&
Advanced Switching
This protocol is a routing technology that modifies the network address in the packet header and allows multiple devices on a private network to share a single IP address
NAT
Time-sensitive communications where occasionally dropping packets is better than waiting
UDP
Establishes a secure connection between client and server by exchanging messages to verify each other's identity and agree on encryption methods
TLS
Supports 2.4 GHz and 5 GHz, achieves up to 72 Mbps accommodates wider channel bandwidth
802.11n
Servers connect to multiple switches for redundancy using mesh topology
Spine and Leaf Topology
An enhanced distance-vector protocol that calculated the shortest path and easily transitions to IPv6 networks when necessary
EIGRP
A set of IP addresses statically set aside and and not assigned
DHCP Exclusions
KPI average time to fix and restore a failed system
MTTR
Wi-Fi standard Implements individualized date encryption for each device and makes brute force attacks more challenging
WPA3
Backbone for SANs
Fibre Channel
Connects a customers internal network to a providers network acting as a security barrier for the customers network
Customer Edge Router (CE)
Uses ARP to assign unique IP addresses on local networks when DHCP unavailable
APIPA
Various algorithms used to reduce downtime and increase scalability to distribute network traffic across multiple servers
Load Balancers
Remote network protocol which transmits data in plain text only
Telenet
Highly secure isolated environments within a public cloud
VPCs - Virtual Private Clouds
Routing protocol which uses the best path algorithm, can be customized, and supports authentication
BGP
Encrypted data that uses only one channel and port 22
SFTP
Offers encryption and strong user authentication when monitoring devices on your network
SNMP v3
Unauthorized wireless access point that’s been installed on the network without administrators permission
Rogue Access Point
Networks created and modified without reconfiguring the original network - perfect to optimize traffic load for two branch offices
Overlay Network
A single connection which partitions a network into subnetworks and provides only one access point between each subnet
VLAN Trunking
Host on a network automatically configures a unique IPv6 address without any device keeping track of which address is assigned to which node
SLAAC
Where uptimes are crucial to your organization, ensures continuous operation to minimize downtime by providing redundancy
High Availability Clusters
Used when fast and secure end-to-end communications between a client and server are needed and only the payload is encrypted
IPsec Transport Mode
architecture combining networking and security into a single cloud-delivered service at the network edge
SASE