Networking Basics
Networking Basics
0. nslookup
Great question — it's common to confuse ping and nslookup since both involve hostnames
and IPs. Here's a simple comparison:
✅ nslookup
✅ Example:
nslookup [Link]
→ Returns: [Link]
✅ ping
🔍 What it does:
✅ Example:
ping [Link]
🧠 Summary Table:
1. Niping
is Test network connectivity between SAP components (e.g., SAP application server ↔
SAProuter or SAP GUI ↔ app server)
niping output examples and how to interpret them — whether the network is fast or latent.
pgsql
CopyEdit
🟢 Interpretation:
pgsql
CopyEdit
🟡 Interpretation:
Stable but high latency → may cause slow response in SAP GUI
vbnet
CopyEdit
NiPing: error: rc = -6
🔴 Interpretation:
Connection failed: Server unreachable or port blocked
2. Iperf:
iPerf Supports Parallel Streams(is a single TCP or UDP connection between the client and
server used to send and receive data.)
iPerf can simulate multiple simultaneous connections (like real-world usage: web, file
transfers, apps).
iperf3 -c [Link] -P 10
-c = client mode
-P 10 = 10 parallel streams
Output:
iperf3 -c [Link] -P 5
It means:
iPerf will create 5 separate TCP connections (aka 5 "streams") from the client to the server.
nyping sends packets one at a time, like ping but with throughput data.
Tests only one TCP connection, so it doesn’t simulate real-world load.
🔍 Example:
nyping -c [Link]
o Latency
o Congestion control
makefile
CopyEdit
Even if your network supports 1 Gbps, the single connection might not saturate it due to TCP
limitations.
📈 Example:
bash
CopyEdit
iperf3 -c [Link] -P 10
🔸 That's nearly saturating your full 1 Gbps link — which means you're testing the
network's true capacity.
📊 Results Comparison
Streams (-P) Command Observed Throughput (Mbit/sec)
1 iperf3 -c [Link] -P 1 ~310 Mbit/sec
2 iperf3 -c [Link] -P 2 ~590 Mbit/sec
5 iperf3 -c [Link] -P 5 ~920 Mbit/sec
10 iperf3 -c [Link] -P 10 ~940 Mbit/sec
✅ Conclusion:
Even on fast networks, using multiple parallel streams is key to reaching full
bandwidth.
With a single stream, you'll rarely reach full throughput.
So, when testing or benchmarking, always use -P 5 or higher for accurate
measurements.:
3. Test-NetConnection:
The Test-NetConnection command is a PowerShell cmdlet used to
test network connectivity, including checking if a remote host is
reachable and whether specific ports are open. Output Includes:
Ping status
TCP port status
IP address resolution
Interface used
Network latency (if applicable)
✅ Common Uses of Test-NetConnection:
Use Case Command Example What It Does
Checks if the host [Link]
Ping a host Test-NetConnection [Link]
is reachable via ping
Test-NetConnection [Link] Checks if port 443 (HTTPS) is
Test specific port -Port 443 open on [Link]
Test-NetConnection [Link] Shows route hops to reach the
Trace route -TraceRoute destination
Test with a remote Test-NetConnection - Tests connectivity to an IP
computer name ComputerName [Link] address
Test with port and Test-NetConnection - Checks if port 80 is open and
detailed output ComputerName server01 -Port 80 gives detailed info
4. Tracert/Traceroute:
traceroute (or tracert on Windows):
Shows the path a packet takes from your system to a destination
IP/hostname, including all hops (routers) in between.
Use:
cmd
CopyEdit
tracert [Link]
📌 Helps find where delay or failure is happening in the network
path.
Here's a simple example to help you understand good vs. bad hops in
a tracert command output.
Trace complete.
Each hop responds with latency values (ms).
The path is clear and ends at the destination.
Trace complete.
* * * Request timed out. = no response from intermediate
routers.
Could indicate:
o Firewalls blocking ICMP
o Network issues
o Host unreachable
5. nslookup:
nslookup (short for "Name Server Lookup") is a command-line tool
used to query DNS (Domain Name System) servers to obtain
information about domain names and IP addresses. It helps in
checking if a domain name resolves to an IP address or
troubleshooting DNS issues.
examples of successful and failed nslookup commands:
Name: [Link]
Address: [Link]
✔️Meaning:
DNS server successfully resolved the hostname
[Link] to its IP address [Link].
