Activity: Ethernet Frame Analysis
Part I
Note
Before performing the following tasks, make sure that your virtual switch setup, i.e. launch Virtualbox and boot all your VM's > starting with the instructor router, followed by r1 and r2 and finally web and ws1. Verify that traffic is traversing the bridge in r1.
- Launch Wireshark
- Select Capture from the toolbar, and in the dropdown select options.
- In the dialog that pops up, select
Virtualbox Host-Only Network #2from the interface list - In the input box at the bottom of the dialog pane (labelled "Capture filter for selected interfaces:") type "
ether multicast" - Click on Start. The capture will begin. Let it run for about a minute, then stop the capture
Tip
In the filter input box at the top of Wireshark window, type "stp" and press Enter
- Select one of the filtered packets and examine it. Do you notice anything different in how Wireshark displays it?
- What are the three fields of the ethernet header?
- Examine the destination MAC address. Where did you see this address before?
- Still looking at the destination MAC address, expand it and examine the contents inside. What type of address is it?
- Similarly, examine the source MAC address. What are the characteristics of this address?
Part II
- Log into each of web, ws1, r1 and r2 and flush the arp cache in each.
- Run
arp -n
to display the arp entries - Run
sudo ip -s -s neigh flush all
to delete all entries in the cache- Alternatively you can delete entries individually by running
sudo arp -d [ip_address]
- Alternatively you can delete entries individually by running
- In ws1, r1 and r2, execute a packet capture as follows:
sudo tcpdump arp -w [capture_file_name]
where[capture_file_name]isws1_capture.pcap,r1_capture.pcapandr2_capture.pcapfor ws1, r1 and r2 respectively - In web, send a few ping probes to ws1 and 8.8.8.8
- Stop the captures
- Copy the capture files to your host and examine them with Wireshark.
- Create a folder on your host called "captures" in a suitable location, then in Powershell navigation to that folder just created.
- In Powershell run:
scp admin@[vm_ip_address]:[capture_file_name] ./
to copy the specified capture file into the "captures" folder (if you ssh configuration is set up correctly, you can run something likescp r1:r1_capture.pcap ./) - Alternatively, you may use
sftp
Tip
The three capture files each contain ARP packets even though the ping probes were only send to ws1 and google name server. Why?
- Select one of the ARP packet and examine its contents.
- What is the destination MAC address? What type of address is it?
- What is the value of the EtherType field?
- Expand the contents of the ARP protocol:
- What is the Protocol type? Why?
- What is the Target MAC address? Notice anything unusual about it? Why?