{"id":3607,"date":"2024-09-06T08:39:42","date_gmt":"2024-09-06T08:39:42","guid":{"rendered":"https:\/\/howtogeek.blog\/ja\/?p=3607"},"modified":"2024-09-06T08:39:42","modified_gmt":"2024-09-06T08:39:42","slug":"optimize-your-network-analysis-with-the-latest-wireshark-version-4-4-0-ja","status":"publish","type":"post","link":"https:\/\/howtogeek.blog\/ja\/optimize-your-network-analysis-with-the-latest-wireshark-version-4-4-0-ja\/","title":{"rendered":"\u6700\u65b0\u306e Wireshark \u30d0\u30fc\u30b8\u30e7\u30f3 4.4.0 \u3067\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u5206\u6790\u3092\u6700\u9069\u5316"},"content":{"rendered":"<p><span>\ufeff<\/span><\/p>\n<p>Wireshark \u306f\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af \u30d1\u30b1\u30c3\u30c8 \u30a2\u30ca\u30e9\u30a4\u30b6\u30fc\u3067\u3059\u3002\u30cd\u30c3\u30c8\u30ef\u30fc\u30af \u30d1\u30b1\u30c3\u30c8 \u30a2\u30ca\u30e9\u30a4\u30b6\u30fc\u306f\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af \u30d1\u30b1\u30c3\u30c8\u3092\u30ad\u30e3\u30d7\u30c1\u30e3\u3057\u3001\u305d\u306e\u30d1\u30b1\u30c3\u30c8 \u30c7\u30fc\u30bf\u3092\u53ef\u80fd\u306a\u9650\u308a\u8a73\u7d30\u306b\u8868\u793a\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u30cd\u30c3\u30c8\u30ef\u30fc\u30af \u30d1\u30b1\u30c3\u30c8 \u30a2\u30ca\u30e9\u30a4\u30b6\u30fc\u306f\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af \u30b1\u30fc\u30d6\u30eb\u5185\u3067\u4f55\u304c\u8d77\u3053\u3063\u3066\u3044\u308b\u304b\u3092\u8abf\u3079\u308b\u305f\u3081\u306b\u4f7f\u7528\u3059\u308b\u6e2c\u5b9a\u88c5\u7f6e\u3068\u8003\u3048\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u3053\u308c\u306f\u3001\u96fb\u6c17\u6280\u5e2b\u304c\u96fb\u7dda\u5185\u3067\u4f55\u304c\u8d77\u3053\u3063\u3066\u3044\u308b\u304b\u3092\u8abf\u3079\u308b\u305f\u3081\u306b\u4f7f\u7528\u3059\u308b\u96fb\u5727\u8a08\u3068\u540c\u3058\u3067\u3059 (\u3082\u3061\u308d\u3093\u3001\u3088\u308a\u9ad8\u5ea6\u306a\u30ec\u30d9\u30eb\u3067\u3059\u304c)\u3002\u4ee5\u524d\u306f\u3001\u3053\u306e\u3088\u3046\u306a\u30c4\u30fc\u30eb\u306f\u975e\u5e38\u306b\u9ad8\u4fa1\u3067\u3042\u3063\u305f\u308a\u3001\u72ec\u81ea\u306e\u3082\u306e\u3067\u3042\u3063\u305f\u308a\u3001\u305d\u306e\u4e21\u65b9\u3067\u3042\u3063\u305f\u308a\u3057\u307e\u3057\u305f\u3002\u3057\u304b\u3057\u3001Wireshark \u306e\u767b\u5834\u306b\u3088\u308a\u3001\u3059\u3079\u3066\u304c\u5909\u308f\u308a\u307e\u3057\u305f\u3002Wireshark \u306f\u3001\u73fe\u5728\u5229\u7528\u3067\u304d\u308b\u30aa\u30fc\u30d7\u30f3 \u30bd\u30fc\u30b9 \u30d1\u30b1\u30c3\u30c8 \u30a2\u30ca\u30e9\u30a4\u30b6\u30fc\u306e\u4e2d\u3067\u304a\u305d\u3089\u304f\u6700\u9ad8\u306e\u3082\u306e\u306e 1 \u3064\u3067\u3059\u3002<\/p>\n<ul>\n<li>\u6570\u767e\u306e\u30d7\u30ed\u30c8\u30b3\u30eb\u3092\u8a73\u7d30\u306b\u691c\u67fb\u3057\u3001\u5e38\u306b\u8ffd\u52a0\u3055\u308c\u3066\u3044\u307e\u3059<\/li>\n<li>\u30e9\u30a4\u30d6\u30ad\u30e3\u30d7\u30c1\u30e3\u3068\u30aa\u30d5\u30e9\u30a4\u30f3\u5206\u6790<\/li>\n<li>\u6a19\u6e96\u306e3\u30da\u30a4\u30f3\u30d1\u30b1\u30c3\u30c8\u30d6\u30e9\u30a6\u30b6<\/li>\n<li>\u30de\u30eb\u30c1\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0: Windows\u3001Linux\u3001OS X\u3001Solaris\u3001FreeBSD\u3001NetBSD\u306a\u3069\u3001\u3055\u307e\u3056\u307e\u306a\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3067\u5b9f\u884c\u3067\u304d\u307e\u3059\u3002<\/li>\n<li>\u30ad\u30e3\u30d7\u30c1\u30e3\u3055\u308c\u305f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30c7\u30fc\u30bf\u306f\u3001GUI\u307e\u305f\u306fTTY\u30e2\u30fc\u30c9\u306eTShark\u30e6\u30fc\u30c6\u30a3\u30ea\u30c6\u30a3\u3092\u4ecb\u3057\u3066\u53c2\u7167\u3067\u304d\u307e\u3059\u3002<\/li>\n<li>\u696d\u754c\u3067\u6700\u3082\u5f37\u529b\u306a\u30c7\u30a3\u30b9\u30d7\u30ec\u30a4\u30d5\u30a3\u30eb\u30bf\u30fc<\/li>\n<li>\u8c4a\u5bcc\u306aVoIP\u5206\u6790<\/li>\n<li>\u3055\u307e\u3056\u307e\u306a\u30ad\u30e3\u30d7\u30c1\u30e3\u30d5\u30a1\u30a4\u30eb\u5f62\u5f0f\u306e\u8aad\u307f\u53d6\u308a\/\u66f8\u304d\u8fbc\u307f<\/li>\n<li>gzip\u3067\u5727\u7e2e\u3055\u308c\u305f\u30ad\u30e3\u30d7\u30c1\u30e3\u30d5\u30a1\u30a4\u30eb\u306f\u3001\u305d\u306e\u5834\u3067\u89e3\u51cd\u3067\u304d\u307e\u3059\u3002<\/li>\n<li>\u30e9\u30a4\u30d6\u30c7\u30fc\u30bf\u306f\u3001\u30a4\u30fc\u30b5\u30cd\u30c3\u30c8\u3001IEEE 802.11\u3001PPP\/HDLC\u3001ATM\u3001Bluetooth\u3001USB\u3001\u30c8\u30fc\u30af\u30f3\u30ea\u30f3\u30b0\u3001\u30d5\u30ec\u30fc\u30e0\u30ea\u30ec\u30fc\u3001FDDI \u306a\u3069\u304b\u3089\u8aad\u307f\u53d6\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059 (\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306b\u3088\u3063\u3066\u7570\u306a\u308a\u307e\u3059)<\/li>\n<li>IPsec\u3001ISAKMP\u3001Kerberos\u3001SNMPv3\u3001SSL\/TLS\u3001WEP\u3001WPA\/WPA2 \u306a\u3069\u3001\u591a\u304f\u306e\u30d7\u30ed\u30c8\u30b3\u30eb\u306e\u5fa9\u53f7\u5316\u3092\u30b5\u30dd\u30fc\u30c8<\/li>\n<li>\u30d1\u30b1\u30c3\u30c8\u30ea\u30b9\u30c8\u306b\u8272\u5206\u3051\u30eb\u30fc\u30eb\u3092\u9069\u7528\u3057\u3066\u3001\u8fc5\u901f\u304b\u3064\u76f4\u611f\u7684\u306a\u5206\u6790\u3092\u884c\u3046\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/li>\n<li>\u51fa\u529b\u306fXML\u3001PostScript\u00ae\u3001CSV\u3001\u307e\u305f\u306f\u30d7\u30ec\u30fc\u30f3\u30c6\u30ad\u30b9\u30c8\u5f62\u5f0f\u3067\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u3067\u304d\u307e\u3059\u3002<\/li>\n<\/ul>\n<p><strong>Wireshark 4.4.0 \u306e\u5909\u66f4\u30ed\u30b0:<\/strong><\/p>\n<ul>\n<li>I\/O \u30b0\u30e9\u30d5\u3001\u30d5\u30ed\u30fc \u30b0\u30e9\u30d5\/VoIP \u901a\u8a71\u3001TCP \u30b9\u30c8\u30ea\u30fc\u30e0 \u30b0\u30e9\u30d5\u306a\u3069\u306e\u30b0\u30e9\u30d5\u4f5c\u6210\u30c0\u30a4\u30a2\u30ed\u30b0\u306b\u591a\u304f\u306e\u6539\u5584\u3068\u4fee\u6b63\u304c\u52a0\u3048\u3089\u308c\u307e\u3057\u305f\u3002<\/li>\n<li>Wireshark \u306f\u3001\u81ea\u52d5\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u5207\u308a\u66ff\u3048\u3092\u30b5\u30dd\u30fc\u30c8\u3059\u308b\u3088\u3046\u306b\u306a\u308a\u307e\u3057\u305f\u3002\u8868\u793a\u30d5\u30a3\u30eb\u30bf\u30fc\u3092\u69cb\u6210\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306b\u95a2\u9023\u4ed8\u3051\u308b\u3053\u3068\u304c\u3067\u304d\u3001\u30d5\u30a3\u30eb\u30bf\u30fc\u306b\u4e00\u81f4\u3059\u308b\u30ad\u30e3\u30d7\u30c1\u30e3 \u30d5\u30a1\u30a4\u30eb\u3092\u958b\u304f\u3068\u3001Wireshark \u306f\u81ea\u52d5\u7684\u306b\u305d\u306e\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306b\u5207\u308a\u66ff\u308f\u308a\u307e\u3059\u3002<\/li>\n<li>Lua 5.3 \u304a\u3088\u3073 5.4 \u306e\u30b5\u30dd\u30fc\u30c8\u304c\u8ffd\u52a0\u3055\u308c\u3001Lua 5.1 \u304a\u3088\u3073 5.2 \u306e\u30b5\u30dd\u30fc\u30c8\u306f\u524a\u9664\u3055\u308c\u307e\u3057\u305f\u3002Windows \u304a\u3088\u3073 macOS \u30a4\u30f3\u30b9\u30c8\u30fc\u30e9\u30fc\u306b\u306f\u3001Lua 5.4.6 \u304c\u540c\u68b1\u3055\u308c\u308b\u3088\u3046\u306b\u306a\u308a\u307e\u3057\u305f\u3002<\/li>\n<li>\u5024\u6587\u5b57\u5217 (\u6570\u5024\u30d5\u30a3\u30fc\u30eb\u30c9\u306e\u30aa\u30d7\u30b7\u30e7\u30f3\u306e\u6587\u5b57\u5217\u8868\u73fe) \u306e\u8868\u793a\u30d5\u30a3\u30eb\u30bf\u30fc\u306e\u30b5\u30dd\u30fc\u30c8\u304c\u6539\u5584\u3055\u308c\u307e\u3057\u305f\u3002<\/li>\n<li>\u8868\u793a\u30d5\u30a3\u30eb\u30bf\u30fc\u95a2\u6570\u306f\u3001\u30d7\u30ed\u30c8\u30b3\u30eb\u89e3\u6790\u5668\u3084\u30d5\u30a1\u30a4\u30eb\u30d1\u30fc\u30b5\u30fc\u3068\u540c\u69d8\u306b\u3001\u30d7\u30e9\u30b0\u30a4\u30f3\u3068\u3057\u3066\u5b9f\u88c5\u3067\u304d\u307e\u3059\u3002<\/li>\n<li>\u5404\u8868\u793a\u30d5\u30a3\u30eb\u30bf \u30d5\u30a3\u30fc\u30eb\u30c9\u306b\u5bfe\u5fdc\u3059\u308b pcap \u30d5\u30a3\u30eb\u30bf\u304c\u3042\u308b\u5834\u5408\u306f\u3001[\u7de8\u96c6] \u203a [\u30b3\u30d4\u30fc] \u203a [\u8868\u793a\u30d5\u30a3\u30eb\u30bf\u3092 pcap \u30d5\u30a3\u30eb\u30bf\u3068\u3057\u3066] \u3092\u4f7f\u7528\u3057\u3066\u3001\u8868\u793a\u30d5\u30a3\u30eb\u30bf\u3092 pcap \u30d5\u30a3\u30eb\u30bf\u306b\u5909\u63db\u3067\u304d\u307e\u3059\u3002<\/li>\n<li>\u30ab\u30b9\u30bf\u30e0\u5217\u306f\u3001\u8868\u793a\u30d5\u30a3\u30eb\u30bf\u30fc\u95a2\u6570\u3001\u30d1\u30b1\u30c3\u30c8 \u30b9\u30e9\u30a4\u30b9\u3001\u7b97\u8853\u8a08\u7b97\u3001\u8ad6\u7406\u30c6\u30b9\u30c8\u3001\u751f\u306e\u30d0\u30a4\u30c8 \u30a2\u30c9\u30ec\u30b9\u6307\u5b9a\u3001\u30d7\u30ed\u30c8\u30b3\u30eb \u30ec\u30a4\u30e4\u30fc\u4fee\u98fe\u5b50\u306a\u3069\u306e\u6709\u52b9\u306a\u30d5\u30a3\u30fc\u30eb\u30c9\u5f0f\u3092\u4f7f\u7528\u3057\u3066\u5b9a\u7fa9\u3067\u304d\u307e\u3059\u3002<\/li>\n<li>tshark -e \u306e\u30ab\u30b9\u30bf\u30e0\u51fa\u529b\u30d5\u30a3\u30fc\u30eb\u30c9\u3082\u3001\u4efb\u610f\u306e\u6709\u52b9\u306a\u30d5\u30a3\u30fc\u30eb\u30c9\u5f0f\u3092\u4f7f\u7528\u3057\u3066\u5b9a\u7fa9\u3067\u304d\u307e\u3059\u3002<\/li>\n<li>Wireshark \u306f\u3001\u5727\u7e2e\u30d5\u30a1\u30a4\u30eb\u306e\u30b5\u30dd\u30fc\u30c8\u306e\u305f\u3081\u306b\u3001zlib \u3067\u306f\u306a\u304f zlib-ng \u3092\u4f7f\u7528\u3057\u3066\u30d3\u30eb\u30c9\u3067\u304d\u307e\u3059\u3002zlib-ng \u306f zlib \u3088\u308a\u3082\u5927\u5e45\u306b\u9ad8\u901f\u3067\u3059\u3002\u516c\u5f0f\u306e Windows \u304a\u3088\u3073 macOS \u30d1\u30c3\u30b1\u30fc\u30b8\u306b\u306f\u3053\u306e\u6a5f\u80fd\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002<\/li>\n<li>\u4ed6\u306b\u3082\u591a\u304f\u306e\u6539\u5584\u304c\u884c\u308f\u308c\u307e\u3057\u305f\u3002\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001<strong><a href=\"https:\/\/www.wireshark.org\/docs\/relnotes\/wireshark-4.4.0.html\" rel=\"nofollow\">\u300c\u65b0\u6a5f\u80fd\u3068\u66f4\u65b0\u3055\u308c\u305f\u6a5f\u80fd\u300d  \u30bb\u30af\u30b7\u30e7\u30f3\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/a><\/strong><\/li>\n<\/ul>\n<p>\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9: <a href=\"https:\/\/1.eu.dl.wireshark.org\/win64\/Wireshark-4.4.0-x64.exe\" rel=\"nofollow\">Wireshark 4.4.0<\/a> | 83.2 MB (\u30aa\u30fc\u30d7\u30f3 \u30bd\u30fc\u30b9)<br \/>\n\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9:<a