Business

Lab2Encryption

Name(s): _________________________________________________________Any data that is sensitive or critical for business or military purposes should be encrypted.  But what does it mean to be encrypted.  What does encrypted data look like?  In this lab we will look at data which is unencrypted and data that is encrypted.  We will use a tool called GNS3 to simulate two routers that are connected via a point-to-point link.  We will run data through this link while looking at the packets going through it.  The tool we will use to view the data is Wireshark which is probably the most important tool we as network engineers have in our toolbelt.  Let’s answer the following questions as we go through the lab.Ÿ 1. What is the cleartext data that is being sent in the ping between the two PCs?  _____________________Ÿ 2. What is the protocol used for the ping utility? ____________________Ÿ 3. How many ping messages do you see? _____________________  Why? ________________________________________________________________________Ÿ 4.  Is this data encrypted or unencrypted?  _____________________________Ÿ 5.  Now let’s make a change in the router.  What types of messages do you see now?  Does it look the same as the messages we saw before we made the change to the router? ________________________Ÿ 6.  What protocol do you see now? ____________________Ÿ 7.  Are you still able to see the source and destination MAC address?  __________What layer is this you are looking at the MAC address in? _____________Ÿ 8.  Are you still able to see the source and destination IP address?  __________What layer is this you are looking at the IP address in? _____________ Ÿ 9. Can you see the cleartext data you saw before?  ____________________________Ÿ 10.  Explain the ESP protocol.  Does what we see in Wireshark make sense?  Write a paragraph answering these two questions.End of Procedure

Back To Top