CompTIA Network+ N10-009 Domain 4.0

Complete Study Guide for Network Security

Exam: N10-009 Domain 4.0: Network Security (19% of exam) Updated: June 2025
🔒 Security Fundamentals ⚡ Attack Prevention 🛡️ Defense Solutions ✅ Free Study Material

Master CompTIA Network+ Domain 4.0: Network Security

This comprehensive study guide covers all essential topics for Domain 4.0 - Network Security of the CompTIA Network+ N10-009 certification exam. Domain 4.0 represents 19% of the exam content and is crucial for understanding modern network security practices and defense strategies.

🔐 Security Concepts

CIA triad, logical/physical security, and authentication fundamentals

⚡ Attack Types

Technology-based, human, and environmental network attacks

🛡️ Defense Solutions

Firewalls, VPNs, IDS/IPS, and security monitoring systems

🔑 Access Control

Authentication methods, authorization, and network access control

📋 Security Protocols

Encryption, secure protocols, and security best practices

3 Main Topics 40+ Security Concepts 75+ Key Terms 19% of Exam

4.1 Basic Network Security Concepts

Network security encompasses both logical and physical protection mechanisms to ensure confidentiality, integrity, and availability of network resources and data.

Logical Security

Encryption

Data in Transit: Protecting data while moving across networks

  • TLS/SSL: Web traffic encryption (HTTPS)
  • IPSec: Network layer encryption for VPNs
  • SSH: Secure remote access and file transfers
  • WPA3: Wireless network encryption

Data at Rest: Protecting stored data

  • Disk encryption: Full disk or file-level
  • Database encryption: Column or table-level
  • Key management: Secure key storage and rotation

Digital Certificates

PKI (Public Key Infrastructure): Comprehensive certificate management system

  • Certificate Authority (CA): Issues and manages certificates
  • Registration Authority (RA): Verifies certificate requests
  • Certificate Repository: Stores and distributes certificates
  • Certificate Revocation List (CRL): Lists revoked certificates

Self-signed Certificates: Created without CA validation

  • Use cases: Internal systems, testing environments
  • Limitations: No third-party validation, browser warnings

Identity and Access Management (IAM)

Authentication Methods

Authentication Factors:

  • Something you know: Passwords, PINs
  • Something you have: Tokens, smart cards
  • Something you are: Biometrics

Multifactor Authentication (MFA): Combines multiple factors for enhanced security

Time-based Authentication: TOTP (Time-based One-Time Password) tokens

Single Sign-On (SSO)

Allows users to authenticate once and access multiple systems:

  • Benefits: Improved user experience, reduced password fatigue
  • Protocols: SAML, OAuth, OpenID Connect
  • Considerations: Single point of failure risk

Authentication Protocols

RADIUS

Remote Authentication Dial-in User Service

  • Function: Centralized authentication, authorization, accounting (AAA)
  • Protocol: UDP-based (ports 1812/1813)
  • Use cases: Network access control, VPN authentication
  • Security: Shared secret between client and server

LDAP

Lightweight Directory Access Protocol

  • Function: Directory service for user/group information
  • Protocol: TCP port 389 (LDAPS: 636)
  • Structure: Hierarchical tree structure (DN, OU, CN)
  • Integration: Active Directory, OpenLDAP

SAML

Security Assertion Markup Language

  • Function: XML-based SSO standard
  • Components: Identity Provider (IdP), Service Provider (SP)
  • Use cases: Web-based SSO, federated identity
  • Assertions: Authentication, authorization, attribute statements

TACACS+

Terminal Access Controller Access Control System Plus

  • Function: Cisco proprietary AAA protocol
  • Protocol: TCP port 49 (full encryption)
  • Advantage: Separates authentication and authorization
  • Use cases: Network device management, granular control

Authorization & Access Control

Access Control Principles

Authorization: Determining what authenticated users can access

Least Privilege: Users receive minimum necessary permissions

Role-Based Access Control (RBAC): Permissions assigned based on job roles

RBAC Benefits:
• Simplified management
• Consistent permissions
• Easier compliance auditing
• Reduced human error

Geofencing

Location-based access control using GPS or network-based positioning:

  • Function: Restricts access based on physical location
  • Methods: IP geolocation, GPS coordinates, Wi-Fi/cellular positioning
  • Use cases: Prevent unauthorized access from foreign countries
  • Considerations: VPN bypass, accuracy limitations

Physical Security

Physical Access Controls

Cameras: Surveillance and monitoring systems

  • Types: Fixed, PTZ (pan-tilt-zoom), thermal
  • Features: Motion detection, night vision, facial recognition
  • Storage: Local NVR/DVR, cloud-based

Locks: Physical barriers to unauthorized access

  • Mechanical: Key-based, combination locks
  • Electronic: Card readers, biometric scanners
  • Smart locks: Mobile app control, audit trails

Deception Technologies

Honeypot

Decoy system designed to attract and analyze attackers:

  • Purpose: Early attack detection, threat intelligence
  • Types: Low-interaction (limited services), high-interaction (full systems)
  • Deployment: Internal or external network placement
  • Benefits: Distract attackers, gather attack methods

