Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Cisco Certification: Introduction To ISDN, Part V > NetSparsh - Viral Content you Love & Share

Cisco Certification: Introduction To ISDN, Part V

The major reason I recommend getting your hands on real Cisco equipment rather than a simulator is that real Cisco routers give you the chance to practice and learn show and debug commands.

The knowledge you acquire from debugs is invaluable. Frankly, itâ??s this knowledge that puts you above the â??averageâ?? CCNA who doesnâ??t have that hands-on experience. Watching debugs in action also gives you a head start on the CCNP. Since 90 â?" 95% of CCNAs go on to pursue the CCNP, itâ??s a great idea to get started with debugs now.

Donâ??t make the mistake of waiting until youâ??re studying for your CCNP and CCIE to start learning debugs and shows. The work you do for the CCNA is the foundation for everything youâ??ll do in the future.

Never, ever, ever practice debugs on a production network. There are debugs that will give you so much information that the router actually becomes overloaded and then locks up. Never practice debugs on a production network.

Itâ??s important to know the proper show and debug commands for ISDN for several reasons. First, by watching ISDN in operation, you can see its processes and better understand whatâ??s going on. Secondly, itâ??s difficult if not impossible to properly troubleshoot ISDN without knowing the proper show and debug commands. (Itâ??s easy to overlook an ISDN authentication error just by looking at the configuration, but running debug ppp negotiation will quickly show you where the problem lies.)

Letâ??s take a look at the ISDN show and debug commands that every CCNA and CCNP should know.

Show ISDN Status

If you only know one ISDN show command, itâ??s got to be this one. Always use this command after configuring your ISDN switch type and any necessary SPIDs. The command will show you the switch type (and will also show you if you did not configure a switch type), and whether the SPIDs you entered are valid:

R1#show isdn status Global ISDN Switchtype = basic-ni < ISDN switch type is correctly configured.> ISDN BRI0 interface

dsl 0, interface ISDN Switchtype = basic-ni

Layer 1 Status:

ACTIVE

Layer 2 Status:

TEI = 91, Ces = 1, SAPI = 0, State = MULTIPLE_FRAME_ESTABLISHED

TEI = 92, Ces = 2, SAPI = 0, State = MULTIPLE_FRAME_ESTABLISHED

Spid Status:

TEI 91, ces = 1, state = 5(init)

spid1 configured, no LDN, spid1 sent, spid1 valid < SPID 1 is good.>

Endpoint ID Info: epsf = 0, usid = 1, tid = 1

TEI 92, ces = 2, state = 5(init)

spid2 configured, no LDN, spid2 sent, spid2 valid

Endpoint ID Info: epsf = 0, usid = 3, tid = 1

Layer 3 Status:

0 Active Layer 3 Call(s)

Activated dsl 0 CCBs = 0

The Free Channel Mask: 0x80000003

Once in a while, youâ??ll get this output from show isdn status:

R2#show isdn status The current ISDN Switchtype = basic-ni1 ISDN BRI0 interface

Layer 1 Status:

ACTIVE

Layer 2 Status:

Layer 2 NOT Activated

Spid Status:

TEI Not Assigned, ces = 1, state = 3(await establishment)

spid1 configured, no LDN, spid1 NOT sent, spid1 NOT valid

TEI Not Assigned, ces = 2, state = 1(terminal down)

spid2 configured, no LDN, spid2 NOT sent, spid2 NOT valid

Check your running configuration, and if the SPIDs look good, simply close the BRI interface and open it again. Then run show ISDN status again. If you then see â??spids are validâ??, youâ??re ready to proceed. If you still see a message that the spids are invalid, youâ??ve most likely mistyped the SPID.

Show Access-List

Whatâ??s this command got to do with ISDN? Everything.

Remember how the ISDN link comes up in the first place? Interesting traffic. By default, there is no interesting traffic. You define interesting traffic with the dialer-list and dialer-group commands, AND the access-list command. If you have a problem with your link never coming up or with it coming up and staying up, use this command to see what traffic has been defined as interesting.

Show Dialer

Another helpful command to determine why an ISDN link is coming up and staying up. This command shows you how many successful calls and failed calls have taken place, what the current idle-timer value is (by default, itâ??s 120 seconds), and most importantly, what the source and destination was for the current interesting traffic:

R1#show dialer
BRI0 - dialer type = ISDN
Dial String Successes Failures Last called Last status
8358662 1 0 00:00:59
successful
0 incoming call(s) have been screened.
0 incoming call(s) rejected for callback.

BRI0:1 - dialer type = ISDN
Idle timer (120 secs), Fast idle timer (20 secs)
Wait for carrier (30 secs), Re-enable (15 secs)
Dialer state is data link layer up
Dial reason: ip (s=172.12.21.1, d=172.12.21.2) < s=Source, d=Destination >
Time until disconnect 62 secs
< Idle timer, reset by interesting traffic only >
Connected to 8358662 (R2)

Here, you can see that the idle-timer value is at its default, that there are 62 seconds left until the link comes down (unless interesting traffic resets the timer), and that the source of the interesting traffic was 172.12.21.1 and the destination is 172.12.21.2. If that destination is the multicast address of a routing protocol â?" say, 224.0.0.5 for OSPF â?" you know what traffic is keeping the line up.

