CompTIA Network+ N10-009

Domain 5.0: Network Troubleshooting

Complete Study Guide & Practical Reference for Professional Network Troubleshooting

20-25% Exam Weight
5 Objectives
7-Step Methodology
Free Resource

Master Network Troubleshooting for CompTIA Network+ N10-009

Welcome to the most comprehensive study guide for CompTIA Network+ Domain 5.0. This guide covers everything you need to know about network troubleshooting, from systematic methodologies to advanced diagnostic tools. Whether you're preparing for the N10-009 exam or enhancing your professional troubleshooting skills, this resource provides practical, real-world knowledge.

🔍

Systematic Approach

Learn the 7-step troubleshooting methodology that ensures consistent, efficient problem resolution across any network environment.

🔧

Practical Tools

Master essential troubleshooting tools including command-line utilities, packet analyzers, and hardware testing equipment.

Performance Optimization

Identify and resolve network performance bottlenecks, latency issues, and bandwidth limitations effectively.

📊

Real-World Scenarios

Apply troubleshooting knowledge to common enterprise network problems with detailed examples and solutions.

Estimated Study Time: 8-12 hours
Difficulty Level: Intermediate to Advanced
Prerequisites: Basic networking knowledge (Network+ Domains 1-4)

Domain 5.0 Objectives Covered

  • 5.1 Explain the network troubleshooting methodology
  • 5.2 Given a scenario, troubleshoot common cable connectivity issues and select the appropriate tools
  • 5.3 Given a scenario, use the appropriate network software tools and commands
  • 5.4 Given a scenario, troubleshoot common wireless connectivity and performance issues
  • 5.5 Given a scenario, troubleshoot general networking issues

5.1 Network Troubleshooting Methodology

A systematic approach to network troubleshooting ensures efficient problem resolution and prevents recurring issues through proper documentation and analysis.

The Structured Troubleshooting Process

Step 1

Identify the Problem

Gather Information: Collect detailed information about the issue from multiple sources

  • Question users: What exactly is not working? When did it start?
  • Identify symptoms: Error messages, performance issues, connectivity failures
  • Determine changes: Recent updates, configuration changes, new equipment
  • Duplicate the problem: Reproduce the issue to understand its scope
  • Approach individually: Handle multiple problems separately to avoid confusion
Step 2

Establish a Theory of Probable Cause

Question the Obvious: Start with simple, common causes before complex scenarios

Consider Multiple Approaches:

  • Top-to-bottom OSI: Start at Application layer, work down to Physical
  • Bottom-to-top OSI: Start at Physical layer, work up to Application
  • Divide and conquer: Isolate problem domain by testing different segments
Step 3

Test the Theory to Determine Cause

If theory confirmed: Determine next steps to resolve the problem

If theory not confirmed: Establish new theory or escalate to higher expertise

Testing Guidelines:
• Use non-disruptive tests when possible
• Document test results for future reference
• Consider impact on production systems
Step 4

Establish Plan of Action

Develop comprehensive plan to resolve problem and identify potential effects:

  • Resource requirements: Personnel, equipment, time
  • Impact assessment: Affected users, systems, services
  • Rollback plan: How to undo changes if needed
  • Communication plan: Notify stakeholders of planned changes
Step 5

Implement Solution or Escalate

Execute the planned solution or escalate to appropriate personnel:

  • Follow change management: Proper approval and scheduling
  • Escalation criteria: Complex issues, critical systems, time constraints
  • Implementation timing: Consider maintenance windows
Step 6

Verify Full System Functionality

Confirm the problem is resolved and implement preventive measures:

  • End-to-end testing: Verify complete functionality
  • User validation: Confirm users can perform required tasks
  • Preventive measures: Monitoring, alerts, configuration changes
  • Performance baseline: Establish new performance metrics
Step 7

Document Findings and Lessons Learned

Create comprehensive documentation throughout the process:

  • Problem description: Symptoms, scope, impact
  • Root cause analysis: What caused the problem
  • Solution implemented: Step-by-step resolution
  • Lessons learned: Prevention strategies, knowledge transfer
Troubleshooting Best Practices:
• Always have a backup plan before making changes
• Test changes in a lab environment when possible
• Keep detailed logs of all troubleshooting steps
• Communicate clearly with users and stakeholders
• Learn from each troubleshooting experience

5.2 Cabling & Physical Interface Issues

Cable Issues

Incorrect Cable Types

Fiber Optic Mismatch:

  • Single-mode: Long distance, narrow core (9μm)
  • Multi-mode: Shorter distance, wider core (50μm/62.5μm)
  • Problem: Mode mismatch causes signal loss
  • Detection: High attenuation, intermittent connectivity

Ethernet Cable Categories:

  • Cat 5e: 1Gbps, 100MHz
  • Cat 6: 1Gbps (10Gbps short distance), 250MHz
  • Cat 6A: 10Gbps, 500MHz
  • Cat 7/8: Higher frequencies, specialized applications

Shielding Issues:

  • STP: Shielded Twisted Pair - better EMI protection
  • UTP: Unshielded Twisted Pair - more common, cost-effective
  • Problem: Using UTP in high-EMI environments

Signal Degradation Issues

Crosstalk

Electromagnetic interference between wire pairs:

  • NEXT: Near-End Crosstalk - interference at transmitting end
  • FEXT: Far-End Crosstalk - interference at receiving end
  • Causes: Damaged cable, poor termination, bundle proximity
  • Testing: Cable analyzer with crosstalk measurements

Electromagnetic Interference (EMI)

External interference affecting signal quality:

  • Sources: Motors, fluorescent lights, wireless devices
  • Symptoms: Intermittent connectivity, performance issues
  • Mitigation: Shielded cables, proper grounding, route separation
  • Testing: Spectrum analyzer, EMI detector

Attenuation

Signal strength loss over distance:

  • Causes: Cable length, poor connections, cable degradation
  • Limits: 100m for copper Ethernet, varies for fiber
  • Solutions: Repeaters, switches, shorter cable runs
  • Testing: Cable tester, optical power meter

Termination & Polarity Issues

Improper Termination

Incorrect cable connector installation:

  • RJ45 issues: Wrong wire order, poor crimping, exposed conductors
  • Fiber issues: Poor polish, contamination, improper insertion loss
  • Standards: T568A vs T568B wiring standards
  • Testing: Wire map testing, continuity testing

TX/RX Transposition

Transmit and receive pairs swapped:

  • Fiber optic: TX connected to TX, RX to RX (no communication)
  • Copper: Wrong pair assignments
  • Detection: No link light, failed connectivity
  • Solution: Swap fiber connections, rewire copper pairs

Interface Issues & Counters

Error Counters

CRC (Cyclic Redundancy Check): Frame corruption errors

  • Causes: Physical layer issues, electromagnetic interference
  • Impact: Retransmissions, performance degradation

Runts: Frames smaller than 64 bytes

  • Causes: Collisions, faulty NICs, duplex mismatch

Giants: Frames larger than maximum size (1518 bytes)

  • Causes: Faulty drivers, incorrect MTU settings

Drops: Discarded packets due to buffer overflow

  • Causes: Congestion, insufficient bandwidth

Port Status Issues

Port States

Error Disabled: Port automatically shut down due to error condition

  • Triggers: Port security violation, STP guard, duplex mismatch
  • Recovery: Clear error condition, manually re-enable port

Administratively Down: Port manually disabled

  • Commands: shutdown/no shutdown
  • Reasons: Security, maintenance, troubleshooting

Suspended: Port temporarily disabled by switch

  • Causes: Policy violations, security restrictions

Hardware Issues

Power over Ethernet (PoE)

Power Budget Exceeded: Switch cannot provide enough power

  • PoE (802.3af): 15.4W per port
  • PoE+ (802.3at): 30W per port
  • PoE++ (802.3bt): 60W or 100W per port
  • Solution: PoE budget management, external power injectors

Incorrect PoE Standard: Mismatch between device requirements and switch capability

Transceiver Issues

Transceiver Mismatch: Incompatible SFP/QSFP modules

  • Speed mismatch: 1G SFP in 10G port
  • Protocol mismatch: Ethernet vs Fibre Channel
  • Vendor compatibility: Third-party vs OEM transceivers

Signal Strength Issues:

  • Fiber attenuation: Signal loss over distance
  • Dirty connectors: Contamination affecting light transmission
  • Testing: Optical power meter, OTDR testing

5.3 Network Services Issues

Switching Issues

Spanning Tree Protocol (STP) Issues

Network Loops: Multiple paths causing broadcast storms

  • Symptoms: High CPU utilization, slow network performance
  • Detection: Rapidly changing MAC address tables
  • Prevention: Proper STP configuration, loop prevention

Root Bridge Selection Issues:

  • Problem: Suboptimal root bridge selection
  • Solution: Manual priority configuration
  • Best practice: Set core switches as root bridge

Port Roles & States:

  • Roles: Root, designated, alternate, backup
  • States: Discarding, learning, forwarding
  • Issues: Slow convergence, incorrect role assignment

VLAN Issues

Incorrect VLAN Assignment:

  • Symptoms: Cannot communicate with other hosts
  • Troubleshooting: Verify port VLAN membership
  • Commands: show vlan, show interface switchport
  • Common causes: Wrong access VLAN, trunk misconfiguration

VLAN Trunking Issues:

  • Native VLAN mismatch: Different native VLANs on trunk
  • Allowed VLAN list: Required VLANs not permitted
  • Encapsulation mismatch: 802.1Q vs ISL

Access Control List (ACL) Issues

Improperly configured ACLs blocking legitimate traffic:

  • Order dependency: First match wins principle
  • Implicit deny: Default deny at end of ACL
  • Direction: Inbound vs outbound application
  • Troubleshooting: ACL hit counters, log analysis

Routing Issues

Route Selection Problems

Routing Table Issues:

  • Missing routes: No path to destination network
  • Incorrect routes: Wrong next-hop or interface
  • Route preference: Administrative distance conflicts
  • Commands: show ip route, show route

Default Route Problems:

  • Missing default route: Cannot reach unknown networks
  • Incorrect default gateway: Wrong next-hop address
  • Multiple defaults: Conflicting default routes

IP Address Configuration Issues

DHCP Issues

Address Pool Exhaustion: No available IP addresses in DHCP scope

  • Symptoms: Clients receive APIPA addresses (169.254.x.x)
  • Causes: Undersized scope, long lease times, scope depletion
  • Solutions: Expand scope, reduce lease time, reclaim unused addresses
  • Monitoring: DHCP scope utilization, lease tracking

IP Configuration Errors

Incorrect Default Gateway:

  • Symptoms: Local network access works, Internet doesn't
  • Testing: ping default gateway, traceroute
  • Common causes: Wrong IP, gateway down, routing issues

Incorrect IP Address:

  • Wrong subnet: IP not in correct network range
  • Duplicate IP: Two devices with same IP address
  • Detection: ARP conflicts, ping responses

Incorrect Subnet Mask:

  • Symptoms: Communication issues with some hosts
  • Impact: Incorrect network/broadcast calculation
  • Testing: Verify network connectivity patterns
Network Services Troubleshooting Tips:
• Verify physical connectivity first
• Check configuration consistency across devices
• Use appropriate show commands for each service
• Monitor logs for error messages and patterns
• Test connectivity at each network layer

5.4 Performance Issues

Network Congestion & Capacity

Congestion/Contention

Multiple devices competing for limited network resources:

  • Symptoms: Slow response times, packet loss, timeouts
  • Causes: Insufficient bandwidth, shared collision domains
  • Detection: Interface utilization monitoring, queue depths
  • Solutions: Bandwidth upgrades, traffic shaping, load balancing

Bottlenecking

Single point of constraint limiting overall performance:

  • Common locations: Uplinks, Internet connections, servers
  • Identification: Performance monitoring, traffic analysis
  • CPU bottlenecks: High device CPU utilization
  • Memory bottlenecks: Insufficient buffer space

Bandwidth vs Throughput

Bandwidth: Maximum theoretical capacity of network link

Throughput: Actual data transfer rate achieved

  • Factors affecting throughput: Protocol overhead, errors, congestion
  • Measurement: iperf, speed tests, flow monitoring
  • Optimization: Protocol tuning, error reduction

Network Performance Metrics

Latency

Time delay for data to travel from source to destination:

  • Types: Propagation, transmission, processing, queuing delay
  • Measurement: ping, traceroute, synthetic transactions
  • Typical values: LAN <1ms, WAN 20-100ms, Satellite 500-600ms
  • Impact: Application responsiveness, user experience

Packet Loss

Percentage of packets that fail to reach destination:

  • Causes: Congestion, buffer overflow, link errors
  • Impact: Retransmissions, reduced throughput
  • Acceptable levels: <0.1% for most applications
  • Testing: Extended ping tests, performance monitoring

Jitter

Variation in packet arrival times (latency variation):

  • Causes: Network congestion, route changes, queuing
  • Impact: Voice quality degradation, video stuttering
  • Measurement: Jitter buffers, VoIP quality metrics
  • Mitigation: QoS implementation, traffic prioritization

Wireless Performance Issues

RF Interference

Channel Overlap: Adjacent wireless networks using overlapping channels

  • 2.4GHz: Use channels 1, 6, 11 for non-overlap
  • 5GHz: More channels available, less congestion
  • Detection: Wi-Fi analyzer, spectrum analysis
  • Solution: Channel planning, power adjustment

External Interference:

  • Sources: Microwaves, Bluetooth, baby monitors
  • Symptoms: Intermittent connectivity, slow speeds
  • Mitigation: Channel change, 5GHz migration

Signal & Coverage Issues

Signal Degradation/Loss:

  • Causes: Distance, obstacles, multipath fading
  • Symptoms: Low signal strength, high retry rates
  • Solutions: Additional APs, antenna adjustments

Insufficient Wireless Coverage:

  • Dead zones: Areas with no signal
  • Weak signal areas: Poor performance zones
  • Solution: Site survey, AP placement optimization

Client Connection Issues

Client Disassociation:

  • Causes: Weak signal, interference, authentication issues
  • Symptoms: Frequent disconnections, failed connections
  • Troubleshooting: Client logs, AP association logs

Roaming Misconfiguration:

  • Sticky clients: Not roaming to stronger signal
  • Excessive roaming: Constantly switching APs
  • Solutions: Power adjustment, roaming thresholds
Performance Troubleshooting Strategy:
• Establish baseline performance metrics
• Monitor key performance indicators continuously
• Use appropriate tools for each type of analysis
• Consider application requirements when evaluating performance
• Implement QoS for critical applications

5.5 Troubleshooting Tools & Protocols

Software Troubleshooting Tools

Protocol Analyzer

Deep packet inspection and network traffic analysis:

  • Wireshark: Most popular open-source packet analyzer
  • Capabilities: Capture, filter, analyze network traffic
  • Use cases: Protocol debugging, security analysis, performance troubleshooting
  • Features: Real-time capture, offline analysis, protocol decoding

Network Discovery Tools

Nmap: Network discovery and security auditing tool

  • Host discovery: Find active devices on network
  • Port scanning: Identify open ports and services
  • OS detection: Fingerprint operating systems
  • Script scanning: Automated vulnerability detection

LLDP/CDP: Link Layer Discovery Protocols

  • LLDP: IEEE 802.1AB standard for device discovery
  • CDP: Cisco Discovery Protocol (proprietary)
  • Information: Device type, capabilities, management address

Command Line Tools

Command Purpose Example Usage Key Information
ping Test connectivity and latency ping 8.8.8.8 Round-trip time, packet loss
traceroute/tracert Trace path to destination traceroute google.com Hop-by-hop latency, routing path
nslookup DNS troubleshooting nslookup example.com DNS resolution, record types
dig Advanced DNS lookup dig @8.8.8.8 example.com MX Detailed DNS information
tcpdump Command-line packet capture tcpdump -i eth0 port 80 Network traffic analysis
netstat Network connection status netstat -an Active connections, listening ports
ip/ifconfig/ipconfig Interface configuration ip addr show IP addresses, interface status
arp ARP table management arp -a MAC-to-IP mappings

Hardware Troubleshooting Tools

Physical Layer Testing

Toner/Probe: Cable tracing and identification

  • Function: Locate cables in walls, patch panels
  • Components: Tone generator and inductive probe
  • Use cases: Cable mapping, fault isolation

Cable Tester: Verify cable integrity and performance

  • Basic testing: Continuity, wire mapping, length
  • Advanced testing: Crosstalk, attenuation, delay skew
  • Certification: Category compliance testing

Network Analysis Hardware

Network Taps: Hardware devices for traffic monitoring

  • Function: Copy network traffic for analysis
  • Types: Passive optical, active electrical
  • Benefits: No impact on network performance

Wi-Fi Analyzer: Wireless network analysis tools

  • Function: RF spectrum analysis, signal strength mapping
  • Capabilities: Channel utilization, interference detection
  • Site surveys: Coverage planning and optimization

Visual Fault Locator: Fiber optic troubleshooting

  • Function: Inject visible light into fiber
  • Detection: Breaks, bends, connectors
  • Range: Typically up to 5km

Performance Testing

Speed Tester: Bandwidth and throughput measurement

  • Web-based: Speedtest.net, Fast.com
  • Command-line: iperf, iperf3
  • Dedicated hardware: Professional testing equipment
  • Metrics: Download/upload speeds, latency, jitter

Network Device Commands

Layer 2 Troubleshooting Commands

show mac-address-table: Display MAC address mappings

  • Information: MAC addresses, VLANs, ports
  • Troubleshooting: MAC flapping, learning issues

show vlan: Display VLAN configuration and status

  • Information: VLAN ID, name, ports, status
  • Verification: Port assignments, VLAN existence

show arp: Display ARP table entries

  • Information: IP-to-MAC mappings, interface associations
  • Troubleshooting: Address resolution issues

Layer 3 & Interface Commands

show route: Display routing table

  • Information: Networks, next-hops, metrics, protocols
  • Verification: Path selection, reachability

show interface: Display interface status and statistics

  • Information: Status, utilization, errors, counters
  • Troubleshooting: Physical layer issues, performance

show config: Display device configuration

  • Information: Running vs startup configuration
  • Verification: Configuration consistency

show power: Display PoE status and budgets

  • Information: Power consumption, available power
  • Troubleshooting: PoE delivery issues
Tool Selection Guidelines:
• Choose appropriate tool for the problem scope
• Start with simple tools before complex analysis
• Use multiple tools to correlate findings
• Consider impact on production systems
• Document tool results for future reference

4.1 Basic Network Security Concepts

Network security encompasses both logical and physical protection mechanisms to ensure confidentiality, integrity, and availability of network resources and data.

Logical Security

Encryption

Data in Transit: Protecting data while moving across networks

  • TLS/SSL: Web traffic encryption (HTTPS)
  • IPSec: Network layer encryption for VPNs
  • SSH: Secure remote access and file transfers
  • WPA3: Wireless network encryption

Data at Rest: Protecting stored data

  • Disk encryption: Full disk or file-level
  • Database encryption: Column or table-level
  • Key management: Secure key storage and rotation

Digital Certificates

PKI (Public Key Infrastructure): Comprehensive certificate management system

  • Certificate Authority (CA): Issues and manages certificates
  • Registration Authority (RA): Verifies certificate requests
  • Certificate Repository: Stores and distributes certificates
  • Certificate Revocation List (CRL): Lists revoked certificates

Self-signed Certificates: Created without CA validation

  • Use cases: Internal systems, testing environments
  • Limitations: No third-party validation, browser warnings

Identity and Access Management (IAM)

Authentication Methods

Authentication Factors:

  • Something you know: Passwords, PINs
  • Something you have: Tokens, smart cards
  • Something you are: Biometrics

Multifactor Authentication (MFA): Combines multiple factors for enhanced security

Time-based Authentication: TOTP (Time-based One-Time Password) tokens

Single Sign-On (SSO)

Allows users to authenticate once and access multiple systems:

  • Benefits: Improved user experience, reduced password fatigue
  • Protocols: SAML, OAuth, OpenID Connect
  • Considerations: Single point of failure risk

Authentication Protocols

RADIUS

Remote Authentication Dial-in User Service

  • Function: Centralized authentication, authorization, accounting (AAA)
  • Protocol: UDP-based (ports 1812/1813)
  • Use cases: Network access control, VPN authentication
  • Security: Shared secret between client and server

LDAP

Lightweight Directory Access Protocol

  • Function: Directory service for user/group information
  • Protocol: TCP port 389 (LDAPS: 636)
  • Structure: Hierarchical tree structure (DN, OU, CN)
  • Integration: Active Directory, OpenLDAP

SAML

Security Assertion Markup Language

  • Function: XML-based SSO standard
  • Components: Identity Provider (IdP), Service Provider (SP)
  • Use cases: Web-based SSO, federated identity
  • Assertions: Authentication, authorization, attribute statements

TACACS+

Terminal Access Controller Access Control System Plus

  • Function: Cisco proprietary AAA protocol
  • Protocol: TCP port 49 (full encryption)
  • Advantage: Separates authentication and authorization
  • Use cases: Network device management, granular control

Authorization & Access Control

Access Control Principles

Authorization: Determining what authenticated users can access

Least Privilege: Users receive minimum necessary permissions

Role-Based Access Control (RBAC): Permissions assigned based on job roles

RBAC Benefits:
• Simplified management
• Consistent permissions
• Easier compliance auditing
• Reduced human error

Geofencing

Location-based access control using GPS or network-based positioning:

  • Function: Restricts access based on physical location
  • Methods: IP geolocation, GPS coordinates, Wi-Fi/cellular positioning
  • Use cases: Prevent unauthorized access from foreign countries
  • Considerations: VPN bypass, accuracy limitations

Physical Security

Physical Access Controls

Cameras: Surveillance and monitoring systems

  • Types: Fixed, PTZ (pan-tilt-zoom), thermal
  • Features: Motion detection, night vision, facial recognition
  • Storage: Local NVR/DVR, cloud-based

Locks: Physical barriers to unauthorized access

  • Mechanical: Key-based, combination locks
  • Electronic: Card readers, biometric scanners
  • Smart locks: Mobile app control, audit trails

Deception Technologies

Honeypot

Decoy system designed to attract and analyze attackers:

  • Purpose: Early attack detection, threat intelligence
  • Types: Low-interaction (limited services), high-interaction (full systems)
  • Deployment: Internal or external network placement
  • Benefits: Distract attackers, gather attack methods

Honeynet

Network of interconnected honeypots simulating real network environment:

  • Complexity: Multiple systems with realistic interactions
  • Research: Advanced threat analysis and malware study
  • Monitoring: Comprehensive logging and traffic analysis

Security Terminology & CIA Triad

Core Security Terms

Risk: Potential for loss or damage from threat exploitation

Vulnerability: Weakness that can be exploited by threats

Exploit: Method used to take advantage of vulnerability

Threat: Potential danger that could harm system/data

Risk Formula:
Risk = Threat × Vulnerability × Impact

CIA Triad

Confidentiality: Protecting information from unauthorized disclosure

  • Encryption, access controls, classification

Integrity: Ensuring data accuracy and preventing unauthorized modification

  • Checksums, digital signatures, version control

Availability: Ensuring systems and data are accessible when needed

  • Redundancy, fault tolerance, disaster recovery

Compliance & Regulatory Requirements

Data Locality

Requirements for data to reside within specific geographic boundaries:

  • Data sovereignty: National laws governing data storage
  • Compliance: Meeting regional regulatory requirements
  • Cloud considerations: Selecting appropriate data center locations

PCI DSS

Payment Card Industry Data Security Standards

  • Scope: Organizations handling credit card data
  • Requirements: 12 main requirements covering network security
  • Compliance levels: Based on transaction volume
  • Network security: Firewalls, encryption, access controls

GDPR

General Data Protection Regulation

  • Scope: EU personal data protection
  • Rights: Data portability, erasure, breach notification
  • Technical measures: Encryption, pseudonymization
  • Penalties: Up to 4% of annual revenue

Network Segmentation Enforcement

IoT & IIoT Security

IoT (Internet of Things): Consumer connected devices

IIoT (Industrial IoT): Industrial connected systems

  • Challenges: Weak authentication, unencrypted communications
  • Segmentation: Isolated VLANs, micro-segmentation
  • Monitoring: Behavior analysis, anomaly detection

Industrial Control Systems

SCADA: Supervisory Control and Data Acquisition

ICS: Industrial Control Systems

OT: Operational Technology

  • Air-gapping: Physical network isolation
  • DMZ deployment: Secured connection to corporate networks
  • Protocol security: Modbus, DNP3, industrial Ethernet

Guest & BYOD Networks

Guest Networks: Isolated access for visitors

  • Isolation: Separate VLAN with limited access
  • Captive portal: Terms acceptance and registration
  • Bandwidth limits: Quality of service controls

BYOD (Bring Your Own Device): Personal device corporate access

  • Mobile Device Management (MDM): Policy enforcement
  • Containerization: Separate work and personal data
  • Certificate-based authentication: Device identity verification

4.2 Attack Types & Network Impact

Denial of Service Attacks

DoS (Denial of Service)

Attacks from single source to overwhelm target resources:

  • Volumetric: Bandwidth exhaustion attacks
  • Protocol: Exploit protocol weaknesses (SYN flood)
  • Application layer: Target specific services
  • Impact: Service unavailability, performance degradation

DDoS (Distributed Denial of Service)

Coordinated attacks from multiple sources (botnet):

  • Amplification: DNS, NTP reflection attacks
  • Botnet: Compromised devices under attacker control
  • Mitigation: Rate limiting, traffic filtering, CDN protection
  • Scale: Can reach hundreds of Gbps

Layer 2 Attacks

VLAN Hopping

Techniques to access unauthorized VLANs:

  • Double tagging: Exploiting 802.1Q tag processing
  • Switch spoofing: Mimicking trunk port behavior
  • Mitigation: Disable unused ports, explicit VLAN assignment
  • Impact: Unauthorized network access, data exposure

MAC Flooding

Overwhelming switch MAC address table:

  • Method: Sending frames with many fake MAC addresses
  • Result: Switch enters fail-open mode (hub behavior)
  • Impact: Network traffic becomes visible to all ports
  • Mitigation: Port security, MAC address limits

ARP Poisoning/Spoofing

Manipulating ARP tables for man-in-the-middle attacks:

  • ARP Poisoning: Corrupting ARP cache entries
  • ARP Spoofing: Impersonating another device's MAC address
  • Impact: Traffic interception, session hijacking
  • Mitigation: Static ARP entries, ARP inspection

DNS Attacks

DNS Poisoning

Corrupting DNS resolver cache with false information:

  • Cache poisoning: Injecting malicious DNS records
  • Impact: Users redirected to malicious websites
  • Persistence: False entries cached until TTL expires
  • Mitigation: DNSSEC, DNS filtering, secure resolvers

DNS Spoofing

Impersonating legitimate DNS responses:

  • Method: Racing to respond before legitimate DNS server
  • Tools: DNS spoofing frameworks, packet injection
  • Impact: Traffic redirection, credential harvesting
  • Detection: DNS query monitoring, anomaly detection

Rogue Services & Evil Twin Attacks

Rogue DHCP Server

Unauthorized DHCP server providing malicious network configuration:

  • Attack vector: Faster DHCP response than legitimate server
  • Malicious config: Attacker's DNS server, default gateway
  • Impact: Traffic interception, DNS manipulation
  • Mitigation: DHCP snooping, port security

Rogue Access Point

Unauthorized wireless access point on corporate network:

  • Types: Employee-installed, attacker-deployed
  • Risks: Bypass security controls, unauthorized access
  • Detection: Wireless surveys, WIDS/WIPS systems
  • Mitigation: Network access control, port security

Evil Twin

Malicious wireless access point mimicking legitimate network:

  • Method: Same SSID as legitimate network
  • Attraction: Stronger signal or open authentication
  • Impact: Credential harvesting, traffic interception
  • Mitigation: Certificate-based authentication, user education

Advanced Attack Methods

On-Path Attack (MITM)

Attacker intercepts communication between two parties:

  • Active: Modifying communications in real-time
  • Passive: Eavesdropping without modification
  • Methods: ARP spoofing, DNS hijacking, SSL stripping
  • Mitigation: End-to-end encryption, certificate pinning

Malware

Malicious software designed to damage or gain unauthorized access:

  • Virus: Self-replicating code attached to files
  • Worm: Self-propagating across networks
  • Trojan: Disguised as legitimate software
  • Ransomware: Encrypts data for monetary demands
  • Botnet: Network of compromised devices