Honeynet

Network of interconnected honeypots simulating real network environment:

  • Complexity: Multiple systems with realistic interactions
  • Research: Advanced threat analysis and malware study
  • Monitoring: Comprehensive logging and traffic analysis

Security Terminology & CIA Triad

Core Security Terms

Risk: Potential for loss or damage from threat exploitation

Vulnerability: Weakness that can be exploited by threats

Exploit: Method used to take advantage of vulnerability

Threat: Potential danger that could harm system/data

Risk Formula:
Risk = Threat × Vulnerability × Impact

CIA Triad

Confidentiality: Protecting information from unauthorized disclosure

  • Encryption, access controls, classification

Integrity: Ensuring data accuracy and preventing unauthorized modification

Availability: Ensuring systems and data are accessible when needed

  • Redundancy, fault tolerance, disaster recovery

Compliance & Regulatory Requirements

Data Locality

Requirements for data to reside within specific geographic boundaries:

  • Data sovereignty: National laws governing data storage
  • Compliance: Meeting regional regulatory requirements
  • Cloud considerations: Selecting appropriate data center locations

PCI DSS

Payment Card Industry Data Security Standards

  • Scope: Organizations handling credit card data
  • Requirements: 12 main requirements covering network security
  • Compliance levels: Based on transaction volume
  • Network security: Firewalls, encryption, access controls

GDPR

General Data Protection Regulation

  • Scope: EU personal data protection
  • Rights: Data portability, erasure, breach notification
  • Technical measures: Encryption, pseudonymization
  • Penalties: Up to 4% of annual revenue

Network Segmentation Enforcement

IoT & IIoT Security

IoT (Internet of Things): Consumer connected devices

IIoT (Industrial IoT): Industrial connected systems

  • Challenges: Weak authentication, unencrypted communications
  • Segmentation: Isolated VLANs, micro-segmentation
  • Monitoring: Behavior analysis, anomaly detection

Industrial Control Systems

SCADA: Supervisory Control and Data Acquisition

ICS: Industrial Control Systems

OT: Operational Technology

  • Air-gapping: Physical network isolation
  • DMZ deployment: Secured connection to corporate networks
  • Protocol security: Modbus, DNP3, industrial Ethernet

Guest & BYOD Networks

Guest Networks: Isolated access for visitors

  • Isolation: Separate VLAN with limited access
  • Captive portal: Terms acceptance and registration
  • Bandwidth limits: Quality of service controls

BYOD (Bring Your Own Device): Personal device corporate access

  • Mobile Device Management (MDM): Policy enforcement
  • Containerization: Separate work and personal data
  • Certificate-based authentication: Device identity verification

4.2 Attack Types & Network Impact

Denial of Service Attacks

DoS (Denial of Service)

Attacks from single source to overwhelm target resources:

  • Volumetric: Bandwidth exhaustion attacks
  • Protocol: Exploit protocol weaknesses (SYN flood)
  • Application layer: Target specific services
  • Impact: Service unavailability, performance degradation

DDoS (Distributed Denial of Service)

Coordinated attacks from multiple sources (botnet):

  • Amplification: DNS, NTP reflection attacks
  • Botnet: Compromised devices under attacker control
  • Mitigation: Rate limiting, traffic filtering, CDN protection
  • Scale: Can reach hundreds of Gbps

Layer 2 Attacks

VLAN Hopping

Techniques to access unauthorized VLANs:

  • Double tagging: Exploiting 802.1Q tag processing
  • Switch spoofing: Mimicking trunk port behavior
  • Mitigation: Disable unused ports, explicit VLAN assignment
  • Impact: Unauthorized network access, data exposure

MAC Flooding

Overwhelming switch MAC address table:

  • Method: Sending frames with many fake MAC addresses
  • Result: Switch enters fail-open mode (hub behavior)
  • Impact: Network traffic becomes visible to all ports
  • Mitigation: Port security, MAC address limits

ARP Poisoning/Spoofing

Manipulating ARP tables for man-in-the-middle attacks:

  • ARP Poisoning: Corrupting ARP cache entries
  • ARP Spoofing: Impersonating another device's MAC address
  • Impact: Traffic interception, session hijacking
  • Mitigation: Static ARP entries, ARP inspection

DNS Attacks

DNS Poisoning

Corrupting DNS resolver cache with false information:

  • Cache poisoning: Injecting malicious DNS records
  • Impact: Users redirected to malicious websites
  • Persistence: False entries cached until TTL expires
  • Mitigation: DNSSEC, DNS filtering, secure resolvers

DNS Spoofing

Impersonating legitimate DNS responses:

  • Method: Racing to respond before legitimate DNS server
  • Tools: DNS spoofing frameworks, packet injection
  • Impact: Traffic redirection, credential harvesting
  • Detection: DNS query monitoring, anomaly detection

Rogue Services & Evil Twin Attacks

Rogue DHCP Server

Unauthorized DHCP server providing malicious network configuration:

  • Attack vector: Faster DHCP response than legitimate server
  • Malicious config: Attacker's DNS server, default gateway
  • Impact: Traffic interception, DNS manipulation
  • Mitigation: DHCP snooping, port security

