These tools help you watch the network continuously — collecting data, detecting problems early, and documenting network behavior.
SNMP is the most widely used protocol for monitoring network devices like routers, switches, firewalls, and servers.
| Component | Role |
|---|---|
| Manager | The Network Management System (NMS) that requests or receives data |
| Agent | Runs on the network device (router/switch) and responds to the manager |
| MIB | The Management Information Base is a structured database of monitored parameters (e.g., interface status, CPU load) |
| Version | Features |
|---|---|
| v1 | Basic, no encryption, obsolete |
| v2c | Adds bulk data transfers, but still no encryption |
| v3 | Adds authentication (MD5/SHA) and encryption (DES/AES) — most secure and preferred |
| Type | Purpose |
|---|---|
| GET | Manager requests info from an agent |
| SET | Manager changes config on agent |
| TRAP | Agent sends alert to the manager |
| INFORM | Like a TRAP but waits for acknowledgment |
A switch goes down → it sends a TRAP to the NMS.
The NMS polls devices every 5 minutes using GET to check CPU/memory/interface status.
Always use SNMPv3 where possible. Limit community string exposure (public/private in v2c) and apply ACLs.
Syslog is a logging protocol that collects messages from devices (e.g., startup events, interface status changes, configuration changes).
| Level | Description |
|---|---|
| 0 | Emergency |
| 1 | Alert |
| 2 | Critical |
| 3 | Error |
| 4 | Warning |
| 5 | Notice |
| 6 | Informational |
| 7 | Debug |
Lower number = more urgent.
You can configure your router to send warning-level logs and above to a Syslog server for centralized analysis.
logging host 192.168.1.50
logging trap warnings
Centralized log collection
Historical event tracking
Useful for compliance and auditing
NetFlow is a Cisco protocol used to analyze traffic flows through your network — helping you answer questions like:
Who is using the most bandwidth?
What applications are being used?
Is there suspicious traffic behavior?
Source and destination IPs
Ports (TCP/UDP)
Protocol type
Interface
Number of packets and bytes
| Type | Description |
|---|---|
| Original NetFlow | Basic flow collection |
| Flexible NetFlow | Customizable templates |
| IPFIX | Standards-based (IETF) version of NetFlow |
Identify top 10 bandwidth consumers by exporting NetFlow to a tool like SolarWinds NTA, ntop, or Cisco Stealthwatch.
SPAN is used to mirror live traffic from a switch port or VLAN to a monitoring port for analysis (e.g., Wireshark).
| Type | Description |
|---|---|
| Local SPAN | Mirror traffic within the same switch |
| RSPAN | Mirror traffic across switches using a special VLAN |
| ERSPAN | Encapsulated in GRE tunnels for transport over an IP network — very flexible |
You want to analyze suspicious traffic. You configure SPAN to mirror all traffic from a VLAN to a port where Wireshark is connected.
monitor session 1 source interface g0/1
monitor session 1 destination interface g0/2
| Tool | Purpose | Key Strength |
|---|---|---|
| SNMP | Device health/status | Polling + alerting |
| Syslog | Event logging | Severity-based alerts |
| NetFlow | Traffic flow analysis | App and user visibility |
| SPAN | Live packet capture | Protocol-level analysis |
Cisco DNA Center is a centralized controller and analytics platform that offers automation, policy control, and assurance for enterprise networks. It supports both Day 0 (design) through Day N (monitoring and optimization) tasks.
DNA Center (short for Digital Network Architecture Center) is Cisco’s flagship platform for:
Device provisioning (automated onboarding)
Network-wide configuration (template-based)
Policy-based control (segmentation, security)
Real-time telemetry and analytics
| Area | Purpose |
|---|---|
| Design | Create sites, IP pools, device roles |
| Policy | Apply access control and segmentation (e.g., SGTs) |
| Provision | Push configurations and onboard new devices |
| Assurance | Monitor performance, generate insights |
Cisco ISE for identity policies
Meraki Dashboard
NetFlow and Syslog feeds
REST APIs for external automation tools
DNA Assurance provides continuous monitoring and scoring of network performance, user experience, and application responsiveness.