Social Engineering Attacks

Phishing

Fraudulent attempts to obtain sensitive information:

  • Email phishing: Malicious emails with fake links
  • Spear phishing: Targeted attacks on specific individuals
  • Whaling: Targeting high-profile executives
  • Vishing: Voice-based phishing attacks
  • Smishing: SMS-based phishing attacks

Physical Social Engineering

Dumpster Diving: Searching discarded materials for sensitive information

Shoulder Surfing: Observing users entering passwords or PIN codes

Tailgating: Following authorized person through secured entrance

Mitigation:
• Security awareness training
• Proper document disposal
• Physical access controls
• Privacy screens and shields

4.3 Network Security Defense Solutions

Device Hardening

Security Hardening Practices

Disable Unused Ports and Services:

  • Network ports: Shutdown unused switch ports
  • Services: Disable unnecessary network services
  • Protocols: Remove insecure protocols (Telnet, HTTP)
  • Benefits: Reduced attack surface, improved performance

Change Default Passwords:

  • Default credentials: Well-known and easily exploited
  • Strong passwords: Complex, unique passwords
  • Regular rotation: Periodic password changes
  • Documentation: Secure password management

Network Access Control (NAC)

Port Security

Controls access to individual switch ports:

  • MAC address limiting: Restrict number of MAC addresses per port
  • Static MAC binding: Associate specific MAC with port
  • Violation actions: Shutdown, restrict, or protect mode
  • Aging: Automatic MAC address aging timers

802.1X Port-Based Authentication

Network access control using authentication before network access:

  • Components: Supplicant, Authenticator, Authentication Server
  • EAP methods: EAP-TLS, PEAP, EAP-TTLS
  • Dynamic VLANs: VLAN assignment based on identity
  • MAB: MAC Authentication Bypass for legacy devices

MAC Filtering

Allow or deny access based on MAC addresses:

  • Whitelist: Only approved MAC addresses allowed
  • Blacklist: Specific MAC addresses denied
  • Limitations: MAC addresses can be spoofed
  • Use cases: IoT devices, legacy equipment

Key Management

Cryptographic Key Management

Secure generation, distribution, storage, and rotation of encryption keys:

  • Key generation: Hardware Security Modules (HSMs)
  • Key distribution: Secure channels, out-of-band methods
  • Key storage: Protected key stores, hardware tokens
  • Key rotation: Regular key updates and lifecycle management
  • Key escrow: Secure backup for key recovery
Key Management Best Practices:
• Separate encryption and signing keys
• Implement key versioning
• Secure key backup and recovery
• Regular security audits

Security Rules & Filtering

Access Control Lists (ACLs)

Rules defining permitted and denied network traffic:

  • Standard ACLs: Filter based on source IP address
  • Extended ACLs: Filter on source, destination, ports, protocols
  • Placement: Close to source (deny) or destination (permit)
  • Order matters: First match wins, implicit deny at end
ACL Example:
deny tcp any host 192.168.1.100 eq 23
permit tcp 192.168.1.0 0.0.0.255 any eq 80

URL Filtering

Controls web access based on website categories or specific URLs:

  • Category-based: Block by content type (social media, gaming)
  • Reputation-based: Block known malicious sites
  • Time-based: Restrict access during specific hours
  • User/group-based: Different policies for different users

Content Filtering

Deep packet inspection to block specific content types:

  • Application control: Block specific applications
  • File type filtering: Block dangerous file extensions
  • Keyword filtering: Block content containing specific terms
  • Data Loss Prevention (DLP): Prevent sensitive data exfiltration

Network Zones & Segmentation

Security Zones

Trusted Zone: Internal corporate network with high trust level

Untrusted Zone: External networks (Internet) with no trust

Benefits:

  • Clear security boundaries
  • Consistent policy application
  • Simplified rule management
  • Defense in depth

Screened Subnet (DMZ)

Network segment between trusted and untrusted networks:

  • Purpose: Host public-facing services securely
  • Services: Web servers, email servers, DNS
  • Protection: Firewalls on both sides
  • Access control: Limited communication with internal network
DMZ Architecture:
Internet ↔ Firewall ↔ DMZ ↔ Firewall ↔ Internal Network

Advanced Defense Techniques

Defense Technique Purpose Implementation Effectiveness
Network Segmentation Isolate network resources VLANs, firewalls, routers 🟢 High
Micro-segmentation Granular access control Software-defined perimeters 🟢 Very High
Zero Trust Never trust, always verify Identity-based access control 🟢 Very High
Intrusion Prevention Block malicious traffic IPS appliances, signatures 🟡 Medium-High
Behavior Analysis Detect anomalies ML-based monitoring 🟡 Medium-High
Defense in Depth Strategy:
• Multiple layers of security controls
• Physical, network, application, and data protection
• Administrative, technical, and physical controls
• Assume any single control can fail
• Regular testing and validation of defenses

3.1 Organizational Processes & Procedures

Proper documentation, lifecycle management, and change control processes are essential for maintaining reliable network operations and ensuring business continuity.

Network Documentation

Physical vs. Logical Diagrams

Physical: Shows actual equipment placement, rack locations, cable runs, and physical connections
Logical: Shows network relationships, IP addressing schemes, VLANs, and data flow independent of physical layout

Rack Diagrams

Detailed layouts showing equipment placement within racks:

  • Device positioning (front/rear view)
  • Power requirements and connections
  • Patch panel assignments
  • Airflow and cooling considerations

Cable Maps & Diagrams

Comprehensive cable documentation including:

  • Cable types and specifications
  • Source and destination endpoints
  • Cable routing and pathways
  • Testing results and certifications

Network Layer Diagrams

Layer 1: Physical connectivity and media
Layer 2: Switch topology, VLANs, spanning tree
Layer 3: Routing topology, IP addressing, subnets

Asset Management

Hardware Inventory

Complete tracking of physical network equipment:

  • Model numbers and serial numbers
  • Purchase dates and locations
  • Configuration specifications
  • Performance capabilities

Software Inventory

Tracking of all network software components:

  • Operating system versions
  • Firmware versions
  • Application software
  • Security patch levels

Licensing Management

Compliance and optimization of software licenses:

  • License types and quantities
  • Expiration dates
  • Compliance auditing
  • Renewal tracking

Warranty Support

Tracking support coverage and contracts:

  • Warranty expiration dates
  • Support contract details
  • Service level agreements
  • Escalation procedures

Specialized Documentation

IPAM (IP Address Management)

Centralized tracking of IP address allocation:

  • Available and allocated IP ranges
  • DHCP scope management
  • DNS record correlation
  • Historical usage tracking

Service Level Agreements (SLA)

Formal agreements defining service expectations:

  • Uptime targets: 99.9%, 99.99%
  • Response times: Incident resolution
  • Performance metrics: Bandwidth, latency
  • Penalties: Non-compliance consequences

Wireless Survey & Heat Maps

RF coverage analysis and optimization:

  • Signal strength measurements
  • Coverage area visualization
  • Interference identification
  • Access point placement recommendations

Life-cycle Management

End-of-Life (EOL) & End-of-Support (EOS)

EOL: Manufacturer stops selling product
EOS: Support and updates discontinued
Planning: Migration strategies before support ends

