Lab 4.2 - Introduction To Wireshark
Lab 4.2 - Introduction To Wireshark
Mininet Topology
Objectives
Part 1: Install and Verify the Mininet Topology
Part 2: Capture and Analyze ICMP Data in Wireshark
Background / Scenario
The CyberOps VM includes a Python script that, when you run it, will set up and configure the devices shown
in the figure above. You will then have access to four hosts, a switch, and a router inside your one VM. This
will allow you to simulate a variety of network protocols and services without having to configure a physical
network of devices. For example, in this lab you will use the ping command between two hosts in the Mininet
Topology and capture those pings with Wireshark.
Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network troubleshooting,
analysis, software and protocol development, and education. As data streams travel over the network, the
sniffer "captures" each protocol data unit (PDU) and can decode and analyze its content according to the
appropriate RFC or other specifications.
Wireshark is a useful tool for anyone working with networks for data analysis and troubleshooting. You will
use Wireshark to capture ICMP data packets.
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 20 www.netacad.com
Lab - Introduction to Wireshark
Required Resources
• CyberOps Workstation virtual machine
Instructions
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 20 www.netacad.com
Lab - Introduction to Wireshark
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 20 www.netacad.com
Lab - Introduction to Wireshark
b. At the prompt on Node: H1, enter ip address to verify the IPv4 address and record the MAC address. Do
the same for Node: H2. The IPv4 address and MAC address are highlighted below for reference.
[root@secOps analyst]# ip address
<output omitted>
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 20 www.netacad.com
Lab - Introduction to Wireshark
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 20 www.netacad.com
Lab - Introduction to Wireshark
a. On Node: H1, enter wireshark & to start Wireshark (The pop-up warning is not important for this lab.).
Click OK to continue.
[root@secOps]# wireshark &
[1] 1552
[root@secOps ~]#
** (wireshark:1552): WARNING **: Couldn't connect to accessibility bus:
Failed to connect to socket /tmp/dbus-f0dFz9baYA: Connection refused
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 6 of 20 www.netacad.com
Lab - Introduction to Wireshark
c. On Node: H1, press the Enter key, if necessary, to get a prompt. Then type ping -c 5 10.0.0.12 to ping
H2 five times. The command option -c specifies the count or number of pings. The 5 specifies that five
pings should be sent. The pings will all be successful.
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 7 of 20 www.netacad.com
Lab - Introduction to Wireshark
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 8 of 20 www.netacad.com
Lab - Introduction to Wireshark
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 9 of 20 www.netacad.com
Lab - Introduction to Wireshark
f. If necessary, click the first ICMP request PDU frames in the top section of Wireshark. Notice that the
Source column has H1’s IP address, and the Destination column has H2’s IP address.
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 10 of 20 www.netacad.com
Lab - Introduction to Wireshark
g. With this PDU frame still selected in the top section, navigate to the middle section. Click the arrow to the
left of the Ethernet II row to view the Destination and Source MAC addresses.
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 11 of 20 www.netacad.com
Lab - Introduction to Wireshark
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 12 of 20 www.netacad.com
Lab - Introduction to Wireshark
Question:
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 13 of 20 www.netacad.com
Lab - Introduction to Wireshark
Note: In the preceding example of a captured ICMP request, ICMP data is encapsulated inside an IPv4
packet PDU (IPv4 header) which is then encapsulated in an Ethernet II frame PDU (Ethernet II header)
for transmission on the LAN.
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 14 of 20 www.netacad.com
Lab - Introduction to Wireshark
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 15 of 20 www.netacad.com
Lab - Introduction to Wireshark
c. Start a new Wireshark capture on H1 by selecting Capture > Start. You can also click the Start button or
type Ctrl-E Click Continue without Saving to start a new capture.
d. H4 is a simulated remote server. Ping H4 from H1. The ping should be successful.
[root@secOps analyst]# ping -c 5 172.16.0.40
e. Review the captured data in Wireshark. Examine the IP and MAC addresses that you pinged. Notice that
the MAC address is for the R1-eth1 interface. List the destination IP and MAC addresses.
Question:
IP address:
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 16 of 20 www.netacad.com
Lab - Introduction to Wireshark
172.16.0.40.
MAC address:
This will be associated with the R1-eth1 interface, which is the default gateway for the hosts H1,
H2, and H3 in this LAN.
f. In the main CyberOps VM window, enter quit to stop Mininet.
mininet> quit
*** Stopping 0 controllers
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 17 of 20 www.netacad.com
Lab - Introduction to Wireshark
*** Done
g. To clean up all the processes that were used by Mininet, enter the sudo mn -c command at the prompt.
analyst@secOps ~]$ sudo mn -c
[sudo] password for analyst:
*** Removing excess controllers/ofprotocols/ofdatapaths/pings/noxes
killall controller ofprotocol ofdatapath ping nox_core lt-nox_core ovs-openflowd ovs-
controller udpbwtest mnexec ivs 2> /dev/null
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 18 of 20 www.netacad.com
Lab - Introduction to Wireshark
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 19 of 20 www.netacad.com
Lab - Introduction to Wireshark
End of document
© 2018 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 20 of 20 www.netacad.com