0% found this document useful (0 votes)
29 views60 pages

Sample

The document is a review guide for the Cisco Certified Support Technician (CCST) Networking 100-150 Exam, structured as a day-by-day study plan leading up to the exam. It covers essential networking topics, including networking models, TCP/IP functions, data encapsulation, and various protocols. The guide also includes study resources and practical tips for exam preparation.

Uploaded by

wadie2geummah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views60 pages

Sample

The document is a review guide for the Cisco Certified Support Technician (CCST) Networking 100-150 Exam, structured as a day-by-day study plan leading up to the exam. It covers essential networking topics, including networking models, TCP/IP functions, data encapsulation, and various protocols. The guide also includes study resources and practical tips for exam preparation.

Uploaded by

wadie2geummah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 60

31 Days Before Your

Cisco Certified
Support Technician
(CCST) Networking
100-150 Exam
A Day-By-Day Review Guide for the
CCST-Networking Certification Exam
Allan Johnson

Cisco Press
Hoboken, NJ
ii  31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

31 Days Before Your Cisco Certified


Support Technician (CCST) Networking
100-150 Exam
Allan Johnson
Copyright © 2024 Cisco Systems, Inc.
Published by:
Cisco Press
All rights reserved. This publication is protected by copyright, and permission must be obtained from the
publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form
or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding
permissions, request forms, and the appropriate contacts within the Pearson Education Global Rights &
Permissions Department, please visit www.pearson.com/permissions.
No patent liability is assumed with respect to the use of the information contained herein. Although every
precaution has been taken in the preparation of this book, the publisher and author assume no responsi-
bility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the infor-
mation contained herein.
Please contact us with concerns about any potential bias at pearson.com/report-bias.html.
Microsoft and/or its respective suppliers make no representations about the suitability of the information
contained in the documents and related graphics published as part of the services for any purpose all such
documents and related graphics are provided “as is” without warranty of any kind. Microsoft and/or its
respective suppliers hereby disclaim all warranties and conditions with regard to this information, includ-
ing all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a
particular purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers
be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss
of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of
or in connection with the use or performance of information available from the services.
The documents and related graphics contained herein could include technical inaccuracies or typographi-
cal errors. Changes are periodically added to the information herein. Microsoft and/or its respective sup-
pliers may make improvements and/or changes in the product(s) and/or the program(s) described herein
at any time. Partial screen shots may be viewed in full within the software version specified.
Microsoft® Windows®, and Microsoft Office® are registered trademarks of the Microsoft Corporation in
the U.S.A. and other countries. This book is not sponsored or endorsed by or affiliated with the Microsoft
Corporation.
$PrintCode
Library of Congress Control Number: 2024902156
ISBN-13: 978-0-13-822291-8
ISBN-10: 0-13-822291-6

Warning and Disclaimer


This book is designed to provide information about exam topics for the Cisco Certified Support
Technician (CCST) certification. Every effort has been made to make this book as complete and as
accurate as possible, but no warranty or fitness is implied.

The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc.,
shall have neither liability nor responsibility to any person or entity with respect to any loss or
damages arising from the information contained in this book or from the use of the discs or
programs that may accompany it.
iii  

The opinions expressed in this book belong to the author and are not necessarily those of Cisco
Systems, Inc.

Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service marks have been
appropriately capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this
information. Use of a term in this book should not be regarded as affecting the validity of any
trademark or service mark.

Special Sales
For information about buying this title in bulk quantities, or for special sales opportunities (which
may include electronic versions; custom cover designs; and content particular to your business, train-
ing goals, marketing focus, or branding interests), please contact our corporate sales department at
[email protected] or (800) 382-3419.

For government sales inquiries, please contact [email protected].

For questions about sales outside the U.S., please contact [email protected].

Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each
book is crafted with care and precision, undergoing rigorous development that involves the unique
expertise of members from the professional technical community.

Readers’ feedback is a natural continuation of this process. If you have any comments regarding how
we could improve the quality of this book, or otherwise alter it to better suit your needs, you can
contact us through email at [email protected]. Please make sure to include the book title
and ISBN in your message.

We greatly appreciate your assistance.


GM K12, Early Career and Professional Learning Soo Kang
Alliances Manager, Cisco Press Caroline Antonio
Director, ITP Product Management Brett Bartow
Executive Editor James Manly
Managing Editor Sandra Schroeder
Development Editor Ellie C. Bru
Senior Project Editor Mandie Frank
Copy Editor Bart Reed
Technical Editor Patrick Gargano
Editorial Assistant Cindy Teeters
Designer Chuti Prasertsith
Composition CodeMantra
Indexer Ken Johnson
Proofreader Jennifer Hinchliffe
iv 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

About the Author


Allan Johnson entered the academic world in 1999 after 10 years as a business owner/operator to
dedicate his efforts to his passion for teaching. He holds both an MBA and an MEd in training and
development. He taught CCNA courses at the high school level for seven years and has taught both
CCNA and CCNP courses at Del Mar College in Corpus Christi, Texas. In 2003, Allan began to
commit much of his time and energy to the CCNA Instructional Support Team, providing services
to Networking Academy instructors worldwide and creating training materials. He now splits his
time between working as a curriculum lead for Cisco Networking Academy and as an account lead
for Unicon (unicon.net) supporting Cisco’s educational efforts.

About the Technical Reviewer


Patrick Gargano is a lead content advocate and instructor on the Technical Education team
within Learning & Certifications at Cisco. Before joining Cisco in 2021, he worked as a Cisco
Networking Academy instructor and instructor-trainer since 2000, and as a Certified Cisco Systems
Instructor (CCSI) since 2005 for Fast Lane UK, Skyline ATS, and NterOne teaching CCNA and
CCNP courses. Recently, he was responsible for developing Cisco’s official ENARSI, ENSDWI,
ENCC, SDWFND, and SDWSCS course content. He has published four Cisco Press books, and
he holds CCNA, CyberOps Associate, and CCNP Enterprise certifications. He also holds BEd and
BA degrees from the University of Ottawa and has a Master of Professional Studies (MPS) degree
in computer networking from Fort Hays State University. He is a regular speaker at Cisco Live,
presenting on topics related to SD-WAN and network troubleshooting. He lives in Quebec, Canada
with his wife and son.
v  

Dedications
For my wife, Becky. Thank you for all your support during this crazy whirlwind of a year. You are
the stabilizing force that keeps me grounded.

Acknowledgments
As a technical author, I rely heavily on my technical editor; Patrick Gargano had my back for
this work. Thankfully, when James Manly contacted him, he was willing and able to do the ardu-
ous review work necessary to make sure that you get a book that is both technically accurate and
unambiguous.

Russ White’s Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide, First
Edition was one of my main sources. Russ is well known in the computer networking community
where he is a highly respected expert. I recommend subscribing to the podcast Hedge, where Russ is
a co-host.

The Cisco Network Academy authors for the online curriculum take the reader deeper, past the
CCST Networking exam topics, with the ultimate goal of preparing the student not only for
CCST Networking certification, but for more advanced college-level technology courses and
degrees as well. Thank you especially to Rick Graziani, Bob Vachon, John Pickard, Dave Holzinger,
Martin Benson, Suk-Yi Pennock, Allan Reid, Anna Bolen and the rest of the ACE team. Their
excellent treatment of the material is reflected throughout this book.

James Manly, executive editor, effectively juggles multiple projects simultaneously, steering each from
beginning to end. Thank you, James, for shepherding this project for me.

Thank you to the professional and thorough review of this work by development editor Ellie Bru,
project editor Mandie Frank, and copy editor Bart Reed. Their combined efforts ensure that what I
authored is ready for publication.

And to the rest of the Pearson family who contributes in countless ways to bring a book to the
reader, thank you for all your hard work.
vi 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

Contents at a Glance
Day 31: Networking Models   1

Day 30: TCP/IP Layer Functions   5

Day 29: Data Encapsulation   9

Day 28: Measuring Network Performance   13

Day 27: Network Topologies   21

Day 26: Cloud Computing   31

Day 25: Transport Protocols   37

Day 24: FTP, NTP, and ICMP   43

Day 23: HTTP, DHCP, and DNS   55

Day 22: Private Addressing and NAT   63

Day 21: IPv4 Addressing   69

Day 20: IPv6 Addressing   77

Day 19: Cables and Connectors   91

Day 18: Wireless Technologies   105

Day 17: Endpoint Devices   113

Day 16: Configure PC and Mobile Access   121

Day 15: Device Status Lights   139

Day 14: Connecting Cables   143

Day 13: Device Ports   151

Day 12: Routing Concepts   155

Day 11: Switching Concepts   169

Day 10: Troubleshooting and Help Desks   177

Day 9: Wireshark   185

Day 8: Diagnostic Commands   191

Day 7: Device Management   205

Day 6: Show Commands   215

Day 5: Firewalls   227

Day 4: Threats, Vulnerabilities, and Attacks   235


vii  

Day 3: Security Protocols and Practices   245

Day 2: Secure Wireless Access   253

Day 1: Review and Practice   267

Exam Day   269

Post-Exam Information   271

CCST Networking Countdown Calendar   273

Exam Checklist   275

Index   279

Reader Services
Register your copy at www.ciscopress.com/title/9780138222918 for convenient access to
downloads, updates, and corrections as they become available. To start the registration process,
go to www.ciscopress.com/register and log in or create an account.* Enter the product ISBN
9780138222918 and click Submit. When the process is complete, you will find any available bonus
content under Registered Products.

*Be sure to check the box that you would like to hear from us to receive exclusive discounts on
future editions of this product.
viii 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

Contents
Day 31: Networking Models 1

CCST Networking Exam Topic 1


Key Topics 1
The OSI and TCP/IP Models 1
OSI Layers 2
TCP/IP Layers and Protocols 3

Study Resources 4

Day 30: TCP/IP Layer Functions 5

CCST Networking 100-150 Exam Topic 5


Key Topics 5
The TCP/IP Application Layer 5
The TCP/IP Transport Layer 5
The TCP/IP Internet Layer 6
The TCP/IP Network Access Layer 7
Study Resources 8

Day 29: Data Encapsulation 9

CCST Networking 100-150 Exam Topic 9


Key Topics 9
Data Encapsulation Summary 9
Encapsulating in Tunnels 10
Study Resources 11

Day 28: Measuring Network Performance 13

CCST Networking 100-150 Exam Topic 13


Key Topics 13
Bandwidth, Throughput, and Goodput 13
Bandwidth 13
Throughput 13
Goodput 14
End-to-End Bandwidth 14

Sources of Delay 15
Physical Path Length 15
Serialization Delay 15
ix  

Queueing Delay 15
Jitter 15

Speed Tests 16
The iPerf Tool 17

Study Resources 20

Day 27: Network Topologies 21

CCST Networking 100-150 Exam Topic 21


Key Topics 21
LANs and WANs 21
LANs 21
LAN Topologies 21
WANs 22
WAN Topologies 23
Physical and Logical Topologies 24

Topology Variations 26
Small Office/Home Office (SOHO) 26
SOHO Routers 27

Hierarchical Campus Design 27


Study Resources 29

Day 26: Cloud Computing 31

CCST Networking 100-150 Exam Topic 31


Key Topics 31
On-Premises Computing 31
Cloud Computing 32
Cloud Computing Services 33
Server Virtualization 34
Study Resources 36

Day 25: Transport Protocols 37

CCST Networking 100-150 Exam Topic 37


Key Topics 37
TCP and UDP 37
TCP Header 38
Port Numbers 38
Error Recovery 39
x 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

Flow Control 40
Connection Establishment and Termination 40
UDP 41

Study Resources 42

Day 24: FTP, NTP, and ICMP 43

CCST Networking 100-150 Exam Topic 43


Key Topics 43
File Transfer Protocols 43
FTP 43
SFTP 45
TFTP 46

NTP 46
NTP Configuration and Verification 47

Internet Control Message Protocol (ICMP) 48


ICMPv4 and ICMPv6 48
Ping and Traceroute 49
ICMPv6 Messages 51
RA Message 51
RS Message 51
NS Message 52
NA Message 52

Study Resources 53

Day 23: HTTP, DHCP, and DNS 55

CCST Networking 100-150 Exam Topic 55


Key Topics 55
HTTP 55
HTTP Operation 56

DHCP 57
DHCPv4 58
DHCPv6 58
SLAAC 58
Stateless and Stateful DHCPv6 Operation 60

DNS Operation 61
Study Resources 62
xi  

Day 22: Private Addressing and NAT 63

CCST Networking 100-150 Exam Topic 63


Key Topics 63
Private Addressing 63
Reserved Addresses 63

NAT Concepts 64
A NAT Example 66
Dynamic and Static NAT 66
NAT Overload 67
NAT Benefits 68
NAT Limitations 68