Health scores help you quantify network quality in real time and historically:
| Score Type | Evaluates |
|---|---|
| Device Health | CPU, memory, interface errors, config compliance |
| Client Health | RSSI, authentication success, DHCP/DNS failures |
| Application Health | Delay, packet loss, response time of apps (e.g., HTTP, VoIP) |
Client 360 view: all data about a specific user/device (e.g., signal strength, last login, failure reasons)
Time-travel analytics: investigate issues that happened in the past
Path trace: visualize packet flow across the network for a specific session
A user complains their Zoom call drops frequently.
DNA Center shows:
Poor SNR (signal-to-noise ratio)
High retransmissions on the AP
Congested channel usage → recommends channel reallocation
DNA Center leverages Artificial Intelligence (AI) and Machine Learning (ML) to detect, analyze, and resolve anomalies in real time.
| Feature | Description |
|---|---|
| Anomaly Detection | Finds unusual patterns (e.g., sudden traffic drops, misbehaving clients) |
| Root-Cause Analysis | Identifies the real issue and affected devices |
| Suggested Remediation | Offers automatic or guided fixes |
| Proactive Alerts | Warns about degrading conditions (e.g., cable quality, wireless channel saturation) |
High DHCP failure rate for clients on VLAN 20
DNA Center traces this to:
A misconfigured ip helper-address
Or failed DHCP server
It highlights the change log and recommends reconfiguration
| Feature | Function | Benefit |
|---|---|---|
| DNA Center | Network controller and manager | Centralized control |
| Assurance | Health scoring and insights | Proactive operations |
| AI/ML | Smart analytics | Faster problem resolution |
| Time Travel | Historical diagnostics | Root-cause correlation |
Network engineers use a variety of tools to diagnose, isolate, and resolve problems. Cisco IOS provides both active tools (like ping and traceroute) and passive tools (like show and logging commands).
Tests basic IP connectivity between two devices.
Uses ICMP Echo Request and waits for Echo Reply.
ping 192.168.1.1
| Output | Meaning |
|---|---|
!!!!! |
Successful replies |
..... |
No response (timeout) |
U.U.U. |
Destination unreachable |
Identifies each hop between source and destination.
Uses TTL values in IP headers to reveal intermediate routers.
traceroute 8.8.8.8
traceroute to find delays or dropped hops.Debug commands show live, detailed internal processing — ideal for in-depth problem analysis, but they can consume CPU, so use them with caution.
| Command | Purpose |
|---|---|
debug ip routing |
View dynamic routing updates |
debug dhcp detail |
Watch DHCP request/response process |
debug arp |
Monitor ARP traffic |
debug aaa authentication |
Troubleshoot login/auth issues |
Use in a test environment or during a maintenance window.
Always disable after use:
undebug all
Show commands are non-intrusive and safe for production environments. They're your first line of investigation.
| Command | Description |
|---|---|
show ip route |
Displays routing table |
show interfaces |
Traffic stats, errors, and status |
show vlan |
VLAN membership and configuration |
show spanning-tree |
STP roles and port states |
show mac address-table |
MAC-to-port mapping |
show ip arp |
View ARP cache |
show ip dhcp binding |
See DHCP-assigned addresses |
Cisco devices maintain an internal buffer of recent log messages (Syslog). These are essential for tracking recent changes or faults.
show logging
Supports filtering by:
Severity
Timestamp
Module/subsystem
logging buffered 4096 debugging
| Tool | Type | Purpose |
|---|---|---|
ping |
Active | IP connectivity check |
traceroute |
Active | Identify network path |
debug |
Active | Real-time detailed output |
show |
Passive | View current state of configs/stats |
show logging |
Passive | Check recent events/messages |
Performance metrics allow you to quantify how well your network is performing. These indicators are critical for maintaining SLAs (Service Level Agreements), ensuring client satisfaction, and detecting problems early.
Cisco routers support IP SLA, which creates probes that simulate real-world traffic to measure performance.
IP SLA generates synthetic traffic to:
Simulate ping, HTTP, VoIP calls, DNS queries, etc.
