CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs



Similar documents
1 PC to WX64 direction connection with crossover cable or hub/switch

1. Hardware Installation

Computer Networks I Laboratory Exercise 1

Pre-lab and In-class Laboratory Exercise 10 (L10)

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

1 crossover cable. the PCs. network

3.5 EXTERNAL NETWORK HDD. User s Manual

Configuring TCP/IP Networking for Windows Me:

enervista UR Setup Software Quick Connect Instructions:

Lab - Configure a Windows 7 Firewall

Lab Configuring Access Policies and DMZ Settings

Lab - Configure a Windows Vista Firewall

Lab Configuring Access Policies and DMZ Settings

Enabling Internet Connection Sharing on Windows Enabling ICS On Windows XP As The Host 4 Enabling ICS On Windows XP As The Client 11

EDGE FX Network configuration

Prestige 314 Read Me First

Lab Conducting a Network Capture with Wireshark

DSL-2600U. User Manual V 1.0

In this lab you will explore the Windows XP Firewall and configure some advanced settings.

Self Help Guide IMPORTANT! Configuring Your Router With Your Modem. Please read the following carefully; This Guide refers to the following Products:

CCNA Discovery Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

Table of Contents. 0. Internet Connectivity Assumptions Identifying the Network Wall Jack Identifying the Ethernet Cable..

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications

Quick Installation Guide Network Management Card

Lab - Configure a Windows XP Firewall

Network & Internet Installation & Information Guide Fall 2004 Edition. Campus Ethernet For PCs using Windows 2000 & XP

MaxSea TimeZero NN3D Radar Connection Checklist

Self Help Guide. Please read the following carefully; Synopsis: Requirements: A Computer with a working RJ45 LAN Port All Belkin Modem Routers

Prestige 650R-31/33 Read Me First

StarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking

Linksys Gateway SPA2100-SU Manual

Using a simple crossover RJ45 cable, you can directly connect your Dexter to any computer.

Chapter 15: Advanced Networks

Lab 2 - Basic Router Configuration

How to configure DVR and computer for running Remote Viewer via IP network

Broadband Router ESG-103. User s Guide

Prestige 660R-6x Read Me First

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab

ACT High Speed WiMAX Internet

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

Internet Guide. Prepared for 55 John Street

c. Securely insert the Ethernet cable from your cable or DSL modem into the Internet port (B) on the WGT634U. Broadband modem

Ultra Thin Client TC-401 TC-402. Users s Guide

Application Note Configuring the UGate 3000 for use with ClipMail Pro and ClipExpress

Volume AGKSOFT. Wayne Nucleus Back Office Software. Nucleus Guide

Setup Manual and Programming Reference. RGA Ethernet Adapter. Stanford Research Systems. Revision 1.05 (11/2010)

Debugging Network Communications. 1 Check the Network Cabling

V.I.P. Kit. Video Insight Pilot Kit. (Video Insight Pilot Kit).

Chapter 2 Preparing Your Network

Lab PC Network TCP/IP Configuration

7 6.2 Windows Vista / Windows IP Address Syntax Mobile Port Windows Vista / Windows Apply Rules To Your Device

ON HOLD ANNOUNCER. Once you receive your audio announcer, check the packaging to ensure that all of the following items are enclosed:

ADSL MODEM. User Manual V1.0

Basics of Port Forwarding on a Router for Security DVR s

Configuring a Trimble Sps 461 using the Ethernet Connection GETTING THE GPS ON THE NETWORK HTTP PORT. By Bob Glover

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version /2004

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

HYPERLINK Internet PC setup guide. HYPERLINK Internet support helpdesk at

Manual Wireless Extender Setup Instructions. Before you start, there are two things you will need. 1. Laptop computer 2. Router s security key

If you never used nor intend to use the wired-connection, then please disregard the following info.

DSL Installation Guide

Prestige 324. Prestige 324. Intelligent Broadband Sharing Gateway. Version 3.60 January 2003 Quick Start Guide

a) Network connection problems (check these for existing installations)

Configuring the WT-4 for ftp (Infrastructure Mode)

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Guideline for setting up a functional VPN

Setting up VPN Access for Remote Diagnostics Support

Actiontec GT784WN Router

Multi-Homing Dual WAN Firewall Router

VinNOW-TSYS Integration Setup

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Lab - Using Wireshark to View Network Traffic

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo

Chapter 7 Troubleshooting

NetLINE Wireless Broadband Gateway

Prestige 623R-T. Quick Start Guide. ADSL Dual-link Router. Version 3.40

RAPID BROADBAND INSTALLATION RAPID BROADBAND SUPPORT CONTACT DETAILS. AND TROUBLESHOOTING GUIDE. Tel:

Broadband Router User s Manual

SETTING UP REMOTE ACCESS FOR Q-SEE DVR SYSTEMS MODEL NUMBER: QC40198

Using Cisco UC320W with Windows Small Business Server

Lab 1: Network Devices and Technologies - Capturing Network Traffic

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Networking your DVR Made Easy

Quick Note 53. Ethernet to W-WAN failover with logical Ethernet interface.

