Troubleshooting Connectivity of WAN
·
·
Troubleshooting with Diagnostic Utilities
·
The Trace Route Utility (tracert/trace route)
·
ping
·
The Destination Host Unreachable Message
·
The Request Timed Out Message
·
The Unknown Host Message
·
The Expired TTL Message
·
Troubleshooting with ping
·
ARP
·
The net stat Command
·
net stat e
·
net stat -a
·
net stat -r
·
net stat s
·
nbtstat
·
The ipconfig Command
·
ifconfig
·
The winipcfg Command
·
nslookup
·
dig
·
Interpreting Visual Indicators
·
LEDs on Networking Devices
·
LEDs on NICs and Other Devices
·
Troubleshooting Remote Connectivity
·
Troubleshooting Physical Connectivity
·
DSL
·
Cable Troubleshooting Procedures
·
Home Satellite Troubleshooting Procedures
·
Wireless Internet Access Troubleshooting
Procedures
·
POTS Troubleshooting Procedures
·
Modem-Specific Troubleshooting
·
Troubleshooting Authentication Failure
·
Troubleshooting Protocol Configuration Problems
·
Troubleshooting Small Office/Home Office Router
·
Configuration
·
Troubleshooting
·
Identifying and Troubleshooting Client
Connectivity Problems
·
Protocol Errors
·
Protocol-Specific Issues
·
Authentication
·
Permissions Errors
·
Physical Connectivity Errors
·
Troubleshooting Checklists
·
Troubleshooting Cabling Problems
·
Troubleshooting Operating System Connectivity
·
Troubleshooting Network Printing
·
Troubleshooting Data Access
·
Troubleshooting NICs
Troubleshooting Connectivity
For anyone working with
TCP/IP networks, troubleshooting connectivity is something that is simply going
to have to be done. This tutorial identifies the tools that are used in the
troubleshooting process and identifies scenarios in which these tools can be
used.
Troubleshooting with Diagnostic Utilities
Many utilities can be used
when troubleshooting TCP/IP. Although the actual utilities available vary from
platform to platform, the functionality between platforms is quite similar.
Table 1 lists the TCP/IP troubleshooting tools along with their purpose.
Table
1 Common TCP/IP Troubleshooting Tools and Their Purpose
|
|
Tool
|
Purpose
|
tracert/trace route
|
Used to track the path a packet
takes as it travels across a network. tracert is used on Windows systems, trace
route is used on UNIX, Linux, and Macintosh systems.
|
Ping
|
Used to test connectivity between
two devices on a network.
|
Arp
|
Used to view and work with the IP
address to MAC address resolution cache.
|
Net stat
|
Used to view the current TCP/IP
connections on a system.
|
Nbtstat
|
Used to view statistics related to
NetBIOS name resolutions, and to see information about current NetBIOS over
TCP/IP connections.
|
Ipconfig
|
Used to view and renew TCP/IP
configuration on a Windows system.
|
Ifconfig
|
Used to view TCP/IP configuration
on a UNIX, Linux or Macintosh system.
|
Winipcfg
|
Graphical tool used to view TCP/IP
configuration on Windows 95, 98, and Me.
|
nslookup/dig
|
Used to perform manual DNS
lookups. nslookup can be used on Windows, UNIX, Macintosh, and Linux systems.
dig can only be used on UNIX, Linux, and Macintosh systems.
|
The following sections look in more detail at these utilities and
the output they produce.
The Trace Route Utility (tracert/trace
route)
The trace route utility does exactly what its name implies it
traces the route between two hosts. It does this by using Internet Control
Message Protocol (ICMP) echo packets to report information back at every step
in the journey. Each of the common network operating systems provides a trace
route utility, but the name of the command and the output vary slightly on
each. Table 2 shows the trace route command syntax used in various operating
systems
Table
2 Trace Route Utility Commands
|
|
Operating System
|
Trace Route Command Syntax
|
Windows Server 2000/2003
|
tracert <IP address>
|
Novell NetWare
|
iptrace
|
Linux/UNIX
|
trace route <IP address>
|
Macintosh
|
trace route <IP address>
|
Trace route provides a lot of useful information, including the IP
address of every router connection it passes through and, in many cases, the
name of the router (although this depends on the router's configuration). Trace
route also reports the length, in milliseconds, of the round-trip the packet
made from the source location to the router and back. This information can help
identify where network bottlenecks or breakdowns might be. The following is an
example of a successful tracert command
on a Windows 2000 system:
C:\>tracert 24.7.70.37
Tracing route to c1-p4.sttlwa1.home.net [24.7.70.37] over a
maximum of 30 hops:
1 30 ms
20 ms 20 ms 24.67.184.1
2 20 ms
20 ms 30 ms rd1ht-ge3-0.ok.shawcable.net
[24.67.224.7]
3 50 ms
30 ms 30 ms rc1wh-atm0-2-1.vc.shawcable.net
[204.209.214.193]
4 50 ms
30 ms 30 ms rc2wh-pos15-0.vc.shawcable.net
[204.209.214.90]
5 30 ms
40 ms 30 ms rc2wt-pos2-0.wa.shawcable.net
[66.163.76.37]
6 30 ms
40 ms 30 ms c1-pos6-3.sttlwa1.home.net
[24.7.70.37]
Trace complete.
Similar to the other common operating systems, the tracert display on a Windows-based system includes several columns
of information. The first column represents the hop number. You may recall that
'hop' is the term used to describe a step in the path a packet takes as it
crosses the network. The next three columns indicate the round-trip time, in
milliseconds, that a packet takes in its attempts to reach the destination. The
last column is the hostname and the IP address of the responding device.
Of course, not all trace route attempts are successful. The
following is the output from a tracert command
on a Windows Server 2003 system that doesn't manage to get to the remote host:
C:\>tracert comptia.org
Tracing route to comptia.org [216.119.103.72]
Over a maximum of 30 hops:
1 27 ms
28 ms 14 ms 24.67.179.1
2 55 ms
13 ms 14 ms rd1ht-ge3-0.ok.shawcable.net
[24.67.224.7]
3 27 ms
27 ms 28 ms rc1wh-atm0-2-1.shawcable.net
[204.209.214.19]
4 28 ms
41 ms 27 ms rc1wt-pos2-0.wa.shawcable.net
[66.163.76.65]
5 28 ms
41 ms 27 ms rc2wt-pos1-0.wa.shawcable.net
[66.163.68.2]
6 41 ms
55 ms 41 ms c1-pos6-3.sttlwa1.home.net
[24.7.70.37]
7 54 ms
42 ms 27 ms home-gw.st6wa.ip.att.net
[192.205.32.249]
8 * *
* Request timed out.
9 * *
* Request timed out.
10 * *
* Request timed out.
11 * *
* Request timed out.
12 * *
* Request timed out.
13 * *
* Request timed out.
14 * *
* Request timed out.
15 * *
* Request timed out.
In this example, the trace route request only gets to the seventh
hop, at which point it fails; this failure indicates that the problem lies on
the far side of the device in step 7 or on the near side of the device in step
8. In other words, the device at step 7 is functioning but might not be able to
make the next hop. The cause of the problem could be a range of things, such as
an error in the routing table or a faulty connection. Alternatively, the
seventh device might be operating 100%, but device 8 might not be functioning
at all. In any case, you can isolate the problem to just one or two devices.
