SlideShare une entreprise Scribd logo
1  sur  46
©2015 Amir Jafari – www.amir-Jafari.com
Routing and Switching 200-120
11 - Troubleshooting Ethernet LANs
Troubleshooting Ethernet LANs
©2015 Amir Jafari – www.amir-Jafari.com
Agenda
 Perspectives on Network Verification and Troubleshooting
 Analyzing LAN Topology Using Cisco Discovery Protocol
 Analyzing Switch Interface Status
 Predicting Where Switches Will Forward Frames
 Analyzing VLANs and VLAN Trunks
Perspectives on Network Verification and
Troubleshooting
©2015 Amir Jafari – www.amir-Jafari.com
Preparing to Use an Organized Troubleshooting Process
The three major steps in troubleshooting process are as follows:
Step 1. Analyzing/predicting normal operation: Predict the details of what
should happen if the network is working correctly
Step 2. Problem isolation: Determine how far along the expected path the
frame/packet goes before it cannot be forwarded any
Step 3. Root cause analysis: Identify the underlying causes of the problems
identified in the previous
 You need to remember the theory of how networks should work, as well as
how to interpret the show command output
 This process requires the use of testing tools, such as ping and traceroute,
to isolate the problem
Perspectives on Network Verification and
Troubleshooting
©2015 Amir Jafari – www.amir-Jafari.com
Preparing to Use an Organized Troubleshooting Process
Example Network with a ping Problem
Layer 3 Problem Isolation
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Analyzing LAN Topology Using Cisco Discovery
Protocol
 The proprietary Cisco Discovery Protocol (CDP) discovers basic information
about neighboring routers and switches without needing to know the
passwords for the neighboring devices
 To discover information, routers and switches send CDP messages out each
of their interfaces
 Devices that support CDP learn information about others by listening for the
advertisements sent by other devices
 The IEEE has standardized the Link Layer Discovery Protocol (LLDP),
which serves the same role
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Analyzing LAN Topology Using Cisco Discovery
Protocol
 From a troubleshooting perspective, CDP can be used to either confirm or fix
the documentation shown in a network diagram, or even discover the devices
and interfaces used in a network
 CDP sends a copy of the CDP update to any known data link addresses
 CDP discovers several useful details from the neighboring Cisco
devices:
 Device identifier: Typically the host name
 Address list: Network and data link addresses
 Port identifier: The interface on the remote router or switch on the other
end of the link that sent the CDP advertisement
 Capabilities list: Information on what type of device it is
 Platform: The model and OS level running on the device
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining Information Learned by CDP
show cdp Commands That List Information About
Neighbors
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining Information Learned by CDP
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining Information Learned by CDP
 The CDP holdtime, which is the amount of time that the device will hold
packets from neighbor devices
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining Information Learned by CDP
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining Information Learned by CDP
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining Information Learned by CDP
 Cisco recommends that CDP be disabled on any interface that might not have
a need for CDP
 CDP can be disabled globally and per-interface:
 Per-interface, the no cdp enable and cdp enable interface subcommands
toggle CDP off and on, respectively.
 the no cdp run and cdp run global commands toggle CDP off and on
(respectively) for the entire switch
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining the Status of the CDP Protocols
Commands Used to Verify CDP Operations
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining the Status of the CDP Protocols
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Status Codes and Reasons for Nonworking
States
 Cisco switches use two different sets of interface status codes:
1. Two codes (words) that use the same conventions as do router interface
status codes
2. Single code (word)
 Both sets of status codes can determine whether an interface is working
 The switch show interfaces and show interfaces description commands list
the two-code status just like routers. The two codes are named:
1. Line status: refer to whether Layer 1 is working
2. Protocol status: refer to whether Layer 2 is working
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Status Codes and Reasons for Nonworking
States
 The show interfaces status command lists a different single interface
status code.
 This single interface status code corresponds to different combinations of
the two-code interface status codes
 For example, the show interfaces status command lists a “connected” state
for working interfaces. It corresponds to the up/up state seen with the show
interfaces command
 Any interface state other than connected or up/up means that the switch will
not forward or receive frames on the interface
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Status Codes and Reasons for Nonworking
States
LAN Switch Interface Status Codes
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Speed and Duplex Issues
 Many UTP-based Ethernet interfaces support multiple speeds, either full- or
half-duplex, and support IEEE standard
 These same interfaces can also be configured to use a specific speed using
the speed {10 | 100 | 1000} interface subcommand, and a specific duplex
using the duplex {half | full} interface subcommand
 With both configured (speed and duplex), a switch or router disables the
IEEE-standard autonegotiation process on that interface
 The show interfaces and show interfaces status commands list both the
actual speed and duplex settings on an interface
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Speed and Duplex Issues
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Speed and Duplex Issues
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Speed and Duplex Issues
When one device has disabled autonegotiation, and the other device uses
autonegotiation, the device using autonegotiation chooses the default duplex
setting
based on the current speed. The defaults are as follows:
 If the speed is not known through any means, use 10 Mbps, half-duplex
 If the switch successfully senses the speed without IEEE autonegotiation, by
just looking at the signal on the cable:
1. If the speed is 10 or 100 Mbps, default to use half-duplex
2. If the speed is 1,000 Mbps, default to use full-duplex
 While autonegotiation works well, these defaults allow for the possibility of a
difficult-to-troubleshoot problem called a duplex mismatch
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Speed and Duplex Issues
 While autonegotiation works well, these defaults allow for the possibility of a
difficult-to-troubleshoot problem called a duplex mismatch
 In this case both devices could use the same speed, so the devices would
consider the link to be up, but one side would use half-duplex, and the other
side would use full-duplex
Conditions to Create a Duplex Mismatch Between SW1 and
SW2
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Speed and Duplex Issues
 Finding a duplex mismatch can be much more difficult than finding a speed
mismatch, because the switch interface will still be in a connected (up/up)
state
 In this case, the interface works, but it might work poorly, with poor
performance, and with symptoms of intermittent problems
 The reason is that the device using half-duplex uses CSMA/CD logic, waiting
to send when receiving a frame, believing collisions occur when they
physically do not—and actually stopping sending a frame because the switch
thinks a collision occurred
 To identify duplex mismatch problems, check the duplex setting on each end
of the link and watch for incrementing collision and late collision counters
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Common Layer 1 Problems on Working Interfaces
 When the interface reaches the connect (up/up) state, the switch considers the
interface to be working.
 The switch, of course, tries to use the interface, and at the same time, the
switch keeps various interface counters.
 These interface counters can help identify problems that can occur even
