The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by , 2016-10-09 18:40:30

Networking Fundamentals, Exam 98-366

Networking Fundamentals, Exam 98-366

Defining Network Infrastructures and Network Security | 179

6. Your client wants a server that can cache web pages in order to increase the speed of
commonly accessed Web sites. What type of server does the client require?
a. Proxy
b. DNS
c. Firewall
d. VPN

7. The customer you are working for wants a device that can detect network anomalies and
report them to an administrator. What type of device is the customer looking for?
a. Internet content filter
b. Proxy server
c. WINS server
d. NIDS

8. Your boss asks you to set up an area that is not on the LAN but not quite on the
Internet. This area will house servers that will serve requests to users who are connecting
to your intranet. What type of zone does your boss want you to set up?
a. DMZ
b. Extranet
c. FTP
d. VPN

9. You have been asked by a client to install a VPN server that can offer unencrypted
tunnels by default, or encrypted tunnels by using IPSec. Which of the following services
should you choose in order to accomplish this?
a. DNS
b. L2TP
c. WINS
d. IPsec

10. You have set up a default VPN in Windows Server 2008. However, your boss is not
happy with the level of security. She would rather have L2TP combined with IPsec.
What tunneling protocol is running currently on the server?
a. RRAS
b. L2TP without IPsec
c. PPTP
d. VPNv2

Fill in the Blank

Fill in the correct answer in the blank space provided.

1. ____________ allows users to interact with each other and contribute to Web sites.

2. The ____________ defines DNS.

3. The ____________ is an enormous system of interlinked hypertext documents.

4. You have set up a network zone that allows remote access for employees of your
company. This is known as a ____________.

5. You install a VPN server that uses inbound port 1701. The server is utilizing
the ____________ protocol.

6. You installed a VPN server and configured a VPN adapter on a client computer.
However, the connection cannot be completed from the client to the server. This is
because you skipped the ____________ step.

www.it-ebooks.info

180 | Lesson 8

7. The VPN server has been configured and is running properly. However, it has not been
configured to hand out IP addresses to clients. When a VPN server is configured this
way, the clients obtain their IP addresses from a ____________ server.

8. A firewall normally has a private and a ____________ IP address.

9. You have installed a firewall that accepts or rejects packets based on a set of rules. This
firewall keeps track of the state of the network connection. It is running a type of packet
filtering known as ____________.

10. You have configured a firewall so that all ports are closed. Now you are attempting to
scan the firewall’s ports to verify that there are no open ones. You should use the
____________ option within the Nmap port scanning program.

■ Case Scenarios

Scenario 8-1: Setting Up a DMZ

A client wants you to set up a DMZ with two servers. Each server will service a different set
of people:

1. Server #1 will service employees who work from home.
2. Server #2 will service two partner companies.
What two types of network zones will enable this functionality?

Scenario 8-2: Selecting the Appropriate Services

The ABC Company wants you to install a solution that will allow it to do the following:
1. Enable remote client computers to connect via tunneling.
2. Allow for a high level of security during remote connections.

What solution and protocol will enable this functionality?

Scenario 8-3: Setting Up a PPTP Server

Proseware, Inc., requires that you set up a PPTP server on a D-Link DIR-655 router. The
following are details for the IP configuration:

• IP address: 10.254.254.50 (static)

• Subnet mask: 255.255.255.0

• Gateway address: 10.254.254.1

• PPTP server IP address: 10.254.254.199

• Username: administrator

• Password: 123PPTPABC##

Access the DIR-655 emulator at the following link and configure the DHCP server
appropriately: http://support.dlink.com/emulators/dir655/133NA/login.html

Scenario 8-4: Creating a WAN with VPN

This activity will require two Windows Server 2008 computers, each with two network
adapters.

The purpose of this case scenario is to connect two separate networks together over a simulated
WAN and then implement a VPN between the two. Normally, a client on one IP network

www.it-ebooks.info

Defining Network Infrastructures and Network Security | 181

cannot connect to or ping a client on another IP network. Here, the goal is to have the clients
on both networks pinging each other through a routed connection. Each city is considered its
own separate LAN, yet New York City and London will connect to make this WAN. You will
need the following at your disposal:

• Two Windows Server 2008 computers with two network adapters each; because these
will have two network connections, they will be known as multi-homed machines or
computers

• Two client computers minimum
• Crossover cable

You will need to change the IP addresses on all machines.

Servers should be set up as IP .1.

Clients’ IP addresses should ascend from there. Make sure to also set the gateway address to
the Server’s LAN IP.

When all IPs are configured, make sure that all clients can ping the server on the LAN.

Table 8-1 CITY LAN NETWORKS WAN IP (SECOND NIC)
New York City 192.168.1.0 152.69.101.50
IP chart London 192.168.2.0 152.69.101.51

*TAKE NOTE 1. Try to ping any host on the other city. You should not be able to. The results should say
Destination Host Unreachable or Request Timed Out. You should, however, be able to
Tip: Remember that you ping all hosts, including the server in your city.
can make a crossover
cable. Just make sure 2. Verify that your servers have the second NIC set up and functioning with the proper
to use the 568A wiring IP address. Label it WAN card.
standard on one end
and the 568B standard 3. Connect your crossover cable from WAN card on the NYC server to the WAN card on
on the other. Wiring the London server.
was covered in Lesson 3,
“Understanding Wired Create your own internetwork now, and afterward, set up the VPN connection from one
and Wireless Networks.” city to the other so that clients on one city (your choice) can log in to the VPN server in
the other city.

✴ Workplace Ready

Examine Various Levels of Firewalls

Firewalls are extremely important in network security. Every network needs to have one or
more of these in order to have any semblance of safety.

Even if your network has a firewall, individual client computers should be protected by a
software-based firewall as well. Most versions of Windows come with a built-in firewall program.
Some versions such as Windows 7 also include the Windows Firewall with Advanced Security.
This can be accessed by going to Start > Control Panel > System and Security > Windows
Firewall. Then click the Advanced settings link. From here, custom inbound and outbound
rules can be implemented, and the firewall can be monitored as well. Check it out!

www.it-ebooks.info

182 | Lesson 8

When you are done, access the Internet and research the firewalls offered by the following
companies:

• Check Point
• Cisco
• D-Link
• Linksys
• Microsoft (ISA)

Describe the pros and cons of each of these vendors’ solutions. From your analysis, define
which solution would be best for the following scenarios:

• Home office with four computers
• Small office with 25 computers
• Mid-sized company with 180 computers
• Enterprise-level company with 1,000 computers

In your argument, prove your point by showing devices that can support the appropriate
number of users.

www.it-ebooks.info

Index

3-leg perimeter DMZ configuration, 17, 176 Category 5e, 56
568A, 53 Category 6, 56
568B, 53 Centralized computing, 23
802.3, 21–22 Channel bonding, 62
8P8C, 6 CIR (committed information rate), 156
Circuit-level gateway, 173
A Classful network architecture, 69
Address Resolution Protocol, 37 Classless inter-domain routing (CIDR), 85–86
Ad-hoc mode, 62 Client-server model, 23–24
Anycast address, 87 Command prompt, 99–101
Application layer Communications subnetwork

