(i) Preface
This blog post shares the methods associated with GNS3 Wireshark.
It is clear that similar articles have been shared on the web, and this blog is intended to provide a clearer and more detailed process for everyone.
(ii) Preparation
GNS3 Software +wireshark
GNS3 Download: http://pan.baidu.com/s/1o6DRLG2
Wireshark Download: http://pan.baidu.com/s/1qWDhKKk
Links long-term effective, such as failure, please contact the blogger.
(iii) experimental
When both GNS3 and Wireshark are installed, do the following:
1. Open GNS3 "preferences" option
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/59/D7/wKioL1TsoVLguZtFAAFe-t01LfE495.jpg "title=" 1.png " Style= "Float:left;" alt= "wkiol1tsovlguztfaafe-t01lfe495.jpg"/>
2. Go to the "Preferences" window and select "Capture" option
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/59/DB/wKiom1TsoYmxwyWLAAHhjmnokkg003.jpg "title=" 2.png " alt= "Wkiom1tsoymxwywlaahhjmnokkg003.jpg"/>
3. You can see the following window information 650) this.width=650; "Src=" http://s3.51cto.com/wyfs02/M01/59/D7/ Wkiol1tsoznzxszqaahlfl85kpo479.jpg "title=" 3.png "alt=" Wkiol1tsoznzxszqaahlfl85kpo479.jpg "/>
Color window information is what we want to modify (here I have changed in advance), the key is to find the capture package software Wireshark installation path, where Bo Master's Wireshark Software Installation path: C:\Program Files (x86) \wireshark\ Wireshark.exe, note that there is also a "%c" symbol in the back, you must do exactly the same, or you will not be able to start Wireshark (even if installed successfully) on GNS3.
As for the installation path lookup, relatively simple, no longer mentioned here, just stressed that must be filled in the following format:
C:\Program Files (x86) \wireshark\wireshark.exe%c
4. After the setting is complete, you can grab the bag as follows:
(1) Right-click on the link to see the "cature" option
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/59/DB/wKiom1TspTLhanEnAAB5mk6l3vI296.jpg "title=" 4.png " alt= "Wkiom1tsptlhanenaab5mk6l3vi296.jpg"/>
(2) After clicking, select the interface to grab the packet, click the "OK" option
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/59/D7/wKioL1TspnvhpxLbAACs8LkOjgY240.jpg "title=" 5.png " alt= "Wkiol1tspnvhpxlbaacs8lkojgy240.jpg"/>
(3) Enter the Wireshark interface
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/59/DB/wKiom1TspgehYtO8AAL4HOn6eE8178.jpg "title=" 6.png " alt= "Wkiom1tspgehyto8aal4hon6ee8178.jpg"/>
(4) Ping operation on R1 650) this.width=650; "Src=" http://s3.51cto.com/wyfs02/M01/59/D7/ Wkiol1tsp7zcix6daafejw2ofco566.jpg "title=" 7.png "alt=" Wkiol1tsp7zcix6daafejw2ofco566.jpg "/>
(5) Right click on the link at this time
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/59/DB/wKiom1TspyfjIo4WAABnmJRId-Y423.jpg "title=" 8.png " alt= "Wkiom1tspyfjio4waabnmjrid-y423.jpg"/>
There are two options to see:
Stop capturing: Stop grabbing the packet
start Wireshark: Crawl data passed on the link before this operation
Select "Start Wireshark" here
(6) You can enter the Wireshark interface again and see the ping package we just ping
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/59/D7/wKioL1TsqRvhf75ZAAkDzJ-ArpE523.jpg "title=" 9.png " alt= "Wkiol1tsqrvhf75zaakdzj-arpe523.jpg"/>
This experiment completed, if there are operational questions, please leave a message on the blog, bloggers will keep track.
This article is from the "fragrant fluttering leaves" blog, please make sure to keep this source http://xpleaf.blog.51cto.com/9315560/1615125
GNS3 with the Grab kit tool Wireshark