Netscreen Troubleshooting Tools
Netscreen Troubleshooting Tools
Objectives
NO
YES More
theories?
NO
Troubleshooting Methodologies
• Far-end focus
– Start at destination point in network and work back to the source
• Near-end focus
– Start at source point in network and work out to destination
• Working the OSI layers
– Start at Layer 1 and work up
Documentation is Essential!
e2
e7
10.1.20.0/24
10.1.2.0/24
1.1.7.0/24
1.1.70.0/24
B .1 .254
.254 .1
10.1.20.5
Public C
B
Zone 1.1.70.250
Interface Address
E1 10.1.1.1
E2 10.1.2.1
E7 1.1.7.1
E8 1.1.8.1
get system
ns208-> get sys
Product Name: NS208
Serial Number: 0043042002000115, Control Number: 00000000
Hardware Version: 0110(0)-(11), FPGA checksum: 00000000, VLAN1 IP (0.0.0.0)
Software Version: 5.1.0r1.0, Type: Firewall+VPN
Base Mac: 0010.db1d.2140
File Name: ns200.5.1.0r1.0, Checksum: 634852f6
Interface ethernet1:
number 0, if_info 0, if_index 0, mode route
link down, phy-link down
vsys Root, zone Untrust, vr trust-vr
get interface
ns208-> get interface
untrust-vr (0 entries)
======================
trust-vr (8 entries)
======================
ID IP-Prefix Interface Gateway P Pref Mtr Vsys
------------------------------------------------------------------------------
* 9 0.0.0.0/0 eth8 1.1.8.254 S 20 1 Root
ns208-> ping
Target IP address:10.1.10.5
Repeat count [5]:
Datagram size [100]:
Timeout in seconds[2]:
Source interface:
Type escape sequence to abort
10.1.10.0/24 1.1.70.0/24
.1 .254 .1 .1 .254 .1
A e1 e7 C
10.1.1.0/24 1.1.7.0/24 B
10.1.10.5 1.1.70.250
• Get session
• Output options
• Debug utility
• Snoop utility
get session
• Basic session
ns208-> get session
alloc 5/max 128000, alloc failed 0
id 78/s**,vsys 0,flag 00000040/80/20,policy -1,time 89
0(21):10.1.10.5/4647->200.5.5.5/80,6,0010db12cea1,vlan 0,tun 0,vsd 0
3(00):10.1.10.5/4647<-200.5.5.5/80,6,000000000000,vlan 0,tun 0,vsd 0
• Overview
– Utility to view internal operations of NetScreen devices
• Common debug types
– Debug flow basic
– Debug nat
– Debug arp
– Debug DHCP
– Debug ike detail
– Debug pki detail
• Output to debug buffer by default
Debug Buffer
Packet Packet
Received intact?
Forward
No
Yes packet
Existing Destination
No No Drop packet
Session? reachable?
Yes Create
No Yes session
entry
Yes Permitted by
policy?
e7
e2
10.1.20.0/24
10.1.2.0/24
1.1.7.0/24
1.1.70.0/24
B .1 .254
.254 .1
10.1.20.5
Public C
B
Zone 1.1.70.250
Debug Flow Basic Output
• Logical AND
– Enter options on the same line
– All conditions must be present
ns208-> set ffilter src-ip 1.1.7.250 dst-ip 10.1.10.5 ip-prot 6
filter added
• Logical OR
– Options entered on separate lines
– Any condition may be present
ns208-> set ffilter src-ip 1.1.7.250 dst-ip 10.1.10.5 ip-prot 6
filter added
ns208-> set ffilter src-ip 10.1.1.1
filter added
ns208-> set ffilter dst-ip 1.1.70.1
filter added
ns208-> set ffilter dst-port 80
filter added
Viewing Flow Filter
• To remove filters
ns208-> unset ffilter 1
filter 1 removed
ns208-> get ffilter
Flow filter based on:
id:0 src ip 1.1.7.250 dst ip 10.1.10.5 ip proto 6
id:1 dst ip 1.1.70.1
id:2 dst port 80
Snoop Utility
ns208-> snoop
Start Snoop, type ESC or 'snoop off' to stop, continue? [y]/n y
ns208-> clear db
ns208-> ping 10.1.1.254
Type escape sequence to abort
Sending 5, 100-byte ICMP Echos to 10.1.1.254, timeout is 2 seconds
!!!!!
Success Rate is 100 percent (5/5), round-trip time min/avg/max=100/100/100 ms
ns208-> get db stream
04470.0: 0(o):0010db19a4e0->0010db3aed41/0800
10.1.1.1->10.1.1.254/1, tlen=128
vhl=45, tos=00, id=1260, frag=0000, ttl=64
icmp:type=8, code=0
04470.0: 0(i):0010db3aed41->0010db19a4e0/0800
10.1.1.254->10.1.1.1/1, tlen=128
vhl=45, tos=00, id=1264, frag=0000, ttl=64
icmp:type=0, code=0
Snoop Output Example – HTTP