Uploaded by BLACK HAT

Network-Plus-Notes README.md at main · HiroNewf Network-Plus-Notes · GitHub

advertisement
Product
HiroNewf / Network-Plus-Notes
Code
Issues
Pull requests
Solutions
Open Source
Pricing
Sign in
Search
Public
Notifications
Actions
main
Sign up
Projects
Security
Insights
Network-Plus-Notes / README.md
Go to file
HiroNewf Update README.md
Latest commit 887366f on Jun 17, 2022
1 contributor
2610 lines (2431 sloc)
122 KB
Raw
Blame
Github Pages Version
https://hironewf.github.io/Network-Plus-Notes/ I think this version is more visually pleasing but the table of contents will not work properly
when using the github pages version.
Table of contents
The table of contents will take you right to the section you click on and the links for the headers of each section will take you to the Professor
Messer video for that section. This probably isn't really going to help anyone else because it is for the 007 version of Network+ but it is here
anyways
Also there are some spelling errors that I will try and fix soon, but I can't be bothered too right now. On top of that at times you will find that I
never typed the spelled out version for a certain acronym, this is either because I already knew the spelled out version or because I didn't feel
like it was all that important to write down. Perhaps at some points I will go through this again and add all of the spelled out versions, but that
is not important to me right now.
1.0 Networking Concepts (23% of the exam)
1.1 Introduction to IP
1.1 Common Ports
1.2 Understand the OSI Model
1.3 Introduction to Ethernet
1.3 Network Switching Overview
1.3 Broadcast and Collision Domains
1.3 Unicasts, Broadcasts and Multicasts
1.3 Protocol Data Units
1.3 Network Segmentation
1.3 Spanning Tree Protocol
1.3 Switch Interface Properties
1.3 Static and Dynamic Routing
1.3 IGP and EGP
1.3 Dynamic Routing Protocols
1.3 IPv4 and IPv6 Addressing
1.3 Configuring IPv6
1.3 Prioritizing Traffic
1.3 Network Address Translation
1.3 Access Control Lists
1.3 Circuit Switching and Packet Switching
1.3 Software Defined Networking
1.4 Binary Math
1.4 IPv4 Addresses
1.4 Classful Subnetting
1.4 IPv4 Subnet Masks
1.4 IPv6 Subnet Masks
1.4 Calculating IPv4 Subnets and Hosts
1.4 Seven Second Subnetting
1.4 Assigning IPv4 Addresses
1.4 Assigning IPv6 Addresses
1.5 Network Topologies
1.5 Common Network Types
1.5 Internet Of Things Topologies
1.6 Wireless Standards
1.6 Cellular Network Standards
1.6 Wireless Network Topologies
1.7 Cloud Services and Delivery Models
1.8 An Overview of DNS
1.8 DNS Record Types
1.8 DHCP Addressing Overview
1.8 Configuring DHCP
1.8 An Overview of NTP
2.0 Infrastructure (18% of the exam)
2.1 Copper Cabling
2.1 Copper Connectors
2.1 Optical Fiber
2.1 Optical Fiber Connectors
2.1 Copper Termination Standards
2.1 Network Termination Points
2.1 Network Transceivers
2.1 Ethernet Standards
2.2 Networking Devices
2.3 Advanced Networking Devices
2.4 Virtual Networking
2.4 Network Storage
2.5 WAN Services
2.5 WAN Transmission Mediums
2.5 WAN Technolgies
2.5 WAN Termination
3.0 Network Operations (17% of the exam)
3.1 Network Documentation
3.2 Availability Concepts
3.2 Power Management
3.2 Backup and Recovery
3.3 Process Monitoring
3.3 Event Management
3.3 Performance Metrics
3.4 Remote Access
3.5 Policies and Best Practices
4.0 Network Security (20% of the exam)
4.1 Physical Security
4.2 Authorization, Authentication, and Accounting
4.2 Multi-factor Authentication
4.2 Access Control
4.3 Wireless Encryption
4.3 Wireless Authentication and Security
4.4 Denial of Service
4.4 Social Engineering
4.4 Insider Threats
4.4 Loigc Bombs
4.4 Rogue Access Points
4.4 Wardriving
4.4 Phishing
4.4 Ransomware
4.4 DNS Poisoning
4.4 Spoofing
4.4 Wireless Deauthentication
4.4 Brute Force Attacks
4.4 VLAN Hopping
4.4 Man-In-The_Middle
4.4 Vulnerabilities and Exploits
4.5 Device Hardening
4.6 Mitigation Techniques
4.6 Switch Port Protection
4.6 Network Segmentation
5.0 Network Troubleshooting and Tools (22% of the exam)
5.1 Network Troubleshooting Methodology
5.2 Hardware Tools
5.2 Software Tools
5.2 Command Line Tools
5.3 Wired Network Troubleshooting
5.4 Wireless Network Troubleshooting
5.5 Network Service Troubleshooting
1.0
Introduction to IP
TCP and UDP for moving data across the network
Frames have many things inside them including headers and data
Lots of encapsulation when getting a frame ready to move across the network
TCP is layer 4
Uses the TCP handshake
A connection based protocol
Good when you need to make sure you get all of the data
UDP is layer 4
Does not verify that data has been received
Faster but less reliable (Connection less protocol)
Good for real time purposes like voice/video calls, ect
IP addresses and port numbers is what is used so the routers and other devices know where to direct the frame/data so that the right
person may get their information
Many different applications have their own ports
SHH - 22
HTTPS 443
ect
All of this routing data like source and destination IP and ports will be stored in the frame
0-1023 are permanent port numbers while 1,024-65535 are non permanent port numbers
TCP ports and UDP ports are different things
ICMP (Internet Control Message Protocol)
Used to check in and see if a device is functioning properly
Admin use mainly
Also can be used for devices to alert others when they are not working properly
Could alert that a packet timed out and did not reach its destination
Common Ports
Telnet TCP 23
Remote login via console
Not encrypted so not at all secure
Not used often
SHH TCP 22
Encrypted remote login via console
Better than Telnet
DNS UDP 53
Converts names of websites to IP addresses
Very important, if they aren’t working they whole network will have trouble
SMTP TCP 25
Server to server email transfer
Send from a device to a mail server
SFTP TCP 22
Uses SSH to make secure file transfer
Full featured file transfer protocol
FTP TCP 20 (active mode data) TCP 21 (Control)
An unencrypted file transfer protocol
Username and password needed
Full featured
TFTP TCP 69
No authentication or encryption
Just read and write files, very basic
DHCP UDP 67 and UDP 68
Automatically configures IP address, default gateway, subnet mask, ect
DHCP could be stand alone or more commonly for houses in the router
There is a lease time for IP addresses, you only get it for a certain amount of time
Reservations can make it so certain devices always get the same IP addresses
HTTP TCP 80
Unencrypted protocol commonly used via a browser
HTTPS 443
Encrypted browser protocol
SNMP UDP 161
Managing network devices, gathering logs and statistics from the devices
V1 & V2 not encrypted, V3 is encrypted, has integrity, authentication and authorization
RDP TCP 3389
Remotely share a desktop (or just an application)
Common for Windows
Can use other OS for this as well
NTP UDP 123
Sync all the clocks
Very accurate
SIP TCP 5060-5061
Voice over IP
Setups up and ends calls
Adds features as well
SMB also called CIFS, TCP 445
Used by Windows
Files sharing, printer sharing, ect
POP3 TCP 110
Receive emails from a mail server
Basic
IMAP4 TCP 143
More common today
Receive emails from a mail server
More features than POP3
LDAP TCP 389
Directory access protocol
Store and retrieve info in a network directory
LDAPS TCP 636
LDAP but over SSL, so secure
H.323 TCP 1720
Another VoIP signaling protocol
Call, ring, hangup
Early VoIP protocol, but still used quite a lot today
Understanding the OSI Model
Open Systems Interconnection Reference Model
7 Layers
Layer 7 Application (The layer we see, HTTP, FTP, POP3, ect)
Layer 6 Presentation (encoding and encryption, often combined with layer 7)
Layer 5 Session (Communication management between devices, control protocols and tunneling protocols)
Layer 4 Transport (TCP, UDP, ect)
Layer 3 Network (Routing layer, routers, IP, Packets, Layer 3 switches, frame fragmentation)
Frame fragmentation is when you break a frame into smaller pieces so the data can be sent across the network
Layer 2 Data Link (MAC, Frames, Switches, Bridges)
Layer 1 Physical (Signaling, cabling, connectors, hubs, bits, ect)
Certain protocols and processes exist at each layer
Packet capture tools like Wireshark are where you really start to see OSI model in the real world
Introduction to Ethernet
Enterprise networks have the same base functionality as a home network
There is just a ton more data and hardware
May even be many buildings connected to each other
MAC addresses
Physical unique address
48 bits long, displayed in hexadecimal
First half is the Organizationally Unique Identifier (the manufacturer)
Second half is Network Interface Controller Specific (serial number)
Half duplex
Cannot send and receive at the same time (like hubs or switches if configured as so)
Prone to collisions
CSMA/CD Can tell when there is a collision and wait a random amount of time before continuing to send data
CSMA/CD can see if any data is currently being transmitted or if the case is clear
Full duplex
Can send and receive at the same time
Need to make sure the switch and devices support full duplex
Much more intelligent in many ways (Knows where the data needs to go instead of just sending it to everyone on the network)
CSMA/CA
Collision Avoidance, like CD but for wireless networks
Can’t hear the other devices so they will ask if the network is in the clear before sending data
Network Switching Overview
The switch is much smarter than the hub
Forward or drop frames based on the MAC addresses
Has a table MAC addresses
Keeping the environment loop free with STP
Frame switching
Has a table of MAC addresses to output interface
Only knows the next step, just keeps passing the packet on until it gets to its location or its TTL expires
Always adding to its table when it comes across something new
If it doesn’t know where to send the data it floods the data to all of the devices
When the data finds the right person the switch gets a response and adds the information to it’s table
ARP
Determine MAC address based on a IP address
Can be captured with a packet capture tool
arp -a to view the arp table on your computer
Broadcast Domains and Collision Domains
Collision domains CSMA/CD
Hard to find these days because of full duplex
Only one station can talk at a time
The collision domains are separated by switches
Broadcast domains
There are some cases where you need to broadcast something (a necessary evil)
Broadcasts can go through switches and bridges but they stop at a router
Unicasts, Broadcasts, and Multicast
Unicast = one to one (most common, HTTPS, FTP, IMAP3, ect)
Multicast = one to many (things like live voice calls with many people, streams, ect)
Broadcast = one to all (arp requests, routing updates, ect)
Protocol Data Units
Unit of transmission (Frame, packet, bits, TCP, UDP, ect)
Lots of headers are needed so each devices service can see the information they need
Frame are encapsulated in headers as they move down the OSI model and de-encapsulated as they move back up the OSI model
when they reach their destination
MTU
Maximum size of a IP packet that you can transmit
All devices need be able to support the MTU that you have set
A high MTU can greatly increase speeds
1500 bytes is the standard MTU for IP packets
Some of this packet is the headers not all of it is your payload (only 1472 bytes is the payload)
If the DF bit is set it means that the data cannot be fragmented
Network Segmentation
LANs = Local Area Network
Virtual LANs
Separated logically instead of physically
Can have many on a single switch (or use many switches)
You could run a cable for each VLAN when connecting switches in order to keep the traffic separate or you could use one cable
for all of the VLANs with VLAN trunking
This is known as a 802.1Q trunk, it adds a header to the frame that notes what VLAN the traffic came from so that it can be
routed, once it reaches the end of the trunk the header is removed and the frame is forwarded to the correct VLAN
Spanning Tree Protocol
Used to prevent loops in networks
Loops will easily overwhelm your network so you need to stop them from happening
802.1D standard
There are a few port states for ports using STP
Blocking = not forwarding to prevent a loop
Listening = not forwarding and cleaning the MAC table
Learning = not forwarding and adding to the MAC table
Forwarding = data passes through
Disable = admin turned off the port
Root switch
One per network
STP will label ports as “root port” if that is the way to get to the root switch
The designated ports are the other ports that lead to other spots in the network
Blocked ports are well closed ports that traffic cannot go through
STP may make a route to a certain device a little bit longer, but this is worth it
STP can automatically change the port states if a device fails and you need a new path to get somewhere
RSTP is 802.1W
Faster than STP
Backwards compatible
Switch Interface Properties
Speed and duplex settings
The most basic settings you need to config or have config automatically
IP addresses may also be needed
Switches need to be assigned a VLAN as well
Trunk interfaces need to be config-ed too
DMZ Demilitarized zone
Between the internet and your intranet
Security
POE (802.3af)
Ethernet and power in one cable
Endspans is what you call a switch with built in POE
Midpsans is what you call it when you use a power injector with your switch for POE
Mode A = POE on the wires that are used for data
Mode B = POE on unused wires
15.4 watts DC power
Max current of 350 mA
POE+ (802.3at)
Improved POE
25.5 watts DC power
Max current of 600 mA
Port mirroring
Connect a monitoring device so you can copy what is happening on the device (switch) and send a copy to your device
Static and Dynamic Routing
Each router only knows the next step
Routing table tells them where to send packets
Static routing
Manually add the routes
Good for small networks / bad for large networks
More secure
No overhead for routing protocols
Easy to mess up and make a loop
Have to manually update routes when there is a change
Dynamic routing
Routing tables are updated automatically in almost real time
Good for large and complicated networks
Has some router overhead
Still has some initial configuration that is needed
Default route
The way of last resort
Great when there is only one way in and out of the network
Can make things a lot simpler depending on your network
IGP and EGP
AS
Autonomous System
A network of nearly any size with a single routing policy
Within your control
IGP
Used within a single AS
IPv4 dynamic routing
OSPFv2 (Open shortest path first)
RIPv2 (Routing information protocol version 2)
EIGRP (Enhanced interior gateway routing protocol)
IPv6 dynamic routing
OSPFv3
EIGRP for IPv6
RIPng (RIP next gen)
EGP
Used for routing between AS
BGP (Border gateway protocol
Very common
Dynamic Routing Protocols
Automatically communicate between routers so they are always updating their routing tables
Needs a formula to determine the best routes
Distance vectoring routing protocols
How many “hops” (number of routers) away is another network
Does not care about the speed of the link only the distance
Very little config as it is quite simple
Not great for large networks
Many different protocols use this
RIP
RIPv2
EIGRP
Link-state routing protocols
Care more for the speed of the link than the distance
A ton better for large networks
OSPF (very common for large networks)
Hybrid routing protocols
Combining Link state and distance vectoring
BGP
IPv4 and IPv6 Addressing
Every device needs an IP address
Subnet mask is also needed
Subnet masks tells you which part of the IP address is the network ID and which part is the host ID
IPv4 address
32 bits / 4 bytes / 4 octets long
Lowest number is 0 highest is 255
IPv6 address
128 bit / 16 bytes / 16 octets long
Displayed in hexadecimal
Hard to memorize this type of addresses so DNS is even more important
IPv6 can be shortened
Leading 0’s are optional
Groups of 0’s can be replaced with :: (but only once per address)
So 2001:0000:0000:CD30:0000:0000:0000:0000
is now 2001:0:0:CD30::
Configuring IPv6
Dual-stack routing
v4 and v6 in one network (Have both types of addresses for a single device)
Most modern networks can understand both versions of IP
Tunneling IPv6
6to4 addressing
Can send IPv6 between devices that have a IPv4 connection
No NAT support
Needs relay routers
4in6 tunneling
V4 tunneled in a v6 network
Teredo/Miredo tunnel
IPv6 through IPv4
No special hardware needed
Teredo is Microsoft | Miredo is Linux, Mac OS, ect (Open Source)
NDP (Neighbor Discovery Protocol)
Sends multicast with ICMPv6
Replaced IPv4 ARP
Finds other devices MAC addresses
SLAAC - automatically config IP address without DHCP servers
DAD - No duplicate IPs
Discover routers with RS and RA
NS and NA
NS = Neighbor Solicitation
Sent as a multicast
One workstation searching for the MAC of another workstation
NA = Neighbor advertisement
The response to a NS with the needed info
Prioritizing Traffic
Many different apps and devices with many different requirements
Some types of traffic are more important than others
Packet Shaping
Control bandwidth and data rates
Some apps have higher priority
QoS
The process of controlling traffic flows
Many different methods
CoS
Layer 2
In a 802.1Q trunk
DiffServ
Layer 3
QoS is set in the IPv4 header
Network Address Translation
All of the IPv4 addresses are used up
Private IP addresses
For inside a Intranet only
Not rout-able across the internet
These are the private addresses range
10.0.0.0-10.255.255.255
172.16.0.0-172.31.255.255
192.169.0.0-192.168.255.255
NAT changes these private addresses into public addresses (The routers own address which is rout-able across the internet)
Each router directly connected to the internet has its own IPv4 address
Port numbers are used so the router can tell where on the intranet to send internet traffic (Since it can’t use IP addresses due to the
changes being made to them)
Port forwarding
Someone on the outside gets access to the inside of your network
Maps External IP and port number to an internal IP and port number
Also known as Static NAT or Destination NAT
Does not timeout or expire
Access Control Lists
Allow or deny traffic
Commonly sits on the outer limits of the network where traffic is going in and out
Can evaluate on many different types of criteria
Source IP, Destination IP, Port numbers, ICMP, time of day, application, ect
Works from top to bottom
Looks at first rule to see if there is a match there if not it keeps moving down the list of rules
Most specific rules tend to be at the top
At the bottom tends to be a implicit deny rule
If it matches no other rules than it is denied and can’t come through
Circuit Switching and Packet Switching
Circuit switching
Circuit is established before data passes through
Nobody else can use it when it is idle
Not an efficient use of resources
Connection is always there and it is all yours
Examples
POTS (Plain Old Telephone Service)
T1, T3, E1, and E3
ISDN
Packet Switching
Grouping data into packets and sending it across a network
The media is shared
If you aren’t using it, someone else is
More efficient
Examples
SONET
ATM
DSL
Frame Relay
MPLS
Cable Modem
Satellite
Wireless
Software-Defined Networking
Control Plane
Administration and ongoing servicing
Data plane
Transferring data
Directly programmable
Make changes at any time (Dynamically if needed)
Centrally managed
Vendor neutral
Virtualize things with distributed switching
Servers can be far away from each other while on the same VLAN
Don't need to worry about moving the servers
Binary Math
This is kinda hard to write out without any charts or something but here we go
All 0’s and 1’s
Each digit is a bit
8 bits is a byte/octet
Each bit represents a number
0 means that digit is not included in the number while 1 means that digit is included in the number
00000000
128 64 32 16 8 4 2 1
Every time there is a 0 bring down a 0 every time there is a 1 bring down the number associated with the bit then add them all together
So for 10010100
We have 3 1’s in this binary and they are associated with the numbers 128, 16, and 4
So if we simply add all 3 of those numbers together we get 148
This can be done in reverse so say we have 186 and needed to make it in binary
First we ask if there is a 128? if so the first number is a 1 (we also now subtract 128 from 186 to get 58)
Now we ask if there is 64 in the remaining number of 58 - there is not so that is a 0
Next is 32 which there is so that is 1 and now we have 26 left
Next is 16 which there is so that is also a 1 and we have 10 left
Next is 8 which there again is so that is 1 and we have 2 left
There is no 4 so that is a 0
There is a 2 so that is a 1 and now we have 0 Left
So this is now 0
In the end we have 10111010 = 186
IPv4 Addresses
Every device needs one | like 182.23.46.2
Also need a subnet mask like 255.255.0.0 or 255.240.0.0
Default gateway is needed to talk outside of the local subnet
Loopback address is a way to send traffic to yourself
127.0.0.1-127.255.255.254
Reserved addresses are set aside for future use
240.0.0.1-255.255.255.254
Virtual IP addresses
Not for a physical device
Classful Subnetting
Class A
Leading bits of 1-126
8 network bits and 24 remaining bits
like 255.0.0.0
Class B
Leading bits of 128-191
16 network bits and 16 remaining bits
255.255.0.0
Class C
Leading bits of 192-223
24 network bits and 8 remaining bits
Class D (Multicast)
Leading bits of 224-239
Nothing else is defined for class D
Class E (reserved)
Leading bits of 240-254
Nothing else is defined for class E
For each subnet there are host addresses, network address and broadcast address
The first address in a subnet is the host address
The last address in a subnet is the broadcast address
All of the other addresses are host addresses
For actually calculating all of these addresses scroll down to the 7 second subnetting section (I will add it soon)
IPv4 Subnet Masks
Subnet masks could be written in binary with ones all lined up on the left and zeros all on the right
Something like 11111111.11111111.0.0 or 255.255.0.0 or /16
Or 11111111.11100000.00000000.00000000 or 255.224.0.0 or /11
These / followed by a number are the CIDR notation, it is a way to display what the subnet mask is
just simply used Professor Messer’s chart for converting between CIDR notions, binary and decimal for the subnet masks and I am too lazy
to make my own chart ATM so nothing goes here
IPv6 Subnet Masks
IANA (Internet Assigned Numbers Authority provides addresses to RIRs (Regional Internet Registries
RIRs assign smaller blocks to ISps (Internet Service Providers)
Then that provider will give you a /48 subnet
First 48 bits is the Global Routing Prefix
The next 16 bits tend to be the different subnets
Those 16 bits give you 65,536 total subnets
The last 64 bits tend to be Host ID’s on that subnet
