Troubleshoot Basic Network Issues in Oracle Cloud Infrastructure

Introduction

In Oracle Cloud Infrastructure (OCI), diagnosing network connectivity issues requires visibility into the configuration and flow of traffic across multiple components. OCI Network Command Center tools such as Network Visualizer, Network Path Analyzer, and VCN Flow Logs provide deep insights into the layout, routing, and flow behavior of network resources. These tools enable rapid identification of misconfigurations, missing routes, and communication failures across virtual cloud networks (VCNs), subnets, and gateways in an OCI network environment.

In this tutorial, we will focus on fundamental troubleshooting techniques for common connectivity issues. While it demonstrates how to effectively use these tools to simplify troubleshooting and resolve issues efficiently, the goal is also to develop a broader understanding of how to approach and analyze connectivity challenges, not just how to use the tools themselves.

image

Objectives

Prerequisites

Task 1: View Your Network Setup with Network Visualizer

Before you start digging into what is broken, it helps to take a step back and get a clear view of your network environment. The Network Visualizer in OCI offers a graphical representation of your VCN topology. While it does not directly troubleshoot issues, it provides a clear, consolidated view of your entire network architecture in a specific compartment you choose.

This visual context shows how everything is connected (VCNs, subnets, gateways, route tables, security lists) all in one place. This makes it easier to spot anything that looks off, like a missing route, or a VCN that is not associated to a Dynamic Routing Gateway (DRG). In complex setups, it can save you a lot of guesswork. It is not always a fix, but it is a solid first step that can point you in the right direction before you get into the details.

For this tutorial, we have summarized how the Network Visualizer works in the following diagram. For more information, see Network Visualizer.

image

Example

We will use the following architecture as our example.

image

In this sample case, two issues came up in the environment. We will see how the Network Visualizer helps to identify and resolve them.

Let us take a quick tour of our network environment using Network Visualizer in the OCI Console, which should reflect the architecture.

First Level: Regional Network Topology

This topology includes DRGs, VCNs, CPEs, and various types of gateways.

image

image

  1. Click VCN-2.

  2. Now let us dig deeper into the VCN topology, starting with the routing map.

image

Second Level: VCN Topology

This topology includes subnets, VLANs, and gateways to other resources. In addition to the security rules that the subnet uses (security list or NSG).

  1. We are in the VCN Routing map view.
  2. VCN-2 consists of one private subnet.
  3. We can see a rule in the subnet’s route table that sends traffic destined to VCN-1 to the DRG as the next hop.

image

  1. Switch to the VCN Security map view.
  2. We can also see in this view that VCN-2 consists of one private subnet.
  3. Also, security lists and Network Security Groups (NSGs) that are attached to the private subnet are visible in this mode.

image

  1. Click the private subnet.
  2. Now let us dig deeper into the subnet topology, starting with the inventory map.

image

Third Level: Subnet Topology

This topology shows the resource information about OCI Compute instances, OCI Load Balancer(s), OCI File Storage Service, and OCI Kubernetes Engine (OKE) clusters in the subnet, and the security rules that the resource uses.

  1. We are in the subnet Inventory map view.
  2. We only have one compute instance in this subnet (VM-2), click on it.
  3. You can see some information about the VM like the compartment, IPs, and more.

image

  1. Switch to the subnet Security map view.
  2. We only have one compute instance in this subnet (VM-2).
  3. We see which security lists and NSGs that VM-2 is using.

image

Summary:

We have explored how our network environment looks like and the components involved, what do you think are the root causes of the issue we mentioned earlier?

Task 2: Validate Network Configuration

After getting a clear view of your network environment and what components you have, the next essential step is to validate the actual configuration in place. Many connectivity issues come down to something simple; a missing route, overly strict security rules, or a subnet that is simply linked to the wrong route table or security list.

Before jumping into deeper troubleshooting like checking logs or running packet captures, it is important to ensure everything is configured as expected. This step can often reveal the root cause early and help you avoid unnecessary investigation later on.

Example

We will use the following architecture as our example.

image

To begin with, let us outline the core routing and security components that play a central role in validating the configuration:

  1. Routing Rules:

    • On-premises:

      • RT-0: Routing of the on-premises Customer Premises Equipment (CPE) device (or multicloud), in case of FastConnect or IPSec connection (refer to the vendor: Cisco, Fortinet, and so on).
    • OCI VCN Route Tables: Exist in the VCN and used to send traffic out of the VCN (for example, to the internet, to an on-premises network, or to a peered VCN). These route tables have rules that look and act similar to traditional network route rules you might already be familiar with.

      • RT-1-2-3: VCN routing tables that are assigned to the subnet level, in order to route outgoing traffic.
      • RT-2a: VCN routing tables that are assigned to the DRG VCN-2 attachment, which is needed for transit routing scenarios, in this example, it is used as an Ingress Route Table to route traffic coming from DRG through the firewall for inspection.
      • RT-2b: VCN routing table that is attached to NAT gateway, in this example it is used as an Ingress Route Table to route response traffic coming back from the Internet to the firewall for inspection.
    • OCI DRG Route Tables: Exist in the DRG and used to route packets entering the DRG through the attachment.

      • RT-10-20-30: DRG routing tables for VCN attachments, to route traffic coming from the VCN.
      • RT-40-50: DRG routing tables for RPC attachments, to route traffic coming from the other region.
      • RT-60: DRG RT for IPSec attachment, to route traffic coming from on-premises or a multicloud network.
  2. Security Rules:

    • On-premises:

      • FW-0: Control and restrict the traffic flow to and from OCI on the on-premises CPE device (or multicloud), in case of FastConnect or IPSec connection (refer to the vendor: Cisco, Fortinet, and so on).
    • OCI VCN Security Lists: Act as virtual firewalls for VCN-based resources, with ingress and egress rules that specify the types of traffic allowed in and out. Security lists are configured at the subnet level, which means that all VNICs in a subnet are subject to the same set of security lists.

      • SL-1-2-3: Security lists that are assigned to the subnet level, in order to control ingress and egress traffic on each subnet.

    Note: NSGs are another type of virtual firewalls available in OCI. They function similarly to security lists but offer more granular control, as they are applied at the resource level. This is useful when two resources in the same subnet require different security postures. However, NSGs are not used in this tutorial. For more information, see Comparison of Security Lists and Network Security Groups.

    • OCI Network Firewall or a Third-Party Firewall: Acts as a centralized, stateful inspection point for traffic between subnets, VCNs, and external networks, enforcing advanced security policies beyond basic security list rules.

      • FW-2: Controls and inspects all North-South and East-West traffic in an OCI network environment.

We understand how routing and security are applied across the environment, let us take a closer look at the following sample case, where four issues have come up. By applying some common sense, we will figure out which configurations to check, and where, for each troubleshooting scenario.

Note:

It is crucial to understand how traffic is managed and controlled throughout the network. By tracking the path traffic should take, you can quickly identify where problems might occur and which settings need to be reviewed when troubleshooting.

Task 3: Utilize Network Path Analyzer

You reviewed the overall network setup, manually checked the configuration of routing and security rules. However, the issue persists, maybe you overlooked some configuration detail, so what is the next step?

This is where Network Path Analyzer comes in. Think of it as your virtual network detective, designed to inspect your OCI network routing and security configuration in real-time. It collects and analyzes them to determine how the paths between the source and the destination will function or fail. No actual traffic is sent, instead, the configuration is examined and used to confirm reachability.

Instead of performing manual connectivity tests like ping or telnet from individual VMs or databases, Network Path Analyzer lets you verify the configuration of communication paths directly within the OCI Console, offering a more efficient and centralized troubleshooting approach.

Network Path Analyzer supports the following scenarios:

Example 1

We will use the following architecture as our example.

image

We encountered a network issue and we will use Network Path Analyzer to trace and address the root cause.

Issue: VM-1 cannot access a website hosted on VM-2 (OCI to OCI).

Example 2

We will use the following architecture as our example.

image

We encountered a network issue and we will use Network Path Analyzer to trace and address the root cause.

Issue: VM-2 cannot install telnet package (OCI to Internet).

Note: Telnet is a network protocol and a command-line tool used to remotely access and manage devices over a network. It is used for basic network testing as well (for example, checking if a port is open).

Task 4: Analyze VCN Flow Logs

VCN Flow Logs offer an additional layer of visibility into traffic behavior. This service allows you to drill-down into the actual traffic hitting each VNIC, indicating whether it was accepted or rejected based on security list and NSG rules, helping you troubleshoot security-related issues.

Beyond troubleshooting, VCN Flow Logs are crucial for monitoring network activity, capturing source/destination IPs, ports, protocols, and timestamps, providing the detailed telemetry needed for audits and security investigations as well.

Example

We will use the following architecture as our example.

image

Note: In this example, we focus only on logging at point Y, where the destination is located. However, you can apply the same steps to enable and analyze logs at point X (the source of the traffic) to gain additional visibility into the overall traffic flow.

We encountered a network issue and we will use VCN Flow Logs to trace and address the root cause.

Issue: VM-1 cannot access a website hosted on VM-2.

Next Steps

We explored how to troubleshoot fundamental networking issues in OCI by examining architecture, routing, and security configurations. These core checks help resolve most common connectivity problems. The next tutorial will focus on advanced scenarios and more real-world use cases.

Acknowledgments

More Learning Resources

Explore other labs on docs.oracle.com/learn or access more free learning content on the Oracle Learning YouTube channel. Additionally, visit education.oracle.com/learning-explorer to become an Oracle Learning Explorer.

For product documentation, visit Oracle Help Center.