Lab 4.2.3 Analyzing Network Traffic



Similar documents
Lab Diagramming External Traffic Flows

Lab Diagramming Intranet Traffic Flows

Lab Creating a Logical Network Diagram

Lab Diagramming Traffic Flows to and from Remote Sites

Lab Characterizing Network Applications

Lab Developing ACLs to Implement Firewall Rule Sets

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Lab Load Balancing Across Multiple Paths

Device Interface IP Address Subnet Mask Default Gateway

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Lab Advanced Telnet Operations

Lab Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips

PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram

3.1 Connecting to a Router and Basic Configuration

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Lab 8.4.3a Managing Cisco IOS Images with TFTP

Lab Configure Syslog on AP

Lab 3.5.1: Basic VLAN Configuration (Instructor Version)

Lab Configuring Access Policies and DMZ Settings

Lab 3.3 Configuring QoS with SDM

Lab 5.3.9b Managing Router Configuration Files Using TFTP

Lab Configure Intrusion Prevention on the PIX Security Appliance

Lab Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

Lab: Basic Router Configuration

Lab Configure Basic AP Security through IOS CLI


CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

LAB Configuring NAT. Objective. Background/Preparation

Skills Assessment Student Training Exam

Lab Configure Cisco IOS Firewall CBAC

Lab Introductory Lab 1 - Getting Started and Building Start.txt

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations

Lab Configuring the PIX Firewall as a DHCP Server

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

Savvius Insight Initial Configuration

1 PC to WX64 direction connection with crossover cable or hub/switch

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Lab Configuring PAT with SDM and Static NAT using Cisco IOS Commands

Multi-Homing Dual WAN Firewall Router

Objectives. Router as a Computer. Router components and their functions. Router components and their functions

Using Cisco UC320W with Windows Small Business Server

Lab Creating a Network Map using CDP Instructor Version 2500

IntraVUE Plug Scanner/Recorder Installation and Start-Up

Lab Configuring Access Policies and DMZ Settings

- QoS Classification and Marking -

Lab 3.4.2: Managing a Web Server

Remote PC Guide for Standalone PC Implementation

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

1 Axis camera configuration IP configuration Setting up date and time Installing an IPS Analytics Application...

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support

Lab Configuring DHCP with SDM and the Cisco IOS CLI

Chapter 15: Advanced Networks

Maintaining the Content Server

CCNA Access List Sim

Chapter 1 Configuring Basic Connectivity

Lab Organizing CCENT Objectives by OSI Layer

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

LifeSize Networker Installation Guide

Objectives. Background. Required Resources. CCNA Security

Lab 7-1 Configuring Switches for IP Telephony Support

Allworx Installation Course

Cisco Configuration Professional Quick Start Guide

Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5

Lab Use Network Inspector to Observe STP Behavior

Lab 8.3.3b Configuring a Remote Router Using SSH

Lab PC Network TCP/IP Configuration

NetFlow Subinterface Support

Lab Conducting a Network Capture with Wireshark

Barracuda Link Balancer Administrator s Guide

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Wireless G Broadband quick install

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T PIN6 T PIN7 R+ PIN8 R-

Lab Configure IOS Firewall IDS

Lab Introductory Lab 1 Getting Started and Building Start.txt

Load Balancer LB-2. User s Guide

Using Internet or Windows Explorer to Upload Your Site

GLBP - Gateway Load Balancing Protocol

Basic Router and Switch Instructions (Cisco Devices)

Welcome to Todd Lammle s CCNA Bootcamp

Configuring Port Security

Lab 8.4.3b Managing Cisco IOS images with ROMMON and TFTP

Lab 2 - Basic Router Configuration

Router Lab Reference Guide

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide

CCNA 2 Chapter 5. Managing Cisco IOS Software

Lab Configuring Basic Router Settings with the Cisco IOS CLI

Network Load Balancing

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Lab - Observing DNS Resolution

Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network

1 You will need the following items to get started:

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

Load Balancing Router. User s Guide

Configure ISDN Backup and VPN Connection

Transcription:

Lab 4.2.3 Analyzing Network Traffic Objective Device Designation Device Name Address Subnet Mask Discovery Server Network Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1 255.255.0.0 255.255.255.0 PC1 Host1 10.0.0.200 255.255.255.0 PC2 Host2 10.0.0.201 255.255.255.0 Upon completion of this activity, you will be able to: Identify and describe the network requirements to support file transfer and email applications. 640-802 CCNA Exam Objectives This lab contains skills that relate to the following CCNA exam objectives: Select the components required to meet a network specification. Describe common networked applications, including web applications. All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 7

Expected Results and Success Criteria Before starting this lab, read through the tasks that you are expected to perform. What do you expect the result of performing these tasks will be? What benefits are gained from designing a network to deliver services such as email and FTP before implementing it? What problems could arise if email and FTP services are provided without first planning and designing the network? Background / Preparation FilmCompany is an expanding small advertising company moving into interactive advertising media, including video presentations. This company has just been awarded a large video support contract by the StadiumCompany. With this new contract, FilmCompany expects to see their business grow approximately 70 percent. A part of this expansion requires consideration of the email and FTP services provided by the network. Users expect immediate access to their emails and to the files that they are sharing or updating. In this lab, you will generate some FTP and email traffic on a network and use the Cisco IOS NBAR (Network- Based Application Recognition) feature to identify and examine that traffic. Task 1: Design Network Access to FTP and Email Services Step 1: FTP network considerations File transfer traffic can put high-volume traffic onto the network. This traffic can have a greater effect on throughput than interactive end-to-end connections. Although file transfers are throughput-intensive, they typically have low response-time requirements. As part of the initial characterization of the network, it is important to identify the level of FTP traffic that will be generated. From this information, the network designers can decide on throughput and redundancy requirements. a. List possible file transfer applications that would generate traffic on the FilmCompany network. All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 7

