Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,400 --> 00:00:06,890
It in a sexual way and take it to the point to point let's go ahead with that point of point.
2
00:00:06,890 --> 00:00:14,810
Poor call Point to Point porticos people he is a datalink clear communications protocols used to establish
3
00:00:14,870 --> 00:00:18,610
a direct connection between two notes.
4
00:00:18,620 --> 00:00:25,130
It connects to others directly without any host or any other networking device in between it's camp
5
00:00:25,130 --> 00:00:32,330
provides a connection authentication transmission encryption and cooperation optional optionally this
6
00:00:32,330 --> 00:00:39,700
particle is used over many types of physical networks including the serial cable phone line cellular
7
00:00:39,700 --> 00:00:42,920
telephone fiber optic links and etc..
8
00:00:43,160 --> 00:00:48,370
PKP also supports authentication by PAP and Chapur recalls.
9
00:00:48,380 --> 00:00:55,190
And additionally can monitored the quality of the link by link quality management feature and takes
10
00:00:55,190 --> 00:00:55,870
the link down.
11
00:00:55,880 --> 00:01:10,660
If there is too much errors the main PBB components are see LCP and the NCP HDL C is used for encapsulating
12
00:01:10,750 --> 00:01:19,050
that grounds LCP refers to the control protocol and is used for setting up maintaining terminating the
13
00:01:19,050 --> 00:01:24,130
link between the Wes's and handling were writing limits on packet size.
14
00:01:24,160 --> 00:01:31,600
NCP refers to network control porticoes and is used for establishing and configuring different network
15
00:01:31,600 --> 00:01:37,960
clear protocols such as IPV for IP V-6 IPX and Etzler.
16
00:01:38,430 --> 00:01:42,180
Let's go ahead with the p p p frame in the PPV frame.
17
00:01:42,180 --> 00:01:50,760
Again we have some different fields and one byte of the Lakefield and one byte with the Edwards field.
18
00:01:50,820 --> 00:01:54,480
We have combed through all fields which consists of one byte.
19
00:01:54,480 --> 00:01:59,670
Again we poor local field that there may be one or two bytes.
20
00:01:59,810 --> 00:02:10,010
We are payload which is where I bowl and we have FCC Frenchy's sequences and the flag fills in our free
21
00:02:12,250 --> 00:02:21,490
to establish epeople P.S. We have some phrases and in the phrase one link establishment and configuration
22
00:02:21,490 --> 00:02:25,120
negotiation is met in this phase.
23
00:02:25,150 --> 00:02:34,090
LCP opens the connection and negotiates the configuration options and this phase finishes when the receiving
24
00:02:34,090 --> 00:02:42,390
rather Senza configuration acknowledgment for him back to the rudder initiating the connection interface
25
00:02:42,430 --> 00:02:51,300
to cool the off link is checked which is an optional step and in the step LCP test linked to that mine.
26
00:02:51,440 --> 00:02:59,770
Whether the link called it is sufficient to bring up network layer protocols and in the last phrase
27
00:02:59,800 --> 00:03:07,540
which is phrased to in here network where political configuration negotiation is made and after the
28
00:03:07,540 --> 00:03:16,000
LCP has finished doing quoted the termination phrase the appropriate NCP can separately configured the
29
00:03:15,990 --> 00:03:22,980
network protocols and brings them up and take them down at any time.
30
00:03:23,000 --> 00:03:30,240
Let's go ahead of the configuration of the point to point protocol to configure the point to point protocol
31
00:03:30,270 --> 00:03:38,780
we have some options that we can use and there are authentication compression error detection people
32
00:03:38,790 --> 00:03:41,660
be called back and the multa link.
33
00:03:41,700 --> 00:03:44,370
And let's take a look to these guys now.
34
00:03:45,730 --> 00:03:53,800
Authentication can be made by the PAP and the CHEP protocols for people be correct.
35
00:03:54,040 --> 00:04:00,370
Let's go ahead with Pepp authentication first which transmits on an encrypted Eski passwords over the
36
00:04:00,370 --> 00:04:09,100
network in here if you want support authentication would mean rather X and rather Y rather X sends its
37
00:04:09,190 --> 00:04:18,100
own parameters which is user rather X password strong pass or something like that rather x' permit those
38
00:04:18,100 --> 00:04:21,760
are checked on rather Weist local database.
