Exam Objectives Layer 1 physical layer: - - Where transmission of bytes occurs across the network Devices o Cable o Ethernet o Coaxial o Hubs o Access points The physical layer decides the topology of the network Layer 2 data link layer: - Packages Data into frames and transmits those frames on the network Mac Address’s and ethernet reside on this layer LLC resides on this layer, LLC provides connection services and allows acknowledgment of receipt of messages. Layer 3 the network layer - Forwards and routes traffic using logical addressing The network layer is sometimes also called the routing layer. A device found at layer 3 or the network layer would be a router Forwards packets based on IP address Layer 4 the transport layer - The transport layer is the dividing line between what we call the upper layers of the OSI model and the lower layers of the OSI model When we talk about segments and datagrams we are talking about the transport layer Two protocols in the transport layer are TCP and UDP Layer 5 the session layer - The session layer keeps conversation separate to prevent intermingling of data Layer 6 the presentation layer - The presentation layer formats the data to be exchanged and secures the data with proper encryption Layer 7 – application layer - This layer provides application-level services where users communicate with the computer Examples FTP, Email, Browsers, etc Data Encapsulation - - - Ethernet header o Each Ethernet frame starts with an Ethernet header, which contains destination and source MAC addresses as its first two fields. The middle section of the frame is payload data including any headers for other protocols (for example, Internet Protocol) carried in the frame. Internet Protocol IP Header o An IP header is header information at the beginning of an Internet Protocol (IP) packet. An IP packet is the smallest message entity exchanged via the Internet Protocol across an IP network. IP packets consist of a header for addressing and routing, and a payload for user data. The header contains information about IP version, source IP address, destination IP address, time-to-live, etc. Transmission Control Protocol TCP o Connection oriented protocol User datagram Protocol or PDU o Connection less protocol TCP flags Payload o The actual data in the frame Network Topologies Mesh - A mesh topology is a network setup where each computer and network device are interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks. Star/hub-and-spoke - A star network is a local area network (LAN) topology in which all nodes -personal computers (PCs), workstations or other devices -- are directly connected to a common central computer that is often referred to as a hub. Therefore, a star network is often referred to as a hub-andspoke network topology. Bus - Bus topology, also known as line topology, is a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable. The single cable, where all data is transmitted between devices, is referred to as the bus, backbone, or trunk. Ring - A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node – a ring. Data travels from node to node, with each node along the way handling every packet. Hybrid Network types and characteristics - Peer-to-peer o Peers share resources files printers and everything else directly with each other o Administration and back up is difficult - - - - - - - o Benefits low cost, no dedicated resources o This is inefficient for larger networks Client – server o Uses a dedicated server to provide access to files, scanners, printers and other resources o Administration and back up are easy under this model o Disadvantages – higher cost – specialized OS – requires dedicated resources LAN o Connects computers within a limited distance o Like a small office space MAN o Connects scattered locations across a city or metro area WAN o Connects geographically disparate internal networks and consists of lease lines or VPN’s o The internet is the largest WAN available WLAN o A wireless LAN is a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building. PAN o Around a person CAN o Campus area network connects buildings in a business park or university SAN storage area network o Specialized LAN that transfers data at the block level with a special protocol Software defined wide area network SDWAN o Uses a centralized control function to steer traffic securely and intelligently across the WAN and directly to trusted SaaS and IaaS providers Multiprotocol Label Switching MPLS o Allows traffic to be dynamically routed based on load conditions and path availability o This is primarily used by service providers on the backbone of there networks Multipoint generic routing encapsulation mGRE o Enables one node to communicate with many other nodes o Essentially creating a point-to-multipoint link o MGRE is usually combined with DMVPN o MGRE is used to create tunnels from one node to multiple nodes. Service related entry point Demarcation point - Where the internet service provider connection ends and our networks begin From the demarcation point we run a cable to our border gateway or our router Smart Jack - Provides information on the network status Virtual network Concepts -VSwitch - a virtual switch or vswitch enables one virtual machine or VM to communicate with another. Virtual switches are also used to establish connections between virtual and physical networks and to carry a VM’s traffic to other VM’s or a physical