3.3.3.4 Lab - Using Wireshark To View Network Traffic
3.3.3.4 Lab - Using Wireshark To View Network Traffic
T Topology
O Objectives
Part 1: (O Optional) Dow wnload and Install I Wireshark Part 2: Ca apture and Analyze A Loca al ICMP Data in Wireshar rk Start and stop data a capture of ping p traffic to local hosts. Locat te the IP and MAC address s information in captured P PDUs.
Part 3: Ca apture and Analyze A Remote ICMP Da ata in Wiresh hark Start and stop data a capture of ping p traffic to remote r hosts . Locat te the IP and MAC address s information in captured P PDUs. Expla ain why MAC addresses for remote host ts are differen nt than the MA AC addresses s of local hos sts.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
P Page 1 of 20
R Required Resources R
1 PC (Windows 7, Vista, or XP with w Internet access) a Additional PC(s) on n a local-area a network (LA AN) will be use ed to reply to ping request ts.
P Part 1:
Wireshark k has become e the industry standard pac cket-sniffer pr rogram used by network engineers. Thi is open source so oftware is available for man ny different op perating syste ems, including g Windows, M Mac, and Linu ux. In Part 1 of this la ab, you will do ownload and install the Wireshark softw ware program on your PC. Note: If Wireshark W is already installe ed on your PC C, you can sk kip Part 1 and d go directly to o Part 2. If Wi ireshark is not installed on your PC, check with w your instru uctor about yo our academys software do ownload polic cy.
c.
are version yo ou need based d on your PC Cs architectur re and operati ing system. F For Choose the softwa nce, if you hav ve a 64-bit PC C running Win ndows, choos se Windows Installer (64-bit). instan
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
P Page 2 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic After making a sele ection, the do ownload should start. The llocation of the e downloaded d file depends s on the ser and opera ating system that t you use. For Windows s users, the default location n is the Down nloads brows folder r.
c.
If this is the first tim me to install Wireshark, W or after a you hav ve completed the uninstall process, you will navigate to the Wir reshark Setup p wizard. Click Next.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
P Page 3 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic d. Contin nue advancin ng through the e installation process. p Click k I Agree whe en the Licens se Agreement t window displa ays.
e. Keep the default se ettings on the e Choose Com mponents win ndow and clic ck Next.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
P Page 4 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic f. Choose your desired shortcut options and cli ick Next.
g. You can c change th he installation location of Wireshark, W but t unless you have limited d disk space, it is recom mmended that t you keep the e default loca ation.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
P Page 5 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic h. To ca apture live net twork data, WinPcap W must be installed o on your PC. If WinPcap is already insta alled on your PC, P the Install check box will w be unchec cked. If your in ap is older tha an the nstalled versiion of WinPca versio on that comes s with Wiresha ark, it is recom mmend that y you allow the newer versio on to be instal lled by clickin ng the Install WinPcap x.x x.x (version number) n chec ck box. i. Finish h the WinPcap p Setup Wiza ard if installing g WinPcap.
j.
Wires shark starts in nstalling its file es and a sepa arate window displays with h the status of f the installati ion. Click Next when the inst tallation is complete.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
P Page 6 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic k. Click Finish to com mplete the Wireshark insta all process.
P Part 2: Capture C and a Analy yze Local ICMP Da ata in Wir reshark
In Part 2 of o this lab, you will ping another PC on the t LAN and capture ICMP P requests an nd replies in Wireshark k. You will als so look inside the frames captured for sp pecific inform mation. This an nalysis should d help to clarify how w packet head ders are used d to transport data to their destination.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
P Page 7 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic a. Open a command window, type e ipconfig /all, and then pr ress Enter. y PC inter rfaces IP add dress and MA AC (physical) a address. b. Note your
c.
Ask a team membe er for their PC Cs IP address s and provide e your PCs IP P address to t them. Do not provide them with your MA AC address at t this time.
Note: Clicking the first interface e icon in the ro ow of icons allso opens the e Interface Lis st.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
P Page 8 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic c. On the Wireshark: Capture Interfaces window w, click the ch heck box nex xt to the interfa ace connecte ed to your LAN.
terfaces are listed and you u are unsure w which interfac ce to check, c click the Deta ails Note: If multiple int n, and then click the 802.3 (Ethernet) ta ab. Verify tha at the MAC ad ddress matche es what you n noted in button Step 1b. Close the e Interface De etails window after verifying g the correct iinterface.
y have che ecked the corr rect interface, click Start to o start the data capture. d. After you
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
P Page 9 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic Inform mation will sta art scrolling do own the top section in Wire eshark. The d data lines will appear in diff fferent colors s based on pr rotocol.
e. This information ca an scroll by ve ery quickly de epending on w what commun nication is tak king place bet tween your PC P and the LA AN. We can apply a a filter to t make it eas sier to view an nd work with the data that is being captured by Wiresh hark. For this lab, we are only o interested d in displayin ng ICMP (ping g) PDUs. Type e icmp in the Filter box at the e top of Wires shark and pre ess Enter or c click on the Ap pply button to o view only IC CMP (ping) ) PDUs.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
Pa age 10 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic f. This filter f causes all a data in the top window to o disappear, but you are s still capturing the traffic on the interfa ace. Bring up the command prompt window that you opened earliier and ping th he IP address s that you receiv ved from your r team membe er. Notice tha at you start se eeing data appear in the to op window of Wires shark again.