b. List these applications by priority based on response time. 1. 2. 3. 4. 5. c. List these applications by priority based on bandwidth requirements. 1. 2. 3. 4. 5. Step 2: Email network considerations Although customers expect immediate access to their emails, they usually do not expect emails to have network priority over files that they are sharing or updating. Emails are expected to be delivered reliably and accurately. Generally, emails are not throughput-intensive, except when there are enterprise-wide mail-outs or there is a denial of service attack. List some email policies that could control the volume of email data and the bandwidth used. Step 3: Configure and connect the host PCs NOTE: If the PCs used in this lab are also connected to your Academy LAN or to the Internet, ensure that you record the cable connections and TCP/IP settings so that these can be restored at the conclusion of the lab. a. Set the IP addresses for PC1 and PC2 as shown in the configuration table. b. Establish a terminal session to router R1 from one of the PCs, and configure the interfaces and hostname as shown in the configuration table. Task 2: Configure NBAR to Examine Network Traffic Step 1: Enable NBAR Protocol Discovery NBAR can determine which protocols and applications are currently running on a network. NBAR includes the Protocol Discovery feature, which identifies the application protocols operating on an interface so that appropriate QoS policies can be developed and applied. To enable Protocol Discovery to monitor selected protocols on a router interface, issue the following commands from the global configuration mode: FC-CPE-1(config)#interface fastethernet 0/0 FC-CPE-1(config-if)#ip nbar protocol-discovery All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 7

Step 2: Confirm that Protocol Discovery is configured From the privileged EXEC mode, issue the show running-config command and confirm that the following output appears under interface FastEthernet 0/0: interface FastEthernet0/0 ip address 10.0.0.1 255.255.255.0 ip nbar protocol-discovery If protocol-discovery is not confirmed, reissue the configuration commands for interface FastEthernet 0/0. Task 3: Generate and Identify Network Traffic Step 1: Generate FTP traffic The Mozilla Thunderbird email client program will be downloaded from Discovery Server as an example of FTP. a. On PC1, launch a web browser and enter the URL ftp://server.discovery.ccna, Alternatively, from the command line, enter ftp server.discovery.ccna. If DNS is not configured the IP address 172.17.1.1 must be used instead of the domain name. b. Locate the file thunderbird_setup.exe in the pub directory, download the file, and save it on PC1. Repeat this step for PC2. Step 2: Generate Email traffic If the Thunderbird email client has been installed and email accounts set up on both PC1 and PC2, proceed to Step 2d. Otherwise, install and set up the email client on PC1 and PC2 as described in Steps 2a through 2c. a. Install the Thunderbird email client on PC1 and PC2 by double-clicking the downloaded thunderbird_setup.exe file and accepting the default settings. b. When the installation has completed, launch the program. c. Configure email account settings as shown in this table. Field Account Name Your Name E-mail address Type of incoming server you are using Incoming Server (SMTP) 172.17.1.1 Outgoing Server (SMTP) 172.17.1.1 Value The account name is based on the pod and host computer. There are a total of 20 accounts configured on Discovery Server, labeled user[1..20].the password for each account is cheetah[1..20]. Use the same name as above. username@server.discovery.ccna POP 1) On the Tools menu, click Account Settings. All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 7

2) 3) Complete the required Thunderbird Account Settings. In the left pane of the Account Settings screen, click Server Settings and complete the necessary details. 4) In the left pane, click Outgoing Server (SMTP) and complete the proper configuration for the Outgoing Server (SMTP). All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 7

d. Send and receive two emails between accounts on each PC. Step 3: Display the NBAR results With Protocol Discovery enabled, any protocol traffic supported by NBAR, as well as the statistics associated with that protocol, can be discovered. a. To display the traffic identified by NBAR, issue the show ip nbar protocol-discovery command from the privileged EXEC mode. FC-CPE-1#show ip nbar protocol-discovery The output will have the following headings: FastEthernet0/0 Input Output ----- ------ Protocol Packet Count Packet Count Byte Count Byte Count 5min Bit Rate (bps) 5min Bit Rate (bps) 5min Max Bit Rate (bps) 5min Max Bit Rate (bps) --------------------- ------------------------ ------------------------ b. List each protocol identified and the Input and Output information. All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 7

c. Although the data traffic in this lab may not be sufficient to generate values for the 5min Bit rate (bps) and 5min Max Bit Rate (bps) fields, consider and discuss how these values would be applied to designing an FTP and email network. Step 4: Use NBAR to monitor other data traffic NBAR can identify and monitor a range of network application traffic protocols. From the privileged EXEC mode of the router, issue the command show ip nbar port-map and note the output displayed. FC-CPE-1#show ip nbar port-map List some protocols that you consider should be monitored and policies applied to. Step 5: Clean up Erase the configurations and reload the routers and switches. Disconnect and store the cabling. For PC hosts that are normally connected to other networks (such as the school LAN or to the Internet), reconnect the appropriate cabling and restore the TCP/IP settings. Challenge This lab considered only the volume of FTP and email data traffic and its impact on network design. Reliable access to servers is also important. In the space below, sketch a revised topology for this lab that would provide redundancy for these services. All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 7