Study Resources 68

Day 21: IPv4 Addressing 69

CCST Networking 100-150 Exam Topic 69


Key Topics 69
IPv4 Addressing 69
Header Format 69
Classes of Addresses 70
Purpose of the Subnet Mask 71

Subnetting in Four Steps 72


Determine How Many Bits to Borrow 72
Determine the New Subnet Mask 73
Determine the Subnet Multiplier 74
List the Subnets, Host Ranges, and Broadcast Addresses 74
Subnetting Example 1 74
Subnetting Example 2 75
Subnetting Example 3 75

Study Resources 76

Day 20: IPv6 Addressing 77

CCST Networking 100-150 Exam Topic 77


Key Topics 77
Overview and Benefits of IPv6 77
The IPv6 Protocol 78
IPv6 Address Types 79
Unicast 80
Global Unicast Address 80
Link-Local Address 82
xii 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

Loopback Address 83
Unspecified Address 83
Unique Local Address 84
IPv4 Embedded Address 84
Multicast 85
Assigned Multicast 85
Solicited-Node Multicast 86
Anycast 87

Representing the IPv6 Address 88


Conventions for Writing IPv6 Addresses 88
Conventions for Writing IPv6 Prefixes 88

Migration to IPv6 89
Study Resources 90

Day 19: Cables and Connectors 91

CCST Networking 100-150 Exam Topic 91


Key Topics 91
Network Media Forms and Standards 91
Copper Cabling 93
Unshielded Twisted Pair (UTP) 94
Shielded Twisted Pair (STP) 95
Coaxial Cable 95

UTP Cabling Standards and Connectors 96


UTP Categories 96
UTP Connectors 97
Straight-through and Crossover UTP Cables 97

Fiber-Optic Cabling 98
Types of Fiber Media 98
Single-Mode Fiber (SMF) 99
Multimode Fiber (MMF) 99
Fiber-Optic Connectors 100
Fiber Patch Cords 101
Fiber versus Copper 104

Study Resources 104

Day 18: Wireless Technologies 105

CCST Networking 100-150 Exam Topic 105


Key Topics 105
Wi-Fi 105
RF Spectrum 105
xiii  

Channels 105
802.11 Standards 107
Wireless Interference 108
Wi-Fi Networks 109

Cellular Networks 110


5G Cellular Network Components 110
Radio Access Network (RAN) 111
Mobile Core 111
Advantages and Disadvantages of Cellular Networks 111

Study Resources 112

Day 17: Endpoint Devices 113

CCST Networking 100-150 Exam Topic 113


Key Topics 113
Hosts 113
Sending a Packet 114
Virtual Hosts 114

Mobile Devices 116


Early Developments 116
The Advent of Mobile Phones 116
The Smartphone Era 116
Tablets and Phablets 117
Operating Systems 117

Internet of Things 117


Study Resources 119

Day 16: Configure PC and Mobile Access 121

CCST Networking 100-150 Exam Topic 121


Key Topics 121
Windows 121
The Settings App 121
The Control Panel 122
The Command Line 124
Verifying Connectivity 127

Linux 129
Verifying Connectivity 130

Finding Your Public IP Address 132


macOS 132
xiv 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

Mobile Devices 134


Verify Connectivity 135
iOS 135
Android 135

Study Resources 138

Day 15: Device Status Lights 139

CCST Networking 100-150 Exam Topic 139


Key Topics 139
Cisco Device Link Lights 139
Study Resources 141

Day 14: Connecting Cables 143

CCST Networking 100-150 Exam Topic 143


Key Topics 143
Networking Icons 143
Switches 143
Access Layer Switches 144
Distribution Layer Switches 145
Core Layer Switches 145

LAN Device Connection Guidelines 145


Physical and Logical Topologies 146
Topology Examples 147
Physical Topology Example 147
Logical Topology Example 148

Cable Management 149


Study Resources 150

Day 13: Device Ports 151

CCST Networking 100-150 Exam Topic 151


Key Topics 151
Cisco 4461 ISR Ports 151
Fixed Ports and NIMs 151
SM-X Slots 153

Study Resources 154


xv  

Day 12: Routing Concepts 155

CCST Networking 100-150 Exam Topic 155


Key Topics 155
Packet Forwarding 155
Path Determination and Switching Function Example 156

Routing Methods 157


Classifying Dynamic Routing Protocols 158
IGP and EGP 159
Distance Vector Routing Protocols 159
Link-State Routing Protocols 159
Classful Routing Protocols 160
Classless Routing Protocols 160

Dynamic Routing Metrics 160


Administrative Distance 161
IGP Comparison Summary 163
Routing Loop Prevention 163
Link-State Routing Protocol Features 164
Building the Link-State Database 164
Calculating the Dijkstra Algorithm 165
Convergence with Link-State Protocols 166

Study Resources 167

Day 11: Switching Concepts 169

CCST Networking 100-150 Exam Topic 169


Key Topics 169
Evolution to Switching 169
Switching Logic 170
Collision and Broadcast Domains 171
Frame Forwarding 171
Switch Forwarding Methods 171
Symmetric and Asymmetric Switching 172
Memory Buffering 172
Layer 2 and Layer 3 Switching 172

VLAN Concepts 172


Traffic Types 173
Types of VLANs 174
Voice VLAN Example 175

Study Resources 175


xvi 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

Day 10: Troubleshooting and Help Desks 177

CCST Networking 100-150 Exam Topic 177


Key Topics 177
Troubleshooting Methodology Overview 177
Structured Troubleshooting Methods 178

Help Desks 180


Policies and Procedures 180
Prioritization and Escalation 180
Ticketing Systems 181

Study Resources 183

Day 9: Wireshark 185

CCST Networking 100-150 Exam Topic 185


Key Topics 185
Wireshark Overview 185
Features 185
Who Uses Wireshark? 186

Wireshark Packet Capture 186


Download and Install Wireshark 186

Save a Packet Capture 187


Open a Packet Capture 189
Study Resources 189

Day 8: Diagnostic Commands 191

CCST Networking 100-150 Exam Topic 191


Key Topics 191
IP Diagnostic Commands 191
The ipconfig Command 191
The ifconfig Command 194
The ip Command 195
The ip addr Command 195
The ip addr add Command 196
The ip route Command 197
The ip neigh Command 197

The ping Command 197


The tracert Command 201
The nslookup Command 203
Study Resources 204
xvii  

Day 7: Device Management 205

CCST Networking 100-150 Exam Topic 205


Key Topics 205
Remote Access 205
RDP 205
SSH 206
Telnet 207

Virtual Private Networks (VPNs) 207


Windows VPN Configuration 207
Scripting a VPN Connection 207

Terminal Emulators 208


Consoles 209
Network Management Systems 210
NMS Functions 210
Network Management Tools 211
Simple Network Management Protocol (SNMP) 211
Command-Line Interfaces (CLI) 211
REST APIs 211
Syslog 211
NetFlow 211

Network Cloud Management Using Meraki 211


Meraki Dashboard Features 212
APIs and Advanced Control 212

Study Resources 213

Day 6: Show Commands 215

CCST Networking 100-150 Exam Topic 215


Key Topics 215
Cisco IOS Help Facility 215
Command Auto-Complete 216
Privilege Levels 216
Cisco Discovery Protocol (CDP) 218
Common show Commands 219
The show ip interface brief Command 226

Study Resources 226


xviii 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

Day 5: Firewalls 227

CCST Networking 100-150 Exam Topic 227


Key Topics 227
Firewall Devices 227
Stateless Firewalls 227
Stateful Firewalls 229
Application Gateway Firewalls 229
Next-Generation Firewalls 229
Cisco IOS Firewall Configuration Example 230

Host-Based Firewalls 231


Windows Defender Firewall 231
iptables 232
nftables 232
TCP Wrappers 233

Study Resources 233

Day 4: Threats, Vulnerabilities, and Attacks 235

CCST Networking 100-150 Exam Topic 235


Key Topics 235
Security Fundamentals 235
Security Terms 235
Data Exfiltration 236
Penetration Testing Tools 236
Attack Types 237
Types of Malware 238

Network Attacks 239


Reconnaissance Attacks 239
Access Attacks 240
Social Engineering Attacks 240
DoS and DDoS Attacks 241
IP Attacks 241
Transport Layer Attacks 242

Study Resources 243

Day 3: Security Protocols and Practices 245

CCST Networking 100-150 Exam Topic 245


Key Topics 245
Security Fundamentals 245
The Cybersecurity Cube 245
Security Principles 245
xix  

Data States 246


Safeguards 246
The CIA Triad 247
Confidentiality 248
Integrity 248
Availability 249

Access Control 249


Types of Access Control 249
Physical Access Control 249
Logical Access Control 249
Administrative Access Control 249
Authentication, Authorization, and Accounting (AAA) 250
Authentication 250
Authorization 250
Accounting 250

Identity Stores 251


AD Functions 251
AD Key Components 251

Security Program 251


Study Resources 252

Day 2: Secure Wireless Access 253

CCST Networking 100-150 Exam Topic 253


Key Topics 253
Wireless Attacks and Security 253
DoS Attacks 253
Rogue Access Points 254
Man-in-the-Middle Attack 254
SSID Cloaking 255
MAC Addresses Filtering 255
Shared Key Authentication Methods 256
Authenticating a Home User 256
Encryption Methods 257

Home Router Configuration 258


Log in to the Wireless Router 258
Basic Network Setup 259
Step 1: Log in to the router from a web browser. 259
Step 2: Change the default administrative password. 259
Step 3: Log in with the new administrative password. 260
Step 4: Change the default DHCP IPv4 addresses. 261
Step 5: Renew the IP address. 262
Step 6: Log in to the router with the new IP address. 262
xx 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

Basic Wireless Setup 262


Step 1: View the WLAN defaults. 262
Step 2: Change the network mode. 263
Step 3: Configure the SSID. 264
Step 4: Configure the channel. 264
Step 5: Configure the security mode. 264
Step 6: Configure the passphrase. 266
Step 7: Verify connectivity for devices connected to the router. 266

Study Resources 266

Day 1: Review and Practice 267

Configure a Home Network 267


Instructions 267

Exam Day 269

What You Need for the Exam 269


What You Should Receive After Completion 270
Summary 270

Post-Exam Information 271

Receiving Your Certificate and Badge 271


Determining Career Options 271
Examining Certification Options 272
If You Did Not Pass the Exam 272
Summary 272

CCST Networking Countdown Calendar 273

Exam Checklist 275

Index 279
xxi  

Icons Used in This Book

Access Point Switch Router Printer Clock

Server WWW Server ASA 5500 Phone Laptop

File Server Cisco Nexus 1000 Cloud Firewall Terminal

Command Syntax Conventions


The conventions used to present command syntax in this book are the same conventions used in
the IOS Command Reference. The Command Reference describes these conventions as follows:
nn Boldface indicates commands and keywords that are entered literally as shown. In actual con-
figuration examples and output (not general command syntax), boldface indicates commands
that are manually input by the user (such as a show command).
nn Italic indicates arguments for which you supply actual values.
nn Vertical bars (|) separate alternative, mutually exclusive elements.
nn Square brackets ([ ]) indicate an optional element.
nn Braces ({ }) indicate a required choice.
nn Braces within brackets ([{ }]) indicate a required choice within an optional element.
xxii 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

Introduction
If you’re reading this introduction, you’ve probably already spent a considerable amount of time and
energy pursuing your CCST Networking certification. Regardless of how you got to this point
in your travels through your studies, 31 Days Before Your Cisco Certified Support Technician (CCST)
Networking 100-150 Exam most likely represents the last leg of your journey on your way to the
destination: to become a Cisco Certified Support Technician in Networking. However, if you are
like me, you might be reading this book at the beginning of your studies. If so, this book provides an
excellent overview of the material you must now spend a great deal of time studying and practicing.
But I must warn you: unless you are extremely well-versed in networking technologies and have
considerable experience supporting networks, this book will not serve you well as the sole resource
for your exam preparations. Therefore, let me spend some time discussing my recommendations for
study resources.

Study Resources
Cisco Press and Pearson IT Certification offer an abundance of networking-related books to serve
as your primary source for learning how to install, configure, operate, and troubleshoot small to
medium-size routed and switched networks.

Safari Books Online


All the resources I reference in the book are available with a subscription to Safari Books Online
(https://www.safaribooksonline.com). If you don’t have an account, you can try it free for ten days.

Primary Resources
First on the list must be Russ White’s Cisco Certified Support Technician CCST Networking 100-150
Official Cert Guide 1st Edition (ISBN: 9780138213428). If you do not buy any other books, buy this
one. Russ’s method of teaching, combined with his technical expertise and down-to-earth style, is
unsurpassed in our industry. As you read through his book, you sense that he is sitting right there
next to you walking you through the material. With your purchase, you get access to practice exams
and study materials and other online resources that are worth the price of the book. There is no
better resource on the market for a CCST Networking candidate.