href=\"https:\/\/1.eu.dl.wireshark.org\/win64\/WiresharkPortable64_4.4.0.paf.exe\" rel=\"nofollow\">\u30dd\u30fc\u30bf\u30d6\u30eb Wireshark 4.4.0<\/a> | <a href=\"https:\/\/1.eu.dl.wireshark.org\/win64\/Wireshark-4.4.0-arm64.exe\" rel=\"nofollow\">ARM64 \u30a4\u30f3\u30b9\u30c8\u30fc\u30e9\u30fc<\/a><br \/>\n\u8868\u793a: <a href=\"https:\/\/www.wireshark.org\/\" rel=\"nofollow\">Wireshark \u306e Web \u30b5\u30a4\u30c8<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ufeff Wireshark \u306f\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af \u30d1\u30b1\u30c3\u30c8 \u30a2\u30ca\u30e9\u30a4\u30b6\u30fc\u3067\u3059\u3002\u30cd\u30c3\u30c8\u30ef\u30fc\u30af \u30d1\u30b1\u30c3\u30c8 \u30a2\u30ca\u30e9\u30a4\u30b6\u30fc\u306f\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af \u30d1\u30b1\u30c3\u30c8\u3092\u30ad\u30e3\u30d7\u30c1\u30e3\u3057\u3001\u305d\u306e\u30d1\u30b1\u30c3\u30c8 \u30c7\u30fc\u30bf\u3092\u53ef\u80fd\u306a\u9650\u308a\u8a73\u7d30\u306b\u8868\u793a\u3057\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u30cd\u30c3\u30c8\u30ef\u30fc\u30af \u30d1\u30b1\u30c3\u30c8 \u30a2\u30ca\u30e9\u30a4\u30b6\u30fc\u306f\u3001\u30cd\u30c3\u30c8\u30ef\u30fc\u30af \u30b1\u30fc\u30d6\u30eb\u5185\u3067\u4f55\u304c\u8d77\u3053\u3063\u3066\u3044\u308b\u304b\u3092\u8abf\u3079\u308b\u305f\u3081\u306b\u4f7f\u7528\u3059\u308b\u6e2c\u5b9a\u88c5\u7f6e\u3068\u8003\u3048\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u3053\u308c\u306f\u3001\u96fb\u6c17\u6280\u5e2b\u304c\u96fb\u7dda\u5185\u3067\u4f55\u304c\u8d77\u3053\u3063\u3066\u3044\u308b\u304b\u3092\u8abf\u3079\u308b\u305f\u3081\u306b\u4f7f\u7528\u3059\u308b\u96fb\u5727\u8a08\u3068\u540c\u3058\u3067\u3059 (\u3082\u3061\u308d\u3093\u3001\u3088\u308a\u9ad8\u5ea6\u306a\u30ec\u30d9\u30eb\u3067\u3059\u304c)\u3002\u4ee5\u524d\u306f\u3001\u3053\u306e\u3088\u3046\u306a\u30c4\u30fc\u30eb\u306f\u975e\u5e38\u306b\u9ad8\u4fa1\u3067\u3042\u3063\u305f\u308a\u3001\u72ec\u81ea\u306e\u3082\u306e\u3067\u3042\u3063\u305f\u308a\u3001\u305d\u306e\u4e21\u65b9\u3067\u3042\u3063\u305f\u308a\u3057\u307e\u3057\u305f\u3002\u3057\u304b\u3057\u3001Wireshark \u306e\u767b\u5834\u306b\u3088\u308a\u3001\u3059\u3079\u3066\u304c\u5909\u308f\u308a\u307e\u3057\u305f\u3002Wireshark \u306f\u3001\u73fe\u5728\u5229\u7528\u3067\u304d\u308b\u30aa\u30fc\u30d7\u30f3 \u30bd\u30fc\u30b9 \u30d1\u30b1\u30c3\u30c8 \u30a2\u30ca\u30e9\u30a4\u30b6\u30fc\u306e\u4e2d\u3067\u304a\u305d\u3089\u304f\u6700\u9ad8\u306e\u3082\u306e\u306e 1 \u3064\u3067\u3059\u3002 \u6570\u767e\u306e\u30d7\u30ed\u30c8\u30b3\u30eb\u3092\u8a73\u7d30\u306b\u691c\u67fb\u3057\u3001\u5e38\u306b\u8ffd\u52a0\u3055\u308c\u3066\u3044\u307e\u3059 \u30e9\u30a4\u30d6\u30ad\u30e3\u30d7\u30c1\u30e3\u3068\u30aa\u30d5\u30e9\u30a4\u30f3\u5206\u6790 \u6a19\u6e96\u306e3\u30da\u30a4\u30f3\u30d1\u30b1\u30c3\u30c8\u30d6\u30e9\u30a6\u30b6 \u30de\u30eb\u30c1\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0: Windows\u3001Linux\u3001OS X\u3001Solaris\u3001FreeBSD\u3001NetBSD\u306a\u3069\u3001\u3055\u307e\u3056\u307e\u306a\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3067\u5b9f\u884c\u3067\u304d\u307e\u3059\u3002 \u30ad\u30e3\u30d7\u30c1\u30e3\u3055\u308c\u305f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30c7\u30fc\u30bf\u306f\u3001GUI\u307e\u305f\u306fTTY\u30e2\u30fc\u30c9\u306eTShark\u30e6\u30fc\u30c6\u30a3\u30ea\u30c6\u30a3\u3092\u4ecb\u3057\u3066\u53c2\u7167\u3067\u304d\u307e\u3059\u3002 \u696d\u754c\u3067\u6700\u3082\u5f37\u529b\u306a\u30c7\u30a3\u30b9\u30d7\u30ec\u30a4\u30d5\u30a3\u30eb\u30bf\u30fc \u8c4a\u5bcc\u306aVoIP\u5206\u6790 \u3055\u307e\u3056\u307e\u306a\u30ad\u30e3\u30d7\u30c1\u30e3\u30d5\u30a1\u30a4\u30eb\u5f62\u5f0f\u306e\u8aad\u307f\u53d6\u308a\/\u66f8\u304d\u8fbc\u307f gzip\u3067\u5727\u7e2e\u3055\u308c\u305f\u30ad\u30e3\u30d7\u30c1\u30e3\u30d5\u30a1\u30a4\u30eb\u306f\u3001\u305d\u306e\u5834\u3067\u89e3\u51cd\u3067\u304d\u307e\u3059\u3002 \u30e9\u30a4\u30d6\u30c7\u30fc\u30bf\u306f\u3001\u30a4\u30fc\u30b5\u30cd\u30c3\u30c8\u3001IEEE 802.11\u3001PPP\/HDLC\u3001ATM\u3001Bluetooth\u3001USB\u3001\u30c8\u30fc\u30af\u30f3\u30ea\u30f3\u30b0\u3001\u30d5\u30ec\u30fc\u30e0\u30ea\u30ec\u30fc\u3001FDDI \u306a\u3069\u304b\u3089\u8aad\u307f\u53d6\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059 (\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306b\u3088\u3063\u3066\u7570\u306a\u308a\u307e\u3059) IPsec\u3001ISAKMP\u3001Kerberos\u3001SNMPv3\u3001SSL\/TLS\u3001WEP\u3001WPA\/WPA2 \u306a\u3069\u3001\u591a\u304f\u306e\u30d7\u30ed\u30c8\u30b3\u30eb\u306e\u5fa9\u53f7\u5316\u3092\u30b5\u30dd\u30fc\u30c8 \u30d1\u30b1\u30c3\u30c8\u30ea\u30b9\u30c8\u306b\u8272\u5206\u3051\u30eb\u30fc\u30eb\u3092\u9069\u7528\u3057\u3066\u3001\u8fc5\u901f\u304b\u3064\u76f4\u611f\u7684\u306a\u5206\u6790\u3092\u884c\u3046\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002 \u51fa\u529b\u306fXML\u3001PostScript\u00ae\u3001CSV\u3001\u307e\u305f\u306f\u30d7\u30ec\u30fc\u30f3\u30c6\u30ad\u30b9\u30c8\u5f62\u5f0f\u3067\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u3067\u304d\u307e\u3059\u3002 