n10 009 Module 5
n10 009 Module 5
Troubleshooting
NETWORK + N10-009 MODULE 5
Topics
5.1 Troubleshooting Methodology
5.2 Common Cabling and Physical Interface Issues
5.3 Network Service Issues
5.4 Performance Issues
5.5 Troubleshooting Tools and Protocols
General Troubleshooting Methodology
Troubleshooting Methodology Review
5.1
Troubleshooting
Methodology
Network + N10-009 Module 5
General Troubleshooting Methodology
1. Identify the Problem
2. Establish a Theory of Probable Cause
3. Test the Theory to Determine the Cause
4. Establish a Plan of Action to Resolve the Problem and
Identify Potential Effects
5. Implement the Solution or Escalate as Necessary
6. Verify Full System Functionality and, if Applicable, Implement
Preventive Measures
7. Document Findings, Actions, and Outcomes
1. Identify the Problem
Gather information
Question users
Identify symptoms
Determine if anything has changed
Duplicate the problem, if possible
Approach multiple problems individually
Identify Symptoms
What symptoms are observed?
◦ Could this be a hardware issue, connectivity issue, or policies applied to devices or software?
Interview Users
◦ Understand the symptoms from the user’s perspective
◦ Helps narrow down potential causes and prioritize troubleshooting efforts
◦ What is not working? (e.g., can't access the internet, slow speeds, application error)
◦ When did the issue start?
◦ How widespread is the problem? (One user, a department, or the entire network)
◦ Are there specific error messages
Troubleshooting History
◦ Avoid duplicating effort and build on prior knowledge
◦ Have similar issues occurred in the past?
◦ What steps have already been taken to resolve this issue?
◦ Have any temporary fixes been applied (e.g., bypassing a router or firewall)?
Gather Information (cont’d)
Affected Scope
◦ Determine if the issue is localized or systemic
◦ Which devices, users, or services are affected?
◦ Is the issue specific to a single device, VLAN, or subnet?
◦ Are there commonalities among affected devices (e.g., same application, same switch)?
◦ Are other users/devices on the same network functioning normally?
Network Environment
◦ Many issues arise from recent changes or external factors
◦ Are there any recent changes to the network or configuration? (E.g., updates, maintenance, new devices added)
◦ Are there known outages in the ISP or upstream provider?
◦ Are environmental factors a concern (e.g., power outages, high temperature, or physical damage to cables)?
Gather Information (cont’d)
Device-Specific Information
◦ Identify any compatibility or configuration issues
◦ Device type (PC, router, switch, server, IoT, etc.)
◦ IP and MAC addresses of affected devices
◦ Operating system and software versions (e.g., firmware, drivers)
◦ Connection type (wired vs. wireless)
Network Configuration
◦ Misconfigurations in these areas are common causes of network problems
◦ IP addressing (static vs. dynamic, correct subnet, and gateway)
◦ DNS server settings
◦ VLAN membership or segment for affected devices
◦ Routing tables and firewall rules
◦ Wireless SSID, channel, and signal strength for Wi-Fi issues
Gather Information (cont’d)
Symptoms in the Network Stack (OSI Model)
◦ Pinpoint the layer where the issue begins
◦ Can the device communicate at Layer 1 (link lights, cable connectivity)?
◦ Is Layer 2 functioning? (MAC address in ARP table or switch table)
◦ Can the device ping the gateway or DNS server? (Layer 3 testing)
◦ Are specific services or ports failing? (Layer 4 testing with telnet or netcat)
External Dependencies
◦ Many issues can originate from third-party dependencies
◦ Are external services (e.g., cloud apps, SaaS platforms) experiencing outages?
◦ Is the ISP or upstream provider functional?
◦ Are critical services like DNS or DHCP operational?
Are the symptoms of the problem occurring on a single machine that has recently been changed
or replaced?
Was there a change in:
◦ Any configuration of switches, routers, firewalls
◦ Directory Services
◦ DHCP
◦ DNS
◦ Policies applies to users or computer
Duplicate the Problem, Including with Users
Work with users and observe problem
◦ Carefully ask users questions and listen to their responses
◦ Observe each step that is taken to cause the problem
◦ Does the problem happen to a single user, group of users, entire
building or organization
Attempting to fix multiple problems can add confusion and possibly make things worse
◦ If you do manage to resolve the problem, you won’t know which fix worked
2. Establish a Theory of Probably Cause
Question the obvious
Often the best first step is to eliminate the obvious
◦ Go for the easiest fix
Each step usually takes you closer to the solution of the problem
Question the Obvious
Investigate simple, common, and often overlooked causes of an issue before moving on to more
complex troubleshooting steps
Rule out basic problems to avoid unnecessary time spent diagnosing more intricate issues
By "questioning the obvious," you can often identify and resolve issues more efficiently, avoiding
unnecessary escalation or complex diagnostics
Check the Basics:
◦ Start with straightforward possibilities such as:
◦ Is the device powered on?
◦ Are cables connected properly?
◦ Is the network adapter enabled?
◦ Are they connected to the right network (Wi-Fi or Ethernet)?
◦ Is the user entering the correct password?
