SlideShare a Scribd company logo
1 of 10
Use of Common Analyzing and Positioning Tools Security Level 
1 Network Packet Catcher and Analyzer 
The UAP that functions as SoftACD communicates with the CTI/IVR 
through the TCP protocol. Because the UAP and the CTI/IVR are two 
different products, they might not agree with each other in respect of 
log and message tracing. Thus, to determine whether a problem 
occurs at the side of the UAP or the CTI/IVR, the correct method is to 
analyze the TCP network packets sent between the UAP and the 
CTI/IVR. 
Ethereal 0.10.12 is a complimentary network protocol analyzer 
program that supports UNIX and Windows. This program helps you to 
capture data from the network and analyze the data, and to analyze 
the data that is captured by a sniffer and saved in a hard disk. This 
program also helps you to view the captured data packets in an 
interactive manner and to query for the abstract and details about each 
packet. The Ethereal has diverse powerful features including support 
for almost all protocols, rich filter language, and ease to query for the 
data flow after TCP sessions are reconstructed. 
2014-12-11 HUAWEI Confidential Page 1, Total 10
Use of Common Analyzing and Positioning Tools Security Level 
1.1 Basic Use of the Tool 
1.1.1 Basic Use 
For the information about the basic use of the Ethereal, refer to 
《Ethereal操作指导书》(without English version) on the Support Web 
site. 
1.1.2 How to Realize Packet Capture Between the UAP 
and the CTI Through TCP Ports 
Networking 
The Ethereal is bound to a specific network interface card (NIC). After 
being installed in a PC, the Ethereal can capture only the packets that 
travel through the NIC. If the packets on the network do not travel 
through the NIC, the packets cannot be captured. Thus, configuring 
the network before packet capture becomes necessary to enable the 
target packets to travel through the NIC of the PC where the Ethereal 
is installed. 
Without the configuration of a LAN switch, packets cannot be captured 
through the LAN switch. The reason is that generally packets that 
travel through another port cannot be captured through a port of the 
LAN switch. 
If the LAN switch is adopted to capture packets, the port mirroring of 
the LAN switch must be configured. That is, the target ports must be 
mirrored to the access port for packet capture. In general, the following 
two target ports for packet capture should be traced between the UAP 
and the CTI: 
 Target port 1: It is the associated control service element (ACSE) 
port of the IFM board at the UAP side that expects data packets. 
You can run the LST CSTACFG command to query for the 
information about the port. 
 Target port 2: It is the ACSE port at the CTI/IVR side that expects 
data packets. You can run the LST CTIPORT command to query 
for the CTI link code, IP address, and information about the IP 
port. 
 Access port for packet capture: A PC connects to this port for 
capturing packets. 
An image of networking for packet capture between the UAP and the 
CTI is as follows: 
2014-12-11 HUAWEI Confidential Page 2, Total 10
Use of Common Analyzing and Positioning Tools Security Level 
Gigabit port I Gigabit port II 
Gigabit port I Gigabit port II 
Trunk: VLANA and VLANB connect to the same 
GE 
Target port for packet capture (Port: 1/2) 
Access port for packet capture(Port: 0/24) 
Configuring the LAN Switch 
Take Huawei Quidway 5624P as an example. The configuration of the 
LAN switch is described as follows: 
Configure the port mirroring to enable capturing of the packets that 
flow in and out of port 1/2 (Gb) at port 0/24 (100 Mb) in the data link 
layer. 
Port mirroring is configured as follows: 
< Quidway>sy //Access the system configuration mode. 
[Quidway] acl num 200 //Configure numbers 200-299 in the ACL table 
based on the LINK layer, numbers 0-99 based on the IP layer, and 
numbers 100-199 based on the TCP layer. 
