Join David Bombal for an in-depth discussion in this video Network tap: Forward capture via GRE tunnel, part of Practical Software-Defined Networking: 4 SDN and OpenFlow Applications.
- [Narrator] So in the first demonstration I'm going to show you Network Visualizer with a 3800 series switch. In other words, using a physical switch and then I'll do a similar demonstration using Mininet. Network Visualizer has been installed on this controller. I can see that by going to Applications and in this example, notice Network Visualizer is currently active and hence the gooey interface of the controller has been extended with Network Visualizer functionality.
Before showing you how to configure this, I'm going to show you what it can do. Basically, what Network Visualizer allows you to do is to forward traffic from a switch to a central monitoring station. On this local PC here, I'm running Wireshark but this PC is not connected to the OpenFlow network. In this topology, I have a host connected to the 3800 series switch.
Here's the host, with the browser open to the Open Networking Foundation's website. At my capture host, running Wireshark is not connected to the switch, the 3800 series switch. It is separated from the 3800 series switch by an IP network, which could be routed, it could be switched, it could be across WAN, it doesn't matter, what I'm going to do is I'm going to intercept traffic of a host, in this case, this PC connected to the switch, and I'm going to encapsulate the captured packets within a GRE tunnel and forward that to my capturing device, which I'm running locally.
My capturing device is not connected to the switch that I'm going to do the capture from. Looking at a topology, my capture host is somewhere in this cloud. My HP Controller is somewhere in this cloud, running the Network Visualizer application. The host that I want to capture traffic from, is over here. It's connected to this 3800 series switch. The Wireshark host, which is over here, is separated from the 3800 series switch by an IP network which is in turn connected to this 5400, which is connected to the 3800 series switch.
This 3800 series switch is running OpenFlow on the V-LAN where this host is connected. What it's going to do, is it's going to create a GRE tunnel and forward the traffic to my host that's running Wireshark. Traffic sent from this host, UserVM2 is going to be copied and forwarded through the GRE tunnel to my Wireshark host. In addition it will be forwarded onto the network using normal forward, in other words using traditional routing and switching.
Packets that I decide to capture are going to be copied and sent through the GRE tunnel to my Wireshark device.
- Microsoft Skype SDN API
- HPE physical switch, OpenFlow tables, and wiretap tunnel
- OVSDB on Mininet
- DNS interception using OpenFlow
- Cisco SDN options
- Cisco APIC-EM path trace