Software Management

Patches: Security and bug fixes
OS Updates: Operating system maintenance
Firmware: Hardware-level software updates
Testing: Validation before production deployment

Decommissioning Process

Secure retirement of network equipment:

  • Data sanitization/wiping
  • Configuration backup and removal
  • Asset disposal procedures
  • Environmental compliance

Change & Configuration Management

Change Management Process

Structured approach to network modifications:

  • Request: Formal change proposal
  • Approval: Review and authorization
  • Testing: Pre-production validation
  • Implementation: Controlled deployment
  • Verification: Post-change validation

Configuration Management

Production: Current active configurations
Backup: Stored copies for restoration
Baseline/Golden: Standard reference configurations for consistency

3.2 Network Monitoring Technologies

Monitoring Methods

SNMP (Simple Network Management Protocol)

Industry standard for network device monitoring and management

VersionSecurityFeatures
v1Community strings (plain text)Basic monitoring
v2cCommunity stringsImproved data types, bulk transfers
v3Authentication & encryptionUser-based security, privacy

SNMP Components

Traps: Unsolicited alerts sent by devices to management station
MIB (Management Information Base): Database of manageable objects
Community Strings: Shared secrets for SNMP access (v1/v2c)
Authentication: User credentials and encryption (v3)

Flow Data Analysis

Network traffic pattern analysis using:

  • NetFlow: Cisco's flow technology
  • sFlow: Statistical packet sampling
  • IPFIX: IP Flow Information Export standard
  • Benefits: Bandwidth utilization, security analysis

Packet Capture

Deep packet inspection for troubleshooting:

  • Tools: Wireshark, tcpdump, TShark
  • Analysis: Protocol decoding, timing
  • Filtering: Specific traffic isolation
  • Storage: PCAP file formats

Monitoring Solutions & Analysis

Baseline Metrics & Anomaly Detection

Establishing normal operational parameters:

  • Performance baselines: CPU, memory, bandwidth
  • Traffic patterns: Typical usage flows
  • Anomaly alerting: Deviation from normal
  • Thresholds: Warning and critical levels

Log Aggregation

Syslog Collector: Centralized log collection from network devices
SIEM: Security Information and Event Management for correlation and analysis
Benefits: Centralized analysis, compliance reporting

Integration & Mirroring

API Integration: Programmatic access to monitoring data
Port Mirroring: Copy traffic to monitoring tools

  • SPAN: Switch Port Analyzer (Cisco)
  • Mirror ports: Traffic replication
  • Remote monitoring: RSPAN, ERSPAN

Monitoring Categories

Network Discovery

Ad Hoc: Manual, on-demand device discovery
Scheduled: Automated, periodic network scanning
Methods: SNMP, ping sweeps, ARP table analysis

Traffic Analysis

Understanding network traffic patterns:

  • Bandwidth utilization
  • Protocol distribution
  • Top talkers identification
  • Security threat detection

Performance Monitoring

Key performance indicators (KPIs):

  • Latency: Round-trip time measurements
  • Throughput: Data transfer rates
  • Packet loss: Reliability metrics
  • Jitter: Timing variation

Availability & Configuration Monitoring

Availability: Device and service uptime tracking
Configuration: Change detection and compliance monitoring
Alerting: Immediate notification of issues

3.3 Disaster Recovery Concepts

DR Metrics & Objectives

Recovery Point Objective (RPO)

Definition: Maximum acceptable data loss measured in time
Example: RPO of 1 hour means maximum 1 hour of data loss
Impact: Determines backup frequency requirements

Recovery Time Objective (RTO)

Definition: Maximum acceptable downtime for system recovery
Example: RTO of 4 hours means system must be restored within 4 hours
Impact: Determines infrastructure and staffing requirements

Mean Time to Repair (MTTR)

Definition: Average time required to repair failed system
Calculation: Total repair time ÷ Number of incidents
Goal: Minimize through better processes and tools

Mean Time Between Failures (MTBF)

Definition: Average time between system failures
Calculation: Total operating time ÷ Number of failures
Goal: Maximize through redundancy and quality equipment

Disaster Recovery Sites

Cold Site

Description: Basic facility with power, cooling, and network connectivity
Recovery Time: Days to weeks
Cost: Lowest cost option
Use Case: Non-critical systems with longer RTO requirements

Warm Site

Description: Partially equipped with some systems and data
Recovery Time: Hours to days
Cost: Moderate cost
Use Case: Balance between cost and recovery time

Hot Site

Description: Fully equipped with current data and systems
Recovery Time: Minutes to hours
Cost: Highest cost
Use Case: Mission-critical systems requiring immediate failover

High Availability Approaches

Active-Active

Configuration: Multiple systems simultaneously processing requests
Benefits: Load distribution, no wasted resources
Considerations: More complex configuration, potential data sync issues

Active-Passive

Configuration: Primary system active, secondary on standby
Benefits: Simpler configuration, faster failover
Considerations: Standby resources not utilized during normal operations

DR Testing & Validation

Tabletop Exercises

Discussion-based scenario walkthroughs:

  • Purpose: Test procedures and communication
  • Participants: Key stakeholders and response teams
  • Benefits: Low cost, identifies process gaps
  • Frequency: Quarterly or semi-annually

Validation Tests

Practical testing of recovery procedures:

  • Full testing: Complete system failover
  • Partial testing: Individual component testing
  • Parallel testing: Test without affecting production
  • Documentation: Record results and improvements
DR Planning Best Practices:
• Regular testing and updates of DR procedures
• Clear roles and responsibilities definition
• Communication plans for stakeholders
• Documentation of all recovery processes
• Regular review and adjustment of RPO/RTO targets

3.4 IPv4 & IPv6 Network Services

Dynamic Addressing

DHCP (Dynamic Host Configuration Protocol)

Automatic IP address assignment and network configuration

DHCP Process (DORA):
1. Discover: Client broadcasts for DHCP server
2. Offer: Server offers IP configuration
3. Request: Client requests specific configuration
4. Acknowledge: Server confirms assignment

DHCP Configuration Options

Reservations: Static IP assignment for specific MAC addresses
Scope: Range of IP addresses available for assignment
Lease Time: Duration of IP address assignment
Exclusions: IP addresses withheld from automatic assignment

DHCP Options & Relay

Common Options:

  • Option 3: Default gateway
  • Option 6: DNS servers
  • Option 42: NTP servers
  • Option 150: TFTP server

DHCP Relay/IP Helper: Forwards DHCP requests across subnets

SLAAC (Stateless Address Autoconfiguration)

IPv6 automatic address configuration without DHCP:

  • Router Advertisement: Network prefix announcement
  • Interface ID: Generated from MAC address (EUI-64)
  • Privacy Extensions: Temporary addresses for privacy
  • Duplicate Address Detection: Ensures uniqueness

Domain Name System (DNS)

DNS Fundamentals

Hierarchical name resolution system translating domain names to IP addresses

DNS Query Process:
1. Client queries local DNS resolver
2. Resolver queries root nameservers
3. Root directs to TLD nameservers
4. TLD directs to authoritative servers
5. Authoritative server returns IP address

DNS Security Extensions

DNSSEC: Cryptographic signatures for DNS data integrity
DNS over HTTPS (DoH): DNS queries over encrypted HTTPS
DNS over TLS (DoT): DNS queries over TLS encryption