The trace route utility can also help you isolate a heavily
congested network. In the following example, the trace route packets fail in
the midst of the tracert from
a Windows Server 2003 system, but subsequently are able to continue. This
behavior can be an indicator of network congestion:
C:\>tracert comptia.org
Tracing route to comptia.org [216.119.103.72]over a maximum of 30
hops:
1 96 ms
96 ms 55 ms 24.67.179.1
2 14 ms
13 ms 28 ms rd1ht-ge3-0.ok.shawcable.net
[24.67.224.7]
3 28 ms
27 ms 41 ms rc1wh-atm0-2-1.shawcable.net
[204.209.214.19]
4 28 ms
41 ms 27 ms rc1wt-pos2-0.wa.shawcable.net
[66.163.76.65]
5 41 ms
27 ms 27 ms rc2wt-pos1-0.wa.shawcable.net
[66.163.68.2]
6 55 ms
41 ms 27 ms c1-pos6-3.sttlwa1.home.net
[24.7.70.37]
7 54 ms
42 ms 27 ms home-gw.st6wa.ip.att.net
[192.205.32.249]
8 55 ms
41 ms 28 ms gbr3-p40.st6wa.ip.att.net
[12.123.44.130]
9 * *
* Request timed out.
10 * *
* Request timed out.
11 * *
* Request timed out.
12 * *
* Request timed out.
13 69 ms
68 ms 69 ms gbr2-p20.sd2ca.ip.att.net
[12.122.11.254]
14 55 ms
68 ms 69 ms gbr1-p60.sd2ca.ip.att.net
[12.122.1.109]
15 82 ms
69 ms 82 ms gbr1-p30.phmaz.ip.att.net
[12.122.2.142]
16 68 ms
69 ms 82 ms gar2-p360.phmaz.ip.att.net
[12.123.142.45]
17 110 ms
96 ms 96 ms 12.125.99.70
18 124 ms
96 ms 96 ms
light.crystaltech.com [216.119.107.1]
19 82 ms
96 ms 96 ms 216.119.103.72
Trace complete.
Generally speaking, trace route utilities allow you to identify the
location of a problem in the connectivity between two devices. After you have
determined this location, you might need to use a utility such as ping to continue troubleshooting. In many cases, as in the
examples provided in this chapter, the routers might be on a network such as
the Internet and therefore not within your control. In that case, there is
little you can do except inform your ISP of the problem.
ping
Most network administrators are very familiar with the ping utility and are likely to use it on an almost daily basis.
The basic function of the ping command
is to test the connectivity between the two devices on a network. All the
command is designed to do is determine whether the two computers can see each
other and to notify you of how long the round-trip takes to complete.
Although ping is
most often used on its own, a number of switches can be used to assist in the
troubleshooting process. Table 3 shows some of the commonly used switches
with ping on
a Windows system.
Table
3 ping Command Switches
|
|
Option
|
Description
|
ping -t
|
Pings a device on the network
until stopped
|
ping -a
|
Resolves addresses to hostnames
|
ping -n count
|
Specifies the number of echo
requests to send
|
ping -r count
|
Records route for count hops
|
ping -s count
|
Timestamp for count hops
|
ping -w timeout
|
Timeout in milliseconds to wait
for each reply
|
ping works
by sending ICMP echo request messages to another device on the network. If the
other device on the network hears the ping request,
it automatically responds with an ICMP echo reply. By default, the ping command on a Windows-based system sends four data packets;
however, using the -t switch,
a continuous stream of ping requests
can be sent.
ping is
perhaps the most widely used of all network tools; it is primarily used to
verify connectivity between two network devices. On a good day, the results
from the ping command
will be successful, and the sending device will receive a reply from the remote
device. Not all ping results
are that successful, and to be able to effectively use ping, you must be able to interpret the results of a failed ping command.
The Destination Host Unreachable
Message
The Destination Host Unreachable error message means that a route
to the destination computer system cannot be found. To remedy this problem, you
might need to examine the routing information on the local host to confirm that
the local host is correctly configured, or you might need to make sure that the
default gateway information is correct. The following is an example of a ping failure that gives the Destination host unreachable message:
Pinging 24.67.54.233 with 32 bytes of data:
Destination host unreachable.
Destination host unreachable.
Destination host unreachable.
Destination host unreachable.
Ping statistics for 24.67.54.233:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),
Approximate round trip times in mille-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
The Request Timed Out Message
The Request Timed Out error message is very common when you use
the ping command.
Essentially, this error message indicates that your host did not receive
the ping message
back from the destination device within the designated time period. Assuming
that the network connectivity is okay on your system, this is typically an indicator
that the destination device is not connected to the network, is powered off, or
is not configured correctly. It could also mean that some intermediate device
is not operating correctly. In some rare cases, it can also indicate that there
is so much congestion on the network that timely delivery of the ping message could not be completed. It might also mean that the ping is being sent to an invalid IP address or that the system is not
on the same network as the remote host, and an intermediary device is not
configured correctly. In any of these cases, the failed ping should initiate a troubleshooting process that might involve
other tools, manual inspection, and possibly reconfiguration. The following
example shows the output from a ping to
an invalid IP address:
C:\>ping 169.76.54.3
Pinging 169.76.54.3 with 32 bytes of data:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Ping statistics for 169.76.54.3:
Packets: Sent = 4,
Received = 0, Lost = 4 (100%
Approximate round trip times in mille-seconds:
Minimum = 0ms, Maximum =
0ms, Average = 0ms
During the ping request,
you might receive some replies from the remote host that are intermixed
with Request timed out errors.
This is often a result of a congested network. An example follows; notice that
this example, which was run on a Windows Me system, uses the -t switch to generate continuous pings:
C:\>ping -t 24.67.184.65
Pinging 24.67.184.65 with 32 bytes of data:
Reply from 24.67.184.65: bytes=32 time=55ms TTL=127
Reply from 24.67.184.65: bytes=32 time=54ms TTL=127
Reply from 24.67.184.65: bytes=32 time=27ms TTL=127
Request timed out.
Request timed out.
Request timed out.
Reply from 24.67.184.65: bytes=32 time=69ms TTL=127
Reply from 24.67.184.65: bytes=32 time=28ms TTL=127
Reply from 24.67.184.65: bytes=32 time=28ms TTL=127
Reply from 24.67.184.65: bytes=32 time=68ms TTL=127
Reply from 24.67.184.65: bytes=32 time=41ms TTL=127
Ping statistics for 24.67.184.65:
Packets: Sent = 11,
Received = 8, Lost = 3 (27% loss),
Approximate round trip times in mille-seconds:
Minimum = 27ms, Maximum =
69ms, Average = 33ms
In this example, three packets were lost. If this continued on
your network, you would need to troubleshoot to find out why packets were being
dropped.
The Unknown Host Message
The Unknown Host error message is generated when the hostname of
the destination computer cannot be resolved. This error usually occurs when
you ping an
incorrect hostname, as shown in the following example, or try to use ping with a hostname when hostname resolution (via DNS or a HOSTS text file) is not configured:
C:\>ping www.comptia.ca
Unknown host www.comptia.ca
If the ping fails,
you need to verify that the ping is
being sent to the correct remote host. If it is, and if name resolution is
configured, you have to dig a little more to find the problem. This error might
indicate a problem with the name resolution process, and you might need to
verify that the DNS or WINS server is available. Other commands, such as nslookup or dig, can
help in this process.
The Expired TTL Message
The Time to Live (TTL) is an important consideration in
understanding the ping command.
The function of the TTL is to prevent circular routing, which occurs when
a ping request
keeps looping through a series of hosts. The TTL counts each hop along the way
toward its destination device. Each time it counts one hop, the hop is
subtracted from the TTL. If the TTL reaches 0, the TTL has expired, and you get
a message like the following:
Reply from 24.67.180.1: TTL expired in transit
If the TTL is exceeded with ping, you might have a routing problem on the network. You can modify
the TTL for ping on
a Windows system by using the ping
-I command.
Troubleshooting with ping
Although ping does not completely isolate problems, you can use it to help
identify where a problem lies. When troubleshooting with ping, take the following steps:
1.
|
Ping the
IP address of your local loopback, using the command ping
127.0.0.1. If this command is successful, you know that the
TCP/IP protocol suite is installed correctly on your system and functioning.
If you are unable to ping the local loopback adapter, TCP/IP
might need to be reloaded or reconfigured on the machine you are using.
|
|
2.
|
Ping the
assigned IP address of your local network interface card (NIC). If the ping is successful, you know that your
NIC is functioning on the network and has TCP/IP correctly installed. If you
are unable to ping the local NIC, TCP/IP might not be
bound correctly to the NIC or the NIC drivers might be improperly installed.
|
|
3.
|
Ping the
IP address of another known good system on your local network. By doing so,
you can determine whether the computer you are using can see other computers
on the network. If you can ping other devices on your local network,
you have network connectivity.
If you cannot ping other devices on your local network and you were able to ping the IP address of your system, you might not be connected to the network correctly. |
|
4.
|
After you've confirmed that
you have network connectivity for the local network, you can verify
connectivity to a remote network by sending a ping to the IP address of the default
gateway.
|
|
5.
|
If you are able to ping the default gateway, you can verify
remote connectivity by sending a ping to the IP address of a system on a
remote network.
|
Using just the ping command in these steps, you can confirm network connectivity on
not only the local network, but also on a remote network. The whole process
requires as much time as it takes to type in the command, and you can do it all
from a single location.
If you are an optimistic person, you can perform step 5 first. If
that works, all the other steps will also work, saving you the need to test
them. If your step 5 trial fails, you can go back to step 1 and start the
troubleshooting process from the beginning.
ARP
The Address Resolution Protocol (ARP) is used to resolve IP
addresses to MAC addresses. This is important because on a network, devices
find each other using the IP address, but communication between devices
requires the MAC address.
When a computer wants to send data to another computer on the
network, it must know the MAC address of the destination system. To discover
this information, ARP sends out a discovery packet to obtain the MAC address.
When the destination computer is found, it sends its MAC address to the sending
computer. The ARP-resolved MAC addresses are stored temporarily on a computer
system in the ARP cache. Inside this ARP cache is a list of matching MAC and IP
addresses. This ARP cache is checked before a discovery packet is sent on to
the network to determine if there is an existing entry.
Entries in the ARP cache are periodically flushed so that the
cache doesn't fill up with unused entries. The following code shows an example
of the ARP command with the output from a Windows 2000 system:
C:\>arp -a
Interface: 24.67.179.22 on Interface 0x3
Internet Address Physical Address Type
24.67.179.1 00-00-77-93-d8-3d dynamic
As you might notice in the previous code, the type is listed as
dynamic. Entries in the ARP cache can be added statically or dynamically.
Static entries are added manually and do not expire. The dynamic entries are
added automatically when the system accesses another on the network.
As with other command-line utilities, there are several switches
available for the arp command.
Table 4 shows the available switches for Windows-based systems.
Table
4 ARP Switches
|
|
Switch
|
Description
|
-a or -g
|
Displays both the IP and MAC
addresses and whether they are dynamic or static entries
|
inet_addr
|
Specifies a specific internet
address
|
-N if_addr
|
Displays the ARP entries for a
specified network interface
|
eth_addr
|
Specifies a MAC address
|
if_addr
|
Specifies an Internet address
|
-d
|
Deletes an entry from the ARP
cache
|
-s
|
Adds a static permanent address to
the ARP cache
|
The net stat Command
The net stat command displays the protocol statistics and current TCP/IP
connections on the local system. Used without any switches, the net stat command shows the active
connections for all outbound TCP/IP connections. In addition, several switches
are available that change the type of information net stat displays. Table 5 shows
the various switches available for the netstatutility.
Table 5 net stat
Switches
|
|
| Switch |
Description |
| -a | Displays the current connections and listening ports |
| -e | Displays Ethernet statistics |
| -n | Lists addresses and port numbers in numerical form |
| -p | Shows connections for the specified protocol |
| -r | Shows the routing table |
| -s | Lists per-protocol statistics |
| interval | Specifies the length of time to wait before redisplaying statistics |
The net stat utility is used to show the port activity for both TCP and UDP
connections, showing the inbound and outbound connections. When used without
switches, the net stat utility has four information headings.
·
Proto Lists the protocol being used, either UDP or TCP.
·
Local address Specifies the local address and port being used.
·
Foreign address identifies the destination address and the port
being used.
·
State specifies whether the connection is established.
In its default usage, the net stat command shows outbound connections that have been established by
TCP. The following shows a sample output from a net stat command without using
any switches:
C:\>netstat
Active Connections
Proto Local Address Foreign Address State
TCP laptop: 2848 MEDIASERVICES1:1755 ESTABLISHED
TCP laptop: 1833 www.test.com:80 ESTABLISHED
TCP laptop: 2858 194.70.58.241:80 ESTABLISHED
TCP laptop: 2860 194.70.58.241:80 ESTABLISHED
TCP laptop: 2354 www.test.com:80 ESTABLISHED
TCP laptop: 2361 www.test.com:80 ESTABLISHED
TCP laptop: 1114 www.test.com:80 ESTABLISHED
TCP laptop: 1959 www.test.com:80 ESTABLISHED
TCP laptop: 1960 www.test.com:80 ESTABLISHED
TCP laptop: 1963 www.test.com:80 ESTABLISHED
TCP laptop: 2870 localhost: 8431 TIME_WAIT
TCP laptop: 8431 localhost: 2862 TIME_WAIT
TCP laptop: 8431 localhost: 2863 TIME_WAIT
TCP laptop: 8431 localhost: 2867 TIME_WAIT
TCP laptop: 8431 localhost: 2872 TIME_WAIT
Like any other command-line utility, they are often used with
switches. The following sections provide a brief explanation of the switches
and a sample output from each.
Net stat e
The net stat -e command
shows the activity for the NIC and displays the number of packets that have
been both sent and received. An example of the net stat -e command is shown here:
C:\WINDOWS\Desktop>netstat -e
Interface Statistics
Received Sent
Bytes
17412385 40237510
Unicast packets
79129 85055
Non-uncast packets
693 254
Discards
0 0
Errors 0 0
Unknown protocols
306
As you can see, the net
stat -e command shows more than just the packets that have been sent
and received:
- Bytes the number
of bytes that have been sent or received by the NIC since the computer was
turned on.
- Unicast packets
Packets sent and received directly to this interface.
- Non-unicast
packets Broadcast or multicast packets that were picked up by the NIC.
- Discards the
number of packets rejected by the NIC, perhaps because they were damaged.
