SlideShare a Scribd company logo
MUM
EUROPE
2017
MIKROTIK TRAFFIC
GENERATOR STUDY
CASE
JOSE MANUEL ROMAN
j o s e . r o m a n @ f i b e r c l i . c o m + 3 4 6 5 2 2 4 1 4 3 1
M A D R I D / P R A G U E
• (2016–Now)CEO@FiberCLI
• (2015–Now)CTOWISP
17 years experience at IT industry, Mikrotik Certified Consultant and Trainer. MTCNA, MTCRE, MTCTCE,
MTCUME,MTCWE,MTCIPv6E,MTCINE, CISA,CISSP,MasterITIL.
• (2008–Now)SecurityConsultantandAnalyst
• (2000–2007)Networking, SecurityandITILTeacher
JOSE MANUEL ROMAN
J O S E . r o m a n @ f i b e r c l i . c o m + 3 4 6 5 2 2 4 1 4 3 1
M A D R I D / P R A G U E
• (2016@MUMMiddleEast)-Systemintegration andanalysis
• (2016@MUMSpain)-Integración deMikroTik concabeceras defibraóptica
• (2016@MUMEurope)-SecuringandtestingwithMikroTik
• (2015@MUMSpain)-Pruebasdeseguridadyconfiguración conMikrotik
My previous presentations at MUM
COMPANY PROFILE
PROJECT BASED
• Fiber optic installation outdor and
indoor (Hotel and Office Building)
• Wireless installation Rural area and
City
b u s i n e s s i n q u i r i e S : h e l l o @ f i b e r c l i . c o m
CONSULTANT
• Mikrotik Products
• Licensed Antennas
• Ipv4 Brocker
• Advanced monitoring integrations
b u s i n e s s i n q u i r i e S : h e l l o @ f i b e r c l i . c o m
TRAINING
• Official Mikrotik Training Partner
with three different languages and
modules (English, Indonesia and
Spanish)
• Courses on premises of companies in
Europe and middle east
• Specialized in IPv6
b u s i n e s s i n q u i r i e S : h e l l o @ f i b e r c l i . c o m
AGENDA
▪ Traffic Generator Introduction
▪ Special Use Case
▪ Example
Objetive
The goal of this presentation is to explain the
operation of the traffic generator
11
Problem
What to do when I need to test or audit whether
a router or a system is working correctly?
12
Symptoms
We have a complex configuration and we have no
idea how to test it.
13
Solution
Traffic generator
14
TRAFFIC GENERATOR
INTRODUCTION
WHAT IS
TRAFFIC
GENERATOR?
Traffic Generator is a tool that allows to evaluate performance of DUT
(Device Under Test) or SUT (System Under Test).
“
“https://wiki.mikrotik.com/wiki/Manual:Tools/Traffic_Generator
WHAT’S TRAFFIC
GENERATOR CAN
DO?
“
“
Traffic Generator tool can generate and send RAW packets over specific ports.
It also collects latency and jitter values, tx/rx rates, counts lost packets and
detects Out-of-Order (OOO) packets.
Traffic Generator can be used similar to bandwidth test tool as well as
generate packets that will be routed back to packet generator for advanced
status collection.
DEVICE UNDER TEST
TRAFFIC GENERATOR
Test performance of device or system before migrate to production
infrastructure such as :
• PPS (Packet Per Second)
• Throughput /Bandwidth
• CPU
• Hardware Encryption
Test performanceof link (wired or wireless) between sites :
• Latency
• Packet loss
• Jitter
• Bandwidth
SITE 1 SITE 2
DEVICE UNDER TEST
TRAFFIC GENERATOR TRAFFIC GENERATOR TRAFFIC GENERATOR
Polices (firewall or qos) test performance of device :
• Creating “fabricated” packets
EXAMPLE
CASE 1
Simple Traffic Generator
DEVICE UNDER TESTTRAFFIC GENERATOR
10.1.0.0/24
/ip address
add address=10.1.0.1/24 interface=ether1 network=10.1.0.0
/ip address
add address=10.1.0.2/24 interface=ether1 network=10.1.0.0
PORT TEMPLATE STREAM
/tool traffic-generator port
add interface=ether1 name=port1
/tool traffic-generator packet-template
add name=template-1 port=port1 ip-dst=10.1.0.2 ip-src=10.1.0.1
/tool traffic-generator stream
add name=stream-1 packet-size=1500 tx-template=template-1
WHY TX/RX TRAFFIC’S NOT EQUAL?
Because we only send (tx) traffic to the
destination address as above, DUT/SUT only
receive traffic without sending the packet back
We change the template in the “IP” section like
this.
Ip address ether1 on Traffic-Generator device
Ip address ether1 on DUT/SUT device
CASE 2
Multi-Port Traffic Generator
DEVICE UNDER TESTTRAFFIC GENERATOR
/ip address
add address=10.1.0.2/24 interface=ether1 network=10.1.0.0
add address=10.2.0.2/24 interface=ether2 network=10.2.0.0
add address=10.3.0.2/24 interface=ether3 network=10.3.0.0
/ip address
add address=10.1.0.1/24 interface=ether1 network=10.1.0.0
add address=10.2.0.1/24 interface=ether2 network=10.2.0.0
add address=10.3.0.1/24 interface=ether3 network=10.3.0.0
