Home
Chapter 3 – Using Maintenance & Troubleshooting Tools
Contents
1. Tra f f IC Captur ing Tools Ne tfi low BIRMINGHAM Netflow Configuration pie Netflow Collector The address used as a source needs 10 150 1 24 to match the IP address defined on the collector for the router The Netflow version and udp port number need on the router to match Ri config Htint fa1 0 the version and port number on the Ri config if Htip flow ingress collector Ri config if Ht int fal 1 Ri config if H ip flow ingress Ri config ip flow export source loO Ri config Hip flow export version 5 Ri config Hip flow export destination 10 1 50 1 9996 Chapter 3 oc Ne thi low Monitorin BIRMINGHAM R1 show ip cache flow SrcIf SrcIPaddress DstIF DstIPaddress Pr SrcP DstP Pkts 5e0 0 0 121 10 1 194 10 Null 224 0 0 10 58 0000 0000 27 5e0 0 0 121 10 1 194 14 Null 224 0 0 10 58 0000 0000 28 Fa0 0 10 1 192 5 Null 224 0 0 10 58 0000 0000 28 FaO 1 10 1 192 13 Null 224 0 0 10 58 0000 0000 27 FaO 1 10 1 152 1 Local 10 1 220 2 01 0000 0303 1 Se0 0 1 10 1 193 6 Null 224 0 0 10 58 0000 0000 28 FaO 1 10 1 152 1 5e0 0 1 10 1 163 193 11 0666 E75E 1906 Se0 0 1 10 1 163 193 FaO O 10 1 152 1 11 E75E 0666 1905 The command show ip cache flow include 10 1 163 193 could have been used to limit the output to only those flows that have 10 1 163 193 as the source or destination IP address Chapter 3 Cisco IP Service Level Agreement SLA Responder The IP SLA feature of Cisco IOS Software allows you to c
2. 1 N2 OSPF NSSA external type 2 E1 OSPF external type 1 E2 OSPF external type 2 i IS IS su I 5 IS summary L1 IS IS level 1 L2 IS IS level 2 ia I S IS inter area candidate default U per user static route o ODR P periodic downloaded static route Gateway of last resort is not set 10 0 0 0 8 is variably subnetted 46 subnets 6 masks C 10 1 193 2 32 is directly connected Serial0 0 1 C 10 1 193 0 30 is directly connected Serial0 0 1 D 10 1 193 6 32 90 20517120 via 10 1 192 9 2d01h FastEthernetO 1 90 20517120 via 10 1 192 1 2dO1h FastEthernet0 0 D 10 1 193 4 30 90 20517120 via 10 1 192 9 2d01h FastEthernet0 1 90 20517120 via 10 1 192 1 2d01h FastEthernet0 0 D 10 1 193 5 32 90 41024000 via 10 1 194 6 2d01h Serial0 0 0 122 Chapter 3 Networking Academy Filtering Cisco IOS Outputs Fe City University Unfortunately show commands do not always have the option that allows you filter the output down to exactly what you need You can still perform a more generic way of filtering R1 show ip interface brief Interface IP Address OK Method Status Protocol FastEthernet0 0 192 168 1 11 YES NVRAM up up Serial0 0 unassigned YES NVRAM admin down down FastEthernet0 1 192 168 0 11 YES NVRAM up up Serial0 1 unassigned YES NVRAM admin down down NVIO unassigned YES unset up up LoopbackO 10 1 1 1 YES NVRAM up up The output of Cisco OS show commands can be filtered by appendi
3. 127 0 0 1 This is Syslog test message number 0020 systems but syslog 17 02 07 Local0 Debug 127 0 0 1 This is Syslog test message number 0019 17 02 06 Local5 Alert 127 0 0 1 This is Syslog test message number 0018 software i S aval lable for 17 02 06 System4 Debug 127 0 0 1 This is Syslog test message number 0017 p 17 02 04 Local3 Info 127 0 0 1 This is Syslog test message number 0016 W d d M h 17 02 03 Lpr Critical 127 0 0 1 This is Syslog test message number 0015 l n OWS an ac l ntos 17 02 02 System4 Notice 127 0 0 1 This is Syslog test message number 0014 latfo rms 17 02 01 System1 Critical 127 0 0 1 This is Syslog test message number 0013 p s Display 00 Default v 17 02 00 User Warning 127 0 0 1 This is Syslog test message number 0012 17 01 59 System2 Info 127 0 0 1 This is Syslog test message number 0011 17 01 58 Local6 Critical 127 0 0 1 This is Syslog test message number 0010 f p 17 01 57 Local4 Emerg 127 0 0 1 This is Syslog test message number 0009 Sys og SO twa re IS 17 01 56 UUCP Debug 127 0 0 1 This is Syslog test message number 0008 il bl 7 17 01 55 Local4 Info 127 0 0 1 This is Syslog test message number 0007 avaliable via commercia 17 01 54 User Error 127 0 0 1 This is Syslog test message number 0006 17 01 53 Local3 Notice 127 0 0 1 This is Syslog test message number 0005 S oftware pac kages or 17 01 52 Kernelinfo 127 0 0 1 This is Syslog test message number 0004 17 01 51 News info 127 0 0 1 This
4. Agent re The agent response will be given back to the source port The Manager will receive traps on port 162 Managed Node Vad SNMP Agent SNMP Security is Not My Problem Chapter 3 BIRMINGHAM City University SNMP Configuration Fa0 0 10 1 50 1 24 Ri config snmp server community cisco ro Ri config snmp server community san fran rw Ri config snmp server location TSHOOT Lab Facility Ri config snmp server contact support mgmt tshoot local Ri config snmp server ifindex persist The snmp server ifindex persist guarantees that the SNMP interface index for each interface will stay the same even if the device is rebooted Chapter 3 BIRMINGHAM City University SNMP Configuration lu 10 1 50 1 24 Ri config snmp server host 10 1 50 1 version 2c cisco Ri config snmp server enable traps R1 sh run include traps snmp server enable traps vrrp snmp server enable traps dsl snmp server enable traps tty snmp server enable traps eigrp snmp server enable traps envmon lt output omitted gt Chapter 3 gren Log M onitor ing Tools ad S VS f OG BIRMINGHAM Syslog is a standard for forwarding og messages in an IP network Syslog messages may be sent via UDP or the TCP The data is sent in clear text 0 Kiwi Syslog Daemon Registered version 7 0 2 Syslog is usually not xis Detam ee native to Windows based Time Priority Hostname Message a 17 02 08 Syslog Warning
5. is Syslog test message number 0003 f reeware 17 N1 5N Suctem Critical 1797711 Thie ie Gnelna tect meceane number NNN 100 61i MPH 17 02 09 18 2002 Chapter 3 Networking Academy Syslog Configuration FaQ 0 10 1 50 1 24 Severity O system unusable I 7 alerts ee action needed i i everity 2 critical conditions Hat ds el Severity 3 error conditions R1 config logging host 10 0 50 1 Severity 4 warnings Severity 5 notifications R1 config logging trap lt severity gt Severity 6 informational messages Severity 7 debugging R1 config service timestamps log uptime datetime R1 config service sequence numbers R1 clock set lt hh mm ss day month year Monitor Logging R1 config show logging R1 config clear logging Chapter 3 e A NetFlow enabled device such as a router or Layer 3 switch will collect information about the IP traffic that is flowing through the device classifying it by flow For each individual flow the number of packets and bytes is tracked and accounted This information is kept ina flow cache e Flows are expired from the cache when the flows are terminated or time out Netflow cache can be configured as a standalone feature on router interfaces and examined using CLI commands In addition to keeping a local cache and temporary accounting of the flows on the device itself the flow information can be exported to a NetFlow collector Chapter 3
6. 2 69 2 42 FddiO g 172 69 13 6 forward IP s 172 69 89 33 Ethernet2 d 10 130 2 156 Serial2 g 172 69 16 2 forward R1 debug ip rip RIP received v2 update from 10 1 1 2 on Serial0 0 0 30 0 0 0 8 via 0 0 0 0 in 1 hops RIP sending v2 update to 224 0 0 9 via FastEthernet0 0 20 1 1 1 RIP build update entries 10 0 0 0 8 via 0 0 0 0 metric 1 tag O 30 0 0 0 8 via 0 0 0 0 metric 2 tag 0 RIP sending v2 update to 224 0 0 9 via Serial0 0 0 10 1 1 1 R1 sh debug display active debugs R1 Hu all switch off all currently active debugs Chapter 3 sen Diagnosing Hardware Issues Using Cisco IOS Commands Due to its nature diagnosing hardware problems is highly product and platform dependent However you can use a number of generic commands to diagnose performance related hardware issues on all Cisco IOS platforms 1 Show processes cpu 2 Show memory 3 Show interface Chapter 3 Networking Academy Checking CPU Utilisation ac The same CPU that is used to run the operating system processes is also responsible for packet switching The CPU is interrupted to suspend the current process that it is executing switch one or more packets and resume the execution of scheduled processes CPU resources spent on interrupts packet switching Total CPU resources spent on processing amp interrupts RO1 show processes cpu sorted lmin CPU utilization for five seconds one minut
7. 68 37 2 show stuff txt The redirect option does not display the output on the console Ri show ip interface brief tee flash show stuff txt The tee option displays the output on the console and sends it to the file R1H dir flash Directory of flash 1 rw 23361156 Mar 2 2009 16 25 54 08 00 c1841 advipservicesk9mz 1243 bin 2 rw 680 Mar 7 2009 02 16 56 08 00 show stuff txt R1 show ip interface brief append flash show stuff txt The append option allows you to add the command output to an existing file Chapter 3 BIRMINGHAM o C 7 City University Testing Network Connectivity with R1 Fa0 1 Source Internet Fa0 0 172 16 0 3 ll Lo0 172 16 0 1 Lo0 172 16 0 2 10 1 156 1 R1H ping 10 1 156 1 Type escape sequence to abort Sending 5 100 byte ICMP Echos to 10 1 156 1 timeout is 2 seconds HI Success rate is 100 percent 5 5 round trip min avg max 1 2 4 ms R1 ping 10 1 156 1 source loO Type escape sequence to abort Sending 5 100 byte ICMP Echos to 10 1 156 1 timeout is 2 seconds Packet sent with a source address of 10 1 192 2 Success rate is 0 percent 0 5 Chapter 3 Testing Network Connectivity with Ping BIRMINGHAM City University R1 Fa0 1 Source Internet Fa0 0 172 16 0 3 Lo0 172 16 0 1 Lo0 172 16 0 2 By setting the df b t option and combining it with the size option you can force routers along the path to drop the packets if they would have to fra
8. 7 a a G S1 config monitor session 2 destination remote vlan 100 SWl show vlan remote span Remote SPAN VLANs 100 SW2 show monitor S2 config vlan 100 rede S2 config vlan remote span TYPe O RSPAN VLAN gt EE S2 config monitor session 3 destination int fa0 8 ae rn al S2 config Hmonitor session 3 source remote vlan 100 Ingress Disabled SW2 show vlan remote span Remote SPAN VLANs Chapter 3 Traffic Capturing Tools Simple BIRMINGHAM Network Management Protocol Jer SNMP SNMP forms part of the internet protocol suite as defined by the IETF gt SNMP is used by network management systems to monitor network attached devices for conditions that warrant administrative attention It consists of a set of standards for network management including an Application Layer protocol a database schema and a set of data objects The current version is SNMPv3 SNPv1 and v2 are considered obsolete and are extremely insecure It is recommended they NOT be used ona publicly attached network Chapter 3 SNMPv1 and SNMPv2 Architecture SNMP asks agents embedded in network devices for information or tells the agents to do something Managed Node e Typically SNMP uses UDP ports SNMP Agent 161 for the agent and 162 for the manager The Manager may send Requests from any available ports source port to port 161 in the agent destination port Managed Node a SNMP
9. Chapter 3 Using Maintenance amp Troubleshooting Tools amp Applications Objectives Describe amp utilise Cisco IOS diagnostic tools Explain the need for specialist tools in the troubleshooting process Configure software to allow packet captures Explain how to create a network baseline using Netflow SNMP IP SLA amp NBAR Chapter 3 Networking Academy Filtering Cisco TOS Outputs Cisco IOS offers multiple show commands useful for gathering information However many of these show commands produce a large quantity of output R1 show ip route 10 1 193 3 Routing entry for 10 1 193 0 30 Known via connected distance O metric O connected via interface Redistributing via eigrp 1 Routing Descriptor Blocks directly connected via Serial0 0 1 Route metric is O traffic share count is 1 R1 show ip route 10 1 193 10 Subnet not in table If gateway of last resort default route is present in the IP routing table but no entry matches the IP address you entered the router again responds with the Subnet not in table message even though packets for that destination are forwarded using the gateway of last resort Chapter 3 porn Fi ilter ing Ci ISC O I OS Ou fpu ts BMG R1 show ip route 10 1 193 0 255 255 255 0 longer prefixes Codes C connected S static R RIP M mobile B BGP D EIGRP EX EIGRP external O OSPF IA OSPF inter area N1 OSPF NSSA external type
