Network+/Objectives

1.0 Networking Concepts

edit
edit

1.2 Compare and contrast networking appliances, applications, and functions.

edit

1.3 Summarize cloud concepts and connectivity options.

edit
  • Network functions virtualization (NFV)
  • Virtual private cloud (VPC)
  • Network security groups
  • Network security lists
  • Cloud gateways
    • Internet gateway
    • Network address translation (NAT) gateway
  • Cloud connectivity options
    • VPN
    • Direct Connect

1.4 Explain common networking ports, protocols, services, and traffic types.

edit
Protocols Ports
File Transfer Protocol (FTP) 20/21
Secure File Transfer Protocol (SFTP) 22
Secure Shell (SSH) 22
Telnet 23
Simple Mail Transfer Protocol (SMTP) 25
Domain Name System (DNS) 53
Dynamic Host Configuration Protocol (DHCP) 67/68
Trivial File Transfer Protocol (TFTP) 69
Hypertext Transfer Protocol (HTTP) 80
Network Time Protocol (NTP) 123
Simple Network Management Protocol (SNMP) 161/162
Lightweight Directory Access Protocol (LDAP) 389
Hypertext Transfer Protocol Secure (HTTPS) 443
Server Message Block (SMB) 445
Syslog 514
Simple Mail Transfer Protocol Secure (SMTPS) 587
Lightweight Directory Access Protocol over SSL (LDAPS) 636
Structured Query Language (SQL) Server 1433
Remote Desktop Protocol (RDP) 3389
Session Initiation Protocol (SIP) 5060/5061

1.5 Compare and contrast transmission media and transceivers.

edit

1.6 Compare and contrast network topologies, architectures, and types.

edit
  • Mesh
  • Hybrid
  • Star/hub and spoke
  • Spine and leaf
  • Point to point

  • Three-tier hierarchical model
    • Core
    • Distribution
    • Access
  • Collapsed core
  • Traffic flows
    • North-south
    • East-west

1.7 Given a scenario, use appropriate IPv4 network addressing.

edit

1.8 Summarize evolving use cases for modern network environments

edit


2.0 Network Implementation

edit

2.1 Explain characteristics of routing technologies.

edit

2.2 Given a scenario, configure switching technologies and features.

edit

2.3 Given a scenario, select and configure wireless devices and technologies.

edit
  • Channels
    • Channel width
    • Non-overlapping channels
    • Regulatory impacts
  • Frequency options
    • 2.4GHz
    • 5GHz
    • 6GHz
    • Band steering
  • Service set identifier (SSID)
    • Basic service set identifier (BSSID)
    • Extended service set identifier (ESSID)

  • Network types
    • Mesh networks
    • Ad hoc
    • Point to point
    • Infrastructure
  • Encryption
  • Guest networks
    • Captive portals
  • Authentication
  • Antennas
    • Omnidirectional vs. directional
  • Autonomous vs. lightweight access point

2.4 Explain important factors of physical installations.

edit


3.0 Network Operations

edit

3.1 Explain the purpose of organizational processes and procedures.

edit
  • Documentation
    • Physical vs. logical diagrams
    • Rack diagrams
    • Cable maps and diagrams
    • Network diagrams
      • Layer 1
      • Layer 2
      • Layer 3
    • Asset inventory
      • Hardware
      • Software
      • Licensing
      • Warranty support
    • IP address management (IPAM)
    • Service-level agreement (SLA)
    • Wireless survey/heat map

  • Life-cycle management
    • End-of-life (EOL)
    • End-of-support (EOS)
    • Software management
      • Patches and bug fixes
      • Operating system (OS)
      • Firmware
    • Decommissioning
  • Change management
    • Request process tracking/service request
  • Configuration management
    • Production configuration
    • Backup configuration
    • Baseline/golden configuration

3.2 Given a scenario, use network monitoring technologies.

edit

  • Solutions
    • Network discovery
      • Ad hoc
      • Scheduled
    • Traffic analysis
    • Performance monitoring
    • Availability monitoring
    • Configuration monitoring

3.3 Explain disaster recovery (DR) concepts.

edit
  • DR metrics
    • Recovery point objective (RPO)
    • Recovery time objective (RTO)
    • Mean time to repair (MTTR)
    • Mean time between failures (MTBF)
  • DR sites
    • Cold site
    • Warm site
    • Hot site

  • High-availability approaches
    • Active-active
    • Active-passive
  • Testing
    • Tabletop exercises
    • Validation tests

3.4 Given a scenario, implement IPv4 and IPv6 network services.

edit

3.5 Compare and contrast network access and management methods.

edit
  • Site-to-site VPN
  • Client-to-site VPN
    • Clientless
    • Split tunnel vs. full tunnel
  • Connection methods
    • SSH
    • Graphical user interface (GUI)
    • API
    • Console
  • Jump box/host
  • In-band vs. out-of-band management


4.0 Network Security

edit

4.1 Explain the importance of basic network security concepts.

edit

4.2 Summarize various types of attacks and their impact to the network.

edit

4.3 Given a scenario, apply network security features, defense techniques, and solutions.

edit

5.0 Network Troubleshooting

edit

5.1 Explain the troubleshooting methodology.

edit

1. Identify the problem

  • Gather information
  • Question users
  • Identify symptoms
  • Determine if anything has changed
  • Duplicate the problem, if possible
  • Approach multiple problems individually

2. Establish a theory of probable cause

  • Question the obvious
  • Consider multiple approaches
    • Top-to-bottom/bottom-to-top OSI model
    • Divide and conquer

3. Test the theory to determine the cause

  • If theory is confirmed, determine next steps to resolve problem
  • If theory is not confirmed, establish a new theory or escalate

4. Establish a plan of action to resolve the problem and identify potential effects

5. Implement the solution or escalate as necessary

6. Verify full system functionality and implement preventive measures if applicable

7. Document findings, actions, outcomes, and lessons learned throughout the process

5.2 Given a scenario, troubleshoot common cabling and physical interface issues.

edit

  • Interface issues
    • Increasing interface counters
    • Port status
      • Error disabled
      • Administratively down
      • Suspended
  • Hardware issues
    • Power over Ethernet (PoE)
      • Power budget exceeded
      • Incorrect standard
    • Transceivers
      • Mismatch
      • Signal strength

5.3 Given a scenario, troubleshoot common issues with network services.

edit

  • Route selection
  • Address pool exhaustion
  • Incorrect default gateway
  • Incorrect IP address
    • Duplicate IP address
  • Incorrect subnet mask

5.4 Given a scenario, troubleshoot common performance issues.

edit

  • Wireless
    • Interference
      • Channel overlap
    • Signal degradation or loss
    • Insufficient wireless coverage
    • Client disassociation issues
    • Roaming misconfiguration

5.5 Given a scenario, use the appropriate tool or protocol to solve networking issues.

edit

  • Hardware tools
  • Basic networking device commands
    • show mac-address-table
    • show route
    • show interface
    • show config
    • show arp
    • show vlan
    • show power