Wireshark 4.4.0 \u306e\u5909\u66f4\u30ed\u30b0: I\/O \u30b0\u30e9\u30d5\u3001\u30d5\u30ed\u30fc \u30b0\u30e9\u30d5\/VoIP \u901a\u8a71\u3001TCP \u30b9\u30c8\u30ea\u30fc\u30e0 \u30b0\u30e9\u30d5\u306a\u3069\u306e\u30b0\u30e9\u30d5\u4f5c\u6210\u30c0\u30a4\u30a2\u30ed\u30b0\u306b\u591a\u304f\u306e\u6539\u5584\u3068\u4fee\u6b63\u304c\u52a0\u3048\u3089\u308c\u307e\u3057\u305f\u3002 Wireshark \u306f\u3001\u81ea\u52d5\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u5207\u308a\u66ff\u3048\u3092\u30b5\u30dd\u30fc\u30c8\u3059\u308b\u3088\u3046\u306b\u306a\u308a\u307e\u3057\u305f\u3002\u8868\u793a\u30d5\u30a3\u30eb\u30bf\u30fc\u3092\u69cb\u6210\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306b\u95a2\u9023\u4ed8\u3051\u308b\u3053\u3068\u304c\u3067\u304d\u3001\u30d5\u30a3\u30eb\u30bf\u30fc\u306b\u4e00\u81f4\u3059\u308b\u30ad\u30e3\u30d7\u30c1\u30e3 \u30d5\u30a1\u30a4\u30eb\u3092\u958b\u304f\u3068\u3001Wireshark \u306f\u81ea\u52d5\u7684\u306b\u305d\u306e\u30d7\u30ed\u30d5\u30a1\u30a4\u30eb\u306b\u5207\u308a\u66ff\u308f\u308a\u307e\u3059\u3002 Lua 5.3 \u304a\u3088\u3073 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[140,464,465,466,467,372,342,343,468,469,470],"class_list":["post-3607","post","type-post","status-publish","format-standard","hentry","category-how-to","tag-network","tag-network-analyzer","tag-network-monitoring","tag-network-security","tag-network-traffic","tag-open-source","tag-soft","tag-software","tag-wifi-capture","tag-wifi-scanner","tag-wireshark"],"acf":[],"_links":{"self":[{"href":"https:\/\/howtogeek.blog\/ja\/wp-json\/wp\/v2\/posts\/3607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/howtogeek.blog\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howtogeek.blog\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/ja\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/ja\/wp-json\/wp\/v2\/comments?post=3607"}],"version-history":[{"count":1,"href":"https:\/\/howtogeek.blog\/ja\/wp-json\/wp\/v2\/posts\/3607\/revisions"}],"predecessor-version":[{"id":3608,"href":"https:\/\/howtogeek.blog\/ja\/wp-json\/wp\/v2\/posts\/3607\/revisions\/3608"}],"wp:attachment":[{"href":"https:\/\/howtogeek.blog\/ja\/wp-json\/wp\/v2\/media?parent=3607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howtogeek.blog\/ja\/wp-json\/wp\/v2\/categories?post=3607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howtogeek.blog\/ja\/wp-json\/wp\/v2\/tags?post=3607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}