10. E EEE eee eee eee HIM M M M M M M MMM Success rate is 76 percent 77 101 round trip min avg max 176 184 193 ms Chapter 3 Testing Network Connectivity with BIRMINGHAM Telne t City University ae Fa0 1 i re S e Fa0 0 a 172 16 0 3 Lo0 172 16 0 1 Lo0 172 16 0 2 10 1 156 1 Telnet is an excellent companion to ping for testing transport layer connections from the command line Telnet server applications use port 23 but you can specify a specific port number on the client and connect to any TCP port that you want to test R1 telnet 10 1 156 1 80 Trying 10 1 156 1 80 Open GET lt html gt lt body gt lt h1 gt It works lt h1 gt lt body gt lt html gt Connection to 192 168 37 2 closed by foreign host R1 telnet 10 1 156 1 25 Trying 10 1 156 1 25 Connection refused by remote host Chapter 3 di Collecting Real Time Information Cisco Debug Commands Se Because debugging output is assigned high priority in the CPU process it can render the system unusable Therefore use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff debug ip packet P s 172 69 13 44 FddiO d 10 125 254 1 Serial2 g 172 69 16 2 forward rp s 172 69 1 57 Ethernet4 d 10 36 125 2 Serial2 g 172 69 16 2 forward IP s 172 69 1 6 Ethernet4 d 255 255 255 255 rcvd 2 IP s 172 69 1 55 Ethernet4 d 17
11. FastEthernet 0 0 FastEthernet0 0 is up line protocol is up lt output omitted gt Last input 00 00 00 output 00 00 01 output hang never Last clearing of show interface counters never Input queue 0 75 1120 0 size max drops flushes Total output drops 0 Queueing strategy fifo Output queue 0 40 size max 5 minute input rate 2000 bits sec 3 packets sec 5 minute output rate 0 bits sec 1 packets sec 110834589 packets input 1698341767 bytes Received 61734527 broadcasts 0 runts 0 giants 565 throttles 30 input errors 5 CRC 1 frame 0 overrun 25 ignored O watchdog O input packets with dribble condition detected 35616938 packets output 526385834 bytes O underruns O output errors 0 collisions 1 interface resets O babbles O late collision O deferred O lost carrier O no carrier O output buffer failures O output buffers swapped out Chapter 3 Checking Interfaces Filtered Fr If you repeatedly want to display selected statistics to see how the counters are increasing it is useful to filter the output Using a regular expression to include only the lines in which you are interested can prove quite useful in this case Ri show interfaces FastEthernet 0 0 include Fast errors packets FastEthernet0 0 is up line protocol is up 5 minute input rate 3000 bits sec 5 packets sec 5 minute output rate 2000 bits sec 1 packets sec 2548 packets input 257209 bytes O input errors O CRC
12. O frame O overrun O ignored O input packets with dribble condition detected 610 packets output 73509 bytes 0 underruns O output errors 0 collisions O interface resets Caret match string if it occurs at the beginning of a line Pipe logical OR Chapter 3 Traffic Capturing Tools pie Information gathering is essential to both troubleshooting and maintenance Information is either gathered on a need basis such as during a troubleshooting effort or continuously as part of baseline creation A troubleshooter need to be able to 1 Enable Switched Port Analyser SPAN and Remote SPAN RSPAN to facilitate the use of packet sniffers 2 Configure routers and switches for communication with Simple Network Management Protocol SNMP or NetFlow based network management systems to facilitate the collection of device and traffic statistics that are part of a network baseline 3 Configure routers and switches to send SNMP traps to provide fault notification to SNMP based network management systems Chapter 3 sw Traffic Capturing Tools Protocol susan A na f yse hd Se Packet sniffers or protocol analysers are important and useful tools for network engineers Using these tools you can look for and observe protocol errors like retransmissions or session resets Packet sniffers are powerful tools because they capture large amounts of very detailed data use filtering so that only the traff