6. Ping
Definition: ping is a command-line utility used to test the reachability
of a host on a network. It also measures the round-trip time it takes
for a packet to travel from the source to the destination and back.
Example Use Case:
1. Check Network Connectivity: You can use ping to check if a
computer or server is reachable over the network.
Command Example:
ping [Link]
This command sends packets to [Link] and waits for a response,
indicating whether the website is reachable.
Output:
PING [Link] ([Link]) 56(84) bytes of data.
64 bytes from [Link]: icmp_seq=1 ttl=54 time=12.4 ms
64 bytes from [Link]: icmp_seq=2 ttl=54 time=11.9 ms
7. Telnet
Definition: telnet is a command-line tool used to connect to remote
devices (usually servers) over a network, typically on a specific port.
It's commonly used for testing connections to services like HTTP, FTP,
or SMTP.
Example Use Case:
1. Test Port Accessibility: You can use telnet to check if a specific
port is open and accessible on a remote server.
Command Example:
telnet [Link] 80
This command attempts to connect to port 80 (HTTP) on
[Link].
Output:
Trying [Link]...
Connected to [Link].
If the connection is successful, it means port 80 is open on the
remote server. If unsuccessful, it may indicate a firewall or network
issue.
Key Difference:
ping is used to check network reachability.
telnet is used to check if a specific port is open and listening.
8. A DNS switch
during the migration of servers from on-premise to the cloud refers
to the process of updating the DNS records to point to the new
cloud-based infrastructure after migrating the servers. This is an
important step in the migration process, ensuring that users and
services can resolve and access the new cloud-hosted servers rather
than the old on-premise ones.
Key Steps in a DNS Switch:
1. Migrating the Servers: You move your applications, databases,
and services to the cloud, configuring them to run on the cloud
infrastructure (e.g., AWS, Azure, Google Cloud).
2. DNS Record Update: After the migration, the DNS records (such
as A-records, CNAME records, or MX records) for the domain
need to be updated to reflect the new IP addresses or
endpoints associated with the cloud servers.
o For example: If your website's domain [Link]
was pointing to an on-premise server IP address, after
migration, you update the DNS to point to the new IP
address or URL of the cloud server.
3. Propagation: Once the DNS records are updated, the changes
will propagate across the DNS system, which can take anywhere
from a few minutes to 48 hours, depending on TTL (Time to
Live) settings. During this time, some users might still be
directed to the old on-premise servers, while others will be
directed to the new cloud servers.
4. Testing: It's important to test the DNS switch to ensure that
everything is functioning as expected, and all services are
reachable through the new cloud infrastructure.
Example:
Imagine you have a web application hosted on an on-premise server
with an IP address [Link], and you are migrating this
application to AWS with a new cloud server IP [Link].
Before Migration: DNS record for [Link] points to
[Link] (on-premise).
After Migration: You update the DNS record for
[Link] to point to [Link] (cloud).
Why It's Important:
Seamless Transition: The DNS switch ensures a smooth
transition for end-users, so they can access the migrated
servers without manual reconfiguration on their part.
Avoid Downtime: Proper DNS switching can minimize
downtime and ensure that services are continuously accessible
as you transition between the on-premise and cloud
environments.
Final Step of Migration: Once the DNS switch is complete, the
migration is essentially finished, and all traffic will be routed to
the cloud environment.
--------------------------------------------------------------------------------------------
Summary:
A Records: Use when you want to directly point a domain to an
IP address.
CNAME Records: Use when you want to point one domain
name to another (useful for aliases and subdomains).
Does this help clarify the difference and how each is used?
Conclusion:
CNAME records are ideal in migration scenarios for managing
subdomains and ensuring that DNS changes are minimal and
scalable.
A records are necessary for the main domain but are more
cumbersome to update for each domain/subdomain
individually.
This approach ensures flexibility, ease of management, and minimal
disruption during server migration from on-premise to the cloud.
-------------------------------------------------------------------------------------------
Scenario 1:
When only IP address changes ,then it is enough if we update the A-
records
After Migration (Cloud):
Update the A record for [Link] to the new
cloud IP:
[Link] IN A [Link]
All CNAME records (e.g., [Link], [Link],
[Link]) automatically resolve to the new IP address
([Link]) because they point to [Link].
No need to update each subdomain's DNS manually! You just update
the A record for [Link], and all subdomains will
automatically follow.
Scenario-2
When both IP address and FQDN changes
To ensure minimal downtime during a DNS switch when both FQDN
and IP address change after cloud migration, use the following
strategy:
Best Practice: Use Temporary CNAME Mapping + Low TTL
Step-by-step with Example
Before Migration (On-Prem)
Current FQDN: [Link] → IP: [Link]
Public DNS points to:
objectivec
CopyEdit
[Link] IN CNAME [Link]
☁️After Migration (Cloud)
New FQDN: [Link] → IP: [Link]
Update DNS CNAME:
[Link] IN CNAME
[Link]
✅ Result:
Only one DNS change (CNAME) needed, and because TTL was low,
clients update quickly = minimal downtime.
------------------------------------------------------------------------------------------
12. TTL
What is TTL in DNS?
TTL (Time To Live) tells how long DNS records are cached by users'
systems or ISPs.
🔄 After Migration:
You can increase TTL back to a higher value for stability.
4o
You said:
You can increase TTL back to a higher value for stability.?why?
ChatGPT said:
Yes, you can increase TTL back to a higher value after migration for
stability and performance. Here's why:
✅ Why Increase TTL After Migration?
1. Less DNS Traffic
Higher TTL (e.g., 1 hour or 24 hours) means client systems
cache DNS longer, reducing the number of DNS lookups → less
load on DNS servers.
2. Faster Response Time
If DNS is cached, applications resolve hostnames faster,
improving performance for users.
3. Network Efficiency
Fewer external DNS queries = less network chatter and better
overall efficiency.
🔁 Example:
After migration is stable:
[Link] TTL 86400 (24 hrs)
This means clients will reuse the resolved IP for 24 hours without re-
checking DNS.
⚠️Just Remember:
Only increase TTL after you’re sure the system is working fine in the
new environment.
-----------------------------------------------------------------------------------------
13. Impact of Migration on third party
systems:
1. Update the third-party system's configuration: to use the new hostname or FQDN of the
SAP system. This might involve updating URLs, API endpoints, or connection settings as
discussed above.
2. Use a Load Balancer or Reverse Proxy: If the third-party system communicates with the
SAP system through a load balancer or reverse proxy, you might need to update the load
balancer or reverse proxy configuration to point to the new SAP system.
3. Certificate Updates: If the SAP system uses SSL/TLS certificates, you might need to update
the certificates to reflect the new hostname or FQDN.
a. Certificate for the CNAME Record: If the third-party system connects to the SAP system
using the CNAME record ([Link]), the SAP system should have an SSL
certificate that matches the CNAME record ([Link]). If the SAP system has
a wildcard certificate or a certificate that matches the CNAME record (sap-
[Link]), no change might be required in the third-party system.
b. Certificate for the Actual Hostname: If the SAP system has an SSL certificate for its actual
hostname ([Link]), the third-party system might not trust the
certificate if it's not configured to trust the certificate authority (CA) that issued the
certificate. If the SAP system's certificate is not trusted by the third-party system, you might
need to update the certificate trust store in the third-party system to trust the CA that issued
the certificate. If the SAP system's certificate doesn't match the CNAME record, you might
need to obtain a new certificate that matches the CNAME record ([Link]).
Best Practices
1. Use a Certificate that Matches the CNAME Record: Ensure that the SAP system has an SSL
certificate that matches the CNAME record ([Link]) to avoid any
certificate trust issues.
4. Firewall Rules: Ensure that the firewall rules are updated to allow communication
between the third-party system and the new SAP system.
OS or application thinks it's running under this virtual name, even though the
physical server hostname is different.
✅ Example:
[Link]
[Link] [Link]
So, SAP services can bind to [Link] and you can failover this IP/hostname to
another server.
Used purely at DNS level; the client is redirected to the real hostname via DNS.
If you're using a virtual hostname for an SAP server, then the CNAME should point to the
virtual hostname, not the physical hostname.
🔹 Why?
Clients and apps connect using the virtual hostname. In case of failover or changes, the
backend mapping (virtual → physical) changes without affecting the users or DNS.
🔹 Example:
-------------------------------------------------------------------------------------------------------------------------
15. nmon:
Two or more computers or devices connected form a network. This connection can be via a
cable or a wireless one.
What is an IP address?
The two most common IP address versions available today are IPv4 and IPv6. IPv6 is a more
recent version and is a successor of IPv4.
IPv4 addresses are 32-bit addresses whereas IPv6 is a 128-bit address. We are looking at
IPv4 addresses in this post.
In an IPv4 address, each byte or the 8-bit segment of the address is called an octet. It is
generally represented in decimal format with each octet separated by a period (like
[Link]).
Private network is the one that cannot be accessed directly over the internet. The hosts in a
private network have private IP addresses and hence help in conserving addresses in the
public IP address range. A private network is highly secured with firewalls and a number of
other rules that are established within the subnets. This makes it the most chosen choice for
all the systems that host confidential data. From an SAP perspective, most of the application
servers and all database servers are usually in subnets within a private network of the
organization. Federated portal or Fiori systems are exposed to the internet via web
dispatcher and/or external load balancers.
A number of rules can be defined at a subnet level and a private network level on how to
route a particular request and whether to allow or deny access to and from the hosts in
network.
Class A - [Link] to [Link] – First octet is the network id and the remaining three
octets are host id
Class B - [Link] to [Link] – First and second octet are network id, third and
fourth constitute host id
Class C - 192.168.0 0 to [Link] – first, second and third are network id while the
fourth one is for host id
In a network with smaller number of subnets and more devices, class A provides larger
address space range for hosts. In a network with large number of subnets with low number
of hosts on each subnet, Class C provides more CIDR blocks for subnets.
You may notice that the private ip addresses of different components in an environment (say
DEV or QAS or PROD) differ by only one or two octets. This is because of the fact that all the
components are part of the same subnet and have the same network id.
DMZ is a subnet in your network that exposes the external-facing systems of your IT
landscape to the internet. It provides a layer of security to your network. Systems that
provide services to users on external network are placed in DMZ. SAP Web dispatcher lies in
the DMZ.
Firewall?
Firewall sits in the DMZ between internet and your local network. It prevents unauthorized
access to internet users to a private network. All the traffic to and from the local network
has to pass through firewall and is secured.
Network Address Translation (NAT)?
NAT device hides original host IP address from the outside world. It masks the IP address of
the hosts on its network and exposes its own IP address or that of a firewall to the internet.
In these cases, NAT devices are associated with a public IP address. All the requests to
internet originating from a network are exposed with a single IP address. This way, a number
of host computers or devices are able to talk to the internet with a single IP address and
hence NAT helps in slowing down the rate at which address space is assigned. NAT device
keeps track of all outgoing packets transferred and matches the incoming packets with the
correct hosts. While you are in office and open SAP support portal, the NAT device masks
your host ip and sends the request to SAP with firewall ip. The response from SAP is sent
back to firewall ip which is then checked internally as to which host is awaiting response and
then routed to your host.
Domain, Domain Name System (DNS) & Fully Qualified Domain Name (FQDN)?
Simply put, DNS lets us use names instead of IP addresses while connecting to a server. It is
because of the existence of DNS names, we are able to call
[Link] or [Link] instead of those servers ip addresses like
[Link] or [Link].
DNS uses a hierarchical naming system similar to SAP folder structure. The folders are called
domains and the hosts can be considered as files in the ultimate folder. Here is an example
DNS domain tree. Anchor point for all domains is root which lies at the top. Millions of
domains exist under root and these are called top-level domains. There can be multiple sub-
levels under each domain, the DNS tree can be upto 127 levels deep. Domain under a
domain is called a subdomain. The complete DNS name of the PROD fiori becomes
[Link] and that of DEV becomes [Link]. The complete DNS
name [Link] is called a Fully Qualified Domain Name (FQDN).
This post is an attempt to explain the commonly used networking terms in a simple way
targeting beginners in this area. Thank you for reading and please leave your feedback in the
comments section.
Outbound traffic
↓
NAT Gateway (Public IP)
Internet
If your proxy server is in a public subnet with a public IP, then NAT is not needed.
But that’s rare in secure enterprise setups, where public IPs are avoided directly on proxy
hosts.
Inbound traffic
Component Role
Firewall Filters traffic based on IPs, ports (only allows valid SAP traffic).
Web Handles load balancing, SSL termination, and routing to correct SAP
Dispatcher backend system.
Mon-sat 8:30