CyberFlood L4-L7 Traffic Generator: New Blog/YouTube Combo Series

So excited about this new series of blogs and YouTube videos. Absolutely LOVE “getting my geek on” and then sharing it.

This series will be about the Layer 4 thru Layer 7 traffic generation tool from Spirent. If you are familiar with my blog and youtube channel you will likely have seen many other articles/videos regarding Spirent’s “Test Center” tool or Spirent’s “Web Avalanche/Web Reflector” tool. I very much adore traffic generators actually. They are like these big gorgeous geek toys. lol.

I have played with CyberFlood off and on for about a year. Just pretty much was me telling the Spirent guy what I needed to create for a long lived and static environment with Stealthwatch. Him helping me create that… then me click play. So didn’t really need to learn too much about it.

With the new job …. that has MAJORLY changed. I will be heavily back in the world of being a “geeky lab rat” and pretty much using L4 thru L7 traffic generations tools (Spirent’s CyberFlood and IXIA’s BreakingPoint) pretty much almost every day. So I get to learn tons and tons and I get to then share it with you!

Overview of the Foundational first 3 Videos

These 3 videos are the 3 videos/teachings/foundation I wish had been there when I started a few months ago. So, did for this pretty much like what I did with my 7 part IPv6 series I built awhile ago…. and that is I built the training I wished had been there for me when I was learning.

Hope it helps you. Oh and once we have this foundational/base set… got tons more coming!

Videos Details

Video 1: CyberFlood Fun: 2 CyberFlood Ports, 1 Router, 2 Subnets

Length: 18 minutes, 48 seconds

2 Cyberflood ports connected directly to a layer 3 device

This one starts pretty much at the beginning with a very basic environment.

  • 2 CyberFlood ports connected to the Nexus 9K.
  • Nexus 9K as the default gateway for traffic

In this video we will

2 Spirent C100s and highlighted ports that will be used
  1. Cable 2 CyberFlood 10gig ports to the Nexus 9K
    • Client cable to e1/11 on the Nexus 9k
    • Server cable to e1/15 on the Nexus 9K.
  2. On the CyberFlood
    • Create a CyberFlood “queue” for the 2 ports
    • Start a new test
    • Add a “client” subnet and a “server” subnet
  3. Run the Test, poke around and also grab sniffer traces

Video #2: CyberFlood Fun: 2 CyberFlood Ports, 1 Router, 4 Subnets, 2 CyberFlood Virtual Routers

Length: 17 minutes, 40 seconds

2 Cyberflood ports connected directly to a layer 3 device and using VirtualRouters

This video builds on the last video by adding 2 more subnets and 2 “CyberFlood Virtual Routers”. The Layer 3 Nexus 9K will then no longer be the default gateway for the clients and servers. We will need to add static routes on the Nexus 9K as well as on the “CyberFlood Virtual Routers”.

In this video we will

  1. Change the IP addresses on e1/11 and e1/15 on the Nexus N9k
  2. Modify the existing CyberFlood test by adding 2 “CyberFlood Virtual Routers”
  3. Discuss the need for static routes on the CyberFlood Virtual routers as well as on the Nexus 9K.
  4. Make sure these statics are configured properly
  5. Run a “Trial Run”
  6. Grab sniffer traces

Video#3: CyberFlood Fun: 1 Firewall, 2 CyberFlood Ports, 4 Subnets, 2 CyberFlood Virtual Routers

Length: 11 minutes, 8 seconds

2 Cyberflood ports with CyberFlood Virtual Routers and Firewall as layer 3 device

Time to change out the layer 3 device in the middle from being the Nexus 9K to being a Cisco Firewall. A FirePower 4120 to be exact. 🙂

In this video we will

  1. Configure the FP4120 Firewall to take over the IP addresses the Nexu9K used to be
  2. Review a little how the FirePower is set up (inside/outside, etc)
  3. Remembering that video 2 also needed static routes on the Nexus 9K…
  4. Configure the static routes on the Firewall.
  5. Send the traffic
  6. Very we see the traffic on the Firewall.


Categories: Fun in the Lab, Spirent

Tags: , , ,

Leave a Reply