Show ISDN History

Want to see what calls have been made in the last 15 minutes? Just run this command. Itâ??s helpful if youâ??re walking in to an ISDN troubleshooting situation and want to see what calls have been made.

R1#show isdn
history-------------------------------------------------------------------------------- ISDN CALL HISTORY--------------------------------------------------------------------------------History table has a maximum of 100 entries.History table data is retained for a maximum of 15 Minutes.--------------------------------------------------------------------------------Call Calling Called Remote Seconds Seconds Seconds ChargesType Number .Number Name Used Left Idle Units/Currency-------------------------------------------------------------------------------------- ---------------------Out 8358662 R2 121 0Out 8358662 R2 121 0--------------------------------------------------------------------------------------------------- --

Debug PPP Negotiation

Not only do you need to know this command for your CCNA and CCNP exams, you MUST know it to be an effective ISDN troubleshooter.

When PPP authentication is first configured, itâ??s simple to mistype a password, or forget to configure a â??username / passwordâ?? combination. Instead of continually reading your running configuration to see what the problem is, run debug ppp negotiation and send a ping to bring the line up. Youâ??ll quickly see where the problem is.

R2#debug ppp negotiation PPP protocol negotiation debugging is on R2#ping 172.12.21.1

BR0:1 PPP: Phase is AUTHENTICATING, by both < Both routers are authenticating the other with CHAP. > BR0:1 CHAP: O CHALLENGE id 1 len 23 from "R2" < R2 is sending a challenge to the remote router. O = â??outgoingâ??. > BR0:1 CHAP: I CHALLENGE id 1 len 23 from "R1" < A CHAP challenge has come in from R1. I = â??incomingâ??> BR0:1 CHAP: O RESPONSE id 1 len 23 from "R2" < R2 is sending a response to the challenge. > BR0:1 CHAP: I SUCCESS id 1 len 4 < A success message has come in , indicating the challenge was successfully met. > BR0:1 CHAP: I RESPONSE id 1 len 23 from "R1" < A response to the challenge sent to R1 is now coming in. > BR0:1 CHAP: O SUCCESS id 1 len 4 < The challenge was successfully met by R1, and a success message is sent. >

By mastering these simple ISDN show and debug commands, you increase your chances of passing the CCNA and CCNP exams greatly, and vastly improve your on-the-job skills.

I recommend you visit www.cisco.com/univercd for more show and debug commands. Learning to negotiate this valuable online resource will truly help you become more valuable on the job. Every Cisco router and switch command, along with default and usage guidelines, can be found on this site. Iâ??ll have an article posted soon to help you learn your way around the site; in the meantime, I urge you to begin adding this website to your troubleshooting toolkit.

Chris Bryant, CCIE (TM) #12933, has been active in the Cisco certification community for years. He has written several books that have helped CCNA candidates around the world achieve the coveted CCNA certification, including several concentrating on binary math conversions and subnetting questions that the average CCNA candidate will need to answer on their CCNA exams.

He is the owner of The Bryant Advantage (http://www.thebryantadvantage.com) where he teaches affordable world-class CCNA courses via the Internet, and sells his popular Cisco certification books. Heâ??s proud to have helped CCNA candidates around the world achieve their career goals. Mr. Bryantâ??s books and courses are sold on his site, on eBay, and on several other major Cisco certification sites.

In The News:


Engadget

New York City ordered to share code for DNA evidence software
Engadget
Many attempts to open up access to software in the justice system have fallen flat. Advocates in New York, however, have just scored a significant victory. A...

and more »

Employer, parental software may be blocking website
Seattle Times
If the problem persists when connected to a different network, it likely stems from software on that computer — a software firewall, a virtual private network or parental software. If the problem goes away — and especially if the other computer has ...


TechCrunch

Disputed DNA analysis software's code open for inspection after ...
TechCrunch
If you're going to convict or acquit based on evidence provided by a piece of software, you'd better be damn sure that software is reliable. One such program,..

and more »

ProPublica

Federal Judge Unseals New York Crime Lab's Software for Analyzing DNA Evidence
ProPublica
A federal judge this week unsealed the source code for a software program developed by New York City's crime lab, exposing to public scrutiny a disputed technique for analyzing complex DNA evidence. Judge Valerie Caproni of the Southern District of New ...


