chapter 10

User Generated

Nqrywhzznu

Writing

Description

here are some project and cases I need you to do so it is really clear and organized they all not that hard but you need to do them all in a good quality . thank you so much and do your best

Unformatted Attachment Preview

Hands-On Project 10-1 Examining Traffic on an ISATAP Network Time Required: 15 minutes Objective: In this project, you will examine network traffic between a host and an ISATAP router using ISATAP interfaces. Description: Windows 10 and Windows Server 2012 R2 support ISATAP router functions. The following Hands-On Project shows you Router Solicitation and Router Response transactions between a host and an ISATAP using ISATAP interfaces. You will also examine a DNS query and response for the domain isatap.ipv6sandbox.com. For this project, you need the Wireshark capture file ch10_isatap.pcapng, which contains the related network packet traffic. Your instructor should provide the file, or you may download it from this book’s companion Web site. You also need to refer to the network lab configuration shown in Figure 10-21. This exercise assumes that Wireshark is installed on your computer. Figure 10-21 ISATAP network lab diagram 1. 1. Start Wireshark. (In Windows 7, click the Start button, point to All Programs, and then click Wireshark. In Windows 10, click the Startbutton, click All apps, and then click Wireshark. Alternatively, use the Start menu search box [Windows 7] or the Search box on the taskbar [Windows 10], type Wireshark, and then click Wireshark in the resulting list.) 2. 2. In Wireshark, click File, click Open, and navigate to the ch10_isatap.pcapng capture file. Double-click the file to open it. 3. 3. Expand the Wireshark window and each of the columns in the main pane, so you can see all the listed data clearly, including the Protocol, Length, and Info columns. 4. 4. Scroll down the list of packets (top pane) and select packet #75, which is labeled “Router Solicitation” in the Info column. 5. 5. In the packet details pane (middle pane) of the Wireshark window, expand Internet Protocol Version 6 and Internet Control Message Protocol v6. 6. 6. Under Internet Protocol Version 6, locate the Source fields for both the IPv6 and IPv4 ISATAP addresses of the host sending the solicitation and then locate those IP addresses in the diagram in Figure 10-21. 7. 7. Locate the Destination fields for both the IPv6 and IPv4 ISATAP addresses and locate those addresses in the diagram in Figure 10-21. 8. 8. Make a note as to which network device is the sending source and which device is the destination by both host name and interface index name and number. 9. 9. Under Internet Control Message Protocol v6, locate the Type field and verify that this is a router solicitation. 10. 10. In the packet list (top pane), select packet #76, which is labeled “Router Advertisement” in the Info column. 11. 11. Under Internet Protocol Version 6, locate the Source fields for the IPv6 and ISATAP IPv4 addresses of the source node and then locate those addresses in the diagram in Figure 1021. 12. 12. Under Internet Protocol Version 6, locate the Destination fields for the IPv6 and ISATAP IPv4 addresses of the source node and then locate those addresses in the diagram in Figure 10-21. 13. 13. Make a note as to which network device is the sending source and which device is the destination by both host name and interface index name and number. 14. 14. If necessary, expand Internet Control Message Protocol v6 and, in the Type field, verify that this is a Router Advertisement. 15. 15. Expand ICMPv6 Option (Prefix information) and then locate the Prefixfield and make a note of the prefix. 16. 16. Collapse all the fields you opened. 17. 17. In the packet list, scroll down and select packet #80, which is labeled “Standard query A isatap.ipv6sandbox.com” in the Info column and listed as “DNS” in the Protocol column. 18. 18. Expand Domain Name System (query), expand Queries, and then expand isatap.ipv6sandbox.com to examine the A record DNS query. 19. 19. In the packet list, select packet #81, which is labeled “Standard query response A 10.1.106.1” in the Info column and listed as “DNS” in the Protocol column. 20. 20. Under Domain Name System (response), expand Queries and then expand isatap.ipv6sandbox.com, if necessary, to examine the information contained there. 21. 