[Quidway-acl-200] rule 1 permit ingress interface g1/2 //g1/2 is the 
target port number for packet capture. It is the rule for configuring 
the data that flows in to the port. 
[Quidway-acl-200] rule 2 permit ingress interface g1/2 //g1/2 is the 
target port number for packet capture. It is the rule for configuring 
the data that flows out of the port. 
[Quidway-acl-200]quit 
[Quidway]mirrored-to link-group 200 interface ethernet 0/24 
2014-12-11 HUAWEI Confidential Page 3, Total 10
Use of Common Analyzing and Positioning Tools Security Level 
//Configure the mirroring. e0/24 is the access port for packet 
capture. 
[Quidway]quit 
For details about the use of the LAN switch (Huawei Quidway 5624P), 
refer to the user documents (shipped with equipment) related to 
HUAWEI Quidway 5624P. 
Commands may vary with switches. For details, refer to the relevant 
operation manuals. 
Packet Capture 
For details, refer to the attachment. 
网络数据包捕获与 
分析. pdf Capture and Analysis of Network Data Packets 
2014-12-11 HUAWEI Confidential Page 4, Total 10
Use of Common Analyzing and Positioning Tools Security Level 
2 PRA Signaling Analysis 
The UAP that functions as an IP gateway communicates with other 
products through the PRA trunk. An analysis of PRA signaling is 
required to analyze the PRA signaling exchange of the UAP. 
2014-12-11 HUAWEI Confidential Page 5, Total 10
Use of Common Analyzing and Positioning Tools Security Level 
2.1.1 PRA Signaling Analysis 
For details about tracing, analyzing and troubleshooting the PRA 
signaling, refer to《PRA信令分析和常见问题处理》(without English 
version) on the Support Web site. 
2.1.2 PRA Signaling Analyzer 
When tracing PRA messages at the UAP, right-click the page for 
tracing PRA messages and select the Signaling Analysis option from 
the displayed menu to analyze the PRA signaling. 
For the PRA tracing messages provided by other sources, adopt PRA 
Signaling Analyzer V001 for analysis. For details, visit the Support Web 
site. 
2.1.3 Example of PRA Signaling Analysis 
Tracing PRA and SIP Messages 
Reserve four to eight PRA trunks in a voice gateway, and then trace 
the PRA and SIP messages. The SIP tracing number is 95569. 
 Analyze the PRA messages of which the values in the Connect 
column and the Alert column are NA. These calls generally fail 
soon. 
If the UAP receives a PRA disconnection message, you can infer 
that abnormal disconnection happens. 
2014-12-11 HUAWEI Confidential Page 6, Total 10
Use of Common Analyzing and Positioning Tools Security Level 
If the UAP sends a PRA disconnection message, you need to 
analyze the SIP message to check whether the disconnection 
message is sent from the NGN at the called side. Here, the 
disconnection is caused by unreachability. 
2014-12-11 HUAWEI Confidential Page 7, Total 10
Use of Common Analyzing and Positioning Tools Security Level 
 Analyze the messages of which the values in the Connect column 
are NA. These calls are generally unanswered, disconnected, or 
rejected after ringing. 
2014-12-11 HUAWEI Confidential Page 8, Total 10
Use of Common Analyzing and Positioning Tools Security Level 
2.2 SIP Signaling Analyzer 
None. 
2.3 ASN.1 Analyzer 
None. 
2.4 Character String Analyzer 
2.4.1 ASCII Code and Character String Converter 
The tool is used to view the ASCII codes in an announcement 
message that is delivered, convert the ASCII codes to character 
strings, and check whether the audio file exists on the file server. 
码流和字符串转换. 
r ar ASCII Code and Character String Converter 
2014-12-11 HUAWEI Confidential Page 9, Total 10
Use of Common Analyzing and Positioning Tools Security Level 
2.4.2 Machine Code and Chinese Character Converter 
Analyze the use of TTS variables for playing voices. This converter is 
used to convert the values of TTS variables (machine codes) to 
Chinese characters, and convert the machine codes to Chinese 
characters. 
内码转换. r ar 
Machine Code and Chinese Character Converter 
2014-12-11 HUAWEI Confidential Page 10, Total 10

