1. Trang chủ
  2. » Công Nghệ Thông Tin

WINDOWS 2000 TROUBLE SHOOTING TCP/I P phần 10 doc

71 131 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 71
Dung lượng 328,26 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

For a list of those docu-ments, see Chapter 4, “Windows 2000 TCP/IP Internals.” Windows 2000 EnhancementsThe following are some of the most exciting enhancements Microsoft hasmade to the

Trang 1

■ Client Services for NetWare (CSNW)

■ Gateway Services for NetWare (GSNW)

■ NWLink (Microsoft’s implementation of the IPX/SPX protocol)

■ File and Print Services for NetWare (FPNW)

■ Microsoft Print Services for UNIX (LPD and LPR services)SNA (Systems Network Architecture) is a separate software packagefrom Microsoft that can be used to connect Windows PC networks to IBMmainframe networks

General Troubleshooting Guidelines

Troubleshooting TCP/IP and other network problems is made easier ifyou follow the Ten Commandments of Troubleshooting:

1 Know thy network

2 Use the tools of the trade

3 Take it one change at a time

4 Isolate the problem

5 Recreate the problem

6 Don’t overlook the obvious

7 Try the easy way first

8 Document what you do

9 Practice the art of patience

10 Seek help from others

Troubleshooting Resources

There is a great deal of troubleshooting information for TCP/IP issues ingeneral and for Windows 2000-specific problems Be sure to take advan-tage of the following:

■ Microsoft documentation, including Help files, the Resource Kits,white papers, TechNet, official newsgroups, and the MicrosoftWeb site

■ Third-party documentation, including Internet mailing lists,Usenet public newsgroups, Web resources, local user groups,and books and magazines

Trang 2

Troubleshooting ModelsFollowing a set procedure allows you to organize the troubleshootingprocess and makes it less likely that you will overlook something impor-tant along the way The problem-solving models used by other professionscan be applied to network troubleshooting as well, as discussed in the fol-lowing sections.

Differential Diagnosis Model

This model is used in the medical field and consists of the following steps:

1 Examination

2 Diagnosis

3 Treatment

4 FollowupThese same steps can be used in solving TCP/IP connectivity prob-lems

SARA Model

This model is popular in the criminal justice world, in use by law ment agencies practicing community-oriented policing It includes the fol-lowing steps:

enforce-1 Scanning

2 Analysis

3 Response

4 AssessmentComparing the models, you see that although the terminology differs,the actual steps involve the same processes Problem-solving basics arethe same regardless of the type of problem

Information-Gathering TipsGathering information is always one of the first steps in problem solving

In network troubleshooting, as in most areas, this involves asking tions

Trang 3

■ Were you doing anything else in addition to this primary task atthe time?

■ What error message(s), if any, were displayed?

■ Is anyone else on the network experiencing the same problem?

■ Have you ever been able to perform this task on this computer?

■ When was the last time you were able to do so?

■ What changes have occurred since the last time you were able to

by the problem, how many are affected by the problem, what productionactivities are affected by the problem, and how often the problem occurs Solutions, once formulated, should also be prioritized according tocost, time involved, longevity, and long-term effect on performance

Forms and Check Lists

You can devise forms and check lists to guide you through the bleshooting process in an organized manner, or you can use the onessupplied in Chapter 3, “General Windows 2000 TCP/IP TroubleshootingGuidelines.” Forms are useful in helping you to gather information, andcheck lists force you to approach problem solving in a methodical, step-by-step way that is more conducive to success

Trang 4

trou-Inside TCP/IP

The Windows 2000 implementation of TCP/IP supports a large number ofInternet standards as outlined in various RFCs For a list of those docu-ments, see Chapter 4, “Windows 2000 TCP/IP Internals.”

Windows 2000 EnhancementsThe following are some of the most exciting enhancements Microsoft hasmade to the TCP/IP stack:

■ Scalable TCP window size and timestamping (RFC 1323)

■ Selective Acknowledgments (RFC 2018)

■ Support for IP over ATM (RFC 1577)

■ TCP fast retransmit

■ Quality of service (QoS)

■ Resource Reservation Protocol (RSVP)

CIDR is useful for the following purposes:

■ Smaller Internet routing tables

■ Less updating of external routes

■ More efficient allocation of address space

■ Increase in number of available (host) Internet addresses

Multihoming

A computer that has multiple IP addresses is called a multihomed host.

This can be a computer with more than one NIC, or a computer that hasmultiple IP addresses assigned to one NIC Windows 2000 supports bothtypes of multihoming

Trang 5

A multihomed computer with two NICs can act as a router, passingtransmissions from one subnet to another.

