Network Analysis Tools Flashcards

1
Q

Elements of Diagnosis

A

Gathered information: Gathering information about what is happening is essential to the troubleshooting process. Usually, the problem report does not contain enough information for you to formulate a good hypothesis without first gathering more information. You can gather information and symptoms either directly by observing processes or indirectly by executing tests.

Analysis: The gathered information is analyzed. Compare the symptoms against your knowledge of the system, processes, and baseline to separate the normal behavior from the abnormal behavior.

Elimination: By comparing the observed behavior against expected behavior, you can eliminate possible problem causes.

Proposed hypotheses: After gathering and analyzing information and eliminating the possible causes, you will be left with one or more potential problem causes. You need to assess the probability of each of these causes, so you can propose the most likely cause as the hypothetical cause of the problem.

Testing: Test the hypothetical cause to confirm or deny that it is the actual cause. The simplest way to perform testing is to propose a solution that is based on this hypothesis, implement that solution, and verify if it solves the problem. If this method is impossible or disruptive, the hypothesis can be strengthened or invalidated by gathering and analyzing more information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Router Categories

A

Routers can be classified into three categories:

Software-based routers: These routers have a shared control and data plane and a single CPU responsible for all operations.

Hardware-based routers: These routers have a separated control and data plane, a single CPU to manage the control plane, and an ASIC that has been designed with the only purpose to forward packets very fast. When the ASIC cannot forward a packet, it punts it to the CPU.

Hardware-assisted routers: These types of routers have a separated control and data plane, a single CPU to manage the control plane, and a Network Processor (NP) significantly increasing the throughput of the device. If the NP cannot forward a packet, it punts it to the CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CPU Functions

A

When a device has completed the boot process, the CPU has two distinct functions. The first function is to run the different processes under IOS to carry out the function for a device operating in a network. The second is to send/receive packets to/from the switching hardware. The CPU is doing both of these functions simultaneously.

In the show processes cpu sorted 1min command display, the CPU utilization for five seconds field contains two elements: 7 percent and 4 percent. The first number is the total CPU utilization, and the second number is the interrupt utilization. Interrupt utilization indicates the volume of network traffic the CPU is receiving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Memory Symptoms

A

The show memory command displays the amount of processor memory and I/O memory that is in use and available (free). I/O memory is used for temporary packet buffering.

When device performance is a concern during network troubleshooting, check the free memory. As a result of a lack of memory, device performance can drastically slow, or get to a point that causes the device to automatically reboot. You should always plan and take into consideration the free amount of memory on your device.

When a process cannot allocate the needed memory due to unavailability of enough memory, the router or the switch will log a memory allocation failure with a %SYS-2-MALLOCFAIL message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Interface Statistics

A

Input queue drops: These signify that the traffic is dropping because the router was receiving more traffic than it could process.

Output queue drops: These are usually a result of a congested link.

Input errors: These may be a result of interface problems, duplex errors, and CRC errors.

Output errors: These are usually related to duplex issues.

Your device may have various controllers that relate to different interfaces. Depending on the interface hardware, the show controllers command gives you a more detailed packet and error statistics than the show interface command for that particular type of hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Common Show Filters

A

exclude

include

begin

section

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Regular Expressions

A

^ = Matches the character at the beginning of the string
| = Matches one of the characters or character patterns on either side of the pipe. This action is similar to the logical OR
$ = Matches the character or null string at the end of a regular expression
* = Matches zero or more sequences of the character preceding the asterisk. Also acts as a wildcard for matching any number of characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Traceroute

A

The traceroute tool is very useful if you want to determine the specific path that a frame takes to its destination. If there is an unreachable destination, you can determine where on the path the issue lies.

Traceroute works by sending the remote host a sequence of three UDP datagrams with a TTL of 1 in the IP header and the destination ports 33434 (first packet), 33435 (second packet), and 33436 (third packet). The TTL of 1 causes the datagram to “timeout” when it hits the first router in the path. The router responds with an ICMP “time exceeded” message, meaning the datagram has expired.

The next three UDP datagrams are sent with TTL of 2 to destination ports 33437, 33438 and 33439.

After passing through the first router which decrements the TTL to 1, the datagram arrives at the ingress interface of the second router. The second router drops the TTL to 0 and responds with an ICMP “time exceeded” message.

This process continues until the packet reaches the final destination and the ICMP “time exceeded,” messages are sent by all the routers along the path.

When the packet reaches the final destination, the device responds with an ICMP “port unreachable.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Traceroute Responses

A

xx msec = the RTT to the hop
A = administratively prohibited
Q = Source quench (destination too busy)
I = User interrupted test
U = Port unreachable
H = Host unreachable
N = Network unreachable
P = Protocol unreachable
T = timeout
? = Unknown packet type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Debug Outputs

A

Console: By default, logging is enabled on the console port. Hence, the console port always processes debug output even if you are actually using some other port or method (such as aux, vty, or buffer) to capture the output.

Excessive debugs to the console port of a router can cause it to hang. You should consider changing where the debug messages are captured and turn off logging to the console with the no logging console command.

Some debug commands are very verbose and therefore, you cannot easily view any subsequent commands you wish to type while the debug is in process. To remedy the situation, configure logging synchronous on the console line.