Those 64 bits give you about 18 million trillion hosts per subnet (So much more than the total IPv4 address range)
So all in all this is quite similar to how subnet masks for IPv4 work there is just so many more subnets and host addresses to work with
Calculating IPv4 Subnets and Hosts
VLSM (Variable Length Subnet Masks)
Allows network admins to define their own subnets (not classful)
So many more options and flexibility comes from this
2 to the power of the number of subnet bits you have would allow you to calculate the total numbers of subnets you have
2 to the power of the number of host bits that you have would allow you to calculate the total numbers of hosts you have per subnet
(make sure to subtract 2 from that number for the network address and broadcast address)
Look at the first number of the IPv4 address to see what range it is in (Class A, B, ect) and that will tell you have many bits are the network
ID in this case lets say is Class A, so 8 network bits, then you look at your CIDR notation and see it is for example /24 meaning there are still
16 bits left that are not host IDs but indeed subnet ID’s. The remaining 8 bits are then your hosts ID’s, this is how you get your numbers for
the for the equations above
Seven Second Subnetting
Assigning IPv4 Addresses
This used to be completely manual
BOOTP
Automatically define some things but not everything
Didn’t know when leases were up
DHCP
Automatically configured most settings and works with nearly every device
Your IP will expire and you will get a new one every now and then
But you can set it so you always have the same IP if you desire
A DHCP reservation where you tie a MAC address to a IP address
APIPA
When you use DHCP but no address is available you can use a link local address to communicate within your subnet
169.254.0.1-169.254.255.254
First and last 256 addresses are reserved
Your device will pick a link-local address then send an ARP request to make sure that said address is not in use by anyone else, then it
assigns it to itself if it is available
Assigning IPv6 Addresses
DHCPv6
Every device already has a link-local address without the need for DHCP
So your DHCP request can be sent with multicast instead of broadcast
Process of getting an address is a lot like IPv4
Solicit | Advertise | Request | Reply
A static IP address with a modified EUI-64 (64 bits)
A modified MAC address (48 bits)
To make this address first split the MAC address in half
Now place FFFE in the middle of the MAC address (the missing 16 bits)
Now invert the 7th bit (The U/L bit aka the Universal/local bit)
This is the second character in the address and it switches like so (They work both ways to while 1 will become a 3, if you
simply started with a 3 that will then be a 1)
0 to 2 | 1 to 3 | 4 to 6 | 5 to 7 | 8 to A | 9 to B | C to E | D to F
Examples
MAC of 8c:2d:aa:4b:98:a7 to EUI-64 of 8e2d:aaff:fe4b:98a7
MAC of a0:21:b7:63:40:3f to EUI-64 of a221:b7ff:fe63:403f
Network Topologies
Physical network map
All of the physical devices and cable connections
Physical maps of the racks and the components inside them
Logical network map
For virtual devices or high level overview of the network
Visio, OmniGraffle, Gliffy.com
Good for planning and sharing with 3rd parties
Star network
A switch in the middle with everything connected to that switch
Ring network
All of the devices are connected to each other in a ring form
Used in MANs and WANs
Sometimes you have 2 rings for fault tolerance
Mesh network
Many redundant links, sometimes all of the devices are connected to all of the other devices
Redundant, fault tolerant, load balancing
Used in WANs
Bus network
Single cable with every device connected to that cable
Easy to implement, very horrible for fault tolerance
CAN (in your car) is a modern bus network
Wireless Topologies
Infrastructure
All devices communicate through an AP
Most common
Ad hoc networking
No pre existing hardware
Just configure both devices to communicate directly with each other
Mesh
Ad hoc devices working together to create a mesh “cloud”
Self form and self heal
Common Network Types
LAN = local area network
A single building, group of buildings, ect
High speed and small
WLAN = Wireless local area network
Same thing as LAN but wireless
Can be extended with more AP’s
MAN = metropolitan area network
Between the side of a LAN and a WAN
Size of like a city or something
Often owned by governments
WAN = Wide area network
Spanning around the globe
Tends to be slower in speeds
CAN = Campus Area network
Many buildings owned by a company or a college | group of buildings close to each other
LAN technologies are very high speed (many times fiber)
SAN = Software area network
Looks and feels like a local storage device
Block level access (More efficient)
NAS = Network attached storage
Remote storage device
File level access
PAN = personal area network
Bluetooth, IR, NFC
Common inside a house or car (Audio, Mobile phone, workout/health devices, ect)
Internet of Things Topologies
Wearable tech, home automation, ect
Z-Wave
Mainly for home automation
Control lights, locks, garage doors
Wireless mesh network
ANT / ANT+
Fitness devices, heart monitors, ect
Uses 2.4GHZ so it could be jammed
Optional encryption
Bluetooth
Uses PAN
Wireless headphones, smart phones, smart watches, tethering, ect
NFC (near field communication)
Common on phones
2 way communication (commonly for payments)
Can help with Bluetooth pairing
Could also use it as an access token
IR (Infrared)
Included on phones and much more
Control entertainment center with your phone (most common use case)
RFID (Radio-frequency Identification)
Tracking, access badges, ect
Not usually powered devices
IEEE 802.11 wireless networks
Most common IoT networks
Always being updating
Wireless Standards
802.11a (one of the first standards)
5GHZ range
54 Mbit/s
802.11b (also one of the first standards)
2.4 GHZ range
11 Mbit/s
Better range than 802.11a
More conflict with other devices
802.11g
“upgrade of 802.11b”
2.4GHZ range
54 Mbit/s
Backwards compatible with 802.11b
802.11n
5 or 2.4GHZ range
Much more bandwidth
600 Mbit/s
Uses MIMO (Multiple input multiple output)
802.11ac
5GHZ range
Can use channel bonding for large channel bandwidths
6.8 Gbit/s
Uses 8MU-MIMO
Cellular Network Standards
Separate land into cells
One antenna per cell
2G networks
GSM (Global System for Mobile Communications)
CDMA (Code division multiple access)
Poor data support
GSM
90% of the market for a while (AT&T, Tmobile)
Could move SIM from phone to phone
Uses TDMA (Everyone gets a little slice of time)
Streams are combined into a single stream then broken out again when they reach the location
CDMA
Everyone is using the same frequency, but they have their own code
Verizon and Sprint used this
4G LTE
Converged standard
Based on GSM and EDGE
Downloads of 300Mbit/s for LTE-A (150 Mbit/s for normal LTE)
Wireless Network Technologies
Channels
Not overlapping channels is necessary (When using many AP)
So many more channels with 5GHz
For 2.4 GHz channels 1, 6, and 11 are likely what you will want to use
Different bandwidths are used
802.11a 20MHz
802.11b 22MHz
802.11g 20MHz
802.11n 20 or 40MHz (2 20MHz channels)
802.11ac 40MHz (for 802.11n stations), 80MHz for 802.11ac stations or 160MHz also for 802.11ac
Antennas
802.11n added MIMO which allowed us to send many streams at once on the same frequency
802.11ac improved upon this
This relied on the number of antennas you have
Information is displayed like this (Antennas on the AP) x (antennas on the client): number of streams
Like 2x2:2 or 3x3:2 or 4x4:4
MIMO could still only send to one device at a single time but this all changed with MU-MIMO which can send to many clients at the same
time
Power level controls
Set it as low as you can while still getting the coverage you need
Control the distance covered by your AP or router
Omnidirectional antennas
Most common on AP
Sends the signal in all directions evenly
Directional antenna
Focus the signal
Send the signal from building to building
Yagi antenna
Parabolic antenna
Wireless survey tools
Need to know signal coverage and interference
Many built in tools can help with this as well as 3rd party tools
Spectrum analyzer will give you very detailed information
Cloud Services and Delivery Models
SaaS
On demand software
Nothing is stored locally
Your data is out there, not in your control
Stuff like Google Mail
IaaS
Your provided with the hardware but nothing more
Your data is still in the cloud but you have a bit more control
PaaS
Nothing physical in your environment (OS is not handled by you)
You just handle the development process
Gives you a sandbox to build your own application
Cloud types
Private cloud
Everything is within your control (hardware, software, all of it)
Public cloud
3rd party data server
Hybrid cloud
Both public and private combined
Community cloud
A group of people get together and share a cloud
On-premise
You control everything and it is all owned by you
Hosted
Not in your building, you may not even own the servers
Cloud
More modular (can add and remove resources and data very quickly)
Connecting to the cloud
SSL or TLS for browser access
VPN for a encrypted private way to access your cloud data
Direction connection is the more secure but also the most costly
Cloud policies
Use a CASB for security policies and controls for data on the cloud
Visibility
Make sure the right people are seeing the right things and have the right authority to access things
Compliance
Are you complying with laws and other things
Threat Prevention
Make sure people are authorized
Data Security
Encryption, protect transfers of data with DLP
An Overview of DNS
Translate human readable names into computer readable names
Has a hierarchy
At the top is the .com, .net, .org, ect
Next up is a name like .professor messer or .youtube
Then is the web sever something like www or mail
You could even have another level down lower for certain sections of your website
A huge distributed databases with so many servers and server clusters
You likely need to ask many different servers before you can find the IP address you need
i. Client queries local name server
ii. Local name server queries root server
iii. Root server replies to local name server
iv. Local name server queries .com name server
v. .com name server replies to local name server
vi. Local name server queries ProfessorMesser.com name server
vii. Professermesser.com name server replies to local name server
viii. Local name server gives the client the info and logs the data into a cache
Internal DNS
Managed on internal network and has the internet routing information that you don’t want anyone else to be able to see
External DNS
Like Google or Quad9
Won’t have local information but they can help with external DNS queries
Third-party DNS
Middle ground between internet and external
Good for large environments
Run in the cloud
May have more features compared to internal DNS servers
DNS Record Types
RR (resource records)
Database records of domain name servers
Configure the DNS and the lookups will simply take place in a text file
A or AAAA
Name with an IP address
A for IPv4
AAAA for IPv6
CNAME record
Alias of another name
Make it so www.youtube.com could be just “videos” or something along that line
Service record (SRV)
Find a certain service on the network
find the Windows Domain Controller, or the messing server, or the VoIP controller, ect
Mail exchange record (MX)
