N

NAC (network access control), 367, 682–683

NAC (Network Admission Control) (Cisco), 682–683

name resolution. See also DNS (Domain Name System)

broadcasts for, 319

NetBIOS/NetBEUI, 304–306

overview of, 303

name server (NS) records, DNS, 327

names, network

Active Directory-integrated zones, 335

DDNS, 338–339

DNS record types, 327–330

DNS servers, 324–327

DNSSEC, 340

forward lookup zones, 330–331

host file, 306–308

how DNS works, 308–309

IPAM (IP Address Management), 340

name resolution, 318–324

name servers, 314–318

name spaces, 309–314

NetBIOS and, 304–306

overview of, 303

placing DNS servers, 335–338

review Q&A, 346–348

troubleshooting DNS, 340–343

Windows use of SMB, 331–334

naming conventions, DNS, 314

nano-SIM, in LTE, 583

nanometer (nm), in measurement of wavelength of light, 61

NAS (Network Access Server), 372–373, 513

NAS (network attached storage), 566, 605

NAT (Network Address Translation)

active FTP and, 299

configuring, 233–234

Dynamic NAT, 232

high availability, 635

moving to IPv6 (NAT64), 443

overview of, 228–229

Port Address Translation, 230–231

port forwarding, 231–233

setting up, 229

Static NAT, 231–232

WAN problems, 754

NAT translation table, 230–231

NAT traversal, 442

National Institute of Standards (NIST)

hash algorithms, 359

time servers, 751

National Security Agency (NSA), 674

NDP (Neighbor Discovery Protocol), 436–437

near-end crosstalk (NEXT), troubleshooting copper cable, 143

near field communication (NFC), 588–589

NEC (National Electrical Code)

cable fire ratings, 64

cable pulling standards, 133

need analysis/definition, in building network, 601–602

Neighbor Discovery Protocol (NDP), 436–437

neighbor solicitation/advertisement, NDP, 436

neighborship, OSPF, 244

Nessus vulnerability scanner, 638, 640

Net Activity Viewer, Linux utility, 275

net view, troubleshooting NetBIOS settings, 344

NetBIOS/NetBEUI, 304–306, 344

NetBT (NetBIOS over TCP/IP), 305

NetFlow collectors, 707

NetFlow, packet flow monitoring with, 705–708

netstat utility

checking out NetBIOS, 306

diagnosing TCP/IP networks, 345

rules for determining good or bad communication, 278

software troubleshooting tools, 733

viewing connection status, 275–278

viewing endpoints, 272

viewing open ports, 671–672

network access control (NAC), 367, 682–683

network access policies, 629

Network Access Server (NAS), 372–373, 513

Network Address Translation. See NAT (Network Address Translation)

Network Admission Control (NAC) (Cisco), 682–683

network analyzers

Nagios, 715

packet inspection, 705

performance monitoring, 716

network appliances, WAN problems, 753–754

network attached storage (NAS), 566, 605

network-based anti-malware, 689

network-based firewalls, 690

network-based IDS (NIDS), 413

network controller, controlling traffic to routers and switches, 568

network diagrams, 602

network IDs

configuring routers, 255–256

converting to dotted decimal, 193

interconnecting LANs, 179–181

for LANs, 178–179

in router, 180

troubleshooting routers, 258

network installation. See installing physical network

network interface cards. See NICs (network interface cards)

Network Interface layer (Link layer), TCP/IP, 34–35, 41

network interface unit. See NIU (network interface unit)

network intrusion protection system (NIPS), 415

Network layer (Layer 3), OSI model, 22–24

Network Management Software (NMS), 252–254

network management station (NMS), 701–702

network models

Cisco certifications, 2

OSI. See OSI (Open Systems Interconnection)

overview of, 1–2

TCP/IP. See TCP/IP (Transmission Control Protocol/Internet Protocol)

troubleshooting, 41

working with, 2–4

network monitoring

with distributed control system, 619–620

with industrial control system, 617–619

interface monitors, 708–711

overview of, 699

packet flow using NetFlow, 705–708

packet sniffers, 704

performance monitors, 711–712

with programmable logic controller, 620–621

as protection measure, 678

protocol analyzers, 704–705

review Q&A, 717–719

scenario combining tools and techniques, 712–716

SIEM, 716–717

SNMP, 699–703

tools for, 704

network names. See names, network

network operations center (NOC), 714

network protection

ACLs (access control lists), 692–693

administrative access attacks, 666

ARP cache poisoning, 658–661

brute force attacks, 664

cleartext credentials, 674

controlling user accounts, 679–681

deauthentication (deauth) attacks, 663

device hardening, 685

disabling unneeded services, 671–672

DMZ (demilitarized zone), 693–694

DoS (denial of service) attacks, 661–663

edge devices, 681–682

firewall implementation and configuration, 691–692

firewall troubleshooting, 695, 696–698

firewall types, 690–691

guest and quarantine networks, 684–685

hardening, 675

honeypots and honeynets, 694–695

host security, 686

local attacks (physical), 664–666

malware, 667–668

malware prevention, 686–689

man-in-the-middle attacks, 663–664

monitoring, 678

network security, 679

overview of, 655

packet/protocol abuse, 657–658

persistent and non-persistent agents, 683–684

physical security, 675

posture assessment, 682–683

prevention and control, 675–678

RE emanation, 674

session hijacking, 664

social engineering, 668–670

spoofing attacks, 656–657

threats, 655–656

unencrypted channels, 673–674

unpatched and legacy systems, 673

VLAN hopping attacks, 666

vulnerabilities, 671

zero-day attacks, 658

network protection devices

AAA, 418–419

intrusion detection/intrusion protection, 412–415

overview of, 412

port mirroring, 415

proxy servers, 415–417

network protocols, 21

network security

controlling user accounts, 679–681

device hardening, 685

edge devices, 681–682

guest and quarantine networks, 684–685

overview of, 679

persistent and non-persistent agents, 683–684

posture assessment, 682–683

network segmentation

DMZs using, 693

SCADA, 622–623

VLANs for, 606

Network Time Protocol. See NTP (Network Time Protocol)

network topologies

bus and ring topologies, 46–47

hybrid topology, 48–49

mesh topology, 49–50

overview of, 45

parameters of, 50

review Q&A, 66–68

star topology, 48

network troubleshooting

arp utility, 729–730

cable strippers/snips, 725

cable testers, TDRs, and OTDRs, 722–724

certifiers, 724

documenting findings, 743–744

end-to-end connectivity, 756

escalation, 754–756

establish plan of action, 741

establish theory of probable cause, 739–741

hands-on problems, 745–748

hardware tools, 722

identify the problem, 738–739

implement solution or escalate, 742

ipconfig/ifconfig, 728–729

LAN problems, 748–751

light meters, 724–725

looking glass sites, 735

multimeters, 725–726

My Traceroute (mtr), 732

netstat utility, 733

network models (TCP/IP and OSI), 41

nslookup, 731

overview of, 721

packet sniffers/protocol analyzers, 733–734

ping/pathping, and arping, 730–731

port scanners, 734–735

process for, 736–737

punchdown tools, 726

resolving common issues, 744

review Q&A, 757–759

route utility, 732

software tools, 727

test theory of probable cause, 741

throughput testers, 735–736

tone probes/tone generators, 726

tools for, 722

tracert and traceroute, 727–728

unable to access remote Web server, 744–745

verifying functionality of system and implement preventative measures, 742–743

voltage quality recorder and temperature monitor, 725

WAN problems, 751–754

wireless issues, 540–543

Network utility, macOS

displaying MAC and IP addresses, 174–176

troubleshooting no DHCP server message, 210–211

networking devices (advanced). See advanced networking devices

networks, building

categories to consider in, 601

compatibility issues, 606–607

DCS (distributed control system), 619–620

design process, 603

documentation, 602–603

equipment room, 605

external connections, 610–611

ICS (industrial control system), 617–618

internal connections, 607–610

need analysis/definition, 601–602

overview of, 599–600

peripherals, 605–606

PLC (programmable logic controller), 620–621

review Q&A, 623–625

SCADA (supervisory control and data acquisition), 621–623

servers, 604

UC (unified communication), 612–615

VoIP, 611–612

VTC and medianets, 615–617

workstations, 604

networks, wireless. See wireless networking

Next-Generation Firewalls (NGFW), 691

NEXT (near-end crosstalk), troubleshooting copper cable, 143

NFC (near field communication), 588–589

NGFW (Next-Generation Firewalls), 691

NIC teaming (port bonding), 411–412, 751

NICs (network interface cards)

