IP Network Troubleshooting Part 3. Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services - KAMU

Similar documents
Fundamentals of IP Networking 2017 Webinar Series Part 4 Building a Segmented IP Network Focused On Performance & Security

Fundamentals of IP Networking 2017 Webinar Series Part 5 Cybersecurity Fundamentals & Securing the Network

Network packet analyzer Wireshark

So What is WireShark?

Broadcast Infrastructure Cybersecurity - Part 2

Computer Networks Security: intro. CS Computer Systems Security

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark

Tools Needed: - PC with Wireshark installed ( - An Ethernet hub or a managed switch with Port mirroring capability

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

Packet Analysis - Wireshark

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

IP Multicast: Does It Really Work? Wayne M. Pecena, CPBE, CBNE

Introduction to OSI model and Network Analyzer :- Introduction to Wireshark

Packet Capture & Wireshark. Fakrul Alam

Configuring your VLAN. Presented by Gregory Laffoon

K2289: Using advanced tcpdump filters

Lab 4: Network Packet Capture and Analysis using Wireshark

Protocol Analysis: Capturing Packets

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

Cisco EXAM CCNA Cisco Certified Network Associate. Buy Full Product.

Network Analyzer :- Introduction to Wireshark

Lab 3.3 Configuring Wireshark and SPAN

CUCM MediaSense Call Recording Error Troubleshooting

ITTC Communication Networks Laboratory The University of Kansas EECS 563 Introduction to Protocol Analysis with Wireshark

Experiment 2: Wireshark as a Network Protocol Analyzer

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Cloud 101. Wayne M. Pecena, CPBE, CBNE Texas A&M University - KAMU

Lab Using Wireshark to Examine Ethernet Frames

Packet Capture Wireshark Fakrul Alam

COMP2330 Data Communications and Networking

ITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark

Wireshark. Why we need to capture packet & how it s related to security? 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

Internetwork Basic. Possible causes of LAN traffic congestion are

Network Forensics (wireshark) Cybersecurity HS Summer Camp

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.

Hands-On Network Security: Practical Tools & Methods

A Simple Network Analyzer Decoding TCP, UDP, DNS and DHCP headers

Principles behind data link layer services:

Introduction to Wireshark

A quick tutorial on using tshark

Lab Using Wireshark to Examine Ethernet Frames

Lab - Using Wireshark to Examine TCP and UDP Captures

Network Reference Models

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Gigabit Networks, VLANs & Wireless LANs

Introduction to TCP/IP networking

Imi :... Data:... Nazwisko:... Stron:...

Wireshark Lab: Getting Started v6.0

Introducing Cisco Data Center Networking Course DCICN v1.0; 4 Days, Instructor-led

Lab 1: Packet Sniffing and Wireshark

EE 610 Part 2: Encapsulation and network utilities

Cisco Nexus 7000 Series Architecture: Built-in Wireshark Capability for Network Visibility and Control

University of Maryland Baltimore County Department of Information Systems Spring 2015

Networking By: Vince

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

TCP /IP Fundamentals Mr. Cantu

Lab Exercise Protocol Layers

Introduction to Troubleshooting TCP/IP Networks with Wireshark

Appendix B Policies and Filters

Getting Started with the VG248

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

20-CS Cyber Defense Overview Fall, Network Basics

ch02 True/False Indicate whether the statement is true or false.

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Defining Networks with the OSI Model. Module 2

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

NETWORK PACKET ANALYSIS PROGRAM

Study Guide. Module Two

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Protocol Analysis: Capturing Packets

Trace Collection Guidelines

The following steps should be used when configuring a VLAN on the EdgeXOS platform:

TECHNICAL INTRODUCTION...2 BRIEF TECHNICAL INTRODUCTION...2 SUPPORTED PROTOCOLS...2 High-Level Protocols...2 Low-Level Protocols...2 REQUIREMENTS...

CSC 401 Data and Computer Communications Networks

Networking Background

A hacker in a hoodie with leather gloves tapping a glowing blue lock icon on a transparent touchscreen with ones and zeroes raining down in green

Wireshark Lab: Getting Started v7.0

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Wireshark- Looking into the Packet. Henry A. McKelvey, MIS. Blacks in Technology

UDP, TCP, IP multicast

Network sniffing packet capture and analysis

2. What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet? A. NAT B.

To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet.