network. - Virtual network interface card vNIC - A virtual network interface card (vNIC) represents the configuration of a VM connected to a network. A VM can be configured to have multiple vNICs. - NVF network function virtualization NFV Network functions virtualization is a network architecture concept that leverages the IT virtualization technologies to virtualize entire classes of network node functions into building blocks that may connect, or chain together, to create and deliver communication services. - Hypervisor A hypervisor, also known as a virtual machine monitor or VMM, is software that creates and runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing. Provider links - - - - - Satellite o Communication to a satellite o Useful for remote sites o This connection can have high latency Digital subscriber line DSL o Copper coaxial connection usually o DSL uses telephone lines to provide connectivity o Download speed is faster than upload speed Cable o Copper or coaxial connection usually o Cable broadband Leased Line o A leased line, also known as a dedicated line, connects two locations for private voice and/or data telecommunication service. A leased line is not a dedicated cable; it is a reserved circuit between two points. The leased line is always active and available for a fixed monthly fee. o Leased lines can span short or long distances. They always maintain a single open circuit, as opposed to traditional telephone services that reuse the same lines for many different conversations through a process called switching. Metro-optical o If you’re part of a company that has many different locations in a single city, you can usually connect those together at higher speeds using Metro Ethernet, or Metro-E. This is a type of connectivity that’s usually within a very small geographic area, but it does allow you to connect those locations using very high-speed networks. Another nice part about metro Ethernet is that it is Ethernet. At both sides of the connection, the provider simply hands you off an Ethernet connection that you can plug into a normal Ethernet switch Summarize the types of cable and connectors and explain what the appropriate type for a solution is Copper - - - - - - - twisted pair o two wires with equal and opposite signals o transmit+ and transmit- or receive+ and receive – o the twist is the secret its always moving away from noise and interference this way cat 5 o fast ethernet o 100base-TX o 100mpbs o 100 meters cat 5e o gigabit ethernet o 1000base-t o 1000 mbps o 100 meters cat 6 o using cat6 at 100 meters will limit the speed from 10GBPS to 1GBPS cat 6a o 10Gbase-T o 10 GBPS o 100 meters cat 7 o 10GBase-t o 10 gbps o 100 meters Coaxial RG-6 o This is used in television/digital cable o And high speed internet over cable /cable modem connections Twinaxial o Have two inner conductors o This cable is common on 10 gigabit ethernet SFP+ cables o Twinaxial cables are used for very short range high speed connections between devices - Full duplex Five meters limited distance Low cost Low latency compared to twisted pair Termination standards o o o o The standard itself mentions times when you may want to use T568A colors and T568B colors. So it’s important that you punch down or use the same standard on both ends of the cable. You don’t want to use T568A on one side and 568B on the other. That creates a lot of confusion. And you may find that the cable is not working as expected. TIA/EIA-568A TIA/EIA-568B Many orgs traditionally use 568B Fiber - - single mode o single mode fiber is used for longer distances o maximum distance is 40 kilometers o is more expensive then multimode multimode o this deals with shorter distances o distances can reach in the 200-to-500-meter range Connector types - - local connector LC o sometimes called a love connector o two connections on the end o two ends a transmit and receive straight tip ST (fiber) o used for fiber o twist on connector o stick and twist - - - - - - - subscribers connect SC (fiber) o used for fiber o snap in kind of connection o stick and click mechanical transfer MT o fiber connector o very small openings registered jack RJ o a registered jack is a standardized telecommunication network interface for connecting voice and data equipment to a service provided by local exchange carrier or long distance carrier Angled physical contact APC o The crossings and cable connectors are green o Fiber connection o Light is reflected at an angle o SC connectors use APC more Ultra-physical contact UPC o The crossings and cable connectors are blue o Fiber connection o No angling o MTRJ uses UPC more RJ11 o Connector type used for voice application RJ45 o Connector type used for ethernet F-type connector o Twist on connector o Coaxial R connector commonly used for cable television, and cable modems Transceiver type o Small form factor pluggable SFP Commonly used to provide 1 Gbit fiber o Enhanced form factor pluggable SFP+ The same size as SPF Supports data rates up to 16 Gbit/s Common with 10 gigabit ethernet o Quad small form factor pluggable QSPF 4 channel SFP four 1 gbit connections o Enhanced quad small form factor pluggable QSFP Is a four channel SFP + four 10Gbit/sec Cable management - Patch panel patch bay o - a patch panel in a LAN is a mounted hardware assembly that contains ports that are used to connect and manage incoming and outgoing LAN cables Fiber distribution panel o Used for managing and