1/57
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Physical shows actual devices and cabling, while logical shows network flow and relationships
Physical shows IP and subnet mask
Logical are high level view (WAN layout, application flow)
Visual layout of equipment placement in a rack
Good when physical access is limited
Might have rack components labeled as well so we can tell them instructions on where on the rack they need to perform actions on
Documentation showing how cables connect devices and paths
Shows network drops and the number of it and where it goes in the IDF or MDF
Layer 1 shows physical connections and interface, Layer 2 shows switching and VLANs and mac addresses, Layer 3 shows IP addressing and routing and subnet masks
Hardware, software, licensing, and warranty support tracked for network resources
Tag all items with barcode, RFID, etc
Have an asset database that contains all fields about an asset
System for planning, tracking, and managing IP address usage
Increase/decrease the amount of IP addresses available
Control reservation times
Contract that defines expected service performance and availability
Uptime, response time agreement, etc
If techs will be dispatched if there are problems
May require customer to keep spare equipment on site
Assessment that shows wireless coverage, signal strength, and interference
Stage where a piece of hardware or software is no longer coming out with version updates
May continue to provide security patches and updates
May provide warranty repair
Stage where vendor no longer provides updates or fixes
Current version is the final version
Security concern
Includes applying patches, maintaining operating systems, and updating firmware
Monthly updates for features, bugs, and security updates
Emergency out-of-band updates for emergency security concerns
Network, user settings, OS settings, etc
Firmware updates can be done over the network or physically connect to the device
Save firmware binaries just in case of incompatibilities on new versions
Proper removal and disposal of outdated or unused network equipment
Sanitize media or destroy hardware
Can be a legal issue to destroy information to early, be careful
Don’t place anything with critical information in the trash
Formal system to submit, review, and track network change requests
Often overlooked
Policies can contain things like: frequency, duration, installation process, and fallback procedures
Best managed with tickets
The most current running configuration
Everyone uses this config
Covers all aspects: hardware, firmware, software versions, device driver versions, updates
Tested a lot before installation
Known working config just in case production config has issues
Copy files, create a snapshot of a VM, etc
A “checklist” that says, if all of these things work, the application will work as expected
Can be updated if the production config is working and a new feature should be considered baseline
Methods(SNMP/Simple Network Management Protocol)
A database of data (MIB) - management information base
The database contains object identifiers (OIDs)
Port UDP/161
v2c
Data type enhancements, bulk transfers, non-encrypted
v3
current standard. message integrity checks, authentication, and encryption
MIB walkers can scan for all OID devices on a network and all related information
Traps allow you to configure client devices to ping the MIB or another SNMP monitoring device if a certain threshold is crossed (like too many errors too quickly)
UDP/162
Community strings are passwords that grant you access to SNMP data on a device. Can have multiple strings for different actions like reading, writing, or traps
In SNMP v3, community strings were replaced with passwords that are hashed before being sent over the network
Information about traffic patterns collected from network devices
Process of collecting and analyzing raw network packets
Think wireshark
Normal performance measurements used for comparison and anomaly alerting
Centralized collection of logs, often using syslog collectors and SIEM tools
Allows systems to interact programmatically for monitoring and automation
Technique that copies network traffic from one port to another for analysis
Identifying devices and connections through ad hoc or scheduled scans
Scheduled means on a schedule while ad hoc means as necessary
Examining data flows to understand usage and detect issues
Measuring speed, latency, and throughput of network services
SNMP, NetFlow, protocol analysis, software agent, etc
Checking uptime and responsiveness of network resources
Is something up or down?
Short or long term reporting
Tracking changes and compliance in device settings
Back these files up
Can vary by firmware or OS version
DR metrics(Disaster Recovery Plan (DRP))
Detailed plan for resuming operations after a disaster
Backups, off-site data replication, cloud alternatives, remote sites, etc
3rd party options
Maximum acceptable data loss measured in time
How far back in time does data go?
Defined by how much data would normally be collected in that time
Target time to restore services after an outage
Best to be near-zero
Defining a normal amount of time to get to a certain service level
Average time required to fix a failed component
Full failure to full functionality
Predicted time between hardware or system failures
Facility with no pre-installed equipment, requiring full setup
Facility with some infrastructure and data ready, but partial setup needed
Fully equipped and operational backup location ready for immediate use
Exactly the same to the original site (ideally)
Multiple sites handle traffic simultaneously for redundancy
Configs and session information is copied between the two
More complex to set up
One site/device is active while another waits on standby for failover
Configs and session information is copied between the two
Discussion-based simulations of incident response or disaster recovery plans
Practical checks to confirm network systems or recovery methods work as intended
Don’t touch production systems
Helps document what worked and what needs to be fixed
Provides automatic IP assignment with options for reservations, scopes, lease times, options, relay/IP helpers, and exclusions
DORA
Discover: Find a DHCP server
Offer: Get an offer from a DHCP server
Request: Lock in the offer
Acknowledge: DHCP server confirms
Relays/IP helpers allow you to send information to another subnet even when you don’t have an IP address yet. This is to help infrastructure have redundant DHCP servers
Configs on the DHCP server
Scope: Range of IP addresses that can be handed out
Subnet mask
Lease durations
T1 timer renewal at 50%
T2 timer rebinding at 87.5%
DNS server
Default gateway
VOIP servers
Exceptions for static IPs, etc
IPv6 method that allows devices to assign themselves addresses without a server
An IPv6 device generates its own address using the network prefix from a router’s Router Advertisement (RA) and combines it with a unique interface identifier (often based on the device’s MAC address or a randomly generated value). No DHCP server is needed. Devices also use RA messages to learn the default gateway and other network info.
Before using the address, it runs Duplicate Address Detection (DAD) to make sure no other device on the network is using it. If no duplicate is found, the address is assigned to the interface.
System for translating names to IP addresses with features like DNSSEC, DoH/DoT, record types (A, AAAA, CNAME, MX, TXT, NS, PTR), zone types (forward, reverse), authoritative vs. non-authoritative, primary vs. secondary, and recursive resolution
Local text file that maps hostnames to IP addresses
Protocol for synchronizing device clocks over the internet
Provides highly accurate time synchronization over local networks
Enhances NTP with authentication and encryption for secure time sync
Encrypted tunnel connecting entire networks across the internet
Encrypted tunnel connecting a single user device to a network
Remote access through a browser without dedicated VPN software
Split allows some traffic to bypass VPN, while full sends all traffic through VPN
Secure command-line access protocol for remote management
Visual interface for managing devices
Programming interface for interacting with systems and devices
Direct physical or serial connection to a device for configuration
Intermediate secure system used to access devices in a protected network
In-band uses production network for management, while out-of-band uses a separate dedicated pat