SlideShare a Scribd company logo
©2015 Amir Jafari – www.amir-Jafari.com
Routing and Switching 200-120
11 - Troubleshooting Ethernet LANs
Troubleshooting Ethernet LANs
©2015 Amir Jafari – www.amir-Jafari.com
Agenda
 Perspectives on Network Verification and Troubleshooting
 Analyzing LAN Topology Using Cisco Discovery Protocol
 Analyzing Switch Interface Status
 Predicting Where Switches Will Forward Frames
 Analyzing VLANs and VLAN Trunks
Perspectives on Network Verification and
Troubleshooting
©2015 Amir Jafari – www.amir-Jafari.com
Preparing to Use an Organized Troubleshooting Process
The three major steps in troubleshooting process are as follows:
Step 1. Analyzing/predicting normal operation: Predict the details of what
should happen if the network is working correctly
Step 2. Problem isolation: Determine how far along the expected path the
frame/packet goes before it cannot be forwarded any
Step 3. Root cause analysis: Identify the underlying causes of the problems
identified in the previous
 You need to remember the theory of how networks should work, as well as
how to interpret the show command output
 This process requires the use of testing tools, such as ping and traceroute,
to isolate the problem
Perspectives on Network Verification and
Troubleshooting
©2015 Amir Jafari – www.amir-Jafari.com
Preparing to Use an Organized Troubleshooting Process
Example Network with a ping Problem
Layer 3 Problem Isolation
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Analyzing LAN Topology Using Cisco Discovery
Protocol
 The proprietary Cisco Discovery Protocol (CDP) discovers basic information
about neighboring routers and switches without needing to know the
passwords for the neighboring devices
 To discover information, routers and switches send CDP messages out each
of their interfaces
 Devices that support CDP learn information about others by listening for the
advertisements sent by other devices
 The IEEE has standardized the Link Layer Discovery Protocol (LLDP),
which serves the same role
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Analyzing LAN Topology Using Cisco Discovery
Protocol
 From a troubleshooting perspective, CDP can be used to either confirm or fix
the documentation shown in a network diagram, or even discover the devices
and interfaces used in a network
 CDP sends a copy of the CDP update to any known data link addresses
 CDP discovers several useful details from the neighboring Cisco
devices:
 Device identifier: Typically the host name
 Address list: Network and data link addresses
 Port identifier: The interface on the remote router or switch on the other
end of the link that sent the CDP advertisement
 Capabilities list: Information on what type of device it is
 Platform: The model and OS level running on the device
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining Information Learned by CDP
show cdp Commands That List Information About
Neighbors
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining Information Learned by CDP
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining Information Learned by CDP
 The CDP holdtime, which is the amount of time that the device will hold
packets from neighbor devices
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining Information Learned by CDP
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining Information Learned by CDP
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining Information Learned by CDP
 Cisco recommends that CDP be disabled on any interface that might not have
a need for CDP
 CDP can be disabled globally and per-interface:
 Per-interface, the no cdp enable and cdp enable interface subcommands
toggle CDP off and on, respectively.
 the no cdp run and cdp run global commands toggle CDP off and on
(respectively) for the entire switch
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining the Status of the CDP Protocols
Commands Used to Verify CDP Operations
Analyzing LAN Topology Using Cisco
Discovery Protocol
©2015 Amir Jafari – www.amir-Jafari.com
Examining the Status of the CDP Protocols
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Status Codes and Reasons for Nonworking
States
 Cisco switches use two different sets of interface status codes:
1. Two codes (words) that use the same conventions as do router interface
status codes
2. Single code (word)
 Both sets of status codes can determine whether an interface is working
 The switch show interfaces and show interfaces description commands list
the two-code status just like routers. The two codes are named:
1. Line status: refer to whether Layer 1 is working
2. Protocol status: refer to whether Layer 2 is working
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Status Codes and Reasons for Nonworking
States
 The show interfaces status command lists a different single interface
status code.
 This single interface status code corresponds to different combinations of
the two-code interface status codes
 For example, the show interfaces status command lists a “connected” state
for working interfaces. It corresponds to the up/up state seen with the show
interfaces command
 Any interface state other than connected or up/up means that the switch will
not forward or receive frames on the interface
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Status Codes and Reasons for Nonworking
States
LAN Switch Interface Status Codes
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Speed and Duplex Issues
 Many UTP-based Ethernet interfaces support multiple speeds, either full- or
half-duplex, and support IEEE standard
 These same interfaces can also be configured to use a specific speed using
the speed {10 | 100 | 1000} interface subcommand, and a specific duplex
using the duplex {half | full} interface subcommand
 With both configured (speed and duplex), a switch or router disables the
IEEE-standard autonegotiation process on that interface
 The show interfaces and show interfaces status commands list both the
actual speed and duplex settings on an interface
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Speed and Duplex Issues
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Speed and Duplex Issues
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Speed and Duplex Issues
When one device has disabled autonegotiation, and the other device uses
autonegotiation, the device using autonegotiation chooses the default duplex
setting
based on the current speed. The defaults are as follows:
 If the speed is not known through any means, use 10 Mbps, half-duplex
 If the switch successfully senses the speed without IEEE autonegotiation, by
just looking at the signal on the cable:
1. If the speed is 10 or 100 Mbps, default to use half-duplex
2. If the speed is 1,000 Mbps, default to use full-duplex
 While autonegotiation works well, these defaults allow for the possibility of a
difficult-to-troubleshoot problem called a duplex mismatch
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Speed and Duplex Issues
 While autonegotiation works well, these defaults allow for the possibility of a
difficult-to-troubleshoot problem called a duplex mismatch
 In this case both devices could use the same speed, so the devices would
consider the link to be up, but one side would use half-duplex, and the other
side would use full-duplex
Conditions to Create a Duplex Mismatch Between SW1 and
SW2
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Interface Speed and Duplex Issues
 Finding a duplex mismatch can be much more difficult than finding a speed
mismatch, because the switch interface will still be in a connected (up/up)
state
 In this case, the interface works, but it might work poorly, with poor
performance, and with symptoms of intermittent problems
 The reason is that the device using half-duplex uses CSMA/CD logic, waiting
to send when receiving a frame, believing collisions occur when they
physically do not—and actually stopping sending a frame because the switch
thinks a collision occurred
 To identify duplex mismatch problems, check the duplex setting on each end
of the link and watch for incrementing collision and late collision counters
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Common Layer 1 Problems on Working Interfaces
 When the interface reaches the connect (up/up) state, the switch considers the
interface to be working.
 The switch, of course, tries to use the interface, and at the same time, the
switch keeps various interface counters.
 These interface counters can help identify problems that can occur even
though the interface is in a connect state
 Whenever the physical transmission has problems, the receiving device might
receive a frame whose bits have changed values. These frames do not pass
the error detection logic as implemented in the FCS field in the Ethernet trailer.
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Common Layer 1 Problems on Working Interfaces
 The receiving device discards the frame and counts it as some kind of input
error. Cisco switches list this error as a CRC error. (Cyclic redundancy check
[CRC] is a term related to how the FCS math detects an error)
Interface Counters for Layer 1 Problems
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Common Layer 1 Problems on Working Interfaces
 Runts: Frames that did not meet the minimum frame size requirement (64
bytes, including the 18-byte destination MAC, source MAC, Type, and FCS).
Can be caused by collisions
 Giants: Frames that exceed the maximum frame size requirement (1518
bytes, including the 18-byte destination MAC, source MAC, Type, and FCS)
 Input Errors: A total of many counters, including runts, giants, no buffer, CRC,
frame, overrun, and ignored counts
 CRC: Received frames that did not pass the FCS math; can be caused by
collisions
 Frame: Received frames that have an illegal format, for example, ending with
a partial byte; can be caused by collisions
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Common Layer 1 Problems on Working Interfaces
 Packets Output: Total number of packets (frames) forwarded out the interface
 Output Errors: Total number of packets (frames) that the switch port tried to
transmit, but for which some problem occurred
 Collisions: Counter of all collisions that occur when the interface is
transmitting a frame
 Late Collisions: The subset of all collisions that happen after the 64th byte of
the frame has been transmitted. (In a properly working Ethernet LAN,
collisions should occur within the first 64 bytes; late collisions today often
point to a duplex mismatch)
Analyzing Switch Interface Status
©2015 Amir Jafari – www.amir-Jafari.com
Common Layer 1 Problems on Working Interfaces
 If a LAN design follows cabling guidelines, all collisions should occur by the
end of the 64th byte of any frame
 When a switch has already sent 64 bytes of a frame, and the switch receives a
frame on that same interface, the switch senses a collision
 In this case, the collision is a late collision, and the switch increments the late
collision counter in addition to the usual CSMA/CD actions to send a jam
signal, wait a random time, and try again
 With a duplex mismatch, the half-duplex interface will likely see the late
collisions counter increment
Predicting Where Switches Will Forward
Frames
©2015 Amir Jafari – www.amir-Jafari.com
Predicting the Contents of the MAC Address Table
 The output of show mac address-table EXEC command includes some static
overhead MAC addresses used by the switch and any statically configured
MAC addresses, such as those configured with the port security feature.
 The command also lists all dynamically learned MAC addresses
 If you want to see only the dynamically learned MAC address table entries,
simply use the show mac address-table dynamic EXEC command
Predicting Where Switches Will Forward
Frames
©2015 Amir Jafari – www.amir-Jafari.com
Predicting the Contents of the MAC Address Table
Predictions for MAC Table Entries on SW1 and
SW2
Predicting Where Switches Will Forward
Frames
©2015 Amir Jafari – www.amir-Jafari.com
Predicting the Contents of the MAC Address Table
Predicting Where Switches Will Forward
Frames
©2015 Amir Jafari – www.amir-Jafari.com
Analyzing the Forwarding Path
Summarizes switch forwarding logic including the LAN switching:
Step 1. Process functions on the incoming interface, if the interface is currently in
an up/up
(connected) state:
A. If configured, apply port security logic to filter the frame as appropriate
B. If the port is an access port, determine the interface’s access VLAN
C. If the port is a trunk, determine the frame’s tagged VLAN
Predicting Where Switches Will Forward
Frames
©2015 Amir Jafari – www.amir-Jafari.com
Analyzing the Forwarding Path
Step 2. Make a forwarding decision. Look for the frame’s destination MAC
address in the MAC address table, but only for entries in the VLAN identified in
Step 1. If the destination MAC is...
A. Found (unicast), forward the frame out the only interface listed in the
matched address table entry.
B. Not found (unicast), flood the frame out all other access ports (except the
incoming port) in that same VLAN, plus out trunks that have not restricted the
VLAN from that trunk
C. Broadcast, flood the frame, with the same rules as the previous step
Predicting Where Switches Will Forward
Frames
©2015 Amir Jafari – www.amir-Jafari.com
Port Security and Filtering
 Port security allows three violation modes (shutdown, protect, and restrict), but
only the default setting of shutdown causes the switch to err-disable the
interface
 Any MAC addresses associated with a port on which port security is enabled
show up as static MAC addresses
 The show mac address-table dynamic command does not list MAC addresses
off these interfaces on which port security is enabled
 The show mac address-table and show mac address-table static
commands do list these static MAC addresses
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Ensuring That the Right Access Interfaces Are in the
Right VLANs
Commands That Can Find Access Ports and
VLANs
 show vlan and show vlan brief commands do not list operational trunks
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Access VLANs Not Being Defined
 A VLAN can be defined to a switch in two ways:
1. Using the vlan number global configuration command
2. It can be learned from another switch using VTP
 show vlan command always lists all VLANs known to the switch, but the show
running-config command does not
 Switches configured as VTP servers and clients do not list the vlan commands
in the running-config nor the startup-config file; on these switches, you must
use the show vlan command.
 Switches configured to use VTP transparent mode, or that disable VTP, list the
vlan configuration commands in the configuration files
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Access VLANs Being Disabled
 For any existing VLANs, also verify that the VLAN is active
 The show vlan command should list one of two VLAN state values,
depending on the current state:
1. Active
2. act/lshut
 The second of these states means that the VLAN is shutdown. Shutting down
a VLAN disables the VLAN on that switch only, so that the switch will not
forward frames in that VLAN
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Access VLANs Being Disabled
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Check the Allowed VLAN List on Both Ends of a Trunk
It is possible to configure a different allowed VLAN list on the opposite ends of a
VLAN trunk. When mismatched, the trunk cannot pass traffic for that VLAN
Mismatched VLAN-Allowed Lists on a Trunk
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Check the Allowed VLAN List on Both Ends of a Trunk
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Mismatched Trunking Operational States
 The most common incorrect configuration—which results in both switches not
trunking—is a configuration that uses the switchport mode dynamic auto
command on both switches on the link
 A different incorrect trunking configuration results in one switch with an
operational state of “trunk,” while the other switch has an operational state of
“static access”
 When this combination of events happens, the interface works a little. The
status on each end will be up/up or connected.
 Traffic in the native VLAN will actually cross the link successfully. However,
traffic in all the rest of the VLANs will not cross the link.
Analyzing VLANs and VLAN Trunks
©2015 Amir Jafari – www.amir-Jafari.com
Mismatched Trunking Operational States
Mismatched Trunking Operational States
Troubleshooting Ethernet LANs
©2015 Amir Jafari – www.amir-Jafari.com
Command References
Troubleshooting Ethernet LANs
©2015 Amir Jafari – www.amir-Jafari.com
Command References
Troubleshooting Ethernet LANs
©2015 Amir Jafari – www.amir-Jafari.com
Command References
Troubleshooting Ethernet LANs
©2015 Amir Jafari – www.amir-Jafari.com
References
1) Cisco Systems, Inc, www.cisco.com/
2) Wendell Odom ,”Cisco CCENT/CCNA ICND1 100-101 Official Cert Guide”,
Cisco Press, USA, 2013

