CompTIA Network+ Exam Essentials
CompTIA Network+ Exam Essentials
PREPARED BY:
KNOWLEDGEBASE SUPERUSER
KBSUPERUSER.COM
− Switching Layer
− E.g. Webpage is divided small parts and send to destination, they will
be combined later.
PAGE 1
KBSUPERUSER.COM
TCP Flags
− Header describes the payload and contain important information with TCP
Flags.
− Fragmentation slow things down and if one is lost, the packet is lost.
PAGE 2
KBSUPERUSER.COM
− If MTU is set to 1500, that does not mean the usable value 1500. “Ethernet Header
– IP Header – TCP Header and CRC” also needs to be calculated.
− If the organization uses tunneling small sizes will be needed. So the size should
be set to automatic.
Network Topologies
− Network Topologies Explained - superuser (kbsuperuser.com)
− Assist to understand the signal flow. “How signal goes from “A” to “B”?
− Star “Hub and Spoke”: Hub in the center, spokes are located outside. Used
in most large and small networks. No point is directly connected to other.
PAGE 3
KBSUPERUSER.COM
− Ring: Used in many popular topologies. Token ring is no longer used. Ring
is still used in WAN and MAN. Dual rings are created for fault tolerance.
− Bus: Used in early local networks. Coaxial cable was the bus. Simple but
prone to errors. One break can fail all connection
PAGE 4
KBSUPERUSER.COM
− Wireless Topologies:
− Infrastructure: All devices are connected via access point. This is the most
common used.
− Mesh: Devices work together to form a mesh. Many different kinds of devices
can be linked. Self-form and self-heal!
Network Types
- Peer to Peer: Everyone talks to everyone. All devices are both server and clients.
Easy to deploy with low cost. Since all distributed difficult to administer and
difficult to secure.
- Local Area Network: Local is relative but we can accept the local if the sources
are in the same place. High-speed connectivity. If the speed is not high then it is
not local.
- Wide Area Network: Much larger distance. Many different WAN technologies
are included such as point to point, MPLS, Satellite.
- Wireless Local Area Network: 802.11 Technologies. Limited Area but it can be
expanded with more access points to a specific area.
- Campus Area Network: Corporate Area Network. Limited Area such as group
of buildings, no third party included. Fiber connected so the speed is high.
- Storage Area Network: Looks and feels like a local storage device. Block level
access is enabled. Efficient write and read is available.
PAGE 5
KBSUPERUSER.COM
o Labels are put / pushed onto packet when enter the cloud.
- SD-WAN: A wan built for cloud. Useful for cloud application. No need to hop
from a centralized point data center. Easy quick access to cloud based
applications.
WAN Termination
- Demarcation Point (The Demarc): The physical point which connects
internal network to service provider network.
Virtual Networks
- Since the numbers of the servers has changed and there are lots of physical /
virtual servers, managing the network al changed.
- Virtual Machine Manager: Manages all virtual platform and guest OS from one
screen like vSphere Client. Provides Hardware management such as CPU, RAM,
Networking, Security.
Provider Links
- Satellite Networking: Non-terrestrial communication, high cost, 50 bit down
and 3 bit up are common, works with line of sight. Difficult remote sites can be
handled.
o DSL / ADSL: Uses telephone lines, Distance limitation. If you are close
to source, you are lucky. 200 Mbit down 20 Mbit up.
- Fiber: High speed, frequencies of light, long distances. High installation cost,
high maintenance cost, difficult to repair.
- Metro Ethernet: A contained regional area. Connect the sites with ethernet.
Fiber always used in provider site and copper always used in client site.
Cabling
- Copper Cabling: Twisting is the key for success. Do it once and do it correct!
Balanced pair operation needed which means Transmit+ Transmit- / Receive+
Receive-
PAGE 7
KBSUPERUSER.COM
o Single mode: smaller core, long range. Up to 100 km. Expensive. Laser
Beams.
