Network+ Notes
20, 21 FTP
22 SSH, SFTP
23 Telnet
25 SMTP
53 DNS
67,68 DHCP
69 TFTP
80 HTTP
110 IMAP3
123 NTP
139 NetBIOS
143 IMAP
161 SNMP
389 LDAP
443 HTTPS
445 SMB
465 SMTPS
636 LDAPS
993 IMAPS
995 POP3S
3389 RDP
5060, 5061 SIP
1720 H.323
OSI
Application – allow access to network resources, SMTP, HTTP, FTP
Presentation – translate, encrypt, compress data, syntax layer, MPEG, SSL
Session – establish sessions, API, sockets, dialogues between computers, NetBIOS, SAP
Transport – provide reliable process for message delivery and error delivery, TCP, UDP
Network – IP, routers, switches, move packets from source to destination, routing protocols,
multicast group management, network-layer address assignment, IPv4, ICMP, IPSec, ARP,
MPLS
Data Link – organize bits into frames, routing packets, MAC, logical addressing, error control,
sourcing process to destination process delivery, RAPA, PPP, Frame Relay, ATM, Fiber Cable
Physical – hub, bits over a medium, repeaters, 100BASETX, ISDN
T-568A
gw g ow b bw o brw br
1 2 34 56 7 8
T-568B
ow o gw b bw g brw br
1 2 34 56 7 8
4,5,7,8 are the same
1,2,3,6 swapped colors but same pattern
1. Identify the Problem
Gather information
Duplicate the problem
Question users
Identify the symptoms
Determine if anything has changed
Define individual problems clearly
2. Develop a Theory
3. Test the Theory
4. Plan of Action
5. Implement the Solution
6. Verify System Functionality
7. Document the Issue
Class A 0-127
Class B 128-191
Class C 192-223
127.0.0.1 Loopback
192.
Questions
484 SIEM, MIB, SYSLOG, SNMPv3 --- SNMP
487 wiremap, 100MB pins etc
Port 587 (SMTP over SSL)
Application Fuzzing is a testing method used to discover coding errors and security loopholes in
software, operating systems or networks by inserting a large amount of data, called fuzz, into the
test subject in an attempt to make the system crash.
GRE enables the usage of protocols that are not normally supported by a network, because the
packets are wrapped within other packets that do use supported protocols.
A first hop redundancy protocol (FHRP) is a computer networking protocol which is designed to
protect the default gateway used on a subnetwork by allowing two or more routers to provide backup
for that address; in the event of failure of an active router, the backup router will take over the
address
LACP is a data link layer protocol defined in IEEE 802.3ad standard. It provides a method to control
the bundling of several physical ports together to form a single logical channel. It enables a network
device, typically a data switch, to negotiate an automatic bundling of links by sending LACP packets
to the peer.
PaaS: Platform as a Service
Cloud platform services, also known as Platform as a Service (PaaS), provide cloud components to
certain software while being used mainly for applications. PaaS delivers a framework for developers
that they can build upon and use to create customized applications. All servers, storage, and
networking can be managed by the enterprise or a third-party provider while the developers can
maintain management of the applications.
LARGEST MTU for a standard Ethernet frame 1500
FIM is a technology that monitors and detects changes in files that may indicate a cyberattack.
Unfortunately, for many organizations, FIM mostly means noise: too many changes, no context
around these changes, and very little insight into whether a change actually poses a risk. FIM is a
critical security control, but it must provide sufficient insight and actionable intelligence.
Otherwise known as change monitoring, file integrity monitoring involves examining files to see if
and when they change, how they change, who changed them, and what can be done to restore
those files if those modifications are unauthorized.
60q
8:17pm
111111111
mgre hub and spoke topology
netstat - Displays active TCP connections, ports on which the computer is listening, Ethernet
statistics, the IP routing table, IPv4 statistics
smf - single mode fiber
mmf - multimode fiber
1000BaseSX - only mmf
1000BaseLX - mmf + smf
FIBER!!!!!!!!!!
SFP tranceiver - LC
GBIC tranceiver - SC
Recovery Time Objective (RTO) is the duration of time and a service level within which a business
process must be restored after a disaster
An optical time-domain reflectometer (OTDR) is an optoelectronic instrument used to
characterize an optical fiber. ... It injects a series of optical pulses into the fiber under test and
extracts, from the same end of the fiber, light that is scattered (Rayleigh backscatter) or
reflected back from points along the fiber.
A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an
external modem that converts a digital data frame from the communications technology used
on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice
versa.
Dig (Domain Information Groper) is a powerful command-line tool for querying DNS name
servers. The dig command, allows you to query information about various DNS records,
including host addresses, mail exchanges, and name servers. It is the most commonly
used tool among system administrators for troubleshooting DNS problems because of its
flexibility and ease of use.
iptables is a user-space utility program that allows a system administrator to configure the IP
packet filter rules of the Linux kernel firewall
Data Over Cable Service Interface Specification (DOCSIS) is an international telecommunications
standard that permits the addition of high-bandwidth data transfer to an existing cable
television
Address Resolution Protocol (ARP) is a procedure for mapping a dynamic IP address to a
permanent physical machine address in a local area network (LAN).
The 1.5Mbps offered by T1 line providers is usually guaranteed, i.e. any time you access the
connection, you always get the same bandwidth. ... Most T1 line providers offer an uptime of
99.9% making the service suitable for mission critical applications such as connecting email and
web servers.
due to IP tunneling, some extra headers are added to the IPv6 packet, exceeding the packet size higher than the
maximum transmission unit (MTU), resulting in increase in packet drops. One probable solution is to find the
MTU of every link in advance using the Internet Control Message Protocol (ICMP) packets and accordingly
fragment the packets at the source itself. However, most of the intermediate routers and the network firewalls
do not allow ICMP packets to traverse through their network, resulting in network black holes, where we
cannot know the MTU of some links in advance.
Datagram Transport Layer Security (DTLS) is a communications protocol designed to protect
data privacy and preventing eavesdropping and tampering. It is based on the Transport Layer
Security (TLS) protocol, which is a protocol that provides security to computer-based
communications networks.
As a part of the IPv4 enhancement, IPsec is a layer 3 OSI model or internet layer end-to-end
security scheme. In contrast, while some other Internet security systems in widespread use
operate above layer 3, such as Transport Layer Security (TLS) that operates above the Transport
Layer and Secure Shell (SSH) that operates at the Application layer