Lab4-7 Efarelo G3
Lab4-7 Efarelo G3
Topology
Objectives
Part 1: Capture and Analyze Local ICMP Data in Wireshark
Part 2: Capture and Analyze Remote ICMP Data in Wireshark
Background / Scenario
Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network
troubleshooting, analysis, software and protocol development, and education. As data
streams travel back and forth over the network, the sniffer "captures" each protocol data
unit (PDU) and can decode and analyze its content according to the appropriate RFC or
other specifications.
Wireshark is a useful tool for anyone working with networks and can be used with most
labs in the CCNA courses for data analysis and troubleshooting. In this lab, you will use
Wireshark to capture ICMP data packet IP addresses and Ethernet frame MAC addresses.
Required Resources
• 1 PC (Windows with internet access)
• Additional PCs on a local-area network (LAN) will be used to reply to ping requests.
Using a packet sniffer such as Wireshark may be considered a breach of the security
policy of the school. It is recommended that permission be obtained before running
Wireshark for this lab. If using a packet sniffer such as Wireshark is an issue, the instructor
may wish to assign the lab as homework or perform a walk-through demonstration.
Windows IP Configuration
b. Ask a team member or team members for their PC IP address and provide your PC IP
address to them.
Do not provide them with your MAC address at this time.
Close a Windows Command Prompt.
For this lab, we are only interested in displaying ICMP (ping) PDUs. Type icmp in the
Filter box at the top of Wireshark and press Enter, or click the Apply button (arrow
sign) to view only ICMP (ping) PDUs.
c. This filter causes all data in the top window to disappear, but you are still capturing the
traffic on the interface. Navigate to a command prompt window and ping the IP
address that you received from your team member.
C:\> ping 192.168.1.114
b. With this PDU frame still selected in the top section, navigate to the middle section.
Click the plus sign to the left of the Ethernet II row to view the destination and source
MAC addresses.
Questions:
Si
Si
ARP request.
d. You can stop capturing data by clicking the Stop Capture icon.
Step 2: Examining and analyzing the data from the remote hosts.
Review the captured data in Wireshark and examine the IP and MAC addresses of the
three locations that you pinged. List the destination IP and MAC addresses for all three
locations in the space provided.
Questions:
Reflection Question
Why does Wireshark show the actual MAC address of the local hosts, but not the actual
MAC address for the remote hosts?
Las direcciones MAC de los hosts remotos no se conocen en la red local, por lo que se
utiliza la dirección MAC de la puerta de enlace predeterminada. Una vez que el paquete
llega al enrutador de la puerta de enlace predeterminada, se elimina la información de
capa 2 del paquete y se adjunta un nuevo encabezado de capa 2 con la dirección MAC de
destino del enrutador del siguiente salto.
Part 1: Create a new inbound rule allowing ICMP traffic through the firewall.
a. Navigate to the Control Panel and click the System and Security option in the
Category view.
b. In the System and Security window, click Windows Defender Firewall or Windows
Firewall.
c. In the left pane of the Windows Defender Firewall or Windows Firewall window,
click Advanced settings.
d. On the Advanced Security window, click the Inbound Rules option on the left sidebar
and then click New Rule… on the right sidebar.
e. This launches the New Inbound Rule wizard. On the Rule Type screen, click the
Custom radio button and click Next.
f. In the left pane, click the Protocol and Ports option and using the Protocol Type
drop-down menu, select ICMPv4, and then click Next.
g. Verify that Any IP address for both the local and remote IP addresses are selected.
Click Next to continue.
h. Select Allow the connection. Click Next to continue.
i. By default, this rule applies to all the profiles. Click Next to continue.
j. Name the rule with Allow ICMP Requests. Click Finish to continue. This new rule
should allow your team members to receive ping replies from your PC.
a. On the Advanced Security window, click Inbound Rules in the left pane and then
locate the rule you created previously.
b. Right-click the ICMP rule and select Disable Rule if so desired. You may also select
Delete if you want to permanently delete it. If you choose this option, you must re-
create the rule again to allow ICMP replies. End of
document
LAB 7.1.6 Lab - Use Wireshark to Examine
Ethernet Frames Topology
Lab - Use Wireshark to Examine Ethernet Frames Topology
Objectives
Part 1: Examine the Header Fields in an Ethernet II Frame
Part 2: Use Wireshark to Capture and Analyze Ethernet Frames
Background / Scenario
When upper layer protocols communicate with each other, data flows down the Open
Systems
Interconnection (OSI) layers and is encapsulated into a Layer 2 frame. The frame
composition is dependent on the media access type. For example, if the upper layer
protocols are TCP and IP and the media access is Ethernet, then the Layer 2 frame
encapsulation will be Ethernet II. This is typical for a LAN environment.