- Network Connectors:
PAGE 8
KBSUPERUSER.COM
- Network Transceivers:
- Cable Management:
o Copper Patch Panel: End user – Punch Down Block – Patch Cable –
Switch. Only move the patch cables between switches.
o 66 Block: Analog voice, left and right patched, easy to follow the path,
just a punch down tool is enough. Generally replaced with 110 Block.
PAGE 9
KBSUPERUSER.COM
o 100 BASE-TX: “Fast Ethernet” Min CAT5, 2 pair, Max 100 meters.
o 1000 BASE-T: 4 pair balanced, max 100 meters, 125 MHz, CAT5/CAT5E
PAGE 10
KBSUPERUSER.COM
Network Addressing:
- Binary Math:
- IPv4 Addressing:
o Subnet Mask shows the device subnet => where the data should be sent.
- Network Address Translation: IPv4 supports 4.29 billion address but more
than 20 billion devices are connected now. So unique IP address defining is not
possible. Routers keeps the NAT table.
PAGE 11
KBSUPERUSER.COM
- Network Communication:
- Construction of Subnet:
o Network Address: First IP Address of subnet. Set all host bits to zero.
PAGE 12
KBSUPERUSER.COM
- IPv6 Addressing:
o 128 bits address – 16 bytes. 6.8 billion people can get 5X1027 each.
o DHCP can still be used but it is better to use IPv6 and MAC Address
together. (Extended Unique Identifier)
- Tunnelling IPv6:
o 6to4 Addressing: Send IP6 over IPv4. Does not support NAT. Creates
IPv6 based on IPv4. Require relay routers.
o Dual Stock Routing: Router run both. IPv4 and IPv6 routing tables are
separately saved.
PAGE 13
KBSUPERUSER.COM
- https://kbsuperuser.com/tcp-udp-explained
- https://kbsuperuser.com/tcpip-cheat-sheet
- Common Ports - Cheat Sheet - superuser (kbsuperuser.com)
PAGE 14
KBSUPERUSER.COM
DHCP Overview:
- What is DHCP and How DHCP works? - superuser (kbsuperuser.com)
- DHCP - Cheat Sheet - superuser (kbsuperuser.com)
- Configuring DHCP:
o Scope: IP Address Range, Excluded Address, Subnet Mask, Lease
Duration, DNS, Default Gateway.
o After the lease duration address reclaimed and added back to pool.
o Automatic Assignment: DHCP gives the IP Address from past
assignments.
o Static Assignment: Administratively configured. Add MAC address and
assign IP address for servers, admin computers etc.
- DHCP Renewal Process:
o T1 Timer: Check the lending DHCP server to renew IP Address. %50 lease
time (by default)
o T2 Timer: If the original DHCP server is down try rebinding from any
DHCP Server. %87.5 lease time.
o E.g. Lease Time=8 days. T1=4 days and T2=7 days.
o No checkback needed in the first half of the lease time.
PAGE 15
KBSUPERUSER.COM
DNS Overview:
- What is DNS and How DNS works? - superuser (kbsuperuser.com)
PAGE 16
KBSUPERUSER.COM
NTP Overview:
- Every device has own clock. And synchronization of devices important. (log files,
authentication, outage details etc.)
- NTP Server: Listen on udp/123 responds to NTP Clients.
- NTP Clients: Request time from NTP Server.
- NTP Server / Client: Get time from other server, respond queries.
- Stratum Layers:
o 0: Atomic clock, GPS Clock, very accurate.
o 1: Synchronized to stratum 0.
o 2: Synchronized to stratum 1.
o Downtime wins.
- It is very important to plan who will be the server and who will be the client. If
there are more than 1 server is defined as NTP. The small stratum is more
accurate so it wins.
Network Architectures:
- Core: Center of the network. Webserver, Database, Applications etc.
- Distribution: Midpoint between users and core communication between access
switches.