If you are a Cisco Networking Academy student, you are blessed with access to the online version
of the Networking Essentials version 3 curriculum and the wildly popular Packet Tracer network
simulator. However, this content is also available for free to anyone who signs up at https://skills-
forall.com. After registering and logging in, look for the Network Technician Career Path
(https://skillsforall.com/career-path/network-technician). Here, you can gain access to the
following four mini-courses that add up to 70 hours of training:
nn Networking Basics
nn Networking Devices and Initial Configuration
nn Network Addressing and Basic Troubleshooting
nn Network Support and Security
xxiii  

You can also buy Networking Essentials Companion Guide v3: Cisco Certified Support Technician
(CCST) Networking 100-150, Second Edition (ISBN: 978-0-13-832133-8), which maps to both the
Networking Essentials version 3 instructor-led online course and the four self-enroll mini-courses.
You might also consider purchasing Networking Essentials Lab Manual v3: Cisco Certified Support
Technician (CCST) Networking 100-150, 2nd Edition (ISBN: 9780138293727). You can find these
books at http://www.ciscopress.com by clicking the Cisco Networking Academy link.

The Cisco Learning Network


Finally, if you have not done so already, you should register with The Cisco Learning Network at
https://learningnetwork.cisco.com. Sponsored by Cisco, The Cisco Learning Network is a free
social learning network where IT professionals can engage in the common pursuit of enhancing and
advancing their IT careers. Here, you can find many resources to help you prepare for your CCST
Networking exam, in addition to a community of like-minded people ready to answer your ques-
tions, help you with your struggles, and share in your triumphs.

So which resources should you buy? The answer to that question depends largely on how deep
your pockets are or how much you like books. If you’re like me, you must have it all! I admit it; my
bookcase is a testament to my Cisco “geekness.” Whatever you choose, you will be in good hands.
Any or all of these resources will serve you well.

Goals and Methods


The main goal of this book is to provide you with a clear and succinct review of the CCST
Networking objectives. Each day, we will review an exam topic, starting with the first one and
proceeding through the list objectives until they are all covered. Each day is structured using the
following format:
nn A title for the day that concisely states the overall topic
nn A list of one or more CCST Networking 100-150 exam topics to be reviewed
nn A “Key Topics” section to introduce the review material and quickly orient you to the day’s
focus
nn An extensive review section consisting of short paragraphs, lists, tables, examples, and graphics
nn A “Study Resources” section to give you a quick reference for locating more in-depth treat-
ment of the day’s topics

The book counts down starting with Day 31 and continues through exam day to provide post-test
information. Inside this book is also a calendar and checklist that you can tear out and use during
your exam preparation.

Use the calendar to enter each actual date beside the countdown day and the exact day, time, and
location of your CCST Networking exam. The calendar provides a visual for the time you can
dedicate to each exam topic.

The checklist highlights important tasks and deadlines leading up to your exam. Use it to help you
map out your studies.
xxiv 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

Who Should Read This Book?


The audience for this book is anyone finishing preparation for taking the CCST Networking
100-150 exam. A secondary audience is anyone needing a refresher review of CCST Networking
exam topics, possibly as a review before attempting to sit for another certification for which the
CCST Networking exam topics provide a foundation.

Getting to Know the CCST Networking 100-150


Exam
Cisco announced the current CCST Networking 100-150 exam in January 2023. This certification
is aimed at entry-level network technicians, networking students, and interns. It tests foundational
knowledge and skills in network operation, including the understanding of devices, media, and pro-
tocols vital for network communication. This certification serves as an entry point into the Cisco
certification program, with CCNA being the next level. The exam is targeted toward secondary and
post-secondary students, as well as entry-level IT and Networking professionals. To qualify, candi-
dates should have a minimum of 150 hours of instruction and hands-on experience, and successful
candidates will be recognized as qualified entry-level network technicians and customer support
technicians.

To earn your certification, you must pass a 50-minute exam composed of 35 to 50 questions.
Certiport has an exam tutorial here:

https://certiport.pearsonvue.com/Educator-resources/Exam-details/Exam-tutorials/
Cisco_Tutorial.pdf

If that link doesn’t work, be sure to register at https://www.certiport.com and then look for the
exam tutorials link. One of the nice features of the CCST Networking exam is that you can move
forward and back through test items, changing your answers if desired, before the exam ends or you
select Finish.

What Topics Are Covered on the CCST Networking Exam


The six domains of the CCST Networking 100-150 exam are as follows:
nn 1.0 Standards and Concepts
nn 2.0 Addressing and Subnet Formats
nn 3.0 Endpoints and Media Types
nn 4.0 Infrastructure
nn 5.0 Diagnosing Problems
nn 6.0 Security

Although Cisco outlines general exam topics, not all topics might appear on the CCST Networking
exam; likewise, topics that are not specifically listed might appear on the exam. The exam topics that
Cisco provides and this book covers are a general framework for exam preparation. Be sure to check
Cisco’s website for the latest exam topics.
xxv  

Purchase an Exam Voucher and Schedule Your Exam


If you are starting 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150
Exam today, register with Certiport (https://www.certiport.com) and purchase your exam voucher
right now. Next, use Certiport’s locator to find a testing center (https://www.certiport.com/
locator). Many testing centers provide remote testing in your chosen space. In my testing experi-
ence, there is no better motivator than a scheduled test date staring me in the face. I’m willing to
bet the same holds true for you. So, if you’re ready, gather the following information and register
right now!
nn Legal name
nn Social Security or passport number
nn Company name
nn Valid email address
nn Method of payment

You can schedule your exam at any time. I recommend that you schedule it for 31 days from now.
The process and available test times vary based on the local testing center you choose.

Remember, there is no better motivation for study than an actual test date. Sign up today.
xxvi 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

Credits
Figures 2.3–2.6, 2.8–2.19: Linksys Holdings

Figures 5.4, 7.1, 7.2, 16.1–16.5: Microsoft Corporation

Figure 7.3: PuTTY

Figures 9.1- 9.3: Wireshark Foundation

Figure 14.5a: Wavebreakmedia/Shutterstock

Figure 14.5b: WhiteYura/Shutterstock

Figure 16.6: The Linux Foundation

Figures 16.7, 16.8, 16.10: Apple Inc

Figures 16.9, 16.11: Google LLC

Figure 19.1a: Galushko Sergey/Shutterstock

Figure 19.1b: ZayacSK/Shutterstock

Figure 19.1c: Ra3rn/Shutterstock

Figure 19.4b: Monte_a/Shutterstock

Figure 19.4c: Nattapan72/Shutterstock

Figure 19.4d: Darkroom Graphic/Shutterstock

Figure 19.5a: Peter Kotoff/Shutterstock

Figure 19.5b: Rogerutting/123RF

Figure 19.6a: Shaffandi/123RF

Figure 19.6b: Shahril KHMD/Shutterstock

Figure 19.10: Datskevich Aleh/Shutterstock


Figure 19.11: tom_tom_13/Shutterstock

Figure 19.12: Artush/123RF

Figure 19.13: Horvathta/Shutterstock

Figure 19.15: Suyanawut/123RF

Figures 19.14, 19.16, 19.17: Andrey Renteev/Shutterstock

Figures 28.5, 28.6: Ookla, LLC


Day 28
Measuring Network Performance

CCST Networking 100-150 Exam Topic


nn 1.2. Differentiate between bandwidth and throughput.
nn Latency, delay, speed test vs. iPerf

Key Topics
Today’s review focuses on the different measurements for network performance, the sources of
delay, testing network performance online, and testing network performance using the Windows
iPerf tool.

Bandwidth, Throughput, and Goodput


There are three basic measurements for network performance: bandwidth, throughput, and goodput.

Bandwidth
Bandwidth is determined by the medium’s physical properties and is measured in bits per second.
For example, 10GBASE-T Ethernet has a maximum capacity of 10Gbps (gigabits per second). The
available bandwidth of a connection is how Internet service providers (ISPs) advertise and charge
for their services.

Throughput
Throughput is the actual rate of data transfer across the network and will be less than the band-
width. This is because there is overhead on the link, such as routing protocols, Layer 2 minimum
frame sizes (Ethernet), network congestion, and more.

Another important reason that throughput is less than bandwidth is because network engineers
want to ensure the link has enough capacity to adjust to new demand bursts. For example, in
Figure 28-1, Application 4 might not be able to start if the other three applications are consuming
closer to 100% of the link’s capacity. For this reason, it is common for network designers to consider
a link at 80% bandwidth utilization as full utilization.
14 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

Figure 28-1 Providing Enough Bandwidth for Another Application to Start

100%

Application 4

80%

Application 3

Application 2

Application 1

Goodput
Although less commonly mentioned, goodput is the measure of the actual payload of data that is
transmitted across the network. Goodput will always be less than throughput because every data
packet contains fields of overhead. For example, Ethernet has a 20-byte header and IPv6 has a
40-byte header. In addition, there will always be a small number of errors in data transmission where
packets must be recent.

End-to-End Bandwidth
The bandwidth of an end-to-end path is limited by the lowest bandwidth link along the path. For
example, a 1Gbps local link does not guarantee 1Gbps to all destinations. In Figure 28-2, Host
A will have an end-to-end bandwidth of 1Gbps to Server E. However, Host A will be limited to
100Mbps to Server G and 10Mbps to Server H.

Figure 28-2 Lowest Bandwidth Link Determines End-to-End Bandwidth

1Gbps E

1Gbps C
B
A
1Gbps 100Mbps
F 1Gbps
G
100Mbps

D 10Mbps

H
Day 28 15  

Sources of Delay
Delay is the time it takes for a packet to travel from source to destination. Sources of delay include
the following:
nn The physical path length
nn The time it takes to transmit data onto the wire (serialization delay)
nn Queueing when there is congestion between the source and destination
nn Jitter, which is the measure of difference in delay between packets

Physical Path Length


Physical path length is the actual distance that packets need to travel from the source to the destina-
tion. The physical path length is a fundamental factor in determining delay, as it contributes to the
overall time it takes for a signal to traverse the distance. In general, longer physical paths result in
higher delays.

Serialization Delay
Serialization delay refers to the time it takes to convert digital data into a stream of bits and transmit
it onto the network. This process involves encoding the data and sending it out as a series of bits, as
shown for the 8 bits in Figure 28-3.

Figure 28-3 Converting Digital Bits to the Physical Medium

Bit 8
Physical
Bit 8

Bit 7
Bit 6

Bit 4
Bit 7

Bit 2

Bit 1
Bit 3
Bit 5

Interface
Bit 6
Bit 5
Octet in Memory

Bit 4
Bit 3
Bit 2
Bit 1

Queueing Delay
Queueing delay occurs when there is congestion or contention for resources within the network.
When multiple packets are trying to traverse the same network link simultaneously, they may have
to wait in a queue before they can be transmitted. This queueing delay is directly related to network
traffic and the network’s capacity. Higher levels of congestion lead to longer queueing delays.

Jitter
Jitter is the measure of variation in delay between packets. In an ideal network, packets would
all arrive at the destination with consistent and predictable delays, as shown for the top row of
packets in Figure 28-4. However, in real-world networks, factors such as varying traffic loads,
16 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

different routing paths, and queueing delays can introduce variation in the arrival times of packets,
as shown in the bottom row of packets in Figure 28-4.

Figure 28-4 An Example of Equally Spaced and Jittered Packets

Equally spaced packets

P1 P2 P3 P4 P5 P6
A B
P1 P2 P3 P4 P5 P6

Jittered packets

Jitter can be a significant issue in real-time applications like Voice over Internet Protocol (VoIP) or
video streaming applications, where consistent timing is essential. To mitigate jitter, network engi-
neers often use techniques like quality of service (QoS) to prioritize certain types of traffic and
reduce variability in delay.

Speed Tests
It’s relatively easy for you to test the speed of your personal Internet connections. A quick Internet
search will reveal several ad-supported sites that provide this service for free. Speed tests measure the
throughput of your link. Specifically, they measure the throughput between you and the destination
server that the speed test chooses for your test. Some speed tests, such as the one provided by Ookla,
allow you to change the destination server, as shown in Figure 28-5.

Figure 28-5 Example of a Web-Based Speed Test by Ookla


Day 28 17  

Ookla also has an app you can use to test the throughput of your cellular bandwidth, as shown in
Figure 28-6.

Figure 28-6 Ookla’s Mobile App Speedtest

The iPerf Tool


Although there are a variety of other tools you could download for measuring your network’s per-
formance, the CCST-Networking exam specifically calls out the iPerf tool. As of this writing, iPerf
is in version 3 and can be downloaded for all the major operating systems at https://iperf.fr.
18 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

Example 28-1 shows the iPerf tool running on a Windows machine, testing the connection to a
public iPerf server in Dallas.

Example 28-1 Output from the iPerf Windows Tool

C:\tools\iperf-3.1.3-win32> iperf3 -c dal.speedtest.clouvider.net


Connecting to host dal.speedtest.clouvider.net, port 5200
[ 4] local 192.168.68.106 port 61680 connected to 2.56.188.136 port 5200
[ ID] Interval Transfer Bandwidth
[ 4] 0.00-1.00 sec 441 KBytes 3.60 Mbits/sec
[ 4] 1.00-2.00 sec 756 KBytes 6.19 Mbits/sec
[ 4] 2.00-3.01 sec 756 KBytes 6.18 Mbits/sec
[ 4] 3.01-4.00 sec 693 KBytes 5.68 Mbits/sec
[ 4] 4.00-5.00 sec 756 KBytes 6.20 Mbits/sec
[ 4] 5.00-6.00 sec 756 KBytes 6.19 Mbits/sec
[ 4] 6.00-7.00 sec 756 KBytes 6.21 Mbits/sec
[ 4] 7.00-8.00 sec 756 KBytes 6.20 Mbits/sec
[ 4] 8.00-9.01 sec 819 KBytes 6.62 Mbits/sec
[ 4] 9.01-10.01 sec 819 KBytes 6.71 Mbits/sec
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval Transfer   Bandwidth
[ 4] 0.00-10.01 sec 7.14 MBytes 5.98 Mbits/sec sender
[ 4] 0.00-10.01 sec 7.14 MBytes 5.98 Mbits/sec receiver

iperf Done.

C:\tools\iperf-3.1.3-win32>

NOTE You can easily find available iPerf public servers by doing an Internet search. The
server chosen for Example 28-1 was found at https://github.com/R0GGER/public-iperf3-
servers.

In Example 28-1, the number of kilobytes of data being transferred is measured every second. This
value is then converted into the number of bits per second. After 10 seconds, we can see that the
average throughput is 5.98Mbps for both the sender and the receiver.

Be sure you review the documentation for iPerf at https://iperf.fr/iperf-doc.php and practice differ-
ent command-line options, including the following:
nn -s sets the device to run in server mode.
nn -t changes the amount of time in seconds to something other than the default 10 seconds.
nn -w can be used to set the TCP window size.
nn -4 or -6 indicate to only use IPv4 or IPv6, respectively.

Example 28-2 shows all the available options for iPerf on Windows.
Day 28 19  

Example 28-2 Windows iPerf Options

C:\tools\iperf-3.1.3-win32> iperf3 -h
Usage: iperf [-s|-c host] [options]
iperf [-h|--help] [-v|--version]

Server or Client:
-p, --port # server port to listen on/connect to
-f, --format [kmgKMG] format to report: Kbits, Mbits, KBytes, MBytes
-i, --interval # seconds between periodic bandwidth reports
-F, --file name xmit/recv the specified file
-B, --bind <host> bind to a specific interface
-V, --verbose more detailed output
-J, --json output in JSON format
--logfile f send output to a log file
-d, --debug emit debugging output
-v, --version show version information and quit
-h, --help show this message and quit
Server specific:
-s, --server run in server mode
-D, --daemon run the server as a daemon
-I, --pidfile file write PID file
-1, --one-off handle one client connection then exit
Client specific:
-c, --client <host> run in client mode, connecting to <host>
-u, --udp use UDP rather than TCP
-b, --bandwidth #[KMG][/#] target bandwidth in bits/sec (0 for unlimited)
   (default 1 Mbit/sec for UDP, unlimited for TCP)
  (optional slash and packet count for burst mode)
-t, --time # time in seconds to transmit for (default 10 secs)
-n, --bytes #[KMG]   number of bytes to transmit (instead of -t)
-k, --blockcount #[KMG]     number of blocks (packets) to transmit
(instead of -t or -n)
-l, --len #[KMG] length of buffer to read or write
  (default 128 KB for TCP, 8 KB for UDP)
--cport <port> bind to a specific client port (TCP and UDP,
default: ephemeral port)
-P, --parallel # number of parallel client streams to run
-R, --reverse      run in reverse mode (server sends, client receives)
-w, --window #[KMG]        set window size / socket buffer size
-M, --set-mss #       set TCP/SCTP maximum segment size (MTU - 40 bytes)
-N, --no-delay set TCP/SCTP no delay, disabling Nagle's Algorithm
-4, --version4 only use IPv4
-6, --version6 only use IPv6
20 31 Days Before Your Cisco Certified Support Technician (CCST) Networking 100-150 Exam

-S, --tos N set the IP 'type of service'


-Z, --zerocopy use a 'zero copy' method of sending data
-O, --omit N omit the first n seconds
-T, --title str prefix every output line with this string
--get-server-output get results from server
--udp-counters-64bit use 64-bit counters in UDP test packets

[KMG] indicates options that support a K/M/G suffix for kilo-, mega-, or giga-

iperf3 homepage at: http://software.es.net/iperf/


Report bugs to: https://github.com/esnet/iperf

C:\tools\iperf-3.1.3-win32>

If you want to test the performance in your own network, download iPerf on the computer that
will receive the iPerf packets. Use the -s option to start an iPerf server, as shown in Example 28-3.

Example 28-3 iPerf Running in Server Mode

C:\tools\iperf-3.1.3-win32> iperf3 -s
-----------------------------------------------------------
Server listening on 5201
-----------------------------------------------------------

NOTE You will most likely need to configure a rule on your local firewalls to allow iPerf
traffic.

Study Resources
For today’s exam topics, refer to the following resources for more study:

Resource Module or Chapter


SFA Self Enroll: Networking Basics 1
SFA Self Enroll: Network Support and Security 1
SFA Instructor Led: Networking Essentials 1, 37
CCST Networking 100-150 Official Cert Guide 9

NOTE SFA: https://skillsforall.com/


This page intentionally left blank
Index
Symbols SSH, 206
Telnet, 207
? command, 215 TCP Wrappers, 233
wireless security
attacks (overview), 253
Numbers basic setups, 262–266
3–1-4 (pi) rule, 80 DoS attacks, 253–254
5G cellular networks, 109–110 encryption, 257
home router configurations, 258
802.11 standards, 107–108
home user authentication, 256–257
MAC address filtering, 255–256
A MITM attacks, 254–255
passphrases, 266
AAA (Authentication, Authorization, rogue AP, 254
Accounting), 250 shared key authentication, 256
accounting, 250 SSID cloaking, 255
authentication, 250 verifying connectivity/access, 266
authorization, 250 WEP, 256
access wireless router logins, 258–259
ACL, 250 WPA, 256, 257
attacks, 240 WPA2, 256–257
controlling, 248 WPA3, 256
administrative access control, 249–250 access layer switches, 144
logical access control, 249 accounting, 250
physical access control, 249, 252
ACL (Access Control Lists), 250
home routers, 267–268
HTTPS connectivity/access, Linux, AD (Active Directory), 251
131–132 administration, 251
improper access control as a data loss authentication, 251
vector, 236 authorization, 251
network connectivity components of, 251
access layer switches, 144 directory services, 251
Android, 135–137 domains, 251
cable management, 149–150 forests, 251
core layer switches, 145 functions, 251
distribution layer switches, 145 OU, 251
iOS, 134–136 trees, 251
LAN device connectivity guidelines, AD (Administrative Distance),
145–146 161–163
Linux, 129–132 address classes, IPv4 addressing, 70–71
logical topologies, 24–25, 147, 148–149 address resolution, solicited-node
macOS, 132–134 multicast addresses, 86
mobile devices, 134–137
address spoofing attacks, 242
networking icons, 143–144
physical topologies,24–25, 146, 147–148 addressing schemes, subnetting, 74
switches, overview, 143 administration
Windows 11, 121–128 access control, 249–250
remote access AD, 251
RDP, 205 adware, 238
280 AES (Advanced Encryption Standard)

AES (Advanced Encryption shoulder surfing, 241


Standard), 257 sniffer attacks, 238
algorithms, hashing, 248 social engineering attacks, 240–241
All People Seem To Need Data “something for something” (quid pro
Processing memorization technique, quo), 241
OSI model, 3 spam, 241
spear phishing, 240
amplification/reflection attacks, 242
spoofing attacks, 237, 240, 242
ANDing, IPv4 addressing, 71 tailgating, 241
Android OS, 117, 134–137 TCP
anycast addresses, 87 reset attacks, 242
AP (Access Points) session hijacking, 242
rogue AP, 254 TCP SYN f lood attacks, 242
SSID cloaking, 255 transport layer attacks, 242–243
trust exploitation attacks, 240
application gateway (proxy) firewalls,
UDP f lood attacks, 243
229–230
audit trails, 248
application layer
OSI model, 2 authentication, 250
TCP/IP model, 3, 5 AD, 251
home users, 256–257
ARP (Address Resolution Protocol)
MFA, 250
arp -a command, 125–126
shared key authentication, 256
caches, viewing in Windows 11, 125–126
WEP, 256
show arp command, 219, 222
WPA, 256, 257
tables, viewing, 197
WPA2, 256–257
assets, security, 235 WPA3, 256
assigned multicast addresses, 85–86 authorization, 250, 251
asymmetric switching, 172 auto-completing commands, 216
attacks automating VPN connections, 207–208
access attacks, 240
auxiliary ports, Cisco 4461 ISR, 152
amplification/ref lection attacks, 242
baiting, 241 availability, CIA Triad, 245, 249
buffer overf low attacks, 240 awareness, security, 251
compromised key attacks, 238
data modification attacks, 237
DDoS attacks, 241 B
DoS attacks, 238, 241, 253–254 badges (certification), receiving, 271
dumpster diving, 241 baiting, 241
eavesdropping attacks, 237
bandwidth, 13, 14
ICMP attacks, 242
impersonation, 241 basic network setups, 259–262
IP attacks, 241–242 billing systems, security, 250
MITM attacks, 238, 240, 242, 254–255 binary values, subnetting
overview, 253 octet binary values, 73
password attacks, 238, 240 subnet masks, 72
phishing, 240 biometric security, 250
port redirection attacks, 240
bits borrowed, subnetting, 72–73
pretexting, 240
reconnaissance attacks, 239 black hole VLAN, 174
rogue AP, 254 borrowing bits, subnetting, 72–73
session hijacking, 242 bottom-up troubleshooting method, 178
cloud computing 281

broadcast domains, 171 CDP (Cisco Discovery Protocol), 218


buffer overflow attacks, 240 cellular networks, 109–110
Building Your I.T. Career: A Complete Toolkit for certificates, digital, 248
a Dynamic Career in Any Economy, Second certification
Edition (Pearson IT Certification, post-exam options, 272
2013), 271–272 receiving certificates/badges, 271
Certipoint
C in-person CCST exams, 269
remote exams, 269–270
cable management, 91, 149–150 channels, 105–106
advantages of, 92
CIA Triad, 247
coaxial cable, 95–96
availability, 245, 249
copper cable, 92, 93, 104
confidentiality, 245, 248
disadvantages of, 92
defined, 245–246
fiber patch cords, 101–103
integrity, 245, 248
fiber-optic cable, 91, 92, 98
connectors, 100–101 Cisco 4461 ISR, ports, 151
copper cable versus, 104 auxiliary ports, 152
MMF cable, 99 console ports, 152
SMF cable, 98–99 fixed ports, 151–153
LAN cabling standards, 92–93 Gigabit Ethernet 0/0/0 and 0/0/1
STP cable, 95 ports, 152
UTP cable, 94–95 Gigabit Ethernet 0/0/2 and 0/0/3
categories, 96–97 ports, 152
connectors, 97 management network ports, 152
crossover UTP cable, 97–98 NIM, 152
straight-through UTP cable, 97–98 SM-X slots, 153–154
Ten Gigabit Ethernet 0/0/4 and 0/0/5
CACT (Certipoint Authorized Testing
ports, 152
Centers), 269
USB ports, 152
calendars, CCST networking
Cisco Certified Support Technician CCST
countdown, 273–274
Networking 100–150 Official Cert Guide
CAN (Campus Area Networks), 26 (Cisco Press, 2023), 272
capturing packets with Wireshark, 186 Cisco IOS
opening captures, 189 firewall configuration example, 230–231
saving captures, 187–189 help facility, 216
career options, determining, 271–272 ? command, 215
CCST networking command syntax help, 215
countdown calendars, 273–274 console error messages, 215–216
exams Word help, 215
after completion, 270 classful routing protocols, 160
career options, 271–272 classless routing protocols, 160
certificates/badges, 271
CLI (Command-Line Interfaces), 211
certification options, 272
checklists, 275–277 cloaking, SSID, 255
failing, 272 cloud computing, 31, 32
in-person exams, 269 advantages of, 32
remote exams, 269–270 community clouds, 34
requirements, 269 disadvantages of, 32
scoring, 270 hybrid clouds, 33
post-exam information, 271–272 Meraki cloud management, 212–213
282 cloud computing

models of, 33–34 privileges


private clouds, 33 levels of, 216–217
public clouds, 33 syntax, 217
server virtualization, 34–35 route print command, 127
services SFTP commands, 45
IaaS, 33 show commands
NIST service characteristics, 33 defined, 219
PaaS (Platform as a Service), 33 show arp command, 219, 222
SaaS, 33 show interface status command, 219, 224
storage as a data loss vector, 236 show interfaces command, 219
workf lows, 33 show inventory command, 219, 225
coaxial cable, 95–96 show ip interface brief command, 226
collision domains, 171 show ip interface command, 219, 221–222
show ip route command, 131, 160–161,
command line (Windows 11), 124–127
219, 222
commands show mac address-table command, 219, 225
? command, 215 show protocols command, 219, 223
arp -a command, 125–126 show running-config command, 219–220
auto-completing commands, 216 show version command, 219, 223–224
Cisco IOS help facility, 216 speedtest command, 131
? command, 215 traceroute command, 49–50
command syntax help, 215 tracert command, 128, 201–203
console error messages, 215–216
community clouds, 34
Word help, 215
curl command, 132 community protocols, security, 248
FTP commands, 43–45 comparison troubleshooting
getmac /v command, 124 method, 179
Get-NetRoute command, 126–127 compromised key attacks, 238
ifconfig command, 194–195 confidentiality, CIA Triad, 245, 248
Linux, 129–130 configuring
macOS, 132–133 Cisco IOS firewalls, example, 230–231
ip addr add command, 196–197 home networks, 267–268
ip addr command, 195–196 home routers, 258
ip address command, 130 IP configuration information, viewing in
ip command, 195 Windows 11, 124–125
ipconfig command, 124–125, 191–194 networks
ip route command, 197 basic setups, 259–262
ipv6 unicast-routing global configuration wireless setups, 262–266
command, 85–86 NTP, 47–48
nc command/Ncat, 131–132 VPN for Windows devices, 207–208
netstat command, 203
connectionless protocols, 37–38, 41
netstat -rn command, 132
networksetup -getinfo <network connection-oriented protocols, 37–38
service> command, 133–134 connectivity
networksetup -listallnetworkservices cable management, 149–150
command, 133–134 coaxial cable, 95–96
nslookup command, 203 copper cable, 91, 92, 93, 104
ping command, 49, 197–200 crosstalk, 93
reconnaissance attacks, 239 EMI, 93
verifying Linux connectivity, 130–131 fiber patch cords, 101–103
verifying Windows 11 connectivity, 127 fiber-optic cable, 91, 92, 98
data storage 283

connectors, 100–101 console error messages, 215–216


copper cable versus, 104 console ports, 152, 209–210
MMF cable, 99 Control Panel (Windows 11), 122–124
SMF cable, 98–99
controlling access, 248
interference, 93, 108–109
administrative access control, 249–250
iOS
logical access control, 249
activating connectivity/access, 134–135
physical access control, 249, 252
verifying connectivity/access, 135–136
LAN device connectivity guidelines, convergence, link-state routing
145–146 protocols, 166–167
Linux copper cable, 91, 92, 93, 104
finding public IP addresses, 132 core layer switches, 145
HTTPS connectivity/access, 131–132 countdown calendars, CCST
verifying connectivity/access, 130–132 networking, 273–274
verifying IP configuration information,
crackers, password, 237
129–130
macOS, verifying configuration CRC (Cyclic Redundancy Checks),
information, 132–134 171–172
mobile devices crossover UTP cable, 97–98
activating connectivity/access, 134–135 crosstalk, 93
verifying connectivity/access, 135–137 curl command, 132
networking icons, 143–144 cut-through switching, 172
RFI, 93
cybersecurity (McCumber) cube, 245
STP cable, 95
CIA Triad, 247
switches
availability, 245, 249
access layer switches, 144
confidentiality, 245, 248
core layer switches, 145
defined, 245–246
distribution layer switches, 145
integrity, 245, 248
overview, 143
data states, 246
TCP connection establishment/
principles of, 245–246
termination, 40–41
safeguards, 246–247
topologies
logical topologies, 24–25, 147, 148–149
physical topologies, 24–25, 146, 147–148 D
UTP cable, 94–95
categories, 96–97 DAD (Duplicate Address Detection), 86
connectors, 97 data encapsulation
crossover UTP cable, 97–98 PDU, 9–10
straight-through UTP cable, 97–98 summary, 9–10
Windows 11 tunnels, 10–11
command line, 124–127 data encryption, 257
Control Panel, 122–124 data exfiltration, 236
PowerShell, 124–127
data link layer, OSI model, 2
Settings app, 121–122
verifying connectivity/access, 127–128 data loss vectors, security, 236
viewing ARP caches, 125–126 data modification attacks, 237
viewing host routing tables, 126–127 data processing, 246
viewing IP configuration information, data states, cybersecurity (McCumber)
124–125 cube, 246
wireless connectivity, 91, 92
data storage, 246
wireless security, verifying, 266
284 data transmission

data transmission, 246 DHCPv6 (Dynamic Host Configuration


data VLAN, 174 Protocol version 6), 58
databases, link-state, 164–165 SLAAC, 58–59
neighbor discovery, 59–60
DDoS attacks, 241
NS messages, 59–60
debuggers, 237 operation of, 60–61
decimal values, subnetting, 73 RA messages, 59
default VLAN, 174 RS messages, 58–59
delays, network performance, 15 stateful operations, 58–61
jitter, 15–16 diagnostic commands, 191
physical path lengths, 15 ifconfig command, 194–195
queueing delays, 15 ip addr add command, 196–197
serialization delays, 15 ip addr command, 195–196
DELETE messages, 56 ip command, 195
ip route command, 197
desktops, RDP, 205
ipconfig command, 191–194
Destination Unreachable messages, 48 netstat command, 203
device management nslookup command, 203
console ports, 209–210 ping command, 49, 197–200
Meraki cloud management, 212–213 tracert command, 128, 201–203
NMS digital certificates, 248
CLI, 211
Dijkstra algorithm, 165–166
defined, 210
functions, 210–211 directly connected routing, 157
NetFlow, 211 directory services, 251
REST API, 211 discovery protocols
SNMP, 211 CDP, 218
Syslog, 211 LLDP, 218
RDP, 205 distance vector protocols, 159
SSH, 206
distribution layer switches, 145
Telnet, 207
terminal emulators, 208–209 divide-and-conquer troubleshooting
VPN, 207 method, 178
device ports, Cisco 4461 ISR, 151 DNS (Domain Name System)
auxiliary ports, 152 operation of, 61–62
console ports, 152 process of, 61–62
fixed ports, 151–153 resource records, 61–62
Gigabit Ethernet 0/0/0 and 0/0/1 URI, 61
ports, 152 domains, AD, 251
Gigabit Ethernet 0/0/2 and 0/0/3 DoS attacks,238, 241, 253
ports, 152 dual-stacking, IPv6 addressing, 89–90
management network ports, 152 dumpster diving, 241
NIM, 152
dynamic NAT, 66–67
SM-X slots, 153–154
Ten Gigabit Ethernet 0/0/4 and 0/0/5 dynamic routing, 157–158
ports, 152 classful routing protocols, 160
USB ports, 152 classless routing protocols, 160
distance vector protocols, 159
device status lights, 139–140
EGP, 157–158
DHCPv4 (Dynamic Host Configuration EIGRP, 163
Protocol version 4), 57–58 IGP, 159, 163
finding public IP addresses, Linux 285

link-state routing protocols, 159–160 Ethernet


building databases, 164–165 crossover UTP cable, 97–98
convergence, 166–167 Gigabit Ethernet 0/0/0 and 0/0/1
Dijkstra algorithm, 165–166 ports, 152
features of, 164 Gigabit Ethernet 0/0/2 and 0/0/3
LSA, 164–165, 166–167 ports, 152
SPF algorithm, 165–166 switches, 170
metrics, 160–161 Ten Gigabit Ethernet 0/0/4 and 0/0/5
OSPF, 163 ports, 152
R2 routing tables, 161 exams
RIPv2, 163 after completion, 270
show ip route command, 160–161, certification, receiving certificates/
219, 222 badges, 271
checklists
Days 9–1, 277
E Days 17–10, 276
eavesdropping attacks, 237 Days 24–18, 275–276
Echo messages, 48 Days 31–25, 275
failing, 272
educated guess troubleshooting
in-person exams, 269
method, 179
post-exam information
EGP (Exterior Gateway Protocols), 159 career options, 271–272
EIGRP (Enhanced Interior Gateway certificates/badges, 271
Routing Protocol), 163 certification options, 272
email as a data loss vector, 236 remote exams, 269–270
EMI (Electromagnetic Interference), 93 requirements, 269
encapsulating data scoring, 270
PDU, 9–10 exfiltrating data, 236
summary, 9–10 exploits, security, 235, 237
tunnels, 10–11
encryption, 248
data, 257
F
tools, 237 failing exams, 272
endpoints failover mechanisms, 249
hosts FF02:0:0:0:0:FF00::/104 multicast
defined, 114 prefix, 86
virtual hosts, 114–116
FF02::1 All-nodes multicast group, 85
IoT, 117–119
mobile devices, 117 FF02::2 All-routers multicast group,
development of, 116 85–86
smartphones, 116 fiber patch cords, 101–103
tablets/phablets, 117 fiber-optic cable, 91, 92, 98
packets, sending, 114 connectors, 100–101
virtual hosts, 114–116 copper cable versus, 104
end-to-end bandwidth, 14 MMF cable, 99
error messages, console, 215–216 SMF cable, 98–99
error recovery (reliability), TCP, 39–40 file permissions, Linux, 250
escalation/prioritization, help desks, filtering MAC addresses, 255–256
180–181 finding public IP addresses,
establishing TCP connections, 40–41 Linux, 132
286 firewalls

firewalls, 227
application gateway (proxy) firewalls,
H
229–230 hacking tools
Cisco IOS firewall example, 230–231 network scanning/hacking, 237
host-based firewalls, 231–233 OS hacks, 237
iptables, 232 wireless hacking, 237
nftables, 232 hard copies as data loss vectors, 236
NGFW, 229–230 hashing algorithms, 248
stateful firewalls, 229
HEAD messages, 56
stateless firewalls, 227–228
TCP Wrappers, 233 headers
Windows Defender Firewall, 231–232 IPv4 addressing, 69
IPv6 addressing, 78–79
fixed ports, Cisco 4461 ISR, 151–153
TCP, 38, 41
flood attacks UDP, 41
TCP SYN, 242
help desks, 180
UDP, 243
policies/procedures, 180
flow control, TCP, 40 prioritization/escalation, 180–181
follow-the-path troubleshooting ticketing systems, 181–182
method, 178 trouble tickets
forensic tools, security, 237 fields, 182
forests, AD, 251 ticketing process, 181
forwarding help facility, Cisco IOS, 216
frame forwarding, 171 ? command, 215
packets, 155 command syntax help, 215
path determination, 156 console error messages, 215–216
switching, 156 Word help, 215
switch forwarding, 170 hierarchical campus design, 27–29
fragment-free switching, 172 hijacking sessions, 242
frame forwarding, 171 hold-down timers, 164
frequency channels, 105–106 home networks, configuring, 267–268
FTP (File Transfer Protocol), 43, 45 home routers
commands, 43–45 access, 267–268
SFTP, 43, 45 configuring, 258
TFTP, 43, 46 home users, authentication, 256–257
full mesh topologies, 23–24 host reachability messages, 48
host routing tables, viewing in Windows
G 11, 126–127
host-based firewalls, 231–233
GET messages, 55 hosts
getmac /v command, 124 defined, 113–114
Get-NetRoute command, 126–127 virtual hosts, 114–116
Gigabit Ethernet 0/0/0 and 0/0/1 HTTP (HyperText Transfer Protocol), 55
ports, 152 DELETE messages, 56
Gigabit Ethernet 0/0/2 and 0/0/3 GET messages, 55
ports, 152 HEAD messages, 56
global unicast addresses, 80–82 operation of, 56–57
POST messages, 55
goodput, 14
PUT messages, 56
Graziani’s 3–1-4 (pi) rule, 80
IP addressing 287

