ITNET04 Module08 Network Troubleshooting
ITNET04 Module08 Network Troubleshooting
Network Troubleshooting
ITNET04
WAN Connectivity
Module Objectives
Module References:
CCNAv7 ENSA– Module 12
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
8.1 Troubleshooting Methodology
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Network Documentation
Documenting the Network
To efficiently diagnose and correct network problems, a network engineer needs to know:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Network Documentation
Infrastructure Device Documentation
Infrastructure device documentation focuses on the details (IP settings, connections, platform
information, location) of routers, switches, access points, firewalls, etc
Router Device
Documentation
Switch Device
Documentation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Network Documentation
End System Documentation
End-system documentation focuses on the IP configuration and services of end-system
devices such as servers, network management consoles, and user workstations.
End-System
Documentation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Network Documentation
Network Topology
Diagrams
Physical Topology network
diagrams show the physical
layout of the devices
connected to the network and
typically include:
• Device type
• Model and manufacturer
• Operating System version
• Cable type and identifier
• Cable specification
• Connector type
• Cabling endpoints
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Network Documentation
Network Topology
Diagrams (Cont.)
Logical network topology diagrams
illustrate how devices are logically
connected to the network and might
include:
• Device identifiers
• IP address and prefix lengths
• Interface identifiers
• Connection type
• Frame Relay DLCI for virtual circuits
• Site-to-site VPNs
• Routing protocols and static routes
• WAN technologies used
• Data-link protocols
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Network Documentation
Establishing a Network Baseline
The purpose of network monitoring is to watch
network performance in comparison to a
predetermined baseline. A network baseline determines the
“personality” of the network under normal
conditions
A network performance baseline
How does a network perform on an average day?
• Establishes normal network or system performance
Which part of the network is most heavily used?
• Requires collecting performance data from the ports
and devices that are essential to operation What part of the network is least used?
• Allows the network administrator to determine the
Where are the most errors occurring?
difference between abnormal behavior and proper
network performance Which devices should be monitored and at what
alert threshold?
Analysis after an initial baseline also tends to reveal
Can the network meet the identified policies?
hidden problems. The collected data can show the
true nature of congestion or potential congestion in a
network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Network Documentation
Steps to Establish a Network Baseline
Step 1: Determine what types of data to
collect.
• Start out with a few variables that represent
the defined policy.
• Capturing too many data points can be
overwhelming and make analysis difficult.
• Start out simply, and fine-tune along the way.
Step 2: Identify devices and ports of
interest.
• Use the network topology to identify key
devices where performance data should be
measured.
• Devices and ports of interest include network
device ports that connect to other network
devices, servers, and key users.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Network Documentation
Steps to Establish a Network Baseline (Cont.)
Step 3: Determine the baseline duration
• The length of time and baseline information being gathered must be sufficient for establishing a typical
picture of the network.
• Daily trends of network traffic should be measured.
• Monitor for trends that occur over a longer period of time such as weekly or monthly.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Network Documentation
When documenting the network, it is
Measuring Data necessary to gather information directly
from routers and switches.
Ping, traceroute, and telnet are useful
commands to document.
The figure to the left lists some of the most
common Cisco IOS show commands used
for data collection.
Manual data collection using show
commands on individual network devices is
very time consuming and is not a scalable
solution. This should be reserved for
smaller networks or mission critical devices.
Sophisticated network management
software is typically used to baseline large
and complex networks.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Network Documentation
Measuring Data
For documentation, it is necessary to gather information directly from routers and switches.
Manual data collection using show commands on individual network devices is usually reserved
for smaller networks or mission critical devices because it is time consuming.
Command Description
Show interface Show detailed output (protocol, status, statistics, addressing) for an interface
Show arp / show ipv6 neighbors Shows ip address to mac address mappings
Show port Shows the status of ports on a switch © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Troubleshooting Process
General Troubleshooting Approaches
• For network engineers, administrators, and support personnel, troubleshooting is
a process that takes the greatest percentage their time.
• Using efficient troubleshooting techniques shortens overall troubleshooting time.
• Two extreme approaches to troubleshooting almost always result in
disappointment, delay, or failure.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Troubleshooting Process
Troubleshooting Procedures
Use efficient troubleshooting Stage 1: Gather symptoms
techniques to shorten overall
troubleshooting time.
Stage 2. Isolate the problem – Stage 2: Isolate the problem
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Troubleshooting Process
Troubleshooting Procedures
Use efficient troubleshooting Stage 1: Gather symptoms
techniques to shorten overall
troubleshooting time.