Question the Obvious (cont’d)
Verify Assumptions:
◦ Avoid making assumptions about the state of the system or network
◦ For example:
◦ If someone says the cable is fine, check it yourself
◦ Confirm that all software or firmware versions are compatible
An entire department reports slow network speeds. Before diving into bandwidth analysis,
ensure:
◦ There isn’t a large file download occurring on the network
◦ The switches and routers are powered on and operational
Consider Various Approaches
There are two standard approaches:
◦ Top-to-Bottom/Bottom-to-Top OSI Model
◦ Divide and conquer
OSI Model Bottom-to-Top / Top-to-Bottom
Aspect Bottom-to-Top Top-to-Bottom
• Starting with a single host, moving out to the • Starting with the general network/services,
Scope
larger network narrowing down to individual hosts
• Begins with the physical components (OSI • Starts at the user-facing application (OSI
Starting Point
Layer 1) and works up the OSI model Layer 7) and works down the OSI model
Focus • Focuses on physical and foundational Focuses on the user experience and high-level
network connectivity first application-related issues first
Advantages • Catches hardware or physical issues early • Quickly identifies user-facing issues
• Ensures the foundation of the network is • Avoids time spent on lower layers when the
operational before moving up issue is high-level
Disadvantages • May overlook higher-layer problems like • Can waste time on application
misconfigurations in the application. troubleshooting if the issue is at lower layers
Common Use Cases • When the issue is likely infrastructure-related • When the issue is likely user-facing (e.g.,
(e.g., cables, switches, connectivity) application bugs, session timeouts)
• When there is complete network failure • When users report specific application issues
Bottom-to-Top Examples
Test Procedure Validates Comments
Link lights Check for a link light on the • Layer 1 likely ok Does not guaranteed signal
device NIC and/or switchport quality, only that the device or
switchport is receiving carrier on
the link
ARP 1. Clear your arp cache • Layers 2 and 1 ok • Open command prompt as
C:\> arp -d * 2. Ping your default gateway or administrator
C:\> ping <def gw IP> another local neighbor • If you don’t have admin
C:\> arp -a 3. Check to see if you have an privilege, skip step 1 by
ARP entry for that node rebooting
DHCP lease Release and renew your DHCP • Layers 1 and 2 are ok If you can reach the DHCP server
C:\> ipconfig /release lease • DHCP server is responsive to renew your lease, Layers 1 & 2
C:\> ipconfig /renew and DHCP are fine
Try connecting using 1. Ping by name • All layers plus DNS • If one activity is successful,
different protocols 2. Open a browser • “” HTTP / HTTPS then all OSI layers are fine
3. Connect to a shared folder • “”SMB (or FTP, NFS, etc.) • Focus on non-working tests
Top-to-Bottom Examples
Test Procedure Validates Comments
Connect to your own • Open webserver, open a browser • Service itself is running • Make a connection using
service to localhost localhost (loopback) address
• On file server, open Windows run • No need to involve DNS or
line or file client to localhost create a socket
Service listening on a At a command prompt, enter • Service is listening on • Service is ready to accept
port netstat –na its port clients
Verify that you see the open port: • Ensure no local or
0.0.0.0:<port number> intermediate device firewall
rules are blocking inbound
connections
Connect using Attempt to make a normal • Network connectivity at If some device can connect, you
various devices connection from different devices on the server itself is ok can then focus on why others
different networks cannot
Divide and Conquer
Usually a time saver
Requires that you have a sense of where to start
Select an OSI layer (typically Layer 3)
Try a test that validates that layer plus all layers either above or below that layer
◦ Example: If you can successfully ping a destination, there is nothing wrong with Layers 1, 2, or 3
◦ You can generally validate the lower layers more easily than the upper layers with one test
Your plan should include how to roll back to the original state if something goes awry
You will also want to monitor the effects of your solution to ensure it does not create another
problem
5. Implement the Solution or Escalate as Necessary
When you have applied the solution, evaluate the full functionality of the network
Document:
◦ Cause of failure
◦ Solution steps
◦ Recommendations for preventing a future occurrence of this problem
If the solution is found to affect other network operations, consider rolling back and trying
another solution, as well as escalating the problem
6. Verify Full System Functionality and, if
Applicable, Implement Preventive Measures
Run regression tests to uncover any changes to the system or network
◦ Regression tests are a re-run of any original functionality/security tests
The new system may be different, but it should provide the same output as the previous system
7. Document Findings, Actions, and Outcomes
This step is sometimes avoided and is one of the most important in the troubleshooting process
This can be used in the future by other network administrators
◦ Including yourself
Documentation should include:
◦ When the problem occurred and when the solution was implemented
◦ Why the particular solution was used
◦ What changes or fixes were made
◦ Other fixes that might have been considered and why they were not used
◦ Who documented and applied the solution
Build on your initial documentation from Step 5
Establish a searchable knowledge base of problems and solutions for all IT staff to refer to
Troubleshooting
Methodology
Review
Review
Troubleshooting methodology has seven steps:
1. Identify the Problem
2. Establish a Theory of Probable Cause
3. Test the Theory to Determine the Cause
4. Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
5. Implement the Solution or Escalate as Necessary
6. Verify Full System Functionality and, if Applicable, Implement Preventive Measures
7. Document Findings, Actions, and Outcomes
Review (cont’d)
When performing step 1, Identify the Problem, include the following substeps:
◦ Gather information
◦ Question users
◦ Identify symptoms
◦ Determine if anything has changed
◦ Duplicate the problem, if possible
◦ Approach multiple problems individually
When performing step 2, Establish a Theory of Probable Cause, question the obvious and consider
using a standard approach such as:
◦ OSI Top-to-Bottom
◦ Bottom-to-Top
◦ Divide and conquer
Try pinging locally, then progressively ping farther and farther out, moving past your network and
even out into the Internet, to see where the failure lies
Review (cont’d)
When performing step 3, Test the Theory to Determine the Cause, keep in mind the following:
If theory is confirmed, determine next steps to resolve problem
If theory is not confirmed, establish a new theory or escalate
If your solution does not fix the problem, BE SURE to restore the original configuration
◦ You do not want to introduce new problems/variables
Once you’re sure of the solution, perform step 4 by planning on how to roll the solution out to
the affected devices
Your plan should include how to roll back to the original state if something goes awry
You will also want to monitor the effects of your solution to ensure it does not create another
problem
Review (cont’d)
When you are ready, perform Step 5 by implementing the solution or escalating as necessary
For Step 6, perform regression testing to ensure that the network now functions as it should
Finally, document everything, creating a knowledge base that you and others can refer to later
Common Twisted Pair Issues
Common Interface Issues
5.2 Common Power Over Ethernet (PoE) Issues
Cabling and Fiber Optic Cable and Transceiver Issues
Interface Issues Common Cabling and Interface Issues Review
Network + N10-009 Module 5
Common Twisted
Pair Issues
Common Cable Issues
Cable too long – exceeds the recommended length for speed or use case
Incorrect cable type – cable has the wrong specification for the use case
Damaged UTP/STP cable
◦ One or more of the wires in twisted pair cable is broken
◦ If you see a link light, that only guarantees that you hear carrier, not that signal is clean or you can transmit
Bad plug/port
◦ Dirty/corroded/bent/broken pins
◦ One or more of the wires came loose inside the plug
EMI / RFI interference
◦ Cable too close to electromagnetic noise sources
◦ Insufficient shielding or twists-per-foot to resist the amount of electromagnetic/radio interference in the
environment
Incorrect or Inadequate Cable Type
Using a lower cable category when a higher one is needed
◦ Unable to deliver required speed, noise rejection, distance, or PoE at a distance
◦ The deployed cable category is too low for the use case
◦ The cable length is too long for the speed/use case
Full-Cross
◦ Now a legacy standard
◦ All four wire pairs are crossed
◦ Only needed for legacy hardware that does not support Auto MDI-X (crossover auto-adjust)
Half-Cross Crossover Cable Pinout
One End
Works in most cases
Other End
Full-Cross Crossover Cable
Might be necessary in some legacy installations
Rollover (Console) Cable Pinout
Used for console connections to Cisco, NetApp, Juniper,
HP, Dell, Ubiquiti, TP-Link, Arista and other devices
Improper Termination
Incorrect termination can include:
Punching down the wrong twisted pair wires to a 110 block
Incorrectly wiring a cable drop to an RJ-45 wall outlet
Incorrectly splicing a fiber optic pigtail
Plugging a spliced pigtail into the wrong fiber optic pass-through jack on a patch panel
Mixing up the pins when crimping an RJ-45 end on a patch cable
Wires too short or too long when crimping an end on a patch cable
Not fully crimping an end when making a patch cable
Inadequate or incorrect strain relief of a bundled fiber optic cable on a patch panel
Bad Termination Examples
Can You Spot the Problem?
