Exam: RedHat EX431 - Red Hat Certificate of Expertise in ESB
Once you have configured your network with switches and routers, you may need to verify and troubleshoot your network. Some of the commands that you can use to verify and troubleshot your network arediscussed in this chapter. The commands discussed in the chapter may be used from both a PC and a Cisco router. They may do the same thing but their implementation is different.
Packet InterNet Groper (Ping)
The ping command allows you to verify the connectivity of your PC to the remote hosts. It is a very good command to troubleshoot your network for the connectivity of devices on your network. However, if you need to find out the connectivity of your computer to a different subnet, you need to specify the route to the subnet or configure the router between your subnet and the other subnet to which you want to connect.
The Ping command uses ICMP (Internet Control Message Protocol) echo request and ICMP echo replies query messages to find out whether the remote host is active or not. It also allows you to find out theminimum, average, and maximum time to reach a host and return back.
The ping command works by first sending an echo request to a host. The Ping then waits till it gets a reply from the host. If the ping is able to get to the destination and is able to get an echo reply from the host, the Ping is successful.
The ping command can be executed in normal and privileged mode but cannot be executed in configuration mode. The command returns the following types of output:
This example shows how to ping a remote host from normal executive mode:
Switch# ping host1
220.127.116.11 is alive
In exec mode, the Ping command returns the number of packets, the packet size, and the timeout period as output:
The traceroute command allows you to discover the path or the list of routers taken by a device to reach the network destination. As the name suggests, the traceroute command traces the path that a network packet takes to reach a destination. The traceroute command also allows you to find out the places where the routing has broken down by displaying TTL time-outs and ICMP error messages.
The command cannot be executed from the DOS prompt. The following example displays the hops that the network packet has taken to reach the destination by using the traceroute command:
Typeescape sequence to abort.
Tracing the route to r1.test.com (18.104.22.168)
1 r1.test.com (22.214.171.124) 16 msec * 16 msec
The above example shows that the packet went through a single hop to reach the destination.
The telnet command allows you to access the command-line interface (CLI) of the switch and to access other devices on the network using the switch. You need to configure a telnet session to use it by setting up the IP address and settingup the default gateway on the switch.
You can have multiple telnet sessions. The maximum limit of telnet sessions however is 8 simultaneous sessions. The following command opens a Telnet session to a remote host.
This example shows how to establish a Telnet connection from the switch to the remote host named PC1:
Switch# telnet PC1
Connected to PC1
Escape character is '^]'.
Just like telnet, the SSH (secure shell) is also used to build a connection to a router, a switch or other networking devices for network management. However, the SSH command is a secure option to use as compared to telnet because telnet does not encrypt its connections whereas SSH encrypts its connections. A hacker can easily capture the network packets from a telnet session but cannot capture packets from an SSH session.
SSH uses digital certificates, in a Public/Private Key Cryptography to authenticate client and server computers.
Just like telnet, you need to configure SSH on your router with hostname, domain name and generate a certificate to encrypt SSH packets.
The ARP command allows you to add an entry in the Address Resolution Protocol (ARP) cache, which is used by a software application to translate 32-bit IP addresses into 48-bit hardware addresses.
The ARP command allows you to create IP-to-MAC address mappings. To add a permanent entry in the ARP cache, you need to execute the command in global configuration mode and to remove an entry from the cache you need to use the No form of this command.
vrf: specifies VPN routing and forwarding instance. This is an optional parameter for the command.
Vrf name: specifies the VRF instance that identifies a VPN. This is an optional parameter for the command.
Ip-address : IP address (Ipv4 address) for which a permanent entry is to be added to the ARP cache
hardware-address : Hardware (data link layer) address that the IPv4 address is linked to.
Encapsulation-type :the encapsulation types are:arpa, srp, srpa, srpb.
For Ethernet interfaces, the arpa encapsulation is used typically.
The following example shows a static ARP entry for a typical Ethernet host:
RP/0/RP0/CPU0:router(config)# arp 192.168.17.19 0800.0900.1834 arpa
The ipconfig command allows you to view the current IP settings of your NIC on your PC or for your router’s LAN/WAN interfaces. The output of the ipconfig command displays the IP Address, Subnet Mask, Default Gateway, and (on a PC), even the DNS Servers.
Show and debug commands
The show and debug commands have multiple options and are available for many features and functions within CiscoIOS software. To show command is used to verify the MST (Multiple Spanning Tree) configuration. Some examples of show commands are show interface, show buffers, showsection, and showflash.
The debug command allows you to troubleshoot your network with the extensive output that the command generates. Someexamples of debugcommands aredebug all,debug aaa accounting, anddebug mpls packets. You need a telnet session to use debug commands. You can turn off the debug command by using undebug all command.
Which of the following commands would you use to display all the current IP settings on your switch?
The ipconfig command allows you to view the current IP settings of your NIC on your PC or for your router’s LAN/WAN interfaces.
Related IT Guides
How to Claim the Refund / Exchange?
In case of failure your money is fully secure by BrainDumps Guarantee Policy. Before claiming the guarantee all downloaded products must be deleted and all copies of BrainDumps Products must be destroyed.
Under What Conditions I can Claim the Guarantee?
Full Refund is valid for any BrainDumps Testing Engine Purchase where user fails the corresponding exam within 30 days from the date of purchase of Exam. Product Exchange is valid for customers who claim guarantee within 90 days from date of purchase. Customer can contact BrainDumps to claim this guarantee and get full refund at email@example.com. Exam failures that occur before the purchasing date are not qualified for claiming guarantee. The refund request should be submitted within 7 days after exam failure.
The money-back-guarantee is not applicable on following cases:
This is a ONE TIME OFFER. You will never see this Again
Enter Your Email Address to Receive Your 20% OFF Discount Code Plus... Our Exclusive Weekly Deals
Save 20%. Today on all IT exams. Instant Download
Use the following Discount Code during the checkout and get 20% discount on all your purchases: