0% found this document useful (0 votes)
46 views8 pages

Training Windows Admin and Networking

Networking

Uploaded by

Ciprian ionut
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views8 pages

Training Windows Admin and Networking

Networking

Uploaded by

Ciprian ionut
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Training Windows Admin and Networking

Pentru lectii video trebuie sa va faceti cont freetrial de 10 zile pe


https://app.pluralsight.com/library/
Dupa activarea contului cursurile se gasesc aici:
https://app.pluralsight.com/paths/skill/networking-fundamentals doar modulul beginner ,
Si aici :
https://app.pluralsight.com/library/courses/windows-client-administration/table-of-contents

Cele doua cursuri sunt mai mult decat suficiente daca le invatati dar daca nu intelegeti ceva
aveti mai jos si alte materiale .

Windows admin:

- https://www.howtogeek.com/school/using-windows-admin-tools-like-a-pro/lesson1/
-de pe aceasta pagina se trece prin cele 9 lectii de la “school navigation”

- https://www.howtogeek.com/school/windows-network-sharing/
-trebuie trecut prin cele 10 lectii

Troubleshooting

Basic Networking
Concepts
● IP address
○ IPv4 (32 bits) vs IPv6 (128 bits)
○ The transition from IPv4 to IPv6 is due to address space range.
○ Private vs public IPs
○ Each network adapter has assigned an IP (either static or dynamically by a
DHCP Server). One device (Workstation, Server, etc.) can have multiple
network adapters.
○ Types of IPv4 addresses:
■ Unicast - Assigned to a single network interface located on a specific
subnet on the network and used for one-to-one communications.
■ Multicast - Assigned to one or more network interfaces located on
various subnets on the network and used for one-to-many
communications.
■ Broadcast - Assigned to all network interfaces located on a subnet on
the network and used for one-to-everyone-on-a-subnet
communications.
○ Special IP Addresses:
■ 0.0.0.0 - known as the unspecified IPv4 address, it is used to indicate
the absence of an address. The unspecified address is used only as a
source address when the IPv4 node is not configured with an IPv4
address configuration and is attempting to obtain an address through
a configuration protocol such as Dynamic Host Configuration Protocol
(DHCP). Also some services uses this address to listen to any IP
address.
■ 127.0.0.1 - known as the IPv4 loopback address, it is assigned to an
internal loopback interface, enabling a node to send packets to itself.
○ IPv4 Name Resolution
■ https://technet.microsoft.com/en-us/library/dd379505(v=ws.10).aspx
○ Ipv4 Routing
■ https://technet.microsoft.com/en-us/library/dd379495(v=ws.10).aspx
○ IPv4 Physical Address Resolution
■ https://technet.microsoft.com/en-us/library/dd392257(v=ws.10).aspx
○ Resources:
■ https://technet.microsoft.com/en-us/library/dd379547(v=ws.10).aspx
■ https://technet.microsoft.com/en-us/library/dd379505(v=ws.10).aspx
■ https://www.ibm.com/support/knowledgecenter/en/ssw_ibm_i_61/rzai2
/rzai2compipv4ipv6.htm
■ https://www.isoc.org/internet/issues/ipv6_faq.shtml#q3
● MAC
○ Network adapters have a uniquely address associated.
○ If a network adapter is receiving a packet, it is comparing the packet’s
destination MAC address to the adapter’s own MAC address. If the addresses
match, the packet is processed, otherwise it is discarded.
○ Since ethernet uses MAC addresses, the sender needs to get the MAC
address of the next hop. There is a special protocol ARP (address resolution
protocol) that is used for that. Once the sender has retrieved the MAC
address of the next hop, he writes that target MAC address into the packet
and sends the packet.
○ Resources:
■ For more details how the ARP works and and how the routing of the
packets is done check the link below:
■ https://www.howtogeek.com/169540/what-exactly-is-a-mac-address-
used-for/
● Port
○ TCP and UDP have separate port spaces, each identified by port numbers in
the range 1-65535.
○ There are some Common Ports for different services. Check this for more
details: http://web.mit.edu/rhel-doc/4/RH-DOCS/rhel-sg-en-4/ch-ports.html
○ Important:
■ In general, each service listens to a port for incoming connections
(server role), and each client connects to that service using a different
port (client role).
■ Two services cannot listen on the same port.
■ To check what service (process) is listening on port, use the netstat
command if you have access to the host where the service is running.
■ To check remotely if there is any service that listens to a specific
ip_address:port, use telnet command.
Devices
● Router
○ Used to connect multiple networks together.
○ Acts as a dispatcher, choosing the best path for the packets to be transmitted
from a source to a destination.
○ Connects networks
○ Analyze the data being sent over a network, change how it is packaged, and
send it to another network or to a different type of network.
○ Routers can have different capabilities, such as:
■ Firewall - specialized software that can analyze the incoming and the
outgoing data
■ VPN (Virtual Private Network) - allowing access to a private network
remotely
○ Resources:
■ https://www.diffen.com/difference/Router_vs_Switch
● Switch
○ Used to connect multiple devices(computers, servers, printers, etc.) in the
same network.
○ Acts as a controller
○ Creates a network
○ Two types:
■ Unmanaged (works out of the box)
■ Managed - can be configured
○ Resources:
■ https://www.cisco.com/c/en/us/solutions/small-business/resource-
center/connect-employees-offices/networking-basics.html
● Access Point
○ Allows wireless devices to connect to the network
○ It is connected to a wired router, or switch
○ Resources:
■ https://www.lifewire.com/wireless-access-point-816545
■ https://en.wikipedia.org/wiki/Wireless_access_point

