Module 8 Flashcards
(35 cards)
The 1/2 split method
divide & conquer. Divide the circuit or topology in 1/2 & test. This is continued to be done until the problem component is found.
Troubleshooting questions
- How widespread is the issue? (users affected)
- were there any recent changes?
- Are there any problems w/ power?
- What layers are involved?
Troubleshooting Steps
- Don’t Panic
- Get the right resources engaged.
- What was the last thing that changed?
- Get the data that you can.
- Learn when 2 escalate.
- Was this a process problem? How do we avoid this in the future?
Implementation Considerations
- Small Office LAN deployment.
- List of requirements
- Device types & requirements
- Equipment limitation (space growth)
- Compabality Requirements (works w/ other devices/services)
- Wired/Wireless Considerations.
- Security.
Network Operation Center - NOC
a place where network admin monitors & manages the network. Contains systems 2 visualize health of the network in real-time & provides automated alerting at any time. It is the focal point 4 troubleshooting & updating network devices i.e (router, switch, firewall, etc.)
Network Monitoring
- Ping Monitoring
- SNMP Monitoring & Graphing
- Netflow & SFlow
- Server Software ( Solarwinds)
- Syslogs (System logs)
Configuration Management
- Manual Configuration backups via CLI.
2. Automated backups
Authentication, Authorization, Accounting - AAA
Authentication - is user valid
Authorization - what is the user authorized to do
Accounting - keep track of what the user has done.
Terminal Access Controller Access Control System - TACACS
a family of related protocols handling remote authentication and services for network access through a centralized server.
Remote Authentication Dial-in User Service - RADIUS
is a networking protocol, operating on ports 1812 & 1813, that provides centralized AAA management for users who connect and use network services.
System Log
entries made 4 everything that happens on network devices. A log can be stored in a device itself or a logging server.
Syslogging Locations
- Console
- VTY lines
- Logging buffer
- External Syslog Server
Syslogging Severity Levels
0 = Emergency 1 = Alert 2 = Critical 3 = Errors 4 = Warnings 5 = Notification 6 = Informational 7 = Debugging
Debugging
is the process of finding and resolving bugs within computer programs, software, or systems in real-time. Uses “terminal monitor” if telnet/ssh to console & “ debug all” to clear debugs.
Business Continuity
plan 2 ensure an organization has a speedy recovery & can continue 2 operate after a disruption.
Disaster Recovery
a documented process 2 recover & protect a business IT infrastructure in the event of a natural or man-made disaster.
Product Authorization keys
needed 2 claim licenses via Cisco licensing portal.
IPconfig
displays IP @ info of a host. Also use 2 obtain MAC @.
Ping
ICMP responsible for 4 ping, works @ L3.
Traceroute - Tracert
traces out the hop by hop route 2 an IP endpoint.
Pathping
similar 2 tracert includes local hop & exclude latency on 1st trace. Perform statistics on each hop 2 track lost vs sent packets & latency at each hop.
Nslookup
perform a name server lookup using DNS. Can also perform a reverse lookup IP @ to hostname.
Netstat
(-a, -b, -n, -o, -r) displays active L4 TCP /UDP sessions on a host.
Nbstat
windows only display NETBIOS over TCP/IP statistics