Packet Tracer Simulation - TCP and UDP Communications (Instructor Version Optional Packet Tracer)



Similar documents
CCNA Discovery Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

Lab - Using Wireshark to View Network Traffic

Lab - Observing DNS Resolution

Lab Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

BASIC ANALYSIS OF TCP/IP NETWORKS

Lab - Configure a Windows Vista Firewall

Update Instructions

Lab - Configure a Windows 7 Firewall

Lab Configure Cisco IOS Firewall CBAC

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Hands-on Network Traffic Analysis Cyber Defense Boot Camp

Multi-Homing Dual WAN Firewall Router

INTRODUCTION TO FIREWALL SECURITY

Qvis Security Technical Support Field Manual LX Series

Lab 3.4.2: Managing a Web Server

Packet Tracer - Connecting a Wired and Wireless LAN Topology

Easy Setup Guide for the Sony Network Camera

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

Lab - Observing DNS Resolution

Basic Exchange Setup Guide

Lab Conducting a Network Capture with Wireshark

Lab 1: Packet Sniffing and Wireshark

Lab - Configure a Windows XP Firewall

Cisco Configuring Commonly Used IP ACLs

Firewall Defaults and Some Basic Rules

Configuring your client to connect to your Exchange mailbox

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

6.0. Getting Started Guide

Cisco Packet Tracer 6.3 Frequently Asked Questions

SFTP Server User Login Instructions. Open Internet explorer and enter the following url:

Lab Configuring Access Policies and DMZ Settings

Tunnels and Redirectors

Module 1: Reviewing the Suite of TCP/IP Protocols

Computer Networks I Laboratory Exercise 1

Packet Tracer - Subnetting Scenario 1 (Instructor Version)

Lab Configuring Access Policies and DMZ Settings

CALL CENTER AGENT CCA APPLICATION GUIDE

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: Rev 6

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5

Basic Firewall Lab. Lab Objectives. Configuration

User guide. Business

Lab Developing ACLs to Implement Firewall Rule Sets

Networking Guide Redwood Manager 3.0 August 2013

Configuring Trend Micro Content Security

FINS Gateway For OMRON PLCs

Setup Guide. network support pc repairs web design graphic design Internet services spam filtering hosting sales programming

Special Note Ethernet Connection Problems and Handling Methods (CS203 / CS468 / CS469)

In this lab you will explore the Windows XP Firewall and configure some advanced settings.

How do I load balance FTP on NetScaler?

SonicWALL GMS Custom Reports

Parallels Plesk Panel

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Basic Exchange Setup Guide

Chapter 3 Using Access Control Lists (ACLs)

ABB solar inverters. User s manual ABB Remote monitoring portal

Wireshark Tutorial INTRODUCTION

Introduction to Network Security Lab 1 - Wireshark

Users Manual. Super Silent Client. Super Silent Client Users Manual Piravi Software Solutions. Document Revision 1.

Webmail Instruction Guide

Faculty/Staff instructions for connecting to the Hood College VPN to gain access to your office computer

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo

Grapevine Mail User Guide

Lab 7.1.9b Introduction to Fluke Protocol Inspector

Lab 1: Network Devices and Technologies - Capturing Network Traffic

Lab Diagramming Intranet Traffic Flows

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Application Monitoring using SNMPc 7.0

Update Instructions

PaperClip. em4 Cloud Client. Manual Setup Guide

Deployment Guide: Transparent Mode

Network Load Balancing

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance

C-more Remote Access with Apple ipad or iphone Tutorial

Mondopad v1.6. Quick Start

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Microsoft Exchange Mailbox Software Setup Guide

Configure A VoIP Network

Virtual Appliance for VMware Server. Getting Started Guide. Revision Warning and Disclaimer

TC 3/10 Rev. A

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

VisuSniff: A Tool For The Visualization Of Network Traffic

Applicazioni Telematiche

Lab Editing the HOSTS File in Windows

Implementing Network Address Translation and Port Redirection in epipe

PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram

MFC7840W Windows Network Connection Repair Instructions

Desktop Client Application User Guide

A S B

Kaseya Server Instal ation User Guide June 6, 2008

1. Firewall Configuration

Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Application Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0

SSL VPN Portal Options

Setting up in Outlook Express

Immotec Systems, Inc. SQL Server 2005 Installation Document

UIP1868P User Interface Guide

Proxies. Chapter 4. Network & Security Gildas Avoine

Transcription:

