Jump to content

Network+/Objectives

From Wikiversity

1.0 Networking Concepts

[edit | edit source]
[edit | edit source]

1.2 Compare and contrast networking appliances, applications, and functions.

[edit | edit source]

1.3 Summarize cloud concepts and connectivity options.

[edit | edit source]
  • Network functions virtualization (NFV)
  • Virtual private cloud (VPC)
  • Network security groups
  • Network security lists
  • Cloud gateways
    • Internet gateway
    • Network address translation (NAT) gateway
  • Cloud connectivity options
    • VPN
    • Direct Connect

1.4 Explain common networking ports, protocols, services, and traffic types.

[edit | edit source]
Protocols Ports
File Transfer Protocol (FTP) 20/21
Secure File Transfer Protocol (SFTP) 22
Secure Shell (SSH) 22
Telnet 23
Simple Mail Transfer Protocol (SMTP) 25
Domain Name System (DNS) 53
Dynamic Host Configuration Protocol (DHCP) 67/68
Trivial File Transfer Protocol (TFTP) 69
Hypertext Transfer Protocol (HTTP) 80
Network Time Protocol (NTP) 123
Simple Network Management Protocol (SNMP) 161/162
Lightweight Directory Access Protocol (LDAP) 389
Hypertext Transfer Protocol Secure (HTTPS) 443
Server Message Block (SMB) 445
Syslog 514
Simple Mail Transfer Protocol Secure (SMTPS) 587
Lightweight Directory Access Protocol over SSL (LDAPS) 636
Structured Query Language (SQL) Server 1433
Remote Desktop Protocol (RDP) 3389
Session Initiation Protocol (SIP) 5060/5061

1.5 Compare and contrast transmission media and transceivers.

[edit | edit source]

1.6 Compare and contrast network topologies, architectures, and types.

[edit | edit source]
  • Mesh
  • Hybrid
  • Star/hub and spoke
  • Spine and leaf
  • Point to point

  • Three-tier hierarchical model
    • Core
    • Distribution
    • Access
  • Collapsed core
  • Traffic flows
    • North-south
    • East-west

1.7 Given a scenario, use appropriate IPv4 network addressing.

[edit | edit source]

1.8 Summarize evolving use cases for modern network environments

[edit | edit source]


2.0 Network Implementation

[edit | edit source]

2.1 Explain characteristics of routing technologies.

[edit | edit source]

2.2 Given a scenario, configure switching technologies and features.

[edit | edit source]

2.3 Given a scenario, select and configure wireless devices and technologies.

[edit | edit source]
  • Channels
    • Channel width
    • Non-overlapping channels
    • Regulatory impacts
  • Frequency options
    • 2.4GHz
    • 5GHz
    • 6GHz
    • Band steering
  • Service set identifier (SSID)
    • Basic service set identifier (BSSID)
    • Extended service set identifier (ESSID)

  • Network types
    • Mesh networks
    • Ad hoc
    • Point to point
    • Infrastructure
  • Encryption
  • Guest networks
    • Captive portals
  • Authentication
  • Antennas
    • Omnidirectional vs. directional
  • Autonomous vs. lightweight access point

2.4 Explain important factors of physical installations.

[edit | edit source]


3.0 Network Operations

[edit | edit source]

3.1 Explain the purpose of organizational processes and procedures.

[edit | edit source]
  • Documentation
    • Physical vs. logical diagrams
    • Rack diagrams
    • Cable maps and diagrams
    • Network diagrams
      • Layer 1
      • Layer 2
      • Layer 3
    • Asset inventory
      • Hardware
      • Software
      • Licensing
      • Warranty support
    • IP address management (IPAM)
    • Service-level agreement (SLA)
    • Wireless survey/heat map

  • Life-cycle management
    • End-of-life (EOL)
    • End-of-support (EOS)
    • Software management
      • Patches and bug fixes
      • Operating system (OS)
      • Firmware
    • Decommissioning
  • Change management
    • Request process tracking/service request
  • Configuration management
    • Production configuration
    • Backup configuration
    • Baseline/golden configuration

3.2 Given a scenario, use network monitoring technologies.

[edit | edit source]

  • Solutions
    • Network discovery
      • Ad hoc
      • Scheduled
    • Traffic analysis
    • Performance monitoring
    • Availability monitoring
    • Configuration monitoring

3.3 Explain disaster recovery (DR) concepts.

[edit | edit source]
  • DR metrics
    • Recovery point objective (RPO)
    • Recovery time objective (RTO)
    • Mean time to repair (MTTR)
    • Mean time between failures (MTBF)
  • DR sites
    • Cold site
    • Warm site
    • Hot site

  • High-availability approaches
    • Active-active
    • Active-passive
  • Testing
    • Tabletop exercises
    • Validation tests

3.4 Given a scenario, implement IPv4 and IPv6 network services.

[edit | edit source]

3.5 Compare and contrast network access and management methods.

[edit | edit source]
  • Site-to-site VPN
  • Client-to-site VPN
    • Clientless
    • Split tunnel vs. full tunnel
  • Connection methods
    • SSH
    • Graphical user interface (GUI)
    • API
    • Console
  • Jump box/host
  • In-band vs. out-of-band management


4.0 Network Security

[edit | edit source]

4.1 Explain the importance of basic network security concepts.

[edit | edit source]

4.2 Summarize various types of attacks and their impact to the network.

[edit | edit source]

4.3 Given a scenario, apply network security features, defense techniques, and solutions.

[edit | edit source]

5.0 Network Troubleshooting

[edit | edit source]

5.1 Explain the troubleshooting methodology.

[edit | edit source]

1. Identify the problem

  • Gather information
  • Question users
  • Identify symptoms
  • Determine if anything has changed
  • Duplicate the problem, if possible
  • Approach multiple problems individually

2. Establish a theory of probable cause

  • Question the obvious
  • Consider multiple approaches
    • Top-to-bottom/bottom-to-top OSI model
    • Divide and conquer

3. Test the theory to determine the cause

  • If theory is confirmed, determine next steps to resolve problem
  • If theory is not confirmed, establish a new theory or escalate

4. Establish a plan of action to resolve the problem and identify potential effects

5. Implement the solution or escalate as necessary

6. Verify full system functionality and implement preventive measures if applicable

7. Document findings, actions, outcomes, and lessons learned throughout the process

5.2 Given a scenario, troubleshoot common cabling and physical interface issues.

[edit | edit source]

  • Interface issues
    • Increasing interface counters
    • Port status
      • Error disabled
      • Administratively down
      • Suspended
  • Hardware issues
    • Power over Ethernet (PoE)
      • Power budget exceeded
      • Incorrect standard
    • Transceivers
      • Mismatch
      • Signal strength

5.3 Given a scenario, troubleshoot common issues with network services.

[edit | edit source]

  • Route selection
  • Address pool exhaustion
  • Incorrect default gateway
  • Incorrect IP address
    • Duplicate IP address
  • Incorrect subnet mask

5.4 Given a scenario, troubleshoot common performance issues.

[edit | edit source]

  • Wireless
    • Interference
      • Channel overlap
    • Signal degradation or loss
    • Insufficient wireless coverage
    • Client disassociation issues
    • Roaming misconfiguration

5.5 Given a scenario, use the appropriate tool or protocol to solve networking issues.

[edit | edit source]

  • Hardware tools
  • Basic networking device commands
    • show mac-address-table
    • show route
    • show interface
    • show config
    • show arp
    • show vlan
    • show power