54 | | It should look similar to this. Let's check out the source and destination information from the HTTP data packets. We can see that the source is 10.1.4.2, which corresponds to the Alice node IP address, and the destination is 10.1.1.2, which corresponds to the Server1 node's IP address. This makes it clear that Alice was making an HTTP request to Server1. Now open up throughproxy.pcap in Wireshark. |
| 54 | |
| 55 | It should look similar to this. Let's check out the source and destination information from the HTTP data packets. We can see that the source is 10.1.4.2, which corresponds to the Alice node IP address, and the destination is 10.1.1.2, which corresponds to the Server1 node's IP address. This makes it clear that Alice was making an HTTP request to Server1. |
| 56 | |
| 57 | [[Image(Direct Dataflow.png)]] |
| 58 | |
| 59 | |
| 60 | Now open up throughproxy.pcap in Wireshark. |
58 | | What we see is much different, we see that the source is 10.1.3.4, which is the IP address of the proxy node. So, now the destination, Server1, doesn't know that the request came from Alice, but instead thinks that the request came from the proxy node. Now, we try it with the throughtor.pcap file. |
| 64 | What we see is much different, we see that the source is 10.1.3.4, which is the IP address of the proxy node. So, now the destination, Server1, doesn't know that the request came from Alice, but instead thinks that the request came from the proxy node. |
| 65 | |
| 66 | [[Image(Proxy Dataflow.png)]] |
| 67 | |
| 68 | Now, we try it with the throughtor.pcap file. |