IP Multicasting

Multicasting refers to sending data to multiple destinations on the

net-work at the same time, using a single multicast address Computers aredesignated as members of a multicast group, and only group membersreceive the messages A computer can belong to multiple multicast groupssimultaneously

There are two types of multicast groups: permanent and transient.The Internet Group Management Protocol (IGMP) is used to manage mul-ticast membership The multicast address range consists of the class Daddresses 224.0.0.0 through 239.255.255.255

Windows 2000 includes the following utilities that are useful in bleshooting multicast transmissions:

trou-■ MRINFO

■ NETSH ROUTING IP MIB SHOW MFE

■ NETSH ROUTING IP MIB SHOW MFESTATS

■ NETSH ROUTING IP MIB SHOW JOINS

Duplicate Address Detection

In order for computers to communicate on a TCP/IP network, each work interface must have a unique IP address Windows 2000 uses a

net-“gratuitous ARP broadcast” when a computer comes online to detectwhether another computer is already using the IP address it is configured

to use If there is duplication, the second computer with the IP addresswill not be allowed to use it

Inside TCP and UDP

TCP and UDP are Host-to-Host (Transport) layer protocols They handleflow control and provide for reliable end-to-end communications

TCP

TCP is a connection-oriented protocol that handles important one-to-onecommunications such as logons, file and printer sharing, and replication.Windows 2000 TCP includes dead gateway detection, delayed acknowledg-ments, TCP keep-alives, and avoidance of the Silly Window Syndrome

UDP

UDP is a connectionless protocol used for broadcast transmissions andother situations where guaranteed delivery is not required UDP doesn’t

Trang 6

break messages into smaller chunks and reassemble them on the otherend as TCP does UDP is faster than TCP, but less reliable.

Both UDP and TCP provide for ports to differentiate between multipleconnections using the same IP address

TCP/IP Registry SettingsTCP/IP gets configuration information from the Windows Registry Youcan use a Registry Editor to change the behavior of the Windows 2000TCP/IP stack, but this should be done with caution

See Chapter 4 for a listing of Registry settings that can be changed,and instructions on how to do so

Network Monitoring Tools

Windows 2000 includes various tools and utilities that can be used toverify connectivity, gather information, monitor performance, and evenanalyze the packets themselves to assist you in troubleshooting yourTCP/IP network

These include graphic tools such as Network Monitor, Event Viewer,and the Performance console (also called System Monitor), as well ascommand-line utilities standard to the TCP/IP suite

Monitoring GuidelinesMonitoring network activity gives you a chance to gather information over

a period of time, detect and analyze patterns, and compare changes

Baselining

The first step in any monitoring program is to establish a baseline; thiscan be described as the process of collecting information about the

“patient” (the network) before it gets sick Gather your baseline

informa-tion when the network is working properly, so you can use it for son purposes when things go wrong

compari-Documentation

Be sure to document everything you do, and keep your documentationorderly and organized This will assist you in maintaining the networkand allow you to quickly and efficiently return to previous measures

Performance Logs and AlertsThe administrative tool formerly known as Performance Monitor, nowcalled the System Monitor or listed simply as “Performance” in the MMC,

Trang 7

can be used to obtain real-time data on network performance parameters.This information can be saved in a file for later analysis.

The System Monitor can also be configured to alert you when countersreach a specified limit

The Network Monitor program allows you to capture only those framesthat you are interested in, based on protocol or source or destinationcomputer You can apply even more detailed and exacting filters to datathat you have finished collecting, which allows you to pinpoint the preciseelements you might be looking for in the captured data

Network Monitor is not installed by default If it isn’t installed on yourcomputer, you can install it via the Add/Remove Programs applet in theControl Panel

There are two types of filters used by Network Monitor: capture filtersand display filters

Capture Filters

The purpose of the capture filter is to limit the frames that are actuallysaved in the capture buffer This allows you to make better use of yourbuffer space, because the limited amount of buffer you have can be

devoted to looking at the precise targets of interest It also reduces theamount of “extraneous” information that could cause you to overlooksomething important during your investigations

You can filter the capture information in two ways: by machineaddress pairs, or by a specified pattern in the frames that are examinedduring the capture sequence

Display Filters

The display filter allows us to look for very specific elements of the tured data and allows for a much more refined filtering than we canaccomplish with the capture filter A display filter can be used as a data-base search tool, where the capture frames are the data in our database

Trang 8

cap-Event ViewerThe Event Viewer can be used to check on the status of a number of net-work services Windows 2000 systems are configured to report significantfault situations to the event viewer You should make it a regular practice,perhaps the first thing you do every day, to check out the Event Viewer

on all of your primary servers to see if any of the Windows 2000 servicesrunning on these servers are reporting error conditions

The Event Log does contain an added feature over what was found inWindows NT: the DNS log Because of the added importance of DNS inthe normal functioning of domain-related activity, Microsoft deemed theDNS service important enough to warrant its own log in the Event Viewer

TCP/IP UtilitiesThe group of command-line TCP/IP utilities included with Windows 2000

is similar to those available in Windows NT 4.0 We have the familiar set

of TCP/IP tools, such as:

or enhanced functionality compared to what it could do in Windows NT4.0 In addition to these tools, Windows 2000 offers some new command-line TCP/IP tools, including PATHPING and NETDIAG

For detailed information on how to use these command-line utilities introubleshooting TCP/IP problems, see Chapter 5, “Using Network

Monitoring and Troubleshooting Tools in Windows 2000.”