DNS Record Types

Record Type Purpose Example
A Maps domain to IPv4 address example.com → 192.168.1.100
AAAA Maps domain to IPv6 address example.com → 2001:db8::1
CNAME Canonical name (alias) www.example.com → example.com
MX Mail exchange server example.com → mail.example.com (priority 10)
TXT Text information SPF, DKIM, domain verification
NS Nameserver example.com → ns1.example.com
PTR Reverse DNS lookup 1.168.192.in-addr.arpa → example.com

DNS Zone Types & Authority

Zone Types

Forward Zone: Domain name to IP address resolution
Reverse Zone: IP address to domain name resolution
Benefits: Email validation, logging, security

Authority & Recursion

Authoritative: Definitive source for zone data
Non-authoritative: Cached or forwarded responses
Primary: Master zone with read/write access
Secondary: Replica zone with read-only access
Recursive: Performs full resolution process

Hosts File

Local name resolution file bypassing DNS:

  • Location: /etc/hosts (Linux), C:\Windows\System32\drivers\etc\hosts (Windows)
  • Priority: Checked before DNS resolution
  • Use cases: Testing, blocking, local services

Time Synchronization Protocols

NTP (Network Time Protocol)

Synchronizes system clocks over network with millisecond accuracy

  • Stratum levels: Distance from reference clock
  • Authentication: Symmetric keys for security
  • Port: UDP 123

PTP (Precision Time Protocol)

IEEE 1588 standard for microsecond-level time synchronization in LANs

  • Accuracy: Sub-microsecond precision
  • Use cases: Industrial automation, financial trading
  • Hardware support: Requires specialized network equipment

NTS (Network Time Security)

Security extension for NTP providing authentication and encryption

  • TLS handshake: Secure key exchange
  • Packet authentication: Prevents time spoofing
  • Backward compatibility: Works with existing NTP infrastructure

VPN Services

Site-to-Site VPN

Permanent encrypted connections between network locations:

  • Use case: Connecting branch offices
  • Protocols: IPSec, GRE over IPSec
  • Benefits: Always-on connectivity, transparent to users

Client-to-Site VPN

Remote user access to corporate network:

  • Clientless: Browser-based access (SSL VPN)
  • Client-based: Software installation required
  • Split tunnel: Only corporate traffic through VPN
  • Full tunnel: All traffic through VPN

3.5 Network Access & Management Methods

Connection Methods

SSH (Secure Shell)

Encrypted command-line access to network devices:

  • Authentication: Password or key-based
  • Encryption: All communication encrypted
  • Port: TCP 22
  • Benefits: Secure replacement for Telnet

GUI (Graphical User Interface)

Web-based or application interfaces for device management:

  • Web interfaces: HTTPS-based management
  • Desktop applications: Vendor-specific tools
  • Benefits: User-friendly, visual configuration
  • Considerations: May have limited functionality

API (Application Programming Interface)

Programmatic access to device functions:

  • REST API: HTTP-based interactions
  • NETCONF: Network configuration protocol
  • Benefits: Automation, integration with tools
  • Authentication: API keys, tokens

Console Access

Direct physical connection to device:

  • Serial console: RS-232 or USB connections
  • Emergency access: Works when network is down
  • Initial configuration: First-time device setup
  • Recovery: Password recovery and firmware updates

Access Control & Security

Jump Box/Bastion Host

Secure gateway for accessing internal network resources:

  • Function: Single point of entry
  • Security: Hardened system with logging
  • Access control: Authentication and authorization
  • Monitoring: Session recording and audit trails

Management Network Separation

In-band Management:

  • Uses production network infrastructure
  • Shared with data traffic
  • Cost-effective but less secure

Out-of-band Management:

  • Dedicated management network
  • Isolated from production traffic
  • Higher security and availability
Management Best Practices:
• Use encrypted protocols (SSH, HTTPS) for remote access
• Implement role-based access control (RBAC)
• Enable comprehensive logging and monitoring
• Use out-of-band management for critical infrastructure
• Regularly update management software and firmware
• Implement multi-factor authentication where possible

Access Methods Comparison

Method Security Level Use Case Pros Cons
Console 🟢 High Initial setup, recovery Always available, secure Physical access required
SSH 🟢 High Command-line management Encrypted, scriptable Text-based interface
HTTPS GUI 🟡 Medium-High User-friendly management Visual, easy to use Limited functionality
API 🟡 Medium-High Automation, integration Programmable, scalable Requires development skills
Telnet 🔴 Low Legacy systems only Universal support Unencrypted, insecure
how data packets are forwarded between networks, involving both static configuration and dynamic protocols.

Routing Types

Static Routing

Manually configured routes that don't change automatically. Provides full administrative control but requires manual updates for network changes.

Advantages: Security, predictability, no CPU overhead
Disadvantages: No fault tolerance, manual configuration

Dynamic Routing

Automatically discovers and maintains routes using routing protocols. Adapts to network changes and provides fault tolerance.

Advantages: Automatic convergence, fault tolerance
Disadvantages: CPU overhead, potential security risks

Dynamic Routing Protocols

BGP (Border Gateway Protocol)

Type: Exterior Gateway Protocol (EGP)
Use: Internet routing between autonomous systems
Algorithm: Path vector
Metric: Path attributes (AS path, local preference)

EIGRP (Enhanced Interior Gateway Routing Protocol)

Type: Advanced distance vector
Vendor: Cisco proprietary
Algorithm: DUAL (Diffusing Update Algorithm)
Metric: Bandwidth, delay, reliability, load

OSPF (Open Shortest Path First)

Type: Link state protocol
Standard: Open standard (RFC 2328)
Algorithm: Dijkstra's shortest path
Metric: Cost (based on bandwidth)

Route Selection Criteria

Administrative Distance

Trustworthiness of routing source (0-255, lower is better)

Directly Connected0
Static Route1
EIGRP90
OSPF110
RIP120

Prefix Length (Subnet Mask)

More specific routes (longer prefix) preferred over less specific routes

Example:
192.168.1.0/24 preferred over 192.168.0.0/16

Metric

Protocol-specific path cost calculation

  • OSPF: Cost (bandwidth-based)
  • EIGRP: Composite metric
  • RIP: Hop count
  • BGP: Path attributes

Address Translation & Redundancy

NAT (Network Address Translation)

Translates private IP addresses to public IP addresses, typically one-to-one mapping for each connection.

PAT (Port Address Translation)

NAT overload - many private IPs share one public IP using different port numbers. Most common home/business implementation.

FHRP (First Hop Redundancy Protocol)

Provides gateway redundancy using virtual IP addresses

Virtual IP (VIP) & Subinterfaces

VIP: Shared IP address for redundancy
Subinterfaces: Multiple logical interfaces on single physical interface for VLAN routing

2.2 Switching Technologies & Features

Virtual Local Area Networks (VLANs)

VLAN Fundamentals

Logical segmentation of Layer 2 networks, creating separate broadcast domains on same physical infrastructure.

Benefits: Security, broadcast control, flexible design, cost reduction

VLAN Database

Switch configuration storage containing VLAN information:

  • VLAN ID (1-4094)
  • VLAN name
  • Port assignments
  • VLAN state (active/suspended)

SVI (Switch Virtual Interface)

Layer 3 logical interface representing a VLAN, enables inter-VLAN routing and management access.

