Table of Contents
CompTIA Network+ Study Guide by Todd Lammle Index
Return to CompTIA Network+ Study Guide by Todd Lammle Table of Contents, CompTIA Network+ Study Guide by Todd Lammle, CompTIA Network+, CCNA Certification Study Guide by Todd Lammle Index, CompTIA, CCNA, Cisco, CompTIA Bibliography
A
A record (address record), 155, 156
-a switch, 858, 866
-A switch, 860
AAAA record (quad-A record), 155, 156
absorption, unbounded media and, 791
AC (alternating current), 763
acceptable-use policy (AUP), 512, 678
access control hardware, as a prevention method, 643
access control lists (ACLs) about, 589
hardening and, 615–616
access control vestibules (mantraps), 599, 644–645
access point (AP) about, 133, 142–143
configuring, 443–447
rogue, 452, 591–592
Access Point mode, 444
access ports, 389
acknowledgements, Transport layer and, 42–43
ACLs. See access control lists (ACLs)
acoustical detection systems, 640
Active Directory, 167
Adaptive Security Appliance (ASA), 542
address record (A record), 155, 156
Address Resolution Protocol (ARP) about, 211, 215–217, 242, 310
inspection, 397–398
spoofing, 590
table, 845
using, 845–846
administrative distances (AD), 327–329
administrator training, as a prevention method, 642–643
Advanced Research Projects Agency (Department of Defense), 188–189
AH (Authentication Header), 219
air flow, device placement and, 710
alerts, interface, 486–488, 734–736
alternating current (AC), 763
American National Standards Institute/Telecommunications Industry Association (ANSI/TIA), 715
American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE), 544
amplified/reflected attacks, 587–588
analog modulation, 50
angled physical contact (APC), 67–68
Anomali ThreatStream, 574
ANSI/TIA (American National Standards Institute/Telecommunications Industry Association), 715
ANT+, 441
antennas placement of, 618–619
anycast, 245
AP. See access point (AP)
APC (angled physical contact), 67–68
APIDS (application protocol based IDS), 142
APIPA (Automatic Private IP Addressing), 196, 241
APIs. See application programming interfaces (APIs)
Application layer. See also Process/Application layer about, 36–37, 656
DHCP as Application layer protocol, 151, 159
features of, 35
proxy server as operating on, 160
some firewalls as operating up to, 141
application plane, 667
application programming interfaces (APIs) about, 666–667
northbound, 669
southbound, 667–669
application protocol based IDS (APIDS), 142
applications cable, 748–749
video, 690–691
application-specific integrated circuit (ASIC) about, 370–371
hardware, 153, 175
architecture, network, 12–14
archives, 696–697
ARP. See Address Resolution Protocol (ARP)
arp -a, 288
ARPAnet, 188–189
AS (autonomous system), 317, 326
ASA (Adaptive Security Appliance), 542
ASBR (autonomous system border router), 342
ASHRAE (American Society of Heating, Refrigerating and Air-Conditioning Engineers), 544
ASIC. See application-specific integrated circuit (ASIC)
asset management, 675
asymmetrical routing, 804
AT&T, 436–438
Attachment Unit Interface (AUI) connectors, 110
attacks about, 582, 600
ARP spoofing, 590
deauthentication, 594
denial-of-service (DoS), 453, 583–588
distributed denial-of-service (DDoS), 583–588
DNS poisoning, 589
environmental, 598–600
evil twin, 592–593
human, 598–600
MAC spoofing, 594
malware, 594–598
on-path (man-in-the-middle), 588–589
password, 593
phishing, 599
ransomware, 593
review questions, 602–603, 927–928
rogue access point (AP), 591–592
rogue DHCP, 590–591
social engineering, 598–599
technology-based, 582–598
attenuation, 76, 749, 783–784
audit and assessment report, 526–527
AUI (Attachment Unit Interface) connectors, 110
AUP (acceptable-use policy), 512, 678
authentication, authorization, and accounting (AAA), 568
authentication and authorization authentication, authorization, and accounting (AAA), 568
considerations, 631
802.1X, 571–572
Extensible Authentication Protocol (EAP), 572–573
Kerberos, 570–571
Lightweight Directory Access Protocol (LDAP), 570
local, 571
methods of, 567–573
multifactor authentication (MFA), 567–568
Remote Authentication Dial-In User Service (RADIUS), 568
Terminal Access Controller Access Control System Plus (TACACS+), 568–569
Authentication Header (AH), 219
authorization. See authentication and authorization
Automatic Private IP Addressing (APIPA), 196, 241
automation, 705
autonomous system (AS), 317, 326
autonomous system border router (ASBR), 342
availability about, 727, 739
baseline, 736–737
in CIA triad, 562
interface statistics/status, 733–734
performance metrics/sensors, 727–728
review questions, 741–744, 933–934
uptime, 738
B
backbone about, 658
collapsed, 368
network, 22–23
background checks, 517
backups about, 696–697
security and, 518
bandwidth speed testers, 829–830
bandwidth throttling, 694
barriers, signal degradation and, 438
baselines about, 199, 495
configurations, 527–528
network monitoring and, 676
basic firewall, 132. See also firewalls
basic router, 132. See also routers
basic service area (BSA), 433–434
basic service set (BSS), 433–434
basic switch, 132, 136–137. See also switches
battery testing, 492–493
baud rate, 99
Baudot, Jean-Maurice-Émile, 99
BCP (business continuity plan), 510–511
bend radius limitations, 786
bent pins, 751, 785
Berkeley Software Distribution (BSD) series, 189
BGP (Border Gateway Protocol), 318, 326, 338–340
bidirectional communication, 69–70
bidirectional wavelength-division multiplexing (WDM), Ethernet over, 117
binary conversion, 102–106
binary IP address method, 234
binding, 33
biometrics, as a prevention method, 643
BIX block, 87
BLE (Bluetooth Low Energy), 439–440
blind test, 575
block acknowledgement, 425
Bluetooth, 438–440, 441
Bluetooth Low Energy (BLE), 439–440
BNC connectors, 61
bonding ports, 399–401
Bootstrap Protocol (BootP), 194
Border Gateway Protocol (BGP), 318, 326, 338–340
botnets, 583–584
bottlenecks, 785
bounce, 790
BPDUs (Bridge Protocol Data Units), 379, 399
BPL (Broadband over Power Line), 115–117
branch office data center, 660–661
Bridge Protocol Data Units (BPDUs), 379, 399
bridges, 132, 135–136, 172, 173, 175–177, 369
bridging about, 172
Bring Your Own Device (BYOD) policy, 513, 805
broadband, 99
Broadband over Power Line (BPL), 115–117
broadcast, use of term, 241–242
broadcast domain, 97, 136, 140, 151, 169, 170–174, 176, 177, 242, 243, 264, 383
broadcast storms, 813
brute-force attacks, 593
BSA (basic service area), 433–434
BSD (Berkeley Software Distribution) series, 189
BSS (basic service set), 433–434
buffer, 40
building layout, emergency procedures and, 684
business continuity plan (BCP), 510–511
business risk assessments, 575
butt set, 761
BYOD (Bring Your Own Device) policy, 513, 805
bytes, 102–103, 867
C
-c switch, 860
CAA (Certificate Authority Authorization) record, 156
cabinets, locking, 644
cable connectivity about, 747, 765
applications, 748–749
butt set, 761
certifiers, 755–756
considerations, 747–748
fiber fusion splicer, 764
metrics, 760–761
multimeter, 757–758
optical time-domain reflectometer (OTDR), 756–757
review questions, 767–770, 934–935
specifications and limitations, 747
tap, 760
time-domain reflectometer (TDR), 756
toner generator (probe), 759–760
voltage event recorder (power), 763–764
cable trays, device placement and, 710–711
cables categories of, 63–65, 109–110
coaxial, 60–62
copper, 70
crossover, 80, 81–82
DB-25, 75
distance of, 76
duplex of, 77
Ethernet, 62–65, 110–114
feeder, 86
fiber-optic, 66–71
frequency of, 77–78
managing, 709
multimode fiber-optic (MMF), 67
network, 21
noise immunity of, 77
patch, 80
plain old telephone service (POTS), 63
plenum-rated coating of, 60
properties of, 76–78
public switched telephone network (PSTN), 63
Recommended Standard 232 (RS-232), 74–75
rolled/rollover, 83
serial, 74–76
shielded twisted-pair (STP), 62
single-mode fiber-optic (SMF), 67
straight-through, 80
T1 crossover, 83–85
Thin Ethernet (thinnet), 60
tips for, 66
transmission speeds of, 76
troubleshooting, 782–786, 817–818
25-pair, 86
twinaxial, 62
twisted-pair, 62
Universal Serial Bus (USB), 75–76
unshielded twisted-pair (UTP), 62, 63–65, 65–66, 82, 109
caching proxy server, 161
CAD (computer-aided design), 671
cameras, 133, 167, 517, 639–640
canonical name (CNAME) record, 156–157
capacitance detector, 641
Cap/Cap A virus, 597
captive portal, 621
CAPWAP (Control and Provisioning of Wireless Access Points), 436, 452
CARP (Common Address Redundancy Protocol), 697
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), 144–146, 421–422, 784
Carrier Sense Multiple Access with Collision Detection (CSMA/CD), 97–98, 135, 146
C&C (command and control), 583–584
CCTV (closed-circuit television), 640
CDMA (code division multiple access), 418
cellular technologies, 418–419
Central Processing Unit (CPU) metrics for, 472
usage, 728
Certificate Authority Authorization (CAA) record, 156
certificates, security and, 460–462
certification testers, 755–756
certifiers, 755–756
change management about, 508–510
policies for, 679
procedures for, 715–717
channel service unit/data service unit (CSU/DSU), 49
channels, overlapping/mismatched, 787–788
chip creep, 472
Chrome, Application layer and, 36
CIA triad, 561–562
CIDR (Classless Inter-Domain Routing), 244, 266–268
circuit labeling, 714
circuits, 494, 710
Cisco about, 369, 400, 436, 539
Hot Standby Router Protocol (HSRP), 344–345, 346–350
routers, 170