Rogue Access Point

Unauthorized wireless access point on corporate network:

  • Types: Employee-installed, attacker-deployed
  • Risks: Bypass security controls, unauthorized access
  • Detection: Wireless surveys, WIDS/WIPS systems
  • Mitigation: Network access control, port security

Evil Twin

Malicious wireless access point mimicking legitimate network:

  • Method: Same SSID as legitimate network
  • Attraction: Stronger signal or open authentication
  • Impact: Credential harvesting, traffic interception
  • Mitigation: Certificate-based authentication, user education

Advanced Attack Methods

On-Path Attack (MITM)

Attacker intercepts communication between two parties:

  • Active: Modifying communications in real-time
  • Passive: Eavesdropping without modification
  • Methods: ARP spoofing, DNS hijacking, SSL stripping
  • Mitigation: End-to-end encryption, certificate pinning

Malware

Malicious software designed to damage or gain unauthorized access:

  • Virus: Self-replicating code attached to files
  • Worm: Self-propagating across networks
  • Trojan: Disguised as legitimate software
  • Ransomware: Encrypts data for monetary demands
  • Botnet: Network of compromised devices

Social Engineering Attacks

Phishing

Fraudulent attempts to obtain sensitive information:

  • Email phishing: Malicious emails with fake links
  • Spear phishing: Targeted attacks on specific individuals
  • Whaling: Targeting high-profile executives
  • Vishing: Voice-based phishing attacks
  • Smishing: SMS-based phishing attacks

Physical Social Engineering

Dumpster Diving: Searching discarded materials for sensitive information

Shoulder Surfing: Observing users entering passwords or PIN codes

Tailgating: Following authorized person through secured entrance

Mitigation:
• Security awareness training
• Proper document disposal
• Physical access controls
• Privacy screens and shields

4.3 Network Security Defense Solutions

Device Hardening

Security Hardening Practices

Disable Unused Ports and Services:

  • Network ports: Shutdown unused switch ports
  • Services: Disable unnecessary network services
  • Protocols: Remove insecure protocols (Telnet, HTTP)

  • Benefits: Reduced attack surface, improved performance

Change Default Passwords:

  • Default credentials: Well-known and easily exploited
  • Strong passwords: Complex, unique passwords
  • Regular rotation: Periodic password changes
  • Documentation: Secure password management

Network Access Control (NAC)

Port Security

Controls access to individual switch ports:

  • MAC address limiting: Restrict number of MAC addresses per port
  • Static MAC binding: Associate specific MAC with port
  • Violation actions: Shutdown, restrict, or protect mode
  • Aging: Automatic MAC address aging timers

802.1X Port-Based Authentication

Network access control using authentication before network access:

  • Components: Supplicant, Authenticator, Authentication Server
  • EAP methods: EAP-TLS, PEAP, EAP-TTLS
  • Dynamic VLANs: VLAN assignment based on identity
  • MAB: MAC Authentication Bypass for legacy devices

MAC Filtering

Allow or deny access based on MAC addresses:

  • Whitelist: Only approved MAC addresses allowed
  • Blacklist: Specific MAC addresses denied
  • Limitations: MAC addresses can be spoofed
  • Use cases: IoT devices, legacy equipment

Key Management

Cryptographic Key Management

Secure generation, distribution, storage, and rotation of encryption keys:

  • Key generation: Hardware Security Modules (HSMs)
  • Key distribution: Secure channels, out-of-band methods
  • Key storage: Protected key stores, hardware tokens
  • Key rotation: Regular key updates and lifecycle management
  • Key escrow: Secure backup for key recovery
Key Management Best Practices:
• Separate encryption and signing keys
• Implement key versioning
• Secure key backup and recovery
• Regular security audits

Security Rules & Filtering

Access Control Lists (ACLs)

Rules defining permitted and denied network traffic:

  • Standard ACLs: Filter based on source IP address
  • Extended ACLs: Filter on source, destination, ports, protocols
  • Placement: Close to source (deny) or destination (permit)
  • Order matters: First match wins, implicit deny at end
ACL Example:
deny tcp any host 192.168.1.100 eq 23
permit tcp 192.168.1.0 0.0.0.255 any eq 80

URL Filtering

Controls web access based on website categories or specific URLs:

  • Category-based: Block by content type (social media, gaming)
  • Reputation-based: Block known malicious sites
  • Time-based: Restrict access during specific hours
  • User/group-based: Different policies for different users

Content Filtering

Deep packet inspection to block specific content types:

  • Application control: Block specific applications
  • File type filtering: Block dangerous file extensions
  • Keyword filtering: Block content containing specific terms
  • Data Loss Prevention (DLP): Prevent sensitive data exfiltration

Network Zones & Segmentation

Security Zones

Trusted Zone: Internal corporate network with high trust level

Untrusted Zone: External networks (Internet) with no trust

Benefits:

  • Clear security boundaries
  • Consistent policy application
  • Simplified rule management
  • Defense in depth

Screened Subnet (DMZ)

Network segment between trusted and untrusted networks:

  • Purpose: Host public-facing services securely
  • Services: Web servers, email servers, DNS
  • Protection: Firewalls on both sides
  • Access control: Limited communication with internal network
DMZ Architecture:
Internet ↔ Firewall ↔ DMZ ↔ Firewall ↔ Internal Network

Advanced Defense Techniques

Defense Technique Purpose Implementation Effectiveness
Network Segmentation Isolate network resources VLANs, firewalls, routers 🟢 High
Micro-segmentation Granular access control Software-defined perimeters 🟢 Very High
Zero Trust Never trust, always verify Identity-based access control 🟢 Very High
Intrusion Prevention Block malicious traffic IPS appliances, signatures 🟡 Medium-High
Behavior Analysis Detect anomalies ML-based monitoring 🟡 Medium-High
Defense in Depth Strategy:
• Multiple layers of security controls
• Physical, network, application, and data protection
• Administrative, technical, and physical controls
• Assume any single control can fail
• Regular testing and validation of defenses

3.1 Organizational Processes & Procedures

Proper documentation, lifecycle management, and change control processes are essential for maintaining reliable network operations and ensuring business continuity.

Network Documentation

Physical vs. Logical Diagrams

Physical: Shows actual equipment placement, rack locations, cable runs, and physical connections
Logical: Shows network relationships, IP addressing schemes, VLANs, and data flow independent of physical layout

Rack Diagrams

Detailed layouts showing equipment placement within racks:

  • Device positioning (front/rear view)
  • Power requirements and connections
  • Patch panel assignments
  • Airflow and cooling considerations

Cable Maps & Diagrams

Comprehensive cable documentation including:

  • Cable types and specifications
  • Source and destination endpoints
  • Cable routing and pathways
  • Testing results and certifications

Network Layer Diagrams

Layer 1: Physical connectivity and media
Layer 2: Switch topology, VLANs, spanning tree
Layer 3: Routing topology, IP addressing, subnets

Asset Management

Hardware Inventory

Complete tracking of physical network equipment:

  • Model numbers and serial numbers
  • Purchase dates and locations
  • Configuration specifications
  • Performance capabilities

Software Inventory

Tracking of all network software components:

  • Operating system versions
  • Firmware versions
  • Application software
  • Security patch levels

Licensing Management

Compliance and optimization of software licenses:

  • License types and quantities
  • Expiration dates
  • Compliance auditing
  • Renewal tracking

Warranty Support

Tracking support coverage and contracts:

  • Warranty expiration dates
  • Support contract details
  • Service level agreements
  • Escalation procedures

Specialized Documentation

IPAM (IP Address Management)

Centralized tracking of IP address allocation:

  • Available and allocated IP ranges
  • DHCP scope management
  • DNS record correlation
  • Historical usage tracking

Service Level Agreements (SLA)

Formal agreements defining service expectations:

  • Uptime targets: 99.9%, 99.99%
  • Response times: Incident resolution
  • Performance metrics: Bandwidth, latency
  • Penalties: Non-compliance consequences

Wireless Survey & Heat Maps

RF coverage analysis and optimization:

  • Signal strength measurements
  • Coverage area visualization
  • Interference identification
  • Access point placement recommendations

Life-cycle Management

End-of-Life (EOL) & End-of-Support (EOS)

EOL: Manufacturer stops selling product
EOS: Support and updates discontinued
Planning: Migration strategies before support ends

Software Management

Patches: Security and bug fixes
OS Updates: Operating system maintenance
Firmware: Hardware-level software updates
Testing: Validation before production deployment

Decommissioning Process

Secure retirement of network equipment:

  • Data sanitization/wiping
  • Configuration backup and removal
  • Asset disposal procedures
  • Environmental compliance

Change & Configuration Management

Change Management Process

Structured approach to network modifications:

  • Request: Formal change proposal
  • Approval: Review and authorization
  • Testing: Pre-production validation
  • Implementation: Controlled deployment
  • Verification: Post-change validation

Configuration Management

Production: Current active configurations
Backup: Stored copies for restoration
Baseline/Golden: Standard reference configurations for consistency

3.2 Network Monitoring Technologies

Monitoring Methods

SNMP (Simple Network Management Protocol)

Industry standard for network device monitoring and management

VersionSecurityFeatures
v1Community strings (plain text)Basic monitoring
v2cCommunity stringsImproved data types, bulk transfers
v3Authentication & encryptionUser-based security, privacy

SNMP Components

Traps: Unsolicited alerts sent by devices to management station
MIB (Management Information Base): Database of manageable objects
Community Strings: Shared secrets for SNMP access (v1/v2c)
Authentication: User credentials and encryption (v3)

Flow Data Analysis

Network traffic pattern analysis using:

  • NetFlow: Cisco's flow technology
  • sFlow: Statistical packet sampling
  • IPFIX: IP Flow Information Export standard
  • Benefits: Bandwidth utilization, security analysis

Packet Capture

Deep packet inspection for troubleshooting:

  • Tools: Wireshark, tcpdump, TShark
  • Analysis: Protocol decoding, timing
  • Filtering: Specific traffic isolation
  • Storage: PCAP file formats

