
6 Table of Contents (23 Feb 2018) — Archive/Non-authoritative version
Chapter 7: Mining GigaStor Data.............................................................................220
Mining data from your GigaStor............................................................................................ 220
Selecting a time frame to analyze.....................................................................................223
How to reorder packets based on a trailer timestamp................................................ 223
Analyzing data without any filters....................................................................................225
Analyzing data with filters from the Observer filter editor....................................... 225
Analyzing data with filters from the GigaStor Control Panel.................................... 226
Analyzing data by combining GigaStor Control Panel and Observer filters........... 227
Analyzing multiple GigaStor probe instances from one GigaStor Control
Panel............................................................................................................................................227
Understanding GigaStor accelerated analysis..................................................................... 228
Filter elements that support accelerated analysis........................................................ 229
Chapter 8: Stream Reconstruction...........................................................................230
Reconstructing streams of HTTP, VoIP, and more.............................................................. 230
Defining what can be recreated in Stream Reconstruction.........................................231
How to extract VoIP and video calls from your GigaStor............................................231
Chapter 9: Forensic Analysis.....................................................................................233
Examining your network traffic with forensic analysis.................................................... 233
Importing Snort rules............................................................................................................ 234
Analyzing packets using Snort rules................................................................................. 234
Creating a Forensic Settings profile...................................................................................235
Using network forensics to track a security breach.....................................................240
Using network forensics to track acceptable use or compliance............................... 241
Chapter 10: Microbursts............................................................................................ 242
Searching for microbursts......................................................................................................... 242
Using the Microburst Analysis tab in the GigaStor Control Panel............................ 244
Using the Detail Chart only.................................................................................................244
Chapter 11: Charts, Graphs, and Reports.................................................................248
Configuring options for the GigaStor charts, graphs, and reports................................248
Statistics Lists tab.................................................................................................................. 248
Chapter 12: GigaStor in Financial Firms...................................................................249
Using Observer in financial firms........................................................................................... 249
Analyzing FIX transactions...................................................................................................250
Configuring a FIX profile....................................................................................................... 251
Chapter 13: GigaStor RAID Wiping and Rebuilding................................................253
GS-2P40-576T.................................................................................................................................253
How to delete saved network data.................................................................................. 254
How to reformat the RAID volume................................................................................... 254
How to delete RAID sets......................................................................................................254
How to build new RAID sets...............................................................................................256
How to stripe the volumes in Windows.......................................................................... 257
How to disable the Recycle Bin for RAID........................................................................ 259
How to create folders for the RAID drives......................................................................259
How to use additional storage volumes on the GigaStor active instance.............. 259
GS-2P40-288T............................................................................................................................... 260
How to delete saved network data..................................................................................260