IP Troubleshooting Procedures
The General approach of the process of troubleshooting TCP/IP connectivity issues with the assumption that you will have access to the client and may not have access to the server. If the problem is determined to be a server issue, you contact the server administrator. If you are the server administrator you can apply the troubleshooting process in reverse server to client to further troubleshoot connectivity issues. To efficiently troubleshoot a TCP/IP connectivity problem it is necessary to identify a single pair of source and destination devices that are exhibiting the connectivity problem. When you've selected the two devices test to make sure that the problem is actually occurring between these two devices. Possible problems include these. Physical layer issue somewhere along the path. First hop Layer 3 connectivity issue local LAN segment. Layer 3 IP connectivity issue somewhere along the packet's path. According to the cisco site, below are some starting points they suggest. Try to ping from the source to destination device by IP address. If the ping fails verify that you are using the correct address and try the ping again. If the ping still fails go to the next section Troubleshooting Local Connectivity Problems proceed to Step. Try to ping from the source to the destination device by name. If the ping fails verify that the name is correctly spelled and that it refers to the destination device and then try the ping again. If the ping still fails go to the section Troubleshooting Domain Name Server Problems. If you can ping the destination by both name and address it appears that the problem is an upper layer problem.
You May Also Find These Documents Helpful
-
Part III PHYSICS HSE II Time:2Hours Max:60 Scores 1. Three identical charges each +q are placed at the corners of an equilateral triangle of side d cm. Calculate the force on a +ive charge +2q at the centroid of the triangle. 2 2.If the earth is supposed to be a metallic sphere,its capacity will be nearly (a) 700pf (b) 700 microfarad (c) 700f (d) 6.4 X10^6 f 1score 3. write the relation between dielectric constant and electric susceptibility. 1score 4. A box encloses an electric dipole consisting of charge 5micro C and -5micro C and of length 10cm. What is the total electric flux through the box? 2scores 5. Find the ratio of the p.d that must be applied across the (1)parallel (2) series combination of two identical capacitors so that the energy stored in the two cases becomes the same. 2 scores 6.(a)…
- 775 Words
- 4 Pages
Satisfactory Essays -
1. Is an external wall within 900mm of an allotment boundary to another property, 1.8m to another building that isn’t a class 10 building, or 3m from a brush fence?…
- 800 Words
- 4 Pages
Good Essays -
I thought it would have been the same ip address but it is showing the loopback loop. R1 will apparently choose the highest Ip address on a loopback interface…
- 2232 Words
- 17 Pages
Satisfactory Essays -
The answers are A. The transport layer divides a data stream into segments and may add reliability and flow control information. The second answer is D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.…
- 247 Words
- 1 Page
Satisfactory Essays -
Fill in the blanks in the following table. Then use the table to answer the questions:…
- 472 Words
- 2 Pages
Satisfactory Essays -
When installing a switch you want to figure out where to put the switch first, then you will want to decide whether you are going to use an internal AC power supply or by connecting the Cisco 600W AC RPS which is optional to the RPS connector on the switch. You are then going to want to use the Command Line Interface to configure the switch. The console port on the back can be connected to a management station. This is normally a PC or you can use a modem with a supplied RJ-45-to-RJ-45 rollover console cable and the appropriate adapter. A new switch comes with no password installed. A password has to be installed in order to access the configuration or switch management interfaces. If you don’t put a password on it, you can’t access the configuration until the switch joins a cluster or you install a password.…
- 747 Words
- 3 Pages
Satisfactory Essays -
You must demonstrate the various methods for using the runas utility to allow administrators to reduce the exposure of administrative accounts.…
- 322 Words
- 2 Pages
Satisfactory Essays -
8. The reactance offered by a capacitor to alternating current of frequency 50 Hz is 20 Q. If frequency is increased to 100 Hz, then reactance becomes -----------------.…
- 297 Words
- 2 Pages
Good Essays -
lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers.…
- 235 Words
- 2 Pages
Satisfactory Essays -
This video addresses an employee taking a service call from an unhappy customer. Answer the following questions:…
- 189 Words
- 1 Page
Satisfactory Essays -
PAN, LAN, HAN, MAN or WAN –Given that the Little Country Store is a little secretly run organization, I would choose to setup a Local Area Network (LAN) for their framework designing. The LAN configuration is the best option for a productive Small Office/Home Office (SOHO) where periphery contraptions, for instance, printers and scanners may be bestowed to different PCs on the framework. Making usage of this preferred standpoint makes using a framework more calm than purchasing a printer for each individual PC. This LAN will have three PCs masterminded in a comparative building structure with a most extraordinary detachment of 200 feet between PCs.…
- 605 Words
- 3 Pages
Good Essays -
Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.…
- 624 Words
- 3 Pages
Satisfactory Essays -
What is the primary information system in this area? How is it effective in performing its role? With what systems does it interrelate in receiving data or sending data?…
- 606 Words
- 3 Pages
Good Essays -
Check switches, routers to ensure they are up to date. Check routing protocols, and check for unauthorized network access.…
- 339 Words
- 2 Pages
Satisfactory Essays -
To best addressing this issue let me explain about the network errors first. Network errors…
- 366 Words
- 2 Pages
Good Essays