Network Troubleshooting PDF
Document Details
Uploaded by barrejamesteacher
null
EC-Council
Tags
Related
- Network Troubleshooting Exam 212-82 PDF
- Chapter 16 - 01 - Discuss Network Troubleshooting - 01_ocred_fax_ocred.pdf
- Chapter 16 - 01 - Discuss Network Troubleshooting - 05_ocred_fax_ocred.pdf
- Chapter 16 - 01 - Discuss Network Troubleshooting - 06_ocred_fax_ocred.pdf
- Chapter 16 - 02 - Learn Troubleshooting Basic Network Issues using Utilities and Tools - 01_ocred_fax_ocred.pdf
- Chapter 16 - 02 - Learn Troubleshooting Basic Network Issues using Utilities and Tools - 02_ocred_fax_ocred.pdf
Summary
This document discusses network troubleshooting techniques for cybersecurity technicians, including methods for resolving issues such as network path not found errors. It covers verifying shared drives, pinging IP addresses, and modifying network security settings.
Full Transcript
Certified Cybersecurity Technician Network Troubleshooting Exam 212-82 Troubleshooting Network Issues: Network Path Cannot Be Found Q The issue of “network path was not found” may arise for the following reasons: » The network connection does not exist » The network security settings do not allow sh...
Certified Cybersecurity Technician Network Troubleshooting Exam 212-82 Troubleshooting Network Issues: Network Path Cannot Be Found Q The issue of “network path was not found” may arise for the following reasons: » The network connection does not exist » The network security settings do not allow sharing » The name of the computer with which the connection is to be established is too long » The connection of system is blocked by firewall or the antivirus software.. ’ | -Q——I (@ Troubleshooting Newokmor O ' - Windows cannot access \\test v Verify the shared drive Check the spelling of the name. Otherwsie, there aught be a problem with your network. To v Ping the IP address of the target computer (R)"5 Hide detais v Reinstall the network adapter drive tryto identify and resolve network peoblems, chick Diagnese rom— v o MOdify the network security settings v’ Enable NetBIOS over TCP/IP Error code: (52O00035 The network path was not found. v Rename the computer v Disable the firewall Copyright © by EC-C cll, All Rights Reserved, Reproduction Is Strictly Prohibited Troubleshooting Network Issues: Network Path Cannot Be Found Error code 0x80070035, “The network path was not found,” appears when hosting a system on a network to access files from another system without Ethernet. [ | e Windows cannot access \\test e Check the spelling of the name. Otherwrie, there mught be a problem with your network. To try to wdentify and resolve network peoblems, chick Diagnese I:::\:, Hide details hagnose Cancel Error code: (520070035 The network path was not found, Figure 16.28: Network error A few different and unrelated technical problems generate this error. This issue often occurs for the following reasons: = The network connection does not exist. = Network security settings do not allow sharing. = The name of the computer with which the connection is to be established is too long. = The connection or system is blocked by firewall or antivirus software. Module 16 Page 1951 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Troubleshooting Exam 212-82 Methods to Troubleshoot “The Network Path Cannot Be Found” Error = Verify the shared drive: o Right-click the drive that is to be shared and select Properties. — -nsme v Devices and drives (3) ) \ - Floppy Disk Drive (A:) i DVD Drive (D:) Local Disk (C:) ~ Open Open in new window CCSA_XB4FRE_EN-US_DVS 0 bytes free of 4.03 GB Pin to Quick access & Turn on BitLocker m Scan with Windows Defender... Share with > Restore previous versions Pin to Start Format... Copy Create shortcut B Rename Figure 16.29: Select the Drive to be Shared o Navigate to the Sharing tab. Click Advanced Sharing... if it says Network Path: Not Shared under the section Network File and Folder Sharing. % Local Disk (C:) Properties Securty X Previous Versions General Tools Hardware Network File and Folder Sharing A\ ' Mot Shared Share Advanced Sharing Set custom permissions, create multiple shares, and set other advanced shanng options. " QAdvanced Shanng... Password Protection People must have a user account and password for this computer to access shared folders To change this setting, use the Network and Shanng Center. Close anc fpply Figure 16.30: Share the Selected Drive Module 16 Page 1952 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting o Tick the box for Share this folder, ensure the Share name is correct, and click Apply o To ensure the drive is shared, open the Run window in the system that needs to and OK. access the drive, type the name of the drive, and click OK..2 Run X =7 Type the name of a program, folder, document, or Internet = resource, and Windows will open it for you. Open: [ v Cancel Browse... Figure 16.31: Ensure the Drive is Shared = Ping the IP address of the target system: o On the target system, type in the following command in the command prompt. BN C:\Windows\system32\cmd.exe Microsoft (c) 2017 Windows Microsoft “:\Users\ Windows IP [Version 10.0.15863] ipconfig /all Corporation. All rights reserved. Configuration Host Name Primary Dns Suffix Node Type IP Routing Enabled WINS Proxy Enabled Figure 16.32: Execute “ipconfig” Command o Locate the category IPv4 Address and note down the address (192.168.43.157) here. Figure 16.33: Locate IPv4 Module 16 Page 1953 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Troubleshooting o Exam 212-82 Again, type in the Run window \\IPv4 Address\(the drive that is to be accessed). /< Run X Type the name of a program, folder, document, or Internet resource, and Windows will open it for you. Open: | \\192.168.43.157\c v] 0K Browse... Cancel Figure 16.34: Ensure the Drive to be Accessed o = Ensure that the specified drive is the one that is shared (the C drive in this case). Modify the network security settings: In case the above two methods did not work, check whether the problem is with the network connection. o Double-click Local Policies/Security authentication level. o From the drop-down menu, select Send LM & NTLM-use NTLMv2 session security if negotiated and click Apply and OK. o Try accessing the shared drive now. Y ) File urity Action | P Em > L@ Account Policies v L4 Local Policies Poli ) : U::v':?i eh:yAni pels ’ (A Secur gOp v 3 > ) ) > ] » | > ] LAN Manager 1 Help XD i Security Settings Audit security: = View 2m > Options/Network Windows Defender Firewall with Adve Network List Manager Policies Public Key Policies Software Restriction Policies Application Control Policies 5> &, IP Security Policies on Local Com, » | Advanced Audit Policy Config............. Network security: LAN Manager authentication level Prop... A Policy Network Network Network Network Network Network Network Network N, rk " Network access: Shares that can be accessed anenymously access: Sharing and security medel for local accou.., security: Allew Local System to use computer ident... security: Allow LocalSystem NULL session fallback security: Allow PKU2U authentication requests to t... security: Configure encryption types allowed for Ke... security: Do net store LAN Manager hash value en... security: Force logoff when logon hours expire y: LAN Manager authentication level security: LDAP client signing requirements Local Securty Settng j x Network securty: LAN Manager authenticaticn level [Send LM & NTLM - use NTLMv2 session securty € negotiated ‘ 7 Explan | Modfying tha setting may affect compatibdty with clents, services, and applcation: ) For more infoematicn. see autherticaton level 1Q823659). Network security: Minimum session security for NTLM SSP..... Network security: Minimum session security for NTUM SSP..... Network security: Restrict NTLM: Add remote server excepti..... Network security: Restrict NTUM: Add server exceptions in t.... Network security: Restrict NTUM: Audit Incoeming NTLM Traf..... Network security: Restrict NTLM: Audit NTLM authenticatio..... Network security: Restrict NTLM: Incoming NTLM traffic.. Network security: Restrict NTLM: NTLM authentication in thi........ Network security: Recovery le: Recovery conscle: Shutdown: Allow Shitdnwn: Restrict NTUM: Outgoing NTLM traffic tor... Allow autematic administrative logon Allow floppy copy and access to all drives... system to be shut down without having to... Claar vietial maman: nanefils Figure 16.35: Modify Network Security Settings Module 16 Page 1954 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Troubleshooting = Exam 212-82 Reinstall network adapters o Connect the computer to the Internet with a physical wire and run the command o Click the View tab in the Device Manager window and check Show hidden devices. devmgmt.msc. - ;.{ Device Manager File Action | m| v & 3 7 Devices by connection by container Devices > | Aud > > > > > > > > l Devices by type RDDW-( X Help | View - [m] Resources by type Com & Digi Resources by connection [ Customize... Firm bets Human Interface Devices > *@ IDE ATA/ATAPI controllers » =2 Keyboards > (§ Mice and other pointing devices » [ Monitors [ e > R Ports (COM ] &LPT) > = Print queues > | Sound, video and game controllers > ) mm Storage volume shadow copies Storage volumes > [ Processors > B Security devices > ¥ Scftwere components > [ Software devices > G Storage controllers > @ System devices « B lnivereal Saral Rue cantenllare Displays legacy devices and devices that are no longer installed., Figure 16.36: Check “Show hidden devices” The hidden adapters are shown with light-colored translucent icons when the list of network adapters is expanded. o Right-click all the drivers and uninstall them by selecting Uninstall device. v [ Network adapters [P BlackBerry Virtual Private Network ' Bluetooth Device (Personal Area Network) 57 (57 1| [ Bluetooth Device (RFCOMM Protocol TDI) Intel(R) Centrino(R) Wireless-N 2230 Microsoft Hosted Network Virtual Adapter Microsoft Kernel Debug Network Adapter ' Microsoft Wi-Fi Direct Virtual Adapter I Microsoft Wi-Fi Direct Virtual Adapter #2 [ RAS Async Adapter (57 Realtek PCle FE Family Controller Update driver T Scan