13. e 31 five minutes 148 PID Runtime ms Invoked uSecs 5Sec 1Min 5Min TTY Process 117 31744 1592 19939 0 81 15 67 6 60 2 SSH Process 4 100470152 5822019 17256 2 12 0 78 0 64 0 Check heaps 40 16722820 78952351 211 1 55 0 68 0 37 0 COLLECT STAT C 11 3243112 8188434 396 0 16 0 24 0 11 0 IP Input 8 13212960 52948370 249 0 08 0 08 0 06 0 ARP Input 164 217812 3106996 70 0 00 0 03 0 01 0 HyBridge Input 38 4164868 267365 15577 0 00 0 01 0 00 0 Per minute Job Chapter 3 Checking Memor Y Utilisation sia Similar to CPU cycles memory is a finite resource shared by the various processes that together form the Cisco IOS operating system Memory is divided into different pools and used for different purposes the processor pool contains memory that can be used by the scheduled processes and the I O pool is used to temporarily buffer packets during packet switching R1 show memory Head Total b Used b Free b Lowest b Largest b Processor 820B1DB4 26534476 19686964 6847512 6288260 6712884 I O 3A00000 6291456 3702900 2588556 2511168 2577468 It is useful to create a baseline of the memory usage on routers and switches and graph the utilisation over time If a router or switch does not have enough free memory to satisfy the request of a process it will log a memory allocation failure signified by a SYS 2 MALLOCF AIL Chapter 3 Checking Interfaces A ity University Networking Academy R1 show interfaces
14. e bit rate bps 5 minute bit rate bps realaudio 2911 3040 1678304 198406 19000 1000 http 19624 13506 14050949 2017293 0 0 lt output omitted gt Chapter 3 Chapter 3 Using Maintenance amp Troubleshooting Tools amp Applications Objectives Describe amp utilise Cisco IOS diagnostic tools Explain the need for specialist tools in the troubleshooting process Configure software to allow packet captures Explain how to create a network baseline using Netflow SNMP IP SLA amp NBAR Chapter 3 DE CISCO Any Questions Chapter 3
15. gment them By varying the size and looking at which point the packets start being dropped you can determine the MTU R1 ping 10 1 156 1 size 1476 df bit Type escape sequence to abort Sending 5 1476 byte ICMP Echos to 10 1 156 1 timeout is 2 seconds Packet sent with the DF bit set Success rate is 100 percent 5 5 round trip min avg max 184 189 193 ms R1 ping 10 1 156 1 size 1477 df bit Type escape sequence to abort Sending 5 1477 byte ICMP Echos to 10 1 156 1 timeout is 2 seconds Packet sent with the DF bit set M M M Success rate is 0 percent 0 5 Chapter 3 Networking Academy Testing Network Connectivity with R1 ping Ping Gen Protocol ip Target IP address 10 1 156 1 Repeat count 5 1 Datagram size 100 Timeout in seconds 2 The router is instructed to Extended commands n y send packets starting at a AN size of 1400 bytes sending a Set DF bit in IP header no yes single packet per size and Keno raul increasing the size one byte Loose Strict Record Time stamp Verbose none ata time until a size of 1500 Sweep range of sizes n y bytes is reached Sweep min size 36 1400 Sweep max size 18024 1500 e M Could not fragment Sweep interval 1 Type escape sequence to abort Sending 101 1400 1500 byte ICMP Echos to 10 1 156 1 timeout is 2 seconds Packet sent with the DF bit set TUTUUT TTT EERECEEEEECELECECECECELECELELECELLLELELECE EEE EEE EEE EE
16. ic you are interested in is displayed File Edit View Go Capture Analyze Statistics Help TET ETE TESE TETTERE KE EEE N Filter v sp Expression amp Clear app No Time Source Destination Protocol Info 1 0 000000 0 0 0 0 255 233 2 20220 DHCP DHCP Discover Transaction ID O0x611ca31b Gratuitous ARP for 192 168 37 3 Request Gratuitous ARP for 192 168 37 3 Request ARP Gratuitous ARP for 192 168 37 3 Request 5 0 036872 00 0d 54 9c 4d 5d A nt NT ARP 6 0 684875 00 0d 54 9c 4d 5d SPES SNU STL ARP 7 1 686321 00 0d 54 9c 4d 5d FETT TETT sassaaa Chapter 3 Traffic Capturing Tools Protocol Analyser using SPAN S1 BIRMINGHAM City University Pack Analyser The Switched Port Analyzer SPAN feature of Cisco Catalyst switches allows copying the traffic from one or more switch interfaces or VLANS to another interface on the same switch S1 config monitor session 1 source int fa0 7 S1 config monitor session 1 destination int fa0 8 SWl show monitor Session 1 Type Source Ports Both Fa0 7 Destination Ports Fa0 8 Encapsulation Native Ingress Disabled Chapter 3 di Traffic Capturing Tools Protocol Networking BIRMINGHAM Analyser using RSPAN TE Server Fs S1 S2 Packet Analyser SWl show monitor Session 2 S1 config vlan 100 00000 ene S1 config vlan remote span eoa Toris S1 config monitor session 2 source int fa0
