< Network+

Network+/Objectives

1.0 Networking Concepts

1.2 Compare and contrast networking appliances, applications, and functions.

1.3 Summarize cloud concepts and connectivity options.

  • Network functions virtualization (NFV)
  • Virtual private cloud (VPC)
  • Network security groups
  • Network security lists
  • Cloud gateways
    • Internet gateway
    • Network address translation (NAT) gateway
  • Cloud connectivity options
    • VPN
    • Direct Connect

1.4 Explain common networking ports, protocols, services, and traffic types.

See Quizlet.
ProtocolsPorts
File Transfer Protocol (FTP)20/21
Secure File Transfer Protocol (SFTP)22
Secure Shell (SSH)22
Telnet23
Simple Mail Transfer Protocol (SMTP)25
Domain Name System (DNS)53
Dynamic Host Configuration Protocol (DHCP)67/68
Trivial File Transfer Protocol (TFTP)69
Hypertext Transfer Protocol (HTTP)80
Network Time Protocol (NTP)123
Simple Network Management Protocol (SNMP)161/162
Lightweight Directory Access Protocol (LDAP)389
Hypertext Transfer Protocol Secure (HTTPS)443
Server Message Block (SMB)445
Syslog514
Simple Mail Transfer Protocol Secure (SMTPS)587
Lightweight Directory Access Protocol over SSL (LDAPS)636
Structured Query Language (SQL) Server1433
Remote Desktop Protocol (RDP)3389
Session Initiation Protocol (SIP)5060/5061

1.5 Compare and contrast transmission media and transceivers.

1.6 Compare and contrast network topologies, architectures, and types.

  • Collapsed core
  • Traffic flows
    • North-south
    • East-west

1.7 Given a scenario, use appropriate IPv4 network addressing.

Further reading

1.8 Summarize evolving use cases for modern network environments

2.0 Network Implementation

2.1 Explain characteristics of routing technologies.

2.2 Given a scenario, configure switching technologies and features.

2.3 Given a scenario, select and configure wireless devices and technologies.

2.4 Explain important factors of physical installations.

3.0 Network Operations

3.1 Explain the purpose of organizational processes and procedures.

  • Documentation
    • Physical vs. logical diagrams
    • Rack diagrams
    • Cable maps and diagrams
    • Network diagrams
      • Layer 1
      • Layer 2
      • Layer 3
    • Asset inventory
      • Hardware
      • Software
      • Licensing
      • Warranty support
    • IP address management (IPAM)
    • Service-level agreement (SLA)
    • Wireless survey/heat map

  • Life-cycle management
    • End-of-life (EOL)
    • End-of-support (EOS)
    • Software management
      • Patches and bug fixes
      • Operating system (OS)
      • Firmware
    • Decommissioning
  • Change management
    • Request process tracking/service request
  • Configuration management
    • Production configuration
    • Backup configuration
    • Baseline/golden configuration

3.2 Given a scenario, use network monitoring technologies.

  • Solutions
    • Network discovery
      • Ad hoc
      • Scheduled
    • Traffic analysis
    • Performance monitoring
    • Availability monitoring
    • Configuration monitoring

3.3 Explain disaster recovery (DR) concepts.

  • High-availability approaches
    • Active-active
    • Active-passive
  • Testing
    • Tabletop exercises
    • Validation tests

3.4 Given a scenario, implement IPv4 and IPv6 network services.

3.5 Compare and contrast network access and management methods.

  • Site-to-site VPN
  • Client-to-site VPN
    • Clientless
    • Split tunnel vs. full tunnel
  • Connection methods
    • SSH
    • Graphical user interface (GUI)
    • API
    • Console
  • Jump box/host
  • In-band vs. out-of-band management

4.0 Network Security

4.1 Explain the importance of basic network security concepts.

4.2 Summarize various types of attacks and their impact to the network.

4.3 Given a scenario, apply network security features, defense techniques, and solutions.

5.0 Network Troubleshooting

5.1 Explain the troubleshooting methodology.

1. Identify the problem

  • Gather information
  • Question users
  • Identify symptoms
  • Determine if anything has changed
  • Duplicate the problem, if possible
  • Approach multiple problems individually

2. Establish a theory of probable cause

  • Question the obvious
  • Consider multiple approaches
    • Top-to-bottom/bottom-to-top OSI model
    • Divide and conquer

3. Test the theory to determine the cause

  • If theory is confirmed, determine next steps to resolve problem
  • If theory is not confirmed, establish a new theory or escalate

4. Establish a plan of action to resolve the problem and identify potential effects

5. Implement the solution or escalate as necessary

6. Verify full system functionality and implement preventive measures if applicable

7. Document findings, actions, outcomes, and lessons learned throughout the process

5.2 Given a scenario, troubleshoot common cabling and physical interface issues.

  • Interface issues
    • Increasing interface counters
    • Port status
      • Error disabled
      • Administratively down
      • Suspended
  • Hardware issues
    • Power over Ethernet (PoE)
      • Power budget exceeded
      • Incorrect standard
    • Transceivers
      • Mismatch
      • Signal strength

5.3 Given a scenario, troubleshoot common issues with network services.

  • Route selection
  • Address pool exhaustion
  • Incorrect default gateway
  • Incorrect IP address
    • Duplicate IP address
  • Incorrect subnet mask

5.4 Given a scenario, troubleshoot common performance issues.

  • Wireless
    • Interference
      • Channel overlap
    • Signal degradation or loss
    • Insufficient wireless coverage
    • Client disassociation issues
    • Roaming misconfiguration

5.5 Given a scenario, use the appropriate tool or protocol to solve networking issues.

  • Hardware tools
  • Basic networking device commands
    • show mac-address-table
    • show route
    • show interface
    • show config
    • show arp
    • show vlan
    • show power

This article is issued from Wikiversity. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.