definition, 32 data link layer (DLL), 35–36
gateways, 44, 173 definition of, 33
protocols, 43–44, 45 network layer, 36–38
Application-level gateway (ALG), 173 OSI model, 33–38
ARP table, 37 physical layer, 34–35
Asynchronous transfer mode (ATM), 158, 159 Computer telephony integration (CTI), 24
Attenuation, 55 Connectionless communications, 39
Authentication header (AH), 138 Connection-oriented communications, 39
Automatic Private IP Addressing (APIPA) Continuity tester, 55
definition of, 74 Crossover cable, 53
disabling, 133 Crosstalk, 57
CSU/DSU, 151
B CTI-based server, 24
Back-to-back DMZ configuration, 16, 175
Baseband, 35 D
Basic rate ISDN, 158 Database server, 24
Binary to decimal conversion, 71–72 Data emanation, 56
BitTorrent, 25–26 Data link layer (DLL)
BOGB, 52
Border Gateway Protocol (BGP), 148 communications subnetwork, 35–36
Bridge mode, 61 definition of, 32
Broadband, 35 devices, 45
Broadband cable, 159, 160 layer 2 switching, 36
Broadcast, 3, 10 protocols, 45
Broadcast address, 70 Data transfer rate, 10, 34
Decimal to binary conversion, 71
C Default gateway
Cables, networking configuring, 76–77
definition of, 75–76
BOGB, 52 Demilitarized zone (DMZ)
crossover, 53 back-to-back configuration, 16, 175
fiber optic, 57–59 definition of, 16, 175
plenum rated, 57 perimeter networks, 16–17
shielded twisted-pair, 56 SOHO router, setting up on, 176
straight through, 53 3-leg perimeter configuration, 17, 176
tools, 54–55 Devices, wireless, 59–61
twisted-pair, 51–57 Digital subscriber line (DSL), 159, 160
Caching proxy, 175 Distributed networks
CAM table, 36 client-server model, 23–24
Carrier sense multiple access with collision avoidance (CSMA/CA), 22 definition of, 23
Carrier sense multiple access with collision detection (CSMA/CD), 21 peer-to-peer (P2P) model, 24–26

183

www.it-ebooks.info

184 | Index G
Gateways
Distributive computing, 23
DNS server address application layer, 44, 173
circuit-level, 173
configuration, 76–77 default, 75–77
definition of, 76 Gigabit Ethernet, 23
Domain Name System (DNS) Global routing prefix, 87
definition of, 138, 142
installing, 139–140 H
DORA process, 129–130 Half duplex, 8, 54
DSL. See Digital subscriber line (DSL) Hops, 153
Dual IP stack, 93 Host, 11
Dynamic Host Configuration Protocol (DHCP) Hub, 3
APIPA, 133
configuring, 130–132 I
definition of, 129, 141 IEEE 802.1Q, 36
DORA process, 129–130 IEEE 802.1X, 62
Dynamic IP address, 74 IEEE 802.3, 21
Dynamic routing, 147 IEEE 802.11 WLAN standards, 61
Inbound ports, 40. See also Ports
E Infrastructure mode, 62
Electromagnetic interference (EMI), 56 Institute of Electrical and Electronics Engineers (IEEE), 21
Emanation. See Data emanation Integrated Services Digital Network (ISDN), 158, 159
Encapsulated, 38 Interface ID, 88
Encapsulating security payload (ESP), 138 Interference, 56–57
Encoded, 43 Interior Gateway Routing Protocol (IGRP), 148
Ethernet Internet, 165–166
Internet Assigned Numbers Authority (IANA), 39–40
definition of, 10, 21 Internet content filter, 175
frame, 38 Internet Control Message Protocol (ICMP), 37
standards, 22–23 Internet Engineering Task Force (IETF), 45, 165
switching, 10, 22 Internet Protocol (IP) address
types, 10
Extranet, 166–167 binary conversion, 71–72
class A, 72–73
F class B, 73–74
Faraday cage, 56 class C, 75
Far end crosstalk (FEXT), 57 definition, 10
Fast Ethernet, 23 IPv4, 69–84, 93
Fiber Distributed Data Interface (FDDI), 20, 21, 159, 160 IPv6, 86–93
Fiber optic cable parts of, 11
public versus private, 74
definition of, 57 settings, configuring, 10–14
EMI, 59 static versus dynamic, 74
examining, 57–58 Internet Protocol Security (IPsec)
modes, 58 definition of, 138, 141
types, 58–59 protocols, 138
File server, 23–24 Intranet, 166–167
File transfer protocol (FTP), 112 ipconfig command
Firewall definition of, 13
definition of, 172 network layer, 37
examples of, 173 TCP/IP, 101–105
methodologies, 172–173 IP conflict, 73
SOHO, four-port, configuring, 173–174 IP forwarding, 138
Frame aggregation, 62 IP proxy, 175
Frame Relay IPv4 address
characteristics, 155–156 classes, 69–75
components, 157 configuring, 75
definition of, 154, 159 default gateways, 75–76
format, 156 DNS server, 76–77
Frames, 21
FTP command, 112–113, 120
Full duplex, 8, 54

