Author name: Andrew Walding

My short bio can be viewed here: https://www.evernote.com/l/AKglxPOzlV9E7LHKvPsGzgs-SY3McII8E24

Perhaps a top 15 Wireshark Capture Filter List

Check out these great references as well:   Our custom profiles repository for Wireshark  Our Udemy course on Wireshark   Our Udemy course on Wireless Packet capture     Perhaps…. Of course you can edit these with appropriate addresses and numbers. The ones used are just examples.  Unlike Wireshark’s Display Filter syntax, Capture filters use Berkley Packet […]

Perhaps a top 15 Wireshark Capture Filter List Read More »

arearange1

What is the ‘area range’ command in OSPF?

Check out these additional Routing Resources: Our IP Routing course at Udemy Our Custom Profiles for Wireshark Classes at the Online School This is commonly asked question from our routing courses and routing discussions in other courses.  Let’s explain this command in this article. To start, you have to know that OSPF supports different areas. 

What is the ‘area range’ command in OSPF? Read More »

networkcmd1

What is the “network” Command in OSPF and BGP?

Check out these additional Routing Resources: Our IP Routing course at Udemy Our Custom Profiles for Wireshark Classes at the Online School In a recent course on IPv6, one of my students asked what the “network” command did as we were beginning to study the routing commands used in Cisco IOS when configuring OSPF. In

What is the “network” Command in OSPF and BGP? Read More »

Deleting Remembered Wi-Fi Networks in Windows, MAC OSx, and Linux (Debian)

If you attend our WLAN Operations course, one of the things we discuss is Active Scanning.  Your system uses your saved Wi-Fi networks to actively scan for those networks (probing).  There are potential security risks in this, especially with free networks.  Most students conclude they should not remember networks in this way.  The burning question

Deleting Remembered Wi-Fi Networks in Windows, MAC OSx, and Linux (Debian) Read More »

Screen Shot 2017 11 14 at 5.22.06 PM

Complaint: Why Don’t You Allow Employees to use Wireshark?

Check out these great references as well:   Our custom profiles repository for Wireshark  Our Udemy course on Wireshark   Our Udemy course on Wireless Packet capture     Let me begin with a little background.  At CellStream, and the Online School of Network Sciences, we have taught hundreds of Wireshark classes for general networking, voice networking,

Complaint: Why Don’t You Allow Employees to use Wireshark? Read More »

Real-life Wireless Wireshark Troubleshooting Example

Sometimes troubleshooting in Wireshark is easy-ish, you find a misbehaving protocol behavior or pattern or even a bad packet, sometimes it is tricky and takes a while to find something, and sometimes it is as clear as mud.  Check out these great references as well:   Our custom profiles repository for Wireshark  Our Udemy course on

Real-life Wireless Wireshark Troubleshooting Example Read More »

If I want to get into Networking, what should I learn?

I was recently asked the question “If I want to get into Networking, what should I learn?” A great question because Telecommunications or Data Networking is really not a degree program at most universities, at least not at the undergraduate level.  There are some masters programs, but they are few and far between.  In fact,

If I want to get into Networking, what should I learn? Read More »

Screen Shot 2017 07 15 at 10.35.58 AM

Leveraging SSL and TLS Decryption in Wireshark

Check out these great references as well:  Our custom profiles repository for Wireshark  Our Udemy course on Wireshark   Our Udemy course on Wireless Packet capture I am often asked how SSL and TLS can be decrypted in Wireshark captures.  I have written a separate article on HTTS Decryption in Wireshark here.  NOTE: Wireshark no longer

Leveraging SSL and TLS Decryption in Wireshark Read More »

TLS Decryption in Wireshark Using Key Log Files in Windows, MAC, and Linux

Hi everyone!  Being able to decrypt the encrypted contents of packet captures is very important if you want to troubleshoot anything above Layer 4.  This is even more important today as the network is evolving to QUIC where everything is encrypted. Check out these great references as well:  Our custom profiles repository for Wireshark  Our

TLS Decryption in Wireshark Using Key Log Files in Windows, MAC, and Linux Read More »

Contact Us Here


Please verify.
Validation complete :)
Validation failed :(
 
Your contact request has been received. We usually respond within an hour, but please be patient. We will get back to you very soon.
Scroll to Top