Determines the host name for the name server (not IP the NAME)
Name server records (NS)
Points to the name of the name server
Pointer record (PTR)
Reverse of A or AAAA records
You give it an IP and it gives you the name
Text record (TXT)
Human readable information
Likely valuable to 3rd parties viewing your DNS
Things like SPF to prevent mail spoofing
Or DKIM to digitally sign outgoing mail
DHCP Addressing Overview
Starts as a broadcast (Discover message)
Stops at a router of course
Next the DHCP will offer an IP (if it got the broadcast)
If many offers were given (more than one DHCP server) then the computer will pick one and send them a DHCP Request
Finally the DHCP will send an acknowledgment that that said address is now for your computer
Large organizations DHCP
Routers stop the traffic (could config a DHCP relay so that the traffic would not stop at the router but be turned into a unicast and
sent to the DHCP server)
Multiple servers likely needed for redundancy
Ability to scale well is also a good thing to have
IPAM
Manage IP addressing (plan, track and config DHCP)
Reports on all sorts of things
Lots of controls you can use
IPv4 and IPv6 on one console
Configuring DHCP
Scope properties
A list of IP addresses that will be available for a certain subnet
Subnet masks info as well
Lease duration
ect
Pools
Grouping of IP addresses that will be leased out by the DHCP server
Pools are inside the scope (scope if larger and contains other data including the pool)
Dynamic allocations
IP addresses are reclaimed after a lease period
May or may not get the same address each time
Automatic allocations
You will always get the same address (if it can, but since the IP may not be reserved the same IP may not be available for you to have)
Ties IP addresses to MAC addresses
Static Allocations
Admin configs it
Always have the same IP address
Tying the IP to the MAC address
DHCP leases
Temporary IP addresses
You get the IP for a certain amount of time
You could also manually release the IP address if you wanted
T1 timer
When the devices will try to renew the IP address (50% of the lease time)
T2 timer
If the original DHCP server is down it will try to keep the IP address by talking to another DHCP server around (87.5% of the lease
time)
An Overview of NTP
Sync all of the clocks (everything has a clock and syncing them is important)
Automatically happens with NTP
And very accurate as well
You have lots of control on how this will work
May have an NTP server
In charge of the clock for all the devices
NTP client may request the time from the NTP server and get updates for their clocks
Devices could be both a client and a server at once
Stratum layers
Lower is better
The number 0 is the original reference clock
Next closest clock is number 1 (synced to number 0)
2 is synced to 1, ect
May use many NTP servers for redundancy
If there is a choice between which clock to sync yourself with the device will choose to sync with the lowest number
2.0
Copper Cabling
There are twisted pairs inside the cable
One of the signals will be positive and one will be negative
Twist helps to stop interference
The different pairs in the cable will have different twist rates
UTP
UnShielded Twisted pairs (No shielding anywhere)
STP
Shielded twisted pairs (shielding around the whole cable or the individual pairs)
Has a grounding wire
Abbreviations
U = Unshielded
S = Shielded with braided shield
F = Foil shield
(Over cable shielding) / (Individual pairs shielding)TP
Like U/STP (No whole cable shielded but braided shield around each pair)
EIA set a lot of these cabling standards
TIA also set standards as well as ISO/IEC
Cable specs
Cat 3 = 10Base-T at 100m
Cat 5 = 100BASE-TX or 1000BASE-T at 100m
Cat 5e = 100BASE-TX or 1000BASE-T at 100m
Cat 6 = 10GBASE-T at 37-55m
Cat 6a = 10GBASE-T at 100m
Cat 7 = 10GBASE-T at 100m
The plenum
A non circulating air space above the ceiling is a non plenum
If the air ducts go into a shared air space in the ceiling that is a plenum
There are fire regulations for this area
You also need to make sure your cable inside the plenum need to be plenum rated cable
May not be as flexible as other cables
Coaxial cables
Wire conductor right in center with an insulator around that, metal shielding around all of that, and finally a plastic jacket on the
outside
For TV and modems mostly
Copper Connectors
RJ11 connector
Cable (6P2C) for telephones and modems
RJ45 connector
For our Ethernet (8P8C) cable
BNC connector
Commonly used on WAN connections like DX3
Bulky and hard to work with
DB-9 and DB-25
Serial connections
Early on they were used for almost anything
Still today the 9 pin one is sometime used for a console connection
F-connector
Cable televisions or modem
RG-6 cable
Optical Fiber
Communication using light wavelengths (LED or laser)
Over km of distance
No external interference or tapping
You have a core, cladding and coating on a fiber cable
Multi mode fiber
For short distances, 2 km or less (often with an LED)
More than one signal at once
Signal mode fiber
For long distances, up to 100km
More expensive with lazers
UPC
Ultra polished connector
0 degree angle connection
High return loss
APC
Angled polished connector
8 degree angle connection
Lower return loss, little higher insertion loss
Optical Fiber Connectors
ST connector
Straight tip connector
Bayonet connector
Round at the end
SC connector
Subscriber connector
Square connector
Have a plastic key on the side
LC
Lucent connector
Little connector
The connectors are getting smaller and smaller
MT-RJ
Mechanical Transfer Registered Jack
Smallest connector
About the same size as an RJ-45 connector
Copper Termination Standards
Cable tester can verify the termination is done properly
Don't mix and match the cable pin outs on a single cables
T568A
i. White and Green
ii. Green
iii. White and Orange
iv. Blue
v. White and Blue
vi. Orange
vii. White and Brown
viii. Brown
T568B
i. Orange and White
ii. Orange
iii. Green and White
iv. Blue
v. Blue and White
vi. Green
vii. Brown and White
viii. Brown
Straight through cables
Pin 1 is connected to pin 1
2 is connected to 2, ect
Crossover cable
For connecting like devices together
Pin 1 no longer goes to pin one it goes to pin 3
Pin 2 to pin 6, ect
May not need to do the crossover on the physical cable because if your device supports Auto-MDI-X the device can do the crossover
digitally
Does not deal with 568A or 568B standards
Network Termination Points
Patch panels
Take the connections from say office cubicles punching them down then on the other end have a RJ45 connection that goes into your
networking equipment (switch)
If someone changes desk locations you can simply change the small cable length from the patch panel to the switch instead of having
to run a completely new cable
66 block is used for older standards
110 block is more common for modern networks
Wire to wire patch panel
For cat 5 or 6 cables
Distribution panels for fiber
Patch panel at both ends at times
Need to watch the bend radius of the cable
Leave some cable slack for future changes
Network Transceivers
Transmit and receive mostly in a single device
Modular interface
Most often there are two fibers, one for transmit and one for receive
You could also have both transmit and receive in one cable with BiDi transceivers
GBIC
Early standard
Something like an SC connector
Copper and fiber support
Rather large though
SFP
Replaced GBIC for the most part
1G fiber or copper connections
Much smaller form factor
SFP+
Much faster than SFP (16Gib)
QSFP or QSFP+
4 SFP or SFP+ in one connector that is not that much bigger
Crazy speeds
Saves money because there is less fiber and equipment needed
Ethernet Standards
Most of this was already covered in the Copper Cabling video so like hardly anything is here because I am not writing it again
100BASE-T used 2 pairs of wires
1000BASE-T uses all 4 pairs of wires
1000BASE-SX = multi mode fiber of 220-500m distance
1000BASE-LX = Multi mode fiber of 550m or single mode fiber for 5km distances
10GBASE-T = Much higher frequency (500 MHZ)
Networking Devices
Hub
Layer 1
Very basic (Sends data out of every single port because it doesn’t know where it needs to go)
Everything is half duplex
Not efficient at all
Bridge
Basically a switch with 2 ports on (Bridging 2 networks together)
Forwarding decision made via software
Layer 2 device (Forwards based on MAC addresses)
Today's WAPs are bridges (Bridging between Ethernet and wireless networks)
Switch
Layer 2 device
Forwarding decision made in the hardware (ASIC)
Modern ones have many more features such a PoE
Router
Layer 3
Forwarding decisions based on IP addresses
Can connect different types of networks together
Firewall
Layer 4 (Could be layer 3 or 7 as well)
Allows or denies traffic based on certain criteria (TCP/UDP)
Modern firewalls could even look at the application information and see rather or not that would be allowed into the network (Layer 7)
May also be an VPN endpoint
Can proxy traffic
WAP
Not a wireless router (this is just the wireless part)
Layer 2 device
Modem
Converts analog sounds to digital signals
On traditional phone lines
Allow you to POTS as a backup way of communicating if everything else fails
Can be used for internet access if they are ADSL modems
Converting media
Layer 1
Signal conversion (Copper to fiber, or fiber to copper)
Helpful for extending the range of your connection
Almost always a powered device
Wireless range extender
A wireless repeater
VoIP endpoint
Some people still use voice for some reason
Can be used like POTS or on some sort of software like modern phones
Advanced Networking Devices
Multilayer switch
A switch and a router in a single device
Switching still happens at layer 2 and the routing happens at level 3
Wireless networks
Many AP to manage
Security controls
Should be easy for your users
Wireless LAN controllers
Centralized management of all of your WAP’s (on single console)
Make changes to all of the WAP easily
Monitor and reports on the WAP
Balancing the load (Load balancer)
Many servers sharing the load of one task
Used for large scale implementations
Could be used for fault tolerance
The load balancer decides which server will handle which request
TCP offload, SSL off load, caching, and many more features
Prioritizing QoS at times, content switching
IDS
Intrusion detection system
Looking for security events
Will simply alert when it detects something
IPS
Intrusion prevention system
Looking for security event
Will actually prevent the harmful traffic from entering your network
Identification technologies
Signature based
Looking for an exact match
Anomaly based
Build a baseline of what is normal and notify you of anything odd
Behavior based
Observe and report certain actions
Heuristics
Uses AI to determine if traffic flow is malicious
Proxy
Sits between the users and the external network
Makes requests and accepts data on the users behalf (So it can examine things to make sure nothing dangerous is going on)
Can filter through data
Application proxies
Understands maybe only one application
VPN concentrator
Allows you support VPNs
Could be a stand alone device or be part of a firewall
Could also be simply software
The client will need software for this to work
very common to config VPN to be always on
AAA framework
Identification
Username most often
Authentication
Prove you are who you say you are (password)
Authorization
What level of access do you have?