Monitoring Solutions & Analysis

Baseline Metrics & Anomaly Detection

Establishing normal operational parameters:

  • Performance baselines: CPU, memory, bandwidth
  • Traffic patterns: Typical usage flows
  • Anomaly alerting: Deviation from normal
  • Thresholds: Warning and critical levels

Log Aggregation

Syslog Collector: Centralized log collection from network devices
SIEM: Security Information and Event Management for correlation and analysis
Benefits: Centralized analysis, compliance reporting

Integration & Mirroring

API Integration: Programmatic access to monitoring data
Port Mirroring: Copy traffic to monitoring tools

  • SPAN: Switch Port Analyzer (Cisco)
  • Mirror ports: Traffic replication
  • Remote monitoring: RSPAN, ERSPAN

Monitoring Categories

Network Discovery

Ad Hoc: Manual, on-demand device discovery
Scheduled: Automated, periodic network scanning
Methods: SNMP, ping sweeps, ARP table analysis

Traffic Analysis

Understanding network traffic patterns:

  • Bandwidth utilization
  • Protocol distribution
  • Top talkers identification
  • Security threat detection

Performance Monitoring

Key performance indicators (KPIs):

  • Latency: Round-trip time measurements
  • Throughput: Data transfer rates
  • Packet loss: Reliability metrics
  • Jitter: Timing variation

Availability & Configuration Monitoring

Availability: Device and service uptime tracking
Configuration: Change detection and compliance monitoring
Alerting: Immediate notification of issues

3.3 Disaster Recovery Concepts

DR Metrics & Objectives

Recovery Point Objective (RPO)

Definition: Maximum acceptable data loss measured in time
Example: RPO of 1 hour means maximum 1 hour of data loss
Impact: Determines backup frequency requirements

Recovery Time Objective (RTO)

Definition: Maximum acceptable downtime for system recovery
Example: RTO of 4 hours means system must be restored within 4 hours
Impact: Determines infrastructure and staffing requirements

Mean Time to Repair (MTTR)

Definition: Average time required to repair failed system
Calculation: Total repair time ÷ Number of incidents
Goal: Minimize through better processes and tools

Mean Time Between Failures (MTBF)

Definition: Average time between system failures
Calculation: Total operating time ÷ Number of failures
Goal: Maximize through redundancy and quality equipment

Disaster Recovery Sites

Cold Site

Description: Basic facility with power, cooling, and network connectivity
Recovery Time: Days to weeks
Cost: Lowest cost option
Use Case: Non-critical systems with longer RTO requirements

Warm Site

Description: Partially equipped with some systems and data
Recovery Time: Hours to days
Cost: Moderate cost
Use Case: Balance between cost and recovery time

Hot Site

Description: Fully equipped with current data and systems
Recovery Time: Minutes to hours
Cost: Highest cost
Use Case: Mission-critical systems requiring immediate failover

High Availability Approaches

Active-Active

Configuration: Multiple systems simultaneously processing requests
Benefits: Load distribution, no wasted resources
Considerations: More complex configuration, potential data sync issues

Active-Passive

Configuration: Primary system active, secondary on standby
Benefits: Simpler configuration, faster failover
Considerations: Standby resources not utilized during normal operations

DR Testing & Validation

Tabletop Exercises

Discussion-based scenario walkthroughs:

  • Purpose: Test procedures and communication
  • Participants: Key stakeholders and response teams
  • Benefits: Low cost, identifies process gaps
  • Frequency: Quarterly or semi-annually

Validation Tests

Practical testing of recovery procedures:

  • Full testing: Complete system failover
  • Partial testing: Individual component testing
  • Parallel testing: Test without affecting production
  • Documentation: Record results and improvements
DR Planning Best Practices:
• Regular testing and updates of DR procedures
• Clear roles and responsibilities definition
• Communication plans for stakeholders
• Documentation of all recovery processes
• Regular review and adjustment of RPO/RTO targets

3.4 IPv4 & IPv6 Network Services

Dynamic Addressing

DHCP (Dynamic Host Configuration Protocol)

Automatic IP address assignment and network configuration

DHCP Process (DORA):
1. Discover: Client broadcasts for DHCP server
2. Offer: Server offers IP configuration
3. Request: Client requests specific configuration
4. Acknowledge: Server confirms assignment

DHCP Configuration Options

Reservations: Static IP assignment for specific MAC addresses
Scope: Range of IP addresses available for assignment
Lease Time: Duration of IP address assignment
Exclusions: IP addresses withheld from automatic assignment

DHCP Options & Relay

Common Options:

  • Option 3: Default gateway
  • Option 6: DNS servers
  • Option 42: NTP servers
  • Option 150: TFTP server

DHCP Relay/IP Helper: Forwards DHCP requests across subnets

SLAAC (Stateless Address Autoconfiguration)

IPv6 automatic address configuration without DHCP:

  • Router Advertisement: Network prefix announcement
  • Interface ID: Generated from MAC address (EUI-64)
  • Privacy Extensions: Temporary addresses for privacy
  • Duplicate Address Detection: Ensures uniqueness

