Beruflich Dokumente
Kultur Dokumente
Introduction
1.
Network Configuration Table The data set that should be included for all components: Type of device, model designation IOS image name Device network hostname Location of the device (building, floor, room, rack, panel) If it is a modular device, include all module types and in which module slot they are located Data link layer addresses Network layer addresses Any additional important information about physical aspects of the device
H c vi n m ng Bach Khoa - Website: www.bkacad.com 6
2.
End-System Documentation The following information should be documented: Device name (purpose) Operating system and version IP address Subnet mask Default gateway, DNS server, and WINS server addresses Any high-bandwidth network applications that the end-system runs
H c vi n m ng Bach Khoa - Website: www.bkacad.com 7
Commands that are useful to the network documentation process include: ping telnet show ip interface brief show ip route show cdp neighbor detail
H c vi n m ng Bach Khoa - Website: www.bkacad.com 9
11
Step 2. Identify devices and ports of interest Devices and ports of interest include: Network device ports that connect to other network devices Servers Key users Anything else considered critical to operations.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 12
Sophisticated network management software is often used to baseline large and complex networks. For example, the Fluke Network SuperAgent module enables administrators to automatically create and review reports using its Intelligent Baselines feature.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 14
16
Two extreme approaches to troubleshooting almost always result in disappointment, delay, or failure. At one extreme is the theorist, or rocket scientist, approach. At the other extreme is the impractical, or caveman, approach. The rocket scientist analyzes and reanalyzes the situation until the exact cause at the root of the problem has been identified and corrected with surgical precision. The caveman's first instinct is to start swapping cards, cables, hardware, and software until miraculously the network begins operating again.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 17
18
Stage 1 Gather symptoms - Troubleshooting begins with the process of gathering and documenting symptoms from the network, end systems, and users. Stage 2 Isolate the problem - The problem is not truly isolated until a single problem, or a set of related problems, is identified. Stage 3 Correct the problem - Having isolated and identified the cause of the problem, the network administrator works to correct the problem by implementing, testing, and documenting a solution.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 19
Troubleshooting Methods
There are three main methods for troubleshooting networks: 1. Bottom up 2. Top down 3. Divide and conquer Bottom-Up Troubleshooting Method In bottom-up troubleshooting you start with the physical components of the network and move up through the layers of the OSI model until the cause of the problem is identified.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 20
Troubleshooting Methods
Top-Down Troubleshooting Method In top-down troubleshooting your start with the end-user applications and move down through the layers of the OSI model until the cause of the problem has been identified.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 21
Troubleshooting Methods
Divide-and-Conquer Troubleshooting Method When you apply the divide-and-conquer approach toward troubleshooting a networking problem, you select a layer and test in both directions from the starting layer.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 22
23
Gathering Symptoms
24
Gathering Symptoms
25
NMS Tools
Network management system (NMS) tools include device-level monitoring, configuration, and fault management tools. Examples of commonly used network management tools are CiscoView, HP Openview, Solar Winds, and What's Up Gold.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 26
Knowledge Bases On-line network device vendor knowledge bases have become indispensable sources of information. The figure shows the Cisco Tools & Resources page found at http://www.cisco.com. This is a free tool providing information on Ciscorelated hardware and software.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 27
Baselining Tools Many tools for automating the network documentation and baselining process are available. These tools are available for Windows, Linux, AUX operating systems. The figure shows a screen chapter of the SolarWinds LANsurveyor and CyberGauge software.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 28
Protocol Analyzers A protocol analyzer decodes the various protocol layers in a recorded frame and presents this information in a relatively easy to use format. The figure shows a screen capture of the Wireshark protocol analyzer.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 29
Digital Multimeters Digital multimeters (DMMs) are test instruments that are used to directly measure electrical values of voltage, current, and resistance. Cable Testers Cable testers are specialized, handheld devices designed for testing the various types of data communication cabling.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 31
Cable Analyzers Cable analyzers are multifunctional handheld devices that are used to test and certify copper and fiber cables for different services and standards. Portable Network Analyzers Portable devices that are used for troubleshooting switched networks and VLANs.
32
Troubleshooting Tools
Refer to 8.2.6.3
33
34
WAN Communications
A communications provider or a common carrier normally owns the data links that make up a WAN. The links are made available to subscribers for a fee and are used to interconnect LANs or connect to remote networks. WAN data transfer speed (bandwidth) is considerably slower than the common LAN bandwidth. The charges for link provision are the major cost element, therefore the WAN implementation must aim to provide maximum bandwidth at acceptable cost.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 35
37
Many WANs use a star topology. As the enterprise grows and new
branches are added, the branches are connected back to the head office, producing a traditional star topology. Star endpoints are sometimes cross-connected, creating a mesh or partial mesh topology. This provides for many possible combinations for interconnections.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 38
39
41
Although the Internet may pose a security problem it does provides an alternative for inter-branch traffic. Part of the traffic that must be considered during design is going to or coming from the Internet.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 42
44
A significant proportion of the support calls received by an ISP refer to slowness of the Network. To troubleshoot this effectively, you have to isolate the individual components and test each one as follows: Individual PC host LAN Link from the edge of the user network to the edge of the ISP Backbone of the ISP Server being accessed
45
Network Troubleshooting
46
Information recorded on the physical network diagram typically includes: Device type Model and manufacturer Operating system version Cable type and identifier Cable specification Connector type Cabling endpoints
47
Information recorded on a logical network diagram may include: Device identifiers IP address and subnet Interface identifiers Connection type DLCI for virtual circuits Site-to-site VPNs Routing protocols Static routes Data-link protocols WAN technologies used
48
connection are substandard, causing data to be transferred at a rate that is consistently less than the rate of data flow established in the baseline.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 49
Examples of configuration errors that affect the physical layer include: Serial links reconfigured as asynchronous instead of synchronous Incorrect clock rate Incorrect clock source Interface not turned on
H c vi n m ng Bach Khoa - Website: www.bkacad.com 50
52
53
55
56
57
58
59
To verify STP operation, use the show spanning-tree command on each switch. If you discover that STP is not operating, you can enable it using the spanning-tree vlan ID command.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 60
61
In most networks, static routes are used in combination with dynamic routing protocols. Improper configuration of static routes can lead to less than optimal routing and, in some cases, create routing loops or parts of the network to become unreachable. Troubleshooting dynamic routing protocols requires a thorough understanding of how the specific routing protocol functions.
62
63
The biggest problem with all NAT technologies is interoperability with other network technologies, especially those that contain or derive information from host network addressing in the packet. Some of these technologies include: BOOTP and DHCP DNS and WINS SNMP Tunneling and encryption protocols
H c vi n m ng Bach Khoa - Website: www.bkacad.com 64
65
66
A problem at the application layer can result in unreachable or unusable resources when the physical, data link, network, and transport layers are functional. Another type of problem at the application layer occurs when the physical, data link, network, and transport layers are functional, but the data transfer and requests for network services from a single network service or application do not meet the normal expectations of a user.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 67
The same general troubleshooting process that is used to isolate problems at the lower layers can also be used to isolate problems at the application layer. The concepts are the same, but the technological focus has shifted to involve things such as refused or timed out connections, access lists, and DNS issues.
68
Step 1: Make a backup Step 2: Make an initial hardware or software configuration change. Step 3: Evaluate and document each change and its results. Step 4: Determine if the change solves the problem. Step 5: Stop when the problem is solved. Step 6: If necessary, get assistance from outside resources. Step 7: Document.
H c vi n m ng Bach Khoa - Website: www.bkacad.com 69
Labs
70
Summary
71
72