Accounting
Logging times, data transfers, ect
RADIUS
Common service for the AAA framework
can be used as authentication for almost any type of device
UTM (unified threat management)
An all in one security appliance
Filtering, inspection, spam filter, CSU/DSU, routing and switching, firewall, IDS/IPS, bandwidth shaping, VPN endpoint, so much stuff in
one device
NGFW (Next gen firewalls)
Layer 7 firewalls (inspect application layer information)
Looking at every frame and making security decisions based on all of that data
Can get very detailed and specific with their understanding
VoIP tech
PBX
For analog phones
Connects phone to provider
VoIP PBX
Integrate all VoIP devices to work over a normal network
No need for extra cables
VoIP gateway
Convert VoIP information into something that the normal PSTN network can understand
Content filtering
Could detect if sensitive information is being shared across the network
Could look for inappropriate content
Can detect malware
Filtering out what you don't want
Virtual Networking
Make 100 physical devices seem like one single logical device virtually
Still need to be able to communicate to the physical world
This is done via a hypervisor
Your hardware (CPU) needs to support this
Networking requirements
Has their own private network for all of the VMs
Likely uses a shared networking address with NAT for outside communication
They could also all have their own IP address
Or could have a private address
Virtualization
Much more flexible
Can add and remove things very easily
Network Storage
NAS
Remote access to a file server
File level access
SAN
More efficient
Block level access
Jumbo frames
More than 1500 bytes of a payload
Up to 9,216 (9,000 is the norm) bytes in a single frame
Increase network speeds
All of your devices need to support this option
Fibre Channel (FC)
Built for SANs
Up to 16Gbit/s
Fiber or copper
Uses SCSI, SAS, or SATA commands
FCoE (Fibre channel over Ethernet)
No new hardware needed
Can’t go through a router
FCIP
FC encapsulated into IP packets
Can go through routers to other subnets
iSCSI
Send SCSI commands over an IP network
Make remote drives look and feel like a local drive
Managed well in software
Infiniband
High speed
Has its own hardware
Copper or fiber
Popular for supercomputers and the likes
200Gbit/s speeds are quite common
WAN Services
ISDN
Can use BRI
Two 64 kbit/s bearer channels (for the data)
One 16kbit/s signaling channel (Setting up the ending the call)
PRI
T1 or E1 line
T1 has 23 Bearer channels and one signaling channel
E1 has 30 bearer channels, one signaling channel and one alarm channel
Common for old phone network and the likes (not used that often though)
T1
NA, Japan, South Korea
1.544Mbit/s over 24 channels
E1
Europe
32 channels for a total of 2.048Mbit/s
T3
Also known as DS3
On coax mostly
28 T1 circuits
44.736Mbit
E3
16 E1 circuits
34.36Mbit/s
OC (packet switching instead of the T and E stuff that was circuit switching)
The new and more used today stuff
SONET
Have different line rates (speeds)
OC-3 = 155.52Mbit/sec
OC-12 = 622.08Mbit/sec
OC-48 = 2.49Gbit/sec | 2.5G
OC-192 = 9.95Gbit/sec | 10G
DLS and ADLS (Digital subscriber line)
Common for our homes
WAN network that uses phone lines
Downloads are faster than uploads
10,000 feet distance limitation
Metro Ethernet
A single city
Connect with Ethernet on a WAN (Not common)
Often is running over a different topology
Broadband
Many frequencies
DOCSIS
Data over the cable network
4-250Mbit/sec (maybe even a gig of speed)
Dial-up
Using the existing voice lines for digital signals
Very slow speeds 56kbit/sec
hard to scale
WAN Transmission Mediums
Satellite
Into space
Slow and expensive
50 Mbit/s down and 3 Mbit/s up
For hard to reach sites
High latency 250ms up and down
High frequency around 2GHz
Rain and other things and interfere with the connection
Copper
Cheap and easy to install and maintain
Not as fast as fiber (often combined with fiber)
Very popular
Fiber
High speeds
Higher costs than fiber
Long distances
Common for the core of the WAN
Becoming much more popular for end users
Wireless
Mobile providers
Roaming communication
Limited coverage and speed (remote areas don't tend to work well)
WAN Technologies
Frame relay
Cost effective WAN types
Part of the departure of T1’s
Frames are passed through the cloud and appear on the other side
64 Kbit/sec through 45Mbit/sec speeds
Replaced by MPLS nowadays
ATM
Common for SONET
No frames or packets, it uses cells that were 53 bytes large
High speeds, low latency
Max speeds of 10Gbit/s
MPLS (Multi protocol layer switching)
Best of ATM and frame relay
Traffic through the WAN are labeled
Supports many types of traffic
Common for WANs
Labels are pushing onto packets as they enter the MPLS cloud
Labels are popped off on the way out of the cloud
PPP (Point to point protocol)
Connect 2 devices
Works almost anywhere
Supports authentication, compression, error detection, and multilink for larger speeds
PPPoE (PPP over Ethernet)
Common on DSL networks
Easy to implement, supported in most OS out of the box
DMVPN (Dynamic Multipoint VPN)
VPN builds itself as it is needed
A dynamic mesh
SIP trunking
Control protocol for VoIP
Using a VoIP connection to an IP-PBX
Most efficient and gives you more control over the bandwidth and other things
WAN Termination
Demarc point
Where you connect to the outside world
Used everywhere
On one side is your ISP’s hardware and on the other side is your own hardware
CSU/DSU
Sits between your router and the demarc
Commonly providers the conversion between your provider and your own equipment
Could be built into a router
Many types of connections are used for these devices
Smarjack
More intelligent than just a cable hand off
Owned by the provider
Could provide diagnostics, alarms, re-configuration, ect
3.0
Network Documentation
Operations procedures
Downtime notifications, facilities issues, ect
Software upgrades
Testing and change control
Document everything in a way that is easy to reference
Mapping the network
Both physical and logical maps
This is important and very useful to everyone involved
Logical network maps is a broad perspective of the network
Shows how things move across the network but not the physical hardware
Physical network maps shows all the physical cables and hardware and how they connect
Show interferences, IP addressing, server racks, ect
Change management
The process of how and when to make a change
Documentation, fall back plans, installation process, ect
This can be hard to implement in a organization that is not already using it
Managing your cables
The ANSI/TIA/EIA 606 is the standard for documenting the network
Identifiers and labeling are needed
Color coding, bar coding, ect
A centralized database is nice and common to have now a days
System labeling
Unique system ID for every device
Asset tag, name, serial number, ect
This should be clearly visible and for the server as whole along with each component
Circuit labeling
WAN circuits that are coming into the building
Document all companies of these WAN circuits
Want to know the circuit ID, WAN provider phone number and other information to be able to communicate with them
May want to put into place a monitoring system
Patch panel labeling
Be able to see which port on the floor matches with which port on the patch panel
Usually uses numbers
Baselines
What the normal operation for the network is
You can use this to spot abnormalities and predict when to upgrade what
Inventory management
A record of every asset
Make/model, config, purchase data, location, ect
Have an asset tag with a barcode, RFID, tracking number, ect
Inventory management software
A centralized database of all of you assets
May also have help desk and reporting functions
Availability Concepts
Fault tolerance
If a problem occurs, then what?
