What is our primary use case?
There are multiple use cases for Wireshark. One of the primary use cases is capturing the customer's network traffic. When an issue occurs on the customer's network, we take packet captures to analyze and decode the streams that were active during the time of the incident.
Additionally, we use Wireshark to replay packet streams. This helps us troubleshoot issues that may not be readily observable on the live network. With the packet capture in hand, we can analyze the decoded packets and identify the protocols involved and the specific nature of the issue that occurred.
How has it helped my organization?
It has helped us in debugging challenging customer issues
What is most valuable?
The best part about Wireshark, in my opinion, is its ability to analyze packet capture files. It lists out various protocols like TCP, UDP, or SCTP, along with source and destination codes. This feature is truly amazing.
What needs improvement?
One thing that I feel is currently missing in Wireshark is the ability to perform deep analytics on traffic streams after they have been decoded. While it may not be the major use case right now, it would be beneficial to have some sort of leveraging of artificial intelligence or machine learning to automatically detect threats or vulnerabilities based on specific types of network traffic. Predictive analysis of this nature is currently absent in Wireshark.
So in future releases, it would be great to see more robust analytics for traffic streams in the next version of Wireshark.
One improvement I would suggest is having more graphical representations of network topologies in Wireshark. Currently, when we deploy Wireshark to collect streams, we lack visibility into how different entities are connected at that specific time. Having a network topology view of connected devices, showing the source and destination, would be really beneficial. For example, in DNS troubleshooting, visualizing the network path can help recreate certain issues. Unfortunately, this feature is not currently available in Wireshark.
For how long have I used the solution?
I've been working with Wireshark for more than 13 years. I would consider myself a network software development professional with extensive experience.
I've worked with major companies like Cisco Systems and other networking companies.
What do I think about the stability of the solution?
I would rate the stability of Wireshark as nine out of ten. It's quite stable.
What do I think about the scalability of the solution?
In terms of scalability, I would rate the scalability a seven out of ten. It is difficult to scale this solution.
The use cases I've worked on require deploying Wireshark independently on each node. However, if I want to deploy Wireshark on hundreds of devices and collect information at a single location for better network management, that capability is currently not available. We need Wireshark to run on all the devices and have one device act as a controller to collect and process the information.
Wireshark is popular among both individual users and enterprise organizations, but currently, it is mostly used individually for debugging network traffic.
How are customer service and support?
I usually troubleshoot issues on my own. However, since Wireshark is open source, there is a community support system available.
How would you rate customer service and support?
What about the implementation team?
Deployment-wise, Wireshark is relatively simple. It's not overly complex, and it works quite well. So, in that respect, it's a good solution.
We are working with a hybrid model. We deploy Wireshark in both cloud platforms and on-premises. Depending on the real devices and entities, we sometimes deploy it onto virtual machines in the cloud and collect and process information using a switch. This flexible deployment approach allows us to cater to different scenarios and adapt accordingly.
Which other solutions did I evaluate?
I can compare Wireshark with tools like Suricata and Zeek. Suricata and Zeek are both implemented considering setting objectives, meaning that they are designed to achieve specific goals. For example, Suricata is designed to decode packet streams, perform analysis, and push configuration changes to devices. This makes it a good choice for an Intrusion Prevention System (IPS), which is a system that can detect and prevent attacks.
Wireshark is the base of Suricata. Suricata both use the same packet filter implementation, known as BPF (Berkley Packet Filter). BPF is a powerful tool that can be used to capture and analyze network traffic.
What other advice do I have?
In general, I'm quite fond of Wireshark, so I would rate it an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.