Wireless Local Area Networks

Size: px
Start display at page:

Download "Wireless Local Area Networks"

Transcription

1 Wireless Local Area Networks Experiments for Bachelor Students of Mobile Communication Networks Course Dr.-Ing. Florian Evers & Prof. Dr.-Ing. habil. Andreas Mitschele-Thiel Integrated Communication Systems Faculty of Computer Science and Automation Ilmenau University of Technology

2

3 Contents 1. Introduction Test Set-up Gentoo Linux Network Topology IP-Addresses Netmasks Homework: Preparation 9 4. Experiments Building the Network Router Backbone Router Server Subnet Router Access Points Access Point Access Point Sniffing and Traffic Monitoring Traffic Capturing Traffic Filtering Display Filters Capture Filters Configure Cisco Aironet Web Interface Home Network Associations Setup Configuration IP and ESSID Default Gateway Radio Channel and Transmit Power WEP Abbreviations 29 Contact 33 A. Handouts 35 A.1. Handout: Network topology

4 4 A.2. Handout: IP addresses and netmasks A.3. Handout: Linux Commands

5 1. Introduction Wireless technologies are available since decades ago. One of the popular networks is the Wireless Local Area Network (WLAN). Main reasons for the popularity of WLAN are the always reduced cost of hardware and the ability of WLAN to be quick installed and configured in addition to the services that can be offered using such networks. The fact that WLAN is only suitable for indoor environments has resulted in deploying these networks in companies, airports, hospitals, etc. Thus, it is useful to provide students with knowledge on how to build and configure a WLAN, which is the purpose of these experiments. The rest of this document is structured as follows: chapter 2 provides the network topology of the experiment. In chapter 3 some tasks are given, which should be done before the experiment. Chapter 4 goes through the experiments that should be done step by step. How to configure the access points, used in these experiments, is provided in chapter Test Set-up The test set-up consists of one mobile node, two access points and four computers connected to a Keyboard Video Mouse (KVM) switch. With the help of the KVM switch, you can use one keyboard, mouse and monitor for all four computers. All network cables required for the experiment are already connected. Table 1.1.: KVM layout Port Computer 1 Server 2 Backbone Router 3 Router 4 Subnet Router 1.2. Gentoo Linux The operating system on all computers and the mobile node is Gentoo Linux. To configure the network you will work on the Unix-Shell. Each entered command will be saved in a command history and can be recalled with the help of the arrow up and down keys on the keyboard. If you want to abort a running command, press CTRL-C. 5

6

7 2. Network Topology Figure 2.1 shows the network topology of the experiments. The network is hierarchically structured and can be assumed as a simple structure of a part of the Internet. As the figure shows, the network consists of a server, a backbone router, a router, a subnet router and two access points. The Internet Protocol (IP) addresses and netmasks of the network nodes according the figure. On all computers the network interface eth0 is used for the Internet connection, but is not used in the experiment. Server eth1: /30 Backbone Router eth1: /30 eth2: /30 Router eth1: /30 eth2: /16 eth3: /30 Subnet Router eth1: /30 eth2: /24 Access Point 1 IP: /24 Access Point 2 IP: /16 Mobile Node IP 1: /24 IP 2: DHCP Backbone Router eth1 eth / /12 Server Router eth1 eth1 eth3 eth2 Subnet Router / /16 Access Point 2 eth1 Access Point 1 eth /24 Mobile Node Figure 2.1.: Network topology of the experiments Access point 1 works on channel 5, transmits with 20mW power and has Extended Service Set Identifier (ESSID) set to IKS WLAN AP1, while access point 2 operates on channel 11, sends with 5mW and has ESSID set to IKS WLAN AP2. The target is to configure the network provided in the figure 2.1, so that the mobile node can communicate with the server, which represents the Internet as it runs a web server. 7