Adds complexity and costs to the network
Redundant everything, load balancing, RAID, ect
Redundancy
An additional device to replace a failed device
Power supplies, two completely different servers, RAID, UPS, ect
High availability
Redundant doesn’t always mean available right away
When you can't afford to have any down time you need a redundancy that is always on and always available
Always watch out for single points of failure
Costs a lot more
Load balancing
Spread the load between different servers or devices
If one server is down the others can still perform the action needed
NIC teaming
Load balancing on network cards / connections
Redundant paths and aggregate bandwidth
Done inside the OS
Uses multicasts to do health checks with the other NICs
Power Management
UPS
Uninterruptible power supply
Good for blackouts, brownouts, power surge
Generators
A long term power source that runs on fuel
Could run the entire building or just part of it
Can take some time to get up to speed (can run off the UPSs during this time)
Dual-power supplies
Each one can handle 100% of the load so as long as one is working you are good
Hot swappable
Recovery Sites
Cold site
No hardware, just an empty building
You bring everything including staff
Warm site
Room and rack space, you bring the rest or maybe they even have the hardware there
Hot site
An exact replica of everything
Very costly
Always updated with the latest information
Usually automatic
Very easy to move over to the hot site
Backup and Recovery
The archive attribute
Be able to tell if a file change been changed since the last backup
Full backup
Backup everything
Change all of the archive bits to off afterwards
Long time to backup, very quick to restore
Incremental backup
Backup all of the files changed since the last incremental backup
Quick to backup, but slow to restore
Differential backup
Backup all files changed since the last full backup
Medium amount of time to backup, medium amount of time to restore
Process Monitoring
Log management
Usually sent via syslog to a central log server
Massive storage requirement
Rolling up the data becomes important
Take samples every minute for the day
At the end of that day now keep 5 minute samples
After 30 days start keeping 1 hour samples times, ect
Data graphing
Raw logs or summarized logs
Often managed through SIEM
Turning reports into something visual (Graphs)
Can require a lot of computing resources
Port scanning
Nmap (network mapper)
Find devices and open ports
Can also do a lot more, find OS, find services, ect
Use NSE for more options
Vulnerability scanning
Not that invasive
See what is open and finding unknown devices
Test from the inside and the outside
Vulnerability scan results
Can find lack of security controls
Can find misconfigurations
Can also just find real vulnerabilities
Patch management
Service packs
Many patches at once
Monthly updates are also important
Emergency updates for Zero-day patches
Rollback options
Go back to the previous version (known to work)
Baseline review
See what is normal in your network so you can find what is abnormal
Protocol analyzers
Get into the details of what applications are doing
Capture packets from wired or wireless networks
Make it very easy to see everything that is happening on the network
Might need a lot of storage for this
Event Management
Interface monitoring
Up or Down? (Green is good, red is bad)
Alarming and alerting when something fails
Short term and long term reports
SIEM
Security information and event management
Monitoring and reporting on tons of logs from all over
Can send out security alerts based on this info
Short and long term reports
Correlation between different data types
Very good for forensic analysis
Syslog
The standard for message logging and consolidating logs
Usually logs are sent back to a centralized SIEM using syslog
Lots of disk space required
SIEM logs
Look at all the events that you may need to see in one place
SIEM dashboard
A broader view of what is happening in the logs
Uses lots of graphs
SNMP
Provides queries to devices for more information
v3 is the only one that is encrypted so use that if your devices support it
Can be very detailed so access should be limited
Graphing with SNMP
Uptime, response time, traffic transfers, ect
Many tools can be used to browse or walk the SNMP
Performance Metrics
Monitoring the interface
Trying to find the signs that will hint at a possible failure currently or in the future
Can be monitored with SNMP
MIB-II are where most metrics are
See the error rate, utilization, packet drops, interface resets, speed, duplex and more
Remote Access
IP sec
Security for OSI layer 3
Authenication and ecryption for packets
Also has confidentiality and integity
Uses AH and ESP
Sit-to-site VPNs
The common place to use IPsec
Uses existing connections (often with VPN applicances)
SSL VPN
Common for end user VPN access
Client to site VPN
Uses SSL/TLS protocol
Often built into the OS (or browser)
Can authenticate users
TCP based
DTLS VPN
Datagram transport layer security
UDP based
For real time needs
Remote desktop access
Share a desktop from a remote location
RDP is commong for this
VNC is also quite common for this
Some versions are free and open source
Can be used for troubleshooting or often by scammers
SSH
Encrypted console communication
Good for connecting to network devices for many reasons
Web based Mangement console
All in your browser
Uses HTTPS for encryption
May still need the command line for things not support via the browser’
Transferring files
FTP, SFTP, TFTP, ect
SFTP
FTP with SSH
FTPS
FTP over SSL
Out of band management
The network or device isn’t avaible what do you do?
Most devices hav e a separate management interface
Could connect a moden to this so you can do things remotely
Management network not tied to or relying on the hardware of the normal network
Policies and Best Practices
PUA (Privaledge user agreement)
Exspectations when dealing with data and devices
A signed agreement at times
Password policies
A written policy of what is expsected in a password and how to change / deal with passwords
The recovery process should be difficult to avoid other people gaining access
On-boarding
The process of adding a new employee and setting up all the physical and digital things that they need
Off-baording
The process of getting rid of a former employee and all of their hardware and digital accounts need to be reassigned, deleted,
archived, ect
Licsensing restrictions
There are so many licsenes to manage
Need to make sure you have aviability
Need to have intergrity
Watch out these expiring and how that would affect the company
International export controls
Equipment, information, data and more being exporing to other countries
Processes, procudures, laws and more
Data loss prevention (DLP)
Where is your data?
Detailed polcies to define what is and isn’t allowed with the data
DLP and watch out for and notify you when it finds a policy violation
Remote access policies
Hard to control external communication at times
A policy for everyone included 3rd parties
Very specific requirements to keep things safe
Security incidents
How to handle something going wrong with security
Incident response policies
How should you identify the incident
How should you catagorize the incident
Who needs to respond to the incident
What process needs to be followed
BTOD
Managing employee owned devices and how they can use them
These can be hard to secure
AUP (acceptable use policy)
What is the acceptable ways to use company assets
Should cover all assets and the policies for them
Good for limited the leagal liability of a company when something goes wrong
NDA
Confidentialilty agreement
Internally to proctect the company from exployees
Externally to make sure two companies dont disclose each others information
System life cycle
Managing the disposal of assets
Make sure to completely destroy important information so no one else can see it
Make sure to follow the laws when doing this
Physical destruction
Shredder / pulverizer
driller / hammer
Electromagnetic
Incinerating
Safty procedures and policies
Equipment safty
Personal safty
Enviromental safty
Toxic waste, batteries and the likes
Local government regulations need to be known and followed
4.0
Physical Security
CCTV / IP cameras
Video surveillance
Need to get the right specs (Depth of field, illumination requirements, focal length, ect)
Networked together and recorded over time
Motion detection for alerts
Asset tracking tags
Record of every single asset
Good for financial records, audits, deprecation, ect
Barcode, RFID, tracking number, ect
Tamper detection
Have systems be able to monitor themselves
Sensors, firewalls, ect
Asset tags that could provide tamper notification
ID badge
Can help track who has been where and give you access to certain things
Bio-metrics
Tied to a certain person (fingerprint, iris, voice print)
Useful for 2FA
Hard to change (Could be duplicated though)
Not foolproof but still pretty good
Tokens and cards
Smart card, USB token, hardware or software tokens, key fobs, SMS code to your phone
Door access controls
Lock and key, electronic locks, deadbolt
Token based locks with a card or the likes
Multi factor (smart card and pin)
Authorization, Authentication, and Accounting
AAA framework
Identification
Who you say you are (username)
Authentication
Prove you are who you say you are (Passwords or other)
Authorization
Make sure you get access to what you need to and don't have access to what you should not
Accounting
Tracking information and logging everything
RADIUS
More common AAA protocol
Centralized authentication for users
Works on almost any OS
TACACS
Alternative to RADIUS
For dial-up lines
XTACACS
Made by Cisco
Added more accounting and auditing to TACACS
TACACS+
Latest version of TACACS
Works with many OS and services
Kerberos
Authentication protocol
A one and done login
Protects against man in the middle attacks
Works with many OS’s
SSO with Kerberos
Uses cryptographic tickets
No constant username and password input
Not everything works with Kerberos
LDAP
Read and write information to a directory
DAP was an early version of LDAP
Uses attributes to describe data in the directory
CN = Common name
O = Organization
L = Locality
C = Country
ect (there are more)
Makes a tree of information
Local Authentication
Most devices have an initial account (make sure to change the password for this)
Hard to scale local accounts with large networks
Useful as a backup if AAA is down
Certificate based authentication
Private keys stored somewhere (like a smart card)
PIV cards are used by US federal government
CAC is used by the Department of Defense
Could also be stored on a laptop, USB fob, ect
Auditing
Logs of everything
Who logged in, what did they do, when did they do it
Network usage
Security logs
Multi-factor Authentication
Something you are (Bio-metrics, ex: fingerprint, iris scan, voiceprint)
Something you have (smart card, key fob, USB stick, phone for SMS)
Something you know (Password, pin)
Somewhere you are (location)
Something you do (hand writing, typing style)
Some of this can be expensive, others can be quite cheap
Access Control
NAC (Network Access Control) 802.1X
You don't get access until you authenticate
Port access (Physical ports)
Makes use of EAP and either RADIUS or TACACS
Disable unused ports, check for duplicate MAC
Port security
Prevent unauthorized users from connecting to a switch
Based on the MAC address of the connecting device
Can setup your own rules for this
Setup how many MAC and which MAC addresses can connect to each physical port
MAC filtering
Allow or deny based on the MAC
Easy through packet captures (Can also be easily spoofed)
Captive Portals
Common for wireless networks
Has a list of allowed devices and if you are not on that list it gives you a login screen
Once you login you now have access to the network
ACL
Looks at the packets of allow or disallow traffic
Can filter on very specific criteria
On routers or switches (for ingress or egress)
Wireless Encryption
Wireless Encryption
Anyone can listen in so this needs to be encrypted
WPA and WPA2 (you need the password to listen)
WPA
Upgrade to WEP
Short term bridge between WEP and the new standard
Uses TKIP
Combined the secret key with the IV
64 bit message integrity check to prevent tampering
Still had its own set of issues
WPA2
Uses CCMP for encryption (replaced TKIP)
Uses AES for data confidentiality
More advanced encryption
The long term standard
Wireless Authentication and Security
EAP (Extensible Authentication protocol)
Authenticate framework
WPA and WPA2 use EAP
LEAP
Used with WEP
EAP-FAST
Lightweight
More security
EAP-TLS
Strong security
Lots of people use it
EAP-TTLS
Other types of authenticate through the TLS tunnel
PEAP
EAP within a TLS tunnel
Open system
No authentication
WPA2-Personal / WPA2PSK
Has a pre shared key that you need to login
WPA2-Enterprise / WPA-802.1X
Authenticates users individually
MAC filtering
Can do it on wireless networks as well
Can use a wireless analyzer to help with this (but can be spoofed)
Geo-fencing
Using the GPS to determine rather or not to give someone access
Authentication method
Denial of Service
Force a service to fail by overloading it
Could take advantage of a vulnerability
Could just turn off the power
Could be a smoke screen for other attacks
Could happen accidentally
Network loop or bandwidth limitation, ect
DDOS
The attack is coming from many places at once
At botnet
Make a small attack into a big attack
A small request is now a large response overloading servers
Social Engineering
Manipulate people as they are weakest point in security
Authority
Act like they are in charge so it's okay to do what they say
Intimidation
Bad things will happen if you don't help
Consensus
Convince someone this is what is normally done
“your co-worker did this last week but is out today, could you help?”
Scarcity
Limited amount of time so we have to act fast
Urgency
Make things move faster
Don't think about it or ask others if it is okay
Familiarity
Become your friend and talk with you
Trust
Someone who is safe and can fix the issues
Insider Threats
Someone from within the organization with knowledge and access about the network
Usually causes more harm than other types of attacks
Can harm reputation
Could be accidental or intentional
Logic Bombs
When a event occurs the attack goes off
Time and date or a certain event
Often deleting things from systems
Hard to identify
Need processes to procedures
Lots of monitoring
Auditing
Rogue Access Points
A backdoor into your network
Simply buy an AP and plug it into the network
Needs to be monitored to prevent
Require everyone to Authenticate before using the network
Wireless Evil Twin
This one is config just like all the other WAP
Get other users to use their WAP not the legitimate WAPs
Wardriving
Driving down the street and gathering information about different wireless networks around you
All of this is free with certain applications
Also works on drones or bikes
Phishing
Social engineering with a touch of spoofing
Often done via email then sends you a fake website to login
Check the URL to see if it checks out
Or just don't click links from emails
Vishing
Phishing over the phone
Spear Phishing
Customize the attacks for a certain person or group of people
Spear phishing against the CEO is called Whaling
Ransomware
Take control of your data on your computer until you give them the money they want
Could be fake ransomware where just trying to trick you
Crypto-malware
Ransomware that asked for crypto to unlock
Can protect against this with a backup on a different computer (ideally offline)
DNS Poisoning
Modify the DNS server
To send someone to a different IP address
Send a fake response to a valid DNS request
Modify the workstation files
Spoofing
Pretend to be something you are not
Fake web server, fake DNS, fake MAC address, fake email addresses, fake caller ID, fake IP address, ect
Man in the middle attack uses ARP spoofing to sit between the conversation of 2 devices
Wireless Deauthentication
Keep connecting and dropping off a wireless network
Significant DoS attack
802.11 management frames that make everything work
Some wireless networks don’t protect these management frames
So attackers can make their own management frames and send them through the network to your devices
802.11w addressed this problem by making the management frame encrypted
Still not everything is encrypted
Is required for 802.11ac and all versions going forward
Brute Force Attacks
Dictionary attacks
Using a word list in order to try and crack a password
Start with the easy and most common words
Catch the low hanging fruit / the bad password people
Brute force attacks
You try every possible combination of characters
Very slow and most systems will not allow this many attempts
Best if you can find the hashed password and try to crack that offline where you don't have a limited number of attempts
Lots of computing power required for this
VLAN Hopping
You should only have access to your VLAN
You may be able to hop to another VLAN
Switch spoofing
You pretend to be a switch
Setup trunks so you can now send a receive from any VLANs
Switch admins should disable trunk negotiation so this can’t happen
Double tagging
When a switch sees a frame with a 802.1Q header and the header specified the current native VLAN, and that frame must be
forwarded out of a trunk interface then the switch will remove the header
If you had 2 headers on that frame and the first one was then removed your second header is what the second switch would see
and that is where it would route the traffic allowing you to talk with other VLANs
Man-in-the-Middle
Get in the middle of a conversation of 2 devices
Neither end station knows someone is watching their communication
Arp poisoning
Arp has no security
Arp maps IP’s to MAC address so if you modify the arp table in a device you could make it send traffic to a different MAC address
This man in the middle would then continue to send the traffic to the right location in order to keep both devices from noticing
something is wrong, so that the man in the middle can keep spying and gathering intel
Often done from inside the browser where it will send the traffic to the attacker
The attacker does not need to be on your local network
Requires malware on your machine
Vulnerabilities and Exploits
Vulnerabilities
A weakness that allows bad guys to gain access to things that they shouldn’t have access too
Some are never discovered
Many different types of vulnerabilities
Exploits
Takes advantage of a vulnerability
Many different methods to exploit a vulnerability
Can get quite complex
Zero Day attacks
When someone finds a brand new vulnerability they could notify the organization that has the vulnerability or if they are bad guys
they could trade them or exploit that vulnerability
Zero-day vulnerability are when it has been discovered that there is a vulnerability but it is yet to be patched
If they are exploited then it is a Zero-Day attacks
Device Hardening
Changing default credentials
The default username and password can be easily found by anyone so don't use them!
Avoid common passwords
Something that you can’t find in the dictionary is best
Longer is better and special characters/numbers are very good to use
Upgrading Firmware
To a version that does not have any known vulnerabilities
Make a plan for the new security risks and issues you may run into
Patch management
Security fixed, system stability, ect
Monthly updates or emergency updates for important security issues
File hashing
A way to keep your data security and not in the clear
Allows you to do some integrity checks to make sure the data has not been changed
Disabling unnecessary services
Hard to tell which are unnecessary at times, but every service is a potential risk
requires a lot of research and trial and error
Watching the network
It is quite easy to steal wireless data that is going across a network
Use encrypted protocols and technologies to try and avoid this
Secure protocols
SSH instead of Telnet
HTTPS instead of HTTP
SFTP instead of FTP
SNMPv3 because v3 is the only encrypted version
IPsec encrypt everything at the IP packet level
Generating new keys
Encrypted data requires a key
Need to make sure no one gains access to these keys
Update or change these keys if you have a default key
Disabling unused TCP and UDP ports
If you don’t need the port, why take the risk?
Add this type of filtering on a firewall or appliance
Disabling unused interfaces
The physical ports that are unused should be disabled
More effort to maintain but much more secure
Could also use NAC to help mitigate the risk of unused ports
Mitigation Techniques
IPS signature management
Determine what happens when unwanted traffic appears
Thousands of rules and you need to determine the outcome for these rules
Can be done one by one or by groups
This can take a lot of time to get just right
Device hardening
Use harden guides for your services and platforms
From the manufacture or a 3rd party
Native VLAN
When you are sending traffic across a trunk and the traffic belongs to the native VLAN then it does not need a header
You may want to change this value to separate management traffic from other types of traffic
Privileged accounts
Admin or Root
Needs to be highly secure
User accounts need to have limited access, don't give them more than they need
FIM (File integrity Monitoring)
Some files should NEVER change
Monitor to see when important files change
Windows can check its files with SFC
Linux can check its files with Tripwire
Many other host based options
Restricting access with ACLs
Drop all traffic except for admins when accessing management devices
Different for ACL for application access
Honeypots
Trap the bad guys into a fake network that looks real
Could be a single device or a whole network (honeynet)
Make them look as real as possible
Penetration testing
Simulate an attack to find vulnerabilities
Can be done yourself or from a hired 3rd party
Often these penetration tests are required
Switch Port Protection
At the MAC address layer there is no way to count how many times a frame has been sent around
This leads to loops if config the network incorrectly
The IEEE 802.1D standard is the STP protocol and is used everywhere
STP
This was already talked about somewhere above but
Root Ports are ports that lead to the root switch
Designated ports are other open ports
Blocked ports are blocked to prevent a loop
BPDU Guard
Is the protocol used to communicate between STP devices (switches)
Can't let non offical devices tells your stp switches what to do so you stop that from happening with a BPDU gaurd
Root Guard
One switch will also be the root switch (or bridge)
Can be set manually
Flood guard
Config a maximum number of MAC addresses on a interface
Could be a single MAC or a group of MAC addresses
When this maximum number is exceeded the port will be disbaled
Prevents people from flooding the network with MAC addresses
DHCP snooping
Switch becomes a DHCP firewall
Filters out trusted DHCP servers as trusted and everything else is untrusted
Makes a table of this information and filter things through
Network Segmentation
Physical, logical, virtual
Could increase the performance and security
Physical segmentation
Completely separate devices that are not connected in any way
Could keep different applications separate, custom information separate, ect
Logically segmentation with VLANs
On the same hardware but still separated logically
Can make it so they cant talk to each other
DMZ
Additional security between the internet and you
Public access to local resources
5.0
Network Troubleshooting Methodology
1. Identify the problem
i. Perhaps see if you can duplicate the problem
ii. Identify symptoms
iii. Question the users experiencing the issues
iv. See if any changes have taken place
v. Some of the problems might not be related to each other
2. Establish a theory
i. Start with the most simple explanation
ii. Consider everything
iii. List all of the possible causes
3. Test the theory
i. Go into a lab and try and recreate the problem to test your theories on
ii. You may run out of theories
4. Create a plan of action
i. Correct the issues with minimum impact on the users
ii. Identify that possible side effects of fixing the issue
iii. Have a backup plan
5. Implement the solution
i. Probably done during non production times
ii. May need other people's assistance
6. Verify full system functionality
i. Ask users and customers that everything is all good
ii. Check yourself for the problem
iii. Implement preventive measure so it does not happen again
7. Document findings
i. Write down everything, as much as possible
ii. Consider having a formal database for these types of documents
Hardware Tools
Cable crimpers
Pinch connector to a wire
Good for ethernet cables and other types as well
Wirestrippers and cable snips are also needed for installing these cables
Cable testers
Continuity test
Make sure pin 1 is connected to pin 1
2 to pin 2, ect
Simple devices, will simple readouts
TDR and OTDR
TDR for copper
OTDR for fiber
Lots of information
Estimated cable lengths
Find splice locations
Cable impedance information
Signal loss
Certify cable installations
Log everything
Locate breaks
Can be very costly
Need a person that knows how to properly use the tool
Punch down tools
Punch a wire into a wiring block (66 or 110 block)
Each wire must be punched down on its own
Can take time
Keep things organized
Make sure to keep the twists as close as possible to the block itself, don't do a lot of untwisting
Light meter
For fiber to see how much light is making it all the way through the fiber run
Very useful for testing very long fiber runs
Tone generator
Sends a tone down the cable so you can easily find the other end of the cable
Useful when working with large amounts of cabling
Loopback plug
Loop the signal coming out of a device back into the same device
Can test all types of connections
This is not a crossover cable
Multimeters
Check AC and DC voltage
Continuity tests to see if connections are working
Wire mapping
