
304 CHAPTER 8 WIDE AREA NETWORKS
gateway. Your computer will have different inter-
faces and IP addresses because your network is
different than mine, but the interfaces should be
similar.
5. Start by capturing packets on your regular Ethernet
Interface. In my case, this is the second interface.
Click on the Start button beside the Ethernet driver
(which is 192.168.1.104 on my computer).
6. Go to your Web browser and use it to load a new
Web page, which will cause some packets to move
through your network.
7. A screen similar to that in Figure 8.19 will appear.
After a few seconds, go back to Wireshark and
click the Interface menu item and then click Stop.
8. The top window in Figure 8.19 shows the packets
that are leaving the computer through the tunnel.
Click on a packet to look at it. The middle win-
dow in this figure shows what’s inside the packet.
We see an Ethernet frame, an IP packet, a UDP
datagram, and an Encapsulating Security Payload
packet (which is the ESP packet). Notice that
you cannot see anything inside the ESP packet
because its contents are encrypted. All packets
in this tunnel will only flow to and from my
computer (192.168.1.104) and the VPN gateway
(156.56.245.15).
9. Now we want to look at the packets that are sent
by your computer into the VPN tunnel. No one
else can see these packets. You can see them only
because they are on your computer and you’re
looking at them as they move from your traditional
network software to your VPN software.
10. Click on the Wireshark Capture menu item and
click Interfaces.
11. Click on the Start button beside your VPN inter-
face, which in my case in Figure 8.18 is the button
in front of 156.56.198.144.
12. Go to your Web browser and use it to load a new
Web page, which will cause some packets to move
through your network.
13. A screen similar to that in Figure 8.20 will appear.
After a few seconds, go back to Wireshark and
click the Interface menu item, and then click Stop.
14. The top window in Figure 8.20 shows the pack-
ets that are entering the VPN tunnel. Click on an
HTTP packet to look at it (you may need to scroll
to find one). The middle window in this figure
shows what’s inside the packet. We see an Eth-
ernet frame, an IP packet, a TCP segment, and
an HTTP request (for a page called/enterprise/on
www.tatacommunications.com). We can see these
because they have not yet entered the VPN soft-
ware to be encrypted. These are the packets that
would normally be sent over the Internet if we
have not started the VPN software. Like all nor-
mal Internet messages, they can be read by anyone
with sniffer software such as Wireshark.
Deliverables
1. What layer-2, -3, and -4 protocols are used on
your network to transmit an HTTP packet without
aVPN?
2. What layer-2, -3, and -4 protocols are used on
your network to transmit an HTTP packet when
your VPN is active?
3. Look inside the VPN tunnel as was done in step
14. What layer-2, -3, and -4 protocols are used
inside the encrypted packet?
HANDS-ON ACTIVITY 8C
Examining VPNs with Tracert
Tracert is a useful tool for seeing how VPNs affect rout-
ing. In order to do this lab, you’ll have to have a VPN
you can use. This will normally be available from your
school.
Tracert is a simple command that comes preinstalled
on all Windows and Mac computers. Tracert enables you
to see the route that an IP packet takes as it moves over
the Internet from one computer to another. Do this activity
when you are not on campus.
1. Tracert is command line command, so you first
need to start the CMD window. Click Start, then
Run, and then type CMD and press enter. This
will open the command window, which is usually
a small window with a black background. You can