bonding NICs, 151

bridged NICs, 566–567

buying, 149

connecting, 150–151

creating/reading frames, 13

CSMA/CD, 80–81

diagnosing TCP/IP networks, 344

Ethernet frames, 72

FCS and, 16

frame movement, 16–19

half-duplex and full-duplex, 75, 95–96

how they work, 9–10

hubs and switches, 14–15

installing NIC drivers, 151

installing wireless client, 525

LAN problems, 751

Link layer (Network Interface layer), 34

MAC addresses, 11–12

MAC (Media Access Control) and LLC (Logical Link Control), 19–20

multispeed and auto-sensing, 94

network installation and, 148–149

OSI model and, 20

overview of, 8–9

packets in frames, 25–27

setting up ad hoc network, 525

testing, 155

upgrading 10BaseT to 100BaseT, 93–94

wireless networking hardware, 499

NIDS (network-based IDS), 413

NIPS (network intrusion protection system), 415

NIST (National Institute of Standards)

hash algorithms, 359

time servers, 751

NIU (network interface unit)

connecting modem to phone jack, 470

as demarc, 125–127

DSL smart jacks, 476

nm (nanometer), in measurement of wavelength of light, 61

Nmap port scanner, 638–639, 734

NMS (Network Management Software), 252–254

NMS (network management station), 701–702

NOC (network operations center), 714

nodes, protecting critical nodes, 635

non-persistent agents, in network security, 683–684

nondisclosure agreement, 638

nonrepudiation

defined, 350

digital signatures, 361

overview of, 361

PKI (public-key infrastructure), 361–365

notification, of change, 631

NS (name server) records, DNS, 327

NSA (National Security Agency), 674

nslookup, 342–343, 731

NTP (Network Time Protocol)

example of protocol abuse, 657–658

multicast addresses and, 428

overview of, 266

securing TCP/IP applications, 385

O

OC (Optical Carrier), 461

OEM tools, 253

OFDM (orthogonal frequency-division multiplexing), 505

off-boarding, mobile networking, 592

Office 365 suite (Microsoft), 573

Ohm ratings, coaxial cabling, 54

omnidirectional antennas, 527–529

on-boarding, mobile networking, 592

one-way satellite service, 479–480

open circuit, testing for, 723

open ports (listening ports), 275

Open Shortest Path First (OSPF), 244–246

Open Systems Interconnection. See OSI (Open Systems Interconnection)

OpenNMS, 253–254

OpenVAS, 638

OpenVPN, 396

operating systems. See OSs (operating systems)

Optical Carrier (OC), 461

optical connection tester, 153

optical power meters, 724

optical time domain reflectometer (OTDR), 147–148, 722–724

Organizationally Unique Identifier (OUI), 10, 665–666

orthogonal frequency-division multiplexing (OFDM), 505

OSI (Open Systems Interconnection)

comparing with TCP/IP, 40

encapsulation/de-encapsulation, 33

encryption using, 357

FCS (frame check sequence), 16

frame movement, 16–19

hardware layers (1 &2), 6–8

hexadecimal numbering system, 10

hubs, 14–15

IP addresses (network layer), 22–24

LLC (Logical Link Control), 19–20

MAC-48 and EUI-48, 11

MAC addresses, 10–14

MAC (Media Access Control), 19–20

MHTechEd and, 5–6

network segmentation and, 622–623

NICs, 8–10, 20

overview of, 4–5

packets, 24–27

review Q&A, 41–44

segmentation and reassembly (transport layer), 27–28

software layers (3-7), 20–22

SONET and, 461

switches, 15

talking on networks (session layer), 28–31

top down or bottom up approaches to troubleshooting, 740–741

translation of data from lower layers (presentation layer), 31–32

troubleshooting networks and, 41

working with applications (application layer), 32–33

OSPF (Open Shortest Path First), 244–246

OSs (operating systems)

Linux/UNIX. See Linux/UNIX OSs

mac. See macOS

rules for determining good or bad communication, 278

updates, 632

Windows. See Windows OSs

OTDR (optical time domain reflectometer), 147–148, 722–724

OUI (Organizationally Unique Identifier), 10, 665–666

out-of-band management

LOM (lights-out-management), 491

managed switches and, 398

outbound traffic, firewalls blocking, 689

Outlook (Microsoft), 292, 295

overcapacity, troubleshooting wireless networks, 543

overlay tunnels, moving to IPv6, 443

P

PaaS (Platform as a Service)

overview of, 571–573

public cloud, private cloud, community cloud, and hybrid cloud versions, 574–575

packet drop, interface monitors, 709

packet filters, firewall techniques, 690

packet (protocol) analyzers

packet inspection, 704–705

performance monitoring, 716

packet sniffers

overview of, 704

packet inspection, 705

performance monitoring, 716

packet sniffing attacks, 665

packet switching protocols

ATM (Asynchronous Transfer Mode), 463–464

Frame Relay, 463

MPLS (Multiprotocol Label Switching), 464–467

overview of, 462–463

packets

firewall rules (block/allow), 689

in frames, 24–27

Internet layer and, 35

malformed, 658

OSI model and, 22

packet flow monitoring with NetFlow, 705–708

protocol (packet) analyzers, 704–705

segmentation and reassembly, 27–28

threats, 657–658

traffic floods, 685

traffic spike, 663

pad, Ethernet frames, 73

PAgP (Port Aggregation Protocol), 412, 750–751

PANs (personal area networks), 586, 590

PAP (Password Authentication Protocol)

dangers of cleartext credentials, 674

PPP methods for authentication, 368

RADIUS server supporting, 373

parabolic antennas, 530

parallel cable, 63

parameters, of network topologies, 50

partially meshed topology, 50

passive optical network (PON), 480

passphrases

configuring encryption for access points, 533

in local authentication, 366

wrong passphrase, 541

Password Authentication Protocol. See PAP (Password Authentication Protocol)

passwords

brute force attacks, 664

dangers of cleartext credentials, 674

device hardening, 685

in local authentication, 365–366

password protected screensavers, 670

policies, 629

training end users, 634

PAT (Port Address Translation), 230–233

patch antennas, 530

patch cables

accounting for in UTP cable length specification, 125

connecting PCs to RJ-45 jacks, 124

connecting to DSL modem, 477

making, 136–138

overview of, 122–123

patch panels

110 block and 66 block types, 119–120

CAT ratings, 121–122

connecting, 138–140

organizing cables, 121

overview of, 118

vertical cross-connect, 128

patches

change management, 632–634

device hardening, 685

vulnerabilities of unpatched systems, 673

Path MTU Discovery (PMTU), 753

path vector routing protocols, 246

pathping, 259, 730–731

payload, frame structure, 14

PayPal, phishing attacks, 669

PBX systems, VoIP gateway interfacing with, 611

PC (Physical Contact), fiber connectors, 99

PCF (Point Coordination Function), collision avoidance, 506

PCI Express (PCIe), 150, 499–500

PCI (Peripheral Component Interconnect), 150

PCIe (PCI Express), 150, 499–500

PCs

connecting over phone lines, 470

connecting to RJ-45 jacks via patch cable, 124

connectivity components in star-bus topology, 111

password protection, 670

PDUs (protocol data units), SNMP, 701–702

peer-to-peer mode, ad hoc mode as, 501

penetration testing, 639

performance monitors. See also Windows Performance Monitor (PerfMon), 711–712

Peripheral Component Interconnect (PCI), 150

peripherals, network design, 605–606

permissions, controlling user accounts, 679–681

persistent agents, in network security, 683–684

personal area networks (PANs), 586, 590

personal identification numbers (PINs)

Bluetooth and, 586–587

in local authentication, 366

phishing attacks, 669

physical addresses. See MAC addresses

physical attacks, 662

Physical Contact (PC), fiber connectors, 99

physical intrusion, 669–670

Physical layer (Layer 1), OSI model, 7–10

physical security

hardening network, 675

monitoring, 678

physical topology, 49

PID (process ID), tracking running programs, 277–278

pin-out, troubleshooting copper cable, 141

ping

diagnosing TCP/IP networks, 343–344, 346

software troubleshooting tools, 730–731

troubleshooting DNS, 341–342

using with loopback addresses, 213

verifying IP addresses, 200–201

ping of death, 268

PINs (personal identification numbers)

Bluetooth and, 586–587

in local authentication, 366

PKI (public-key infrastructure), 362–365, 376–377

plain old telephone service (POTS). See also PSTN (public switched telephone network), 469

plaintext, 350

plan of action, in troubleshooting, 741–742

Platform as a Service (PaaS)

overview of, 571–573

public cloud, private cloud, community cloud, and hybrid cloud versions, 574–575

PLC (programmable logic controller), 620–621

plenum-rated cable, cable fire ratings, 64

PMTU black hole, 753

PMTU (Path MTU Discovery), 753

PoE (Power over Ethernet), 521

Point Coordination Function (PCF), collision avoidance, 506

Point-to-Point Protocol. See PPP (Point-to-Point Protocol)

