Cisco tips: Track down communication issues – Part 1

You know how sometimes you plug in everything, configure device / ports and then the un-expected result is “not working”. Then you start to troubleshoot, which is a good point, but very important is where are you looking for the root cause of your issue.

A lot of people who have communication issue start by issuing a ping from one end to the other one. This is a good approach when somebody is reporting service issue (e.g. my webserver doesn’t work) as with the ping you can see immediately if is a communication issue or a server one. This scenario ussualy occurs when you already have a working environment and after a while somebody encounter a service issue.

Instead when you just deployed a new connection and you are having issue with it, ping is not the best approach. In the following article I will try to show you some good steps proven to be effective when you start troubleshooting. For today I will take as example a faulty communication between a Cisco switch and an end device (server or user device). This involes in the first step basic Layer 2 troubleshooting.

Scenario 1: You have an end device connected to a switch and you have no communication

a) Check the interface connection status:

OK – port is connected and protocol shows up status

Not OK – check the faulty port as it is in shutdown state

Not OK – port is not connected, protocol shows down status
You can check for cable error (damage, faulty plug, unplugged) or ask the owner of the remote device to check it.

If you found any error in the above step, try to fix them now. If the interface is connected, but still not working, follow on to the next steps.

b) Check speed and duplex settings
-if you have auto-negotiation here and it fails, you will end with an interface in down status
-again if you have static settings here, check to be the same on both sides.
-for more pro and cons regarding auto-negotiation vs static, please see Greg Ferro’s article

c) Check the interface switchport configuration:


There is no right and wrong configuration here, but I can point you to check the following:
– very important, check if the access VLAN is the right one
– if you have switchport auto-negotiation enabled, check to see that this is correctly achieved
– if you have switchport static configuration, check to have the correct settings for your needs
– if you need trunking (to an end device), check to allow the necessary VLANs on that trunk
– if you use private VLANs, pay attention to the configuration of primary and secondary vlan and right association

d) Check security on the Access port (BPDU guard, port-security, mac-address access-list…):


– port is in shutdown state due to Security Violation (1); The mac-address that you see there is the one coming to the port from the other end, but also you can see that there is a Configured Mac Address (1) on the port; Most probably the one configured on the port does not match the one from the network.


-if the result is like above one, you may want to check if that mac-address access-list allow communication from end device mac-address


– if your interface status is like this, you might have an issue with spanning-tree BPDUguard being enabled on the interface; I know I said that this is end device connected, but what if the user needed an extra port, and he connected there a switch? You always have to assume what’s the worst and check for possible issue.

f) Check the Spanning-tree protocol on the switch port


– your output might look different than the above one, but be sure to have there FWD (Forwarding) status if the port is connected to an end device.
– again it is very rare not to be in FWD status, but if the device has some strange bridging capabilities or user added another device in the middle, like a switch than you can identify a problem with Spanning-tree.

This are the basic stuff that I checked in regard to Layer 2 topology when I have no communication to the end host. In the next part, I will do a short presentation of the scenario when you have communication to end device, but the connection encounter traffic deprecation.

Check the 2nd Part of this series which deals with communication deprecation at Layer 2.

Do you have any other tips in regard to this topic? Anything else you check and can be added here? Be sure to comment below and your suggestion will be taken into consideration.

Cisco Visual Network Index (VNI)

Cisco Visual Network Index (VNI) is an interactive tool that can help you to forecast and analyze the growth and use of IP networks worldwide. Cisco VNI intiative includes distinct elements to provide a comprehensive view of the changing IP network landscape:

Cisco VNI Forecast is a model for the estimation of future global IP traffic growth.

This can help you to estimate global IP traffic growth using data sources like Application Type, Country and Region, Segment or Network. You can access this VNI Forecast Widget and using the Wizard Editor you can create your own forecast. If you have more experience, there is also an advanced editor to predict IP traffic growth. I’m going with the Wizard to show you what I mean and why I like this tool.

IP traffic estimation by Application Type. You can select what applications to check from Web/Email, File Sharing, Internet Gaming, Business Internet, IP WAN and many more. Following the Step by Step wizard you can end with the following graph:

I have checked all the applications in the diagram above.

Estimated IP traffic by country and region:

IP traffic estimation by segment:

And finally Estimation by Networks:

If you want to help Cisco and improve this estimations you can download 2 applications: Pulse which can be installed on a PC (too bad that there is no version for Linux or Mac) or GIST for mobile devices like Blackberry or Iphone.

To see how the statistics gathered from this software look, check on Ciscovnipulse.com. It’s a real nice interactive map where you can find useful information. I don’t know if this numbers are accurate, as they rely on volunteer users which install Cisco VNI software, but certainly they are trying to make a good job together. If this forecasts are true or not will see in the future.

The Cisco CRS-3 Carrier Routing System

On March 9, 2010 Cisco announced the Cisco® CRS-3 Carrier Routing System (CRS) designed to serve as the foundation of the next-generation Internet and set the pace for the astonishing growth of video transmission, mobile devices and new online services through this decade and beyond.