Name Resolution Problems

Name resolution problems are one of the most common causes of theinability to connect to another TCP/IP computer on the network Theseproblems fall into one of two categories: NetBIOS name resolution andhost name resolution

In Windows 2000, as in other Windows operating systems, NetBIOSresolution is handled primarily by WINS, the Windows Internet Name

Trang 9

Service; and host name resolution is handled by the Domain Name

System service, DNS (or its updated incarnation, Dynamic DNS)

WINS and NetBIOS Name Resolution

A NetBIOS name server is a computer that maintains a database of

NetBIOS names and matching IP addresses WINS is the best known andmost widely used NetBIOS name server Windows 2000’s implementation

of WINS complies with RFC 1001/1002 and contains new features notincluded in WINS in NT 4.0

Components of network communications that are involved withNetBIOS name resolution include:

■ The TCP/IP protocol stack

■ NetBIOS over TCP/IP (also called NetBT)

■ WINS and DNS servers

■ Broadcasts

■ LMHOSTS and HOSTS files

■ The Browser service

■ The Server and Workstation services

■ My Network Places

■ The “net” commands (net use, net view, net send)

■ The Alerter serviceThis list can provide a starting point in troubleshooting NetBIOS nameresolution problems To prevent or solve NetBIOS name resolution prob-lems, follow these guidelines:

■ Don’t multihome your WINS server(s)

■ Use a WINS proxy agent on network segments that have WINS clients

non-■ Avoid static records in the WINS database

■ Define replication partners based on link factors

■ Avoid split registration

■ Use the “hub and spoke” model in multisite environments

■ Configure your DNS servers to resolve NetBIOS names

■ Don’t multihome the master browser(s)

■ Use manual tombstoning instead of deleting records

■ Consider all the ramifications before disabling NetBT

Trang 10

DNS and Host Name ResolutionThe NetBIOS namespace is “flat,” but DNS uses a hierarchical (multilevel)namespace DNS resolves Fully Qualified Domain Names (FQDNs) to IPaddresses These names are in the format myserver.mydomain.com

The Windows 2000 DNS is standards-based and is now capable ofdynamic update (hence the new name, Dynamic DNS, or DDNS) DNS isused for resolution of names on the global Internet, and in Windows 2000has moved to the forefront as the name resolution method of choice forMicrosoft networks as well

Resolving Host Names to IP Addresses

DNS clients can resolve a host name to IP address in several ways TheWindows 2000 DNS client service features a caching resolver, whichkeeps a list of recently resolved host names and IP addresses If a sought-after mapping is not there, the client will query a DNS server If the DNSserver can’t resolve the name, the client will go through NetBIOS nameresolution sequence and attempt to resolve the name using the WINSserver, broadcasts, or LMHOSTS files

There are two basic types of queries:

■ Recursive

■ Iterative

An FQDN includes the host name and the host’s domain membership

A fully qualified query must end with a period, although most tions will automatically include it before sending the request

applica-If the request is unqualified, by default the domain membership of themachine issuing the query will be appended to the request A list of otherdomain suffixes can be configured that will be appended to unqualifiedrequests

Planning the DNS Namespace

If a company has both an internal Windows 2000 network and anInternet presence, it can choose to represent the namespace in one of twoways:

■ Use the same domain name for the internal and externalnamespaces

■ Use different domain names for the internal and externalnamespaces

The first choice requires registration of only one domain name, andprovides for more continuity and consistency However, servers will have

Trang 11

to be mirrored internally, and DNS clients will not access external rate host resources.

corpo-The second choice eliminates the need to mirror servers and reducesconfusion as to what is an external and what is an internal resource Youshould, however, register both domain names (although only the externalone is actually required to be registered)

Zones

The actual domains and hosts are contained in zone files These database

files contain resource records, which track the resources contained in adomain

The Windows 2000 server supports both standard and ActiveDirectory integrated zones Active Directory integrated zones offer severaladvantages, including faster and more efficient replication and securedynamic updates

of connectivity problems IP addresses are logical addresses, assigned by

the administrator, and are not to be confused with the more permanent

physical address burned into the NIC, the MAC address.

The IP Address

An IP address has two parts: one identifies the network, and the otheridentifies the host (individual computer) on that network How many bitsrepresent each depends on the subnet mask

Trang 12

IP addresses were originally divided into classes based on the size ofthe networks, as shown in the Table 13.2.

Table 13.2 Address Classes

Address Class

Number of Networks Number of Hosts

Default Subnet Mask

How IP Addresses Are Assigned

In a Windows 2000 TCP/IP network, there are two ways in which IPaddresses (host addresses) can be assigned:

■ Manual address assignment, where an administrator enters theinformation in the TCP/IP configuration properties sheet of everyinterface

■ Automatic addressing, which includes DHCP, APIPA, and ICSautoaddressing

Manual assignment is time-consuming and more prone to errors

DHCP requires that there be a DHCP server on the network configuredwith a block of addresses to allocate APIPA “self-assigns” an addressfrom a preset range to a computer that can’t find a DHCP server An ICShost computer that shares its Internet connection can act as a DHCP

“allocator” and assign addresses to other computers for purposes of ing the connection

shar-ARPThe Address Resolution Protocol is used to resolve IP addresses to physi-cal (MAC) addresses ARP uses broadcasts, and caches the information

You can also add static entries to the ARP cache

You can view the current ARP cache by typing arp –a at the command

prompt

Reverse Address Resolution Protocol (RARP) resolves MAC addresses

to IP addresses

Trang 13

Common IP Addressing Errors

Some of the most common IP addressing errors that affect TCP/IP munications include:

com-■ Duplicate IP addresses on the network

■ Use of invalid or “illegal” IP addresses

■ DHCP configuration problems

DHCP

The Dynamic Host Configuration Protocol (DHCP) server is configured andmanaged from the MMC Most configuration problems are at the serverend

