Networking Chapter 5 Explain Students The Rationale Behind Creating Custom Filter And That They May

subject Type Homework Help
subject Pages 2
subject Words 968
subject Authors Ed Tittel, James Pyles, Jeffrey L. Carrell

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Guide to TCP/IP: IPv6 and IPv4, Fifth Edition
ISBN 978-1-305-94695-8
Chapter 5 Solutions
Answers to Review Questions
2. c
4. True
6. c
8. b
10. d
12. a
14. b
16. b
18. c
20. d
22. False
Hands-On Projects Discussion
Hands-On Project 5-1
In this project, students examine the ping command’s parameter list when they follow the step to type
ping and press Enter. If the students have questions about the parameters listed, refer them to the
Command-Line IP Utilities” document on the companion Web site (www.cengagebrain.com) for this
book. Command-Line IP Utilities lists the parameters and their uses. Students also learn how to open a
Hands-On Project 5-2
In this project, the students build a custom address filter. Although this project requires the students to build
a custom IP address filter, Wireshark supports the creation of physical (data link), IPv6 only, TCP only, and
No ARP and no DNS filters, among many other kinds.
page-pf2
Guide to TCP/IP: IPv6 and IPv4, Fifth Edition
ISBN 978-1-305-94695-8
Hands-On Project 5-3
This project mirrors Hands-On Project 5-1 except that it uses ICMPv6 Echo messages rather than ICMPv4.
It also shows how the students can ping by hostname rather than IPv6 address using the -6 switch with the
Hands-On Project 5-4
This project gives students the experience of actually seeing the network activity of an IPv6 network node
booting and attempting to contact other IPv6 nodes by sending an ICMPv6 Neighbor Solicitation message.
If you have elected to previously show the students how to build a permanent IPv6/ICMPv6 filter in
Wireshark, it will make it much easier to observe this traffic without having to scroll through the
Case Projects Discussion
Case Project 5-1
The default gateway is also referred to as the gateway of last resort—if hosts don’t know where to send
their packets, they forward them to the default gateway. If they constantly send packets to the default
Case Project 5-2
ICMPv6 traffic can be suspect because it contains information about the network and network
configuration. As was presented in the body of the chapter, some ICMPv6-specific security concerns
include:
Case Project 5-3
The easiest way to test the network is to build large Ping packets setting the Don’t Fragment bit using the -f
parameter. Launch your analyzer and look for the response from the routers. Do the routers send back a
Case Project 5-4
Jon B. Postel wrote many of the fundamental RFCs to define the functionality of TCP/IP. He is often

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.