Setting up and creating a Local Area Network (LAN) within Windows XP by Buzzons

Guide to Setting up Internet Connection Sharing for Windows

Omni 56K USB Lite Quick Start Guide

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T PIN6 T PIN7 R+ PIN8 R-

Cisco Cable DVB/DAVIC Management Program

Classroom Management network FAQ and troubleshooting

Compulite File Server

Ethernet Radio Configuration Guide

ipad Installation and Setup

Prestige 324 Quick Start Guide. Prestige 324. Intelligent Broadband Sharing Gateway. Version V3.61(JF.0) May 2004 Quick Start Guide

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Preparing the Windows version of the software for use

Section 5: Installing the Print Driver

SNAP Printer Web Server Users Manual

Transcription:

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min) Observe the configuration of each of the NICs for each computer 4 (10 min) Statically configure an IP address and subnet mask for each computer 5 (15 min) Verify connections in your network with ping 6 (15 min) Examine non-existent IP address and subnet conflicts 7 (15 min) Introducing Ethereal, a packet capture tool 7B Examine packet capture on a Hub 8 Sniffing the network for passwords with Ethereal Each team of two students will use the following components for this experiment: 2 computers with Microsoft Windows 2000 Professional 1 Cisco Systems Catalyst 2900 Series Switch and 1 Cisco Systems Fast Hub 400 2 Ethernet Cables Ethereal Network Analyzer Software Each student will be in command of one computer. Task 1 - Verify that TCP/IP is installed on each of the computers 1. Looking at the desktop window, find the icon labeled My Network Places. Right click on this icon and select "Properties." 2. A window named Network and Dial-up Connections will appear with an icon named Local Area Connection. Right click on this icon and again select "Properties." 3. Another window called "Local Area Connection Properties" will appear that has a white area with three items listed. One of these should be Internet Protocol (TCP/IP). Verify that this item is checked. If it is not, please do so.

4. Select OK to exit Task 2 - Connect the computers together via a switch 1. Observe the icon Local Area Connection in Network and Dial-up Connections. We will compare this icon to that in step 7.. 2. In the back of the computer there will be a slot that looks much like a phone cord slot. This is actually an RJ-45 connection that is meant for Ethernet cables. This port is part of a card that is plugged into the motherboard of the system. It is commonly referred to as a NIC, or Network Interface Controller. The card that you will be using is capable of transfers up to 100 Megabits per second, also referred to as the transfer rate. 3. Each computer has been supplied with one Ethernet cable. Plug one end of this cable into the RJ-45 port. Listen for a click from the end of the cable to tell you that it is plugged in all the way. 4. Locate the switch that has also been supplied. There is one switch for each group of two computers. Plug the other end of the Ethernet cable into one of the ports on the switch. The ordering of ports does not matter. 5. Turn on the switch when all computers have been plugged in. 6. The switch will go through a boot up process, so there will be a sequence of lights switching on and off. These lights will begin as orange, and for the ports that are connected correctly, they will turn green after the boot up sequence is completed. Verify that the ports that are connected do indeed turn green. 7. Observe the difference in the Local Area Connection icon. Task 3 - Observe the configuration of the NIC(s) for each computer 1. Click on the Start button at the lower left of the computer screen and select "Run..." 2. In the field, type cmd This will allow for a command prompt window to appear. 3. Type in ipconfig /all and press enter. 4. There is a lot of information that is returned, but we are interested in only a few items at this time. In particular, we would like to know whether DHCP is enabled, the IP address of the interface, and the Subnet Mask. Fill in the following table with values from the information that is returned. DHCP enabled? IP address of interface Subnet Mask Dynamic Host Configuration Protocol (DHCP) is a protocol that is used to allocate an IP address to each interface that requests one. In particular, a DHCP server sends this information to the DHCP client. In our current setup, there is no such server. Configuring IP addresses will, thus, need to be done manually.

Task 4 - Statically configure an IP address and subnet mask for each computer 1. Again navigate to "Local Area Connection Properties" as in Task 1. 2. Double click "Internet Protocol (TCP/IP)". Select Use the following IP address. 3. Input to the fields the IP address shown on the top of the monitor. Clear the Default Gateway and DNS Server fields and click on OK for both windows. 4. Verify that the IP Address for the computer has indeed changed. To do this, execute the "ipconfig /all" command again. Task 5 - Verify connections in your network with ping Once each of you have set up the configuration correctly, it is time to verify that all computers are on the same network, and can indeed communicate with each other. There is one commonly used command that can verify communication between hosts. This command is called ping. 1. Connect your team's switch with another team's via a crossover cable provided by the lab proctor (in order to ping all 4 hosts). 2. Type ping X in the command prompt where X is one of the IP addresses of the four computers in your network. 3. Repeat for each of the four IP addresses. 4. Fill in the following table with values returned after each execution. IP Address 192.168.0.5 Success Time Out Unreachable Packet Sent Received Lost Minimum Maximum Average 192.168.0.6 192.168.0.7 192.168.0.8