21. Expand Answers and then expand isatap.ipv6sandbox.com to examine the information contained there, as shown in Figure 10-22. Figure 10-22 DNS query answer for isatap.ipv6sandbox.com 22. 22. Make notes about all the information you have gathered. 23. 23. When you are finished, close Wireshark. Hands-On Project 10-2 Examining a 6to4 Capture File Time Required: 10 minutes Objective: In this project, you will examine a 6to4 capture file illustrating the negotiation of communication between a source and destination node. Description: This project provides a sample 6to4 packet capture for you to examine in order to view and understand the mechanics of node-to-node communication negotiations for the 6to4 transition technology. The ch10_6to4.pcapng sample packet file will be provided by your instructor or can be found at this book’s companion Web site. (The trace file was originally named 6to4.pcap and downloaded from https://wiki.wireshark.org/SampleCaptures.) 1. 1. Start Wireshark. (In Windows 7, click the Start button, point to All Programs, and then click Wireshark. In Windows 10, click the Startbutton, click All apps, and then click Wireshark. Alternatively, use the Start menu search box [Windows 7] or the Search box on the taskbar [Windows 10], type Wireshark, and then click Wireshark in the resulting list.) 2. 2. In Wireshark, click File, click Open, and navigate to the ch10_6to4.pcapng capture file. Double-click the file to open it. 3. 3. If necessary, expand the Wireshark window so that you can see all the columns in the upper pane of Wireshark. 4. 4. Select packet number 5. 5. 5. In the middle pane, expand Internet Protocol Version 4 to see information about the IPv4 header encapsulating the IPv6 packet. 6. 6. Locate the Source and Destination fields, and note the IPv4 addresses assigned to each field. 7. 7. Collapse Internet Protocol Version 4, and expand Internet Protocol Version 6 to see information about the IPv6 packet that has been encapsulated. 8. 8. Locate the Source field and note the IPv6 address assigned to the 6to4 source node. 9. 9. Locate the Source 6to4 Gateway IPv4 field, and note the IPv4 address assigned to the 6to4 gateway router servicing the 6to4 source node. 10. 10. Locate the Destination field, and note the IPv6 address assigned to the destination node. 11. 11. Collapse Internet Protocol Version 6, and expand Transmission Control Protocol. 12. 12. Expand [SEQ/ACK analysis] to see that the node is acknowledging receipt of the packet sent by the other node in the previous frame. 13. 13. Close Wireshark. Hands-On Project 10-3 Examining a Teredo Capture File and Router Solicitation Packet Time Required: 10 minutes Objective: In this project, you will examine a Teredo capture file and explore the details of a Router Solicitation sent by a Teredo network node. Description: This project provides a sample Teredo packet capture for you to use in order to examine and understand Teredo. The ch10_Teredo.pcapng sample packet will either be provided by your instructor or can be found at this book’s companion Web site. (The trace file was originally named Teredo.pcap and downloaded from https://wiki.wireshark.org/SampleCaptures.) 1. 1. Start Wireshark. (In Windows 7, click the Start button, point to All Programs, and then click Wireshark. In Windows 10, click the Startbutton, click All apps, and then click Wireshark. Alternatively, use the Start menu search box [Windows 7] or the Search box on the taskbar [Windows 10], type Wireshark, and then click Wireshark in the resulting list.) 2. 2. In Wireshark, click File, click Open, and navigate to the ch10_Teredo.pcapng capture file. Double-click the file to open it. 3. 3. If necessary, expand the Wireshark window so that you can see all the columns in the upper pane of Wireshark. 4. 4. Select packet number 6, which is identified as “Router Solicitation” in the Info column of the upper pane. 5. 5. In the middle pane, expand Internet Protocol Version 4. 6. 6. Locate the Protocol field, and verify that UDP is the protocol being used. 7. 7. Locate the Source and Destination fields, and note the IPv4 addresses being used. 8. 8. Collapse Internet Protocol Version 4, and expand User Datagram Protocol. 9. 9. Locate the Source port field, and note the port number being used by the UDP packet. 10. 10. Locate the Destination port field, and note that a Teredo-identified port is being used. 11. 