DHCP Server Issues

DHCP uses scopes of addresses, which are groups of consecutive IP

addresses that can be allocated to client computers The New ScopeWizard is used to define the scope A scope must have a name, a range of

IP addresses, and a subnet mask You can also exclude certain addresseswithin the scope from being offered to clients

Superscopes are used when a single physical network segment sists of more than one logical IP subnet, and there are two DHCP serversmanaging separate subnets on the same network

con-DHCP lease duration can be set or changed for a scope The default iseight days

You can reserve addresses for computers that need to always have thesame address, such as server machines

There are three types of DHCP options that can be configured:

■ Scope options

■ Client options

■ Class optionsThe DHCP database files are stored in <systemroot>\System32\DHCPand include four files: dhcp.mdb, dhcp.tmp, j50.log, and j50.chk You canedit the backup interval at which Windows 2000 backs up the DHCPdatabase You also must edit the Registry to manually restore the data-base from backup See Chapter 8, “Troubleshooting Windows 2000 IPAddressing Problems,” for explicit instructions

Windows 2000 protects against “rogue” (unauthorized) DHCP servers

by requiring that Windows 2000 DHCP servers be registered in the

Directory, but this does not prevent rogue NT DHCP servers on the work

Trang 14

net-DHCP Client Issues

Most client configuration problems are relatively simple Ensure that youhave TCP/IP connectivity with the DHCP server by using PING Check tosee that the client is configured to obtain an IP address automatically Ifthe client is unable to communicate with other computers and you find it

is using an address from the 169.254.0.0 range, this indicates it wasunable to contact a DHCP server and assigned itself an address viaAPIPA APIPA can be disabled by editing the Registry

or remote relative to the source host

Subnetting problems (incorrect subnet mask) are common reasons forthe inability of TCP/IP computers to connect Subnetting is a complextopic; for examples and walk-throughs on how to calculate subnet masksfor different network classes, see Chapter 8

Remote Access Connectivity

Windows 2000’s Routing and Remote Access service (RRAS) allows you toestablish a TCP/IP connection across a wide area link In many cases,troubleshooting a remote connection is similar to troubleshooting a localconnection However, there are some special considerations

RRAS supports remote access through the traditional dial-up method,

or via Virtual Private Networking (VPN)

Remote Access versus Remote ControlRemote access is different from remote control In the latter, you actually

“take over the desktop” of a remote computer, controlling it from anotherlocation With remote access, you become another node on the remotenetwork, able to access network resources as you would if your computerwere cabled to the network locally

RRAS provides for a Windows 2000 computer to act as both a remoteaccess client and a remote access server RRAS must be installed andconfigured properly, and dial-up networking must also be installed andconfigured if you wish to dial out as a remote client You can use the NewConnection Wizard to set up a dial-up connection

Trang 15

Remote Access Links

Remote access requires a physical link of some sort, commonly a phone line WAN links vary in type, speed, and cost Some common tech-nologies include:

tele-■ Public Switched Telephone Network/PSTN (regular analog phonelines)

■ Integrated Services Digital Network/ISDN (high-speed digitalphone lines)

■ Digital Subscriber Line/DSL (higher-speed digital phone lines)

■ T-Carrier/T-1, T-2, T-3 (dedicated leased line)

■ X.25 (packet-switched network)

Remote Access Protocols

Remote access protocols work across the WAN link (and are sometimes

called WAN protocols) in conjunction with the LAN protocols used by the

network to which you are remotely connecting The LAN protocol is

“wrapped” (encapsulated) inside the WAN protocol

The two popular WAN protocols are:

■ Serial Line Internet Protocol (SLIP)

■ Point-to-Point Protocol (PPP)PPP is more commonly used, as it supports encryption, compression,and automatic IP address assignment by a DHCP server SLIP is used pri-marily by some UNIX servers Windows 2000 can use either SLIP or PPP

to dial out, but uses only PPP for dial-in connections

You can enable PPP event logging and use PPP tracing to gather mation useful in troubleshooting PPP connections For instructions onhow to do so, see Chapter 9, “Troubleshooting Remote Access in a

infor-Windows 2000 TCP/IP Network.”

RRAS Configuration Problems

Configuration problems can stem from either the RRAS server or theremote client

Server Configuration

The first step in troubleshooting the inability to establish a dial-up nection to the remote server is to ensure that the server’s modem or ISDNadapter is working properly, and that the RRAS service is started on theserver You should ensure that the server’s ports are configured for

con-remote access, and that the properties for the LAN protocol being used

Trang 16

(IP) are configured to allow remote access Also be sure there are enough

IP addresses in the static address pool assigned by RRAS, if this feature

is being used by the RRAS server

RRAS allows you to aggregate the bandwidth of multiple telephone lines

If you have trouble doing so, you should ensure that your ISDN adaptersupports multiple lines or that you have two functional modems, eachattached to a separate working telephone line Then, ensure that theremote access server’s PPP options are configured to support multilink

You can also elect to use Bandwidth Allocation Protocol (BAP) to allowmultilink to adapt to changing bandwidth demands

pack-Remote Access Policy

You can set policies on the RRAS server governing remote access thatplace conditions and parameters on incoming connections Policies can beset to limit dial-in to certain days or time of day, connection types, orgroup memberships, and limits can be set on the duration of the connec-tion

When a user attempts to make a connection, the characteristics of theconnection attempt are compared with the authentication information,user dial-in properties, and remote access policies Access will be denied

if the connection attempt doesn’t match any of the remote access policies

NAT and ICSInternet Connection Sharing (ICS) and Network Address Translation (NAT)allow you to provide Internet access to many computers using only onedial-up connection and registered IP address ICS is actually a “light” ver-sion of NAT ICS is available on both Windows 2000 Professional and

Trang 17

Server computers, but NAT is available only on server products NAT ismore flexible and configurable.

