INDEX   

Please note that index links point to page beginnings from the print edition. Locations are approximate in e-readers, and you may need to page down one or more times after clicking a link to get to the indexed material.

Numbers

100 GbE Ethernet, 106

100-megabit Ethernet, 91–92

1000BaseLX Ethernet, 97

1000BaseSX Ethernet, 97

1000BaseT Ethernet, 96

1000BaseX Ethernet, 96

100BaseFX Ethernet, 94–96, 149

100BaseT Ethernet, 92–96

10BaseFL Ethernet, 78–79, 94

10BaseT Ethernet

hub issues, 82

overview of, 73–74

specification, 77

TIA/EIA 568A and 568B, 76–77

upgrading to 100BaseT, 93

UTP use with, 74–76

10BbE Ethernet

backbone networks, 104–105

connectors, 103

copper-based, 102

fiber-based, 100–101

fiber transceivers, 104

overview of, 100

physical connections, 103

standards, 102

10GBaseER Ethernet, 101

10GBaseEW Ethernet, 101

10GBaseL4 Ethernet, 102

10GBaseLR Ethernet, 101

10GBaseLRM Ethernet, 102

10GBaseLW Ethernet, 101

10GBaseSR Ethernet, 101

10GBaseSW Ethernet, 101

10GBaseZR Ethernet, 102

110 block (110-punchdown block), 119–120, 135–136

2G technologies, mobile networking, 581–582

3G technologies, mobile networking, 582–583

40GbE Ethernet, 106

4G technologies, mobile networking, 582–583

4to6 tunneling, moving to IPv6, 441

66 block (66-punchdown block), 120

6in4 tunneling, moving to IPv6, 442

802.11a-ht, 509

802.11g-ht, 509

8P8C (8 position 8 contact) connectors, 59

A

AAA (Authentication, Authorization, and Accounting)

Kerberos, 373–375

overview of, 370–372

RADIUS, 372–373

router/switch configuration for, 418–419

TACACS+, 373

AAAA records, DNS, 328, 439

absorption, physical issues in wireless networks, 543

acceptable use policy (AUP), 628–629

access control

AUP (acceptable use policy), 628–629

authorization and, 366–367

doors, 676–678

network access policies, 629

in network security, 679

to wireless networks (IEEE 802.1x), 515–516

access control lists. See ACLs (access control lists)

Access Control Server (ACS) (Cisco), 684

access points. See WAPs (wireless access points)

access ports, workstations to VLANs, 402–403

accounting. See also AAA (Authentication, Authorization, and Accounting), 372

ACK

HTTP packets, 270–271

TCP segments, 167–168

TCP three-way handshake, 265

ACLs (access control lists)

administrative access attacks, 666

authorization techniques, 367

firewall rules, 692–693

hardening IoT devices, 594

MAC address filtering and, 511–512

troubleshooting firewalls, 695

WAN problems, 752

AcrylicWiFi, conducting site survey, 521–522

ACS (Access Control Server) (Cisco), 684

Active Directory. See AD (Active Directory)

activity lights, checking NIC status, 152–153

actuator, distributed control system, 618

AD (Active Directory)

Active Directory-integrated zones, 331, 335

groups, 332, 334

managing AD databases, 385

ad hoc mode

overview of, 501–503

setting up ad hoc network, 525–526

Adaptive Network Technology (ANT+), 590–591

Adaptive Security Appliance (ASA), 753

address notation, IPv6, 424–426

address space, IPv4 vs. IPv6, 423–424

administrative accounts, administrative access attacks, 666

ADSL (asymmetric DSL). See also DSL (digital subscriber line), 476

Advanced Encryption Standard (AES), 354–355

advanced networking devices

AAA (Authentication, Authorization, and Accounting), 418–419

alternative VPNs, 396

configuring VLAN-capable switches, 400–402

content switches, 409–410

DHCP and VLANs, 406

DMVPN, 395–396

DNS for load balancing, 408–409

DTLS VPNs, 395

interVLAN routing, 404–406

intrusion detection/intrusion protection, 412–415

L2TP VPNs, 394–395

load balancing, 407–408

multilayer switches, 407

network protection devices, 412

overview of, 389

port bonding, 411–412

port mirroring, 415

PPTP VPNs, 392–394

proxy servers, 415–417

QoS (quality of service) and traffic shaping, 410–411

review Q&A, 419–422

SSL VPNs, 395

switch management, 396–398

tagging, 402–403

troubleshooting VLANs, 407

trunking, 399–400

VLANs (virtual LANs), 398–399

VPNs (virtual private networks), 390–392

VTP (VLAN Trunking Protocol), 404

advanced persistent threats (APTs), 691

adware, 668

AES (Advanced Encryption Standard), 354–355

AfriNIC (African Network Information Centre), 436

agents

managed devices running, 701–702

persistent and non-persistent, 683–684

SNMP, 384

aggregation, IPv6, 433–435

Aircrack-ng, for penetration testing, 640

AirMagnet Survey Pro, conducting site survey, 521–522

AJAX, server-side scripting, 281

alerts

emergency alert system, 652

security alerts, 687

SNMP, 703

algorithms. See also by individual types, 351

Amazon Web Services (AWS), example of IaaS, 570–571

American National Standards Institute (ANSI), 57

American Registry for Internet Numbers (ARIN), 186, 435

amplified DoS, 662

amplifiers, repeaters compared with, 454

analog telephony

converting to digital phone systems, 453–455

frequency division multiplexing, 453

long distance phone calls, 449–450

multiplexers and local exchanges, 451–453

overview of, 448–449

PSTN lines and, 470

Android Pay, 589

Android smartphones, 585

Angled Physical Contact (APC) fiber connectors, 99

Angry IP Scanner, 734

ANSI (American National Standards Institute), 57

ANT+ (Adaptive Network Technology), 590–591

antennas

multipath, 544

multiple antenna use with WAPs, 509

omnidirectional, 527–529

patch antennas, 530

placement, 527, 531

satellite television, 480

troubleshooting wireless networks, 542

unidirectional, 530

anti-ESD wrist strap, 648

anti-malware

antivirus programs, 688–689

assessing security posture, 683

definition files, 413

anycast addresses, IPv6, 429–430

Apache

administering, 283–284

Apache HTTP Server on Linux/UNIX OSs, 283

APC (Angled Physical Contact) fiber connectors, 99

APIPA (Automatic Private IP Addressing), 209–210, 525

APIs (application programming interfaces), 33

APNIC (Asia-Pacific Network Information Centre), 436

Apple Pay, 589

application/context aware, firewall techniques, 691

Application layer (Layer 7), OSI model, 32–33

Application layer, TCP/IP model, 41

overview of, 39

protocols, 169–170

application programming interfaces (APIs), 33

application security, TCP/IP

HTTPS (HTTP Secure), 382–383

LDAP (Lightweight Directory Access Protocol), 385

NTP (Network Time Protocol), 385

overview of, 381

SCP (Secure Copy Protocol), 383

SFTP (SSH File Transfer Protocol), 383

SNMP (Simple Network Management Protocol), 384

applications, TCP/IP

active and passive FTP, 298–299

configuring Telnet/SSH clients, 290

connection-oriented vs. connectionless communication, 264–265

connection status, 275–278

DHCP and, 266–267

e-mail, 290–291

e-mail clients, 295

e-mail servers, 293–294

FTP and, 295–296

FTP servers and clients, 296–298

HTTP, 281

HTTPS, 283–285

ICMP, 267–268

IGMP, 268–269

NTP/SNTP, 266

overview of, 263–264

port numbers and, 269–271

publishing Web sites, 281–282

registered ports, 271–275

reviewing Internet applications, 300

rules for determining good or bad communication, 278

SMTP, POP3, IMAP4, 291–293

TCP, 265

Telnet/SSH, 285–287

Telnet/SSH servers and clients, 287–289

TFTP, 267

UDP, 265–266

Web servers and Web clients, 282–283

WWW (World Wide Web), 279–281

APTs (advanced persistent threats), 691

ARIN (American Registry for Internet Numbers), 186, 435

ARP (Address Resolution Protocol)

ARP cache poisoning, 658–661

determining MAC addresses, 171–172, 184–186

Proxy ARP, 755–756

arp utility, 729–730

arping, 730–731

AS (Authentication Server), Kerberos, 374

AS (Autonomous System), 241–242, 244

ASA (Adaptive Security Appliance), 753

Asia-Pacific Network Information Centre (APNIC), 436

ASN (Autonomous System Number), 242–243

assets

disposal, reuse, repurpose, 673

network documentation, 603

protecting critical, 635

asymmetric DSL (ADSL). See also DSL (digital subscriber line), 476

asymmetric-key encryption

defined, 353

example of, 357

public-key cryptography, 355–356

Asynchronous Transfer Mode (ATM), 228, 463–464

AT&T

competing carriers, 460–461

converting from analog to digital phone systems, 456

DSL use by, 476

fiber-to-the-home providers, 480

history of telephony in U.S., 454

ATM (Asynchronous Transfer Mode), 228, 463–464

attack surface, vulnerabilities, 658

attacks. See also by individual types, 627–628

attenuation

physical issues in wireless networks, 543

troubleshooting copper cable, 144

troubleshooting fiber-optic cable, 146

AUP (acceptable use policy), 628–629

authentication

applications for, 32

defined, 350

EAP, 514–515

methods, 366

overview of, 365–366

securing wireless networking, 512–513

of servers using CRAM-MD5, 360

SSH and, 287

trusted and untrusted users and, 665

Authentication, Authorization, and Accounting. See AAA (Authentication, Authorization, and Accounting)

Authentication Server (AS), Kerberos, 374

authentication standards

AAA (Authentication, Authorization, and Accounting), 370–372

combining authentication and encryption, 379

IPSec, 380–381

Kerberos, 373–375

PPP, 368–370

RADIUS, 372–373

SSL/TLS, 379–380

TACACS+, 373

user authentication, 368

authoritative name servers, DNS, 315, 326

authorization

AAA (Authentication, Authorization, and Accounting), 372

defined, 350

overview of, 366–367

techniques, 367

Automatic Private IP Addressing (APIPA), 209–210, 525

Autonomous System (AS), 241–242, 244

Autonomous System Number (ASN), 242–243

AWS (Amazon Web Services), example of IaaS, 570–571

B

B channels (Bearer channels), ISDN, 474–475

backbone networks, 104–105

backoff, CSMA/CA and, 506

backups

assessing backup plan, 644

disaster recovery and, 642–643

RAID, 664

traditional techniques, 643

badges, RFID chips in, 676–677

bandwidth

interface monitors, 708

QoS policies for traffic shaping, 410–411

routing metrics, 236

throughput testers, 735

UTP ratings, 57

bandwidth-efficient encoding schemes, in twisted pair cabling, 58

bandwidth saturation, 543

bandwidth speed testers, 735–736

banner grabbing, 665

bare-metal hypervisors, 561

baseband, compared with broadband, 73, 92

baselines, in troubleshooting, 711–712

Basic Rate Interface (BRI), ISDN, 474

Basic Service Set (BSS)

extending wireless network, 538–539

single access points, 503

Basic Service Set Identifier (BSSID), identifying wireless networks, 504

baud/baud rate, modem speed, 470–472

BCP (business continuity plans), 642, 644–645

beacon, configuring WAPs, 532–533

beam antennas, 530

Bearer channels (B channels), ISDN, 474–475

bend radius limitation, fiber-optic cable, 146

BERT (Bit Error Rate Test), testing telephony connections, 467–468

BGP (Border Gateway Protocol)

anycast addresses, 430

communication between Autonomous Systems, 243

comparing dynamic routing protocols, 246

overview of, 242–244

query tools, 735

BiDi (Bidirectional) transceivers, fiber-optic, 104

binary numbering system

converting dotted decimal to, 174, 183–184, 195–196

overview of, 10

BIND DNS server, 409

biometrics

controlling physical access, 677

in local authentication, 366

Bit Error Rate, 467–468

Bit Error Rate Test (BERT), testing telephony connections, 467–468

bit rates, modem speeds, 471–472

blacklists, MAC address filtering, 512

block ciphers, in symmetric-key encryption, 353–354

blocking policy, security policies, 754

blocks, of storage in hard drives, 565

BlueBorne list, of security vulnerabilities on mobile devices, 588

Bluejacking, 587

Bluesnarfing, 587

Bluetooth, 586–588

BNC connectors, coaxial cable, 52, 55

bonding NICs, 151

BOOTP (Bootstrap Protocol). See also DHCP (Dynamic Host Configuration Protocol), 202

Border Gateway Protocol. See BGP (Border Gateway Protocol)

botnets, DDoS attacks, 662

bots, DDoS attacks, 662

bottlenecks, performance monitoring, 716

BPDUs (bridge protocol data units), 86–87

BRI (Basic Rate Interface), ISDN, 474

bridged connection, DSL, 477

bridged NICs, 566–567

bridges, wireless, 539

bridging loops

for switches, 85

WAN problems, 755

bring your own device. See BYOD (bring your own device)

broadband cable, competing with ADSL, 479

broadband, compared with baseband, 73, 92

broadcast addresses

IPv6 replaces with multicast, 428–429

overview of, 16

broadcast domains, 84

broadcast frequencies, wireless networking, 505

broadcast methods, wireless networking, 505

broadcast storms, WAN problems, 755

broadcasts, for name resolution, 319

brute force attacks, 351, 664

BSS (Basic Service Set)

extending wireless network, 538–539

single access points, 503

BSSID (Basic Service Set Identifier), identifying wireless networks, 504

buffer, fiber-optic cable, 60

building layout, 652

bus topology

coaxial cabling in, 52

Ethernet, 73

overview of, 46–47

business continuity plans (BCP), 642, 644–645

butt set, 159

BYOD (bring your own device)

deployment models, 591

LAN problems, 749

persistent and non-persistent agents and, 684

C

CA (certificate authority), 363–365

cable certifiers. See certifiers

cable drops, mapping cable runs, 129–130

cable mismatch, troubleshooting fiber-optic cable, 146

cable modems

broadband cable competing with ADSL, 479

connecting to ISP via coaxial cable, 53

remote access connections, 485–487

RG-59 coaxial cable, 53–54

cable strippers/snips, 725

cable television, 53–54

cable testers

hardware troubleshooting tools, 722–724

measuring signal loss, 145

troubleshooting copper cable, 141

cable trays, for pulling cable, 132–133

cabling

coaxial, 51–55

copper, 51

fiber-optic, 60–62

fire ratings, 64

hands-on problems, 746

horizontal cabling, 114–116

internal network connections, 607–610

Link layer and, 34

making connections, 135

making patch cables, 136–138

mapping runs, 129–130

NICs and, 9

physical layers of OSI model and, 6–7

physical safety and, 649

pulling cable, 132–135

review Q&A, 66–68

serial and parallel, 63

shielded twisted pair, 55–56

standards, 64–65

structured cabling, 110–111, 125

testing, 140, 155–156

twisted pair, 55

unshielded twisted pair, 56–59

Cache-only DNS servers, 326

cached lookups, DNS servers, 325

Cacti graphing program, 714–715

Caesar cipher, 351–352

CAN (campus area network) example. See networks, building

canonical name (CNAME), DNS records, 327–329

capacitance, Ohm ratings, 54

captive portals, wireless networking, 544

capture file, packet sniffers, 704

carrier sense multiple access/collision avoidance (CSMA/CA), 506–507

carrier sense multiple access/collision detection (CSMA/CD), 79–81, 506

Cat (category) ratings

100BaseT, 92

10BaseT, 74

compatibility and, 606

connecting to DSL modem using patch cable, 477

horizontal cabling, 114

patch panels, 121–122

RJ-45 jacks, 124

upgrades and, 93

UTP, 57–59

Catalyst 3550 (Cisco)

interVLAN routing, 405–406

multilayer switches, 407

cause, of problem

testing theory of, 741

theory of probable, 739–741

CCE (Certified Computer Examiner), 645

CCENT (Cisco Certified Entry Networking Technician), 2

CCITT (International Telegraph and Telephone Consultative Committee), 472–473

CCITT packet switching protocol, 463

CCMP-AES, in WPA2, 517

CCNA (Cisco Certified Network Associate), 2

CCTVs (closed-circuit televisions), for security monitoring, 678

CDMA (code-division multiple access), 582

cellular WAN

CDMA, 582

GSM, 581–582

HSPA+, 582–583

LTE, 583

overview of, 580–581

central box

frames and, 13

hubs and switches, 14–15

last mile connections, 454

NICs and, 9

physical layers of OSI model and, 7

central office

Local Exchange Carrier, 469

in telephone systems, 451–452

trunk lines, 474

certificate authority (CA), 363–365

Certificate Revocation Lists (CRLs), 383

certificates

PKI and, 362–365

revocation lists, 383

WAN problems, 754

Certified Computer Examiner (CCE), 645

Certified Forensic Computer Examiner (CFCE), 645

certifiers

hardware troubleshooting tools, 724

measuring signal loss, 145

CFCE (Certified Forensic Computer Examiner), 645

chain of custody, collecting evidence, 647

Challenge Handshake Authentication Protocol (CHAP), 369, 373

Challenge-Response Authentication-Message Digest 5 (CRAM-MD5), 360

change management

overview of, 630–632

patches and updates, 632–634

change management team, 630–631

change request, 631

channel bandwidth, wireless networking, 505

channel overlap, wireless networking, 540

Channel Service Unit/Digital Service Unit. See CSU/DSU (Channel Service Unit/Digital Service Unit)