though the interface is in a connect state
 Whenever the physical transmission has problems, the receiving device might
receive a frame whose bits have changed values. These frames do not pass
the error detection logic as implemented in the FCS field in the Ethernet trailer.
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Common Layer 1 Problems on Working Interfaces
 The receiving device discards the frame and counts it as some kind of input
error. Cisco switches list this error as a CRC error. (Cyclic redundancy check
[CRC] is a term related to how the FCS math detects an error)
Interface Counters for Layer 1 Problems
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Common Layer 1 Problems on Working Interfaces
 Runts: Frames that did not meet the minimum frame size requirement (64
bytes, including the 18-byte destination MAC, source MAC, Type, and FCS).
Can be caused by collisions
 Giants: Frames that exceed the maximum frame size requirement (1518
bytes, including the 18-byte destination MAC, source MAC, Type, and FCS)
 Input Errors: A total of many counters, including runts, giants, no buffer, CRC,
frame, overrun, and ignored counts
 CRC: Received frames that did not pass the FCS math; can be caused by
collisions
 Frame: Received frames that have an illegal format, for example, ending with
a partial byte; can be caused by collisions
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Common Layer 1 Problems on Working Interfaces
 Packets Output: Total number of packets (frames) forwarded out the interface
 Output Errors: Total number of packets (frames) that the switch port tried to
transmit, but for which some problem occurred
 Collisions: Counter of all collisions that occur when the interface is
transmitting a frame
 Late Collisions: The subset of all collisions that happen after the 64th byte of
the frame has been transmitted. (In a properly working Ethernet LAN,
collisions should occur within the first 64 bytes; late collisions today often
point to a duplex mismatch)
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Common Layer 1 Problems on Working Interfaces
 If a LAN design follows cabling guidelines, all collisions should occur by the
end of the 64th byte of any frame
 When a switch has already sent 64 bytes of a frame, and the switch receives a
frame on that same interface, the switch senses a collision
 In this case, the collision is a late collision, and the switch increments the late
collision counter in addition to the usual CSMA/CD actions to send a jam
signal, wait a random time, and try again
 With a duplex mismatch, the half-duplex interface will likely see the late
collisions counter increment
Predicting Where Switches Will Forward
Frames
©2015 Amir Jafari – www.amir-Jafari.com
Predicting the Contents of the MAC Address Table
 The output of show mac address-table EXEC command includes some static
overhead MAC addresses used by the switch and any statically configured
MAC addresses, such as those configured with the port security feature.
 The command also lists all dynamically learned MAC addresses
 If you want to see only the dynamically learned MAC address table entries,
simply use the show mac address-table dynamic EXEC command
Predicting Where Switches Will Forward
Frames
©2015 Amir Jafari – www.amir-Jafari.com
Predicting the Contents of the MAC Address Table
Predictions for MAC Table Entries on SW1 and
SW2
Predicting Where Switches Will Forward
Frames
©2015 Amir Jafari – www.amir-Jafari.com
Predicting the Contents of the MAC Address Table
Predicting Where Switches Will Forward
Frames
©2015 Amir Jafari – www.amir-Jafari.com
Analyzing the Forwarding Path
Summarizes switch forwarding logic including the LAN switching:
Step 1. Process functions on the incoming interface, if the interface is currently in
an up/up
(connected) state:
A. If configured, apply port security logic to filter the frame as appropriate
B. If the port is an access port, determine the interface’s access VLAN
C. If the port is a trunk, determine the frame’s tagged VLAN
Predicting Where Switches Will Forward
Frames
©2015 Amir Jafari – www.amir-Jafari.com
Analyzing the Forwarding Path
Step 2. Make a forwarding decision. Look for the frame’s destination MAC
address in the MAC address table, but only for entries in the VLAN identified in
Step 1. If the destination MAC is...
A. Found (unicast), forward the frame out the only interface listed in the
matched address table entry.
B. Not found (unicast), flood the frame out all other access ports (except the
incoming port) in that same VLAN, plus out trunks that have not restricted the
VLAN from that trunk
C. Broadcast, flood the frame, with the same rules as the previous step
Predicting Where Switches Will Forward
Frames
©2015 Amir Jafari – www.amir-Jafari.com
Port Security and Filtering
 Port security allows three violation modes (shutdown, protect, and restrict), but
only the default setting of shutdown causes the switch to err-disable the
interface
 Any MAC addresses associated with a port on which port security is enabled
show up as static MAC addresses
 The show mac address-table dynamic command does not list MAC addresses
off these interfaces on which port security is enabled
 The show mac address-table and show mac address-table static
commands do list these static MAC addresses
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Ensuring That the Right Access Interfaces Are in the
Right VLANs
Commands That Can Find Access Ports and
VLANs
 show vlan and show vlan brief commands do not list operational trunks
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Access VLANs Not Being Defined
 A VLAN can be defined to a switch in two ways:
1. Using the vlan number global configuration command
2. It can be learned from another switch using VTP
 show vlan command always lists all VLANs known to the switch, but the show
running-config command does not
 Switches configured as VTP servers and clients do not list the vlan commands
in the running-config nor the startup-config file; on these switches, you must
use the show vlan command.
 Switches configured to use VTP transparent mode, or that disable VTP, list the
vlan configuration commands in the configuration files
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Access VLANs Being Disabled
 For any existing VLANs, also verify that the VLAN is active
 The show vlan command should list one of two VLAN state values,
depending on the current state:
1. Active
2. act/lshut
 The second of these states means that the VLAN is shutdown. Shutting down
a VLAN disables the VLAN on that switch only, so that the switch will not
forward frames in that VLAN
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Access VLANs Being Disabled
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Check the Allowed VLAN List on Both Ends of a Trunk
It is possible to configure a different allowed VLAN list on the opposite ends of a
VLAN trunk. When mismatched, the trunk cannot pass traffic for that VLAN
Mismatched VLAN-Allowed Lists on a Trunk
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Check the Allowed VLAN List on Both Ends of a Trunk
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Mismatched Trunking Operational States
 The most common incorrect configuration—which results in both switches not
trunking—is a configuration that uses the switchport mode dynamic auto
command on both switches on the link
 A different incorrect trunking configuration results in one switch with an
operational state of “trunk,” while the other switch has an operational state of
“static access”
 When this combination of events happens, the interface works a little. The
status on each end will be up/up or connected.
 Traffic in the native VLAN will actually cross the link successfully. However,
traffic in all the rest of the VLANs will not cross the link.
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Mismatched Trunking Operational States
Mismatched Trunking Operational States
Troubleshooting Ethernet LANs
©2015 Amir Jafari – www.amir-Jafari.com
Command References
Troubleshooting Ethernet LANs
©2015 Amir Jafari – www.amir-Jafari.com
Command References
Troubleshooting Ethernet LANs
©2015 Amir Jafari – www.amir-Jafari.com
Command References
Troubleshooting Ethernet LANs
©2015 Amir Jafari – www.amir-Jafari.com
References
1) Cisco Systems, Inc, www.cisco.com/
2) Wendell Odom ,”Cisco CCENT/CCNA ICND1 100-101 Official Cert Guide”,
Cisco Press, USA, 2013