NAT Configuration

NAT must be configured for both public and private interfaces, as NAT

“translates” private IP addresses used internally on the LAN to one ormore public registered IP addresses that are “seen” on the Internet Thepublic interface connects to the ISP, and the private one to the local net-work

Some programs will not work through NAT because they use protocolsthat are not translatable (due to the way the packet headers are con-structed) NAT editors are available and included in Windows 2000 formany common protocols such as FTP, ICMP, PPTP, and NetBT Some pro-tocols, such as HTTP, don’t require a NAT editor

NAT cannot be used with IPSec for host-to-host security

Virtual Private Networking (VPN)

VPNs are a popular solution for creating a secure yet inexpensive way toconnect from a remote computer to a LAN across the Internet Virtual pri-vate networking allows you to establish a “tunnel” in which messages areencapsulated and encrypted

Windows 2000 supports two tunneling protocols:

■ Point-to-Point Tunneling Protocol (PPTP)

■ Layer 2 Tunneling Protocol (L2TP)Troubleshooting VPN connections is similar to troubleshooting otherremote connections, with a bit more complexity Some guidelines include:

■ Ensure that RRAS is installed and enabled on the VPN server

■ Ensure the RRAS service is started on the VPN server

■ Ensure that PPTP or L2TP ports are enabled for inbound remoteaccess traffic

■ Ensure that LAN protocols used by the VPN client are enabled

on the server

■ Ensure that all PPTP or L2TP ports are not already in use

■ Ensure that the VPN client and server are configured with acommon authentication method and a common encryptionmethod

■ Ensure that the user account has the proper dial-in permissionsgranted

■ Ensure that remote access policies are not causing a denial ofthe connection

Trang 18

The Network Interface Level

Connectivity problems can occur at any layer of the networking model

The network interface level includes physical and data link issues, suchas:

■ The network interface card (NIC)

■ NIC drivers

■ Cable and other media

■ Connectivity devices

Connectivity DevicesLayer 1 and 2 connectivity devices include repeaters, hubs, switches, andbridges Each of these serves a different purpose and works in a differentway

Passive Do not boost the signal

Active Boost the signal

Intelligent Contain diagnostic chips for management

Switching (also called a switch; see the next section)

Trang 19

net-Bridges determine whether to forward a packet across based on the MACaddress and the bridge’s own routing table, which it builds as it “learns”the locations of computers on the network.

The 5-4-3 Rule

A standard guideline is that coax Ethernet networks may have no morethan five network segments, connected by no more than four repeaters,and no more than three of those segments may be populated by nodes(computers or other network devices)

The 80/20 Rule

With bridges, a popular guideline is that 80 percent of the network trafficshould be local (same side of the bridge), and 20 percent (or less) shouldcross the bridge

For best performance, you should ensure that computers that municate with each other are most often on the same side of the bridge

com-Looping

Bridge looping is a common problem that can occur if there is more thanone active bridge on the network The Spanning Tree Algorithm wasdeveloped as a solution to bridge looping

The Internetwork Level

The Internetwork layer of the DoD model (equivalent to the Network layer

in OSI) is responsible for routing Windows 2000 allows a computer to

function as an IP router (also called a gateway) when two network

inter-faces are installed and RRAS is properly configured for IP forwarding

IP routing involves finding a pathway from the sending computer or warding router to the destination computer, whose address is designated in

for-the IP header The distance from one router to for-the next is called a hop There are two types of routing: direct and indirect Indirect routing

refers to routing data to a computer on the same subnet, while indirectrouting refers to sending data through a gateway or gateways to a com-puter on a different subnet

Each TCP/IP computer on a routed network has a designated defaultgateway to which packets addressed to a destination with a different net-work ID are sent Windows 2000 allows you to configure multiple defaultgateways, but only one is active at a given time If the first fails, the sec-ond is used The default gateway must be on the same IP subnet as the

IP address assigned to the interface

Trang 20

A router’s interface can connect to a LAN or a WAN Each interfacemust have an IP address with a network ID appropriate for the network

To view the routing table, use the route print command, or you canview the table from the GUI using the RRAS management console

The routing table has the following columns:

Features of the Windows 2000 Router

A Windows 2000 computer running RRAS and providing routing servicessupports the following features:

■ Multiprotocol routing (IP, IPX, and AppleTalk)

■ Support for standard dynamic routing protocols (RIP and OSPF)

■ Packet filtering

■ Router advertisement and discovery (ICMP)

■ Multicast services (IGMP)

■ Unicast routing

Routing ProtocolsRouting can be either static or dynamic Static routing requires manuallyentering routes into the routing table Dynamic routing requires specialprotocols Windows 2000 supports the following dynamic routing proto-cols:

Trang 21

hori-RIP listening (Silent hori-RIP) is also supported With Silent hori-RIP, hosts thatare not routers themselves can listen to RIP messages sent by other com-puters and use them to update their tables.

Both hosts and gateways can implement RIP RIP is relatively easy toset up, but has the following disadvantages and problems:

■ Hop count limit of 15

■ Excessive network traffic caused by RIP broadcasts

■ High convergence time

■ Possibility of routing loops

■ Count-to-infinity problem

■ Rogue RIP routersRIPv2 supports password authentication so the origin of RIPannouncements can be confirmed RIP is a distance vector protocol

OSPF Features

Open Shortest Path First (OSPF) is a link state protocol As such, it isefficient and doesn’t require much overhead The Shortest Path First algo-rithm is not vulnerable to routing loops SPF calculates the shortest pathbetween the router and remote networks by creating and maintaining amap of the network, called the Link State Database (LSDB)

Windows 2000’s OSPF can be used on a broadcast network likeEthernet, a nonbroadcast network like ATM, or a point-to-point networkusing a dedicated leased line OSPF’s routing table structure is hierarchi-cal, unlike RIP’s flat structure

Areas and Router Classifications

OSPF divides the network into areas, which are assigned an area number.There is always a “backbone” area, called Area 0, to which the Area

Border Router (ABR) of every other area is connected An area can consist

of one or more networks or subnets ABRs can summarize their routes,which decreases the need for OSPF to recalculate routes

OSPF routers are classified as:

Trang 22

■ ABRs (Area Border Routers)

■ IRs (Internal Routers)

■ BR (The Backbone Router)

■ ASBR (Autonomous System Border Routers)

OSPF Protocols

OSPF uses the following protocols: common header protocol, hello col, exchange protocol, flooding protocol, and the aging link state recordprotocol

proto-OSPF Advantages

Although it is more complex and requires more technical expertise toimplement, OSPF enjoys the following advantages over RIP:

■ More efficient calculation of routes

■ Faster convergence times

■ Support for load balancing

■ Low bandwidth utilization

■ No routing loops or count-to-infinity problems

■ Hierarchical structure isolates instability within an area

■ More scalable, appropriate for larger networks

■ Secure password authentication for transmission of updatemessages

Windows 2000 Router LoggingYou can enable logging to assist in troubleshooting the Windows 2000router in one of two ways:

■ Enable event logging: Writes events to the system log in EventViewer

■ Enable tracing: Logs to a file

To enable tracing, you must edit the Windows 2000 Registry Forinstructions on how to do so, see Chapter 11, “Troubleshooting Windows

2000 Connectivity Problems at the Internetwork Level.”

Selected Services

Windows 2000 includes the Internet Information Services (IIS 5.0): Webserver, FTP server, NNTP news server, gopher and SMTP mail server All ofthese services depend on the TCP/IP suite and are fully integrated withthe operating system

Trang 23

Site Logging

You can enable site logging to assist with troubleshooting the Web andFTP services This is done through the IIS management console There arefour types of logging formats from which to choose:

■ W3C Extended Log File Format

■ Logging to an ODBC database

■ NCSA Common Log File Format

■ Microsoft IIS Log FormatWC3 and ODBC logging can be customized, while NCSA and MicrosoftIIS formats are fixed (noncustomizable) file formats

Web Server

The Web server is subject to the following common problems:

Connection capacity bottleneck To solve this, you can throttle

network bandwidth

CPU utilization bottleneck To solve this, you can enable

processor throttling, upgrade the CPU, add additional CPUs(multiprocessing), or move applications that use a great deal ofprocessor time to another computer

Site name resolution problems You can use IPCONFIG and

standard name resolution troubleshooting techniques

Inaccessible virtual directories You must add the virtual

directory to every individual site

Problems hosting multiple site You must properly configure

appended port numbers, assign multiple IP addresses, orconfigure host headers

Permissions problems Check NTFS permissions, ensure that

IIS is not set to deny access to that IP address or domain, andcheck the user account

IIS configuration information is stored in the metabase, which is a

hierarchical database similar to the Registry Changes can be made to themetabase using the IIS snap-in to the MMC or the HTML Web-basedInternet Services Manager

FTP Server

Most FTP problems are authentication or permissions problems, or nectivity problems Troubleshoot general network connectivity usingPING

Trang 24

con-FTP commands and arguments are all sent together in the same

pack-et, which makes it easy to troubleshoot the service with a protocol sis tool like Sniffer because you don’t have to reassemble the packets

analy-Ensure that you know how to restart a paused or stopped FTP site

You can do this within the Internet Services MMC or from the commandline

NNTP ServerThe NNTP service can be monitored using System Monitor (Performance).You can also use Event Viewer’s system log, to which NNTP error mes-sages are written

Common NNTP problems involve network connectivity, or NNTP ice availability Both of these can be checked using standard TCP/IP com-mand-line utilities For detailed instructions on how to do so, see Chapter

serv-11 Another common source of problems involves security settings

Always check the permissions on the directories where the newsgroupresides, ensure that the IP address or domain has not been restricted,and check to see if SSL is required

Summary

The TCP/IP protocol suite has been around for—in the context of

comput-er technology—a long time The Windows 2000 opcomput-erating system is new

Together, they work effectively to provide reliable network tions over networks of all sizes They also present some unique trou-bleshooting challenges (also known as opportunities) to the networkadministrator Learning to live with (and love) them is more a job require-ment than an option; it looks as if both will be around for some time tocome

Trang 26

communica-TCP/IP Troubleshooting Secrets

Solutions in this chapter:

Trang 27

Lesser-Known Shortcuts

The following are some of the lesser-known shortcuts available withWindows 2000

Finding the Consoles

Windows 2000 has a great many preconfigured Management Consolesthat you can use right out of the box Many of these consoles are avail-able to you directly from the Administrative Tools menu, which you canaccess from the Start menu However, if you would like to look at some ofthe “undocumented” consoles available in Windows 2000, you can use theFind command from the Start menu to help your search

Click the Start menu, go to Search, and then click on Files or Folders.From there, type in the “Search for file or folders named” text box thestring:

*.msc

This will cause the Find utility to search for all the MicrosoftManagement Consoles on your machine The number of handy MMCsthat Microsoft has included might pleasantly surprise you If you findthem useful, you can create a shortcut on your desktop to any of theseconsoles you discovered

Control the Index Server

The Index Server that comes with Windows 2000 can be incredibly intensive If you find that you have frequent spikes of processor activityattributable to the cisvc.exe or cidaemon.exe processes, you might want towrestle some control over the amount of system resources dedicated to theIndex Server Luckily, Microsoft gives you a way to do this easily

resource-Open the Computer Management console from the Administrative Toolsmenu Then expand the Services and Applications node in the left pane, andclick on Indexing Service First you need to stop the Index Server by right-clicking the Indexing Service node and selecting Stop

After you have stopped the Index Server, right-click it again, tracedown to All Tasks, and then over to click Tune Performance You’ll seethe dialog box displayed in Figure A.1

From this dialog box, you can configure how much of the system’sresources you want to dedicate to the Index Server Processes

The default is “Used often, but not dedicated to this service.”

If you find that the service is used only occasionally, but you still want

to avail yourself of the Index Server services periodically, choose the

“Used occasionally” option button

Trang 28

Figure A.1 The Indexing Service Usage properties dialog box.

Windows 2000 Telnet Client and Server

In Windows NT 4.0, you could easily access the Telnet Client from theAccessories menu in the Start menu If you try to find the Telnet Client inthe same way in Windows 2000, you’ll be sadly disappointed In order to

access the Telnet Client in Windows 2000, you must type telnet at the

Run command or command prompt You will see a screen similar toFigure A.2

Figure A.2 The Windows 2000 Telnet Client application.

The Telnet Client is now entirely character-based You no longer havethe comfort of the nice GUI interface provided with the Telnet Client thatwas included with Windows NT 4.0 To configure the Telnet Client’s

Trang 29

behavior, type ? at the Telnet command prompt You should see output

similar to the following:

Commands may be abbreviated Supported commands are:

close close current connection

display display operating parameters

open connect to a site

quit exit telnet

set set options (type 'set ?' for a list)

status print status information

unset unset options (type 'unset ?' for a list)

?/help print help information

In order to get more control over the appearance of your Telnet dows, you can include some “set” options To find out what your set

win-options are, type set ? at the Telnet command prompt You should see

something similar to the following:

Microsoft Telnet> set ?

NTLM Turn ON NTLM Authentication.

LOCAL_ECHO Turn ON LOCAL_ECHO.

TERM x (where x is ANSI, VT100, VT52, or VTNT)

CRLF Send both CR and LF

By using the “set” options, you can configure such properties as:

■ The terminal emulation type

■ Whether you want to use NTLM authentication

■ Whether the terminal windows should echo the characters thatyou type

There was no Telnet Server available “out of the box” for Windows NT 4.0 There

was a Telnet Server available with the Windows NT 4.0 Resource Kit, although

it was somewhat difficult to implement and was not always very reliable Windows 2000 includes a Telnet Server right out of the box, which is

a tremendous boon to administrators who wish to use command-lineprocesses to execute instructions to remote machines

Trang 30

To access the Windows 2000 Telnet Server, go to the AdministrativeTools menu, and click Telnet Server Administration You should see ascreen similar to Figure A.3.

Figure A.3 The Telnet Server Administration command window.

From here, you can configure the Telnet Server settings The onesthat you’ll be most concerned with will be related to displaying andchanging the Registry settings that determine how the Telnet Serverfunctions If you select option 3 from this list, you will see a screen sim-ilar to Figure A.4

Figure A.4 The Telnet Server Registry settings options.

What do all these options mean? Open the Windows 2000 Help andsearch for Telnet You will find the meanings and the configurationoptions for all settings there

Trang 31

Under-Documented Features and Functions

Here are several under-documented features and functions available inWindows 2000

The FTP Command Set

Have you ever wanted to be able to use the command-line FTP programlike the pros do, but had no idea what the command set was? Table A.1shows a list of the most useful commands you can execute from theWindows 2000 command-line FTP program

Table A.1 Command-Line FTP Program Commands

! Run the command on the local computer rather than on the

FTP Server

ASCII Sets the file transfer type to ASCII, which is the default

Bell The computer will make a sound after a file transfer command

is completed

Binary Sets the file transfer type to binary for binary file transfers such

as program files

Bye This ends the FTP session

CD Changes your directory location on the FTP Server

Debug Causes the screen to print detailed information about the

com-mands sent to and from the FTP Server

Delete Deletes files on the FTP Server

Dir Shows a listing of the Directories on the FTP Server

Get Copies a file on the FTP Server to your computer

Glob Allows you to GET groups (globs) of files using wildcard

char-acters

Lcd Changes the directory where files will be downloaded on the

local machine

Ls Lists files and directories on the FTP Server

Mget GETS multiple files from the FTP Server

Mput Copies multiple files from the local machine to the FTP Server.Open Connects to a specified FTP Server

Put Copies local files to the FTP Server

Command Action

Continued

Trang 32

The nslookup UtilityOne of the most useful utilities you have is the nslookup command.

