Troubleshooting Network issues
Troubleshooting network issues,
in this section,
we're going to discuss how to troubleshoot general
networking issues.
As we go through this section of the course,
we're going to again focus on Domain 5 network troubleshooting
and our final objective,
objective 5.5.
Objective 5.5 states,
that given a scenario,
you must troubleshoot general networking issues.
Now, as we go through this section of the course,
we're going to talk about collisions, and broadcast storms,
and duplicate addresses,
and flooding and switching, and routing loops,
DHCP issues, IP misconfigurations,
VLM misconfigurations, firewall issues, DNS issues,
NTP issues, network performance issues,
low optical link budgets,
certificate issues,
licensed feature issues, BYOD challenges,
and some hardware failures.
But before we cover all those different issues
in this section of the course,
I want to use the rest of this lesson
to discuss a few things you need to consider
during your general network troubleshooting efforts,
including device configuration reviews,
routing tables, interface status,
VLAN assignments,
and your network performance baselines.
First, we have device configuration reviews.
Now previously
we've gone through a standard device configuration
and we reviewed it section by section.
But here, I just wanted to remind you
that whenever you're experiencing a networking issue,
it's always a good idea
to look at your configuration files once more.
Most network devices have two configurations,
a startup configuration and a running configuration.
The startup configuration file is stored in NVRAM,
and it contains the commands needed
to initially configure a router
when it's being booted up.
It also creates the running configuration file
that's going to to be stored in RAM
and used during normal operations.
The running configuration
is the configurations that are actively
being used by the router
at any given time.
Any changes made to the configuration
by a network technician
in the command line interface
is applied first to the running configuration.
But,
if it doesn't saved back to the startup configuration,
those changes will be lost
the next time you reboot the router.
So if everything was working and you rebooted the router
and things stop working,
it may be that you're missing a configuration.
Now if you want to see the startup configuration,
you can enter the command, Show startup-config
at the command line interface.
If you want to see the running configuration,
you're going to enter show running-config
at the command line interface.
Now if you need to save any changes
that you've made to the running config,
to the startup config,
you can do this by entering the command;
copy running-config, startup-config
into the command line interface.
Remember
these three commands work on Cisco devices,
but other network devices use similar commands
to conduct these same types of actions.
Now, next, you need to look at your routing tables.
Anytime data isn't flowing properly in your networks,
it could be a routing issue
to verify your routing tables.
You need to check your routers,
your layer three switches
and any workstations or servers you may have
to view the routes on a network device
like a router or a layer three switch.
You can enter the command Show IP route
from the command line interface.
Now, if you need a view, the routing table
on a Windows, workstation or server,
you can use the command Route print at the command prompt.
If you need to display the routing table on a Linux
Unix or OSX workstation or server,
you can enter the command Route-N at the shell.
Next, you should look at the interface status itself
when there's networking issues going on
to do this, you're going to enter the show interface
or show interfaces command
at the prompt within the command line environment
of your router or switch
again, this is a Cisco specific command,
but similar commands exist for other brands
of network devices.
From this interface status,
we're going to be able to determine all sorts of issues,
such as duplexing issues, DHCP issues, collisions,
and broadcast storms.
Next, we can check the VLAN assignments being used
for our network and our devices,
the VLAN assignments or VLAN tagging
is the practice of segmenting an organizational network
and separating users into respective networks Sections
based on their roles and responsibilities.
Most commonly
VLAN assignments are done using static assignments
based on the ports and the interfaces being used.
Conversely,
you can also set up dynamic VLAN assignments
based on a Mac address of a given client.
And that way, when that client connects,
it will be put into the right VLAN,
regardless of which physical port it's being connected to,
to use dynamic VLAN configurations though,
you need to use a VLAN Membership Policy Server or VMPS.
As well as a client server and database.
Now, remember,
If you're using VLANs,
these will be things that will break up
your broadcast domains
and reduce the chance of a broadcast on from occurring.
But because these VLANs break up broadcast domains,
you need to route traffic from one VLAN to another,
using a router or layer three switch.
If you forget to include a router in your network
architecture
and you're using VLANs,
your traffic is not going to be able to flow
between those VLANs.
So make sure you keep this in mind.
Finally,
you need to ensure that you have
a good network performance baseline
created for your network after you initially configure it
in the simplest terms,
a network performance baseline,
it's just a set of metrics used
in network performance monitoring
to define what the normal working conditions
of this enterprise network infrastructure
are going to look like.
Engineers are going to use network performance baselines
for comparison
to catch changes in traffic that could indicate
there's a problem with your network.
It also lets networks operations personnel
like network technicians,
understand the before and after effects.
Whenever a change is made,
this makes it easier to measure the benefit
and calculate a return on investment
when you're making network changes.
Basically,
if you think there's a problem
and something looks abnormal,
you should consult your network baseline
to see if there really is something that's wrong
or something that's been changed.
And how large of a change has caused
on your performance.
Because if you change one thing by adding a route
and your network performance went down by 50%,
you probably don't want to add that route anymore.
And so you need to look into that closer
again there's lots of places and lots of things
that can go wrong in our networks.
So with all these considerations in mind,
let's jump into this section
on troubleshooting network issues.
Collisions and broadcast storms.
In this video, we're going to discuss collisions
and broadcast storms, how to identify them
and how to overcome them.
First, collisions.
A collision occurs on your network
when something happens to the data
as it's sent through the physical network medium
and it's prevented from reaching its final destination.
Now, most of the time, a collision occurs
when two hosts on the network
are transmitting at the same time
and therefore, their signals get combined
on the network medium and become unreadable.
Now, a collision can occur in both wired
and wireless networks.
If you think back to earlier lessons on ethernet,
you learn how CSMA CD worked
or on wireless networks how we use CSMA CA.
You remember that collisions are possible
on both of these types of networks
and we have to figure out a way to get through them.
Now, to prevent collisions,
you need to architect your networks
with smaller collision domains
because this decreases the chance
of a collision happening.
A collision domain is a network segment
connected by a shared medium or through repeaters
where simultaneous data transmissions can collide
with one another.
Now, if we connect all of our devices to a hub,
all of those devices are going to share
a single collision domain.
Similarly, if we're all connected
to the same wireless access point,
we're all going to be treated as being a part
of the same collision domain.
To break apart those collision domains
into smaller collision domains,
we need to use any layer 2 device,
like a switch or a bridge.
Now, when we replace a hub with a switch,
each switch port becomes its own collision domain
and this completely prevents all the collisions
from occurring on that switch port
between the switch and that client device
if you're connecting it directly to it.
So, how can you detect collisions and why are they so bad?
Well, the first indication
that you might have excessive collisions
is when your network performance starts to go bad.
After all, anytime you have collisions
on an ethernet-based network,
the devices are going to pick a random backoff timer
and then they're going to retransmit.
So, if you have a collision,
it never requires two additional transmissions
to get that data sent back out from the sources
to those destinations.
If you have a lot of collisions,
this causes an exponential decline
in the performance of your networks throughput.
Another way you can more accurately determine
if collisions are occurring on your network,
is to run the show interface command on your network device
and then look at the statistics
for the different switch ports.
Let's take a look at a few examples here.
First, let's look at this example
where we can see the collision counter is increasing.
We expect to see zero collisions,
but as the collisions begin to occur,
the interface statistics are going to start climbing upwards.
If you're using hubs in your network,
you're going to have some collisions occur and that's fine.
This only becomes a problem
when you start to have too many collisions
and your network performance starts to deteriorate.
That said, if you're running a switch base network
and you really should be,
then you shouldn't have collisions occurring
and this would be an indication
that something is not working the way you designed it.
Next, we could also see the deferred counter increasing.
Now, the deferred counter is going to count the number of times
the interface has tried to send a frame,
but, they found the carrier busy at the first attempt.
This is called carrier sensing.
Again, if you're running a switch,
you should not see a deferred counter rising
because nobody should be waiting to transmit.
Now, if you're using a hub based network,
this is going to be a normal part of your network operations
and it shouldn't be a concern.
Next, we have late collisions.
Now, this occurs when a collision is detected
after 5.12 microseconds,
which is the amount of time it takes
for the 512 bit of a frame to be sent.
This is displayed under the late collision counter
in the interface statistics.
A late collision by itself indicates a problem,
but not the root cause.
Instead, the cause is usually an incorrect cable being used,
a bad network interface card
or the use of too many hubs on the network.
Finally, we have excess collisions.
Basically, there is a limit to the number of times
the device can back off from transmitting
and wait when it experiences a collision
to retransmit again.
When the collision occurs,
it's going to choose a backoff timer
and then it tries retransmitting again.
If it detects another collision,
it picks a new backoff timer and tries again.
It'll keep doing this for up to 16 times
but on the 16th time,
it's going to give up and simply just drop that frame.
In this case, it's marked by the interface statistic
as an excessive collision.
Now, if you want to display
the exact number of excessive collisions,
you can enter the command show controller ethernet
on your network platform
and the excessive collision counters will be displayed.
If you're experiencing excessive collisions,
this is going to indicate a problem in the network.
Usually, this is caused by devices
using full duplex communication
over a shared ethernet segment, like a hub
or you have a broken network interface card
or you simply have too many clients
connected to the same collision domain.
To overcome an excessive collision issue,
you should turn off auto negotiation
for the speed and duplex of an interface,
hardcode the speed to a lower setting and change the duplex
to half-duplex instead of full-duplex.
These speed and duplex settings can be configured
on the networking device or on the client itself
within the windows, Linux, Unix,
and OS X operating systems
under the network adapter settings.
Next, we need to talk about broadcast storms.
Now a broadcast storm occurs
when the network system is overwhelmed
by continuous multicast or broadcast traffic.
Broadcast storms are dangerous to your network
because they can quickly overwhelm switches
and other devices as they struggle to keep up
with the flood of packets that's trying to get processed.
When a broadcast storm occurs,
your network performance is going to decrease rapidly
and the worst cases
it can cause a complete denial of service in your network.
Remember, a broadcast packet is addressed at both layer 2
and layer 3.
On layer 2 devices,
the address is FF FF FF FF FF FF.
Now, if it's at layer 3,
you're going to see the IP address used of 255.255.255.255.
Now, a broadcast domain is a logical division
of a computer network in which all of your nodes
can reach each other using the broadcast
at the data link layer, which is layer 2.
Now, a broadcast domain
can be within the same locally or network segment
or it can be bridged
to other local area network segments as well.
Remember, a switch and a layer 2 device
will not break up broadcast domains
because they bridge these things together.
Now instead, you have to reach a router
or a layer 3 switch,
to break up the broadcast domain
into smaller broadcast domains.
In general, there's just a couple of main causes
for broadcast storms occurring in your network.
First, you have a singular broadcast domain
that's just way too large.
In this case, the number of clients will simply create
a broadcast storm
when they're conducting their normal operations.
For example, if you have a large enterprise network
that has numerous switches,
that are interconnecting the network,
this is going to create a really large broadcast domain
because again, switches don't break apart broadcast domains
like a router does.
So, if you have a large broadcast domain setup
using class B private address ranges like 172.16.0.0/16,
you could have up to 65,534 usable IP addresses and hosts
on that one broadcast domain
and that's a really large broadcast domain.
Instead, you should break up that broadcast domain
by subnetting out the class B network into smaller networks
to reduce the number of broadcast being generated
by those clients on the network.
Between each subnet, you're then going to use a router
or a layer 3 switch, to break up those subnets
into separate broadcast domains.
Now our second cause of broadcast storms occur,
we have a large volume of DHCP requests
on a given broadcast domain.
Whenever a new host connects to a broadcast domain,
they attempt to get an IP address assignment
using the DORA process
of discover, offer, request and acknowledge
using the DHCP protocol.
Now, the D or discover part of this process
happens as a broadcast packet because the new network client
doesn't know the location of the DHCP server yet.
So, this can create a storm of broadcast packets
if the network has a lot of clients trying to negotiate
for an IP address all at the same time.
For example, let's say your network device reboots
and all the clients attempt to renegotiate
their DHCP leases.
That can cause a broadcast storm.
If you see a broadcast storm
is being caused by your DHCP configurations,
you need to check if you're using DHCP relays
between your different VLANs.
If you are, you're essentially allowing these VLANs
to be treated as a single broadcast domain
for the purposes of DHCP discovery
and this can lead to broadcast storms
if you have a very large network with a lot of clients.
The third cause of broadcast storms occurring on a network
is going to occur when loops are created
inside of a switching environment.
If you happen to have unmanaged switches
and somebody accidentally cables them together,
this can create an unintentional loop
and this can lead to broadcast storms.
To prevent these, make sure you're enabling BPDUs
or Bridge Protocol Data Units on your managed switches.
Also, you should enforce
a maximum number of MAC addresses per port,
because this will also shut down a port
if a broadcast storm starts to go on through that port.
So, how can you identify if you're having a broadcast storm?
Well, one of the easiest methods
is to look at your packet counters.
If you know your normal baseline for your network
and now you see it rapidly increasing way faster
than you normally do,
this could be an indication of a broadcast storm.
For example, let's say you're running a network
that you're used to seeing about 10,000 packets per second
and now, you're seeing
a hundred thousand packets per second.
This could be indicative of a potential broadcast storm.
In this example, you can see our average broadcast
is around 8,700 packets per second
and we rarely go above 20,000 broadcast packets per second.
So, if I see a spike upwards to a hundred thousand packets
or more per second,
I would know I have a potential broadcast storm on my hands.
Now, another way is to look at your network monitoring tools
and determine the packet loss on your network.
If a broadcast storm starts to occur,
your network devices are going to have a hard time
keeping up with the processing
of all the packets on the network.
And so, packet loss will rise exponentially.
Now, the most definitive way
to identify a broadcast storm though,
is to set up a packet analyzer like Wireshark or TCP dump
and then you start collecting the traffic on the network.
As you look at that traffic,
you're going to look for packets
and see if there's a lot of broadcast packets
that are growing rapidly.
If so, you're suffering from a broadcast storm.
In this example, you see a layer 2 broadcast storm occurring
due to an enormous amount of art broadcast
being conducted in this network.
Now, in this example,
I'm using TCP dump to see all the broadcast traffic
on the network.
To do this, you're going to run the command TCP dump-I
and then your interface,
ether, broadcast and ether multicast.
This'll run TCP dump and only display broadcast
and multicast packets to the screen.
In this example,
you can see there are a lot of AARP requests
that are going on because there's a broadcast storm
that's starting to happen.
Remember, the best way to prevent a broadcast storm
is either set up loop preventions like using BPDUs,
limiting the number of Mac addresses
that can access a given switch port
and breaking up large broadcast domains
into smaller broadcast domains
using routers and multi-layer switches.
Duplicate addresses.
In this video, we're going to discuss duplicate addresses
in our network, specifically duplicate MAC addresses
at layer two and duplicate IP addresses at layer three.
First let's focus on layer two with duplicate MAC addresses.
If you remember a MAC address is a 12 digit number
that's written in hexadecimal format,
and it's used to uniquely identify a network interface card
on a given network.
A MAC address has 48 bits in total length for its address.
The first 24 bits, or six hexadecimal digits,
is going to be assigned based on the hardware manufacturer.
And the second 24 bits, or six hexadecimal digits,
are going to be used to uniquely identify
this particular network interface card on the network.
The MAC address is assigned on the device
when it's manufactured initially,
and this is a hardware or burnt in physical address.
For this reason,
you should not have duplicate MAC addresses on your network,
unless there's an incorrect assignment
made during the production by the manufacturer,
or if somebody in your network
begins to use a self assigned address
known as a locally administered address.
Now, when a self assigned address is being used,
this can often be an indication that MAC spoofing
is being used by a client on your network.
So what's wrong with having duplicate MAC addresses
on the network?
Well, when I think of this problem,
I think back to elementary school in the late eighties
and early nineties.
You see when I was born,
the name Jason was pretty darn common.
This made it a little bit difficult for many of my teachers
because they often had two or three kids
in the class named Jason.
So when the teacher would call out Jason,
there was two or three kids who would respond.
Or if the teacher got a note from Jason's mom,
the teacher then had to figure out which Jason
should get the response
because she didn't know which mom it was.
Now, the same thing happens in our networks.
If you have two or more devices
that respond to data requests
directly from a given MAC address,
this causes a lot of network issues.
Now for example, if you have two devices
using the same Mac address,
your switch might mistake them for each other.
And they might think they're the same device,
and so the switch will keep updating its CAM table
for the location of a single device.
So it goes from port one to port three,
to port one to port three
and repeatedly starts going from one port to the other,
when in reality, there's really two devices there.
Now duplicate MAC addresses
can also cause network conductivity issues
because the switch doesn't know where to send the traffic
destined for that particular MAC address.
Because again, it's switching between two
or three different ports.
Now, luckily MAC addresses are only used
in layer two networks.
So once you reach a router in your network,
the address is going to be converted to an IP address
at layer three,
so the extent of your connectivity issues
is really going to be limited in scope.
Now a more modern challenge that we have
is with virtual machines
and their virtual network interface cards,
because these devices are only a series of ones and zeros,
the virtual network interface cards
have to be assigned a MAC address
by a virtual machines hypervisor.
To ensure you don't end up with duplicate MAC addresses
caused by these virtual machines,
you need to make sure you're using a Logical Domain Manager.