More Related Content

What's hot

Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic AnalysisDavid Sweigert
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginEC-Council
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDaniel Vinyar
 
Ch 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architectureCh 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architectureYoram Orzach
 
Ccna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 AnswersCcna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 AnswersCCNA4Answers
 
IPV6 SIMPLE SECURITY CAPABILITIES
IPV6 SIMPLE SECURITY CAPABILITIESIPV6 SIMPLE SECURITY CAPABILITIES
IPV6 SIMPLE SECURITY CAPABILITIESOlle E Johansson
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5friv4schoolgames
 
NetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseNetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseCisco Canada
 
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco NetworksInfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco NetworksOmer Coskun
 
Chapter 6 firewall
Chapter 6 firewallChapter 6 firewall
Chapter 6 firewallnewbie2019
 

What's hot (20)

Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
BGPalerter: BGP prefix monitoring
BGPalerter: BGP prefix monitoringBGPalerter: BGP prefix monitoring
BGPalerter: BGP prefix monitoring
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
 
Well known protocols port numbers
Well known  protocols port numbersWell known  protocols port numbers
Well known protocols port numbers
 
MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12
 
Deep Packet Inspection technology evolution
Deep Packet Inspection technology evolutionDeep Packet Inspection technology evolution
Deep Packet Inspection technology evolution
 
UCL
UCLUCL
UCL
 
Ch 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architectureCh 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architecture
 
Ccna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 AnswersCcna 4 Final 2 Version 4.0 Answers
Ccna 4 Final 2 Version 4.0 Answers
 
IPV6 SIMPLE SECURITY CAPABILITIES
IPV6 SIMPLE SECURITY CAPABILITIESIPV6 SIMPLE SECURITY CAPABILITIES
IPV6 SIMPLE SECURITY CAPABILITIES
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
 
CCNP Security SIMOS 300-209=vpn 642-648
CCNP Security SIMOS 300-209=vpn 642-648CCNP Security SIMOS 300-209=vpn 642-648
CCNP Security SIMOS 300-209=vpn 642-648
 
Securityic2
Securityic2Securityic2
Securityic2
 
Understanding OpenFlow
Understanding OpenFlowUnderstanding OpenFlow
Understanding OpenFlow
 
NetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseNetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat Defense
 
Topic22
Topic22Topic22
Topic22
 
OpenFlow Overview
OpenFlow OverviewOpenFlow Overview
OpenFlow Overview
 
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco NetworksInfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
 
Chapter 6 firewall
Chapter 6 firewallChapter 6 firewall
Chapter 6 firewall
 

Viewers also liked

Sosiologi lingkungan (pertemuan i)
Sosiologi lingkungan (pertemuan i)Sosiologi lingkungan (pertemuan i)
Sosiologi lingkungan (pertemuan i)didi juliady dillim
 
Aqua Design Intl. Presentation
Aqua Design Intl. PresentationAqua Design Intl. Presentation
Aqua Design Intl. Presentationaqua_design_int
 
Wills, Trusts, and Powers of Attorney
Wills, Trusts, and Powers of AttorneyWills, Trusts, and Powers of Attorney
Wills, Trusts, and Powers of AttorneySheri Sudweeks
 
Aqua Design Partial Client List
Aqua Design Partial Client ListAqua Design Partial Client List
Aqua Design Partial Client Listaqua_design_int
 
2015 Estate and Incapacity Planning
2015 Estate and Incapacity Planning2015 Estate and Incapacity Planning
2015 Estate and Incapacity PlanningSheri Sudweeks
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

Viewers also liked (8)

Sosiologi lingkungan (pertemuan i)
Sosiologi lingkungan (pertemuan i)Sosiologi lingkungan (pertemuan i)
Sosiologi lingkungan (pertemuan i)
 
Kimia dasar
Kimia dasarKimia dasar
Kimia dasar
 
Aqua Design Intl. Presentation
Aqua Design Intl. PresentationAqua Design Intl. Presentation
Aqua Design Intl. Presentation
 