When learning about Layer 2 concepts, it is helpful to analyze frame header information.
In the first part of this lab, you will review the fields contained in an Ethernet II frame. In
Part 2, you will use Wireshark to capture and analyze Ethernet II frame header fields for
local and remote traffic.
Required Resources
• 1 PC (Windows with internet access and with Wireshark installed)
Instructions
Part 1: Examine the Header Fields in an Ethernet II
Frame
In Part 1, you will examine the header fields and content in an Ethernet II frame. A
Wireshark capture will be used to examine the contents in those fields.
Preamble Not shown in capture This field contains synchronizing bits, processed
by the NIC hardware.
Destination Broadcast Layer 2 addresses for the frame. Each address is 48
Address (ff:ff:ff:ff:ff:ff) bits long, or 6 octets, expressed as 12 hexadecimal
digits, 0-
9,A-F.
A common format is 12:34:56:78:9A:BC.
Source Address Dell_50:fd:c8 The first six hex numbers indicate the
(f0:1f:af:50:fd:c8) manufacturer of the network interface card (NIC),
the last six hex numbers are the serial number of
the NIC.
The destination address may be a broadcast,
which contains all ones, or a unicast. The source
address is always unicast.
Frame Type 0x0806 For Ethernet II frames, this field contains a
hexadecimal value that is used to indicate the
type of upper-layer protocol in the data field.
There are numerous upper-layer protocols
supported by Ethernet II. Two common frame
types are these: Value Description
0x0800 IPv4 Protocol
0x0806 Address Resolution Protocol (ARP)
Data ARP Contains the encapsulated upper-level protocol.
The data field is between 46 – 1,500 bytes.
FCS Not shown in capture Frame Check Sequence, used by the NIC to
identify errors during transmission. The value is
computed by the sending device, encompassing
frame addresses, type, and data field. It is verified
by the receiver.
What is significant about the contents of the destination address field?
Todos los hosts en la lan recibirán el frame. La puerta de enlace predeterminada
(default Gateway) enviara una respuesta unicast a el destino, con la dirección MAC
del default Gateway.
Why does the PC send out a broadcast ARP prior to sending the first ping request?
Los computadores no pueden enviar una solicitud de unión (ping) sin conocer la
dirección MAC de destino. El ARP solicita la MAC.
F0:1f:af:50:fd:c8
Netgear
99:c5:72
192.168.0.1
In the Wireshark Filter box, type icmp. The box should turn green if you typed the filter
correctly. If the box is green, click Apply (the right arrow) to apply the filter.
Step 4: From the command prompt window, ping the default gateway of your PC.
From the command window, ping the default gateway using the IP address
Open a Windows command prompt.
a. In the packet list pane (top section), click the first frame listed. You should see Echo
(ping) request under the Info heading. The line should now be highlighted.
b. Examine the first line in the packet details pane (middle section). This line displays the
length of the frame.
c. The second line in the packet details pane shows that it is an Ethernet II frame. The
source and destination MAC addresses are also displayed.
Questions:
40:b0:76:5f:45:60
08:40:f3:2c:ab:20
Un frame IPv4.
192.168.0.192
192.168.0.1
..
In the first echo (ping) request frame, what are the source and destination MAC
addresses?
Source:
40:b0:76:5f:45:60
Source:
192.168.0.192
Type your answers here.
Destination:
23.52.188.256
Porque nuestro pc envia el frame al default Gateway de LAN, este luego reenviara
el ping de conexión a la IP de cisco, y así de router en router hasta llegar al
destino.
