Troubleshooting CCNP TSHOOT Lab

Lesson Contents

In this lesson I’m going to walk you through a full lab that is based on the official Cisco CCNP TSHOOT topology. This lab is “broken” so that we have something to fix.

The official Cisco CCNP TSHOOT topology can be found here:

https://learningnetwork.cisco.com/thread/10965

I recreated this topology in GNS3 as best as I could. Cisco released the topology pictures but without any configurations. I recreated the configurations so it will probably be 95% the same as what you might encounter on the exam. You can find my GNS3 topology right here:

http://gns3vault.com/Faq/ccnp-tshoot-gns3-topology.html

Let’s troubleshoot one of those full labs! Before you continue reading I would highly suggest first giving this full lab a try yourself. If you get stuck you can continue reading and see how and why I solve it. Here’s the lab we are going to fix:

http://gns3vault.com/Troubleshooting/ccnp-tshoot-troubleshooting-1.html

Enough talking, let’s get labbing!

coffee-and-croissantIts Monday morning 8 AM. You slept great and there’s a lovely croissant and cup of coffee waiting for you. Suddenly the phone rings…it’s your colleague!

His voice sounds like he’s in panic. There are users complaining that they can’t access the network and he is unable to solve the problems by himself…he seriously needs your help.

You throw your croissant out of the window…it’s time to show what a network troubleshooting rockstar looks like!

The first thing you do is grab a copy of the network diagram. You want to know the layer2 and layer3 topology so you don’t have to do everything off top of your head.

 

 

Here’s what the network diagrams look like:

 

 

CCNP TSHOOT Layer 2 3 diagram

CCNP TSHOOT Layer 3 diagram

Then you open your helpdesk application and you’ll find the following troubleshooting tickets waiting for you:

  • Ticket #1: One of the users was working on Client1 but he’s complaining that there is no connectivity. He left a comment that he saw a message on the windows taskbar that said something like “no network connectivity”. One of your colleagues looked into the problem and told you it had probably something to do with DHCP.
  • Ticket #2: After fixing the issue with Client1 you receive another ticket that users from VLAN 10 are complaining that they are unable to connect to the FTP server.
  • Ticket #3: Your users are happy that they can connect to the FTP server but they are still unable to reach the webserver.
  • Ticket #4: The IPv6 team left a ticket for you that they are unable to reach 2026::12:/122 from DSW1 or DSW2.

You decide to start with ticket #1. “no network connectivity” probably has something to do with the client not receiving an IP address.

Ticket 1

To solve this problem there are a number of devices we might have to check:

  • DHCP server: The pool could be misconfigured, DHCP might not be running, maybe some of the interfaces are not working.
  • Client: Maybe the client is configured to use a static IP address.
  • ASW1, DSW1 and/or DSW2: These are devices that are in between our client and the DHCP server.

The ticket told us that client1 has an issue but didn’t tell us anything about other clients in VLAN 10 like client2. We can take a quick look if client2 can get a DHCP lease or not. If this is the case then we at least know the DHCP server is fine.

Let’s check this:

Client2#show ip interface brief 
Interface                 IP-Address      OK? Method Status                Protocol
FastEthernet0/0           unassigned      YES DHCP   up                    up

It seems client2 has the same issue, lucky for us nobody reported this issue yet.

Client1#show ip interface brief 
Interface                 IP-Address      OK? Method Status                Protocol
FastEthernet0/0           unassigned      YES DHCP   up                    up  

Client1 is configured for DHCP so to me this machine is looking good. If this were a real computer you might want to check other settings like the firewall. We will move our focus to the DHCP server:

R4#show ip dhcp server statistics 
Memory usage         23235
Address pools        1
Database agents      0
Automatic bindings   0
Manual bindings      0
Expired bindings     0
Malformed messages   0
Secure arp entries   0

Message              Received
BOOTREQUEST          0
DHCPDISCOVER         0
DHCPREQUEST          0
DHCPDECLINE          0
DHCPRELEASE          0
DHCPINFORM           0

Message              Sent
BOOTREPLY            0
DHCPOFFER            0
DHCPACK              0
DHCPNAK              0

First I’ll check if the DHCP server has received and sent any DHCP related messages. This doesn’t seem to be the case but doesn’t have to be an issue.
Maybe the router was rebooted and hasn’t received any DHCP discover messages since then. I do see that there is a DHCP pool. Let’s check if the DHCP service is running:

R4#show processes | include DHCP
  42 Mwe 6155B92C           0         43       0 5496/6000   0 DHCPD Timer     
 131 Mwe 61D4112C        1948      10172     19110568/12000  0 DHCPD Receive   
 150 Msi 61563C34           4         91      43 5124/6000   0 DHCPD Database

This router doesn’t support the “show ip sockets” command so I’ll take a look at the running processes. The DHCP service is running so we know this is not the issue. Let’s take a look at the DHCP pool:

R4#show ip dhcp pool 

Pool VLAN10 :
 Utilization mark (high/low)    : 100 / 0
 Subnet size (first/next)       : 0 / 0 
 Total addresses                : 254
 Leased addresses               : 0
 Pending event                  : none
 1 subnet is currently in the pool :
 Current index        IP address range                    Leased addresses
 10.2.10.1            10.2.10.1        - 10.2.10.254       0

We’ll take a look at the pool. The first thing that I notice is that the address range is incorrect. This pool is configured to use 10.2.10.0 /24 but VLAN 10 is using 10.2.1.0 /24. Let’s fix this:

R4(config)#ip dhcp pool VLAN10
R4(dhcp-config)#network 10.2.1.0 /24

This is looking better. The DHCP configuration itself is looking good now to me. Still, the DHCP server didn’t receive any DHCP discover messages. Let’s check if there is connectivity between R4 and DSW1 / DSW2. We’ll use a quick ping:

R4#ping 10.1.4.6

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.4.6, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 4/4/8 ms
R4#ping 10.1.4.10

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.4.10, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/3/4 ms

This is working fine so to me R4 is 100% operational when it comes to DHCP. This means we’ll have to move our focus to the switches in between the client and R4. I’ll start with ASW1:

ASW1#show ip int brief | include FastEthernet1/4 
FastEthernet1/4           unassigned      YES unset  up    up

First we’ll check the interface that is connected to client1. It seems to be up/up. Let’s check its switchport configuration:

ASW1#show interfaces fa1/4 switchport            
Name: Fa1/4
Switchport: Enabled
Administrative Mode: static access
Operational Mode: static access
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: native
Negotiation of Trunking: Disabled
Access Mode VLAN: 200 (VLAN0200)
Trunking Native Mode VLAN: 1 (default)
Trunking VLANs Enabled: ALL
Trunking VLANs Active: 200
Protected: false
Priority for untagged frames: 0
Override vlan tag priority: FALSE
Voice VLAN: none 
Appliance trust: none

Here’s an error. The interface is in access mode which is good but it has been assigned to VLAN 200. Client1 should be in VLAN 10:

ASW1(config)#interface fa 1/4
ASW1(config-if)#switchport access vlan 10

We’ll put the interface in VLAN 10. Now this probably doesn’t fix this error since client1 isn’t the only device that didn’t get an IP address through DHCP. Client2 was also having issues. We need to verify connectivity from ASW1 to DSW1 and DSW2. Let’s take another look at the network diagram:

CCNP TSHOOT Network Diagram Switches

This is the area of the topology where I will focus on. Client1 is connected to ASW1 and is in VLAN 10. VLAN 10 is configured on ASW1, ASW2, DSW1 and DSW3. R4 is our DHCP server but it’s not directly connected to VLAN 10, it’s in another subnet. This means that DSW1 and DSW2 require the IP helper command so that DHCP discover messages can be relayed to the the DHCP server. This is what we’ll have to check:

  • Is VLAN 10 configured and operational on all switches? Even if only ASW1 and DSW1 would work, I still want to have redundancy so we’ll check DSW2 too.
  • Is IP helper configured on DSW1 and DSW2 for VLAN 10?

We’ll start with IP helper. It’s only a single command so if this is the issue we’ll save a lot of time by not having to check all the interfaces between the switches.

DSW1#show ip interface vlan 10 | include Helper
  Helper address is not set
DSW2#show ip interface vlan 10 | include Helper
  Helper address is not set

That’s not looking good. DSW1 and DSW2 don’t have IP helper configured.

Let’s fix it:

DSW1(config)#interface vlan 10
DSW1(config-if)#ip helper-address 10.1.4.5
DSW2(config)#interface vlan 10
DSW2(config-if)#ip helper-address 10.1.4.9

This is how we configure IP helper. This would be a good moment to check if the clients are receiving IP addresses through DHCP.

Client2#show ip interface brief 
Interface                 IP-Address      OK? Method Status                Protocol
FastEthernet0/0           unassigned      YES DHCP   up                    up
Client1#show ip interface brief 
Interface                 IP-Address      OK? Method Status                Protocol
FastEthernet0/0           unassigned      YES DHCP   up                    up

Still no DHCP action. This looks like one of those Mondays where everything goes wrong…we’ll have to check all the interfaces between the switches:

ASW1#show etherchannel summary 
Flags:  D - down        P - in port-channel
        I - stand-alone s - suspended
        R - Layer3      S - Layer2
        U - in use
Group Port-channel  Ports
-----+------------+-----------------------------------------------------------
1     Po1(SU)     Fa1/2(P)   Fa1/3(P)   
2     Po2(SU)     Fa1/10(P)  Fa1/11(P) 

In between the switches we are using etherchannels. We can see that port-channel 1 and 2 are up and running. This doesn’t tell me anything about the VLANS though. Let’s take a closer look:

ASW1#show vlan-switch id 10

VLAN Name                             Status    Ports
---- -------------------------------- --------- -------------------------------
10   VLAN0010                         active    Fa1/4, Fa1/5

I can see that VLAN 10 is operational. Interface Fa1/4 and Fa1/5 are assigned to it. Let’s see if this VLAN is active on the trunk:

ASW1#show interfaces po1 trunk 

Port      Mode         Encapsulation  Status        Native vlan
Po1       on           802.1q         trunking      1

Port      Vlans allowed on trunk
Po1       1-9,11-4094

Port      Vlans allowed and active in management domain
Po1       1,20,200

Port      Vlans in spanning tree forwarding state and not pruned
Po1       1,200
ASW1#show interfaces po2 trunk 

Port      Mode         Encapsulation  Status        Native vlan
Po2       on           802.1q         trunking      1

Port      Vlans allowed on trunk
Po2       1-9,11-4094

Port      Vlans allowed and active in management domain
Po2       1,20,200

Port      Vlans in spanning tree forwarding state and not pruned
Po2       1,20

Now we are onto something! When we look at the trunk information of the Etherchannels we can see that VLAN 10 is not active. Let’s add it to the trunks:

ASW1(config)#interface po1
ASW1(config-if)#switchport trunk allowed vlan add 10
ASW1(config)#interface po2
ASW1(config-if)#switchport trunk allowed vlan add 10

This will add VLAN 10 to the etherchannels. Let’s check the other switches as well:

DSW1#show etherchannel summary 
Flags:  D - down        P - in port-channel
        I - stand-alone s - suspended
        R - Layer3      S - Layer2
        U - in use
Group Port-channel  Ports
-----+------------+-----------------------------------------------------------
1     Po1(SU)     Fa1/2(P)   Fa1/3(P)   
3     Po3(SU)     Fa1/4(P)   Fa1/5(P)   
5     Po5(SU)     Fa1/8(P)   Fa1/9(P)

DSW2#show etherchannel summary 
Flags:  D - down        P - in port-channel
        I - stand-alone s - suspended
        R - Layer3      S - Layer2
        U - in use
Group Port-channel  Ports
-----+------------+-----------------------------------------------------------
2     Po2(SU)     Fa1/10(P)  Fa1/11(P)  
3     Po3(SU)     Fa1/4(P)   Fa1/5(P)   
4     Po4(SU)     Fa1/6(P)   Fa1/7(P)

The etherchannels on DSW1 and DSW2 are operational. Next step is to check if they are in trunk mode and if VLAN 10 is allowed or not:

DSW1#show interfaces po1 trunk      

Port      Mode         Encapsulation  Status        Native vlan
Po1       on           802.1q         trunking      1

Port      Vlans allowed on trunk
Po1       1-4094

Port      Vlans allowed and active in management domain
Po1       1,10,20,200

Port      Vlans in spanning tree forwarding state and not pruned
Po1       1,10,20,200
DSW1#show interfaces po3 trunk

Port      Mode         Encapsulation  Status        Native vlan
Po3       on           802.1q         trunking      1

Port      Vlans allowed on trunk
Po3       1-4094

Port      Vlans allowed and active in management domain
Po3       1,10,20,200

Port      Vlans in spanning tree forwarding state and not pruned
Po3       1,10,20,200

Interface port-channel 1 is the one that is connected between ASW1 and DSW1. VLAN 10 is allowed on it so this should normally be enough. To make sure redundancy is intact I’m going to check the other interfaces as well:

DSW2#show interfaces po2 trunk 

Port      Mode         Encapsulation  Status        Native vlan
Po2       on           802.1q         trunking      1

Port      Vlans allowed on trunk
Po2       1-4094

Port      Vlans allowed and active in management domain
Po2       1,10,20,200

Port      Vlans in spanning tree forwarding state and not pruned
Po2       1,10,20,200
DSW2#show interfaces po3 trunk 

Port      Mode         Encapsulation  Status        Native vlan
Po3       on           802.1q         trunking      1

Port      Vlans allowed on trunk
Po3       1-4094

Port      Vlans allowed and active in management domain
Po3       1,10,20,200

Port      Vlans in spanning tree forwarding state and not pruned
Po3       10,20,200

We can verify that VLAN 10 is now operational on ASW1, DSW1 and DSW2. I didn’t bother with the interfaces that are connected to ASW2 because VLAN 10 is not active there. Did our hard work pay off?

Client2#show ip interface brief 
Interface                 IP-Address      OK? Method Status                Protocol
FastEthernet0/0           unassigned      YES DHCP   up                    up

Client1#show ip interface brief 
Interface                 IP-Address      OK? Method Status                Protocol
FastEthernet0/0           unassigned      YES DHCP   up                    up 

We fixed all layer 2 and DHCP related issues but the clients are still not getting an IP address. What else could be wrong?

Let’s check if our DHCP server is receiving the DHCP messages from our clients:

R4#show ip dhcp server statistics 
Memory usage         31953
Address pools        1
Database agents      0
Automatic bindings   2
Manual bindings      0
Expired bindings     0
Malformed messages   0
Secure arp entries   0

Message              Received
BOOTREQUEST          0
DHCPDISCOVER         216
DHCPREQUEST          0
DHCPDECLINE          0
DHCPRELEASE          0
DHCPINFORM           0

Message              Sent
BOOTREPLY            0
DHCPOFFER            216
DHCPACK              0
DHCPNAK              0

Great! At least R4 is receiving the DHCP discover messages from our clients. I don’t see any DHCP ACK messages so something somewhere is going wrong. Let’s do a debug:

R4#debug ip dhcp server packet

We’ll enable the debug to see DHCP packets.

R4# DHCPD: DHCPDISCOVER received from client 0063.6973.636f.2d63.3230.382e.3066.6134.2e30.3030.302d.4661.302f.30 through relay 10.2.1.2.
DHCPD: Sending DHCPOFFER to client 0063.6973.636f.2d63.3230.382e.3066.6134.2e30.3030.302d.4661.302f.30 (10.2.1.11).
DHCPD: unicasting BOOTREPLY for client c208.0fa4.0000 to relay 10.2.1.2.
DHCPD: DHCPDISCOVER received from client 0063.6973.636f.2d63.3230.382e.3066.6134.2e30.3030.302d.4661.302f.30 through relay 10.2.1.1.
DHCPD: Sending DHCPOFFER to client 0063.6973.636f.2d63.3230.382e.3066.6134.2e30.3030.302d.4661.302f.30 (10.2.1.11).
R4#
DHCPD: unicasting BOOTREPLY for client c208.0fa4.0000 to relay 10.2.1.1.

R4 is receiving and sending DHCP messages for VLAN 10 and they are relayed to IP address 10.2.1.1 (DSW1) and 10.2.1.2 (DSW2). Is R4 able to reach these IP addresses?

R4#ping 10.2.1.1

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.2.1.1, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5)
R4#ping 10.2.1.2

Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.2.1.2, timeout is 2 seconds:
.....
Success rate is 0 percent (0/5)

R4 is unable to reach these IP addresses so that’s why DHCP is not working now. Back to the drawing board:

CCNP TSHOOT EIGRP

Our topology picture shows up that DSW1, DSW2 and R4 are configured for EIGRP AS 10. R4 should learn about the 10.2.1.0 /24 prefix through EIGRP. Let’s see if R4 has any neighbors:

R4#show ip eigrp neighbors 
IP-EIGRP neighbors for process 10

R4 doesn’t have any EIGRP neighbors. Let’s check its EIGRP configuration:

R4#show ip protocols 
Routing Protocol is "eigrp 10"
  Outgoing update filter list for all interfaces is not set
  Incoming update filter list for all interfaces is not set
  Default networks flagged in outgoing updates
  Default networks accepted from incoming updates
  EIGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0
  EIGRP maximum hopcount 100
  EIGRP maximum metric variance 1
  Redistributing: eigrp 10, ospf 1
  EIGRP NSF-aware route hold timer is 240s
  Automatic network summarization is not in effect
  Maximum path: 4
  Routing for Networks:
    10.1.4.4/30
  Passive Interface(s):
    FastEthernet1/0
  Routing Information Sources:
    Gateway         Distance      Last Update
  Distance: internal 90 external 170

We’ll do a quick show ip protocols to see if we can find anything. There are two interesting things here:

  • The passive interface for FastEthernet1/0 (that’s the interface to DSW1).
  • No network command for 10.1.4.8 /30 (that’s the interface to DSW2).

