
Protocols such as Internet Security Association and Key Management Protocol (ISAKMP), Encapsulating Security Payload (ESP) and Authentication Header (AH) are used to protect the data. Internet Protocol Security (IPsec) is a set of protocols that enable us to authenticate and encrypt traffic between two parties.

For example, we type into our address bar and the webpage simply appears. You must also consider additional protocols your application depends on for proper operation.įor example, Domain Name System (DNS) is one of those name resolution protocols we all take for granted. This includes more than the usual ones like IPv4, IPv6, TCP, TCP, and HTTP. I’ve been using and training network analysts how to use Wireshark for more than 10 years, and enjoy sharing tips and tricks to make your life easier.Īs a protocol analyst, you should be aware of the protocols your applications use. When you get to the task of digging into packets to determine why something is slow, learning how to use a network analysis tool effectively is critical.