organizing fiber optic cables within an enterprise network Punch down block o 66 Type of punch down block used to connect sets of wires in a telephone system Pretty much retired o 110 Network punch down block standard for today’s networks smaller and provide a broader frequency bandwidth o Krone Punch down tool o Bix Punch down tool Ethernet standards - - Copper o 10base-t Supports 10 megabits per second Maximum length 100 meters o 100base-tx Uses category 5 UTP cable 100 mbps speed o 1000base-t 100 meters Category 5 enhanced o 10gbase-t Category 6 Unshielded: 55 meters Shielded 100 meters o 40gbase-t Category 8 Shielded only 30 meters Fiber o 100base-fX Fast ethernet over optic fiber cables 100 mbps o 100base-sx 300 meters max length 100 mbps o o o o o o o o 1000base-sx Multimode fiber 500 meters 1000 mbps 1000base-lx Single mode fiber Maximum distance of 100 meters 10Gbase-sr 10gbase-lr Wavelength division multiplexing Combines multiple signals into one signal and sends over a single fiber optic strand using different wavelengths of the laser light source Coarse wavelength division multiplexing (CWDM) Up to 18 channels Up to 10 GBPS with ethernet UP to 16 GBPS with fiber Used to connect switches and routers over longer distances then you could with a copper cable Dense wavelength division multiplexing (DWDM) Up to 80 channels Up to 8 TBPS Used in major internet service providers Bidirectional wavelength division multiplexing (WDM) Combines multiple signals into one signal and sends over a single fiber optic strand using different wavelengths of the laser light source Given a scenario, configure a subnet and use appropriate IP addressing schemes Public vs Private - - - RFC1918 o In Internet networking, a private network is a computer network that uses a private address space of IP addresses. These addresses are commonly used for local area networks in residential, office, and enterprise environments. Both the IPv4 and the IPv6 specifications define private IP address ranges. NAT o NAT stands for network address translation. It's a way to map multiple local private addresses to a public one before transferring the information. Organizations that want multiple devices to employ a single IP address use NAT, as do most home routers. PAT o NAT translates the inside local addresses into inside global addresses; similarly, PAT translates the private unregistered IP addresses into public registered IP addresses. However, unlike NAT, PAT also uses source port numbers, allowing multiple hosts to share a single IP address while using different port numbers IPv4 vs IPv6 - Automatic private IP Addressing APIPA o A link local address o o o - - - - - - - - Can only communicate to other local devices No forwarding by routers If you are assigned an APIPA address you are not allowed to communicate out to the internet o Routers are not able to forward these IP address's o APIPA address range is 169.254.0.1 - 169.254.255.254 Extended unique identifier (EUI-64) o EUI-64 (Extended Unique Identifier) is a method we can use to automatically configure IPv6 host addresses. An IPv6 device will use the MAC address of its interface to generate a unique 64-bit interface ID. Multicast o Multicast networking is based on the simple concept that a single packet can be sent by a server and it will be received by many receivers. Multicast is different from broadcast because it's more selective. Unicast o In computer networking, unicast is a one-to-one transmission from one point in the network to another point; that is, one sender and one receiver, each identified by a network address. Unicast is in contrast to multicast and broadcast which are one-tomany transmissions. Anycast o An anycast network is two or more servers advertising the same IP address from different locations. Why would we want to do this? Serving traffic from a single location often lacks the redundancy required for critical or latency-sensitive applications that serve users around the world. Broadcast o In computer networking, broadcast traffic is a type of data sent to all computers and devices on a network or subnetwork. It is used in situations where all possible network destinations need to be reached or when the address of a specific computer is unknown. Link local o In computer networking, a link-local address is a network address that is valid only for communications within the subnetwork that the host is connected to. Loopback o The IP address 127.0. 0.1 is called a loopback address. Packets sent to this address never reach the network but are looped through the network interface card only. This can be used for diagnostic purposes to verify that the internal path through the TCP/IP protocols is working. Default gateway o In the networking world, a default gateway is an IP address that traffic gets sent to when it's bound for a destination outside the current network. On most home and small o o o business networks—where you have a single router and several connected devices—the router's private IP address is the default gateway. 192.168.1.1 The router that allows you to communicate outside of your local subnet The default gateway must be an IP address on the local subnet IPv4 Subnetting - - Classless (variable length subnet mask) Classful o A o B o C o D o E Classless inter-Domain Routing notation IPv6 concepts - Tunneling Dual stack Shorthand notation Router advertisement Stateless address configuration SLAAC Virtual IP VIP Sub interfaces Explain common ports, and protocols their application and encrypted alternatives File transfer protocol FTP Ports 20,21 Provides insecure file transfers Secure shell SSH Port 22 Provides secure remote control of another machine using a text based environment Secure file Transfer Protocol Port 22 SFTP Provides secure file transfers. Tunneling file transfers through SSH Telnet Port 23 Provides insecure remote control of another machine. Remote access via the command prompt Simple Mail Transfer protocol SMTP Port 25 Provides the ability to send emails over the network Domain Name Service DNS Port 53 Dynamic Host Control Protocol Converts domain names to IP addresses and IP addresses to domain names Ports 67,68 Automatically provides network parameters to your clients, such as their assigned IP address, subnet mask, default gateway, and the DNS server they should use Trivial file transfer protocol Port 69 TFTP Used as a lightweight file transfer method for sending configuration files or network booting of an operating system. Usually used for sending or receiving config files from a router or switch Hyper Text Transfer Protocol Used for insecure web browsing Port 80 Post office protocol version Port 110 3 POP3 Used for receiving incoming emails Network Time Protocol NTP Port 123 Used to keep accurate time for clients on the network Network basic input/output Port 139 system NetBIOS Used for file or printer sharing in a windows network Internet Mail application Protocol IMAP Port 143 A newer method of retrieving incoming emails which improves upon the older POP3 / operates over TCP/IP SNMP simple network management protocol Ports 161,162 Used to collect data about network devices and monitor their status LDAP lightweight directory access protocol LDAP Ports 389 Used to provide directory services to your network Hypertext transfer protocol Port 443 secure HTTPS Used for secure web browsing Server message block SMB Port 445 Used for Windows file and printer sharing services System logging protocol syslog Port 514 Used to send logging data back to a centralized server Simple mail transfer protocol transport layer security SMTP TLS Port 587 Secure and encrypted way to send emails Lightweight directory access Port 636 protocol secure Provides secure directory services Internet Message Access Protocol over SSL Port 993 Secure and encrypted way to receive emails POP3 over SSL Port 995 Secure and encrypted way to receive emails Structured query language server protocol SQL Port 1433 Used for communication from a client to the database engine Sqlnet protocol Port 1521 Used for communication from a client to an oracle database MySQL Port 3306 Used for communication from a client to MySQL database engine Remote desktop protocol RDP Port 3389 Provides graphical remote control from another client to a server Session initiation protocol SIP Ports Used to initiate Voip and video calls 5060,5061 IP protocol types - - - - - - ICMP o The Internet Control Message Protocol (ICMP) is a network layer protocol used by network devices to diagnose network communication issues. ICMP is mainly used to determine whether or not data is reaching its intended destination in a timely manner. TCP o o UDP o Connection oriented protocol that uses a three-way handshake Transport layer protocol User Datagram Protocol (UDP) is a communications protocol that is primarily used to establish low-latency and loss-tolerating connections between applications on the internet. UDP speeds up transmissions by enabling the transfer of data before an agreement is provided by the receiving party. o UDP is very good for audio and visual streaming Generic routing encapsulation GRE o Used as a simple and effective way to create a tunnel called a GRE tunnel over a public network o GRE tunnels do not provide us with any encryption o Multicast traffic forwarding – GRE tunnels can be used to forward multicast traffic, whereas a VPN cannot. Because of this, multicast traffic such as advertisements sent by routing protocols can be easily transferred between remote sites when using a GRE tunnel. Internet protocol security IPSEC o Used to protect one or more data flows between peers, uses encryption o Implementing IPSEC gives you the following security controls Data confidentiality Data integrity Origin authentication Anti replay o IP sec uses two protocols to achieve encryption AH and ESP Authentication header AH o A protocol within IPSec that provides integrity and authentication Encapsulating security payload ESP o Provides encryption and integrity for the data packets sent over IPsec Connection less vs connection oriented o TCP is connection less UDP is not Explain the use and purpose of network services DHCP - - - - - - Scope o A list of valid IP addresses available for assignment or lease to a client computer or endpoint device on any given subnet Exclusion ranges o An exclusion is an address or range of addresses taken from a DHCP scope that the DHCP server is not allowed to hand out. Reservations o A reservation is a specific IP addresses that is tied to a certain device through its MAC address. For example, if we have a workstation on the network that requires a certain IP address, but we don’t want to go through to trouble of assigning it statically, then we can create a reservation for it. Dynamic assignment o Automatically assigned by DHCP from a list of scope IP addresses Static assignment o When the DHCP assignment