SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 9:
Troubleshooting the
Network
Connecting Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 9
9.0 Introduction
9.1 Troubleshooting with a Systematic Approach
9.2 Network Troubleshooting
9.3 Summary
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3
9.1 Troubleshooting with a
Systematic Approach
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 9: Objectives
 Explain how network documentation is developed and used to
troubleshoot network issues.
 Describe the general troubleshooting process.
 Compare troubleshooting methods that use a systematic, layered
approach.
 Describe troubleshooting tools used to gather and analyze
symptoms of network problems.
 Determine the symptoms and causes of network problems using a
layered model.
 Troubleshoot a network using the layered model.
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Documentation
Documenting the Network
Network documentation is a complete set of accurate and current
network documentation. This documentation includes:
 Configuration files, including network configuration files and end-
system configuration files
 Physical and logical topology diagrams
 A baseline performance level
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Documentation
Network Topology Diagrams
 Physical Topology
Device type
Model and manufacturer
Operating system version
Cable type and identifier
Cable specification
Connector type
Cabling endpoints
 Logical Topology
Device identifiers
IP address and prefix lengths
Interface identifiers
Connection type
DLCI for virtual circuits
Site-to-site VPNs
Routing protocols
Static routes
Data-link protocols
WAN technologies used
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Documentation
Establishing a Network Baseline
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Documentation
Establishing a Network Baseline (cont.)
 Step 1. Determine
what types of data
to collect.
 Step 2. Identify
devices and ports
of interest.
 Step 3. Determine
the baseline
duration.
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Documentation
Measuring Data
Commands that are useful to the network documentation process
include:
 ping
 telnet
 show ip interface brief
 show ipv6 interface brief
 show ip route
 show ipv6 route
 show cdp neighbor detail
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting Process
General Troubleshooting Procedures
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting Process
Gathering Symptoms
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting Process
Questioning End Users
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Isolating the Issue Using Layered Models
Using Layered Models for Troubleshooting
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Isolating the Issue Using Layered Models
Troubleshooting Methods
Using the layered models, there are three primary methods for
troubleshooting networks:
 Bottom-up
 Top-down
 Divide-and-conquer
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Isolating the Issue Using Layered Models
Troubleshooting Methods (cont.)
In addition to the systematic, layered approach to troubleshooting,
there are also, less-structured troubleshooting approaches:
 One troubleshooting approach is based on an educated guess by
the network administrator, based on the symptoms of the problem.
 Another approach involves comparing a working and nonworking
situation, and spotting significant differences.
 Swapping the problematic device with a known, working one is a
quick way to troubleshoot.
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Isolating the Issue Using Layered Models
Guidelines for Selecting a Troubleshooting Method
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17
9.2 Network Troubleshooting
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting Tools
Software Troubleshooting Tools
Common software troubleshooting tools include:
 NMS tools
 Knowledge bases
 Baselining tools
 Host-based protocol analyzers
 Cisco IOS EPC
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting Tools
Hardware Troubleshooting Tools
Common hardware troubleshooting tools include:
 Network analysis module
 Digital multimeters
 Cable testers
 Cable analyzers
 Portable network analyzers
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting Tools
Using a Syslog Server for Troubleshooting
Severity Level
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Symptoms and Causes of Network Troubleshooting
Physical Layer Troubleshooting
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Symptoms and Causes of Network Troubleshooting
Data Link Layer Troubleshooting
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Symptoms and Causes of Network Troubleshooting
Network Layer Troubleshooting
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Symptoms and Causes of Network Troubleshooting
Transport Layer Troubleshooting – ACLs
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Symptoms and Causes of Network Troubleshooting
Transport Layer Troubleshooting – NAT for IPv4
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Symptoms and Causes of Network Troubleshooting
Application Layer Troubleshooting
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting IP Connectivity
Components of Troubleshooting End-to-End Connectivity
When there is no end-to-end connectivity, and the administrator
chooses to troubleshoot with a bottom-up approach, these are
common steps the administrator can take:
Step 1. Check physical connectivity at the point where network
communication stops, including cables and hardware. The
problem might be with a faulty cable or interface, or involve
misconfigured or faulty hardware.
Step 2. Check for duplex mismatches.
Step 3. Check data link and network layer addressing on the local
network. This includes IPv4 ARP tables, IPv6 neighbor
tables, MAC address tables, and VLAN assignments.
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting IP Connectivity
Components of Troubleshooting End-to-End Connectivity (cont.)
Step 4. Verify that the default gateway is correct.
Step 5. Ensure that devices are determining the correct path from
the source to the destination. Manipulate the routing
information if necessary.
Step 6. Verify that the transport layer is functioning properly. Telnet
can also be used to test transport layer connections from the
command line.
Step 7. Verify that there are no ACLs blocking traffic.
Step 8. Ensure that DNS settings are correct. There should be an
accessible DNS server.
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting IP Connectivity
End-to-End Connectivity Problem Initiates Troubleshooting
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting IP Connectivity
Step 1. Verify the Physical Layer
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting IP Connectivity
Step 2. Check for Duplex Mismatches
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting IP Connectivity
Step 3. Verify Layer 2 and Layer 3 Addressing on the
Local Network
IPv4:
 arp command (PC)
 show mac address-
table command (router)
IPv6:
 netsh interface ipv6
show neighbor command
(PC)
 show ipv6 neighbors
(router)
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting IP Connectivity
Step 4. Verify Default Gateway
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting IP Connectivity
Step 5. Verify Correct Path
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting IP Connectivity
Step 6. Verify the Transport Layer
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting IP Connectivity
Step 7. Verify ACLs
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshooting IP Connectivity
Step 8. Verify DNS
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 9: Summary
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

PDF
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
PDF
CCNAv5 - S4: Chapter8 monitoring the network
PDF
CCMAv5 - S4: Chapter 6: Broadband Solutions
PDF
CCNAv5 - S4: Chapter2 Connecting To The Wan
PDF
CCNAv5 - S4: Chapter3 Point to-point Connections
PDF
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
PDF
CCNAv5 - S4: Chapter 4 Frame Relay
PDF
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter8 monitoring the network
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCNAv5 - S4: Chapter2 Connecting To The Wan
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 4 Frame Relay
CCNAv5 - S4: Chapter 1 Hierarchical Network Design

What's hot (20)

PPTX
CCNA 2 Routing and Switching v5.0 Chapter 8
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 5
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 7
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 8
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 6
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 6
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 9
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 2
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 3
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 11
PDF
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 4
PDF
CCNAv5 - S1: Chapter 5 - Ethernet
PDF
CCNAv5 - S3: Chapter2 Lan Redundancy
PDF
CCNAv5 - S1: Chapter 3 - Network protocols and communications
PDF
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 7
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 2
PPTX
Ccna PPT
PPT
Capitulo 2 enrutamiento estatico
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 3
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S3: Chapter2 Lan Redundancy
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 2
Ccna PPT
Capitulo 2 enrutamiento estatico
Ad

Similar to CCNAv5 - S4: Chapter 9 troubleshooting the network (20)

PPTX
3. Troubleshooting the NetworkNetwork.pptx
PPTX
3. Troubleshooting the NetworkNetwork.pptx
PPTX
CCNA4 Verson6 Chapter8
PPTX
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
PPT
CCNA Discovery 2 - Chapter 9
PDF
CCNAv5 - S1: Chapter11 It's A Network
PPTX
Chapter 11 : It’s a network
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 1
PPTX
Ccna v5-S1-Chapter 1
PDF
CCNAv5 - S1: Chapter 1 Exploring The Network
PPTX
Itninstructorpptchapter1final 141024004546-conversion-gate02
PPTX
Chapter 1 : Exploring the Network
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 11
PPTX
Sca n instructorppt_chapter1_final
PDF
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
PPTX
Itn instructor ppt_chapter1 - exploring the network
PPT
CCNA Discovery 1 - Chapter 9
PPTX
Ccna v5-S1-Chapter 4
PPTX
Itn instructor ppt_chapter4_network_access
PPTX
Itn instructor ppt_chapter4_network_access
3. Troubleshooting the NetworkNetwork.pptx
3. Troubleshooting the NetworkNetwork.pptx
CCNA4 Verson6 Chapter8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA Discovery 2 - Chapter 9
CCNAv5 - S1: Chapter11 It's A Network
Chapter 11 : It’s a network
CCNA 1 Routing and Switching v5.0 Chapter 1
Ccna v5-S1-Chapter 1
CCNAv5 - S1: Chapter 1 Exploring The Network
Itninstructorpptchapter1final 141024004546-conversion-gate02
Chapter 1 : Exploring the Network
CCNA 1 Routing and Switching v5.0 Chapter 11
Sca n instructorppt_chapter1_final
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
Itn instructor ppt_chapter1 - exploring the network
CCNA Discovery 1 - Chapter 9
Ccna v5-S1-Chapter 4
Itn instructor ppt_chapter4_network_access
Itn instructor ppt_chapter4_network_access
Ad

More from Vuz Dở Hơi (20)

PDF
Ceh v8 Labs - Module18: Buffer Overflow.
PDF
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
PDF
Cehv8 Labs - Module15: Hacking Wireless Networks.
PDF
Cehv8 Labs - Module14: SQL Injection
PDF
Cehv8 Labs - Module13: Hacking Web Applications.
PDF
Cehv8 Labs - Module12: Hacking Webservers.
PDF
Ceh v8 Labs - Module11: Session Hijacking.
PDF
Cehv8 Labs - Module10: Denial of Service.
PDF
Cehv8 Labs - Module09: Social Engineering.
PDF
Cehv8 Labs - Module08: Sniffers.
PDF
Cehv8 Labs - Module07: Viruses and Worms.
PDF
Cehv8 Labs - Module06: Trojans and Backdoors.
PDF
Cehv8 Labs - Module 05: System Hacking.
PDF
Cehv8 Labs - Module04: Enumeration
PDF
Cehv8 Labs - Module03: Scanning Networks.
PDF
Cehv8 Labs - Module02: Footprinting and Reconnaissance
PDF
Cehv8 - Labs Module 00
PDF
Cehv8 - Module18: Buffer overflow.
PDF
Cehv8 - references
PDF
Cehv8 - Module 20: penetration testing
Ceh v8 Labs - Module18: Buffer Overflow.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module12: Hacking Webservers.
Ceh v8 Labs - Module11: Session Hijacking.
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 - Labs Module 00
Cehv8 - Module18: Buffer overflow.
Cehv8 - references
Cehv8 - Module 20: penetration testing

Recently uploaded (20)

PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Business Ethics Teaching Materials for college
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Complications of Minimal Access Surgery at WLH
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
Pharma ospi slides which help in ospi learning
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPH.pptx obstetrics and gynecology in nursing
human mycosis Human fungal infections are called human mycosis..pptx
Business Ethics Teaching Materials for college
TR - Agricultural Crops Production NC III.pdf
O7-L3 Supply Chain Operations - ICLT Program
Complications of Minimal Access Surgery at WLH
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Microbial disease of the cardiovascular and lymphatic systems
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
RMMM.pdf make it easy to upload and study
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Classroom Observation Tools for Teachers
Pharma ospi slides which help in ospi learning
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
01-Introduction-to-Information-Management.pdf
Renaissance Architecture: A Journey from Faith to Humanism
2.FourierTransform-ShortQuestionswithAnswers.pdf
Final Presentation General Medicine 03-08-2024.pptx

CCNAv5 - S4: Chapter 9 troubleshooting the network

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 9: Troubleshooting the Network Connecting Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 9 9.0 Introduction 9.1 Troubleshooting with a Systematic Approach 9.2 Network Troubleshooting 9.3 Summary
  • 3. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3 9.1 Troubleshooting with a Systematic Approach
  • 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 9: Objectives  Explain how network documentation is developed and used to troubleshoot network issues.  Describe the general troubleshooting process.  Compare troubleshooting methods that use a systematic, layered approach.  Describe troubleshooting tools used to gather and analyze symptoms of network problems.  Determine the symptoms and causes of network problems using a layered model.  Troubleshoot a network using the layered model.
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Documentation Documenting the Network Network documentation is a complete set of accurate and current network documentation. This documentation includes:  Configuration files, including network configuration files and end- system configuration files  Physical and logical topology diagrams  A baseline performance level
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Documentation Network Topology Diagrams  Physical Topology Device type Model and manufacturer Operating system version Cable type and identifier Cable specification Connector type Cabling endpoints  Logical Topology Device identifiers IP address and prefix lengths Interface identifiers Connection type DLCI for virtual circuits Site-to-site VPNs Routing protocols Static routes Data-link protocols WAN technologies used
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Documentation Establishing a Network Baseline
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Documentation Establishing a Network Baseline (cont.)  Step 1. Determine what types of data to collect.  Step 2. Identify devices and ports of interest.  Step 3. Determine the baseline duration.
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Documentation Measuring Data Commands that are useful to the network documentation process include:  ping  telnet  show ip interface brief  show ipv6 interface brief  show ip route  show ipv6 route  show cdp neighbor detail
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting Process General Troubleshooting Procedures
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting Process Gathering Symptoms
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting Process Questioning End Users
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Isolating the Issue Using Layered Models Using Layered Models for Troubleshooting
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Isolating the Issue Using Layered Models Troubleshooting Methods Using the layered models, there are three primary methods for troubleshooting networks:  Bottom-up  Top-down  Divide-and-conquer
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Isolating the Issue Using Layered Models Troubleshooting Methods (cont.) In addition to the systematic, layered approach to troubleshooting, there are also, less-structured troubleshooting approaches:  One troubleshooting approach is based on an educated guess by the network administrator, based on the symptoms of the problem.  Another approach involves comparing a working and nonworking situation, and spotting significant differences.  Swapping the problematic device with a known, working one is a quick way to troubleshoot.
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Isolating the Issue Using Layered Models Guidelines for Selecting a Troubleshooting Method
  • 17. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17 9.2 Network Troubleshooting
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting Tools Software Troubleshooting Tools Common software troubleshooting tools include:  NMS tools  Knowledge bases  Baselining tools  Host-based protocol analyzers  Cisco IOS EPC
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting Tools Hardware Troubleshooting Tools Common hardware troubleshooting tools include:  Network analysis module  Digital multimeters  Cable testers  Cable analyzers  Portable network analyzers
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting Tools Using a Syslog Server for Troubleshooting Severity Level
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Symptoms and Causes of Network Troubleshooting Physical Layer Troubleshooting
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Symptoms and Causes of Network Troubleshooting Data Link Layer Troubleshooting
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Symptoms and Causes of Network Troubleshooting Network Layer Troubleshooting
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Symptoms and Causes of Network Troubleshooting Transport Layer Troubleshooting – ACLs
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Symptoms and Causes of Network Troubleshooting Transport Layer Troubleshooting – NAT for IPv4
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Symptoms and Causes of Network Troubleshooting Application Layer Troubleshooting
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting IP Connectivity Components of Troubleshooting End-to-End Connectivity When there is no end-to-end connectivity, and the administrator chooses to troubleshoot with a bottom-up approach, these are common steps the administrator can take: Step 1. Check physical connectivity at the point where network communication stops, including cables and hardware. The problem might be with a faulty cable or interface, or involve misconfigured or faulty hardware. Step 2. Check for duplex mismatches. Step 3. Check data link and network layer addressing on the local network. This includes IPv4 ARP tables, IPv6 neighbor tables, MAC address tables, and VLAN assignments.
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting IP Connectivity Components of Troubleshooting End-to-End Connectivity (cont.) Step 4. Verify that the default gateway is correct. Step 5. Ensure that devices are determining the correct path from the source to the destination. Manipulate the routing information if necessary. Step 6. Verify that the transport layer is functioning properly. Telnet can also be used to test transport layer connections from the command line. Step 7. Verify that there are no ACLs blocking traffic. Step 8. Ensure that DNS settings are correct. There should be an accessible DNS server.
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting IP Connectivity End-to-End Connectivity Problem Initiates Troubleshooting
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting IP Connectivity Step 1. Verify the Physical Layer
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting IP Connectivity Step 2. Check for Duplex Mismatches
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting IP Connectivity Step 3. Verify Layer 2 and Layer 3 Addressing on the Local Network IPv4:  arp command (PC)  show mac address- table command (router) IPv6:  netsh interface ipv6 show neighbor command (PC)  show ipv6 neighbors (router)
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting IP Connectivity Step 4. Verify Default Gateway
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting IP Connectivity Step 5. Verify Correct Path
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting IP Connectivity Step 6. Verify the Transport Layer
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting IP Connectivity Step 7. Verify ACLs
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshooting IP Connectivity Step 8. Verify DNS
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 9: Summary
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential