Cisco Nexus 7. 00. Series NX- OS Troubleshooting Guide - - Troubleshooting Tools and Methodology. From Doc. Wiki This article describes the troubleshooting tools and methodology available for Cisco NX- OS. The CLI provides a command structure similar to Cisco IOSsoftware, with context- sensitive help, show commands, multiuser support, and roles- based access control. Additionally, you can use the following commands for more information. Provides information about system- level components, including cores, errors, and exceptions. Use the show system error- id command to find details on error codes. Cisco NX- OS has two types of configuration files, running configuration and startup configuration. The device uses the startup configuration (startup- config) during the device startup to configure the software features. The running configuration (running- config) contains the current changes that you make to the startup- configuration file. You should create a backup version of your configuration files before modifying that configuration. You can back up the configuration files to a remote server. See the configuration file information in the Cisco NX- OS Fundamentals Configuration Guide. You can also create a checkpoint copy of the configuration file that you can roll back to if problems occur. See the Rollback feature in the Cisco NX- OS System Management Configuration Guide. In rare cases, these locks may not be removed by the features. Use the show system internal sysmgr startup- config locks command to determine if any locks remain on the startup configuration file. Use thesystem startup- config unlock command to remove these locks. Bad (red) (click to enlarge) Adding. 10 Handy WiFi Troubleshooting Tools. If you need help troubleshooting your wireless networks, here are 10 tools that can help uncover WiFi problems. Bonus: Some are free! Using the CLI, you can enable debugging modes for each feature and view a real- time updated activity log of the control protocol exchanges. Each log entry has a timestamp and is listed chronologically.
You can limit access to the debug feature through the CLI roles mechanism to partition access on a per- role basis. While the debug commands show real- time information, you can use the show commands to list historical and real- time information. A log entry is created for each entered command in addition to the actual debug output. The debug output shows a time- stamped account of the activity that occurred between the local device and other adjacent devices. However, you should be careful when using the debug utility in a production environment, because some options may prevent access to the device by generating too many messages to the console or creating CPU- intensive events that could seriously affect network performance. The debug- filter command allows you to limit the debug information produced by related debug commands. The ping utility generates a series of echo packets to a destination across a TCP/IP internetwork. Here is a list of the most common problems and solutions specifically for the Porsche Boxster and 996 Alarm Modules Since the alarm module is below the driver's seat, it is prone to getting wet. This is especially true in the. Wi-Fi Planning and Site Surveys for 802.11ac and 802.11n. Design, verify and troubleshoot Wi-Fi effectively with Ekahau Site Survey. It’s the first and leading laptop-based Wi-Fi site survey and planning tool. When the echo packets arrive at the destination, they are rerouted and sent back to the source. By specifying the IPv. IPv. 6 address, you can send a series of frames to a target destination. Once these frames reach the target, they are looped back to the source and a time stamp is taken. It is similar to the network- monitoring utility ping, but provides for a greater depth of network diagnostics. Latency is the delay of the network between any two points as seen by a frame traveling between the two points. For example, to configure the pong utility from the access switch to the v. PC primary, you must provide an interface that is directly connected to the v. PC primary. To work around this issue, use the interface option while executing a PONG from an access switch to a v. PC peer. The interface can be one that does not need to go over the peer link, such as an interface that is directly connected to the primary switch. To work around this issue, form a port channel with the two links as members. Legend. (*) - software delay(not hardware latency). NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 4. 84. 0. 2 1. NA) 0 5. 47. 84. 55. NA) 0 4. 76. 0. 4 1. NA) 0 4. 52. 0. Round trip time: 0sec 1. Packet No. 2. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 4. 79. 2. 2 1. NA) 0 5. 39. 45. 27. NA) 0 4. 77. 6. 4 1. NA) 0 4. 23. 2. Round trip time: 0sec 1. Packet No. 3. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 4. 82. 4. 2 1. NA) 0 5. 41. 79. 23. NA) 0 4. 82. 4. 4 1. NA) 0 4. 20. 0. Round trip time: 0sec 1. Packet No. 4. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 4. 76. 0. 2 1. NA) 0 5. 44. 66. 61. NA) 0 4. 81. 6. 4 1. NA) 0 4. 20. 0. Round trip time: 0sec 1. Packet No. 5. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 4. 78. 4. 2 1. NA) 0 5. 53. 55. 20. NA) 0 4. 81. 6. 4 1. NA) 0 4. 20. 0. Round trip time: 0sec 1. Packets sent on vlan : 1. Total packets sent : 5. Total packets received: 5. Maximum round trip time in ns: 1. Minimum round trip time in ns: 1. Average round trip time in ns: 1. Example: Pong command with source MAC. Packet No. 1. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 5. 39. 62. 22. Round trip time: 0sec 1. Packet No. 2. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 5. 33. 78. 47. Round trip time: 0sec 1. Packet No. 3. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 5. 38. 62. 89. Round trip time: 0sec 1. Packet No. 4. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 5. 33. 69. 00. Round trip time: 0sec 1. Packet No. 5. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 5. 44. 59. 70. Round trip time: 0sec 1. Packets sent on vlan : 1. Total packets sent : 5. Total packets received: 5. Maximum round trip time in ns: 1. Minimum round trip time in ns: 1. Average round trip time in ns: 1. Example Pong command with packet injection. Packet No. 1. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 4. 30. 4. 2 1. NA) 0 4. 28. 8. 3 1. NA) 0 5. 40. 65. 35. NA) 0 4. 76. 0. 5 1. NA) 0 4. 81. 6. Round trip time: 0sec 2. Packet No. 2. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 4. 32. 8. 2 1. NA) 0 4. 80. 0. 3 1. NA) 0 5. 43. 28. 96. NA) 0 4. 77. 6. 5 1. NA) 0 4. 81. 6. Round trip time: 0sec 2. Packet No. 3. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 4. 30. 4. 2 1. NA) 0 4. 81. 6. 3 1. NA) 0 5. 32. 28. 69. NA) 0 4. 76. 0. 5 1. NA) 0 4. 81. 6. Round trip time: 0sec 2. Packet No. 4. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 4. 24. 0. 2 1. NA) 0 4. 81. 6. 3 1. NA) 0 5. 32. 73. 03. NA) 0 4. 79. 2. 5 1. NA) 0 4. 83. 2. Round trip time: 0sec 2. Packet No. 5. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. NA) 0 4. 36. 0. 2 1. NA) 0 4. 83. 2. 3 1. NA) 0 5. 42. 20. 18. NA) 0 4. 76. 0. 5 1. NA) 0 4. 78. 4. Round trip time: 0sec 2. Packets sent on vlan : 1. Total packets sent : 5. Total packets received: 5. Maximum round trip time in ns: 2. Minimum round trip time in ns: 2. Average round trip time in ns: 2. Example: Pong command with Fabric. Path. switch(config)# pong destination- swid 2. Packet No. 1. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. Round trip time: 0sec 1. Packet No. 2. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. Round trip time: 0sec 1. Packet No. 3. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. Round trip time: 0sec 1. Packet No. 4. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. Round trip time: 0sec 1. Packet No. 5. Legend. NA) - not available. Hop System- mac (switch- id) Switching time. Round trip time: 0sec 1. Packets sent on vlan : 2. Total packets sent : 5. Total packets received: 5. Maximum round trip time in ns: 1. Minimum round trip time in ns: 1. Average round trip time in ns: 1. Using Traceroute Use traceroute to do the following. Trace the route followed by the data traffic. You can use traceroute to test the connectivity of ports along the path between the generating device and the device closest to the destination. Use the traceroute. IPv. 6 networks. If the destination cannot be reached, the path discovery traces the path up to the point of failure. The command output includes the following. PID = process ID. A - -(hyphen) usually means a daemon not running on any particular TTY. Using the show processes cpu Command Use the show processes cpu command to display CPU utilization. The command output includes the following. Runtime(ms) = CPU time that the process has used, expressed in milliseconds. The output includes the following. Load is defined as the number of running processes. The average reflects the system load over the past 1, 5, and 1. Buffers and the cache are also included in the used memory statistics. This onboard failure logging (OBFL) feature stores failure and environmental information in nonvolatile memory on the module. This information will help you analyze failed modules. The GOLD implementation checks the health of hardware components and verifies proper operation of the system data and control planes. Some tests take effect when the system is booting up; other tests take effect when the system is operational. You can configure a series of diagnostic checks to determine the condition of an online system. You must distinguish between disruptive and nondisruptive diagnostic tests. Although nondisruptive tests occur in the background and do not affect the system data or control planes, disruptive tests do affect live packet flows. You should schedule disruptive tests during special maintenance windows. The show diagnostic content module output displays test attributes such as disruptive or nondisruptive tests. The role of online diagnostic health monitoring is to proactively detect hardware failures in the live network environment and inform you of a failure. These test results help administrators determine the condition of a system and understand the reason for a system failure.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2016
Categories |