netkit lab two-hosts Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group



Similar documents
netkit lab static-routing Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)

netkit lab single-host Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

netkit lab bgp: multi-homed Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

Version Author(s) Web Description

netkit lab Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version 1.

walkthrough Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version 1.

netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)

netkit lab bgp: prefix-filtering Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

netkit lab load balancer web switch 1.1 Giuseppe Di Battista, Massimo Rimondini Version Author(s)

netkit lab Traffic Engineering with MPLS for Linux Version Author(s) F. Di Ciccio, F. Antonini (Kasko Networks S.r.l.)

netkit lab web server and browser 1.2 Giuseppe Di Battista, Maurizio Patrignani, Massimo Rimondini Version Author(s)

netkit lab load balancer dns 1.2 Massimo Rimondini Version Author(s)

IP network tools & troubleshooting. AFCHIX 2010 Nairobi, Kenya October 2010

Network Administration and Monitoring

Practical Network Forensics

Host Configuration (Linux)

NETWORK EMULATION AND NETKIT

ICS 351: Today's plan

Homework 3 TCP/IP Network Monitoring and Management

Instructor Notes for Lab 3

Packet filtering with Linux

Lab 1: Network Devices and Technologies - Capturing Network Traffic

Tcpdump Lab: Wired Network Traffic Sniffing

Troubleshooting Tools

Packet Sniffers. * Windows and Linux - Wireshark

tcpdump: network traffic capture

Corso di Configurazione e Gestione di Reti Locali

Workshop on Scientific Applications for the Internet of Things (IoT) March

BASIC TCP/IP NETWORKING

Lab 1: Introduction to the network lab

Debugging OVS. Jus.n Pe0t April 14, 2011

Unix System Administration

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

Introduction to Passive Network Traffic Monitoring

Red Hat Linux Networking

Sniffing in a Switched Network

Information Security Training. Assignment 1 Networking

Packet Sniffer Detection with AntiSniff

Packet Sniffing with Wireshark and Tcpdump

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Packet Sniffing and Spoofing Lab

Network Packet Analysis and Scapy Introduction

20 Command Line Tools to Monitor Linux Performance

LAB THREE STATIC ROUTING

Subnetting,Supernetting, VLSM & CIDR

Emulating Computer Networks with Netkit. Massimo Rimondini

Hands On Activities: TCP/IP Network Monitoring and Management

Configuration of Cisco Routers. Mario Baldi

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

VisuSniff: A Tool For The Visualization Of Network Traffic

Linux Routers and Community Networks

Linux TCP/IP Network Management

A Research Study on Packet Sniffing Tool TCPDUMP

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

Skywire TCP Socket Examples

Using OpenFlow 1.3 RYU. SDN Framework. RYU project team

Troubleshooting Procedures for Cisco TelePresence Video Communication Server

Host Fingerprinting and Firewalking With hping


Figure 1. Wireshark Menu Bar

Project 2: Firewall Design (Phase I)

Sample Configuration Using the ip nat outside source list C

Get quick control over your Linux server with server commands

Network Management and Debugging. Jing Zhou

Lab Exercise Configure the PIX Firewall and a Cisco Router

L3DSR Overcoming Layer 2 Limitations of Direct Server Return Load Balancing

Python Scripting with Scapy

Lab VI Capturing and monitoring the network traffic

Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy

Customer Tips. Network Packet Analyzer Tips. for the user. Purpose. Introduction to Packet Capture. Xerox Multifunction Devices.

Lab Conducting a Network Capture with Wireshark

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Linux Networking Basics

Lab Objectives & Turn In

HOWTO: Set up a Vyatta device with ThreatSTOP in router mode

Detection of Promiscuous Nodes Using ARP Packets

z/os V1R11 Communications Server system management and monitoring

QualNet 4.5 Network Emulation Interface Model Library

OpenCPN Garmin Radar Plugin

EKT 332/4 COMPUTER NETWORK

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

Introduction to NetGUI

Sample Configuration Using the ip nat outside source static

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

eprism Security Suite

CS179i: Guide - Virtual Machine Setup and Internal Networking in Alpha Lab

TCPdump Basics. TCPdump and WinDump are available at: &

CS197U: A Hands on Introduction to Unix

High Availability in Linux Firewalls using VRRP

Guideline for setting up a functional VPN

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

Module 1: Reviewing the Suite of TCP/IP Protocols

Implementing Network Monitoring Tools

Firestorm Network Intrusion Detection System

Transcription:

Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab two-hosts Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M. Pizzonia, M. Rimondini contact@netkit.org http://www.netkit.org/ setting up a network between two virtual machines

copyright notice All the pages/slides in this presentation, including but not limited to, images, photos, animations, videos, sounds, music, and text (hereby referred to as material ) are protected by copyright. This material, with the exception of some multimedia elements licensed by other organizations, is property of the authors and/or organizations appearing in the first slide. This material, or its parts, can be reproduced and used for didactical purposes within universities and schools, provided that this happens for non-profit purposes. Information contained in this material cannot be used within network design projects or other products of any kind. Any other use is prohibited, unless explicitly authorized by the authors on the basis of an explicit agreement. The authors assume no responsibility about this material and provide this material as is, with no implicit or explicit warranty about the correctness and completeness of its contents, which may be subject to changes. This copyright notice must always be redistributed together with the material, or its portions.