Protocols
● IP, TCP, UDP, DHCP, HTTP
Infrastructure
● IP Allocation (static vs dynamic)
● Subnets
● Gateway
● Virtual networks
● Firewall (inbound/outbound rules)
○ Monitors incoming and outgoing network traffic and decides whether to allow
or block specific traffic based on a defined set of security rules.
○ Types of firewall:
■ Proxy firewall - serves as the gateway from one network to another for
a specific application. Proxy servers can provide additional
functionality such as content caching and security by preventing direct
connections from outside the network.
■ Traditional Firewall -
● Proxy

Resources
● https://www.objc.io/issues/10-syncing-data/ip-tcp-http/

Basic Network Troubleshooting (Windows)

Commands
● Ping
○ Used to determine if the destination host is reachable. If the requesting hosts
receive a response from the destination hosts, this means that the host is
reachable.
○ It sends an ICMP echo request to a target host name or IP address.
○ ICMP messages typically report errors in the processing of datagrams in the
network.
○ The destination host can be:
■ Loopback address (127.0.0.1)cmd
■ Local IP Address
■ Gateway IP Address
■ Remote Host IP address
○ Command: ping ip_address (or hostname if DNS is configured)
○ Resources
■ https://docs.microsoft.com/en-us/windows-
server/administration/windows-commands/ping
■ http://searchnetworking.techtarget.com/definition/ICMP
■ https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol
● Tracert
○ Used to determine the path taken to a destination host and the response time
of the intermediate hosts.
○ It sends ICMP echo request messages to a target host name or IP address
with incrementally increasing time to live (TTL).
○ Command: tracert ip_address (or hostname if DNS is configured)

○ Resources:
■ https://docs.microsoft.com/en-us/windows-
server/administration/windows-commands/tracert
● Ipconfig
○ Displays all current TCP/Ip network configuration for all adapters.
○ It includes, the IP Address, Subnet Mask, and Default Gateway, DNS
settings.
○ It can be either static (manually configured) or given by a DHCP.
○ Command: ipconfig
■ Important parameters
● /all - Displays the full TCP/IP configuration for all adapters.
● /flushdns - Flushes and resets the contents of the DNS client
resolver cache.
● /release [adapter] - Notify the DHCP Server to release the
current DHCP configuration and discard the IP address
configuration for the adapter(s).
● /renew [adapter] - Renews DHCP configuration for all adapters.
○ Resources:
■ https://docs.microsoft.com/en-us/windows-
server/administration/windows-commands/ipconfig

● Netstat
○ Used to determine active TCP connections, ports on which the computer is
listening, Ethernet statistics, IP routing table, IPv4 statistics.
○ One of the most important usage is displays active TCP connections, with
addresses and port numbers, in order to check what process (PID) is listening
on what ip address:port. Also it can be used to verify the status of a
listening port on a host or to check and see what remote hosts are
connected to a local host on a specific port.
○ Command: netstat [parameters]
■ Most useful parameters:
● -a - display all active connections and listening tcp/udp ports
● -n - displays active TCP connections with addresses and port
numbers in numerical form
● -o - display active TCP connections and includes the process
ID (PID)
● -p - show connections only of the specified protocol: tcp, udp,
etc.
● -r - display the routing table
● Some parameters can be combined. Check the resources.

○ Resources:
■ https://docs.microsoft.com/en-us/windows-
server/administration/windows-commands/netstat

Tools and Services (Windows)

Window
● Event Viewer
○ Shows a log of application and system messages, including errors,
information messages, and warnings.
○ There are different categories, but the most important ones are:
■ Application: The Application log records events related to
Windows system components, such as drivers and built-in
interface elements.
■ System: The System log records events related to programs
installed on the system.
■ Security: When security logging is enabled (it’s off by default in
Windows), this log records events related to security, such as
logon attempts and resource access.
○ Resources:
■ https://www.howtogeek.com/123646/htg-explains-what-the-
windows-event-viewer-is-and-how-you-can-use-it/
● Remote Desktop Connection
○ https://www.digitalcitizen.life/connecting-remotely-windows-desktop-
windows-7
○ https://security.berkeley.edu/resources/best-practices-how-
articles/securing-remote-desktop-rdp-system-administrators

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy