1 00:00:02,494 --> 00:00:04,911 (logo music) 2 00:00:08,718 --> 00:00:09,951 - So at this point, I'm assuming 3 00:00:09,951 --> 00:00:13,435 that you downloaded the GNS3 executable file, 4 00:00:13,435 --> 00:00:15,248 the application, and you've also downloaded 5 00:00:15,248 --> 00:00:18,914 at least one Cisco IOS software image. 6 00:00:18,914 --> 00:00:22,089 So now we're going to open up that executable file 7 00:00:22,089 --> 00:00:25,103 from GNS3, and I'm going to go through something 8 00:00:25,103 --> 00:00:27,446 called the Setup Wizard, which is a series of steps 9 00:00:27,446 --> 00:00:31,529 you have to go through to get GNS3 fully up and working. 10 00:00:31,529 --> 00:00:34,063 Now there's actually quite a lot to talk about 11 00:00:34,063 --> 00:00:35,957 during the setup phase here, so I'm going 12 00:00:35,957 --> 00:00:38,315 to divide this into two videos, and this is going 13 00:00:38,315 --> 00:00:41,363 to be part one of that series. 14 00:00:41,363 --> 00:00:45,196 So let's start with unpacking that executable, 15 00:00:47,037 --> 00:00:48,537 or that GNS3 file. 16 00:00:50,330 --> 00:00:52,413 So in my particular case, 17 00:00:54,300 --> 00:00:56,050 I've downloaded GNS3, 18 00:00:57,394 --> 00:01:00,085 right here to this GNS3 file, 19 00:01:00,085 --> 00:01:02,009 and you can see I've got various flavors of it. 20 00:01:02,009 --> 00:01:04,818 As of this recording, version 1.4.4 21 00:01:04,818 --> 00:01:07,805 is the most recent version of GNS3. 22 00:01:07,805 --> 00:01:11,972 So I'm just going to go ahead and double click on that. 23 00:01:13,332 --> 00:01:16,103 And that brings me to the very first page 24 00:01:16,103 --> 00:01:19,378 of the GNS3 setup wizard, so I'll click on Next, 25 00:01:19,378 --> 00:01:23,320 I will agree to the license, and I will let GNS3 install 26 00:01:23,320 --> 00:01:24,796 where it wants to. 27 00:01:24,796 --> 00:01:25,843 Okay, so here's where we're going 28 00:01:25,843 --> 00:01:27,277 to spend a little bit of time. 29 00:01:27,277 --> 00:01:30,830 If you are like me, and when you get something like this 30 00:01:30,830 --> 00:01:33,948 that wants to install a bunch of stuff onto your system, 31 00:01:33,948 --> 00:01:36,721 you might want to know what all of these things are, 32 00:01:36,721 --> 00:01:39,710 and if they're mandatory, and what they do. 33 00:01:39,710 --> 00:01:41,598 So let me just spend a little bit of time 34 00:01:41,598 --> 00:01:43,174 talking about each one of these things. 35 00:01:43,174 --> 00:01:45,747 Let's start with WinPcap. 36 00:01:45,747 --> 00:01:47,790 WinPcap is simply a driver. 37 00:01:47,790 --> 00:01:50,721 It connects to your NIC card, and it allows your NIC card 38 00:01:50,721 --> 00:01:54,842 to capture every single Ethernet frame it sees, 39 00:01:54,842 --> 00:01:56,924 and then send those Ethernet frames to some sort 40 00:01:56,924 --> 00:02:00,577 of application, like maybe WireShark, or some other kind 41 00:02:00,577 --> 00:02:03,182 of packet sniffing application. 42 00:02:03,182 --> 00:02:04,878 So it puts your NIC card into what's called 43 00:02:04,878 --> 00:02:06,437 promiscuous mode. 44 00:02:06,437 --> 00:02:10,291 Without WinPcap, your sniffing program wouldn't do anything. 45 00:02:10,291 --> 00:02:13,685 It wouldn't be able to capture anything. 46 00:02:13,685 --> 00:02:16,325 Or I should say, it would only be able to capture files 47 00:02:16,325 --> 00:02:18,423 that are sent to you, in other words, Ethernet frames 48 00:02:18,423 --> 00:02:22,276 are sent directly to your laptop in broadcast frames. 