two hosts a simple network with two hosts connected to the same collision domain pc1 eth0 10.0.0.1/24 collision domain 0 pc2 eth0 10.0.0.2/24 10.0.0.0/24

host machine step 1 creating the v user@localhost:~$ vstart pc1 --eth0=a ============= Starting virtual machine "pc1" ============= Kernel: /home/user/netkit2/kernel/netkit-kernel kernel Modules: /home/user/netkit2/kernel/modules Memory: 8 MB pc1 is created and a console window opens for pc1 user@localhost:~$ vstart pc2 --eth0=a ============= Starting virtual machine "pc2" ============= Kernel: /home/user user/netkit2/ /netkit2/kernel kernel/netkit netkit-kernel kernel Modules: /home/user user/netkit2/ /netkit2/kernel kernel/modules Memory: 8 MB pc2 is created and a console window opens for pc2

step 2 configuring network interfaces pc1 pc1:~# ifconfig eth0 10.0.0.1 netmask 255.255.255.0 broadcast 10.0.0.255 up pc1:~# pc2 pc2:~# ifconfig eth0 10.0.0.2 netmask 255.255.255.0 broadcast 10.0.0.255 up pc2:~#

step 3 - ping pc1 pc1:~# ping 10.0.0.2 PING 10.0.0.2 (10.0.0.2 10.0.0.2) 56(84) bytes of data. 64 bytes from 10.0.0.2: icmp_seq=1 ttl=64 time=2.65 64 bytes from 10.0.0.2: icmp_seq=2 ttl=64 time=0.357 64 bytes from 10.0.0.2: icmp_seq=3 ttl=64 time=0.380 64 bytes from 10.0.0.2: icmp_seq=4 ttl=64 time=0.349 64 bytes from 10.0.0.2: icmp_seq=5 ttl=64 time=0.348 --- 10.0.0.2 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4078 rtt min/avg avg/max max/mdev mdev = 0.348/0.818/2.656/0.919 pc1:~# pc1 and pc2 can reach each other

TCPDUMP(8) TCPDUMP(8) NAME NAME step 4 a look at the packets let s look at the packets exchanged on collision domain A we use tcpdump, a network sniffer that is widely available on linux boxes tcpdump - dump dumptraffic on on a network number of of bytes captured per packet (default is is68) stores the packets to tofile SYNOPSIS tcpdump [ -AdDeflLnNOpqRStuUvxX ] [ -c -c count count ] [ -C -C file_size ] [ -F -F file file ] [ -i -i interface ] [ -m -m module ] [ -r -r file file ] [ -s -s snaplen ] [ -T -T type type ] [ -w -w file file ] [ -E -E spi@ipaddr algo:secret,... ]

step 4 a look at the packets ping from pc1 pc1 pc1:~# ping 10.0.0.2 PING 10.0.0.2 (10.0.0.2 10.0.0.2) 56(84) bytes of data. 64 bytes from 10.0.0.2: icmp_seq=1 ttl=64 time=6.94 64 bytes from 10.0.0.2: icmp_seq=2 ttl=64 time=0.906 64 bytes from 10.0.0.2: icmp_seq=3 ttl=64 time=0.864 --- 10.0.0.2 ping statistics --- 3 packets transmitted, 3 received, 0% packet loss, time 2033 rtt min/avg avg/max max/mdev mdev = 0.864/2.906/6.948/2.858 pc1:~#

step 4 a look at the packets at the same time, sniff from pc2 (ctrl+c to interrupt) pc2 pc2:~# tcpdump -i eth0 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet Ethernet), capture size 96 bytes 19:27:17.899782 arp who-has has 10.0.0.2 tell 10.0.0.1 19:27:18.002578 arp reply 10.0.0.2 is-at fe:fd fd:0a:00: :0a:00:00 00:02 19:27:18.004384 IP 10.0.0.1 > 10.0.0.2: icmp 64: echo request seq 1 19:27:18.005806 IP 10.0.0.2 > 10.0.0.1: icmp 64: echo reply seq 1 19:27:18.920463 IP 10.0.0.1 > 10.0.0.2: icmp 64: echo request seq 2 19:27:18.920605 IP 10.0.0.2 > 10.0.0.1: icmp 64: echo reply seq 2 6 packets captured 6 packets received by filter 0 packets dropped by kernel pc2:~#

step 4 looking at the packets with a graphical interface same as before, but store sniffed packets into file capture.pcap (on the host machine) the (real) home directory of the current user is made available inside the vm under /hosthome pc2 pc2:~# tcpdump -i eth0 -w /hosthome hosthome/capture.pcap tcpdump: listening on eth0, link-type EN10MB (Ethernet Ethernet), capture size 96 bytes 10 packets captured 10 packets received by filter 0 packets dropped by kernel pc2:~#

step 4 looking at the packets with a graphical interface open capture.pcap on the real host machine using a packet dissector (like, e.g., ethereal)