hdlc抓包分析

R2(config)#int s2/2
R2(config-if)#ip addr 202.100.23.2 255.255.255.0
R2(config-if)#no shut
R2(config-if)#
*Aug 21 16:19:30.153: %LINK-3-UPDOWN: Interface Serial2/2, changed state to up
*Aug 21 16:19:31.155: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2/2, changed state to up
R2(config-if)#
*Aug 21 16:19:59.976: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2/2, changed state to down
R2(config-if)#
*Aug 21 16:20:09.973: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2/2, changed state to up
R2(config-if)#end
R2#sh ip
*Aug 21 16:20:21.022: %SYS-5-CONFIG_I: Configured from console by console
R2#sh ip route 202.100.23.3
Routing entry for 202.100.23.0/24
  Known via "connected", distance 0, metric 0 (connected, via interface)
  Routing Descriptor Blocks:
  * directly connected, via Serial2/2
      Route metric is 0, traffic share count is 1
R2#ping 202.100.23.3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 202.100.23.3, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 8/14/20 ms
R2#sh int s2/2
Serial2/2 is up, line protocol is up
  Hardware is M4T
  Internet address is 202.100.23.2/24
  MTU 1500 bytes, BW 1544 Kbit/sec, DLY 20000 usec,
     reliability 255/255, txload 1/255, rxload 1/255
  Encapsulation HDLC, crc 16, loopback not set
  Keepalive set (10 sec)
  Restart-Delay is 0 secs
  Last input 00:00:04, output 00:00:03, output hang never
  Last clearing of "show interface" counters never
  Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
  Queueing strategy: fifo
  Output queue: 0/40 (size/max)
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
     17 packets input, 2084 bytes, 0 no buffer
     Received 12 broadcasts (0 IP multicasts)
     0 runts, 0 giants, 0 throttles
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
     25 packets output, 3299 bytes, 0 underruns
     0 output errors, 0 collisions, 2 interface resets
     0 unknown protocol drops
     0 output buffer failures, 0 output buffers swapped out
     3 carrier transitions     DCD=up  DSR=up  DTR=up  RTS=up  CTS=up

R3(config)#int s3/3
R3(config-if)#ip addr 202.100.23.3 255.255.255.0
R3(config-if)#no shut
R3(config-if)#
*Aug 21 16:20:02.833: %LINK-3-UPDOWN: Interface Serial3/3, changed state to up
*Aug 21 16:20:03.840: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial3/3, changed state to up
R3(config-if)#

#wireshak抓包
Frame 2: 24 bytes on wire (192 bits), 24 bytes captured (192 bits) on interface 0
    Interface id: 0 (-)
    Encapsulation type: Cisco HDLC (28)
    Arrival Time: Aug 22, 2017 00:19:28.943079000 й
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1503332368.943079000 seconds
    [Time delta from previous captured frame: 0.781037000 seconds]
    [Time delta from previous displayed frame: 0.781037000 seconds]
    [Time since reference or first frame: 0.781037000 seconds]
    Frame Number: 2
    Frame Length: 24 bytes (192 bits)
    Capture Length: 24 bytes (192 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: chdlc:slarp]
Cisco HDLC
    Address: Multicast (0x8f)
    Control: 0x00
    Protocol: SLARP (0x8035)
Cisco SLARP
    Packet type: Line keepalive (2)
    Outgoing sequence number: 1
    Returned sequence number: 0
    Reliability: 0xffff

Frame 5: 24 bytes on wire (192 bits), 24 bytes captured (192 bits) on interface 0
    Interface id: 0 (-)
    Encapsulation type: Cisco HDLC (28)
    Arrival Time: Aug 22, 2017 00:19:38.948860000 й
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1503332378.948860000 seconds
    [Time delta from previous captured frame: 7.686116000 seconds]
    [Time delta from previous displayed frame: 7.686116000 seconds]
    [Time since reference or first frame: 10.786818000 seconds]
    Frame Number: 5
    Frame Length: 24 bytes (192 bits)
    Capture Length: 24 bytes (192 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: chdlc:slarp]
Cisco HDLC
    Address: Multicast (0x8f)
    Control: 0x00
    Protocol: SLARP (0x8035)
Cisco SLARP
    Packet type: Line keepalive (2)
    Outgoing sequence number: 1
    Returned sequence number: 0
    Reliability: 0xffff

