Get the FREE Ultimate OpenClaw Setup Guide →

network-engineering

Scanned
npx machina-cli add skill aiskillstore/marketplace/network-engineering --openclaw
Files (1)
SKILL.md
5.6 KB

Network Engineering

Comprehensive network engineering skill covering network design, troubleshooting, load balancing, DNS, and network security.

When to Use This Skill

  • Designing network topologies
  • Troubleshooting connectivity issues
  • Configuring load balancers
  • DNS configuration and troubleshooting
  • SSL/TLS setup and debugging
  • Network security implementation
  • Performance optimization
  • CDN configuration

Network Architecture

OSI Model Reference

LayerNameProtocolsTroubleshooting
7ApplicationHTTP, DNS, SMTPcurl, browser tools
6PresentationSSL/TLSopenssl
5SessionNetBIOS-
4TransportTCP, UDPnetstat, ss
3NetworkIP, ICMPping, traceroute
2Data LinkEthernetarp
1Physical-cable tester

VPC/Network Design

Subnet Strategy:

VPC CIDR: 10.0.0.0/16 (65,536 IPs)

Public Subnets (internet-facing):
  - 10.0.1.0/24 (AZ-a) - Load balancers, bastion
  - 10.0.2.0/24 (AZ-b)
  - 10.0.3.0/24 (AZ-c)

Private Subnets (application tier):
  - 10.0.11.0/24 (AZ-a) - App servers
  - 10.0.12.0/24 (AZ-b)
  - 10.0.13.0/24 (AZ-c)

Database Subnets (isolated):
  - 10.0.21.0/24 (AZ-a) - Databases only
  - 10.0.22.0/24 (AZ-b)
  - 10.0.23.0/24 (AZ-c)

Traffic Flow:

  • Internet → Load Balancer (public) → App (private) → DB (isolated)
  • NAT Gateway for private subnet outbound
  • VPC Endpoints for AWS services

Load Balancing

Load Balancer Types

TypeLayerUse Case
Application (ALB)7HTTP/HTTPS, path routing
Network (NLB)4TCP/UDP, static IP, high performance
Classic4/7Legacy
Gateway3Third-party appliances

Health Checks

# ALB Health Check
health_check:
  path: /health
  protocol: HTTP
  port: 8080
  interval: 30
  timeout: 5
  healthy_threshold: 2
  unhealthy_threshold: 3
  matcher: "200-299"

Routing Strategies

  • Round Robin: Equal distribution
  • Least Connections: Route to least busy
  • IP Hash: Sticky sessions by client IP
  • Weighted: Percentage-based distribution
  • Path-based: Route by URL path
  • Host-based: Route by hostname

DNS

Record Types

TypePurposeExample
AIPv4 addressexample.com → 192.0.2.1
AAAAIPv6 addressexample.com → 2001:db8::1
CNAMEAliaswww → example.com
MXMail serverexample.com → mail.example.com
TXTArbitrary textSPF, DKIM, verification
NSName serverDNS delegation
SRVService location_sip._tcp.example.com
CAACertificate authorityRestrict CA issuance

DNS Debugging

# Query specific record type
dig example.com A
dig example.com MX
dig example.com TXT

# Query specific DNS server
dig @8.8.8.8 example.com

# Trace DNS resolution
dig +trace example.com

# Check propagation
dig +short example.com @{dns-server}

TTL Strategy

Record TypeRecommended TTL
Static content86400 (1 day)
Dynamic content300 (5 min)
Failover records60 (1 min)
Pre-migrationLower to 60

SSL/TLS

Certificate Types

TypeValidationUse Case
DVDomain ownershipBasic sites
OVOrganization verifiedBusiness sites
EVExtended validationHigh-trust sites
Wildcard*.domain.comMultiple subdomains
SANMulti-domainMultiple specific domains

TLS Configuration

Recommended Settings:

  • TLS 1.2 and 1.3 only
  • Strong cipher suites (AEAD)
  • HSTS enabled
  • OCSP stapling
  • Certificate transparency