channels

configuring WAPs, 534, 536–537

unencrypted channels as vulnerability, 673–674

wireless networking, 505–506

CHAP (Challenge Handshake Authentication Protocol), 369, 373

checksums (message digests), in hashes, 357

choose your own device (CYOD), deployment models, 591–592

CIDR (Classless Inter-Domain Routing)

generating blocks of IP addresses, 187

IPv4 naming convention, 426

real world applications, 197

subnetting and, 188–189

cipher locks, for controlling physical access, 677

ciphers

block ciphers, 353–354

defined, 351

stream ciphers, 354

ciphertext, 353

circuit switches/circuit switching, in telephone systems, 450, 453

circuits, testing for open circuit, 723

Cisco certifications, Network models, 2

Cisco Certified Entry Networking Technician (CCENT), 2

Cisco Certified Network Associate (CCNA), 2

Cisco IOS, 249–250

Cisco Network Assistant, 253, 400–402

Cisco Network Assistant (CNA), 709–711

cladding, fiber-optic cable, 60

class IDs, IP addresses and, 186–187

class of service (CoS), 616–617

Classless Inter-Domain Routing. See CIDR (Classless Inter-Domain Routing)

cleartext

encryption and, 350

vulnerabilities of, 674

client-to-site connection, L2TP VPNs, 394

clients

configuring wireless client, 537–538

installing wireless client, 524–525

LAN problems, 749

closed-circuit televisions (CCTVs), for security monitoring, 678

closed networks, 623

cloud

cloud-based anti-malware, 689

delivery methods, 574–575

disaster recovery and, 643

Infrastructure as a Service, 570–571

overview of, 569

Platform as a Service, 571–573

service layers and, 570

Software as a Service, 573

Web services, 292

cloud bursting, 575

clustering

fault tolerance, 636

load balancing, 408

CNA (Cisco Network Assistant), 709–711

CNAME (canonical name), DNS records, 327–329

coarse wavelength division multiplexing (CWDM), 462

coaxial cable

broadband cable competing with ADSL, 479

connection issues, 486–487

connectors, 52–53

Ohm ratings, 54

overview of, 51

RG (Radio Guide) ratings, 53–54

shielding, 51–52

standards, 55

use with modems, 53

coaxial splitter, 54, 486–487

COBO (corporate-owned business only) devices, deployment models, 591–592

code-division multiple access (CDMA), 582

cold sites, in business continuity plans, 644

collaboration, UC features, 612

collision domains, 81

collision lights, checking NIC status, 153

collisions, CSMA/CA and, 506

Combs, Gerald, 705

communication

connection-oriented vs. connectionless, 36–37, 264–265

rules for determining good or bad communication, 278

community cloud, 575

company-issued personally enabled (COPE), deployment models, 591–592

compatibility, issues in building networks, 601, 606–607

compromised system, symptoms of, 688

computer forensics

certification organizations, 645

collecting evidence, 647–648

documenting the scene, 646–647

first responders, 646

forensics report, 647–648

securing the area, 646

computer telephony integration (CTI), 611

configuration management, 602

conflicting permissions, 681

connection-oriented communication, 36–37, 264–265

connectionless communication, 36–37, 264–265

connections

connection status, 275–278

external network connections, 610–611

internal network connections, 607–610

simultaneous wired/wireless connections causing network failure, 747–748

TCP/IP sessions, 272

connections, wireless

no connection, 540–542

slow connection, 542–545

weird connection, 545–547

connectivity

end-to-end connectivity, 756

methods, 574

software, 730

troubleshooting remote, 491–494

connectors

1000BaseSX and 1000BaseLX, 97

100BaseFX, 94

10BaseFL, 78

10BaseT, 74–75

10BbE, 103

coaxial cable, 51–53, 55

crossover cables, 85

fiber-optic cable, 61–62, 98–99

Gigabit Ethernet, 99

ISDN, 474

mismatch problem, 146

modems, 479

NICs, 148

serial and parallel, 63

for telephone lines, 470

unshielded twisted pair, 59

console port, managed switches and, 396, 398

content filtering, firewall rules for, 693

content switches, alternative to load balancing, 409–410

contingency planning, 641–642

continuity, 140, 723

continuity testers, 141–142

control plane, routers and switches and, 568

controller, distributed control system, 618

controls, in hardening network, 675–678

convergence (steady state), routers, 240

COPE (company-issued personally enabled), deployment models, 591–592

copper cabling

copper-based 10GbE, 102

crosstalk, 142–144

measuring signal loss, 144–145

overview of, 51

T1 and T3 carriers, 457–460

testers, 141–142

troubleshooting areas, 140–141

corporate-owned business only (COBO) devices, deployment models, 591–592

CoS (class of service), 616–617

cost

OSPF metrics, 244

routing metrics, 237

counters, Performance Monitor (PerfMon), 711

couplers, testing cabling, 156

cPanel e-mail server, 293

CPE (customer-premises equipment), 128

CRAM-MD5 (Challenge-Response Authentication-Message Digest 5), 360

CRC (cyclic redundancy check)

in Ethernet frame, 73

FCS using, 14, 16

credentials

dangers of cleartext, 674

device hardening, 685

crimpers/crimping

hardware troubleshooting tools, 725

making patch cables, 136–138

RJ-45 connectors, 75–76

CRLs (Certificate Revocation Lists), 383

crossover cables

connecting to CSU/DSU boxes, 458

connecting to routers, 251

connecting to switches, 85

hands-on problems, 746

crosstalk

testing for, 723

troubleshooting copper cable, 142–144

twisted pair cabling preventing, 55

crypto-malware, 667

cryptographic hash functions. See hashes

cryptography. See encryption

CSMA/CA (carrier sense multiple access/collision avoidance), 506–507

CSMA/CD (carrier sense multiple access/collision detection), 79–81, 506

CSU/DSU (Channel Service Unit/Digital Service Unit)

dedicated private connections, 485

T3 lines and, 460

termination of T1/T3 lines, 457–459, 467

CTI (computer telephony integration), 611

customer-premises equipment (CPE), 128

CWDM (coarse wavelength division multiplexing), 462

CyberDuck FTP client, 298–299

cyclic redundancy check (CRC)

in Ethernet frame, 73

FCS using, 14, 16

CYOD (choose your own device), deployment models, 591–592

D

D channels (Delta channels), ISDN, 474

DAC (discretionary access control), 367

DAI (Dynamic ARP Inspection), 659–661

data breach, 628

Data Encryption Standard (DES), 354

data field, of frame, 14, 71–72

Data Link layer (Layer 2), OSI model, 19–20, 228

data loss prevention (DLP), 629

Data-Over-Cable Service Interface Specification (DOCIS), 228, 479

data plane, routers and switches and, 568

data storage

network attached storage, 566

storage area networks, 565–566

virtualization and, 564–565

data structures, corresponding to layers of TCP/IP model, 41

databases, hacking, 628

datagrams

breaking packets into, 27–28

UDP, 168

DatagramTLS (DTLS) VPNs, 395

DB-25 connector, parallel connections, 63

DB-9 connector, serial connections, 63

dB (decibels)

cable signal measured in, 487

measuring RF output, 528

measuring signal loss, 144–145

DCF (Distributed Coordination Function), 506–507

DCS (distributed control system), 619–620

DDNS (dynamic DNS), 338–339

DDoS (distributed denial of service) attacks, 662–663, 666

de-encapsulation. See encapsulation/de-encapsulation

deauthentication (deauth) attacks, 663

decibels. See dB (decibels)

decimal numbering system, 10, 195–196

dedicated private connections, remote access, 484–485

default gateway, 179

definition files, malware, 413

delay, routing metrics, 236

delivery methods, cloud services, 574–575

Delta channels (D channels), ISDN, 474

demarc (demarcation point)

connecting modem to phone jack, 470–471

connections from outside world entering at, 125–127

connections inside demarc, 127–129

demarc extensions, 128

ISDN, 474

T carriers, 467

demilitarized zone (DMZ), 693–694, 754

denial of service attacks. See DoS (denial of service) attacks

dense wavelength division multiplexing (DWDM), 462, 468

deployment models, for mobile networking, 591–592

DES (Data Encryption Standard), 354

design process, in building network, 603

desktop virtualization, 555–558

destination field, in Ethernet frame, 71–72

destination host unreachable, ICMP, 268

device drivers

installing NIC drivers, 151

updating, 632

device ID, 10

device saturation, troubleshooting wireless networks, 543

devices

advanced networking. See advanced networking devices

categories to consider in building network, 601

hardening, 685

managed. See managed devices

mobile. See mobile devices

network protection. See network protection devices

robust devices in enterprise wireless, 518–519

in scenario combining monitoring tools and techniques, 713

UC devices, 613

DHCP clients, 202–203

DHCP (Dynamic Host Configuration Protocol)