- Errors The
errors that occurred during either the sending or receiving process. As
you would expect, this column should be a low number. If it is not, it
could indicate a problem with the NIC.
- Unknown
protocols the number of packets that were not recognizable by the system.
Net stat -a
The net stat -a command
displays statistics for both TCP and User Datagram Protocol (UDP). Here is an
example of the net stat -a command:
C:\WINDOWS\Desktop>netstat -a
Active Connections
Proto Local Address
Foreign Address State
TCP laptop: 1027 LAPTOP: 0 LISTENING
TCP laptop: 1030 LAPTOP: 0 LISTENING
TCP laptop: 1035 LAPTOP: 0 LISTENING
TCP laptop: 50000 LAPTOP: 0 LISTENING
TCP laptop: 5000 LAPTOP: 0 LISTENING
TCP laptop: 1035 msgr-ns41.msgr.hotmail.com:1863
ESTABLISHED
TCP laptop: nbsession LAPTOP: 0 LISTENING
TCP laptop: 1027 localhost: 50000 ESTABLISHED
TCP laptop: 50000 localhost: 1027 ESTABLISHED
UDP laptop: 1900 *:*
UDP laptop: nbname *:*
UDP laptop: nbdatagram *:*
UDP laptop: 1547 *:*
UDP laptop: 1038 *:*
UDP laptop: 1828 *:*
UDP laptop: 3366 *:*
As you can see, the output includes four columns, which show the
protocol, the local address, the foreign address, and the state of the port.
The TCP connections show the local and foreign destination addresses and the
current state of the connection. UDP, however, is a little different; it does
not list a state status because as mentioned throughout this book, UDP is a
connectionless protocol and does not establish connections. The following list
briefly explains the information provided by thenetstat -a command:
- Proto The
protocol used by the connection.
- Local Address the
IP address of the local computer system and the port number it is using.
If the entry in the local address field is an asterisk (*),
it indicates that the port has not yet been established.
- Foreign Address the
IP address of a remote computer system and the associated port. When a
port has not been established, as with the UDP connections, *:* appears in the column.
- State the
current state of the TCP connection. Possible states include established,
listening, closed, and waiting.
Net stat -r
The net stat -r command is often used to view the routing table for a system. A
system uses a routing table to determine routing information for TCP/IP
traffic. The following is an example of thenetstat -r command from a Windows
Me system:
C:\WINDOWS\Desktop>netstat r
Route table
===========================================================================
===========================================================================
Active Routes:
Network Destination Net mask Gateway Interface Metric
0.0.0.0 0.0.0.0 24.67.179.1 24.67.179.22 1
24.67.179.0 255.255.255.0 24.67.179.22 24.67.179.22 1
24.67.179.22 255.255.255.255 127.0.0.1 127.0.0.1 1
24.255.255.255 255.255.255.255 24.67.179.22 24.67.179. 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0 1
224.0.0.0 224.0.0.0 24.67.179.22 24.67.179.22 1
255.255.255.255 255.255.255.255 24.67.179.22 2 1
Default Gateway: 24.67.179.1
===========================================================================
Persistent Routes:
None
Net stat s
The net stat -s command displays a number of statistics related to the TCP/IP
protocol suite. Understanding the purpose of every field in the output is for
your reference, sample output from the net stat -s command is shown here:
C:\>netstat -s
IP Statistics
Packets Received = 389938
Received Header Errors = 0
Received Address Errors = 1876
Datagram’s Forwarded = 498
Unknown Protocols Received = 0
Received Packets Discarded = 0
Received Packets Delivered = 387566
Output Requests = 397334
Routing Discards = 0
Discarded Output Packets = 0
Output Packet No Route = 916
Reassembly Required = 0
Reassembly Successful = 0
Reassembly Failures = 0
Datagram’s successfully Fragmented = 0
Datagram’s Failing Fragmentation = 0
Fragments Created = 0
ICMP Statistics
Received Sent
Messages 40641 41111
Errors 0 0
Destination Unreachable 223 680
Time Exceeded 24 0
Parameter Problems 0 0
Source Quenches 0 0
Redirects 0 38
Echo’s 20245 20148
Echo Replies 20149 20245
Timestamps 0 0
Timestamp Replies 0 0
Address Masks 0 0
Address Mask Replies 0 0
TCP Statistics
Active Opens = 13538
Passive Opens = 23132
Failed Connection Attempts = 9259
Reset Connections = 254
Current Connections = 15
Segments Received = 330242
Segments Sent = 326935
Segments Retransmitted = 18851
UDP Statistics
Datagram’s Received = 20402
No Ports = 20594
Receive Errors = 0
Datagram’s Sent = 10217
nbtstat
The nbtstat utility is used to view protocol statistics and information for
NetBIOS over TCP/IP connections. nbtstat is commonly used to troubleshoot NetBIOS name resolution problems.
Because nbtstat provides the resolution of NetBIOS names, it's available only on
Windows systems.
A number of case-sensitive switches are available for the nbtstatcommand. Table 6 summarizes these switches.
Table 6 nbtstat
Switches
|
|
| Switch |
Description |
| nbtstat -a | (Adapter status) Outputs the NetBIOS name table and MAC addresses of the card for the specified computer |
| nbtstat -A (IP address) | (Adapter status) Lists the remote machine's name table given its IP address |
| nbtstat -c (cache) | Provides a list of the contents of the NetBIOS name cache |
| nbtstat -n (names) | Lists local NetBIOS names |
| nbtstat -r (resolved) | Lists names resolved by broadcast or WINS |
| nbtstat -R (Reload) | Purges and reloads the remote cache name table |
| nbtstat -S (Sessions) | Summarizes the current NetBIOS sessions and their status |
| nbtstat -s (sessions) | Lists sessions table converting destination IP addresses to computer NetBIOS names |
| nbtstat -RR (Release Refresh) | Sends Name Release packets to WINS, and then starts Refresh |
| nbtstat Remote Name | Remote host machine name |
| nbtstat IP address | Dotted decimal representation of the IP address |
| nbtstat interval | Redisplays selected statistics, pausing interval seconds between each display. Press Ctrl+C to stop redisplaying statistics |
As an example, the following is the output from the nbtstat –n command:
C:\>nbtstat -n
Lana # 0:
Node IpAddress: [169.254.196.192] Scope Id: []
NetBIOS Local Name Table
Name Type Status
---------------------------------------------
LAPTOP <00> UNIQUE Registered
KCS <00> GROUP Registered
LAPTOP <03> UNIQUE Registered
The ipconfig Command
The ipconfig command is a technician's best friend when it comes to viewing the
TCP/IP configuration of a Windows system. Used on its own, the ipconfig command shows basic
information such as the name of the network interface, the IP address, the
subnet mask, and the default gateway. Combined with the /all switch, it shows a
detailed set of information, as you can see in the following example:
C:\>ipconfig /all
Windows 2000 IP Configuration
Host Name . . . . . . . . . . . . : server
Primary DNS Suffix . . . . . . . : write
Node Type . . . . . . . . . . . . : Broadcast
IP Routing Enabled. . . . . . . . : Yes
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : write
ok.anyotherhost.net
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix. : ok.anyotherhost.net
Description . . . . . . . . . . . : D-Link DFE-530TX PCI Fast Ethernet
Physical Address. . . . . . . . . : 00-80-C8-E3-4C-BD
DHCP Enabled. . . . . . . . . . . : Yes
Auto configuration Enabled . . . . : Yes
IP Address . . . . . . . . . . . . : 24.67.184.65
Subnet Mask . . . . . . . . . . . : 255.255.254.0
Default Gateway . . . . . . . . . : 24.67.184.1
DHCP Server . . . . . . . . . . . : 24.67.253.195
DNS Servers . . . . . . . . . . . : 24.67.253.195
24.67.253.212
Lease Obtained.. . . . : Thursday, February 07, 2002 3:42:00 AM
Lease Expires . . . . . : Saturday, February 09, 2002 3:42:00 AM
As you can imagine, you can use the output from an ipconfig /all command in a massive range of troubleshooting scenarios. Table 7
lists some of the most common troubleshooting symptoms, along with where to
look for clues about solving them in the ipconfig /all output.
Table 7 Common
Troubleshooting Symptoms That ipconfig Can Help Solve
|
|
| Symptom |
Field to Check in ipconfig Output |
| User is unable to connect to any other system. | Make sure the TCP/IP address and subnet mask are correct. If the network uses DHCP, make sure DHCP is enabled. |
| User is able to connect to another system on the same subnet but is not able to connect to a remote system. | Make sure the default gateway is correctly configured. |
| User is unable to browse the Internet. | Make sure the DNS server parameters are configured correctly. |
| User is unable to browse across remote subnets. | Make sure the WINS or DNS server parameters are configured correctly, if applicable. |
Using the /all switch might be far and away the most popular, but there are a few
others. These include the switches listed in Table 8.
Table 8 ipconfig
Switches
|
|
| Switch |
Description |
| ? | Displays the ipconfig help screen |
| /all | Displays additional IP configuration information |
| /release | Releases the IP address of the specified adapter |
| /renew | Renews the IP address of a specified adapter |
Ifconfig
Ifconfig performs the same function as ipconfig, but on a Linux, UNIX,
or Macintosh system. Because Linux relies more heavily on command-line
utilities than Windows, the Linux and UNIX version ofifconfig provides much more functionality than ipconfig. On a Linux or UNIX system, you can get information about the
usage of the ifconfig command by using ifconfig --help. The following output
provides an example of the basic ifconfig command run on a Linux system:
Eth0 Link encap:EthernetHWaddr 00:60:08:17:63:A0
Inet addr: 192.168.1.101 Bcast: 192.168.1.255 Mask:255.255.255.0
UP BROADCAST RUNNING MTU: 1500 Metric: 1
RX packets: 911 errors: 0 dropped: 0 overruns: 0 frame: 0
TX packets: 804 errors: 0 dropped: 0 overruns: 0 carrier: 0
Collisions: 0 txqueuelen: 100
Interrupt: 5 Base addresses: 0xe400
Lo Link encap: Local Loopback
Inet addr: 127.0.0.1 Mask: 255.0.0.0
UP LOOPBACK RUNNING MTU: 3924 Metric: 1
RX packets: 18 errors: 0 dropped: 0 overruns: 0 frame: 0
TX packets: 18 errors: 0 dropped: 0 overruns: 0 carrier: 0
Collisions: 0 txqueuelen: 0
Although the ifconfig command displays the IP address, subnet mask and default gateway
information for both the installed network adapter and the local loopback
adapter, it does not report DCHP lease information. Instead, you can use the pump s command to view detailed
information on the DHCP lease including the assigned IP address, the address of
the DHCP server, and the time remaining on the lease. The pump command can also be used
to release and renew IP addresses assigned via DHCP and to view DNS server
information.
The winipcfg Command
On a Windows 98 Second Edition and Windows Me systems, thewinipcfg command is used in addition to the ipconfig command. The difference
between the two utilities is that winipcfg is a graphical utility.
In basic mode, winipcfg shows information including the Media Access Control (MAC) address
and IP address of the interface, the subnet mask, and the default gateway. For
detailed information, similar to that produced with ipconfig /all, a More Info button allows you to switch into a much more
detailed screen.
The same troubleshooting scenarios, with the same solutions, apply
to winipcfg as to ipconfig. Table 9 lists some
solutions to common problems.
Table 9 Common
Troubleshooting Problems That winipcfg Can Help Solve
|
|
| Symptom |
Field to Check in winipcfg Output |
| User is unable to connect to any other system. | Check that the TCP/IP address and subnet mask are correct. If using DHCP, make sure DHCP is enabled. |
| User is able to connect to other system on the same subnet, but is not able to connect to a remote system. | Check that the default gateway is correctly configured. |
| User is unable to browse the Internet. | Make sure the DNS server parameters are configured correctly. |
| User is unable to browse across remote subnets. | Make sure the WINS or DNS server parameters are configured correctly (if applicable). |
Nslookup
Nslookup is a utility used to troubleshoot DNS-related problems. Using nslookup, you can, for example, run manual name resolution queries against
DNS servers, get information about the DNS configuration of your system or
specify what kind of DNS record should be resolved.
When nslookup is started, it displays the current hostname and the IP address of
the locally configured DNS server. You will then see a command prompt which
allows you to specify further queries. This is known as 'interactive' mode. The
commands you can enter in interactive mode are listed in Table 10.
Table 10 nslookup
Switches
|
|
| Switch |
Description |
| all | Prints options, as well as current server and host information |
| [no]debug | Prints debugging information |
| [no]d2 | Prints exhaustive debugging information |
| [no]defame | Appends the domain name to each query |
| [no]recourse | Asks for recursive answer to query |
| [no]search | Uses domain search list |
| [no]Vic | Always uses a virtual circuit |
| domain=NAME | Sets default domain name to NAME |
| schist=N1[/N2/.../N6] | Sets domain to N1 and search list to N1, N2, and so on |
| root=NAME | Sets root server to NAME |
| retry=X | Sets number of retries to X |
| timeout=X | Sets initial timeout interval to X seconds |
| type=X | Sets query type (for example, A, ANY, CNAME, MX, NS, PTR, SOA, or SRV) |
| query type=X | Same as type |
| class=X | Sets query class (for example, IN [Internet], ANY) |
| [no]mixer | Uses MS fast zone transfer |
| ixfrver=X | Current version to use in IXFR transfer request |
| server NAME | Sets default server to NAME, using current default server |
| exit | Exits the program |
Instead of using interactive mode, you can also execute nslookuprequests directly at the command prompt. The following listing
shows the output from nslookup when a domain name is specified to be resolved.
C:\>nslookup comptia.org
Server: nsc1.ht.ok.shawcable.net
Address: 64.59.168.13
Non-authoritative answer:
Name: comptia.org
Address: 208.252.144.4
As you can see from the output, nslookup shows the hostname and IP
address of the DNS server against which the resolution was performed, along
with the hostname and IP address of the resolved host.
Dig
Dig is used on Linux, UNIX or Macintosh system to perform manual DNS
lookups. Dig performs the same basic task as nslookup, but with one major
distinction: The dig command does not have an interactive mode and instead uses only
command-line switches to customize results.
Dig is generally considered a more powerful tool than nslookup, but in the course of a typical network administrator's day, the
minor limitations of nslookup are unlikely to be too much of a factor. Instead, dig is often simply the tool
of choice for DNS information and troubleshooting on UNIX, Linux, or Macintosh
systems. Likens lookup, dig can be used to perform
simple name resolution requests. The output from this process can be seen in
the following listing:
; <<>>Dig 8.2 <<>> xyz.com
; Res options: init recurs defnamdnsrch
; got answer:
; ->>HEADER<<- epode: QUERY, status: NOERROR, id: 4
; Flags: qrrdra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 0
; QUERY SECTION:
; xyz.com, type = A, class = IN
; ANSWER SECTION:
xyz.com. 7h33m IN A 63.240.93.157
; AUTHORITY SECTION:
xyz.com. 7h33m IN NS usrxdns1.ABC.com.
xyz.com. 7h33m IN NS oldtxdns2.ABC.com.
; Total query time: 78 mess
; FROM: localhost.localdomain to SERVER: default -- 209.53.4.130
; WHEN: Sat Oct 16 20:21:24 2004
; MSG SIZE sent: 30 rcvd: 103
As you can see, dig provides a number of pieces of information in
the basic output more so than nslookup. There are three key
areas of the output from which network administrators can gain information.
These are the 'Answer Section,' the 'Authority Section,' and the last four
lines of the output.
The Answer Section of the output provides the name of the domain
or host being resolved, along with its IP address. The A in the results line
indicates the record type that is being resolved.
The Authority Section provides information on the authoritative
DNS servers for the domain against which the resolution request was performed.
This information can be useful in determining whether the correct DNS servers
are considered authoritative for a domain.
The last four lines of the output show how long the name
resolution request took to process and the IP address of the DNS server that
performed the resolution. It also shows the date and time of the request, as
well as the size of the packets sent and received.
Interpreting Visual Indicators
One of the easiest ways to spot signs of trouble on a network or
with a network component is to look at the devices' LEDs. Many of the devices
used in modern networks such as hubs, routers, switches, and even NICshave
these small indicator lights that let you know what, if anything, is going
wrong. The following sections examine some of the common networking devices and
what you can learn from their LEDs.
LEDs on Networking Devices
If you have seen a hub or a switch, you have no doubt noticed the
LEDs on the front of the device. Each RJ-45 connector has one or two dedicated
LEDs. These LEDs are designed to provide the network administrator with a quick
idea of the status of a connection or a potential problem. Table 11 provides
some examples of link-light indicators functioning on a typical hub or switch.
Table 11 Example
Link-Light Indicator LED States for a Network Hub or Switch
|
|
| LED State |
Meaning |
| Solid green | A device is connected to the port, but there is no activity on the device. |
| Blinking green | There is activity on the port. The connected system is sending or receiving data. |
| No LED lit | There is no detectable link. Either there's a problem with the connection between the device and the hub (such as an unplugged cable), or the remote system is powered down. |
| Fast continuous blinking for extended periods | This often indicates a fault with the connection, which can commonly be attributed to a faulty NIC. |
| Blinking amber | There are collisions on the network. A few orange LEDs flashing intermittently are okay, but continuously blinking amber LEDs indicate a problem. |
Note that the LEDs' sequencing and meanings vary among the
different hub manufacturers and therefore might be different from those listed
in Table 11.
In addition to link-light indicators, some hubs and switches have
port-speed LEDs that, when lit, indicate the speed at which the connected
device is functioning. Some also have LEDs that indicate whether the link is
operating in full-duplex mode.
By understanding the function of the lights on networking devices,
you can tell at a glance the status of a device and the systems connected to
it. You should take the time to familiarize yourself with the indicator lights
on the network devices you work with and with their various states.
LEDs on NICs and Other Devices
In addition to hubs and switches, most other networking devices
have LEDs that provide a variety of information. Most NICs have at least one
LED that indicates whether there is a link between the system and the network
into which it is plugged. The link light operates at a physical level; in other
words, it should be lit when the PC is on, regardless of whether the networking
software is loaded, the network configuration is correct, or the user is logged
on to the network. In addition to the link light LED, many NICs have additional
lights to indicate the speed at which the network connection is established
and/or when there is network activity on the link.
LEDs are also included on cable modems and DSL modems, which are
commonly used in small or home office implementations for Internet
connectivity. The number of LEDs and their functionality depends on the device.
For example, one cable modem might have four LEDs: one indicating that the
modem is online, a Send indicator, a Receive indicator, and one labeled
Message. In contrast, a DSL modem might have six LEDs. One shows that the
device is powered, and one flashes to indicate that the device is operating
normally. Then there is a link light for both the local network and the DSL
connection, and another LED for each interface that flashes to indicate
activity on those links.
The usefulness of LEDs in troubleshooting scenarios cannot be
overstated. LEDs provide an instant, visual indicator about the state of a
network link. In some cases, as with collision lights, they can even alert you
to problems on the network. Understanding how to interpret information provided
by LEDs is important for the real world.
Imagine a scenario in which a user who is working at workstation A
calls and tells you she is unable to access the Internet. The Internet
connection could be down, but by connecting to the Internet yourself, you
determine that it is working correctly; therefore, it is safe to assume that
the problem is at the user's end rather than with the Internet connectivity.
Next, you decide to visit the user's workstation to see whether you can ping the Internet router.
Before you begin the ping test, you look at the back of the system and see that the link LED
on the NIC is not lit. At this point, you can be fairly sure that the ping test will not work
because without the link light, there is no connectivity between the NIC and
the switch.
Now you have narrowed the problem to one of a few sources. Either
the NIC or the cable is faulty, the switch to which the user is connected is
not functioning, or the port on the switch to which the user is connected is
faulty.
The easiest way to test whether the cable is the problem is to
borrow a known working cable from workstation B or C and swap it with the cable
connecting workstation A to the hub, switch, or wall port. When you try this,
if the link light does not come on, you can deduce that the NIC is faulty. If
the light does come on, you can deduce that either the port on the switch or a
cable is faulty. The next step is to swap the cable out or try the original
cable in another switch port.
Whatever the actual problem, link lights play an important role in
the troubleshooting process. They give you an easy method of seeing what steps
do and don't work.
Troubleshooting Remote
Connectivity
Remote connectivity errors are bugs that prevent you from
connecting to the office network, from remotely dialing in to your home
computer, or from logging on to your ISP and subsequently the Internet.
Although many means and methods are available for establishing
remote connectivity, network administrators can focus their attention on some
common hot spots when troubleshooting errors, including authentication failure,
protocol configuration problems, and physical connectivity.
Troubleshooting Physical
Connectivity
When you're troubleshooting remote connectivity errors, it is
often easy to forget the most basic troubleshooting practices. By this, we mean
ensuring that all the physical connections are in place. When you suspect a
physical connectivity problem, here are a few key places to look:
·
Faulty cable
·
Improperly connected cable
·
Incorrect cable
·
Faulty interface
·
Faulty networking devices
Now that we have looked at some of the more generalized
considerations of remote connectivity troubleshooting from a physical
perspective, we'll focus specifically on some of the commonly used remote
access technologies.
DSL
Troubleshooting DSL is similar to troubleshooting any other
Internet connection. The following are a few things to check when users are
experiencing problems with a DSL connection:
·
Physical connections
·
The NIC installed in the computer system
·
Network card drivers
·
Protocol configuration
·
LEDs on the DSL modem
Cable Troubleshooting Procedures
In general, cable Internet access is a low-maintenance system with
very few problems. When problems do occur, you can try various troubleshooting
measures:
·
Check the physical connections.
·
Ensure that the protocol configuration on the system is valid.
·
Check the indicator lights on the cable modem.