More Related Content

What's hot

CCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on SwitchCCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on Switch
Amir Jafari
 
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
Amir Jafari
 
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking ModelsCCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking Models
Amir Jafari
 
CCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part ICCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part I
Amir Jafari
 
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingCCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
Amir Jafari
 
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet SwitchingCCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet Switching
Amir Jafari
 
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network AssociateCCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network Associate
Amir Jafari
 
Chapter 16 : inter-vlan routing
Chapter 16 : inter-vlan routingChapter 16 : inter-vlan routing
Chapter 16 : inter-vlan routing
teknetir
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumps
slotiopo
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Vlans
VlansVlans
Vlans1 2d
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
Chaing Ravuth
 
Ccnp route
Ccnp routeCcnp route
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
Chaing Ravuth
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2
Chaing Ravuth
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
Chaing Ravuth
 
Ccnp switch (300 115)
Ccnp switch (300 115)Ccnp switch (300 115)
Ccnp switch (300 115)
mohibullah70
 
Ccna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamCcna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_team
Raja Mazhar
 

What's hot (20)

CCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on SwitchCCNA Lab 3-VLAN Configuration on Switch
CCNA Lab 3-VLAN Configuration on Switch
 
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
CCNA Lab 4-Configuring EtherChannels and optimizing Spanning Tree Protocol on...
 