Crossover cable:
◦ Has differently-wired ends
◦ Is used to connect two Ethernet devices without a switch/hub
◦ Is used to connect two legacy switches/hubs that don’t support Auto MDI-X (crossover auto adjust)
◦ Has one end with the orange set of wires switched with the green set
CAT 5e
CAT 7
CAT 6 CAT 8
Crimping an RJ-45 Head
2 3 4
1
5 6
Nice Crimp Job!
Crimp is on the jacket
No extra wire length
No bare wires
All wires have good contact
Keystone Jack
Used to terminate a network drop in the wall
Wire the back
Snap jack into wall plate
Not All Keystone Jacks are Wired the Same Way
Late Collisions:
◦ Mismatched duplex or cable too long
◦ Late collision counter increments after 64 bytes are received
Port Status
Port status shows administrative state / line protocol state – either can be up or down
Port is up / up:
Port is up / down:
Admin enabled the link, but there is something is wrong at Layer 1 or 2:
PoE is useful when there is no convenient power source near the end device
Note: If the switch does not support PoE, you can insert a separate power injector between the switch and
the end device
PoE Power Budget
PoE Budget is the total amount of electrical power in watts that the switch can supply to connected devices
◦ Such as IP phones, wireless access points, security cameras, and other PoE-compatible equipment
◦ The PoE budget is typically less than the sum of all ports operating at their maximum capacity
Incorrect cabling
◦ Use high-quality Ethernet cables (Cat 5e or higher) for PoE+ or PoE++ to ensure efficient power delivery
◦ Use CAT 6a or higher for distances over 50 meters
PoE Standards
PoE 15.4 watts (802.3af) PoE+ 30 watts 802.3at PoE++ 90 watts (802.3bt)
Uses 2 pairs to carry power Uses 2 pairs to carry power Aka 4PPoE - uses all 4 pairs
Cisco Universal Power over Ethernet
(UPOE) enhances PoE+ at 60 watts Digital Signage
VoIP
Pan/Tilt/Zoom Cameras
Advanced
Wi-Fi
Video IP
Video IP Phones Phones
Networked
Industrial
Alarm Systems Control Systems
PoE Standards
PoE 15.4 watts (802.3af) PoE+ 30 watts 802.3at PoE++ 90 watts (802.3bt)
Uses 2 pairs to carry power Uses 2 pairs to carry power Aka 4PPoE - uses all 4 pairs
Cisco Universal Power over Ethernet
(UPOE) enhances PoE+ at 60 watts Digital Signage
VoIP
Pan/Tilt/Zoom Cameras
Advanced
Wi-Fi
Video IP
Video IP Phones Phones
Networked
Industrial
Alarm Systems Control Systems
PoE Standards
PoE 15.4 watts (802.3af) PoE+ 30 watts 802.3at PoE++ 90 watts (802.3bt)
Uses 2 pairs to carry power Uses 2 pairs to carry power Aka 4PPoE - uses all 4 pairs
Cisco Universal Power over Ethernet
(UPOE) enhances PoE+ at 60 watts Digital Signage
VoIP
Pan/Tilt/Zoom Cameras
Advanced
Wi-Fi
Video IP
Video IP Phones Phones
Networked
Industrial
Alarm Systems Control Systems
PoE Considerations
Be mindful of the switch’s overall power budget
◦ You do not want to overload the switch past its capability
◦ That would cause some ports to not provide power, or require you to prioritize certain ports.
Most PoE switches can autosense if the end device requires PoE
◦ Will automatically turn the power on or off
You can buy a PoE extender to boost both Ethernet signal and PoE power
◦ Place between the PoE switchport and the end device
If your switch does not support PoE, then use a power injector
◦ Place the injector as close as possible to the end device
PoE extender
Monitoring PoE
Enable SNMP to track PoE statistics
Issue switch commands to obtain PoE status
Your fiber optic cable ends are plugged into the wrong ports
◦ Transmit (you will see a light) should be plugged into receive (no light)
◦ Won’t happen with dual (ganged) plugs that have the transmit and receive properly keyed
◦ Unless you mis-wired the pigtail at the fiber optic patch panel
Test/diagnose using:
◦ Visual fault locators (VFLs), OTDRs or power meters
◦ Visual inspection to detect mismatched component types
◦ Performance monitoring for poor signal strength / dropped connections
Preventing Transceiver/Cable Mismatches
Inspect Labels and Color Codes:
◦ SMF: Yellow (common jacket color)
◦ MMF: Orange (OM1 or 2), Aqua (OM3, OM4), Heather Violet (OM4) or Lime Green (OM5)
If necessary, manually set the switchport speed to match the fiber optic transceiver speed
Use Proper Documentation: Label cables, ports, and transceivers for clarity
Educate team members on identifying and matching fiber types
Multimode Fiber Reference
Ethernet Speed Max Distance Wavelength Cable Type Form Factor
Standard
1000BASE-SX 1 Gbps OM1: 275 m, OM2: 550m, 850 nm OM1, OM2, SFP
OM3: 1 km OM3, OM4 Same
physical
10GBASE-SR 10 Gbps OM1: 33 m, OM2: 82 m, 850 nm OM1, OM2, SFP+ form
OM3: 300 m, OM4: 400 m OM3, OM4 factor
25GBASE-SR 25 Gbps OM3: 70 m, OM4: 100 m 850 nm OM3, OM4 SFP28
40GBASE-SR4 40 Gbps OM3: 100 m, OM4: 150 m 850 nm OM3, OM4 QSFP+ Same
physical
100GBASE-SR4 100 Gbps OM3: 70 m, OM4: 100 m 850 nm OM3, OM4 QSFP28
form
100GBASE-SR10 100 Gbps OM3: 100 m, OM4: 150 m 850 nm OM3, OM4 CFP factor
400GBASE-SR8 400 Gbps OM3: 70 m, OM4: 100 m 850 nm OM3, OM4 QSFP-DD or OSFP Distinct
400GBASE-SR4.2 400 Gbps OM4: 150 m, OM5: 150 m 850 nm + 910 nm OM4, OM5 QSFP-DD or OSFP form
factors
Single Mode Fiber Reference
Ethernet Speed Max Distance Wavelength Cable Type Form Factor
Standard
10GBASE-LR 10 Gbps Up to 10 km 1310 nm OS1, OS2 SFP+
10GBASE-ER 10 Gbps Up to 40 km 1550 nm OS1, OS2 SFP+
10GBASE-ZR 10 Gbps Up to 80 km 1550 nm OS2 (recommended) SFP+
25GBASE-LR 25 Gbps Up to 10 km 1310 nm OS1, OS2 SFP28
40GBASE-LR4 40 Gbps Up to 10 km 4 x 1310 nm OS1, OS2 QSFP+
100GBASE-LR4 100 Gbps Up to 10 km 4 x 1310 nm OS1, OS2 QSFP28
100GBASE-ER4 100 Gbps Up to 40 km 4 x 1550 nm OS2 (recommended) QSFP28
400GBASE-LR8 400 Gbps Up to 10 km 8 x 1310 nm OS1, OS2 QSFP-DD or OSFP
Transceiver Signal Strength Issues
Signal strength issues in transceivers can significantly affect the performance of a network link
◦ These issues arise from factors related to the transmitter, receiver, and the physical medium
https://www.chemtronics.com/how-to-clean-and-how-not-to-clean-fiber-optic-connectors
Troubleshooting Signal Strength Issues (cont’d)
Verify Transceiver and Cable Match:
◦ Ensure transceivers and cables are compatible in terms of wavelength, type (single-mode vs. multi-mode), and range
Measure Distance:
◦ Confirm the cable run is within the transceiver’s specified range
◦ Use optical attenuators for short distances with long-range transceivers
Test Components:
◦ Replace transceivers, cables, or connectors with known good components to isolate the issue
VLAN 1 VLAN 2
Switching Loop Recap
Switching loops are caused by redundant links
Can be trunk links or uplinks
Very likely to result in:
◦ Frames travelling continuously through the loop
◦ Broadcast storm (broadcast frames enter the loop and
are amplified by continuous replication)
◦ Very high switch CPU utilization
◦ MAC table instability
Spanning-Tree Protocol (STP) Recap
STP prevents switching loops by:
◦ Temporarily disabling redundant links to a central reference (root bridge)
access-list 101 deny udp host 192.168.3.5 any All traffic is denied
access-list 101 deny icmp any any What can they do?
access-list 101 deny tcp any host 10.10.10.10 eq telnet
What’s Strange Here?
access-list 101 permit tcp host 10.0.0.20 host 10.0.1.20 eq 3389
access-list 101 deny tcp any host 10.0.1.20 eq 3389
access-list 101 deny tcp any any eq 23
access-list 101 deny tcp any host 200.200.200.200 eq 23
• The end result of this ACL is that only one host can RDP
• With the implicit deny all at the end, no other traffic of any type is allowed
• If you want to allow traffic that is not specifically listed, add an explicit permit ip any any at the bottom
Do You See It?
access-list 110 permit tcp any any eq 443
access-list 110 permit udp any any eq 53
• Rules are applied top to bottom
access-list 110 permit ip any any
• Look for any conflicts
access-list 110 deny udp host 192.168.1.150 any eq 53
• Pay attention to the scope of the
access-list 110 deny icmp 10.0.0.0/24 any echo
IP – a single host, an entire
access-list 110 deny ip any 192.168.2.0/24
subnet, or everyone?
access-list 110 permit tcp 192.168.2.0/24 any eq 80
access-list 110 permit icmp 10.0.0.0/24 any echo
access-list 110 deny ip any any
Do You See It?