Wills, Trusts, and Powers of Attorney
Wills, Trusts, and Powers of AttorneyWills, Trusts, and Powers of Attorney
Wills, Trusts, and Powers of Attorney
 
Aqua Design Partial Client List
Aqua Design Partial Client ListAqua Design Partial Client List
Aqua Design Partial Client List
 
2015 Estate and Incapacity Planning
2015 Estate and Incapacity Planning2015 Estate and Incapacity Planning
2015 Estate and Incapacity Planning
 
Health Care Planning
Health Care PlanningHealth Care Planning
Health Care Planning
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar to Attachment 11 use of common analyzing and positioning tools

For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laShainaBoling829
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallThe Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallVishal Kumar
 
Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with WiresharkSiddharth Coontoor
 
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...AnilKumar109331
 
Thesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.pptThesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.pptKavitaChhajed
 
Thesis_presentation.ppt
Thesis_presentation.pptThesis_presentation.ppt
Thesis_presentation.pptMohdIshaq24
 
Thesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.pptThesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.pptAmanJohnTudu
 
Thesis_presentation.ppt
Thesis_presentation.pptThesis_presentation.ppt
Thesis_presentation.pptNishant Kumar
 
Experiment 7 traffic analysis
Experiment 7 traffic analysisExperiment 7 traffic analysis
Experiment 7 traffic analysisnikitaa25
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
iptable casestudy by sans.pdf
iptable casestudy by sans.pdfiptable casestudy by sans.pdf
iptable casestudy by sans.pdfAdmin621695
 
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARKANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARKIJNSA Journal
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding FirewallsLikan Patra
 
Sdn presentation
Sdn presentation Sdn presentation
Sdn presentation Frikha Nour
 

Similar to Attachment 11 use of common analyzing and positioning tools (20)

For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
 
PROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter ThomasPROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter Thomas
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallThe Complete Questionnaires About Firewall
The Complete Questionnaires About Firewall
 
Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with Wireshark
 
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
 
Thesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.pptThesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.ppt
 
Thesis_presentation.ppt
Thesis_presentation.pptThesis_presentation.ppt
Thesis_presentation.ppt
 
Thesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.pptThesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.ppt
 
Thesis_presentation.ppt
Thesis_presentation.pptThesis_presentation.ppt
Thesis_presentation.ppt
 
Experiment 7 traffic analysis
Experiment 7 traffic analysisExperiment 7 traffic analysis
Experiment 7 traffic analysis
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
iptable casestudy by sans.pdf
iptable casestudy by sans.pdfiptable casestudy by sans.pdf
iptable casestudy by sans.pdf
 
Firewall
FirewallFirewall
Firewall
 
100197
100197100197
100197
 
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARKANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
 
Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Sdn presentation
Sdn presentation Sdn presentation
Sdn presentation
 
VPN
VPNVPN
VPN
 
Vp ns
Vp nsVp ns
Vp ns
 
V P N
V P NV P N
V P N
 

More from Christian Silva Espinoza

More from Christian Silva Espinoza (11)

Attachment 3 measures for managing and applying for licenses
Attachment 3 measures for managing and applying for licensesAttachment 3 measures for managing and applying for licenses
Attachment 3 measures for managing and applying for licenses
 
06 mgw data configuration issue1.10
06 mgw data configuration issue1.1006 mgw data configuration issue1.10
06 mgw data configuration issue1.10
 
05 uap terminal system issue1.10
05 uap terminal system issue1.1005 uap terminal system issue1.10
05 uap terminal system issue1.10
 
04 hardware system of uap mgc issue1.10
04 hardware system of uap mgc issue1.1004 hardware system of uap mgc issue1.10
04 hardware system of uap mgc issue1.10
 
03 hardware system of uap mgw issue1.10
03 hardware system of uap mgw issue1.1003 hardware system of uap mgw issue1.10
03 hardware system of uap mgw issue1.10
 
02 uap fundamental issue1.10
02 uap fundamental issue1.1002 uap fundamental issue1.10
02 uap fundamental issue1.10
 