Task 6 - Examine non-existent IP address and subnet conflicts 1. Change the IP addresses according to the following table. Note that the Subnet Mask remains the same as before. Computer 1 Computer 2 Computer 3 Computer 4 Subnet Mask 192.168.1.10 192.168.0.11 192.168.1.12 192.168.2.13 255.255.255.0 2. Ping all 4 computers. Fill in the following table with values returned after each execution. IP Address 192.168.1.10 Success Time Out Unreachable Packet Sent Received Lost Minimum Maximum Average 192.168.0.11 192.168.1.12 192.168.2.13 3. Explain the results. Are they what you expected? 4. Ping an address that is in your subnet but is not connected, for example 192.168.0.253. Is the result different from the Step 2? Explain. Task 7 - Introducing Ethereal We will be running one particular application, Ethereal. It can capture all the packets that are transmitted to and from your Ethernet interface. Once it has finished capturing, it will display the packets in a list ordered by a value that can be changed like time, protocol, or source. We will first capture network traffic generated by ping which uses ICMP (Internet Control Messaging Protocol). 1. Set the computers' IP addresses as follows. Computer 1 Computer 2 Computer 3 Computer 4 IP Address 192.168.0.5 192.168.0.6 192.168.0.7 192.168.0.8 Launch Ethereal. The icon is on the desktop. 2. To begin capturing packets, under the Capture menu choose Start. 3. Verify that the first, fourth, fifth, and sixth options after the Capture Length are selected. 4. Note that many packets can be collected within a short time after Capture is started. It is best to start capturing only right before you do a transfer of packets that you want to

analyze. In this case, you need to be ready to ping before start capturing. When you are ready, click OK to start collecting packets. 5. Ping all 4 hosts on the network. 6. Stop capturing by the click Stop button in Ethereal when you have completed pinging all the hosts click. 7. Wait until Ethereal loads all the captured packets onto the screen. 8. Order the packets according to Protocol by clicking on Protocol column heading. 9. Scroll down in the upper window to packets that are ICMP. Note that in the Info column, there are basically two types of ICMP packets that were transferred. What were these two types of ICMP packets? 10. Click on the first row of the ICMP packets. This should be a request packet and should have the source listed as the IP address/name of your computer, and the destination listed as the address/name you first pinged. The middle and bottom screens should have changed to represent the content of that particular packet. Note that the bottom screen is primarily listed as a hexadecimal representation of the binary bits of the packet, though the rightmost column also lists the contents in an ASCII format. 11. In the middle window, expand the content by clicking on the + within the boxes. Note that you can contract the content again by clicking on the - within the boxes. 12. Fill in the table below. All information can be found within the middle screen for this packet. Arrival Time Source IP Address Destination MAC Address Internet Protocol Version # Sequence # 13. Now click on the second row of the ICMP packet. This should be the reply packet from the host that you pinged in the previous packet. Fill in the table below with the information for this reply packet. Arrival Time Source IP Address Destination MAC Address Internet Protocol Version # Sequence # 14. Note that when clicking on something in the middle of the screen the actual bits of the packet are highlighted in the bottom screen. This is both done in hexadecimal and in ASCII. 15. In ASCII, what are the 32 bytes of data that fill the end of either of these packets? 16. What packets besides those generated by ping do you see? What generated these packets?

EXTRA CREDIT #1: Task 7B Examine packet capture on a Hub In this experiment we will capture packets while connected to a hub instead of a switch and examine the differences between the results. 1. Remove each Ethernet plug from the switch and plug it into the Fast Hub 400. Push until you hear a click. 2. Ping your neighbor to verify that you can see them. 3. There will a long cord connecting the switches used in the last exercise. Remove this plug and place it in the Hub just as with the other cords. The Hub should already be on. Wait for each port to turn Green. 4. Prepare to ping the other computers before starting to capture packets. 5. Capture packets just like in Task 7 steps 2-7 6. Order the packets according to Protocol by clicking on Protocol column heading. 7. What packets besides those generated by ping do you see? How does this differ from the switches and why? EXTRA CREDIT #2: Task 8 Sniffing application layer protocols using Ethereal This experiment requires the Windows 2000 PCs have Internet Information Services installed (specifically the FTP service). This has already been done for you on all the machines. Password sniffing 1. Open a command prompt. 2. Start Ethereal to capture network traffic. 3. FTP to your partner s PC. 4. Use user name = anonymous, password = your email id. 5. Stop network traffic capturing in Ethereal. 6. Search for the packets where the password is found in plain text.