Point-to-Point Protocol over Ethernet (PPPoE), 477–478

Point-to-Point Tunneling Protocol (PPTP), 392–394

pointer (PTR) record, reverse lookup zones, 331

points of failure, 635

policies

security. See security policies

system life cycle, 673

polyvinyl chloride (PVC), cable fire ratings, 64

PON (passive optical network), 480

POP3 (Post Office Protocol version 3)

alternatives to, 291–293

e-mail clients, 295

Microsoft Exchange Server, 294

overview of, 291

reviewing Internet applications, 300

Port Address Translation (PAT), 230–233

port aggregation (port bonding), 411–412

Port Aggregation Protocol (PAgP), 412, 750–751

port bonding (NIC teaming), 411–412, 751

port filtering, firewall rules for, 693

port forwarding, 231–233

port mirroring, 415

port scanners

Nmap, 638–639

software troubleshooting tools, 734–735

PortFast, STP switch settings, 86

ports

authentication, 418

blocked, 672

disabling unused, 685

Internet applications and, 300

managed switches and, 397–398

mirrored, 704

in patch panels, 121

port bonding, 411–412, 751

registered, 271–275

replacing bad port, 155

rules for determining good or bad communication, 278

switchports and router ports, 407

TCP/IP port numbers, 269–271

trunk port, 400

viewing open ports, 671–672

VLAN assignment, 401–403

WAN problems, 752

well-known ports (TCP/IP), 269, 334

Post Office Protocol version 3. See POP3 (Post Office Protocol version 3)

Postfix, e-mail servers, 293

posture assessment, network security, 682–683

POTS (plain old telephone service). See also PSTN (public switched telephone network), 469

power

monitoring with UPS, 157

rack-mounted equipment and, 650

troubleshooting wireless networks, 541

virtualization, 559

power converters, 605

power failure, hands-on problems, 746

power generators, 605

power management, network design, 605

Power over Ethernet (PoE), 521

power supplies, network design, 605

PPP (Point-to-Point Protocol)

CHAP, 369

MS-CHAP, 369–370

overview of, 368–370

PAP, 368

PPPoE (Point-to-Point Protocol over Ethernet), 477–478

PPTP (Point-to-Point Tunneling Protocol), 392–394

pre-shared keys. See PSK (pre-shared keys)

preamble, Ethernet frames, 72

prefix delegation, in transition from IPv4 to IPv6, 431

prefix lengths, IPv6, 426–427

presence information, UC features, 612–613

Presentation layer (Layer 6), OSI model, 31–32

prevention measures, hardening network, 675–678

PRI (Primary Rate Interface), ISDN, 474

primary (master) DNS server, 315

primary zones, forward lookup zones, 330–331

principle of least privilege, 679

printers, peripherals in network design, 605–606

privacy, acceptable use policy, 628–629

private cloud, 574

private dial-up, remote access connections, 482–484

private IP addresses, 213

private keys, in asymmetric-key encryption, 355–356

privileges

network access policies, 629

principle of least privilege, 679

probable cause, theory of probable cause in troubleshooting, 739–741

Process Explorer, 277–278

process ID (PID), tracking running programs, 277–278

profiles, security issues on smartphones, 585

programmable logic controller (PLC), 620–621

promiscuous mode, packet sniffers, 704

protocol data units (PDUs), SNMP, 701–702

protocol (packet) analyzers

packet inspection, 704–705

performance monitoring, 716

protocol suite. See also TCP/IP (Transmission Control Protocol/Internet Protocol)

Application layer protocols, 169–170

history of TCP/IP, 164

Internet layer protocols, 166–167

overview of, 164–166

Transport layer protocols, 167–169

protocols. See also by individual types

defined, 4

extensible, 701

history of TCP/IP, 164

network protocols, 21

protocol abuse as threat, 657–658

UC (unified communication), 614–615

using secure, 673, 685

proximity readers, for RFID chips in badges, 676–677

Proxy ARP, 755–756

proxy servers, 415–417

PSK (pre-shared keys)

EAP-PSK, 514

hardening devices, 594

WPA-PSK, 516, 518

PSTN (public switched telephone network)

bit rates vs. baud rate, 471–472

coexisting with DSL, 476–477

last mile connection options, 469–471

V standards, 472–473

VoIP as alternative to, 489–490

PTR (pointer) record, reverse lookup zones, 331

public cloud, 574

public-key cryptography, 355–356

public-key infrastructure (PKI), 362–365, 376–377

public keys

in asymmetric-key encryption, 355–356

CA (certificate authority) and, 365

SSH using, 377

public switched telephone network. See PSTN (public switched telephone network)

punchdown tool

for connecting UTP cable, 119

hardware troubleshooting tools, 726

PuTTY

accessing router with, 227

connecting to routers, 248–249

generating key pair, 377

getting RSA key, 376

switch management, 396–397

terminal emulation, 254

as third-party Telnet/SSH client, 288–289

PVC (polyvinyl chloride), cable fire ratings, 64

Q

QA (quality assurance), 609

QoS (quality of service)

assessing security posture, 683

medianets providing, 615–616

for traffic shaping, 410–411

QSFP (quad small form-factor pluggable) optics, 104

quarantine networks, 684–685

quartet, IPv6 notation, 425

query tools, Border Gateway Protocol, 735

R

raceways, mapping cable runs, 130

racks. See equipment racks

radio-frequency identification (RFID), 589–590, 676–677

radio frequency interference (RFI), 544–545, 746

radio frequency (RF), measuring RF output of antenna, 528

RADIUS (Remote Authentication Dial-In User Service)

authentication standards, 372–373

configuring encryption for access points, 536

router/switch configuration for, 418–419

wireless authentication using RADIUS server, 512

RAID (redundant array of inexpensive disks)

data storage/backup, 564, 605

hardware consolidation, 559

spreading data across multiple drives, 664

range

extenders, 538

wireless networking, 504

ransomware, 667

Rapid Spanning Tree Protocol (RSTP), 87

RAS (remote access server), 482–484

RBAC (role-based access control), 367

RC4 (Rivest Cipher 4)

examples of symmetric-key encryption, 354

WEP using, 516

WPA using, 517

RDC (Remote Desktop Connection), 488

RDP (Remote Desktop Protocol), 488–489

RE emanation, vulnerabilities, 674

Ready to Send/Clear to Send (RTS/CTS), collision avoidance methods, 507

real-time services (RTS), UC features, 612–613

Real-Time Streaming Protocol (RTSP), for streaming media, 491

Real-time Transport Protocol. See RTP (Real-time Transport Protocol)

reassembly, of packets, 27–28

records, DNS

load balancing and, 408–409

name servers and, 314

overview of, 327–330

recovery, benefits of virtualization, 559

recovery point objective (RPO), 644

recovery time objective (RTO), 644

Reddit hug of death, 663

redundancy

risk management, 636

single point of failure and, 635

redundant array of inexpensive disks. See RAID (redundant array of inexpensive disks)

reflection, physical issues in wireless networks, 543

reflective DDoS attacks, 663

refraction, physical issues in wireless networks, 543

Regional Internet Registries. See RIRs (Regional Internet Registries)

registered ports, 271–275

regulations, policies imposed by, 629–630

relay agent. See DHCP relays (DHCP relay agent)

remote access

in-band management, 491

dedicated connections, 484–485

dial-up connection to Internet, 482

DSL and cable connections for remote access, 485–487

network access policies, 629

overview of, 481–482

private dial-up, 482–484

remote terminal, 488–489

RTSP, 491

Skype, 490–491

VoIP, 489–490

VPN connections for remote access, 484

remote access server (RAS), 482–484

Remote Authentication Dial-In User Service. See RADIUS (Remote Authentication Dial-In User Service)