is configured by an admin Lease time o How long the IP lease lasts Scope options o Subnet mask o IP o Default router default gateway o DNS server o Lease time Available leases o The leases that are available when a client joins the network DHCP relay o DHCP relay is used when the client device and the DHCP server are not located on the same subnet or network IP helper / udp forwarding o User Datagram Protocol (UDP) forwarding is a feature used in Cisco IOS software to forward broadcast and multicast packets received for a specific IP address. DNS - record types Address A vs AAAA - - - - - - - o A – links a hostname to an IPV4 address o AAAA – links a hostname to an IPV6 address Canonical name CNAME o Points a domain name to another domain or subdomain Mail exchange MX o Directs email to a mail server Start of authority (SOA) o Stores important information about a domain or zone Pointer (PTR) o Corelates an IP address with a domain name, these are essentially the opposite of A records Text (TXT) o Adds text into the DNS Service (SRV) o Specifies a host and port for a specific server Name server (NS) o Type of DNS server that stores all the DNS records for a given name. Global hierarchy o Root Answers requests in the root zone o Top-level domain .com .net o Second-level domain Diontraining.com google.com o Subdomain Support.diontraining.com o Host Refers to a specific machine Root DNS servers o A root name server is a name server for the root zone of the Domain Name System of the Internet. It directly answers requests for records in the root zone and answers other requests by returning a list of the authoritative name servers for the appropriate toplevel domain. Internal vs. external o Internal DNS – Allows cloud instances on the same network to access each other using internal DNS names o External – records created around a domain name from a central authority and used on the public internet Zone transfers o Sends DNS records data from the primary nameserver to a secondary nameserver o Uses the TCP protocol to do this Authoritative name servers o The authoritative nameserver contains information specific to the domain name it serves Time to live (TTL) - - - o How long the record is stored in the DNS server DNS caching o DNS cache refers to the temporary storage of info about previous DNS lookups on a machine OS or web browser Reverse DNS/reverse lookup/forward lookup o Reverse DNS lookup – A DNS query for the domain name associated with a given IP address o Forward DNS lookup – using an internet domain name to find an IP address Recursive lookup/iterative lookup o Recursive DNS lookup – where one DNS server communicates with several other DNS servers to hunt down an IP address and return it to the client NTP - Stratum o The NTP stratum is a representation of the hierarchy of time servers in an NTP network Clients o Computers, workstations Servers o Server that keeps the time stored on it Explain basic corporate and datacenter network architecture Three-tiered - - - Core o Big fast expensive routers are in the core of the network o The core is the backbone of the network Distribution aggregation layer o This layer provides boundary definition by implementing ACL’s and policies o Layer three switches are usually at this layer o This layer makes sure the packet are being properly routed Access / edge o This layer connects endpoint devices o There are regular switches at this layer Spine and leaf - - Software defined network o Enables the network to be intelligently and centrally controlled or programmed using software applications Top-of-rack switching o The switches are located at the top of the rack Back bone Traffic flows - North-South o North – traffic exiting the datacenter - o South – traffic that is coming into the datacenter East-West o Refers to traffic flow within a datacenter - Branch office vs on premises datacenter vs colocation Storage area networks - - - Connection types Fiber channel over ethernet o Computer networking technology that encapsulates fiber channel frames over ethernet networks. This allows fiber channel to use 10 gigabit ethernet networks while preserving the fiber channel protocol Fiber channel o High speed data transfer protocol providing in order lossless delivery of raw block data o Primarily used to connect computer data storage to servers in storage area networks o Connects storage to servers Internet small computer systems interface ISCSI Summarize cloud concepts and connectivity options Deployment models - - - Public o Systems and users interact with devices on public networks such as the internet and other clouds o Examples are GCP, AWS, Azure Private o Systems and users only have access with other devices inside the same private cloud or system Hybrid o Mixture of both private and public clouds Community o collaborative effort where infrastructure is shared between several organizations from a specific community with community concerns Server models - Software as a service o Users interact with a web based application and the details of how it works are hidden - - - o Google docs is a good example Infrastructure as a service o Allows for the outsourcing of infrastructure of the servers and desktops to a service provider Platform as a service o Provides a platform for companies that develop applications without the need for infrastructure o Digital ocean is an example of this Desktop as a service o Provides a desktop environment