for hardware changes Properties Figure 16.37: Uninstall Network Adapter o Reboot the system and check if the issue is resolved. Module 16 Page 1955 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Troubleshooting = Exam 212-82 Enable NetBIOS over TCP/IP o Runthe command ncpa.cpl. @ Type the name of a program, folder, document, or Internet resource, and Windows will open it for you. Open: [ ncpa.cpl P ] OK Cancel Browse... Figure 16.38: Run “ncpa.cpl” o Right-click the active Wi-Fi or Ethernet connection and select Properties. o Select Internet Protocol Version 4 (TCP/IPv4) and click Properties. Y Wi-Fi Properties Networking X Sharing Connect using: & Qualcomm Atheros AR9485 Wireless Network Adapter This connection uses the following tems: " ROKK R V) B3 Clientfor Microsoft Networks N ‘I VMware Brdge Protocol " File and Printer Sharing for Microsoft Networks T QoS Packet Scheduler 4. Microsoft Network Adapter Muttiplexor Protocol 4. Microsoft LLDP Protocol Driver. Descrioti v Uil Transmission Control Protocol/Intemet Protocol. The defauit wide area network protocol that provides communication across diverse interconnected networks. OK Cancel Figure 16.39: Select Properties of TCP/IPv4 o Click Advanced in the next window TCP/IP Settings. Module 16 Page 1956 and switch to the WINS tab under Advanced Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Troubleshooting o Exam 212-82 Under NetBIOS setting, check Enable NetBIOS over TCP/IP and click OK. Advanced IP Settings i TCP/IP Setting: DNS ~ WINS WINS addresses, in order of use: Add... Edit... Remove If LMHOSTS lookup is enabled, it applies to all connections for which TCP/IP is enabled. Enable LMHOSTS lookup | Import LMHOSTS... NetBIOS setting O Default: Use NetBIOS setting from the DHCP server. If static IP address is used or the DHCP server does not provide NetBIOS setting, enable NetBIOS over TCP/IP. |_® Enable NetBIOS over TCP/IP | (O Disable NetBIOS over TCP/IP Figure 16.40: Enable NetBIOS over TCP/IP o = Reboot the PC to save the changes. Rename the computer o Go to Control Panel/Credential Manager. o Select Windows Credentials and click Add a Windows credential. Manage your credentials View and delete your saved logon information for websites, connected applications and networks. | % Web Credentials Back up Credentials % Windows Credentials Restore Credentials |Windows Credentials Add a Windows credential No Windows credentials. Certificate-Based Credentials Add a certificate-based credential No certificates, Figure 16.41: Add a Windows Credential Module 16 Page 1957 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Troubleshooting o Sequentially enter the username and password of each machine connected to the network. Type the address of the website or network location and your credentials Make sure that the user name and password that you type can be used to access the location. Internet or network address (e.g. myserver, server.company.com): I| I OK Figure 16.42: Enter Credentials for Machine o = Follow the above procedure for the connected PCs. Disable antivirus and firewall o Right-click the antivirus program icon from the system tray and select Disable. Open Norton Security Run QuickScan Search Run LiveUpdate View Recent History Get Support Turn on Silent Mode Disable Smart Firewall Check for New Version Figure 16.43: Disable Anti-virus o Select the time frame for which the antivirus program will remain disabled. n Security Request * = Protection Alert ter vl vulnerablet your computer Select the duration. hout o. =3 Figure 16.44: Duration Selection Module 16 Page 1958 Certified Cybersecurity Technician Copyright © by EG-Bouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Troubleshooting Exam 212-82 o Once done, check whether the error is resolved. o Go to Control Panel/System and Security. o Click Windows File Firewall. v Edit ‘ View » Control Panel Tools > Help. and Maintenance. Security a (& ¢ Control e Panel H * » System and Security Review your computer's status and resolve issues System and Security. Change Troubleshoot common computer problems Network and Internet Hardware and Sound Check firewall status Programs SyStem User Accounts View amount of RAM| Appearance and Allow an app through Windows Firewall Windows Firewall Set firewall security options to help protect your computer from hackers See the name of this d and malicious software. Personalization Clock, Language, and Region \& Power Options Change battery settings Ease of Access | jte a = Change what the power buttons do Figure 16.45: Click “Windows Firewall” o Click Turn Windows Firewall on or off from the left pane. @ Windows Firewall &« File v Edit 4 @ View > Control Panel Tools Help Control Panel Home ® Allow an app or feature through Windows Firewall Change notification settings Turn Windows Firewall on or off Restore defaults Advanced settings Troubleshoot my network Figure 16.46: Select “Turn Windows Firewall on or off” Option o Select Turn off Windows Firewall and restart the PC. Module 16 Page 1959 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.