Measure latency, jitter, packet loss, and response time
| Scenario | Example |
|---|---|
| Voice network | Measure jitter between sites |
| Web app | Test HTTP availability from branch to data center |
| DNS | Validate external DNS resolution time |
ip sla 1
icmp-echo 8.8.8.8
frequency 60
!
ip sla schedule 1 life forever start-time now
Device health refers to the operational status and resource usage of network hardware.
| Metric | Description |
|---|---|
| CPU Utilization | % of CPU used — high levels may mean routing loops, DoS attacks, or bad processes |
| Memory Usage | Low available memory can cause crashes or slow response |
| Interface Errors | CRC errors, late collisions, input/output drops |
| Temperature and Fan Status | Physical environment checks |
| PoE Failures | For powered devices like phones, cameras, or APs |
show processes cpu sorted
show memory statistics
show interfaces status
show environment all
These focus on wireless client health — particularly useful when troubleshooting Wi-Fi performance issues.
| Metric | Description |
|---|---|
| RSSI (Received Signal Strength Indicator) | Strength of signal received by client — ideal: > -67 dBm |
| SNR (Signal-to-Noise Ratio) | Difference between signal and background noise — ideal: > 25 dB |
| Authentication Failures | Often caused by incorrect credentials or RADIUS issues |
| DHCP Failures | Could be due to misconfigurations or DHCP exhaustion |
| Roaming Failures | Result from misconfigured SSIDs, overlapping channels, or excessive AP spacing |
Check RSSI/SNR
Check authentication success
Check IP address assignment
Look for application success/failures
| Metric Area | Focus | Tools |
|---|---|---|
| SLA Monitoring | Latency, jitter, packet loss | ip sla, DNA Center |
| Device Health | CPU, memory, interface status | show processes, show interfaces |
| Client Metrics | RSSI, SNR, DHCP/Auth stats | DNA Center, wireless controller logs |
As networks become more complex and dynamic, real-time telemetry and feedback from automation tools are essential to understand what's happening instantly and accurately. Traditional methods like SNMP polling are no longer enough.
Streaming telemetry is a push-based monitoring model where the device sends data continuously to a collector — unlike traditional polling methods that pull data periodically.
| Feature | SNMP Polling | Streaming Telemetry |
|---|---|---|
| Model | Pull | Push |
| Frequency | Every X minutes | Real-time or near real-time |
| Overhead | Higher (CPU intensive) | Lower |
| Format | Flat, limited | Rich, structured (JSON, XML) |
| Protocols | SNMP | gRPC, NETCONF, RESTCONF |
Near real-time insights
Lightweight on devices
Highly scalable
Better data granularity
| Protocol | Description |
|---|---|
| gRPC | Google-developed, high-performance telemetry transport |
| NETCONF | XML-based protocol for configuration and data retrieval |
| RESTCONF | RESTful API using HTTP for NETCONF-style data |
Model-driven telemetry uses structured data models (typically YANG) to define:
What data is collected
How it is structured
How it can be consumed by analytics tools
A data modeling language used with NETCONF/RESTCONF.
Ensures consistent structure and predictable output across platforms.
| Benefit | Description |
|---|---|
| Standardized | Devices use the same data model (YANG) |
| Machine-readable | Easily parsed by visualization/analysis tools |
| Rich data sets | Includes operational state, configuration, counters |
| Better integration | Works seamlessly with automation and cloud tools |
| Tool | Use |
|---|---|
| InfluxDB | Time-series database for storing telemetry |
| Grafana | Visualization and dashboarding |
| Cisco DNA Center | Ingests streaming telemetry for Assurance analytics |
| Elastic Stack (ELK) | Advanced searching and alerting |
| Feature | Purpose | Protocols/Tools |
|---|---|---|
| Streaming Telemetry | Real-time monitoring | gRPC, NETCONF, RESTCONF |
| Model-Driven Telemetry | Structured data via models | YANG, InfluxDB, Grafana |
| Benefits | Low overhead, high precision | AI/ML-friendly integration |
Simple Network Management Protocol (SNMP) provides mechanisms to report events to a Network Management System (NMS), primarily through Trap and Inform messages.
| Feature | SNMP Trap | SNMP Inform |
|---|---|---|
| Supported Versions | v1, v2c, v3 | v2c, v3 |
| Acknowledged by NMS? | No | Yes |
| Reliability | Unreliable (best-effort) | Reliable (requires acknowledgment) |
| Use Case | Low-overhead alerting | Critical alerting in reliable networks |
| Response Required? | No | Yes (NMS must reply) |
Exam Tip: SNMPv3 supports both trap and inform, making it suitable for environments where reliable notifications are needed.
