12 Dec 2020
Common network documentation includes:
- Physical and Logical topology diagrams
- Network device documentation that records all pertinent device information (Device, Model, Version)
- Network performance baseline
- End-system documentation, the hardware and software used in servers, network management consoles and user workstations. (Useful in troubleshooting)
The physical layout of the devices connected to the network.
- Device Name
- Device Location (Address, Room number, Rack location)
- Interface and ports used
- Cable type
The logically connected devices in the network, how devices transfer data. You may wish to split the logical topology into IPv4 and IPv6.
- Device identifiers
- IP addresses, netmasks and prefix lengths
- Interface identifiers
- Routing protocol and static routes
- Layer 2 information (VLAN, Trunks, EtherChannel)
A baseline is the normal network or system performance, often referred to as its personality it allows use to compare against a normal network or system condition.
A network baseline should answer the following questions:
- How does the network perform during a normal or average day?
- Where are the most errors occurring?
- What part of the network is most heavily used?
- What part of the network is least used?
- Which devices should be monitored and what alert thresholds should be set?
- Can the network meet the identified policies?
The baseline provides insight into whether the network meets business requirements.
Without a baseline, no standard exists to measure the optimum nature of network traffic and congestion levels.
Steps in creating a Baseline
- Determine what types of data to collect
- To many data points can be overwhelming
- Start simple such as Interface and CPU utilisation
- Identify devices and ports of interest
- Network device ports that connect to other networking devices
- Key users
- Any other critical areas to operations
- Determine the Baseline duration
- Long enough to capture a “normal” picture, including daily trends
- Not performed during unique traffic times
- Minimum of 7 days, typically no longer than 6 weeks
- A 2-4 week Baseline is normally adequate
Manual data collection using
show commands is time consuming and not scalable. Network Management system (NMS) enable administrators to automatically create and review reports, compare performance and create alerts.
- Define the Problem
- Verify there is a problem, then properly define what the problem is.
- Gather Information
- Identify and secure access to targets involved, gather further information
- If the problem is outside of the organisations control, contact administrators from the external system before gathering additional information.
- Analyse Information (Identify possible causes)
- Eliminate Possible Causes
- Propose Hypothesis
- Test Hypothesis
- Before testing assess the impact and urgency
- Document all attempted solutions
- Solve the Problem
- Inform relevant people
- Document the cause and fix
Structured Troubleshooting Methods
Structured methods use the OSI model layers
- Start at the Physical layer (0).
- Start at the Application layer (7).
- Select a layer and test in both directions.
- Start by collecting user experiences then make an informed guess.
- Substitution - “Swap-the-component”
- Swap problematic device with a known working one.
- Comparison - “Spot-the-difference”
- Compare against working devices.
- Educated Guess
- Relies on knowledge and experience.
Enable Syslog logging to server including messages from Emergencies (0) - Notification (5)
R1(config)# logging host 18.104.22.168
R1(config)# logging trap notifications
R1(config)# logging on
Layer 1 - Physical
- Power related
- Hardware faults
- Cabling faults
- Interface configuration errors
- Exceeding design limits
- CPU overload
Layer 2 - Data Link
- Encapsulation errors
- Address mapping errors
- Framing errors
- STP failure or loops
Layer 3 - Network
- Routing table
- Neighbour issues
- Topology database
Layer 4 - Transport
- Order of ACE
- Implicit Deny any
- Incorrect Wildcard masks
- Use of the Established keyword
- IPv4 Helper feature can help solve:
- Tunneling and Encryption protocols
Layers 5-7 (Application TCP/IP model)
- Protocols included:
- FTP and TFTP
- SMTP and POP
You can use the Telnet command to test other network protocols.