switch, 137, 138–139
Cisco Unified Wireless Network (CUWN), for mitigating ad hoc networks, 453
The Cisco CCNA Study Guide (Lammle), 878
cladding, 67
Class A addresses, 236–237, 240
network, 235
subnetting, 940–945
Class B addresses, 238, 240, 278–286
network, 235
Class C addresses, 238–239, 240, 268–278
network, 235
Class of Service (COS), 693–694
Classless Inter-Domain Routing (CIDR), 244, 266–268
classless routing, 275, 332, 333, 338, 340
CLNS (Connectionless Network Service), 343, 344
closed-circuit television (CCTV), 640
cloud computing about, 661–663
concepts, 704
Cluster Management Protocol (CMP), 540
clusters, redundancy and, 538–542
CNAME (canonical name) record, 156–157
coaxial cable, 60–62
code division multiple access (CDMA), 418
collapsed backbone, 368
collision domain, 96–97, 135–136, 143, 144, 150, 153, 169, 170–177
collision event, 96
collision light, 778
collisions, 18, 784
colocation, 660–661
Combine, 574
command and control (C&C), 583–584
Common Address Redundancy Protocol (CARP), 697
Common Vulnerabilities and Exposures (CVE), 563
Common Vulnerability Scoring System (CVSS), 563
communication bidirectional, 69–70
connection-oriented, 38–39
full-duplex, 77
half-duplex, 77
local area network (LAN), 94–96
Session layer and, 37
Compaq, 378
compliance, 688
computer-aided design (CAD), 671
Confidentiality, in CIA triad, 561
Connectionless Network Service (CLNS), 343, 344
connection-oriented communication, 38–39
connectivity common devices for, 132–152
options for, 705–706
software for, 831–832
specialized devices, 152–166
connectors about, 87
BNC, 61
D series, 75
dirty, 786
fiber-optic, 68–69
F-type, 60, 61–62
latched, 69
mechanical transfer registered jack (MT-RJ), 70–71
registered jack (RJ), 65–66, 109
review questions, 89–92, 909–910
square, 68–69
straight tip (ST), 68–69
subscriber, 68–69
consent to monitoring, 678
contention methods, 133, 144–146
continuity testers, 754
Control and Provisioning of Wireless Access Points (CAPWAP), 436, 452
convergence, STP, 380–381
coordinated attack, 585
copper cable, 70
COS (Class of Service), 693–694
course wavelength-division multiplexing (CWDM), Ethernet over, 117
CPU. See Central Processing Unit (CPU)
CRC (cyclic redundancy check), 107, 206, 212, 221, 223, 224, 310–314, 485, 487, 734, 735
crimping, 763
crossover cable, 80, 81–82, 748
crosstalk, 63, 783
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance), 144–146, 421–422, 784
CSMA/CD (Carrier Sense Multiple Access with Collision Detection), 97–98, 135, 146
CSU/DSU (channel service unit/data service unit), 49
CUWN (Cisco Unified Wireless Network), for mitigating ad hoc networks, 453
CVE (Common Vulnerabilities and Exposures), 563
CVSS (Common Vulnerability Scoring System), 563
CWDM (course wavelength-division multiplexing), Ethernet over, 117
cyclic redundancy check (CRC), 107, 206, 212, 221, 223, 224, 310–314, 485, 487, 734, 735
D
DA (destination address), 108
DaaS (Desktop as a Service), 664, 704
DAI (dynamic ARP inspection), 398, 609
DARPA, 189
data center architecture about, 653–654, 717–718
application layer, 656
application programming interfaces (APIs), 666–669
backbone, 658
branch office vs. on-premise data center vs. colocation, 660–661
distribution layer, 655
infrastructure layer, 656
management plans, 656–657
managing network documentation, 670–676
network monitoring, 676–688
network optimization, 689–717
network programmability, 665–666
review questions, 721–724, 931–932
software-defined networking, 655–658
spine-leaf-based two-tier networks, 657
data communication equipment (DCE), 49
data encapsulation, 220–224
Data Link layer about, 46–48
in data encapsulation, 221, 223
Ethernet and, 102–109
features of, 35
frames within, 107–109
in IP routing, 310, 312, 313, 314
Logical Link Control (LCC) within, 47
MAC address as residing on, 133
Media Access Control (MAC) within, 47
switches and bridges at, 175–177
data loss prevention (DLP), 519, 678
Data Over Cable Service Interface Specifications (DOCSIS) standard, 166
data (forwarding) plane, 609, 665, 667
data terminal equipment (DTE), 48–49
datagrams in data encapsulation, 221
defined, 670
dB (decibel) loss, 749, 783–784
DCE (data communication equipment), 49
DDoS (distributed denial-of-service) attacks, 583–588
deauthentication, 594
DEC (Digital Equipment Corporation), 378
decibel (dB) loss, 749, 783–784
decimal conversion, 102–106
de-encapsulation, 221
defense-in-depth strategy about, 564
honeypot, 567
Network Access Control (NAC), 566–567
network segmentation enforcement, 564–565
screened subnet (demilitarized zone), 565
separation of duties, 565–566
demarcation point (demarc), 23, 87
demilitarized zone (DMZ), 141, 142, 157, 517–518, 565
denial of service (DoS) attacks, 453, 583–588
dense wavelength-division multiplexing (DWDM), Ethernet over, 117–118
Desktop as a Service (DaaS), 664, 704
desktops, virtual, 701
destination address (DA), 108
device saturation, with unbounded media (wireless), 787
devices about, 178–179
automated graceful shutdown of attached, 491–492
before Layer 2 switching, 367–370
logs, 476–482
performance metrics/sensors for, 471–473
placement of, 710–714
review questions, 181–184, 911–913
sanitizing, 646–647
UC, 694
DFS (Dynamic Frequency Selection), 424
DHCP. See Dynamic Host Configuration Protocol (DHCP)
DHCP server. See Dynamic Host Configuration Protocol (DHCP) server
diagrams, 671–676
dictionary attacks, 593
Differentiated Services Code Point (DSCP), 693
DiffServ, 693
Diffusing Update Algorithm (DUAL), 337
Digital Equipment Corporation (DEC), 378
digital modulation, 50
Digital Subscriber Line (DSL), 23–24
Digital Subscriber Line (DSL) modem, 133, 153, 166
dipole antennas, 431
directional antennas, 431
direct-sequence spread spectrum (DSSS), 422
dirty connectors, 786
disaster recovery plan (DRP), 510. See also high availability (HA)
discards, 867
discontiguous networks, 335–336
distance limitation for cables, 76, 783–784, 786
signal degradation and, 438
distance-vector (DV) routing protocols, 318, 329, 330–340
distributed denial-of-service (DDoS) attacks, 583–588
distributed switching, 378
distributed WAN, 9
distribution layer, 655
distribution system (DS), 433
distributions, wiring, 85–87
divide-and-conquer approach, 806
DLP (data loss prevention), 519, 678
DMZ (demilitarized zone), 141, 142, 157, 517–518, 565
DNS. See Domain Name Service (DNS)
DNS amplification attack, 587–588
DNS poisoning, 589
DNS (Domain Name Service) server, 148, 152, 153–159, 193–194
DOCSIS (Data Over Cable Service Interface Specifications) standard, 166
documents and policies about, 507, 529
audit and assessment report, 526–527
baseline configurations, 527–528
business continuity plan (BCP), 510–511
change management, 508–510
common, 519–529
disaster recovery plan (DRP), 510
hardening and security policies, 511–519
logical network diagram, 524–525
memorandum of understanding (MOU), 529
monitoring and, 677–679
network, 670–676
nondisclosure agreement (NDA), 528
physical network diagram, 520–524
review questions, 531–532, 925–926
security, 678–679
service-level agreement (SLA), 529
standard operating procedures, 511
wiring diagram, 525–526
Domain Name Service (DNS) incorrect, 799
name resolutions and, 95
Domain Name Service (DNS) server, 148, 152, 153–159, 193–194
domains broadcast domain (See broadcast domain)
collision domain (See collision domain)
hierarchical tree structure of, 153
door locks/swipe mechanisms, 516
doorbells, smart doorbells, 133
DORA process, 196
DoS (denial of service) attacks, 453, 583–588
dotted-decimal IP address method, 234
authorized, 509, 717
planned, 535
planned vs. unplanned, 695, 738
DRP (disaster recovery plan), 510. See also high availability (HA)
DS (distribution system), 433
DSCP (Differentiated Services Code Point), 693
DSL (Digital Subscriber Line), 23–24
DSL (Digital Subscriber Line) modem, 133, 153, 166
DSSS (direct-sequence spread spectrum), 422
DTE (data terminal equipment) (Physical layer), 48–49
DTP (Dynamic Trunking Protocol), 388
DUAL (Diffusing Update Algorithm), 337
dual stacking, 252, 357
dumb terminals, 8
devices and, 483–484
issues with, 750–751
mismatch, 798
network, 733–734
DV (distance-vector) routing protocols, 318, 329, 330–340
DWDM (dense wavelength-division multiplexing), Ethernet over, 117–118
dynamic ARP inspection (DAI), 398, 609
dynamic ARP table entries, 845
dynamic assignment, 157
Dynamic Frequency Selection (DFS), 424
Dynamic Host Configuration Protocol (DHCP) as compared to Bootstrap Protocol (BootP), 194–196
DHCPv6, 251
snooping, 397, 613
Dynamic Host Configuration Protocol (DHCP) server about, 147–152
as common network connectivity device, 133
internal and external DNS, 159
rogue, 590–591, 800–801
third-party/cloud-hosted DNS, 160
dynamic routing, 307, 316–319
Dynamic Trunking Protocol (DTP), 388
E
-e switch, 866–867
EAP (Extensible Authentication Protocol), 460–461, 572–573, 620
EAP-FAST (Extensible Authentication Protocol - Fast), 461, 573
EAP-TLS (Extensible Authentication Protocol - Transport Layer Security), 461–462, 573
EAS (Emergency Alert System), 685
EGPs (exterior gateway protocols), 317, 318, 326
EIA/TIA (Electronic Industries Association/Telecommunications Industry Alliance) standards, 109
802.1X standards, 571–572. See also Remote Authentication Dial-In User Service (RADIUS)
802.11 standards, 441 about, 419–421
comparing, 427–428
EIGRP (Enhanced Interior Gateway Routing Protocol), 328, 336–338, 358
EIGRPv6, 358
elasticity, 707
automated graceful shutdown of attached devices, 491–492
flooding, 495
periodic testing of batteries, 492–493
uninterruptible power supply (UPS), 490–491
electromechanical systems, 640
Electronic Industries Association/Telecommunications Industry Alliance (EIA/TIA) standards, 109
electrostatic discharge (ESD), 682
Emergency Alert System (EAS), 685
employee training, as a prevention method, 642–643
Encapsulating Security Payload (ESP), 219–220
encapsulation defined, 32
errors with, 488, 735
introduction to, 49–50
encryption devices, 152, 162–163
encryption/security type mismatch, 787
end-user training, as a prevention method, 642
Enhanced Interior Gateway Routing Protocol (EIGRP), 328, 336–338, 358
enhanced small form-factor pluggable (SFP+) transceiver, 72
environmental attacks, 598–600
environmental factors/sensors, 489–495, 735–736, 790
environmental monitors, 489–490
EPA (US Environmental Protection Agency), 544–545
equipment access locating and installing, 708–715
security and, 516
Ericsson, 439
errors displaying, 867
interface, 486–488, 734–736
operator, 779
QoS and, 692
ESD (electrostatic discharge), 682
ESP (Encapsulating Security Payload), 219–220
ESS (extended service set), 434
EtherChannel, 400
Ethernet about, 96–102, 118–119
addressing within, 106–107
baud rate of, 99
broadband, 99
broadcast domain within, 97
carrier sense multiple access with collision detection (CSMA/CD), 97–98
collision domain within, 96–97
Data Link layer (OSI reference model) and, 102–109
defined, 96
Fast, 110–114
frames of, 107–109
full-duplex, 100–102
half-duplex, 100–102
number conversions within, 102–106
over bidirectional wavelength-division multiplexing (WDM), 117
over Broadband over Power Line (BPL), 115–117
over course wavelength-division multiplexing (CWDM), 117
over dense wavelength-division multiplexing (DWDM), 117–118
over HDMI, 117, 118
over Power Line Communication (PLC), 115–117
Physical layer (OSI reference model) and, 109–115
review questions, 124–127, 910–911
specifications for, 109
Ethernet loopback adapter (plug), 753
European Telecommunications Standards Institute (ETSi), 416
evil twin, 592–593
availability, 739–740
cable connectivity, 765
connectors, 88
data center architecture, 719–720
Ethernet, 119
Internet Protocol (IP), 224–225
IP address, 254, 298–299
IP routing, 319–320
Network Address Translation (NAT), 298–299
networking devices, 179–180
networks, 25
Open Systems Interconnection (OSI) model, 51–52
performance metrics/sensors, 498–499
routing, 359–360
security, 577
software tools and commands, 879
subnetting, 298–299
troubleshooting, 818–819
virtual local area network (VLAN), 406
wireless networking, 462–463
exploits, 563
extended service set (ESS), 434
Extensible Authentication Protocol (EAP), 460–461, 572–573, 620
Extensible Authentication Protocol - Fast (EAP-FAST), 461, 573
Extensible Authentication Protocol - Transport Layer Security (EAP-TLS), 461–462, 573
exterior gateway protocols (EGPs), 317, 318, 326
F
-f option (route command), 854
facilities support, 542–545
factory reset, 646
Fast Ethernet standards, 110–114
fault tolerance, 15, 696
fax server, 7
FCC (Federal Communications Commission), 416
FCoE (Fibre-Channel over Ethernet), 703
FCS (Frame Check Sequence), 108
FCS (Frame Check Sequence) field, 221, 222, 223, 310, 311, 312, 313, 314
FDM (frequency-division multiplexing), 50
FDMA (frequency-division multiple access), 418
FDPs (fiber distribution panels), 69
feasible successor, 338
Federal Communications Commission (FCC), 416
FHRP (first-hop redundancy protocol), 344–351, 541–542, 548–553, 552
fiber distribution panels (FDPs), 69
fiber fusion splicer, 764
fiber loopback adapter (plug), 753
fiber to coaxial converter, 73
fiber-optic cables about, 66–71
connectors for, 68–69
fiber-optic transceivers, 69–70
Fibre-Channel over Ethernet (FCoE), 703
FIFO (first-in, first-out) buffer, 694
File Transfer Protocol (FTP) about, 191, 706, 871–872
starting, 872–874
files downloading via FTP, 874–875
viruses in, 596
Firefox, Application layer and, 36
demilitarized zone (DMZ) of, 141, 142
incorrect host-based settings, 803
next-generation firewall (NGFW), 166
redundancy and, 542
rules for, 617–618
security and, 517
typical design of, 142
virtual, 700
first-hop redundancy protocol (FHRP), 344–351, 541–542, 548–553, 552
first-in, first-out (FIFO) buffer, 694
5G, 419
five-nines availability, 695
flat network, 383
flooding, 495, 804
floor plan, 523
flow control, Transport layer and, 39–41
forward/filter decision, 375–376
forwarding (data) plane, 667
forwarding port, 380
4G, 418–419
FQDN (fully qualified domain name), 193
frame, in data encapsulation, 221, 223
Frame Check Sequence (FCS), 108
Frame Check Sequence (FCS) field, 221, 222, 223, 310, 311, 312, 313, 314
frames within the Data Link layer (OSI reference model), 107–109
filtering, 375
incorrect, 788
frequency-division multiple access (FDMA), 418
frequency-division multiplexing (FDM), 50
friendly/unintentional DoS, 585
FTP. See File Transfer Protocol (FTP)
full tunneling, 628
full-duplex communication, 77, 483, 733–734, 750–751
fully qualified domain name (FQDN), 193
G
incorrect, 799
UC, 694
generators, 543
Generic Routing Encapsulation (GRE), 211, 218, 354
geofencing, 457, 620
giants, 488, 735
Gigabit Media Independent Interface (GMII), 110
gigabit wiring, 82
global positioning (GPS), 457, 620
Global System Mobile (GSM), 418
GMII (Gigabit Media Independent Interface), 110
GPS (global positioning), 457, 620
GRE (Generic Routing Encapsulation), 211, 218, 354
grounding, 682
GSM (Global System Mobile), 418
H
H.323 protocol, 204
HA. See high availability (HA)
half-duplex communication, 77, 415
three-way, 39
hardening about, 607, 621
best practices, 607–618
IoT access considerations, 621
review questions, 623–624, 928–929
security policies and, 511–519
hardware addressing of, 46
redundancy and, 538–542
troubleshooting, 780
hardware address, 95, 102, 211
HDMI, Ethernet over, 117, 118
heating, ventilation, and air conditioning (HVAC) sensors, 133, 167, 544, 686
Hello Timer (HSRP), 348–349, 551–552
hexadecimal conversion, 102–106
hexadecimal IP address method, 234
HIDS (host-based IDS), 132, 142
hierarchical addressing, 234–241
high availability (HA) about, 535, 555, 695
facilities and infrastructure support, 542–545
mean time between failure (MTBF), 554
mean time to repair (MTTR), 553–554
multipathing, 536–537
network device backup/restore, 554–555
network interface card (NIC) teaming, 537
recovery point objective (RPO), 554
recovery time objective (RTO), 554
redundancy and, 545–553
redundant hardware/clusters, 538–542
review questions, 557–558, 926
high throughput (HT), 426
high-bandwidth applications, 690–691
honeynets, 688
honeypots, 567, 688
hop count, 45, 327, 330, 331, 332, 333, 340, 341, 358
host-based IDS (HIDS), 132, 142
Hosts file, resolving names with, 850–851
Host-to-Host layer of DoD model, 189, 190
protocols of, 204–210
Transport layer also known as, 189, 190, 195
Hot Standby Router Protocol (HSRP), 344–350, 548–549, 551–552, 553, 697
hound, 761
HT (high throughput), 426
HTTP (Hypertext Transfer Protocol), 197
HTTPS (Hypertext Transfer Protocol Secure), 200
hub-and-spoke topology. See star topology
hubs access point (AP) as, 142, 143
as common network connectivity device, 132, 134, 135
considering replacing of with switches, 174
defined, 5
as older technology, 173
at Physical layer of SOHO network, 177–178
switches as compared to, 136, 174
use of as contributing to congestion, 172
humidity, as an environmental concern, 489
HVAC (heating, ventilation, and air conditioning) sensors, 133, 167, 544, 686
hybrid protocol, 318–319, 320, 327, 330, 332, 336, 338
Hypertext Transfer Protocol (HTTP), 197
Hypertext Transfer Protocol Secure (HTTPS), 200
hypervisor, 24, 698–699
I
IaaS (Infrastructure as a Service), 663–665, 704
IaC (Infrastructure as Code), 704–705
IBSS (independent basic service set), 432–433
ICMP (Internet Control Message Protocol), 211, 214–215, 309, 583
ICS (Industrial control system), 168, 686–687
ICSA, 515
IDF (intermediate distribution frame), 85, 524, 708
IDSs (intrusion detection systems), 132, 142, 454, 517, 584
IEEE. See Institute of Electrical and Electronics Engineers (IEEE)
IETF (Internet Engineering Task Force), 188
I/G (Individual/Group) address, 106
IGMP (Internet Group Management Protocol), 204
IGPs (interior gateway protocols), 317, 326, 343
IGRP (Interior Gateway Routing Protocol), 318, 329
IMAP (Internet Message Access Protocol), 198–199, 202
in-band management, 394, 631–632
incident response policies, 510, 678
independent basic service set (IBSS), 432–433
Individual/Group (I/G) address, 106
Industrial control system (ICS), 168, 686–687
InfiniBand, 703
information gathering, during site survey, 447
infrared (IR), 440, 441
infrared (IR) sensors, 640
Infrastructure as a Service (IaaS), 663–665, 704
Infrastructure as Code (IaC), 704–705
infrastructure layer, 656
infrastructure mode, 433–434, 453
infrastructure support, 542–545
inherent attenuation, 109
inside local address, 296
installation safety, 682–684
Institute of Electrical and Electronics Engineers (IEEE) about, 416
Data Link layer specifications of, 46–47
1905.1-2013, 115–118
organizationally unique identifier (OUI) by, 106
Project 802, 47–48
interface about, 45
configurations, 138–141
errors and alerts, 486–488, 734–736
incorrect, 800
misconfiguration, 800
statistics/status, 482–486, 733–734
interference cables and, 749, 784–785
signal degradation and, 438
with unbounded media (wireless), 786–787
interior gateway protocols (IGPs), 317, 326, 343
Interior Gateway Routing Protocol (IGRP), 318, 329
intermediate distribution frame (IDF), 85, 524, 708
Intermediate System-to-Intermediate System (IS-IS), 318, 328, 329, 340, 343–344
international export controls, 678
International Organization for Standardization (ISO), 681, 755–756
International Telecommunications Union (ITU), 476
Internet Control Message Protocol (ICMP), 211, 214–215, 309, 583
Internet Engineering Task Force (IETF), 188
Internet Group Management Protocol (IGMP), 204
Internet layer as describing same thing as Network layer, 189, 190
protocols of, 210–220
TCP as preparing data stream for, 205
Internet Message Access Protocol (IMAP), 198–199, 202
Internet of Things (IoT), 133, 168, 440–441, 621
Internet Protocol (IP) about, 211–214, 224, 687
defined, 44
review questions, 226–229, 913–914
terminology of, 233–234
troubleshooting IP addressing, 286–293
Internet Protocol Security (IPSec), 211, 218–219
Internet Relay Chat (IRC), 583–584
Internet Service Providers (ISPs), 547–548
Internet Small Computer Systems Interface (iSCSI), 702
internetwork, 137–138, 171, 172, 173, 175, 176
internetworking models about, 32–34
router within, 45
inter-VLAN communication, 386
intranet, 9
Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) tunneling, 356
intrusion detection systems (IDSs), 132, 142, 454, 517, 584
intrusion prevention systems (IPSs), 132, 142, 454, 585
inverters, 710
IoT (Internet of Things), 133, 168, 440–441, 621
IP. See Internet Protocol (IP)
IP address about, 253, 298
AP, 444
determining problems with, 289–293
duplicate, 799
expired, 800
hierarchical scheme for, 234–241
incorrect, 799
IP address management (IPAM), 152
network addressing, 235–239
review questions, 257–260, 300–304, 914–916
using, 675–676
VLAN Trunking Protocol (VTP) and, 394–396
written labs, 255–256, 299, 893–894
IP address management (IPAM), 152
IP cameras, 639
IP routing about, 319
process of, 309–314
review questions, 321–324, 918–919
testing your understanding of, 315–316
IPAM (IP address management), 152
ipconfig utility, 288, 483, 836–839
IPSec (Internet Protocol Security), 211, 218–219
IPSs (intrusion prevention systems), 132, 142, 454, 585
IPv4 (Internet Protocol version 4) address types, 241–243
address-exhaustion crisis of, 243, 244
header, 212, 245, 252
popularity of, 271
prolific use of broadcasts in, 245
use of with dual stacking, 252, 357
IPv6 (Internet Protocol version 6) about, 44
addressing and expressions in, 246
benefits of and uses for, 244–245
DHCPv6, 251
dual stacking, 252
introduction, 243
migrating to, 251
Neighbor Discovery Protocol (NDP), 353–354
router advertisement, 351–352
shortened expression in, 246–247
stateless address autoconfiguration (SLAAC), 249–250
why we need it, 244
IR (infrared), 440, 441
IR (infrared) sensors, 640
IRC (Internet Relay Chat), 583–584
ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) tunneling, 356
iSCSI (Internet Small Computer Systems Interface), 702
ISDN, 687
IS-IS (Intermediate System-to-Intermediate System), 318, 328, 329, 340, 343–344
ISO (International Organization for Standardization), 681, 755–756
isotropic antennas, 431
ISPs (Internet Service Providers), 547–548
ITU (International Telecommunications Union), 476
J
jitter about, 474, 729
cables and, 784
QoS and, 692
jumbo frames, 703
K
Kardach, Jim, 439
Kerberos, 570–571
Krone block, 86
L
labeling, 714–715
Lammle, Todd (author) The Cisco CCNA Study Guide, 878
website of, 59
LAN. See local area network (LAN)
latched connectors, 69
latency about, 176, 474, 729
cables and, 784
sensitivity, 690
Layer 1 device analog modem as, 163
hub as, 135
Layer 2 access point (AP) as operating at, 142
broadcasts, 177, 195, 242
DORA components as operating at, 151
NIC as, 133
as propagating layer 2 broadcast storms, 177
switch as, 136, 137, 138, 176
Layer 2 switching. See also virtual local area network (VLAN) about, 140, 141, 171, 175, 367, 405–406
limitations of, 371–372
networking before, 367–370
port mirroring/spanning (SPAN/RSPAN), 404–405
Power over Ethernet (PoE/PoE+), 401–404
review questions, 408–411, 921–922
services for, 370–378
Spanning Tree Protocol (STP), 378–382
design, 138, 140
Network layer as, 171
protocol, 218
switch, 137, 138, 153, 171
Layer 3 device as all about location, 176
multilayer switch as, 138, 153
router as, 137, 138, 175, 177, 211
layered approach, 33
layered architecture, 33
LBFO (load balancing/failover), 813
LCAP (Link Aggregation Control Protocol), 400–401
LCC (Logical Link Control) (Data Link layer), 47
lcd command, 875
LDAP (Lightweight Directory Access Protocol), 200, 202, 570
lease time, 150
least privilege, 563
LEDs. See Light-Emitting Diodes (LEDs)
legacy systems, 687
licensing restrictions, 678
lifting equipment, 682
light source of fiber-optic cables, 77
of multimode fiber-optic (MMF), 67
of single-mode fiber-optic (SMF) cables, 67
Light-Emitting Diodes (LEDs) in network interface cards (NICs), 134
Status Indicators, 750
Lightweight Access Point Protocol (LWAPP), 436, 452
Lightweight Directory Access Protocol (LDAP), 200, 202, 570
Link Aggregation Control Protocol (LCAP), 400–401
link-local address, 353
link-state advertisements or packets (LSAs or LSPs), 340
link-state (LS) routing protocol, 318, 329, 340–344
Linux, 596
load balancing, 133, 144, 327, 535–536, 695
load balancing/failover (LBFO), 813
local addresses, 296
local area network (LAN) about, 4–6
communication within, 94–96
traffic congestion, 169
local authentication, 571
locking cabinets, 644
log reviews, 476–480, 676, 731
logic bomb, 596
Logical Link Control (LCC) (Data Link layer), 47
logical network diagrams, 524–525, 675
login procedure/rights, troubleshooting, 776–777
Long-Term Evolution (LTE), 418
ls command, 875
LS (link-state) routing protocol, 318, 329, 340–344
LSAs/LSPs (link-state advertisements or packets), 340
LTE (Long-Term Evolution), 418
LWAPP (Lightweight Access Point Protocol), 436, 452
M
MAC. See Media Access Control (MAC)
MAC address. See Media Access Control (MAC) address
magnetic flux, 77
mail exchanger (MX) record, 155, 156
security and, 517
main distribution frame (MDF), 85, 524, 708
mainframes, 8
maintenance window, 509, 717
malware (malicious software), 594–598
MAM (mobile application management), 513
MAN (metropolitan area network), 9
Management Frame Protection (MFP), 453
Management Information Base (MIB), 199, 476
management plane, 609, 656–657
man-in-the-middle attack (on-path attack), 588–589
mantraps (access control vestibules), 599, 644–645
Master License Agreement (MLA), 680
Material Safety Data Sheet (MSDS), 684
maximum transmission unit (MTU), 798, 812
MDF (main distribution frame), 85, 524, 708
MDI/MDI-X (medium dependent interface/medium dependent interface-crossover), 782
MDM (mobile device management), 513
mean time between failure (MTBF), 554
mean time to repair (MTTR), 553–554
mechanical transfer registered jack (MT-RJ) connector, 70–71
Media Access Control (MAC) about, 47
defined, 102
efficiency, 425
Ethernet addressing and, 106–107
filtering, 618
spoofing, 594
Media Access Control (MAC) address about, 133, 136–137, 145, 149, 151, 216–217, 242, 246, 249–250, 310, 314–316, 344–345, 348, 373–374
authentication/MAC filtering, 455–457
duplicate, 800
virtual, 549–551
media converters, 72–74, 152, 165
Media Gateway Control Protocol (MGCP), 203
Media Independent Interface (MII), 110
medianets, 687
medium dependent interface/medium dependent interface-crossover (MDI/MDI-X), 782
Memorandum of Understanding (MOU), 529, 680
memory buffer within, 40
metrics for, 472–473, 728
metrics, 45, 728–730, 760–761. See also performance metrics/sensors
metropolitan area network (MAN), 9
MFA (multifactor authentication), 567–568
MFP (Management Frame Protection), 453
MGCP (Media Gateway Control Protocol), 203
mGRE (Multipoint Generic Routing Encapsulation), 12
MIB (Management Information Base), 199, 476
Michelangelo virus, 597
Microsoft Active Directory, 167
SQL Server, 202
Windows Internet Naming Service (WINS), 153
Microsoft Word, Application layer and, 37
MII (Media Independent Interface), 110
Mills, David, 198
MILNET, 189
MIMO (multiple-input, multiple-output), 425
missing routes, 811
mitigation ad hoc networks, 453
denial of service (DoS), 453
rogue access points (AP), 592
rogue APs, 452
MLA (Master License Agreement), 680
MLS (multilayer switch), 138, 152, 153
MMF (multimode fiber-optic) cable, 67
mobile application management (MAM), 513
mobile device management (MDM), 513
mobile devices, onboarding/offboarding, 677
DSL modem, 133, 153, 166
security and, 518
modulation techniques, 50–51, 422
modulator, 50
modules, bad, 812
monitors environmental, 489–490
MOU (Memorandum of Understanding), 529, 680
MPLS (Multiprotocol [[Label Switching), 11–12
MSDS (Material Safety Data Sheet), 684
MTBF (mean time between failure), 554
Mtr utility (pathping), 852–853
MT-RJ (mechanical transfer registered jack) connector, 70–71
MTTR (mean time to repair), 553–554
MTU (maximum transmission unit), 798, 812
multicast addresses, 242, 243, 691
multifactor authentication (MFA), 567–568
multilayer switch (MLS), 138, 152, 153
multimeter, 757–758
multimode fiber to Ethernet converter, 72–73
multimode fiber-optic (MMF) cable, 67
multipartite viruses, 597–598
multipathing, 536–537
multiple-input, multiple-output (MIMO), 425
Multipoint Generic Routing Encapsulation (mGRE), 12
Multiprotocol [[Label Switching (MPLS), 11–12
multitenancy, 706–707
Multiuser Multiple-Input, Multiple-Output (MU-MIMO), 425
MX (mail exchanger) record, 155, 156
MySQL, 203
N
-n switch, 860–861, 869–870
NaaS (Network as a Service), 702
NAC (Network Access Control), 513, 566–567, 677
name resolution, 153, 850–851
name server (NS) record, 156
naming conventions, 714
NAS (network attached storage), 703
NAT. See Network Address Translation (NAT)
National Fire Protection Association (NFPA), 60
National Security Agency (NSA), 515
NAT/PAT. See network address translation (NAT); port address translation (PAT)
NBIs (northbound interface) APIs, 669
nbstat utility, 857–863
NCP (Network Control Protocol), 188
NDA (nondisclosure agreement), 528, 679
NDP (Neighbor Discovery Protocol), 353–354
near-end/far-end crosstalk, 783
near-field communication (NFC), 440, 441
Neighbor Discovery Protocol (NDP), 353–354
neighbor table, 337, 340
Net8, 202
NetBIOS (Network Basic Input/Output System), 204
NETCONF, 668
NetFlow data, 496–498, 737–738
netmask, 856
NetWare services, 368
Network Access Control (NAC), 513, 566–567, 677
Network Access layer, of DoD model, 189, 190
Network Address Translation (NAT) about, 298
defined, 239
how it works, 296–298
introduction, 294–298
names in, 295–296
review questions, 300–304, 916–918
traffic and, 687–688
types of, 295
WAPs and, 429
network addresses about, 44
Class A addresses, 236–237, 240
Class B addresses, 238, 240, 278–286
Class C addresses, 238–239, 240, 268–278
defined, 235
Network as a Service (NaaS), 702
network attached storage (NAS), 703
Network Basic Input/Output System (NetBIOS), 204
network connection LED status indicators, 777–778
Network Control Protocol (NCP), 188
network device backup/restore, 554–555
network interface card (NIC) about, 132, 133–134, 430
configuring, 442–443
teaming, 537, 813
network interface device (NID), 87
network interface unit (NIU), 87
Network layer about, 43–46
in data encapsulation, 221
as describing same thing as Internet layer, 189, 190
features of, 35
interface within, 45
as layer 3, 171
metric within, 45
network addresses within, 44
responsibilities of, 223, 312
routers as using logical address in header of, 175
route-update packets within, 44
as working with Transport layer, 213, 221
Network Management System (NMS), 199, 475
Network Policy and Access Services (NPAS), 566
network segmentation defined, 169
enforcement of, 564–565
planning and implementing a basic SOHO network using, 168–178
Network Time Protocol (NTP), 152, 160, 198, 588, 805
networks about, 3–4, 24–25, 94–96
architecture, 12–14
backbone, 22–23
cables, 21
components of, 6–9
disabling unneeded services, 610
hosts, 8–9
implementing segmentation, 686–688
local area network (LAN), 4–6
managing documentation for, 670–676
metrics for, 473–474, 728–730
metropolitan area network (MAN), 9
monitoring, 676–688
Multipoint Generic Routing Encapsulation (mGRE), 12
Multiprotocol [[Label Switching (MPLS), 11–12
optimizing, 689–717
performance issues, 805
personal area network (PAN), 10
physical topologies, 14–21
review questions, 26–29, 906–907
segments, 23–24
selecting topologies, 22
servers, 6–8
software-defined wide area network (SDWAN), 11
storage area network (SAN), 10–11
virtual networking, 24
wide area network (WAN), 9–10
next-generation firewall (NGFW), 152, 166, 542
next-hop IP address, 856
NFC (near-field communication), 440, 441
NFPA (National Fire Protection Association), 60
NGFW (next-generation firewall), 152, 166, 542
nibble, 102
NIC. See network interface card (NIC)
NID (network interface device), 87
Nimda virus, 596
1905.1-2013 (IEEE) standards, 115–118
NIU (network interface unit), 87
NMS (Network Management System), 199, 475
nondisclosure agreement (NDA), 528, 679
nonpersistent agents, 566–567
non-volatile RAM (NVRAM), 614
northbound interface (NBIs) APIs, 669
notifications security and, 516
security information and event management (SIEM), 576
Novell, 368
NPAS (Network Policy and Access Services), 566
NS (name server) record, 156
NSA (National Security Agency), 515
NTP (Network Time Protocol), 152, 160, 198, 588, 805
NVRAM (non-volatile RAM), 614
O
Object Identifiers (OIDs), 476
octet, 102–103
off site virtual networking, 698
offboarding of mobile devices, 677
policy for, 513–514
OIDs (Object Identifiers), 476
omni directional antennas, 431
on site virtual networking, 698
onboarding of mobile devices, 677
policy for, 513–514
110 block, 86
1000BaseT4, 674
onePK, 668
one-to-many, 242
on-path attack (man-in-the-middle attack), 588–589
on-premise data center, 660–661
Open Impedance Mismatch (echo), 784
Open Shortest Path First (OSPF) as link-state protocol, 329, 340–343
OSPFv3, 359
use of, 328
Open Systems Interconnection (OSI) reference model about, 34–36, 51, 153, 188, 189, 190
advantages of, 34
Application layer of, 35, 36–37
Data Link layer of, 35, 46–48
as hierarchical, 33
Network layer of, 35
origin of, 32
Physical layer of, 35, 48–49
Presentation layer of, 35, 37
protocols of, 37
review questions, 53–56, 907–908
Session layer of, 35, 37
Transport layer of, 35, 37–38, 38–39, 39–41, 41–42, 42–43
OpFlex, 668–669
optical cables, 751
optical link budget, 804
optical time-domain reflectometer (OTDR), 756–757
Oracle, 202
orchestration, 705
organizationally unique identifier (OUI), 106
OSFP. See Open Shortest Path First (OSPF)
OSI. See Open Systems Interconnection (OSI) reference model
OSPFv3, 359
OTDR (optical time-domain reflectometer), 756–757
OUI (organizationally unique identifier), 106
out-of-band management, 394, 631–632
out-of-order delivery, QoS and, 692
outside local address, 296
overcapacity, unbounded media and, 789
overhead, 39
overloading, 295, 297
P
-p option (route command), 855
-p switch, 868–869
PaaS (Platform as a Service), 663–665, 704
packet, in data encapsulation, 221, 223
Packet InterNet Groper (ping), 288
packet shaper, 152, 164
packet shaping, 694
PAgP (Port Aggregation Protocol), 400–401
Palo Alto Networks AutoFocus, 574
PAN (personal area network), 10
Pan/Tilt/Zoom (PTZ) camera feature, 167
passphrase, 459, 788
passwords changing default, 610
complexity and length of, 610–611
for network interface card (NIC), 444
security and, 516
using characters to make strong, 612
PAT (port address translation), 295, 297
patch panel labeling, 715
patches management issues, 676
managing, 614–615
security and, 518
Payment Card Industry Data Security Standard (PCI DSS), 688
PBX (private branch exchange), 165, 701–702
PCI DSS (Payment Card Industry Data Security Standard), 688
PCP (Priority Code Point), 693
PDUs (power distribution units), 543
PDUs (protocol data units), 49, 220, 488
PEAP (Protected Extensible Authentication Protocol), 461, 573
penetration testing, 575
performance metrics/sensors about, 471, 498, 727–728
baselines, 495
device/chassis, 471–473
environmental factors/sensors, 489–495
interface errors/alerts, 486–488
interface statistics/status, 482–486
network, 473–474
optimizing performance, 691–694
review questions, 501–504, 924–925
Simple Network Management Protocol (SNMP), 474–476
permanent DoS, 585
persistent agents, 566–567
personal area network (PAN), 10
phishing, 599
physical access control devices, 133, 167
Physical layer about, 48–49
data communication equipment (DCE) within, 49
data terminal equipment (DTE) within, 48–49
Ethernet and, 109–115
features of, 35
hubs at, of SOHO network, 177–178
responsibilities of, 221, 224, 311, 312, 313, 314
physical network diagrams, 520–524, 675
physical security about, 638–639, 647
prevention methods, 642–645
review questions, 649–650, 930–931
physical star network, 177–178
physical topologies about, 14
point-to-multipoint topology, 19–20
point-to-point topology, 18–19
ring topology, 17
selecting, 22
PIDS (protocol based IDS), 142
piggybacking, 599
pinouts, 750, 782–783
PKI (Public Key Infrastructure), 461–462, 572
placement, of equipment, 683
plain old telephone service (POTS) cable, 63
plans, 507–511
Platform as a Service (PaaS), 663–665, 704
PLC (Power Line Communication), 115–117
PLCs (programmable logic controllers), 168
plenum cables, 60, 748
plenum-rated coating, 60
PoE (Power over Ethernet), 401–404
PoE (Power over Ethernet) cable, 749
pointer record (PTR), 155, 156
point-to-multipoint topology, 19–20
point-to-point topology, 18–19
POP (Post Office Protocol), 198, 202
port address translation (PAT), 295, 297
Port Aggregation Protocol (PAgP), 400–401
port channeling/bonding, 400
port labeling, 714
port mirroring/spanning (SPAN/RSPAN), 404–405
port sweeping, 830
port tagging, 391–392
ports ARP inspection, 397–398
bad, 750, 783
bonding, 399–401
BPDU guard, 399
DHCP snooping, 397
security, 396–397, 608–609
speed of, 797
STP and, 379–380
positive acknowledgement with retransmission, 42
Post Office Protocol (POP), 198, 202
postdeployment site survey, 447
POTS (plain old telephone service) cable, 63
power distribution units (PDUs), 543
Power Line Communication (PLC), 115–117
power management, 709–710
Power over Ethernet (PoE, PoE+/802.3af, 802.3at), 401–404
Power over Ethernet (PoE) cable, 749