·
Cycle the power on the cable modem, and on the system.
If you are sure that the connectors are all in place and the
configuration of the system is correct, the next step is to call the technical
support line of the cable provider.
Home Satellite Troubleshooting Procedures
Your ability to troubleshoot satellite Internet connections might
be very limited. The hardware associated with home satellite remote access
installations are very specialized, and equipment providers often prefer that
you let them do the hardware troubleshooting. Given this limitation, calls to
technical support occur very early in the troubleshooting process.
Wireless Internet Access Troubleshooting Procedures
Troubleshooting wireless access is normally confined to ensuring
that the adapter is functioning correctly and configured properly.
The main factors that can affect wireless access are environmental
conditions and outside interference. Many people who live in areas that often
have fog or other damp conditions experience poor performance (or none at all)
from wireless Internet service.
Here are some specific things you should check when
troubleshooting a wireless connection:
- Check the
configuration of the wireless interface.
- Move the
computer around to find out if it's in a dead spot.
- Check with other
people to see if there is a problem with the service, rather than just
your system.
If you are sure that everything is configured correctly, you might
have to contact the wireless provider to see if anything is amiss
POTS Troubleshooting Procedures
Troubleshooting a dial-up connection problem can be tricky and
time-consuming because you must consider many variables. In fact, of the remote
connectivity mechanisms discussed in this chapter, you are far more likely to
have problems with a POTS connection than any of the others. The following are
some places to start your troubleshooting under various conditions.
If the user is unable to dial out, try the following:
·
Check physical connections.
·
Check that there is a dial tone on the line.
If the user can dial out but can't get a connection, try the
following:
·
Make sure that the user is dialing the correct number.
·
Call the ISP to determine whether it is having problems.
·
Determine if Call Waiting is enabled on the line, or there is some
other telephone provider service interfering with communications.
If the user can dial out and can get a connection but is then
disconnected, try the following:
·
Ensure that the modem connection is configured correctly.
·
Check that the username and password are correct.
·
Verify that the connection settings are correct.
Modem-Specific Troubleshooting
If you are confident that a modem is installed and configured
correctly, but it's still not working properly, you can test and configure it
by using special commands from the AT command set. Table 12 lists some of the
most commonly used AT commands.
Table 12 Commonly
Used AT Commands
|
|
| AT Command |
Result |
| ATA | Sets the modem to auto-answer |
| ATH | Hangs up an active connection |
| ATD | Dials a number |
| ATZ | Resets the modem |
| ATI3 | Displays the name and model of the modem |
In general, getting the modem to respond to an ATZ command is a
good enough indicator that the modem is functioning.
Troubleshooting Authentication
Failure
All forms of remote connectivity should require some form of
authentication to confirm that those trying to access the remote resources have
permission to do so. As a network administrator, you can expect to become very
familiar with authentication troubleshooting. Quite often, authentication errors
result from users incorrectly entering usernames and/or passwords.
Authentication issues can also arise as a result of permissions
changes in users' accounts. If you're troubleshooting remote connectivity and
you have confirmed that the correct username and password are used, you should
confirm that the user has the appropriate permissions to access the network.
The third and perhaps least likely cause for authentication
failure is a downed authentication server. In such a circumstance, you are
likely to receive numerous calls regarding authentication difficulty not just
one or two.
Troubleshooting Protocol
Configuration Problems
Many, but not all, of the problems you encounter with remote
connectivity can be addressed with the measures listed previously. However, you
might encounter a problem when you have confirmed that the network user is
using the correct username and password combination, that no changes have been
made to the user's account information, that all physical connections are in
place, and that the user still cannot establish a remote connection.
The next most likely cause of a client connectivity problem is
protocol configuration. Protocol configuration issues are usually on the client
side of the network. On a TCP/IP network, each client computer must have a
unique address in order to participate on the network. Failure to obtain
addressing information automatically could indicate a problem with a DHCP
server. You should check the DHCP server to make sure that it is functioning
and that addresses are available for assignment.
Beyond basic protocol issues such as addressing, remote
connectivity troubleshooting also brings with it the additional considerations
of authentication protocols. There is one basic rule that applies to all such
issues. If a client in a remote connectivity solution is configured to use one
type of authentication protocol, and the server to which he is connecting does
not support that protocol, the connection will be refused.
Troubleshooting Small Office/Home
Office Router
As more people choose to use broadband Internet connectivity
methods such as cable and DSL, the use of compact hub/router and switch/router
combinations has become commonplace.
Most SOHO routers are, in fact, more than routers. Most are also
Ethernet hubs or switches, making it possible to share an Internet connection
with other systems on the network. They also typically provide basic
firewalling capabilities and, in many cases, DHCP server functionality.
Configuration
The most common configuration method for SOHO routers is through a
browser interface, though some models also use a custom application for this
purpose. Configuration is generally straightforward, as SOHO routers are
designed to be home user friendly.
Troubleshooting
Because a SOHO router is a network device, the rules and
procedures that apply to other troubleshooting scenarios are valid. If you are
experiencing Internet connectivity issues on a network with a SOHO router, the
first step is to ensure that the SOHO router is powered on and that all the
network connections are complete and secure. Also, familiarize yourself with
the diagnostic LEDs on your SOHO router so that you can interpret the
information they provide accordingly.
One of the easiest ways to test whether the SOHO router is the
cause of a problem is to remove it from the communications chain and plug a PC
directly in to the broadband interface (be that cable or DSL). If the PC is
configured to obtain an IP address automatically, it should be able to get an
IP address from the ISP just as easily as it would from the SOHO router. If the
system subsequently works fine and can access the Internet, you know that the
problem lies with the SOHO router and not the configuration of the system.
Identifying and Troubleshooting
Client Connectivity Problems
Client connectivity errors are one of the most common sources of
network-related problems. Issues range from plain old user error to more
complex protocol and cabling issues. Sometimes, even administrators make
mistakes that can impact users! With so many possibilities, it is no wonder
that client connectivity persists as one of the biggest network troubleshooting
hotspots.
Protocol Errors
The client system must have a protocol assigned or bound to its
NIC in order to access resources. You can use various tools to verify that a
protocol is being used by the system for example, on Windows 2000/XP/2003
systems, you use the ipconfig command; on older Windows client systems, you use the winipcfg command; and on Linux,
UNIX, and Macintosh systems, you can use theifconfig command.
Protocol-Specific Issues
You need to consider a number of factors related to network
protocols when you troubleshoot client connectivity. The following list
describes some of the protocol-specific issues you should consider in such a
situation:
·
Transmission Control Protocol/Internet Protocol (TCP/IP) For a
system to operate on a TCP/IP-based network, it must have at the very least a
unique IP address, the correct subnet mask for the network to which it is
connected, and (for cross-network connectivity) a default gateway entry. In
addition, Domain Name Service (DNS) server addresses might be required.
·
Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
Each system on an IPX/SPX network must have a unique address, although the
addresses are generated and assigned automatically. On older networks, care
must be taken to ensure that the correct frame type is being used, although
systems are usually able to autodetect the frame type that is in use.
·
Network BIOS Extended User Interface (NetBEUI) Each system on a
network that uses NetBEUI must have a unique name to identify the computer on
the network. For name resolution between network segments, a network needs
either a Windows Internet Naming System (WINS) server or manual name resolution
through an LMHOSTS file.
