Question: Activity 3 - Analyze Remote IPv4 Inbound Traffic To analyze remote IPv4 inbound traffic: 1. In the top Wireshark packet list pane, select the second
Activity 3 - Analyze Remote IPv4 Inbound Traffic To analyze remote IPv4 inbound traffic: 1. In the top Wireshark packet list pane, select the second ICMP packet, labeled Echo (ping) reply 2. Observe the packet details in the middle Wireshark packet details pane. Notice that it is an Ethernet II / Internet Protocol Version 4 / Internet Control Message Protocol frame. 3. Expand Ethernet II to view Ethernet details. 4. Observe the Destination field. This should contain your MAC address. 5. Observe the Source field. This should contain the MAC address of your default gateway. Notice that the remote Internet layer traffic is returned as local Link layer traffic. The routers between the Internet host and your network routed the packet back to your router so that it could forward the packet back to your computer. 6. Observe the Type field. Notice that the type is 0x0800, indicating IP. 7. Expand Internet Protocol Version 4 to view IP details. 8. Observe the Source address. Notice that the source address is the Internet host IP address. 9. Observe the Destination address. Notice that the destination address is your IP address
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
