Laboratory Work 7
Laboratory Work 7
Control of router 1:
Router# en
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router (config) #interface fastEthernet 0/0
Router (config-if) #ip address 192.168.1.1 255.255.255.0
Router (config-if) #no shutdown
Router (config-if) #exit
Control of router 2:
Router#
Router>en
Router#conf t
Router (config) #interface fa0/0
Router (config-if) #ip address 192.168.2.1 255.255.255.0
Router (config-if) #no shutdown
Router (config-if) #exit
Router (config) #interface serial 1/0
Router (config-if) #ip address 192.168.20.2 255.255.255.0
Router (config-if) #clock rate 64000
Router (config-if) #no shutdown
Router#wr
Also in the «Config» tab, it is necessary to fill the network router IP address
(figure 7.8).
Figure 7.8 – РС configuration
1. Set up static routing between routers without using any protocols directly
connected to each other and by means of «ip route» command to subnets; remove
this command.
2. Check the network level by means of «show ip route» command
(verification of the presence of record about scheduled destination network in a
routing table).
3. By means of «show run» command show the current status of ports of the
router and also the type of connection and connection protocol.
On IP configuration 4 of a computer it is seen that the IP address was
received automatically, due to DHCP protocol (figure 7.10).
It is enough to set up on the router the way to a subnet and computers will
automatically configure IP addresses, as shown in figure 7.11.
Figure 7.10 – PC4 Configuration
During simulation it is possible to click on the sent packet and obtain the
detailed information about it.
Filtering packets.
After selecting the interface and capturing traffic, the packet capture window
is displayed (figure 7.17), the description of fields is given in table.
To create a filter for certain parameters of the packet, you must right-click on
the selected option and apply it.
Retrieving information from captured packets.
From locked files it is necessary to make filtering on HTTP protocol packets
for extraction of files or pictures.
To retrieve files or images from the captured files, you need to filter for
packets of HTTP Protocol.
Then go to File – Export Objects – HTTP menu to retrieve information. A
window will appear that will show all captured http objects-text files, pictures, etc.
(figure 7.20).
In order to retrieve any file from this list, simply highlight it and click «Save
As»
. The drawing was extracted without any problems. In the same way, you can
extract and stream video / audio.
In order to view quickly the transmitted data within a certain session, use the
menu command Analyze - Follow TCP Stream. After executing the command, a
dialog box appears in which different colors will display both the client's requests
and the server's responses.
The «Entire conversation» button with a drop-down list allows you to display
both parties involved in the exchange, or only one of them. The dialog box allows
you to display data in various formats (ASCII, EBCDIC, Hex Dump, C Arrays,
Raw) and save them to a file. When frames with a file are detected in a session, you
can display only the stream of the corresponding direction, select the desired
format, and save it on the disk.
Statistics on captured packets in graphic form.
Wireshark can output the information in graphical mode, which facilitates its
perception. By going to the Statistics-Graphs tool menu, you can select five filters
to compare the files by title with the help of highlighting with different colors in
figure 7.21.
Figure 7.21 – Graph of dependence of traffic different types