M1 - Intro to networks • Identify types of applications and protocols used on a network • Distinguish between the client-server and peer-to-peer models used to control access to a network • Describe various networking hardware devices and the most common physical topologies • Describe the seven layers of the OSI model • Explore best practices for safety when working with networks and computers • Describe the seven-step troubleshooting model for solving a networking problem Key Terms • Active Directory (AD) • Active Directory Domain Services • (AD DS) • API (application programming interface)call • Application layer • ARP (Address Resolution • Protocol) • backbone • bandwidth • best-effort protocol • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • bus topology call tracking system CAN (campus area network) catastrophic failure client-server applications client-server network model connectionless protocol connection-oriented protocol convergence Data Link layer Data Link layer address datagram decapsulation delay-sensitive demarc demarcation point domain electrostatic discharge (ESD) emergency alert system encapsulation fail close fail open file server file services fire suppression system fragmentation frame FTP (File Transfer Protocol) global account grounding hardware address header heating, ventilation, and air conditioning (HVAC) system host HTTP (Hypertext Transfer Protocol) HTTPS (HTTP Secure) hybrid topology ICMP (Internet Control Message Protocol) IMAP4 (Internet Message Access Protocol, version 4) IP (Internet Protocol) IP address knowledge base Layer 2 switch • • • • • • • • • • • • • • • • • • • • Link layer Link layer switch local account local area network (LAN) logical topology loss-tolerant MAC (Media Access Control) address MAN (metropolitan area network) material safety data sheet (MSDS) multicast distribution network network adapter network interface card (NIC) Network layer network operating system (NOS) network services node onboard network port Troubleshooting Network Problems • Describe the steps involved in an effective troubleshooting methodology • Follow a systematic troubleshooting process to identify and resolve networking problems • Document symptoms, solutions, and results when troubleshooting network problems • Use a variety of software and hardware tools to diagnose problems Troubleshooting Network Problems • Methodical, logical troubleshooting methodology • Key to solving network problems • Troubleshooting tools o Tone generator, tone locator o Multimeters o Cable continuity testers o Cable performance tester o Voltage event recorder o Butt set o Network monitors and protocol analyzers o Wireless network testing tools Key Terms Baseline A record of how a network operates under normal conditions (including its performance, collision rate, utilization rate, and so on). Baselines are used for comparison when conditions change. Butt Set A tool for accessing and testing a telephone company’s local loop. The butt set, also known as a telephone test set or lineman’s handset, is essentially a telephone handset with attached wires that can be connected to local loop terminations at a demarc or switching facility. cable checker See continuity tester. Cable performance tester A troubleshooting tool that tests cables for continuity, but can also measure cross talk, attenuation, and impedance; identify the location of faults; and store or print cable testing results. cable tester A device that tests cables for one or more of the following conditions: continuity, segment length, distance to a fault, attenuation along a cable, near-end cross talk, and termination resistance and impedance. Cable testers may also issue pass/fail ratings for wiring standards or store and print cable testing results. call tracking system A software program used to document technical problems and how they were resolved (also known as help desk software). change management system A process or program that provides support personnel with a centralized means of documenting changes made to the network. Network Services IPv4 configuration relies on a number of network services which are normally implemented on servers DHCP – Assigns addresses – what is? What is opposite? DNS (what is?) – Resolves computer names (Fully Qualified Domain Names) to IP addresses and vice versa APIPA (Automatic Private IP Addressing )– Configures a private IP address if the DHCP server is unavailable (implemented by the client) – 169.254.x.x address NAT (what is?) – Allows devices on private networks to gain access to the internet through one public IP address IP addressing •IPv4 • Decimal representation of a 32 bit, 4 octet sets separated by dots. •Binary numbers • Represented by either a 1 or a 0 Classful IP Addressing ABC Subnetting Breaking /24 networks in to smaller chunks /26 and /27 What masks do each have? What does 255 represent? Do conversions Class A network – large number of hosts Class B – medium number of hosts Class C – small number of hosts FH, LH, GW, BC address Subnetting Breaking /24 networks in to smaller chunks /26 and /27 Virtualisation and VLANs Describe methods of network design unique to TCP/IP networks, including subnetting, CIDR. Explain virtualization and identify characteristics of virtual network components Describe techniques for incorporating virtual components in VLANs Explain the advanced features of a switch and understand popular switching techniques, including VLAN management Identify methods of combining VM and VLAN technologies Key Terms access port BID (Bridge ID) BPDU (Bridge Protocol Data Unit) BPDU filter BPDU guard bridged mode CAPWAP (Control and Provisioning of Wireless Access Points) CIDR (Classless Interdomain Routing) CIDR block CIDR notation classful addressing classless routing control plane data plane default VLAN designated port DHCP relay agent extended network prefix guest host host-only mode HSRP (Hot Standby Routing Protocol) Hyper-V hypervisor in-band management ip helper-address KVM (Kernel-based Virtual Machine) LWAPP (Lightweight Access Point Protocol) magic number Management console MSTP (Multiple Spanning Tree Protocol) NAT mode native VLAN network controller network ID network number network prefix OpenFlow out-of-band management prefix mask root bridge root port route aggregation route prefix route summarization routing prefix RSTP (Rapid Spanning Tree Protocol) SAID (security association identifier) slash notation software defined networking (SDN) SPB (Shortest Path Bridging) stack master STP (Spanning Tree Protocol) supernet supernet mask supernetting tag thick AP thin AP TRILL (Transparent Interconnection of Lots of Links) trunk port trunking unmanaged switch virtual adapter virtual appliance virtual bridge virtual console virtual IP address virtual machine manager virtual server virtual switch virtual terminal virtual workstation VirtualBox virtualization VLAN (virtual local area network) VLAN hopping attack VLAN pooling VMware vNIC (virtual network interface card) VRRP (Virtual Router Redundancy Protocol) VTP (VLAN trunking protocol) Wi-Fi controller wireless controller WLAN controller Pen Testing and vulnerability scanning Pent test concepts Reconnaisance (active / passive) Pivot Initial Exploitation Persistence Elevation of privilege Testing Security controls Vulnerability identification Identify/by pass security controls Common misconfigurations Scanning (cred v non-cred)