- Access: Where the users and end-user devices connected.
PAGE 17
KBSUPERUSER.COM
- SDN: Extend the functionality and management. Perfectly build for cloud.
PAGE 18
KBSUPERUSER.COM
Cloud Models:
- Cloud Computing Explained - superuser (kbsuperuser.com)
- IaaS – HaaS: Outsourcing the equipment. Organization is still responsible for
security and management.
- SaaS: No local installation. Provider responsible for managing and security.
Gmail, Office 365 etc.
- PaaS: No Server No Software. Someone else handles the platform organization
handles the development. Public: Everyone has access. Community: Share
resources with other organizations. Private: Organization owned local data
center. Hybrid: a mix of public and private.
- DaaS: virtual desktop infrastructure. Minimum operating system needed on the
client. Applications run on remote server. Network connection must be strong.
Designing Cloud:
- On-Demand computing power: One click to create server, switch etc.
- Elasticity: Scale up and down easily.
- Multitenancy: Many clients can use the same infrastructure.
- Infrastructure as Code: Define server, network, applications as code. Modify,
copy, move code.
- Orchestration: Automation is the key. Services appear and disappear
automatically. Security policies are also automated.
- Connecting to Cloud: VPN, Virtual Private Cloud Gateway, VPC Endpoint.
- VM Sprawl Avoidance: Since it is easy to build server, switch, fw etc. the process
will get out of hand after some time. Formal process needs to be followed.
- VM Escape Protection: VM owners should not break VM Instance and interact
with OS / Hardware.
Networking Devices:
- Hub: OSI Layer 1 – Multiport repeater – Half duplex – 10/100 Mbit/sec.
- Bridge: OSI Layer 2 – Switch 2-4 ports, traffic is based on MAC – can connect
different topologies.
- Switch: OSI Layer 2 – More ports and features. Forward traffic based on MAC.
- Router: OSI Layer 3 – Routes traffic between IP Subnets.
- Access Point: Connect wired and wireless networks.
- Cable Modem: Transmission across multiple frequencies. Data, voice, video.
- DSL / ADLS Modem: Download is faster.
- Repeater: Receive and forward signal. No decision made.
- Converting Media: OSI Layer 1 – Convert F/O to copper, copper to F/O
- Layer 3 Capable Switch / Layer 3 Switch / Multilayer Switch: Switch, Routing
- Wireless Networks / Wireless LAN Controller: Centralized management of
Access points. Deploy, config, monitor and report usage via one point.
- Load Balancer: Multiple servers, invisible to end-users. Large scale
implementation, fault tolerance, managed access servers.
- IDS and IPS: Intrusion Detection And Prevention Systems (IDS&IPS) Explained
- superuser (kbsuperuser.com)
PAGE 19
KBSUPERUSER.COM
- Proxies: Sits between user and external network. Receive the request on their
behalf. Caching, URL Filtering, access control, scanning.
- VPN: encrypted tunnel, often integrated to firewall.
- VOIP: Phone switch.
- Network Based Firewalls: Filter traffic by port number / application. Encrypt
traffic, Layer 3 device, NAT, routing.
Networked Devices:
- VOIP: Each device is a computer, individual config.
- Printer: B&W, Colored, All in One, Ethernet, 802.11 Wireless, Bluetooth.
- Card Reader: Access to door / rooms, biometric auth.
- Cameras: CCTV, motion recognition, object detection, central recording
device
- HVAC: heating, ventilation, air conditioning managed commonly by one PC.
- IoT: Appliances, refrigerators, smart devices, usually wireless.
- SCADA / ICS: Power generation, manufacture equipment, real time info.
Dynamic Routing:
- Routers listen for subnet information from other routers.
- Routers also provide information to other routers. With the gathered
information routers determine the best path.
- If change occurs, then convergence process take place for every protocol.
