Chapter 9. Switches, Routers, and Firewalls

“The Internet . . . is not a big truck. It’s a series of tubes. And . . . those tubes can be filled and if they are filled, when you put your message in, it gets in line and it’s going to be delayed by anyone that puts into that tube enormous amounts of material, enormous amounts of material.”

—Former U.S. Senator Theodore “Ted” Stevens (R-Alaska)1

The line between switches, routers, and firewalls has become very blurred. It only exists as a theoretical line, which is no longer strictly implemented at all, if it ever really was. What does that mean for the forensic investigator? The evidence you may expect to find on one device may actually exist on another. A device called a “switch” may actually contain ...

Get Network Forensics: Tracking Hackers through Cyberspace now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.