power redundancy, 710
preamble, 107
predeployment site survey, 447
prefix routing, 332
presence, 691
Presentation layer, 35, 37
preshared keys (PSKs), 462, 573, 620
prevention methods, 642–645
printer, 133, 167
Priority Code Point (PCP), 693
private branch exchange (PBX), 165, 701–702
private direct connection, 705–706
private IP addresses, 239–240
private networks, 687
privileged user agreement, 678
procedures about, 507–511
monitoring and, 677–678, 679
Process/Application layer of DoD model, 189, 190
protocols of, 191–204
processes, network monitoring and, 676
programmable logic controllers (PLCs), 168
Protected Extensible Authentication Protocol (PEAP), 461, 573
protocol analyzers, 755, 828–829
protocol based IDS (PIDS), 142
protocol data units (PDUs), 49, 220, 488
protocols. See also specific protocols distance-vector (DV) routing protocols, 318, 329, 330–340
exterior gateway protocols (EGPs), 317, 318, 326
first-hop redundancy protocols (FHRPs), 344–351
of Host-to-Host layer, 204–210
interior gateway protocols (IGPs), 317, 326, 343
of IPv6, 357–359
of Process/Application layer, 191–204
routing protocols, 306, 326–330
shortest path first protocols, 329
signal degradation and, 438
proxy server, 7, 133, 152, 160–162
PSKs (preshared keys), 462, 573, 620
PSTN (public switched telephone network), 166
PSTN (public switched telephone network) cable, 63
PTR (pointer record), 155, 156
PTZ (Pan/Tilt/Zoom) camera feature, 167
Public Key Infrastructure (PKI), 461–462, 572
public switched telephone network (PSTN), 166
public switched telephone network (PSTN) cable, 63
PuTTY, 832
pwd command, 875
Q
QoS (quality of service), 167, 386–387, 692
quad small form-factor pluggable (QSFP), 72
quad-A record (AAAA record), 155, 156
quality of service (QoS), 167, 386–387, 692
queue drops, 487
R
-r switch, 861–862, 867
-R switch, 862
RA (Router Advertisement) Guard, 608
racks device placement and, 711–713
installation of, 683
locking, 643–644
monitoring of, 715
security of, 715
radio frequency identification (RFID), 441, 457, 620, 784–785
radio frequency interference (RFI), 749
Radio Resource Management (RRM), for mitigating rogue APs, 452
RADIUS (Remote Authentication Dial-In User Service), 388, 457, 568
range, 802.11 standards and, 428
ransomware, 593, 596
Rapid Spanning Tree Protocol (RSTP), 381–382
RARP (Reverse Address Resolution Protocol), 211, 217
rate shifting, 421
RBAC. See role-based access control (RBAC)
RDP (Remote Desktop Protocol), 203, 629
RDP Gateway, 630
Real-time Transport Protocol (RTP), 203
Recommended Standard 232 (RS-232) cable, 74–75
records, types of found on DNS servers, 155–157. See also specific records
recovery point objective (RPO), 554
recovery time objective (RTO), 554
redundancy hardware/clusters, 538–542
high availability and, 545–553
power, 710
redundancy group, 697
redundancy protocol, 344–351
reflected/amplified attacks, 587–588
reflection, unbounded media and, 790
refraction, unbounded media and, 790–791
refrigerator, 133
registered jack (RJ) connector for Ethernet, 109
use of, 65–66
regulations, monitoring and, 677–678, 680–681
reliable networking, 38
remote access policy, 513, 678
remote access security about, 626, 632
authentication and authorization, 631
in-band management, 631–632
out-of-band management, 631–632
Remote Desktop Connection, 628–629
Remote Desktop Gateway, 629–630
review questions, 634–635, 929–930
Secure Shell (SSH), 630
virtual desktop, 631
Virtual Network Computing (VNC), 630–631
Remote Authentication Dial-In User Service (RADIUS), 388, 457, 568
Remote Desktop, 706
Remote Desktop Connection, 628–629
Remote Desktop Protocol (RDP), 203, 629
Remote Frame Buffer (RFB), 630–631
remote wipe, 646
repeater, 133, 178
Request for Comments (RFCs) in Class B network, 238
RFC 791, 211
RFC 1487, 200
RFC 1518, 268
RFC 1777, 200
RFC 1918, 239–240
RFC 2338, 350
RFC 3232, 209
RFC 3377, 200
very first ones, 188
Request to Send, Clear to Send (RTS/CTS), 422
Reverse Address Resolution Protocol (RARP), 211, 217
reverse lookup zone (or table), 156
review questions attacks, 602–603, 927–928
availability, 741–744, 933–934
cable connectivity, 767–770, 934–935
connectors, 89–92, 909–910
data center architecture, 721–724, 931–932
documents and policies, 531–532, 925–926
Ethernet, 124–127, 910–911
hardening techniques, 623–624, 928–929
high availability, 557–558, 926
Internet Protocol (IP), 226–229, 913–914
IP address, 257–260, 300–304, 914–916
IP routing, 321–324, 918–919
Layer 2 switching, 408–411, 921–922
Network Address Translation (NAT), 300–304, 916–918
networking devices, 181–184, 911–913
networks, 26–29, 906–907
Open Systems Interconnection (OSI) model, 53–56, 907–908
performance metrics/sensors, 501–504, 924–925
physical security, 649–650, 930–931
remote access security, 634–635, 929–930
routing, 361–364, 919–921
security, 578–579, 927
software tools and commands, 881–885, 937–938
subnetting, 300–304, 916–918
troubleshooting, 821–824, 935–937
virtual local area network (VLAN), 408–411, 921–922
wireless networking, 465–468, 922–923
RFB (Remote Frame Buffer), 630–631
RFI (radio frequency interference), 749
RFID (radio frequency identification), 441, 457, 620, 784–785
RIB (Routing Information Base), 339
ring topology, 17
RIP. See Routing Information Protocol (RIP)
RIPng, 358
riser-rated cables, 748
risk assessments business, 575
penetration testing, 575
vulnerability assessment, 574
RJ. See registered jack (RJ) connector
rogue access point (AP), 591–592
rogue APs, 452
rogue DHCP, 590–591
role-based access control (RBAC) about, 564
hardening and, 616–617
rollback, 508, 614, 676, 716
rolled/rollover cable, 83, 748
round-robin load balancing, 330
route redistribution, 338
router advertisement, 351–352
Router Advertisement (RA) Guard, 608
routers about, 43–46
advantage of using in network, 171
defined, 9
described, 137–138
purpose of, 170, 175–176
redundancy and, 540–542
virtual, 700
route-update packets (Network layer), 44
routing about, 359
asymmetrical, 804
basics of, 306–309
issues with, 812
protocols of, 306, 326–330
review questions, 361–364, 919–921
by rumor, 330
Routing Information Base (RIB), 339
Routing Information Protocol (RIP). See also RIPng about, 328, 329, 332, 333, 341, 358
Version 2 (RIPv2), 332–333, 341
routing protocols administrative distances (AD), 327–329
basics of, 326–330
classes of, 329–330
defined, 306
RPO (recovery point objective), 554
RRM (Radio Resource Management), for mitigating rogue APs, 452
RS-232 (Recommended Standard 232) cable, 74–75
RSTP (Rapid Spanning Tree Protocol), 381–382
RTO (recovery time objective), 554
RTP (Real-time Transport Protocol), 203
RTS/CTS (Request to Send, Clear to Send), 422
runts, 488, 735
S
-s switch, 863, 867–868
-S switch, 862
SaaS (Software as a Service), 663–665, 704
SAM (Security Accounts Manager), 571
sanitizing devices, 646–647
SANs (storage area networks), 10–11, 702–703
SBI (southbound interface) APIs, 667–669
SC (square (subscriber) connector), 68–69
SCADA (supervisory control and data acquisition), 133, 168, 686–687
scalability, 707
schematics, 671–676
screened subnet (demilitarized zone), 142, 157, 565
SDN. See software-defined networking (SDN)
SDWAN (software-defined wide area network), 11
Secure File Transfer Protocol (TCP 22), 192
Secure Shell (SSH) protocol, 192, 630, 878
Secure Sockets Layer (SSL), 200, 202
SecureCRT, 832
security about, 576–577
authentication methods, 567–573
CIA triad, 561–562
hardening and, 511–519
implications and considerations, 707–708
least privilege, 563
Media Access Control (MAC) authentication/MAC filtering, 455–457
ports, 396–397, 608–609
Public Key Infrastructure (PKI), 461–462
Remote Authentication Dial-In User Service (RADIUS), 457
review questions, 578–579, 927
security information and event management (SIEM), 576
segmentation and, 688
service set identifier (SSID), 455–457
Temporal Key Integrity Protocol (TKIP), 458–459
threats, 562
vulnerabilities, 562–563
Wi-Fi Protected Access (WPA), 459–462
wired equivalent privacy (WEP), 455–457
wireless, 451–462, 618–621
zero trust, 564
Security Accounts Manager (SAM), 571
security audits, 514, 526–527, 612–613
security event management (SEM), 479–480
security information and event management (SIEM), 477, 479–480, 576
security policies, 514–519, 678–679
segments/segmentation in data encapsulation, 220–221
network, 23–24, 686–688
security and, 688
troubleshooting, 781
SEM (security event management), 479–480
sensitivity, of latency, 690
separation of duties, 565–566
Server Message Block (SMB), 200
troubleshooting, 781
UC, 694
service set identifier (SSID), 434, 444, 455–457, 788
Service-Level Agreement (SLA), 529, 680
service-related entry points, 23
services, unresponsive, 803–804
Session Initiation Protocol (SIP), 203, 687
Session layer (OSI reference model), 35, 37
severity levels, 480–482, 733
SFF (small form factor) connector, 70
SFP (small form-factor pluggable) transceiver, 72
SFP+ (enhanced small form-factor pluggable) transceiver, 72
SFP/GBIC (cable mismatch), 785–786
shielded twisted-pair (STP) cable, 62, 748, 785
Shortest Path Bridging (SPB), 359
shortest path first protocols, 329
shoulder surfing, 599–600
SIEM (security information and event management), 477, 479–480, 576
signal degradation, 438
signal strength, unbounded media and, 789
signal-to-noise ratio, unbounded media and, 791
Simple Mail Transfer Protocol (SMTP), 193, 202
Simple Network Management Protocol (SNMP) about, 199, 474–475, 729–730
Management Information Bases (MIBs), 476
Object Identifiers (OIDs), 476
secure, 608
traps, 475
using, 670–671
simultaneous wired/wireless connections, with unbounded media (wireless), 787
single-mode fiber to Ethernet converter, 72
single-mode fiber-optic (SMF) cable, 67
single-mode to multimode fiber converter, 73–74
SIP (Session Initiation Protocol), 203, 687
capacity, 448–449
multiple floors, 449–450
report for, 526
tools for, 450–451
6to4 tunneling, 252–253, 354–356
66 block, 86
SLA (Service-Level Agreement), 529, 680
SLAAC (stateless address autoconfiguration), 249–250
small form factor (SFF) connector, 70
small form-factor pluggable (SFP) transceiver, 72
small office, home office (SOHO) network about, 455
determining requirements of, 169–175
environmental considerations of, 178
hubs at Physical layer of, 177–178
planning and implementing of basic on using network segmentation, 168–178
switches and bridges at Data Link layer of, 175–177
small office, home office (SOHO) router, 137, 138
smart antennas, 425
smart doorbells, 133
smart jack, 23, 87
smart lockers, 645
smart speakers, 133
smart thermostats, 133
SMB (Server Message Block), 200
SMF (single-mode fiber-optic) cable, 67
SMTP (Simple Mail Transfer Protocol), 193, 202
Smurf attack, 585–586
SNMP. See Simple Network Management Protocol (SNMP)
SOA (start of authority) record, 156
social engineering attacks, 598–599
software checking configurations, 816
troubleshooting, 780
Software as a Service (SaaS), 663–665, 704
software tools and commands about, 827, 878–879
Address Resolution Protocol (ARP), 845–846
bandwidth speed testers, 829–830
connectivity software, 831–832
File Transfer Protocol (FTP), 871–876
Mtr utility (pathping), 852–853
nbstat utility, 857–863
protocol analyzers/packet capture, 828–829
resolving names with Hosts file, 850–851
review questions, 881–885, 937–938
traceroute/tracert, 833–835
Trivial File Transfer Protocol (TFTP) server, 831
software-defined networking (SDN) about, 655, 666, 701
application layer, 656
backbone, 658
infrastructure layer, 656
management plane, 656–657
spine-leaf-based two-tier networks, 657
software-defined wide area network (SDWAN), 11
SOHO (small office, home office) router, 137, 138
southbound interface (SBI) APIs, 667–669
Spanning Tree Algorithm (STA), 379
Spanning Tree Protocol (STP) about, 378–379, 811
convergence, 380–381
Rapid Spanning Tree Protocol (RSTP), 381–382
SPAN/RSPAN (port mirroring/spanning), 404–405
SPB (Shortest Path Bridging), 359
network, 733–734
of ports, 797
spine-leaf-based two-tier networks, 657
SQL (Structured Query Language) Server, 202, 203
SQLnet, 202
- Net, 202
square (subscriber) connector (SC), 68–69
SRV record, 156
SSH (Secure Shell) protocol, 192, 630, 878
SSID (service set identifier), 434, 444, 455–457, 788
SSL (Secure Sockets Layer), 200, 202
SSL certificate, untrusted, 801–802
ST (straight tip) connector, 68–69
STA (Spanning Tree Algorithm), 379
StackWise technology, 539–540
standard operating procedures, 511
Standby Timer (HSRP), 349, 552
start of authority (SOA) record, 156
Start of Frame Delimiter (SOF)/Synch, 107–108
state transitions, 48
state/configuration, 554–555
stateless address autoconfiguration (SLAAC), 249–250
static assignment, 147
static energy, 682
static IP addressing, 196
static routing, 307, 316–319
storage area networks (SANs), 10–11, 702–703
STP. See Spanning Tree Protocol (STP)
STP (shielded twisted-pair) cable, 62, 748, 785
straight tip (ST) connector, 68–69
straight-through cable, 80
Structured Query Language (SQL) Server, 202, 203
subnetting about, 298
basics of, 263–286
benefits of, 264
Class A, 940–945
Classless Inter-Domain Routing (CIDR), 266–268
how to create, 264–265
review questions, 300–304, 916–918
subscriber (square) connector (SC), 68–69
supervisory control and data acquisition (SCADA), 133, 168, 686–687
surge protectors, 764
Switch Port Analyzer (SPAN) and Remote SPAN, 404–405
switches. See also specific switches about, 136–137, 171, 174, 175–177
clustering, 540
defined, 5
placement of, 790
redundancy and, 538–540
syslog, 201, 478–479, 731
system labeling, 714
T
T1 crossover cable, 83–85
T568A wiring standard, 78–80
T568B wiring standard, 78–80
TACACS+ (Terminal Access Controller Access Control System Plus), 568–569
tailgating, 599
tamper detection, 641
tap, 760
TCP. See Transmission Control Protocol (TCP)
TCP (Transport Control Protocol), 157
TCP 23 (Telnet), 192–193, 630, 876–878
TCP segment format, 205–207
TCP/IP. See Transmission Control Protocol/Internet Protocol (TCP/IP)
TCP/UDP ports, blocked, 802–803
TDM (time-division multiplexing), 51
TDMA (time-division multiple access), 418
TDR (time-domain reflectometer), 756
technology-based attacks, 582–598
Telecommunications Industry Alliance/Electronic Industries Association (TIA/EIA), 672–673
Telecommunications Industry Association (TIA), 755–756
telephony server, 7
Telnet (TCP 23), 192–193, 630, 876–878
temperature, as an environmental concern, 471–472, 489, 727
Temporal Key Integrity Protocol (TKIP), 458–459
10Base2, 110
10Base5, 110
10BaseT, 110
Tequila virus, 597
Teredo, 356–357
Terminal Access Controller Access Control System Plus (TACACS+), 568–569
TFTP (Trivial File Transfer Protocol), 196–197
TFTP (Trivial File Transfer Protocol) server, 831
thermostats, smart thermostats, 133
thin computing, 701
Thin Ethernet (thinnet), 60
thin protocol, 207
thinnet, 110
ThreatQuotient, 574
threats categories of, 562
wireless, 451–455
3G, 418, 419
throughput, 747
TIA (Telecommunications Industry Association), 755–756
TIA/EIA (Telecommunications Industry Alliance/Electronic Industries Association), 672–673
time to live (TTL) value, 156, 589
time-division multiple access (TDMA), 418
time-division multiplexing (TDM), 51
time-domain reflectometer (TDR), 756
TKIP (Temporal Key Integrity Protocol), 458–459
TLS (Transport Layer Security), 200
TNS (Transparent Network Substrate), 202
Top-to-Bottom/Bottom-to-Top OSI model, 805–806
TPC (Transmit Power Control), 424
Traceroute, 288
traceroute/tracert, 833–835
Tracert, 288
traffic checking status of, 484–485
receiving, 734
sending, 734
shaping, 694
traffic spike, 584–585
transceivers about, 71–72
incorrect, 750
mismatch, 783
Transmission Control Protocol (TCP) connection-oriented communication, 38–39
as Host-to-Host layer protocol, 204–205
Transport layer and, 38
Transmission Control Protocol/Internet Protocol (TCP/IP) about, 8, 586–587, 781
creation of, 188
pinging, 842
traceroute/tracert and, 833–835
transmission speeds, of cables, 76
Transmit and Received (TX/RX) Reversed, 751, 785
Transmit Power Control (TPC), 424
Transparent mode (VTP), 392, 394
Transparent Network Substrate (TNS), 202
Transport Control Protocol (TCP), 157
Transport layer about, 37–38
acknowledgements within, 42–43
connection-oriented communication within, 38–39
in data encapsulation, 220–224
features of, 35
flow control within, 39–41
Host-to-Host layer also known as, 189, 190, 195
port numbers for, 209, 213, 297
separation of data at, 315
use of UDP at, 158, 195
windowing within, 41–42
as working with Network layer, 213, 221
Transport Layer Security (TLS), 200
traps, 475
Trivial File Transfer Protocol (TFTP), 196–197
Trivial File Transfer Protocol (TFTP) server, 831
Trojan horse, 598
troubleshooting about, 775–776, 818
cables, 782–786
login procedure/rights, 776–777
network connection LED status indicators, 777–778
review questions, 821–824, 935–937
steps for, 791–815
tips for, 815–818
unbounded media (wireless), 786–791
TTL (time to live) value, 156, 589
Tunneled Transport Layer Security (TTLS), 462
tunneling, 354–357
twinaxial cable, 62
2G, 418
TX/RX (Transmit and Received) Reversed, 751, 785
TXT (DKIM) record, 156
Type 1 hypervisor, 699
Type 2 hypervisor, 699
U
UC (unified communications), 694
UDP (User Datagram Protocol), 38, 157, 205, 207–210, 670
ultra physical contact (UPC), 67–68
unbounded media issues (wireless), 786–791
unicast addresses, 242, 243, 691
unified communications (UC), 694
unified threat management (UTM) devices, 166
unintentional/friendly DoS, 585
uninterruptible power supply (UPS), 489, 490–491, 542, 710
Universal Serial Bus (USB), 75–76
unknown unicast flood blocking (UUFB), 398–399
unknown unicast flood rate-limiting (UUFRL), 398–399
unshielded twisted-pair (UTP) cable about, 672, 748
categories of, 63–65
connecting, 65–66
defined, 62
for Ethernet, 109
gigabit wiring of, 82
UPC (ultra physical contact), 67–68
UPS (uninterruptible power supply), 489, 490–491, 542, 710
uptime, 498, 691, 738
US Environmental Protection Agency (EPA), 544–545
USB (Universal Serial Bus), 75–76
User Datagram Protocol (UDP), 38, 157, 205, 207–210, 670
UTM (unified threat management) devices, 166
UTP. See unshielded twisted-pair (UTP) cable
UUFB (unknown unicast flood blocking), 398–399
UUFRL (unknown unicast flood rate-limiting), 398–399
V
variable-length subnet mask (VLSM), 244, 266, 333–335
vendor documentation, 676
very high throughput (VHT), 426
VHT (very high throughput), 426
video applications, 690–691
video teleconferencing (VTC), 687
virtual desktops, 631, 701
virtual IP address, 241
virtual LANs (VLANs) about, 173–174
hopping, 589–590
incorrect, 798
private, 609–610
virtual local area network (VLAN). See also Layer 2 switching about, 173–174, 382–386, 405–406
