Overview

Introduction

Welcome to the Troubleshoot Network Connectivity with Network Utilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 - Using ipconfig
  • Exercise 2 - Using pathping
  • Exercise 3 - Using route
  • Exercise 4 - Using iptables
  • Exercise 5 - Using tcpdump
  • Exercise 6 - Using nmap

After completing this lab, you will be able to:

  • Using the Ipconfig tool
  • Disable or uninstall some network settings
  • Test Host Reachability Using Pathping
  • To use route tool and view a routing table
  • Examine routing behavior
  • Use iptables to block a source IP
  • Use iptables to block a destination port
  • Explain the functions of tcpdump
  • Examine hosts using nmap

Exam Objectives

The following exam objectives are covered in this lab:

  • N10-007 3.3: Explain common scanning, monitoring and patching processes and summarize their expected outputs (Processes, Port scanning)
  • N10-007 3.3: Explain common scanning, monitoring and patching processes and summarize their expected outputs (Processes, Vulnerability scanning)
  • N10-007 3.3: Explain common scanning, monitoring and patching processes and summarize their expected outputs (Patch management, Packet/traffic analysis)
  • N10-007 4.5: Given a scenario, implement network device hardening (Disabling unused ports, IP ports)
  • N10-007 4.5: Given a scenario, implement network device hardening (Disabling unused ports, Device ports - physical and virtual)
  • N10-007 5.2: Given a scenario, use the appropriate tool (Command line, iptables)
  • N10-007 5.2: Given a scenario, use the appropriate tool (Command line, tcpdump)
  • N10-007 5.2: Given a scenario, use the appropriate tool (Command line¸ pathping)
  • N10-007 5.2: Given a scenario, use the appropriate tool (Command line¸ nmap)
  • N10-007 5.2: Given a scenario, use the appropriate tool (route)
  • N10-007 5.2: Given a scenario, use the appropriate tool (Software tools, Port scanner)
  • N10-007 5.2: Given a scenario, use the appropriate tool (Command line, tracert and traceroute)
  • N10-007 5.2: Given a scenario, use the appropriate tool (Command line, ipconfig)
  • N10-007 5.5: Given a scenario, troubleshoot common network service issues (Blocked TCP/UDP ports)

Lab Duration

It will take approximately 1 hour to complete this lab.

Exercise 1 - Using ipconfig

Ipconfig is a Windows utility whose name is based on the phrase Internet Protocol Configuration. As its name suggests, it is a tool used to display all existing IP network configuration values. The tool is also used to change settings of Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS). The ipconfig command with the switch /all provides more detailed information than ipconfig.

The parameter /release releases the IP address for the specified adapter from DHCP server. The parameter /renew renews the IP address for the specified adapter from DHCP server.

Learning Outcomes

After completing this exercise, you will be able to:

  • Using the Ipconfig Tool
  • Disable or uninstall some network settings

Exercise 2 - Using pathping

Pathping is a Windows-based TCP/IP diagnostic tool that provides information about the network path, network delays and dropped packets from the source to the destination network. This tool combines the functionality of tracert and ping commands to verify connectivity between devices.

Learning Outcomes

After completing this exercise, you will be able to:

  • Test Host Reachability Using Pathping

Exercise 3 - Using route

Route is a Windows-based command that allows for the viewing of the local routing table of the device as well as the manipulation of this routing table.

Learning Outcomes

After completing this exercise, you will be able to:

  • To use route tool and view a routing table
  • Examine routing behavior

Exercise 4 - Using iptables

iptables is a utility program that allows a system administrator to configure specific rules that will be enforced by the device on all packets traversing the device. It acts as a packet filter and firewall that examines and directs traffic based on port, protocol, and other criteria. iptables is a Linux based utility. In this exercise, you will examine how it functions.

Learning Outcomes

After completing this exercise, you will be able to:

  • Use iptables to block a source IP
  • Use iptables to block a destination port

Exercise 5 - Using tcpdump

tcpdump is a command line packet analyzer primarily used in Linux based systems. It essentially prints up the contents of network packets. It can read packets from a network interface card from a previously created and saved IP packet file. It is very useful for troubleshooting network problems on a packet by packet basis. In this exercise, you will examine how it functions.

Learning Outcomes

After completing this exercise, you will be able to:

  • Explain the functions of tcpdump

Exercise 6 - Using nmap

nmap, which is short for Network Mapper, is a Linux based utility that, as its name suggests, maps a network. It can perform network scans to identify what services a host is running, determining the operating system it is using as well as the applications it may have running. Other information includes IP addresses, MAC addresses as well as an identification of the host firewall type a device may be using. nmap is a powerful tool that can be used by network admins but may also be leveraged by malicious users as well. In this exercise, you will examine how nmap functions.

Learning Outcomes

After completing this exercise, you will be able to:

  • Examine hosts using nmap

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.