Topology
Addressing Table
Device Interface IP Address Subnet Mask
Objectives
Part 1: Configure Devices and Verify Connectivity
Part 2: Display, Describe, and Analyze Ethernet MAC Addresses
Background / Scenario
Every device on an Ethernet LAN is identified by a Layer 2 MAC address. This address is
assigned by the manufacturer and stored in the firmware of the NIC. This lab will explore and
analyze the components that make up a MAC address, and how you can find this information
on a switch and a PC.
You will cable the equipment as shown in the topology. You will configure the switch and PC to
match the addressing table. You will verify your configurations by testing for network
connectivity.
After the devices have been configured and network connectivity has been verified, you will use
various commands to retrieve information from the devices to answer questions about your
network equipment.
Note: The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.2(2) (lanbasek9
image). Other switches and Cisco IOS versions can be used. Depending on the model and
Cisco IOS version, the commands available and the output produced might vary from what is
shown in the labs.
Note: Make sure that the switches have been erased and have no startup configurations. If you
are unsure, ask your instructor.
Required Resources
1 Switch (Cisco 2960 with Cisco IOS Release 15.2(2) lanbasek9 image or comparable)
1 PC (Windows with a terminal emulation program, such as Tera Term)
Console cable to configure the Cisco switch via the console ports
Ethernet cables as shown in the topology
Instructions
Part 1: Configure Devices and Verify Connectivity
In this part, you will set up the network topology and configure basic settings, such as the
interface IP addresses and device name. For device name and address information, refer to the
Topology and Addressing Table.
Switch> enable
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)#
b. Assign a hostname to the switch based on the Addressing Table.
Switch(config)# hostname S1
c. Disable DNS lookup.
S1(config)# no ip domain-lookup
d. Configure and enable the SVI interface for VLAN 1.
S1(config)# interface vlan 1
S1(config-if)# ip address 192.168.1.2 255.255.255.0
S1(config-if)# no shutdown
S1(config-if)# end
*Mar 1 00:07:59.048: %SYS-5-CONFIG_I: Configured from console by console
Close a configuration window
Question:
What is the OUI portion of the MAC address for this device?
RTA:: 5C-26-0A
Type your answers here.
What is the serial number portion of the MAC address for this device?
RTA: 2A-2A-60
Type your answers here.
Using the example above, find the name of the vendor that manufactured this NIC.
Type your answers here.
c. From the command prompt on PC-A, issue the ipconfig /all command and identify
the OUI portion of the MAC address for the NIC of PC-A.
Type your answers here.
Identify the serial number portion of the MAC address for the NIC of PC-A.
RTA: 11-36-C1
our answers here.
Identify the name of the vendor that manufactured the NIC of PC-A.
RTA: 00-01-96
Question:
Vlan1 What
Did the switch display the MAC address of PC-A? If you answered yes, what port was
it on?
RTA: Si pertenece al puerto FA0/6.
Type your answers here.
Reflection Questions
1. Can you have broadcasts at the Layer 2 level? If so, what would the MAC address be?
RTA: Si usando una dirección broadcast FF.FF.FF.FF.FF.FF.FF.FF
Type your answers here.
2. Why would you need to know the MAC address of a device?
RTA: Se obtiene mucha información a partir de esta, como el vendedor del
dispositivo, además que la MAC es única del dispositivo, por ende permite localizar
un dispositivo de mejor manera que con la IP.
Type your answers here.
End of Document
LAB 7.3.7 Lab - View the Switch MAC
Address Table Topology
Lab - View the Switch MAC Address Table
Topology
Addressing Table
Device Interface IP Address Subnet Mask
Objectives
Part 1: Build and Configure the Network
Part 2: Examine the Switch MAC Address Table
Background / Scenario
The purpose of a Layer 2 LAN switch is to deliver Ethernet frames to host devices on the
local network. The switch records host MAC addresses that are visible on the network,
and maps those MAC addresses to its own Ethernet switch ports. This process is called
building the MAC address table. When a switch receives a frame from a PC, it examines
the frame’s source and destination MAC addresses. The source MAC address is recorded
and mapped to the switch port from which it arrived. Then the destination MAC address is
looked up in the MAC address table. If the destination MAC address is a known address,
then the frame is forwarded out of the corresponding switch port associated with that
MAC address. If the MAC address is unknown, then the frame is broadcasted out of all
switch ports, except the one from which it came. It is important to observe and
understand the function of a switch and how it delivers data on the network. The way a
switch operates has implications for network administrators whose job it is to ensure
secure and consistent network communication.
