Capsa How-tos
How to Locate the Source of Packet Loss With Network Analyzer
Packet loss is usually difficult to troubleshoot, because there are many possible causes for that. It always takes a long time to troubleshoot such issues. Colasoft Capsa network analyzer can help IT team find the source of packet loss by packet analysis and comparison[...]
How to Decrypt HTTPS Packets
Capsa is able to decrypt HTTPS packets. As everything in the HTTPS message is encrypted, including the headers, and the request/response load, the analyzer can only know that a connection is taking place between the two parties and their domain names and IP addresses[...]
Conversation Filter
It is really necessary to focus on conversations from one certain field. Colasoft Capsa provides Conversation Filter to help you to do so. Conversation Filter allows users to filter conversations according to the Address and Port, Location, Conversation Protocol, Conversation Packets, Conversation Content, and Conversation Options[...]
Document Your Network - Capsa Log View & Output
As a networking manager, it is very important to document network log. By analyzing http log files, you will be able to see if your website blocking strategy is successfully set up; if there are any strange IPs in your network system. Colasoft Capsa enables you to do so with Log View and Log Output features.[...]
How to Analyze Network Traffic Based on Local Processes
By analyzing http log files, you will be able to see if your website blocking strategy is successfully set up or if there are any strange IPs in your network system. Colasoft Capsa enables you to do so with Log View and Log Output features[...]
Improve Network Analysis Efficiency with Conversation Colorization Feature
Troubleshooting network problems can be a very difficult and challenging task. Capsa introduces a feature that allows us to highlight-colorize relevant IP conversations in the network based on their MAC address, IP Addresses, TCP or UDP conversations[...]
How to Detect Arp Attacks & Arp Flooding
ARP attacks and ARP flooding are common problems small and large networks are faced with. ARP attacks target specific hosts by using their MAC address and responding on their behalf, while at the same time flooding the network with ARP requests. ARP attacks are frequently used for 'Man-in-the-middle' attacks, causing serious security threats, loss of confidential information and should be therefore quickly identified and mitigated.
[...]
How to Detect Routing Loops and Physical Loops
When working with medium to large scale networks, IT departments are often faced dealing with network loops and broadcast storms that are caused by user error, faulty network devices or incorrect configuration of network equipment. Network loops and broadcast storms are capable of causing major network disruptions and therefore must be dealt with very quickly[...]
Migrating Capsa Configuration Files
Capsa Professional and Capsa Enterprise packet capture application provides the ability feature to backup configurations, including analysis profile settings and network profile settings.
[...]
How to Capture Wireless Network Traffic
As an innovative and high quality network analysis solution, Capsa network analyzer is not only designed to monitor and analyze wired network traffic, but also for wireless LAN traffic, including 802.11 a/b/g/n networks.
[...]
How to Monitor Network Packet Loss
When data is transmitting over computer network, one or more packets may fail to reach their destinations, and this is packet loss.
[...]
Task Scheduler: Auto-Run Packet Capture
Task scheduler provides the ability to run packet capture and analysis at pre-defined time automatically, which can be scheduled to run one time, daily or weekly
[...]
Powerful TCP Flow Analysis
TCP packets reveal useful information to help us troubleshoot slow network, especially for the cases like slow website response, slow CRM transactions and slow downloading or uploading, etc [...]
How to Monitor Network Traffic
As a network analyzer (aka. packet sniffer & protocol analyzer), Capsa make it easy for us to monitor and analyze network traffic in its intuitive and information-rich tab views. With Capsa's network traffic monitor feature, we can quickly identify network [...]
Troubleshoot ARP Attacks with Colasoft Capsa
ARP, because of its simpleness, fastness, and effectiveness, is becoming increasingly popular among internet raggers, thus causing severe influence to the internet environment. With Colasoft Capsa, we can quickly and accurately locate ARP source [...]
How to Analyze Network Utilization Rate
Network utilization rate is the ratio of current network traffic to the maximum traffic that the port can handle. It indicates the bandwidth use in the network. High network utilization rate indicates the network is busy whereas low utilization rate indicates the network is idle [...]
