Posts Tagged ‘wireshark’

Understanding and Implementing Flow Control on Dell Force10 Switches

Monday, January 28th, 2013

Ethernet flow control allows for a receiving node to temporarily stop the transmission of data from the sending node. As defined by IEEE 802.3x this is accomplished via the PAUSE frame. (more…)

Twitt

Trunking and DHCP Across Dell Force10 Switches

Tuesday, October 16th, 2012

I did this lab some time back and thought it would be useful to post. In this lab I use a Dell Force10 S25P (FTOS 8.4.2.6) switch and Dell Force10 S50N (FTOS 8.4.2.6) switch to demonstrate trunking and Dynamic Host Configuration Protocol (DHCP) for multiple subnets. Both of these switches are layer 2/3 switches, however, I use the S25P to do all the routing and use the S50N strictly as a layer 2 switch. (more…)

Twitt

Gratuitous ARP and Basics of Connecting a Cisco IOS Switch with a Cisco CatOS Switch

Monday, October 15th, 2012

Cisco Catalyst C4003

Cisco Catalyst C4003

Some of you may have an old Cisco Catalyst switch laying around that you may want to put to use. CatOS is the old Cisco operating system for Catalyst switches that predates IOS; it can still be found on some of the old Catalyst switches which are now End of Life (EOL). In this lab I connect a Cisco Catalyst 3548-XL (Model WS-C3548-XL-EN) [IOS 12.0(5)WC13] with a Cisco Catalyst 4003 chassis (Model WS-C4003) [CatOS 5.5(20)] to demonstrate basic configuration and switching between the two. Gratuitous ARP is also discussed and demonstrated in this lab. The setup is as shown in the below lab diagram. (more…)

Twitt

Port Monitoring on Force10 Switches

Friday, July 15th, 2011

In this lab I will demonstrate how to do port monitoring on Force10 switches and capture the packets using a network protocol analyzer (Wireshark in this case). Port monitoring allows the copying of all incoming/outgoing packets on a specific port to be mirrored/forwarded to another port where a network protocol analyzer is attached to analyze the traffic. Port monitoring is sometimes also referred to as packet sniffing, and, as you have probably guessed, packet sniffing can be used for malicious purposes. For the majority though port monitoring or packet sniffing is used for a variety of troubleshooting, security, and reporting tasks. (more…)

Twitt