that is accessible through the internet in the form of a cloud desktop or virtual desktop environment Infrastructure as code - Automation/Orchestration o Orchestration is cloud-based automation o Orchestration is the process of arranging or coordinating the installation and configuration of multiple systems Connectivity options - - - - - Virtual private network o Establishes a secure connection between on premises network, remote offices, client devices, and the providers global network Private direct connection to cloud provider o extends pre-existing on premise data center into the providers network to directly connect to your virtual private cloud network Multitenancy o Allowing customers to share computing resources in a public or private cloud Elasticity o Attempts to match the resource allocated with the actual amount of resource needed at any given point in time / elasticity is focused on meeting the sudden increase and decreases in the workload Scalability o Handles the growing workload required to maintain good performance and efficiency for a given software or application Security implications o Multitenancy might cause your data to be hosted on the same physical server as other orgs data Compare and contrast various devices, their features, and their appropriate placement on the network Networking devices - - - - - - - Layer 2 switch o Forwards traffic based on MAC address o Switches have many ports and a lot more features in today’s network Layer 3 capable switch o These can-do layer 2 switching and layer 3 routing Router o Routes traffic between IP subnets o OSI layer 3 devices because it makes routing decisions based on IP o Routers are often used to connect diverse network types such as LAN, WAN, copper, fiber Hub o Layer 1 device – resides on the physical layer of the OSI model o Hub is half duplex Access point o This is not to be confused with a wireless router, a wireless router is a router and an access point in a single device o An access point is a bridge, this means it extends the wired network onto the wireless network o OSI layer 2 devices Bridge o This was the precursor to a switch – imagine a switch with two to four ports o Can connect different topologies o OSI layer 2 device distributes traffic based on MAC addresses Wireless Lan controller o Network component that manages wireless network access points and allows wireless devices to connect to the network o It offers central control over network elements o Centralized management of access points Load balancer o A network load balancer distributes network traffic across multiple WAN links, virtual machines, or server to avoid overloading any single host without using complex routing protocols o Useful for SSL offload o Caching - - - - - - - - o Can provide QOS and prioritization Proxy server o A device that sits in the middle of the communication and make the request for us o Useful features include, access control, caching, URL filtering, content scanning Cable modem o Cable modems use DOCSIS data over cable service interface specification o Cable modems can support data, voice and video connections DSL modem o DSL modem uses telephone lines o Download speed is faster them upload speed Repeater o If you need to expand the network signal beyond the standard range you can use a repeater o Repeaters receive the signal, regenerate the signal, and resends the signal o Commonly used to boost the signal over a fiber or copper connection o Can also convert media o Layer 1 device Voice gateway o The voice gateway is used to connect the enterprise VOIP network with the telecommunications provider Media converter o Converts media so if you needed fiber to convert to copper you would use this device Intrusion prevention system o Monitors network traffic and responds to security events Intrusion detection device o Monitors network traffic without blocking or stopping anything o Passive Firewall o Can be software or hardware based and be virtual or physical devices o Uses a set of rules defining the types of traffic permitted or denied through the device VPN headend o This device is purpose built to provide VPN services Networked devices - - Voice over internet protocol o Turns our voice traffic into regular network traffic o Essentially each phone is a network device o VOIP phone usually use POE Printer Physical access control devices Cameras Heating ventilation and air condition Internet of things IOT Industrial control systems SCADA Compare and contrast routing technologies and bandwidth management concepts Routing - - - - - - - Dynamic Routing – essentially listens for subnet information from other routers o Routing internet protocol RIP Distance vector protocol Updates every 30 seconds RIP is very easy to configure Runs over UDP o Open Shortest Path first OSPF Link state routing protocol Large, scalable routing protocol o Enhanced interior gateway routing protocol EIGRP Distance vector protocol Cisco Hybrid of distance vector and link state protocols that uses bandwidth and delay o Border gateway protocol BGP Hybrid routing protocol Determines routes based on paths, network policies, or configured rule sets Link state o Link state routing protocols will take speed into account o Used in larger networks Distance vector o Routing protocols that determine the best route based on how far another router is away. The deciding vector is distance. o How many hops away is another network o Relatively little configuration o Good for smaller networks Hybrid o This is essentially a little link state and a little distance vector routing protocol Static routing o This is when an Admin configures the router and tells the router where the next destination should be Default route o A default route is a last resort route o A route when no other route matches Administrative distance o The administrative distance value is assigned by the router on a per protocol basis. o The value is used in router to rank routes from most preferred (low AD value) to least preferred (high AD value) o When multiple paths to the same destination are available in its routing table the router uses the route with the lowest administrative distance. Exterior vs interior o OSPF is a interior routing protocol - o EIGRP is an interior routing protocol Time to live TTL o This helps us solve the problem of routing loops o Every time that packet hits a router the TTL decrease by 1 and when it hits the destination its 0 Bandwidth Management - Traffic shaping Quality of service QOS Given a scenario, configure and deploy common ethernet switching features - - - - Data virtual local area network VLAN o A group of devices in the same broadcast domain o You configure the switch points to be separated logically instead of physically o Logically separate your switchports into subnets o VLAN’s cant communicate with each other without a router Voice VLAN o A voice vlan is a vlan that is specifically allocated for users voice data streams Port configurations Port tagging 802.1Q o We refer to this as VLAN truncking o With trunking we can send multiple VLANS across a single trunk and then break them out into the appropriate VLAN on the other side o The process of adding and removing this from a to an 801.1q trunk is relatively straight forward we have our normal ethernet frame that we are sending across. When that hits the trunk were going to add an additional field into this frame called a VLAN header. This VLAN header will contain information about which VLAN is associated with this data. Port aggregation Link aggregation control protocol LCAP Duplex o Half duplex Devices can send and receive data but not at the same time, they either need to be sending or receiving o Full duplex devices can send and receive data at the same time o You can configure the duplex on each individual interface Speed o You will need to configure the speed 10mg 100mb 1000 mg and so on and so forth Flow control Port mirroring Port security Jumbo frames Auto medium dependent interface crossover Media access control address tables Power over ethernet POE - Power over ethernet + Spanning tree protocol STP Carrier sense with multiple access with collision detection CSMA/CD ARP Neighbor discovery protocol Given a scenario, install and configure the appropriate wireless standards and technologies 802.11 standards - A B G N wifi 4 Ac wifi 5 Ax wifi 6 Frequencies and Range - 2.4 GHz 5 GHz Channels - Regulatory impacts Channel Bonding Service Set Identifier SSID - Basic service set Extended service set Independent basic service set Ad-Hoc Roaming Antenna Types - Omni Directional Encryption standards - WiFi protected Access WPA WPA2 Personal Advanced Encryption Standard AES Temporal Key Integrity Protocol TKIP WPA/WPA2 Enterprise AES/TKIP Cellular Technologies - Code division multiple Access CDMA - - Global system for mobile communications GSM Long term evolution LTE o 3G o 4G o 5G Multiple input multiple output MIMO And multi user MIMO MU-MIMO Given a scenario, use the appropriate statistics and sensers to ensure network availability Performance metrics & sensors - Device/Chassis Temperature CPU usage Memory Bandwidth Latency Jitter SNMP - Traps Object identifiers OIDs Management information bases MIBs Network device logs - Log reviews Traffic logs Audit logs Syslog Logging levels / severity levels Interface statistics status - Link state up/down Speed / duplex Send / receive traffic Cyclic redundancy CRCs Protocol packet and byte counts Interface errors or alerts - CRC errors Giants Runts Encapsulation errors Environmental factors and sensors - Temperature Humidity Electrical Flooding Baselines Netflow data Uptime/ Downtime Explain the purpose of organizational documents and policies Plans and procedures - Change management Incident response plan Disaster response plan Business continuity plan System life cycle Standard operating procedures Hardening and security policies - Password policy Acceptable use policy Bring your own device policy Remote access policy Onboarding and offboarding policy Security policy Data loss prevention Common documentation - physical network diagram floor plan Rack diagram Intermediate distribution Frame IDF Frame MDF Logical network diagram Wiring diagram Site survey report Audit and assessment report Baseline configurations Common agreements - Non disclosure agreement NDA Service level agreement - MOU Explain high availability and disaster recovery concepts and summarize what is the best solution - load balancing multipathing network interface NIC teaming redundant hardware clusters - switches hardware firewalls Facilities and infrastructure support - UPS Power distribution unit Generator HVAC Fire Redundancy and high availability concepts - Cold site Warm site Hot site Cloud site Active active vs active passive Multiple ISPs Virtual router redundancy protocol VRRP First hop redundancy protocol Mean time to repair MTTR Mean time between failure MTBF Recovery time objective RTO Recovery point objective RPO Network device backup/restore - State Configuration Explain common security concepts Confidentiality integrity availability CIA Threats - Internal External Vulnerabilities - Common vulnerabilities CVE Zero day Exploits Lease privilege Role based access Zero trust Defense in depth - Network segmentation enforcement Screened subnet or DMZ Separation of duties Network access control Honeypot Authentication methods - Multifactor Terminal access control system plus TACACS+ Single sign on SSO Remote authentication dial in user service RADIUS LDAP Kerberos Local authentication 802.1x Extensible authentication protocol EAP Risk management - Security risk assessment Threat assessment Vulnerability assessment Penetration testing Posture assessment Business risk assessment Process assessment Vendor assessment Security information and event management SIEM Compare and contrast common types of attacks Technology based - - Denial of service DOS Distributed denial of service DDOS Botnet command and control On path attack MITM DNS poisoning VlAN hoping ARP spoofing Rogue DHCP Rogue access point Evil twin Ransomware Password attacks o Bruteforce o Dictionary MAC spoofing IP spoofing Deauthentication Malware Human and environmental - Social engineering Phising Tailgating Piggybacking Shoulder surfing Given a scenario apply network hardening techniques Best Practices - Secure SNMP Router advertisement RA guard Port security Dynamic arp inspection Control plan policing Private VLANs Disable unneeded switch ports Disable unneeded network services Change default passwords Password complexity lengths Enable DHCP snooping Change default VLAN Patch and firmware management - Access control lists Role based access Firewalls rules o Explicit deny o Implicit deny Wireless security - MAC filtering Antenna placement Power levels Wireless client isolation Guest network isolation Preshared keys PSKs EAP Geofencing Captive portal IOT access consideration Compare and contrast remote access methods and security implications - site-to-site VPN client-to-site VPN clientless VPN split tunnel vs full tunnel remote desktop connection remote desktop gateway SSH Virtual network computing VNC Virtual desktop Authentication and authorization considerations Explain the importance of physical security Detection methods - Camera Motion detection Asset tags Tamper detection Prevention methods - Employee training Access control hardware Badge readers Biometrics - Locking racks Locking cabinets Access control vestibule Smart lockers Asset disposal - Factory reset/wipe configuration Sanitize devices for disposal Explain the network troubleshooting methodology Identify the problem - Gather information Questions users Identify symptoms Determine if anything has changed Duplicate the problem if possible Approach multiple problems individually Establish the theory of probable cause - Question the obvious Consider multiple approaches Top to bottom / bottom to top OSI model Divide and conquer Test the theory to determine the cause - If the theory is confirmed determine the next steps to resolve the problem If the theory is not confirmed re-establish a new theory or escalate Establish a plan or action to resolve the problem and identify potential effects Implement the solution or escalate as necessary Verify full system functionality and if applicable implement preventative measurements Document findings actions outcomes and lessons learned Given a scenario troubleshoot common cable connectivity issues and select the appropriate tools Specification and limitations - Throughput Speed - Distance Cable considerations - Shielded and unshielded Plenum and riser-rated Cable application - Rollover cable / console cable Crossover cable Power over ethernet Common issues - Attenuation Interface Decibel DB loss Incorrect pinout Bad ports Open/short Light emitting diode LED status indicators Incorrect transceivers Duplexing issues Transmit and receive TX/RX reverse Dirty optical cables Common tools - Cable crimper Punchdown tool Tone generator Loopback adapter Optical time domain reflector OTDR Multimeter Cable testing Wire map Tap Fusion splicers Spectrum analyzers Snips/cutters Cable stripper Fiber light meter Given a scenario use the appropriate network software tools and commands Software tools - WIFI analyzer Protocol analyzer packet capture - Bandwidth speed test Port scanner Iperf Netflow analyzers TFTP server Terminal emulator IP scanner Command line tool - Ping Ipconfig / ifconfig / ip Nslookup / dig Traceroute / tracert Arp Netstat Hostname Route telnet tcpdump nmap Basic network commands - show interface show config show route Given a scenario troubleshoot common wireless connectivity issues Specification and limitations - throughput speed distance received signal strength indication RSSI effective isotropic radiated power EIRP considerations - - antennas o placement o type o polarization channel utilization AP association time Site survey Common issues - Interface Channel overlap Antenna cable attenuation RF attenuation / signal loss Wrong ssid Incorrect passphrase Encryption protocol mismatch Insufficient wireless coverage Captive portal issues Client dissociation issues Given a scenario troubleshoot general networking issues Considerations - Device configuration review Routing tables Interface status VLAN assignment Network performance baseline