access-list 110 permit tcp any any eq 443
access-list 110 permit udp any any eq 53
access-list 110 permit ip any any
access-list 110 deny udp host 192.168.1.150 any eq 53
access-list 110 deny icmp 10.0.0.0/24 any echo
access-list 110 deny ip any 192.168.2.0/24
access-list 110 permit tcp 192.168.2.0/24 any eq 80
access-list 110 permit icmp 10.0.0.0/24 any echo
access-list 110 deny ip any any
View the router’s route table to ensure that all destination networks have either:
◦ An explicit route (learned by routing protocol or statically entered)
◦ Default route
◦ All routers must know how to get to every destination
◦ They must either have an actual route to the destination or a default route
Troubleshooting Route Selection (cont’d)
Ensure that no networks have overlapping IP addresses, especially across a site-to-site VPN
View the router’s routing protocol configuration to ensure that all routers have complementary
configurations and are able to establish neighbor relations with other routers
If you have static routes, see if a link has failed or the topology has changed
◦ If so, update the static routes
Commands:
◦ Cisco: show ip route, show ip protocols
◦ Juniper: show route, show configuration protocols
Address Pool
Exhaustion
DHCP Address Pool Exhaustion
Occurs when a DHCP server's available pool of IP addresses is depleted
◦ Leaves it unable to assign IP addresses to new devices requesting them
Causes:
◦ Insufficient pool size / bad design
◦ Rogue devices or malicious activity consuming leases Note: if clients are not
◦ Network growth (such as adding mobile devices to the LAN) receiving DHCP leases,
◦ Leases not expiring due to misconfiguration it might also be that
the DHCP service has
Symptoms: stopped or the server
◦ Devices unable to obtain an IP address is unreachable
◦ Windows and macOS devices displaying APIPA (169.254.x.y) addresses
◦ Linux devices displaying 0.0.0.0 addresses
DHCP Address Pool Tests
Ensure that the DHCP server is reachable and its service is running
◦ Ping the server by IP address to ensure it is online
◦ Check to make sure the DHCP service is started – if necessary, restart the service
Attempt to obtain a lease or offer:
◦ On a device that does not have an IP address, reboot and see if you get a DHCP lease
◦ Ensure that the device TCP/IP settings are set to “DHCP” or “Auto”, and not static or manual
◦ Alternative to rebooting, “bounce” the NIC by disabling and re-enabling it
◦ Or set the NIC to some static IP address then set it back to DHCP
◦ Run the nmap script broadcast-dhcp-discover to see if the DHCP server offers an IP address
◦ C:\Program Files (x86)\Nmap>nmap --script broadcast-dhcp-discover
◦ If desired, run Wireshark on the testing machine to see what DHCP messages you get
◦ A DHCP NACK (negative acknowledgement) or no response at all (less common) from a server likely indicates an exhausted scope
2. If applicable, expand the existing address pool by reclaiming excluded or reserved addresses
3. Consider implementing IP Address Management (IPAM) for better tracking and allocation
4. Create a DHCP superscope (group two scopes together)
◦ Add a second IP address to the default gateway
◦ Create another scope with the second default gateway address as Scope Option 003
◦ Group the two scopes together
◦ Note: any communications between the member scopes will be routed through the router
DHCP Address Pool Resolution Options
5. IF feasible, shorten the subnet mask for the subnet
◦ Be careful not to overlap some other subnet ID
◦ Example: Change from /24 (254 hosts) to /23 (510 hosts)
◦ Will require an entire new scope on the DHCP server with the new subnet mask – delete the old scope
◦ Will also require the router to change its subnet mask
◦ Might also require route updates within your network
◦ On every client, release and renew the DHCP lease:
◦ Windows: ipconfig /release, ipconfig /renew
◦ Linux: sudo dhclient –r, sudo dhclient
◦ macOS: sudo ifconfig <interface> down, sudo ifconfig <interface> up
6. Consider moving some devices to a different VLAN with its own subnet ID and DHCP scope
◦ Will require setting up a VLAN interface to route that VLAN
◦ May also require adding/modifying firewall rules and NAT rules to allow that new subnet to go to the
Internet
Incorrect IP Settings
Required IP Settings
Most end devices require four IP settings to communicate on a network:
IP address
◦ Must be unique on the network and appropriate for the subnet
Subnet mask
◦ Must be the same for all devices (including the router) on the same subnet
◦ All devices on a subnet must use the same subnet mask to determine whether traffic should be sent to the default gateway
◦ Note: Other subnets can use different subnet masks, but their IP ranges must not overlap with any other subnet
Default gateway
◦ Should be the same for all devices on the same subnet (in rare cases you might split clients between two default gateways)
◦ If you are using a First Hop Redundancy Protocol (FHRP) the router’s virtual IP should be the default gateway address
◦ If you are using a Switch Virtual Interface (aka SVI, VLAN interfaces) all devices on that VLAN should use the SVI as gateway
◦ Ensure that all devices can reach the SVI across however many switches and trunk links that exist
DNS server(s)
◦ If client devices are joined to an Active Directory domain, use the domain’s DNS server(s)
◦ If client devices are in a workgroup, DNS can be set to ISP, or public DNS such as Google 8.8.8.8 or Verizon 4.2.2.2
Incorrect Default Gateway
Occurs when a device’s IP settings have the wrong IP address for the default gateway
Devices can communicate on the same subnet, but not with any outside network
If only one or a few devices have the problem, check to see if it was a manual misconfiguration
If all or most devices on the subnet have the problem:
◦ Verify that the router itself is properly configured, on the same VLAN, and is reachable
◦ Ensure that DHCP clients are getting the correct default gateway address (scope option 003) from the DHCP
server
Incorrect Default Gateway Tests
Verify that both the router and client are on the correct VLAN
Verify that the router has the correct IP address and subnet mask
Verify that the client has an appropriate IP address, correct subnet mask, and correct default gateway
Try pinging in this order:
1. Another host on your own subnet
2. Your own default gateway
3. Another IP address (interface) on the same router
4. Another host on a different subnet in the same private network
What is Wrong Here?
Can Host A, B, C or D send traffic to Host E?
Why or why not?
1.1 2.1
192.168.1.0 192.168.2.0
What is Wrong Here?