configuring, 203–204

DNS suffix, 338

dynamic IP addressing, 201–202

how it works, 202–203

LAN problems, 748–749

leases, 203

MAC reservations, 206–208

overview of, 266–267

relays, 205–206

reservations, 206

setting up network addressing scheme, 610

troubleshooting, 208–212

using UDP, 168

VLANs and, 406

DHCP leases, 203

DHCP relays (DHCP relay agent), 205–206, 406

DHCP reservations, 206

DHCP scope, 204

DHCP servers

configuring, 204

how DHCP works, 202–203

IPv6 and (DHCPv6), 437, 439

rogue server, 212

running multiple, 211

troubleshooting no server message, 209–211

DHCP Snooping, 661

diagnosing problems, network installation and, 154

diagrams

graphing programs, 714–715

network documentation, 602

dial-up

connecting to Internet, 482

last mile connections, 469

on macOS, 485

private dial-up, 482–484

differential backups, 643

differentiated services code point (DSCP), 616

DiffServ (differentiated services), 616

dig (domain information groper), 343, 731

digital certificates. See certificates

Digital/Intel/Xerox (DIX) standard, 70

digital signal 1 (DS1), 458–459

digital signal, converting analog to, 456

digital signal rate (DS0), 456–457, 475

Digital Signature Algorithm (DSA), 377

digital signatures, 361

digital telephony, 473–475

alternatives to WAN telephony, 468

ATM, 463–464

bit rates vs. baud rate, 471–472

broadband cable, 479

choosing connection option, 481

converting from analog to, 453–455

dial-up lines, 469

DS0 (digital signal rate), 456–457

DSL, 475–478

fiber carriers, 460–462

fiber-to-the-home technologies, 480

last mile solutions, 468

MPLS (Multiprotocol Label Switching), 464–467

overview of, 455–456

packet switching, 462–463

PSTN (public switched telephone network), 469–471

satellite access, 479–480

T1 and T3 copper carriers, 457–460

V standards, 472–473

WAN telephony connections, 467–468

dipole antennas, 527–529

direct-sequence spread-spectrum (DSSS), 505

directional antennas, 527–530

disaster recovery, 642–643

disaster recovery team, 642

Discover, Offer, Request, and Acknowledgement (DORA), 203–204

discretionary access control (DAC), 367

dispersion, troubleshooting fiber-optic cable, 146

distance vector protocols

comparing dynamic routing protocols, 246

overview of, 237–241

RIPv1 and RIPv2, 241–242

distributed control system (DCS), 619–620

Distributed Coordination Function (DCF), 506–507

distributed denial of service (DDoS) attacks, 662–663, 666

distributed switches, 567–568

divide and conquer, in troubleshooting, 740

DIX (Digital/Intel/Xerox) standard, 70

DLP (data loss prevention), 629

DMVPN (dynamic multipoint VPN), 395–396

DMZ (demilitarized zone), 693–694, 754

DNAT (dynamic NAT), 233–234

DNS cache poisoning, 657

DNS (Domain Name System)

configuring DNS servers, 321–324

DNS Security Extensions, 340

DNS servers, 324–327

domains, 312

dynamic DNS, 338–339

forward lookup zones, 330–331

hierarchical name space, 309–314

how it works, 308–309

IPv6 and, 439

LAN problems, 749

for load balancing, 408–409

name resolution, 318–324

name servers, 314–318

overview of, 308

placing DNS servers, 335–338

record types, 327–330

in TCP/IP networks, 303

troubleshooting DNS, 340–343

troubleshooting remote connectivity, 492–493

UDP and, 168, 266

DNS forwarding, 336–337

DNS helpers, 493

DNS resolver cache, 319, 321–322

DNS Security Extensions (DNSSEC), 340, 657

DNS servers

configuring, 321–324

DNS Security Extensions, 340

dynamic DNS, 338–339

external, 338

how DNS works, 308–309

intranets, 312

name servers, 314–318

overview of, 324–327

placing, 335–337

primary and secondary zones, 330–331

private vs. public, 337–338

spoofing attacks, 657

troubleshooting, 340–343

verifying settings, 321

DNS suffix, 338

DNS tree, 312, 314

DNSSEC (DNS Security Extensions), 340, 657

DOCIS (Data-Over-Cable Service Interface Specification), 228, 479

documentation

in building network, 602–603

of change, 632

in computer forensics, 646–647

in troubleshooting process, 742–744

domain controllers

authentication and, 373

managing AD databases, 385

Windows OSs, 334

domain information groper (dig), 343, 731

domains, DNS, 312

domains, Windows, 373–374

doors

access control measures, 676–677

safety measures, 677

DORA (Discover, Offer, Request, and Acknowledgement), 203–204

DoS (denial of service) attacks

deauthentication (deauth), 663

distributed denial of service, 662–663

IIS protection against, 283

overview of, 661–662

packets, 663

traffic floods, 685

dotted decimal notation (dotted octet numbering system)

converting to binary, 183–184, 195–196

determining number of hosts in network, 189–190

IP address notation, 22, 173–174, 425

double-tagging attacks, 403

drivers. See device drivers

Dropbox, 569

DS0 (digital signal rate), 456–457, 475

DS1 (digital signal 1), 458–459

DSA (Digital Signature Algorithm), 377

DSCP (differentiated services code point), 616

DSL Access Multiplexer (DSLAM), 476

DSL (digital subscriber line)

asymmetric, 476

installing, 476–478

modems, 477

overview of, 475–476

remote access connections, 485–487

symmetric, 475

DSLAM (DSL Access Multiplexer), 476

DSSS (direct-sequence spread-spectrum), 505

DTLS (DatagramTLS) VPNs, 395

dual stack, IPv4 and IPv6, 443

dumpster diving, 670

duplex fiber-optic cabling, 60–61

duplication of problem, in troubleshooting, 738

DWDM (dense wavelength division multiplexing), 462, 468

Dynamic ARP Inspection (DAI), 659–661

dynamic DNS (DDNS), 338–339

dynamic IP addressing. See DHCP (Dynamic Host Configuration Protocol)

dynamic multipoint VPN (DMVPN), 395–396

dynamic NAT (DNAT), 233–234

dynamic port numbers (private port numbers), 270–271

dynamic routing, 242–244

comparing dynamic routing protocols, 246

configuring dynamic routing protocol, 257

distance vector protocols, 237–241

EIGRP (Enhanced Interior Gateway Routing Protocol), 246

IS-IS (Intermediate State to Intermediate State), 245–246

link state protocols, 244

metrics, 225, 235–237

OSPF (Open Shortest Path First), 244–245

overview of, 234–235

RIPv1 and RIPv2, 241–242

dynamic VLANs, 401

E

e-mail (electronic mail)

clients, 295

hijacked accounts, 686

overview of, 290–291

servers, 293–294

SMTP, POP3, and IMAP4 protocols, 291–293

spoofing attacks, 656

E1/E3, European carrier for digital transmission, 460

EAP (Extensible Authentication Protocol)

types in common use, 514–516

for wireless authentication, 512–513

echo request/echo reply, ICMP, 267

echo, testing for electrical noise, 723

ECN (explicit congestion notification), 616

edge devices, in network security, 681–682

EDGE (Enhanced Data rates for GSM Evolution), 582–583

edge routers, 243

EDNS (extension mechanisms for DNS), 340

effective permissions, user accounts, 679–680

EGP (Exterior Gateway Protocol), 243

EIGRP (Enhanced Interior Gateway Routing Protocol), 246

electrical safety, 648–649

electromagnetic interference. See EMI (electromagnetic interference)

electronic discovery, use of forensics reports, 648

electrostatic discharge (ESD), 648–649

emergency alert system, 652

emergency exits, 652

emergency procedures, 652

EMI (electromagnetic interference)

