- ✓Router configuration typically involves setting interface IP addresses, configuring routing protocols, and defining access control lists.
- ✓VLANs partition a physical network into multiple logical networks, improving security and reducing broadcast traffic without requiring additional hardware.
- ✓Wireless network configuration requires decisions about frequency band, channel selection, security protocols such as WPA3, and access control.
- ✓Network operating system command-line interfaces such as Cisco IOS and Junos OS are industry standards that network professionals must be familiar with.
- ✓Configuration backups should be taken before and after every change, enabling quick recovery if a misconfiguration causes network problems.
Listen to the full episode inside the course. Enrol to access all 80 episodes, plus assignments, tutor support and Student Finance funding.
Start learning →Alex: Today we're getting hands-on with network configuration. Sam, what does configuration work look like in a managed network environment?
Sam: In a managed network environment, configuration work is disciplined, documented, and controlled. Every change goes through a change management process: the change is proposed, its impact is assessed, it's tested in a lab environment if possible, it's reviewed and approved, it's implemented during a planned maintenance window, and it's documented. This discipline prevents the configuration drift and undocumented changes that are the source of so many network problems.
Alex: Let's talk about router configuration specifically.
Sam: Router configuration in an enterprise environment typically involves setting interface IP addresses, defining the routing protocol to be used, configuring access control lists to filter traffic, setting up VPN tunnels to remote sites, and configuring quality of service policies. Most enterprise routers use a command-line interface, with Cisco IOS being the most widely encountered. The commands follow a structured hierarchy, and becoming fluent with them is a core networking skill.
Alex: What about VLAN configuration on switches?
Sam: VLANs, Virtual Local Area Networks, are one of the most powerful tools in network management. They partition the physical network into logical segments, allowing you to group devices by function rather than physical location. You might have a VLAN for servers, a VLAN for workstations, a VLAN for voice traffic, and a VLAN for guest Wi-Fi, all sharing the same physical infrastructure but logically separated. Configuration involves creating the VLANs on the switches, assigning ports to VLANs, and configuring trunk links between switches to carry multiple VLAN traffic.
Alex: How do you manage wireless networks in an enterprise environment?
Sam: Enterprise wireless is typically managed centrally through a wireless LAN controller, which provides a single point of management for all access points in the organisation. The controller handles authentication, roaming between access points, radio frequency management, and security policy enforcement. Each wireless network is associated with a VLAN, and the controller handles the mapping between wireless SSIDs and wired VLANs. Configuration decisions include channel selection and power levels to minimise interference, band steering to optimise use of 5GHz and 6GHz bands, and security settings including WPA3 and 802.1X authentication.
Alex: What's 802.1X?
Sam: 802.1X is a port-based authentication protocol that controls access to a network by requiring devices to authenticate before they're allowed to connect. When a device tries to connect to a port or wireless network configured with 802.1X, it's challenged to provide credentials. These are passed to a RADIUS authentication server, which validates them against a directory like Active Directory. Only authenticated devices are allowed network access. It's a much more secure approach than relying on physical access controls alone.
Alex: And the importance of configuration backups?
Sam: Critical. You should have an automated backup of every network device's configuration, stored in a secure, version-controlled system. If a device fails and needs to be replaced, or if a misconfiguration needs to be rolled back, a reliable backup makes recovery fast and complete. Without backups, replacing a misconfigured device means rebuilding its configuration from memory or documentation, which is slow and error-prone.
Alex: Thanks Sam. Next we look at network protocols and standards.