remote connectivity

alternatives to WAN telephony, 468

ATM, 463–464

in-band management, 491

bit rates vs. baud rate, 471–472

broadband cable, 479

choosing among connection options, 481

converting from analog to digital phone systems, 453–455

dedicated connections, 484–485

dial-up connection to Internet, 482

dial-up lines, 469

digital telephony, 455–456

DS0 (digital signal rate), 456–457

DSL and cable connections for remote access, 485–487

DSL (digital subscriber line), 475–478

FDM, 453

fiber carriers, 460–462

fiber-to-the-home technologies, 480

ISDN, 473–475

last mile solutions, 468

long distance phone calls, 449–450

MPLS, 464–467

multiplexers and local exchanges, 451–453

overview of, 447–448

packet switching, 462–463

private dial-up, 482–484

PSTN, 469–471

remote access, 481–482

remote terminal, 488–489

reverse lookup zones, 494–496

RTSP, 491

satellite access, 479–480

Skype, 490–491

T1 and T3 copper carriers, 457–460

telephony and beyond, 448–449

troubleshooting, 491–494

V standards, 472–473

VoIP, 489–490

VPN connections for remote access, 484

WAN telephony connections, 467–468

Remote Desktop Connection (RDC), 488

Remote Desktop Protocol (RDP), 488–489

remote terminal, 488–489

remote terminal units (RTUs), SCADA, 621–622

repeaters

bus Ethernet and, 73

in telephone systems, 453–454

request timed out, ICMP, 268

requirements list, in building networks, 601

research, benefits of virtualization, 560

Response, SNMP manager, 702–703

reverse lookup zones, 325, 331

reverse proxy servers, 417

RF (radio frequency), measuring RF output of antenna, 528

RFI (radio frequency interference), 544–545, 746

RFID (radio-frequency identification), 589–590, 676–677

RG-58 coaxial cable, 55

RG-59 coaxial cable, 53, 55

RG-6 coaxial cable, 53, 55

ring topology, 46–47

RIP (Routing Information Protocol)

comparing dynamic routing protocols, 246

improvements in OSPF, 244

RIPv1, 241

RIPv2, 241–242

RIPE NCC (RIPE Network Coordination Centre), 435

RIRs (Regional Internet Registries)

aggregation and, 433–434

IANA overseeing, 186

IPv6, 435–436

IPv6 prefix lengths, 427

risk management, 635–636

acceptable use policy, 628–629

backup techniques, 643–644

business continuity plans, 644–645

change management, 630–632

contingency planning, 641–642

disaster recovery, 642–643

emergency procedures, 652

forensics, 645–648

incident response, 642

network access policies, 629

overview of, 627–628

patches and updates, 632–634

points of failure, 635

policies imposed by government laws and regulations, 629–630

rack installation and maintenance, 649–651

redundancy, 636

review Q&A, 652–654

safety, 648–649

security policies, 628

security preparedness, 638–641

standard business documents, 636–638

training, 634

Rivest Cipher 4. See RC4 (Rivest Cipher 4)

Rivest, Shamir, and Adleman (RSA) algorithm, 357, 376–377

RJ-11 connectors/jacks

DSL modems, 477, 479

for telephone lines, 59, 470

RJ-45 connectors/jacks

10BaseT requirements, 74–75

8P8C connectors and, 59

cable modems, 479

crimping, 75–76

crossover cables, 85

DSL modems, 479

ISDN, 474

for NICs, 148

patch cables and, 124

RJ-45 crimper, 136–138

RJ-48C, for T1 connections, 457

rogue access points, 546–547

rogue anti-malware programs, 687

role-based access control (RBAC), 367

role separation, network access policies, 629

rollback

change management and, 631

patches, 633

rollover (Yost) cable, connecting to routers, 247

root guard, STP switch settings, 86–87

root hints file, 429

root, of DNS tree, 312

root servers, DNS, 309, 429

rootkit, types of malware, 668

route

route print command, 224

software troubleshooting tools, 732

route

establishing, 256

redistribution, 246–247

troubleshooting routers, 258

route aggregation, Border Gateway Protocol, 244

router-on-a-stick, interVLAN routing, 404

router solicitation/advertisement, IPv6, 437

routers

adding interfaces to, 228

aggregation in IPv6, 433–435

broadcasts for name resolution, 319

configuring, 255–257

connecting to, 247–251, 254

data planes and control planes, 568

how they work, 217–219

interconnecting LANs using, 179–181

in logical addressing, 22–23

managed devices, 248

monitoring, 709–710

multicast to, 428

Network Management Software for, 252–254

no-default routers, 431–433

QoS configuration on, 411

TACACS+ and, 373

troubleshooting, 257–259

virtual routers, 568

WAN problems, 752

Web interface in, 251–252

routing

adding interfaces to routers, 228

BGP (Border Gateway Protocol), 242–244

comparing dynamic routing protocols, 246

configuring routers, 255–257

connecting to routers, 247–251, 254

distance vector protocols, 237–241

DNAT (dynamic NAT), 233–234

dynamic routing, 234–235

EIGRP (Enhanced Interior Gateway Routing Protocol), 246

how routers work, 217–219

interconnecting LANs using routers, 179–181

interVLAN routing, 404–406

IS-IS (Intermediate State to Intermediate State), 245–246

link state protocols, 244

logical addressing and, 22–23

metrics, 235–237

NAT (Network Address Translation), 228–229

NMS (Network Management Software), 252–254

OSPF (Open Shortest Path First), 244–245

overview of, 217

PAT (Port Address Translation), 230–231

port forwarding, 231–233

review Q&A, 259–261

RIPv1 and RIPv2, 241–242

route redistribution, 246–247

routing tables, 219–227

troubleshooting routers, 257–259

Web interface in routers, 251–252

Routing and Remote Access Service (RRAS), 392–393, 482–484

Routing Information Protocol. See RIP (Routing Information Protocol)

routing tables

Border Gateway Protocol, 243

checking for router problems, 257

distance vector protocol and, 239

managing packets, 219–221

in router, 180

simple example, 221–223

Windows example, 223–227

RPO (recovery point objective), 644

RRAS (Routing and Remote Access Service), 392–393, 482–484

RS-232 serial cable, 63

RSA (Rivest, Shamir, and Adleman) algorithm, 357, 376–377

RSTP (Rapid Spanning Tree Protocol), 87

RTO (recovery time objective), 644

RTP (Real-time Transport Protocol)

UC protocols, 614–615

VoIP standards, 490–491

VoIP systems using, 612

RTS/CTS (Ready to Send/Clear to Send), collision avoidance methods, 507

RTS (real-time services), UC features, 612–613

RTSP (Real-Time Streaming Protocol), for streaming media, 491

RTUs (remote terminal units), SCADA, 621–622

rules, firewall (block/allow), 689

runs, of cable, 113

Russinovich, Mark, 274, 277

S

SaaS (Software as a Service), 573–575

safety, risk management, 648–649

SANs (storage area networks), 565–566

SAT (source address table), MAC addresses, 82

SATA, writing blocks to disk, 565

satellites, remote connectivity and, 479–480

SC connectors

in 1000BaseSX and 1000BaseLX, 97

in 100BaseFX, 94

in 10BaseFL, 78

for fiber optic cable, 61–62

issues with, 98

SCADA (supervisory control and data acquisition)

network segmentation and, 622–623

overview of, 621

RTUs (remote terminal units), 621–622

scalability

factors in choosing location of telecommunications room, 132

virtualization, 563–564

scanners

peripherals in network design, 605–606

port scanners, 638–639, 734–735

vulnerability scanners, 638, 640

SCP (Secure Copy Protocol), 383

screensavers, password protected, 670

SCSI (Small Computer System Interface), 565

SDH (Synchronous Digital Hierarchy), 461–462

SDN (software defined networking), 568–569

SDSL (symmetric DSL). See also DSL (digital subscriber line), 475

secondary (slave) DNS server, 315

secondary zones, forward lookup zones, 330–331

Secure Copy Protocol (SCP), 383

Secure Hash Algorithm (SHA), 358–360

Secure Shell. See SSH (Secure Shell)