Contenu connexe

Tendances

CCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on SwitchCCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on SwitchAmir Jafari
 
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...Amir Jafari
 
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking ModelsCCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking ModelsAmir Jafari
 
CCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part ICCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part IAmir Jafari
 
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingCCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingAmir Jafari
 
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet SwitchingCCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet SwitchingAmir Jafari
 
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network AssociateCCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network AssociateAmir Jafari
 
Chapter 16 : inter-vlan routing
Chapter 16 : inter-vlan routingChapter 16 : inter-vlan routing
Chapter 16 : inter-vlan routingteknetir
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumpsslotiopo
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Vlans
VlansVlans
Vlans1 2d
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3Chaing Ravuth
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3Chaing Ravuth
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2Chaing Ravuth
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1Chaing Ravuth
 
Ccnp switch (300 115)
Ccnp switch (300 115)Ccnp switch (300 115)
Ccnp switch (300 115)mohibullah70
 
Ccna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamCcna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamRaja Mazhar
 

Tendances (20)

CCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on SwitchCCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on Switch
 
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
 
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking ModelsCCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking Models
 
CCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part ICCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part I
 
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingCCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
 
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet SwitchingCCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet Switching
 
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network AssociateCCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network Associate
 
Chapter 16 : inter-vlan routing
Chapter 16 : inter-vlan routingChapter 16 : inter-vlan routing
Chapter 16 : inter-vlan routing
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumps
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Vlans
VlansVlans
Vlans
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
 
Ccnp route
Ccnp routeCcnp route
Ccnp route
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
Ccnp switch (300 115)
Ccnp switch (300 115)Ccnp switch (300 115)
Ccnp switch (300 115)
 
Ccna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamCcna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_team
 

Similaire à CCNA R&S-11-Troubleshooting Ethernet LANs

Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5friv4schoolgames
 
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013Đồng Quốc Vương
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examĐồng Quốc Vương
 
Eyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration GuideEyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration GuideEyeball Networks
 
F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.Kapil Sabharwal
 
640 802 exam
640 802 exam640 802 exam
640 802 examliemgpc2
 
Industrial Training Presentaion(Networking)
Industrial Training Presentaion(Networking)Industrial Training Presentaion(Networking)
Industrial Training Presentaion(Networking)Gaurav Uniyal
 
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Đồng Quốc Vương
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full nataliej4
 
Chapter 5 Routing.pptx
Chapter 5 Routing.pptxChapter 5 Routing.pptx
Chapter 5 Routing.pptxAyaanMohamed4
 
OpenFlow: What is it Good For?
OpenFlow: What is it Good For? OpenFlow: What is it Good For?
OpenFlow: What is it Good For? APNIC
 
Cymphonix active-passive high availability v9
Cymphonix   active-passive high availability v9Cymphonix   active-passive high availability v9
Cymphonix active-passive high availability v9encikkidal
 
cFrame framework slides
cFrame framework slidescFrame framework slides
cFrame framework slideskestasj
 

Similaire à CCNA R&S-11-Troubleshooting Ethernet LANs (20)

Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
 
ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN
 
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
 
Eyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration GuideEyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration Guide
 
F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.
 
640 802 exam
640 802 exam640 802 exam
640 802 exam
 
Industrial Training Presentaion(Networking)
Industrial Training Presentaion(Networking)Industrial Training Presentaion(Networking)
Industrial Training Presentaion(Networking)
 
Ccna Imp Guide
Ccna Imp GuideCcna Imp Guide
Ccna Imp Guide
 
lecciones ccna3
lecciones ccna3lecciones ccna3
lecciones ccna3
 
CCNA 2
CCNA 2 CCNA 2
CCNA 2
 
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
 
CCNA 200-120 Exam Questions
CCNA 200-120 Exam QuestionsCCNA 200-120 Exam Questions
CCNA 200-120 Exam Questions
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full
 
Chapter 5 Routing.pptx
Chapter 5 Routing.pptxChapter 5 Routing.pptx
Chapter 5 Routing.pptx
 
OpenFlow: What is it Good For?
OpenFlow: What is it Good For? OpenFlow: What is it Good For?
OpenFlow: What is it Good For?
 
ccna 4 final 2012
ccna 4 final 2012ccna 4 final 2012
ccna 4 final 2012
 
Cymphonix active-passive high availability v9
Cymphonix   active-passive high availability v9Cymphonix   active-passive high availability v9
Cymphonix active-passive high availability v9
 
cFrame framework slides
cFrame framework slidescFrame framework slides
cFrame framework slides
 

Plus de Amir Jafari

Smart powetr grids
Smart powetr gridsSmart powetr grids
Smart powetr gridsAmir Jafari
 
CCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing SubnetsCCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing SubnetsAmir Jafari
 
CCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet MasksCCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet MasksAmir Jafari
 
CCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 NetworksCCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 NetworksAmir Jafari
 
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 SubnettingCCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 SubnettingAmir Jafari
 
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part IICCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part IIAmir Jafari
 
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4  historic voice-digital connectivity-part 2CCNA Voice 640-461- Part 4  historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2Amir Jafari
 
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networksPerformance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networksAmir Jafari
 
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksPerformance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksAmir Jafari
 

Plus de Amir Jafari (10)

Smart powetr grids
Smart powetr gridsSmart powetr grids
Smart powetr grids
 
CCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing SubnetsCCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing Subnets
 
CCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet MasksCCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet Masks
 
CCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 NetworksCCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 Networks
 
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 SubnettingCCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 Subnetting
 
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part IICCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part II
 
Network design
Network designNetwork design
Network design
 
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4  historic voice-digital connectivity-part 2CCNA Voice 640-461- Part 4  historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
 
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networksPerformance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
 
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksPerformance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
 

Dernier

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

CCNA R&S-11-Troubleshooting Ethernet LANs

  • 1. ©2015 Amir Jafari – www.amir-Jafari.com Routing and Switching 200-120 11 - Troubleshooting Ethernet LANs
  • 2. Troubleshooting Ethernet LANs ©2015 Amir Jafari – www.amir-Jafari.com Agenda  Perspectives on Network Verification and Troubleshooting  Analyzing LAN Topology Using Cisco Discovery Protocol  Analyzing Switch Interface Status  Predicting Where Switches Will Forward Frames  Analyzing VLANs and VLAN Trunks
  • 3. Perspectives on Network Verification and Troubleshooting ©2015 Amir Jafari – www.amir-Jafari.com Preparing to Use an Organized Troubleshooting Process The three major steps in troubleshooting process are as follows: Step 1. Analyzing/predicting normal operation: Predict the details of what should happen if the network is working correctly Step 2. Problem isolation: Determine how far along the expected path the frame/packet goes before it cannot be forwarded any Step 3. Root cause analysis: Identify the underlying causes of the problems identified in the previous  You need to remember the theory of how networks should work, as well as how to interpret the show command output  This process requires the use of testing tools, such as ping and traceroute, to isolate the problem
  • 4. Perspectives on Network Verification and Troubleshooting ©2015 Amir Jafari – www.amir-Jafari.com Preparing to Use an Organized Troubleshooting Process Example Network with a ping Problem Layer 3 Problem Isolation
  • 5. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Analyzing LAN Topology Using Cisco Discovery Protocol  The proprietary Cisco Discovery Protocol (CDP) discovers basic information about neighboring routers and switches without needing to know the passwords for the neighboring devices  To discover information, routers and switches send CDP messages out each of their interfaces  Devices that support CDP learn information about others by listening for the advertisements sent by other devices  The IEEE has standardized the Link Layer Discovery Protocol (LLDP), which serves the same role
  • 6. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Analyzing LAN Topology Using Cisco Discovery Protocol  From a troubleshooting perspective, CDP can be used to either confirm or fix the documentation shown in a network diagram, or even discover the devices and interfaces used in a network  CDP sends a copy of the CDP update to any known data link addresses  CDP discovers several useful details from the neighboring Cisco devices:  Device identifier: Typically the host name  Address list: Network and data link addresses  Port identifier: The interface on the remote router or switch on the other end of the link that sent the CDP advertisement  Capabilities list: Information on what type of device it is  Platform: The model and OS level running on the device
  • 7. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining Information Learned by CDP show cdp Commands That List Information About Neighbors
  • 8. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining Information Learned by CDP
  • 9. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining Information Learned by CDP  The CDP holdtime, which is the amount of time that the device will hold packets from neighbor devices
  • 10. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining Information Learned by CDP
  • 11. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining Information Learned by CDP
  • 12. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining Information Learned by CDP  Cisco recommends that CDP be disabled on any interface that might not have a need for CDP  CDP can be disabled globally and per-interface:  Per-interface, the no cdp enable and cdp enable interface subcommands toggle CDP off and on, respectively.  the no cdp run and cdp run global commands toggle CDP off and on (respectively) for the entire switch
  • 13. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining the Status of the CDP Protocols Commands Used to Verify CDP Operations
  • 14. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining the Status of the CDP Protocols
  • 15. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Status Codes and Reasons for Nonworking States  Cisco switches use two different sets of interface status codes: 1. Two codes (words) that use the same conventions as do router interface status codes 2. Single code (word)  Both sets of status codes can determine whether an interface is working  The switch show interfaces and show interfaces description commands list the two-code status just like routers. The two codes are named: 1. Line status: refer to whether Layer 1 is working 2. Protocol status: refer to whether Layer 2 is working
  • 16. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Status Codes and Reasons for Nonworking States  The show interfaces status command lists a different single interface status code.  This single interface status code corresponds to different combinations of the two-code interface status codes  For example, the show interfaces status command lists a “connected” state for working interfaces. It corresponds to the up/up state seen with the show interfaces command  Any interface state other than connected or up/up means that the switch will not forward or receive frames on the interface
  • 17. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Status Codes and Reasons for Nonworking States LAN Switch Interface Status Codes