/ipv6 address
add address=2001:10:1:0::1 interface=ether1
add address=2001:10:2:0::1 interface=ether2
add address=2001:10:3:0::1 interface=ether3
/ipv6 address
add address=2001:10:1:0::2 interface=ether1
add address=2001:10:2:0::2 interface=ether2
add address=2001:10:3:0::2 interface=ether3
TEMPLATES START
TRAFFIC GENERATOR
DEVICE UNDER TEST
PORT 1 PORT 2 PORT 3
PORT 1 PORT 2 PORT 3
/tool traffic-generator packet-template
add header-stack=mac,ip,ipv6,udp ip-dst=10.2.0.1 ip-gateway=10.1.0.2 ipv6-dst=2001:10:2::1/128 ipv6-gateway=2001:10:1::2 name=port1-to-port2
add header-stack=mac,ip,ipv6,tcp ip-dst=10.3.0.1 ip-gateway=10.1.0.2 ipv6-dst=2001:10:3::1/128 ipv6-gateway=2001:10:1::2 name=port1-to-port3
add header-stack=mac,ip,ipv6,raw ip-dst=10.1.0.1 ip-gateway=10.2.0.2 ipv6-dst=2001:10:1::1/128 ipv6-gateway=2001:10:2::2 name=port2-to-port1
add header-stack=mac,ipv6,ip,udp ip-dst=10.3.0.1 ip-gateway=10.2.0.2 ipv6-dst=2001:10:3::1/128 ipv6-gateway=2001:10:2::2 name=port2-to-port3
add header-stack=mac,ipv6,ip,tcp ip-dst=10.1.0.1 ip-gateway=10.3.0.2 ipv6-dst=2001:10:1::1/128 ipv6-gateway=2001:10:3::2 name=port3-to-port1
add header-stack=mac,ipv6,ip,raw ip-dst=10.2.0.1 ip-gateway=10.3.0.2 ipv6-dst=2001:10:2::1/128 ipv6-gateway=2001:10:3::2 name=port3-to-port2
CASE 3
Fabricated Packets test
In this case we will try a queue tree configuration
that prioritizes voice traffic. QoS router has
mangle rules and queue tree limitations.
10.100.0.0/24
10.0.0.0/24
10.1.0.0/24
200.0.0.10
10.1.0.100
10.100.0.100
DUT
In this secenario we will generates three diferent
packets
• Two packets generated by (IP -PHONE_SIMULATOR) specified like
RTP and SIP packets.
• One packet generated by (INTRUDER) random packet like
spoofing
SCENARIO
/ip address
add address=10.1.0.100/24 interface=ether1 network=10.1.0.0
IP-PHONE_SIMULATOR
• RTP CALL voice audio data will be marked by DSCP value of
46 DSCP value of 46 results in a ToS byte value of 184
EF=0xB8
• SIP CALL signaling messages will be marked by DSCP value
of 26A DSCP value of 26 results in a ToS byte value of 104
AF31=0x68 (=104)75
CREATE FABRICATED VOIP TRAFIC
/tool traffic-generator packet-template
add ip-dscp=184 ip-dst=10.100.0.100 ip-gateway=10.1.0.1 ip-protocol=udp name=VOIP_RTP udp-dst-port=16384-32767
add ip-dscp=104 ip-dst=10.100.0.100 ip-gateway=10.1.0.1 ip-protocol=udp name=VOIP_SIP udp-dst-port=5060,5061
INTRUDER
/ip address
add address=200.0.0.10/24 interface=ether1 network=200.0.0.0
• Create random RAW packet in Traffic-Generator
CREATE FABRICATED RANDOM TRAFIC
/tool traffic-generator packet-template
add header-stack=mac,ip,raw ip-dst=10.100.0.100 ip-gateway=200.0.0.1 name=spoof
/tool traffic-generator stream add name=stream-1 packet-size=1500 tx-template=spoof
DUT/SUT
ip address
add address=10.100.0.1/24 comment="VOIP SERVER" interface=ether2 network=10.100.0.0
add address=10.0.0.1/24 comment=INTERNET interface=ether1 network=10.0.0.0
add address=10.1.0.1/24 comment=CLIENT interface=ether3 network=10.1.0.0
• Create two mangle for VOIP and one mangle for rest of
packets destinated to VOIP Server
• Create three queue-tree
• One parent queue (PBX_Traffic)
• One queue for rest packets (REST)
• One queue for VOIP packets (VOIP)
CREATE MANGLE AND QUEUE TREE
/ip firewall mangle
add action=mark-packet chain=prerouting comment="VOIP RULES" dscp=46 dst-address=10.100.0.100 new-packet-mark=voip-packets passthrough=no
add action=mark-packet chain=prerouting dscp=26 dst-address=10.100.0.100 new-packet-mark=voip-packets passthrough=no
add action=mark-packet chain=prerouting comment="REST RULES" dst-address=10.100.0.100 new-packet-mark=rest-packets passthrough=no
/queue tree
add name=PBX_Traffic parent=global
add limit-at=5M max-limit=10M name=REST packet-mark=rest-packets parent=PBX_Traffic
add limit-at=1M max-limit=1M name=VOIP packet-mark=voip-packets parent=PBX_Traffic priority=1
LAUNCH SIMULATION
• Launch traffic-generator from “INTRUDER” with packets 20
mbps
• Launch traffic-generator from “IP-PHONE_SIMULATOR” with 120
kbps traffic
INTRUDER
IP-PHONE SIMULATOR
DUT
CASE 4
Testing wireless
Station
AP
Traffic generator
Stats
Stats
CASE 5
Injecting pcap
What is pcap?
How can I generate pcap
captures?
Inject pcap
Inject pcap
Inject pcap
Conclusion
Grazie mille!
Jose.roman@fibercli.com