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking ModelsCCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking Models
 
CCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part ICCNA Lab 1-Configuring a Switch Part I
CCNA Lab 1-Configuring a Switch Part I
 
CCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN RoutingCCNA Lab 5-Configuring Inter-VLAN Routing
CCNA Lab 5-Configuring Inter-VLAN Routing
 
CCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet SwitchingCCNA R&S-09-Configuring Ethernet Switching
CCNA R&S-09-Configuring Ethernet Switching
 
CCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network AssociateCCNA R&S-01-Introduction to Cisco Certified Network Associate
CCNA R&S-01-Introduction to Cisco Certified Network Associate
 
Chapter 16 : inter-vlan routing
Chapter 16 : inter-vlan routingChapter 16 : inter-vlan routing
Chapter 16 : inter-vlan routing
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA 200-120 Latest Dumps
CCNA 200-120 Latest DumpsCCNA 200-120 Latest Dumps
CCNA 200-120 Latest Dumps
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Vlans
VlansVlans
Vlans
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
 
Ccnp route
Ccnp routeCcnp route
Ccnp route
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
 
CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2CCNA3 Verson6 Chapter2
CCNA3 Verson6 Chapter2
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
Ccnp switch (300 115)
Ccnp switch (300 115)Ccnp switch (300 115)
Ccnp switch (300 115)
 
Ccna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamCcna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_team
 

Similar to CCNA R&S-11-Troubleshooting Ethernet LANs

Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5friv4schoolgames
 
ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN
ECI – THE ELASTIC NETWORK™
 
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013Đồng Quốc Vương
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examĐồng Quốc Vương
 
Eyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration GuideEyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration Guide
Eyeball Networks
 
F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.
Kapil Sabharwal
 
640 802 exam
640 802 exam640 802 exam
640 802 examliemgpc2
 
Industrial Training Presentaion(Networking)
Industrial Training Presentaion(Networking)Industrial Training Presentaion(Networking)
Industrial Training Presentaion(Networking)
Gaurav Uniyal
 
Ccna Imp Guide
Ccna Imp GuideCcna Imp Guide
Ccna Imp Guide
abhijitgnbbl
 
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Đồng Quốc Vương
 
CCNA 200-120 Exam Questions
CCNA 200-120 Exam QuestionsCCNA 200-120 Exam Questions
CCNA 200-120 Exam Questions
Eng. Emad Al-Atoum
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full
nataliej4
 
Chapter 5 Routing.pptx
Chapter 5 Routing.pptxChapter 5 Routing.pptx
Chapter 5 Routing.pptx
AyaanMohamed4
 
OpenFlow: What is it Good For?
OpenFlow: What is it Good For? OpenFlow: What is it Good For?
OpenFlow: What is it Good For?
APNIC
 
Cymphonix active-passive high availability v9
Cymphonix   active-passive high availability v9Cymphonix   active-passive high availability v9
Cymphonix active-passive high availability v9encikkidal
 
cFrame framework slides
cFrame framework slidescFrame framework slides
cFrame framework slides
kestasj
 

Similar to CCNA R&S-11-Troubleshooting Ethernet LANs (20)

Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5Ccna 1 practice final exam answer v5
Ccna 1 practice final exam answer v5
 
ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN ECI OpenFlow 2.0 the Future of SDN
ECI OpenFlow 2.0 the Future of SDN
 
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
 
Eyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration GuideEyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration Guide
 
F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.F5 BigIP LTM Initial, Build, Install and Licensing.
F5 BigIP LTM Initial, Build, Install and Licensing.
 
