Network Operations and Management
Network Operations and Management # SNMP # 2021-02-06–09-02-01Z–snmp Syslog #
Network Operations and Management # SNMP # 2021-02-06–09-02-01Z–snmp Syslog #
Network Security # Wikipedia - Network Security The CIA Triad # The CIA Triad Access Restriction # Access Control 3 Access Restriction Concepts # Principle of Least Privilege Role-Based Access Control (RBAC) Zero Trust Defense in Depth # Defense in Depth
https://en.wikipedia.org/wiki/Networking_device
Networking Notes # 20220319094954-specialized-networks Network Security
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link-state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS). Supports the CIDR addressing model Common in large enterprise networks Implements Dijkstra’s algorithm , also known as the shortest parth first (SPF) algorithm. Calculates the shortest route to a destination through the network. ...
PKI # Public-Key Infrastructure Useful for doing business with someone you don’t know, or don’t already have a digital signature for. Uses certificates Certificate is a standardized file containing a public key and digital signature from a trusted 3rd party. SSL certificates are an example of this. Root certificate authorities sign a cert or create an intermediary cert Comodo, Symantec, GoDaddy are examples https://en. ...
Point-to-Point Protocol (PPP) # Enables two point-to-point devices to connect, authenticate with a user and password, and negotiate the network protocol the two devices will use. Password Authentication Protocol (PAP) # Simply transmits the username and password over the connection in plaintext. Challenge Handshake Authentication Protocol (CHAP) # Relies on hashes based on a shared secret, usually a password that both ends of the connection know. Initiator initiates connection Authenticator creates challenge message The initiator makes a hash using the password; sends to authenticator Authenticator compares the value to its own hash calculation based on the password. ...
To review # Data Center Network Architecture Review difference between bandwidth and throughput Bandwidth is theoretical maximum whereas throughput is the an actual measurement of how much data can be transmitted through a network in a given time-frame. Review differences between crossover cables vs straight-through cables and where they would be used in switching, NICs, etc Review SNMP An enterprise network’s end users are the most vulnerable attack vector. ...
The presentation layer translates data from lower layers into a format usable by the Application layer, and vice versa. Data conversion
The Primary Rate Interface (PRI) is a telecommunications interface standard used on an ISDN for carrying multiple DS0 voice and data transmissions between the network and a user. Source: https://en.wikipedia.org/wiki/Primary_Rate_Interface