Wireshark helps with your network device configurations
The Technology Firm
When using protocol analyzers analysts may run into a challenge trying to translate recommendations with other departments.
One example would be when you have a new application that doesn’t work because your current Router or Firewall configurations are preventing proper communication.
Another example is when you spot abnormal or suspicious traffic and want to block it.
With either scenario, the analyst that captured the packets has to explain or translate to the Router or Firewall technical what the change involves with possible packet captures.
The possible issue that arises is the simple fact that different technicians from various disciplines, might not easily understand or be on the same page.
This is where a little known Wireshark feature comes in. When analyzing packets in Wireshark, go to the Tools menu and select Firewall ACL Rules option and you will see various configuration syntaxes for different firewall router products such as Cisco IOS, Linux Netfilter (iptables) and Windows Firewall (via netsh). These rules are based on MAC addresses, IPv4 addresses, TCP and UDP ports, and IPv4+port.
.. read the rest of the article at network computing.. ... https://www.youtube.com/watch?v=2Fnvt7nV-wY
5391525 Bytes