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Student Lab Manual. Student Lab Manual. Network Communications Infrastructure IS3120

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

Cisco Cisco Certified Network Associate (CCNA)

CONTENTS IN DETAIL ACKNOWLEDGMENTS INTRODUCTION 1 PACKET ANALYSIS AND NETWORK BASICS 1 2 TAPPING INTO THE WIRE 17 3 INTRODUCTION TO WIRESHARK 35

EXAM Interconnecting Cisco Networking Devices Part 1 (ICND1) v3. For More Information:

The ACK and NACK of Programming

What You Need to Know About IP Networking Tutorial

Wireshark: Network Forensic Exercise by Fakrul Alam, Bangladesh CERT

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

Raj Jain. The Ohio State University Columbus, OH

Transcription:

IP Network Troubleshooting Part 3 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services - KAMU February 2016

Today s Outline: Focused Upon Protocol Analysis with Wireshark Review of Wireshark Basics & How to Capture Network Traffic Creating Custom Wireshark Views Creating Custom Pre & Post Wireshark Filters Detailed Capture Analysis Examples Alternatives to Wireshark & Why Might These Might Be Considered Additional Useful Tools Takeaways, Questions, and Maybe Some Answers 2

Review of Wireshark Basics & How to Capture Network Traffic 3

Obtain & Install Wireshark Available for Windows, Mac OSx, & Linux Download (current v2.0.1): www.wireshark.org Be Sure to Include Libraries: WinPcap (Windows) Libpcap (Unix/Linux) Install Start Wireshark Select Interface Click Start CTRL+E will Stop You Have Created a PCAP File! View & Analyze Results Save For Later Analysis

Wireshark Host Requirements Windows 10, 8, 7, Vista, Server 2016, Server 2012, Server 2008 R2, and Server 2008 Apple OSx, Debian GNU/Linux, FreeBSD, Mandriva Linux, NetBSD, Red Hat Enterprise/Fedora Linux, and several others.. 64-bit AMD64/x86-64 or 32-bit x86 processor. 400 MB available RAM. Larger capture files require more RAM. 300 MB available disk space. Capture files require additional disk space. 1024 768 (1280 1024 or higher recommended) resolution / 16 bit color minimum. A supported Network Interface Keep in Mind: Don t Use Your Old Retired PC As an Wireshark Capture Host Capturing on a 100 Mbps network can produce hundreds of megabytes of capture data in a very short time. A fast processor, lots of memory and disk space is always a good idea. 5

Captured Packet(s) Selected Header Data Decoded Payload Data Decoded Hexadecimal & ASCII

Application Presentation Session Transport Layer 3 Device Application Presentation Session Transport Network Layer 2 Device Network Network Layer 2 Device Network Data Link Data Link Data Link Data Link Data Link Data Link Data Link Data Link Physical Physical Physical Physical Physical Physical Physical Physical 7

Encapsulation OSI Model 7 6 5 4 3 2 1 Data Flow Layers Transport Network Data Link Physical Protocol Data Unit Segments Packets Frames Bits 8

Where to Tap? Problem Nature Often Determines: At Problem Host At Destination Host Mid-Network Locations Accessibility May Also Drive Tap Point Remember: Interfaces are Bi-Directional

How to Tap Ethernet & Capture Packets Can Be Challenging! How to Capture? UTP Ethernet: Physical Passive Tap Active Tap Optical Ethernet: Physical Passive Tap Active Tap Ethernet Switch Port Mirror Run Wireshark on Client Host if Possible

Active Tap Devices UTP Taps Optical Taps

Shared Media Approach 100 Mbps Maximum Half-Duplex Only Host Device A Ethernet Hub Host Device B Commonplace In Wireless Environment Wireshark Capture Host It Was Simpler In The Past Half-Duplex Shared Media Networks Not Commonplace Today 12

Switched Media Approach Host Device A Ethernet Switch Host Device B Normal Ethernet Switch Operation Prevents Network Traffic Between Host A and Host B To-Be-Seen by the Wireshark Capture Host Wireshark Capture Host 13

Switched Media Hub Approach Host Device A Ethernet Switch Ethernet Hub Host Device B Works, But Downgrading Network To Half-Duplex Ethernet Switch Now Sees 2-MAC Addresses (problem if switch-port security is enabled) Wireshark Capture Host 14

Switched Media Tap Approach Host Device A Ethernet Switch Ethernet Tap Host Device B?? Works, But Often Costly Especially When GigE UTP Or Optical Network Involved Wireshark Capture Host 15

Switched Media Monitor Port Approach Host Device A Ethernet Switch Monitor Port Enabled Host Device B Monitor Port Recommended Approach (where possible) Wireshark Capture Host 16

Keep In Mind! Host Device A Ethernet Switch Monitor Port Enabled Host Device B 500 Mbps Network Traffic 500 Mbps Network Traffic Monitor Port 1000 Mbps Network Traffic Limitations: Bad Frames Not Mirrored No VLAN Tags Passed Caution With RTP Network Traffic Wireshark Capture Host Remember: Tapping a Network Can Be Challenging! 17

