Hands-On Project 10-1
Examining Traffic on an ISATAP Network
Time Required: 15 minutes
Objective: In this project, you will examine network traffic between a host and an
ISATAP router using ISATAP interfaces.
Description: Windows 10 and Windows Server 2012 R2 support ISATAP router
functions. The following Hands-On Project shows you Router Solicitation and Router
Response transactions between a host and an ISATAP using ISATAP interfaces. You will
also examine a DNS query and response for the domain isatap.ipv6sandbox.com. For this
project, you need the Wireshark capture file ch10_isatap.pcapng, which contains the
related network packet traffic. Your instructor should provide the file, or you may
download it from this book’s companion Web site. You also need to refer to the network lab
configuration shown in Figure 10-21. This exercise assumes that Wireshark is installed on
your computer.
Figure 10-21
ISATAP network lab diagram
1. 1.
Start Wireshark. (In Windows 7, click the Start button, point to All Programs, and then
click Wireshark. In Windows 10, click the Startbutton, click All apps, and then
click Wireshark. Alternatively, use the Start menu search box [Windows 7] or the Search
box on the taskbar [Windows 10], type Wireshark, and then click Wireshark in the
resulting list.)
2. 2.
In Wireshark, click File, click Open, and navigate to the ch10_isatap.pcapng capture file.
Double-click the file to open it.
3. 3.
Expand the Wireshark window and each of the columns in the main pane, so you can see all
the listed data clearly, including the Protocol, Length, and Info columns.
4. 4.
Scroll down the list of packets (top pane) and select packet #75, which is labeled “Router
Solicitation” in the Info column.
5. 5.
In the packet details pane (middle pane) of the Wireshark window, expand Internet
Protocol Version 6 and Internet Control Message Protocol v6.
6. 6.
Under Internet Protocol Version 6, locate the Source fields for both the IPv6 and IPv4
ISATAP addresses of the host sending the solicitation and then locate those IP addresses in
the diagram in Figure 10-21.
7. 7.
Locate the Destination fields for both the IPv6 and IPv4 ISATAP addresses and locate
those addresses in the diagram in Figure 10-21.
8. 8.
Make a note as to which network device is the sending source and which device is the
destination by both host name and interface index name and number.
9. 9.
Under Internet Control Message Protocol v6, locate the Type field and verify that this is a
router solicitation.
10. 10.
In the packet list (top pane), select packet #76, which is labeled “Router Advertisement” in
the Info column.
11. 11.
Under Internet Protocol Version 6, locate the Source fields for the IPv6 and ISATAP IPv4
addresses of the source node and then locate those addresses in the diagram in Figure 1021.
12. 12.
Under Internet Protocol Version 6, locate the Destination fields for the IPv6 and ISATAP
IPv4 addresses of the source node and then locate those addresses in the diagram in Figure
10-21.
13. 13.
Make a note as to which network device is the sending source and which device is the
destination by both host name and interface index name and number.
14. 14.
If necessary, expand Internet Control Message Protocol v6 and, in the Type field, verify
that this is a Router Advertisement.
15. 15.
Expand ICMPv6 Option (Prefix information) and then locate the Prefixfield and make a
note of the prefix.
16. 16.
Collapse all the fields you opened.
17. 17.
In the packet list, scroll down and select packet #80, which is labeled “Standard query
A isatap.ipv6sandbox.com” in the Info column and listed as “DNS” in the Protocol column.
18. 18.
Expand Domain Name System (query), expand Queries, and then
expand isatap.ipv6sandbox.com to examine the A record DNS query.
19. 19.
In the packet list, select packet #81, which is labeled “Standard query response A
10.1.106.1” in the Info column and listed as “DNS” in the Protocol column.
20. 20.
Under Domain Name System (response), expand Queries and then
expand isatap.ipv6sandbox.com, if necessary, to examine the information contained
there.
21. 21.
Expand Answers and then expand isatap.ipv6sandbox.com to examine the information
contained there, as shown in Figure 10-22.
Figure 10-22
DNS query answer for isatap.ipv6sandbox.com
22. 22.
Make notes about all the information you have gathered.
23. 23.
When you are finished, close Wireshark.
Hands-On Project 10-2
Examining a 6to4 Capture File
Time Required: 10 minutes
Objective: In this project, you will examine a 6to4 capture file illustrating the
negotiation of communication between a source and destination node.
Description: This project provides a sample 6to4 packet capture for you to examine in
order to view and understand the mechanics of node-to-node communication negotiations
for the 6to4 transition technology. The ch10_6to4.pcapng sample packet file will be
provided by your instructor or can be found at this book’s companion Web site. (The trace
file was originally named 6to4.pcap and downloaded
from https://wiki.wireshark.org/SampleCaptures.)
1. 1.
Start Wireshark. (In Windows 7, click the Start button, point to All Programs, and then
click Wireshark. In Windows 10, click the Startbutton, click All apps, and then
click Wireshark. Alternatively, use the Start menu search box [Windows 7] or the Search
box on the taskbar [Windows 10], type Wireshark, and then click Wireshark in the
resulting list.)
2. 2.
In Wireshark, click File, click Open, and navigate to the ch10_6to4.pcapng capture file.
Double-click the file to open it.
3. 3.
If necessary, expand the Wireshark window so that you can see all the columns in the
upper pane of Wireshark.
4. 4.
Select packet number 5.
5. 5.
In the middle pane, expand Internet Protocol Version 4 to see information about the IPv4
header encapsulating the IPv6 packet.
6. 6.
Locate the Source and Destination fields, and note the IPv4 addresses assigned to each
field.
7. 7.