Stage 3. Implement corrective action – Stage 2: Isolate the problem
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Troubleshooting Process
Gathering Symptoms
Gather Information It is important to gather facts and evidence that will allow you to
progressively eliminate possible causes, and eventually identify the
root cause of the issue.
Determine Ownership There are five information gathering steps:
Narrow the Scope • Gather information from the trouble ticket, users, or end systems
affected by the problem to form a definition of the problem.
Step 2. Determine ownership
Gather symptoms
from suspected • If the problem is within the control of the organization, move onto the
devices next stage. If it is outside of the boundary of organizational control,
contact an administrator for the external system.
Document symptoms
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Troubleshooting Process
Gathering Symptoms (Cont.)
Step 3. Narrow the scope
Gather Information
• Determine if the problem is at the core, distribution, or access layer.
• At the identified layer, analyze the existing symptoms and try to
Determine Ownership determine which piece of equipment is most likely the cause.
Step 4. Gather symptoms from suspect devices
Document symptoms • Gather symptoms from devices using commands/tools, device logs
and packet captures.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Troubleshooting Process
Questioning End Users
In many cases, the problem is reported by an end user. This information may often be
misleading or vague. Use effective questioning techniques when asking the end users about a
network problem they may be experiencing.
Guidelines Example Open Ended End-User Questions
Determine if anything has changed. • What has changed since the last time it did work?
• What works?
Use questions to eliminate or discover possible problems. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
• What does not work?
Isolating the Issue Using Layered Models
Using Layered Models for Troubleshooting
If no solution is identified, the network
administrator compares the
characteristics of the problem to the
logical layers of the network to isolate
and solve the issue.
Logical networking models, such as the
OSI and TCP/IP models, separate
network functionality into modular
layers.
When troubleshooting, these layered
models can be applied to the physical
network to isolate network problems.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Isolating the Issue Using Layered Models
Using Layered Models for Troubleshooting
Logical networking models, such as the OSI and TCP/IP models, separate network functionality
into modular layers.
Application Issues.
Implemented in software.
Software
Data Transport
Issues
Hardware
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Isolating the Issue Using Layered Models
Troubleshooting Methods
Application Bottom-up Troubleshooting Method
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Isolating the Issue Using Layered Models
Troubleshooting Methods
Application Start here Top-Down Troubleshooting Method
Physical
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Isolating the Issue Using Layered Models
Troubleshooting Methods
Application Divide-and-Conquer Troubleshooting
Method
• The network administrator selects a layer and
Transport Start here tests in both directions from that layer.
• Start by collecting user experiences of the
or problem, document the symptoms, and then,
Network Start here using that information, make an informed
guess as to which OSI layer to start your
or investigation.
• If a layer is functioning properly, all layers
Data Link Start here below can be assumed to be functioning.
Physical
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Isolating the Issue Using Layered Models
Guidelines for Selecting a Troubleshooting Method
To quickly resolve network problems, take the
time to select the most effective network
troubleshooting method. An example:
• Two IP routers are not exchanging routing
information.
• The last time this type of problem occurred, it
was a protocol issue.
• Therefore, choose the divide-and-conquer
troubleshooting method.
• Analysis reveals that there is connectivity
between the routers.
• Start the troubleshooting process at the
physical or data link layer.
• Confirm connectivity and begin testing the
TCP/IP-related functions at the next layer up in
the OSI model, the network layer.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Isolating the Issue Using Layered Models
Other Troubleshooting Methods
• Educated guess by the network administrator
• Guess is based on the symptoms of the problem
• This is more successful when implemented by seasoned network
administrators who can rely on their extensive knowledge and experience
• Comparing a working and non-working situation
• Look for differences between configurations, software versions, and
hardware and other device properties.
• This method can be helpful when the network administrator is lacking an
area of expertise or when the problem needs to be resolved quickly.
• Substitution
• Involves swapping the problematic devices with known, working ones.
• If the problem remains, the network administrator knows to look
elsewhere.
• Follow the Path
• Used to discover the actual traffic path from source to destination to
reduce the scope of troubleshooting
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
8.2 Troubleshooting Scenarios
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Troubleshooting Tools Common software troubleshooting tools
Software Troubleshooting Tools include these:
• Network Management System Tools
• NMS tools include device-level monitoring,
configuration, and fault-management tools.
• These graphical tools can be used to
investigate and correct network problems.
• Knowledge Bases
• On-line network device vendor knowledge
bases are very useful.