dynamic, 388
hopping, 589–590
identifying, 388–392
incorrect, 798
memberships, 387
private, 609–610
quality of service (QoS), 386–387
review questions, 408–411, 921–922
static, 387–388
virtual MAC address, 348, 549–551
Virtual Network Computing (VNC), 630–631
virtual network interface card (vNIC), 24, 700
virtual networking about, 24, 697–698
components, 698–702
storage area networks (SANs), 702–703
virtual PBX, 701–702
Virtual Private Network (VPN) clientless, 627
as a connectivity option, 705
Virtual Router Redundancy Protocol (VRRP), 345, 350–351, 548–553, 697
virtual switch (vSwitch), 24, 700
viruses about, 594–595
checking for, 818
file, 596
macro, 596–597
multipartite, 597–598
VLAN. See virtual local area network (VLAN)
VLAN Management Policy Server (VMPS), 388
VLAN Trunking Protocol (VTP) about, 392–393
IP addresses and, 394–396
VLSM (variable-length subnet mask), 244, 266, 333–335
VMPS (VLAN Management Policy Server), 388
VNC (Virtual Network Computing), 630–631
vNIC (virtual network interface card), 24, 700
voice access ports, 389
Voice over Internet Protocol (VoIP), 690
voice security information and event management (vSIEM), 480, 576
VoIP (Voice over Internet Protocol), 690
VoIP endpoint, 152, 166
VoIP gateway, 152, 166
VoIP PBX, 152, 165
VoIP phone, 133, 167
voltage event recorder (power), 763–764
VPN. See Virtual Private Network (VPN)
VPN concentrator headend, 152, 164–165
VRRP (Virtual Router Redundancy Protocol), 345, 350–351, 548–553, 697
vSIEM (voice security information and event management), 480, 576
vSwitch (virtual switch), 24, 700
VTC (video teleconferencing), 687
VTP. See VLAN Trunking Protocol (VTP)
vulnerabilities assessment of, 574
categories of, 562–563
W
walls, signal degradation and, 438
WAN. See wide area network (WAN)
WAP (wireless access point), 429
waveform, 50
mismatch, 786
wavelength-division multiplexing (WDM), Ethernet over, 117
web proxy server, 161
well-known port numbers, 209
WEP (wired equivalent privacy), 444, 455–457
wide area network (WAN) about, 9–10
troubleshooting, 781
wide local area network (WLAN) installing and configuring hardware, 441–447
Wi-Fi Alliance, 416, 426
Wi-Fi Protected Access (WPA), 444, 458, 459–462
windowing, Transport layer and, 41–42
Windows, enabling Telnet in, 877–878
Windows Internet Naming Service (WINS), 153
WINS (Windows Internet Naming Service), 153
wired equivalent privacy (WEP), 444, 455–457
wireless access point (WAP), 429
wireless channel, for network interface card (NIC), 444
wireless client isolation, 619
wireless controllers, 434–436
wireless LAN controller (WLC), 143, 452
wireless network interface card (NIC), 430
wireless networking about, 415–417, 462
cellular technologies, 418–419
components, 428–432
installing, 432–447
review questions, 465–468, 922–923
security, 451–462
wireless range extender, 133, 143
wiring diagrams for, 525–526
installing distributions, 85–87
schematics for, 671–672
security and, 516
standards for, 78–85
WLAN. See wide local area network (WLAN)
WLAN Association (WLANA), 416
WLC (wireless LAN controller), 143, 452
Word (Microsoft), Application layer and, 37
workstations auto-detecting by, 101
carrier sense multiple access with collision detection (CSMA/CD) and, 97–98
network, 6, 8–9
troubleshooting, 781
worm, 594
WPA (Wi-Fi Protected Access), 444, 458, 459–462
WPA3-SAE encryption, 460
availability, 740, 901
cable connectivity, 766, 902
connectors, 88, 889
data center architecture, 720, 901
documents and policies, 530, 897–898
Ethernet, 119–123, 889–891
hardening techniques, 622, 899–900
Internet Protocol (IP), 225, 892–893
IP address, 255–256, 299, 893–894
IP routing, 320, 895
Layer 2 switching, 406–407, 895–896
Network Address Translation (NAT), 299, 894
networking devices, 180, 891–892
networks, 25, 888
Open Systems Interconnection (OSI) model, 52, 888
performance metrics/sensors, 499–500, 896–897
remote access security, 632–633, 900
routing, 360, 895
security, 577, 898–899
software tools and commands, 880, 903
subnetting, 299, 894, 943–945
troubleshooting, 819–820, 902
virtual local area network (VLAN), 406–407, 895–896
wireless networking, 464, 896
Y
Yagis, 431
Z
Fair Use Sources
Networking: TCP/IP, Internet protocols, K8S networking-K8S nets-K8S net, Container net,
Cloud networking-Cloud nets (AWS net, Azure net, GCP net, IBM net, Oracle net)
Oracle networking-Oracle nets-Oracle net-Oracle network-Oracle networks, Oracle Cloud networking-Oracle Cloud nets-Oracle Cloud net-Oracle Cloud network-Oracle Cloud networks,
Docker networking-Docker nets-Docker net-Docker network-Docker networks,
Podman networking-Podman nets-Podman net-Podman network-Podman networks,
OpenShift networking-OpenShift nets-OpenShift net-OpenShift network-OpenShift networks,
IBM mainframe networking-IBM mainframe nets-IBM mainframe net-IBM mainframe network-IBM mainframe networks,
IP networking-IP nets-IP net-IP network-IP networks, TCP/IP networking-TCP/IP nets-TCP/IP net-TCP/IP network-TCP/IP networks,
OS networking-OS nets-OS net-OS network-OS networks, Operating system networking-Operating system nets-Operating system net-Operating system network-Operating system networks,
Linux networking-Linux nets-Linux net-Linux network-Linux networks,
UNIX networking-UNIX nets-UNIX net-UNIX network-UNIX networks,
RHEL networking-RHEL nets-RHEL net-RHEL network-RHEL networks,
Fedora networking-Fedora nets-Fedora net-Fedora network-Fedora networks,
Rocky networking-Rocky nets-Rocky net-Rocky network-Rocky networks,
Debian networking-Debian nets-Debian net-Debian network-Debian networks, Ubuntu networking-Ubuntu nets-Ubuntu net-Ubuntu network-Ubuntu networks,
IBM networking-IBM nets-IBM net-IBM network-IBM networks, SNA networking-SNA nets-SNA net-SNA network-SNA networks,
Ansible networking-Ansible nets-Ansible net-Ansible network-Ansible networks,
macOS networking-macOS nets-macOS net-macOS network-macOS networks, Apple networking-Apple nets-Apple net-Apple network-Apple networks,
Windows networking-Windows nets-Windows net-Windows network-Windows networks,
Microsoft networking-Microsoft nets-Microsoft net-Microsoft network-Microsoft networks,
Windows Server networking-Windows Server nets-Window Server net-Windows Server network-Windows Server networks,
Cisco networking-Cisco nets-Cisco net-Cisco network-Cisco networks,
Palo Alto networking-Palo Alto nets-Palo Alto net-Palo Alto network-Palo Alto networks,
3Com networking-3Com nets-3Com net-3Com network-3Com networks, Novell networking-Novell nets-Novell net-Novell network-Novell networks, NetWare networking-NetWare nets-NetWare net-NetWare network-NetWare networks, Novell NetWare networking-Novell NetWare nets-Novell NetWare net-Novell NetWare network-Novell NetWare networks,
Networking by Programming Languages
C networking-C nets-C net-C network-C networks, C Language networking-C Language nets-C Language net-C Language network-C Language networks,
C++ networking-C plus plus nets-C plus plus net-C plus plus network-C plus plus networks,
C# networking-C sharp nets-C sharp net-C sharp network-C sharp networks, C# .NET networking-C sharp dot net nets-C sharp dot net net-C sharp dot net network-C sharp dot net networks,
Go networking-Go nets-Go net-Go network-Go networks, Golang networking-Golang nets-Golang net-Golang network-Golang networks,
Java networking-Java nets-Java net-Java network-Java networks,
JavaScript networking-JavaScript nets-JavaScript net-JavaScript network-JavaScript networks, JS networking-JS nets-JS net-JS network-JS networks, TypeScript networking-TypeScript nets-TypeScript net-TypeScript network-TypeScript networks,
Node.js networking-Node.js nets-Node.js net-Node.js network-Node.js networks,
Kotlin networking-Kotlin nets-Kotlin net-Kotlin network-Kotlin networks,
Scala networking-Scala nets-Scala net-Scala network-Scala networks,
Python networking-Python nets-Python net-Python network-Python networks,
PowerShell networking-PowerShell nets-PowerShell net-PowerShell network-PowerShell networks,
Ruby networking-Ruby nets-Ruby net-Ruby network-Ruby networks,
Swift networking-Swift nets-Swift net-Swift network-Swift networks,
Cisco: Cisco Networking, Cisco DevOps - Cisco SRE, Cisco Cloud Native - Cisco and Kubernetes, Cisco Cloud - Cisco Data Centers, Cisco GitHub - Cisco Open Source (), Cisco Development Tools (), Cisco Programming Languages (), Cisco APIs, Cisco and Concurrent Parallel Programming (), Cisco and Functional Programming (), Cisco and Microservices, Cisco Security - Cisco Security Breaches, Cisco Research, Cisco Data Science - Cisco DataOps - Cisco Databases, Cisco Artificial Intelligence (Cisco ML - Cisco MLOps, Cisco DL, Cisco AR - Cisco VR), Cisco IoT, Cisco Products - Cisco Services (), Cisco Operating Systems (), Cisco Software (), Cisco Hardware - Cisco Devices (), Cisco Support (), Cisco Media (), Cisco Communication (), Cisco Concepts (), Cisco acronyms (), Cisco Founders (), Cisco People (), Cisco Outline, Cisco History, Cisco Timeline, Cisco Subsidiaries (), Cisco Privacy (), Cisco Censorship (), Cisco Criticism (), Cisco Bibliography, Cisco Courses, Cisco Certification (CCNA, CCNP, CCNE), Cisco Glossary, Cisco Topics, Cisco Blog, Cisco Awesome List, Big Tech. (navbar_cisco, navbar_networking)
© 1994 - 2024 Cloud Monk Losang Jinpa or Fair Use. Disclaimers
SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.