Summary

Troubleshooting any networking issue requires a thorough understanding of how the implementation has been done. However, even more important to understand in a security implementation is the implementation's ultimate goal. As soon as this goal has been clearly identified, you can use various tools to verify if the implementation is doing what it is supposed to be doing. debug and show commands are the most commonly used tools for troubleshooting. Various debug and show commands are often used in succession in an effort to understand the nature of the problem and narrow it down.

The aim of this chapter is to leave you with an understanding of some of the troubleshooting aspects of the principles and practices discussed in this book. The ...

Get Network Security Principles and Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.