22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

638 Lotus Security Handbook<br />

Figure A-3 The same GET as seen in the main screen of a protocol analyzer<br />

(CommView)<br />

Figure A-3 shows the main screen of the CommView protocol analyzer. Typically,<br />

you have a series of packets captured, and for the highlighted line, the<br />

hexadecimal ascii dump of the packet. Depending on the protocol analyzer used,<br />

you can also get a more structured analysis of the actual traffic, interpreted at<br />

different layers (Ethernet, IP, TCP, HTTP, and so forth). The right-hand panel of<br />

Figure A-3 shows such a structured analysis.<br />

However, this is still not as user friendly as the typical Lotus administrator<br />

reading this book may expect. In order to provide a more humane and practical<br />

interface, some protocol analyzers offer the option to “reconstruct” the series of<br />

packets, including the one currently highlighted. Figure A-4 shows such a<br />

reconstruction.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!