networking

Syslog

networking, sysadmin

Syslog # Standard for message logging. Severity Levels # Number Name Description 7 Debug Debug information 6 Information Informational messages 5 Notice Issues of concern that don’t represent a problem 4 Warning Issues that, if not addressed, could become a problem 3 Error Non-urgent errors that need to be addressed when possible 2 Critical Serious errors in secondary subsystem that should be addressed immediatly 1 Alert Serious errors in primary subsystem that should be addressed immediately 0 Emergency Errors that will cause the system to become unusable

Temporal Key Integrity Protocol

networking

Temporal Key Integrity Protocol (TKIP) is a security protocol used in the IEEE 802.11 wireless networking standard. TKIP developed to replace WEP without requiring the replacement of legacy hardware. TKIP is no longer considered secure and was deprecated in 2012. Source: https://en.wikipedia.org/wiki/Temporal_Key_Integrity_Protocol

The CIA Triad

networking, security

The CIA Triad # Confidentiality Integrity Availability Confidentiality # Preventing unauthorized users from accessing data. Passwords Encryption Access control Integrity # Ensuring the data hasn’t been altered. Hashing Message authentication Availability # Making sure systems and data are available for authorized users. Backups Redundant systems Disaster recovery plans These support fault tolerance and availability.

Transport Layer (OSI Layer 4)

networking

Segments packets for sending or reassembles packets. Uses ordered numbering system to organize the packets. Re-requests any packets that were corrupted in transfer. Segmentation # Reassembly #

Virtual Routing And Forwarding

networking

In IP-based computer networks, virtual routing and forwarding (VRF) is a technology that allows multiple instances of a routing table to co-exist within the router at the same time. One or more logical or physical interfaces may have a VRF and these VRFs do not share routes therefore the packets are only forwarded between interfaces on the same VRF. VRFs are the TCP/IP equivalent of a VLAN .

VLAN

networking

A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2) . Source: https://en.wikipedia.org/wiki/Virtual_LAN Enables you to segment a physical network into multiple discreet networks without having additional hardware. Create a VLAN by taking a single physical broadcast domain made up of one or more switches and chop it up into multiple broadcast domains. Requires switches with specific programming to create the virtual networks. ...

Wi-Fi (WiFi)

networking

Wi-Fi (WiFi) # Wi-Fi is a family of wireless network protocols , based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves . Most widely used type of network in the world Wikipedia - Wi-Fi

Wireless Networking

networking

Wireless Network WiFi Encryption/Security # WEP WPS Wireless Networking Standards # _IEEE 802.11* standards_ Wireless Networking Standards

Wireless Networking Standards

networking

AKA IEEE 802.11 standards and specifications Resources # Wikipedia - IEEE 802.11 Wireless Standards and Specifications # Specification 802.11a 802.11b 802.11g 802.11n 802.11ac 802.11ax Frequency 5 GHz 2.4 GHz 2.4 GHz 2.4 GHz or 5 GHz 5 GHz 2.4 GHz or 5 GHz Maximum speed 54 Mbps 11 Mbps 54 Mbps 600 Mbps 1.3 Gbps 9.6 Gbps Maximum distance 100 ft 150 ft 150 ft 300 ft 150 ft 150 ft Channels (non-overlapped) 24 (24) 11 (3) 11 (3) 2. ...