·
AppleTalk Each system on an AppleTalk network must have a unique
address. If AppleTalk over TCP/IP is being used, ensure that the system is
configured with a valid IP address, subnet mask, and (if needed) a default
gateway.
When protocol settings are correctly configured, protocol problems
are infrequent. Unless settings are manually changed, very little can go wrong.
Authentication
Before users can log on to any system, their identities must be
verified. By far the most common type of authentication used is the standard
username and password combination. When a user account is created, it is good
practice for the administrator to set a password. The user should change that
password immediately so that the administrator no longer knows it.
Most user password problems can be traced to users entering an
incorrect password or entering the correct password incorrectly. All common
operating systems offer the ability for the administrator to change a user's
password, but none offer the capability to determine the user's existing
password. Therefore, if a user does forget his or her password, a new one has
to be created and issued.
Permissions Errors
Access to applications and data across the network is controlled
by permissions. Permissions are responsible for protecting the data on the
network and ensuring that only those who should have access to it do.
The first rule of permissions troubleshooting is to remember that
permissions do not change themselves. If a user cannot access a file, the first
question to the user should always be, "Could you ever access the
file?" If the user says, "Yes, but now I can't access the file,"
you should check server change logs or documentation to see if any changes have
been made in the permissions structure.
If no changes have been made, you should verify that the user is
in fact allowed access to that file or directory. In large environments, trying
to keep track of who should have access to what can be a tricky business one
that is best left to defined policies and documentation.
The following are some other items you should consider when
troubleshooting permissions problems:
·
On some operating systems, rights and permissions can be inherited
from parent directories or other directories that are higher in the directory
structure. A change in the permissions assignments at one level might have an
effect on a lower level in the directory tree.
·
File permissions can be gained from objects other than the user's
account. Depending on the operating system being used, rights can also be
gained from group membership, other network objects, or security equivalence.
When you are troubleshooting a permissions problem, be sure that you understand
where rights are supposed to originate.
·
File attributes can override file permissions, and they can
prevent actions from being performed on certain files. To the uninitiated, this
might seem like a file permissions problem, but in fact it is correct
operation.
As with many other IT troubleshooting scenarios, you can solve
most permissions problems effectively if you fully understand what you are
troubleshooting and the factors that affect the situation. Also in common with
other troubleshooting scenarios, you need to approach the problem methodically.
Physical Connectivity Errors
Although many of the problems associated with client connectivity
can be traced to software-based problems such as configuration, authentication,
and permissions issues, physical connectivity is often the root of the problem.
When you are troubleshooting physical connectivity errors, the
first place to look is at the network cables. Although it is rare, cables can
become loose or disconnected from NICs or from the ports on a hub or switch.
Oftentimes, this is the result of other cables being plugged in or unplugged,
or of other activity on the connections around the one that is having the
problem. Other cable considerations include exceeded maximum lengths, cable
breaks, and improperly terminated or made cables, although these are only a
consideration in exceptional cases.
Physical connectivity errors also involve the devices used to
establish the physical client/server connectivity. This can include hubs,
switches, MSAUs, NICs, routers, and connectivity hardware. Although it is
possible to have a problem with a single port on one of the aforementioned
devices, it is more likely that the entire unit will malfunction. Thankfully,
networking devices are very resilient devices that provide many years of
service with few or no problems.
Troubleshooting Checklists
In a real-world networking environment, you will be expected to be
able to troubleshoot client connectivity in many different areas. The following
sections provide some troubleshooting checklists that can help you review some
of the various troubleshooting areas.
Troubleshooting Cabling Problems
Cable accounts for a great many of the problems on a network.
There are many places to look when you suspect a cable-related problem. If you
suspect that cable is at the bottom of your network troubles, consider the
following areas:
- Loose
connections you need to verify that cables are securely attached and that
they are attached to the correct ports.
- Poorly crimped
or bent cable sometimes a chair running over a cable or a cable that has a
poor crimp can cause problems.
- Incorrect cable
length Recall from that cables cannot exceed a specified maximum length.
- Cable placement
Care must be taken when cables are run too closely to strong electrical
devices. If cables are run too closely to electrical devices, you need to
ensure that they are designed for the task.
Troubleshooting Operating System
Connectivity
If you are struggling with operating system connectivity issues,
consider the following:
·
Username/password Make sure that users are logging on to the
network with the correct username/password combination.
·
Configuration It might be necessary to confirm that the network
settings on the client computer have not changed.
·
Account activity you need to verify that the user has an active
account on the network and that it has the correct permissions set. Log on with
a known working account from the client's system, which will allow you to
isolate the problem to the computer or the user account.
·
Physical connections you should check to see if a cable has come
unplugged from the client's system.
·
NIC to confirm that a card is working; you might need to swap out
the card with one that is known to be working.
Troubleshooting Network Printing
Printing is one of the services that network users expect to be
working, and it is the administrator's job to make sure that it is available.
When trying to get printing back up and running on the network, confirm the
following:
·
Printer online status you should confirm that the printer is
online and ready to go. If there is a problem with the printer itself, the
printer might display error messages on an LCD panel or use LEDs to indicate a
problem.
·
Printers functioning nearly all printers have a test print
feature. You can use it to make sure that the printer itself is functioning
correctly.
·
Printer connectivity Verify that the printer is visible to the
network. If the printer is connected directly to the network using TCP/IP, for
instance, you can ping the printer to test for connectivity.
·
Client configuration Ensure that the computers that are trying to
access the printer are configured correctly to use that printer.
·
Permissions On many operating systems, it is possible to set
permissions to allow or deny users access to a printer. You need to verify that
the correct permissions have been set.
·
Check logs Network operating systems log printer activity.
Monitoring printer logs can often provide clues as to the source of a problem.
·
Driver software if you are having problems isolating a printing
issue, consider reinstalling or replacing the printer driver.
Troubleshooting Data Access
The inability to access data is not always a result of
connectivity errors. If a user is unable to access data, there are a few key
areas to verify:
·
Proper network login Sometimes people use a shortcut or try to
access data without being properly logged on to the network. You should verify
that users are correctly logged on to the network and that any necessary
network drives are connected.
·
Permissions when you are troubleshooting data access ensure that
the permissions are set correctly.
·
Connectivity you need to verify that the system that maintains the
data is available. You need to confirm that the server is available. What can
seem like a problem accessing a file can mask a potentially larger problem such
as a disk or server failure.
·
Data integrity Sometimes data itself can be corrupt. This is the
worst-case scenario, and the robust nature of today's file systems ensures that
it occurs rarely. This is when you need backups.
·
Viruses In some cases, viruses might be your problem. You can use
a virus-checking program to determine if indeed this is the problem.
Troubleshooting NICs
When NICs are configured correctly and verified to be working,
very little goes wrong with them. When you are troubleshooting a NIC, you
should consider the following:
·
Resource settings NICs require specific computer resources in
order to operate. After you install a card or add new devices, you should check
for device conflicts.
·
Speed settings If you are not getting the expected speed from the
NIC, you should confirm the speed settings and, if applicable, the duplex
settings.
·
Protocols In order for the NIC to
work on the network, it must have a valid protocol assigned to it, and all
addressing information needs to be in place.
·
Faulty card Some NICs are faulty when they ship from the
manufacturer, and some are damaged through poor handling. To test for this, you
can swap the card with one that is known to be working.

No comments:
Post a Comment