11. Collapse User Datagram Protocol, and expand Teredo IPv6 over UDP tunneling. 12. 12. Expand Teredo Authentication header, and note the information there. 13. 13. Collapse Teredo IPv6 over UDP tunneling, and expand Internet Protocol Version 6. 14. 14. Locate the Next header field, and note that it is ICMPv6. 15. 15. Locate the Source field and note that it is an IPv6 local-link address. 16. 16. Locate the Destination field and note the address type. 17. 17. Collapse Internet Protocol Version 6, and expand Internet Control Message Protocol v6. 18. 18. Expand ICMPv6 Option (Source link-layer address), and note the information fields available. 19. 19. Close Wireshark. Case Project 10-1 Preparing a Network for IPv4-to-IPv6 Transition Technology Deployment Your company is preparing to migrate from IPv4 to IPv6, and you are responsible for determining the steps that take the company up to deploying a transition technology. Your company uses Windows 7 and Windows 10 with the latest service packs for client computers as well as Windows Server 2012 and Windows Server 2016 for your server infrastructure. You have determined that there are three critical steps that must occur before deploying a transition technology: 1. 1. Adopt applications that are independent of IP version. 2. 2. Upgrade name resolution services. 3. 3. Upgrade client computers. Briefly define the activities involved in each of these steps. Case Project 10-2 Configuring Windows 7 Clients to Use Teredo You run a computer network support business servicing home/office and small business clients, and one of your SMB clients wants to experiment with IPv4-to-IPv6 migration on the Windows 7 computers in her office. She has done some research and has heard that Windows 7 already supports IPv4/IPv6 dual stack as well as Teredo and ISATAP interfaces. Your client has also learned that Teredo client computers can even communicate through the NAT service running on her company’s gateway. She wants to implement Teredo as a transition technology and asks you what some of the problems are in getting her Windows 7 computers to use Teredo to send IPv6 packets through her company’s gateway router. Case Project 10-3 Diagramming an ISATAP Encapsulated Header As an IPv4-to-IPv6 transition technology, ISATAP allows an ISATAP network node to send an IPv6 packet over an IPv4 network by encapsulating the packet in an IPv4 header without the need for a preestablished tunnel across the IPv4 domain. Once the sending node determines the end point of the ISATAP tunnel, the IPv6 packet is sent to the node’s ISATAP tunneling interface for encapsulation in the IPv4 header, setting the value in the Protocol field to 41, which indicates that the IPv4 header contains an IPv6 packet. When the device at the end point of the tunnel receives the packet, it reads the value of the Protocol field and knows to decapsulate the IPv6 packet from the IPv4 header prior to accessing the Transport layer protocol (TCP or UDP) and sending the application data up the OSI stack. Given this information, create a diagram of the ISATAP packet as it is sent across the tunnel from the source to destination nodes. Include individual cells in the diagram for the application data, the transport header, the IPv6 header, and the IPv4 header. Within the IPv6 and IPv4 headers, include information regarding the Next Header field, Source and Destination address fields, and the Protocol field. The illustration can be a high-level diagram, but it must show each of the fields at its correct location within each header.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello check the solution to this Hands and case.Am currently finalizing on the others

Case Project 10-1

Preparing a Network for IPv4-to-IPv6 Transition Technology Deployment
Case
Your company is preparing to migrate from IPv4 to IPv6, and you are responsible for
determining the steps that take the company up to deploying a transition technology. Your
company uses Windows 7 and Windows 10 with the latest service packs for client computers as
well as Windows Server 2012 and Windows Server 2016 for your server infrastructure. You have
determined that there are three critical steps that must occur before deploying a transition
technology:
1. Adopt applications that are independent of I...


Anonymous
Super useful! Studypool never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags