当前位置:网站首页>IP and TCP packet capture analysis experiment

IP and TCP packet capture analysis experiment

2020-12-08 14:06:44 osc_ xu7n68ts

IP and TCP Packet capture analysis experiment

IP  and  TCP  Packet capture analysis experiment

The topology IP  and  TCP  Packet capture analysis experiment
chart 1-1

notes : If there is no special instruction , Description of the R1 or SW1 The number at the end of the device name in the corresponding topology is 1 The equipment , R2 or SW2 The number at the end of the device name in the corresponding topology is 2 The equipment , And so on

The experimental requirements

  • To configure IP Address ,R1 Of g0/0 The mouth is 1.1.1.1/24,R2 Of g0/0 The mouth is 1.1.1.2/24

  • Open the grab bag on the chain

  • stay R1 On ping R2

  • Turn on wireshark, View captured ping The contents of the package

  • stay R2 Upper opening FTP service

  • stay R1 Visit R2 Of FTP

  • Refresh wireshark, View captured FTP Login name and password of

Experimental solution
1. Modify the device name

step 1 : stay R1 Go to system view on , Change the device name to R1


<H3C>system-view  System View: return to User View with Ctrl+Z. [H3C]sysname R1 [R1] 

step 2 : stay R2 Go to system view on , Change the device name to R2


<H3C>system-view  System View: return to User View with Ctrl+Z. [H3C]sysname R2 [R2] 

2. To configure IP Address

step 1 : stay R1 Go up into g0/0 Interface view of the interface , To configure IP The address is 1.1.1.1/24


[R1]interface g0/0 [R1-GigabitEthernet0/0]ip address 1.1.1.1 24 

step 2 : stay R2 Go up into g0/0 Interface view of the interface , To configure IP The address is 1.1.1.1/24


[R2]interface g0/0 [R2-GigabitEthernet0/0]ip address 1.1.1.2 24 

3. Open the grab bag

step 1 : Right click on the R1 and R2 Connected links , Click on Open the grab bag , Pictured 1-2 Shown
IP  and  TCP  Packet capture analysis experiment

chart 1-2
4. stay R1 On PING R2

[R1]ping 1.1.1.2 Ping 1.1.1.2 (1.1.1.2): 56 data bytes, press CTRL_C to break 56 bytes from 1.1.1.2: icmp_seq=0 ttl=255 time=1.000 ms 56 bytes from 1.1.1.2: icmp_seq=1 ttl=255 time=1.000 ms 56 bytes from 1.1.1.2: icmp_seq=2 ttl=255 time=0.000 ms 56 bytes from 1.1.1.2: icmp_seq=3 ttl=255 time=1.000 ms 56 bytes from 1.1.1.2: icmp_seq=4 ttl=255 time=1.000 ms
5. Turn on Wireshark, View captured Ping Package content

step 1 : It opens at HCL Right side sidebar , Right click on the GE0/0 Interface , And click the start-up Wireshark, Pictured 1-3 Shown
IP  and  TCP  Packet capture analysis experiment

chart 1-3

step 2 : stay Wireshark You can see the packets caught in , What's highlighted in purple is Ping package , Pictured 1-4 Shown
IP  and  TCP  Packet capture analysis experiment

chart 1-4
step 3 : Double click on a Ping package , View package details , an Internet Protocol Version 4, You can see the details of IP Header format , Pictured 1-5 Shown
IP  and  TCP  Packet capture analysis experiment

chart 1-5

6. stay R2 Upper opening FTP service , Create user wangdaye, password 123456


[R2]ftp server enable  [R2]local-user wangdaye class manage  New local user added. [R2-luser-manage-wangdaye]password simple 123456 [R2-luser-manage-wangdaye]authorization-attribute user-role level-15 [R2-luser-manage-wangdaye]service-type ftp

7. stay R1 Visit FTP service , Enter your username and password

Be careful ::FTP The login function can only be used in the user view


<R1>ftp 1.1.1.2 Press CTRL+C to abort. Connected to 1.1.1.2 (1.1.1.2).220 FTP service ready. User (1.1.1.2:(none)): wangdaye331 Password required for wangdaye. Password: 230 User logged in. Remote system type is UNIX.Using binary mode to transfer files. 

8. Refresh Wireshark, I found that I had caught FTP Login name and password of , Pictured 1-6 Shown

IP  and  TCP  Packet capture analysis experiment
chart 1-6

Technology
Technique
yes
use
Come on
learn
Of
,
No
yes
use
Come on
closed
hidden
Of















Regor has built a wechat group , Friends who are not in the group , Yes, Gargo wechat ( Note unit + full name )

Before entering the group, forward this picture and text to the circle of friends , Add the screenshot to regor , Pull the group immediately !

There is a high-quality attitude to the course
We have helped tens of thousands of netizens to solve the problem of tutorial needs
The course is only for learning and communication , Prohibited for commercial transactions

Guess you like
Previous selections ▼
Cisco Simulator GNS3 How to turn a router into a switch
Learn Huawei routing switching from scratch | OSPF Silent interface


Study hard , Work hard , Let youth be more glorious

Another long way , One step at a time , The shortest way , You can't get there without your feet

版权声明
本文为[osc_ xu7n68ts]所创,转载请带上原文链接,感谢
https://chowdera.com/2020/12/20201208140613952y.html