640 802 exam
640 802 exam640 802 exam
640 802 exam
 
Industrial Training Presentaion(Networking)
Industrial Training Presentaion(Networking)Industrial Training Presentaion(Networking)
Industrial Training Presentaion(Networking)
 
Ccna Imp Guide
Ccna Imp GuideCcna Imp Guide
Ccna Imp Guide
 
lecciones ccna3
lecciones ccna3lecciones ccna3
lecciones ccna3
 
CCNA 2
CCNA 2 CCNA 2
CCNA 2
 
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
 
CCNA 200-120 Exam Questions
CCNA 200-120 Exam QuestionsCCNA 200-120 Exam Questions
CCNA 200-120 Exam Questions
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full
 
Chapter 5 Routing.pptx
Chapter 5 Routing.pptxChapter 5 Routing.pptx
Chapter 5 Routing.pptx
 
OpenFlow: What is it Good For?
OpenFlow: What is it Good For? OpenFlow: What is it Good For?
OpenFlow: What is it Good For?
 
ccna 4 final 2012
ccna 4 final 2012ccna 4 final 2012
ccna 4 final 2012
 
Cymphonix active-passive high availability v9
Cymphonix   active-passive high availability v9Cymphonix   active-passive high availability v9
Cymphonix active-passive high availability v9
 
cFrame framework slides
cFrame framework slidescFrame framework slides
cFrame framework slides
 

More from Amir Jafari

Smart powetr grids
Smart powetr gridsSmart powetr grids
Smart powetr grids
Amir Jafari
 
CCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing SubnetsCCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing Subnets
Amir Jafari
 
CCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet MasksCCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet Masks
Amir Jafari
 
CCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 NetworksCCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 Networks
Amir Jafari
 
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 SubnettingCCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 Subnetting
Amir Jafari
 
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part IICCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part II
Amir Jafari
 
Network design
Network designNetwork design
Network design
Amir Jafari
 
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4  historic voice-digital connectivity-part 2CCNA Voice 640-461- Part 4  historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
Amir Jafari
 
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networksPerformance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networksAmir Jafari
 
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksPerformance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksAmir Jafari
 

More from Amir Jafari (10)

Smart powetr grids
Smart powetr gridsSmart powetr grids
Smart powetr grids
 
CCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing SubnetsCCNA R&S-18-Analyzing Existing Subnets
CCNA R&S-18-Analyzing Existing Subnets
 
CCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet MasksCCNA R&S-17-Analyzing Subnet Masks
CCNA R&S-17-Analyzing Subnet Masks
 
CCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 NetworksCCNA R&S-16-Analyzing Classful IPv4 Networks
CCNA R&S-16-Analyzing Classful IPv4 Networks
 
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 SubnettingCCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 Subnetting
 
CCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part IICCNA Lab 2-Configuring a Switch Part II
CCNA Lab 2-Configuring a Switch Part II
 
Network design
Network designNetwork design
Network design
 
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4  historic voice-digital connectivity-part 2CCNA Voice 640-461- Part 4  historic voice-digital connectivity-part 2
CCNA Voice 640-461- Part 4 historic voice-digital connectivity-part 2
 
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networksPerformance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
Performance evaluation-of-ieee-802.11p-for-vehicular-communication-networks
 
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication NetworksPerformance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
Performance Evaluation Of IEEE 802.11p For Vehicular Communication Networks
 