Switches are used to interconnect and deliver information to computers on local area
networks. Switches deliver Ethernet frames to host devices identified by network interface
card MAC addresses.
Note: The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.2(2)
(lanbasek9 image). Other switches and Cisco IOS versions can be used. Depending on the
model and Cisco IOS version, the commands available and output produced might vary
from what is shown in the labs.
Note: Make sure that the switches have been erased and have no startup configurations. If
you are unsure contact your instructor.
Required Resources
• 2 Switches (Cisco 2960 with Cisco IOS Release 15.2(2) lanbasek9 image or
comparable)
• 2 PCs (Windows with terminal emulation program, such as Tera Term)
• Console cables to configure the Cisco IOS devices via the console ports
• Ethernet cables as shown in the topology
Note: The Fast Ethernet interfaces on Cisco 2960 switches are autosensing and an
Ethernet straight-through cable may be used between switches S1 and S2. If using
another model Cisco switch, it may be necessary to use an Ethernet crossover cable.
Instructions Part 1: Build and Configure the Network
Step 1: Cable the network according to the topology.
C
l
o
s
e
c
o
n
f
i
g
u
r
a
t
i
o
n
w
i
n
d
o
w
Part 2: Examine the Switch MAC Address Table
A switch learns MAC addresses and builds the MAC address table, as network devices
initiate communication on the network.
b. Console into switch S1 and S2 and type the show interface F0/1 command on each
switch.
O
p
e
n
a
c
o
n
f
i
g
u
r
a
t
i
o
n
w
i
n
d
o
w
Questions:
On the second line of command output, what is the hardware addresses (or burned-in
address [bia])?
b. In privileged EXEC mode, type the show mac address-table command and press
Enter.
Are there any MAC addresses recorded in the MAC address table?
What MAC addresses are recorded in the table? To which switch ports are they
mapped and to which devices do they belong? Ignore MAC addresses that are
mapped to the CPU.
If you had not previously recorded MAC addresses of network devices in Step 1, how
could you tell which devices the MAC addresses belong to, using only the output from
the show mac address-table command? Does it work in all scenarios?
RTA:: No, o en algunos caso los que son reservados para CPU.
Does the MAC address table have any addresses in it for VLAN 1? Are there other MAC
addresses listed?
Wait 10 seconds, type the show mac address-table command, and press Enter. Are
there new addresses in the MAC address table?
Type your answers here.
C
l
o
s
e
a
c
o
n
f
i
g
u
r
a
t
i
o
n
w
i
n
d
o
w
Step 4: From PC-B, ping the devices on the network and observe the switch MAC address
table.
a. From PC-B, open a command prompt and type arp -a.
O
p
e
n
a
c
o
m
m
a
n
d
p
r
o
m
p
t
Question:
Not including multicast or broadcast addresses, how many device IP-to-MAC address
pairs have been learned by ARP?
RTA:: ninguna.
Did all devices have successful replies? If not, check your cabling and IP
configurations.
RTA:: Si todos conectaron correctamente.
c. From a console connection to S2, enter the show mac address-table command.
O
p
e
n
a
c
o
n
f
i
g
u
r
a
t
i
o
n
w
i
n
d
o
w
Q
u
e
s
t
i
o
n
:
Has the switch added additional MAC addresses to the MAC address table? If so,
which addresses and devices?
RTA:: Si añadió los que se usaron para hacer un ping desde el pc-b.
Does the PC-B ARP cache have additional entries for all network devices that were
sent pings?
RTA:: Si, ahora si están todas las entradas a las que se hizo ping.
Reflection Question
On Ethernet networks, data is delivered to devices by their MAC addresses. For this to
happen, switches and PCs dynamically build ARP caches and MAC address tables. With
only a few computers on the network this process seems fairly easy. What might be some
of the challenges on larger networks?