Cisco Ethernet Switch SPAN Port Host A Host B Port 1 Port 23 config t Switched Port Analyzer (SPAN) Port Port 14 monitor session 1 source interface fa0/1 monitor session 1 source interface fa0/23 monitor session 1 destination interface fa0/14 exit Wireshark Host

HP Procurve Ethernet Switch Port Mirror Host A Host B Port 1 Port 23 HP Procurve 2915 Port 14 Mirror or Monitor Port config mirror-port 14 int 1, monitor (int 1-12, monitor) int 23, monitor Wireshark Host show monitor exit

Creating Custom Wireshark Views 20

frame 192 selected Header Details Displayed Payload Data Decoded (hex & ASCII)

View Screen Layouts 22

Default View Colors 23

Customize Columns 24

Creating Custom Pre & Post Wireshark Filters 25

Filtering Capture Filters Selectively Capture Packets Pre-Capture Configuration Minimizes Amount of Captured Data Display Filters Applied When Viewing Allows Focusing on Attribute(s) All Data is Retained Which One to Use? Reason for Capturing Dictates Proper Filter Use Use Capture Filter When You Know What You Are Looking For Remember: You Can t Display What Has Not Been Captured!

Using Capture Filters 27

Useful Capture (pcap) Filter Examples ip tcp udp host 165.95.240.130 host 165.95.240.128/26 host 165.95.240.128 mask 255.255.255.192 src net 165.95.240.128/26 dst net 165.95.240.128/26 port 80 not broadcast and not multicast http://www.tcpdump.org/manpages/pcap-filter.7.html 28

Using Display Filters 29

Useful Display Filter Examples eth.addr==00:19:c8:c8:22:7f ip ip.addr==165.95.240.130 ip.addr==165.95.240.130 or ip.addr==165.95.240.129 tcp tcp.port==80 udp udp.port==50000 http http://www.firstdigest.com/2009/05/wiresharks-most-useful-display-filters/ 30

Detailed Capture Analysis Examples 31

TCP 3-Way Handshake SYN ACK SYN, ACK Find the 1 st SYN Packet: Edit>Find Packet Enter tcp.flags.syn==1 Right Click on Packet Select Follow TCP Stream 32

ICMP Example 33

Streaming Media Example 34

Wireshark Statistics 35

Alternatives to Wireshark & Why Might These Might Be Considered 36

Fluke Networks Clearsight 37

http://www.riverbed.com/products/steelcentral/steelcentral-packet-analyzer-personal-edition.html http://www.klos.com/products/packetvault/ 38

Additional Useful Tools 39

zenmap nmap security scanner GUI https://nmap.org/zenmap/ 40

Wireless Networks & Wireshark Wireless is challenging! Most 802.11 Network Adapters Do Not Support Promiscuous Mode If Promiscuous Mode is Available You Only See Packets To-From the Host Running Wireshark! You Must Select RF Channel (Wireshark capture options) You Will Only See Packets on That RF Channel Extensively Use Capture Filters! Focus Upon a Specific Client 41

Takeaways, Questions, and Maybe Some Answers 42

Takeaway Points & Concepts: Parts 1-3 Establish a Structured Troubleshooting Approach Avoid Shooting from the Hip Approach(s) Use the OSI Model as a Guide to a Structured Approach Work You Way Up the IP Stack Verify Layer 1 Physical Connectivity Verify Layer 2 Connectivity is Error Free Verify Layer 3 Inter-Networking Use Protocol Analysis to See Network activity 80% of Network Problems is Physical Infrastructure Based Standards Not Properly Applied Guidelines Not Adhered To Don t Loose Sight of 100m Ethernet UTP Segment Limit! 43

Takeaway Points & Concepts. Use Protocol Analysis to See Network Host Interaction Wireshark Is The Most Popular Protocol Analyzer Understanding the OSI Model & TCP/IP Protocol Action is Key to Understanding Wireshark Results Understand How & Where to Capture Network Activity Filtering is Essential to Find the Needle in the Haystack Capture Filters (minimize captured data) Display Filters (minimize displayed info) Customize Your Wireshark Views Verify Everything Yourself Caution Trusting What You Are Told! 44

References Further Study https://wiki.wireshark.org/ https://www.wireshark.org/docs/wsug_html/

Utilize a Structured Process to Troubleshooting! 46

47

Thank You for Attending! Wayne M. Pecena Texas A&M University wpecena@sbe.org 979.845.5662? Questions? 48