  • 18. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Speed and Duplex Issues  Many UTP-based Ethernet interfaces support multiple speeds, either full- or half-duplex, and support IEEE standard  These same interfaces can also be configured to use a specific speed using the speed {10 | 100 | 1000} interface subcommand, and a specific duplex using the duplex {half | full} interface subcommand  With both configured (speed and duplex), a switch or router disables the IEEE-standard autonegotiation process on that interface  The show interfaces and show interfaces status commands list both the actual speed and duplex settings on an interface
  • 19. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Speed and Duplex Issues
  • 20. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Speed and Duplex Issues
  • 21. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Speed and Duplex Issues When one device has disabled autonegotiation, and the other device uses autonegotiation, the device using autonegotiation chooses the default duplex setting based on the current speed. The defaults are as follows:  If the speed is not known through any means, use 10 Mbps, half-duplex  If the switch successfully senses the speed without IEEE autonegotiation, by just looking at the signal on the cable: 1. If the speed is 10 or 100 Mbps, default to use half-duplex 2. If the speed is 1,000 Mbps, default to use full-duplex  While autonegotiation works well, these defaults allow for the possibility of a difficult-to-troubleshoot problem called a duplex mismatch
  • 22. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Speed and Duplex Issues  While autonegotiation works well, these defaults allow for the possibility of a difficult-to-troubleshoot problem called a duplex mismatch  In this case both devices could use the same speed, so the devices would consider the link to be up, but one side would use half-duplex, and the other side would use full-duplex Conditions to Create a Duplex Mismatch Between SW1 and SW2
  • 23. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Speed and Duplex Issues  Finding a duplex mismatch can be much more difficult than finding a speed mismatch, because the switch interface will still be in a connected (up/up) state  In this case, the interface works, but it might work poorly, with poor performance, and with symptoms of intermittent problems  The reason is that the device using half-duplex uses CSMA/CD logic, waiting to send when receiving a frame, believing collisions occur when they physically do not—and actually stopping sending a frame because the switch thinks a collision occurred  To identify duplex mismatch problems, check the duplex setting on each end of the link and watch for incrementing collision and late collision counters
  • 24. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Common Layer 1 Problems on Working Interfaces  When the interface reaches the connect (up/up) state, the switch considers the interface to be working.  The switch, of course, tries to use the interface, and at the same time, the switch keeps various interface counters.  These interface counters can help identify problems that can occur even though the interface is in a connect state  Whenever the physical transmission has problems, the receiving device might receive a frame whose bits have changed values. These frames do not pass the error detection logic as implemented in the FCS field in the Ethernet trailer.
  • 25. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Common Layer 1 Problems on Working Interfaces  The receiving device discards the frame and counts it as some kind of input error. Cisco switches list this error as a CRC error. (Cyclic redundancy check [CRC] is a term related to how the FCS math detects an error) Interface Counters for Layer 1 Problems
  • 26. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Common Layer 1 Problems on Working Interfaces  Runts: Frames that did not meet the minimum frame size requirement (64 bytes, including the 18-byte destination MAC, source MAC, Type, and FCS). Can be caused by collisions  Giants: Frames that exceed the maximum frame size requirement (1518 bytes, including the 18-byte destination MAC, source MAC, Type, and FCS)  Input Errors: A total of many counters, including runts, giants, no buffer, CRC, frame, overrun, and ignored counts  CRC: Received frames that did not pass the FCS math; can be caused by collisions  Frame: Received frames that have an illegal format, for example, ending with a partial byte; can be caused by collisions
  • 27. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Common Layer 1 Problems on Working Interfaces  Packets Output: Total number of packets (frames) forwarded out the interface  Output Errors: Total number of packets (frames) that the switch port tried to transmit, but for which some problem occurred  Collisions: Counter of all collisions that occur when the interface is transmitting a frame  Late Collisions: The subset of all collisions that happen after the 64th byte of the frame has been transmitted. (In a properly working Ethernet LAN, collisions should occur within the first 64 bytes; late collisions today often point to a duplex mismatch)
  • 28. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Common Layer 1 Problems on Working Interfaces  If a LAN design follows cabling guidelines, all collisions should occur by the end of the 64th byte of any frame  When a switch has already sent 64 bytes of a frame, and the switch receives a frame on that same interface, the switch senses a collision  In this case, the collision is a late collision, and the switch increments the late collision counter in addition to the usual CSMA/CD actions to send a jam signal, wait a random time, and try again  With a duplex mismatch, the half-duplex interface will likely see the late collisions counter increment