8 2.1. IP-Addresses The IP addresses used in this experiment are free to use for private networks. The Internet Assigned Numbers Authority (IANA) defined 3 address ranges for private networks: Table 2.1.: IP addresses for private networks [ipa11] address range CIDR # addresses to / = to / = to / = In this practical course, IP addresses of the range /8 are used Netmasks A netmask is a bitmask, for the network protcol IPv4, that describes how many bits from the beginning of the IP address are used for the netprefix. A netmask has a length of 32 bit. All bits of the network part are set to 1, and all remaining bits of the host part are set to 0. A short notation of the netmask is the Classless Inter-Domain Routing (CIDR) notation, where the number of continious 1 bits from the left is counted. Table 2.2.: netmask examples [net11] CIDR netmask binary netmask # addresses / / / / / /

9 3. Homework: Preparation eth1 eth1 eth2 eth / /8 Computer Router Server Figure 3.1.: Network topology Complete the following table with the help of figure 3.1. Some fields may not be necessary. System: Computer interface eth1: /24 route default route IP forwarding System: Router interface route eth1: eth2: default route IP forwarding System: Server interface eth1: /30 route /8 gateway default route IP forwarding no 9

10 Table 3.1.: Sample routing table # Destination Gateway Genmask Interface eth eth eth eth eth1 Table 3.1 shows the routing table of a computer. The computer receives packets for another computer. Which entry of the routing table will be used, if the packet should be forwarded to: , , , , ? Inform yourself about the structure of Internet Control Message Protocol (ICMP), Network Time Protocol (NTP) and Hypertext Transfer Protocol (HTTP). How ping packets differ from other ICMP packets? Which transport protocol and port is used by NTP? Which transport protocol and port is used by HTTP? 10

11 4. Experiments The interfaces in all network nodes are not configured yet. First you have to configure the interfaces and assign the correct IP adresses. Afterwards you have to construct suitable routing tables in the network nodes, so that each node can reach all nodes connected directly to it. The next step is to activate IP forwarding, so each node can reach all other nodes in the network. IP forwarding enables the packet transfer between all network interfaces of one computer. The following steps help you. Remember, all steps are just explained once, the procedure for the other computers is analog Building the Network Turn on all computers and the mobile node. username: praktikum password: praktikum Router i. Type ifconfig -a. How many interfaces can you see? Which interfaces are already active? ii. The network interface eth1 is not configured. Use ifconfig eth /30 to configure the interface for the transit network. iii. The interface eth2 is already configured, because the router runs a Dynamic Host Configuration Protocol (DHCP) server on it. Configure interface eth3 according to eth1. iv. Type ifconfig. What do you see now? v. Type route add default gw This command adds interface eth2 of the backbone router as default gateway for the router. If the router does not know where to forward a packet, it will send the packet to the defined gateway. vi. Type route add -net /16 gw , to add a route from eth1 to the interface of the subnet router. Notice that the server is directly connected to the router. vii. If you want to check, whether the routing table is built correctly, type route -n. Interpret what you see. 11

12 viii. Type nano /proc/sys/net/ipv4/ip forward. To enable IP forwarding, replace 0 with 1, save (CTRL-O) the file and exit (CTRL-X) nano Backbone Router i. Configure the network interfaces to the following addresses: /30 (eth1) and /30 (eth2). ii. Add a route from the backbone router to the server and the router. iii. If a default gateway is necessary, add one. iv. Check, whether the routing table is built correctly. v. Type ping c 4. If everything is configured correct, you should obtain four replies from the interface. vi. Don t forget to enable IP forwarding Server i. The network interface eth1 is not yet configured. Configure it to /30. ii. Add a route, from eth1 to the backbone router. iii. Add the backbone router as default gateway for the server. iv. Is there a need of step ii and step iii, or is one of them enough? In case one is enough, which one would you choose? Discuss by looking at the routing table. v. Ping the backbone router ( ). If everything is configured correctly, you should obtain a reply from the interface. vi. Is IP forwarding necessary for the server? Why or why not? Subnet Router i. Configure the network interfaces and create corresponding routing tables. ii. If a error message appears, explain it. How to fix the error? iii. Test the network with the help of the ping command. ( ). iv. Enable IP forwarding if necessary. Especially ping the server 12

