The switches clone a copy of all the traffic on that port en send it to the port to which your PC is connected. In an Ethernet local area network ( LAN ), promiscuous mode ensures that every data packet that is transmitted is received and read by a network adapter. Other possibility (but this requires managed switches with this ability and access to them) is to setup the port on either A or B as a so-called span-port or mirror-port (depends on vendor how it is called). The easiest way to properly listen in to the conversation between A and B is to put a simple hub (which transmits ALL traffic to all its ports) between either A or B and the LAN and have the monitoring PC listen in on that same hub. Wireshark operates on two different modes Promiscuous mode and monitor mode. As your own NIC isn't part of the conversation between the other 2 computers it will generally NOT receive that traffic. Most switches these days are smart and will only send traffic to where it is needed. IP-subnets (Layer 3) have nothing to do with it.Īnd anything in the same (v)lan as your own NIC can be seen, unless your switches keep it away from your NIC. Please note that I say (v)lan, because this is a Layer 2 thing. Wireshark can capture data through two modes the first mode is the promiscuous mode via which the packets are captured through the network to which the device is assigned. Which means anything happening outside your own (v)lan is invisible anyway.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |