Activity: Ethernet Frame Analysis
Part I
Note
Before performing the following tasks, make sure that your virtual switch setup, i.e. launch Virtualbox and boot all your VM's > starting with the instructor router, followed by r1 and r2 and finally web and ws1. Verify that traffic is traversing the bridge in r1.
- Launch Wireshark
 - Select Capture from the toolbar, and in the dropdown select options.
 - In the dialog that pops up, select 
Virtualbox Host-Only Network #2from the interface list - In the input box at the bottom of the dialog pane (labelled "Capture filter for selected interfaces:") type "
ether multicast" - Click on Start. The capture will begin. Let it run for about a minute, then stop the capture
 
Tip
In the filter input box at the top of Wireshark window, type "stp" and press Enter
- Select one of the filtered packets and examine it. Do you notice anything different in how Wireshark displays it?
 - What are the three fields of the ethernet header?
 - Examine the destination MAC address. Where did you see this address before?
 - Still looking at the destination MAC address, expand it and examine the contents inside. What type of address is it?
 - Similarly, examine the source MAC address. What are the characteristics of this address?
 
Part II
- Log into each of web, ws1, r1 and r2 and flush the arp cache in each.
 - Run 
arp -n
to display the arp entries - Run 
sudo ip -s -s neigh flush all
to delete all entries in the cache- Alternatively you can delete entries individually by running 
sudo arp -d [ip_address] 
 - Alternatively you can delete entries individually by running 
 - In ws1, r1 and r2, execute a packet capture as follows: 
sudo tcpdump arp -w [capture_file_name]
where[capture_file_name]isws1_capture.pcap,r1_capture.pcapandr2_capture.pcapfor ws1, r1 and r2 respectively - In web, send a few ping probes to ws1 and 8.8.8.8
 - Stop the captures
 - Copy the capture files to your host and examine them with Wireshark.
- Create a folder on your host called "captures" in a suitable location, then in Powershell navigation to that folder just created.
 - In Powershell run: 
scp admin@[vm_ip_address]:[capture_file_name] ./
to copy the specified capture file into the "captures" folder (if you ssh configuration is set up correctly, you can run something likescp r1:r1_capture.pcap ./) - Alternatively, you may use 
sftp 
 
Tip
The three capture files each contain ARP packets even though the ping probes were only send to ws1 and google name server. Why?
- Select one of the ARP packet and examine its contents.
 - What is the destination MAC address? What type of address is it?
 - What is the value of the EtherType field?
 - Expand the contents of the ARP protocol:
 - What is the Protocol type? Why?
 - What is the Target MAC address? Notice anything unusual about it? Why?