More Related Content

What's hot

Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Duane Bodle
 
From NAT to NAT Traversal
From NAT to NAT TraversalFrom NAT to NAT Traversal
From NAT to NAT Traversal
Li-Wei Yao
 
Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6
Private
 
NAT Traversal
NAT TraversalNAT Traversal
NAT Traversal
Davide Carboni
 
Fedv6tf-IPv6-new-friends
Fedv6tf-IPv6-new-friendsFedv6tf-IPv6-new-friends
Fedv6tf-IPv6-new-friends
Tim Martin
 
Things I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedThings I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I started
Faelix Ltd
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginEC-Council
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Wardner Maia
 
Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
Tim Martin
 
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
SolarWinds
 
05 06 ike
05   06 ike05   06 ike
05 06 ike
Babaa Naya
 
MyIX Updates
MyIX UpdatesMyIX Updates
MyIX Updates
MyNOG
 
MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
Akbar Azwir, MM, PMP, PMI-SP, PSM I, CISSP
 
ospf initial configuration
ospf initial configurationospf initial configuration
ospf initial configuration
RandyDookheran1
 
Nat
NatNat
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
Jeff Green
 
NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
singhsukdeep
 
Go with the Flow-v2
Go with the Flow-v2Go with the Flow-v2
Go with the Flow-v2Zobair Khan
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7
Nil Menon
 

What's hot (20)

Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
 
From NAT to NAT Traversal
From NAT to NAT TraversalFrom NAT to NAT Traversal
From NAT to NAT Traversal
 
Getting started with IPv6
Getting started with IPv6Getting started with IPv6
Getting started with IPv6
 
NAT Traversal
NAT TraversalNAT Traversal
NAT Traversal
 
Fedv6tf-IPv6-new-friends
Fedv6tf-IPv6-new-friendsFedv6tf-IPv6-new-friends
Fedv6tf-IPv6-new-friends
 
Things I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedThings I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I started
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
 
Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
 
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
NetFlow Best Practices - Tips and Tricks to Get the Most Out of Your Network ...
 
