1 - Hortonville Area School District



Introducing Routing and Switching in the Enterprise

1 Chapter 9:

2 Troubleshooting an Enterprise Network

1 Online Study Guide

| |

|9 |Troubleshooting an Enterprise Network |

|9.1. |Understanding the Impact of Network Failure |

|9.1.1 |Enterprise Network Requirements |

|9.1.1.1 |Define network downtime. | |

| |What issues are associated with a non-reliable network? | |

|9.1.1.2 |List the factors that can cause network downtime. | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

|9.1.1.3 |What is a benefit of redundancy? | |

| |How does the three-layer hierarchical network design help in | |

| |network performance? | |

| |How does a SLA benefit the customer and the provider? | |

| | | |

| |What do warranties provide in network reliability? | |

| |What does a business continuity plan provide to an enterprise? | |

|9.1.2 |Monitoring and Proactive Maintenance |

|9.1.2.1 |Define proactive maintenance. | |

| | | |

| |Define baseline. | |

| |List the tools that are used to monitor and gather network | |

| |performance data. | |

| | | |

| | | |

| |How does an administrator use proactive maintenance? | |

| | | |

|9.1.2.2 |What documentation should be kept to assist in network | |

| |maintenance? | |

| | | |

| |What are the best practices for performing baseline network | |

| |performance levels? | |

| | | |

| |How can a ping be used to help in determining performance | |

| |baseline? | |

|9.1.2.3 |What information cannot be found by using ping and tracert | |

| |How can packet sniffing tools help in determining network | |

| |traffic congestion issues? | |

|9.1.2.4 |Define SNMP. | |

| |What is the role of an Agent? | |

| |Define MIB. | |

| | | |

| |How do traps or thresholds interact with the NMS. | |

| | | |

| | | |

| |What type of information should a Network Monitoring Plan | |

| |include? | |

|9.1.2.5 |Packet Tracer Activity |

|9.1.3 |Troubleshooting and the Failure Domian |

|9.1.3.1 |What is the objective of any troubleshooting effort? | |

| |What role does redundancy play in the failure domain? | |

| | | |

| | | |

| |What are hot swappable spares? | |

| | | |

| | | |

|9.1.3.2 |What is the highest priority in determining an appropriate | |

| |solution? | |

| |List the concerns that a business continuity plan includes. | |

| | | |

| | | |

| | | |

| | | |

| | | |

| |What is a failure domain and what determines it size? | |

|9.1.3.3 |What does the failure of a layer 2 switch effect? | |

| |Why does the failure of a border router create a larger failure| |

| |domain? | |

| |Give an example when the size of the failure domain may not be | |

| |the deciding factor in troubleshooting. | |

|9.1.3.4 |Interactive Activity |

|91.4 |Troubleshooting Process |

|9.1.4.1 |Define Top-down. | |

| | | |

| |Define Bottom-up. | |

| |Define Divide-and conquer. | |

| |Define Trial-and-error | |

| | | |

| |Define Trial and Error | |

| | | |

| |Define Substitution. | |

|9.1.4.2 |What is used when a more structured approach is needed to | |

| |troubleshoot? | |

| |List the steps in the generic problem-solving model. | |

| | | |

| | | |

| | | |

| | | |

| | | |

| |What layer would mismatched encryption keys be found? | |

| |Improper cabling or RF signal loss would be found at what | |

| |layer? | |

| |What are some common issues found at the Data Link layer? | |

| | | |

| | | |

| |Mis-configured ACLS can be an issue at what layers? | |

| |Improper routing and improperly configured addresses would be | |

| |issues at what layer? | |

|9.1.4.3 |Interactive Activity |

|9.2 |Troubleshooting Switching and Connectivity Issues |

|9.2.1 |Troubleshooting Basic Switching |

|9.2.1.1 |Faults at the access layer effect what devices? | |

| |At what layer do most switch issues occur at and what can be | |

| |done to prevent them? | |

| |List the steps to follow if the link LED is not illuminated. | |

| | | |

| | | |

| | | |

|9.2.1.2 |What commands display the switch security configuration? | |

| | | |

| |What should be done before altering any security | |

| |configurations? | |

| |How can the show mac-address-table and clear mac-address-table | |

| |dynamic help with switch issues? | |

|9.2.1.3 |What commands allow you to lock down speed and duplex on | |

| |switchports? | |

| |What are indicators of STP issues in the network | |

| | | |

| | | |

| | | |

| | | |

|9.2.1.4 |What can cause an overloaded processor? | |

| | | |

| | | |

| |Where should the root bridge optimally be located? | |

| |List the commands used to troubleshoot STP. | |

|9.2.1.5 |Packet Tracer Activity |

|9.2.2 |Troubleshooting VLAN Configuration Issues |

|9.2.2.1 |Ports in the same VLAN need what in order to communicate? | |

| |What command displays all the ports and what vlan they are | |

| |assigned to? | |

| |What would the show vlan id 5 display? | |

| |What is required to have inter-VLAN routing? | |

| |What is the de-facto standard encapsulation and where might it | |

| |cause a troubleshooting problem? | |

|9.2.2.2 |The show ip interface brief command can be used to verify the |True |

| |status of each sub-interface on the router. |False |

| |What should be in the routing table when you issue the show ip | |

| |route command? | |

|9.2.2.3 | What VLAN are untagged frames sent across on a trunk port? | |

| |What is advisable practice when changing the native VLAN on a | |

| |device? | |

|9.2.2.4 |Packet Tracer Activity |

|9.2.3 |Troubleshooting VTP |

|9.2.3.1 |List the information that should be checked when | |

| |troubleshooting VTP. | |

| | | |

| | | |

| | | |

| | | |

| |What command can you enter to check the domain name of a | |

| |switch? | |

| |What does VTP version 2 modify on the switch? | |

|9.2.3.2 |How do switches use the revision number? | |

| |How do you reset the revision number on a switch and when | |

| |should you rest it? | |

| |What does configuring passwords on the VTP domain prevent? | |

| |What should you check if updates are not propagating through | |

| |the network and what command should you enter? | |

|9.2.3.3 |Packet Tracer Activity | |

|9.3 |Troubleshooting Routing Issues |

|9.3.1 |RIP Issues |

|9.3.1.1 |How do the show and debug commands differ in the output they | |

| |display? | |

| |What important information does show ip protocols display? | |

| |What information does show run tells you that show ip protocols| |

| |does not? | |

| |What networks should show up in both show ip route and show ip | |

| |protocols? | |

| |When should a command like debug ip rip be used? | |

|9.3.1.2 |List the problems to look for if RIP updates are not being | |

| |received? | |

| |In the media scenario, what is the reason R1 is missing routes | |

| |in the routing table? | |

| |What is a recommended practice when checking routing problems | |

| |with the show ip route command? | |

| |Why is RIP not a good choice in an enterprise network? | |

|9.3.1.3 |Packet Tracer Activity |

|9.3.1.4 |Hands on Lab |

|9.3.2 |EIGRP Issues |

|9.3.2.1 |In the scenario, what is the router ip address of the neighbor | |

| |on the s0/0/0 interface? | |

| |In the scenario, what is the metric to the 172.20.1.8 /30 | |

| |network and how many possible paths are there? | |

| |In the scenario, how many Hellos have been sent and received? | |

| |What does the D mean in the routing table? | |

| |In the scenario, on what interfaces are hello packets being | |

| |received on? | |

|9.3.2.2 |List he possible reasons EIGRP may not be working? | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| |What should be used if discontiguous networks exist in the | |

| |network design? | |

| |What is the problem in the scenario and how should it be fixed?| |

|9.3.2.3 |Packet Tracer Activity |

|9.3.3 |OSPF Issues |

|9.3.3.1 |List the problems that can occur with OSPF routing? | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| |What two show commands can help in adjacency issues? | |

| | | |

| |What information can be learned using the show ip ospf command?| |

| | | |

|9.3.3.2 | Interactive Activity |

|9.3.3.3 |Hands on Lab |

|9.3.4 |Route Redistribution Issues |

|9.3.4.1 |What two routing protocols uses the default-information | |

| |originate command to redistribute a route? | |

| |The redistribute static command is entered after issuing what | |

| |command when configuring a router? | |

| |What does an * in the routing table indicate? | |

|9.3.4.2 |Hands on Lab |

|9.3.4.3 |Hands on Lab |

|9.4 |Troubleshooting WAN Configurations |

|9.4.1 |Troubleshooting WAN Connectivity |

|9.4.1.1 |Why are some layer 1 WAN issues unavoidable in a network? | |

| |What are some common physical problems in a WAN connection? | |

| |How can the show controllers command help an administrator | |

| |troubleshoot? | |

|9.4.1.2 |What is a WAN problem when connecting non-Cisco equipment in a | |

| |network? | |

| |What command can be used to check the encapsulation? | |

| |IP addresses must be used on serial links. |True |

| | |False |

|9.1.4.3 |Define SLARP. | |

| |What must the status of a link be before layer 3 traffic can go| |

| |across the link? | |

| |What might be the cause of a WAN problem if the line is up but | |

| |the protocol is down? | |

| |What must be done if the line shows administratively down? | |

|9.1.4.4 |What must be verified when troubleshooting PPP? | |

| | | |

| |In the scenario, is the link up and if so, what protocols are | |

| |being sent across it? | |

| |In the scenario, is authentication being used and if so what | |

| |kind is it? | |

| |What is the magic number being used in the scenario? | |

|9.4.1.5 |Packet Tracer Activity |

|9.4.2 |Troubleshooting WAN Authentication |

|9.4.2.1 |In the scenario, how does the administrator know that R2 is not| |

| |using CHAP? | |

| | | |

| |When does authentication occur in a PPP WAN connection? | |

|9.4.2.2 |What must exist on both remote ends for authentication to take | |

| |place? | |

| |Usernames by default are the router names and are not case |True |

| |sensitive. |False |

|9.4.2.3 |Packet Tracer Activity |

|9.4.2.4 |Hands on Lab |

|9.5 |Troubleshooting ACL Issues |

|9.5.1 |Determining if an ACL is the Issue |

|9.5.1.1 |What questions should be asked to help isolate an ACL problem? | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| | | |

| |What can be done to assist in finding answers to the questions? | |

|9.5.1.2 |In the scenario how many telnet packets have been denied? | |

| |Why should you use the clear access-list counters when | |

| |troubleshooting a new ACL issue? | |

| |What can be learned about ACL placement from both the show ip | |

| |interface and show run command? | |

| |What same information does the show run and the show access-list| |

| |commands tell you? | |

| |How can the debug ip packet help you troubleshoot an ACL? | |

|9.5.1.3 |Interactive Activity |

|9.5.1.4 |Packet Tracer Activity |

|9.5.2 |ACL Configuratio and Placement Issues |

|9.5.2.1 |What traffic should be configures early in the ACL list? | |

| |How can logging help troubleshoot an ACL? | |

| |In the scenario, what command will show that RIP packets to R2 | |

| |are being denied? | |

| |What type of ACL issue is this an example of? | |

|9.5.2.2 |Where should a standard ACL be placed? | |

| |How can an extended ACL allow more efficient bandwidth usage? | |

|9.5.2.3 |Packet Tracer Activity |

|9.5.2.4 |Hands on Lab |

|9.6 |Chapter Summary |

|9.6.1 |Summary |

|9.6.2 |Critical Thinking |

|9.7.1 |Chapter Quiz |

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download