Skip to content

Great Celebrity Fashion

Bądź modna jak celebrytka!

Use Debug to Get Rid of Network Configuration Pests

Posted on November 25, 2022 By Lennon

James HanbackI have a contract with an insect control company, just like many people who live in houses. Sometimes, someone will arrive at my door in a clean uniform and a large canister containing some magical chemical concoction. The canister is attached to a long wand, which is used to create an invisible barrier that stops six-, eight-, or hundred-legged creatures entering my space. When I don’t see any small crawling, flying or undulating creatures, I know that the pest control service is effective. The debugger visits my home every now and then because I don’t want any evidence of pests in my home.
The way that debugging in the network world works is a little different. Cisco IOS allows you to enable debugging. This is because you are specifically looking at the root cause of the problem. You want to see the bugs. You have the Cisco IOS debug command. This command is designed to overwhelm you with as much information as you can possibly understand about almost every aspect of an IOS setup.
I don’t mean to. Have you ever tried to follow the context-sensitive help for debug commands? It will take you about 10 screens to list all secondary keywords available immediately after the command.
The debug command is a valuable tool when you have issues that aren’t easy to diagnose. It allows you to examine a running configuration and to inspect the output of show commands that relate to the technology you are trying to troubleshoot. The debug command allows you examine the output in real time, as the device attempts to send or receive traffic. This is an advantage over relying on static output presented in show commands.
There is a caveat. It is not recommended to use debug commands on a network that is in production unless you have been instructed by someone at Cisco Technical Assistance Center (TAC). Debugging can cause significant resource consumption on your hardware, scrolling finger, as well as your eyesight. You should use the debug command sparingly, and only when necessary.
Imagine that you manage Router1’s Enhanced Interior Gateway Routing Protocols (EIGRP) administration, while Router2 is managed remotely by another administrator. Imagine that the Router2 admin adds an additional network to the Router2EIGRP configuration. The Router1 administrator decides that the new network should be kept secret from Router1. Inadvertently, the Router2 admin issues an EIGRP passive interface command for the interface connecting Router2 and Router1. EIGRP passive interfaces prevent both outbound and inbound advertisements. This causes an immediate break in the neighbor relationship between Router2 and Router1.
If you happen to be monitoring Router1’s console at the time, the first sign that something is not right might be a Syslog message like the one below:
%DUAL-5NBRCHANGE: EIGRP–IPv4 10 Neighbor 192.168.51.50.50 (FastEthernet0/0 is down) Interface PEER-TERMINATION received
You might call the Router2 admin to ask a few questions. What if the other administrator was not available? What if the problem wasn’t noticed until the next morning when users arrived at work and began to send support tickets your way? (Of course, this assumes that you didn’t have the foresight or system monitoring to alert you immediately a problem is identified.
You might have completely missed the console message in that case. The passive-interface command was sent to the remote router and not the router you manage, so the console message is not visible.

Uncategorized

Post navigation

Previous Post: Reluctant Industry: Cloud (and AWS), in the Making of
Next Post: To protect your system from Orson Welles, use strong passwords

More Related Articles

Risk Management for Small Projects. I know that I have neglected to manage small/simple projects in the past. However, the need for risk management becomes evident when managing large/complex projects. This topic was the subject of a recent discussion in pmStudent.e-Learning. I’ll share some of my thoughts and welcome your comments. Scaling it down photo by Soggydan Dan Bennett via flickr. My basic principle when managing small projects is to scale back the critical project management processes to fit the environment, not eliminate the need. Although I didn’t feel this way in the beginning, my perspective changed after managing larger projects. I see the value of thinking about even the smallest projects in an organized way. Sometimes, distinct activities can be combined on smaller projects. However, I’ve come to the conclusion that this is not optimal. Respecting the boundaries between discrete projects management processes is key to clarity and thought. This helps you get better results and preserves the integrity of your process. Intuition: The simpler a project is, the easier it will be to intuitively grasp the risks involved. If your project is two weeks long, you will need to think about the risks when planning the project. Because it is a short time frame, you will probably be quite proficient at it if your team has done similar projects before. How valid is our “gut feeling” in identifying and assessing risk? The longer a project takes, the more involved it becomes. Continuous risk management is essential for a long-term project. This will ensure that you identify and assess all risks throughout the project’s life cycle. Even if a project is only for a month, it is possible to only do this activity once or twice. It’s not going be a 2-hour discussion. It should be a 5-minute conversation. Steps to manage risk in small projects Uncategorized
Python 2 vs. Python3: Which is Better to Learn? Uncategorized
Project Management: The Importance of Project Management Uncategorized
The Strategic Shift of Microsoft Azure towards Cloud Solutions Provider Partners Uncategorized
7 Steps to Build Great Teams at Work Uncategorized
Top 7 Microsoft Azure Certifications that Can Help You Make a Fortune In 2020 Uncategorized

Archives

  • March 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022

Categories

  • Uncategorized

Recent Posts

  • Chennai floods and Business Continuity Plans (BCP).
  • Build relationships and win as a team
  • AWS Lambda allows you to create a serverless web application
  • Big Data Trends for 2018
  • Syntax in Programming: What is it and why does it matter?

Recent Comments

  1. A WordPress Commenter on Hello world!

Copyright © 2023 Great Celebrity Fashion.

Powered by PressBook Blog WordPress theme