• When combined with Internet search engines,
a network administrator has access to a vast
pool of experience-based information.
• Baselining Tools
• Many tools for automating the network
documentation and baselining process are
available. For example:
• SolarWinds Network Performance Monitor
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Troubleshooting Tools
Protocol Analyzers Protocol analyzers are useful to investigate
packet content while the content is flowing
through the network.
A protocol analyzer decodes the various
protocol layers in a recorded frame and
presents it in an easy to use format.
The figure to the left shows a screen
capture of the Wireshark protocol analyzer.
Most protocol analyzers can filter traffic that
meets certain criteria. For example, all
traffic to and from a particular device can be
captured.
Protocol analyzers are very helpful in
troubleshooting network performance
problems.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Troubleshooting Tools
Hardware Troubleshooting Tools There are multiple types of hardware
troubleshooting tools including:
• Digital Multimeters are test instruments that
are used to directly measure electrical values
of voltage, current, and resistance.
• Cable Testers are specialized handheld
devices designed for testing the various types
of data communication cabling. They can be
used to detect broken wires, crossed-over
wiring, shorted connections, and improperly
paired connections. More expensive time-
domain reflectometers (TDRs) are used to
pinpoint the distance to a break in a cable.
• Cable Analyzers are multifunctional handheld
devices that are used to test and certify copper
and fiber cables for different services and
standards.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Troubleshooting Tools
Hardware Troubleshooting Tools (Cont.)
• Portable Network Analyzers are used for
troubleshooting switched networks and VLANs.
• By plugging the network analyzer in anywhere on
the network, a network engineer can see the
switch port to which the devices is connected.
• They can also see the average and peak
utilization as well as the VLAN configuration.
• Network Analysis Module – The Cisco NAM
is a device or software.
• It provides an embedded browser-based interface
that generates reports on the traffic that consumes
critical network resources.
• The NAM can capture and decode packets and
track response times to pinpoint an application
problem to a particular network or server.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Troubleshooting Tools
Using a Syslog Server for Troubleshooting
Recall: Syslog is used by an IP device
known as a syslog client to send text-
based log messages to another IP
device known as the syslog server.
Implementing a logging facility is a
very important part of network security
and also for network troubleshooting.
Network devices can log various types
of information including configuration
changes, ACL violations, interface
Cisco devices can send log messages to several different facilities:
status, and many other types of
• Console and Terminal lines events.
• Buffered logging
Syslog messages fall into one of eight
• SNMP traps
levels. The lower the level number, the
• External Syslog server
higher the severity level.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Symptoms and Causes of Network Troubleshooting
Physical Layer Troubleshooting
The physical layer is the only layer with physically tangible
properties, such as wires, cards, and antennas.
Application
Because the upper layers of the OSI model depend on the
Presentation physical layer to function, a network administrator must
Session have the ability to effectively isolate and correct problems at
this layer.
Transport
Common symptoms of network problems at the physical
Network layer include:
Data Link • Performance lower than baseline
• Loss of connectivity
Physical
• Network bottlenecks or congestion
• High CPU utilization rates
• Console error messages
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Symptoms and Causes of Network Troubleshooting
Physical Layer Troubleshooting (Cont.)
Issues that commonly cause network problems at the physical layer include:
Physical
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Symptoms and Causes of Network Troubleshooting
Data Link Layer Troubleshooting (Cont.)
Issues at the data link layer that commonly result in network
Application connectivity or performance problems include these:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Symptoms and Causes of Network Troubleshooting
Network Layer Troubleshooting
Network layer problems include any problem that involves a
Application Layer 3 protocol (routed or routing protocols)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Symptoms and Causes of Network Troubleshooting
Transport Layer Troubleshooting – NAT for IPv4
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Symptoms and Causes of Network Troubleshooting
Application Layer Troubleshooting
Most of the application layer protocols provide user services
Application for network management, file transfer, distributed file
Presentation services, terminal emulation, and email.
The most widely known and implemented TCP/IP application
Session
layer protocols include:
Transport • SSH/Telnet, HTTP, FTP, TFTP
Network • SMTP, POP, SNMP, DNS, NFS
Data Link Application layer problems prevent services from being
provided to application programs.
Physical
A problem at the application layer can result in unreachable
or unusable resources when the physical, data link, network,
and transport layers are functional.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Troubleshooting IP Connectivity
Components of Troubleshooting End-to-End Connectivity
By employing a structured
approach to the troubleshooting
process, an administrator can
reduce the time it takes to
diagnose and solve a problem.
Sample scenario:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Troubleshooting IP Connectivity
Components of Troubleshooting End-to-End Connectivity (Cont.)
Step 1. Check physical connectivity at the
point where network communication stops.
Step 2. Check for duplex mismatches.
• show processes cpu Input queue: 0/75/0 (size/max/drops); Total output drops:0
Queueing strategy: fifo
• show memory Output queue :0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
• show interfaces 5 minute output rate 0 bits/sec, 0 packets/sec
0 packets input, 0 bytes, 0 no buffer
If device exhibits performance issues Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
and hardware is suspected to be at fault, 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0
abort
use the show interfaces command and 0 watchdog, 1017 multicast, 0 pause input
pay attention to the following: 0 input packets with dribble condition detected
0 packets output, 0 bytes, 0 underruns
• Input queue drops 0 output errors, 0 collisions, 1 interface resets
0 unknown protocol drops
• Output queue drops 0 babbles, 0 late collision, 0 deferred
• Input errors 0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
• Output errors © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Troubleshooting IP Connectivity
Step 2 – Check for Duplex Mismatches
S1#show interface Fa0/20 Duplex mismatch between two ends of
FastEthernet0/20 is up, line protocol is up
Hardware is CN Fast Ethernet, address is an Ethernet link is another common
0010.11c4.7801 (bia 0010.11c4.7801) cause for interface errors.
MTU 1500 bytes, BW 100000 Kbit, DLY 1000 usec,
reliability 255/255, txload 1/255, rxload 1/255 Interfaces use autonegotation to
Encapsulation ARPA, loopback not set
Keepalive set (10 sec) determine link speed and duplex
Full-duplex, Auto-speed, media type is 10/100BaseTX
... • The IEEE 802.3ab Gigabit Ethernet
standard mandates the use of
S2#show interface Fa0/20 autonegotiation for speed and duplex.
FastEthernet0/20 is up, line protocol is up
Hardware is CN Fast Ethernet, address is • Most Fast Ethernet NICs also use
0010.11c4.7801 (bia 0010.11c4.7801) autonegotiation by default.
MTU 1500 bytes, BW 100000 Kbit, DLY 1000 usec,
reliability 255/255, txload 1/255, rxload 1/255 Set the speed and duplex manually on
Encapsulation ARPA, loopback not set
Keepalive set (10 sec) both ends if autonegortiation fails.
Half-duplex, Auto-speed, media type is 10/100BaseTX
... • Point-to-point Ethernet links should
always run in full-duplex mode.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Troubleshooting IP Connectivity
Step 3 – Verify Layer 2 and 3 Addressing on the Local Network
Look for VLAN assignment issues when
troubleshooting end-to-end connectivity
S1>show mac address-table issues (show vlan)
Mac Address Table
The output of the show mac address-
-------------------------------------------
table command can also be helpful when
Vlan Mac Address Type Ports looking for VLAN assignment issues.
All 0100.0ccc.ccc STATIC
CPU
All 0100.0ccc.ccd STATIC R1
CPU
1 d48c.b5ce.a0c0 DYNAMIC PC1
Fa0/1
10 000f.34f9.9201 DYNAMIC
Fa0/5
10 5475.d08e.9ad8 DYNAMIC
Fa0/13
---- ----------- -------- -----
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Total MAC Addresses for this criterion: 5
Troubleshooting IP Connectivity
Step 3 – Verify Layer 2 and 3 Addressing on the Local Network
The arp Windows command can C:\WINDOWS\system32>arp -a
be used to help verify mappings Interface: 192.168.2.62 --- 0xe
between destination IP addresses Internet Address Physical Address Type
and Layer 2 Ethernet addresses. 10.1.10.1 d48c.b5ce.a0c0
dynamic
• The arp –d command can be 10.1.10.255 ff-ff-ff-ff-ff-ff static
used to clear the arp cache and 224.0.0.22 01-00-5e-00-00-16 static
allow it to repopulate with updated 224.0.0.251 01-00-5e-00-00-fb static
224.0.0.252 01-00-5e-00-00-fc static
info.
239.255.255.250 01-00-5e-7f-ff-fa static
255.255.255.255 ff-ff-ff-ff-ff-ff static
The netsh interface ipv6 show neighbor Windows command will list all devices that are
currently in the neighbor table.
• By examining the neighbor table, the network administrator can verify that the destination IPv6
addresses map to correct Ethernet addresses.
The show ipv6 neighbors command can be used on a Cisco IOS router.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Troubleshooting IP Connectivity
Step 4 – Verify Default Gateway If there is no default route on the router
or if the host is configured with the
wrong default gateway, then
R1>show ip route communication between two endpoints
... on different networks will not work.
Gateway of last resort is 192.168.1.2 to network 0.0.0.0 Use the following commands to verify
S* 0.0.0.0/0 [1/0] via 192.168.1.2 • show ip route / show ipv6 route to
check for the router default route on R1
C:\WINDOWS\system32>route print
• ipconfig Windows command to verify if
IPv4 Route Table a PC has a default gateway
=============================================================
Active Routes: • Route print Windows command to
Network Destination Netmask Gateway Interface Metric check the PC routing table for a default
0.0.0.0 0.0.0.0 10.1.10.2 10.1.10.100 50 gateway
• show ipv6 interface GigabitEthernet
0/0 command to verify if router is a
member of the correct multicast group.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Troubleshooting IP Connectivity When troubleshooting a connectivity issue,
Step 5 – Verify Correct Path verify the path to the destination network.
Use either the show ip route or show ipv6
route command to verify that the route exists to
the destination device/network.
Forwarding packets is based on the longest bit
match or longest prefix match. If the destination
address in a packet:
• Does not match any entry in the routing table,
then the default route is used; otherwise drop
• Matches a single entry in the routing table,
forward through the interface that is defined in
this route.
• Matches more than one entry in the routing table
and the routing entries have the same prefix
length, load-balance among the routes that are
defined in the routing table.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Troubleshooting IP Connectivity
Step 6 – Verify the Transport Layer
If the network layer appears to be functioning as expected, but users are still unable to
access resources, then troubleshoot the upper layers.
Most common issues that affect transport: ACL and NAT configuration problems.
A common tool for testing transport layer functionality is the Telnet utility.
If a ping is successful to a server, then all layers below the network layer, between the user
and the server are operational. Issue is likely to be with Layer 4 or up.
For example: R1# telnet 2001:db8:acad:3::2
R1>telnet 2001:db8:acad:3::2 80
Trying 2001:db8:acad:3::2, 80...
% Connection refused by remote host
R1#
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Troubleshooting IP Connectivity
Step 7 – Verify ACLs
ACLs may prohibit protocols
from passing through the
interface in the inbound or
R3#show access-lists
Extended IP access list 100
outbound direction.
deny ip 172.16.1.0 0.0.0.255 any (3 match(es)) Use the following commands
permit ip any any
to display the contents of all
R3#show ip interface Serial0/0/1 | include access list ACLs:
Outgoing access list is not set
Inbound access list is not set • show ip access-lists
• show ipv6 access-list
R3#show ip interface gigabitethernet0/0 | include access list
Outgoing access list is not set Use the following commands
Inbound access list 100
to see if there are ACLs set
on a particular interface:
• show ip interfaces
• show ipv6 interfaces
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Troubleshooting IP Connectivity
Step 7 – Verify DNS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Questions?
Module Summary
What Did You Learn In This Module?
• Common network documentation includes physical and logical network topologies, network
device documentation, and network performance baseline documentation.
• Baselining allows an administrator to document what is considered normal behavior / traffic
characteristics of the network
• The troubleshooting process should be guided by structured methods which involve
gathering symptoms, isolating the issue, implementing corrective action and documenting the
solution
• Several troubleshooting methods may be used depending on the nature of the problem
• Use bottom-up approach when encountering a new problem or if the problem appears to
be a physical issue
• Use top-down approach when a problem appears to be software in nature
• Use divide and conquer when a problem seems to be similar to a previously diagnosed
issue.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Module Practice and Quiz
What did I learn in this module? (Cont.)
• Troubleshooting tools include
• Hardware tools: digital multimeters, cable testers, cable analyzers, portable network analyzers,
Cisco Prime NAM,
• Software tools: NMS tools, knowledge bases, baselining tools, protocol analyzer, and syslog
servers.
• When identifying the cause of an issue, it is important to recognize the probable network
layer where it lies
• Physical layer problems cause failures and suboptimal conditions.
• Data link layer problems are typically caused by encapsulation errors, address mapping errors,
framing errors, and STP failures or loops.
• Network layer problems include IPv4, IPv6, routing protocols (such as EIGRP, OSPF, etc.).
• Transport layer problems can be misconfigured NAT or ACLs.
• Application layer problems can result in unreachable or unusable resources.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56