After this decision, parameters of the burst or constant flow can be modified, for this test I will choose to send 10000 bursts of 10 packets each at a 1Mbps rate (As seen in the image, the Burst/Sec modifies dynamically based in the Bits/Sec parameter. I will leave it in Fixed which is a payload of all zeros.Īfter configuring desired parameters in the protocols we can proceed to the Stream Control tab where we can choose between send packets in burst or a constant flow. We can specify DF-Bit, Total Header Length, TTL, ToS, Source and destination addresses, Source Port, Destination Port, modifications to checksum among other possibilities.įor Payload data you can choose between Fixed and Random.
Here we can see some available protocols to start crafting our packet, however, be aware that the ‘Advance’ tab below contains even more protocols to choose.įor Media Access Control we can use the real MAC of our NIC or a different one, for destination we can send broadcasts, unicasts, multicasts, it can be whatever it is needed for the recreation. When we are done with this tab we can proceed to Protocol Data where we can define the header fields of our chosen protocols. I chose Ethernet as L2, IPv4 as 元 and UDP as L4 for this test. Double-Clicking in the gear icon or Right click + Edit Stream will open a new window like this: In order to create a stream, a right click in the white window will display a menu with the options New Stream, Edit Stream, Duplicate Stream, Delete Stream, Open Streams and Save Streams.Īfter clicking in New Stream, a new object will appear in the white window. Here we will configure and manage our ‘traffic streams’. Now that port 7 is selected, a white window will be displayed at the right side of the Ports and Streams category. Īfter installing the application we will see a screen like this one:īy expanding the port group 0 we will see the current available NICs (or adapters) we are able to send traffic from, in this case, and for this test I will use my local Ethernet adapter which is referenced as Port 7: if7(intel(R)82579LM: The application is freeware, open source and it can be downloaded from. The application is really helpful since it can generate/craft almost any header field of most used protocols in our daily cases such as ARP, ICMP, UDP, TCP, IPV4, IPV6, IGMP, 802.1Q among others and even provide an option for user defined experimental protocols.
The application is available for WINDOWS, MAC OS and LINUX operative systems therefore there are no limitations in platform compatibility either. So there is no need to wait for an available Pageant/IXIA device to generate traffic when there is no time to lose. The advantage of it besides its user friendly GUI and flexibility is how traffic can be injected directly by user’s laptop NICs.
OSTINATO is a powerful traffic generator and often referred as a “Reverse Wireshark” application. If your network is live, make sure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment.
The information in this document is based on the Cisco Catalyst 3850 Series Switch that runs Cisco IOS-XE Versions 03.06.00 and later. This document describes the use of OSTINATO, a powerful freeware open-source traffic generator in order to help engineers with lab recreations by generating triggers or study platform behaviors based in certain specific packet structures directly from their personal computers/workstations.