https://github.com/austingebauer/vagrant-mininet
A repeatable Mininet installation using HashiCorp Vagrant
https://github.com/austingebauer/vagrant-mininet
hashicorp mininet vagrant
Last synced: 10 months ago
JSON representation
A repeatable Mininet installation using HashiCorp Vagrant
- Host: GitHub
- URL: https://github.com/austingebauer/vagrant-mininet
- Owner: austingebauer
- License: mit
- Created: 2021-11-06T22:58:00.000Z (about 4 years ago)
- Default Branch: main
- Last Pushed: 2021-11-06T23:08:07.000Z (about 4 years ago)
- Last Synced: 2025-02-08T20:24:00.902Z (12 months ago)
- Topics: hashicorp, mininet, vagrant
- Language: Shell
- Homepage:
- Size: 5.86 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# vagrant-mininet
Repeatable [Mininet](http://mininet.org/) installation using HashiCorp [Vagrant](https://www.vagrantup.com).
## Installation
- Install [Vagrant](https://www.vagrantup.com/downloads)
- Install [VirtualBox](https://www.virtualbox.org/wiki/Downloads)
- This is currently tested against VirtualBox, but it may work using different providers (e.g., VMWare Fusion)
## Usage
- Run `vagrant up`
- Run `vagrant ssh`
- Run `sudo mn --test pingall` within the VM to test that Mininet has been installed properly.
### Packet Captures using Wireshark
- Install XQuartz for macOS or Xming for Windows for X11 forwarding
- Run `sudo xauth add $(xauth list $DISPLAY)` to allow `root` to use X11 Forwarding
- Run `sudo -E wireshark &` to run Wireshark in the background.
- Once the Mininet controller is up, you will see the interfaces (e.g. `s1-eth1`) in Wireshark.
- You can run packet captures on any that were created by the Mininet SDN configuration.