With more than 12 times the traffic capacity of the nearest competing system, the Cisco CRS-3 is designed to transform the broadband communication and entertainment industry by accelerating the delivery of compelling new experiences for consumers, new revenue opportunities for service providers, and new ways to collaborate in the workplace.

Check below the amazing features of this device which can support for sure the future technologies:

Defining Scalability

  • Total capacity of up to 322 Tbps – 13 times the competition
  • Proven multichassis architecture with 3-stage fabric
  • Tried and tested QuantumFlow Array chipset to help prevent bottlenecks

Defining Core and Data Center Services

  • Built-in service intelligence allows the network and cloud to work as one
  • Multi-directional capabilities handle traffic between data centers and from core to subscriber
  • Cloud VPNs automate network connectivity

Defining Cost Savings

  • Lower cost per Gbps – uses up to 40% power of competitors
  • Optional modular power system that grows with capacity
  • Smart design uses the existing CRS-1 chassis and many components, requiring only fabric and line card upgrade

Traffic capacity / module:

Introducing the Cisco CRS-3 Carrier Routing System by Mr. John Chambers:

[stream provider=youtube flv=http%3A//www.youtube.com/watch%3Fv%3DZfZmRGI7u10 img=x:/img.youtube.com/vi/ZfZmRGI7u10/0.jpg embed=false share=false width=560 height=340 dock=false controlbar=bottom skin=imeo.swf bandwidth=high autostart=false /]

Cisco CRS-3 Carrier Routing System presentation:

[stream provider=youtube flv=http%3A//www.youtube.com/watch%3Fv%3DtOcAlD8XsSY img=x:/img.youtube.com/vi/tOcAlD8XsSY/0.jpg embed=false share=false width=560 height=340 dock=false controlbar=bottom skin=imeo.swf bandwidth=high autostart=false /]

GNS3: OSPF and EIGRP scenario

A ready made GNS3 topology, including 3 interconnected routers in different domains (EIGRP and OSPF) like in the topology below.

Requirements:

– GNS3 or Dynamips install and functional
– Cisco IOS image for 3640 platform with Advanced IP Services

What’s included in the archive:

– routers initial configs
– network diagram
– GNS3 (or Dynamips) config file*
* Check the GNS3 config file for direction

What can you test with this scenario:

– ospf area range command
– ospf summary address command
– advertise loopback interfaces with /24 netmask
– redistribution between OSPF and EIGRP

Load the .net file in GNS3 / Dynamips, apply initial router configuration and you should have working scenario with OSPF and EIGRP routing.

{filelink=1}

Cisco and IDG international Innovation Awards 2010

Austrian Companies ASFINAG & X-Tention Win the Cisco and IDG international Innovation Awards 2010
ASFINAG scoops award for implementing reliable communication network in Austria’s tunnels and X-Tention takes prize for its use of innovative IT solutions to link doctor’s surgeries, care homes and hospitals.

Quoting Cisco Press release:

“ASFINAG rewarded for highly secure and reliable communication in Austria’s tunnels

ASFINAG Autobahnen- und Schnellstraßen-Finanzierungs-Aktiengesellschaft won the Cisco Innovation Award 2010 in the Most Innovative Unified Communications and Collaboration Project category for implementing the Cisco IP Interoperability and Collaboration System (IPICS) in Austria’s tunnels. This system permits ASFINAG to connect analog and digital networks, including landlines, mobile phones and the radio networks used by the fire and ambulance service and the police. These services all use different networks, which are not compatible with each other. In the event of an emergency, IPICS facilitates rapid and reliable communication with all the emergency services. IPICS has already proven its worth and is being used extensively in the Arlbergtunnel, Europe’s longest road tunnel.


X-Tention awarded prize for standardised exchange of patient files

X-Tention Informationstechnologie GmbH took the Cisco Innovation Award 2010 in the Most Innovative Data Centre Project of the Year category for its role in the Cisco Medical Data Exchange Solution (MDES) project. MDES is a technology for highly secure, standardised exchange of patient data between hospitals, care homes and doctor’s surgeries. MDES was developed by Cisco in cooperation with Tiani Spirit of Austria, a world leader in its area. X-Tention, a hospital IT specialist, implemented the system at the Klinikum Wels-Grieskirchen, currently Cisco’s international e-health reference for connecting hospitals, care homes and doctor’s surgeries via networks. X-Tention is also working with Cisco on a number of similar projects in Austria, Germany, Switzerland and South Africa.”

[stream provider=youtube flv=http%3A//www.youtube.com/watch%3Fv%3DVqd2kPuqz9Y img=x:/img.youtube.com/vi/Vqd2kPuqz9Y/0.jpg embed=true share=true width=560 height=340 dock=true controlbar=over skin=imeo.swf bandwidth=med autostart=false /]

Read the full news on Cisco.com Press release…