Analyzing 4G LTE traffic............................................................................................................................................................................. 42
Chapter 8: Forensic Analysis........................................................................................................................................ 44
Importing Snort rules..................................................................................................................................................................................44
Analyzing packets using Snort rules..................................................................................................................................................... 45
Creating a Forensic Settings profile...................................................................................................................................................... 45
Chapter 9: Microbursts..................................................................................................................................................52
Searching for microbursts...............................................................................................................................................................................52
Using the Detail Chart only...................................................................................................................................................................... 54
Detailed Chart tab........................................................................................................................................................................................ 57
GigaStor Outline............................................................................................................................................................................................57
Capture Graph tab....................................................................................................................................................................................... 57
Statistics Lists tab......................................................................................................................................................................................... 58
Using Observer in financial firms................................................................................................................................................................. 59
Analyzing FIX transactions........................................................................................................................................................................60
Configuring a FIX profile............................................................................................................................................................................61
How a probe uses RAM....................................................................................................................................................................................67
How packet capture affects RAM........................................................................................................................................................... 72
How to allocate the reserved RAM..............................................................................................................................................................73
Chapter 14: Gen2 Capture Card................................................................................................................................... 76
Gen2 capture card..............................................................................................................................................................................................76
| iii