In this lab, you will learn how to use several different applications and interfaces to identify and document an IP network design and schema. Chief among these is PuTTY, which you used in Lab #1. The primary use of PuTTY is to establish Telnet and SSH sessions to remote servers. You will use PuTTY to collect information about those resources. You will also use Wireshark to capture packet data from the sessions you establish with PuTTY.
Upon completing this lab, you will be able to:
• Develop a plan for identifying and documenting the logical IP network design and IP addressing schema based on data collected from Lab #1 • Use PuTTY to establish Telnet and SSH to …show more content…
2. To start the Wireshark application, double-click on the Wireshark icon on the desktop. 3. When the Wireshark window appears, click the Citrix Systems link in the area marked “Interface
List.” This tells Wireshark which interface to monitor for activity. In this case, you are capturing data from the virtual environment. In a production environment, you would see a list of interfaces corresponding to the resources available in that environment (servers, nodes, etc.).
The Wireshark window
Once you select Citrix Systems, Wireshark begins capturing data, which you will see as lines of information in the application window.
8/30/12 7:51 PM
LAB #2 | Network Documentation
4. Minimize the Wireshark application window. 5. Start the Windows Command Prompt by clicking Start > Run and typing cmd in the dialog box.
To collect data for analysis, Wireshark must have a stream of incoming packets to capture. The next steps cover how to feed IP packets to Wireshark using ping, Telnet, and Secure Shell (SSH) connections. These connections generate packets on the virtual environment interface, which are then captured by Wireshark.
6. From the Windows Command Prompt application window, type ping 172.30.0.8 and press Enter. Note
the Reply responses, which indicate the two-way passage of