Debugging SSL

# Check certificate
openssl s_client -connect example.com:443 -servername example.com

# Check certificate chain
openssl s_client -connect example.com:443 -showcerts

# Check expiration
echo | openssl s_client -connect example.com:443 2>/dev/null | openssl x509 -noout -dates

# Test TLS versions
openssl s_client -connect example.com:443 -tls1_2
openssl s_client -connect example.com:443 -tls1_3

Troubleshooting

Connectivity Checklist

  1. Physical/Cloud layer: Is the instance running?
  2. Security groups: Are ports open?
  3. NACLs: Are subnets allowing traffic?
  4. Route tables: Is routing correct?
  5. DNS: Does name resolve?
  6. Application: Is service listening?

Common Commands

# Check if port is listening
netstat -tlnp | grep :80
ss -tlnp | grep :80

# Test TCP connectivity
nc -zv hostname 443
telnet hostname 443

# Check routes
ip route
traceroute hostname
mtr hostname

# DNS resolution
nslookup hostname
dig hostname
host hostname

# Network interfaces
ip addr
ifconfig

# Active connections
netstat -an
ss -tuln

Performance Debugging

# Bandwidth test
iperf3 -c server-ip

# Latency analysis
ping -c 100 hostname | tail -1

# MTU issues
ping -M do -s 1472 hostname

# Packet capture
tcpdump -i eth0 port 443

Reference Files

  • references/troubleshooting.md - Detailed troubleshooting workflows

Integration with Other Skills

  • cloud-infrastructure - For cloud networking
  • security-engineering - For network security
  • performance - For network optimization

Source

git clone https://github.com/aiskillstore/marketplace/blob/main/skills/89jobrien/network-engineering/SKILL.mdView on GitHub

Overview

Comprehensive coverage of network design, troubleshooting, load balancing, DNS, and security. It guides architectural decisions, connectivity debugging, SSL/TLS setup, and performance optimization.

How This Skill Works

It combines OSI model references with practical VPC/network design, load balancer configurations, DNS records, and TLS settings to build scalable, secure networks. The skill presents concrete patterns, health checks, and routing strategies engineers can apply directly.

When to Use It

  • Designing network topologies
  • Troubleshooting connectivity issues
  • Configuring load balancers
  • DNS configuration and troubleshooting
  • SSL/TLS setup and debugging

Quick Start

  1. Step 1: Define your VPC with CIDR 10.0.0.0/16 and split into public, private, and database subnets
  2. Step 2: Configure load balancers by type (ALB for HTTP/HTTPS, NLB for TCP/UDP) and set health checks
  3. Step 3: Set up DNS records (A/AAAA/CNAME/MX) and enforce TLS 1.2/1.3 with appropriate certificate types

Best Practices

  • Define a clear VPC/subnet strategy with public, private, and database segments as shown in the design example
  • Use appropriate load balancer types: ALB for HTTP/HTTPS and NLB for TCP/UDP with high performance
  • Implement robust health checks with proper path, interval, timeout, and thresholds
  • Plan DNS records and TTLs to match content type and failover needs (A, AAAA, CNAME, MX, TXT, etc.)
  • Enforce TLS 1.2 and 1.3 only and manage certificates with DV/OV/EV options and wildcard/SAN as needed

Example Use Cases

  • Design a VPC with CIDR 10.0.0.0/16 and public/private/database subnets across multiple AZs
  • Configure ALB for HTTP/HTTPS with path routing and NLB for TCP/UDP traffic including static IPs
  • Set up DNS records including A, AAAA, CNAME, MX, and TXT along with a sensible TTL strategy
  • Diagnose DNS issues using common dig commands and trace DNS resolution steps
  • Implement TLS configurations choosing DV/OV/EV certificates and enforcing TLS 1.2/1.3

Frequently Asked Questions

Add this skill to your agents
Sponsor this space

Reach thousands of developers