39
00:04:21,910 --> 00:04:30,910
And if the parameters are matched communication is as stablished and rather white will accept or reject
40
00:04:30,910 --> 00:04:31,840
message too.
41
00:04:31,910 --> 00:04:40,780
Rather why let's go ahead with the Chapeltown get in the year Firstly rather why this time sends a challenge
42
00:04:40,780 --> 00:04:49,840
message and starts with the three way handshake this time rather X response with its own username and
43
00:04:49,840 --> 00:04:52,960
the passport again as you can see in here.
44
00:04:53,110 --> 00:05:01,690
Then run why compares the permit others on it's own local and accept or reject the communication as
45
00:05:01,690 --> 00:05:03,860
you can see.
46
00:05:03,880 --> 00:05:07,150
Let's go with the cooperation cooperation.
47
00:05:07,200 --> 00:05:15,040
It increases the effective throughput on people the connections by reducing the amount of data in Frane
48
00:05:15,430 --> 00:05:23,730
we can use this record or the predictor protocols for cooperation on point to point protocol.
49
00:05:24,840 --> 00:05:29,060
Error the direction identifies fault conditions.
50
00:05:29,280 --> 00:05:33,060
There are two options the call the and the magic number.
51
00:05:33,150 --> 00:05:37,920
Help ensure reliable loop free data link.
52
00:05:38,010 --> 00:05:45,420
The magic number field helps in detecting links that are in a loop spec condition and are generated
53
00:05:45,420 --> 00:05:49,290
randomly at each end of the connection.
54
00:05:49,290 --> 00:05:51,470
Let's go ahead with the code.
55
00:05:51,480 --> 00:05:59,280
Back security people came before to augment that with the use of people be called back people they called
56
00:05:59,290 --> 00:06:04,680
back is through X the access server to disconnect the incoming connection.
57
00:06:04,680 --> 00:06:14,460
After a successful authentication and reestablish the connection wire and outbound call and the last
58
00:06:14,460 --> 00:06:21,810
feature we are going to focus on is the multa link monitoring is used to take multiple people buildings
59
00:06:21,870 --> 00:06:28,890
and bomb them together making them act as a single people building and pro-ISIS load balancing as you
60
00:06:28,890 --> 00:06:38,880
can see in here we have two separate warnings in here and one mottling is doing actually is this is
61
00:06:38,880 --> 00:06:47,590
combining the two separate wings together and bonding them together as a single link.
62
00:06:47,590 --> 00:06:48,220
Let's go ahead.
63
00:06:48,220 --> 00:06:55,390
The point of point particle configuration and troubleshooting Let's go ahead with the how we can call
64
00:06:55,390 --> 00:07:05,050
for you to be forced to cover your pee pee pee guys all are rather what I'm going to do is just going
65
00:07:05,170 --> 00:07:12,610
under the interface more for us by typing the interface and the interface name.
66
00:07:12,610 --> 00:07:23,100
Basically then we're defining an encapsulation method and our encapsulation method will be p p p point
67
00:07:23,100 --> 00:07:30,690
to point particle then optionally we can define a compressed method or we can define the people pick
68
00:07:30,870 --> 00:07:37,360
Lenku multi-byte slapping the corporis predictor and Peepy Piccoli 80
69
00:07:39,960 --> 00:07:47,020
let's go ahead how we can Cuvier people Piramal killing as you can see that we have two separate things.
70
00:07:47,160 --> 00:07:54,930
And what we are doing here is just to combine them together for load balancing purposes to configure
71
00:07:54,930 --> 00:08:02,890
the people appear on our rather Again we're just getting into the interface more buzz by typing this
72
00:08:02,900 --> 00:08:12,420
on interface Malto link and the monthly number then we are defining our IP address.
73
00:08:12,540 --> 00:08:21,300
And the thing we are going to do this time is typing the BPP multilane and people multiplying group
74
00:08:21,330 --> 00:08:31,860
and the group number them we are getting into the serial interfaces by typing the serial 0 3 0 and serial
75
00:08:31,860 --> 00:08:33,290
3 0 1.