HTTPS, Linux connectivity/access, show ip interface brief command, 226


131–132 show ip interface command, 219,
hub-and-spoke topologies, 23 221–222
hybrid clouds, 33 interference, 93, 108–109
hybrid topologies, 24 Internet connections
SOHO, 26–27
speed tests, 16–17
I Internet layer, TCP/IP, 3, 6–7
IaaS (Infrastructure as a Service), 33 inventories, show inventory command,
ICMP attacks, 242 219, 225
ICMPv4 (Internet Control Message iOS, 117, 134–136
Protocol version 4), 48 IoT (Internet of Things), 117–119
Destination Unreachable messages, 48 IP (Internet Protocol)
Echo messages, 48 attacks, 241–242
host reachability messages, 48 multicast traffic, 174
ping command, 49 show ip interface brief command, 226
Service Unreachable messages, 48 show ip interface command, 219,
Time Exceeded messages, 49 221–222
traceroute command, 49–50 show ip route command, 219, 222
ICMPv6 (Internet Control Message telephony traffic, 173
Protocol version 6), 48 ip addr add command, 196–197
Destination Unreachable messages, 48 ip addr command, 195–196
Echo messages, 48
ip address command, 130
host reachability messages, 48
messaging (overview), 51 IP addressing. See also specific IPv4
NA messages, 52–53 addressing and IPv6 addressing
NS messages, 52 entries below
ping command, 49 configuration information
RA messages, 51 verifying in Linux, 129–130
RS messages, 51–52 verifying in macOS, 132–134
Service Unreachable messages, 48 viewing in Windows 11, 124–125
Time Exceeded messages, 49 Linux devices
traceroute command, 49–50 ping command, 198–199, 200
viewing settings, 194–195
icons, networking, 143–144
macOS devices
identity stores, 251 ping command, 198–199, 200
IEEE 802.11 standards, 107–108 viewing settings, 194–195
ifconfig command, 194–195 NAT, 64
Linux, 129–130 benefits of, 68
macOS, 132–133 dynamic NAT, 66–67
IGP (Interior Gateway Protocols), example of, 66
159, 163 inside global addresses, 65
inside local addresses, 65
impersonation, 241
limitations of, 68
in-person exams, 269 outside global addresses, 65
inside global addresses, 65 outside local addresses, 65
inside local addresses, 65 overloading, 67
integrity, CIA Triad, 245, 248 PAT, 67
interfaces static NAT, 67
show interface status command, 219, 224 terminology, 65–66
topologies, 63–64
288 IP addressing

netstat command, 203 migrating to, 89–90


private addressing, 63 multicast addresses, 85
public IP addresses, finding with assigned multicast addresses, 85–86
Linux, 132 FF02:0:0:0:0:FF00::/104 multicast
reserved addresses, 63–64 prefix, 87
spoofing attacks, 237 FF02::1 All-nodes multicast group, 85
TTL fields, IP headers, 164 FF02::2 All-routers multicast group,
verifying new addresses were added to 85–86
interfaces, 196–197 ipv6 unicast-routing global configuration
Windows devices command, 85–86
ping command, 197–198, 199 least significant 24 bits, 87
releasing settings, 193–194 solicited-node multicast addresses, 86–87
renewing settings, 193–194 overview, 77–78
tracert command, 202–203 prefixes, 88–89
viewing settings, 191–192 tunneling, 89
ip command, 195 unicast addresses, 80
ip route command, 197 3–1-4 (pi) rule, 80
global unicast addresses, 80–82
ipconfig command, 124–125, 191–194
IPv4 embedded addresses, 84–85
iPerf tool, 17–20 link-local addresses, 82–83
iptables, 232 loopback addresses, 83
IPv4 addressing, 69 ULA, 84
address classes, 70–71 unspecified addresses, 83
ANDing, 71 writing conventions
dual-stacking, 89–90 addresses, 88
embedded addresses in IPv6, 84–85 prefixes, 88–89
headers, 69 ipv6 unicast-routing global
IPv6 addressing configuration command, 85–86
comparisons, 78
migrating to, 89–90
subnetting J
addressing schemes, 74 jitter, 15–16
borrowing bits, 72–73
examples, 74–76
methodology, 72–74 K
multipliers, determining, 74
octet binary values, 73 key attacks, compromised, 238
octet decimal values, 73
subnet masks, 70–71 L
subnet masks, ANDing, 71
subnet masks, binary values, 72 LAN (Local Area Networks)
subnet masks, determining new, 73–74 cabling standards, 92–93
tunneling, 89 components of, 21
IPv6 addressing device connectivity guidelines, 145–146
anycast addresses, 87 switching
benefits of, 77–78 broadcast domains, 171
dual-stacking, 89–90 collision domains, 171
headers, 78–79 Ethernet switches, 170
IPv4 addressing evolution to, 169–170
comparisons, 78 forwarding, 170
migrating from, 89–90 Layer 2 switching, 172
Layer 3 switching, 172
management network ports, Cisco 4461 ISR 289

logic, 170–171 public IP addresses, finding, 132


MAC addresses, 170–171 routing tables, viewing, 132
topologies, 21–22, 24–26 speedtest command, 131
VLAN LLDP (Link Layer Discovery
benefits of, 173 Protocol), 218
black hole VLAN, 174 log files, accounting, 250
data VLAN, 174
logical access control, 249
default VLAN, 174
IP multicast traffic, 174 logical topologies, 24–25, 147, 148–149
IP telephony traffic, 173 logins
management traffic, 173 SSH, 206
management VLAN, 174 wireless routers, 258–259
native VLAN, 174 logs, network device, 250
normal data traffic, 174 loop prevention, routing, 163–164
reasons for using, 172–173
loopback addresses, 83
scavenger class traffic, 174
traffic, types of, 173–174 LSA (Link-State Advertisements),
types of, 174 164–165, 166–167
voice VLAN, 174–175
WLAN, 26 M
Layer 2 switching, 172
MAC addresses
Layer 3 switching, 172
filtering, 255–256
least significant 24 bits, multicast show mac address-table command, 219,
addresses, 87 225
lights, device status, 139–140 switches, 170–171
link-local addresses, 82–83 macOS
link-state routing protocols, 159–160 configuration information, verifying,
building databases, 164–165 132–134
convergence, 166–167 connectivity/access, 132–134
Dijkstra algorithm, 165–166 ifconfig command, 132–133
features of, 164 ip command options, 195
LSA, 164–165, 166–167 IP settings, viewing, 194–195
SPF algorithm, 165–166 networksetup -getinfo <network
Linux service> command, 133–134
connectivity/access, verifying, 130–132 networksetup -listallnetworkservices
curl command, 132 command, 133–134
file permissions, Linux, 250 ping command, 198–199, 200
firewalls, 232 maintenance, security, 249
HTTPS connectivity/access, 131–132 malware
ifconfig command, 129–130 adware, 238
ip address command, 130 ransomware, 239
ip command options, 195 rootkits, 239
IP configuration information, verifying, spyware, 239
129–130 Trojan horses, 238
IP settings, viewing, 194–195 viruses, 238
iptables, 232 worms, 238
nc command/Ncat, 131–132 MAN (Metropolitan Area Networks), 26
netstat -rn command, 132
management network ports, Cisco 4461
nftables, 232
ISR, 152
ping command, 130–131, 198–199, 200
290 management VLAN

management VLAN, 174 mobile cores, 111


managing mobile devices
cabling, 91, 149–150 connectivity/access, activating,
advantages of, 92 134–135
coaxial cable, 95–96 development of, 116
copper cable, 92, 93, 104 OS, 117
disadvantages of, 92 RAN, 111
fiber patch cords, 101–103 smartphones, 116
fiber-optic cable, 91, 92, 98 tablets/phablets, 117
fiber-optic cable, connectors, 100–101 verifying connectivity/access, 135–137
fiber-optic cable, MMF, 99 modification attacks, data, 237
fiber-optic cable, SMF, 98–99 monitoring networks, Wireshark
fiber-optic cable versus copper cable, 104 downloading, 186
LAN cabling standards, 92–93 features of, 185
STP cable, 95 installing, 186
UTP cable, 94–95 overview, 185
UTP cable, categories, 96–97 packet capturing, 186
UTP cable, connectors, 97 opening captures, 189
UTP cable, crossover, 97–98 saving captures, 187–189
UTP cable, straight-through, 97–98 users, 186
cloud computing, 212–213
Moran, Matthew, 271–272
devices
console ports, 209–210 multicast addresses, 85
Meraki cloud management, 212–213 assigned multicast addresses, 85–86
NMS, 210–211 FF02:0:0:0:0:FF00::/104 multicast
RDP, 205 prefix, 87
SSH, 206 FF02::1 All-nodes multicast group, 85
Telnet, 207 FF02::2 All-routers multicast group,
terminal emulators, 208–209 85–86
VPN, 207–208 ipv6 unicast-routing global configuration
command, 85–86
man-in-the-middle attacks. See MITM
least significant 24 bits, 87
attacks
solicited-node multicast addresses, 86–87
McCumber (cybersecurity) cube, 245
multicast traffic, IP, 174
CIA Triad, 247
availability, 245, 249 multipliers, subnetting, 74
confidentiality, 245, 248
defined, 245–246
integrity, 245, 248
N
data states, 246 NA messages, 52–53
principles of, 245–246 NAT (Network Address Translation), 64
safeguards, 246–247 benefits of, 68
memory dynamic NAT, 66–67
buffering, switches, 172 example of, 66
port-based memory, 172 inside global addresses, 65
shared memory, 172 inside local addresses, 65
Meraki cloud management, 212–213 limitations of, 68
MFA (Multifactor Authentication), 250 outside global addresses, 65
outside local addresses, 65
mitigation, defined, 236
overloading, 67
MITM attacks, 238, 240, 242, 254–255 PAT, 67
MMF cable, 99 static NAT, 67
networks 291

terminology, 65–66 application layer, 3, 5


topologies, 63–64 Internet layer, 3, 6–7
native VLAN, 174 network access layer, 7–8
nc command/Ncat, 131–132 PDU, 9–10
protocols, 8
neighbor discovery
transport layer, 3, 5–6
NDP, 86–87
SLAAC, 59–60 networks
5G cellular networks, 109–110
NetFlow, 211
attacks
netstat command, 203 access attacks, 240
netstat -rn command, 132 reconnaissance attacks, 239
network access layer, TCP/IP, 7–8 basic setups, 259–262
network device logs, 250 CAN, 26
cellular networks, 109–110
network layer, OSI model, 2
configuring
network media/connectivity, 91 basic setups, 259–262
advantages of, 92 wireless setups, 262–266
coaxial cable, 95–96 connectivity/access
copper cable, 92, 93 access layer switches, 144
fiber-optic cable versus, 104 cable management, 149–150
crosstalk, 93 core layer switches, 145
disadvantages of, 92 distribution layer switches, 145
EMI, 93 Linux, 129–132
fiber patch cords, 101–103 logical topologies, 24–25, 147, 148–149
fiber-optic cable, 91, 92, 98 macOS, 132–134
connectors, 100–101 mobile devices, 134–137
copper cable versus, 104 networking icons, 143–144
MMF cable, 99 physical topologies, 24–25, 146, 147–148
SMF cable, 98–99 switches, overview, 143
interference, 93, 108–109 Windows 11, 121–128
LAN cabling standards, 92–93 firewalls, 227
RFI, 93 application gateway (proxy) firewalls,
STP cable, 95 229–230
UTP cable, 94–95 Cisco IOS firewall example, 230–231
categories, 96–97 host-based firewalls, 231–233
connectors, 97 iptables, 232
crossover UTP cable, 97–98 nftables, 232
straight-through UTP cable, 97–98 NGFW, 229–230
wireless connectivity, 91, 92 stateful firewalls, 229
networking models stateless firewalls, 227–228
OSI model, 1–3 TCP Wrappers, 233
All People Seem To Need Data Processing Windows Defender Firewall, 231–232
memorization technique, 3 hierarchical campus design, 27–29
application layer, 2 home networks, configuring, 267–268
data link layer, 2 icons, 143–144
network layer, 2 LAN
physical layer, 2 broadcast domains, 171
presentation layer, 2 cabling standards, 92–93
session layer, 2 collision domains, 171
transportation layer, 2 components of, 21
TCP/IP model, 1, 7 device connectivity guidelines, 145–146
292 networks