- Which routing protocol:
o Define the best path: State of link, how far away?
o Rank the routes best to worst.
o Convergence time can widely change.
- Distance-Vector Protocol: How many hoops away is another network? Good
for small networks, usually automatic. Routing Information Protocol (RIP)
- Link-State routing Protocol: Connectivity is the key. More often in large
network. Open shortest Path First.
- Hybrid Routing Protocols: Mixed of link state and distance vector protocol.
o Border Gateway Protocol defines the path with criteria “network
topology”, “speed”, “rules” etc.
Routing Technologies:
- Routing Tables: A list of directions for packets.
- Hop: A packet passes through router, a hop to next router.
- Router does not know how to get everywhere, just need to know how to go
another place. If configured wrong, it will create loop and the data will go wrong
direction.
- IPv4 Time To Live & IPv6 Hop Limit: Avoid packet hop forever.
- Default Route: A route when no other route matches. Go that way to 0.0.0.0/0
PAGE 20
KBSUPERUSER.COM
Introduction to Ethernet:
- Ethernet Frame:
Network Switching:
- Switches:
o Forward / Drop Frame based on MAC Address.
o Gather / Update MAC Address
o Maintain loop free environment (STP)
- Address Resolution Protocol (ARP): Determine a MAC address based on an
IP address.
- PoE Power Modes:
o Mode A: Power on data pairs greater than 1 Gbps.
o Mode B: Power on spare pairs.
o POE: 802.3 standard / 15.4 watt / 350 mA.
o POE+: 802.3 standard / 25.5 watt / 600 mA.
PAGE 21
KBSUPERUSER.COM
Interface Configurations:
- Basic Interface Config: speed / duplex. Generally automatic. Need to match
on both sides.
- IP Address Management: Layer 3 interfaces, VLAN Interfaces, Management
Interfaces. IP Address, Subnet Mask, GW CIDR Block, DNS needs to be
configured.
- VLAN Assignment: Each device each port should be assigned to a VLAN.
- LAG and Mirroring: Multiple interface acts like one interface with LAG.
Mirroring copy traffic from one interface to another.
- Jumbo Frame: Send frames more than 1500 bytes of payload. (9216 bytes.)
Especially for backup and high traffic services.
- Ethernet Flow Control: Ethernet is non-deterministic. So, never knows how
fast or slow it will be. IEEE 802.3x pause frame and tell other devices pause
frame before sending.
- Port Security: Prevent unauthorized users from connecting based on source
MAC Address. Unique rules for every interface.
Wireless Standards:
Wireless Technologies:
- Frequency: 2.4 or 5 GHz or both or additional bands. Channels are numbered
by IEEE not to overlap each other.
- Bandwidth: 20 for 2.4, 40,80,160 MHz for 5 GHz.
- SSID: Same for all access points in order to connect once and resume using.
Access points have BSSID just like MAC Address.
- Omnidirectional Antennas: Signal is evenly distributed all sites.
- Directional Antennas: Send – receive single direction. E.g. between buildings.
PAGE 22
KBSUPERUSER.COM
Wireless Encryption:
- Users needs to be authenticated before login and the communication needs to
be encrypted.
- WPA: Released 2002 after WEP weakness. Every packet gets a unique 128 bits
encryption key. But still everyone can listen and the key must be given to right
person.
- WPA-2: Released 2004. Use AES encryption and CBC-MAC.
- WPA-3: Released 2018. Stronger encryption with Message Integrity Check.
Handshake method have changed. Not only user is authenticated to AP, AP
also authenticate to user.
Cellular Standards:
- Separate land into “cells”.
- 2G: Primary for voice.
- 3G: Upgraded data connectivity.
- 4G and LTE: GSM + CDMA providers.
- 5G: 10G, higher frequencies.
Performance Metrics:
- Device Performance: Temperature, CPU Usage, Memory
- Bandwidth Monitor: Network Statics, SNMP, NetFlow etc.
- Latency: Delay between request and response.
- Jitter: The time between frames. Real time media a sensitive.
- Monitoring Interface: Links status, error rate, discard, packet drops etc.
PAGE 23
KBSUPERUSER.COM
SNMP
- Database of collected data.
- Pull from devices udp / 61
- SNMPv1: Structured tables in the clear.
- SNMPv2: Data types, enhancements, still clear.
- SNMPv3: Message integrity, authentication, encryption.
- Creating graphs with collected data is too important.
- SNMP Trap: udp / 162. If a value exceeds defined threshold value send alert /
message
PAGE 24
KBSUPERUSER.COM
Security Policies:
- Password Policy: Resist guessing, greater than 8 chars, symbols, numbers etc.
- Acceptable use Policies: Rules of behavior.
- BYOD: what happens if lost? What happens if employee sells?
- Remote Access Policies: Encrypted connection, credentials, who can reach
internal area from outside?
- On-Boarding: New comers needs to sign IT Agreement
- Off-Boarding: What to do when someone leaves?
- Data Loss Prevention: Look for confidential data before transfer.
- Security policy includes everything not a static document and change is
constant.
Network Documentation:
- Floor Plans: Where the wires are laid? Where are the wireless? Patch Panels?
- Physical Network Maps: How each device is connected to other?
- Distribution Frames: Patch Panels, passive cable termination, MDFs, IDFs
- Logical Network Maps: High level views. Useful for planning.
- Managing Cables: ANSI / TIA / EIA606, everything needs to be labeled.
- Site survey: Determine existing and plan new requirements.
- Audit and Assessment Report: Are we following the rules?
- Baseline: Seeing current situation and following it.
PAGE 25
KBSUPERUSER.COM
- Availability Concepts:
o Recovery:
▪ Recovery Time Objective (RTO): How long it will take to take it
back?
▪ Recovery Point Objective (RPO): How much data loss is
acceptable?
▪ Mean Time to Repair (MTTR): Time required to fix the issue.
▪ Mean Time Between Failure (MTBF): Predict time between
outages.
Network Security:
- CIA Triad: Infosec - CIA Triad Explained - superuser (kbsuperuser.com)
- Security Concepts:
o Vulnerability: A weakness in system.
o Zero-Day Attack: Vulnerabilities not found yet.
o Threat: Vulnerability can be exploited by threat.
o Insider Threats: Least privilege, create policies.
o Vulnerability Databases: CVE Community, National Vulnerability
Database.
o Exploits: Take advantage of vulnerability, gain control of a system.
o Role Based Access Control: provide access according to user role.
o Zero Trust: Holistic approach to network security. No one is trusted
unless verified.
- Defense in Depth:
o Layering the defense.
o Physical Controls: Door locks, fences, rack blocks, cameras.
o Technical Controls: Hardware, software, firewall, AD, encryption.
o Firewall, screened subnet, hashing, salting, authentication, IPS,
VPN, Card, badge, antimalware, antivirus, security guard.
o Physical Segmentation: Separate devices, separate infrastructure.
o Logical Segmentation: VLAN.
o Separation of Duties: Split knowledge, dual control.
o Network Access Control:
▪ IEEE 802.1x port-based access after auth.
▪ EAP or RADIUS
▪ Disable un-used ports
▪ MAC address checking to stop spoofing.
o Honey Pots:
▪ Attract attackers and trap them to a pot. Create a virtual world to
explore. See the capabilities and methods of attackers.
- Authentication Methods:
PAGE 26
KBSUPERUSER.COM
Network Hardening
- SNMP
- Router Advertisement Guard
- Port Security
- Dynamic ARP Inspection
- Patch Management
- Control Plane Policing
- Role-based Access
- Private VLAN
- Access Control List
- Firewall Rules
- Disabling un-used ports
- Change default credentials
- Password complexity
- DHCP Snooping
- Changing default VLAN
- Upgrading firmware
Wireless Security:
- MAC Filtering
- Antenna Placement
- Wireless Isolation
- Wireless Security Nodes
- EAP
- Geo Config
- Captive Portal
PAGE 27
KBSUPERUSER.COM
Remote Access:
- Use VPNs via firewall, standalone hardware, software etc.