13 Access Points The next step is to configure the access points. If you turn on the access points for the first time, the default settings are loaded. If no DHCP server is connected to the access point, the IP address is set to /24. On default ESSID is set to tsunami and the access point transmits on channel 7. Use the mobile node to configure the access points. Configure them one after another, to avoid confusion. Which access point is connected to a DHCP server? Access Point 1 i. Change the IP address of the interface wlan0 to the following address /24. ii. Take care that only one access point 1 is powered. iii. With the command iwconfig wlan0 essid tsunami you can connect the mobile node to the access point. iv. Type iwconfig and check if you are connected. v. Send ping packets to the access point. vi. Type konqueror, to open the webbrowser, and access vii. You have to configure the IP address, network mask, default gateway, ESSID, working channel and sending power of the access point. Reflect about the order of the changes. Maybe you have to reconnect to the accesspoint after some changes. Read chapter 5 at page 19 if you need some help for configuration. viii. Configure the interface wlan0 to the following IP address: /24 and add access point 1 as default gateway. ix. Connect the mobile node to the access point IKS WLAN AP1. x. If everything is configured correct, you should be able to ping the server Access Point 2 i. At first plug in access point 2. ii. Deactivate the interface wlan0 to delete the IP address and the default gateway with the help of ifconfig wlan0 down. iii. Type ifconfig wlan0 up to reactivate the interface. iv. Type iwlist scan wlan0 to scan for visible accesspoints and analyze the output. v. Connect the mobile node to the access point tsunami vi. Check if you are connected. vii. Type dhcpcd wlan0. Now you get your IP address, netmask and default gateway from the DHCP server. viii. Open Konqueror and access 13

14 ix. You have to configure ESSID, working channel and sending power of the access point. Maybe you have to reconnect to the accesspoint after some changes. x. Connect the mobile node to the access point IKS WLAN AP2. xi. Scan for visible accesspoints and analyze the output. What has changed? xii. If everything is configured correct, you should be able to ping the server. 14

15 4.2. Sniffing and Traffic Monitoring Packet sniffers are capable to capture network traffic, decoding packet contents and presenting them in readable way. Sniffers are used to monitor network traffic and debug errors in the network operation. This experiment provides an insight into how to use such sniffers to monitor, filter and analyze network traffic. The packet sniffer used in this experiment is wireshark ( Traffic Capturing Start wireshark on the mobile node by typing wireshark on the command line. Click on Capture Interface, to open the Capture Interfaces window. This window shows all interfaces that wireshark has detected. Click on the Start button, responsible to your wireless interface, to start capturing packets. i. Wait about one minute. Which protocols do you see? ii. Which IP addresses do you find in the current trace file? iii. Wireshark provides you with lots of informations about the captured packets. Which kind of informations can you obtain? iv. Send ping packets from the mobile node to the server. v. Monitor the ping packets in wireshark and notice their content and delay Traffic Filtering For effective traffic monitoring, traffic should be filtered, so only traffic matching the filter will be presented. The next steps should give you an insight into how to create and use traffic filters Display Filters i. Send ping packets from the mobile node to the server. ii. Create a filter to present only the packets sent by the server to the interface of your mobile node or reverse (Filter: ip.addr == ). What do you see? 15

16 iii. You can extend the filter, to show only traffic of a certain protocol. For example, ping packets are sent, using ICMP. If we are interested in this traffic only, we have to use an adequate filter (Filter: ip.addr == && icmp ). iv. Now delete the filter to show all packets. Notice the types of packets you receive. Write filters to show the traffic of each protocol for itself. v. Access in your browser and repeat step iv Capture Filters In contrast to display filters, which capture all packets and present them matching certain rules, capture filters affect the capturing of packets themselves. Only packets matching the given filter will be captured. The basic syntax of capture filters in wireshark is the following: [not] primitive [and or [not] primitive...] 16