  • 29. Predicting Where Switches Will Forward Frames ©2015 Amir Jafari – www.amir-Jafari.com Predicting the Contents of the MAC Address Table  The output of show mac address-table EXEC command includes some static overhead MAC addresses used by the switch and any statically configured MAC addresses, such as those configured with the port security feature.  The command also lists all dynamically learned MAC addresses  If you want to see only the dynamically learned MAC address table entries, simply use the show mac address-table dynamic EXEC command
  • 30. Predicting Where Switches Will Forward Frames ©2015 Amir Jafari – www.amir-Jafari.com Predicting the Contents of the MAC Address Table Predictions for MAC Table Entries on SW1 and SW2
  • 31. Predicting Where Switches Will Forward Frames ©2015 Amir Jafari – www.amir-Jafari.com Predicting the Contents of the MAC Address Table
  • 32. Predicting Where Switches Will Forward Frames ©2015 Amir Jafari – www.amir-Jafari.com Analyzing the Forwarding Path Summarizes switch forwarding logic including the LAN switching: Step 1. Process functions on the incoming interface, if the interface is currently in an up/up (connected) state: A. If configured, apply port security logic to filter the frame as appropriate B. If the port is an access port, determine the interface’s access VLAN C. If the port is a trunk, determine the frame’s tagged VLAN
  • 33. Predicting Where Switches Will Forward Frames ©2015 Amir Jafari – www.amir-Jafari.com Analyzing the Forwarding Path Step 2. Make a forwarding decision. Look for the frame’s destination MAC address in the MAC address table, but only for entries in the VLAN identified in Step 1. If the destination MAC is... A. Found (unicast), forward the frame out the only interface listed in the matched address table entry. B. Not found (unicast), flood the frame out all other access ports (except the incoming port) in that same VLAN, plus out trunks that have not restricted the VLAN from that trunk C. Broadcast, flood the frame, with the same rules as the previous step
  • 34. Predicting Where Switches Will Forward Frames ©2015 Amir Jafari – www.amir-Jafari.com Port Security and Filtering  Port security allows three violation modes (shutdown, protect, and restrict), but only the default setting of shutdown causes the switch to err-disable the interface  Any MAC addresses associated with a port on which port security is enabled show up as static MAC addresses  The show mac address-table dynamic command does not list MAC addresses off these interfaces on which port security is enabled  The show mac address-table and show mac address-table static commands do list these static MAC addresses
  • 35. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Ensuring That the Right Access Interfaces Are in the Right VLANs Commands That Can Find Access Ports and VLANs  show vlan and show vlan brief commands do not list operational trunks
  • 36. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Access VLANs Not Being Defined  A VLAN can be defined to a switch in two ways: 1. Using the vlan number global configuration command 2. It can be learned from another switch using VTP  show vlan command always lists all VLANs known to the switch, but the show running-config command does not  Switches configured as VTP servers and clients do not list the vlan commands in the running-config nor the startup-config file; on these switches, you must use the show vlan command.  Switches configured to use VTP transparent mode, or that disable VTP, list the vlan configuration commands in the configuration files
  • 37. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Access VLANs Being Disabled  For any existing VLANs, also verify that the VLAN is active  The show vlan command should list one of two VLAN state values, depending on the current state: 1. Active 2. act/lshut  The second of these states means that the VLAN is shutdown. Shutting down a VLAN disables the VLAN on that switch only, so that the switch will not forward frames in that VLAN
  • 38. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Access VLANs Being Disabled
  • 39. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Check the Allowed VLAN List on Both Ends of a Trunk It is possible to configure a different allowed VLAN list on the opposite ends of a VLAN trunk. When mismatched, the trunk cannot pass traffic for that VLAN Mismatched VLAN-Allowed Lists on a Trunk
  • 40. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Check the Allowed VLAN List on Both Ends of a Trunk
  • 41. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Mismatched Trunking Operational States  The most common incorrect configuration—which results in both switches not trunking—is a configuration that uses the switchport mode dynamic auto command on both switches on the link  A different incorrect trunking configuration results in one switch with an operational state of “trunk,” while the other switch has an operational state of “static access”  When this combination of events happens, the interface works a little. The status on each end will be up/up or connected.  Traffic in the native VLAN will actually cross the link successfully. However, traffic in all the rest of the VLANs will not cross the link.
  • 42. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Mismatched Trunking Operational States Mismatched Trunking Operational States
  • 43. Troubleshooting Ethernet LANs ©2015 Amir Jafari – www.amir-Jafari.com Command References
  • 44. Troubleshooting Ethernet LANs ©2015 Amir Jafari – www.amir-Jafari.com Command References
  • 45. Troubleshooting Ethernet LANs ©2015 Amir Jafari – www.amir-Jafari.com Command References
  • 46. Troubleshooting Ethernet LANs ©2015 Amir Jafari – www.amir-Jafari.com References 1) Cisco Systems, Inc, www.cisco.com/ 2) Wendell Odom ,”Cisco CCENT/CCNA ICND1 100-101 Official Cert Guide”, Cisco Press, USA, 2013

