Common network diagnostic and configuration utilities A ‘toolkit’ for network users and managers when ‘troubleshooting’ is needed on your network.

Slides:



Advertisements
Similar presentations
Static Routing Exercise AFNOG 2003/ Track 2 # 1 Static Routing Exercise u Unix network interface configuration u Cisco network interface configuration.
Advertisements

Static Routing Exercise. What will the exercise involve?  Unix network interface configuration  Cisco network interface configuration  Static routes.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Precept 3 Host Configuration 1 Peng Sun. What TCP conn. running? Commands netstat [-n] [-p] [-c] (Linux) lsof -i -P (Mac) ss (newer version of netstat)
METEOROLOGICAL TELECOMMUNICATION AND METCAP A GLANCE TO NETWORK BRIEFLY Ömer Hüdai ALBAYRAK 2010ALANYA.
SYSTEM ADMINISTRATION Chapter 19
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Nassau Community College
Chapter 13: Troubleshooting network connectivity Unit objectives Identify TCP/IP troubleshooting tools Discuss the Telnet utility and its functions Discuss.
1 Linux Networking and Security Chapter 2. 2 Configuring Basic Networking Describe how networking devices differ from other Linux devices Configure Linux.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
Internet Control Message Protocol (ICMP)
Linux Networking TCP/IP stack kernel controls the TCP/IP protocol Ethernet adapter is hooked to the kernel in with the ipconfig command ifconfig sets the.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Network Debugging Organizational Communications and Technologies Prithvi Rao H. John Heinz III School of Public Policy and Management Carnegie Mellon University.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
TCP/IP Protocol Suite 1 Chapter 6 Upon completion you will be able to: Delivery, Forwarding, and Routing of IP Packets Understand the different types of.
TCP/IP Protocol Suite 1 Chapter 6 Upon completion you will be able to: Delivery, Forwarding, and Routing of IP Packets Understand the different types of.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
CT1304 LAN L AB Rehab AlFallaj. TCP\IP U TILITIES Objectives: To understand the following TCP\IP utilities: Hostname Ipconfig Ping Arp Tracert Netstat.
1 TCP/IP architecture A set of protocols allowing communication across diverse networks Out of ARPANET Emphasize on robustness regarding to failure Emphasize.
Linux Networking Commands
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
TCP/IP Protocol Suite 1 Chapter 6 Upon completion you will be able to: Delivery, Forwarding, and Routing of IP Packets Understand the different types of.
1 Version 3.1 Module 4 Learning About Other Devices.
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
58 Troubleshooting Network Connectivity Version A.01 H3065S Module 6 Slides.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
Module 3: Configuring Basic TCP/IPv4 Settings. Overview of the TCP/IP Protocol Suite Overview of TCP/IP Addressing Name Resolution Dynamic IP Addressing.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
Computer Networks. IP Addresses Before we communicate with a computer on the network we have to be able to identify it. Every computer on a network must.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Examining TCP/IP.
Copyright © Lopamudra Roychoudhuri
Linux+ Guide to Linux Certification Chapter Fifteen Linux Networking.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
1 TCP/IP Networking. 2 TCP/IP TCP/IP is the networking protocol suite most commonly used with UNIX, Windows, NT and most other OS’s. TCP/IP defines a.
Static Routing Exercise
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Static Routing Routing Protocols and Concepts – Chapter 2.
Static Routing Exercise Mark Tinka & Isatou Jah. What will the exercise involve?  Unix network interface configuration  Cisco network interface configuration.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
1 Kyung Hee University Chapter 6 Delivery Forwarding, and Routing of IP Packets.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 6: Static Routing Routing and Switching Essentials.
Static Routing Exercise AFNOG 2002 / track 2 # 1 Static Routing Exercise u Unix network interface configuration u Cisco network interface configuration.
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
Configuring a Router Module 3 Semester 2. Router Configuration Tasks Name a router Set passwords Examine show commands Configure a serial interface Configure.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
Chapter 5e.  Upon completion of this chapter, you should be able to:  Find IP configuration settings on Windows & Linux  Troubleshoot IP configuration.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Click to edit Master subtitle style
Troubleshooting a Network
Troubleshooting ip Chapter 5e.
CompTIA Network+ N Authorized Cert Guide
TCP/IP Utilities Richard Goldman May 29, 2003.
Network Commands 2 Linux Ubuntu A.S.
Linux Ubuntu Network Commands 3 A.S.
Troubleshooting IP Communications
Configuring a Router Module 3 Semester 2.
Troubleshooting ip Chapter 5e.
Module 12 Network Configuration
Presentation transcript:

Common network diagnostic and configuration utilities A ‘toolkit’ for network users and managers when ‘troubleshooting’ is needed on your network

Kudlick Classroom lectern Each student workstation has two Intel PRO1000 Gigabit Ethernet Controllers; one is named ‘eth0’ and it is connected to a LAN switch that has a ‘gateway’ to the campus network and the Internet; the other is named ‘eth1’ and it is connected to a different switch which does not offer an Internet ‘gateway’

