PracticeBlogFlashcardsEspañol

Monitoring, Log Triage, and Route or Service Troubleshooting Lab

Key Takeaways

  • PBQ troubleshooting is faster when you separate monitoring evidence, log evidence, path evidence, and service evidence.
  • Interface counters, syslog, SNMP, flow data, and packet captures answer different questions.
  • Routing issues are often visible through missing routes, wrong gateways, ACL blocks, or asymmetric paths.
  • Service failures require checking name resolution, port reachability, process health, certificates, and dependencies.
  • A clear escalation note should include scope, symptoms, timestamps, tests performed, findings, and next action.
Last updated: April 2026

Monitoring and Troubleshooting Lab

Many Network+ performance-based questions provide a small set of logs, counters, route tables, or command outputs. The goal is to decide what changed, where the failure begins, and which fix matches the evidence.

Scenario

Users in VLAN 10 report that the intranet is unavailable. Users in VLAN 30 can reach the same intranet server. Internet access still works for VLAN 10.

Evidence:

EvidenceResult
User IP172.20.10.55/24
User gateway172.20.10.1
Intranet server172.20.30.25
Ping gatewaySuccess
Ping intranet serverFails
DNS lookup intranet name172.20.30.25
TCP 443 test to intranetTimeout
Firewall logDeny 172.20.10.55 to 172.20.30.25 TCP 443 rule 90

The evidence says DNS works, the local gateway works, and the destination IP is known. The firewall deny log is the strongest clue. The next action is to review the rule set and allow the required user-to-intranet HTTPS flow if it is approved.

Evidence Types

Tool or sourceBest forExample clue
SyslogDevice events and severityInterface changed state, denied traffic, authentication failure
SNMPHealth and performance pollingInterface utilization, errors, CPU, memory
NetFlow or flow dataWho talked to whom and how muchTop talkers, unusual destination ports
Packet capturePacket-level proofTCP SYN retransmits, TLS alert, ARP behavior
Interface countersLink quality and errorsCRC errors, drops, duplex mismatch clues
Route tablePath selectionMissing default route, wrong next hop
DNS toolsName resolutionWrong record, no response, split DNS issue

Route Triage

SymptomLikely issueUseful command family
Can reach local gateway but not remote networkRoute, ACL, firewall, or upstream issueping, traceroute, route table
Traceroute stops at firewallPolicy block or missing route after firewallfirewall logs, route table
One direction works, return failsAsymmetric routing or missing return routeroute tables on both sides
Only one subnet affectedVLAN interface, ACL, route advertisement, or DHCP optioninterface status, ACL, DHCP lease

Service Triage

LayerQuestionTest
DNSDoes the name resolve to the expected IP address?nslookup or dig
Network pathCan the client reach the destination network?ping or traceroute where allowed
TransportIs the expected port reachable?tcping, nc, Test-NetConnection, or packet capture
ApplicationIs the service process healthy?service status, HTTP response, logs
SecurityIs a firewall, ACL, certificate, or authentication control blocking it?firewall logs, TLS details, auth logs

Do not stop at "ping fails" if ICMP is blocked by policy. For web services, a TCP 443 test and firewall logs may be more useful than ping.

Example Log Triage

Log lineInterpretation
%LINK-3-UPDOWN: Interface Gi1/0/24 changed state to downPhysical or data link event on a switchport
Deny TCP 172.20.10.55:51512 to 172.20.30.25:443Firewall policy blocked a web session
DHCPDISCOVER from client, no DHCPOFFER observedDHCP server, relay, VLAN, or trunk issue
OSPF neighbor down, dead timer expiredRouting adjacency failure
High CRC errors on Gi1/0/12Cable, transceiver, interference, or duplex issue

Escalation Note Template

Use concise notes in PBQs when asked to document the issue:

  • Scope: VLAN 10 users cannot reach intranet HTTPS; VLAN 30 users can.
  • Time: Reports began after the 09:15 firewall change.
  • Tests: Gateway ping succeeds; DNS resolves; TCP 443 times out.
  • Evidence: Firewall denies VLAN 10 to 172.20.30.25 TCP 443 on rule 90.
  • Next action: Review rule 90 and add or move approved HTTPS allow rule above deny.

Common PBQ Traps

  • Replacing cabling when logs show an explicit firewall deny.
  • Treating DNS as broken after the name resolved correctly.
  • Assuming ping failure means the server is down when ICMP is blocked.
  • Ignoring return routes and asymmetric routing.
  • Looking only at average bandwidth and missing interface errors or drops.
  • Escalating without timestamps, affected scope, or evidence.
Test Your Knowledge

A client resolves a server name correctly, can reach its gateway, but TCP 443 to the server times out and firewall logs show a deny. What is the most likely cause?

A
B
C
D
Test Your Knowledge

Which evidence source is best for identifying CRC errors and drops on a physical switch interface?

A
B
C
D
Test Your KnowledgeMulti-Select

Which details belong in a useful network escalation note? Select three.

Select all that apply

Affected scope and symptoms
Timestamps or change window context
Tests performed and evidence found
A guess with no supporting data
A request to ignore logs