Let’s fix these two issues:

R4(config)#router eigrp 10
R4(config-router)#no passive-interface fastEthernet 1/0
R4(config-router)#network 10.1.4.8 0.0.0.3

Let’s see if this made any difference:

R4#show ip eigrp neighbors 
IP-EIGRP neighbors for process 10
H   Address                 Interface       Hold Uptime   SRTT   RTO  Q  Seq
                                            (sec)         (ms)       Cnt Num
1   10.1.4.10               Fa2/0             11 00:00:34   12   200  0  19
0   10.1.4.6                Fa1/0             13 00:00:43   10   200  0  21

Seems we now have EIGRP neighbors! Let’s see if this solves our DHCP problem:

R4#show ip dhcp server statistics 
Memory usage         31953
Address pools        1
Database agents      0
Automatic bindings   2
Manual bindings      0
Expired bindings     0
Malformed messages   0
Secure arp entries   0

Message              Received
BOOTREQUEST          0
DHCPDISCOVER         340
DHCPREQUEST          4
DHCPDECLINE          0
DHCPRELEASE          0
DHCPINFORM           0

Message              Sent
BOOTREPLY            0
DHCPOFFER            340
DHCPACK              4
DHCPNAK              0

This is looking better! R4 is now sending DHCP ACKs so we know that the DHCP Offer makes it to the client. Let’s see if they finally got an IP address:

Client1#show ip interface brief 
Interface                 IP-Address      OK? Method Status                Protocol
FastEthernet0/0           10.2.1.11       YES DHCP   up                    up
Client2#show ip interface brief 
Interface                 IP-Address      OK? Method Status                Protocol
FastEthernet0/0           10.2.1.12       YES DHCP   up                    up  

Finally the clients are receiving IP addresses through DHCP! This ticket is solved.

To solve this ticket I tried to get a “quick win” by looking at the DHCP configuration on R4. After fixing it, it still wasn’t working. When this occurs it’s best to jump to the bottom of the OSI-model and check everything layer-by-layer. Start with the cabling, connectors and then move on to layer 2. Check the VLANs, interfaces, trunks, spanning tree, etc. When this is OK, check layer 3….IP addresses, routing, etc.

Let’s solve the next ticket!

Ticket 2

Here’s the ticket again:

Ticket #2: After fixing the issue with Client1 you receive another ticket that users from VLAN 10 are complaining that they are unable to connect to the FTP server.

DHCP is working but it seems our clients are unable to reach the FTP server. This FTP server is in another subnet so traffic has to be routed. The first thing I would check is to see if they can reach their default gateway or not.

We're Sorry, Full Content Access is for Members Only...

If you like to keep on reading, Become a Member Now! Here is why:

  • Learn any CCNA, CCNP and CCIE R&S Topic. Explained As Simple As Possible.
  • Try for Just $1. The Best Dollar You’ve Ever Spent on Your Cisco Career!
  • Full Access to our 785 Lessons. More Lessons Added Every Week!
  • Content created by Rene Molenaar (CCIE #41726)

1438 Sign Ups in the last 30 days

satisfaction-guaranteed
100% Satisfaction Guaranteed!
You may cancel your monthly membership at any time.
No Questions Asked!

Forum Replies

  1. Hi,
    Thanks a lot!!!
    It is so clear and helpful!
    One question-can I run the Tshoot lab on Packet Tracer ?

  2. Hi David,

    Glad that you like it! I think you should be able to run this in packet tracer but you’ll have to rebuild it. On GNS3Vault.com I added the GNS3 topology with all the startup-configs. You might be able to build the topology in packet tracer and then copy / paste some of my configurations.

    Rene

  3. Great Lab!!

    I took me two full days to solve it!! I loved it! I hope you can publish some more labs like this!

    Thanks!

  4. Hello Ashok.

    You probably mean gns3vault.com. You can register by going to this link: https://gns3vault.com/registration/. It was a little hard to find, but the link is available on the right in the login box under the Labs, Blog, FAQ or Contact tabs.

    I hope this has been helpful!

    Laz

27 more replies! Ask a question or join the discussion by visiting our Community Forum