coaxial cable shielded from, 51–52

hands-on problems, 746

STP cable and, 55

troubleshooting copper cable, 141

troubleshooting remote connectivity, 493–494

UTP limitations, 94

emulation, virtualization compared with, 555–556

encapsulation/de-encapsulation

encapsulation of data by frames, 12–13

IP packets, 170

OSI (Open Systems Interconnection), 33

TCP/IP model, 40

encryption

applications for, 32

asymmetric-key encryption, 355–357

combining authentication with, 379

configuring WAPs, 533, 535–536

defined, 350

encryption using OSI model, 357

hardening IoT devices, 594

hashes used in, 360

IPSec, 380–381

NFC (near field communication), 589

overview of, 350–351, 375–376

securing wireless networking, 516–518

SSH, 376–378

SSH and, 287

SSL/TLS, 32, 379–380

substitution ciphers, 351–352

symmetric-key encryption, 353–355

tunneling, 378–379

unencrypted channels as vulnerability, 673–674

WPA2, 518

XOR (eXclusive OR) encryption, 352–353

end-to-end connectivity, 756

endpoints

open ports (listening ports), 275

PPTP, 392

TCP/IP, 271–272

VPN, 390–391

Enhanced Data rates for GSM Evolution (EDGE), 582–583

Enhanced Interior Gateway Routing Protocol (EIGRP), 246

enhanced small form factor pluggable (SFP+), 10GbE connections, 103

enterprise wireless

administering, 519–520

overview of, 518

PoE (Power over Ethernet), 521

robust devices, 518–519

VLAN pooling, 520

environment

considerations in building network, 601

controlling, 651–652

environmental monitors, 157

ephemeral port numbers, 270–271

equipment racks

diagrams, 605

installation and maintenance, 649–651

monitoring systems, 157

mounting, 650–651

power backup for, 157

in telecommunications rooms, 116–118

equipment room, network design, 605

error rate, interface monitors, 709

escalation, in troubleshooting

determining when to escalate, 754–756

as necessary, 742

overview of, 741

ESD (electrostatic discharge), 648–649

ESS (Extended Service Set), 503

ESSID (Extended Service Set Identifier), 504–505, 539

ESX/ESXi hypervisors, 561, 563

Ethernet

100-megabit, 91–92

1000BaseSX and 1000BaseLX, 97

100BaseFX, 94–96

100BaseT, 92–94

10BaseFL, 78–79

10BaseT, 73–74, 77

10BbE, 100–103

40GbE and 100 GbE standards, 106

backbone networks, 104–105

bus Ethernet, 73

connecting segments, 84

connectors, 99

crossover cables, 85

CSMA/CD and, 79–81

enhancing/extending Ethernet networks, 81–82

fiber transceivers, 104

frames, 71–73

Gigabit Ethernet, 96–97

hub issues, 82

IEEE 802.1Q switch standard, 400

IEEE 802.3 standards, 70

implementing Gigabit Ethernet, 99–100

IP addresses in LANs, 170–172

LAN problems, 750–751

overview of, 69–70

review Q&A, 87–89, 106–108

routing interfaces, 227

SFF fiber connectors, 98

STP (spanning tree protocol), 85–87

switch issues, 87

switches, 82–84

TIA/EIA 568A and 568B, 76–77

troubleshooting interface errors in remote connectivity, 492

uplink ports, 84–85

UTP use with 10BaseT, 74–76

WAN connectivity, 468

EUI-48 (Extended Unique Identifier-48), MAC addresses, 11

EUI-64 (Extended Unique Identifier-64 bit), MAC addresses, 427

event management, SNMP, 703

evidence, forensic, 647–648

evil twin, rogue access points, 546–547

Evolved High-Speed Packet Access (HSPA+), 582–583

Exchange Server, e-mail, 294

eXclusive OR (XOR) encryption, 352–353

Exim server, e-mail, 293

exit plans, 652

explicit congestion notification (ECN), 616

Extended Service Set (ESS), 503

Extended Service Set Identifier (ESSID), 504–505, 539

Extended Unique Identifier-48 (EUI-48), MAC addresses, 11

Extended Unique Identifier-64 bit (EUI-64), MAC addresses, 427

Extensible Authentication Protocol (EAP)

types in common use, 514–516

for wireless authentication, 512–513

Extensible Markup Language (XML), 280

extensible protocols, SNMP as, 701

extension mechanisms for DNS (EDNS), 340

Exterior Gateway Protocol (EGP), 243

external connections, in building networks, 610–611

external firewalls, 693

F

F connectors

cable modems, 479

coaxial cabling, 53, 55

fail closed/fail open, door safety measures, 652, 677

failover, high availability and, 635

fair access policy, security policies, 754

far-end crosstalk (FEXT), troubleshooting copper cable, 143–144

Fast Ethernet, 96

fault tolerance

benefits of star topology, 48

hardware, 664

redundancy and, 636

faxes, 605–606, 612

FC (Fibre Channel), 565

FCoE (Fibre Channel over Ethernet), 565

FCS (frame check sequence)

in Ethernet frame, 71–73

frame movement, 17

overview of, 16

structure of frames and, 14

FDM (frequency division multiplexing), 453

feature changes/updates, 633

FEC (Forwarding Equivalence Class), Multiprotocol Label Switching, 465–466

FEXT (far-end crosstalk), troubleshooting copper cable, 143–144

FHSS (frequency-hopping spread-spectrum), 505

fiber-optic cable

100BaseFX Ethernet, 94–96

10BaseFL Ethernet, 78–79

10BbE Ethernet, 100–101

characteristics of fiber transceivers, 104

connectors, 61–62

duplex fiber-optic cabling, 60–61

Gigabit Ethernet, 70

NICs (network interface cards), 149

optical connection tester, 153

overview of, 60

signal loss/degradation, 146

signal mismatch, 146

single-mode and multimode, 61

troubleshooting, 145

troubleshooting tools, 147–148

fiber-optic carriers

OC (Optical Carrier), 461

overview of, 460–461

SONET (U.S.) and SDH (Europe), 461–462

WDM (wave division multiplexing), 462

fiber-to-the-home technologies, 480

fiber transceivers, 104

Fibre Channel (FC), 565

Fibre Channel over Ethernet (FCoE), 565

file hashing, 357

file integrity monitoring (FIM), 717

file servers, NAS as alternative to, 605

File Transfer Protocol. See FTP (File Transfer Protocol)

FileZilla, FTP servers, 296–297

filtering

firewall rules for, 693

MAC address filtering, 511–512, 533–534

FIM (file integrity monitoring), 717

FIN, TCP three-way handshake, 265

fire escape plans, 652

fire ratings, cabling, 64

fire suppression system, 651

Firefox browser (Mozilla), 298

firewalls

access control lists, 692–693

defined, 268

external and internal, 693–694

honeypots and honeynets, 694–695

implementation and configuration, 691–692

intrusion detection and intrusion protection, 412

techniques and features, 690–691

troubleshooting, 695

types, 690

virtual firewalls, 568

firmware updates, 633

floor plan, for network installation, 129

flow cache, NetFlow, 707

forensics. See computer forensics

forward lookup zones, DNS, 325–326, 330–331

forward proxy servers, 416

Forwarding Equivalence Class (FEC), Multiprotocol Label Switching, 465–466

four-post racks, 118

FQDN (fully qualified domain name)

defined, 313

DNS hierarchy and, 317

in DNS resolver cache, 323

load balancing and, 408

reverse lookup zones and, 331

fractional T1 access, 460

frame check sequence. See FCS (frame check sequence)

Frame Relay, 228, 463

frames

data structures corresponding to TCP/IP layers, 41

Ethernet, 71–73

Link layer, 35

in OSI model, 12–14

packets in, 24–27

send/receive (movement), 16–19

FreeRADIUS, 373

frequencies

configuring access points, 537

wireless networking, 505

frequency analysis, cracking Caesar ciphers, 351

frequency division multiplexing (FDM), 453

frequency-hopping spread-spectrum (FHSS), 505

frequency mismatch, troubleshooting wireless networks, 540

frequency ratings, UTP cable, 57

FTP (File Transfer Protocol)

active and passive, 298–299

clients, 298

overview of, 295–296

reviewing Internet applications, 300

servers, 296–297

full backups, 643

full-duplex NICs, 75, 95–96

fully meshed topology, 50

G

gain, measuring RF output, 528

gateways (gateway routers), NAT setup, 229

gateways, UC gateways, 613

GBIC (gigabit interface converters), 99, 146

GCFA (GIAC Certified Forensic Analyst), 645

Generic Routing Encapsulation (GRE), 396

geofencing, 593

Get requests, SNMP manager, 702–703

GIAC Certified Forensic Analyst (GCFA), 645

GIAC (Global Information Assurance Certification), 645

Gigabit Ethernet

1000BaseSX and 1000BaseLX, 97

connectors, 98–99

implementing, 99–100

overview of, 96–97

standards, 70

gigabit interface converters (GBIC), 99, 146

Global System for Mobile Communications (GSM), 581–582

global unicast addresses, IPv6, 430–431

Gmail, 292

Google

cloud services (Google Drive), 569

Google Web Server (GWS), 283

Web services, 292

GPS, geofencing and, 593

graphical user interfaces (GUIs), 283–284

graphs. See diagrams

GRE (Generic Routing Encapsulation), 396

Greenfield mode, WAPs, 509

ground loops, in electrical safety, 648

groups

dangers of default accounts, 681

IGMP groups, 269

permissions, 679–680

Windows OSs, 332–334

GSM (Global System for Mobile Communications), 581–582

guest networks, network security and, 684–685

guests

managing guest accounts, 665

virtualization, 551

GUIs (graphical user interfaces), 283–284

GWS (Google Web Server), 283

H

H.320, VTC over ISDN, 616

H.323

UC protocols, 614–615

VoIP standards, 490

HA (high availability), 635–636

half-duplex NICs, 75, 95

hands-on problems, 745–748

hard drives

dynamically sizing virtual drive, 558

pools on SANs, 565

hardening IoT devices, 594

hardening network

controlling user accounts, 679–681

device hardening, 685

edge devices, 681–682

guest and quarantine networks, 684–685

host security, 686

malware prevention, 686–689

monitoring, 678

network security, 679

overview of, 675

persistent and non-persistent agents, 683–684

physical security, 675

posture assessment, 682–683

prevention and control, 675–678

switch port protection, 661

hardware

benefits of virtualization, 559

configuring virtual hardware, 554

edge devices, 682

fault tolerance, 664

firewall appliance, 690

firewalls, 690

hands-on problems, 746

OSI layers 1 & 2, 6–8

wireless networking, 499–501

hardware troubleshooting tools

cable strippers/snips, 725

cable testers, TDRs, and OTDRs, 722–724

certifiers, 724

light meters, 724–725

multimeters, 725–726

overview of, 722

punchdown tools, 726

tone probes/tone generators, 726

voltage quality recorder and temperature monitor, 725

hashes

digital signatures, 361

examples of, 358–359

exercise using SHA-512, 359–360

integrity and, 357–358

use in encryption and authentication, 360

header, frame structure, 14

Health Insurance Portability and Accountability Act (HIPAA), 630

heat/cooling, factors in choosing location of telecommunications room, 131

heat maps, in site survey, 522

heating, ventilation, and air conditioning (HVAC), 651

Hello packets, OSPF, 244

Heroku, example of PaaS, 572–573

hexadecimal numbering system, 10, 425

hextet, IPv6 notation, 425

HIDS (host-based IDS), 413–414

high availability (HA), 635–636

high-throughput mode, WAPs, 509

HIPAA (Health Insurance Portability and Accountability Act), 630

HIPS (host-based intrusion protection system), 415

HMI (human machine interface), 619–620

home automation, 591

honeynets, 694–695

honeypots, 694–695

hops/hop counts

metrics, 236

RIPv1, 241

routers and, 235

horizontal cabling

choosing, 115–116

overview of, 114–116

solid core vs. stranded, 115

structured cabling components, 113

host-based anti-malware, 689

host-based firewalls

intrusion detection/intrusion protection, 412

overview of, 690

troubleshooting, 695, 745

host-based intrusion protection system (HIPS), 415

host file

editing, 307

flat name space in, 309

overview of, 306–308

host IDs, 178, 189–190

host names, DNS, 312

host security

anti-malware programs, 688–689

malware prevention, 686–688

host-to-site connection, VPNs, 393–394

host virtualization, 554

hot sites, business continuity plans, 645

Hot Standby Router Protocol (HSRP), 636

hotspots, wireless, 583–584

HSPA+ (Evolved High-Speed Packet Access), 582–583

HSRP (Hot Standby Router Protocol), 636

HTML (Hypertext Markup Language)

publishing Web sites, 281–282

version 5 (HTML5), 280

as Web interface, 279

HTTP (Hypertext Transfer Protocol)

ACK packet, 270–271

Apache HTTP Server, 283

Application layer protocols, 169

content switches, 409–410

overview of, 281

reviewing Internet applications, 300

vulnerabilities in, 283

HTTP proxy server, 417

HTTPS (HTTP Secure)

content switches, 409–410

overview of, 283–285

reviewing Internet applications, 300

securing TCP/IP applications, 382–383

securing Web browsers, 585

using secure protocols, 674

hubs

bus Ethernet and, 73

Ethernet issues, 82

overview of, 14–15

human machine interface (HMI), 619–620

humidity, factors in choosing location of telecommunications room, 131

HVAC (heating, ventilation, and air conditioning), 651

hybrid cloud, 575

hybrid routing protocols, 243

hybrid topology, 48–49

Hyper-V, 561, 563

HyperTerminal, 248

Hypertext Markup Language. See HTML (Hypertext Markup Language)

Hypertext Transfer Protocol. See HTTP (Hypertext Transfer Protocol)

hypervisors

administering, 563

choosing, 561–562

overview of, 554–555

virtualization in modern networks, 561

I

IaaS (Infrastructure as a Service), 570–571, 574–575

IACIS (International Association of Computer Investigative Specialists), 645

IANA (Internet Assigned Numbers Authority)

managing IP addresses, 186–187

on port numbers, 270

standardization of dynamic routing protocols, 241

IAS (Internet Authentication Service), 372–373

IB (InfiniBand), 565–566

IBSS (Independent Basic Service Set), 501

ICA (Independent Computing Architecture), 488

ICANN (Internet Corporation for Assigned Names and Numbers), 309, 318

ICMP (Internet Control Message Protocol)

Internet layer protocols, 166–167

overview of, 267–268

ping command, 730

PMTU (Path MTU Discovery), 753

traceroute/tracert, 728

ICS (industrial control system), 617–619

ICS server, 619

IDEA (International Data Encryption Algorithm), 354

IDF (intermediate distribution frame). See also telecommunications room, 116, 607

IDS (intrusion detection system), 412–414

IEEE (Institute of Electrical and Electronic Engineers)

access control/authentication (802.1X), 512, 515–516

broadcast frequencies (802.11), 505

collision avoidance methods (802.11), 506–507

Ethernet (1000BaseT-802.3ab), 96

Ethernet (1000BaseX-802.3z), 96

Ethernet (802.3), 70

Ethernet switches (802.1Q), 400

mobile networking (802.11), 583–586

networking standards (802), 64–65

parallel communication (1284), 63, 65

Power over Ethernet (802.3af), 521

requesting MAC addresses from, 10

RSTP standard (802.1w), 87

summary (802.11), 507

wireless (802.11), 499

wireless (802.11a), 508

wireless (802.11ac), 510

wireless (802.11b), 507

wireless (802.11g), 508–509

wireless (802.11i), 512, 517

wireless (802.11n), 509

IETF (Internet Engineering Task Force)

development of IPv6, 423

dynamic routing protocols, 241

IPSec, 380

ifconfig. See ipconfig/ifconfig

IFG (interframe gap), CSMA/CA and, 506

IGMP groups, 269

IGMP (Internet Group Management Protocol), 268–269

IGMP snooping, 751

IGP (Interior Gateway Protocol), 243–245

IGRP (Interior Gateway Routing Protocol), 246

IIS (Internet Information Services), as Microsoft Web server, 282–283

IMAP (Internet Message Access Protocol)

alternatives to, 291–293

e-mail clients, 295

example of connection-orientation, 36–37

Microsoft Exchange Server, 294

overview of, 291

reviewing Internet applications, 300

impedance

Ohm ratings, 54

testing for impedance mismatch, 723

improper access, 679

IMT-2000 (International Mobile Telecommunications-2000), mobile standard, 582

in-band management, VNC and SSH enabling, 491

inbound traffic, firewalls blocking, 689

incident response, 642

incidents, contingency planning, 641

incremental backups, 643

Independent Basic Service Set (IBSS), 501

Independent Computing Architecture (ICA), 488

industrial control system (ICS), 617–619

InfiniBand (IB), 565–566

infrared communication (IR), 590

Infrastructure as a Service (IaaS), 570–571, 574–575

infrastructure mode, 503–504, 526

inheritance, administering permissions and, 681

initialization vectors (IV), 517

insider threats, 664

installing physical network

bonding NICs, 151

buying NICs, 149

checking link lights, 154–155

connecting NICs, 150–151

connecting patch panels, 138–140

connecting work areas, 135–136

connections inside demarc, 127–129

creating floor plan, 129

demarc (demarcation point), 125–127

diagnosing problems, 154

equipment racks, 116–118

horizontal cabling, 114–116

installing NIC drivers, 151

link lights, 152–153

making cable connections, 135

making patch cables, 136–138

mapping cable runs, 129–130

measuring signal loss, 144–145

NICs, 148–149

overview of, 109–110

patch panels and cable, 118–123

pulling cable, 132–135

review Q&A, 160–162

selecting location for telecommunications room, 131–132

star-bus topology, 111–112

structured cabling and, 110–111, 125

telecommunications room, 113–114, 116

testing cable runs, 140

testing cabling, 155–156

testing NICs, 155

toner use in troubleshooting, 158–160

troubleshooting copper-related issues, 140–144

troubleshooting fiber-related issues, 145–148

troubleshooting telecommunications rooms, 156–158

work area, 123–125

Institute of Electrical and Electronic Engineers. See IEEE (Institute of Electrical and Electronic Engineers)

insulating jacket, fiber-optic cable, 60

Integrated Services Digital Network (ISDN), 473–475, 616

integrity of data, 350, 357–360

Interexchange Carriers (IXC), 469

interface errors, 492, 746

interface monitors, 708–711

interfaces

adding to routers, 228

APIs (application programming interfaces), 33

DCS (distributed control system), 618

monitoring, 708–711

network interface cards. See NICs (network interface cards)

NIU (network interface unit), 125–127, 470, 476

routing interfaces, 227

interference. See also EMI (electromagnetic interference); RFI (radio frequency interference)

addressing physical issues in wireless networks, 544–545

hands-on problems, 746

site survey indicating sources of, 524

troubleshooting remote connectivity, 493–494

interframe gap (IFG), CSMA/CA and, 506

Interior Gateway Protocol (IGP), 243–245

Interior Gateway Routing Protocol (IGRP), 246

intermediate distribution frame (IDF). See also telecommunications room, 116, 607

Intermediate State to Intermediate State (IS-IS), 245–246

internal connections, building networks, 607–610

internal firewalls, 694

International Association of Computer Investigative Specialists (IACIS), 645

International Data Encryption Algorithm (IDEA), 354

International Mobile Telecommunications-2000 (IMT-2000), mobile standard, 582

International Organization for Standardization (ISO), 57

International Society of Forensic Computer Examiners (ISFCE), 645

International Telecommunications Union (ITU), 473, 582

International Telegraph and Telephone Consultative Committee (CCITT), 472–473

Internet

DDNS (dynamic DNS) and, 340

decentralization of, 242

World Wide Web and, 279

Internet Assigned Numbers Authority. See IANA (Internet Assigned Numbers Authority)

Internet Authentication Service (IAS), 372–373

Internet Control Message Protocol. See ICMP (Internet Control Message Protocol)

Internet Corporation for Assigned Names and Numbers (ICANN), 309, 318

Internet DNS, 335–336

Internet Group Management Protocol (IGMP), 268–269

Internet Information Services (IIS), as Microsoft Web server, 282–283

Internet layer, TCP/IP

data structures, 41

overview of, 35

protocols, 166–167

Internet Message Access Protocol. See IMAP (Internet Message Access Protocol)

Internet of Things (IoT)

DDoS attacks, 666

hardening IoT devices, 594

Internet Protocol Security (IPSec), 380–381, 396

Internet service providers. See ISPs (Internet service providers)

Internet Small Computer System Interface (iSCSI), 565

Internet Society (ISOC), 241

Intra-Site Automatic Tunnel Addressing Protocol (ISATAP), 442

intranets, DNS servers and, 312

intrusion detection system (IDS), 412–414

intrusion protection system (IPS), 414–415

inventory management, 603

IOS, Cisco operating system, 249–250

iOS smartphones, 585

IoT (Internet of Things)

DDoS attacks, 666

hardening IoT devices, 594

ip a, displaying MAC and IP addresses, 11–12, 176, 178

IP Address Management (IPAM), 340

IP addresses, 173–174

32-bit in IPv4, 172–173

applying, 176–178

assignments, 197

class IDs, 186–187

configuring routers, 255–256

depletion of IPv4 addresses, 228–229

diagnosing TCP/IP networks, 345

DNS name resolution and, 318–320

documentation, 603

dynamic IP addressing, 201–202

generating, 209–210

hands-on problems, 746

IPv4 vs. IPv6 address space, 423–424

LAN problems, 748–749

in LANs, 170–172, 179

multicast addresses, 268–269

overview of, 22–24

PAT and, 231

replacing 32-bit addresses with 128-bit addresses, 245

setting up network addressing scheme, 610

special IP addresses, 212–213

spoofing attacks, 656

static IP addressing, 198–201

subnet masks, 181–186

in TCP/IP networks, 23

uniqueness of, 174

utility for displaying, 174–176

IP cameras, for security monitoring, 678

IP filtering, firewall rules for, 693

IP helper, 406

IP (Internet Protocol), in TCP/IP suite, 22, 166–167

IP packets

data structures corresponding to TCP/IP layers, 41

encapsulation/de-encapsulation, 170

frames and, 24–26

Internet layer and, 35

TCP segments, 37–38

IP/SIP, for VTC, 616

IPAM (IP Address Management), 340

ipconfig/ifconfig

checking if IPv6 is working, 437, 439

configuring DNS, 321–324

displaying MAC and IP addresses, 176–177

forcing DNS server to update records, 339

software troubleshooting tools, 728–729

troubleshooting DNS, 340–341

viewing MAC addresses, 11–12

IPS (intrusion protection system), 414–415

IPSec (Internet Protocol Security), 380–381, 396

IPv4

address notation, 424–425

configuring DNS in Windows, 320

depletion of IPv4 addresses, 228–229

dual stack with IPv6, 443

history of, 423

Internet layer protocols, 166–167

running IPv4 and IPv6, 440–441

IPv4 to IPv6 tunneling standards

4to6 tunneling, 441

6in4 tunneling, 442

ISATAP, 442

NAT traversal, 442

overlay tunnels, 443

overview of, 441

tunnel brokers, 443

IPv6, 435–436

address notation, 424–426

aggregation, 433–435

anycast addresses, 429–430

DHCPv6 servers, 437, 439

DNS and, 439

global unicast addresses, 430–431

Internet layer protocols, 166–167

IPSec, 380–381

link-local addresses, 426–427

moving to IPv6, 441–443

multicast addresses, 428–429

NDP, 436–437

no-default routers and, 431–433

OSPF support, 245

overview of, 423–424

prefix lengths, 427

review Q&A, 444–446

running IPv4 and IPv6, 440–441

verifying it is working, 437, 438

IR blasters, 590

IR (infrared communication), 590

IS-IS (Intermediate State to Intermediate State), 245–246

ISATAP (Intra-Site Automatic Tunnel Addressing Protocol), 442

iSCSI (Internet Small Computer System Interface), 565

ISDN (Integrated Services Digital Network), 473–475, 616

ISFCE (International Society of Forensic Computer Examiners), 645

ISO (International Organization for Standardization), 57

ISOC (Internet Society), 241

ISPs (Internet service providers)

configuring routers, 255–256

DNS helpers, 493

IS-IS, 246

NIU (network interface unit), 125–127

WAN problems, 752–753

Web servers provided by, 281–282

ITU (International Telecommunications Union), 473, 582

IV (initialization vectors), 517

IXC (Interexchange Carriers), 469

J

JavaScript, 281

jitter, 144, 543

jumbo frames, 565

K

Kali Linux, 641

KDC (Key Distribution Center), 374–375

Keks, Anton, 734

Kerberos, 373–375

Kernel-based Virtual Machine (KVM), 562

Key Distribution Center (KDC), 374–375

key fobs, RFID chips in, 676–677

key pads, door access control measures, 677

key pairs, in asymmetric-key encryption, 356

keyboards, Bluetooth and, 586

KVM (Kernel-based Virtual Machine), 562

L

L2F (Layer 2 Forwarding), 394

L2TP (Layer 2 Tunneling Protocol), 394–395

Label Distribution Protocol (LDP), 465

label edge router (LER), 465–466

label switching router (LSR), 465–466

LACNIC (Latin American and Caribbean Internet Addresses Registry), 436

LACP (Link Aggregation Protocol), 412, 750–751

LANs (local area networks)

configuring routers, 256

fiber-based 10 GbE and, 100–101

interconnecting LANs using routers, 179–181

IP addresses in, 170–172

NAT setup, 229

network IDs, 178–179

problems, 748–751

remote access, 481

routing table example, 221–223

troubleshooting interface errors in remote connectivity, 492

laptops

Bluetooth and, 586

installing wireless client, 524–525

last mile

connection from central office to end users, 454

digital telephony, 468

latency, troubleshooting copper cable, 144

Latin American and Caribbean Internet Addresses Registry (LACNIC), 436

laws, policies imposed by government laws and regulations, 629–630

Layer 2 Forwarding (L2F), 394

Layer 2 Tunneling Protocol (L2TP), 394–395

Layer 3 switches, 219

layers, OSI model

Layer 1 (Physical layer), OSI model, 7–10

Layer 2 (Data Link layer), OSI model, 19–20, 228

Layer 3 (Network layer), OSI model, 22–24

Layer 4 (Transport layer), OSI model, 27–28

Layer 5 (Session layer), OSI model, 28–31

Layer 6 (Presentation layer), OSI model, 31–32

Layer 7 (Application layer), OSI model, 32–33

LC connectors

in 1000BaseSX and 1000BaseLX, 97

for fiber optic cable, 61–62

SFF (small form factor) connectors, 98

LDAP (Lightweight Directory Access Protocol), 385

LDP (Label Distribution Protocol), 465

LEC (Local Exchange Carrier), 469

LEDs (light-emitting diodes), 152–153, 746

legacy mode, WAPs, 509

legacy systems

isolating, 606

vulnerabilities of, 673

legal holds, use of forensics reports, 648

LER (label edge router), 465–466

licensing restrictions, 603, 630

light-emitting diodes (LEDs), 152–153, 746

light leakage, troubleshooting fiber-optic cable, 146

light meters, hardware troubleshooting tools, 724–725

lights-out-management (LOM), 491

Lightweight Access Point Protocol (LWAPP), 520

Lightweight Directory Access Protocol (LDAP), 385

link aggregation

LAN problems, 750–751

NICs (network interface cards), 151

port bonding, 411–412

Link Aggregation Protocol (LACP), 412, 750–751

Link layer (Network Interface layer), TCP/IP, 34–35, 41

link lights

checking NIC status, 152–153

diagnosing problems, 154–155

troubleshooting with, 746

link-local addresses, IPv6, 426–427

link state advertisement (LSA) packets, 244

link state protocols

comparing dynamic routing protocols, 246

IS-IS, 245–246

OSPF, 244–245

overview of, 244

link state, wireless networking software, 501

Linux/UNIX OSs

administrative access attacks, 666

Apache HTTP Server, 283

configuring DNS, 320–321

dig (domain information groper), 343

displaying MAC and IP addresses, 174–178

e-mail servers, 293

forward and reverse lookup zones, 331

FreeRADIUS, 373

FTP servers, 296

hashing exercise using SHA-512, 360

installing NIC drivers, 151

Net Activity Viewer, 275

netstat utility for viewing endpoints, 272–274

performance monitors, 711

static IP addressing, 199

telnetd server, 288

troubleshooting no DHCP server message, 211

troubleshooting routers, 258–259

LLC (Logical Link Control), 19–20

load balancing

content switches as alternative to, 409–410

DNS for, 408–409

fault tolerance, 636

overview of, 407–408

QoS (quality of service) and traffic shaping, 410–411

local area networks. See LANs (local area networks)