‘hostname’ This command will quickly show you the network name for your host machine (or will allow you to change that name if you possess the necessary authorization) Example: $ hostname This command works by calling a standard library function (e.g., ‘gethostname()’ ) that we’ll often be using in our own programs

‘ping’ A standard UNIX tool for testing whether a particular host is reachable across an IP network – and if so, then how quickly? Example: $ ping It also confirms that a Network Interface Controller is operating properly, and that a hostname can be ‘resolved’ to its address Example: $ ping stargate.cs.usfca.edu

‘traceroute’ A tool for determining what route is being taken by packets sent over an IP network Example: $ traceroute cs.stanford.edu This tool will report on each of the ‘hops’ between network ‘routers’ along a path to the specified destination, and the elapsed times for each ‘hop’ (in milliseconds) (A similar tool for Linux is ‘tracepath’)

‘route’ It lets users display current information in a host’s ‘routing table’ database -- and it lets a privileged user manipulate that info Example: $ /sbin/route -n The routing table’s entries tell the kernel’s networking subsystem how to deliver, or forward, or else discard, any IP-network packets that are being received by a NIC

‘tcpdump’ This is a ‘packet decoding’ tool – it shows where a packet is coming from, where it is going to, as well as its size and its purpose But it’s only available to a ‘privileged’ user Example: $ sudo /usr/sbin/tcpdump –i eth0 For an active interface on the internet, the volume of output normally produced is so intense as to overwhelm a human’s view!

‘netstat’ It can show a lot of information about the current state of your host’s networking subsystem – such as routing-table entries, active connections, ports and protocols, or statistics for the active Network Interfaces Example: $ netstat -i It’s not a ‘privileged’ command – any user can execute Linux’s ‘netstat’ utility

‘whois’ It’s queries an official Internet database to determine the current owner of a network domain name or host name Example: $ whois It allows users to find out who they can contact in order to report any abuses or malfunctions that have been identified as originating from a particular IP-address

‘ifconfig’ This program allows a user to view status information and statistics for any network interfaces which exist in your machine, or to modify the state of a network interface if you possess the necessary authorizations Example: $ /sbin/ifconfig -a With ‘sudo’ privileges, we will be able to make changes to our interfaces’ states

‘ftp’ This offers a convenient command-line interface to the File-Transfer Protocol which is implemented on the Internet Example: $ ftp hopper.usfca.edu You will usually need to enter a password and a sequence of ftp-specific commands in order to ‘download’ (or ‘upload’) a file using this standard UNIX ‘ftp’ application

‘telnet’ This program lets users communicate with remote servers using the ‘telnet’ protocol Example: $ telnet rainmaker.wunderground.com 3000 Of course, the remote host must allow the connection for specified port-number and for the user who is attempting to connect System administrators often configure a network’s ‘firewall’ to reject telnet-requests

Thanks, Alex! Our System Administrator, Alex Fedosov, has kindly provided a list of several other networking utilities that he finds are very useful in managing the CS Department’s various local networks and its ‘gateways’ Most of those tools are not mentioned by our textbook because they are mainly of use for specialized management tasks

‘nmap’ This is a networking security port-scanner with lots of options and capabilities that a Network Administrator would find helpful for doing security-related troubleshooting Example: $ nmap localhost

‘lsof’ This utility lists a host’s open files and its network connections (i.e., ‘sockets’), and shows which processes are using them Example: $ /usr/sbin/lsof There are lots of command-line options (see the online manual: $ man lsof ) that can make the displayed information be more helpful for your specific purpose

‘host’ This is a Domain Name Service ‘resolver’ allowing a user to find out the hostname for a particular Internet Protocol address Example: $ host Notice that the order in which the numeric components of the host’s IP-address are shown in this program’s output has been reversed (bringing up the ‘endian’ topic)

‘arp’ This utility displays information in a host’s ARP cache (Address Resolution Protocol) and allows a user to manipulate that info Example: $ /sbin/arp

Demo: ‘nicwatch.cpp’ This is ‘packet sniffer’ that your Instructor has created for your use in studying how the network interfaces in our classroom machines are working, and for assistance in ‘debugging’ your own network programs Example: $ nicwatch eth0 You can redirect its screen-output to a file if you want to examine it more leisurely!

In-class exercise #1 Find out what IP-address is being used by your classroom workstation: $ ping hrn235xx Now look at your workstation’s ‘routing table’ to see which interfaces are currently being used: $ /sbin/route -n Then use the ‘ifconfig’ utility to assign an IP- address to your machine’s secondary NIC (i.e., to the ‘eth1’ network interface) $ sudo /sbin/ifconfig eth xxx up Did this cause any routing-table changes?

In-class exercise #2 Now that your secondary NIC is “up” and is using an IP-address on the local area network, you can use ‘ping’ to see if other host are reachable on the LAN $ ping yyy In a separate window you can execute our ‘nicwatch’ utility while ‘ping’ is running: $ nicwatch eth1