01 introduction to ipcc system issue1.0
01 introduction to ipcc system issue1.001 introduction to ipcc system issue1.0
01 introduction to ipcc system issue1.0
 
Apkt ds nn central_110620
Apkt ds nn central_110620Apkt ds nn central_110620
Apkt ds nn central_110620
 
1600 g technical_description
1600 g technical_description1600 g technical_description
1600 g technical_description
 
Apkt sn lte_091102
Apkt sn lte_091102Apkt sn lte_091102
Apkt sn lte_091102
 
Cisco data center training for ibm
Cisco data center training for ibmCisco data center training for ibm
Cisco data center training for ibm
 

Recently uploaded

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Attachment 11 use of common analyzing and positioning tools

  • 1. Use of Common Analyzing and Positioning Tools Security Level 1 Network Packet Catcher and Analyzer The UAP that functions as SoftACD communicates with the CTI/IVR through the TCP protocol. Because the UAP and the CTI/IVR are two different products, they might not agree with each other in respect of log and message tracing. Thus, to determine whether a problem occurs at the side of the UAP or the CTI/IVR, the correct method is to analyze the TCP network packets sent between the UAP and the CTI/IVR. Ethereal 0.10.12 is a complimentary network protocol analyzer program that supports UNIX and Windows. This program helps you to capture data from the network and analyze the data, and to analyze the data that is captured by a sniffer and saved in a hard disk. This program also helps you to view the captured data packets in an interactive manner and to query for the abstract and details about each packet. The Ethereal has diverse powerful features including support for almost all protocols, rich filter language, and ease to query for the data flow after TCP sessions are reconstructed. 2014-12-11 HUAWEI Confidential Page 1, Total 10
  • 2. Use of Common Analyzing and Positioning Tools Security Level 1.1 Basic Use of the Tool 1.1.1 Basic Use For the information about the basic use of the Ethereal, refer to 《Ethereal操作指导书》(without English version) on the Support Web site. 1.1.2 How to Realize Packet Capture Between the UAP and the CTI Through TCP Ports Networking The Ethereal is bound to a specific network interface card (NIC). After being installed in a PC, the Ethereal can capture only the packets that travel through the NIC. If the packets on the network do not travel through the NIC, the packets cannot be captured. Thus, configuring the network before packet capture becomes necessary to enable the target packets to travel through the NIC of the PC where the Ethereal is installed. Without the configuration of a LAN switch, packets cannot be captured through the LAN switch. The reason is that generally packets that travel through another port cannot be captured through a port of the LAN switch. If the LAN switch is adopted to capture packets, the port mirroring of the LAN switch must be configured. That is, the target ports must be mirrored to the access port for packet capture. In general, the following two target ports for packet capture should be traced between the UAP and the CTI:  Target port 1: It is the associated control service element (ACSE) port of the IFM board at the UAP side that expects data packets. You can run the LST CSTACFG command to query for the information about the port.  Target port 2: It is the ACSE port at the CTI/IVR side that expects data packets. You can run the LST CTIPORT command to query for the CTI link code, IP address, and information about the IP port.  Access port for packet capture: A PC connects to this port for capturing packets. An image of networking for packet capture between the UAP and the CTI is as follows: 2014-12-11 HUAWEI Confidential Page 2, Total 10