Domain Name System (DNS)

DNS Fundamentals

Hierarchical name resolution system translating domain names to IP addresses

DNS Query Process:
1. Client queries local DNS resolver
2. Resolver queries root nameservers
3. Root directs to TLD nameservers
4. TLD directs to authoritative servers
5. Authoritative server returns IP address

DNS Security Extensions

DNSSEC: Cryptographic signatures for DNS data integrity
DNS over HTTPS (DoH): DNS queries over encrypted HTTPS
DNS over TLS (DoT): DNS queries over TLS encryption

DNS Record Types

Record Type Purpose Example
A Maps domain to IPv4 address example.com → 192.168.1.100
AAAA Maps domain to IPv6 address example.com → 2001:db8::1
CNAME Canonical name (alias) www.example.com → example.com
MX Mail exchange server example.com → mail.example.com (priority 10)
TXT Text information SPF, DKIM, domain verification
NS Nameserver example.com → ns1.example.com
PTR Reverse DNS lookup 1.168.192.in-addr.arpa → example.com

DNS Zone Types & Authority

Zone Types

Forward Zone: Domain name to IP address resolution
Reverse Zone: IP address to domain name resolution
Benefits: Email validation, logging, security

Authority & Recursion

Authoritative: Definitive source for zone data
Non-authoritative: Cached or forwarded responses
Primary: Master zone with read/write access
Secondary: Replica zone with read-only access
Recursive: Performs full resolution process

Hosts File

Local name resolution file bypassing DNS:

  • Location: /etc/hosts (Linux), C:\Windows\System32\drivers\etc\hosts (Windows)
  • Priority: Checked before DNS resolution
  • Use cases: Testing, blocking, local services

Time Synchronization Protocols

NTP (Network Time Protocol)

Synchronizes system clocks over network with millisecond accuracy

  • Stratum levels: Distance from reference clock
  • Authentication: Symmetric keys for security
  • Port: UDP 123

PTP (Precision Time Protocol)

IEEE 1588 standard for microsecond-level time synchronization in LANs

  • Accuracy: Sub-microsecond precision
  • Use cases: Industrial automation, financial trading
  • Hardware support: Requires specialized network equipment

NTS (Network Time Security)

Security extension for NTP providing authentication and encryption

  • TLS handshake: Secure key exchange
  • Packet authentication: Prevents time spoofing
  • Backward compatibility: Works with existing NTP infrastructure

VPN Services

Site-to-Site VPN

Permanent encrypted connections between network locations:

  • Use case: Connecting branch offices
  • Protocols: IPSec, GRE over IPSec
  • Benefits: Always-on connectivity, transparent to users

Client-to-Site VPN

Remote user access to corporate network:

  • Clientless: Browser-based access (SSL VPN)
  • Client-based: Software installation required
  • Split tunnel: Only corporate traffic through VPN
  • Full tunnel: All traffic through VPN

3.5 Network Access & Management Methods

Connection Methods

SSH (Secure Shell)

Encrypted command-line access to network devices:

  • Authentication: Password or key-based
  • Encryption: All communication encrypted
  • Port: TCP 22
  • Benefits: Secure replacement for Telnet

GUI (Graphical User Interface)

Web-based or application interfaces for device management:

  • Web interfaces: HTTPS-based management
  • Desktop applications: Vendor-specific tools
  • Benefits: User-friendly, visual configuration
  • Considerations: May have limited functionality

API (Application Programming Interface)

Programmatic access to device functions:

  • REST API: HTTP-based interactions
  • NETCONF: Network configuration protocol
  • Benefits: Automation, integration with tools
  • Authentication: API keys, tokens

Console Access

Direct physical connection to device:

  • Serial console: RS-232 or USB connections
  • Emergency access: Works when network is down
  • Initial configuration: First-time device setup
  • Recovery: Password recovery and firmware updates

Access Control & Security

Jump Box/Bastion Host

Secure gateway for accessing internal network resources:

  • Function: Single point of entry
  • Security: Hardened system with logging
  • Access control: Authentication and authorization
  • Monitoring: Session recording and audit trails

Management Network Separation

In-band Management:

  • Uses production network infrastructure
  • Shared with data traffic
  • Cost-effective but less secure

Out-of-band Management:

  • Dedicated management network
  • Isolated from production traffic
  • Higher security and availability
Management Best Practices:
• Use encrypted protocols (SSH, HTTPS) for remote access
• Implement role-based access control (RBAC)
• Enable comprehensive logging and monitoring
• Use out-of-band management for critical infrastructure
• Regularly update management software and firmware
• Implement multi-factor authentication where possible

Access Methods Comparison

Method Security Level Use Case Pros Cons
Console 🟢 High Initial setup, recovery Always available, secure Physical access required
SSH 🟢 High Command-line management Encrypted, scriptable Text-based interface
HTTPS GUI 🟡 Medium-High User-friendly management Visual, easy to use Limited functionality
API 🟡 Medium-High Automation, integration Programmable, scalable Requires development skills
Telnet 🔴 Low Legacy systems only Universal support Unencrypted, insecure
how data packets are forwarded between networks, involving both static configuration and dynamic protocols.