05 06 ike
05   06 ike05   06 ike
05 06 ike
 
MyIX Updates
MyIX UpdatesMyIX Updates
MyIX Updates
 
Asfws2014 tproxy
Asfws2014 tproxyAsfws2014 tproxy
Asfws2014 tproxy
 
MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
 
ospf initial configuration
ospf initial configurationospf initial configuration
ospf initial configuration
 
Nat
NatNat
Nat
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
NAT Ccna
NAT CcnaNAT Ccna
NAT Ccna
 
Go with the Flow-v2
Go with the Flow-v2Go with the Flow-v2
Go with the Flow-v2
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7
 

Viewers also liked

MUM Madrid 2016 - Mikrotik y Suricata
MUM Madrid 2016 - Mikrotik y SuricataMUM Madrid 2016 - Mikrotik y Suricata
MUM Madrid 2016 - Mikrotik y Suricata
Fajar Nugroho
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
Drift
 
Alcohols, thiols, phenols, and ethers
Alcohols, thiols, phenols, and ethersAlcohols, thiols, phenols, and ethers
Alcohols, thiols, phenols, and ethers
Marvin Gonzaga
 
Red Hat Storage Day Seattle: Stabilizing Petabyte Ceph Cluster in OpenStack C...
Red Hat Storage Day Seattle: Stabilizing Petabyte Ceph Cluster in OpenStack C...Red Hat Storage Day Seattle: Stabilizing Petabyte Ceph Cluster in OpenStack C...
Red Hat Storage Day Seattle: Stabilizing Petabyte Ceph Cluster in OpenStack C...
Red_Hat_Storage
 
Cryocar
CryocarCryocar
20151112 CITA BIM Gathering Keynote Dublin
20151112 CITA BIM Gathering Keynote Dublin20151112 CITA BIM Gathering Keynote Dublin
20151112 CITA BIM Gathering Keynote Dublin
Léon Berlo
 
10 of the Biggest Stories in Technology
10 of the Biggest Stories in Technology10 of the Biggest Stories in Technology
10 of the Biggest Stories in Technology
Brett Cotham
 
2017 Q1 - BIMserver introduction and overview
2017 Q1 - BIMserver introduction and overview2017 Q1 - BIMserver introduction and overview
2017 Q1 - BIMserver introduction and overview
Léon Berlo
 
Your 1st Ceph cluster
Your 1st Ceph clusterYour 1st Ceph cluster
Your 1st Ceph cluster
Mirantis
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science
Booz Allen Hamilton
 
IT in Healthcare
IT in HealthcareIT in Healthcare
IT in Healthcare
NetApp
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
InterQuest Group
 
UX, ethnography and possibilities: for Libraries, Museums and Archives
UX, ethnography and possibilities: for Libraries, Museums and ArchivesUX, ethnography and possibilities: for Libraries, Museums and Archives
UX, ethnography and possibilities: for Libraries, Museums and Archives
Ned Potter
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
Luminary Labs
 

Viewers also liked (14)

MUM Madrid 2016 - Mikrotik y Suricata
MUM Madrid 2016 - Mikrotik y SuricataMUM Madrid 2016 - Mikrotik y Suricata
MUM Madrid 2016 - Mikrotik y Suricata
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 
Alcohols, thiols, phenols, and ethers
Alcohols, thiols, phenols, and ethersAlcohols, thiols, phenols, and ethers
Alcohols, thiols, phenols, and ethers
 
Red Hat Storage Day Seattle: Stabilizing Petabyte Ceph Cluster in OpenStack C...
Red Hat Storage Day Seattle: Stabilizing Petabyte Ceph Cluster in OpenStack C...Red Hat Storage Day Seattle: Stabilizing Petabyte Ceph Cluster in OpenStack C...
Red Hat Storage Day Seattle: Stabilizing Petabyte Ceph Cluster in OpenStack C...
 
Cryocar
CryocarCryocar
Cryocar
 
20151112 CITA BIM Gathering Keynote Dublin
20151112 CITA BIM Gathering Keynote Dublin20151112 CITA BIM Gathering Keynote Dublin
20151112 CITA BIM Gathering Keynote Dublin
 
10 of the Biggest Stories in Technology
10 of the Biggest Stories in Technology10 of the Biggest Stories in Technology
10 of the Biggest Stories in Technology
 
2017 Q1 - BIMserver introduction and overview
2017 Q1 - BIMserver introduction and overview2017 Q1 - BIMserver introduction and overview
2017 Q1 - BIMserver introduction and overview
 
Your 1st Ceph cluster
Your 1st Ceph clusterYour 1st Ceph cluster
Your 1st Ceph cluster
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science
 
IT in Healthcare
IT in HealthcareIT in Healthcare
IT in Healthcare
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?[Infographic] How will Internet of Things (IoT) change the world as we know it?
[Infographic] How will Internet of Things (IoT) change the world as we know it?
 
UX, ethnography and possibilities: for Libraries, Museums and Archives
UX, ethnography and possibilities: for Libraries, Museums and ArchivesUX, ethnography and possibilities: for Libraries, Museums and Archives
UX, ethnography and possibilities: for Libraries, Museums and Archives
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similar to MUM Europe 2017 - Traffic Generator Case Study

Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)
Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)
Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)
Jakub Botwicz
 
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...Mullaiselvan Mohan
 
Being HAPI! Reverse Proxying on Purpose
Being HAPI! Reverse Proxying on PurposeBeing HAPI! Reverse Proxying on Purpose
Being HAPI! Reverse Proxying on Purpose
Aman Kohli
 
Cisco Automation with Puppet and onePK - PuppetConf 2013
Cisco Automation with Puppet and onePK - PuppetConf 2013Cisco Automation with Puppet and onePK - PuppetConf 2013
Cisco Automation with Puppet and onePK - PuppetConf 2013
Puppet
 
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SPKrzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
PROIDEA
 
Web Template Mechanisms in SOC Verification - DVCon.pdf
Web Template Mechanisms in SOC Verification - DVCon.pdfWeb Template Mechanisms in SOC Verification - DVCon.pdf
Web Template Mechanisms in SOC Verification - DVCon.pdf
SamHoney6
 
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
InfluxData
 
Transport for London - Using Data to Keep London Moving
Transport for London - Using Data to Keep London MovingTransport for London - Using Data to Keep London Moving
Transport for London - Using Data to Keep London Moving
WSO2
 
Network-Connected Development with ZeroMQ
Network-Connected Development with ZeroMQNetwork-Connected Development with ZeroMQ
Network-Connected Development with ZeroMQ
ICS
 
CI/CD and TDD in deploying kamailio
CI/CD and TDD in deploying kamailioCI/CD and TDD in deploying kamailio
CI/CD and TDD in deploying kamailio
Aleksandar Sosic
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m
Agus Awaludin
 
Video Traffic Management
Video Traffic ManagementVideo Traffic Management
Video Traffic Management
Shenick Network Systems
 
WebRTC Summit November 2013 - WebRTC Interoperability (and why it is important)
WebRTC Summit November 2013 - WebRTC Interoperability (and why it is important)WebRTC Summit November 2013 - WebRTC Interoperability (and why it is important)
WebRTC Summit November 2013 - WebRTC Interoperability (and why it is important)
Crocodile WebRTC SDK and Cloud Signalling Network
 
Matrix.org decentralised communication, Matthew Hodgson, TADSummit
Matrix.org decentralised communication, Matthew Hodgson, TADSummitMatrix.org decentralised communication, Matthew Hodgson, TADSummit
Matrix.org decentralised communication, Matthew Hodgson, TADSummit
Alan Quayle
 
Attacking SAP Mobile
Attacking SAP MobileAttacking SAP Mobile
Attacking SAP Mobile
ERPScan
 
Network Automation with Salt and NAPALM: Introuction
Network Automation with Salt and NAPALM: IntrouctionNetwork Automation with Salt and NAPALM: Introuction
Network Automation with Salt and NAPALM: Introuction
Cloudflare
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
Sumutiu Marius
 
Splunk app for stream
Splunk app for stream Splunk app for stream
Splunk app for stream csching
 

Similar to MUM Europe 2017 - Traffic Generator Case Study (20)

Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)
Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)
Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)
 
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
 
Being HAPI! Reverse Proxying on Purpose
Being HAPI! Reverse Proxying on PurposeBeing HAPI! Reverse Proxying on Purpose
Being HAPI! Reverse Proxying on Purpose
 
Cisco Automation with Puppet and onePK - PuppetConf 2013
Cisco Automation with Puppet and onePK - PuppetConf 2013Cisco Automation with Puppet and onePK - PuppetConf 2013
Cisco Automation with Puppet and onePK - PuppetConf 2013
 
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SPKrzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
Krzysztof Mazepa - Netflow/cflow - ulubionym narzędziem operatorów SP
 
Resume 8 Yrs.Exp. c c++,Telecom
Resume 8 Yrs.Exp. c c++,TelecomResume 8 Yrs.Exp. c c++,Telecom
Resume 8 Yrs.Exp. c c++,Telecom
 
Mohamed_Omar_Cv
Mohamed_Omar_CvMohamed_Omar_Cv
Mohamed_Omar_Cv
 
Web Template Mechanisms in SOC Verification - DVCon.pdf
Web Template Mechanisms in SOC Verification - DVCon.pdfWeb Template Mechanisms in SOC Verification - DVCon.pdf
Web Template Mechanisms in SOC Verification - DVCon.pdf
 
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
 
Transport for London - Using Data to Keep London Moving
Transport for London - Using Data to Keep London MovingTransport for London - Using Data to Keep London Moving
Transport for London - Using Data to Keep London Moving
 
Network-Connected Development with ZeroMQ
Network-Connected Development with ZeroMQNetwork-Connected Development with ZeroMQ
Network-Connected Development with ZeroMQ
 
CI/CD and TDD in deploying kamailio
CI/CD and TDD in deploying kamailioCI/CD and TDD in deploying kamailio
CI/CD and TDD in deploying kamailio
 
Dccp evaluation for sip signaling ict4 m
Dccp evaluation for sip signaling   ict4 m Dccp evaluation for sip signaling   ict4 m
Dccp evaluation for sip signaling ict4 m
 
Video Traffic Management
Video Traffic ManagementVideo Traffic Management
Video Traffic Management
 
WebRTC Summit November 2013 - WebRTC Interoperability (and why it is important)
WebRTC Summit November 2013 - WebRTC Interoperability (and why it is important)WebRTC Summit November 2013 - WebRTC Interoperability (and why it is important)
WebRTC Summit November 2013 - WebRTC Interoperability (and why it is important)
 
Matrix.org decentralised communication, Matthew Hodgson, TADSummit
Matrix.org decentralised communication, Matthew Hodgson, TADSummitMatrix.org decentralised communication, Matthew Hodgson, TADSummit
Matrix.org decentralised communication, Matthew Hodgson, TADSummit
 
Attacking SAP Mobile
Attacking SAP MobileAttacking SAP Mobile
Attacking SAP Mobile
 
Network Automation with Salt and NAPALM: Introuction
Network Automation with Salt and NAPALM: IntrouctionNetwork Automation with Salt and NAPALM: Introuction
Network Automation with Salt and NAPALM: Introuction
 
BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.BlackHat Hacking - Hacking VoIP.
BlackHat Hacking - Hacking VoIP.
 
Splunk app for stream
Splunk app for stream Splunk app for stream
Splunk app for stream
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

