All language subtitles for 4. VLAN

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (SoranĂ®)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt-PT Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,560 --> 00:00:06,720 In the section we're going to talk about the land's actually. 2 00:00:06,990 --> 00:00:13,890 It was so hard to understand why we use reelin on the first day of my networking days. 3 00:00:14,100 --> 00:00:18,770 But after day by day it was easier to get it. 4 00:00:18,790 --> 00:00:26,720 Generally we're making virtue local area networks on the same switch and making them to communicate. 5 00:00:26,730 --> 00:00:35,880 The main reason we are using realigns is separating the broadcast traffic as you know our local network 6 00:00:36,060 --> 00:00:40,680 broadcasts are not forwarded over rather. 7 00:00:40,860 --> 00:00:47,380 But if you use re-aligned you don't need the rudder to eliminate the broadcast traffic. 8 00:00:47,520 --> 00:00:53,770 You can use relearns on the sense of each and broadcast traffic is not forward. 9 00:00:53,790 --> 00:01:03,960 But when that will pass it will it has on its broadcast traffic lines are not used on Plug and Play 10 00:01:03,960 --> 00:01:05,680 which are the dummy. 11 00:01:05,690 --> 00:01:06,480 So it's. 12 00:01:06,510 --> 00:01:15,390 And please keep in mind that different religions tenets communicate each other without a layer 3D wise 13 00:01:15,390 --> 00:01:23,500 such as a rudder or firewall maybe listicle to the wheel and communication. 14 00:01:23,500 --> 00:01:27,550 Here we have the latest twitchy as you can see in here. 15 00:01:27,760 --> 00:01:38,540 And we have two different religions and we have these two one two three and four in here. 16 00:01:38,550 --> 00:01:43,560 First there is zero one and face it is zero. 17 00:01:43,570 --> 00:01:54,060 Two can communicate with each other because they're on the same Melanne face zero of three and faces 18 00:01:54,070 --> 00:02:04,270 are 0 4 also which are PC 3 and PC four can communicate with each other because they are on this same 19 00:02:04,290 --> 00:02:17,410 wheel and two but there is zero one can not communicate with Prestatyn 0 3 and face the 0 4 because 20 00:02:17,410 --> 00:02:22,080 they are on the difference with Lance. 21 00:02:22,300 --> 00:02:33,610 If you want to establish a connection between first then 0 1 and 3 and 4 with we need to use Layer 3 22 00:02:33,940 --> 00:02:40,190 the word searches or rather or maybe a firewall or something like that. 23 00:02:40,390 --> 00:02:48,910 Let's take a look to the benefits of religion well as proof of the following benefits the first benefit 24 00:02:48,970 --> 00:02:58,420 is security separating systems that have sensitive data from the rest of the network decreases the chances 25 00:02:58,420 --> 00:03:05,200 that people will gain access to the information they are not authorized to see. 26 00:03:05,200 --> 00:03:14,830 The second benefit is logical grouping when users on a real Moochie a new physical location but continue 27 00:03:14,830 --> 00:03:17,460 to perform the same job function. 28 00:03:17,670 --> 00:03:22,600 The station of those users do not need to be reconfigured. 29 00:03:22,600 --> 00:03:29,460 Similarly if users change their job functions they need not physically move. 30 00:03:29,560 --> 00:03:38,140 Changing the membership of the End station to that of the Deity team makes the users and stations local 31 00:03:38,140 --> 00:03:41,260 to the resources of the new team. 32 00:03:41,260 --> 00:03:51,070 The third benefit is will reduce the need of rudders will reduce the need to have rudders deployed on 33 00:03:51,070 --> 00:03:59,290 a network to contain broadcast traffic polluting of a packet is limited to the switch ports that belong 34 00:03:59,600 --> 00:04:10,120 to it to the two that will do for the benefit of the villain is reducing of the network traffic by confining 35 00:04:10,150 --> 00:04:18,310 the broadcast domains and stations on a villain are prevented from listening to or receiving broadcasts 36 00:04:18,640 --> 00:04:21,110 not intended for them. 37 00:04:21,270 --> 00:04:30,160 Moreover if a router is not connected between the Whelan's and stations of a real and cannot communicate 38 00:04:30,160 --> 00:04:38,000 with the installations of the other willen Let's talk about the real Antibes. 39 00:04:38,000 --> 00:04:41,330 Now we have six types of Relafen. 40 00:04:41,330 --> 00:04:44,430 The first type is the default villa. 41 00:04:44,450 --> 00:04:50,100 This is basically where all ports belong to by default guys. 42 00:04:50,300 --> 00:04:56,890 This is technically real one and it can't be deleted from the switch. 43 00:04:56,900 --> 00:05:02,870 The second thing is that the second type of the villans are the they Whelan's. 44 00:05:02,960 --> 00:05:11,360 This is the normal reelin where the traffic is carried and where the client data goes through the local 45 00:05:11,360 --> 00:05:12,680 or network. 46 00:05:12,680 --> 00:05:21,640 The third is the voice we learn the voice we lands are Coover your to carry the voice traffic there 47 00:05:21,690 --> 00:05:23,360 for is the management. 48 00:05:23,450 --> 00:05:30,400 Learn this religion is used on a different network for management purposes. 49 00:05:30,650 --> 00:05:34,520 The fifth is the need to learn the nature we learn. 50 00:05:34,530 --> 00:05:43,430 Is that why Q only concept terrific belonging do need we learn is not taxed. 51 00:05:43,490 --> 00:05:50,550 Not that by default mealand Brown is the native learn on all Cisco catalysed. 52 00:05:50,720 --> 00:05:59,030 So its you can this ignored any Whelan's or as your native land on your switch and not that it need 53 00:05:59,030 --> 00:06:03,730 to merge on both ends of the trunk connection. 54 00:06:03,860 --> 00:06:11,110 The last time we are going to focus on is the research we learn there are some bills that are researched 55 00:06:11,190 --> 00:06:20,390 internally over yours to which in order to use them on other M.R. the environments like FDDI suckering 56 00:06:20,630 --> 00:06:22,190 and something like that. 57 00:06:22,260 --> 00:06:32,560 This specific villans used for these two networks are between 1000 and two and 1000 then five 58 00:06:35,170 --> 00:06:37,770 listicle to the voice feel an operation. 59 00:06:38,220 --> 00:06:45,310 It is always recoupment the two separate data and most terrific and most of the times we are using a 60 00:06:45,580 --> 00:06:49,140 separate We learned to carry was traffic. 61 00:06:49,240 --> 00:06:55,510 Usually I phone sit next to a computer on the same desk guys. 62 00:06:55,690 --> 00:07:02,470 They record the same you pick cables as computers and also use the Internet. 63 00:07:02,470 --> 00:07:06,760 This will work but it has some disadvantages. 64 00:07:06,820 --> 00:07:11,480 You need to install a new cable from the switchboard to the IP phone. 65 00:07:11,620 --> 00:07:21,120 Or maybe you will lose a switch port for the IP phone to Solti's most IP phones including Cisco where 66 00:07:21,460 --> 00:07:30,580 three port switch inside of the IP phone one port connects to the two edge one porch connects to the 67 00:07:30,850 --> 00:07:36,120 computer one internal port connects to the phone. 68 00:07:36,160 --> 00:07:44,380 This the ellos as to connect the IP phone and computer like you see in the screen right now as you can 69 00:07:44,380 --> 00:07:45,450 see in here. 70 00:07:45,700 --> 00:07:58,480 We have a switch and we have an IP phone envy ever PC in here with just one cable coming to our IP phone 71 00:07:59,170 --> 00:08:03,800 and IP form has two different ports. 72 00:08:03,810 --> 00:08:09,840 One of them are local or in a port they are either port. 73 00:08:09,840 --> 00:08:11,760 Is the PC part. 74 00:08:11,920 --> 00:08:20,380 We're terminating the cable coming from switch on the local or in a port and we're terminating the cable 75 00:08:20,380 --> 00:08:27,460 coming from PC on our PC port of the IP phone to Vienna in a year. 76 00:08:27,520 --> 00:08:29,490 We are also different. 77 00:08:29,500 --> 00:08:39,940 We last we're vigilant tend to carry the day of the PC and we're also Villon 30 to carry the voice traffic 78 00:08:39,940 --> 00:08:43,210 coming from the IP phone to the switch. 79 00:08:43,330 --> 00:08:50,800 And here is the configuration we're coming into the interface mode by typing interface and first the 80 00:08:50,800 --> 00:08:56,850 third 0 or 16 for this configuration then to define. 81 00:08:56,890 --> 00:09:05,120 And that's a Willam we are chirruping switch port access will learn and the villain number. 82 00:09:05,290 --> 00:09:07,540 This is the access we learn. 83 00:09:07,840 --> 00:09:17,440 And we're also defining voice we learn as you can see and the command is switch poort voice real and 84 00:09:17,590 --> 00:09:24,520 and the real number which is thought for this situation. 85 00:09:24,950 --> 00:09:26,940 Let's take to the wheel and trying to. 86 00:09:26,940 --> 00:09:37,940 Now we have two modes of switch ports and they are access or trunk and access port can carry a single 87 00:09:37,940 --> 00:09:48,430 will then however truck ports can transport in multivalent information but when we last each frame sets 88 00:09:48,450 --> 00:09:58,670 the real the information and that is known as tagging to for example in here we need to define the big 89 00:09:58,680 --> 00:10:02,840 0 1 as an access port. 90 00:10:03,080 --> 00:10:09,020 We need to define the gig 0 2 as oxers poor. 91 00:10:09,320 --> 00:10:21,030 We need to define the Dijk 0 1 and 0 2 off to see which to also as oxers ports but we need to define 92 00:10:21,080 --> 00:10:32,180 this guy's gig 0 three guys as a trunk port because we're going to carry two different Villines which 93 00:10:32,180 --> 00:10:39,030 are Willum 100 and we learn 200 for example. 94 00:10:39,260 --> 00:10:41,800 Let's go with the wheel and try again. 95 00:10:42,290 --> 00:10:49,100 Trunks are used to carry traffic that belongs to multiple violence between devices all the same link 96 00:10:49,470 --> 00:10:56,180 and diverse can that are mine which will and the traffic belongs to by it's villaine identifier the 97 00:10:56,180 --> 00:11:02,040 villain identifier is a pack that is encapsulated with the data. 98 00:11:02,200 --> 00:11:10,790 I asked the L and the DOT why Q Are two types of encapsulation that are used to carry data for a multiple 99 00:11:10,800 --> 00:11:13,300 villans over trunk lengths. 100 00:11:13,550 --> 00:11:23,120 I asked Al is this guy is a Cisco proprietary protocol for the interconnection of multiple surveys and 101 00:11:23,450 --> 00:11:29,810 maintenance of information as traffic goes between Swades and that mine. 102 00:11:29,810 --> 00:11:41,920 Q Is there I threw Bill EastEnder for taking friends on their trike Let's go ahead with implementing 103 00:11:41,980 --> 00:11:45,130 Whelan's and Bil'in security. 104 00:11:45,130 --> 00:11:50,320 We have different Willum range for different purposes. 105 00:11:50,370 --> 00:11:58,520 The relearns zero and four thousand ninety five are used for system use only. 106 00:11:58,530 --> 00:12:03,410 And their research we love than is the default. 107 00:12:03,430 --> 00:12:11,110 We learn as you know relations between two and one thousand and one that are used for the Internet. 108 00:12:11,170 --> 00:12:23,410 Lance Williams between 1002 and 1005 are used for Cisco defaults for FDDI and the token rent and relearns 109 00:12:23,410 --> 00:12:32,110 between 1000 and twenty five and forty thousand ninety four are the extended range Rylands and they 110 00:12:32,110 --> 00:12:36,540 are used for internet Whelan's only. 111 00:12:36,910 --> 00:12:43,630 Let's take a look to the real and configuration now to configure real and that's pretty straight forward. 112 00:12:43,660 --> 00:12:53,780 On the configuration mode we are typing replan and we're defining every number in here. 113 00:12:54,630 --> 00:13:01,440 On the switch one as you can see we are using two Whelan's Well I'm 100 and we are on two hundred end 114 00:13:01,450 --> 00:13:09,630 by typing Villon and the real number we are getting into the config mill mud on the coffee will melt. 115 00:13:09,810 --> 00:13:19,830 We can do anything to our relearns as you can see which is I tene year and which is HRO for Villon 200 116 00:13:20,640 --> 00:13:21,920 after opening. 117 00:13:21,920 --> 00:13:29,120 Our relations are for after core figuring them globally though we are getting into the interface mode. 118 00:13:29,130 --> 00:13:39,270 For example for interface gigs 0 1 we are defining the switch port mode as access because that's carrying 119 00:13:39,270 --> 00:13:45,430 just Bombay and then is then we are saying our switch port to the related. 120 00:13:45,460 --> 00:13:49,460 We learn as you can see this same thing in here also. 121 00:13:49,710 --> 00:13:57,030 Let's take a look to the trunk configuration only digs 0 3 we are going to make trunk of figuration 122 00:13:57,030 --> 00:14:05,030 because I'm going to carry multiple relay any information from here which are we and one hundred answers 123 00:14:05,150 --> 00:14:08,730 which are real and 100 and 200. 124 00:14:08,970 --> 00:14:17,460 So to define in thrang we're configuring switch port thrang and we are typing the. 125 00:14:17,480 --> 00:14:22,380 Are encapsulation type which is that why Kuna here. 126 00:14:22,690 --> 00:14:31,620 There we are typing switch port mod's through this time instead of access. 127 00:14:31,640 --> 00:14:38,480 Lastly we are typing the switchboard TURANGA elde and we are typing the Meilan numbers that we are allowing 128 00:14:38,480 --> 00:14:49,610 to go from that try Let's take a look to the dynamic TripIt trying Porthcawl DTP now DDP is this is 129 00:14:49,730 --> 00:14:50,770 appropriate. 130 00:14:50,770 --> 00:14:56,860 We're trying to protocol which is used to automatically negotiate throwing spit when it's got quite 131 00:14:56,890 --> 00:14:57,420 severe. 132 00:14:57,460 --> 00:15:05,400 So it's dynamic trunking Porthcawl DTP can be used to negotiate the enformed trunk connection but this 133 00:15:05,400 --> 00:15:13,910 could switch dynamically dynamic trunking protocol can operate in different throwing modes as shown 134 00:15:13,910 --> 00:15:24,440 in the graphic if you want to create truckling between two suites usually use for example to rank and 135 00:15:24,610 --> 00:15:26,500 rank on board. 136 00:15:26,800 --> 00:15:28,380 You can use twang. 137 00:15:28,400 --> 00:15:31,810 And also you Cale's throng. 138 00:15:31,880 --> 00:15:34,480 And are terrible. 139 00:15:34,520 --> 00:15:38,300 You can use Aalto and throng. 140 00:15:38,360 --> 00:15:44,360 Also indiscernible and also retailers that terrible with the throng. 141 00:15:44,410 --> 00:15:47,390 Also and the terrible So 142 00:15:50,770 --> 00:15:58,350 as you can see in here one site is configured as switch poor mode dynamic. 143 00:15:58,510 --> 00:16:06,250 The Super Bowl and the other side is outsole And as I showed you on the previous slide that's horrible 144 00:16:06,310 --> 00:16:09,520 and output is forming the trunk link. 145 00:16:09,700 --> 00:16:14,340 But in here we're defining also on both ends. 146 00:16:14,530 --> 00:16:26,350 But we cannot tronc we cannot perform a trunk link to where they are transport's we are using show interfaces 147 00:16:26,810 --> 00:16:28,160 to run commands. 148 00:16:28,180 --> 00:16:34,010 And we can see the front porch which are making an actual train King. 149 00:16:34,090 --> 00:16:43,770 At that moment and other very fine command is show interfaces and interface name and the switch port 150 00:16:43,900 --> 00:16:48,580 we can see the administratively or the operational mode. 151 00:16:48,640 --> 00:16:59,730 If they are trying or not let's say go to the come on we learn at tech types as to which interface which 152 00:16:59,730 --> 00:17:07,590 is connected to and and the ways a computer may be Grise or a printer are normally in Access mode and 153 00:17:07,860 --> 00:17:16,650 that and they will have to access to its own real traffic from the other religions are not forwarded. 154 00:17:16,770 --> 00:17:25,470 Wired that interface as you know consider a situation where an attacker is connected to a switch interface 155 00:17:25,740 --> 00:17:28,300 which is configured with either dynamic. 156 00:17:28,300 --> 00:17:38,580 There is this terrible dynamic out or trunk Mobbs if the Ebtekar can generate DTP messages from his 157 00:17:38,580 --> 00:17:45,400 computer directing at truckling can be formed between his computer and the switch. 158 00:17:45,570 --> 00:17:54,000 Another method of switch spoofing is by connecting by connecting Rook's which an interface configured 159 00:17:54,120 --> 00:17:55,290 with dynamic. 160 00:17:55,290 --> 00:17:59,450 These are both dynamic ultra or strong modes. 161 00:18:01,160 --> 00:18:04,630 Let's take a look to the double tagging attack. 162 00:18:04,640 --> 00:18:14,490 Lastly double tagging real and hoping ETEC takes advantage of my Q and that like tagging and tags removed. 163 00:18:14,490 --> 00:18:23,990 Process of many types of surveys many surveys review all the data mining to tack you double taking ETEC 164 00:18:24,020 --> 00:18:34,250 and Ebtekar change the or regional frame to add to the land tax and out-of tag which is of his own land 165 00:18:34,340 --> 00:18:37,830 and an inner hidden tag of the victims. 166 00:18:37,940 --> 00:18:42,290 We'll then hear the errors PC must belong to the net. 167 00:18:42,290 --> 00:18:50,960 We love to try and link when double Turks frame reaches the switch one meaning in this example the switch 168 00:18:50,960 --> 00:19:00,470 can only see the outer Whelan of the wheel and that the interface really belongs to this switch so which 169 00:19:00,470 --> 00:19:08,510 one will know remailed all too real and tech and will forward to all the ports belong to Natsu will 170 00:19:08,510 --> 00:19:16,640 land and in this example there is villaine one one copy of that frame is forward to the trunk link to 171 00:19:16,640 --> 00:19:22,090 reach the next switch which is switched to when the frame reaches the switch to. 172 00:19:22,100 --> 00:19:27,070 It will open the frame to see the second tech switch to real. 173 00:19:27,080 --> 00:19:34,310 Now assume that frame blanks to Villon 100 and it is forward will on 100. 19245

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.