Problematic Policies
VLANNING
Monitoring Technologies
Time keeps on slippin
7 Layer Dip
100

This set of guidelines ensures employees understand acceptable use of company-owned devices and networks.

What is an Acceptable Use Policy (AUP)

100

This service translates private IP addresses to public IP addresses, allowing multiple devices to share a single internet connection. 

What is Network Address Translation (NAT)

100

This type of monitoring captures and analyzes all network traffic to identify potential issues, often using tools like Wireshark.

What is Packet Sniffing or protocol analysis

100

This protocol is widely used to synchronize clocks across computer networks. 

What is Network Time Protocol (NTP)

100

Issues at this layer may involve incorrect cabling, faulty hardware, or misconfigured network devices.

What is the Physical Layer (Layer 1)

200

This document outlines the steps an organization should follow to restore operations in case of major network outage. 

What is a Disaster Recovery Plan (DRP)

200

This protocol eliminates the risk of loops in a network by blocking redundant paths on switches.

What is Spanning Tree Protocol

200

This network monitoring tool uses ICMP to test the reachability and response time of a host.

What is Ping
200

This issue occurs when clocks across a network are out of sync, potentially causing authenticity or data logging errors.

What is Time Drift

200

Problems at this layer often include packet loss, incorrect IP configurations, or routing table errors.

What is the Network Layer (Layer 3)

300

This policy helps define who is allowed access to specific resources on a network based on their role.

What is a Role-Based Access Control (RBAC) policy

300

This network service resolves hostnames into IP addresses to facilitate communication over the internet.

What is Domain Name System (DNS)

300

This protocol collects and organizes data about devices on a network, often used for performance monitoring and troubleshooting.

What is SNMP (Simple Network Management Protocol)

300

This element in NTP hierarchy determines how far a device is from the reference clock.

What is Stratum

300

Troubleshooting this layer often involves checking port configurations, firewalls, or application-specific protocols like HTTP or FTP.

What is the Application Layer (Layer 7)

400

This document ensures that the quality of service agreed upon by a provider and client is maintained, such as uptime guarantees.

What is Service Level Agreement (SLA)

400

This VLAN configuration technique allows single switch port to belong to multiple VLANs, dividing traffic efficiently. 

What is VLAN trunking

400

This technology uses network tap or mirror port to duplicate traffic for analysis without affecting the original flow.

What is Port Mirroring or SPAN

400

This mode allows devices to synchronize their clocks even when no direct network connection is available.

What is Autonomous Mode

400

Errors at this layer can result from failed handshakes or incorrect encryption settings in protocols like SSL/TLS.

What is the Session Layer (Layer 5)

500

This type of documentation logs all the changes made to a network, including hardware upgrades and configuration updates. 

What is a Change Management Log

500
This type of VLAN is assigned to handle untagged traffic that doesn't match any other VLAN on a trunk port. 

What is a Native VLAN

500

This tool focuses on detecting and alerting administrators about unusual or suspicious activities in real-time

What is an Intrusion Detection System (IDS)

500

This term represents the measurement uncertainty introduced during the transmission of time synchronization data.

What is Jitter

500

This layer may encounter problems like checksum errors or retransmissions due to unreliable data delivery.

What is Transport Layer (Layer 4)