IP address conflict: one Wrong subnet mask –
probably can, but the host will think This host is configured
Wrong default gateway
other will not be able to destination is on the correctly
same network
1.1 2.1
192.168.1.0 192.168.2.0
Resolved! All Nodes are Configured Correctly
Changed the subnet
Changed Host A IP to a mask to /24, to conform Corrected the default This host is configured
unique address with the rest of the gateway address correctly
subnet
1.1 2.1
192.168.1.0 192.168.2.0
Network Service
Issues Review
Review
Legacy switches or hubs might not be able autodetect and change Tx – Rx pairs
You might have to use an actual crossover cable to connect older switches and hubs together
When troubleshooting VLAN assignment, ensure that:
◦ The switchport that the device is on is in the correct VLAN
◦ The device has the correct IP address, subnet mask, and default gateway for the VLAN
◦ A VLAN interface has been set up on the distribution layer switch to act as default gateway for the VLAN
◦ All devices in the VLAN can ping their default gateway
When troubleshooting VLAN mismatches, ensure that the Native VLAN is the same on both
sides of a trunk link
If you connect two switches using a simple uplink, ensure that the assigned VLAN membership is
the same for ANY port (upstream or downstream) that will use the uplink
Review (cont’d)
Spanning-Tree Protocol (STP) automatically blocks redundant links that can cause switching
loops
Switching loops often occur because STP was disabled or misconfigured
STP goes through a 50-second process to identify and disable loops
Rapid PVST+ is a new replacement for STP, and is also backward compatible with STP
If a non-optimal switch is elected as the root bridge, go to the preferred switch and lower its
bridge priority
The switches will elect the new root bridge and update the STP topology accordingly
Review (cont’d)
You might think that there is a connectivity problem when in actuality you have a firewall or ACL blocking certain
types of traffic
When troubleshooting ACLs, try connecting to a different site, or with a different protocol
Outbound HTTP / HTTPS is usually allowed on most firewalls
Temporarily disable the firewall rule to see if connectivity is restored
View the access list to examine its rules order
Keep in mind that ACLs compare incoming packets to each rule in the list, starting from the top
Once the packet matches a rule, the permit/deny action is applied and the packet is not checked against any other rule
Make sure that the rule order in an ACL does not inadvertently conflict with another rule
Most ACLs have an implicit “deny all” at the end
If your ACL only has deny statements, be sure to add an explicit “permit any” rule at the end to allow all other traffic
Review (cont’d)
When troubleshooting routing, use tracert/traceroute to find where the path fails
◦ Keep in mind that a firewall or ACL blocking ICMP might make the path seem to end before it actually does
If a router does not know what to do with a packet, it will discard it
A router must either have a route for every network, or a default route (gateway of last resort –
0.0.0.0/0)
Examine the router’s route table to ensure it has a route for every destination
Ensure that no networks have overlapping IP addresses, especially across a site-to-site VPN
View the router’s routing protocol configuration to ensure that all routers have complementary
configurations and are able to establish neighbor relations with other routers
Update static routes on all routers if a link has failed or the network topology has changed
Remember that routers select routes by:
◦ 1. Longest prefix match, 2. Administrative distance, 3. Routing protocol metric
Review (cont’d)
DHCP address pool exhaustion occurs when a DHCP server's available pool of IP addresses is
depleted, leaving it unable to assign IP addresses to new devices requesting them
Windows and macOS devices that cannot obtain a DHCP lease will display an APIPA (169.254.x.y)
address as their IP address
Linux devices that cannot obtain a DHCP lease will display 0.0.0.0 as their IP address
You can use ipconfig /release and ipconfig /renew to attempt to communicate with the DHCP
server
You can also view the DHCP server’s logs or use an nmap script to troubleshoot DHCP
Make sure that the DHCP service itself is running, and that the server is reachable across the
network
Review (cont’d)
Solutions for resolving DHCP scope exhaustion include:
Attempting to scavenge stale leases
Increasing the scope size by reclaiming excluded or reserved addresses
Implementing IPAM for better management and tracking
Creating a superscope of two scopes grouped together
Recreating the scope with a larger address pool (you will need to use a shorter subnet mask)
Moving some devices to another subnet / VLAN
Review (cont’d)
Most end devices require four IP settings to communicate on a network: IP address, subnet mask, default gateway, and
DNS server(s) IPs
The IP address must be unique on the network and appropriate for the subnet
The subnet mask must be the same for all devices (including the router) on the same subnet
The default gateway should be the same for all devices on the same subnet (in rare cases you might split clients between
two default gateways)
If you are using a First Hop Redundancy Protocol (FHRP) the router’s virtual IP should be the default gateway address
If you are using a Switch Virtual Interface (aka SVI, VLAN interface) all devices on that VLAN should use the SVI as
gateway
Ensure that all devices can reach the SVI across however many switches and trunk links that exist
If client devices are joined to an Active Directory domain, use the domain’s DNS server(s)
If client devices are in a workgroup, DNS can be set to the ISP DNS, or public DNS such as Google 8.8.8.8 or Verizon
4.2.2.2
Device Uptime / Downtime
Network Conditions
Wireless Signal Issues
5.4 Performance Disassociation Issues
Issues Roaming Issues
Network + N10-009 Module 5
Addressing a Common Problem with Public Wi-Fi Hotspots
Performance Issues Review
Device Uptime / Downtime
The most basic metric you can track on a device, link or system
How long something has been down or up is a very common starting point for other
investigations
You can use outside systems to regularly ping a device or service and log any failures to respond
You can also check timestamps in a system log to see time gaps, as well as when a system or
service restarted
To view device uptime, use the following command:
◦ show version (Cisco)
◦ show system uptime (Juniper)
Network Conditions
Network Performance-Related Issues
Bandwidth
◦ Refers to the maximum data transfer rate of a network or internet connection, measured in bits per
second (e.g., Mbps, Gbps)
◦ Determines how much data can be transmitted simultaneously
◦ High bandwidth enables faster file transfers, higher-quality streaming, and better support for multiple users
◦ Affected by:
◦ Infrastructure limitations (e.g., cable type, router capacity)
◦ Network traffic and contention levels
◦ Protocol overhead reducing the effective bandwidth
Congestion
◦ Caused when excessive traffic overwhelms
the network's capacity
Network Performance-Related Issues (cont’d)
Contention