- Full Tunnel: All traffic goes to corporate FW even if not related with
organization.
- Split Tunnel: Only corporate related traffic goes to corporate firewall.
- Remote Desktop Connection: RDP, VNC. Use Remote Desktop Gateway.
- Use SSH tcp/22 and encrypt all traffic.
- Out of band management: serial connection, USB, console router
Physical Security:
- CCTV: Object detection, motion detection, plate and face detection.
- Asset Tracking Tags: Record all assets.
- Tamper Detection: Use tampered stickers
- Employee Training: One on one, posters, signs, messages/
- Access Control Hardware: Gate, lock, camera
- Badge Reader, biometrics, smart locks
- Locking cabinets
- Data destruction
- Access control vestibules
Network Troubleshooting:
- Identify the Problem: Gather information, Question Users, Check Help Desk
Tickets, Get as many details as possible.
- Find out if anything changed
- Establish a Theory: Start with obvious Consider everything, divide and
conquer problem.
- Confirm the theory: Determine next steps to resolve the problem. If it does
not work try with another theory.
- Create a plan of action: Build the plan what to do. Identify potential effects.
- Implement the solution: Try the fix, escalate as necessary, get help from a 3rd
party.
- Verify full system functionality: Check the solution with customer.
- Document Findings: Add the results to knowledgebase.
- Briefly:
o Identify problem
o Establish a theory of probable cause
o Test the theory
o Establish a plan of action
o Implement the solution
o Verify full system function
o Document findings
PAGE 28
KBSUPERUSER.COM
Cable Connectivity:
- Using Right Cable: Speed / Bandwidth, Throughput, Distance
- Unshielded and Shielded Cable: U / S / F Cable
- S/FTP, F/UTP means: Shielded outside / Foil Shielding inside, Foil outside /
No shielding inside
- Active / Circulating Plenum Airspace
- Traditional Cable Jacket: Polyvinyl chloride (PVC)
- Fire-Rated Cable Jacket: Fluorinated ethylene polymer (FEP) or low-smoke
polyvinyl chloride (PVC)
- Serial Console Cables: D-Subminiature or D-Sub like DB-9 or DB-25.
Commonly used for RS-232. Now used for configuration port.
- Rollover Cable – Rolled Cable – Cisco Console Cable - Yost Cable: A
standard for RJ-45 to serial communications
- Ethernet cross-over cables: Connect to Ethernet devices without using a
switch by using crossover cable. Can be a good alternative to a console
connection.
- PoE: One wire for both network and electricity. Phones, cameras, access points.
PAGE 29
KBSUPERUSER.COM
Hardware Tools:
- Cable Crimpers: Coaxial, twisted pair, fiber. Connect the modular connector
to Ethernet Cable. Get a good pair of electrician’s scissors.
- Make sure to use correct modular connectors.
- Punch-Down tools: Punch a wire into wiring block such as 66 / 110 blocks.
Trims the wires during the punch.
- Document everything, tag everything.
- Tone Generator: follow the tone to find the cable. Easy wire tracing.
- Loopback Plugs: Useful for testing physical ports or fooling the applications.
Serial / RS-232, Ethernet, T1, fiber. These are not cross-over cables.
- TDR or OTDR: Estimate cable lengths both copper and fiber. Cable impedance
information, signal losses, locate copper or fiber breaks. Resolve layer 1 issues
quickly. Helps to validate installation.
- Multimeters: AC, DC, Continuity.
- Cable Testers: Relatively simple, continuity test. Can identify missing pins.
Not usually used for frequency testing.