17. n code OK Number of successes 13 Number of failures 1 Operation time to live Forever R3 show ip sla responder IP SLA Monitor Responder is Enabled Number of control message received 15 Number of errors 1 Recent sources 10 10 101 00 38 01 807 UTC Fri Mar 3 2010 10 10 10 1 00 37 01 783 UTC Fri Mar 3 2010 OUTPUT OMITTED tcpConnect Responder IP Address Port 10 10 20 1 80 Chapter 3 Network Based Application Recognition ites NBAR Used in conjunction with QoS class based features NBAR is an intelligent classification engine that Classifies modern client server and web based applications Discovers what traffic is running on the network Analyzes application traffic patterns in real time e NBAR functions Performs identification of applications and protocols Layer 4 7 Performs protocol discovery Provides traffic statistics e New applications are re supported by loading a Packet Description Language Module PDLM Chapter 3 A Configuring and Monitoring NBAR Protocol Discovery o R1 config if ip nbar protocol discovery Configures NBAR to discover traffic for all protocols known to NBAR ona particular interface Requires that CEF be enabled before protocol discovery Can be applied with or without a service policy enabled Rl show ip nbar protocol discovery Ethernet0 0 Input Output Protocol Packet Count Packet Count Byte Count Byte Count 5 minut
18. ng a pipe character to the show command followed by one of the keywords include exclude or begin R1 show ip interface brief exclude unassigned Interface IP Address OK Method Status Protocol FastEthernetO O 192 168 1 11 YES NVRAM up up FastEthernetO 1 192 168 0 11 YES NVRAM up up LoopbackO 10 1 1 1 YES NVRAM up up Chapter 3 Filtering Cisco IOS Outputs pine R14 show processes cpu include IP Input 713149172 7922812 397 0 24 0 15 0 05 0 IP Input SW1 show running config begin line vty line vty 04 transport input telnet ssh line vty 5 15 transport input telnet ssh Chapter 3 Filtering Cisco IOS Outputs pine e Cisco LOS Software Release 12 3 2 T introduced the section option which allows you to select and display a specific section or lines from the configuration that match a particular regular expression and any following associated lines R1 show running config section router eigrp router eigrp 1 network 10 1 192 2 0 0 0 0 network 10 1 192 10 0 0 0 0 network 10 1 193 1 0 0 0 0 no auto summary Chapter 3 Saving Cisco IOS Outputs et Other useful options that can be used with the pipe character after the show command are redirect tee and append The output of a show command can be redirected copied or appended to a file by using the pipe character followed by the options redirect tee or append and a URL that denotes the file R1 show ip int brief redirect tftp 192 1
19. onfigure a router to send synthetic generated traffic to a host computer or router that has been configured to respond Networking One way or return travel times and packet loss data are gathered and certain measurements allow jitter data to be 10 10 20 S 10 10 10 1 24 llected as well collected as we IP SLA ES 4 amp R3 config ip sla responder tcpConnect ipaddress 10 10 20 1 port 80 Monitor Ri config ip sla monitor 1 Ri config rtr type tcpConnect 10 10 20 1 Ri config rtr tcp frequency 120 R1 config rtr monitor tcp tos 64 R1 config ip sla monitor schedule 1 start time now life forever Chapter 3 BIRMINGHAM City University Cisco IP Service Level Agreement SLA Responder IP SLA monitor supports the ICMP echo feature without the need to configure the target Host router as a responder Networking BIRMINGHAM City University Allows IP SLA to operate with none Cisco devices 10 10 20 1 24 10 10 10 1 24 ETER S d FIS Ri config tt ip sla monitor 2 IP SLA Monitor Ri config rtr type echo protocol ipIcmpEcho 10 10 20 1 Ri config rtr echo Ht frequency 120 R1 config rtr monitor echo tos 32 Ri config Ht ip sla monitor schedule 2 start time now life forever Chapter 3 Verify IP SLA En R1 show ip sla monitor statistics Round trip time RTT Index 1 Latest RTT 168 ms Latest operation start time 16 10 52 453 UTC Sun Mar 3 2010 Latest operation retur
Download Pdf Manuals
Related Search
Related Contents
uMP3g3 Manual - Light-O-Rama MIS000201 MIS000202 SQ140L SQUADRAMODELLI DV-DH160T 取扱説明書 Intel RAID Controller SRCU42X Homeowners Guide Affut Oct-Nov-Déc. 2007.qxp - L`A. Agence culturelle du Poitou Copyright © All rights reserved.
Failed to retrieve file