Traditionally, however, Windows NT network administrators have not hadvery much training in how to use the utility You can use nslookup totroubleshoot problems with host name resolution, and to investigateproblems with the DNS server itself, such as absent records in the zonedatabase file

There may be times when you are not at a machine that has the DNSConsole available, but you still need to know the contents of the zonedatabase file to troubleshoot a host name resolution problem In thatcase, you can still access the entries in the zone database by using thenslookup command

First, start nslookup in interactive mode Remember that interactivemode allows you to stay in the nslookup command context until you type

exit from the nslookup command prompt Then type ? to see the

ls –a tacteam.net.

again replacing the zone name with the one that you’re interested in Youcan use the –t [Record Type] command to list only those records you areinterested in For example, if you only wanted to see the NS records forthe zone, you could type:

ls -t NS tacteam.net.

and a list of all the NS records would be returned

Prompt When multiple files are being transferred, prompt will cause

the system to prompt you for your wish to download quent files This is turned on by default

subse-Status Informs you of the current status of FTP connections and

tog-gled options

Type Sets or displays the file transfer type

Verbose Gives you detailed information about all FTP commands

exe-cuted during the session

Command Action

Trang 33

Take some time to acquaint yourself with the nslookup command Youwill find it a faithful ally in solving many of your DNS-related problems.

Using ipconfig Switches

You have undoubtedly run into the ipconfig command and some of itsnew features The ipconfig command now allows you to set and show theclass IDs available to DHCP clients on your Windows 2000 network The Windows 2000 DHCP service allows you to use class IDs that theDHCP client sends to the DHCP server to let it know that it is a member

of a “class,” either a “user class” or a “vendor class.”

The user classes are those that you can create yourself, and the vendorclasses are implemented by vendors of specific hardware and software

The trick is, how do you actually implement these class IDs? If youlook at the online help for the ipconfig command, you see the following:

| /setclassid adapter [classidtoset] ]

adapter Full name or pattern with '*' and '?' to 'match',

* matches any character, ? matches one character.

Options /? Display this help message.

/all Display full configuration information.

/release Release the IP address for the specified adapter.

/renew Renew the IP address for the specified adapter.

/flushdns Purges the DNS Resolver cache.

/registerdns Refreshes all DHCP leases and re-registers DNS names /displaydns Display the contents of the DNS Resolver Cache.

NOTE

Trang 34

/showclassid Displays all the dhcp class IDs allowed for adapter.

/setclassid Modifies the dhcp class id.

The default is to display only the IP address, subnet mask and default gateway for each adapter bound to TCP/IP.

For Release and Renew, if no adapter name is specified, then the IP address leases for all adapters bound to TCP/IP will be released or renewed.

For SetClassID, if no class id is specified, then the classid is removed.

To see the available class IDs, you can use the showclassid switch

Notice that the command must include the adapter name Now, how doyou know your adapter name? You could use the ipconfig command withthe /all switch and see something like the following:

C:\>ipconfig /all Windows 2000 IP Configuration

Host Name : EXETER Primary DNS Suffix : tacteam.net Node Type : Hybrid

IP Routing Enabled : Yes WINS Proxy Enabled : No DNS Suffix Search List : blah.com

wins.tacteam.net Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix : Description : 3Com EtherLink XL 10/100 PCI TX NIC (3C905B-T)

Physical Address : 00-50-04-70-EC-D3 DHCP Enabled : No

IP Address : 192.168.1.186 Subnet Mask : 255.255.255.0 Default Gateway : 192.168.1.16 DNS Servers : 192.168.1.185

192.168.1.16 Primary WINS Server : 192.168.1.185

Looking at this example, what do you think the adapter name is? Ifyou guessed 3Com EtherLink XL 10/100 PCI TX NIC (3C905B-T), you’rewrong! The actual adapter name is Local Area Connection So, what doyou think you would get if you typed ipconfig /showclassid Local

Trang 35

need to put the phrase “Local Area Connection” in quotation marks This

Now, when I type the command ipconfig /showclassid 3Com, we seethe following:

C:\>ipconfig /showclassid 3Com

Windows 2000 IP Configuration

DHCP Class ID for Adapter "3Com":

DHCP ClassID Name : Microsoft Dynamic BOOTP Class DHCP ClassID Description : User class for options specific

to dynamic BOOTP clients

You can use the new adapter name when setting class IDs for yourDHCP clients as well For more information on how to create and use

user and vendor class IDs, check out Managing Windows 2000 Network Services published by Syngress Media.

For Experts Only

Here are some of the more advanced features of Windows 2000

The Future of IP Communications

As we enter the twenty-first century, the ways we communicate continue

to change Technologies once dreamed of only by science fiction writersare becoming reality—and many of those technologies are based on IP

IP Telephony

One exciting development is IP telephony, which offers simultaneousvoice, video, and data transmission over the Internet or the local net-work

Ngày đăng: 13/08/2014, 12:21

TỪ KHÓA LIÊN QUAN