Routing Types

Static Routing

Manually configured routes that don't change automatically. Provides full administrative control but requires manual updates for network changes.

Advantages: Security, predictability, no CPU overhead
Disadvantages: No fault tolerance, manual configuration

Dynamic Routing

Automatically discovers and maintains routes using routing protocols. Adapts to network changes and provides fault tolerance.

Advantages: Automatic convergence, fault tolerance
Disadvantages: CPU overhead, potential security risks

Dynamic Routing Protocols

BGP (Border Gateway Protocol)

Type: Exterior Gateway Protocol (EGP)
Use: Internet routing between autonomous systems
Algorithm: Path vector
Metric: Path attributes (AS path, local preference)

EIGRP (Enhanced Interior Gateway Routing Protocol)

Type: Advanced distance vector
Vendor: Cisco proprietary
Algorithm: DUAL (Diffusing Update Algorithm)
Metric: Bandwidth, delay, reliability, load

OSPF (Open Shortest Path First)

Type: Link state protocol
Standard: Open standard (RFC 2328)
Algorithm: Dijkstra's shortest path
Metric: Cost (based on bandwidth)

Route Selection Criteria

Administrative Distance

Trustworthiness of routing source (0-255, lower is better)

Directly Connected0
Static Route1
EIGRP90
OSPF110
RIP120

Prefix Length (Subnet Mask)

More specific routes (longer prefix) preferred over less specific routes

Example:
192.168.1.0/24 preferred over 192.168.0.0/16

Metric

Protocol-specific path cost calculation

  • OSPF: Cost (bandwidth-based)
  • EIGRP: Composite metric
  • RIP: Hop count
  • BGP: Path attributes

Address Translation & Redundancy

NAT (Network Address Translation)

Translates private IP addresses to public IP addresses, typically one-to-one mapping for each connection.

PAT (Port Address Translation)

NAT overload - many private IPs share one public IP using different port numbers. Most common home/business implementation.

FHRP (First Hop Redundancy Protocol)

Provides gateway redundancy using virtual IP addresses

  • HSRP: Cisco proprietary
  • VRRP: Open standard
  • GLBP: Cisco load balancing

Virtual IP (VIP) & Subinterfaces

VIP: Shared IP address for redundancy
Subinterfaces: Multiple logical interfaces on single physical interface for VLAN routing

2.2 Switching Technologies & Features

Virtual Local Area Networks (VLANs)

VLAN Fundamentals

Logical segmentation of Layer 2 networks, creating separate broadcast domains on same physical infrastructure.

Benefits: Security, broadcast control, flexible design, cost reduction

VLAN Database

Switch configuration storage containing VLAN information:

  • VLAN ID (1-4094)
  • VLAN name
  • Port assignments
  • VLAN state (active/suspended)

SVI (Switch Virtual Interface)

Layer 3 logical interface representing a VLAN, enables inter-VLAN routing and management access.

Example: interface vlan 10
ip address 192.168.10.1 255.255.255.0

Interface Configuration

Native VLAN

Default VLAN for untagged traffic on 802.1Q trunk ports. Default is VLAN 1, but should be changed for security.

Voice VLAN

Dedicated VLAN for VoIP traffic, providing QoS prioritization and separate from data traffic.

802.1Q Tagging

IEEE standard for VLAN tagging, inserts 4-byte tag into Ethernet frame header:

  • TPID: Tag Protocol Identifier
  • PCP: Priority Code Point (QoS)
  • DEI: Drop Eligible Indicator
  • VID: VLAN Identifier (12 bits)

Link Aggregation

Combines multiple physical links into single logical link:

  • LACP: Link Aggregation Control Protocol (802.3ad)
  • PAgP: Port Aggregation Protocol (Cisco)
  • Benefits: Increased bandwidth, redundancy

Speed & Duplex

Speed: 10Mbps, 100Mbps, 1Gbps, 10Gbps, etc.
Duplex:

  • Half: Send OR receive (collisions possible)
  • Full: Send AND receive simultaneously
  • Auto: Negotiate best speed/duplex

Spanning Tree & Frame Size

Spanning Tree Protocol (STP)

Prevents Layer 2 loops by blocking redundant paths:

  • STP: Original 802.1D (50 second convergence)
  • RSTP: Rapid STP 802.1w (6 second convergence)
  • MSTP: Multiple STP 802.1s (per-VLAN)
Port States: Blocking → Listening → Learning → Forwarding

MTU (Maximum Transmission Unit)

Largest frame size that can be transmitted:

  • Standard Ethernet: 1518 bytes
  • Jumbo Frames: Up to 9000 bytes
  • Benefits: Reduced overhead for large transfers
  • Requirement: End-to-end support needed

2.3 Wireless Devices & Technologies

Wireless Channels & Frequency

2.4GHz Band

Channels: 1-14 (varies by region)
Non-overlapping: 1, 6, 11 (North America)
Range: Better penetration, longer range
Issues: More congested, interference

5GHz Band

Channels: Many more available
Non-overlapping: 36, 40, 44, 48, 149, 153, 157, 161
Range: Shorter range, less penetration
Benefits: Less congested, higher speeds

6GHz Band (Wi-Fi 6E)

Channels: 1200MHz of spectrum
Benefits: No legacy device interference
Range: Similar to 5GHz
Requirement: Wi-Fi 6E certified devices

Channel Management

Channel Width: 20MHz, 40MHz, 80MHz, 160MHz
Band Steering: Direct devices to optimal frequency
802.11h: Dynamic Frequency Selection (DFS)

Service Set Identifiers

SSID (Service Set Identifier)

Network name broadcasted by access points, up to 32 characters. Can be hidden for basic security.

