Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I have installed wireshark which has replaced ethereal and have been sniffing packets on a client network to study his network traffic. My question is: When reading the output of session of wireshark how would
I determine traffic that is supposed to be there and what is not. I have noticed a lot of ARPing from several client machines on this clients network and he has also stated that his network performance has dropped a lot. I guess what I want to say is how would I fine tune his network using wireshark. Is there some trick or guidelines that I should follow?
A simple check for problems is to capture all traffic during a problem for a few minutes, then select menu Analyze->Expert Info. If you don't see a significant source of errors, then take a look at Statistics->Endpoints to see which addresses are generating the most traffic. You can then perform further analysis on that traffic.
Do you know if wireshark has a module that will display certificates that are being exchanged during an authentication like RADIUS on a wireless connection using PEAP?
I pointed you to an online resource, with an image that shows how wireshark decodes a PEAP exchange with a certificate. Isn't that what you asked about?
I find myself placing my own foot in my mouth a lot. Sorry, I thought that it was only a sale pitch but I see there are 6 chapters as a reference. thanks
From the readings from your reference it only shows me what is the content of the certificate but what I am interested in is the actual name of the certificates that are being exchanged(eap keys)like *.pem,*.der and etc... I am trying to figure out a EAP-PEAP issue. thanks
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.