5

.docx

School

John Tyler Community College *

*We aren’t endorsed by this school

Course

262

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

6

Uploaded by MegaHareMaster1079

Report
Mininet Topology Objectives Part 1: Install and Verify the Mininet Topology Part 2: Capture and Analyze ICMP Data in Wireshark Background / Scenario The CyberOps VM includes a Python script that, when you run it, will set up and configure the devices shown in the figure above. You will then have access to four hosts, a switch, and a router inside your one VM. This will allow you to simulate a variety of network protocols and services without having to configure a physical network of devices. For example, in this lab you will use the ping command between two hosts in the Mininet Topology and capture those pings with Wireshark. Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network troubleshooting, analysis, software and protocol development, and education. As data streams travel over the network, the sniffer "captures" each protocol data unit (PDU) and can decode and analyze its content according to the appropriate RFC or other specifications. Wireshark is a useful tool for anyone working with networks for data analysis and troubleshooting. You will use Wireshark to capture ICMP data packets. Required Resources CyberOps Workstation virtual machine Instructions I have bolded and changed font to red for all sections that require a response. Type your response in this document and submit on Canvas when completed. Install and Verify the Mininet Topology In this part, you will use a Python script to set up the Mininet Topology inside the CyberOps VM. You will then record the IP and MAC addresses for H1 and H2. Verify your PC’s interface addresses. Start and log into your CyberOps Workstation that you have installed in a previous lab using the following credentials: Username: analyst Password: cyberops
Run the Python script to install the Mininet Topology. Open a terminal emulator to start Mininet and enter the following command at the prompt. When prompted, enter cyberops as the password. [analyst@secOps ~]$ sudo ~/lab.support.files/scripts/cyberops_topo.py [sudo] password for analyst: Record IP and MAC addresses for H1 and H2. At the mininet prompt, start terminal windows on hosts H1 and H2. This will open separate windows for these hosts. Each host will have a separate configuration for the network including unique IP and MAC addresses. *** Starting CLI: mininet> xterm H1 mininet> xterm H2 At the prompt on Node: H1 , enter ip address to verify the IPv4 address and record the MAC address. Do the same for Node: H2 . The IPv4 address and MAC address are highlighted below for reference. [root@secOps analyst]# ip address <output omitted> 2: H1-eth0@if3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000 link/ether ba:d4:1d:7b:f3:61 brd ff:ff:ff:ff:ff:ff link-netnsid 0 inet 10.0.0.11/24 brd 10.0.0.255 scope global H1-eth0 valid_lft forever preferred_lft forever inet6 fe80::b8d4:1dff:fe7b:f361/64 scope link valid_lft forever preferred_lft forever Host-interface IP Address MAC Address H1-eth0 Blank Blank H2-eth0 Blank blank Capture and Analyze ICMP Data in Wireshark In this part, you will ping between two hosts in the Mininet and capture ICMP requests and replies in Wireshark. You will also look inside the captured PDUs for specific information. This analysis should help to clarify how packet headers are used to transport data to the destination.
Examine the captured data on the same LAN. In this step, you will examine the data that was generated by the ping requests of your team member’s PC. Wireshark data is displayed in three sections: The top section displays the list of PDU frames captured with a summary of the IP packet information listed. The middle section lists PDU information for the frame selected in the top part of the screen and separates a captured PDU frame by its protocol layers. The bottom section displays the raw data of each layer. The raw data is displayed in both hexadecimal and decimal form. On Node: H1 , enter wireshark & to start Wireshark (The pop-up warning is not important for this lab.). Click OK to continue. [root@secOps]# wireshark & [1] 1552 [root@secOps ~]# ** (wireshark:1552): WARNING **: Couldn't connect to accessibility bus: Failed to connect to socket /tmp/dbus- f0dFz9baYA: Connection refused Gtk-Message: GtkDialog mapped without a transient parent. This is discouraged. In the Wireshark window, under the Capture heading, select the H1-eth0 interface. Click Start to capture the data traffic. On Node: H1 , press the Enter key, if necessary, to get a prompt. Then type ping -c 5 10.0.0.12 to ping H2 five times. The command option -c specifies the count or number of pings. The 5 specifies that five pings should be sent. The pings will all be successful. [root@secOps analyst]# ping -c 5 10.0.0.12 Navigate to the Wireshark window, click Stop to stop the packet capture. A filter can be applied to display only the interested traffic. Type icmp in the Filter field and click Apply . If necessary, click the first ICMP request PDU frames in the top section of Wireshark. Notice that the Source column has H1’s IP address, and the Destination column has H2’s IP address. With this PDU frame still selected in the top section, navigate to the middle section. Click the arrow to the left of the Ethernet II row to view the Destination and Source MAC addresses.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help