Frame 6: 24 bytes on wire (192 bits), 24 bytes captured (192 bits) on interface 0
    Interface id: 0 (-)
    Encapsulation type: Cisco HDLC (28)
    Arrival Time: Aug 22, 2017 00:19:48.960462000 й
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1503332388.960462000 seconds
    [Time delta from previous captured frame: 10.011602000 seconds]
    [Time delta from previous displayed frame: 10.011602000 seconds]
    [Time since reference or first frame: 20.798420000 seconds]
    Frame Number: 6
    Frame Length: 24 bytes (192 bits)
    Capture Length: 24 bytes (192 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: chdlc:slarp]
Cisco HDLC
    Address: Multicast (0x8f)
    Control: 0x00
    Protocol: SLARP (0x8035)
Cisco SLARP
    Packet type: Line keepalive (2)
    Outgoing sequence number: 2
    Returned sequence number: 0
    Reliability: 0xffff
Frame 7: 24 bytes on wire (192 bits), 24 bytes captured (192 bits) on interface 0
    Interface id: 0 (-)
    Encapsulation type: Cisco HDLC (28)
    Arrival Time: Aug 22, 2017 00:19:58.971612000 й
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1503332398.971612000 seconds
    [Time delta from previous captured frame: 10.011150000 seconds]
    [Time delta from previous displayed frame: 10.011150000 seconds]
    [Time since reference or first frame: 30.809570000 seconds]
    Frame Number: 7
    Frame Length: 24 bytes (192 bits)
    Capture Length: 24 bytes (192 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: chdlc:slarp]
Cisco HDLC
    Address: Multicast (0x8f)
    Control: 0x00
    Protocol: SLARP (0x8035)
Cisco SLARP
    Packet type: Line keepalive (2)
    Outgoing sequence number: 3
    Returned sequence number: 0
    Reliability: 0xffff

Frame 12: 24 bytes on wire (192 bits), 24 bytes captured (192 bits) on interface 0
    Interface id: 0 (-)
    Encapsulation type: Cisco HDLC (28)
    Arrival Time: Aug 22, 2017 00:20:08.283878000 й
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1503332408.283878000 seconds
    [Time delta from previous captured frame: 1.763341000 seconds]
    [Time delta from previous displayed frame: 1.763341000 seconds]
    [Time since reference or first frame: 40.121836000 seconds]
    Frame Number: 12
    Frame Length: 24 bytes (192 bits)
    Capture Length: 24 bytes (192 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: chdlc:slarp]
Cisco HDLC
    Address: Multicast (0x8f)
    Control: 0x00
    Protocol: SLARP (0x8035)
Cisco SLARP
    Packet type: Line keepalive (2)
    Outgoing sequence number: 1
    Returned sequence number: 0
    Reliability: 0xffff
Frame 13: 24 bytes on wire (192 bits), 24 bytes captured (192 bits) on interface 0
    Interface id: 0 (-)
    Encapsulation type: Cisco HDLC (28)
    Arrival Time: Aug 22, 2017 00:20:08.974619000 й
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1503332408.974619000 seconds
    [Time delta from previous captured frame: 0.690741000 seconds]
    [Time delta from previous displayed frame: 0.690741000 seconds]
    [Time since reference or first frame: 40.812577000 seconds]
    Frame Number: 13
    Frame Length: 24 bytes (192 bits)
    Capture Length: 24 bytes (192 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: chdlc:slarp]
Cisco HDLC
    Address: Multicast (0x8f)
    Control: 0x00
    Protocol: SLARP (0x8035)
Cisco SLARP
    Packet type: Line keepalive (2)
    Outgoing sequence number: 4
    Returned sequence number: 1
    Reliability: 0xffff
Frame 15: 24 bytes on wire (192 bits), 24 bytes captured (192 bits) on interface 0
    Interface id: 0 (-)
    Encapsulation type: Cisco HDLC (28)
    Arrival Time: Aug 22, 2017 00:20:18.287355000 й
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1503332418.287355000 seconds
    [Time delta from previous captured frame: 8.309871000 seconds]
    [Time delta from previous displayed frame: 8.309871000 seconds]
    [Time since reference or first frame: 50.125313000 seconds]
    Frame Number: 15
    Frame Length: 24 bytes (192 bits)
    Capture Length: 24 bytes (192 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: chdlc:slarp]
Cisco HDLC
    Address: Multicast (0x8f)
    Control: 0x00
    Protocol: SLARP (0x8035)
Cisco SLARP
    Packet type: Line keepalive (2)
    Outgoing sequence number: 2
    Returned sequence number: 4
    Reliability: 0xffff
Frame 17: 24 bytes on wire (192 bits), 24 bytes captured (192 bits) on interface 0
    Interface id: 0 (-)
    Encapsulation type: Cisco HDLC (28)
    Arrival Time: Aug 22, 2017 00:20:18.983543000 й
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1503332418.983543000 seconds
    [Time delta from previous captured frame: 0.289949000 seconds]
    [Time delta from previous displayed frame: 0.289949000 seconds]
    [Time since reference or first frame: 50.821501000 seconds]
    Frame Number: 17
    Frame Length: 24 bytes (192 bits)
    Capture Length: 24 bytes (192 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: chdlc:slarp]
Cisco HDLC
    Address: Multicast (0x8f)
    Control: 0x00
    Protocol: SLARP (0x8035)
Cisco SLARP
    Packet type: Line keepalive (2)
    Outgoing sequence number: 5
    Returned sequence number: 2
    Reliability: 0xffff
Frame 19: 24 bytes on wire (192 bits), 24 bytes captured (192 bits) on interface 0
    Interface id: 0 (-)
    Encapsulation type: Cisco HDLC (28)
    Arrival Time: Aug 22, 2017 00:20:28.300209000 й
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1503332428.300209000 seconds
    [Time delta from previous captured frame: 8.603183000 seconds]
    [Time delta from previous displayed frame: 8.603183000 seconds]
    [Time since reference or first frame: 60.138167000 seconds]
    Frame Number: 19
    Frame Length: 24 bytes (192 bits)
    Capture Length: 24 bytes (192 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: chdlc:slarp]
Cisco HDLC
    Address: Multicast (0x8f)
    Control: 0x00
    Protocol: SLARP (0x8035)
Cisco SLARP
    Packet type: Line keepalive (2)
    Outgoing sequence number: 3
    Returned sequence number: 5
    Reliability: 0xffff
Frame 20: 24 bytes on wire (192 bits), 24 bytes captured (192 bits) on interface 0
    Interface id: 0 (-)
    Encapsulation type: Cisco HDLC (28)
    Arrival Time: Aug 22, 2017 00:20:28.988014000 й
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1503332428.988014000 seconds
    [Time delta from previous captured frame: 0.687805000 seconds]
    [Time delta from previous displayed frame: 0.687805000 seconds]
    [Time since reference or first frame: 60.825972000 seconds]
    Frame Number: 20
    Frame Length: 24 bytes (192 bits)
    Capture Length: 24 bytes (192 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: chdlc:slarp]
Cisco HDLC
    Address: Multicast (0x8f)
    Control: 0x00
    Protocol: SLARP (0x8035)
Cisco SLARP
    Packet type: Line keepalive (2)
    Outgoing sequence number: 6
    Returned sequence number: 3
    Reliability: 0xffff

Frame 21: 104 bytes on wire (832 bits), 104 bytes captured (832 bits) on interface 0
    Interface id: 0 (-)
    Encapsulation type: Cisco HDLC (28)
    Arrival Time: Aug 22, 2017 00:20:34.504765000 й
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1503332434.504765000 seconds
    [Time delta from previous captured frame: 5.516751000 seconds]
    [Time delta from previous displayed frame: 5.516751000 seconds]
    [Time since reference or first frame: 66.342723000 seconds]
    Frame Number: 21
    Frame Length: 104 bytes (832 bits)
    Capture Length: 104 bytes (832 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: chdlc:ip:icmp:data]
    [Coloring Rule Name: ICMP]
    [Coloring Rule String: icmp || icmpv6]
Cisco HDLC
    Address: Unicast (0x0f)
    Control: 0x00
    Protocol: IP (0x0800)
Internet Protocol Version 4, Src: 202.100.23.2, Dst: 202.100.23.3
Internet Control Message Protocol

Frame 22: 104 bytes on wire (832 bits), 104 bytes captured (832 bits) on interface 0
    Interface id: 0 (-)
    Encapsulation type: Cisco HDLC (28)
    Arrival Time: Aug 22, 2017 00:20:34.515784000 й
    [Time shift for this packet: 0.000000000 seconds]
    Epoch Time: 1503332434.515784000 seconds
    [Time delta from previous captured frame: 0.011019000 seconds]
    [Time delta from previous displayed frame: 0.011019000 seconds]
    [Time since reference or first frame: 66.353742000 seconds]
    Frame Number: 22
    Frame Length: 104 bytes (832 bits)
    Capture Length: 104 bytes (832 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: chdlc:ip:icmp:data]
    [Coloring Rule Name: ICMP]
    [Coloring Rule String: icmp || icmpv6]
Cisco HDLC
    Address: Unicast (0x0f)
    Control: 0x00
    Protocol: IP (0x0800)
Internet Protocol Version 4, Src: 202.100.23.3, Dst: 202.100.23.2
Internet Control Message Protocol
时间: 2024-12-08 07:37:10

hdlc抓包分析的相关文章

tcpdump抓包分析具体解释

說實在的,對於 tcpdump 這個軟體來說,你甚至能够說這個軟體其實就是個駭客軟體, 因為他不但能够分析封包的流向,連封包的內容也能够進行『監聽』, 假设你使用的傳輸資料是明碼的話,不得了,在 router 上面就可能被人家監聽走了! 非常可怕吶!所以,我們也要來瞭解一下這個軟體啊!(註:這個 tcpdump 必須使用 root 的身份執行) [[email protected] ~]# tcpdump [-nn] [-i 介面] [-w 儲存檔名] [-c 次數] [-Ae] [-qX] [

