5. Configure wireless security: If wireless networking is used, configure the wireless security settings such as setting up a Wi-Fi password, enabling encryption, and MAC address filtering.
6. Test the network: After configuring the network, test the network connectivity to ensure that all devices are communicating with each other and can access the internet.
7. Maintain the network: Regularly maintain the network by installing firmware updates, running security scans, and checking network performance to ensure it is running smoothly.
2.6 Compare and contrast common network configuration concepts
DNS
1. Address: DNS is used to convert domain names to IP addresses that computers can understand. DNS stores IP addresses in address records (A records) and IPv6 addresses in AAAA records.
2. Mail exchanger (MX): MX records are used to specify the mail servers that are responsible for accepting email for a particular domain. MX records have a priority value that specifies the order in which mail servers should be contacted.
3. Text (TXT): TXT records are used to store text-based information about a domain, such as SPF or DKIM records.
4. Spam management: SPF, DKIM, and DMARC are all methods of preventing spam and phishing attacks.
a. DomainKeys Identified Mail (DKIM) is an email authentication method that uses public key cryptography to verify the authenticity of an email message.
b. Sender Policy Framework (SPF) is a method of email authentication that allows email administrators to specify which IP addresses are authorized to send email on behalf of a particular domain.
c. Domain-based Message Authentication, Reporting, and Conformance (DMARC) is an email authentication protocol that builds on SPF and DKIM. DMARC allows email administrators to specify what action should be taken if an email fails authentication, such as rejecting or quarantining the email.
DHCP
1. Leases: DHCP leases are used to assign IP addresses to network devices for a specific amount of time. After the lease expires, the IP address is released back into the pool of available addresses.
2. Reservations: DHCP reservations are used to assign a specific IP address to a network device based on its MAC address. This ensures that the device always receives the same IP address.
3. Scope: DHCP scope is the range of IP addresses that are available for DHCP assignment. A DHCP scope can be configured with various options such as subnet mask, gateway, and DNS servers.