17 Table 4.1.: Some primitives available in wireshark [wir11] Command Task [src dest] host <ip address> This primitive allows you to filter on a host IP address or name. You can optionally precede the primitive with the keyword src dst to specify that you are only interested in source or destination addresses. ether [src dst] host <ehost> This primitive allows you to filter on Ethernet host addresses. You can optionally include the keyword src dst between the keywords ether and host to specify that you are only interested in source or destination addresses. gateway host <host> This primitive allows you to filter on packets that used host as a gateway. That is, where the Ethernet source or destination was host but neither the source nor destination IP address was host. [tcp udp] [src dst] port <port> This primitive allows you to filter on TCP and UDP port numbers. You can optionally precede this primitive with the keywords src dst and tcp udp which allow you to specify that you are only interested in source or destination ports and TCP or UDP packets respectively. The keywords tcp udp must appear before src dst. less greater <length> This primitive allows you to filter on packets whose length was less than or equal to the specified length, or greater than or equal to the specified length, respectively. ether ip broadcast multicast This primitive allows you to filter on either Ethernet or IP broadcasts or multicasts. Table 4.2.: Operators for primitives in wireshark [wir11] Operator Meaning!, not logical NOT-operation &&, and logical AND-operation, or logical OR-operation & bitwise AND-operation 17

18 You can access and check the content of packets with the help of the capture filters. The basic syntax is: protocol[<offset in bytes from the beginning of the header>:<number of bytes>] Table 4.3.: Examples for filter expressions checking the contents of packets [wir11] Filter Result ip[8] = 1 Filters IP packets, where the byte number 8 (TTL) equals 1. tcp[0:2] = 22 Filters TCP packets, where the value of the first two bytes of TCP header (port number) equals 22. Notice that the <number of bytes> in the basic syntax can be 1, 2 or 4. If you do not give any number, this value will be 1. If you want to use a capture filter, you have to stop capturing first. Next step is to click Capture Interface. Before you can restart capturing, you have to click Options responsible to your wireless interface. Enter your filter behind Capture Filter: and press Start. Now practice your knowledge about filtering. i. Access in Konqueror. ii. Write a filter that captures all packets with Time to Live (TTL) greater than 63. iii. Ping the server to test the filter. What can you see? iv. Write a filter that captures all HTTP traffic. v. Test the filter by accessing the server in Konqueror. vi. Write a filter that captures all NTP traffic sent from the mobile node. Reflect which protocol and port is used by NTP. vii. Write a filter that captures all ICMP packets, but no ping ones. Reflect the structure of the ICMP header. 18

19 5. Configure Cisco Aironet Web Interface Home Figure 5.1 shows the Home page, that displays the status of the access point. There you can see informations about the number of radio devices associated, the status of the Ethernet as well as the radio interface and a list of recent events. Also, this page shows information about IP and Media Access Control (MAC) addresses of both interfaces. Figure 5.1.: Summary Status 19

20 Network Figure 5.2 shows the Network page. It displays the status and statistics for the Ethernet and radio interfaces. Figure 5.2.: Network Ports 20

21 Associations The Associations page displays a list of all devices in your WLAN. It lists their system names, network roles, and parent-client relationships. Figure 5.3 presents a screenshot of the page. Figure 5.3.: Association Table 21

22 Setup The Setup page is shown in Figure 5.4. It contains links for configure associations, event log, services and network ports. Section 5.2 gives you a insight in some of the configurations. Figure 5.4.: Setup 22

23 5.2. Configuration IP and ESSID Click on the link Identification behind AP Radio: Internal on the Setup page. Here you can configure the IP address, network mask and ESSID of the radio interface. Figure 5.5.: AP Radio: Internal Identification 23

24 Figure 5.6 shows the Ethernet Identifaction page. Here you can configure the IP address and network mask of the Ethernet interface. You get to the page with the link Identification behind Ethernet on the Setup page. Figure 5.6.: Ethernet Identification 24

25 Default Gateway Click on the link Routing on the Setup page. Figure 5.7 shows the page that appears. Here you can define the default gateway for the access point. Figure 5.7.: Routing Setup 25

26 Radio Channel and Transmit Power Click on the link Hardware behind AP Radio: Internal on the Setup page. Next to many other configurations, you can set up the transmission power and the radio channel here. Figure 5.8.: AP Radio: Internal Hardware 26

27 WEP If you follow the link Radio Data Encryption (WEP) on the page shown on figure 5.8, you can define a Wired Equivalent Privacy (WEP) encryption key for the radio interface. Figure 5.9.: AP Radio: Internal Data Encryption 27