Recently uploaded

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

CCNA R&S-11-Troubleshooting Ethernet LANs

  • 1. ©2015 Amir Jafari – www.amir-Jafari.com Routing and Switching 200-120 11 - Troubleshooting Ethernet LANs
  • 2. Troubleshooting Ethernet LANs ©2015 Amir Jafari – www.amir-Jafari.com Agenda  Perspectives on Network Verification and Troubleshooting  Analyzing LAN Topology Using Cisco Discovery Protocol  Analyzing Switch Interface Status  Predicting Where Switches Will Forward Frames  Analyzing VLANs and VLAN Trunks
  • 3. Perspectives on Network Verification and Troubleshooting ©2015 Amir Jafari – www.amir-Jafari.com Preparing to Use an Organized Troubleshooting Process The three major steps in troubleshooting process are as follows: Step 1. Analyzing/predicting normal operation: Predict the details of what should happen if the network is working correctly Step 2. Problem isolation: Determine how far along the expected path the frame/packet goes before it cannot be forwarded any Step 3. Root cause analysis: Identify the underlying causes of the problems identified in the previous  You need to remember the theory of how networks should work, as well as how to interpret the show command output  This process requires the use of testing tools, such as ping and traceroute, to isolate the problem
  • 4. Perspectives on Network Verification and Troubleshooting ©2015 Amir Jafari – www.amir-Jafari.com Preparing to Use an Organized Troubleshooting Process Example Network with a ping Problem Layer 3 Problem Isolation
  • 5. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Analyzing LAN Topology Using Cisco Discovery Protocol  The proprietary Cisco Discovery Protocol (CDP) discovers basic information about neighboring routers and switches without needing to know the passwords for the neighboring devices  To discover information, routers and switches send CDP messages out each of their interfaces  Devices that support CDP learn information about others by listening for the advertisements sent by other devices  The IEEE has standardized the Link Layer Discovery Protocol (LLDP), which serves the same role
  • 6. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Analyzing LAN Topology Using Cisco Discovery Protocol  From a troubleshooting perspective, CDP can be used to either confirm or fix the documentation shown in a network diagram, or even discover the devices and interfaces used in a network  CDP sends a copy of the CDP update to any known data link addresses  CDP discovers several useful details from the neighboring Cisco devices:  Device identifier: Typically the host name  Address list: Network and data link addresses  Port identifier: The interface on the remote router or switch on the other end of the link that sent the CDP advertisement  Capabilities list: Information on what type of device it is  Platform: The model and OS level running on the device
  • 7. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining Information Learned by CDP show cdp Commands That List Information About Neighbors
  • 8. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining Information Learned by CDP
  • 9. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining Information Learned by CDP  The CDP holdtime, which is the amount of time that the device will hold packets from neighbor devices
  • 10. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining Information Learned by CDP
  • 11. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining Information Learned by CDP
  • 12. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining Information Learned by CDP  Cisco recommends that CDP be disabled on any interface that might not have a need for CDP  CDP can be disabled globally and per-interface:  Per-interface, the no cdp enable and cdp enable interface subcommands toggle CDP off and on, respectively.  the no cdp run and cdp run global commands toggle CDP off and on (respectively) for the entire switch
  • 13. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining the Status of the CDP Protocols Commands Used to Verify CDP Operations
  • 14. Analyzing LAN Topology Using Cisco Discovery Protocol ©2015 Amir Jafari – www.amir-Jafari.com Examining the Status of the CDP Protocols
  • 15. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Status Codes and Reasons for Nonworking States  Cisco switches use two different sets of interface status codes: 1. Two codes (words) that use the same conventions as do router interface status codes 2. Single code (word)  Both sets of status codes can determine whether an interface is working  The switch show interfaces and show interfaces description commands list the two-code status just like routers. The two codes are named: 1. Line status: refer to whether Layer 1 is working 2. Protocol status: refer to whether Layer 2 is working
  • 16. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Status Codes and Reasons for Nonworking States  The show interfaces status command lists a different single interface status code.  This single interface status code corresponds to different combinations of the two-code interface status codes  For example, the show interfaces status command lists a “connected” state for working interfaces. It corresponds to the up/up state seen with the show interfaces command  Any interface state other than connected or up/up means that the switch will not forward or receive frames on the interface
  • 17. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Status Codes and Reasons for Nonworking States LAN Switch Interface Status Codes
  • 18. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Speed and Duplex Issues  Many UTP-based Ethernet interfaces support multiple speeds, either full- or half-duplex, and support IEEE standard  These same interfaces can also be configured to use a specific speed using the speed {10 | 100 | 1000} interface subcommand, and a specific duplex using the duplex {half | full} interface subcommand  With both configured (speed and duplex), a switch or router disables the IEEE-standard autonegotiation process on that interface  The show interfaces and show interfaces status commands list both the actual speed and duplex settings on an interface
  • 19. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Speed and Duplex Issues
  • 20. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Speed and Duplex Issues
  • 21. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Speed and Duplex Issues When one device has disabled autonegotiation, and the other device uses autonegotiation, the device using autonegotiation chooses the default duplex setting based on the current speed. The defaults are as follows:  If the speed is not known through any means, use 10 Mbps, half-duplex  If the switch successfully senses the speed without IEEE autonegotiation, by just looking at the signal on the cable: 1. If the speed is 10 or 100 Mbps, default to use half-duplex 2. If the speed is 1,000 Mbps, default to use full-duplex  While autonegotiation works well, these defaults allow for the possibility of a difficult-to-troubleshoot problem called a duplex mismatch
  • 22. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Speed and Duplex Issues  While autonegotiation works well, these defaults allow for the possibility of a difficult-to-troubleshoot problem called a duplex mismatch  In this case both devices could use the same speed, so the devices would consider the link to be up, but one side would use half-duplex, and the other side would use full-duplex Conditions to Create a Duplex Mismatch Between SW1 and SW2
  • 23. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Interface Speed and Duplex Issues  Finding a duplex mismatch can be much more difficult than finding a speed mismatch, because the switch interface will still be in a connected (up/up) state  In this case, the interface works, but it might work poorly, with poor performance, and with symptoms of intermittent problems  The reason is that the device using half-duplex uses CSMA/CD logic, waiting to send when receiving a frame, believing collisions occur when they physically do not—and actually stopping sending a frame because the switch thinks a collision occurred  To identify duplex mismatch problems, check the duplex setting on each end of the link and watch for incrementing collision and late collision counters