local attacks (physical), 664–666

local authentication, 365

local DNS, 335–336

Local Exchange Carrier (LEC), 469

local exchanges, in telephone systems, 451–453

location services, locating lost/disabled mobile devices, 593–594

locks

physical intrusion, 669–670

prevention and control measures in hardening, 675

logic bombs, 668

logical addressing

IP addresses, 22

in large networks, 21

routers, 22–23

Logical Link Control (LLC), 19–20

logical topology, 49

logs

managing, 712

in performance monitoring, 711

LOM (lights-out-management), 491

long distance phone calls, 449–450

Long Term Evolution (LTE), 583

looking glass sites, software troubleshooting tools, 735

loopback adapters, in certifiers, 724

loopback address, special IP addresses, 212

loopback plug, 155–156

loopback test, checking NIC status, 155

LSA (link state advertisement) packets, 244

LSR (label switching router), 465–466

LTE (Long Term Evolution), 583

LWAPP (Lightweight Access Point Protocol), 520

Lyon, Gordon, 638

M

MAC address filtering, 511–512, 533–534

MAC addresses, 10–14

determining from IP address, 171–172, 184

dynamic VLANs, 401

Ethernet frames, 72

EUI-48, 11

EUI-64, 427

frame movement, 17–19

frames and, 13–14

hexadecimal numbering system and, 10

hubs and switches and, 14–15, 82–84

LAN problems, 748

limits of physical addresses, 21

malicious users and, 665

NICs and, 9–10

reservations, 206–208

spoofing attacks, 512, 656

in TCP/IP networks, 23

utility for displaying, 174–176

viewing on various OSs, 11–12

MAC (mandatory access control), 367

MAC (Media Access Control), 19–20

MAC reservations, DHCP, 206–208

macOS

administrative access attacks, 666

dial-up on, 485

displaying MAC and IP addresses, 174–178

hashing exercise using SHA-512, 360

installing NIC drivers, 151

performance monitors, 711

static IP addressing, 199

telnet server, 288–289

troubleshooting DHCP server, 210–211

troubleshooting routers, 258

viewing endpoints, 272–274

VPN on, 394

macros, types of malware, 667

Mail eXchanger (MX) records, DNS, 329

mailboxes, e-mail servers, 294

main distribution frame (MDF), 128–129, 611

malformed packets, 658

malicious users, 665–666

malware

anti-malware definition files, 413

anti-malware programs, 688–689

assessing security posture, 683

dealing with, 688

overview of, 667

preventing, 686–689

training end users in recognizing, 634

types, 667–668

man-in-the-middle attacks, 663–664

managed devices. See also VLANs (virtual LANs)

exploring managed switch capabilities, 419

managed switches, 396–398

port mirroring in managed switches, 415

routers and switches as, 248

in SNMP system, 700–701

managed networks, SNMP, 700

managed security service provider (MSSP), 717

Management Information Base (MIB), 384, 700–701

mantraps, preventing tailgaiting, 676

master (primary) DNS server, 315

material safety data sheet (MSDS), 651

maximum transmission unit (MTU), 237, 752–753

MBSA (Microsoft Baseline Security Analyzer), 638

MD5 (Message-Digest Algorithm version 5), 358–359

MDF (main distribution frame), 128–129, 611

mean time between failure (MTBF), 644

mean time to failure (MTTF), 644

mean time to recover (MTTR), 644

media converters, 79, 99–100

Media Gateway Control Protocol (MGCP), 614–615

medianets, VTC, 615–617

memorandum of understanding (MOU), 637

mesh topology, 49–50, 501

Message-Digest Algorithm version 5 (MD5), 358–359

messaging, UC features, 612

MetaFrame terminal emulation, 488

Metasploit, penetration testing, 641

metrics

interface monitors, 708

OSPF, 244

routing, 224–225, 235–237

MGCP (Media Gateway Control Protocol), 614–615

MHTechEd (Mike’s High-Tech Educational Supply Store and Post Office), 5–6

MIB (Management Information Base), 384, 700–701

micro (µ), in measurement of fiber-optic cable, 60

Microsoft Baseline Security Analyzer (MBSA), 638

Microsoft Exchange Server, e-mail servers, 294

Mike's High-Tech Educational Supply Store and Post Office (MHTechEd), 5–6

MIMO (multiple in/multiple out)

multiple antenna use with WAPs, 509

Multiuser MIMO, 510

troubleshooting wireless networks, 542

Miredo, NAT traversal, 442

mirrored ports, packet sniffers, 704

mixed mode, WAPs, 509

MLS (multilayer switches)

content switches, 409–410

DNS for load balancing, 408–409

interVLAN routing, 404

load balancing, 407–408

overview of, 219, 407

port bonding, 411–412

QoS and traffic shaping, 410–411

MMF (multimode fiber), 61, 78

MMS (multimedia messaging system), 582

mobile devices

on-boarding and off-boarding, 592

deployment models, 591–592

geofencing, 593

hardening, 594

installing wireless client, 524–525

locating lost/disabled, 593–594

vulnerabilities on, 588

mobile networking

ANT+, 590–591

Bluetooth, 586–588

on-boarding and off-boarding mobile devices, 592

CDMA, 582

cellular WAN, 580–581

deployment models, 591–592

geofencing, 593

GSM, 581–582

hardening IoT devices, 594

HSPA+, 582–583

IR (infrared communication), 590

locating lost/disabled devices, 593–594

LTE, 583

NFC, 588–589

overview of, 579

review Q&A, 595–597

RFID, 589–590

standard (802.11), 583–586

technologies, 580

Z-wave and Zigbee, 591

modal distortion, fiber-optic cable, 61

models. See network models

modem (modulator-demodulator)

cable modems, 53–54, 479

connecting PCs over phone lines, 470

converting analog to digital, 456

data speeds (bit rates and baud rate), 471–472

dial-up, 482

DSL modems, 477

remote access connections, 485–487

satellite modem, 480

troubleshooting interface errors in remote connectivity, 492

V standards, 472–473

modulation techniques, 451

monitoring

networks. See network monitoring

physical surveillance, 678

power use, 157–158

motherboards, 149

MOU (memorandum of understanding), 637

mounting brackets, for cable, 133

Mozilla Firefox, 416

Mozilla Thunderbird, 295

MPLS (Multiprotocol Label Switching), 464–467

MS-CHAP, 369–370, 373

MSAs (multisource agreements), 103, 637

MSDS (material safety data sheet), 651

MSSP (managed security service provider), 717

MT-RJ connectors, 61–62, 98

MTBF (mean time between failure), 644

mtr (My Traceroute), 259, 732

MTTF (mean time to failure), 644

MTTR (mean time to recover), 644

MTU black hole, 753

MTU (maximum transmission unit), 237, 752–753

MU-MIMO (Multiuser MIMO), 510

multicast addresses, 268–269, 428–429

multicast, unicast compared with, 614

multifactor authentication, 366, 677

multilayer switches. See MLS (multilayer switches)

multimedia messaging system (MMS), 582

multimeters, 141–142, 725–726

multimode fiber (MMF), 61, 78

multipath antennas, 544

multiple in/multiple out. See MIMO (multiple in/multiple out)

multiplexers/demultiplexers

customer-premises equipment, 128

DSL Access Multiplexer, 476

frequency division multiplexing, 453

in telephone systems, 451–453

time division multiplexing, 458

wave division multiplexing, 462

Multiprotocol Label Switching (MPLS), 464–467

multisource agreements (MSAs), 103, 637

MX (Mail eXchanger) records, DNS, 329

My Traceroute (mtr), 259, 732

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.9.12