28

29 Abbreviations CIDR DHCP ESSID HTTP IANA ICMP IP KVM MAC NTP TCP TTL UDP WEP WLAN Classless Inter-Domain Routing Dynamic Host Configuration Protocol Extended Service Set Identifier Hypertext Transfer Protocol Internet Assigned Numbers Authority Internet Control Message Protocol Internet Protocol Keyboard Video Mouse Media Access Control Network Time Protocol Transmission Control Protocol Time to Live User Datagram Protocol Wired Equivalent Privacy Wireless Local Area Network 29

30

31 Bibliography [air11] Cisco Aironet 1200 Series Access Point Installation and Configuration Guide. ConfigurationGuide.pdf, last accessed 12. July 2011 [gen11] Gentoo Linux x86 Handbook. handbook-x86.xml, last accessed 12. July 2011 [htt11] Hypertext Transfer Protocol. last accessed 12. July 2011 [icm11] Internet Control Message Protocol. Control_Message_Protocol, last accessed 12. July 2011 [ipa11] Private IP address. last accessed 12. July 2011 [ipf11] IP forwarding. last accessed 12. July 2011 [net11] Netmask. last accessed 12. July 2011 [ntp11] Network Time Protocol. Protocol, last accessed 12. July 2011 [rou11a] Routing. last accessed 12. July 2011 [rou11b] Routing table. last accessed 12. July 2011 [wir11] Wireshark Documentation. last accessed 12. July

32

33 Contact 33

34

35 A. Handouts A.1. Handout: Network topology Server eth1: /30 Backbone Router eth1: /30 eth2: /30 Router eth1: /30 eth2: /16 eth3: /30 Subnet Router eth1: /30 eth2: /24 Access Point 1 IP: /24 Access Point 2 IP: /16 Mobile Node IP 1: /24 IP 2: DHCP Backbone Router eth1 eth / /12 Server Router eth1 eth1 eth3 eth2 Subnet Router / /16 Access Point 2 eth1 Access Point 1 eth /24 Mobile Node Figure A.1.: Network topology of the experiments

36

37 A.2. Handout: IP addresses and netmasks Table A.1.: IP addresses for private networks [ipa11] address range CIDR # addresses to / = to / = to / = Table A.2.: netmask examples [net11] CIDR netmask binary netmask # addresses / / / / / /

38

39 A.3. Handout: Linux Commands dhcpcd wlan0 Receive IP address, netmask and default gateway for interface wlan0 from the DHCP server. ifconfig Display informations about all active network interfaces. ifconfig -a Display informations about all network interfaces, active or inactive. ifconfig eth /30 Assign IP address and netmask to interface eth0. ifconfig wlan0 down Deactivate interface wlan0 if it is not already inactive. ifconfig wlan0 up Activate interface wlan0 if it is not already active. iwconfig Display informations about all wireless network interfaces. iwconfig wlan0 essid tsunami Connect the interface wlan0 to the accesspoint with ESSID tsunmai. iwlist scan wlan0 Scan for visible access points seen by interface wlan0. konqueror Open the webbrowser konqueror. nano /proc/sys/net/ipv4/ip forward Open the file /proc/sys/net/ipv4/ip forward to edit it. ping c 4 Ping the host four times to see if it can be reached. route -n Show the routing table for all interfaces. route add -net /16 gw Add a route for the network /16 via gateway route add default gw Add the IP address as default gateway. route del -net /16 gw Delete the route for the network /16 via gateway route del default gw Delete the IP address as default gateway. wireshark Open the network analyzer wireshark.

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

Unix System Administration

Unix System Administration Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71

More information

IP Address: the per-network unique identifier used to find you on a network

IP Address: the per-network unique identifier used to find you on a network Linux Networking What is a network? A collection of devices connected together Can use IPv4, IPv6, other schemes Different devices on a network can talk to each other May be walls to separate different

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1

More information

Introduction to Analyzer and the ARP protocol

Introduction to Analyzer and the ARP protocol Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining

More information

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci. Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation

More information

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008

More information

Introduction on Low level Network tools

Introduction on Low level Network tools Georges Da Costa dacosta@irit.fr http: //www.irit.fr/~georges.da-costa/cours/addis/ 1 Introduction 2 Aircrack-ng 3 Wireshark Low level tools Hacking tools Aircrack-ng (ex Aircrack, ex Airsnort) WEP/WPA