Layer 2 switching, 172 VLAN


Layer 3 switching, 172 benefits of, 173
switching, Ethernet switches, 170 black hole VLAN, 174
switching, evolution to, 169–170 data VLAN, 174
switching, forwarding, 170 default VLAN, 174
switching, logic, 170–171 IP multicast traffic, 174
switching, MAC addresses, 170–171 IP telephony traffic, 173
topologies, 21–22, 24–26 management traffic, 173
WLAN, 26 management VLAN, 174
MAN, 26 native VLAN, 174
management traffic, VLAN, 173 normal data traffic, 174
monitoring, Wireshark reasons for using, 172–173
downloading, 186 scavenger class traffic, 174
features of, 185 traffic, types of, 173–174
installing, 186 types of, 174
overview, 185 voice VLAN, 174–175
packet capturing, 186–189 VPN, 207
users, 186 automating connections, 207–208
PAN, 26 scripting connections, 207–208
performance tunnels, 10–11
bandwidth, 13, 14 Windows configurations, 207–208
delays, 15–16 WAN
end-to-end bandwidth, 14 connecting to, 22–23
goodput, 14 topologies, 23–26
iPerf tool, 17–20 Wi-Fi networks, 105, 109–110
jitter, 15–16 wireless security
physical path lengths, 15 attacks (overview), 253
queueing delays, 15 basic setups, 262–266
serialization delays, 15 DoS attacks, 253–254
speed tests, 16–17 encryption, 257
throughput, 13–14 home router configurations, 258
RAN, 111 home user authentication, 256–257
scanning tools, 237 MAC address filtering, 255–256
SOHO MITM attacks, 254–255
Internet connections, 26–27 passphrases, 266
routers, 27 rogue AP, 254
three-tiered campus design, 28 shared key authentication, 256
topologies, 24–25 SSID cloaking, 255
CAN, 26 verifying connectivity/access, 266
full mesh topologies, 23–24 WEP, 256
hub-and-spoke topologies, 23 wireless router logins, 258–259
hybrid topologies, 24 WPA, 256, 257
LAN, 21–22, 24–26 WPA2, 256–257
logical topologies, 24–25, 147, 148–149 WPA3, 256
MAN, 26 Wireshark network monitoring
PAN, 26 downloading, 186
physical topologies, 24–25, 146, 147–148 features of, 185
point-to-point topologies, 23 installing, 186
variations of, 26 overview, 185
WAN, 23–26 packet capturing, 186–189
WLAN, 26 users, 186
two-tiered campus design, 28–29 WLAN, 26
iOS 293

networksetup -getinfo <network ip address command, 130


service> command, 133–134 ip command options, 195
networksetup -listallnetworkservices nc command/Ncat, 131–132
command, 133–134 netstat -rn command, 132
nftables, 232 nftables, 232
ping command, 198–199, 200, 130–131
NGFW (Next-Generation Firewalls),
speedtest command, 131
229–230
verifying connectivity/access, 130–132
NIM (Network Interface Modules), 152 verifying IP configuration information,
NIST, cloud computing services, 33 129–130
NMS (Network Management Systems) viewing IP settings, 194–195
CLI, 211 viewing routing tables, 132
defined, 210 macOS
functions, 210–211 connectivity/access, 132–134
NetFlow, 211 ifconfig command, 132–133
REST API, 211 ip command options, 195
SNMP, 211 networksetup -getinfo <network service>
Syslog, 211 command, 133–134
normal data traffic, 174 networksetup -listallnetworkservices
command, 133–134
NS messages, 52, 59–60
ping command, 198–199, 200
nslookup command, 203 verifying configuration information,
NTP (Network Time Protocol) 132–134
configuring, 47–48 viewing IP settings, 194–195
Stratums, 46–47 mobile devices, 117
verifying, 47–48 activating connectivity/access, 134–135
connectivity/access, 134–137
verifying connectivity/access, 135–137
O Windows 11
octet binary values, subnetting, 73 arp -a command, 125–126
octet decimal values, subnetting, 73 command line, 124–127
connectivity/access, 121–128
Ookla, speed tests, 16–17
Control Panel, 122–124
on-premises computing firewalls, 231–232
advantages of, 31 getmac /v command, 124
disadvantages of, 31–32 Get-NetRoute command, 126–127
opening packet captures, 189 ipconfig command, 124–125
OS (Operating Systems) netstat command, 203
Android OS, 117, 134–137 ping command, 197–198, 199, 127
Cisco IOS PowerShell, 124–127
firewall configuration example, 230–231 releasing IP settings, 193–194
help facility, 215–216 renewing IP settings, 193–194
hacking tools, 237 route print command, 127
iOS, 117, 134–136 Settings app, 121–122
Linux tracert command, 128, 202–203
connectivity/access, 129–132 verifying connectivity/access, 127–128
curl command, 132 viewing ARP caches, 125–126
finding public IP addresses, 132 viewing host routing tables, 126–127
firewalls, 232 viewing IP configuration information,
HTTPS connectivity/access, 131–132 124–125
ifconfig command, 129–130 viewing IP settings, 191–192
Windows Defender Firewall, 231–232
294 OSI model

OSI model, 1–3 delays, 15–16


All People Seem To Need Data end-to-end bandwidth, 14
Processing memorization technique, 3 goodput, 14
application layer, 2 iPerf tool, 17–20
data link layer, 2 jitter, 15–16
network layer, 2 physical path lengths, 15
physical layer, 2 queueing delays, 15
presentation layer, 2 serialization delays, 15
session layer, 2 speed tests, 16–17
stateless firewalls, 227–228 throughput, 13–14
transportation layer, 2 permissions (Linux), file, 250
OSPF (Open Shortest Path First), 163 phablets/tablets, 117
OU (Organizational Units), 251 phishing, 240
outside global addresses, 65 physical access control, 249, 252
outside local addresses, 65 physical layer, OSI model, 2
overloading NAT, 67 physical path lengths, network
performance/delays, 15
P physical topologies, 24–25, 146, 147–148
pi (3–1-4) rule, 80
PaaS (Platform as a Service), 33
ping command, 49, 197–200
packets IP addressing
capturing with Wireshark, 186 Linux devices, 198–199, 200
opening captures, 189 macOS devices, 198–199, 200
saving captures, 187–189 Windows devices, 197–198, 199
crafting tools, 237 reconnaissance attacks, 239
delays verifying Linux connectivity, 130–131
jitter, 15–16 verifying Windows 11 connectivity, 127
physical path lengths, 15
point-to-point topologies, 23
queueing delays, 15
serialization delays, 15 poisoning/poison reverse, route, 164
forwarding, 155 policies/procedures, help desks, 180
path determination, 156 ports
switching, 156 Cisco 4461 ISR, 151
sending, 114 auxiliary ports, 152
sniffers, 237, 238 console ports, 152
PAN (Personal Area Networks), 26 fixed ports, 151–153
passphrases, wireless security, 266 Gigabit Ethernet 0/0/0 and 0/0/1
ports, 152
passwords, 250
Gigabit Ethernet 0/0/2 and 0/0/3
attacks, 238, 240
ports, 152
crackers, 237
management network ports, 152
PAT (Port Address Translation), 67 NIM, 152
path determination, packet SM-X slots, 153–154
forwarding, 156 Ten Gigabit Ethernet 0/0/4 and 0/0/5
path lengths, network performance/ ports, 152
delays, 15 USB ports, 152
PDU (Protocol Data Units), 9–10 console ports, 209–210
memory, 172
penetration testing tools, 236–237
numbers, TCP/UDP, 38–39
performance, networks redirection attacks, 240
bandwidth, 13, 14
protocols 295

POST messages, 55 Destination Unreachable messages, 48


post-exam information Echo messages, 48
career options, 271 host reachability messages, 48
certificates/badges, 271 ping command, 49
certification options, 272 Service Unreachable messages, 48
failing exams, 272 Time Exceeded messages, 49
PowerShell (Windows 11), 124–127 traceroute command, 49–50
ICMPv6, 48
prefixes, IPv6 addressing, 88–89
Destination Unreachable messages, 48
presentation layer, OSI model, 2 Echo messages, 48
pretexting, 240 host reachability messages, 48
prioritization/escalation, help desks, messaging (overview), 51
180–181 NA messages, 52–53
privacy NS messages, 52
private addressing, 63 ping command, 49
private clouds, 33 RA messages, 51
WEP, 256 RS messages, 51–52
Service Unreachable messages, 48
privileges
Time Exceeded messages, 49
command syntax, 217
traceroute command, 49–50
levels of, 216–217
IGP, 159, 163
processing data, 246 link-state routing protocols, 159–160
protocols building databases, 164–165
ARP. add ARP entries convergence, 166–167
CDP, 218 Dijkstra algorithm, 165–166
connectionless protocols, 37–38, 41 features of, 164
connection-oriented protocols, 37–38 LSA, 164–165, 166–167
DHCPv4, 57–58 SPF algorithm, 165–166
DHCPv6, 58 LLDP, 218
SLAAC, 58–61 NDP, 86–87
stateful operations, 58–61 NTP
discovery protocols, 218 configuring, 47–48
distance vector protocols, 159 Stratums, 46–47
DNS verifying, 47–48
operation of, 61–62 OSPF, 163
process of, 61–62 RIPv2, 163
resource records, 61–62 SFTP, 43, 45
URI, 61 show protocols command, 219, 223
EGP, 157–158 SNMP, 211
EIGRP, 163 TCP, 37
FTP, 43, 45 connection establishment/termination,
commands, 43–45 40–41
SFTP, 43, 45 error recovery (reliability), 39–40
TFTP, 43, 46 flow control, 40
HTTP, 55 headers, 38, 41
DELETE messages, 56 port numbers, 38–39
GET messages, 55 windowing, 40
HEAD messages, 56 TCP/IP model, 8
operation of, 56–57 TFTP, 43, 46
POST messages, 55 UDP, 37
PUT messages, 56 headers, 41
ICMPv4, 48 port numbers, 38–39
296 proxy (application gateway) firewalls

proxy (application gateway) firewalls, rogue AP, 254


229–230 rootkit detectors, 237
public clouds, 33 rootkits, 239
public IP addresses, finding with route print command, 127
Linux, 132 routers/routing
PUT messages, 56 AD, 161–163
Cisco 4461 ISR, ports, 151
auxiliary ports, 152
Q console ports, 152
queueing delays, 15 fixed ports, 151–153
quid pro quo (“something for Gigabit Ethernet 0/0/0 and 0/0/1
something”), 241 ports, 152
Gigabit Ethernet 0/0/2 and 0/0/3
ports, 152
R management network ports, 152
NIM, 152
R2 routing tables, 161
SM-X slots, 153–154
RA messages, 51, 59 Ten Gigabit Ethernet 0/0/4 and 0/0/5
RAN (Radio Access Networks), 111 ports, 152
ransomware, 239 USB ports, 152
RBAC, 250 directly connected routing, 157
dynamic routing, 157–158
RDP (Remote Desktop Protocol), 205
classful routing protocols, 160
reconnaissance attacks, 239 classless routing protocols, 160
redirection attacks, ports, 240 distance vector protocols, 159
redundancy, 171–172, 249 EGP, 157–158
reflection/amplification attacks, 242 EIGRP, 163
regular maintenance, security, 249 IGP, 159, 163
link-state routing protocols, 159–160,
releasing IP settings in Windows
164–167
devices, 193–194
metrics, 160–161
reliability (error recovery), TCP, 39–40 OSPF, 163
remote access R2 routing tables, 161
RDP, 205 RIPv2, 163
SSH, 206 show ip route command, 219, 222,
Telnet, 207 160–161
remote exams, 269–270 home routers
removable media as data loss vector, 236 access, 267–268
configuring, 258
renewing IP settings in Windows
loop prevention, 163–164
devices, 193–194
packet forwarding, 155
reserved addresses, 63–64 path determination, 156
reset attacks, TCP, 242 switching, 156
resource records, DNS, 61–62 poisoning/poison reverse, 164
REST API, 211 RA messages, 59
RF spectrum, 105–106 routing tables
R2 routing tables, 161
RFI (Radio Frequency Interference), 93
triggered updates, 164
RIPv2 (Routing Information Protocol viewing, 197
version 2), 163 viewing in Linux, 132
risks, security, 236 RS messages, 58–59
security 297

show ip interface brief command, 226 dumpster diving, 241


show ip route command, 219, 222 eavesdropping attacks, 237
SOHO, 27 ICMP attacks, 242
split horizon rule, 164 impersonation, 241
SSID cloaking, 255 IP attacks, 241–242
static routing, 157–158 MITM attacks, 238, 240, 242, 254–255
triggered updates, 164 password attacks, 238, 240
TTL fields, IP headers, 164 phishing, 240
wireless routers, logins, 258–259 port redirection attacks, 240
RS messages, 51–52, 58–59 pretexting, 240
reconnaissance attacks, 239
session hijacking, 242
S shoulder surfing, 241
sniffer attacks, 238
SaaS (Software as a Service), 33
social engineering attacks, 240–241
safeguards, cybersecurity (McCumber) “something for something” (quid pro
cube, 246–247 quo), 241
saving packet captures, 187–189 spam, 241
scanning tools, 237, 237, 239 spear phishing, 240
scavenger class traffic, 174 spoofing attacks, 237, 240, 242
scoring exams, 270 tailgating, 241
TCP reset attacks, 242
scripting VPN connections, 207–208
TCP session hijacking, 242
security TCP SYN flood attacks, 242
AAA, 250 transport layer attacks, 242–243
access control, 248 trust exploitation attacks, 240
administrative access control, 249–250 UDP flood attacks, 243
logical access control, 249 audit trails, 248
physical access control, 249, 252 authentication, 250
accounting, 250 authorization, 250
ACL, 250 awareness, 251
AD, 251 billing systems, 250
administration, 251 biometric security, 250
authentication, 251 CIA Triad, 247
authorization, 251 availability, 245, 249
components of, 251 confidentiality, 245, 248
directory services, 251 defined, 245–246
domains, 251 integrity, 245, 248
forests, 251 communication protocols, 248
functions, 251 cybersecurity (McCumber) cube, 245
OU, 251 CIA Triad, 245–246, 247–249
trees, 251 data states, 246
assets, 235 principles of, 245–246
attacks safeguards, 246–247
access attacks, 240 data exfiltration, 236
amplification/reflection attacks, 242 data loss vectors, 236
baiting, 241 debuggers, 237
buffer overflow attacks, 240 digital certificates, 248
compromised key attacks, 238 encryption, 237, 248
data modification attacks, 237 exploits, 235, 237
DDoS attacks, 241 failover mechanisms, 249
DoS attacks, 238, 241, 253 file permissions, Linux, 250
298 security