76
00:08:33,540 --> 00:08:37,190
There we are defining our encapsulation as.
77
00:08:37,620 --> 00:08:47,550
And we are no IP address TPP multilane and the PBT mottling group one for the both of our interfaces.
78
00:08:47,580 --> 00:08:55,170
This configuration should be made on rather too as well as you can see to refer to PBB configuration.
79
00:08:55,210 --> 00:09:04,850
We can turn the show interface and the interface name command and we can check the encapsulation meated
80
00:09:04,930 --> 00:09:10,020
and we can check if LCP is open or not.
81
00:09:11,380 --> 00:09:16,060
Let's go and how we can configure the authentication for druthers.
82
00:09:16,060 --> 00:09:22,010
The first thing we're going to focus on is configuring the pap to configure the PAP.
83
00:09:22,030 --> 00:09:29,330
What we are doing or rather X is to define the rather wise parameters.
84
00:09:29,800 --> 00:09:36,970
But surely there's something wrong in the figure the Celene step is not available for the purposes you
85
00:09:36,970 --> 00:09:37,800
know.
86
00:09:37,990 --> 00:09:39,950
So I'm cleaning this out.
87
00:09:39,970 --> 00:09:42,210
Sorry guys there's not challenge step
88
00:09:44,950 --> 00:09:45,890
OK.
89
00:09:46,760 --> 00:09:54,200
No response to just this guy will send the message and this guy the other guy will tell me they accept
90
00:09:54,200 --> 00:09:55,120
or reject.
91
00:09:55,130 --> 00:10:02,320
So what are we going to do on the rather Aksa is to define the rather wise leaders own rather Rake's
92
00:10:02,330 --> 00:10:05,930
we are attacking the user name rather why.
93
00:10:06,260 --> 00:10:15,120
And the passport as soon pass and and in the interface most people rather as we are defining the people
94
00:10:15,500 --> 00:10:26,390
or complication as Pap and we're also defining the own username and password of two other eggs by typing
95
00:10:26,390 --> 00:10:36,930
the p p p pap Sentier is her name rather X and passport with strong past this line in here means I'm
96
00:10:36,930 --> 00:10:45,970
going to send there rather X as user name but rather an answer I'm going to send a rather why as do
97
00:10:46,030 --> 00:10:51,220
other X as my username and the passport strong pass.
98
00:10:51,440 --> 00:10:58,310
So what I'm going to come for you or rather what this time is firstly is the parameters of the rather
99
00:10:58,730 --> 00:11:06,920
X-ers you can see in here inserting the username Roderick's password and the strong pass again then
100
00:11:06,980 --> 00:11:15,140
under the interface mode and defining the authentication protocol as pep then what then defining in
101
00:11:15,170 --> 00:11:27,260
here is the DPP Pepp sent username and rather why as the rather wise on username and password will be
102
00:11:27,500 --> 00:11:29,380
strong press again.
103
00:11:30,230 --> 00:11:37,510
And let's go back to covering the CHEP challenge handshake authentication protocol this term again and
104
00:11:37,520 --> 00:11:44,060
defining the rather words per meters or rather X and rather X as per meters on rather why and the difference
105
00:11:44,060 --> 00:11:54,350
is Peepy authentication Pugel will be just CHEP in here is as you can see this we have just two steps
106
00:11:54,380 --> 00:12:01,100
and we are defining our user names of the remote networks Lehman Brothers and we are defining the authentication
107
00:12:01,100 --> 00:12:11,600
protocol as CHEP to troubleshoot the PBT connection we are typing the debark BPP authentication which
108
00:12:11,600 --> 00:12:14,570
displays authentication Xchange sequence.
109
00:12:14,750 --> 00:12:22,400
We can't write the book peepin negotiation which displays packets during connection establishment.
110
00:12:22,400 --> 00:12:30,110
We didn't write the DBA BPP packets which displays the BBB packets being sent and received.
111
00:12:30,110 --> 00:12:37,310
We can tap the Dilbert BPP URL which displays poor local errors and the error statistics and we can
112
00:12:37,310 --> 00:12:42,830
use the debug PBB chip command to display the CHEP packet extranets.
13156
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.