Spectrum analyzers
Examine all of the frequencies coming from wireless networks in the area
Helps when checking for interference
Software Tools
Protocol analyzer
Gathers every frame on the network
Wireshark
Or even built-in tools
Solve complex application issues
Good for finding security issues as well
Port scanner
Scan for IP addresses and open ports
OS and service information as well
Nmap is the most popular one
And Zenmap
Can graphically see the results on some port scanners
Good for finding rogue devices
Wireless packet analysis
Wireless networks are very easy to monitor
You can't hear the network if you are transmitting so turn that off
Need the right hardware to capture this information
Gather lots of data from the network
Speed test sites
Bandwidth testing, or ping testing
Very easy to use
Useful when comparing the impact of changes you made
Command Line Tools
Ping
See if a device is reachable using ICMP
Determine round trip time between devices
Traceroute / tracert
Map the entire path to a device
Uses ICMP
Many different options and control over how exactly this happens
NS lookup and Dig
Look up information from DNS servers
Names, ip addresses, cache timers, ect
NS look up is on almost any OS
Not really used anymore
DIg
More advanced than NS look up
Much more common today
Ipconfig and ifconfig
ipconfig for windows and ifconfig for linux and mac
Lots of IP details can be seen here
iptables
A stateful firewall for linux
Advanced filtering by all sorts of things
IP address, port, application, content, ect
netstat
Network statistics for many OS
-a shows all active connections
-b shows binaries (windows)
tcpdump
Capture packets from the command line
Included in linux and mac and windows has its own version called windump
Apply filters and view in real time
Save the data to use later
Readable by things like wireshark
Lots of data to shift through
Pathping
For windows
Both ping and traceroute in one (also adds a few things)
All of this happens in 2 phases
First phases run a traceroute
Second phase measures the round trip time and packet loss at each hop along the way
Nmap
Network mapper, port scanner, OS sanners, services scan
It is all types of things in one with tons of options of what you can do
NSE is a scripting language you can use to extend its capabilities
Route / route print
View the devices routing table
arp
Determine MAC address based on IP address
arp
arp -a
Wired Network Troubleshooting
Signal loss
Signal strength diminishes over distance
This is signal attenuation
Happens with wireless networking, copper, and fiber
dB is the measurement of signal strength
Common symptoms
No connectivity
Intermittent connectivity
Poor performance
Good to have a TDR or OTDR for troubleshooting this
Latency
Waiting time (some is normal)
Examine the response time of an application with all types of tools
Packet captures, protocol analyzers, ect
Jitter
When data does not arrive at regular intervals
Really bad for real time information because if the packet is dropped it is gone forever
Jitter itself is the time between frames
A high number can lead to a choppy voice call
Troubleshooting it
Confirm that you have enough bandwidth
Make sure your hardware is fast enough for real time interaction
Make sure to use QoS to help with jitter
Crosstalk (XT)
Signals on one circuit affect another in a bad way
Causes interference
Measure it with a TDR
NEXT is near end crosstalk
Crosstalk at the transmitting end
FEXT Far end crosstalk
At the receiving end
Troubleshooting it
Almost always a wiring issues
Maintain twists
Check your crimp
Use a shielded cable if needed
6A for increased cable diameter
Always test and certify your installations
EMI and interference
Cable handling
Don't twist, pull, or stretch cables too much
Watch your bend radius
Don't use staples
EMI is anywhere there is a power source
Always test with a TDR after installation
Open and Shorts
Short circuits
When two connections are touching
Some communication may still occur (inconsistently)
Open circuits
When the cable is broken completely
No communication can occur
Troubleshooting them
May be hard to find where the problem is
Replace the cable (hard to repair)
TDR helps find the location of the issue
Pin-outs
When they are incorrect, you may have a slow link or a link that does not work at all
Cable testers are good for verifying the pinouts
2 popular ways of doing pinouts
T568A
T568B
Incorrect cable type
Outside of the cable is likely labeled with some helpful information
TDR is also good for making sure the labing is correct and getting more info
Troubleshooting interfaces
Interface errors may indicate a hardware issue
Verifying the configurations to make sure they are set correctly
Verify two way traffic connectivity
Transceiver mismatch
Transceivers need to match the fiber type (single mode, multi mode) and the wavelength
Check across the entire link that you have the right transceiver
Reversing transmit and receive
Wiring mistake
Easy problem to catch (visually or with a cable tester)
Some internet hardware can automatically fix this in software so everything still works (Auto-MDIX)
Damaged cables
Cables can be out in the open and easily damaged
Hard to see inside the cable so you may need a TDR
Bottlenecks
One or more of the devices in the network are much slower than the others bring down the performance significantly
Must continue to monitor all of these to find the slowest ones
A baseline is good to help with find abnormality
Interface configuration problems
Could cause poor throughput or no connectivity at all (with or without link lights)
Some people prefer to set this up manually instead of automatically
Settings need to match on both sides for it to work properly
VLAN configuration
May have a link light no internet surfing
Automatically IP’s have the wrong subnet and manual assignment won’t work
Check the VLAN config on the switch itself
Duplex and speed mismatch
Incorrect speed will lead to performance issues, slowing down everything
Incorrect duplex will also cause significant slowdowns
Wireless Network Troubleshooting
Reflection
Signals can bounce off some surfaces
Too much of this and the signal will be weaker
Changing the location of the antennas and where they are pointed could help solve this
Not as big of a problem when using MIMI in 802.11n or 802.11 ac
Refraction
Signal passes through an object and exits the object at a different angle
Can affect data rates
For long links the most
Absorption
Passes through an object and loses a bit of signal
Changes how much this happens based on the material it is passing through and the frequency used
Put the antennas on the ceiling to try and avoid most walls
Latency and Jitter
The delay between transmitting and receiving the response is latency
Jitter is an unpredictable data stream and inconsistent intervals
There is more interference and signal issues on wireless networks because everything could conflict with everything else
May run into these problems when there are too many people on the network
Attenuation
Signal gets weaker as you move away from the AP
Measured with a WI-FI analyzer
Control the power output if it is an option
Use a higher gain antenna
Move closer to the antenna
Interference
Something else is using the same frequency
Can be predictable or unpredictable
Multi tenant buildings are very unpredictable
Use netstat -s or performance monitor in windows to measure this
Incorrect antenna type
Must fit the room and the situation
Omnidirectional
Good on the ceiling, poor between buildings
Directional
Good for connecting two points together, or for a wall mounted AP
Incorrect antenna placement
Don't put AP too close to each other
Don't put AP too far away from your users
Make sure to check frequencies and channels you are using
Hard to make sure channels don't overlap in 2.4GHZ because there are only so many channels to work with
Overcapacity
Hitting the limit of devices you can use
5GHZ can help with this
Bandwidth saturation
Not enough bandwidth
Large environments suffer from this a lot more
Frequency mismatch
Devices need to match the AP
May not operate properly
Mixing standards can cause issues with performance
SSID (Service set identifier)
Indicates the name of the wireless network
Make sure to connect to the correct one
Wrong passphrase
Wireless authentication through many methods
A single shared passphrase may get you into the network (not common on large enterprise networks)
For enterprise things like 802.1X would authenticate you to the network
Different credentials for each person
Security type mismatch
Encryption on wireless networks is very important
Make sure the client matches the AP
Much easier these days since most things use WPA2 for this
Signal to noise ratio
What to you to what you don't want ratio
A very large ration is best
Equal amounts of each would be terrible
Network Service Troubleshooting
Names not resolving
Web browsing and other applications will not work
Try to ping IP addresses to make sure it is not a connection issue
Check all of your IP settings (IP, subnet mask, default gateway, DNS server IP addresses, ect)
Use nslookup or dig to test if you can get a response from the DNS server
IP configuration issues
Can’t communicate outside the subnet, no communication at all, or can only communicate to some IP addresses on your subnet
Assure that you have the correct information (Ip address, subnet masks, gateway, ect)
Traceroute and ping to try and see if the issue is you or something else in your infrastructure
Duplicate IP addresses
Static assignment must be the very organized
DHCP could make a mistake, overlap, or be rogue causing issues
Most modern OS have systems in place to prevent duplicate IPs
Troubleshooting them
Check the manually configured ones first
Ping the IP addresses
Capture the DHCP process
Duplicate MAC addresses
Not common
Could be someone messed up a manual config
Could be a manufacturing error but that is VERY rare
Could be man in the middle attack
Likely causes intermittent connectivity
Expired IP address
A device failed to be able to renew its IP address
Could be a issue with a DHCP server
Not functioning right
No available IP addresses
Rogue DHCP server
Could make someone have an invalid or duplicate IP address
Enable security on your switch to stop this
DHCP snooping
Authorized DHCP servers in Active Directory
Disable any Rogue DHCP you find and make sure to not keep any IP addresses they may have assigned
Untrusted SSL certificate
Browsers don’t trust the certificate
Look at the Certificate details for the issuing CA and compare it to the trusted list of CA’s on your computer
Incorrect time
Lots of things, especially security is time sensitive
Kerberos, Active Directory and more
Exhausted DHCP scope
No more addresses in the pool so you get an APIPA address
Add more addresses if possible to avoid this
IPAM can report and monitor on IP address shortages
Lowering the lease time can also help if you have a lot of users coming and going from your network
Blocked TCP/UDP ports
Applications not working because the traffic can’t get through
Especially new applications may have issues
Confirm this is the issue with a packet capture
Could run a traceroute tool to see how far your packet can go to find where the filtering is occuring
Incorrect host-based firewall setting
Also will cause applications to not work
Filtering on your device
Check the settings of your firewall (might need to be done by an admin)
Could be centrally administered
Packet capture from an external device could give you more information on the firewall and its filtering
Incorrect ACL settings
Only some IP addresses may be accessible
Confirm with packet capture that this is indeed the issue
Tracerout could also help with identifying the point of no return
Unresponsive service
No answer at all
Make sure your port number and protocol is correct
Confirm that there is connectivity
Ping or traceroute
Could try and use Telnet to see if it responds
Hardware failure
No response
Confirm connectivity
Ping and traceroute likely won't work
Check the server itself
© 2023 GitHub, Inc.
Terms
Privacy
Security
Status
Docs
Contact GitHub
Pricing
API
Training
Blog
About
History
Fork
1
Star
1
Download
Study collections