firewalls, 227 exploiting, 237


application gateway (proxy) firewalls, scanners, 237, 239
229–230 wireless security
Cisco IOS firewall example, 230–231 attacks (overview), 253
host-based firewalls, 231–233 basic setups, 262–266
iptables, 232 DoS attacks, 253–254
nftables, 232 encryption, 257
NGFW, 229–230 home router configurations, 258
stateful firewalls, 229 home user authentication, 256–257
stateless firewalls, 227–228 MAC address filtering, 255–256
TCP Wrappers, 233 MITM attacks, 254–255
Windows Defender Firewall, 231–232 passphrases, 266
forensic tools, 237 rogue AP, 254
hacking tools shared key authentication, 256
network scanning/hacking, 237 SSID cloaking, 255
OS hacks, 237 verifying connectivity/access, 266
wireless hacking, 237 WEP, 256
hashing algorithms, 248 wireless router logins, 258–259
identity stores, 251 WPA, 256, 257
log files, 250 WPA2, 256–257
maintenance, 249 WPA3, 256
malware sending packets, 114
adware, 238 serialization delays, 15
ransomware, 239
server virtualization, 34–35
rootkits, 239
spyware, 239 Service Unreachable messages, 48
Trojan horses, 238 session hijacking, 242
viruses, 238 session layer, OSI model, 2
worms, 238 setting up networks
mitigation, 236 basic setups, 259–262
network device logs, 250 wireless setups, 262–266
packets
Settings app (Windows 11), 121–122
crafting tools, 237
sniffers, 237, 238 SFTP (Secure FTP), 43, 45
passwords, 250 shared key authentication, 256
attacks, 238, 240 shared memory, 172
crackers, 237 shoulder surfing, 241
penetration testing tools, 236–237 show commands
programs, 251–252 defined, 219
RBAC, 250 show arp command, 219, 222
redundancy, 249 show interface status command, 219, 224
risks, 236 show interfaces command, 219, 220–221
rootkit detectors, 237 show inventory command, 219, 225
scanning tools show ip interface brief command, 226
network scanning/hacking, 237 show ip interface command, 219, 221–222
vulnerability scanners, 237, 239 show ip route command, 131, 160–161,
smartcards, 250 219, 222
threats, defined, 235 show mac address-table command, 219, 225
training, 251 show protocols command, 219, 223
user awareness/training, 251 show running-config command, 219–220
vulnerabilities, 235 show version command, 219, 223–224
TCP (Transport Control Protocol) 299

SLAAC (Stateless Address store-and-forward switching, 171–172


Autoconfiguration), 58–59 STP cable, 95
neighbor discovery, 59–60 straight-through UTP cable, 97–98
NS messages, 59–60
Stratums, NTP, 46–47
operation of, 60–61
RA messages, 59 structured troubleshooting methods,
RS messages, 58–59 178–179
smartcards, 250 subnetting
addressing schemes, 74
smartphones, 116
borrowing bits, 72–73
SMF cable, 98–99 examples, 74–76
SM-X slots, 153–154 methodology, 72–74
sniffers, packet, 237, 238 multipliers, determining, 74
SNMP (Simple Network Management octet binary values, 73
Protocol), 211 octet decimal values, 73
social engineering attacks, 240–241 subnet masks, 70–71
ANDing, 71
social networking as data loss
binary values, 72
vector, 236
determining new masks, 73–74
SOHO (Small Offices/Home Offices)
substitution troubleshooting method, 179
Internet connections, 26–27
routers, 27 switches/switching
access layer switches, 144
solicited-node multicast addresses,
asymmetric switching, 172
86–87
broadcast domains, 171
“something for something” (quid pro collision domains, 171
quo), 241 core layer switches, 145
spam, 241 cut-through switching, 172
spear phishing, 240 distribution layer switches, 145
speed tests, 16–17 Ethernet switches, 170
evolution to, 169–170
speedtest command, 131
forwarding, 170
SPF algorithm, 165–166 fragment-free switching, 172
split horizon rule, 164 frame forwarding, 171
spoofing attacks, 237, 240, 242 Layer 2 switching, 172
spyware, 239 Layer 3 switching, 172
SSH (Secure Shell), 206 logic, 170–171
MAC addresses, 170–171
SSID (Service Set Identifiers)
memory buffering, 172
cloaking, 255
overview, 143
configuring, 264
packet forwarding, 156
stateful firewalls, 229 show ip interface brief command, 226
stateful operations, DHCPv6, 58–61 store-and-forward switching, 171–172
stateless firewalls, 227–228 symmetric switching, 172
states of data, cybersecurity syntax help, commands, 215
(McCumber) cube, 246 Syslog, 211
static NAT, 67
static routing, 157–158
T
status lights, devices, 139–140
storage tablets/phablets, 117
cloud storage as a data loss vector, 236 tailgating, 241
data storage, 246 TCP (Transport Control Protocol), 37
300 TCP (Transport Control Protocol)

attacks PAN, 26
reset attacks, 242 physical topologies, 24–25, 146, 147–148
session hijacking, 242 point-to-point topologies, 23
TCP SYN flood attacks, 242 variations of, 26
connection establishment/termination, WAN, 23–24
40–41 WLAN, 26
error recovery (reliability), 39–40 traceroute command, 49–50
f low control, 40 tracert command, 128, 201–203
headers, 38, 41
traffic, VLAN
port numbers, 38–39
IP
TCP Wrappers, 233
multicast traffic, 174
windowing, 40
telephony traffic, 173
TCP/IP model, 1, 7 management traffic, 173
application layer, 3, 5 normal data traffic, 174
Internet layer, 3, 6–7 scavenger class traffic, 174
network access layer, 7–8
training, security, 251
PDU, 9–10
protocols, 8 transmitting data, 246
transport layer, 3, 5–6 transport layer, TCP/IP, 3, 5–6, 242–243
transport layer attacks, 242–243 transport protocols
telephony traffic, IP, 173 connectionless protocols, 37–38
Telnet, 207 connection-oriented protocols, 37–38
TCP, 37
Ten Gigabit Ethernet 0/0/4 and 0/0/5
connection establishment/termination,
ports, 152
40–41
terminal emulators, 208–209 error recovery (reliability), 39–40
terminating TCP connections, 40–41 flow control, 40
testing, penetration testing tools, headers, 38, 41
236–237 port numbers, 38–39
TFTP (Trivial FTP), 43, 46 windowing, 40
threats, security, 235 UDP, 37
headers, 41
three-tiered campus design, 28
port numbers, 38–39
throughput, 13–14
transportation layer, 2
ticketing systems, 181–182
trees, AD, 251
Time Exceeded messages, 49
triggered updates, routing tables, 164
timers, hold-down, 164
Trojan horses, 238
TKIP (Total Key Integrity Protocol), 257
trouble tickets
top-down troubleshooting method, 178 fields, 182
topologies ticketing process, 181
NAT, 65 troubleshooting
networks bottom-up troubleshooting method, 178
CAN, 26 comparison troubleshooting method, 179
full mesh topologies, 23–24 divide-and-conquer troubleshooting
hub-and-spoke topologies, 23 method, 178
hybrid topologies, 24 educated guess troubleshooting
LAN, 21–22 method, 179
logical topologies, 24–25, 147, 148–149 follow-the-path troubleshooting
MAN, 26 method, 178
VPN (Virtual Private Networks) 301

help desks, 180


policies/procedures, 180
V
prioritization/escalation, 180–181 verifying
ticketing systems, 181–182 connectivity/access
trouble tickets, 181–182 Android, 135–136
methodologies (overview), 177 iOS, 135–136
selecting a troubleshooting method, 179 Linux, 130–132
structured troubleshooting methods, mobile devices, 135–137
178–179 Windows 11, 127–128
substitution troubleshooting wireless security, 266
method, 179 new IP addresses were added to
top-down troubleshooting method, 178 interfaces, 196–197
trust exploitation attacks, 240 NTP, 47–48
TTL fields, IP headers, 164 versioning, show version command,
219, 223–224
tunnels
data encapsulation, 10–11 viewing
IPv6 addressing, 89 ARP caches in Windows 11, 125–126
ARP tables, 197
two-tiered campus design, 28–29
host routing tables in Windows 11,
126–127
U IP configuration information in
Windows 11, 124–125
UDP (User Datagram Protocol), 37 IP settings
f lood attacks, 243 Linux devices, 194–195
headers, 41 macOS devices, 194–195
port numbers, 38–39 Windows devices, 191–192
ULA (Unique Local Addresses), 84 routing tables, 197
unencrypted devices as a data loss routing tables in Linux, 132
vector, 236 virtualization
unicast addresses, 80 hosts, 114–116
3–1-4 (pi) rule, 80 servers, 34–35
global unicast addresses, 80–82 viruses, 238
IPv4 embedded addresses, 84–85 VLAN (Virtual LAN)
link-local addresses, 82–83 benefits of, 173
loopback addresses, 83 black hole VLAN, 174
ULA, 84 data VLAN, 174
unspecified addresses, 83 default VLAN, 174
unspecified unicast addresses, 83 IP
updates (routing tables), multicast traffic, 174
triggered, 164 telephony traffic, 173
URI (Uniform Resource Identifiers), 61 management traffic, 173
management VLAN, 174
USB ports, Cisco 4461 ISR, 152
native VLAN, 174
users normal data traffic, 174
home user authentication, 256–257 reasons for using, 172–173
security awareness/training, 251 scavenger class traffic, 174
UTP cable, 94–95 traffic, types of, 173–174
categories, 96–97 types of, 174
connectors, 97 voice VLAN, 174–175
crossover UTP cable, 97–98 VPN (Virtual Private Networks), 207
straight-through UTP cable, 97–98 automating connections, 207–208
302 VPN (Virtual Private Networks)

scripting connections, 207–208 configuring


tunnels, 10–11 basic setups, 262–266
Windows configurations, 207–208 home routers, 258
vulnerabilities encryption, 257
exploits, 237 home user authentication, 256–257
scanners, 237, 239 MAC address filtering, 255–256
security, 235 passphrases, 266
shared key authentication, 256
SSID cloaking, 255
W verifying connectivity/access, 266
WEP, 256
WAN (Wide Area Networks)
wireless router logins, 258–259
connecting to, 22–23
WPA, 256, 257
topologies, 23–26
WPA2, 256–257
WEP (Wired Equivalent Privacy), 256 WPA3, 256
Wi-Fi networks, 105, 109–110 wireless technologies
windowing, TCP, 40 802.11 standards, 107–108
Windows 11 cellular networks, 109–110
arp -a command, 125–126 channels, 105–106
command line, 124–127 crosstalk, 93
connectivity/access, verifying, 127–128 EMI, 93
Control Panel, 122–124 interference, 93, 108–109
getmac /v command, 124 mobile cores, 111
Get-NetRoute command, 126–127 network connectivity, 91, 92
ipconfig command, 124–125 RAN, 111
IP settings RF spectrum, 105–106
releasing, 193–194 RFI, 93
renewing, 193–194 Wi-Fi, 105
viewing, 191–192 Wi-Fi networks, 109–110
netstat command, 203 Wireshark network monitoring
ping command, 127, 197–198, 199 downloading, 186
PowerShell, 124–127 features of, 185
route print command, 127 installing, 186
Settings app, 121–122 overview, 185
tracert command, 128, 202–203 packet capturing, 186
viewing opening captures, 189
ARP caches, 125–126 saving captures, 187–189
host routing tables, 126–127 users, 186
IP configuration information, 124–125 WLAN (Wireless LAN), 26
VPN configurations, 207–208
Word help, 215
Windows Defender Firewall, 231–232
worms, 238
Windows Defender Firewall, 231–232
WPA (Wi-Fi Protected Access), 256, 257
wireless hacking tools, 237
WPA2, 256–257
wireless router logins, 258–259
WPA3, 256
wireless security
attacks writing conventions, IPv6 addressing
DoS attacks, 253–254 addresses, 88
MITM attacks, 254–255 prefixes, 88–89
overview, 253
rogue AP, 254

You might also like