◦ Occurs when multiple devices compete for the same network resources, such as bandwidth or access to the
transmission medium
◦ In modern switched networks, contention is avoided through microsegmentation at the switchport level
◦ Contention is rare unless uplinks/trunk links to switches become saturated, or devices exist on shared segments (hubs)
◦ Contention in WLANs is inherent because multiple devices share the same radio spectrum
◦ Can be managed through:
◦ Using 5 GHz or 6 GHz bands
◦ Deploying multiple Access Points (APs)
◦ Spreading devices across channels
◦ Limiting the number of devices per AP, and implementing QoS
Bottlenecks
◦ Occurs when one part of the network has a lower capacity than the rest, limiting overall performance
◦ Caused by mismatched hardware capacities, outdated network devices or interfaces, and insufficient
bandwidth on critical links
Real-time Traffic Performance Metrics
Bandwidth
◦ Must be sufficient for the traffic load
Packet Loss:
◦ Packets that never arrive
◦ Causes interruptions in audio or video streams, leading to degraded call quality (e.g., missing words or video frames)
◦ Excessive packet loss can make real-time applications like VoIP or video conferencing unusable
Latency:
◦ Delay between transmission and reception
◦ High latency results in noticeable delays in communication
◦ Causes awkward pauses in Video or VoIP calls, or lag in online gaming
Steady stream of packets
◦ Impacts interactivity, making real-time collaboration frustrating
Jitter:
◦ Variable delay
◦ Inconsistent packet arrival times
◦ Creates distortion or "choppiness" in audio and video streams
◦ Worst impact is on audio
◦ Hardest to compensate for Same packet stream after congestion or improper queueing (causes jitter)
Impact of Network Conditions on Real-time Traffic
Monitor Performance:
◦ Regularly test and monitor network performance to stay within acceptable thresholds
Upgrade Infrastructure:
◦ Invest in high-quality hardware and faster network connections for critical applications
Wireless Signal
Issues
Wireless Signal Degradation and Loss
Channel overlap, channel crowding
EMI, RFI
Attenuation
◦ WAP is too far away
◦ Dead spots / insufficient coverage
Physical obstruction
◦ absorption, reflection
Multi-path interference
◦ Reflected signal amplifies itself or
cancels itself out (phase cancellation)
Common Wi-Fi Interference Sources
RFI/EMI
◦ Microwave ovens
◦ Motors, fans, lights, elevator shafts
◦ Manufacturing equipment/factory machines
◦ Hospital radiology equipment
Channel Crowding / Channel Overlap
◦ Too many devices on one channel
◦ Neighboring wireless networks that overlap part of yours
Frequency Crowding
◦ Other wireless sources such as:
◦ LTE, Bluetooth, unlicensed equipment such as smart home devices,
◦ radar/meteorological equipment, medical instruments, etc.
BAD Better
Consider Antenna Angle and Signal Coverage
Multi-story AP Coverage Example
Troubleshooting Wireless Signal Issues
Conduct a site survey / visual inspection
If possible, supplement your walkthrough with architectural/floor plans
Identify elevator shafts, stairwells, other possible obstructions and distances
Look For Anything That Might Obstruct Signal
Heavy equipment including furnaces, HVAC and water heating
Heavy furniture including steel racks/shelves/desks
Concrete or steel-reinforced walls, doors, ceilings and floors
Armored electrical cables, thinwall conduit, electrical breaker boxes
Fluorescent lighting reflectors
Thick glass and mirrors
Faraday cages (completely shielded enclosures)
◦ Government/military classified areas
◦ Radiation-shielded walls (hospitals)
Large bodies of water
Mounds of earth
Buildings and other structures
Use a Spectrum Analyzer
Use a spectrum analyzer to identify:
◦ Frequency crowding
◦ RFI/EMI
◦ Dead or weak zones
Solution: NeverSSL.com
Public Wi-Fi Login Issue - Solution
Open a connection to neverssl.com
Provides an HTTP-only website to trigger captive portal login pages on public Wi-Fi
Allows public Wi-Fi networks to intercept and redirect requests to their login portal
Ensures users can access Wi-Fi authentication pages when HTTPS websites are blocked from redirection
A simple workaround for modern encrypted web browsing that may hinder captive portal detection
How to Use Neverssl.com
1. Join a public Wi-Fi network, which typically requires authentication through a captive portal
2. Open any web browser on your device
3. Manually type http://neverssl.com into the browser's address bar
4. Since NeverSSL.com operates over unencrypted HTTP, the Wi-Fi network intercepts the
request
5. The network redirects you to its captive portal page for authentication
6. Follow the Wi-Fi provider's instructions (e.g., agree to terms, enter login credentials) to gain
full Internet access
7. Voila! You’re on!
Performance Issues
Review
Review
Device uptime / downtime is the most basic metric you can track on a device, link or system
You can use outside systems to regularly ping a device or service and log any failures to respond
You can also check timestamps in a system’s log to see time gaps, as well as when a system or
service restarted
Bandwidth refers to the maximum data transfer rate of a network or internet connection,
measured in bits per second (e.g., Mbps, Gbps)
Bandwidth is affected by:
◦ Infrastructure limitations (e.g., cable type, router capacity)
◦ Network traffic and contention levels
◦ Protocol overhead reducing the effective bandwidth
Congestion is caused when excessive traffic overwhelms the network's capacity
Review (cont’d)
Contention occurs when multiple devices compete for the same network resources, such as
bandwidth or access to the transmission medium
In modern switched networks, contention is avoided through microsegmentation at the
switchport level
Contention in WLANs is inherent because multiple devices share the same radio spectrum
WLAN contention is managed through using 5 GHz and 6 GHz bands, deploying more WAPs,
spreading devices among WAPs, limiting the number of devices per WAP, and implementing QoS
Bottlenecks occur when one part of the network has a lower capacity than the rest, limiting
overall performance
Bottlenecks are caused by mismatched hardware capacities, outdated network devices or
interfaces, and insufficient bandwidth on critical links
Review (cont’d)
Real-time traffic performance is measured using the following metrics:
◦ Bandwidth - Must be sufficient for the traffic load
◦ Packet Loss - Packets that never arrive
◦ Latency - Delay between transmission and reception
◦ Jitter - Variable delay
Examples include:
◦ SolarWinds Deep Packet Inspection and Analysis Tool
◦ NetFlow
◦ sFlow
Protocol Analyzer Example
Bandwidth Speed Tester
Software that allows you to check the bandwidth (speed) of an Internet
connection
Measures download and upload speed
Helps identify performance issues with your ISP
◦ Only measures speed to a particular site, not to all websites on the Internet
◦ Vendors offer this service as a part of their website
◦ Some software vendors also offer line quality checks
◦ Looking-glass sites run a software that allows viewing of routing data as well
Note: Be sure to move the cable around while testing to check for loose/intermittent connections!