- Taps and Port Mirrors: Intercept network traffic and send a copy to a packet
capture device. Disconnect the link put a tap in the middle and do the analysis.
- Fusion Splicer: Joins two ends of a fiver together. Add a connector to end of a
fiber, extend the length, remove damaged section.
- Light Meter: Shows how much light is getting through. Useful during
installation.
- Spectrum Analyzer: See the frequencies and conflicts.
Software Tools:
- Wireless packet analysis: Easy to monitor. You have to be quiet and listening.
“Wireshark”
- Protocol Analyzers: Solve complex application issues. Get and shows the
details. Gather frames and view traffic patterns. “Wireshark”
- Speed Test Sites: Bandwidth Testing. Measure at different times of the day.
IPS sites, speedof.me, speetest.net
- iPerf: Performance monitoring and speed testing. Set iPerf server and client.
- IP and port scanners: Active scan for IP Addresses and open ports. Set the
range and see who responds. Nmap / Zenmap / Angry IP Scanner.
- NetFlow: Gather traffic statics from all traffic flows. Probe watches network
communication. Summary records are sent to collector.
- TFTP Server: perfect for initial file transfers and firmware upgrades.
- Terminal Emulator: Encrypted Terminal communication
PAGE 30
KBSUPERUSER.COM
Wireless Troubleshooting:
- Performance can vary. Throughput, speed, distance effects the performance.
- RSSI: The strength of a received radio signal. Closer in decibel-milliwatss to
zero is better.
- Wireless survey tools: Signal coverage, potential interference.
- EIRP: The radiated signal strength. Transmit strength + antenna gain - cable
loss. For 2.4GHz maximum EIRP is +36 dBm or 4W.
- Omnidirectional antennas are good choice for most environments.
- Directional antennas focus the signal and provide increased distances. Yagi,
Parabolic. Point to point. Antennas are placed at both ends.
- Polarization: The orientation of an antenna. Transmitting and receiving
should be same.
- AP Association time: Devices must associate with an access point. Also check
the connection with wired network controller.
- Channel Utilization: Everyone can’t talk at one time. Disable legacy, low
speed support and use the fastest possible speeds and configurations. Check
the channels and adjust the output power, split network.
- Site Survey: Determine existing wireless landscape, identify existing Aps, work
around existing frequencies, plan for ongoing site surveys.
PAGE 31
KBSUPERUSER.COM
PAGE 32
KBSUPERUSER.COM
- Routing Loops: Check the configuration. Traceroute will show the problem.
- Missing Route: A route to destination network does not exist. The packet will
be dropped.
- Rogue DHCP Server: IP Addresses assigned by a non-authorized DHCP
Server. Intermittent connectivity, no connectivity. Enable DHCP Snooping on
the switch. Authorize DHCP servers in Active Directory. Disable the rogue and
renew the IP Address.
- Exhausted DHCP Scope: Check the server and add more IP address if
possible. Lower the lease time.
- IP Configuration Issues: Check the IP Address, Subnet Mask, Gateway and
DNS. Monitor the traffic. Check the devices and confirm subnet mask and
gateway.
- Low Optical Link Budget: Clean the connectors. Check the cable with a light
meter.
- Certificate Issues: Something is wrong with certificate. Check the certificate
details.
- Hardware Failure: Application does not respond. Confirm connectivity, run a
traceroute. Check the devices, light.
- Incorrect Firewall Setting: Check the configuration. Are ports protocol
allowed? Confirm the rules.
- Incorrect VLAN Configurations: Check the VLAN assignments on the switch.
- DNS Issues: Check the IP configuration and DNS settings on the client. Use
nslookup or dig. Change the DNS server.
- NTP Issues: time is important for applications such as Kerberos Active
Directory. Configure NTP on all devices and automate the settings.
- BYOD: Difficult to secure. Devices need to meet the company’s requirements.
PAGE 33