49 00:02:22,276 --> 00:02:25,658 Any other Ethernet frames that your Ethernet card sees, 50 00:02:25,658 --> 00:02:28,281 it normally ignores those frames, it discards them. 51 00:02:28,281 --> 00:02:30,185 Well, with WinPcap, it has the ability 52 00:02:30,185 --> 00:02:32,596 to actually collect everything it sees, 53 00:02:32,596 --> 00:02:34,543 and then send it to Wireshark. 54 00:02:34,543 --> 00:02:37,543 Wireshark is a packet-sniffing tool. 55 00:02:39,061 --> 00:02:42,133 If you've never actually seen Wireshark before, 56 00:02:42,133 --> 00:02:43,715 this is an example of what it looks like. 57 00:02:43,715 --> 00:02:45,722 After you've done a capture, you can see 58 00:02:45,722 --> 00:02:49,738 every single frame that your NIC card has collected. 59 00:02:49,738 --> 00:02:52,068 And you can open up these things, 60 00:02:52,068 --> 00:02:55,841 you can see every single field within every single header. 61 00:02:55,841 --> 00:02:58,241 And this is a great, useful tool when you're learning 62 00:02:58,241 --> 00:02:59,962 about networking protocols. 63 00:02:59,962 --> 00:03:02,896 You know, there's no better way to learn about 64 00:03:02,896 --> 00:03:05,495 how OSPF works, or how RIP works, 65 00:03:05,495 --> 00:03:08,855 than by actually seeing the packets capturing them 66 00:03:08,855 --> 00:03:11,279 and seeing every single field in there, 67 00:03:11,279 --> 00:03:14,227 seeing when a packet generates or triggers 68 00:03:14,227 --> 00:03:16,274 another packet in response. 69 00:03:16,274 --> 00:03:18,406 And a packet-sniffing tool like Wireshark, 70 00:03:18,406 --> 00:03:20,284 and there are others out there as well, 71 00:03:20,284 --> 00:03:22,566 is a great tool to do that. 72 00:03:22,566 --> 00:03:24,996 Now along with this, when you capture your files, 73 00:03:24,996 --> 00:03:27,370 now you might be wondering, well, what's Wireshark 74 00:03:27,370 --> 00:03:29,084 have to do with GNS3? 75 00:03:29,084 --> 00:03:32,779 Because GNS3 is creating a virtual networking topology. 76 00:03:32,779 --> 00:03:36,065 I'm not dealing with real routers with real cables here. 77 00:03:36,065 --> 00:03:38,883 Well the nice thing about this is because GNS3 is bundled 78 00:03:38,883 --> 00:03:41,684 in, I should say Wireshark is bundled 79 00:03:41,684 --> 00:03:43,833 into the GNS3 download. 80 00:03:43,833 --> 00:03:46,593 Once you create your virtual topology of your routers, 81 00:03:46,593 --> 00:03:49,633 connected via serial interfaces or Ethernet interfaces 82 00:03:49,633 --> 00:03:53,330 or whatever they are, you can right click on any router, 83 00:03:53,330 --> 00:03:54,563 I'll show you how to do this, 84 00:03:54,563 --> 00:03:56,091 and there's a "Capture" option. 85 00:03:56,091 --> 00:03:57,879 You select which interface you want, 86 00:03:57,879 --> 00:04:00,705 you could capture off of serial interfaces if you want to. 87 00:04:00,705 --> 00:04:02,753 And then it actually captures all the packets 88 00:04:02,753 --> 00:04:05,921 on that interface and displays them in Wireshark. 89 00:04:05,921 --> 00:04:08,409 Now where this is really, totally cool and useful is, 90 00:04:08,409 --> 00:04:11,916 you know, imagine you had real routers in a real lab, 91 00:04:11,916 --> 00:04:13,515 and they were all cabled up via Ethernet 92 00:04:13,515 --> 00:04:15,345 or serial interfaces. 93 00:04:15,345 --> 00:04:18,922 How would you actually capture packets in that environment? 94 00:04:18,922 --> 00:04:21,836 Well one way is, you'd have to purchase a hub, 95 00:04:21,836 --> 00:04:26,013 an Ethernet hub, install it in between two routers, 96 00:04:26,013 --> 00:04:28,965 connect your PC to that hub, and then your PC 97 00:04:28,965 --> 00:04:30,513 would have the ability to see all the packets 98 00:04:30,513 --> 00:04:32,860 going back and forth between those routers. 99 00:04:32,860 --> 00:04:34,811 That's great if you're talking about Ethernet. 100 00:04:34,811 --> 00:04:37,290 But what if I want to capture stuff on a serial link, 101 00:04:37,290 --> 00:04:40,305 like if I want to see what frame relay headers look like, 102 00:04:40,305 --> 00:04:42,254 or what PPP headers look like. 103 00:04:42,254 --> 00:04:43,966 Can't do that with a hub. 104 00:04:43,966 --> 00:04:45,884 Kinda hard with a back-to-back serial cable 105 00:04:45,884 --> 00:04:47,465 to capture that stuff. 106 00:04:47,465 --> 00:04:50,138 But here, in the GNS3 virtual environment, 107 00:04:50,138 --> 00:04:52,701 it's so easy to do so. 108 00:04:52,701 --> 00:04:54,270 Now the other thing you're going to want to do is, 109 00:04:54,270 --> 00:04:56,026 once you capture your various files, you're going 110 00:04:56,026 --> 00:04:59,456 to want to save them, just click File and Save As, 111 00:04:59,456 --> 00:05:02,502 and the reason for that is because 112 00:05:02,502 --> 00:05:04,670 you will see here, in addition to Wireshark, 113 00:05:04,670 --> 00:05:07,578 the GNS3 application downloads these SolarWinds 114 00:05:07,578 --> 00:05:09,576 response time viewer. 115 00:05:09,576 --> 00:05:13,453 And what that does is with that tool, you can import 116 00:05:13,453 --> 00:05:17,086 your capture file that you got from Wireshark, 117 00:05:17,086 --> 00:05:19,253 and then click on Analyze, 118 00:05:20,808 --> 00:05:22,343 it just takes a couple of moments here, 119 00:05:22,343 --> 00:05:25,044 and what this does is it takes all the traffic 120 00:05:25,044 --> 00:05:29,846 that Wireshark created and sorts it and categorizes it 121 00:05:29,846 --> 00:05:32,541 by different high-level categories you can see here. 122 00:05:32,541 --> 00:05:34,433 And if you highlight one of these, or if you just 123 00:05:34,433 --> 00:05:36,784 actually mouse over it, you can see you get 124 00:05:36,784 --> 00:05:38,364 a lot more detailed information 125 00:05:38,364 --> 00:05:41,396 about the average network response time, 126 00:05:41,396 --> 00:05:44,172 the average application response time, 127 00:05:44,172 --> 00:05:46,837 so this is also a really great tool to just get 128 00:05:46,837 --> 00:05:49,125 a high-level snapshot of what's going on 129 00:05:49,125 --> 00:05:51,246 not only in your virtual environment, 130 00:05:51,246 --> 00:05:53,175 but you can use this in a real network as well 131 00:05:53,175 --> 00:05:55,609 to see, what's going on in my network? 132 00:05:55,609 --> 00:05:57,310 Is there stuff going across my cable 133 00:05:57,310 --> 00:05:59,874 that I didn't expect to be there? 134 00:05:59,874 --> 00:06:01,529 So the SolarWinds response time viewer 135 00:06:01,529 --> 00:06:04,694 is a great tool for that purpose. 136 00:06:04,694 --> 00:06:07,799 In addition to that, you get Dynamips, 137 00:06:07,799 --> 00:06:09,083 have to have Dynamips. 138 00:06:09,083 --> 00:06:12,624 Dynamips is the engine that creates your emulated router, 139 00:06:12,624 --> 00:06:14,537 so that's gotta be in there. 140 00:06:14,537 --> 00:06:15,866 And then you've got Qemu. 141 00:06:15,866 --> 00:06:17,805 I'm not really going to talk about Qemu, 142 00:06:17,805 --> 00:06:21,743 that's really for people who like virtualizing, 143 00:06:21,743 --> 00:06:26,113 using a virtual machine, like if you want to have 144 00:06:26,113 --> 00:06:29,953 GNS3 running with VM ware or Virtual Box or something, 145 00:06:29,953 --> 00:06:32,076 then this whole Qemu thing gets involved, 146 00:06:32,076 --> 00:06:33,301 but I'm not going to go into that 147 00:06:33,301 --> 00:06:36,865 in this basic tutorial video right here. 148 00:06:36,865 --> 00:06:39,198 Now the next thing, but you will want to include, 149 00:06:39,198 --> 00:06:42,354 don't uncheck it, just leave Qemu checked as it is, 150 00:06:42,354 --> 00:06:45,469 cause later on you might want to use that in your studies, 151 00:06:45,469 --> 00:06:47,052 VPCS, awesome tool. 152 00:06:48,034 --> 00:06:51,156 This stands for the Virtual PC Simulator. 153 00:06:51,156 --> 00:06:54,096 So when you create your network topology within GNS3 154 00:06:54,096 --> 00:06:56,060 of your routers connected to each other, 155 00:06:56,060 --> 00:06:59,389 you might want to have some PCs connected to those routers. 156 00:06:59,389 --> 00:07:02,400 For example, maybe you need something to generate traffic, 157 00:07:02,400 --> 00:07:07,093 maybe UDP traffic or TCP traffic, or ICMP traffic, 158 00:07:07,093 --> 00:07:10,562 going through those routers, because you want that traffic 159 00:07:10,562 --> 00:07:12,559 to go through the routers, and maybe you want to test out 160 00:07:12,559 --> 00:07:14,703 your access list to see if they're actually working 161 00:07:14,703 --> 00:07:16,128 as you expect. 162 00:07:16,128 --> 00:07:18,703 Or you want to test out your quality of service policies 163 00:07:18,703 --> 00:07:21,335 to see if they're working as you expect. 164 00:07:21,335 --> 00:07:24,368 Well VPCS, the Virtual PC Simulator, 165 00:07:24,368 --> 00:07:26,243 is a great tool for doing that. 166 00:07:26,243 --> 00:07:28,994 You can just drop these virtual PCs into your network, 167 00:07:28,994 --> 00:07:31,403 connect them to your routers, and on the virtual PCs 168 00:07:31,403 --> 00:07:34,220 you can tell them, start a UDP traffic stream, 169 00:07:34,220 --> 00:07:36,264 start a TCP traffic stream, and you can select 170 00:07:36,264 --> 00:07:38,901 the port numbers and all kinds of stuff, 171 00:07:38,901 --> 00:07:41,322 which is a great tool for testing simple stuff 172 00:07:41,322 --> 00:07:43,853 in your GNS3 virtual topology. 173 00:07:43,853 --> 00:07:46,863 So fortunately for us, that is built in. 174 00:07:46,863 --> 00:07:49,991 CPUlimit is just a little program that, like it sounds, 175 00:07:49,991 --> 00:07:53,021 it sort of helps GNS3 to work with your CPU 176 00:07:53,021 --> 00:07:56,903 so it doesn't consume too many CPU resources. 177 00:07:56,903 --> 00:08:00,668 Then of course, you have the GNS3 application itself, 178 00:08:00,668 --> 00:08:02,322 gotta have that in there. 179 00:08:02,322 --> 00:08:05,250 And it also comes bundled in with SuperPutty. 180 00:08:05,250 --> 00:08:09,481 Now, when you're working with the Cisco IOS command line, 181 00:08:09,481 --> 00:08:11,873 you have to have some application 182 00:08:11,873 --> 00:08:13,791 to display that command line, 183 00:08:13,791 --> 00:08:15,976 we call that a terminal application. 184 00:08:15,976 --> 00:08:18,186 And there's lots of terminal applications out there, 185 00:08:18,186 --> 00:08:21,612 but SuperPutty is one example of a terminal application. 186 00:08:21,612 --> 00:08:24,110 It comes bundled in here with GNS3. 187 00:08:24,110 --> 00:08:25,892 Now if you are used to using 188 00:08:25,892 --> 00:08:28,271 a different terminal server application, 189 00:08:28,271 --> 00:08:32,395 like, for example, HyperTerminal or SecureCRT, 190 00:08:32,395 --> 00:08:34,013 or something, you can. 191 00:08:34,013 --> 00:08:35,821 GNS3 does give you the flexibility 192 00:08:35,821 --> 00:08:38,887 to use whatever terminal application you want, 193 00:08:38,887 --> 00:08:41,935 it's just that it defaults to Putty. 194 00:08:41,935 --> 00:08:44,831 And then lastly, there's TightVNC Viewer, 195 00:08:44,831 --> 00:08:46,351 and that's more of an advanced topic, 196 00:08:46,351 --> 00:08:49,077 I'm not going to get into the details of that. 197 00:08:49,077 --> 00:08:52,271 So let's just go ahead and let it default all this stuff, 198 00:08:52,271 --> 00:08:56,438 and I'll click Next, and I'll let it default to the, 199 00:08:57,996 --> 00:09:00,603 with the file that it wants to, the folder. 200 00:09:00,603 --> 00:09:04,443 Now in this particular case, the text that, 201 00:09:04,443 --> 00:09:07,071 WinPcap is already running on my machine, 202 00:09:07,071 --> 00:09:09,569 it's already installed on my machine, so I don't need 203 00:09:09,569 --> 00:09:12,353 to install it again, but if you don't get this message, 204 00:09:12,353 --> 00:09:15,336 you definitely want to have WinPcap installed 205 00:09:15,336 --> 00:09:16,659 on your laptop. 206 00:09:16,659 --> 00:09:19,475 So for example, if you've never used Wireshark before, 207 00:09:19,475 --> 00:09:22,050 you've never had a reason to sniff Ethernet frames 208 00:09:22,050 --> 00:09:26,433 or packets, you might not have WinPcap on your laptop, 209 00:09:26,433 --> 00:09:28,221 and you might need to install it. 210 00:09:28,221 --> 00:09:30,973 In this case, I'm going to cancel out of it. 211 00:09:30,973 --> 00:09:33,222 And right now, it's downloading Wireshark. 212 00:09:33,222 --> 00:09:35,382 I'm going to cancel out of Wireshark right here, 213 00:09:35,382 --> 00:09:37,677 gonna quit, and I'm going to cancel out of this 214 00:09:37,677 --> 00:09:40,181 because I already have Wireshark, I don't need 215 00:09:40,181 --> 00:09:43,098 to download it, so I'll abort that. 216 00:09:44,905 --> 00:09:46,853 I also already have the response time viewer, 217 00:09:46,853 --> 00:09:48,311 I just showed you an example of that. 218 00:09:48,311 --> 00:09:50,000 So I'll just cancel out of that as well 219 00:09:50,000 --> 00:09:53,731 just to speed things up here for this video. 220 00:09:53,731 --> 00:09:55,494 And then now it's downloading everything else, 221 00:09:55,494 --> 00:09:57,744 which will be pretty quick. 222 00:10:01,695 --> 00:10:03,975 And in just a moment here we should be, 223 00:10:03,975 --> 00:10:06,888 there we go, setup was completed successfully. 224 00:10:06,888 --> 00:10:10,005 And now I click Next, and now I have the option 225 00:10:10,005 --> 00:10:13,735 to get a free license of the SolarWinds standard tool set. 226 00:10:13,735 --> 00:10:15,362 You're definitely going to want this, lots of tools 227 00:10:15,362 --> 00:10:17,608 available for free, which is awesome, 228 00:10:17,608 --> 00:10:20,390 so you want to click Yes, and then when you hit Next, 229 00:10:20,390 --> 00:10:22,550 you'll actually bring up a web browser, 230 00:10:22,550 --> 00:10:25,092 or a new tab in your web browser, that allows you 231 00:10:25,092 --> 00:10:27,763 to go to the SolarWinds website and register 232 00:10:27,763 --> 00:10:31,930 for that free license, which will then be emailed to you. 233 00:10:32,768 --> 00:10:34,613 And then lastfully, we can start GNS 234 00:10:34,613 --> 00:10:37,198 by hitting the Finish button here. 235 00:10:37,198 --> 00:10:39,594 So at this point, I'm going to go ahead 236 00:10:39,594 --> 00:10:42,019 and stop this video right here. 237 00:10:42,019 --> 00:10:44,708 This concludes part one of the setup. 238 00:10:44,708 --> 00:10:46,920 And in part two of the setup, the next video, 239 00:10:46,920 --> 00:10:48,227 I'm going to click the Finish button here 240 00:10:48,227 --> 00:10:50,235 and we're going to see what the next steps are 241 00:10:50,235 --> 00:10:53,917 to, for example, import Cisco IOS into GNS 242 00:10:53,917 --> 00:10:55,984 so it has something it can work with. 243 00:10:55,984 --> 00:10:58,479 So we'll see that in the next section. 244 00:10:58,479 --> 00:11:00,896 (logo music)