TechCrunch

What washing dishes, driving a truck and working in a cemetery taught me about the power of 'blue-collar' software
TechCrunch
I don't think this is the usual route to a job in tech and venture capital. But my former work life has opened my eyes to a corner of the technology world I think has the chance to create the next Salesforce, Oracle or LinkedIn: software targeted at ...

and more »

BGR

Google will now pay $1000 for critical software bugs found in popular third-party apps
BGR
With malware creators becoming more aggressive and sophisticated, a number of tech companies in recent years have instituted “bug bounty” programs that provide monetary rewards to any individual or group that uncovers critical vulnerabilities in software.
Google Play Security Reward Program: Bug Bounty Program - Get Rewards through HackerOneHackerOne
Android malware on Google Play adds devices to botnet | Symantec Connect CommunitySymantec
Android Developers Blog: Playtime 2017: Find success on Google Play and grow your business with new Play Console ...Android Developers Blog
Symantec
all 216 news articles »

Bloomberg

Tesla-Like Software Updates Put Dealers' Profit Center at Risk
Bloomberg
The over-the-air software updates Musk pioneered to add features or fix flaws in his electric vehicles are being embraced by more automakers, a potentially grim development for dealers who typically rely on parts and service for as much as half of ...

and more »

Quartz

Facebook treats its ethical failures like software bugs, and that's why they keep happening
Quartz
As the story of Russia, Facebook, and the 2016 US election drags on, Facebook's been quick to open its wallet. It took out full-page ads in both the New York Times and the Washington Post earlier this month to tell the world how it's going to protect ...


Mac Rumors

Eltima Software's Elmedia Player and Folx Infected With Malware
Mac Rumors
The compromised software was discovered on October 19, and customers who downloaded software from Eltima on that date before 3:15 p.m. Eastern Time may be affected by the malware. The following files will be found on an infected system:
Hackers Distribute Malware-Infected Media Player to Hundreds of Mac UsersMotherboard

all 15 news articles »

Financial Times

Kaspersky denies its software can be used for Russian espionage
Financial Times
The founder of Russian cyber security firm Kaspersky Lab denies that Russian security services can use its popular anti-virus software for espionage, claiming ...

and more »
Google News

Think Of This

Think of this, first we had the HAM Radio, then... Read More

Microsoft Navision Customization and Reporting ? Tips For Programmer/IT Specialist

C/SIDE (Client/Server Integrated Development Environment) - The core of... Read More

Are You Waiting for Microsoft Longhorn Operating System

I love new technology. I am still ready to wait... Read More

Protect Your Most Vital Business Asset with Security Software

Homeland security, airport security, Internet security â?" these days weâ??re... Read More

How to Make Own CMS

Every day millions of new web documents emerge on the... Read More

Tools for Customizing Great Plains

Microsoft Business Solutions ? Great Plains has captured the US... Read More

Software Upgrades Arent Always the Best Move

When my daughter was getting into AOL instant messaging (AIM)... Read More

Put Some Pizazz in Your Software Arsenal

The software giants don't do everything and don't always produce... Read More

Microsoft CRM Data Conversion FAQ

Microsoft Business Solutions CRM data conversion deserves FAQ type of... Read More

What is a Document Manager without Version History?

Document Manager and Version HistoryIn previous articles I have discussed... Read More

Microsoft Great Plains Chemicals & Paint Industry Implementation & Customization Notes

Microsoft Great Plains fits to majority of industries, in the... Read More

Microsoft Great Plains Subcontracting ? Overview for Microsoft Business Solutions Partner

Microsoft Business Solutions Great Plains is very popular ERP/MRP applications... Read More

Computer Phones ? Facts and Fallacies

The stakes are high when considering security, privacy, and savings,... Read More

Microsoft Great Plains Dynamics on Pervasive SQL.2000 Data Repair ? Overview For DBAs

Some introduction into Great Plains Software products, now Microsoft Business... Read More

Microsoft Great Plains: Getting New Users Licenses ? Annual Service Plan FAQ

Microsoft Business Solutions Great Plains, Solomon, Navision, Axapta, Microsoft CRM... Read More

Microsoft CRM Implementation - US Market Lessons

Microsoft CRM is CRM answer from Microsoft Business Solutions. If... Read More

Two Reasons to Use Timesheet Software

This short paper will expand on two key reasons to... Read More

Popular Fleet Maintenance Programs

Some companies that are in need of fleet management may... Read More

ERP Consulting: Microsoft Great Plains Partner Future Directions

In the Clinton era the status quo was simple: you... Read More

Getting Technical Support Help Online

Sometimes your PC will start acting strange for no apparent... Read More

Upgrading Great Plains Dexterity Customization ? switching to new technologies: SQL, Crystal, eConne

1. Replace Dexterity cursor with SQL Stored Procedure Dexterity... Read More

Databases ? How We Love to Hate Them!

You've finally created databases that you can actually use to... Read More

Corporate ERP: Standard vs. Rich functionality ? Microsoft Great Plains

Traditionally we were considering functionally rich systems, such as SAP,... Read More

Destination: Desktop for Google

First we had the original Google search that evolved into... Read More

Passwords Used In Microsoft Word Documents

You would like to protect your documents, wouldn't you? Reasons... Read More