(Instructor Version Optional Packet Tracer) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or to provide additional practice. Topology Objectives Part 1: Generate Network Traffic in Simulation Mode Part 2: Examine the Functionality of the TCP and UDP Protocols Background This simulation activity is intended to provide a foundation for understanding the TCP and UDP in detail. Simulation mode provides the ability to view the functionality of the different protocols. As data moves through the network, it is broken down into smaller pieces and identified in some fashion so that the pieces can be put back together. Each of these pieces is assigned a specific name (protocol data unit [PDU]) and associated with a specific layer. Packet Tracer Simulation mode enables the user to view each of the protocols and the associated PDU. The steps outlined below lead the user through the process of requesting services using various applications available on a client PC. This activity provides an opportunity to explore the functionality of the TCP and UDP protocols, multiplexing and the function of port numbers in determining which local application requested the data or is sending the data. Part 1: Generate Network Traffic in Simulation Mode Step 1: Generate traffic to populate Address Resolution Protocol (ARP) tables. Perform the following tasks task to reduce the amount of network traffic viewed in the simulation. a. Click MultiServer and click the Desktop tab > Command Prompt. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 6

b. Enter the ping 192.168.1.255 command. This will take a few seconds as every device on the network responds to MultiServer. c. Close the MultiServer window. Step 2: Generate web (HTTP) traffic. a. Switch to Simulation mode. b. Click HTTP Client and click the Desktop tab > Web Browser. c. In the URL field, enter 192.168.1.254 and click Go. Envelopes (PDUs) will appear in the simulation window. d. Minimize, but do not close, the HTTP Client configuration window. Step 3: Generate FTP traffic. a. Click FTP Client and click the Desktop tab > Command Prompt. b. Enter the ftp 192.168.1.254 command. PDUs will appear in the simulation window. c. Minimize, but do not close, the FTP Client configuration window. Step 4: Generate DNS traffic. a. Click DNS Client and click the Desktop tab > Command Prompt. b. Enter the nslookup multiserver.pt.ptu command. A PDU will appear in the simulation window. c. Minimize, but do not close, the DNS Client configuration window. Step 5: Generate Email traffic. a. Click E-Mail Client and click the Desktop tab > E Mail tool. b. Click Compose and enter the following information: 1) To: user@multiserver.pt.ptu 2) Subject: Personalize the subject line 3) E-Mail Body: Personalize the Email c. Click Send. d. Minimize, but do not close, the E-Mail Client configuration window. Step 6: Verify that the traffic is generated and ready for simulation. Every client computer should have PDUs listed in the Simulation Panel. Part 2: Examine Functionality of the TCP and UDP Protocols Step 1: Examine multiplexing as all of the traffic crosses the network. You will now use the Capture/Forward button and the Back button in the Simulation Panel. a. Click Capture/Forward once. All of the PDUs are transferred to the switch. b. Click Capture/Forward again. Some of the PDUs disappear. What do you think happened to them? They are stored in the switch. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 6

c. Click Capture/Forward six times. All clients should have received a reply. Note that only one PDU can cross a wire in each direction at any given time. What is this called? Multiplexing. d. A variety of PDUs appears in the event list in the upper right pane of the simulation window. Why are they so many different colors? They represent different protocols. e. Click Back eight times. This should reset the simulation. Note: Do not click Reset Simulation any time during this activity; if you do, you will need to repeat the steps in Part 1. Step 2: Examine HTTP traffic as the clients communicate with the server. a. Filter the traffic that is currently displayed to display only HTTP and TCP PDUs filter the traffic that is currently displayed: 1) Click Edit Filters and toggle the Show All/None check box. 2) Select HTTP and TCP. Click anywhere outside of the Edit Filters box to hide it. The Visible Events should now display only HTTP and TCP PDUs. b. Click Capture/Forward. Hold your mouse above each PDU until you find one that originates from HTTP Client. Click the PDU envelope to open it. c. Click the Inbound PDU Details tab and scroll down to the last section. What is the section labeled? TCP Yes. d. Record the SRC PORT, DEST PORT, SEQUENCE NUM, and ACK NUM values. What is written in the field to the left of the WINDOW field? 1025 (could be different), 80, 0, 0 SYN e. Close the PDU and click Capture/Forward until a PDU returns to the HTTP Client with a checkmark. 80, 1025, 0, 1. SYN+ACK. The source and destination ports are reversed, and the acknowledgement number is 1. The SYN has changed to SYN+ACK. g. There is a second PDU of a different color, which HTTP Client has prepared to send to MultiServer. This is the beginning of the HTTP communication. Click this second PDU envelope and select Outbound PDU Details. h. What information is now listed in the TCP section? How are the port and sequence numbers different from the previous two PDUs? 1025, 80, 1, 1. PSH+ACK The source and destination ports are reversed, and both sequence and acknowledgement numbers are 1. i. Click Back until the simulation is reset. Step 3: Examine FTP traffic as the clients communicate with the server. a. In the Simulation Panel, change Edit Filters to display only FTP and TCP. b. Click Capture/Forward. Hold your cursor above each PDU until you find one that originates from FTP Client. Click that PDU envelope to open it. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 6

c. Click the Inbound PDU Details tab and scroll down to the last section. What is the section labeled? TCP Yes. d. Record the SRC PORT, DEST PORT, SEQUENCE NUM, and ACK NUM values. What is written in the field to the left of the WINDOW field? 1025, 21, 0, 0. SYN e. Close the PDU and click Capture/Forward until a PDU returns to the FTP Client with a checkmark. 21, 1025, 0, 1. SYN+ACK. The source and destination ports are reversed, and the acknowledgement number is 1. g. Click the Outbound PDU Details tab. How are the port and sequence numbers different from the previous two results? 1025, 21, 1, 1. ACK. The source and destination ports are reversed, and both sequence and acknowledgement numbers are 1. h. Close the PDU and click Capture/Forward until a second PDU returns to the FTP Client. The PDU is a different color. i. Open the PDU and select Inbound PDU Details. Scroll down past the TCP section. What is the message from the server? May say either Username ok, need password or Welcome to PT Ftp server j. Click Back until the simulation is reset. Step 4: Examine DNS traffic as the clients communicate with the server. a. In the Simulation Panel, change Edit Filters to display only DNS and UDP. b. Click the PDU envelope to open it. c. Click the Inbound PDU Details tab and scroll down to the last section. What is the section labeled? UDP No d. Record the SRC PORT and DEST PORT values. Why is there no sequence and acknowledgement number? 1025, 53. Because UDP does not need to establish a reliable connection. e. Close the PDU and click Capture/Forward until a PDU returns to the DNS Client with a checkmark. 53, 1025. The source and destination ports are reversed. g. What is the last section of the PDU called? DNS ANSWER. h. Click Back until the simulation is reset. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 6

Step 5: Examine email traffic as the clients communicate with the server. a. In the Simulation Panel, change Edit Filters to display only POP3, SMTP and TCP. b. Click Capture/Forward. Hold your cursor above each PDU until you find one that originates from E-mail Client. Click that PDU envelope to open it. c. Click the Inbound PDU Details tab and scroll down to the last section. What transport layer protocol does email traffic use? TCP Yes. d. Record the SRC PORT, DEST PORT, SEQUENCE NUM, and ACK NUM values. What is written in the field to the left of the WINDOW field? 1025, 25, 0, 0. SYN e. Close the PDU and click Capture/Forward until a PDU returns to the E-Mail Client with a checkmark. 25, 1025, 0, 1. SYN+ACK. The source and destination ports are reversed, and the acknowledgement number is 1. g. Click the Outbound PDU Details tab. How are the port and sequence numbers different from the previous two results? 1025, 25, 1, 1. ACK. The source and destination ports are reversed, and both sequence and acknowledgement numbers are 1. ACK h. There is a second PDU of a different color that HTTP Client has prepared to send to MultiServer. This is the beginning of the email communication. Click this second PDU envelope and select Outbound PDU Details. i. How are the port and sequence numbers different from the previous two PDUs? 1025, 25, 1, 1. PSH+ACK. The source and destination ports are reversed, and both sequence and acknowledgement numbers are 1. j. What email protocol is associated with TCP port 25? What protocol is associated with TCP port 110? SMTP. POP3. k. Click Back until the simulation is reset. Step 6: Examine the use of port numbers from the server. a. To see TCP active sessions, perform the following steps in quick succession: 1) Switch back to Realtime mode. 2) Click MultiServer and click the Desktop tab > Command Prompt. b. Enter the netstat command. What protocols are listed in the left column? TCP What port numbers are being used by the server? Answers will vary, but students may see all three: 21, 25, 80. They should certainly see 21 c. What states are the sessions in? Answer will vary. Possible states include CLOSED, ESTABLISHED, LAST_ACK 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 6

d. Repeat the netstat command several times until you see only one session still ESTABLISHED. For which service is this connection still open? FTP Why doesn t this session close like the other three? (Hint: Check the minimized clients) The server is waiting for a password from the client. Suggested Scoring Rubric Activity Section Question Location Possible Points Earned Points Part 2: Examine Functionality of the TCP and UDP Protocols Step 1 15 Step 2 15 Step 3 15 Step 4 15 Step 5 15 Step 6 25 Total Score 100 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 6