Secure Sockets Layer/Transport Layer Security. See SSL/TLS (Secure Sockets Layer/Transport Layer Security)

securing TCP/IP. See also application security, TCP/IP

AAA, 370–372

application security, 381

asymmetric-key encryption, 355–357

authentication, 365–366

authorization, 366–367

combining authentication and encryption, 379

encryption, 350–351

encryption standards, 375–376

encryption using OSI model, 357

HTTPS, 382–383

integrity of data, 357–360

IPSec (Internet Protocol Security), 380–381

Kerberos, 373–375

LDAP, 385

nonrepudiation, 361–365

NTP, 385

overview of, 349–350

PPP, 368–370

RADIUS, 372–373

review Q&A, 385–387

SCP, 383

SFTP, 383

SNMP, 384

SSH, 376–378

SSL/TLS, 379–380

standards, 367–368

substitution ciphers, 351–352

symmetric-key encryption, 353–355

TACACS+, 373

tunneling, 378–379

user authentication standards, 368

XOR encryption, 352–353

security

categories to consider in building network, 601

network protection. See network protection

network security. See network security

TCP/IP applications. See application security, TCP/IP

wireless network security. See wireless network security

security alerts, Windows OSs, 687

security event management (SEM), 716

security guards, preventing tailgaiting, 676

security identifiers (SIDs), Kerberos, 374–375

security information and event management (SIEM), 716–717

security information management (SIM), 716

security policies

AUP (acceptable use policy), 628–629

incident response policy, 642

network access policies, 629

overview of, 628

policies imposed by government laws and regulations, 629–630

training end users, 634

WAN problems, 754

security preparedness, 638–641

security type mismatch, 540–541

segmentation

DMZs using network segmentation, 693

of packets, 27–28

SCADA, 622–623

VLANs for network segmentation, 606

segments

connecting Ethernet segments, 84

Ethernet frames, 71

TCP segments, 37–38, 167–168

SEM (security event management), 716

send/receive (movement), frames, 16–19

sensors, distributed control system, 618

serial cable, 63

server-based anti-malware, 689

server clusters. See also clustering, 408

Server Message Block. See SMB (Server Message Block)

server rail racks, 118

servers

authentication using CRAM-MD5, 360

DHCP. See DHCP servers

DNS. See DNS servers

e-mail, 293–294

FTP, 296–297

LAN problems, 749

network design, 604

proxy servers, 415–417

SSH, 287–289

telnetd, 288

temper detection features, 675

time servers, 751

UC servers, 613

Web servers. See Web servers

Windows Server. See Windows Server

service layers, cloud, 570

service level agreements (SLAs), 637

Service Profile ID (SPID), ISDN, 475

Service Set Identifier. See SSID (Service Set Identifier)

services

disabling unneeded, 671–672, 685

Web services, 292

session hijacking, 664

Session Initiation Protocol. See SIP (Session Initiation Protocol)

Session layer (Layer 5), OSI model, 28–31

session software, 29

sessions

OSI model, 28–31

TCP/IP model, 38, 272

SFF (small form factor) connectors, Gigabit Ethernet, 98

SFP+ (enhanced small form factor pluggable), 10GbE connections, 103

SFP (small form-factor pluggable)

BiDi (Bidirectional) transceivers using, 104

media converters, 100

troubleshooting fiber-optic cable, 146

SFTP (SSH File Transfer Protocol), 383

SHA (Secure Hash Algorithm), 358–360

shielded twisted pair. See STP (shielded twisted pair)

short (electric)

testing for, 723

troubleshooting copper cable, 140

Short Message Service (SMS), 703

SIDs (security identifiers), Kerberos, 374–375

SIEM (security information and event management), 716–717

signal loss/degradation

measuring, 144–145

troubleshooting copper cable, 144–145

troubleshooting fiber-optic cable, 146

signal mismatch, troubleshooting fiber-optic cable, 146

signal strength, wireless networking software, 501

signal-to-noise ratio (SNR), 544–545

signal, troubleshooting wireless networks, 541

signature patterns, in network traffic, 413

signatures, digital, 361, 377

signatures, virus, 689

SIM (security information management), 716

SIM (subscriber identity module), 581–583

Simple Mail Transfer Protocol. See SMTP (Simple Mail Transfer Protocol)

Simple Network Management Protocol. See SNMP (Simple Network Management Protocol)

Simple Network Time Protocol (SNTP), 266

single-mode fiber (SMF), 61

single sign-on, Kerberos, 375

SIP (Session Initiation Protocol)

UC protocols, 614–615

VoIP standards, 490

VoIP systems using, 612

site survey, wireless networking, 521–524

site-to-site connection, L2TP VPNs, 394

Skype, 490–491

SLAs (service level agreements), 637

slashdotting, 663

Small Computer System Interface (SCSI), 565

small form-factor pluggable. See SFP (small form-factor pluggable)

small form factor (SFF) connectors, Gigabit Ethernet, 98

small office, home office. See SOHO (small office, home office)

smart jacks, DSL, 476

smartphones. See also mobile devices

802.11-capability, 583–585

Bluetooth and, 586

installing wireless client, 524–525

LTE support, 583

SMB (Server Message Block)

DNS names in folder and printer sharing, 332

for file sharing, 305

overview of, 332–334

SMF (single-mode fiber), 61

SMS (Short Message Service), 703

SMTP (Simple Mail Transfer Protocol)

alternatives to, 291–293

e-mail clients, 295

Microsoft Exchange Server, 294

overview of, 291

reviewing Internet applications, 300

snapshots

disaster recovery and, 642

VMs (virtual machines), 559

SNAT (Static NAT), 231–232

sniffers. See packet sniffers

SNMP manager, 700–702

SNMP (Simple Network Management Protocol)

protocol underlying network monitoring tools, 699–703

securing TCP/IP applications, 384

snmpwalk utility, 703

SNR (signal-to-noise ratio), 544–545

SNTP (Simple Network Time Protocol), 266

SOA (Start of Authority) record, DNS, 327

social engineering

threats, 668–670

training end users in recognizing, 634

socket pairs, TCP/IP, 272

sockets (endpoints)

open ports (listening ports), 275

PPTP, 392

TCP/IP, 271–272

VPN, 390–391

software

firewalls, 690

OSI layers (3-7), 20–22

wireless networking, 501

Software as a Service (SaaS), 573–575

software defined networking (SDN), 568–569

software troubleshooting tools

arp utility, 729–730

ipconfig/ifconfig, 728–729

looking glass sites, 735

My Traceroute (mtr), 732

netstat utility, 733

nslookup, 731

overview of, 727

packet sniffers/protocol analyzers, 733–734

ping/pathping, and arping, 730–731

port scanners, 734–735

route utility, 732

throughput testers, 735–736

tracert/traceroute, 727–728

SOHO (small office, home office)

DHCP servers with SOHO router, 202, 206

DNS servers not needed in small networks, 336

download speed requirements, 476

enabling delegation on SOHO router, 432

external network connections, 610–611

firewalls, 690–691

increasing signal/power levels, 541

PPPoE routers, 478

setting up network addressing scheme, 610

video surveillance, 678

WAPs and wireless routers, 518

SONET (Synchronous Optical Network)

fiber-based 10 GbE, 100–101

fiber-optic carrier in U.S., 461–462

long distance connections and, 449

source address table (SAT), MAC addresses, 82

source field, in Ethernet frame, 71–72

SOW (statement of work), 637

Spanning Tree Protocol (STP), 85–87, 755

spectrum analyzers, 544–545

speed-test sites, 735–736

SPID (Service Profile ID), ISDN, 475

split cable problem, cable connection issues, 487

spoofing attacks

MAC addresses and, 512

threats, 656–657

spyware, 668

Squid proxy server, 417

SRV records, DNS, 329–330

SSH (Secure Shell)

alternative VPNs, 396

in-band management and, 491

configuring clients, 290

connecting to routers, 254

death of Telnet, 290

encryption standards, 376–378

overview of, 286–287

reviewing Internet applications, 300

servers and clients, 287–289

tunneling and, 378–379

using secure protocols, 674

VNC and, 489

SSID broadcasts, 504

SSID (Service Set Identifier)

accessing guest networks, 684

configuring WAPs, 531–533

configuring wireless client, 538

device saturation, 543

frequency mismatch, 540

hardening IoT devices, 594

identifying wireless networks, 504–505

open network issues, 545

rogue access points, 546–547

security type mismatch, 540–541

setting up ad hoc network, 525–526

VLAN pooling and, 520

war driving and war chalking, 547

wrong SSID, 546

SSL/TLS (Secure Sockets Layer/Transport Layer Security)

combining authentication and encryption, 379–381

HTTPS and, 283–285

SSL VPNs, 395

WAN problems, 754

working at Session layer, 32

ST connectors

in 100BaseFX, 94

in 10BaseFL, 78

for fiber optic cable, 61–62

issues with, 98

standard business documents, 636–638

standard operating procedures, 603

standards, 57–58

cable pulling, 133

cabling, 64–65

encryption, 354–355

Ethernet (802.3), 70

Ethernet cable (568A and 568B), 76–77

hash algorithms, 359

IPv4 to IPv6 tunneling standards, 441–443

modem (V standards), 472–473

remote terminal, 488–489

RSTP (802.1w), 87

STP, 55

structured cabling, 110–112

switches (802.1Q), 400

TEMPEST standards, 674

VoIP, 490–491

Wi-Fi/mobile networking (802.11), 498–499, 507–510, 583–586

wireless networking, 498–499

standards (802.11), 507–510

standards, TCP/IP security

AAA (Authentication, Authorization, and Accounting), 370–372

combining authentication and encryption, 379

encryption standards, 375–376

IPSec (Internet Protocol Security), 380–381

Kerberos, 373–375

overview of, 367–368

PPP (Point-to-Point Protocol), 368–370

RADIUS (Remote Authentication Dial-In User Service), 372–373

SSH (Secure Shell), 376–378

SSL/TLS (Secure Sockets Layer/Transport Layer Security), 379–380

TACACS+ (Terminal Access Controller Access Control System Plus), 373

tunneling, 378–379

user authentication standards, 368

star-bus topology, 49, 111–112

star-ring topology, 49

star topology, 48, 503

Start of Authority (SOA) record, DNS, 327

stateful DHCPv6 servers, 437

stateful inspection, firewall techniques, 690

stateless DHCPv6 servers, 437

stateless inspection, firewall techniques, 691

statement of work (SOW), 637

static IP addressing, 198–201

Static NAT (SNAT), 231–232

static routes, 234–235

static VLANs, 401

steady state routers, 240

storage area networks (SANs), 565–566

STP (shielded twisted pair)