Now, a Logical Domain Manager
is used to listen to multicast messages on the network
and keep track of all the MAC addresses that are being used.
As it does this, it identifies if there's any duplicates
and if it is,
then it will go ahead and reassign MAC addresses
for its virtual machines to prevent duplications.
So how can you determine if there's a duplicate MAC address
operating on your network?
First, you're going to see network conductivity issues
for two machines,
and those machines will have duplicate MAC addresses.
This is caused by the switch
that continually has to go back and forth between two ports
and updating its CAM table
because it sees the same MAC address reporting itself
on two different ports.
This will cause intermittent connectivity
for the two devices
or one of the devices will have great connectivity
and the other one will be completely non-responsive.
Second, you could set up a protocol analyzer like Wireshark
on your network.
Then you can look at the network traffic,
specifically the ARP traffic and see what IP addresses
are being mapped and reported for each MAC address.
If you see the same AMC address being used
by two different machines or two different IP addresses,
this could indicate a duplicate MAC address
is on your network.
To prevent issues on your network
caused by duplicate MAC addresses,
you can enable port security on your devices.
This can be configured to allow a single MAC address
to be configured to one single switch port,
and then it's going to prevent any duplicate MAC addresses
from accessing the network at the same time.
Now, to identify switch boards that are used
for particular MAC address,
you can editor the show ARP command on your switch.
Here's an example of running the show ARP command
on a Cisco switch.
Notice there are two matching MAC addresses in use here,
both with different IP addresses
and different physical interface ports.
One is on fast ethernet 0/3/3/4
and the other is on fast ethernet 0/3/3/5.
This can cause conflicts or frames
that simply aren't going to be delivered to the right devices
on this switch.
Now, once you identify the devices
that are using the duplicate MAC addresses,
you can check those devices locally
to see if there's a hardware manufacturing issue
that assigned the same MAC address to both devices,
or, if this is the case in MAC spoofing,
you want to make sure that you reset the MAC address
back to the burned in physical address
or remove that device from the network completely.
If it's a hardware manufacturing issue,
you're going to need to replace the network interface card
to permanently solve this problem.
Next, let's talk about duplicate IP addresses.
A duplicate IP address is also known
as an IP Address Conflict.
This occurs when another computer on the same network
has an identical IP to another workstation or server
on that same network.
Most often this occurs when you're using static IP address
assignments for your network clients
and you didn't properly account for which IPs
were already used by other devices, or you had a typo.
If you're using DHCP in this happens,
this could be a DHCP server issue
where it didn't properly account
for the IPs it already issued out,
or it could be the case of somebody statically assigning
an IP to their client,
even though the DHCP server has that IP address assigned
as part of its scope.
Now, a third reason this can occur
is if you have a rogue DHCP server on your network,
because that rogue DHCP server could be handing out
the same IP addresses as your official DHCP server,
and this can be happening
from a private class C address IP scope.
Now, if you have duplicate IP addresses
being used by two devices on your network,
this'll cause intermittent connectivity
for both of those clients,
because both of those clients
are requesting network services,
but the routers may not know where to send the traffic
back to 'cause both clients are using the same IP address.
To solve this, you should first check if the client
is dynamically or statically assigned an IP address.
As I said, most commonly, devices can be statically assigned
an IP, and you're going to have a duplicate IP address issue
because somebody typed in the wrong thing.
To check this, go to your network adapter properties
for TCP/IP version four in Windows
and you're going to see,
use the following IP address radio buttons there,
and if that's selected,
that means you're statically assigned.
If your network is supposed to use DHCP,
simply click, obtain an IP address automatically instead
and then save your changes,
and the network interface card will go out
to the DHCP server and get the dynamic assignment
for an IP address that it should use moving forward.
If you want to identify the duplicate IP addresses
on your network though,
you can start by logging into the command line interface
on your router.
In my example, I'm going to use a Cisco router
and I'm going to enter the command show ARP,
just like we did when searching for duplicate MAC addresses.
This time though,
we're focused on IP addresses in that first column.
Here, I see two IP addresses displayed with 10.1.4.2.
The first one is located on interface,
fast ethernet 0/3/3/4
and the second one is on the interface
fast ethernet 0/3/3/5.
Now that we know which interfaces and switch ports
are being used,
we can check the configurations on those individual clients
and we can ensure they're properly assigned statically
or they're configured to receive a dynamic IP address
from our network's DHCP server.
Routing Issues.
In this video, we're going to discuss routing issues
that you may come across in your networks,
including multicast flooding,
asymmetrical routing and missing routes.
Now, first we're going to talk about multicast flooding.
If you remember, multicast networks operate
by sending out group communications
that are addressed to a group
of destination computers simultaneously.
For this to work, the multicast message is sent
to a single multicast address
and then the message can be distributed to the entire group.
This is great most of the time,
but sometimes things can malfunction
and a multicast flood can occur.
Now, multicast flooding happens when no specific host
is associated with the multicast MAC address
inside the CAM table of the switch.
When this occurs, multitask traffic is going to be flooded
throughout the entire local area network or VLAN,
creating unnecessary traffic and wasting network resources.
To prevent this issue, you need to configure your switch
to block unknown multicast packets.
Now, for the exam,
you don't need to know the specific commands
on how to block multicast traffic on a switchboard,
but you do need to know that blocking it
will solve this type of multicast flood issue.
Next, we have asymmetrical routing.
Asymmetrical routing occurs
when network packets leave via one path
and then return via a different path.
This can occur when traffic is flowing
across two different layer two bridge pair interfaces
on a router or a firewall
or when there's flows across different routers
or firewalls in a high availability cluster.
Now, if you're using Load Balancing
and using a protocol like HSRP,
asymmetric routing can occur
and it's something you need to think about.
This is a problem if you're using security devices
and network appliances to perform deep packet inspection
or you're using a stateful firewall,
because these devices need to see
all the packets associated with a given packet flow,
otherwise issues happen.
Now, while modern routers will attempt to forward packets
in a consistent next hop for each packet in the flow,
this only applies in one direction
when they do their forwarding.
Our routers will make no attempt in directing return traffic
to the originating router, because they only want to ensure
the fastest and most efficient delivery of those packets.
Now, this behavior presents problems for our firewalls
and our security appliance clusters,
because they don't support asymmetric routing,
because of the set of cluster nodes
all provide a path to the same networks.
So routers forwarding packets to networks
through the cluster can choose any of the cluster nodes
as their next hop.
And this causes asymmetric routing to occur
and the flow of packets in one direction
goes out a different node than what comes back
in the return path.
Because of this difference in packet flow,
network traffic can be dropped by one
or both of the firewalls in the cluster,
because they aren't seeing all the traffic
from the packet flow.
So how do we solve this problem?
Well, the solution to this is to adjust the placement
of your firewalls and internal routing
so that the traffic will flow in both directions
to the same firewall, even if the incoming traffic
is entering the network through a different router
than the router that handled the matching outgoing traffic.
Essentially, we need to put all our firewalls
closer to the systems they are protecting
instead of at the edge of the network
and this will avoid asymmetric routing problems.
Remember, asymmetric routing
doesn't cause any routing issues necessarily,
but they do cause issues with dropped packet flows,
because our security devices like firewalls
and unified threat management systems
need to be able to see the entire flow.
So you need to consider the design
of your network architecture
to prevent this issue from occurring.
If you don't, then packet flow drops are going to occur
and your clients can experience
network intermittent connectivity.
Finally, we need to talk about missing routes.
Now, missing routes occur
when a router cannot reach a destination
because there's a missing route inside the routing table.
These missing routes can occur
for lots of different reasons,
depending on what routing protocol is being used
to share that routing information.
Now, missing routes are commonly found as an issue
when network administrators are using static routes
and manually adding them to the routing tables.
If the administrator mistypes a route or the command,
the proper route will not get added to the routing table
and this causes problems.
So if you suspect you're missing a route,
you should enter the show IP route command
from the command line interface of your switch
and that'll display the routes available to it.
Now, if you're working on a Windows client or server,
you can enter the route print command
to see the routing table for your system.
If you're using dynamic routing protocols like OSPF or BGP,
there may also be issues where the routers
are not properly establishing their neighbor states
and this can cause the routers to not reach convergence
across their routing tables.
To troubleshoot this kind of issue,
you need to verify the dynamic routing protocols enabled
and if the two routers can communicate with each other.
To verify this, you should run the ping command
from one router to the destination router
and validate that connectivity exists.
If you identify that a route is missing,
you can statically add that route from the command line
or you can work with a network administrator
or network engineer
to troubleshoot the underlying dynamic routing protocols
that are being used by these routers.
Loops
in this lesson, we're going to discuss loops,
specifically switching loops and routing loops.
First we have switching loops.
Switching loops, or bridging loops,
are going to occur whenever there's more than one path
between a source and destination device.
As broadcast packets are set for switching
through every single switch port,
flooding can really occur quickly
when broadcast messages are sent
and then repeated back through another switch port
in this looped architecture.
This will create a broadcast storm for you.
Since our modern networks are built
with additional load balancing and fault tolerance,
there's usually going to be multiple physical connections
between each part of the network.
And so naturally, we would have loops
and switching loops would become inevitable
if we didn't put some protections in place to prevent them.
So, how are you going to prevent them?
Well, to prevent a switching loop,
you have to enable STP, the spanning tree protocol.
To check if STP is enabled and configured on your switch,
you need to use the command, show span tree,
and then hit enter.
For the network plus exam, you do not need to know
how to configure a spanning tree protocol on a switch,
but I'm showing you what it looks like
just for demonstration purposes here.
Now you can see here, the information for this switch
in VLAN0001, which is our default VLAN.
In this example, the route ID
is set with a priority of one at a cost of two.
The bridge ID is set with a priority of 61,441.
As we look at the different interfaces on this switch,
you can see there are two ports
that are designated as the root port
that will forward traffic.
And all the other ports are set as designated ports.
Eth1/11, 1/12, 1/15, and 1/16 are all in a blocking state.
And this is what prevents a loop from occurring
with this switch.
Now the bottom line here, when it comes to switching loops,
is that if you suspect a switching loop,
it's likely an issue with how you configure your STP
and you need to escalate this work
to a network administrator or network engineer
to troubleshoot it, reconfigure it and repair it.
Next, let's talk about routing loops.
A routing loop is formed when an error occurs
in the operation of your routing algorithm.
And this creates a circular route
amongst a group of network devices.
Routing loops are caused by incorrect configurations
of your routing protocols,
where data packets get sent
between different hosts of different networks.
And they get caught in this endless loop,
traveling in a circle between the different network routers
with incorrect route entries.
Routing loops, unlike switching loops
are not caused by physical circular connections,
but instead by the logical layer 3 circular connections
that can exist within your routing tables.
Remember, we want multiple physical connections
between our routers,
because this gives us higher redundancy and fault tolerance.
So our routing protocols have methods in place to protect us
from physical loops causing issues.
Things like weighted connections based on hops
or the speed of those connections.
For example, distance vector routing protocols,
use a Time to Live, or TTL, in the data gram header
of the IP packets.
And this will help us avoid routing loops.
So, if a packet reaches the Time to Live of zero,
it's going to be dropped by the router
and it's not going to be forwarded.
And that effectively ends your routing loop.
Now, another method to prevent routing loops
is known as split-horizon.
If you can figure split-horizon, you're going to ensure
that you have this router configuration
that stops a route from being advertised back
in the direction that it came from.
This split-horizon mechanism ensures that a router
can not send back alert route to the same router
that it learned it from.
To setup split-horizon on a Cisco router, for example,
you're simply going to enter the command ip split-horizon
and hit enter at the command line interface.
If you believe split-horizon has been disabled by accident,
you can look to see if the no ip split-horizon command
was previously issued.
Now, route poisoning is another method we can use
to avoid routing loops inside of our networks.
If a router detects that one of its connected routes
has failed, the router is going to poison
that route by increasing its metric
to an infinitely high number.
This happens automatically inside your routers.
So there really isn't something you have to do or configure,
it'll just happen for you.
Finally, we have hold-down timers.
Hold-down timers are used to prevent bad routes
from being restored and passed
to other routers by accident.
Now hold-down timers are used
with distant vector routing protocols like RIP.
The router is going to be configured,
so that will not advertise or accept any routes
that are in a hold-down state.
This occurs for a set period known as the hold-down period.
By default, the hold-down timer is set at 180 seconds
or three minutes when you're using RIP
as your routing protocol.
It should be configured that way,
automatically, by your router.
As I said, most of the routing loop issues
can be solved by simply using the right routing protocols,
ensuring they're configured properly.
If you're adding a bunch of static routes into your router,
be really careful because this is how most routing loops
are going to be created.
Remember, statically-created routes are given a metric
of 1 by default, making it extremely, highly trusted
by the router.
The only type of route that the router will trust more
than your statically assigned route
is a directly connected route.
Any routes that it learns through OSPF or RIP or BGP
or EIGRP or any other routing protocol
will not overwrite that static route that you created.
So you have to be careful with static routes
in order to prevent a potential routing loop.
DHCP Issues.
In this video, we're going to discuss DHCP issues,
such as rogue DHCP servers and DHCP scope exhaustion.
Now, DHCP, or the Dynamic Host Configuration Protocol,
is a network management protocol
that's used on IP networks for automatically assigning
IP addresses and other communication parameters
to devices that are connected to the network
using a client server architecture.
Basically, DHCP is used to automatically assign
an IP address, a subnet mask, a default gateway,
and a DNS server's IP address
to a client whenever it joins the network.
This works great most of the time,
but if someone adds a rogue DHCP server to your network,
this can cause a ton of issues for you.
Now, a rogue DHCP server is a DHCP server on the network
that is not under your administrative control,
since you are the network administrator.
Remember, rogue DHCP servers can be installed on a network
either as part of a malicious attack
or simply accidentally by your own employees.
In the case of a malicious attack,
the rogue DHCP server could be used
to automatically configure network clients
as they join the network to use a different DHCP server,
one that's controlled by your attacker.
That way, anytime somebody enters google.com
or citibank.com, they're going to be redirected to another site
that's controlled by the attacker
and looks like those sites,
and then, they can conduct an on-path
or man in the middle attack against them.
Now, in the case of an accidental install by an employee,
this normally occurs when somebody connects
a wireless router or wireless gateway to your network
for their own convenience
and they really didn't realize that the device
had a built-in DHCP server contained within it.
In either case, the rogue DHCP server
will begin to hand out IP addresses from its own scope.
Now, this scope may or may not be the same
as your official DHCP servers.
If it isn't, you're not going to see
a lot of network connectivity issues for those clients
that are getting IPS from the rogue DHCP server
if the default gateway is still being handed out correctly.
Now, if the rogue DHCP server is using
the same scope as your DHCP server,
this is where you can have a lot of problems.
For example, let's pretend you're both using
192.168.1.0/24 as your network scope.
This is a traditional one used by small office
and home office networks.
You both then can start to suffer connectivity issues
because two devices can both be assigned
the exact same IP address,
leading to a duplicate IP address.
Now, to prevent a rogue DHCP server
from connecting to your network,
you should configure DHCP snooping on your network.
DHCP snooping is a series of techniques
that are applied to improve the security
of DHCP's infrastructure
by excluding rogue DHCP server traffic
and removing their malicious or malformed DHCP traffic
from the network.
Now, rogue DHCP servers can also be countered
by using port security on your switch ports,
because that rogue DHCP's MAC address
isn't going to be on your authorized list of devices
when they connect to a switch port.
Finally, rogue DHCP servers can also be detected
by properly configuring an intrusion detection system
and once identified, it can be manually removed
from the network by your network administrators.
Next, we have have DHCP scope exhaustion.
Now, DHCP scope exhaustion occurs
when the DHCP server simply runs out of valid IPs
to assign to somebody when they join the network.
For example, let's say again you're using the scope
of 191.168.1.0/24
and that's your private Class C network.
You've reserved 192.168.1.1 for the gateway
and 192.168.1.255 for your broadcast.
Now you have 254 IPs left in your DHCP scope.
Now, as long as you have less than 254 devices
that want to connect you at the same time,
you're not going to suffer DHCP scope exhaustion.
But if you have 500 people that want to connect,
you're going to run out of IP addresses
before everybody gets their own.
Now, many DHCP servers use a default lease time
of 86,400 seconds, which is one day,
but I've seen some organizations set their DHCP leases
to seven days or even 30 days.
Now, this is helpful from a security analyst perspective,
because those clients aren't changing
their IP addresses as often,
and so it's easier to correlate log data,
but these longer lease times can lead
to DHCP scope exhaustion
if you have a lot of transient users.
For example, let's say you're running
the wireless network at a local college.
You have hundreds or thousands of different people
that connect to your network on a daily basis.
One student might have a class
on Monday, Wednesday, and Friday,
and another student might have classes
on Tuesday and Thursday.
If you're using seven-day leases,
the first student would still have their lease
for the entire week, and so would the second student.
Now, we're going to need two leases for these two students.
But if we instead lowered our lease time to 24 hours,
these two students could, in theory,
receive the exact same IP, but not at the same time,
because the lease would expire on the first one
before the second one showed up to class.
Now, another thing you can do
to overcome DHCP scope exhaustion
is to increase the scope size.
For example, instead of providing the 254 IP addresses
by using the network of 192.168.1.0/24,
I can instead change my scope to 172.16.1.0/22.
This gives me 1,022 available IPs
for me to assign to my clients,
which is going to serve all 500 of my students with no problem.
The final thing you can do
is decrease the number of devices
that are using the DHCP server and in turn,
the IP addresses from its scope.
In this case, you're going to want to enable port security
or network access control, NAC,
to enable you to prevent clients from accessing your network
and getting assigned an IP address from your DHCP scope.
IP and VLAN settings.
In this video, we're going to discuss IP and VLAN settings.
First, let's talk about IP settings.
This can occur when you have the incorrect IP address,
subnet mask, gateway or DNS server IP address
assigned to a client
and it will cause issues for you with your IP settings.
Remember from your lessons on DHCP,
we talked about the fact that every network client
needs four key pieces of information
in order to communicate properly on the network.
This is their IP address, their subnet mask,
the IP of their default gateway
and the IP of their DNS server.
Now let's take a look at a static assignment
on this OSX client.
Notice here, we have three key pieces of information shown.
The IP address, the subnet mask
and the router or default gateway.
The DNS server IP is on a different tab,
and it really doesn't matter for this example,
as long as we don't need to conduct name resolutions.
So, you were called to troubleshoot this client
because they can't access the internet.
Let's assume you already tried to ping the server
at 8.8.8.8 and it failed.
So, you know you have some kind of a routing issue here.
What could the problem be?
Now, I want you to go ahead and pause the video here
and look at it and see if you can figure out the issue.
All right, I'm going to count to five.
One, two, three, four, five.
All right, you're back?
Did you figure out the issue?
In this case,
the issue is that we have the wrong default gateway.
Notice the IP address is 192.168.1.200,
and it has a subnet mask of 255.255.255.0.
With this subnet mask,
the default gateway would have to be an IP
of 192.168.1 dot something
because it's in this 192.168.1.0/24 network
for us to be able to reach it.
Now, if the default gateway
is set 10.0.1.1 and this is truly the IP of my router,
then I have an incorrect IP address.
Because again, my subnet mask of 255.255.255.0,
if applied to the router's IP address of 10.0.1.1
would tell me I need to have something
in the network of 10.0.1.0/24.
So to get this client to connect to the internet
and have its traffic properly routed,
I need to change either the default gateway to 192.168.1.1
or change the IP address to 10.0.1.200
or something like that.
All right, let's take a look at another example.
This one comes from a Windows client.
Just like our last example,
this client cannot ping 8.8.8.8 successfully.
So you see the client has a statically assigned IP address
of 192.168.1.200.
Its subnet mask is 255.255.255.128
and the default gateway here is 192.168.1.1.
All right, go ahead and pause the video.
I want to see if you can identify the issue
and think about how you're going to fix
this client's network connectivity issues.
Pause the video and come back
in one, two, three, four, five.
All right, you're back?
Did you figure this one out?
Let's take a closer look at that subnet mask.
Notice it wasn't a class full class C of 255.255.255.0
So this isn't the 192.168.1.0/24 network
and it doesn't have 254 usable IP addresses.
Instead we have a subnet mask of 255.255.255.128.
This gives us a /25 network using CIDR notation.
That means we only have 126 usable IP addresses.
So if our gateway is 192.168.1.1,
and we have a subnet mask of 255.255.255.128,
then our network ID is 192.168.1.0
And our broadcast is going to be 192.168.1.127.
Everything between those two ranges
is going to be usable IPs.
But our client was assigned 192.168.1.200.
And that means it's assigned into a range
that's in another network.
So that IP address and gateway aren't on the same sub-net.
This would explain why we can't route our traffic
to the network because we can't reach our default gateway.
This is going to be a problem for us.
So our solution would be to change our IP address
to something on the same sub-net as that default gateway,
like 192.168.1.100
or we could see if there's a gateway
on the same sub-net as our client.
This means we need a gateway
with an IP address of 192.168.1.129
or something between there and 192.168.1.254,
because our network ID will be 192.168.1.128.
and the broadcast will be 192.168.1.255
if we're using the subnet mask for a /25 network
of 255.255.255.128.
All right, now, if you're going to connect to a website
by its domain name and that isn't working,
we need to look at the DNS IP server configuration.
In this case, you'd want to ensure
you have a working DNS server
and the IP has been properly entered on the client.
If you don't have your own DNS server,
you can always set your DNS server's IP to 8.8.8.8
which is the public DNS server hosted by Google.
So here you could see the DNS server
is set to 192.168.1.1 as the primary
and 192.168.1.2 as the secondary.
This is fine as long as the DNS servers there
are running on those IP addresses.
Now, if you don't have DNS servers,
then you want to reconfigure those to the public DNS servers
at 8.8.8.8 and 8.8.4.4,
both of those are Google's DNS servers.
Next let's talk about VLAN settings.
Remember when it comes to VLANs
you need to route the traffic between the VLANs
otherwise your devices aren't going to be able to communicate.
So let's pretend I have two VLANs,
one called IT and one called HR,
even though both IT and HR
are connected to switch one and switch two physically,
they can't communicate with each other
until I route traffic between them using a router.
Also, if you're going to have devices in the same VLAN
they need to be in the same logical sub-net.
So in this example,
all of my clients are part of the IT VLAN,
and they should be using the same sub-net of 192.168.1.0/24.
And all of my HR VLAN clients should use their own sub-net
something like 192.168.2.0/ 24.
So let's take a look at this
using a basic network logical diagram.
Here, we see one IT client and one HR client.
Each one is assigned an IP address in a /24 network.
The IT client is assigned to the IT sub-net
of 192.168.1.0/24 in VLAN 100.
And the HR client is going to be assigned
to 192.168.2.0/24 as it's network in VLAN 200.
To simplify this topology,
I left out all the other IT and HR clients,
but there could be 50 or 60 of these
connected there as well, either to switch one or two.
It really doesn't matter for our purposes,
as long as they're configured into the proper VLAN.
Now, as this is a logical diagram
and how we see it set up here,
the IT client cannot communicate to the HR client
and neither of those clients
can communicate with the internet.
Why is that?
All right, I want you to pause the video here
and I'm going to count to five
and I want you to come back and give me the answer.
One, two, three, four, five.
All right, you're back?
Did you figure out the issue?
Well, this issue is all going to come down to the fact
that there are no gateways
for the IT or HR clients to communicate with.
Notice in this logical topology, we only have one router
and that router has an interface IP of 10.0.0.1
in the 10.0.0.0/24 network.
This means it's the default VLAN, VLAN 1
and its network isn't on the same logical network
as either the IT or HR VLANs.
So for us to allow the IT and HR clients to communicate,
they're going to need a place to route traffic
between switch one and switch two.
Then to allow both of them to communicate with the internet,
we need to connect them to a new router
that's connected to the internet as well.
Now our easiest and cheapest solution in this case
would be to remove the connection
between switch one and switch two.
Then we can connect switch one to router one
and assign it a new interface
on an IP address in the IT VLAN.
We could also connect switch two directly to router one
and assign it an interface with the HR VLAN.
Now we can use router one to route traffic between VLAN 100,
the IT VLAN and VLAN 200, the HR VLAN.
And we can route both of those VLANs out to the internet,
going through router one as well.
So remember, if you start having devices
that can't communicate with each other,
like one of the IT clients can't communicate
with one of the HR clients,
it could be an improper VLAN configuration.
Make sure you check your configuration
and that there's a proper routing setup
between the different VLANs
because the number one cause of issues
when you're dealing with VLANs that won't communicate
is people aren't routing the traffic right.
Another common mistake people make when dealing with VLANs
is simply that they don't use them.
Now, if you don't use VLANs
all of your traffic will end up in the default VLAN, VLAN 1.
When this occurs,
you're going to have a really large single broadcast domain.
For example,
if you have a server that's operating in VLAN 1 ,
the default VLAN,
it can experience slow load times
because there's too many devices located inside VLAN 1
and the number of broadcasts
are going to slow down the entire VLAN.
Instead, this server, which currently has an untagged port,
and therefore it's assigned to VLAN 1 by default,
should be added to the server VLAN with the other servers.
This will segregate them from all the other client villains
and increase their speed dramatically.
Firewall issues, in this video,
we're going to discuss firewall issues
and how to troubleshoot network issues
involving incorrect firewall settings
and block services, ports or addresses.
First, let's talk about the purpose of a firewall.
Remember firewalls or network security devices
that moderate and filter
incoming and outgoing network traffic
based upon established rule sets.
Essentially firewalls act as an inspection point and barrier
between a private internal network and the public internet
or other private internal networks,
if you're using screen subnets,
Now, firewalls can exist as either host-based firewalls
or network-based firewalls.
A host-based firewall is a piece of software
that runs on an individual computer or device
that's connected to your network
and performs the functions of a firewall
to protect that one single device.
For example, if you're running a windows, client or server,
you can utilize the built-in windows defender firewall
to go dock to host based,
two-way network traffic filtering and inspection,
as well as blocking unauthorized network traffic
from flowing into or out of your device.
A network-based firewall is a network security device
that's deployed inline with the network traffic flow,
just before the border or gateway router
in order to monitor and filter incoming
and outgoing network traffic
based upon your established rule sets.
In general, regardless of whether the issue resides on a
host-based firewall or a network-based firewall,
the network connectivity issues experience
will be caused by one of three different situations.
First, access to protected resources
from unprotected networks, isn't working.
Second, access to unprotected resources
from protected networks, isn't working.
Or third, access to the firewall
and its configurations, isn't working.
Basically the problems can be broken down
into either traffic is not going through the firewall
or traffic is not going to the firewall,
and in either case it's not working properly.
So to troubleshoot these issues,
you should use your seven-step troubleshooting method
and understand the OSI model to troubleshoot each layer
from layer one physical all the way up
until you identify the issues.
Now, for example, is the firewall properly cabled
into the network at the right position?
If so, does the link lights on the network interface card
show up that the link is established
between the router and the firewall?
If it does layer, one is probably not your issue.
Next, we go to layer two,
and we determine if the router and firewall
are communicating using AARP and their Mac addresses.
If they are, we're going to move up to layer three
and determine if the firewall has a valid IP address,
subnet mask and default gateway.
And that way it can communicate properly on the network.
Once we've done all that we can now inspect the firewall
itself for issues.
Usually when traffic isn't flowing to
or through the firewall,
the issue is going to be related to a misconfigured rule set
as part of your access control list or ACL.
Now the access control list
is simply a collection of permit and deny conditions,
which we call rules.
And they're going to provide security
by blocking unauthorized users
and allowing authorized users to access specific resources.
To inspect the firewall rules on a network based firewall,
you're going to use the command show access dash lists
to display the contents of the current access control list
on a Cisco device, as an example.
Each device is going to have a different command,
but for Cisco it's show access lists.
Now, let's say for example, you're trying to figure out
why the network clients and the internet filter group
are not able to access Google, Facebook
or Dion training's websites.
You might log into your firewall or router
and check the current ACL restrictions.
In this example,
you can see there's a deny statement in line 20
for the internet filter group.
And it states that all TCP network traffic
from any IP to any IP over any port
should be blocked by this rule.
Basically, any clients have been added
to the internet filter group
will be unable to connect to any websites
because they're using TCP to connect a report 80
or port 443, when they're trying to go to a website.
Similarly, if we have a client in the one-on-one group
and it's having timing issues,
we could look at our ACL and see what the root causes
looking at line 10 within the one-to-one access control list
states to deny any UDP traffic
from any IP to any IP that uses NTP,
which is port 123 and use for the network time protocol.
The problem here is that NTP operates using UDP traffic.
So the single line in the ACL
will break all MTP functionality
for any devices assigned to group 101.
So when you're writing or editing an ACL rule,
always be careful to think through
what you're intending to do with that rule.
First, you need to ensure there's no typos in your rules
because this will cause a lot of issues,
they'll result in traffic being blocked.
When it really shouldn't be.
Second, verify the protocol important numbers
that you're referencing in your rule
and ensure they're correct.
Do you really want to block TCP or UDP?
Make that decision?
You want to block a specific port or all ports?
All of this is important to consider.
Third, verify the source and destination addresses
are referenced by the rule.
Did you include the correct IP address or network IP
and the correct subnet mask?
A simple typo like 0.0.255.255 instead of 0.0.0.255
is going to cost 65,636 IPs to be blocked.
Instead of the 256 IPS, you were intending to block.
Fourth, verify the order of the rules
is being applied correctly.
Remember ACL's are always processing order
from the top of the list to the bottom of the list.
Your most specific rules need to be first
and your motion rules need to be at the end.
Let's consider this example and see if we can determine
why a network client can't connect to Google servers
at 8.8.8.8 from within the Dion training group of clients.
Now, first, we're going to pull up the access control list
and look for the Dion training group rules.
Under these rules,
we look under the rules pertaining to this issue.
In this case,
we can't reach the server located at 8.8.8.8.
So if we look at rule 20,
we're going to see there's a permit rule for all TCP traffic
going from any IP, going to the server at 8.8.8.8,
if it's over port 80, which is used for web traffic.
So based on this rule loan,
the traffic should be able to reach the server.
Now, let's see what other rules we have
for servers at 8.8.8.8.
Now we have one rule at line 40,
and it again says to permit traffic over TCP
from any IP to the server at 8.8.8.8 using port 25.
So we're going to allow email traffic over SMTP
to be sent from any of our clients
to the server at 8.8.8.8
Again, this seems fine, and we shouldn't have an issue.
Now, remember, ACL rules are implied in order,
and once it finds a matching rule,
it's going to stop as it goes down the access list.
So look at it from the beginning.
The first rule is line 10.
It says to deny any TCP traffic
from any IP address to any IP address.
And this applies to all ports because none were specified.
So if I'm trying to visit the server at 8.8.8.8,
will rule 10 match this packet?
Is it going to go from any IP to any IP using TCP?
Yes, yes it is.
Therefore the traffic is going to be blocked
and it will never get to rule 20 or rule 40
that specifically allow traffic to this server
at 8.8.8.8 over port 80 or port 25.
So instead we can change the order of this ACL
and we're going to put the more specific lines
like 20 and 40 at the top.
So we're going to make them 10 and 20 respectfully.
Then we're going to take the current line 10
and move it to the bottom of our list.
So to make this easier to see I'm creating a new group here
called Dion training new at the bottom of this ACL.
Here, you can see the difference in the order
from Dion training group to the Dion training new group.
So notice I now have our most specific ACL
listed at 10 and 20 and a more generic one at line 30,
which is for the any IP to any IP, but for a specific port.
Then I have my most generic rules at the bottom,
lines, 40 and 50.
This is going to block all traffic for UDP
and all traffic for TCP.
Remember when you're troubleshooting issues with firewalls,
always check your ACL's
to ensure they're in the right sequence
and that you haven't missed typed anything in them
because this can lead to a lot of connectivity issues
and the wrong traffic being blocked
or being allowed through your firewall.
Similarly, when you're dealing with software firewalls,
like the windows defender firewall,
it's important to look not just at the IP addresses
and ports that are being blocked,
but also you need to look at the
applications and services themselves.
Under your windows defender firewall,
you're going to see inbound rules and outbound rules listed.
Under each type,
you're going to see the name of the application or service
and whether it's allowed or denied.
Then you're going to see if any specific IP addresses reports
are being allowed or blocked
with those applications and services.
Just like in the earlier examples with network firewalls,
a simple typo here can cause a lot of connectivity problems
for your clients and your servers.
So always double check your ACL's
to ensure they're blocking and allowing
exactly what you want them to do and in the right order.
DNS and NTP Issues.
In this video, we're going to discuss how to troubleshoot DNS
and NTP issues.
First let's focus on DNS.
Remember, DNS is used to match the domain names
with the corresponding IP addresses
that are used by a server.
This allows us to use memorable domain names
while our computers can access the information
using those IP addresses.
If your network clients
are unable to resolve their domain names to IP addresses
such as figuring out that diontraining.com
is supposed to point to 45.79.184.180, for example,
then you most likely have a DNS issue.
So first you needed to determine
if the issue is occurring on a single network client,
or is it a larger wide-scale DNS issue
on your network?
If it's only affecting one client,
then it's most likely going to be an issue
with that client's TCP/IP settings.
By running the IP, ifconfig or ip commands,
you can determine the IP address of the assigned DNS server.
Once you have that IP,
you should verify connectivity between your client
and that DNS server.
If there's no connectivity between them,
then you need to troubleshoot the connection at layer one
layer two, or layer three of the OSI model
to fix this DNS issue,
because your client simply can't reach the DNS server.
If your client can reach the DNS server,
but there's still a DNS issue,
then you need to either flush the DNS cache on the client
or change the configuration to allow the client
to use a different DNS server.
Something like Google's DNS servers
located at 8.8.8.8 and 8.8.4.4.
On the other hand,
if a client doesn't seem to be having an issue
with their configuration,
it may be your DNS server itself
is not properly responding.
In this case, you're going to troubleshoot your DNS server.
Now, this is usually going to be an issue
specifically for people who run their own websites
and control their own DNS records.
In these cases,
you need to verify that your A records
and your CNAME records were properly created.
With an A record,
you need to ensure the domain name is typed in properly,
and the IP address has been entered correctly.
A simple typo on either of these two parts of the A record
will cause users to not be able to locate your servers
and they won't be able to access them
using your domain name.
For your CNAME or Canonical Name records,
you need to ensure that the domain name used
as the source and destination are both spelled properly,
otherwise, you can be redirecting users to the wrong server
or to someplace that doesn't exist.
To verify your ANAME and CNAME records,
you can use the nslookup command.
Another common issue at DNS records
is the Time to Live
or TTL might be set incorrectly.
If the Time to Live is set too high,
the old DNS records will remain cached
until the Time to Live expires.
So if you have a Time to Live of 86,400 seconds,
your DNS server records won't expire
or be refreshed by DNS cache
until at least one day has elapsed.
In general, I like to keep my Time to Live
on my DNS server records at a pretty short interval,
something like 300 seconds,
which is about five minutes.
This avoids any caching issues
if I'm making frequent changes to my networks
or my websites.
Now another issue with DNS that occurs
is one of high latency.
If your DNS records are hosted far away from your users,
that's going to take more time and more delay
for them to access those records
when they're looking up a particular domain.
This is known as DNS Latency.
To reduce DNS latency
and improve the overall network performance for your users,
you should use DNS servers
that are located closer to your users,
such as one that you host yourself
within your DMZ or screened subnet,
or one hosted by your internet service provider directly.
Next, we're going to discuss NTP
or the Network Time Protocol.
And there's some issues around this as well.
Remember, NTP is a protocol
that allows the synchronization of system clocks
between different layers of a hierarchal,
semi-layered system of time sources.
This is important
because many of our distributed applications,
such as network authentication,
they're going to rely on proper synchronization of time
between your client and a server,
and our networks use NTP to do all of that.
In general, issues with NTP
are caused by the NTP packets not being received.
NTP packets may not be processed,
or the NTP packets have errors or packet loss.
If the NTP packets are not being received,
this needs to be troubleshot
to determine the root cause.
You need to begin at the physical layer
and ensure your clients and servers are properly connected
and cabled to your network.
Then if the NTP server is on your Local Area Network,
you need to verify it's communicating
between the client and the server
using their MAC addresses properly.
If the NTP servers located outside the Local Area Network,
you need to verify that the client can communicate
to that server using layer three IP addresses
for that server.
Now in general, if NTP packets are not being received,
this is more of a general network communication issue
at layer one, layer two, layer three,
or possibly a DNS server issue,
if you're referring to that NTP server
using its domain name and not its IP address.
Now, if the NTP packets are being received,
but they're not being processed properly,
you need to look at the network client or the NTP server
to ensure they're operating the NTP service
to read and process those NTP packets
that are being sent and received by these devices.
If the NTP process or service
doesn't act on the NTP packets being received,
there's going to be network communication issues
with other services, things like HTTPS
and network authentication processes.
Now, if the NTP packets are processed,
but there's errors or packet loss in them,
there's going to be a loss of time synchronization
that can occur.
The loss of synchronization might occur
if dispersion or delayed value for server goes really high.
High values indicate that packets are taking way too long
to get to the client from the server
in reference to the root of the clock.
So the local machine cannot trust the accuracy of the time
present in the packet
because it doesn't know how long
it took the packet to get there.
If there's a saturated link
or buffering is occurring along the way,
the packets can get delayed
as they come to the NTP client.
Now, the timestamp contained within a subsequent NTP packet
can occasionally vary a lot
and the local client cannot really adjust for that variance.
So if you're seeing errors
or lost packets with NTP,
that's going to cause a lot of loss of synchronization for you.
And you need to ensure that there's no saturation
in your network connections
and that your network connectivity is adequate
to be able to send the NTP packets in a timely manner.
Network performance issues.
In this video, we're going to discuss
how to troubleshoot network performance issues
that you may experience out in the field.
Now the five most common causes
of network performance issues
are high CPU usage in a network device,
high bandwidth usage in a network,
poor physical connectivity,
malfunctioning of your network or DNS problems.
First, it's important to realize that every network device
such as your routers, switches and firewalls
are at their core, a computer.
That includes a CPU or central processing unit.
If that device begins to experience
a high CPU utilization rate,
that device is going to start slowing down and in turn,
the network that is being processed for all those packets
is also going to slow down.
So whenever a CPU is overutilized,
the latency, jitter and packet loss will start to increase
and this can cause the entire network performance
to deteriorate on you.
So to solve this issue, you need to either
upgrade your network devices to more powerful ones
such as enterprise class routers and firewalls
or you need to simplify the processing load
that you're putting on those devices.
For example, I once saw an enterprise network
where their border firewall
was slowing down the entire network.
Now when we looked at it closer,
we saw their access list had over 3,000 entries in it.
That meant that every time a packet was received,
it was checked against these 3,000 individual entries
to find its match or to eventually block that packet.
Now this consumes a lot of processing time
and leads to high CPU utilization rates.
Now we conducted an ACO review
and we were able to simplify their rule set
down to about 300 rules.
This drastically reduced the CPU utilization rate they had
and sped up the network.
Second, high bandwidth utilization
is another cause of network performance deterioration.
Now when bandwidth utilization is high,
network communications have to wait
to enter or leave that network.
This can cause buffers to fill up
and in the worst cases, packets can be dropped.
Now when those packets are dropped,
they're going to be retransmitted if they were sent using TCP.
And this leads again,
to even higher bandwidth utilization rates
because we have retransmissions.
To solve this issue,
you can either increase your bandwidth size
by paying more to your internet service provider
or you can do a network flow analysis
and determine what sites and traffic types
are being used by all of your clients.
For example, if 90% of your traffic is being wasted
by people scrolling Facebook each day,
you may need to change your acceptable use policy
or reduce or eliminate
when people are allowed to use Facebook on your network.
Literally, I had one network where 90% of our traffic
was either going to or coming from Facebook
and our end users kept complaining
because they couldn't do any real work on their job
because our internet was so slow.
And this is why conducting a NetFlow analysis
can really help you understand
what your users are really doing on your network
and is it something you want to allow.
Third, you may have network performance issues
if you have a poor physical connection.
To solve this, you're going to need to check your cables
and test them one by one.
Now if you suspect it's an issue
with the internet search provider's portion of the network,
you need to connect a test client
directly to the demarcation point
and test the connection from there.
If that connection is poor,
then you know it's your ISP's problem to solve.
If it isn't, that means it's something in your network
that's the problem and you need to start testing every cable
from the from the demarc point
all the way back to your border router
and then to your switch and then to your client
until you find where that broken or damaged cable might be
that's causing the slowdown in your network connection.
Remember, a damaged cable may still operate,
but it's going to cause additional errors
and these errors require data
to be retransmitted over and over again
and this slows down your overall network performance.
To test your cables, always use a cable tester
for twisted pair connections
or a fiber light meter for fiber optic connections.
Fourth, we have malfunctioning of our network.
Now if you have misconfigurations of your devices
or hardware failures,
your network performance is obviously going to suffer.
Sometimes this can even be caused
by using old or outdated network operating systems.
Again, this is an area
where your seven step troubleshooting method
is going to help you identify the exact location
of the device that's having these issues
and then you can focus on whether it's a configuration issue
or a hardware failure issue
that's causing those network performance issues.
Finally, fifth, we have DNS problems in our network.
Now we already talked specifically about DNS issues
in a separate lesson,
but DNS issues are a serious cause
of a lot of our network performance issues.
Remember, if you have a high DNS latency,
this is going to slow down the overall user experience
because when that user requests a website,
they first have to go and resolve that domain name
all the way out to that DNS server
and get the IP address over DNS.
Other issues.
In this video we're going to discuss some other issues
you may need to troubleshoot.
Things like low optical link budgets, certificate issues,
license feature issues, BYOD challenges
and hardware failures.
First, let's talk about low optical link budgets.
And what exactly is an optical link budget?
Now an optical link budget is a calculation that considers
all the anticipated losses along the length
of a fiber optic connection.
This is important to understand.
Because the light signal that's going across
that fiber optic cable will lose signal strength
as it travels down this cable.
Now this occurs naturally due to the distance of the cable,
as well as from losses due to multiplexing,
benzing your cable, imperfect connections, patches
or splices that happen along the fiber optic cable.
If you experience a low optical link budget,
your fiber connection will experience issues
such as reduced transmission efficiency,
slower connection speeds
or even downtime on that connection.
To measure the condition of your fiber optic connection,
you're going to use an optical time domain reflectometer
to measure the amount of losses or reflections
that are occurring in the connection.
This reading from the optical time domain reflectometer
is going to be reported in decibels per kilometer.
And this indicates how much attenuation and degradation
is occurring over the length of that connection.
Normally, you should experience 0.25 decibels per kilometer
for a standard fiber optic cable.
But if you experience a higher rate than this,
then you may have a low optical link budget.
To calculate your link budget.
You simply take the receiver's power budget or how much
initial signal you're going to be transmitting out,
and then you subtract any multiplexing and demultiplexing
losses as well as losses from the fiber itself
that's caused by those distances and the imperfections.
And any losses from the connectors or patch panels
that are being used as well.
Now, this will give you the total optical link budget.
For example, let's say I designed a fiber optic circuit
with a receiver that can sense light received between
negative seven decibels and negative 23 decibels.
And I send the signal out at positive five decibels.
Now, if I only have a loss of 20 decibels
due to the distance, the connectors
and a splice in that cable.
The is going to be able to pick up that signal
because I still have negative 15 decibels of light signal
being received at that distant end.
And negative 15 is in between negative seven
and negative 23.
On the other hand, if the fiber connection was broken
and somebody went to repair it by splicing that connection,
maybe they did a really bad job of it.
And adds an extra 25 decibels of signal loss.
Now I'm going to transmit at the same five decibels
that I was before.
But I'm losing 15 decibels for distance
in that first splice.
And now because of this poor second splice,
I'm losing another 25 decibels.
This brings my total value on the receiving end
to negative 35 decibels.
And that means the receiver can't pick up that signal
because it can only sense the signals between negative seven
and negative 23 decibels.
And negative 35 is far too weak for the receiver to see it.
Now, we're going to have a broken fiber link essentially,
because we have a low optical link budget level.
So, what can we do to fix this?
Well, we can either increase the power of the transmitter
to say plus 20 decibels instead of plus five decibels.
Or we can have somebody go back and try to do a better job
of splicing that cable.
Now, this isn't a very realistic example
because most professional splices will only cause a loss
of 0.1 or 0.2 decibels.
But hopefully you're getting the idea of how low optical
link budget can work and negatively affect
your fiber networks.
Next, we have certificate issues
that can cause network issues for us as well.
A digital certificate is used as a credential
to facilitate the verification of identities
between users inside of a transaction.
For example, when you attempt to connect
to an e-commerce site over HTTPS,
your network client uses digital certificates
to validate the server's identity and decide
if it can really trust that server when sending sensitive
information over to it.
The most common certificate issues are going to occur
on a websites SSL or TLS certificate
when it's displaying as untrusted.
Now, this occurs for one of three reasons.
It can be that the digital certificate is not signed
by a trusted certificate authority,
the certificate itself has already expired
or the server didn't have a certificate associated
with a trusted route certificate.
Now, regardless of which of these three things is happening,
the end result is going to be the same.
Your client's browser is not going to show a secure
connection over HTTPS because it's web browser
and the server are not communicating over a secure tunnel.
Now, in either of these cases,
you can't solve the issue for your network clients
because you don't own that web server.
But if you were the one who owned that web server,
then it becomes your problem to fix.
Now in this case, you need to purchase a digital certificate
from a trusted certificate authority and install it.
Or you need to renew your expired digital certificate.
Or you need to install a certificate from a trusted
certificate authority with a valid route certificate
on your server.
In addition to using digital certificates with HTTPS
websites,
we also can use digital certificates inside of our networks
for network authentication using 802.1X with EAP.
In these cases, your security team's going to run
your organizations own certificate authority
to create these digital certificates and issue them
to the network clients and the servers.
Again,
if you're having issues with these digital certificates,
you need to ensure they're trusted, that they're not expired
and that they're installed properly on the network devices
and the network clients.
Next, we need to talk about licensed feature issues
that could arise in your networks.
Sometimes when troubleshooting issues in your network,
you may come across an error message such as error,
feature not licensed.
Now as you can see in this example
from a NetScaler VPX appliance,
there are many different features that are enabled
or disabled based upon the license has been purchased
by this organization.
For example, the license they have purchased will allow them
to do load balancing and content switching.
But it does not support global server load balancing
or clustering.
This is a different feature set that requires a different
and more expensive license.
Now if you get an error concerning a particular license
feature in this or another network device,
you first need to determine what license
you have loaded on that device.
Then compare the license you loaded
with the features it unlocks.
If the license is unlocking the features you expected,
you may need to contact the manufacturer to troubleshoot
the issue.
But you may realize you simply purchase the wrong license
for the features that you need.
And in this case,
you need to work with your organization's purchasing agents
and their contracting professionals to get the right license
procured so you can load it up into the device.
Now this is a common issue in large bureaucratic
organizations where the people who use the things
and install the devices are not the same ones
who are empowered to make purchasing decisions.
As a young network administrator.
I remember submitting the requisition forms
to my organization for all the licenses I needed.
I specified that I needed the platinum license.
And the contracting person decided, you know what,
the gold license would be just fine
because it costs 35% less.
Well, guess what?
That contracting person didn't know that a gold license
didn't include the three critical features
that we actually needed.
And those features were the whole reason we were buying
this particular network appliance.
So, when we received the license key
and we tried to load it up on the network appliance,
we kept getting the feature not licensed error message.
And it took us almost two days to figure out
that the reason was our organization gave us a gold license
and not a platinum license that we really needed.
So learn from our mistake.
Make sure you tell the contract personnel
that substitutions are simply not allowed.
You need this level of license or just won't work
for the features you need.
Next let's discuss BYOD challenges
or bring your own device challenges.
Now I don't want to specifically focus on security
challenges associated with BYOB policies.
Because we've already talked about that in other videos.
Instead, I really want to focus on the networking issues
that you may come across when you're trying to support
a BYOB policy inside your organization.
Now BYOD or bring your own device is this policy
that allows your end users to bring their own smartphones,
tablets, laptops and other technical devices into work
and use them on your organization's network.
Now BYOB allows the organization to save money
by not having to purchase all these devices
for the employees.
But instead they're relying on the employees
to bring their own equipment and their own devices
and then do the business on those devices
using your organization's network.
Now the biggest challenge with BYOD
besides securing these devices,
is actually supporting these devices.
When a user brings their own device,
you're no longer supporting one or two models of laptops,
but instead you've got 50 or 100
or 200 different varieties now.
Your employees may bring a Windows 10 Home Edition laptop
or a MacBook Air or a Chromebook.
And guess what,
you're going to be expected to support all of them.
This is a massive headache and a huge challenge
for support personnel,
like our service desk and our network technicians.
Now, when a device doesn't work properly
like we want to expect it to,
we have to determine is it the device
or is it some software the user loaded
or is it a network issue that we need to solve?
This makes it very challenging.
Honestly, well many organizations think that implementing
a BYOB policy can save them a lot of money
because they'll have a reduced capital expenditure
or CapEx costs.
It really just increases your OPEX
or operational expenditures because now you're wasting
so much time on labor hours to support and troubleshoot
all these different devices.
Another challenge with supporting these devices is ensuring
the security of your network and how these devices
are going to access your network.
Are you going to let these devices connect
on your wired network connections
or are you going to make them use wireless?
We require that they be registered ahead of time
so you know what their MAC addresses are and they can be
identified in waitlist.
Or are you going to require these BYOD devices
to remain on a separate VLAN?
That way they're not going to touch your internal network
services, and if they do,
they have to pass through a screened sub-net.
All of these are valid questions to consider
as you determine how you're going to support BYOB
on your network,
both operationally and from a troubleshooting
and repair perspective.
Finally, let's talk about hardware failures.
Hardware failures can occur all over your network.
Your routers, your switches and your firewalls
can fail for all sorts of reasons
just like your network clients can.
As you begin to troubleshoot this issue,
you need to pinpoint both which device is experiencing
the failure and which component on the device has failed.
Once you identify the device that failed,
such as a router that isn't passing traffic
from one subnet to another.
You then need to identify the component that failed.
Most components on our network devices
are field replaceable.
Which means you can swap them out with different components
and get the device back up and operational very quickly.
For example, if we had one of our dual power supplies fail
in a border router,
we can schedule an emergency maintenance window.
We can power down the device, open up the chassis,
replace the broken power supply
and then return the device to normal operations.
If an interface card or module is broken or defective,
we can simply replace that as well.
And many of these are considered hot pluggable modules.
So if you have an SFP plus module that fails,
we can simply replace it without even shutting down
the network device or taking it offline.
If a client or server on the other hand
is found to have a defective component or hardware failure,
we can work with our CompTIA A+ technicians
to solve those issues by replacing the associated
hardware components.
Normally with a defective or field piece of hardware,
the fastest way to restore service is simply to replace
the component that's failed us.
In some cases,
such as a failed motherboard on a router or switch,
you may need to replace the entire device.
In these cases, you should get a spare switch or router
from your supply closet, mounted into the rack,
load up your backup configurations from the failed device
and put that into the replacement device
and then reconnect all the cables to it.
And finally restore service using your new device.
Then you can take the field device out of the rack,
return it to the manufacturer for repair
and then it can become part of your spares in the future
if it's under warranty or you could dispose of it properly
if it's reached the end of its useful life.
Troubleshooting network issues,
in this section,
we're going to discuss how to troubleshoot general
networking issues.
As we go through this section of the course,
we're going to again focus on Domain 5 network troubleshooting
and our final objective,
objective 5.5.
Objective 5.5 states,
that given a scenario,
you must troubleshoot general networking issues.
Now, as we go through this section of the course,
we're going to talk about collisions, and broadcast storms,
and duplicate addresses,
and flooding and switching, and routing loops,
DHCP issues, IP misconfigurations,
VLM misconfigurations, firewall issues, DNS issues,
NTP issues, network performance issues,
low optical link budgets,
certificate issues,
licensed feature issues, BYOD challenges,
and some hardware failures.
But before we cover all those different issues
in this section of the course,
I want to use the rest of this lesson
to discuss a few things you need to consider
during your general network troubleshooting efforts,
including device configuration reviews,
routing tables, interface status,
VLAN assignments,
and your network performance baselines.
First, we have device configuration reviews.
Now previously
we've gone through a standard device configuration
and we reviewed it section by section.
But here, I just wanted to remind you
that whenever you're experiencing a networking issue,
it's always a good idea
to look at your configuration files once more.
Most network devices have two configurations,
a startup configuration and a running configuration.
The startup configuration file is stored in NVRAM,
and it contains the commands needed
to initially configure a router
when it's being booted up.
It also creates the running configuration file
that's going to to be stored in RAM
and used during normal operations.
The running configuration
is the configurations that are actively
being used by the router
at any given time.
Any changes made to the configuration
by a network technician
in the command line interface
is applied first to the running configuration.
But,
if it doesn't saved back to the startup configuration,
those changes will be lost
the next time you reboot the router.
So if everything was working and you rebooted the router
and things stop working,
it may be that you're missing a configuration.
Now if you want to see the startup configuration,
you can enter the command, Show startup-config
at the command line interface.
If you want to see the running configuration,
you're going to enter show running-config
at the command line interface.
Now if you need to save any changes
that you've made to the running config,
to the startup config,
you can do this by entering the command;
copy running-config, startup-config
into the command line interface.
Remember
these three commands work on Cisco devices,
but other network devices use similar commands
to conduct these same types of actions.
Now, next, you need to look at your routing tables.
Anytime data isn't flowing properly in your networks,
it could be a routing issue
to verify your routing tables.
You need to check your routers,
your layer three switches
and any workstations or servers you may have
to view the routes on a network device
like a router or a layer three switch.
You can enter the command Show IP route
from the command line interface.
Now, if you need a view, the routing table
on a Windows, workstation or server,
you can use the command Route print at the command prompt.
If you need to display the routing table on a Linux
Unix or OSX workstation or server,
you can enter the command Route-N at the shell.
Next, you should look at the interface status itself
when there's networking issues going on
to do this, you're going to enter the show interface
or show interfaces command
at the prompt within the command line environment
of your router or switch
again, this is a Cisco specific command,
but similar commands exist for other brands
of network devices.
From this interface status,
we're going to be able to determine all sorts of issues,
such as duplexing issues, DHCP issues, collisions,
and broadcast storms.
Next, we can check the VLAN assignments being used
for our network and our devices,
the VLAN assignments or VLAN tagging
is the practice of segmenting an organizational network
and separating users into respective networks Sections
based on their roles and responsibilities.
Most commonly
VLAN assignments are done using static assignments
based on the ports and the interfaces being used.
Conversely,
you can also set up dynamic VLAN assignments
based on a Mac address of a given client.
And that way, when that client connects,
it will be put into the right VLAN,
regardless of which physical port it's being connected to,
to use dynamic VLAN configurations though,
you need to use a VLAN Membership Policy Server or VMPS.
As well as a client server and database.
Now, remember,
If you're using VLANs,
these will be things that will break up
your broadcast domains
and reduce the chance of a broadcast on from occurring.
But because these VLANs break up broadcast domains,
you need to route traffic from one VLAN to another,
using a router or layer three switch.
If you forget to include a router in your network
architecture
and you're using VLANs,
your traffic is not going to be able to flow
between those VLANs.
So make sure you keep this in mind.
Finally,
you need to ensure that you have
a good network performance baseline
created for your network after you initially configure it
in the simplest terms,
a network performance baseline,
it's just a set of metrics used
in network performance monitoring
to define what the normal working conditions
of this enterprise network infrastructure
are going to look like.
Engineers are going to use network performance baselines
for comparison
to catch changes in traffic that could indicate
there's a problem with your network.
It also lets networks operations personnel
like network technicians,
understand the before and after effects.
Whenever a change is made,
this makes it easier to measure the benefit
and calculate a return on investment
when you're making network changes.
Basically,
if you think there's a problem
and something looks abnormal,
you should consult your network baseline
to see if there really is something that's wrong
or something that's been changed.
And how large of a change has caused
on your performance.
Because if you change one thing by adding a route
and your network performance went down by 50%,
you probably don't want to add that route anymore.
And so you need to look into that closer
again there's lots of places and lots of things
that can go wrong in our networks.
So with all these considerations in mind,
let's jump into this section
on troubleshooting network issues.
Collisions and broadcast storms.
In this video, we're going to discuss collisions
and broadcast storms, how to identify them
and how to overcome them.
First, collisions.
A collision occurs on your network
when something happens to the data
as it's sent through the physical network medium
and it's prevented from reaching its final destination.
Now, most of the time, a collision occurs
when two hosts on the network
are transmitting at the same time
and therefore, their signals get combined
on the network medium and become unreadable.
Now, a collision can occur in both wired
and wireless networks.
If you think back to earlier lessons on ethernet,
you learn how CSMA CD worked
or on wireless networks how we use CSMA CA.
You remember that collisions are possible
on both of these types of networks
and we have to figure out a way to get through them.
Now, to prevent collisions,
you need to architect your networks
with smaller collision domains
because this decreases the chance
of a collision happening.
A collision domain is a network segment
connected by a shared medium or through repeaters
where simultaneous data transmissions can collide
with one another.
Now, if we connect all of our devices to a hub,
all of those devices are going to share
a single collision domain.
Similarly, if we're all connected
to the same wireless access point,
we're all going to be treated as being a part
of the same collision domain.
To break apart those collision domains
into smaller collision domains,
we need to use any layer 2 device,
like a switch or a bridge.
Now, when we replace a hub with a switch,
each switch port becomes its own collision domain
and this completely prevents all the collisions
from occurring on that switch port
between the switch and that client device
if you're connecting it directly to it.
So, how can you detect collisions and why are they so bad?
Well, the first indication
that you might have excessive collisions
is when your network performance starts to go bad.
After all, anytime you have collisions
on an ethernet-based network,
the devices are going to pick a random backoff timer
and then they're going to retransmit.
So, if you have a collision,
it never requires two additional transmissions
to get that data sent back out from the sources
to those destinations.
If you have a lot of collisions,
this causes an exponential decline
in the performance of your networks throughput.
Another way you can more accurately determine
if collisions are occurring on your network,
is to run the show interface command on your network device
and then look at the statistics
for the different switch ports.
Let's take a look at a few examples here.
First, let's look at this example
where we can see the collision counter is increasing.
We expect to see zero collisions,
but as the collisions begin to occur,
the interface statistics are going to start climbing upwards.
If you're using hubs in your network,
you're going to have some collisions occur and that's fine.
This only becomes a problem
when you start to have too many collisions
and your network performance starts to deteriorate.
That said, if you're running a switch base network
and you really should be,
then you shouldn't have collisions occurring
and this would be an indication
that something is not working the way you designed it.
Next, we could also see the deferred counter increasing.
Now, the deferred counter is going to count the number of times
the interface has tried to send a frame,
but, they found the carrier busy at the first attempt.
This is called carrier sensing.
Again, if you're running a switch,
you should not see a deferred counter rising
because nobody should be waiting to transmit.
Now, if you're using a hub based network,
this is going to be a normal part of your network operations
and it shouldn't be a concern.
Next, we have late collisions.
Now, this occurs when a collision is detected
after 5.12 microseconds,
which is the amount of time it takes
for the 512 bit of a frame to be sent.
This is displayed under the late collision counter
in the interface statistics.
A late collision by itself indicates a problem,
but not the root cause.
Instead, the cause is usually an incorrect cable being used,
a bad network interface card
or the use of too many hubs on the network.
Finally, we have excess collisions.
Basically, there is a limit to the number of times
the device can back off from transmitting
and wait when it experiences a collision
to retransmit again.
When the collision occurs,
it's going to choose a backoff timer
and then it tries retransmitting again.
If it detects another collision,
it picks a new backoff timer and tries again.
It'll keep doing this for up to 16 times
but on the 16th time,
it's going to give up and simply just drop that frame.
In this case, it's marked by the interface statistic
as an excessive collision.
Now, if you want to display
the exact number of excessive collisions,
you can enter the command show controller ethernet
on your network platform
and the excessive collision counters will be displayed.
If you're experiencing excessive collisions,
this is going to indicate a problem in the network.
Usually, this is caused by devices
using full duplex communication
over a shared ethernet segment, like a hub
or you have a broken network interface card
or you simply have too many clients
connected to the same collision domain.
To overcome an excessive collision issue,
you should turn off auto negotiation
for the speed and duplex of an interface,
hardcode the speed to a lower setting and change the duplex
to half-duplex instead of full-duplex.
These speed and duplex settings can be configured
on the networking device or on the client itself
within the windows, Linux, Unix,
and OS X operating systems
under the network adapter settings.
Next, we need to talk about broadcast storms.
Now a broadcast storm occurs
when the network system is overwhelmed
by continuous multicast or broadcast traffic.
Broadcast storms are dangerous to your network
because they can quickly overwhelm switches
and other devices as they struggle to keep up
with the flood of packets that's trying to get processed.
When a broadcast storm occurs,
your network performance is going to decrease rapidly
and the worst cases
it can cause a complete denial of service in your network.
Remember, a broadcast packet is addressed at both layer 2
and layer 3.
On layer 2 devices,
the address is FF FF FF FF FF FF.
Now, if it's at layer 3,
you're going to see the IP address used of 255.255.255.255.
Now, a broadcast domain is a logical division
of a computer network in which all of your nodes
can reach each other using the broadcast
at the data link layer, which is layer 2.
Now, a broadcast domain
can be within the same locally or network segment
or it can be bridged
to other local area network segments as well.
Remember, a switch and a layer 2 device
will not break up broadcast domains
because they bridge these things together.
Now instead, you have to reach a router
or a layer 3 switch,
to break up the broadcast domain
into smaller broadcast domains.
In general, there's just a couple of main causes
for broadcast storms occurring in your network.
First, you have a singular broadcast domain
that's just way too large.
In this case, the number of clients will simply create
a broadcast storm
when they're conducting their normal operations.
For example, if you have a large enterprise network
that has numerous switches,
that are interconnecting the network,
this is going to create a really large broadcast domain
because again, switches don't break apart broadcast domains
like a router does.
So, if you have a large broadcast domain setup
using class B private address ranges like 172.16.0.0/16,
you could have up to 65,534 usable IP addresses and hosts
on that one broadcast domain
and that's a really large broadcast domain.
Instead, you should break up that broadcast domain
by subnetting out the class B network into smaller networks
to reduce the number of broadcast being generated
by those clients on the network.
Between each subnet, you're then going to use a router
or a layer 3 switch, to break up those subnets
into separate broadcast domains.
Now our second cause of broadcast storms occur,
we have a large volume of DHCP requests
on a given broadcast domain.
Whenever a new host connects to a broadcast domain,
they attempt to get an IP address assignment
using the DORA process
of discover, offer, request and acknowledge
using the DHCP protocol.
Now, the D or discover part of this process
happens as a broadcast packet because the new network client
doesn't know the location of the DHCP server yet.
So, this can create a storm of broadcast packets
if the network has a lot of clients trying to negotiate
for an IP address all at the same time.
For example, let's say your network device reboots
and all the clients attempt to renegotiate
their DHCP leases.
That can cause a broadcast storm.
If you see a broadcast storm
is being caused by your DHCP configurations,
you need to check if you're using DHCP relays
between your different VLANs.
If you are, you're essentially allowing these VLANs
to be treated as a single broadcast domain
for the purposes of DHCP discovery
and this can lead to broadcast storms
if you have a very large network with a lot of clients.
The third cause of broadcast storms occurring on a network
is going to occur when loops are created
inside of a switching environment.
If you happen to have unmanaged switches
and somebody accidentally cables them together,
this can create an unintentional loop
and this can lead to broadcast storms.
To prevent these, make sure you're enabling BPDUs
or Bridge Protocol Data Units on your managed switches.
Also, you should enforce
a maximum number of MAC addresses per port,
because this will also shut down a port
if a broadcast storm starts to go on through that port.
So, how can you identify if you're having a broadcast storm?
Well, one of the easiest methods
is to look at your packet counters.
If you know your normal baseline for your network
and now you see it rapidly increasing way faster
than you normally do,
this could be an indication of a broadcast storm.
For example, let's say you're running a network
that you're used to seeing about 10,000 packets per second
and now, you're seeing
a hundred thousand packets per second.
This could be indicative of a potential broadcast storm.
In this example, you can see our average broadcast
is around 8,700 packets per second
and we rarely go above 20,000 broadcast packets per second.
So, if I see a spike upwards to a hundred thousand packets
or more per second,
I would know I have a potential broadcast storm on my hands.
Now, another way is to look at your network monitoring tools
and determine the packet loss on your network.
If a broadcast storm starts to occur,
your network devices are going to have a hard time
keeping up with the processing
of all the packets on the network.
And so, packet loss will rise exponentially.
Now, the most definitive way
to identify a broadcast storm though,
is to set up a packet analyzer like Wireshark or TCP dump
and then you start collecting the traffic on the network.
As you look at that traffic,
you're going to look for packets
and see if there's a lot of broadcast packets
that are growing rapidly.
If so, you're suffering from a broadcast storm.
In this example, you see a layer 2 broadcast storm occurring
due to an enormous amount of art broadcast
being conducted in this network.
Now, in this example,
I'm using TCP dump to see all the broadcast traffic
on the network.
To do this, you're going to run the command TCP dump-I
and then your interface,
ether, broadcast and ether multicast.
This'll run TCP dump and only display broadcast
and multicast packets to the screen.
In this example,
you can see there are a lot of AARP requests
that are going on because there's a broadcast storm
that's starting to happen.
Remember, the best way to prevent a broadcast storm
is either set up loop preventions like using BPDUs,
limiting the number of Mac addresses
that can access a given switch port
and breaking up large broadcast domains
into smaller broadcast domains
using routers and multi-layer switches.
Duplicate addresses.
In this video, we're going to discuss duplicate addresses
in our network, specifically duplicate MAC addresses
at layer two and duplicate IP addresses at layer three.
First let's focus on layer two with duplicate MAC addresses.
If you remember a MAC address is a 12 digit number
that's written in hexadecimal format,
and it's used to uniquely identify a network interface card
on a given network.
A MAC address has 48 bits in total length for its address.
The first 24 bits, or six hexadecimal digits,
is going to be assigned based on the hardware manufacturer.
And the second 24 bits, or six hexadecimal digits,
are going to be used to uniquely identify
this particular network interface card on the network.
The MAC address is assigned on the device
when it's manufactured initially,
and this is a hardware or burnt in physical address.
For this reason,
you should not have duplicate MAC addresses on your network,
unless there's an incorrect assignment
made during the production by the manufacturer,
or if somebody in your network
begins to use a self assigned address
known as a locally administered address.
Now, when a self assigned address is being used,
this can often be an indication that MAC spoofing
is being used by a client on your network.
So what's wrong with having duplicate MAC addresses
on the network?
Well, when I think of this problem,
I think back to elementary school in the late eighties
and early nineties.
You see when I was born,
the name Jason was pretty darn common.
This made it a little bit difficult for many of my teachers
because they often had two or three kids
in the class named Jason.
So when the teacher would call out Jason,
there was two or three kids who would respond.
Or if the teacher got a note from Jason's mom,
the teacher then had to figure out which Jason
should get the response
because she didn't know which mom it was.
Now, the same thing happens in our networks.
If you have two or more devices
that respond to data requests
directly from a given MAC address,
this causes a lot of network issues.
Now for example, if you have two devices
using the same Mac address,
your switch might mistake them for each other.
And they might think they're the same device,
and so the switch will keep updating its CAM table
for the location of a single device.
So it goes from port one to port three,
to port one to port three
and repeatedly starts going from one port to the other,
when in reality, there's really two devices there.
Now duplicate MAC addresses
can also cause network conductivity issues
because the switch doesn't know where to send the traffic
destined for that particular MAC address.
Because again, it's switching between two
or three different ports.
Now, luckily MAC addresses are only used
in layer two networks.
So once you reach a router in your network,
the address is going to be converted to an IP address
at layer three,
so the extent of your connectivity issues
is really going to be limited in scope.
Now a more modern challenge that we have
is with virtual machines
and their virtual network interface cards,
because these devices are only a series of ones and zeros,
the virtual network interface cards
have to be assigned a MAC address
by a virtual machines hypervisor.
To ensure you don't end up with duplicate MAC addresses
caused by these virtual machines,
you need to make sure you're using a Logical Domain Manager.
Now, a Logical Domain Manager
is used to listen to multicast messages on the network
and keep track of all the MAC addresses that are being used.
As it does this, it identifies if there's any duplicates
and if it is,
then it will go ahead and reassign MAC addresses
for its virtual machines to prevent duplications.
So how can you determine if there's a duplicate MAC address
operating on your network?
First, you're going to see network conductivity issues
for two machines,
and those machines will have duplicate MAC addresses.
This is caused by the switch
that continually has to go back and forth between two ports
and updating its CAM table
because it sees the same MAC address reporting itself
on two different ports.
This will cause intermittent connectivity
for the two devices
or one of the devices will have great connectivity
and the other one will be completely non-responsive.
Second, you could set up a protocol analyzer like Wireshark
on your network.
Then you can look at the network traffic,
specifically the ARP traffic and see what IP addresses
are being mapped and reported for each MAC address.
If you see the same AMC address being used
by two different machines or two different IP addresses,
this could indicate a duplicate MAC address
is on your network.
To prevent issues on your network
caused by duplicate MAC addresses,
you can enable port security on your devices.
This can be configured to allow a single MAC address
to be configured to one single switch port,
and then it's going to prevent any duplicate MAC addresses
from accessing the network at the same time.
Now, to identify switch boards that are used
for particular MAC address,
you can editor the show ARP command on your switch.
Here's an example of running the show ARP command
on a Cisco switch.
Notice there are two matching MAC addresses in use here,
both with different IP addresses
and different physical interface ports.
One is on fast ethernet 0/3/3/4
and the other is on fast ethernet 0/3/3/5.
This can cause conflicts or frames
that simply aren't going to be delivered to the right devices
on this switch.
Now, once you identify the devices
that are using the duplicate MAC addresses,
you can check those devices locally
to see if there's a hardware manufacturing issue
that assigned the same MAC address to both devices,
or, if this is the case in MAC spoofing,
you want to make sure that you reset the MAC address
back to the burned in physical address
or remove that device from the network completely.
If it's a hardware manufacturing issue,
you're going to need to replace the network interface card
to permanently solve this problem.
Next, let's talk about duplicate IP addresses.
A duplicate IP address is also known
as an IP Address Conflict.
This occurs when another computer on the same network
has an identical IP to another workstation or server
on that same network.
Most often this occurs when you're using static IP address
assignments for your network clients
and you didn't properly account for which IPs
were already used by other devices, or you had a typo.
If you're using DHCP in this happens,
this could be a DHCP server issue
where it didn't properly account
for the IPs it already issued out,
or it could be the case of somebody statically assigning
an IP to their client,
even though the DHCP server has that IP address assigned
as part of its scope.
Now, a third reason this can occur
is if you have a rogue DHCP server on your network,
because that rogue DHCP server could be handing out
the same IP addresses as your official DHCP server,
and this can be happening
from a private class C address IP scope.
Now, if you have duplicate IP addresses
being used by two devices on your network,
this'll cause intermittent connectivity
for both of those clients,
because both of those clients
are requesting network services,
but the routers may not know where to send the traffic
back to 'cause both clients are using the same IP address.
To solve this, you should first check if the client
is dynamically or statically assigned an IP address.
As I said, most commonly, devices can be statically assigned
an IP, and you're going to have a duplicate IP address issue
because somebody typed in the wrong thing.
To check this, go to your network adapter properties
for TCP/IP version four in Windows
and you're going to see,
use the following IP address radio buttons there,
and if that's selected,
that means you're statically assigned.
If your network is supposed to use DHCP,
simply click, obtain an IP address automatically instead
and then save your changes,
and the network interface card will go out
to the DHCP server and get the dynamic assignment
for an IP address that it should use moving forward.
If you want to identify the duplicate IP addresses
on your network though,
you can start by logging into the command line interface
on your router.
In my example, I'm going to use a Cisco router
and I'm going to enter the command show ARP,
just like we did when searching for duplicate MAC addresses.
This time though,
we're focused on IP addresses in that first column.
Here, I see two IP addresses displayed with 10.1.4.2.
The first one is located on interface,
fast ethernet 0/3/3/4
and the second one is on the interface
fast ethernet 0/3/3/5.
Now that we know which interfaces and switch ports
are being used,
we can check the configurations on those individual clients
and we can ensure they're properly assigned statically
or they're configured to receive a dynamic IP address
from our network's DHCP server.
Routing Issues.
In this video, we're going to discuss routing issues
that you may come across in your networks,
including multicast flooding,
asymmetrical routing and missing routes.
Now, first we're going to talk about multicast flooding.
If you remember, multicast networks operate
by sending out group communications
that are addressed to a group
of destination computers simultaneously.
For this to work, the multicast message is sent
to a single multicast address
and then the message can be distributed to the entire group.
This is great most of the time,
but sometimes things can malfunction
and a multicast flood can occur.
Now, multicast flooding happens when no specific host
is associated with the multicast MAC address
inside the CAM table of the switch.
When this occurs, multitask traffic is going to be flooded
throughout the entire local area network or VLAN,
creating unnecessary traffic and wasting network resources.
To prevent this issue, you need to configure your switch
to block unknown multicast packets.
Now, for the exam,
you don't need to know the specific commands
on how to block multicast traffic on a switchboard,
but you do need to know that blocking it
will solve this type of multicast flood issue.
Next, we have asymmetrical routing.
Asymmetrical routing occurs
when network packets leave via one path
and then return via a different path.
This can occur when traffic is flowing
across two different layer two bridge pair interfaces
on a router or a firewall
or when there's flows across different routers
or firewalls in a high availability cluster.
Now, if you're using Load Balancing
and using a protocol like HSRP,
asymmetric routing can occur
and it's something you need to think about.
This is a problem if you're using security devices
and network appliances to perform deep packet inspection
or you're using a stateful firewall,
because these devices need to see
all the packets associated with a given packet flow,
otherwise issues happen.
Now, while modern routers will attempt to forward packets
in a consistent next hop for each packet in the flow,
this only applies in one direction
when they do their forwarding.
Our routers will make no attempt in directing return traffic
to the originating router, because they only want to ensure
the fastest and most efficient delivery of those packets.
Now, this behavior presents problems for our firewalls
and our security appliance clusters,
because they don't support asymmetric routing,
because of the set of cluster nodes
all provide a path to the same networks.
So routers forwarding packets to networks
through the cluster can choose any of the cluster nodes
as their next hop.
And this causes asymmetric routing to occur
and the flow of packets in one direction
goes out a different node than what comes back
in the return path.
Because of this difference in packet flow,
network traffic can be dropped by one
or both of the firewalls in the cluster,
because they aren't seeing all the traffic
from the packet flow.
So how do we solve this problem?
Well, the solution to this is to adjust the placement
of your firewalls and internal routing
so that the traffic will flow in both directions
to the same firewall, even if the incoming traffic
is entering the network through a different router
than the router that handled the matching outgoing traffic.
Essentially, we need to put all our firewalls
closer to the systems they are protecting
instead of at the edge of the network
and this will avoid asymmetric routing problems.
Remember, asymmetric routing
doesn't cause any routing issues necessarily,
but they do cause issues with dropped packet flows,
because our security devices like firewalls
and unified threat management systems
need to be able to see the entire flow.
So you need to consider the design
of your network architecture
to prevent this issue from occurring.
If you don't, then packet flow drops are going to occur
and your clients can experience
network intermittent connectivity.
Finally, we need to talk about missing routes.
Now, missing routes occur
when a router cannot reach a destination
because there's a missing route inside the routing table.
These missing routes can occur
for lots of different reasons,
depending on what routing protocol is being used
to share that routing information.
Now, missing routes are commonly found as an issue
when network administrators are using static routes
and manually adding them to the routing tables.
If the administrator mistypes a route or the command,
the proper route will not get added to the routing table
and this causes problems.
So if you suspect you're missing a route,
you should enter the show IP route command
from the command line interface of your switch
and that'll display the routes available to it.
Now, if you're working on a Windows client or server,
you can enter the route print command
to see the routing table for your system.
If you're using dynamic routing protocols like OSPF or BGP,
there may also be issues where the routers
are not properly establishing their neighbor states
and this can cause the routers to not reach convergence
across their routing tables.
To troubleshoot this kind of issue,
you need to verify the dynamic routing protocols enabled
and if the two routers can communicate with each other.
To verify this, you should run the ping command
from one router to the destination router
and validate that connectivity exists.
If you identify that a route is missing,
you can statically add that route from the command line
or you can work with a network administrator
or network engineer
to troubleshoot the underlying dynamic routing protocols
that are being used by these routers.
Loops
in this lesson, we're going to discuss loops,
specifically switching loops and routing loops.
First we have switching loops.
Switching loops, or bridging loops,
are going to occur whenever there's more than one path
between a source and destination device.
As broadcast packets are set for switching
through every single switch port,
flooding can really occur quickly
when broadcast messages are sent
and then repeated back through another switch port
in this looped architecture.
This will create a broadcast storm for you.
Since our modern networks are built
with additional load balancing and fault tolerance,
there's usually going to be multiple physical connections
between each part of the network.
And so naturally, we would have loops
and switching loops would become inevitable
if we didn't put some protections in place to prevent them.
So, how are you going to prevent them?
Well, to prevent a switching loop,
you have to enable STP, the spanning tree protocol.
To check if STP is enabled and configured on your switch,
you need to use the command, show span tree,
and then hit enter.
For the network plus exam, you do not need to know
how to configure a spanning tree protocol on a switch,
but I'm showing you what it looks like
just for demonstration purposes here.
Now you can see here, the information for this switch
in VLAN0001, which is our default VLAN.
In this example, the route ID
is set with a priority of one at a cost of two.
The bridge ID is set with a priority of 61,441.
As we look at the different interfaces on this switch,
you can see there are two ports
that are designated as the root port
that will forward traffic.
And all the other ports are set as designated ports.
Eth1/11, 1/12, 1/15, and 1/16 are all in a blocking state.
And this is what prevents a loop from occurring
with this switch.
Now the bottom line here, when it comes to switching loops,
is that if you suspect a switching loop,
it's likely an issue with how you configure your STP
and you need to escalate this work
to a network administrator or network engineer
to troubleshoot it, reconfigure it and repair it.
Next, let's talk about routing loops.
A routing loop is formed when an error occurs
in the operation of your routing algorithm.
And this creates a circular route
amongst a group of network devices.
Routing loops are caused by incorrect configurations
of your routing protocols,
where data packets get sent
between different hosts of different networks.
And they get caught in this endless loop,
traveling in a circle between the different network routers
with incorrect route entries.
Routing loops, unlike switching loops
are not caused by physical circular connections,
but instead by the logical layer 3 circular connections
that can exist within your routing tables.
Remember, we want multiple physical connections
between our routers,
because this gives us higher redundancy and fault tolerance.
So our routing protocols have methods in place to protect us
from physical loops causing issues.
Things like weighted connections based on hops
or the speed of those connections.
For example, distance vector routing protocols,
use a Time to Live, or TTL, in the data gram header
of the IP packets.
And this will help us avoid routing loops.
So, if a packet reaches the Time to Live of zero,
it's going to be dropped by the router
and it's not going to be forwarded.
And that effectively ends your routing loop.
Now, another method to prevent routing loops
is known as split-horizon.
If you can figure split-horizon, you're going to ensure
that you have this router configuration
that stops a route from being advertised back
in the direction that it came from.
This split-horizon mechanism ensures that a router
can not send back alert route to the same router
that it learned it from.
To setup split-horizon on a Cisco router, for example,
you're simply going to enter the command ip split-horizon
and hit enter at the command line interface.
If you believe split-horizon has been disabled by accident,
you can look to see if the no ip split-horizon command
was previously issued.
Now, route poisoning is another method we can use
to avoid routing loops inside of our networks.
If a router detects that one of its connected routes
has failed, the router is going to poison
that route by increasing its metric
to an infinitely high number.
This happens automatically inside your routers.
So there really isn't something you have to do or configure,
it'll just happen for you.
Finally, we have hold-down timers.
Hold-down timers are used to prevent bad routes
from being restored and passed
to other routers by accident.
Now hold-down timers are used
with distant vector routing protocols like RIP.
The router is going to be configured,
so that will not advertise or accept any routes
that are in a hold-down state.
This occurs for a set period known as the hold-down period.
By default, the hold-down timer is set at 180 seconds
or three minutes when you're using RIP
as your routing protocol.
It should be configured that way,
automatically, by your router.
As I said, most of the routing loop issues
can be solved by simply using the right routing protocols,
ensuring they're configured properly.
If you're adding a bunch of static routes into your router,
be really careful because this is how most routing loops
are going to be created.
Remember, statically-created routes are given a metric
of 1 by default, making it extremely, highly trusted
by the router.
The only type of route that the router will trust more
than your statically assigned route
is a directly connected route.
Any routes that it learns through OSPF or RIP or BGP
or EIGRP or any other routing protocol
will not overwrite that static route that you created.
So you have to be careful with static routes
in order to prevent a potential routing loop.
DHCP Issues.
In this video, we're going to discuss DHCP issues,
such as rogue DHCP servers and DHCP scope exhaustion.
Now, DHCP, or the Dynamic Host Configuration Protocol,
is a network management protocol
that's used on IP networks for automatically assigning
IP addresses and other communication parameters
to devices that are connected to the network
using a client server architecture.
Basically, DHCP is used to automatically assign
an IP address, a subnet mask, a default gateway,
and a DNS server's IP address
to a client whenever it joins the network.
This works great most of the time,
but if someone adds a rogue DHCP server to your network,
this can cause a ton of issues for you.
Now, a rogue DHCP server is a DHCP server on the network
that is not under your administrative control,
since you are the network administrator.
Remember, rogue DHCP servers can be installed on a network
either as part of a malicious attack
or simply accidentally by your own employees.
In the case of a malicious attack,
the rogue DHCP server could be used
to automatically configure network clients
as they join the network to use a different DHCP server,
one that's controlled by your attacker.
That way, anytime somebody enters google.com
or citibank.com, they're going to be redirected to another site
that's controlled by the attacker
and looks like those sites,
and then, they can conduct an on-path
or man in the middle attack against them.
Now, in the case of an accidental install by an employee,
this normally occurs when somebody connects
a wireless router or wireless gateway to your network
for their own convenience
and they really didn't realize that the device
had a built-in DHCP server contained within it.
In either case, the rogue DHCP server
will begin to hand out IP addresses from its own scope.
Now, this scope may or may not be the same
as your official DHCP servers.
If it isn't, you're not going to see
a lot of network connectivity issues for those clients
that are getting IPS from the rogue DHCP server
if the default gateway is still being handed out correctly.
Now, if the rogue DHCP server is using
the same scope as your DHCP server,
this is where you can have a lot of problems.
For example, let's pretend you're both using
192.168.1.0/24 as your network scope.
This is a traditional one used by small office
and home office networks.
You both then can start to suffer connectivity issues
because two devices can both be assigned
the exact same IP address,
leading to a duplicate IP address.
Now, to prevent a rogue DHCP server
from connecting to your network,
you should configure DHCP snooping on your network.
DHCP snooping is a series of techniques
that are applied to improve the security
of DHCP's infrastructure
by excluding rogue DHCP server traffic
and removing their malicious or malformed DHCP traffic
from the network.
Now, rogue DHCP servers can also be countered
by using port security on your switch ports,
because that rogue DHCP's MAC address
isn't going to be on your authorized list of devices
when they connect to a switch port.
Finally, rogue DHCP servers can also be detected
by properly configuring an intrusion detection system
and once identified, it can be manually removed
from the network by your network administrators.
Next, we have have DHCP scope exhaustion.
Now, DHCP scope exhaustion occurs
when the DHCP server simply runs out of valid IPs
to assign to somebody when they join the network.
For example, let's say again you're using the scope
of 191.168.1.0/24
and that's your private Class C network.
You've reserved 192.168.1.1 for the gateway
and 192.168.1.255 for your broadcast.
Now you have 254 IPs left in your DHCP scope.
Now, as long as you have less than 254 devices
that want to connect you at the same time,
you're not going to suffer DHCP scope exhaustion.
But if you have 500 people that want to connect,
you're going to run out of IP addresses
before everybody gets their own.
Now, many DHCP servers use a default lease time
of 86,400 seconds, which is one day,
but I've seen some organizations set their DHCP leases
to seven days or even 30 days.
Now, this is helpful from a security analyst perspective,
because those clients aren't changing
their IP addresses as often,
and so it's easier to correlate log data,
but these longer lease times can lead
to DHCP scope exhaustion
if you have a lot of transient users.
For example, let's say you're running
the wireless network at a local college.
You have hundreds or thousands of different people
that connect to your network on a daily basis.
One student might have a class
on Monday, Wednesday, and Friday,
and another student might have classes
on Tuesday and Thursday.
If you're using seven-day leases,
the first student would still have their lease
for the entire week, and so would the second student.
Now, we're going to need two leases for these two students.
But if we instead lowered our lease time to 24 hours,
these two students could, in theory,
receive the exact same IP, but not at the same time,
because the lease would expire on the first one
before the second one showed up to class.
Now, another thing you can do
to overcome DHCP scope exhaustion
is to increase the scope size.
For example, instead of providing the 254 IP addresses
by using the network of 192.168.1.0/24,
I can instead change my scope to 172.16.1.0/22.
