Cisco and Wireshark
Cisco and Wireshark
Cisco and Wireshark
Cisco Packet Tracer is a widely-used network simulation tool that helps network professionals to
design, configure, and troubleshoot networks in a safe, virtual environment. This tool simulates
network protocols and devices, allowing users to experiment with different network topologies,
configurations, and scenarios without needing physical hardware.
Cisco Packet Tracer gets used by network professionals, students, and educators.
Using Packet Tracer, users gain hands-on experience with networking concepts and technologies,
which can help them develop essential skills and knowledge for building a career in IT and networking.
What Is Wireshark?
Wireshark is a network protocol analyzer, or an application that captures packets from a network
connection, such as from your computer to your home office or the internet. Packet is the name given
to a discrete unit of data in a typical Ethernet network.
Wireshark is the most often-used packet sniffer in the world. Like any other packet sniffer, Wireshark
does three things:
1.Packet Capture: Wireshark listens to a network connection in real time and then grabs entire
streams of traffic – quite possibly tens of thousands of packets at a time.
2.Filtering: Wireshark is capable of slicing and dicing all of this random live data using filters.
By applying a filter, you can obtain just the information you need to see.
3.Visualization: Wireshark, like any good packet sniffer, allows you to dive right into the very
middle of a network packet. It also allows you to visualize entire conversations and network
streams.
Packet sniffing can be compared to spelunking – going inside a cave and hiking around. Folks who use
Wireshark on a network are kind of like those who use flashlights to see what cool things they can find.
After all, when using Wireshark on a network connection (or a flashlight in a cave), you’re effectively
using a tool to hunt around tunnels and tubes to see what you can see.
Those new to information security can use Wireshark as a tool to understand network traffic analysis,
how communication takes place when particular protocols are involved and where it goes wrong when
certain issues occur.
First of all, it can’t help a user who has little understanding of network protocols. No tool, no matter
how cool, replaces knowledge very well. In other words, to properly use Wireshark, you need to learn
exactly how a network operates. That means, you need to understand things such as the three-way TCP
handshake and various protocols, including TCP, UDP, DHCP and ICMP.
Second, Wireshark can’t grab traffic from all of the other systems on the network under normal
circumstances. On modern networks that use devices called switches, Wireshark (or any other standard
packet-capturing tool) can only sniff traffic between your local computer and the remote system it is
talking to.
Third, while Wireshark can show malformed packets and apply color coding, it doesn’t have actual
alerts; Wireshark isn’t an intrusion detection system (IDS).
Fourth, Wireshark can’t help with decryption with regards to encrypted traffic.
And finally, it is quite easy to spoof IPv4 packets. Wireshark can’t really tell you if a particular IP
address it finds in a captured packet is a real one or not. That requires a bit more know-how on the part
of an IT pro, as well as additional software.
As the figure shows, the router thought a common destination was unreachable. This was discovered by
drilling down into the IPv6 Internet Message Control Protocol (ICMP) traffic, which is marked in
black. In Wireshark, any packet marked in black is considered to reflect some sort of issue.
Figure: Drilling down into a packet to identify a network problem using Wireshark
In this case, Wireshark helped determine that the router wasn’t working properly and couldn’t find
YouTube very easily. The problem was resolved by restarting the cable modem. Of course, while this
particular problem didn’t necessitate using Wireshark, it’s kind of cool to authoritatively finalize the
issue.
When you take another look at the bottom of Figure you can see that a specific packet is highlighted.
This shows the innards of a TCP packet that is part of a transport layer security (TLS) conversation.
This is a great example of how you can drill down into the captured packet.
Using Wireshark doesn’t allow you to read the encrypted contents of the packet, but you can identify
the version of TLS the browser and YouTube are using to encrypt things. Interestingly enough, the
encryption shifted to TLS version 1.2 during the listening.
Wireshark is often used to identify more complex network issues. For example, if a network
experiences too many retransmissions, congestion can occur. By using Wireshark, you can
By using Wireshark, you can identify specific retransmission issues, as shown below in Figure.
.
Figure: Viewing packet flow statistics using Wireshark to identify retransmissions
By confirming this type of issue, you can then reconfigure the router or switch to speed up traffic.