Tech

The Essentials of Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

The Essentials of Networking

  • Network Card Troubleshooting
    • Use Device Manager –> NIC properties for information/configuration.
    • Change duplex and wake-on LAN settings there
    • Link lights show connectivity, activity, and (sometimes) speed.
      • Full-Duplex–the NIC is talking & listening at the same time.
      • Half-Duplex–
    • Wake-on LAN–wakes up a computer from sleeping if certain information comes in (a so-called ‘magic packet’).
  • Working With Connections–NETSTAT
    • The ‘netstat’ command shows important information about connections.
    • Use netstat switches ‘-n’ and ‘-a’ as needed.
    • Consider a 3rd-party tool, such as TCPView as an alternative to netstat.
      • TCPView is from SysInternals website.
    • Netstat–shows statistics for different connections (usually TCP/UDP)
      • ex: Windows folder sharing–(Port 445)
    • TCPView is a ‘3rd-party’ tool that is like graphical Netstat.
      • shows things happening ‘in-the-moment’.
  • Windows Naming
    • Windows naming is designed for LANs.
    • When you install Windows, you give the computer a Windows name.
    • All Windows systems will be a member of a domain or a workgroup.
      • A Windows system will either be a ‘workgroup’ or a ‘member’ of an ‘Active Directory’ domain (there’s no exception to this rule!).
    • Homegroups are a more secure & automated organization, but still a workgroup.
    • ‘Netbios’ / ‘netbt’–a Windows specific naming convention.
    • ‘DNS’ is the naming convention often used.
  • Working With Active Directory
    • An ‘Active Directory’ domain requires a dedicated domain controller.
    • Windows domains support singe sign-on.
    • Domains support domain policies, login scripts & running profiles.
    • We use ‘Organizational Units’ to organize the Active Directory.
    • Domain admin (not to be confused with the local admin!) has the power to add any computer to the domain.
  • Windows Sharing with Mac & Linux
    • SMBs (Server Message Blocks) are Windows’ method for network connectivity.
    • SAMBA–a Windows folder & printer sharing emulation tool built into Linux & Macs.
    • SAMBA comes with Linux & Macs to connect to Windows networks.
    • You need to know the workgroup or Domain name as well as give the system a computer name.
      • SAMBA still requires a computer name!
    • LAN manager (goes back to the 1980’s) has evolved to SMB.
  • Net Command (old & complicated; allows you to do many networking things)
    • The ‘NET’ command has many switches.
    • ‘NET VIEW’ shows the systems & the shares in a workgroup or domain.
    • ‘NET SHARE’ shares folders or views shared folders.
    • The ‘NETUSE’ command accesses shared folders.
      • ex: ‘net share shareit = c:\stuff
    • ‘NET USER’ creates and deletes user accounts.
  • Firewall Configuration
    • Firewalls are common on gateway routers.
    • The firewall’s access control list” (ACL) defines what may or may not forward or filter (what people can or can’t do or access).
    • Stateless firewalls block on fixed criteria, such as port number, time of day, URL, etc.
    • Stateful firewalls block based on actions taking place at that moment (e.g., too many pings)
    • Principle of least privilege–give people just enough access to do what they need to do. More challenging to configure, so people often use an ‘Access list/Deny List’ (aka…Blacklist/Whitelist…an increasing antiquated industry term in today’s cultural environment)
      • Deny List/Blacklist–blanket list of things that you can’t go to
      • Access List/Whitelist–blanket list of only things you can go to.
    • DMZ (Demilitarized zone)
      • careful to know what a “Real DMZ” set-up is (it has a second router separating the real internal network from things that can be publicly accessed, like file or web servers.
    • 3rd party services also offer firewalls.
  • Windows Firewall
    • Windows Defender Firewall is a host-based firewall that comes with Windows.
    • Host firewalls protect systems using host features such as filenames or process ID’s.
    • Defender Firewall has three settings: Domain, Public & Private.
    • You can create exceptions manually if needed.
    • All operating systems have a built-in host based firewall.
  • Port Forwarding
    • A ‘port forward’ is when a NAT router opens incoming traffic on a certain port, access to a single system on the internal network.
    • You can configure port forwarding on the NAT router.
    • We often use non-standard port numbers for security.
    • We use Dynamic DNS to give DNS names to port forward devices.
  • Wireless Encryption
    • The obsolete WEP encryption is easily cracked today and is never to be used.
    • WPA introduced TKIP-personal shared key and RADIUS authentication.
    • WPA2 added AES encryption.
    • WPS automates encryption, but is easily crackable.
    • WEP (Wired Equivalent Privacy)–used RC-4 (easily crackable)
    • TKIP (Temporal Key Integrity Protocol)
    • AES (Advanced Encryption Standard)
      • AES is still used as the primary encryption standard
    • Pre-shared key/ Personal key
    • RADIUS Server
    • WPA (Wi-Fi Protected Access) PSK (Personal Shared Key)
    • WPA2
    • TKIP is WPA and AES is WPA2
    • WPS (Wi-Fi Protected Setup)–very easily hacked!
    • Bottom Line–In a SOHO (Small Office/Home Office) environment you will setup encryption & that encryption will be WPA2 and its gonna be Personal Shared Key.
  • Enterprise Wireless Setup
    • Enterprise WAPs often use Power over Ethernet (PoE).
    • Use powerful wireless analysis tools to determine WAP location.
    • Enterprise networks often use RADIUS or TACACS+ protocols for authentication.
      • AAA (Authorization, Authentication, Accounting)
    • Two or more WAPs sharing the same SSID are known as ESSIDs.
    • PoE (Power over Ethernet) eliminates need for A/C adopter.
      • PoE (1st generation) and PoE+
      • PoE+ provides a lot more electricity for individual devices.
      • Needs an equivalent PoE-capable switch or a PoE injector
  • Enterprise Wireless Configuration
    • ESSID (Extended SSID)–same SSID on all the individual devices (individual WAPs) and all are a member of the same WAN.