This gives me 1,022 available IPs
for me to assign to my clients,
which is going to serve all 500 of my students with no problem.
The final thing you can do
is decrease the number of devices
that are using the DHCP server and in turn,
the IP addresses from its scope.
In this case, you're going to want to enable port security
or network access control, NAC,
to enable you to prevent clients from accessing your network
and getting assigned an IP address from your DHCP scope.
IP and VLAN settings.
In this video, we're going to discuss IP and VLAN settings.
First, let's talk about IP settings.
This can occur when you have the incorrect IP address,
subnet mask, gateway or DNS server IP address
assigned to a client
and it will cause issues for you with your IP settings.
Remember from your lessons on DHCP,
we talked about the fact that every network client
needs four key pieces of information
in order to communicate properly on the network.
This is their IP address, their subnet mask,
the IP of their default gateway
and the IP of their DNS server.
Now let's take a look at a static assignment
on this OSX client.
Notice here, we have three key pieces of information shown.
The IP address, the subnet mask
and the router or default gateway.
The DNS server IP is on a different tab,
and it really doesn't matter for this example,
as long as we don't need to conduct name resolutions.
So, you were called to troubleshoot this client
because they can't access the internet.
Let's assume you already tried to ping the server
at 8.8.8.8 and it failed.
So, you know you have some kind of a routing issue here.
What could the problem be?
Now, I want you to go ahead and pause the video here
and look at it and see if you can figure out the issue.
All right, I'm going to count to five.
One, two, three, four, five.
All right, you're back?
Did you figure out the issue?
In this case,
the issue is that we have the wrong default gateway.
Notice the IP address is 192.168.1.200,
and it has a subnet mask of 255.255.255.0.
With this subnet mask,
the default gateway would have to be an IP
of 192.168.1 dot something
because it's in this 192.168.1.0/24 network
for us to be able to reach it.
Now, if the default gateway
is set 10.0.1.1 and this is truly the IP of my router,
then I have an incorrect IP address.
Because again, my subnet mask of 255.255.255.0,
if applied to the router's IP address of 10.0.1.1
would tell me I need to have something
in the network of 10.0.1.0/24.
So to get this client to connect to the internet
and have its traffic properly routed,
I need to change either the default gateway to 192.168.1.1
or change the IP address to 10.0.1.200
or something like that.
All right, let's take a look at another example.
This one comes from a Windows client.
Just like our last example,
this client cannot ping 8.8.8.8 successfully.
So you see the client has a statically assigned IP address
of 192.168.1.200.
Its subnet mask is 255.255.255.128
and the default gateway here is 192.168.1.1.
All right, go ahead and pause the video.
I want to see if you can identify the issue
and think about how you're going to fix
this client's network connectivity issues.
Pause the video and come back
in one, two, three, four, five.
All right, you're back?
Did you figure this one out?
Let's take a closer look at that subnet mask.
Notice it wasn't a class full class C of 255.255.255.0
So this isn't the 192.168.1.0/24 network
and it doesn't have 254 usable IP addresses.
Instead we have a subnet mask of 255.255.255.128.
This gives us a /25 network using CIDR notation.
That means we only have 126 usable IP addresses.
So if our gateway is 192.168.1.1,
and we have a subnet mask of 255.255.255.128,
then our network ID is 192.168.1.0
And our broadcast is going to be 192.168.1.127.
Everything between those two ranges
is going to be usable IPs.
But our client was assigned 192.168.1.200.
And that means it's assigned into a range
that's in another network.
So that IP address and gateway aren't on the same sub-net.
This would explain why we can't route our traffic
to the network because we can't reach our default gateway.
This is going to be a problem for us.
So our solution would be to change our IP address
to something on the same sub-net as that default gateway,
like 192.168.1.100
or we could see if there's a gateway
on the same sub-net as our client.
This means we need a gateway
with an IP address of 192.168.1.129
or something between there and 192.168.1.254,
because our network ID will be 192.168.1.128.
and the broadcast will be 192.168.1.255
if we're using the subnet mask for a /25 network
of 255.255.255.128.
All right, now, if you're going to connect to a website
by its domain name and that isn't working,
we need to look at the DNS IP server configuration.
In this case, you'd want to ensure
you have a working DNS server
and the IP has been properly entered on the client.
If you don't have your own DNS server,
you can always set your DNS server's IP to 8.8.8.8
which is the public DNS server hosted by Google.
So here you could see the DNS server
is set to 192.168.1.1 as the primary
and 192.168.1.2 as the secondary.
This is fine as long as the DNS servers there
are running on those IP addresses.
Now, if you don't have DNS servers,
then you want to reconfigure those to the public DNS servers
at 8.8.8.8 and 8.8.4.4,
both of those are Google's DNS servers.
Next let's talk about VLAN settings.
Remember when it comes to VLANs
you need to route the traffic between the VLANs
otherwise your devices aren't going to be able to communicate.
So let's pretend I have two VLANs,
one called IT and one called HR,
even though both IT and HR
are connected to switch one and switch two physically,
they can't communicate with each other
until I route traffic between them using a router.
Also, if you're going to have devices in the same VLAN
they need to be in the same logical sub-net.
So in this example,
all of my clients are part of the IT VLAN,
and they should be using the same sub-net of 192.168.1.0/24.
And all of my HR VLAN clients should use their own sub-net
something like 192.168.2.0/ 24.
So let's take a look at this
using a basic network logical diagram.
Here, we see one IT client and one HR client.
Each one is assigned an IP address in a /24 network.
The IT client is assigned to the IT sub-net
of 192.168.1.0/24 in VLAN 100.
And the HR client is going to be assigned
to 192.168.2.0/24 as it's network in VLAN 200.
To simplify this topology,
I left out all the other IT and HR clients,
but there could be 50 or 60 of these
connected there as well, either to switch one or two.
It really doesn't matter for our purposes,
as long as they're configured into the proper VLAN.
Now, as this is a logical diagram
and how we see it set up here,
the IT client cannot communicate to the HR client
and neither of those clients
can communicate with the internet.
Why is that?
All right, I want you to pause the video here
and I'm going to count to five
and I want you to come back and give me the answer.
One, two, three, four, five.
All right, you're back?
Did you figure out the issue?
Well, this issue is all going to come down to the fact
that there are no gateways
for the IT or HR clients to communicate with.
Notice in this logical topology, we only have one router
and that router has an interface IP of 10.0.0.1
in the 10.0.0.0/24 network.
This means it's the default VLAN, VLAN 1
and its network isn't on the same logical network
as either the IT or HR VLANs.
So for us to allow the IT and HR clients to communicate,
they're going to need a place to route traffic
between switch one and switch two.
Then to allow both of them to communicate with the internet,
we need to connect them to a new router
that's connected to the internet as well.
Now our easiest and cheapest solution in this case
would be to remove the connection
between switch one and switch two.
Then we can connect switch one to router one
and assign it a new interface
on an IP address in the IT VLAN.
We could also connect switch two directly to router one
and assign it an interface with the HR VLAN.
Now we can use router one to route traffic between VLAN 100,
the IT VLAN and VLAN 200, the HR VLAN.
And we can route both of those VLANs out to the internet,
going through router one as well.
So remember, if you start having devices
that can't communicate with each other,
like one of the IT clients can't communicate
with one of the HR clients,
it could be an improper VLAN configuration.
Make sure you check your configuration
and that there's a proper routing setup
between the different VLANs
because the number one cause of issues
when you're dealing with VLANs that won't communicate
is people aren't routing the traffic right.
Another common mistake people make when dealing with VLANs
is simply that they don't use them.
Now, if you don't use VLANs
all of your traffic will end up in the default VLAN, VLAN 1.
When this occurs,
you're going to have a really large single broadcast domain.
For example,
if you have a server that's operating in VLAN 1 ,
the default VLAN,
it can experience slow load times
because there's too many devices located inside VLAN 1
and the number of broadcasts
are going to slow down the entire VLAN.
Instead, this server, which currently has an untagged port,
and therefore it's assigned to VLAN 1 by default,
should be added to the server VLAN with the other servers.
This will segregate them from all the other client villains
and increase their speed dramatically.
Firewall issues, in this video,
we're going to discuss firewall issues
and how to troubleshoot network issues
involving incorrect firewall settings
and block services, ports or addresses.
First, let's talk about the purpose of a firewall.
Remember firewalls or network security devices
that moderate and filter
incoming and outgoing network traffic
based upon established rule sets.
Essentially firewalls act as an inspection point and barrier
between a private internal network and the public internet
or other private internal networks,
if you're using screen subnets,
Now, firewalls can exist as either host-based firewalls
or network-based firewalls.
A host-based firewall is a piece of software
that runs on an individual computer or device
that's connected to your network
and performs the functions of a firewall
to protect that one single device.
For example, if you're running a windows, client or server,
you can utilize the built-in windows defender firewall
to go dock to host based,
two-way network traffic filtering and inspection,
as well as blocking unauthorized network traffic
from flowing into or out of your device.
A network-based firewall is a network security device
that's deployed inline with the network traffic flow,
just before the border or gateway router
in order to monitor and filter incoming
and outgoing network traffic
based upon your established rule sets.
In general, regardless of whether the issue resides on a
host-based firewall or a network-based firewall,
the network connectivity issues experience
will be caused by one of three different situations.
First, access to protected resources
from unprotected networks, isn't working.
Second, access to unprotected resources
from protected networks, isn't working.
Or third, access to the firewall
and its configurations, isn't working.
Basically the problems can be broken down
into either traffic is not going through the firewall
or traffic is not going to the firewall,
and in either case it's not working properly.
So to troubleshoot these issues,
you should use your seven-step troubleshooting method
and understand the OSI model to troubleshoot each layer
from layer one physical all the way up
until you identify the issues.
Now, for example, is the firewall properly cabled
into the network at the right position?
If so, does the link lights on the network interface card
show up that the link is established
between the router and the firewall?
If it does layer, one is probably not your issue.
Next, we go to layer two,
and we determine if the router and firewall
are communicating using AARP and their Mac addresses.
If they are, we're going to move up to layer three
and determine if the firewall has a valid IP address,
subnet mask and default gateway.
And that way it can communicate properly on the network.
Once we've done all that we can now inspect the firewall
itself for issues.
Usually when traffic isn't flowing to
or through the firewall,
the issue is going to be related to a misconfigured rule set
as part of your access control list or ACL.
Now the access control list
is simply a collection of permit and deny conditions,
which we call rules.
And they're going to provide security
by blocking unauthorized users
and allowing authorized users to access specific resources.
To inspect the firewall rules on a network based firewall,
you're going to use the command show access dash lists
to display the contents of the current access control list
on a Cisco device, as an example.
Each device is going to have a different command,
but for Cisco it's show access lists.
Now, let's say for example, you're trying to figure out
why the network clients and the internet filter group
are not able to access Google, Facebook
or Dion training's websites.
You might log into your firewall or router
and check the current ACL restrictions.
In this example,
you can see there's a deny statement in line 20
for the internet filter group.
And it states that all TCP network traffic
from any IP to any IP over any port
should be blocked by this rule.
Basically, any clients have been added
to the internet filter group
will be unable to connect to any websites
because they're using TCP to connect a report 80
or port 443, when they're trying to go to a website.
Similarly, if we have a client in the one-on-one group
and it's having timing issues,
we could look at our ACL and see what the root causes
looking at line 10 within the one-to-one access control list
states to deny any UDP traffic
from any IP to any IP that uses NTP,
which is port 123 and use for the network time protocol.
The problem here is that NTP operates using UDP traffic.
So the single line in the ACL
will break all MTP functionality
for any devices assigned to group 101.
So when you're writing or editing an ACL rule,
always be careful to think through
what you're intending to do with that rule.
First, you need to ensure there's no typos in your rules
because this will cause a lot of issues,
they'll result in traffic being blocked.
When it really shouldn't be.
Second, verify the protocol important numbers
that you're referencing in your rule
and ensure they're correct.
Do you really want to block TCP or UDP?
Make that decision?
You want to block a specific port or all ports?
All of this is important to consider.
Third, verify the source and destination addresses
are referenced by the rule.
Did you include the correct IP address or network IP
and the correct subnet mask?
A simple typo like 0.0.255.255 instead of 0.0.0.255
is going to cost 65,636 IPs to be blocked.
Instead of the 256 IPS, you were intending to block.
Fourth, verify the order of the rules
is being applied correctly.
Remember ACL's are always processing order
from the top of the list to the bottom of the list.
Your most specific rules need to be first
and your motion rules need to be at the end.
Let's consider this example and see if we can determine
why a network client can't connect to Google servers
at 8.8.8.8 from within the Dion training group of clients.
Now, first, we're going to pull up the access control list
and look for the Dion training group rules.
Under these rules,
we look under the rules pertaining to this issue.
In this case,
we can't reach the server located at 8.8.8.8.
So if we look at rule 20,
we're going to see there's a permit rule for all TCP traffic
going from any IP, going to the server at 8.8.8.8,
if it's over port 80, which is used for web traffic.
So based on this rule loan,
the traffic should be able to reach the server.
Now, let's see what other rules we have
for servers at 8.8.8.8.
Now we have one rule at line 40,
and it again says to permit traffic over TCP
from any IP to the server at 8.8.8.8 using port 25.
So we're going to allow email traffic over SMTP
to be sent from any of our clients
to the server at 8.8.8.8
Again, this seems fine, and we shouldn't have an issue.
Now, remember, ACL rules are implied in order,
and once it finds a matching rule,
it's going to stop as it goes down the access list.
So look at it from the beginning.
The first rule is line 10.
It says to deny any TCP traffic
from any IP address to any IP address.
And this applies to all ports because none were specified.
So if I'm trying to visit the server at 8.8.8.8,
will rule 10 match this packet?
Is it going to go from any IP to any IP using TCP?
Yes, yes it is.
Therefore the traffic is going to be blocked
and it will never get to rule 20 or rule 40
that specifically allow traffic to this server
at 8.8.8.8 over port 80 or port 25.
So instead we can change the order of this ACL
and we're going to put the more specific lines
like 20 and 40 at the top.
So we're going to make them 10 and 20 respectfully.
Then we're going to take the current line 10
and move it to the bottom of our list.
So to make this easier to see I'm creating a new group here
called Dion training new at the bottom of this ACL.
Here, you can see the difference in the order
from Dion training group to the Dion training new group.
So notice I now have our most specific ACL
listed at 10 and 20 and a more generic one at line 30,
which is for the any IP to any IP, but for a specific port.
Then I have my most generic rules at the bottom,
lines, 40 and 50.
This is going to block all traffic for UDP
and all traffic for TCP.
Remember when you're troubleshooting issues with firewalls,
always check your ACL's
to ensure they're in the right sequence
and that you haven't missed typed anything in them
because this can lead to a lot of connectivity issues
and the wrong traffic being blocked
or being allowed through your firewall.
Similarly, when you're dealing with software firewalls,
like the windows defender firewall,
it's important to look not just at the IP addresses
and ports that are being blocked,
but also you need to look at the
applications and services themselves.
Under your windows defender firewall,
you're going to see inbound rules and outbound rules listed.
Under each type,
you're going to see the name of the application or service
and whether it's allowed or denied.
Then you're going to see if any specific IP addresses reports
are being allowed or blocked
with those applications and services.
Just like in the earlier examples with network firewalls,
a simple typo here can cause a lot of connectivity problems
for your clients and your servers.
So always double check your ACL's
to ensure they're blocking and allowing
exactly what you want them to do and in the right order.
DNS and NTP Issues.
In this video, we're going to discuss how to troubleshoot DNS
and NTP issues.
First let's focus on DNS.
Remember, DNS is used to match the domain names
with the corresponding IP addresses
that are used by a server.
This allows us to use memorable domain names
while our computers can access the information
using those IP addresses.
If your network clients
are unable to resolve their domain names to IP addresses
such as figuring out that diontraining.com
is supposed to point to 45.79.184.180, for example,
then you most likely have a DNS issue.
So first you needed to determine
if the issue is occurring on a single network client,
or is it a larger wide-scale DNS issue
on your network?
If it's only affecting one client,
then it's most likely going to be an issue
with that client's TCP/IP settings.
By running the IP, ifconfig or ip commands,
you can determine the IP address of the assigned DNS server.
Once you have that IP,
you should verify connectivity between your client
and that DNS server.
If there's no connectivity between them,
then you need to troubleshoot the connection at layer one
layer two, or layer three of the OSI model
to fix this DNS issue,
because your client simply can't reach the DNS server.
If your client can reach the DNS server,
but there's still a DNS issue,
then you need to either flush the DNS cache on the client
or change the configuration to allow the client
to use a different DNS server.
Something like Google's DNS servers
located at 8.8.8.8 and 8.8.4.4.
On the other hand,
if a client doesn't seem to be having an issue
with their configuration,
it may be your DNS server itself
is not properly responding.
In this case, you're going to troubleshoot your DNS server.
Now, this is usually going to be an issue
specifically for people who run their own websites
and control their own DNS records.
In these cases,
you need to verify that your A records
and your CNAME records were properly created.
With an A record,
you need to ensure the domain name is typed in properly,
and the IP address has been entered correctly.
A simple typo on either of these two parts of the A record
will cause users to not be able to locate your servers
and they won't be able to access them
using your domain name.