SPAN (Switched Port Analyzer) is used to mirror traffic to a monitoring port, but hardware limitations must be considered:
Cannot capture ingress and egress on VLAN simultaneously on many platforms.
A source port/interface can only participate in one SPAN session at a time.
When using RSPAN, both source and destination VLANs must be configured correctly across all switches involved.
Use local SPAN for simple setups, and ERSPAN for multi-device analysis (encapsulates mirrored traffic in GRE).
Cisco DNA Center integrates with Cisco ISE (Identity Services Engine) to enhance policy enforcement based on identity and security posture.
DNA Center consumes Security Group Tags (SGTs) from ISE.
DNA Assurance uses SGT data for:
Policy-based segmentation
Quarantine actions
Dynamic rate limiting or VLAN assignment
An infected device is detected via telemetry; DNA Center applies a policy to isolate the endpoint based on SGT via programmable enforcement.
Network assurance depends heavily on accurate and meaningful logs. Two features are vital here:
Filters messages based on criteria like severity, facility, or message text.
Useful in high-traffic environments to reduce log noise.
logging discriminator CRIT level 0-3
logging buffered discriminator CRIT 4096
Logs must be timestamped consistently across devices.
Use NTP (Network Time Protocol) to synchronize all device clocks.
ntp server 10.1.1.1
A highly testable feature in ENCOR involves using IP SLA + Object Tracking + Static Route for automatic failover.
ip sla 1
icmp-echo 8.8.8.8
frequency 10
ip sla schedule 1 life forever start-time now
track 1 ip sla 1 reachability
ip route 0.0.0.0 0.0.0.0 192.168.1.1 track 1
If the IP SLA target becomes unreachable, the tracked route is removed.
Common for Internet failover or backup link automation.
Path Trace is a powerful feature in Cisco DNA Center Assurance that helps visualize end-to-end traffic flows across the network.
Uses application telemetry, device flow mapping, and identity data.
Visualizes:
Source and destination nodes
Intermediate devices (switches, routers)
Applied QoS, ACLs, SGTs
VLAN or VXLAN segmentation info
Troubleshoot why a user's video call is failing — Path Trace shows that an intermediate switch has an ACL blocking the traffic.
What is the purpose of IP SLA in network monitoring?
IP SLA measures network performance metrics such as latency, jitter, and packet loss.
IP Service Level Agreements (IP SLA) allow network devices to generate synthetic traffic to test connectivity and performance between devices. These probes measure response time, availability, and quality metrics across the network. Administrators often use IP SLA with tracking features to trigger failover actions when performance thresholds are exceeded. For example, if latency on a primary path increases beyond a defined limit, the router can automatically switch to a backup route. This proactive monitoring helps maintain service availability and detect degradation before users are affected.
Demand Score: 59
Exam Relevance Score: 83
What is the main difference between SPAN and RSPAN?
SPAN mirrors traffic within the same switch, while RSPAN allows mirrored traffic to be sent across multiple switches.
Switch Port Analyzer (SPAN) copies traffic from one or more source ports to a monitoring port on the same switch. Remote SPAN (RSPAN) extends this capability across the network by sending mirrored traffic through a special VLAN to another switch where the monitoring device resides. RSPAN is useful when the analyzer cannot be directly connected to the source switch. Engineers must ensure the RSPAN VLAN is properly configured across trunk links; otherwise mirrored traffic will not reach the destination analyzer.
Demand Score: 58
Exam Relevance Score: 80
What is the primary purpose of Flexible NetFlow in enterprise networks?
Flexible NetFlow collects and analyzes network traffic flow information for monitoring and troubleshooting.
Flexible NetFlow allows administrators to define custom flow records that capture specific packet attributes such as source IP, destination IP, ports, and protocol information. This data is exported to collectors where it can be analyzed for traffic patterns, performance monitoring, or security analysis. Compared to traditional NetFlow, Flexible NetFlow provides greater flexibility in defining which fields are monitored and exported. Engineers commonly use it to detect abnormal traffic patterns or identify bandwidth-intensive applications in enterprise environments.
Demand Score: 60
Exam Relevance Score: 82