BSSID (Basic Service Set Identifier)

MAC address of individual access point's radio. Unique identifier for each AP.

ESSID (Extended Service Set Identifier)

Same SSID used across multiple access points to create seamless roaming experience.

Wireless Network Types

Infrastructure Mode

Devices connect through access point to wired network. Most common deployment model.

Ad Hoc (IBSS)

Direct device-to-device communication without access point. Independent Basic Service Set.

Point-to-Point

Direct wireless link between two locations, often using directional antennas for long distances.

Mesh Networks

Multiple APs interconnected wirelessly, providing redundancy and extended coverage.

Security & Authentication

WPA2 (Wi-Fi Protected Access 2)

Encryption: AES-CCMP
Authentication: PSK or 802.1X
Standard: IEEE 802.11i
Key Management: 4-way handshake

WPA3

Encryption: AES-GCMP
Authentication: SAE (Simultaneous Authentication of Equals)
Benefits: Protection against offline attacks
Enhanced: 192-bit security for enterprise

Authentication Methods

PSK (Pre-Shared Key): Same password for all users
Enterprise (802.1X): Individual user credentials via RADIUS server

Guest Networks & Captive Portals

Guest Network: Isolated SSID for visitors
Captive Portal: Web-based authentication before network access

Antennas & Access Points

Antenna Types

Omnidirectional: 360-degree coverage pattern
Directional: Focused coverage (Yagi, parabolic)
Use Cases: Omni for general coverage, directional for point-to-point

Access Point Types

Autonomous (Fat AP): Self-contained with full functionality
Lightweight (Thin AP): Controlled by wireless LAN controller (WLC)

2.4 Physical Installation Factors

Installation Locations & Infrastructure

MDF (Main Distribution Frame)

Central wiring point connecting to service provider and housing core network equipment:

  • Internet service provider connections
  • Core switches and routers
  • Server connections
  • Building backbone cabling

IDF (Intermediate Distribution Frame)

Secondary wiring closets for floor or area distribution:

  • Access layer switches
  • Patch panels
  • Horizontal cable runs to workstations
  • Local networking equipment

Rack Considerations

Standard Sizes: 19" width, 42U height typical
Airflow: Port-side exhaust vs. intake
Security: Lockable doors and side panels
Organization: Cable management and labeling

Cabling Infrastructure

Patch Panels

Organized termination points for horizontal cabling:

  • Purpose: Cable management and organization
  • Types: Cat5e, Cat6, Cat6A
  • Configuration: 24, 48 port common
  • Benefits: Easy changes without re-termination

Fiber Distribution Panels

Fiber optic cable termination and management:

  • Splice trays: Fusion splice protection
  • Adapter panels: Connector terminations
  • Cable management: Bend radius protection
  • Testing access: Easy troubleshooting

Power Systems

UPS (Uninterruptible Power Supply)

Backup power for critical network equipment:

  • Online: Continuous power conditioning
  • Line Interactive: Automatic voltage regulation
  • Standby: Basic backup power
  • Runtime: Based on load and battery capacity

PDU (Power Distribution Unit)

Intelligent power distribution for rack equipment:

  • Basic: Simple power strip
  • Monitored: Remote power monitoring
  • Switched: Remote on/off control
  • Intelligent: Advanced monitoring and control

Power Considerations

Power Load: Calculate total equipment power draw
Voltage Requirements:

  • 120V: Standard US outlets
  • 208V: Three-phase systems
  • 240V: High-power equipment
  • Planning: 80% rule for circuit loading

Environmental Factors

Temperature Control

Operating Range: Typically 64-75°F (18-24°C)
Cooling: HVAC systems for equipment rooms
Hot/Cold Aisles: Efficient airflow management
Monitoring: Temperature sensors and alerts

Humidity Control

Optimal Range: 45-55% relative humidity
Too Low: Static electricity damage
Too High: Corrosion and condensation
Control: Humidifiers and dehumidifiers

Fire Suppression

Specialized systems for equipment protection:

  • Clean Agent: FM-200, Novec 1230 (no residue)
  • Inert Gas: Nitrogen, argon (oxygen displacement)
  • Water Mist: Fine water droplets
  • Avoid: Standard sprinklers (water damage)
Installation Best Practices:
• Plan cable paths to avoid interference
• Label all connections for easy identification
• Maintain proper bend radius for cables
• Ensure adequate ventilation and power capacity
• Document all installations for future reference