Network Troubleshooting Tools
Total Page:16
File Type:pdf, Size:1020Kb
Network Troubleshooting Tools Network Troubleshooting Tools Joseph D. Sloan Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Network Troubleshooting Tools by Joseph D. Sloan Copyright © 2001 O’Reilly & Associates, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472. Editors: Robert Denn and Mike Loukides Production Editor: Catherine Morris Cover Designer: Emma Colby Printing History: August 2001: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly & Associates, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. The association between the image of a basilisk and network troubleshooting is a trademark of O’Reilly & Associates, Inc. While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Library of Congress Cataloging-in-Publication Data Sloan, Joe. Network Troubleshooting Tools / Joe Sloan.--1st ed. p. cm. Includes bibliographical references and index. ISBN 0-596-00186-X 1. Computer networks--Maintenance and repair 2. Computer networks--Management. I. Title. TK5105.5 .S557 2001 004.6--dc21 2001035422 [C] [3/02] Table of Contents Preface ..................................................................................................................... ix 1. Network Management and Troubleshooting .................................. 1 General Approaches to Troubleshooting ....................................................... 2 Need for Troubleshooting Tools ..................................................................... 5 Troubleshooting and Management ................................................................. 6 2. Host Configurations ............................................................................... 18 Utilities ............................................................................................................ 20 System Configuration Files ............................................................................ 35 Microsoft Windows ........................................................................................ 42 3. Connectivity Testing .............................................................................. 45 Cabling ............................................................................................................ 45 Testing Adapters ............................................................................................ 52 Software Testing with ping ............................................................................ 53 Microsoft Windows ........................................................................................ 69 4. Path Characteristics ............................................................................... 71 Path Discovery with traceroute ..................................................................... 71 Path Performance ........................................................................................... 79 Microsoft Windows ........................................................................................ 97 5. Packet Capture ....................................................................................... 100 Traffic Capture Tools ................................................................................... 100 Access to Traffic ........................................................................................... 101 v Oracle 8i Internal Services for Waits, Latches, Locks, and Memory, eMatter Edition Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved. vi Table of Contents Capturing Data ............................................................................................. 103 tcpdump ....................................................................................................... 104 Analysis Tools .............................................................................................. 118 Packet Analyzers .......................................................................................... 124 Dark Side of Packet Capture ....................................................................... 129 Microsoft Windows ...................................................................................... 131 6. Device Discovery and Mapping ...................................................... 134 Troubleshooting Versus Management ........................................................ 134 Device Discovery ......................................................................................... 137 Device Identification .................................................................................... 144 Scripts ........................................................................................................... 149 Mapping or Diagramming ........................................................................... 151 Politics and Security ..................................................................................... 156 Microsoft Windows ...................................................................................... 158 7. Device Monitoring with SNMP ........................................................ 160 Overview of SNMP ....................................................................................... 160 SNMP-Based Management Tools ................................................................. 165 Non-SNMP Approaches ............................................................................... 190 Microsoft Windows ...................................................................................... 190 8. Performance Measurement Tools ................................................... 194 What, When, and Where ............................................................................. 194 Host-Monitoring Tools ................................................................................. 196 Point-Monitoring Tools ................................................................................ 197 Network-Monitoring Tools .......................................................................... 205 RMON ........................................................................................................... 216 Microsoft Windows ...................................................................................... 219 9. Testing Connectivity Protocols ......................................................... 224 Packet Injection Tools ................................................................................. 224 Network Emulators and Simulators ............................................................. 235 Microsoft Windows ...................................................................................... 238 10. Application-Level Tools ....................................................................... 239 Application-Protocols Tools ........................................................................ 239 Microsoft Windows ...................................................................................... 254 Oracle 8i Internal Services for Waits, Latches, Locks, and Memory, eMatter Edition Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved. Table of Contents vii 11. Miscellaneous Tools ............................................................................. 255 Communications Tools ................................................................................ 255 Log Files and Auditing ................................................................................. 260 NTP ............................................................................................................... 267 Security Tools ............................................................................................... 269 Microsoft Windows ...................................................................................... 270 12. Troubleshooting Strategies ................................................................ 273 Generic Troubleshooting ............................................................................. 273 Task-Specific Troubleshooting .................................................................... 277 A. Software Sources ................................................................................... 289 B. Resources and References ................................................................. 305 Index .................................................................................................................... 317 Oracle 8i Internal Services for Waits, Latches, Locks, and Memory, eMatter Edition Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved. Preface Preface This book is not a general introduction to network troubleshooting. Rather, it is about one aspect of troubleshooting—information collection. This book is a tuto- rial introduction to tools and techniques for collecting information about com- puter networks. It should be particularly useful when dealing with network problems, but the tools and techniques it describes are not limited