MUM Europe 2017 - Traffic Generator Case Study

  • 3. JOSE MANUEL ROMAN j o s e . r o m a n @ f i b e r c l i . c o m + 3 4 6 5 2 2 4 1 4 3 1 M A D R I D / P R A G U E • (2016–Now)CEO@FiberCLI • (2015–Now)CTOWISP 17 years experience at IT industry, Mikrotik Certified Consultant and Trainer. MTCNA, MTCRE, MTCTCE, MTCUME,MTCWE,MTCIPv6E,MTCINE, CISA,CISSP,MasterITIL. • (2008–Now)SecurityConsultantandAnalyst • (2000–2007)Networking, SecurityandITILTeacher
  • 4. JOSE MANUEL ROMAN J O S E . r o m a n @ f i b e r c l i . c o m + 3 4 6 5 2 2 4 1 4 3 1 M A D R I D / P R A G U E • (2016@MUMMiddleEast)-Systemintegration andanalysis • (2016@MUMSpain)-Integración deMikroTik concabeceras defibraóptica • (2016@MUMEurope)-SecuringandtestingwithMikroTik • (2015@MUMSpain)-Pruebasdeseguridadyconfiguración conMikrotik My previous presentations at MUM
  • 6.
  • 7. PROJECT BASED • Fiber optic installation outdor and indoor (Hotel and Office Building) • Wireless installation Rural area and City b u s i n e s s i n q u i r i e S : h e l l o @ f i b e r c l i . c o m
  • 8. CONSULTANT • Mikrotik Products • Licensed Antennas • Ipv4 Brocker • Advanced monitoring integrations b u s i n e s s i n q u i r i e S : h e l l o @ f i b e r c l i . c o m
  • 9. TRAINING • Official Mikrotik Training Partner with three different languages and modules (English, Indonesia and Spanish) • Courses on premises of companies in Europe and middle east • Specialized in IPv6 b u s i n e s s i n q u i r i e S : h e l l o @ f i b e r c l i . c o m
  • 10. AGENDA ▪ Traffic Generator Introduction ▪ Special Use Case ▪ Example
  • 11. Objetive The goal of this presentation is to explain the operation of the traffic generator 11
  • 12. Problem What to do when I need to test or audit whether a router or a system is working correctly? 12
  • 13. Symptoms We have a complex configuration and we have no idea how to test it. 13
  • 17. Traffic Generator is a tool that allows to evaluate performance of DUT (Device Under Test) or SUT (System Under Test). “ “https://wiki.mikrotik.com/wiki/Manual:Tools/Traffic_Generator
  • 19. “ “ Traffic Generator tool can generate and send RAW packets over specific ports. It also collects latency and jitter values, tx/rx rates, counts lost packets and detects Out-of-Order (OOO) packets. Traffic Generator can be used similar to bandwidth test tool as well as generate packets that will be routed back to packet generator for advanced status collection.
  • 20. DEVICE UNDER TEST TRAFFIC GENERATOR Test performance of device or system before migrate to production infrastructure such as : • PPS (Packet Per Second) • Throughput /Bandwidth • CPU • Hardware Encryption
  • 21. Test performanceof link (wired or wireless) between sites : • Latency • Packet loss • Jitter • Bandwidth SITE 1 SITE 2
  • 22. DEVICE UNDER TEST TRAFFIC GENERATOR TRAFFIC GENERATOR TRAFFIC GENERATOR Polices (firewall or qos) test performance of device : • Creating “fabricated” packets
  • 25. DEVICE UNDER TESTTRAFFIC GENERATOR 10.1.0.0/24
  • 26. /ip address add address=10.1.0.1/24 interface=ether1 network=10.1.0.0 /ip address add address=10.1.0.2/24 interface=ether1 network=10.1.0.0
  • 28. /tool traffic-generator port add interface=ether1 name=port1
  • 29.
  • 30. /tool traffic-generator packet-template add name=template-1 port=port1 ip-dst=10.1.0.2 ip-src=10.1.0.1
  • 31. /tool traffic-generator stream add name=stream-1 packet-size=1500 tx-template=template-1
  • 32.
  • 33. WHY TX/RX TRAFFIC’S NOT EQUAL?
  • 34. Because we only send (tx) traffic to the destination address as above, DUT/SUT only receive traffic without sending the packet back
  • 35. We change the template in the “IP” section like this. Ip address ether1 on Traffic-Generator device Ip address ether1 on DUT/SUT device
  • 36.
  • 37.
  • 40. /ip address add address=10.1.0.2/24 interface=ether1 network=10.1.0.0 add address=10.2.0.2/24 interface=ether2 network=10.2.0.0 add address=10.3.0.2/24 interface=ether3 network=10.3.0.0 /ip address add address=10.1.0.1/24 interface=ether1 network=10.1.0.0 add address=10.2.0.1/24 interface=ether2 network=10.2.0.0 add address=10.3.0.1/24 interface=ether3 network=10.3.0.0 /ipv6 address add address=2001:10:1:0::1 interface=ether1 add address=2001:10:2:0::1 interface=ether2 add address=2001:10:3:0::1 interface=ether3 /ipv6 address add address=2001:10:1:0::2 interface=ether1 add address=2001:10:2:0::2 interface=ether2 add address=2001:10:3:0::2 interface=ether3