www.it-ebooks.info

network address translation (NAT), 78–79 Index | 185
subnetting, 79–84
IPv4-mapped addresses, 93 Network
IPv6 address adapters, 5–9, 60
configuring, 88–93 cables, fiber optic, 57–59
definition of, 86 cables, twisted-pair 51–57
dual IP stack, 93 controller, 24
versus IPv4, 86–87 distributed, 23–26
parts, 87–88 documentation, 2–3
types, 87 interference, 56
IPv6 subnet, 88 operating systems, 24
IPv6 tunneling, 93 perimeter, 16–17
ISDN. See Integrated Services Digital Network reasons for using, 2
speed, 10. See also data transfer rate
L subnet, 81–82
Layer 2 switching, 36 standards, 21–23
Layer 3 switching, 38 topology, 18–20
Leased lines, 156 wired, 51–59 (see also Wired network)
Local area network (LAN) wireless, 59–64 (see also Wireless network)

data transfer on, 10 Network address translation (NAT), 78–79
definition of, 2 Networking services
documentation, examining, 3–5
IP, configuring, 10–14 DHCP, 129–133, 141
structure, documenting, 2–5 DNS, 138–140, 142
types of, 14–16 Remote Access Service, 136
virtual, 15–16 Remote Desktop Services, 134–136
wired, 14–15 Routing and Remote Access Service (RRAS), 136–138, 141
wireless, 15–16 Terminal Services, 134–136, 141
Logical IP address, 70 WINS, 140–141, 142
Logical topology, 20 Network interface card (NIC), 5. See also Network adapter
Loopback IP address, 70 Network intrusion detection system (NIDS), 175
Network intrusion prevention system (NIPS), 175
M Network layer
MAC flood, 36 communications subnetwork, 36–38
Masked, 79 definition of, 32
MDI port, 54 devices, 45
MDI-X ports, 54 layer 3 switching, 38
Media Access Control (MAC) address, 35 protocols, 45
Medium dependent interface (MDI) port, 19, 54 Nmap, 174
Mesh topology, 19–20 Node, 70
Messaging server, 24 nslookup, 112
Microsoft Visio, 3
Multicast address, 87 O
Multicasting, 71 Open shortest path first, 119, 148
Multi-mode fiber optic (MM), 58 Open Systems Interconnection (OSI) model
Multiple-Input Multiple-Output (MIMO), 61
Multistation Access Unit (MAU), 20 communication subnetwork, 33–38
definition of, 31
N layers, 31–33, 39–45
Name resolution Outbound ports, 40. See also Ports
Overhead, 38
DNS, 138–140
WINS, 140–141 P
NAT. See Network address translation (NAT) Packet filtering, 173
NAT filtering, 173 Packets, structure, 88
Nbtstat command, 109–110 Packet switching exchange (PSE), 153
Near end crosstalk (NEXT), 57 Packet switching services
Net command, 119
Netsh command, 113–115 Frame Relay, 154–157
Netstat command, 107–109 X.25, 150–154
Patch cable. See Twisted-pair patch cable
pathping, 111–112
Peer-to-peer (P2P) model, 24–26
Perimeter network, 16–17

www.it-ebooks.info

186 | Index S
Security association (SA), 138
Permanent virtual circuits (PVCs), 155–156 Session layer, 32, 42, 45
Physical data rate (PHY), 62 Serial data transfer, 10
Physical layer Service set identifier (SSID), 62
Shielded twisted-pair (STP) cables, 56
communications subnetwork, 34–35 ShieldsUP, 174–175
data transfer rate, 34 Signal emanation. See Data emanation
definition of, 32 Single-mode fiber optic (SMF), 58
devices, 45 SOHO (small office–home office)
protocols, 45
Ping command firewalls, 173–174
definition of, 13–14 router, 4
network layer, 37 router, DMZ set up, 176
TCP/IP, 101, 105–107 SONET, 158–159, 160
Port address translation, 78 Star topology, 18–19
Port-based network access control, 62 Stateful packet inspection (SPI), 173
Ports Static IP address, 74
categories, 40 Static routing, 147
inbound versus outbound, 40 Straight through cable, 53, 54
MDI, 19, 54 Subnet mask, 11, 79
protocols, 40–41 Subnetting, 79–84
RJ-45, 6 Switch, 5
transport layer, 39–41 Switching, Ethernet, 10
POTS/PSTN, 159, 160 Synchronous, 153
Presentation layer
definition of, 32, 42–43 T
protocols, 45 T1, 157
Primary rate ISDN, 158 T3, 157
Print server, 24 T-carrier, 157–158, 159
Private IP address, 74 TCP/IP
Protocols. See also individual OSI layers
IPSec, 138 command prompt, 99–101
ports, 40–41 commands, 99–120
routing, 147–148 definition of, 69
TCP/IP, 118–119 FTP, 112–113
tunneling, 167–168 ipconfig, 101–105
Protocol stack, 31 model, 45–46
Proxy server, 175 nbtstat, 107, 109–110
Public IP address, 74 net command, 119
Punch down tool, 55 netsh, 113–115
netstat, 107–109
R nslookup, 112
Radio frequency interference (RFI), 56 pathping, 110, 111–112
Remote Access Service, 136 ping, 101, 105–107
Remote Desktop Protocol, 134 protocols, 118–119
Remote Desktop Services, 134–136 route, 115–119
Ring topology, 20 tracert, 110–111
RJ-45 port, 6 Telecommunications Industry Association/Electronics
Route command, 115–119, 120
Routers, network layer, 38 Industries Alliance (TIA/EIA), 53
Routing Telnet, 113
Terminal Services, 134–136, 141
dynamic versus static, 147 Token ring, 20, 21
protocols, 147–148 Torrents, 25–26
Routing and Remote Access Service (RRAS) tracert, 110–111
configuring, 148–149 Transceive, 8
definition of, 136, 141 Transmission Control Protocol (TCP),
enabling, 137–138
Routing information protocol (RIP) 39, 45–46
adding, 148–149 Transport layer
definition of, 118, 147–148
installing, 149–150 definition of, 32, 39
netstat, 41–42

www.it-ebooks.info

Index | 187

ports, 39–41 Frame relay, 154–157, 159
protocols, 45 ISDN, 158–159
Truncated, 88 packet switching, 150–157
Twisted-pair patch cable POTS/PSTN, 159, 160
categories, 56 routing, 147–150
definition, 51 SONET, 158, 160
examining, 51–53 T-carriers, 157–158, 159
interference on, 56–57 X.25, 150–154, 159
standards, 53 Wi-Fi, 61
tools for, 55 Windows Internet Name Service (WINS)
types, 53 definition of, 140, 142
installing, 140–141
U Wired LAN, 14–15
Unicast, 10 Wired network. See also Network
Unicast address, 87 cable, fiber optic, 57–59
Unmasked, 79 cable, twisted-pair, 51–57
User Datagram Protocol (UDP), 39 Wireless access point (WAP), 15, 59–60
Wireless bridge, 61
V Wireless encryption protocols (WEP), 62
Variable-length subnet masking, 85 Wireless local area network (WLAN), 15, 61
Virtual circuit, 153 Wireless network. See also Network
Virtual LAN (VLAN) adapters, 60
connection modes, 62–63
definition of, 15–16 devices, 59–61
layer 2 switching, 36 encryption, 62
Virtual private networks (VPNs) settings, 63–64
creating, 168–171 standards, 61–62
definition of, 167 Wireless repeater, 60
functionality on routers, 171–172 Wireshark, 37–38, 43
tunneling protocols, 167–168 World Wide Web, 166

W X
Web 2.0, 166 X.25
Web server, 24
Wide Area Networks (WAN) advantages of, 154
characteristics, 152
ATM, 158, 159 components, 152
broadband cable, 159, 160 definition of, 150, 159
DSL, 159, 160 switching process, 151
FDDI, 159, 160

www.it-ebooks.info


Click to View FlipBook Version