The network connection drop-down menu displays connections that are linked to my computer's network adapters plus three new ones:
WAN Network Interface (IP)
WAN Network Interface (IPv6)
WAN Network Interface (BH)
When I select any listed connection and click Start, no traffic is displayed in the Established Connections window. One connection will, however, show outbound traffic in the Network Flow window.
I cannot find in the software documentation any guidance on establishing a connection to an emulated WAN. Please advise.
All Forums
> Connection Emulator
> Current topic
WAN Connection Emulation on an Air-Gapped PC
Started by Faust
Faust
WAN Connection Emulation on an Air-Gapped PC 30 September 2024, 04:33 |
Re: WAN Connection Emulation on an Air-Gapped PC 30 September 2024, 09:59 |
Admin Registered: 18 years ago Posts: 3 570 |
The network interfaces you mentioned (WAN Network Interface (IP), (IPv6), and (BH)) are virtual and typically appear in specific configurations like dial-up or PPPoE connections. If your computer is connected via regular Ethernet or WiFi, these interfaces usually won't show any meaningful traffic.
Regarding the Established Connections window, it functions similarly to a built-in netstat tool, displaying active TCP connections. This window is independent of the network interface you select for emulation in the drop-down. The lack of visible traffic there doesn't indicate a problem with the emulation itself.
As for your question about "establishing a connection to an emulated WAN," the purpose of the software is to apply network conditions (like bandwidth limits, latency, packet loss, packet corruption) to your existing network adapters. It doesn't create or establish a new network connection, but rather simulates the conditions typically experienced on various WAN types (e.g., satellite, dial-up) on your chosen connection.
If you're aiming to emulate a specific WAN environment, you'll need to adjust the parameters (e.g., bandwidth, latency) accordingly. For instance:
Regarding the Established Connections window, it functions similarly to a built-in netstat tool, displaying active TCP connections. This window is independent of the network interface you select for emulation in the drop-down. The lack of visible traffic there doesn't indicate a problem with the emulation itself.
As for your question about "establishing a connection to an emulated WAN," the purpose of the software is to apply network conditions (like bandwidth limits, latency, packet loss, packet corruption) to your existing network adapters. It doesn't create or establish a new network connection, but rather simulates the conditions typically experienced on various WAN types (e.g., satellite, dial-up) on your chosen connection.
If you're aiming to emulate a specific WAN environment, you'll need to adjust the parameters (e.g., bandwidth, latency) accordingly. For instance:
- Dial-up: Low bandwidth and higher packet loss.
- Satellite: High latency but higher bandwidth.
Faust
Re: WAN Connection Emulation on an Air-Gapped PC 01 October 2024, 00:16 |
Re: WAN Connection Emulation on an Air-Gapped PC 01 October 2024, 12:59 |
Admin Registered: 18 years ago Posts: 3 570 |
That correct, it isn't designed to simulate a full internet connection or make the system believe it's connected when it's not. Its main function is to apply WAN conditions like bandwidth limits, latency, and packet loss to an existing network connection.
That said, if you are writing this message from the same computer, it means you are already connected to the internet. You can use netstat or a tool like Process Explorer to view any active network connections or check for any suspicious application activity.
If your goal is to monitor malware-related traffic, tools like these can help in a live environment. Alternatively, if you are looking for a more isolated approach, a sandbox or virtual machine with controlled internet access might be a better option for analysing such communications.
That said, if you are writing this message from the same computer, it means you are already connected to the internet. You can use netstat or a tool like Process Explorer to view any active network connections or check for any suspicious application activity.
If your goal is to monitor malware-related traffic, tools like these can help in a live environment. Alternatively, if you are looking for a more isolated approach, a sandbox or virtual machine with controlled internet access might be a better option for analysing such communications.