AUX and VTY Ports: To receive debug messages when connected to the AUX port or remotely logged into the device via TELNET or SSH through the VTY lines, type the command terminal monitor.

Logs: Like any syslog message, debug messages can also be collected in logs. You can use the logging command to configure messages to be captured in an internal device buffer or external syslog server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Debug ip packet

A

Packets generated by a router or destined for a router are process-switched and are therefore displayed with the debug ip packet command.

Packets that are forwarded through a router that is configured for fast-switching or CEF are not provided to the processor, and hence the debugging does not show anything. To display packets forwarded through a router with the debug ip packet command, you need to disable fast-switching on the router with the no ip route-cache command (for unicast packets) or no ip mroute-cache (for multicast packets). This command is configured on the interfaces where the traffic is supposed to flow. You can verify whether fast switching is enabled with the show ip interface command.

Note
Disabling fast-switching on a router that handles many packets can cause CPU utilization to spike so that the box hangs or loses its connection to its peers.

Note
Do not disable fast-switching on a router running Multiprotocol Label Switching (MPLS). MPLS is used along with CEF. Therefore, disabling fast-switching on the interface can have disastrous effect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Service Level Agreement (SLA)

A

a contract between a network provider and its customers, or between a network department and its internal corporate customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IP SLA

A

IP SLA is a Cisco proprietary solution that uses the 1967 UDP port for control messages. When configuring ISP SLA source and responder, specify a different Layer 4 port where testing will be executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Switchport Analyzer (SPAN) Types

A

Local (SPAN)
Remote (RSPAN)
Encapsulated Remote (ERSPAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote SPAN (RSPAN)

A

RSPAN supports source and destination ports on different switches, while local SPAN supports only source and destination ports on the same switch.

RSPAN consists of the RSPAN source session, RSPAN VLAN, and RSPAN destination session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Reflector Port

A

On some of the platforms, a reflector port needs to be specified together with an RSPAN VLAN. The reflector port is a physical interface that acts as a loopback and reflects the traffic that is copied from source ports to an RSPAN VLAN. No traffic is actually sent out of the interface that is assigned as the reflector port. The need for a reflector port is caused by a hardware design limitation on some platforms. The reflector port can be used for only one session at a time. RSPAN supports source ports, source VLANs, and destinations on different switches, which provide Remote Monitoring of multiple switches across a network. RSPAN uses a Layer 2 VLAN to carry SPAN traffic between switches.

17
Q

Encapsulated Remote SPAN (ERSPAN)

A

The Cisco ERSPAN mirrors traffic on one or more “source” ports and delivers the mirrored traffic to one or more “destination” ports on another switch. The traffic is encapsulated in Generic Routing Encapsulation (GRE) and is, therefore, routable across a Layer 3 network between the “source” switch and the “destination” switch. ERSPAN supports source ports, source VLANs, and destination ports on different switches, which provide Remote Monitoring of multiple switches across your network.

ERSPAN consists of an ERSPAN source session, routable ERSPAN GRE encapsulated traffic, and an ERSPAN destination session.

A device that has only an ERSPAN source session configured is called an ERSPAN source device, and a device that has only an ERSPAN destination session configured is called an ERSPAN termination device. You separately configure ERSPAN source sessions and destination sessions on different switches.

18
Q

Command to monitor the statistics of ERSPAN monitored traffic

A

show platform hardware qfp active feature erspan state

19
Q

Embedded Packet Capture (EPC)

A

Allows for packet data to be captured at various points in the CEF packet-processing path; flowing through, to and from a Cisco router

Support varies based on model

Can export packet information as a packet capture (PCAP) file to allow for further examination through other tools.

20
Q

Embedded Wireshark

A

Allows for packet data to be captured at various points in the packet-processing path; flowing through, to and from a Catalyst 4500 switch (with a Sup7E running 3.3SG or later) and Catalyst 3850 switch

Is supported only on switches running IP Base image or IP Services image.

Packets captured in the output direction of an interface might not reflect the changes made by switch rewrite (includes TTL, VLAN tag, CoS, checksum, MAC addresses, DSCP, precedent, UP, and so on).

21
Q

Mini-Protocol Analyzer (MPA)

A

Uses a SPAN session to capture data plane traffic

Allows for packet data to be captured at various points in a hardware-forwarding device like Cisco 7600, Catalyst 6500 and ME6500 platforms

Limits the captured packets to selected VLANs, ACLs, or MAC addresses.

Captures packet information in a libpcap file, which is supported by many packet analysis and sniffer programs.

22
Q

Cisco Packet Capture Tools Characteristics

A

There are exec-level commands to start and stop the capture, define buffer size, define buffer type (linear or circular), and define the packet size to capture. The tools will facilitate the export of the packet capture in formats suitable for analysis.

The tools are useful when it is not possible to tap into the network using a standalone packet-sniffing tool, or when the need arises to remotely debug and troubleshoot issues.

The capture rate can be throttled using further administrative controls. For example, using an Access Control List (ACL) to specify the maximum packet capture rate or a specific sampling interval.

You can use show commands to display packet contents on the device itself.