Note: If your team members PC C does not re eply to your pi ngs, this may y be because their PC firew wall is blocki ing these requests. Please e see Append dix A: Allowing g ICMP Traffic Through a F Firewall for in nformation ndows 7. on ho ow to allow ICMP traffic thro ough the firew wall using Win g. Stop capturing c data by clicking the t Stop Cap pture icon.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
Pa age 11 of 20
P request PDU U frames in th he top section n of Wireshar rk. Notice that t the Source c column a. Click the first ICMP a and the t Destinatio on contains th he IP address s of the teamm mates PC you pinged. has your PCs IP address,
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
Pa age 12 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic b. With this t PDU fram me still selecte ed in the top section, s navig gate to the miiddle section. Click the plus sign to the left of the Ethernet II row to view the Des stination and S Source MAC addresses.
Does the Destination MAC addr ress in Wiresh hark match th he MAC addre ess that of yo our team mem mbers?
Note: In the preced ding example e of a captured d ICMP reque est, ICMP dat ta is encapsu ulated inside a an IPv4 packe et PDU (IPv4 header) whic ch is then enc capsulated in a an Ethernet II frame PDU (Ethernet II h header) for tra ansmission on n the LAN.
P Part 3: Capture C and a Analy yze Remo ote ICMP Data in W Wireshark k
In Part 3, you will ping remote hosts s (hosts not on the LAN) an nd examine th he generated d data from those pings. You will then determine what t is different about a this data a from the data examined in Part 2.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
Pa age 13 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic b. Make sure the che eck box next to o the LAN int terface is chec cked, and the en click Start.
c.
A window prompts to save the previously p cap ptured data b before starting g another cap pture. It is not neces ssary to save this data. Clic ck Continue without Sav ving.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
Pa age 14 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic d. With the t capture active, ping the e following three website U URLs: 1) www.yahoo.co w om 2) www.cisco.com w m 3) www.google.co w om
Note: When you ping the URLs listed, notice e that the Dom main Name Se erver (DNS) t translates the e URL to an IP address. Not te the IP addr ress received for each URL L. e. You can c stop captu uring data by clicking the Stop S Capture e icon.
S Step 2: Examining and analyzing g the data fr rom the rem mote hosts.
a. Revie ew the capture ed data in Wireshark, exam mine the IP an nd MAC addr resses of the three location ns that you pinged. List the destination IP and MAC addresses fo or all three loc cations in the space provid ded. 1st Location: 2 Lo ocation: 3 Lo ocation:
rd nd
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
Pa age 15 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic b. What is significant about this inf formation?
c.
How does d this information differ r from the loca al ping inform mation you rec ceived in Part t 2?
R Reflection
Why does s Wireshark show the actual MAC addre ess of the loc cal hosts, but not the actua al MAC addres ss for the remote ho osts?
S Step 1: Cre eate a new inbound rule allowing ICMP traffi c through t the firewall.
a. From the Control Panel, P click the System an nd Security o option.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
Pa age 16 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic c. In the e left pane of the t Windows Firewall wind dow, click Adv vanced settings.
d. On the Advanced Security S window, choose the Inbound R Rules option on the left sid debar and the en click New Rule R on the e right sideba ar.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
Pa age 17 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic e. This launches the New Inbound d Rule wizard. On the Rule e Type screen n, click the Cu ustom radio b button c Next and click
f.
In the e left pane, click the Protoc col and Ports s option and u using the Pro otocol type dro op-down men nu, select ICMP Pv4, and then click Next.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
Pa age 18 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic g. In the e left pane, click the Name option and in n the Name fie eld, type Allo ow ICMP Req quests. Click Finish.
This new n rule shou uld allow your r team membe ers to receive e ping replies from your PC C.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
Pa age 19 of 20
L Lab - Using Wireshark W to View Netwo ork Traffic b. To dis sable the rule e, click the Dis sable Rule op ption. When y you choose th his option, you will see this s option chang ge to Enable Rule. You ca an toggle back k and forth be etween Disab ble Rule and E Enable Rule; the status s of the rule also a shows in the Enabled column of the e Inbound Rules list.
c.
To pe ermanently de elete the ICMP P rule, click Delete D . If you choose this o option, you must re-create the rule again to allow ICMP replies.
2013 Cisco and d/or its affiliates. All rights reserve ed. This docume ent is Cisco Publiic.
Pa age 20 of 20