  • 42. TRAFFIC GENERATOR DEVICE UNDER TEST PORT 1 PORT 2 PORT 3 PORT 1 PORT 2 PORT 3
  • 43. /tool traffic-generator packet-template add header-stack=mac,ip,ipv6,udp ip-dst=10.2.0.1 ip-gateway=10.1.0.2 ipv6-dst=2001:10:2::1/128 ipv6-gateway=2001:10:1::2 name=port1-to-port2 add header-stack=mac,ip,ipv6,tcp ip-dst=10.3.0.1 ip-gateway=10.1.0.2 ipv6-dst=2001:10:3::1/128 ipv6-gateway=2001:10:1::2 name=port1-to-port3 add header-stack=mac,ip,ipv6,raw ip-dst=10.1.0.1 ip-gateway=10.2.0.2 ipv6-dst=2001:10:1::1/128 ipv6-gateway=2001:10:2::2 name=port2-to-port1 add header-stack=mac,ipv6,ip,udp ip-dst=10.3.0.1 ip-gateway=10.2.0.2 ipv6-dst=2001:10:3::1/128 ipv6-gateway=2001:10:2::2 name=port2-to-port3 add header-stack=mac,ipv6,ip,tcp ip-dst=10.1.0.1 ip-gateway=10.3.0.2 ipv6-dst=2001:10:1::1/128 ipv6-gateway=2001:10:3::2 name=port3-to-port1 add header-stack=mac,ipv6,ip,raw ip-dst=10.2.0.1 ip-gateway=10.3.0.2 ipv6-dst=2001:10:2::1/128 ipv6-gateway=2001:10:3::2 name=port3-to-port2
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 50. In this case we will try a queue tree configuration that prioritizes voice traffic. QoS router has mangle rules and queue tree limitations.
  • 52. In this secenario we will generates three diferent packets • Two packets generated by (IP -PHONE_SIMULATOR) specified like RTP and SIP packets. • One packet generated by (INTRUDER) random packet like spoofing SCENARIO
  • 53. /ip address add address=10.1.0.100/24 interface=ether1 network=10.1.0.0 IP-PHONE_SIMULATOR
  • 54. • RTP CALL voice audio data will be marked by DSCP value of 46 DSCP value of 46 results in a ToS byte value of 184 EF=0xB8 • SIP CALL signaling messages will be marked by DSCP value of 26A DSCP value of 26 results in a ToS byte value of 104 AF31=0x68 (=104)75 CREATE FABRICATED VOIP TRAFIC
  • 55.
  • 56. /tool traffic-generator packet-template add ip-dscp=184 ip-dst=10.100.0.100 ip-gateway=10.1.0.1 ip-protocol=udp name=VOIP_RTP udp-dst-port=16384-32767 add ip-dscp=104 ip-dst=10.100.0.100 ip-gateway=10.1.0.1 ip-protocol=udp name=VOIP_SIP udp-dst-port=5060,5061
  • 57. INTRUDER /ip address add address=200.0.0.10/24 interface=ether1 network=200.0.0.0
  • 58. • Create random RAW packet in Traffic-Generator CREATE FABRICATED RANDOM TRAFIC
  • 59. /tool traffic-generator packet-template add header-stack=mac,ip,raw ip-dst=10.100.0.100 ip-gateway=200.0.0.1 name=spoof /tool traffic-generator stream add name=stream-1 packet-size=1500 tx-template=spoof
  • 60. DUT/SUT ip address add address=10.100.0.1/24 comment="VOIP SERVER" interface=ether2 network=10.100.0.0 add address=10.0.0.1/24 comment=INTERNET interface=ether1 network=10.0.0.0 add address=10.1.0.1/24 comment=CLIENT interface=ether3 network=10.1.0.0
  • 61. • Create two mangle for VOIP and one mangle for rest of packets destinated to VOIP Server • Create three queue-tree • One parent queue (PBX_Traffic) • One queue for rest packets (REST) • One queue for VOIP packets (VOIP) CREATE MANGLE AND QUEUE TREE
  • 62. /ip firewall mangle add action=mark-packet chain=prerouting comment="VOIP RULES" dscp=46 dst-address=10.100.0.100 new-packet-mark=voip-packets passthrough=no add action=mark-packet chain=prerouting dscp=26 dst-address=10.100.0.100 new-packet-mark=voip-packets passthrough=no add action=mark-packet chain=prerouting comment="REST RULES" dst-address=10.100.0.100 new-packet-mark=rest-packets passthrough=no
  • 63. /queue tree add name=PBX_Traffic parent=global add limit-at=5M max-limit=10M name=REST packet-mark=rest-packets parent=PBX_Traffic add limit-at=1M max-limit=1M name=VOIP packet-mark=voip-packets parent=PBX_Traffic priority=1
  • 65. • Launch traffic-generator from “INTRUDER” with packets 20 mbps • Launch traffic-generator from “IP-PHONE_SIMULATOR” with 120 kbps traffic
  • 68. DUT
  • 71. AP
  • 73. Stats
  • 74. Stats
  • 77. How can I generate pcap captures?
  • 78.
  • 83.