Lab name: Remote Management Switch
Lab Topology
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/45/BC/wKioL1PqLMiRZgnIAADtn6fZiFI952.jpg "Title =" image001.png "alt =" wkiol1pqlmirzgniaadtn6fzifi952.jpg "/>
Tutorial steps:
(1) configure the host and connect the vro to the entire network.
(2) configure the vswitch
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/45/BA/wKiom1PqK73juNiqAAIJ5_gVI5Y259.jpg "Title =" image002.png "alt =" wkiom1pqk73juniqaaij5_gvi5y259.jpg "/>
(3) Verify the remote management of vswitches on hosts whose IP address is 192.168.2.2.
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/45/BC/wKioL1PqLOPQv-R5AAFgR3Fz1S8705.jpg "Title =" image003.jpg "alt =" wKioL1PqLOPQv-R5AAFgR3Fz1S8705.jpg "/>
Conclusion: the Key of the experiment is to first achieve network interconnection, and then focus on the configuration of the switch, save the IP address after configuration, and set the password.
Use of the packet capture tool
Experiment Name: Use of TCP protocol analysis tool
Topology implementation
Tutorial steps:
(1) Build an FTP server so that the client can successfully access the server
(2) install Wireshark packet capture software on the client
(3) Open Wireshark software and click Start.
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/45/BA/wKiom1PqLBLDT26pAAGjOA8nGy8977.jpg "style =" float: none; "Title =" image004.png "alt =" wkiom1pqlbldt26paagjoa8ngy8977.jpg "/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/45/BA/wKiom1PqLBKxP3fqAAGliKZlyBY373.jpg "style =" float: none; "Title =" image005.png "alt =" wkiom1pqlbkxp3fqaaglikzlyby373.jpg "/>
(4) access the FTP server-close-stop in the packet capture menu
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/45/BA/wKiom1PqLCqCURTgAACgl7fIQEI436.jpg "style =" float: none; "Title =" image006.png "alt =" wkiom1pqlcqcurtgaacgl7fiqei436.jpg "/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/45/BA/wKiom1PqLCqyZPDpAAHaDfrYSTc002.jpg "style =" float: none; "Title =" image007.jpg "alt =" wkiom1pqlcqyzpdpaahadfrystc002.jpg "/>
(5) Find the data whose source is the client host IP address protocol is TCP
-Open the corresponding transport layer.-view the SYN value.
1) first handshake
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/45/BC/wKioL1PqLanhZyNhAAJ1JTTKjtA361.jpg "style =" float: none; "Title =" image008.jpg "alt =" wkiol1pqlanh1_haaj1jttkjta361.jpg "/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/45/BB/wKiom1PqLJCBoSjxAAD0dwz_XLU445.jpg "style =" float: none; "Title =" image009.png "alt =" wkiom1pqljcbosjxaad0dwz_xlu445.jpg "/>
2) second handshake
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/45/BB/wKiom1PqLLOww7l6AAMpygSWM8g319.jpg "Title =" image010.png "alt =" wkiom1pqloww7l6aampygswm8g319.jpg "/>
3) The third handshake
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/45/BC/wKioL1PqLeDRSkoyAAI-rgnluwo019.jpg "Title =" image011.jpg "alt =" wKioL1PqLeDRSkoyAAI-rgnluwo019.jpg "/>
Conclusion: The focus of the experiment is to analyze the packet capture data. First, we can see the source and target addresses, as well as the SYN and ACK values, which are the first handshakes.