1000BaseT and, 97

overview of, 55–56

standards, 55

STP (Spanning Tree Protocol), 85–87, 755

straight-through cable

connecting switches with, 84–85

hands-on problems, 746

stream ciphers, in symmetric-key encryption, 354

streaming media, 491

structured cabling. See also cabling

beyond star topology, 125

components of, 113

connecting patch panels, 138–140

connecting work areas, 135–136

connections inside demarc, 127–129

creating floor plan, 129

defined, 110

demarc (demarcation point), 125–127

equipment racks, 116–118

horizontal cabling, 114–116

installing, 129

for internal network connections, 607–608

making cable connections, 135

making patch cables, 136–138

mapping cable runs, 129–130

measuring signal loss, 144–145

overview of, 110–111

patch cables, 122–123

patch panels, 118–122

pulling cable, 132–135

selecting location for telecommunications room, 131–132

telecommunications room, 113–114

testing cable runs, 140

troubleshooting copper-related issues, 140–144

troubleshooting fiber-related issues, 145–148

work area, 123–125

STS (Synchronous Transport Signal), 462

subnet masks

classless and classful, 188

diagnosing TCP/IP networks, 345

LAN problems, 749

overview of, 181–186

routing table example, 221–223

subnets/subnetting

calculating subnets, 191–195

creating subnets, 190–191

determining number of hosts in network, 189–190

logical addressing, 21

overview of, 188–189

subscriber identity module (SIM), 581–583

supervisory control and data acquisition. See SCADA (supervisory control and data acquisition)

switch port protection

device hardening, 685

in network hardening, 661

switchboard, in telephone systems, 450

switches

bridging loops for, 85–86

configuring VLAN-capable switches, 400–402

connecting using uplink ports, 84–85

connectivity components in star-bus topology, 111–112

content switches, 409–410

crossover cables, 85

data planes and control planes, 568

distributed switches, 567–568

Ethernet, 82–84

flood guards, 685

interVLAN routing, 405–406

Link layer (Network Interface layer), 34

managed devices, 248, 396–398

MLS (multilayer switches), 219

monitoring, 709–710

overview of, 15

port mirroring in managed switches, 415

shopping for, 106

standard for Ethernet switches (802.1Q), 400

TACACS+, 373

telephone circuit switches, 450

troubleshooting Ethernet issues, 87

trunking, 399–400

virtual switches, 566–568

wireless controllers, 520

switching loops, WAN problems, 755

symmetric DSL (SDSL). See also DSL (digital subscriber line), 475

symmetric-key encryption

block ciphers, 353–354

defined, 353

examples of, 354–355

stream ciphers, 354

symptoms, gathering information in troubleshooting, 738

SYN

TCP segments, 167–168

TCP three-way handshake, 265

SYN-ACK

TCP segments, 167–168

TCP three-way handshake, 265

Synchronous Digital Hierarchy (SDH), 461–462

Synchronous Optical Network. See SONET (Synchronous Optical Network)

Synchronous Transport Signal (STS), 462

syslog (macOS and Linux), 711

system

compromised system, 664

symptoms of compromise, 688

system duplication, benefits of virtualization, 560

system life cycle policies, 673

system recovery, 559

T

T carriers (T1/T3)

dedicated private connections, 485

demarc (demarcation point), 467

DS1 (digital signal 1), 458–459

fractional T1 access, 460

history of remote connections, 448–449

packet switching protocols, 462–463

T3 carriers, 460

termination, 457

trunk lines, 474

TA (terminal adapter), ISDN, 474–475

tablet computers, 524–525

TACACS+ (Terminal Access Controller Access Control System Plus)

authentication standards, 373

router/switch configuration for, 418–419

tagging

double-tagging attacks, 403

VLANs, 402–403

tailgaiting, 676

tamper detection features, servers, 675

Tap to Pay services, NFC and, 589

TCN (topology change notification), Spanning Tree Protocol, 86

TCP/IP (Transmission Control Protocol/Internet Protocol). See also applications, TCP/IP

Application layer, 39, 169–170

applying IP addresses, 176–178

calculating subnets, 191–195

class IDs, 186–187

comparing with OSI model, 40

configuring DHCP, 203–204

connection-oriented vs. connectionless communication, 36–37

converting dotted decimal to binary, 195–196

creating subnets, 190–191

data structures corresponding to layers of, 41

determining number of hosts in network, 189–190

DHCP relays, 205–206

DHCP reservations, 206

diagnosing TCP/IP networks, 343–346

dynamic IP addressing, 201–202

encapsulation/de-encapsulation, 40

how DHCP works, 202–203

interconnecting LANs using routers, 179–181

Internet layer, 35

Internet layer protocols, 166–167

IP address assignments, 197

IP addresses, 172–176

IP and Ethernet and, 170–172

Link layer (Network Interface layer), 34–35

MAC addresses and IP addresses, 23

MAC reservations, 206–208

network IDs, 178–179

overview of, 34, 163–164

packets in frames, 24–27

protocol suite, 22, 164–166, 264

review Q&A, 41–44, 213–215

routing and, 217

securing. See securing TCP/IP

sessions, 38

special IP addresses, 212–213

static IP addressing, 198–201

subnet masks, 181–186

subnetting, 188–189

TCP segments, 37–38

Transport layer, 36, 167–169

troubleshooting DHCP, 208–212

troubleshooting networks and, 41

UDP datagrams, 38

TCP segments, 37–38, 40–41

TCP three-way handshake, 167–168, 265

TCP (Transmission Control Protocol)

connection-oriented, 37

HTTP running on TCP port 80, 281

HTTPS running on port 443, 285

Internet applications port numbers, 300

overview of, 265

in TCP/IP suite, 22

Transport layer protocols, 167–168

tcpdump, LAN problems, 734

TCPView utility, viewing connection status, 274–275

TDM (time division multiplexing), 458

TDMA (time-division multiple access), 581

TDR (time domain reflectometer)

hardware troubleshooting tools, 722–724

testing cabling, 155–156

troubleshooting copper cable, 142

Telecommunications Industry Association/Electronics Industries Alliance (TIA/EIA). See TIA/EIA (Telecommunications Industry Association/Electronics Industries Alliance)

Telecommunications Industry Association (TIA), 57

telecommunications room

equipment racks, 116–118

overview of, 113–114

patch panels and cable, 118–123

selecting location for, 131–132

in star-bus topology, 116

troubleshooting, 156–158

telephony

analog. See analog telephony

digital. See digital telephony

Telnet

configuring clients, 290

connecting to routers, 254

overview of, 285–286

remote terminal and, 488

reviewing Internet applications, 300

servers and clients, 287–289

SSH replacing, 290, 376

telnetd server, Linux/UNIX OSs, 288

temperature monitor, hardware troubleshooting tools, 725

TEMPEST standards, protecting against RF emanation, 674

Temporal Key Integrity Protocol (TKIP), 517

Teredo, NAT traversal, 442

Terminal Access Controller Access Control System Plus (TACACS+)

authentication standards, 373

router/switch configuration for, 418–419

terminal adapter (TA), ISDN, 474–475

terminal emulation

PuTTY utility, 254

remote terminals, 488–489

SSH, 287

termination

hands-on problems, 746

of T1 lines, 457–458

terminators, of bus topology, 46

TFTP (Trivial File Transfer Protocol)

compared with FTP, 299

overview of, 267

reviewing Internet applications, 300

TGT (Ticket-Granting Ticket), Kerberos, 374

theory of probable cause in troubleshooting, 739–741

thick clients, WAPs, 520

thin clients, WAPs, 520

third-party tools, managing routers, 253

threats

administrative access attacks, 666

ARP cache poisoning, 658–661

brute force attacks, 664

deauthentication (deauth) attacks, 663

DoS (denial of service) attacks, 661–663

local attacks (physical), 664–666

malware, 667–668

man-in-the-middle attacks, 663–664

overview of, 655–656

packet/protocol abuse, 657–658

session hijacking, 664

social engineering, 668–670

spoofing attacks, 656–657

VLAN hopping attacks, 666

zero-day attacks, 658

throughput

interface monitors, 708

software troubleshooting tools, 735–736

TIA/EIA (Telecommunications Industry Association/Electronics Industries Alliance)

cable certifier specifications, 145

cable pulling standards, 133

crossover cables, 85

Ethernet cable standards (568A and 568B), 76–77

structured cabling standards, 110–112

TIA (Telecommunications Industry Association), 57

TIC (Tunnel Information and Control) protocol, 443

Ticket-Granting Ticket (TGT), Kerberos, 374

time-division multiple access (TDMA), 581

time division multiplexing (TDM), 458

time domain reflectometer. See TDR (time domain reflectometer)

time servers, LAN problems, 751

TKIP (Temporal Key Integrity Protocol), 517

TLD (top-level domain) servers, 309

TLS (Transport Layer Security). See SSL/TLS (Secure Sockets Layer/Transport Layer Security)

