Search This Blog

Friday, March 19, 2010

Fast Pinger

Let’s talk about one of my favorite tools: Fping.exe

Fping mostly works like the well known ping command that’s available in every windows/unix/linux OS, but gives you some more options that make it a tool to use when testing failover technologies in your network.

Let’s look at the additional options from the fping.exe command that aren’t available from the ping.exe command :

-S : size sweep. Ping with size1, size1 + 1, ..., size 2 datalength

One might wonder when this option is useful. Have you ever tried to determine the MTU of a particular network? Testing it with best guesses using the “-f don’t fragment flag” option combined with the “-l ” option in the ping command? Here’s how to determine the MTU using fping.exe in a single command:

Fping 10.0.0.1 -S1400/1500 –t1 –f


The output speaks for itself! Another option (I already used in the previous example) is:

-t : time between 2 pings in ms up to 1000000

The “-t

Friday, March 12, 2010

Sniffing dot1Q tags with wireshark

Ok, so here's the issue. When testing some QoS settings on a customers network I wanted to verify layer-2 QoS (CoS) using Wireshark. I've done so many times, but recently I got a new laptop (HP Elitebook 8530P) and I noticed that no matter what I configured in the monitor session, no dot1q tag would appear in Wireshark.

Today I created a small testlab which you can see below.


I configured the following SPAN session:

monitor session 1 source interface Fa0/23
monitor session 1 destination interface Fa0/24 encapsulation dot1q

I sniffed some ICMP packets originating from FW1 towards FW2, which gave me the following Wireshark output:


Clearly no dot1Q tags present in the captured data.....

After some searches on the web I found out that newer drivers strip off tags like dot1Q by default and therefore are not available to upper layers in the OSI-model.

In my case it concerns an Intel 82567LM Gigabit Adapter which, luckily for me, has the possibility to turn off this 'strip off' feature by setting the following registry key: MonitorModeEnabled, value 1, type DWORD, at the following location:

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}\00xx


The '0007' part of the registry location may differ from laptop to laptop. You can check by looking at the DriverDesc string in each folder.

After a quick reboot I did the same test as earlier with the output below:


YES! It's working again like it should. The yellow circle shows the CoS value and the blue circle shows the VLAN-id. Time for some QoS testing next week....

Welcome!

Welcome to this new blog! Obviously there's not much to read.....yet! Stay tuned and I'll try to write articles on a regular basis regarding networking and network security.