Hálózati eszközök


lakis@dpdk-pktgen:~$ ping 8.8.8.8 -c 4 -i 0.01
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_seq=1 ttl=59 time=14.1 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=59 time=15.1 ms
64 bytes from 8.8.8.8: icmp_seq=3 ttl=59 time=12.7 ms
64 bytes from 8.8.8.8: icmp_seq=4 ttl=59 time=14.6 ms

--- 8.8.8.8 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 41ms
rtt min/avg/max/mdev = 12.663/14.125/15.136/0.920 ms, pipe 2

C:\Windows\system32>ping 8.8.8.8 -n 4
Reply from 8.8.8.8: bytes=32 time=14ms TTL=60
Reply from 8.8.8.8: bytes=32 time=14ms TTL=60
Reply from 8.8.8.8: bytes=32 time=14ms TTL=60
Reply from 8.8.8.8: bytes=32 time=14ms TTL=60

Ping statistics for 8.8.8.8:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 14ms, Maximum = 14ms, Average = 14ms

lakis@dpdk-pktgen:~$ traceroute berkeley.edu
traceroute to berkeley.edu (35.163.72.93), 30 hops max, 60 byte packets
1 192.168.0.192 (192.168.0.192) 0.292 ms 0.344 ms 0.390 ms
2 ikoktatok-gate.inf.elte.hu (157.181.167.254) 1.251 ms 1.250 ms 1.265 ms
3 taurus.centaur-taurus.elte.hu (157.181.126.134) 5.180 ms 5.267 ms 5.325 ms
4 fw1.firewall.elte.hu (157.181.141.145) 1.271 ms 1.358 ms 1.299 ms
5 taurus.fw1.fw.backbone.elte.hu (192.153.18.146) 5.626 ms 5.356 ms 5.395 ms
6 rtr.hbone-elte.elte.hu (157.181.141.9) 2.229 ms 1.245 ms 1.749 ms
7 tg0-0-0-14.rtr2.vh.hbone.hu (195.111.100.47) 2.377 ms 2.415 ms 2.407 ms
8 be1.rtr1.vh.hbone.hu (195.111.96.56) 1.945 ms 1.642 ms 1.877 ms
9 bpt-b4-link.telia.net (80.239.195.56) 1.626 ms 1.581 ms 1.097 ms
10 win-bb2-link.telia.net (62.115.143.116) 196.574 ms win-bb2-link.telia.net (213.155.137.38) 196.993 ms
win-bb2-link.telia.net (213.155.135.222) 180.071 ms
11 ffm-bb4-link.telia.net (62.115.133.79) 199.425 ms 199.232 ms *
12 * * *
13 prs-bb3-link.telia.net (62.115.137.114) 180.494 ms 179.986 ms *
14 sjo-b21-link.telia.net (62.115.119.229) 197.252 ms 197.249 ms 197.264 ms
15 * a100row-ic-300117-sjo-b21.c.telia.net (213.248.87.118) 196.555 ms *
16 nyk-bb4-link.telia.net (62.115.142.222) 180.081 ms 54.240.242.148 (54.240.242.148) 200.986 ms
54.240.242.88 (54.240.242.88) 201.877 ms
17 54.240.242.161 (54.240.242.161) 200.935 ms * *
18 * * *
19 * * * 

C:\Windows\system32>tracert berkeley.edu

Tracing route to berkeley.edu [141.193.213.21]
over a maximum of 30 hops:

    1     4 ms     4 ms     4 ms  192.168.0.1
    2    13 ms    14 ms    12 ms  catv-86-101-192-8.catv.fixed.vodafone.hu [84.100.190.9]
    3     *        *        *     Request timed out.
    4    17 ms    14 ms    15 ms  catv-89-133-5-121.catv.fixed.vodafone.hu [88.122.5.121]
    5    16 ms    17 ms    16 ms  bpt-b6-link.ip.twelve99.net [62.115.44.66]
    6    14 ms    13 ms    17 ms  bpt-b2-link.ip.twelve99.net [62.115.112.226]
    7   116 ms    13 ms    13 ms  bpt-b3-link.ip.twelve99.net [62.115.134.132]
    8    17 ms    31 ms    15 ms  cloudflare-ic-369085.ip.twelve99-cust.net [62.115.146.45]
    9    15 ms    13 ms    14 ms  141.193.213.21

Trace complete.

lakis@dpdk-pktgen:~$ tcpdump -i enp0s3 -w out.pcap -e icmp
tcpdump: listening on enp0s3, link-type EN10MB (Ethernet), snapshot length 262144 bytes
8 packets captured
8 packets received by filter
0 packets dropped by kernel

lakis@dpdk-pktgen:~$ tcpdump -i enp0s3 host 8.8.8.8 and port 443
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on enp0s3, link-type EN10MB (Ethernet), snapshot length 262144 bytes
16:04:07.954409 IP dpdk-pktgen.34520 > dns.google.https: Flags [S], seq 356450301, win 64240, options
[mss 1460,sackOK,TS val 1992832445 ecr 0,nop,wscale 7], length 0
16:04:07.969011 IP dns.google.https > dpdk-pktgen.34520: Flags [S.], seq 301568001, ack 356450302, win
65535, options [mss 1460], length 0
16:04:07.969027 IP dpdk-pktgen.34520 > dns.google.https: Flags [.], ack 1, win 64240, length 0
16:04:07.969761 IP dpdk-pktgen.34520 > dns.google.https: Flags [P.], seq 1:659, ack 1, win 64240,
length 658
16:04:07.970017 IP dns.google.https > dpdk-pktgen.34520: Flags [.], ack 659, win 65535, length 0
16:04:08.010573 IP dns.google.https > dpdk-pktgen.34520: Flags [.], seq 1:2921, ack 659, win 65535,
length 2920

lakis@dpdk-pktgen:~$ tshark -i enp0s3
Running as user "root" and group "root". This could be dangerous.
Capturing on 'enp0s3'
    ** (tshark:5843) 16:12:55.471865 [Main MESSAGE] -- Capture started.
    ** (tshark:5843) 16:12:55.471913 [Main MESSAGE] -- File: "/tmp/wireshark_enp0s3Z098S2.pcapng"
    1 0.000000000    10.0.2.15 → 8.8.8.8      ICMP 98 Echo (ping) request  id=0x6560, seq=1/256, ttl=64
    2 0.016315231      8.8.8.8 → 10.0.2.15    ICMP 98 Echo (ping) reply    id=0x6560, seq=1/256, ttl=59 (request in 1)
    3 1.006522017    10.0.2.15 → 8.8.8.8      ICMP 98 Echo (ping) request  id=0x6560, seq=2/512, ttl=64
    4 1.022024577      8.8.8.8 → 10.0.2.15    ICMP 98 Echo (ping) reply    id=0x6560, seq=2/512, ttl=59 (request in 3)
    5 2.028945838    10.0.2.15 → 8.8.8.8      ICMP 98 Echo (ping) request  id=0x6560, seq=3/768, ttl=64
    6 2.044899282      8.8.8.8 → 10.0.2.15    ICMP 98 Echo (ping) reply    id=0x6560, seq=3/768, ttl=59 (request in 5)
    7 3.029240399    10.0.2.15 → 8.8.8.8      ICMP 98 Echo (ping) request  id=0x6560, seq=4/1024, ttl=64
    8 3.044148796      8.8.8.8 → 10.0.2.15    ICMP 98 Echo (ping) reply    id=0x6560, seq=4/1024, ttl=59 (request in 7)
    9 5.205262881 PcsCompu_c1:c8:9c → RealtekU_12:35:02 ARP 42 Who has 10.0.2.2? Tell 10.0.2.15
    10 5.205463029 RealtekU_12:35:02 → PcsCompu_c1:c8:9c ARP 60 10.0.2.2 is at 52:54:00:12:35:02
tshark: 
10 packets captured

lakis@dpdk-pktgen:~$ nc -4l -p 8000
asd
asd2

lakis@dpdk-pktgen:~$ nc 127.0.0.1 8000
asd
asd2

lakis@dpdk-pktgen:~$ ip link
1: lo:  mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: enp0s3:  mtu 1500 qdisc pfifo_fast state UP mode DEFAULT group default qlen 1000
    link/ether 08:00:27:c1:c8:9c brd ff:ff:ff:ff:ff:ff

lakis@dpdk-pktgen:~$ ifconfig
enp0s3: flags=4163  mtu 1500
        inet 10.0.2.15  netmask 255.255.255.0  broadcast 10.0.2.255
        inet6 fe80::a00:27ff:fec1:c89c  prefixlen 64  scopeid 0x20
        ether 08:00:27:c1:c8:9c  txqueuelen 1000  (Ethernet)
        RX packets 36510  bytes 42776660 (42.7 MB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 13783  bytes 1977904 (1.9 MB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 1145  bytes 97001 (97.0 KB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 1145  bytes 97001 (97.0 KB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0


C:\Windows\system32>ipconfig

Windows IP Configuration


Ethernet adapter vEthernet (Default Switch):

    Connection-specific DNS Suffix  . :
    Link-local IPv6 Address . . . . . : fe80::c6f0:daf6:a646:7fbb%54
    IPv4 Address. . . . . . . . . . . : 172.17.47.1
    Subnet Mask . . . . . . . . . . . : 255.255.240.0
    Default Gateway . . . . . . . . . :

Wireless LAN adapter Wi-Fi:

    Connection-specific DNS Suffix  . : home
    IPv6 Address. . . . . . . . . . . : 2a02:ab88:7816:1700:2ee1:f98f:5ea:7c57
    Temporary IPv6 Address. . . . . . : 2a02:ab88:7816:1700:dee:61aa:4d50:febe
    Link-local IPv6 Address . . . . . : fe80::afdb:c8ba:696b:f1f3%15
    IPv4 Address. . . . . . . . . . . : 192.168.0.11
    Subnet Mask . . . . . . . . . . . : 255.255.255.0
    Default Gateway . . . . . . . . . : fe80::362f:c4ff:fe88:4ddf%15
                                        192.168.0.1

Feladatok