  • 24. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Common Layer 1 Problems on Working Interfaces  When the interface reaches the connect (up/up) state, the switch considers the interface to be working.  The switch, of course, tries to use the interface, and at the same time, the switch keeps various interface counters.  These interface counters can help identify problems that can occur even though the interface is in a connect state  Whenever the physical transmission has problems, the receiving device might receive a frame whose bits have changed values. These frames do not pass the error detection logic as implemented in the FCS field in the Ethernet trailer.
  • 25. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Common Layer 1 Problems on Working Interfaces  The receiving device discards the frame and counts it as some kind of input error. Cisco switches list this error as a CRC error. (Cyclic redundancy check [CRC] is a term related to how the FCS math detects an error) Interface Counters for Layer 1 Problems
  • 26. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Common Layer 1 Problems on Working Interfaces  Runts: Frames that did not meet the minimum frame size requirement (64 bytes, including the 18-byte destination MAC, source MAC, Type, and FCS). Can be caused by collisions  Giants: Frames that exceed the maximum frame size requirement (1518 bytes, including the 18-byte destination MAC, source MAC, Type, and FCS)  Input Errors: A total of many counters, including runts, giants, no buffer, CRC, frame, overrun, and ignored counts  CRC: Received frames that did not pass the FCS math; can be caused by collisions  Frame: Received frames that have an illegal format, for example, ending with a partial byte; can be caused by collisions
  • 27. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Common Layer 1 Problems on Working Interfaces  Packets Output: Total number of packets (frames) forwarded out the interface  Output Errors: Total number of packets (frames) that the switch port tried to transmit, but for which some problem occurred  Collisions: Counter of all collisions that occur when the interface is transmitting a frame  Late Collisions: The subset of all collisions that happen after the 64th byte of the frame has been transmitted. (In a properly working Ethernet LAN, collisions should occur within the first 64 bytes; late collisions today often point to a duplex mismatch)
  • 28. Analyzing Switch Interface Status ©2015 Amir Jafari – www.amir-Jafari.com Common Layer 1 Problems on Working Interfaces  If a LAN design follows cabling guidelines, all collisions should occur by the end of the 64th byte of any frame  When a switch has already sent 64 bytes of a frame, and the switch receives a frame on that same interface, the switch senses a collision  In this case, the collision is a late collision, and the switch increments the late collision counter in addition to the usual CSMA/CD actions to send a jam signal, wait a random time, and try again  With a duplex mismatch, the half-duplex interface will likely see the late collisions counter increment
  • 29. Predicting Where Switches Will Forward Frames ©2015 Amir Jafari – www.amir-Jafari.com Predicting the Contents of the MAC Address Table  The output of show mac address-table EXEC command includes some static overhead MAC addresses used by the switch and any statically configured MAC addresses, such as those configured with the port security feature.  The command also lists all dynamically learned MAC addresses  If you want to see only the dynamically learned MAC address table entries, simply use the show mac address-table dynamic EXEC command
  • 30. Predicting Where Switches Will Forward Frames ©2015 Amir Jafari – www.amir-Jafari.com Predicting the Contents of the MAC Address Table Predictions for MAC Table Entries on SW1 and SW2
  • 31. Predicting Where Switches Will Forward Frames ©2015 Amir Jafari – www.amir-Jafari.com Predicting the Contents of the MAC Address Table
  • 32. Predicting Where Switches Will Forward Frames ©2015 Amir Jafari – www.amir-Jafari.com Analyzing the Forwarding Path Summarizes switch forwarding logic including the LAN switching: Step 1. Process functions on the incoming interface, if the interface is currently in an up/up (connected) state: A. If configured, apply port security logic to filter the frame as appropriate B. If the port is an access port, determine the interface’s access VLAN C. If the port is a trunk, determine the frame’s tagged VLAN
  • 33. Predicting Where Switches Will Forward Frames ©2015 Amir Jafari – www.amir-Jafari.com Analyzing the Forwarding Path Step 2. Make a forwarding decision. Look for the frame’s destination MAC address in the MAC address table, but only for entries in the VLAN identified in Step 1. If the destination MAC is... A. Found (unicast), forward the frame out the only interface listed in the matched address table entry. B. Not found (unicast), flood the frame out all other access ports (except the incoming port) in that same VLAN, plus out trunks that have not restricted the VLAN from that trunk C. Broadcast, flood the frame, with the same rules as the previous step
  • 34. Predicting Where Switches Will Forward Frames ©2015 Amir Jafari – www.amir-Jafari.com Port Security and Filtering  Port security allows three violation modes (shutdown, protect, and restrict), but only the default setting of shutdown causes the switch to err-disable the interface  Any MAC addresses associated with a port on which port security is enabled show up as static MAC addresses  The show mac address-table dynamic command does not list MAC addresses off these interfaces on which port security is enabled  The show mac address-table and show mac address-table static commands do list these static MAC addresses
  • 35. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Ensuring That the Right Access Interfaces Are in the Right VLANs Commands That Can Find Access Ports and VLANs  show vlan and show vlan brief commands do not list operational trunks
  • 36. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Access VLANs Not Being Defined  A VLAN can be defined to a switch in two ways: 1. Using the vlan number global configuration command 2. It can be learned from another switch using VTP  show vlan command always lists all VLANs known to the switch, but the show running-config command does not  Switches configured as VTP servers and clients do not list the vlan commands in the running-config nor the startup-config file; on these switches, you must use the show vlan command.  Switches configured to use VTP transparent mode, or that disable VTP, list the vlan configuration commands in the configuration files
  • 37. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Access VLANs Being Disabled  For any existing VLANs, also verify that the VLAN is active  The show vlan command should list one of two VLAN state values, depending on the current state: 1. Active 2. act/lshut  The second of these states means that the VLAN is shutdown. Shutting down a VLAN disables the VLAN on that switch only, so that the switch will not forward frames in that VLAN
  • 38. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Access VLANs Being Disabled
  • 39. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Check the Allowed VLAN List on Both Ends of a Trunk It is possible to configure a different allowed VLAN list on the opposite ends of a VLAN trunk. When mismatched, the trunk cannot pass traffic for that VLAN Mismatched VLAN-Allowed Lists on a Trunk
  • 40. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Check the Allowed VLAN List on Both Ends of a Trunk
  • 41. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Mismatched Trunking Operational States  The most common incorrect configuration—which results in both switches not trunking—is a configuration that uses the switchport mode dynamic auto command on both switches on the link  A different incorrect trunking configuration results in one switch with an operational state of “trunk,” while the other switch has an operational state of “static access”  When this combination of events happens, the interface works a little. The status on each end will be up/up or connected.  Traffic in the native VLAN will actually cross the link successfully. However, traffic in all the rest of the VLANs will not cross the link.
  • 42. Analyzing VLANs and VLAN Trunks ©2015 Amir Jafari – www.amir-Jafari.com Mismatched Trunking Operational States Mismatched Trunking Operational States
  • 43. Troubleshooting Ethernet LANs ©2015 Amir Jafari – www.amir-Jafari.com Command References
  • 44. Troubleshooting Ethernet LANs ©2015 Amir Jafari – www.amir-Jafari.com Command References
  • 45. Troubleshooting Ethernet LANs ©2015 Amir Jafari – www.amir-Jafari.com Command References
  • 46. Troubleshooting Ethernet LANs ©2015 Amir Jafari – www.amir-Jafari.com References 1) Cisco Systems, Inc, www.cisco.com/ 2) Wendell Odom ,”Cisco CCENT/CCNA ICND1 100-101 Official Cert Guide”, Cisco Press, USA, 2013