云计算之路-阿里云上:Wireshark抓包分析一个耗时20秒的请求

这篇博文分享的是我们针对一个耗时20秒的请求,用Wireshark进行抓包分析的过程. 请求的流程是这样的:客户端浏览器 -> SLB(负载均衡) -> ECS(云服务器) -> SLB -> 客户端浏览器. 下面是分析的过程: 1. 启动Wireshark,针对内网网卡进行抓包. 2. 在IIS日志中找出要分析的请求(借助Log Parser Studio) 通过c-ip(Client IP Address)可以获知SLB的内网IP,在分析Wireshar抓包时需要依据这个IP进

Python 爬虫知识点 - 淘宝商品检索结果抓包分析(续二)

一.URL分析 通过对“Python机器学习”结果抓包分析,有两个无规律的参数:_ksTS和callback.通过构建如下URL可以获得目标关键词的检索结果,如下所示: https://s.taobao.com/search?data-key=s&data-value=44&ajax=true&_ksTS=1482325509866_2527&callback=jsonp2528&q=Python机器学习&imgfile=&js=1&stat

使用Fiddler对手机进行抓包分析

场景:一个html页面,安卓app使用webview来显示,但是显示效果不是预期的.于是自己写了一个基本webview的demo,使用webview的loadurl方法请求这个html页面.可以正确显示,但是客户端组抓包说我请求的地址不一样,让我自己抓包分析. 分析:app在请求这个页面时请求附加了字符串及cookie等信息. 解决方法:使用Fiddler抓包,抓包过程网上有很多教程,注意一点有的手机可能设置代理时不能设置全局代理,可以使用ProxyDroid来设置全局代理. Fiddler抓包

云计算之路-阿里云上:超过70秒的请求抓包分析

超过70秒的请求是通过分析IIS日志发现的: 10.159.63.104是SLB的内网IP. 通过Wireshark抓包分析请求是9:22:21收到的(tcp.stream eq 23080): 09:22:21.299838000 10.159.63.104 10.161.241.208 HTTP 291 GET /eastsea/p/3764040.html HTTP/1.0 这个请求响应内容的长度是:Content-Length 1154110(1.1MB) 云服务器(ECS)在收到请求后

Wireshark抓包分析从入门到精通

曾近有个牛逼的实战课程放在你的面前,你不懂得好好珍惜,直到失去后才追悔莫及,如果G-LAB可以给你再来一次的机会,你会不会抓住?没错,G-LAB真的给了你再来一次的机会.[Wireshark抓包分析从入门到精通]主讲<郭主任>(月光宝盒索取)请联系QQ:2853771084

TcpIP协议,HTTP,DNS 实战:基于wireshark与BurpSuit抓包分析

TcpIP协议,HTTP,DNS 实战:基于wireshark与BurpSuite抓包分析

python Pycurl 库 —— 实现对网站抓包分析

经常使用基调网络的同学,可能对基调网络对页面元素的性能展示感觉很好.它可以做到对一条URL做详细的检测,包括:阻塞时间.DNS解析时间.建立连接时间.SSL握手时间.发出请求时间.首包时间等. 其实,我们也可以做到.比如Python pycurl 库就可以做到对数据的收集,然后可以对收集的数据写入redis或者Mysql.最后前端使用echars通过图形的形式进行展示出来. echars是百度一个开源项目,功能很强大(项目URL:http://echarts.baidu.com)可以将数据通过各

[转]Linux操作系统tcpdump抓包分析详解

PS:tcpdump是一个用于截取网络分组,并输出分组内容的工具,简单说就是数据包抓包工具.tcpdump凭借强大的功能和灵活的截取策略,使其成为Linux系统下用于网络分析和问题排查的首选工具. tcpdump提供了源代码,公开了接口,因此具备很强的可扩展性,对于网络维护和入侵者都是非常有用的工具.tcpdump存在于基本的Linux系统中,由于它需要将网络界面设置为混杂模式,普通用户不能正常执行,但具备root权限的用户可以直接执行它来获取网络上的信息.因此系统中存在网络分析工具主要不是对本