Example: interface vlan 10
ip address 192.168.10.1 255.255.255.0

Interface Configuration

Native VLAN

Default VLAN for untagged traffic on 802.1Q trunk ports. Default is VLAN 1, but should be changed for security.

Voice VLAN

Dedicated VLAN for VoIP traffic, providing QoS prioritization and separate from data traffic.

802.1Q Tagging

IEEE standard for VLAN tagging, inserts 4-byte tag into Ethernet frame header:

  • TPID: Tag Protocol Identifier
  • PCP: Priority Code Point (QoS)
  • DEI: Drop Eligible Indicator
  • VID: VLAN Identifier (12 bits)

Link Aggregation

Combines multiple physical links into single logical link:

  • LACP: Link Aggregation Control Protocol (802.3ad)
  • PAgP: Port Aggregation Protocol (Cisco)
  • Benefits: Increased bandwidth, redundancy

Speed & Duplex

Speed: 10Mbps, 100Mbps, 1Gbps, 10Gbps, etc.
Duplex:

  • Half: Send OR receive (collisions possible)
  • Full: Send AND receive simultaneously
  • Auto: Negotiate best speed/duplex

Spanning Tree & Frame Size

Spanning Tree Protocol (STP)

Prevents Layer 2 loops by blocking redundant paths:

  • STP: Original 802.1D (50 second convergence)
  • RSTP: Rapid STP 802.1w (6 second convergence)
  • MSTP: Multiple STP 802.1s (per-VLAN)
Port States: Blocking → Listening → Learning → Forwarding

MTU (Maximum Transmission Unit)

Largest frame size that can be transmitted:

  • Standard Ethernet: 1518 bytes
  • Jumbo Frames: Up to 9000 bytes
  • Benefits: Reduced overhead for large transfers
  • Requirement: End-to-end support needed

2.3 Wireless Devices & Technologies

Wireless Channels & Frequency

2.4GHz Band

Channels: 1-14 (varies by region)
Non-overlapping: 1, 6, 11 (North America)
Range: Better penetration, longer range
Issues: More congested, interference

5GHz Band

Channels: Many more available
Non-overlapping: 36, 40, 44, 48, 149, 153, 157, 161
Range: Shorter range, less penetration
Benefits: Less congested, higher speeds

6GHz Band (Wi-Fi 6E)

Channels: 1200MHz of spectrum
Benefits: No legacy device interference
Range: Similar to 5GHz
Requirement: Wi-Fi 6E certified devices

Channel Management

Channel Width: 20MHz, 40MHz, 80MHz, 160MHz
Band Steering: Direct devices to optimal frequency
802.11h: Dynamic Frequency Selection (DFS)

Service Set Identifiers

SSID (Service Set Identifier)

Network name broadcasted by access points, up to 32 characters. Can be hidden for basic security.

BSSID (Basic Service Set Identifier)

MAC address of individual access point's radio. Unique identifier for each AP.

ESSID (Extended Service Set Identifier)

Same SSID used across multiple access points to create seamless roaming experience.

Wireless Network Types

Infrastructure Mode

Devices connect through access point to wired network. Most common deployment model.

Ad Hoc (IBSS)

Direct device-to-device communication without access point. Independent Basic Service Set.

Point-to-Point

Direct wireless link between two locations, often using directional antennas for long distances.

Mesh Networks

Multiple APs interconnected wirelessly, providing redundancy and extended coverage.

Security & Authentication

WPA2 (Wi-Fi Protected Access 2)

Encryption: AES-CCMP
Authentication: PSK or 802.1X
Standard: IEEE 802.11i
Key Management: 4-way handshake

WPA3

Encryption: AES-GCMP
Authentication: SAE (Simultaneous Authentication of Equals)
Benefits: Protection against offline attacks
Enhanced: 192-bit security for enterprise

Authentication Methods

PSK (Pre-Shared Key): Same password for all users
Enterprise (802.1X): Individual user credentials via RADIUS server

Guest Networks & Captive Portals

Guest Network: Isolated SSID for visitors
Captive Portal: Web-based authentication before network access

Antennas & Access Points

Antenna Types

Omnidirectional: 360-degree coverage pattern
Directional: Focused coverage (Yagi, parabolic)
Use Cases: Omni for general coverage, directional for point-to-point

Access Point Types

Autonomous (Fat AP): Self-contained with full functionality
Lightweight (Thin AP): Controlled by wireless LAN controller (WLC)

2.4 Physical Installation Factors

Installation Locations & Infrastructure

MDF (Main Distribution Frame)

Central wiring point connecting to service provider and housing core network equipment:

  • Internet service provider connections
  • Core switches and routers
  • Server connections
  • Building backbone cabling

IDF (Intermediate Distribution Frame)

Secondary wiring closets for floor or area distribution:

  • Access layer switches
  • Patch panels
  • Horizontal cable runs to workstations
  • Local networking equipment

Rack Considerations

Standard Sizes: 19" width, 42U height typical
Airflow: Port-side exhaust vs. intake
Security: Lockable doors and side panels
Organization: Cable management and labeling

Cabling Infrastructure

Patch Panels

Organized termination points for horizontal cabling:

  • Purpose: Cable management and organization
  • Types: Cat5e, Cat6, Cat6A
  • Configuration: 24, 48 port common
  • Benefits: Easy changes without re-termination

Fiber Distribution Panels

Fiber optic cable termination and management:

  • Splice trays: Fusion splice protection
  • Adapter panels: Connector terminations
  • Cable management: Bend radius protection
  • Testing access: Easy troubleshooting

Power Systems

UPS (Uninterruptible Power Supply)

Backup power for critical network equipment:

  • Online: Continuous power conditioning
  • Line Interactive: Automatic voltage regulation
  • Standby: Basic backup power
  • Runtime: Based on load and battery capacity

PDU (Power Distribution Unit)

Intelligent power distribution for rack equipment:

  • Basic: Simple power strip
  • Monitored: Remote power monitoring
  • Switched: Remote on/off control
  • Intelligent: Advanced monitoring and control

Power Considerations

Power Load: Calculate total equipment power draw
Voltage Requirements:

  • 120V: Standard US outlets
  • 208V: Three-phase systems
  • 240V: High-power equipment
  • Planning: 80% rule for circuit loading

Environmental Factors

Temperature Control

Operating Range: Typically 64-75°F (18-24°C)
Cooling: HVAC systems for equipment rooms
Hot/Cold Aisles: Efficient airflow management
Monitoring: Temperature sensors and alerts

Humidity Control

Optimal Range: 45-55% relative humidity
Too Low: Static electricity damage
Too High: Corrosion and condensation
Control: Humidifiers and dehumidifiers

Fire Suppression

Specialized systems for equipment protection:

  • Clean Agent: FM-200, Novec 1230 (no residue)
  • Inert Gas: Nitrogen, argon (oxygen displacement)
  • Water Mist: Fine water droplets
  • Avoid: Standard sprinklers (water damage)
Installation Best Practices:
• Plan cable paths to avoid interference
• Label all connections for easy identification
• Maintain proper bend radius for cables
• Ensure adequate ventilation and power capacity
• Document all installations for future reference