Token Ring, 49

tone probes/tone generators, 158–160, 726

top-level domain (TLD) servers, 309

top listeners, performance monitoring, 716

top talkers

performance monitoring, 716

symptoms of compromised system, 688

topologies. See network topologies

topology change notification (TCN), Spanning Tree Protocol, 86

trace cables, 158

traceroute/tracert

checking router issues, 752

diagnosing TCP/IP networks, 346

software troubleshooting tools, 727–728

troubleshooting routers, 258

traffic. See also packets

firewall rules (block/allow), 689

protocol (packet) analyzers, 704–705

traffic floods, 685

traffic shaping, 410–411

traffic spike, 663

trailer, frame structure, 14

training end users, 634

transceiver mismatch, 146

transceivers, hot-swappable, 746

Transmission Control Protocol. See TCP (Transmission Control Protocol)

Transmission Control Protocol/Internet Protocol. See TCP/IP (Transmission Control Protocol/Internet Protocol)

transmit beamforming, 509

Transport layer (Layer 4), OSI model, 27–28

Transport Layer Security. See SSL/TLS (Secure Sockets Layer/Transport Layer Security)

Transport layer, TCP/IP

data structure in, 41

overview of, 36

protocols, 167–169

Transport mode, IPSec, 381

Trap PDU, SNMP manager, 702–703

Trivial File Transfer Protocol. See TFTP (Trivial File Transfer Protocol)

Trojan horse, 668

troubleshooting process

documenting findings, 743–744

establish plan of action, 741

establish theory of probable cause, 739–741

identify the problem, 738–739

implement solution or escalate, 742

overview of, 736–737

test theory of probable cause, 741

verifying functionality of system and implement preventative measures, 742–743

trunk lines, 474

trunk port, 400

trunking, VLANs, 399–400

trusted/untrusted users, 664–665

TSP (Tunnel Setup Protocol), 443

tunnel brokers, moving to IPv6, 443

Tunnel Information and Control (TIC) protocol, 443

Tunnel mode, IPSec, 381

Tunnel Setup Protocol (TSP), 443

tunneling

4to6 tunneling, 441

6in4 tunneling, 442

encryption standards, 378–379

SSL/TLS (Secure Sockets Layer/Transport Layer Security), 380

VPNs and, 390–391

twisted pair cable. See also STP (shielded twisted pair); UTP (unshielded twisted pair)

100BaseT4 and 100BaseTX, 92

Gigabit Ethernet over, 70

overview of, 55

two-factor authentication, 366

two-post equipment racks, 118

two-way satellite service, 480

TXT records, DNS, 330

Type-1 hypervisors, 561

Type-2 hypervisors, 561

Type field, of frame, 14, 71–72

U

U (unit), height measurement for equipment racks, 118

UART (Universal Asynchronous Receiver/Transmitter), 470

UC (unified communication)

network components, 613–614

overview of, 612–613

protocols, 614–615

VoIP and, 611–612

UDP (User Datagram Protocol)

connectionless communication, 37

data structures corresponding to TCP/IP layers, 41

datagrams, 38, 40

DHCP and, 203

Internet applications port numbers, 300

overview of, 265–266

Transport layer protocols, 168–169

Ultra Physical Contact (UPC) connectors, 99

unauthorized access, controlling user accounts, 679

unencrypted channels, as vulnerability, 673–674

unicast addressing

frame movement and, 18

global unicast addresses, 430–431

IPv6 link-local addresses, 428

unicast, multicast compared with, 614

unidirectional antennas, 530

unified communication. See UC (unified communication)

Unified Threat Management (UTM), 691

uniform resource locator (URL), 283

uninterruptible power supplies. See UPSs (uninterruptible power supplies)

unit (U), height measurement for equipment racks, 118

Universal Asynchronous Receiver/Transmitter (UART), 470

UNIX. See Linux/UNIX OSs

unshielded twisted. See UTP (unshielded twisted pair)

UPC (Ultra Physical Contact) connectors, 99

updates

anti-malware programs, 688

change management, 632–634

device hardening, 685

uplink ports, connecting two switches with, 84–85

UPSs (uninterruptible power supplies)

backing up equipment racks, 156

equipment racks and, 117–118

monitoring power, 157–158

network design, 605

rack-mounted equipment and, 650

URL (uniform resource locator), 283

USB

connecting to routers via USB port, 254

installing wireless client, 525

NICs with, 150–151

wireless networking hardware, 499–500

user account control, 666

user authentication. See also authentication, 368

User Datagram Protocol. See UDP (User Datagram Protocol)

user names, dangers of cleartext credentials, 674

users/user accounts

asking questions of in troubleshooting, 738

credentials, 674, 685

dangers of default accounts, 681

malicious, 665–666

managing, 679–681

spoofing attacks, 656

trusted and untrusted, 664–665

utilization, interface monitors, 708

utilization limits, security policies, 754

UTM (Unified Threat Management), 691

UTP (unshielded twisted pair)

1000BaseT and, 97

connectivity components in star-bus topology, 111–112

connectors, 59

horizontal cabling, 114

limitations of, 94

making patch cables, 136–138

OSI hardware, 6–7

overview of, 56

RJ-45 connectors, 148

solid core vs. stranded, 115

standards, 57–58

use with 10BaseT, 73–76

V

V standards, for modems, 472–473

vampire taps, on coaxial cable, 52

variable-length subnet masking (VLSM), 241

vendors, 603

vertical cross-connect, patch panels, 128

video conferencing, UC features, 612

video surveillance, for security monitoring, 678

video teleconferencing (VTC)

medianets and, 615–617

UC features, 613

virtual IP, 635

virtual LANs. See VLANs (virtual LANs)

virtual machines. See VMs (virtual machines)

Virtual Network Computing (VNC), 489

virtual networking, 566

virtual private networks. See VPNs (virtual private networks)

virtual reality, 552–553

Virtual Router Redundancy Protocol (VRRP), 636

virtual routers and firewalls, 568

virtual switches, 566–568

VirtualBox (Oracle)

configuring virtual hardware, 554

desktop virtualization, 555–558

guest environment for virtualization, 551–552

virtualization in modern networks, 561

virtualization. See also cloud

administering hypervisor, 563

benefits of, 559–560

choosing hypervisor, 561–562

compared with emulation, 555–556

data storage and, 564–565

desktop virtualization, 555–558

hypervisors, 554–555

in modern networks, 561

NAS (network attached storage), 566

overview of, 551–554

review Q&A, 576–578

SANs (storage area networks), 565–566

scaling, 563–564

SDN (software defined networking), 568–569

virtual networking, 566

virtual routers and firewalls, 568

virtual switches, 566–568

virus shields, 688

viruses

antivirus programs, 688–689

signatures, 689

types of malware, 667

VLAN hopping attacks, 666

VLAN Trunking Protocol (VTP), 404

VLANs (virtual LANs)

assignment, 401

configuring VLAN-capable switches, 400–402

DHCP and, 406

interVLAN routing, 404–406

LAN problems, 749–750

for network segmentation, 606

overview of, 398–399

for segmented network, 609–610

tagging, 402–403

troubleshooting, 407

trunking, 399–400

VLAN pooling in enterprise wireless, 520

VTP (VLAN Trunking Protocol), 404

VLSM (variable-length subnet masking), 241

VMs (virtual machines). See also hypervisors

benefits of virtualization, 559

creating, 557

guest environment for virtualization, 551

scaling, 563–564

virtual switches and, 566–567

VirtualBox (Oracle), 551–552

VMware

System Setup, 555

virtualization in modern networks, 561

vSphere Client, 563

VNC (Virtual Network Computing), 489

VoIP (Voice over IP)