For your CNAME or Canonical Name records,
you need to ensure that the domain name used
as the source and destination are both spelled properly,
otherwise, you can be redirecting users to the wrong server
or to someplace that doesn't exist.
To verify your ANAME and CNAME records,
you can use the nslookup command.
Another common issue at DNS records
is the Time to Live
or TTL might be set incorrectly.
If the Time to Live is set too high,
the old DNS records will remain cached
until the Time to Live expires.
So if you have a Time to Live of 86,400 seconds,
your DNS server records won't expire
or be refreshed by DNS cache
until at least one day has elapsed.
In general, I like to keep my Time to Live
on my DNS server records at a pretty short interval,
something like 300 seconds,
which is about five minutes.
This avoids any caching issues
if I'm making frequent changes to my networks
or my websites.
Now another issue with DNS that occurs
is one of high latency.
If your DNS records are hosted far away from your users,
that's going to take more time and more delay
for them to access those records
when they're looking up a particular domain.
This is known as DNS Latency.
To reduce DNS latency
and improve the overall network performance for your users,
you should use DNS servers
that are located closer to your users,
such as one that you host yourself
within your DMZ or screened subnet,
or one hosted by your internet service provider directly.
Next, we're going to discuss NTP
or the Network Time Protocol.
And there's some issues around this as well.
Remember, NTP is a protocol
that allows the synchronization of system clocks
between different layers of a hierarchal,
semi-layered system of time sources.
This is important
because many of our distributed applications,
such as network authentication,
they're going to rely on proper synchronization of time
between your client and a server,
and our networks use NTP to do all of that.
In general, issues with NTP
are caused by the NTP packets not being received.
NTP packets may not be processed,
or the NTP packets have errors or packet loss.
If the NTP packets are not being received,
this needs to be troubleshot
to determine the root cause.
You need to begin at the physical layer
and ensure your clients and servers are properly connected
and cabled to your network.
Then if the NTP server is on your Local Area Network,
you need to verify it's communicating
between the client and the server
using their MAC addresses properly.
If the NTP servers located outside the Local Area Network,
you need to verify that the client can communicate
to that server using layer three IP addresses
for that server.
Now in general, if NTP packets are not being received,
this is more of a general network communication issue
at layer one, layer two, layer three,
or possibly a DNS server issue,
if you're referring to that NTP server
using its domain name and not its IP address.
Now, if the NTP packets are being received,
but they're not being processed properly,
you need to look at the network client or the NTP server
to ensure they're operating the NTP service
to read and process those NTP packets
that are being sent and received by these devices.
If the NTP process or service
doesn't act on the NTP packets being received,
there's going to be network communication issues
with other services, things like HTTPS
and network authentication processes.
Now, if the NTP packets are processed,
but there's errors or packet loss in them,
there's going to be a loss of time synchronization
that can occur.
The loss of synchronization might occur
if dispersion or delayed value for server goes really high.
High values indicate that packets are taking way too long
to get to the client from the server
in reference to the root of the clock.
So the local machine cannot trust the accuracy of the time
present in the packet
because it doesn't know how long
it took the packet to get there.
If there's a saturated link
or buffering is occurring along the way,
the packets can get delayed
as they come to the NTP client.
Now, the timestamp contained within a subsequent NTP packet
can occasionally vary a lot
and the local client cannot really adjust for that variance.
So if you're seeing errors
or lost packets with NTP,
that's going to cause a lot of loss of synchronization for you.
And you need to ensure that there's no saturation
in your network connections
and that your network connectivity is adequate
to be able to send the NTP packets in a timely manner.
Network performance issues.
In this video, we're going to discuss
how to troubleshoot network performance issues
that you may experience out in the field.
Now the five most common causes
of network performance issues
are high CPU usage in a network device,
high bandwidth usage in a network,
poor physical connectivity,
malfunctioning of your network or DNS problems.
First, it's important to realize that every network device
such as your routers, switches and firewalls
are at their core, a computer.
That includes a CPU or central processing unit.
If that device begins to experience
a high CPU utilization rate,
that device is going to start slowing down and in turn,
the network that is being processed for all those packets
is also going to slow down.
So whenever a CPU is overutilized,
the latency, jitter and packet loss will start to increase
and this can cause the entire network performance
to deteriorate on you.
So to solve this issue, you need to either
upgrade your network devices to more powerful ones
such as enterprise class routers and firewalls
or you need to simplify the processing load
that you're putting on those devices.
For example, I once saw an enterprise network
where their border firewall
was slowing down the entire network.
Now when we looked at it closer,
we saw their access list had over 3,000 entries in it.
That meant that every time a packet was received,
it was checked against these 3,000 individual entries
to find its match or to eventually block that packet.
Now this consumes a lot of processing time
and leads to high CPU utilization rates.
Now we conducted an ACO review
and we were able to simplify their rule set
down to about 300 rules.
This drastically reduced the CPU utilization rate they had
and sped up the network.
Second, high bandwidth utilization
is another cause of network performance deterioration.
Now when bandwidth utilization is high,
network communications have to wait
to enter or leave that network.
This can cause buffers to fill up
and in the worst cases, packets can be dropped.
Now when those packets are dropped,
they're going to be retransmitted if they were sent using TCP.
And this leads again,
to even higher bandwidth utilization rates
because we have retransmissions.
To solve this issue,
you can either increase your bandwidth size
by paying more to your internet service provider
or you can do a network flow analysis
and determine what sites and traffic types
are being used by all of your clients.
For example, if 90% of your traffic is being wasted
by people scrolling Facebook each day,
you may need to change your acceptable use policy
or reduce or eliminate
when people are allowed to use Facebook on your network.
Literally, I had one network where 90% of our traffic
was either going to or coming from Facebook
and our end users kept complaining
because they couldn't do any real work on their job
because our internet was so slow.
And this is why conducting a NetFlow analysis
can really help you understand
what your users are really doing on your network
and is it something you want to allow.
Third, you may have network performance issues
if you have a poor physical connection.
To solve this, you're going to need to check your cables
and test them one by one.
Now if you suspect it's an issue
with the internet search provider's portion of the network,
you need to connect a test client
directly to the demarcation point
and test the connection from there.
If that connection is poor,
then you know it's your ISP's problem to solve.
If it isn't, that means it's something in your network
that's the problem and you need to start testing every cable
from the from the demarc point
all the way back to your border router
and then to your switch and then to your client
until you find where that broken or damaged cable might be
that's causing the slowdown in your network connection.
Remember, a damaged cable may still operate,
but it's going to cause additional errors
and these errors require data
to be retransmitted over and over again
and this slows down your overall network performance.
To test your cables, always use a cable tester
for twisted pair connections
or a fiber light meter for fiber optic connections.
Fourth, we have malfunctioning of our network.
Now if you have misconfigurations of your devices
or hardware failures,
your network performance is obviously going to suffer.
Sometimes this can even be caused
by using old or outdated network operating systems.
Again, this is an area
where your seven step troubleshooting method
is going to help you identify the exact location
of the device that's having these issues
and then you can focus on whether it's a configuration issue
or a hardware failure issue
that's causing those network performance issues.
Finally, fifth, we have DNS problems in our network.
Now we already talked specifically about DNS issues
in a separate lesson,
but DNS issues are a serious cause
of a lot of our network performance issues.
Remember, if you have a high DNS latency,
this is going to slow down the overall user experience
because when that user requests a website,
they first have to go and resolve that domain name
all the way out to that DNS server
and get the IP address over DNS.
Other issues.
In this video we're going to discuss some other issues
you may need to troubleshoot.
Things like low optical link budgets, certificate issues,
license feature issues, BYOD challenges
and hardware failures.
First, let's talk about low optical link budgets.
And what exactly is an optical link budget?
Now an optical link budget is a calculation that considers
all the anticipated losses along the length
of a fiber optic connection.
This is important to understand.
Because the light signal that's going across
that fiber optic cable will lose signal strength
as it travels down this cable.
Now this occurs naturally due to the distance of the cable,
as well as from losses due to multiplexing,
benzing your cable, imperfect connections, patches
or splices that happen along the fiber optic cable.
If you experience a low optical link budget,
your fiber connection will experience issues
such as reduced transmission efficiency,
slower connection speeds
or even downtime on that connection.
To measure the condition of your fiber optic connection,
you're going to use an optical time domain reflectometer
to measure the amount of losses or reflections
that are occurring in the connection.
This reading from the optical time domain reflectometer
is going to be reported in decibels per kilometer.
And this indicates how much attenuation and degradation
is occurring over the length of that connection.
Normally, you should experience 0.25 decibels per kilometer
for a standard fiber optic cable.
But if you experience a higher rate than this,
then you may have a low optical link budget.
To calculate your link budget.
You simply take the receiver's power budget or how much
initial signal you're going to be transmitting out,
and then you subtract any multiplexing and demultiplexing
losses as well as losses from the fiber itself
that's caused by those distances and the imperfections.
And any losses from the connectors or patch panels
that are being used as well.
Now, this will give you the total optical link budget.
For example, let's say I designed a fiber optic circuit
with a receiver that can sense light received between
negative seven decibels and negative 23 decibels.
And I send the signal out at positive five decibels.
Now, if I only have a loss of 20 decibels
due to the distance, the connectors
and a splice in that cable.
The is going to be able to pick up that signal
because I still have negative 15 decibels of light signal
being received at that distant end.
And negative 15 is in between negative seven
and negative 23.
On the other hand, if the fiber connection was broken
and somebody went to repair it by splicing that connection,
maybe they did a really bad job of it.
And adds an extra 25 decibels of signal loss.
Now I'm going to transmit at the same five decibels
that I was before.
But I'm losing 15 decibels for distance
in that first splice.
And now because of this poor second splice,
I'm losing another 25 decibels.
This brings my total value on the receiving end
to negative 35 decibels.
And that means the receiver can't pick up that signal
because it can only sense the signals between negative seven
and negative 23 decibels.
And negative 35 is far too weak for the receiver to see it.
Now, we're going to have a broken fiber link essentially,
because we have a low optical link budget level.
So, what can we do to fix this?
Well, we can either increase the power of the transmitter
to say plus 20 decibels instead of plus five decibels.
Or we can have somebody go back and try to do a better job
of splicing that cable.
Now, this isn't a very realistic example
because most professional splices will only cause a loss
of 0.1 or 0.2 decibels.
But hopefully you're getting the idea of how low optical
link budget can work and negatively affect
your fiber networks.
Next, we have certificate issues
that can cause network issues for us as well.
A digital certificate is used as a credential
to facilitate the verification of identities
between users inside of a transaction.
For example, when you attempt to connect
to an e-commerce site over HTTPS,
your network client uses digital certificates
to validate the server's identity and decide
if it can really trust that server when sending sensitive
information over to it.
The most common certificate issues are going to occur
on a websites SSL or TLS certificate
when it's displaying as untrusted.
Now, this occurs for one of three reasons.
It can be that the digital certificate is not signed
by a trusted certificate authority,
the certificate itself has already expired
or the server didn't have a certificate associated
with a trusted route certificate.
Now, regardless of which of these three things is happening,
the end result is going to be the same.
Your client's browser is not going to show a secure
connection over HTTPS because it's web browser
and the server are not communicating over a secure tunnel.
Now, in either of these cases,
you can't solve the issue for your network clients
because you don't own that web server.
But if you were the one who owned that web server,
then it becomes your problem to fix.
Now in this case, you need to purchase a digital certificate
from a trusted certificate authority and install it.
Or you need to renew your expired digital certificate.
Or you need to install a certificate from a trusted
certificate authority with a valid route certificate
on your server.
In addition to using digital certificates with HTTPS
websites,
we also can use digital certificates inside of our networks
for network authentication using 802.1X with EAP.
In these cases, your security team's going to run
your organizations own certificate authority
to create these digital certificates and issue them
to the network clients and the servers.
Again,
if you're having issues with these digital certificates,
you need to ensure they're trusted, that they're not expired
and that they're installed properly on the network devices
and the network clients.
Next, we need to talk about licensed feature issues
that could arise in your networks.
Sometimes when troubleshooting issues in your network,
you may come across an error message such as error,
feature not licensed.
Now as you can see in this example
from a NetScaler VPX appliance,
there are many different features that are enabled
or disabled based upon the license has been purchased
by this organization.
For example, the license they have purchased will allow them
to do load balancing and content switching.
But it does not support global server load balancing
or clustering.
This is a different feature set that requires a different
and more expensive license.
Now if you get an error concerning a particular license
feature in this or another network device,
you first need to determine what license
you have loaded on that device.
Then compare the license you loaded
with the features it unlocks.
If the license is unlocking the features you expected,
you may need to contact the manufacturer to troubleshoot
the issue.
But you may realize you simply purchase the wrong license
for the features that you need.
And in this case,
you need to work with your organization's purchasing agents
and their contracting professionals to get the right license
procured so you can load it up into the device.
Now this is a common issue in large bureaucratic
organizations where the people who use the things
and install the devices are not the same ones
who are empowered to make purchasing decisions.
As a young network administrator.
I remember submitting the requisition forms
to my organization for all the licenses I needed.
I specified that I needed the platinum license.
And the contracting person decided, you know what,
the gold license would be just fine
because it costs 35% less.
Well, guess what?
That contracting person didn't know that a gold license
didn't include the three critical features
that we actually needed.
And those features were the whole reason we were buying
this particular network appliance.
So, when we received the license key
and we tried to load it up on the network appliance,
we kept getting the feature not licensed error message.
And it took us almost two days to figure out
that the reason was our organization gave us a gold license
and not a platinum license that we really needed.
So learn from our mistake.
Make sure you tell the contract personnel
that substitutions are simply not allowed.
You need this level of license or just won't work
for the features you need.
Next let's discuss BYOD challenges
or bring your own device challenges.
Now I don't want to specifically focus on security
challenges associated with BYOB policies.
Because we've already talked about that in other videos.
Instead, I really want to focus on the networking issues
that you may come across when you're trying to support
a BYOB policy inside your organization.
Now BYOD or bring your own device is this policy
that allows your end users to bring their own smartphones,
tablets, laptops and other technical devices into work
and use them on your organization's network.
Now BYOB allows the organization to save money
by not having to purchase all these devices
for the employees.
But instead they're relying on the employees
to bring their own equipment and their own devices
and then do the business on those devices
using your organization's network.
Now the biggest challenge with BYOD
besides securing these devices,
is actually supporting these devices.
When a user brings their own device,
you're no longer supporting one or two models of laptops,
but instead you've got 50 or 100
or 200 different varieties now.
Your employees may bring a Windows 10 Home Edition laptop
or a MacBook Air or a Chromebook.
And guess what,
you're going to be expected to support all of them.
This is a massive headache and a huge challenge
for support personnel,
like our service desk and our network technicians.
Now, when a device doesn't work properly
like we want to expect it to,
we have to determine is it the device
or is it some software the user loaded
or is it a network issue that we need to solve?
This makes it very challenging.
Honestly, well many organizations think that implementing
a BYOB policy can save them a lot of money
because they'll have a reduced capital expenditure
or CapEx costs.
It really just increases your OPEX
or operational expenditures because now you're wasting
so much time on labor hours to support and troubleshoot
all these different devices.
Another challenge with supporting these devices is ensuring
the security of your network and how these devices
are going to access your network.
Are you going to let these devices connect
on your wired network connections
or are you going to make them use wireless?
We require that they be registered ahead of time
so you know what their MAC addresses are and they can be
identified in waitlist.
Or are you going to require these BYOD devices
to remain on a separate VLAN?
That way they're not going to touch your internal network
services, and if they do,
they have to pass through a screened sub-net.
All of these are valid questions to consider
as you determine how you're going to support BYOB
on your network,
both operationally and from a troubleshooting
and repair perspective.
Finally, let's talk about hardware failures.
Hardware failures can occur all over your network.
Your routers, your switches and your firewalls
can fail for all sorts of reasons
just like your network clients can.
As you begin to troubleshoot this issue,
you need to pinpoint both which device is experiencing
the failure and which component on the device has failed.
Once you identify the device that failed,
such as a router that isn't passing traffic
from one subnet to another.
You then need to identify the component that failed.
Most components on our network devices
are field replaceable.
Which means you can swap them out with different components
and get the device back up and operational very quickly.
For example, if we had one of our dual power supplies fail
in a border router,
we can schedule an emergency maintenance window.
We can power down the device, open up the chassis,
replace the broken power supply
and then return the device to normal operations.
If an interface card or module is broken or defective,
we can simply replace that as well.
And many of these are considered hot pluggable modules.
So if you have an SFP plus module that fails,
we can simply replace it without even shutting down
the network device or taking it offline.
If a client or server on the other hand
is found to have a defective component or hardware failure,
we can work with our CompTIA A+ technicians
to solve those issues by replacing the associated
hardware components.
Normally with a defective or field piece of hardware,
the fastest way to restore service is simply to replace
the component that's failed us.
In some cases,
such as a failed motherboard on a router or switch,
you may need to replace the entire device.
In these cases, you should get a spare switch or router
from your supply closet, mounted into the rack,
load up your backup configurations from the failed device
and put that into the replacement device
and then reconnect all the cables to it.
And finally restore service using your new device.
Then you can take the field device out of the rack,
return it to the manufacturer for repair
and then it can become part of your spares in the future
if it's under warranty or you could dispose of it properly
if it's reached the end of its useful life.