# Activity: Ethernet Frame Analysis ## Part I :::info Before performing the following tasks, make sure that your virtual switch setup, i.e. launch Virtualbox and boot all your VM's starting with the instructor router, followed by **r1** and **r2** and finally **web** and **ws1**. Verify that traffic is traversing the bridge in **r1**. ::: - Launch Wireshark - Select **Capture** from the toolbar, and in the dropdown select options. - In the dialog that pops up, select **`Virtualbox Host-Only Network #2`** from the interface list - In the input box at the bottom of the dialog pane (labelled "**Capture filter for selected interfaces:**") type "`ether multicast`" - Click on Start. The capture will begin. Let it run for about a minute, then stop the capture :::success :bulb: In the filter input box at the top of Wireshark window, type "stp" and press Enter - Select one of the filtered packets and examine it. Do you notice anything different in how Wireshark displays it? - What are the three fields of the ethernet header? - Examine the destination MAC address. Where did you see this address before? - Still looking at the destination MAC address, expand it and examine the contents inside. What type of address is it? - Similarly, examine the source MAC address. What are the characteristics of this address? ::: ## Part II - Log into each of **web**, **ws1**, **r1** and **r2** and flush the arp cache in each. - Run <br /> `arp -n` <br /> to display the arp entries - Run <br /> `sudo ip -s -s neigh flush all` <br /> to delete all entries in the cache - Alternatively you can delete entries individually by running <br /> `sudo arp -d [ip_address]` - In __ws1__, **r1** and **r2**, execute a packet capture as follows: <br /> `sudo tcpdump arp -w [capture_file_name]` <br /> where ``[capture_file_name]`` is `ws1_capture.pcap`, `r1_capture.pcap` and `r2_capture.pcap` for **ws1**, **r1** and **r2** respectively - In __web__, send a few ping probes to __ws1__ and 8.8.8.8 - Stop the captures - Copy the capture files to your host and examine them with Wireshark. - Create a folder on your host called "captures" in a suitable location, then in Powershell navigation to that folder just created. - In Powershell run: <br /> `scp admin@[vm_ip_address]:[capture_file_name] ./` <br /> to copy the specified capture file into the __"captures"__ folder (if you ssh configuration is set up correctly, you can run something like `scp r1:r1_capture.pcap ./` ) - Alternatively, you may use __`sftp`__ :::success :bulb: The three capture files each contain ARP packets even though the ping probes were only send to ws1 and google name server. Why? - Select one of the ARP packet and examine its contents. - What is the destination MAC address? What type of address is it? - What is the value of the __EtherType__ field? - Expand the contents of the ARP protocol: - What is the Protocol type? Why? - What is the __Target MAC address__? Notice anything unusual about it? Why?