  • 3. Use of Common Analyzing and Positioning Tools Security Level Gigabit port I Gigabit port II Gigabit port I Gigabit port II Trunk: VLANA and VLANB connect to the same GE Target port for packet capture (Port: 1/2) Access port for packet capture(Port: 0/24) Configuring the LAN Switch Take Huawei Quidway 5624P as an example. The configuration of the LAN switch is described as follows: Configure the port mirroring to enable capturing of the packets that flow in and out of port 1/2 (Gb) at port 0/24 (100 Mb) in the data link layer. Port mirroring is configured as follows: < Quidway>sy //Access the system configuration mode. [Quidway] acl num 200 //Configure numbers 200-299 in the ACL table based on the LINK layer, numbers 0-99 based on the IP layer, and numbers 100-199 based on the TCP layer. [Quidway-acl-200] rule 1 permit ingress interface g1/2 //g1/2 is the target port number for packet capture. It is the rule for configuring the data that flows in to the port. [Quidway-acl-200] rule 2 permit ingress interface g1/2 //g1/2 is the target port number for packet capture. It is the rule for configuring the data that flows out of the port. [Quidway-acl-200]quit [Quidway]mirrored-to link-group 200 interface ethernet 0/24 2014-12-11 HUAWEI Confidential Page 3, Total 10
  • 4. Use of Common Analyzing and Positioning Tools Security Level //Configure the mirroring. e0/24 is the access port for packet capture. [Quidway]quit For details about the use of the LAN switch (Huawei Quidway 5624P), refer to the user documents (shipped with equipment) related to HUAWEI Quidway 5624P. Commands may vary with switches. For details, refer to the relevant operation manuals. Packet Capture For details, refer to the attachment. 网络数据包捕获与 分析. pdf Capture and Analysis of Network Data Packets 2014-12-11 HUAWEI Confidential Page 4, Total 10
  • 5. Use of Common Analyzing and Positioning Tools Security Level 2 PRA Signaling Analysis The UAP that functions as an IP gateway communicates with other products through the PRA trunk. An analysis of PRA signaling is required to analyze the PRA signaling exchange of the UAP. 2014-12-11 HUAWEI Confidential Page 5, Total 10
  • 6. Use of Common Analyzing and Positioning Tools Security Level 2.1.1 PRA Signaling Analysis For details about tracing, analyzing and troubleshooting the PRA signaling, refer to《PRA信令分析和常见问题处理》(without English version) on the Support Web site. 2.1.2 PRA Signaling Analyzer When tracing PRA messages at the UAP, right-click the page for tracing PRA messages and select the Signaling Analysis option from the displayed menu to analyze the PRA signaling. For the PRA tracing messages provided by other sources, adopt PRA Signaling Analyzer V001 for analysis. For details, visit the Support Web site. 2.1.3 Example of PRA Signaling Analysis Tracing PRA and SIP Messages Reserve four to eight PRA trunks in a voice gateway, and then trace the PRA and SIP messages. The SIP tracing number is 95569.  Analyze the PRA messages of which the values in the Connect column and the Alert column are NA. These calls generally fail soon. If the UAP receives a PRA disconnection message, you can infer that abnormal disconnection happens. 2014-12-11 HUAWEI Confidential Page 6, Total 10
  • 7. Use of Common Analyzing and Positioning Tools Security Level If the UAP sends a PRA disconnection message, you need to analyze the SIP message to check whether the disconnection message is sent from the NGN at the called side. Here, the disconnection is caused by unreachability. 2014-12-11 HUAWEI Confidential Page 7, Total 10
  • 8. Use of Common Analyzing and Positioning Tools Security Level  Analyze the messages of which the values in the Connect column are NA. These calls are generally unanswered, disconnected, or rejected after ringing. 2014-12-11 HUAWEI Confidential Page 8, Total 10
  • 9. Use of Common Analyzing and Positioning Tools Security Level 2.2 SIP Signaling Analyzer None. 2.3 ASN.1 Analyzer None. 2.4 Character String Analyzer 2.4.1 ASCII Code and Character String Converter The tool is used to view the ASCII codes in an announcement message that is delivered, convert the ASCII codes to character strings, and check whether the audio file exists on the file server. 码流和字符串转换. r ar ASCII Code and Character String Converter 2014-12-11 HUAWEI Confidential Page 9, Total 10
  • 10. Use of Common Analyzing and Positioning Tools Security Level 2.4.2 Machine Code and Chinese Character Converter Analyze the use of TTS variables for playing voices. This converter is used to convert the values of TTS variables (machine codes) to Chinese characters, and convert the machine codes to Chinese characters. 内码转换. r ar Machine Code and Chinese Character Converter 2014-12-11 HUAWEI Confidential Page 10, Total 10