essential skill, ensuring that more professionals are equipped to safeguard and optimize the modern network infrastructure. I am convinced that the future of network troubleshooting lies in making powerful tools accessible without diluting the profound insights they provide.

Amanda Griffin

VP, Sales (POLQA, AQuA, ViSQOL, PVQA, QualTest, call quality analysis and monitoring)

5 个月

Do you provide voice quality metrics within PCAP analysis? Do you provide voice quality for actual payload and reasons for voice quality degradation, e.g. noise, echo, audio gaps?

Andreas Diedrich

CEO @ Interview NS | Leading Network Performance Management Solutions

7 个月

Hi Jason ... may I introduce you to sharkmon ? wireshark display filters and analysis feature s- but for 1000ds of pcap fillers - aggregated in top down web based dashboards --https://youtu.be/52PDgfvivuY?si=ZDLhzyFTEyMX8R56 - you eve great to give to introduction -- to latest release

回复
James Swan

Senior Infrastructure Engineer and All-around IT Guru

10 个月

More and more I have found that everything needs to be encrypted which makes raw packet captures less useful. A better way to get the TLS keys in would open up that functionality again. I know there's a way... but it's cumbersome and makes debugging a PITA.

Todd Magers, CISSP, JNCIA

Solutions Architect - Network/Security Visibility Systems #Visibility #Observability #NetworkPerformance

10 个月

Great write up Jason!

Jenniffer Mackey

East Coast Sales Director at ZyXEL Communications Inc.

10 个月

Agreed Jason Walls. Making a tool that simplifies the packet trace analysis more accessible to everyone is beneficial. It means that not only can R&D read and provide the analysis but also perhaps a Tier 1 support agent, a Sales Engineer or a Product Manager. Reading a packet trace is difficult if one doesn't have basic TCP/IP knowledge... chances are they will not understand what they are looking at. We support CloudShark by QA Cafe and CD Router in our training and testing.

要查看或添加评论,请登录

Jason Walls的更多文章

社区洞察

其他会员也浏览了