More information

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program. Configuration Gateway > WAN Page Gateway: LAN nat config Page Gateway: LAN dhcp server config Page Gateway LOG Page Preparing the Network Preparing the Computers for TCP/IP Networking Configuring TCP/IP

More information

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup 1:1 NAT in ZeroShell Requirements The version of ZeroShell used for writing this document is Release 1.0.beta11. This document does not describe installing ZeroShell, it is assumed that the user already

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo A typical set up for a router PCs can be connected to the router via USB or Ethernet. If you wish to use a telephone with the

More information

Lab 1: Packet Sniffing and Wireshark

Lab 1: Packet Sniffing and Wireshark Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.

More information

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface. Quick Note 53 Ethernet to W-WAN failover with logical Ethernet interface. Digi Support August 2015 1 Contents 1 Introduction... 2 1.1 Introduction... 2 1.2 Assumptions... 3 1.3 Corrections... 3 2 Version...

More information

Cisco Configuring Commonly Used IP ACLs

Cisco Configuring Commonly Used IP ACLs Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow

More information

CONNECTING THE RASPBERRY PI TO A NETWORK

CONNECTING THE RASPBERRY PI TO A NETWORK CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete

More information

Savvius Insight Initial Configuration

Savvius Insight Initial Configuration The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 5 is due Thursday (Oct. 22) Part 1 (tracking

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Practical Network Forensics

Practical Network Forensics BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe issg@securesystemssupport.co.uk www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

NBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012

NBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012 NBG2105 Wireless Mini Travel Router Version 1.00 Edition 1, 11/2012 Quick Start Guide User s Guide LAN IP Address Default Login Details 192.168.1.1 (Router Mode) 192.168.1.2 (Other Modes) Passwordwww.zyxel.com

More information

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking

Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)

More information

Instructor Notes for Lab 3

Instructor Notes for Lab 3 Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Yung-Chih Chen University of Massachusetts Amherst Department of Computer Science 1 Reminders 2 Reminders Assignment

More information

TCP/IP Network Essentials. Linux System Administration and IP Services

TCP/IP Network Essentials. Linux System Administration and IP Services TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

EKT 332/4 COMPUTER NETWORK

EKT 332/4 COMPUTER NETWORK UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)

More information

Lab - Using Wireshark to View Network Traffic

Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP

More information

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

School of Information Science (IS 2935 Introduction to Computer Security, 2003) Student Name : School of Information Science (IS 2935 Introduction to Computer Security, 2003) Firewall Configuration Part I: Objective The goal of this lab is to allow students to exploit an active attack

More information

Network Protocol Configuration

Network Protocol Configuration Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring

More information

User guide for NANOSTATION 2

User guide for NANOSTATION 2 User guide for NANOSTATION 2 1. Connecting hardware. Connecting your Nanostation 2 to your network is very easy, as it s using the POE (Power Over Ethernet) technology. For this you will need two direct

More information

BR-800. ProHD Broadcaster. Easy Set-Up Guide V 1.01

BR-800. ProHD Broadcaster. Easy Set-Up Guide V 1.01 BR-800 ProHD Broadcaster Easy Set-Up Guide V 1.01 BR-800 EASY SET-UP GUIDE BEFOREYOUBEGIN! Pleasedeterminethetypeofconfigurationbyselectingthescenariothatbest describesthewayyouwillbeusingyourbr-800prohdbroadcaster.onceyouhavedeterminedyour

More information

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas surligas@csd.uoc.gr 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters

More information

108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL

108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL 108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL Contents 1. Overview...1 1.1 Product Feature...1 1.2 System Requirements...1 1.3 Applications...1 2. Getting Start...2 2.1 Know the 108Mbps Wireless

More information

Implementing Network Address Translation and Port Redirection in epipe

Implementing Network Address Translation and Port Redirection in epipe Implementing Network Address Translation and Port Redirection in epipe Contents 1 Introduction... 2 2 Network Address Translation... 2 2.1 What is NAT?... 2 2.2 NAT Redirection... 3 2.3 Bimap... 4 2.4

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

- IPv4 Addressing and Subnetting -

- IPv4 Addressing and Subnetting - 1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI

More information

Sample Configuration Using the ip nat outside source list C

Sample Configuration Using the ip nat outside source list C Sample Configuration Using the ip nat outside source list C Table of Contents Sample Configuration Using the ip nat outside source list Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

Preparing the Computers for TCP/IP Networking

Preparing the Computers for TCP/IP Networking Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

PART IV. Network Layer

PART IV. Network Layer PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must

More information

Issue 1 April 2, 2009 Using the VT2442 Web User Interface

Issue 1 April 2, 2009 Using the VT2442 Web User Interface Using the VT2442 Web User Interface View the Terms of Service by visiting the Vonage website at www.vonage.com/tos. 1 Table of Contents Introduction to the Web UI... 3 Home Page... 4 Setup... 7 WAN Configuration...

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

MITM Man in the Middle

MITM Man in the Middle MITM Man in the Middle Wifi Packet Capturing and Session Hijacking using Wireshark Introduction The main Objective of this Attack is to make a Fake Access point and send the fake ARP Packets on same Wi-Fi

More information

IP Addressing Introductory material.

IP Addressing Introductory material. IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport

More information

101 Application Delivery Fundamentals

101 Application Delivery Fundamentals CERTIFIED F5 STUDY GUIDE Eric Mitchell Channel SE, East US and Federal F5 Networks Contents Overview 4 Printed References 4 Section 1 - OSI 5 Objective - 1.01 Explain, compare, and contrast the OSI layers

More information

LevelOne WBR-3405TX. User`s Manual. 11g Wireless AP Router

LevelOne WBR-3405TX. User`s Manual. 11g Wireless AP Router LevelOne WBR-3405TX 11g Wireless AP Router User`s Manual Contents 1. Overview...4 1.1 Product Feature...4 1.2 System Requirements...4 1.3 Applications...4 2. Getting Start...5 2.1 Know the 11g Wireless

More information

Chapter 3 Using Access Control Lists (ACLs)

Chapter 3 Using Access Control Lists (ACLs) Chapter 3 Using Access Control Lists (ACLs) Access control lists (ACLs) enable you to permit or deny packets based on source and destination IP address, IP protocol information, or TCP or UDP protocol

More information

Chapter 11 Network Address Translation

Chapter 11 Network Address Translation Chapter 11 Network Address Translation You can configure an HP routing switch to perform standard Network Address Translation (NAT). NAT enables private IP networks that use nonregistered IP addresses

More information

ASUS WL-5XX Series Wireless Router Internet Configuration. User s Guide

ASUS WL-5XX Series Wireless Router Internet Configuration. User s Guide ASUS WL-5XX Series Wireless Router Internet Configuration User s Guide Contents Chapter 1 Introduction:...1 Chapter 2 Connecting the wireless router...1 Chapter 3 Getting to know your Internet connection

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Wireshark Tutorial INTRODUCTION

Wireshark Tutorial INTRODUCTION Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer WIRESHARK. WIRESHARK would be used for the lab experiments. This document introduces the basic operation

More information

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview

More information

Lab 1: Introduction to the network lab

Lab 1: Introduction to the network lab CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,

More information

Nokia Siemens Networks. CPEi-lte 7212. User Manual

Nokia Siemens Networks. CPEi-lte 7212. User Manual Nokia Siemens Networks CPEi-lte 7212 User Manual Contents Chapter 1: CPEi-lte 7212 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the CPEi-lte 7212... 1-2 Back of the CPEi-lte

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Arduino Wifi shield And reciever. 5V adapter. Connecting wifi module on shield: Make sure the wifi unit is connected the following way on the shield:

Arduino Wifi shield And reciever. 5V adapter. Connecting wifi module on shield: Make sure the wifi unit is connected the following way on the shield: the following parts are needed to test the unit: Arduino UNO R3 Arduino Wifi shield And reciever 5V adapter Connecting wifi module on shield: Make sure the wifi unit is connected the following way on the

More information

DCB Ethernet Tunnel Family Configuration Guide

DCB Ethernet Tunnel Family Configuration Guide DCB Ethernet Tunnel Family Configuration Guide Introduction Thank you for your purchase of the DCB Ethernet Tunnel. This guide will step you through a typical installation as shown in the following diagram.