example of connectionless-orientation, 37

overview of, 489

standards, 490–491

UC (unified communication), 611–612

voltage event recorders, 157–158

voltage quality recorder, 725

VPN concentrators, 394

VPN tunnels, 391

VPNs (virtual private networks)

alternatives, 396

DMVPN, 395–396

DTLS VPNs, 395

L2TP VPNs, 394–395

overview of, 390–392

PPTP VPNs, 392–394

Proxy ARP, 755–756

SSL VPNs, 395

VPN connections for remote access, 484

VRRP (Virtual Router Redundancy Protocol), 636

vSphere Client (VMware), 563

VTC (video teleconferencing)

medianets and, 615–617

UC features, 613

VTP pruning, 404

VTP (VLAN Trunking Protocol), 404

vulnerabilities

attack surface, 658

BlueBorne list of security vulnerabilities on mobile devices, 588

cleartext credentials, 674

disabling unneeded services, 671–672

in HTTP, 283

overview of, 671

RE emanation, 674

scanning/managing, 638

unencrypted channels, 673–674

unpatched and legacy systems, 673

vulnerability patches, 633

W

WANs (wide area networks)

alternatives to WAN telephony, 468

cellular WAN. See cellular WAN

configuring routers, 255–256

distance vector protocols, 237

interconnected LANs in, 178

interconnecting LANs using routers, 179–181

IP addresses in, 176

NAT setup, 229

problems, 751–754

remote access, 481

remote connectivity and, 447

routing table example, 221–223

telephony connections, 467–468

WAPs (wireless access points)

adding to Wi-Fi network, 539

administering enterprise wireless, 519–520

BSS and ESS, 503

channels, 505–506

configuring, 531

configuring channel and frequency of access point, 534, 536–537

configuring encryption, 533, 535–536

configuring MAC address filtering, 533–534

configuring SSID and beacon, 531–533

features in 802.11n, 509

MAC address filtering support, 511–512

no connection issues, 540–542

physical issues, 543–545

placing, 527–531

robust devices in enterprise wireless, 518–519

rogue access points, 546–547

setting up infrastructure network, 526

setup utilities, 501

weird connection issues, 545–546

wireless networking hardware, 500

wireless security, 512–513

WPS (Wi-Fi Protected Setup), 510

war chalking, 547

war driving, 547

warm sites, business continuity plans, 644–645

wavelength mismatch, troubleshooting fiber-optic cable, 146

WDM (wavelength division multiplexing)

characteristics of fiber transceivers, 104

fiber-optic carriers and, 462

PON (passive optical network), 480

Web applications

developing, 571–573

Web sites as, 570–571

Web browsers

accessing Web, 279

configuring access points, 531

FTP in, 298

popular types, 283

requesting HTML pages, 280–281

securing, 585

working at Application layer, 32

Web clients

ephemeral port numbers, 271

overview of, 282–283

securing with HTTPS, 283–285

Web filtering, 693

Web hosting, by ISPs, 282

Web interface, in routers, 251–252

Web pages

delivered or served by Web server, 282–283

HTTPS securing, 285

publishing Web sites, 281–282

Web browsers requesting HTML pages, 280–281

Web servers

Apache HTTP Server, 283

DNS and, 318–319

Google Web Server, 283

HTTP and, 281

overview of, 282–283

publishing Web sites, 281–282

securing with HTTPS, 283–285

unable to access remote, 744–745

Web services, e-mail as, 292

Web sites

Apache HTTP Server and, 283

DNS and, 318–319

publishing, 281–282

securing with HTTPS, 283–285

as Web applications, 570–571

Webmin, administering Apache, 283–284

well-known ports, TCP/IP, 269, 334

WEP attacks, 516–517

WEP (Wired Equivalent Privacy)

for data encryption, 516–518

weakness of, 533

whitelists, MAC address filtering, 511

Wi-Fi. See wireless networking

Wi-Fi analyzer, conducting site survey, 521

Wi-Fi Protected Access. See WPA (Wi-Fi Protected Access)/WPA2

wide area networks. See WANs (wide area networks)

Window domains, 332

Windows Defender, 690

Windows OSs

Active Directory database management, 385

Active Directory groups, 332, 334

Active Directory-integrated zones, 335

administrative access attacks, 666

compatibility issues, 606

configuring DNS, 320–322

DDNS (dynamic DNS), 338–339

determining MAC addresses, 172

displaying MAC and IP addresses, 174–178

e-mail servers, 293–294

firewalls, 690

forward and reverse lookup zones, 331

FTP servers, 296–297

hashing exercise using SHA-512, 360

host file, 306–307

installing NIC drivers, 151

Kerberos and, 373–374

NetBT (NetBIOS over TCP/IP), 305

netstat utility for viewing endpoints, 272–274

performance monitors, 711

remote terminal standard, 488–489

security alerts, 687

setting up VPN connection in Windows 10, 392–393

SMB, 331–334

static IP addressing, 199

TCPView utility, 274–275

telnet server, 288

troubleshooting no DHCP server message, 210–211

troubleshooting routers, 258–259

Windows Performance Monitor (PerfMon)

baselines, 711

counters, 711

overview of, 711

Windows Server

forward and reverse lookup zones, 331

IAS (Internet Authentication Service) built in, 372–373

remote terminal standard, 488–489

RRAS (Routing and Remote Access Service), 392–393

WinFrame terminal emulation, 488

wire map problem, 723

wired/wireless, categories to consider in building network, 601

wireless access points. See WAPs (wireless access points)

wireless analyzer, 521

wireless bridges, 539

wireless controllers, 520

wireless LANs (WLANs), 503

wireless network security

access control (802.1X), 515–516

authentication, 512–513

EAP (Extensible Authentication Protocol), 514–515

encryption, 516–518

MAC address filtering, 511–512

overview of, 510–511

wireless networking

access control (802.1X), 515–516

ad hoc mode, 501–503

authentication, 512–513

broadcasting frequency and methods, 505

BSSID, SSID, and ESSID, 504–505

channels, 505–506

configuring access points, 531

configuring channel and frequency of access point, 534, 536–537

configuring client, 537–538

configuring encryption, 533, 535–536

configuring MAC address filtering, 533–534

configuring SSID and beacon, 531–533

CSMA/CD, 506–507

dangers of public Wi-Fi, 585

EAP, 514–515

encryption, 516–518

enterprise wireless, 518–521

extending network, 538–539

hardware, 499–501

implementing, 521

infrastructure mode, 503–504

installing client, 524–525

internal network connections, 609

MAC address filtering, 511–512

no connection issues, 540–542

overview of, 497–498

physical issues, 543–545

placing access points/ antennas, 527–531

range, 504

review Q&A, 547–549

security of, 510–511

setting up ad hoc network, 525–526

setting up infrastructure network, 526

site survey, 521–524

slow connection issues, 542–545

software, 501

standards (802.11), 498–499, 507–510

troubleshooting, 539–540

verifying installation, 539

weird connection issues, 545–547

WPS (Wi-Fi Protected Setup), 510

wireless profiles, security issues on smartphones, 585

wiremap, troubleshooting copper cable, 141–142

Wireshark

packet sniffers/protocol analyzers, 733–734

performance monitoring, 716

protocol analyzing with, 705–707

WLANs (wireless LANs), 503

word patterns, cracking Caesar ciphers, 351

work areas

connecting, 135–136

network installation and, 123–125

structured cabling components, 114

workgroups, Windows groups, 332–333

workstations

accessing VLANs, 402–403

network design, 604

World Wide Web

HTML and, 279–281

HTTP and, 281

HTTPS and, 283–285

publishing Web sites, 281–282

Web servers and Web clients, 282–283

worms, 667

WPA (Wi-Fi Protected Access)/WPA2

configuring encryption for access points, 533

for data encryption, 517

hardening IoT devices, 594

WPA2, 517–518

WPS attacks, 510

WPS (Wi-Fi Protected Setup), 510

X

X.25 packet switching protocol, 463

XenApp, 488

XENPAK transceiver, 103

XenServer (Citrix), 562

Xerox, 69–70

XML (Extensible Markup Language), 280

XOR (eXclusive OR) encryption, 352–353

Y

Yagi antennas, 530

Yahoo! 292

Ylonen, Tatu, 376

Yost (rollover) cable, connecting to routers, 247

Z

Z-wave, for home automation, 591

Zennström, Niklas, 491

zero-day attacks, 658

zeroconf (zero-configuration networking), 209

Zigbee, for home automation, 591

zombies, DDoS attacks, 662

zones

name servers, 314

primary and secondary, 330–331

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.188.64.66