Editor's Notes

  1. Beginning course details and/or books/materials needed for a class/project.
  2. Beginning course details and/or books/materials needed for a class/project.
  3. Beginning course details and/or books/materials needed for a class/project.
  4. Beginning course details and/or books/materials needed for a class/project.
  5. Beginning course details and/or books/materials needed for a class/project.
  6. Beginning course details and/or books/materials needed for a class/project.
  7. Beginning course details and/or books/materials needed for a class/project.
  8. Beginning course details and/or books/materials needed for a class/project.
  9. Beginning course details and/or books/materials needed for a class/project.
  10. Beginning course details and/or books/materials needed for a class/project.
  11. Beginning course details and/or books/materials needed for a class/project.
  12. Beginning course details and/or books/materials needed for a class/project.
  13. Beginning course details and/or books/materials needed for a class/project.
  14. Beginning course details and/or books/materials needed for a class/project.
  15. Beginning course details and/or books/materials needed for a class/project.
  16. Beginning course details and/or books/materials needed for a class/project.
  17. Beginning course details and/or books/materials needed for a class/project.
  18. Beginning course details and/or books/materials needed for a class/project.
  19. Beginning course details and/or books/materials needed for a class/project.
  20. Beginning course details and/or books/materials needed for a class/project.
  21. Beginning course details and/or books/materials needed for a class/project.
  22. Beginning course details and/or books/materials needed for a class/project.
  23. Beginning course details and/or books/materials needed for a class/project.
  24. Beginning course details and/or books/materials needed for a class/project.
  25. Beginning course details and/or books/materials needed for a class/project.
  26. Beginning course details and/or books/materials needed for a class/project.
  27. Beginning course details and/or books/materials needed for a class/project.
  28. Beginning course details and/or books/materials needed for a class/project.
  29. Beginning course details and/or books/materials needed for a class/project.
  30. Beginning course details and/or books/materials needed for a class/project.
  31. Beginning course details and/or books/materials needed for a class/project.
  32. Beginning course details and/or books/materials needed for a class/project.
  33. Beginning course details and/or books/materials needed for a class/project.
  34. Beginning course details and/or books/materials needed for a class/project.
  35. Beginning course details and/or books/materials needed for a class/project.
  36. Beginning course details and/or books/materials needed for a class/project.
  37. Beginning course details and/or books/materials needed for a class/project.
  38. Beginning course details and/or books/materials needed for a class/project.
  39. Beginning course details and/or books/materials needed for a class/project.
  40. Beginning course details and/or books/materials needed for a class/project.
  41. Beginning course details and/or books/materials needed for a class/project.
  42. Beginning course details and/or books/materials needed for a class/project.
  43. Beginning course details and/or books/materials needed for a class/project.
  44. Beginning course details and/or books/materials needed for a class/project.
  45. Beginning course details and/or books/materials needed for a class/project.