More information

Networking Basics for Automation Engineers

Networking Basics for Automation Engineers Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------

More information

Configuring the PIX Firewall with PDM

Configuring the PIX Firewall with PDM Configuring the PIX Firewall with PDM Objectives In this lab exercise you will complete the following tasks: Install PDM Configure inside to outside access through your PIX Firewall using PDM Configure

More information

Future Internet Technologies

Future Internet Technologies Future Internet Technologies Traditional Internet Dr. Dennis Pfisterer Institut für Telematik, Universität zu Lübeck http://www.itm.uni-luebeck.de/people/pfisterer Internet Protocol v4 (IPv4) IPv4 Model

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

IP Filter/Firewall Setup

IP Filter/Firewall Setup IP Filter/Firewall Setup Introduction The IP Filter/Firewall function helps protect your local network against attack from outside. It also provides a method of restricting users on the local network from

More information

The Wireless Network Road Trip

The Wireless Network Road Trip The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Kvaser BlackBird Getting Started Guide

Kvaser BlackBird Getting Started Guide Kvaser BlackBird Getting Started Guide Copyright 2007-2011 Kvaser AB, Mölndal, Sweden http://www.kvaser.com Last updated Wednesday, 18 September 2013 We believe that the information contained herein was

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

IS SERIES. QuikStart Programming Guide. IP Network Direct System. Programming Videos

IS SERIES. QuikStart Programming Guide. IP Network Direct System. Programming Videos 0215 IS SERIES IP Network Direct System QuikStart Programming Guide 1 4 GHI 2 ABC 5 JKL 3 DEF 6 MNO PRIVACY TRANSFER LIST SETTING 7 PQRS 8 TUV 9 WXYZ ZOOM 0 # WIDE Programming Videos ATTENTION: This is

More information

IP Routing Features. Contents

IP Routing Features. Contents 7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)

netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s) netkit lab MPLS VPNs with overlapping address spaces Version Author(s) 1.0 S.Filippi, L.Ricci, F.Antonini E-mail Web Description silvia.filippi@kaskonetworks.it http://www.kaksonetworks.it/ A lab showing

More information

ZyAIR B-4000. Hot Spot Gateway. Quick Installation Guide Version 1.04 March 2004

ZyAIR B-4000. Hot Spot Gateway. Quick Installation Guide Version 1.04 March 2004 Hot Spot Gateway Quick Installation Guide Version 1.04 March 2004 Table of Contents 1 Introducing the ZyAIR... 3 1.1 Rear Panel Connections... 3 1.2 The Front Panel LEDs... 3 1.3 Factory Defaults... 4

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

Packet Sniffing with Wireshark and Tcpdump

Packet Sniffing with Wireshark and Tcpdump Packet Sniffing with Wireshark and Tcpdump Capturing, or sniffing, network traffic is invaluable for network administrators troubleshooting network problems, security engineers investigating network security

More information

D-Link DAP-1360 Repeater Mode Configuration

D-Link DAP-1360 Repeater Mode Configuration D-Link DAP-1360 Repeater Mode Configuration Outline 1. Package Contents 2. System Requirements 3. Hardware Overview Connections LED s WPS LED/Button 4. Default Settings 5. Configuring your LAN Adapter

More information

Sample Configuration Using the ip nat outside source static

Sample Configuration Using the ip nat outside source static Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

1.0 Basic Principles of TCP/IP Network Communications

1.0 Basic Principles of TCP/IP Network Communications Section 1 Basic Principles of TCP/IP Network Communications Section 2 Introduction to Doors NetXtreme Section 3 Common Connection Issues Section 4 Common Causes Section 5 Tools Section 6 Contact Keri Systems

More information

Configuring Static and Dynamic NAT Simultaneously

Configuring Static and Dynamic NAT Simultaneously Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some

More information

Subnetting,Supernetting, VLSM & CIDR

Subnetting,Supernetting, VLSM & CIDR Subnetting,Supernetting, VLSM & CIDR WHAT - IP Address Unique 32 or 128 bit Binary, used to identify a system on a Network or Internet. Network Portion Host Portion CLASSFULL ADDRESSING IP address space

More information