Light Meter / Fiber Optic Cable Tester
Certify and troubleshoot fiber-optic cable
Can measure loss/breakage by sending light through a
fiber optic cable
Network Tap
A Network Tap is specialized hardware that allows passive monitoring of traffic without
interrupting the flow, often used for security analysis and forensics
A physical tap is inserted between two devices (e.g., switch-to-switch or switch-to-router) to
capture traffic as it flows between them
These devices can be used to intercept traffic over both fiber optic and copper Ethernet links,
providing access to all packets traveling between network devices
Wi-Fi Analyzer
A Wi-Fi analyzer is similar to a network analyzer except it is used for wireless networks
Collects packets from the wireless networks and detects:
◦ Acceptable networks, hidden networks, interference by other networks, devices, and other machinery
Use for wireless surveys, wireless access point placement, and troubleshooting
Can be a standalone device or an app on a PC or phone
Phone App Wi-Fi Analyzer Example
Spectrum Analyzer
Measures the level of signal (including noise) across a range of frequencies
Used to find:
◦ Congested wireless channels and frequencies
◦ Interference levels at different frequencies
Usually requires:
◦ A specialized hardware receiver that can process ANY signal type, not just Wi-Fi
◦ Software that can interpret the reading
OTDR Trace
Typical Features of an OTDR Trace
Basic Networking
Device Commands
Network Device Commands
Command Description Comment
show mac-address-table Display a switch’s MAC table Cisco commands for older and
show mac address-table current switches
show route Display router’s route table Juniper
show ip route Cisco
show interface Display interface statistics Juniper, Cisco
show config Display device’s running or saved configuration Juniper, HP, Aruba
show running-config Cisco
show startup-config Cisco
show arp Display the ARP cache Universal
show ip arp
show vlan Display VLANs and their ports on the switch Universal
show power Display power information Cisco and some Juniper
show power inline Display PoE information
Troubleshooting
Tools and Protocols
Review
Review
A protocol analyzer is a hardware or software tool that captures and analyzes network traffic
You can use a protocol analyzer to:
◦ Measure bandwidth utilization by protocol or host
◦ Identify unauthorized, unknown, or potentially malicious traffic (by protocol)
◦ Identify peak times of utilization
◦ Detect sniffers on your network (hosts with network interfaces in promiscuous mode)
A bandwidth speed tester is software that allows you to check the bandwidth (speed) of an
Internet connection
The speed tester measures download and upload speed, helping you identify performance
issues with your ISP
Review (cont’d)
Command Description Examples
ping Send an ICMP echo to a remote host to prove ping 8.8.8.8
Layer 3 connectivity ping www.example.com
traceroute / tracert Discover the Layer 3 path to a remote host tracert www.example.com
Can use IP address or DNS FQDN as target traceroute 8.8.8.8
nslookup Manually query a DNS server (Windows) nslookup example.com
dig Manually query a DNS server (Linux) dig example.com
netstat Display listening ports and sockets netstat
netstat -na
netstat -nao
ip / ifconfig / ipconfig Display host IP settings ip addr (Linux)
Ifconfig (Linux)
ipconfig (Windows)
arp Display host arp cache arp -a
Review (cont’d)
Nmap sends specially crafted packets to target hosts and analyzes the responses
Nmap can be used for host discovery, port and vulnerability scanning, OS/service version
detection, firewall and IDS testing, and network topology mapping
Nmap has a graphical user interface (GUI) named Zenmap that simplifies scanning and
visualization
Review (cont’d)
Cisco Discovery Protocol (CDP) is used to discover information about directly connected devices
CDP verifies Layer 2 connectivity and can provide information about neighbors such as device
identifiers, IP addresses, port identifiers, capabilities (e.g., router, switch), and platform
information
Link Layer Discovery Protocol (LLDP) is a vendor-neutral alternative to CDP
LLDP is useful when neighbor devices (such as VoIP phones) are non-Cisco
Review (cont’d)
A telephone toner is used to locate a cable on a patch panel or wall jack
A cable tester checks for broken wires or connections, shorts, and incorrect pin-outs
A light meter / fiber optic cable tester is used to certify and troubleshoot fiber-optic cable
The light meter can measure loss/breakage by sending light through a fiber optic cable
A network tap is a specialized hardware device that allows passive monitoring of traffic without
interrupting the flow
Network taps are often used for security analysis and forensics
A Wi-Fi analyzer is a network analyzer for wireless networks
A Wi-Fi analyzer collects packets from the wireless networks and detects acceptable networks, hidden
networks, interference by other networks, devices, and other machinery
Wi-Fi analyzers are used for wireless surveys, wireless access point placement, and troubleshooting
Review (cont’d)
A spectrum analyzer is a specialized tool that measures the level of any type of signal, including Wi-Fi,
RFI and EMI, across a range of frequencies
A spectrum analyzer is used to find:
◦ Congested wireless channels and frequencies
◦ Interference levels at different frequencies
A visual fault locator uses a laser to check continuity, locate fiber breaks, poor mechanical splices and
damaged connectors in fiber optic cabling
◦ Finds faults along a cable
◦ You must be able to fully see the cable
A time delay reflectometer (TDR) is used to check cable continuity
◦ The TDR sends a signal down the cable, which bounces back at a break in the cable or at the end
◦ The time taken for the reflected signal to return is then calculated to determine where the break or end is
An Optical time domain reflectometer (OTDR) is used to check continuity in fiber-optic cables
Review (cont’d)
Command Description Comment
show mac-address-table Display a switch’s MAC table Cisco commands for older and
show mac address-table current switches
show route Display router’s route table Juniper
show ip route Cisco
show interface Display interface statistics Juniper, Cisco
show config Display device’s running or saved configuration Juniper, HP, Aruba
show running-config Cisco
show startup-config Cisco
show arp Display the ARP cache Universal
show ip arp
show vlan Display VLANs and their ports on the switch Universal
show power Display power information Cisco and some Juniper
show power inline Display PoE information