24x7 Network Monitoring
As a delicate work, network analysis always requires us to view the original packets and analyze them. However, not all the network failures can be found in a very short period. Sometimes network analysis requires long time monitoring and must be based on the baseline of normal network [...]
Powerful Protocol Analyzer
By analyzing network protocol distribution and learning what protocols are being used in the network, we can quickly find out what host is doing what activity [...]
Find Reasons for Slow Network
Slow network is a common phenomenon. For the diversity of the reasons causing slow network, to troubleshoot slow network is one of the most common and troublesome work in daily network management [...]
Analyze Broadcast Traffic with Colasoft Capsa
In Ethernet, all communications are based on broadcast. Excessive broadcast traffic may lead to network performance depreciation, or even cause network failures such as slow network and intermittence [...]
Diagnose Network by TTL Value
TTL tells the router whether the packet should be dropped because it stays in the network for too long. TTL is initially designed to define a time scope beyond which the packet will be dropped. As TTL value will be deducted by at least 1 by the router when the packet passes through, TTL often indicates the number of the routers which the packet passed through before it was dropped [...]
Detect Backdoor with Colasoft Capsa
A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected, the backdoor may take the form of an installed program, or could be a modification to an existing program or hardware device. It hides in the computer, scans existing loopholes, opens corresponding ports, as well as modifies system registration files [...]
How to Detect Email Worm with Colasoft Packet Sniffer
In networking, an email worm is a computer worm which can copy itself to the shared folder in system. And it will keep sending infected emails to stochastic email addresses. In this way, it spreads fast via SMTP mail servers.
What Is the Harm of Email Worm
An email worm can send lots [...]
How to Detect the Network Malfunction Via the End-point View
There are two tabs concerning endpoint statistics in Capsa: the Physical Endpoint tab and the IP Endpoint tab. Users can detect the IP/MAC endpoint in the largest traffic in a short time by the endpoint analytics. And also, The system supply clear statistics of traffic ranking (Top 5 IP endpoint under HTTP protocol)[...]
How to Track BitTorrent User in Network with Colasoft Packet Sniffer
BitTorrent Consumes Big Bandwidth
Based on the working principle of BitTorrent protocol, if somebody is downloading big files with BitTorrent software, it will be a disaster for other users who need bandwidth for business operations as the user will consume large amount of bandwidth, thus causing long time network slowness, intermittence, even disconnections; because meantime the [...]
Email Monitor & Auto-saving Email Content
Some people may doubt if it is legal to monitor email of employees with an email monitor software (aka. email spy or email checker), but this is not the topic of this article. We are going to discuss how we can monitor email with some technical methods, especially how we can monitor email with this [...]
How to Monitor Internet Traffic with Colasoft Packet Sniffer
Internet traffic is the flow of data around the Internet. It includes web traffic, which is the amount of that data that is related to the World Wide Web, along with the traffic from other major uses of the Internet, such as electronic mail and peer-to-peer networks.
In case we want to monitor internet traffic generated [...]
How to Monitor http Traffic with Packet Sniffer
Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. Its use for retrieving inter-linked resources led to the establishment of the World Wide Web.
In order to monitor http traffic, we will need a packet sniffer (or a protocol analyzer) software. Here is a detail process how we can monitor http [...]
How to Improve Network Protocols Learning and Teaching
In computing, a protocol is a set of rules which is used by computers to communicate with each other across a network. A protocol is a convention or standard that controls or enables the connection, communication, and data transfer between computing endpoints. In its simplest form, a protocol can be defined as the rules governing the syntax, semantics, and synchronization of communication. Protocols may be implemented by hardware, software [...]
Detecting Trojan and Worm with Capsa Network Analyzer
Trojan and Worms are two major threats to network security. Do you know what exact is a Trojan horse? In Wikipedia, Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, it is possible for a hacker to access it remotely and perform various operations[...]