Lab 6.7.2: Examining ICMP Packets: (Instructor Version)
Lab 6.7.2: Examining ICMP Packets: (Instructor Version)
Lab 6.7.2: Examining ICMP Packets: (Instructor Version)
Addressing Table
Device
Interface
IP Address
Subnet Mask
S0/0/0
10.10.10.6
255.255.255.252 N/A
Fa0/0
192.168.254.253 255.255.255.0
S0/0/0
10.10.10.5
255.255.255.252 10.10.10.6
Fa0/0
172.16.255.254
255.255.0.0
N/A
192.168.254.254 255.255.255.0
192.168.254.253
N/A
172.31.24.254
255.255.255.0
N/A
hostPod#A
N/A
172.16.Pod#.1
255.255.0.0
172.16.255.254
hostPod#B
N/A
172.16.Pod#.2
255.255.0.0
172.16.255.254
S1-Central
N/A
172.16.254.1
255.255.0.0
172.16.255.254
R1-ISP
R2-Central
Eagle Server
Default Gateway
N/A
N/A
Learning Objectives
Upon completion of this lab, you will be able to:
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 8
CCNA Exploration
Network Fundamentals: Addressing the Network - IPV4
Background
The Internet Control Message Protocol (ICMP) was first defined in RFC 792, September, 1981. ICMP
message types were later expanded in RFC 1700. ICMP operates at the TCP/IP Network layer and is
used to exchange information between devices.
ICMP packets serve many uses in todays computer network. When a router cannot deliver a packet to a
destination network or host, an informational message is returned to the source. Also, the ping and
tracert commands send ICMP messages to destinations, and destinations respond with ICMP
messages.
Scenario
Using the Eagle 1 Lab, Wireshark captures will be made of ICMP packets between network devices.
Depending on the classroom situation, the lab topology may have been modified before this class. It is
best to use one host to verify infrastructure connectivity. If the default web page cannot be accessed from
eagle-server.example.com, troubleshoot end-to-end network connectivity:
1. Verify that all network equipment is powered on, and eagle-server is on.
2. From a known good host computer, ping eagle-server. If the ping test fails, ping S1-Central, R2Central, R1-ISP, and finally eagle-server. Take corrective action on devices that fail ping tests.
3. If an individual host computer cannot connect to eagle-server, check the cable connection
between the host and S1-Central. Verify that the host computer has the correct IP address,
shown in the logical addressing table above, and can ping R2-Central, 172.16.255.254. Verify
that the host computer has the correct Gateway IP address, 172.16.255.254, and can ping R1ISP, 10.10.10.6. Finally, verify that the host has the correct DNS address, and can ping eagleserver.example.com.
Meaning
Echo Reply
Destination Unreachable
Source Quench
Redirect
Echo
Time Exceeded
Parameter Problem
Timestamp
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 8
CCNA Exploration
Network Fundamentals: Addressing the Network - IPV4
Value
14
15
16
Meaning
Timestamp Reply
Information Request
Information Reply
Code
Value
0
1
2
3
4
5
6
7
8
9
10
11
12
Meaning
Net Unreachable
Host Unreachable
Protocol Unreachable
Port Unreachable
Fragmentation Needed and Don't Fragment was Set
Source Route Failed
Destination Network Unknown
Destination Host Unknown
Source Host Isolated
Communication with Destination Network is
Administratively Prohibited
Communication with Destination Host is
Administratively Prohibited
Destination Network Unreachable for Type of Service
Destination Host Unreachable for Type of Service
Figure 3. ICMP Type 3 Message Codes
Using ICMP message capture shown in Figure 4, fill in the fields for the ICMP packet echo request.
Values beginning with 0x are hexadecimal numbers:
Using the ICMP message capture shown in Figure 5, fill in the fields for the ICMP packet echo reply:
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 8
CCNA Exploration
Network Fundamentals: Addressing the Network - IPV4
At the TCP/IP Network layer, communication between devices is not guaranteed. However, ICMP does
provide minimal checks for a reply to match the request. From the information provided in the ICMP
messages above, how does the sender know that the reply is to a specific echo?
___________________________________________________________________________________
___________________________________________________________________________________
Answer: The identifier is used to identify this host computer, and the sequence number is used to identify
this echo request.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 8
CCNA Exploration
Network Fundamentals: Addressing the Network - IPV4
Value
8 (Echo (ping) request)
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 5 of 8
CCNA Exploration
Network Fundamentals: Addressing the Network - IPV4
Code
Checksum
Identifier
Sequence number
Data
0
Answers may vary
Answers may vary
Answers may vary
abcdefghijklmnopqrstuvwabcdefghi
Value
0 (Echo (ping) reply)
0
Answers may vary
Answers may vary
Answers may vary
acdefghijklmnopqrstuvwabcdefghi
Checksum
Answers
vary
Answers
vary
Answers
vary
Answers
vary
Answers
vary
Answers
vary
Identifier
Answers vary
Sequence number
Answers vary
Same as request #2
Same as request #2
Same as request #2
Answers vary
Same as request #2
Same as request #3
Same as request #2
Answers vary
Same as request #2
Same as request #4
Why did the Checksum values change with each new request?
___________________________________________________________________________________
Answer: While the Identifier remained the same, the sequence number changed.
Step 2: Capture and evaluate ICMP echo messages to 192.168.253.1.
In this step, pings will be sent to a fictitious network and host. The results from the Wireshark capture will
be evaluatedand may be surprising.
Try to ping IP address 192.168.253.1.
C:\> ping 192.168.253.1
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 6 of 8
CCNA Exploration
Network Fundamentals: Addressing the Network - IPV4
Page 7 of 8
CCNA Exploration
Network Fundamentals: Addressing the Network - IPV4
See Figure 11, which shows ping replies when the TTL value has been exceeded.
What network device responds to pings that exceed the TTL value?
________The gateway router__________________________________________________
Task 3: Challenge
Use Wireshark to capture a tracert session to Eagle Server and then to 192.168.254.251. Examine the
ICMP TTL exceeded message. This will demonstrate how the tracert command traces the network
path to the destination.
Task 4: Reflection
The ICMP protocol is very useful when troubleshooting network connectivity issues. Without ICMP
messages, a sender has no way to tell why a destination connection failed. Using the ping command,
different ICMP message type values were captured and evaluated.
Task 5: Clean Up
Wireshark may have been loaded on the pod host computer. If the program must be removed, click Start
> Control Panel > Add or Remove Programs, and scroll down to Wireshark. Click the filename, click
Remove, and follow uninstall instructions.
Remove any Wireshark pcap files that were created on the pod host computer.
Unless directed otherwise by the instructor, turn off power to the host computers. Remove anything that
was brought into the lab, and leave the room ready for the next class.
All contents are Copyright 19922007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 8 of 8