Collapse Internet Protocol Version 4, and expand Internet Protocol Version 6 to see
information about the IPv6 packet that has been encapsulated.
8. 8.
Locate the Source field and note the IPv6 address assigned to the 6to4 source node.
9. 9.
Locate the Source 6to4 Gateway IPv4 field, and note the IPv4 address assigned to the
6to4 gateway router servicing the 6to4 source node.
10. 10.
Locate the Destination field, and note the IPv6 address assigned to the destination node.
11. 11.
Collapse Internet Protocol Version 6, and expand Transmission Control Protocol.
12. 12.
Expand [SEQ/ACK analysis] to see that the node is acknowledging receipt of the packet
sent by the other node in the previous frame.
13. 13.
Close Wireshark.
Hands-On Project 10-3
Examining a Teredo Capture File and Router Solicitation
Packet
Time Required: 10 minutes
Objective: In this project, you will examine a Teredo capture file and explore the details
of a Router Solicitation sent by a Teredo network node.
Description: This project provides a sample Teredo packet capture for you to use in
order to examine and understand Teredo. The ch10_Teredo.pcapng sample packet will
either be provided by your instructor or can be found at this book’s companion Web site.
(The trace file was originally named Teredo.pcap and downloaded
from https://wiki.wireshark.org/SampleCaptures.)
1. 1.
Start Wireshark. (In Windows 7, click the Start button, point to All Programs, and then
click Wireshark. In Windows 10, click the Startbutton, click All apps, and then
click Wireshark. Alternatively, use the Start menu search box [Windows 7] or the Search
box on the taskbar [Windows 10], type Wireshark, and then click Wireshark in the
resulting list.)
2. 2.
In Wireshark, click File, click Open, and navigate to the ch10_Teredo.pcapng capture file.
Double-click the file to open it.
3. 3.
If necessary, expand the Wireshark window so that you can see all the columns in the
upper pane of Wireshark.
4. 4.
Select packet number 6, which is identified as “Router Solicitation” in the Info column of
the upper pane.
5. 5.
In the middle pane, expand Internet Protocol Version 4.
6. 6.
Locate the Protocol field, and verify that UDP is the protocol being used.
7. 7.
Locate the Source and Destination fields, and note the IPv4 addresses being used.
8. 8.
Collapse Internet Protocol Version 4, and expand User Datagram Protocol.
9. 9.
Locate the Source port field, and note the port number being used by the UDP packet.
10. 10.
Locate the Destination port field, and note that a Teredo-identified port is being used.
11. 11.
Collapse User Datagram Protocol, and expand Teredo IPv6 over UDP tunneling.
12. 12.
Expand Teredo Authentication header, and note the information there.
13. 13.
Collapse Teredo IPv6 over UDP tunneling, and expand Internet Protocol Version 6.
14. 14.
Locate the Next header field, and note that it is ICMPv6.
15. 15.
Locate the Source field and note that it is an IPv6 local-link address.
16. 16.
Locate the Destination field and note the address type.
17. 17.
Collapse Internet Protocol Version 6, and expand Internet Control Message Protocol
v6.
18. 18.
Expand ICMPv6 Option (Source link-layer address), and note the information fields
available.
19. 19.
Close Wireshark.
Case Project 10-1
Preparing a Network for IPv4-to-IPv6 Transition Technology
Deployment
Your company is preparing to migrate from IPv4 to IPv6, and you are responsible for
determining the steps that take the company up to deploying a transition technology. Your
company uses Windows 7 and Windows 10 with the latest service packs for client
computers as well as Windows Server 2012 and Windows Server 2016 for your server
infrastructure. You have determined that there are three critical steps that must occur
before deploying a transition technology:
1. 1.
Adopt applications that are independent of IP version.
2. 2.
Upgrade name resolution services.
3. 3.
Upgrade client computers.
Briefly define the activities involved in each of these steps.
Case Project 10-2
Configuring Windows 7 Clients to Use Teredo
You run a computer network support business servicing home/office and small business
clients, and one of your SMB clients wants to experiment with IPv4-to-IPv6 migration on
the Windows 7 computers in her office. She has done some research and has heard that
Windows 7 already supports IPv4/IPv6 dual stack as well as Teredo and ISATAP interfaces.
Your client has also learned that Teredo client computers can even communicate through
the NAT service running on her company’s gateway. She wants to implement Teredo as a
transition technology and asks you what some of the problems are in getting her Windows
7 computers to use Teredo to send IPv6 packets through her company’s gateway router.
Case Project 10-3
Diagramming an ISATAP Encapsulated Header
As an IPv4-to-IPv6 transition technology, ISATAP allows an ISATAP network node to send
an IPv6 packet over an IPv4 network by encapsulating the packet in an IPv4 header
without the need for a preestablished tunnel across the IPv4 domain. Once the sending
node determines the end point of the ISATAP tunnel, the IPv6 packet is sent to the node’s
ISATAP tunneling interface for encapsulation in the IPv4 header, setting the value in the
Protocol field to 41, which indicates that the IPv4 header contains an IPv6 packet. When
the device at the end point of the tunnel receives the packet, it reads the value of the
Protocol field and knows to decapsulate the IPv6 packet from the IPv4 header prior to
accessing the Transport layer protocol (TCP or UDP) and sending the application data up
the OSI stack. Given this information, create a diagram of the ISATAP packet as it is sent
across the tunnel from the source to destination nodes. Include individual cells in the
diagram for the application data, the transport header, the IPv6 header, and the IPv4
header. Within the IPv6 and IPv4 headers, include information regarding the Next Header
field, Source and Destination address fields, and the Protocol field. The illustration can be a
high-level diagram, but it must show each of the fields at its correct location within each
header.
Purchase answer to see full
attachment