Notes de l'éditeur

  1. Beginning course details and/or books/materials needed for a class/project.
  2. Beginning course details and/or books/materials needed for a class/project.
  3. Beginning course details and/or books/materials needed for a class/project.
  4. Beginning course details and/or books/materials needed for a class/project.
  5. Beginning course details and/or books/materials needed for a class/project.
  6. Beginning course details and/or books/materials needed for a class/project.
  7. Beginning course details and/or books/materials needed for a class/project.
  8. Beginning course details and/or books/materials needed for a class/project.
  9. Beginning course details and/or books/materials needed for a class/project.
  10. Beginning course details and/or books/materials needed for a class/project.
  11. Beginning course details and/or books/materials needed for a class/project.
  12. Beginning course details and/or books/materials needed for a class/project.
  13. Beginning course details and/or books/materials needed for a class/project.
  14. Beginning course details and/or books/materials needed for a class/project.
  15. Beginning course details and/or books/materials needed for a class/project.
  16. Beginning course details and/or books/materials needed for a class/project.
  17. Beginning course details and/or books/materials needed for a class/project.
  18. Beginning course details and/or books/materials needed for a class/project.
  19. Beginning course details and/or books/materials needed for a class/project.
  20. Beginning course details and/or books/materials needed for a class/project.
  21. Beginning course details and/or books/materials needed for a class/project.
  22. Beginning course details and/or books/materials needed for a class/project.
  23. Beginning course details and/or books/materials needed for a class/project.
  24. Beginning course details and/or books/materials needed for a class/project.
  25. Beginning course details and/or books/materials needed for a class/project.
  26. Beginning course details and/or books/materials needed for a class/project.
  27. Beginning course details and/or books/materials needed for a class/project.
  28. Beginning course details and/or books/materials needed for a class/project.
  29. Beginning course details and/or books/materials needed for a class/project.
  30. Beginning course details and/or books/materials needed for a class/project.
  31. Beginning course details and/or books/materials needed for a class/project.
  32. Beginning course details and/or books/materials needed for a class/project.
  33. Beginning course details and/or books/materials needed for a class/project.
  34. Beginning course details and/or books/materials needed for a class/project.
  35. Beginning course details and/or books/materials needed for a class/project.
  36. Beginning course details and/or books/materials needed for a class/project.
  37. Beginning course details and/or books/materials needed for a class/project.
  38. Beginning course details and/or books/materials needed for a class/project.
  39. Beginning course details and/or books/materials needed for a class/project.
  40. Beginning course details and/or books/materials needed for a class/project.
  41. Beginning course details and/or books/materials needed for a class/project.
  42. Beginning course details and/or books/materials needed for a class/project.
  43. Beginning course details and/or books/materials needed for a class/project.
  44. Beginning course details and/or books/materials needed for a class/project.
  45. Beginning course details and/or books/materials needed for a class/project.