Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,560 --> 00:00:06,720
In the section we're going to talk about the land's actually.
2
00:00:06,990 --> 00:00:13,890
It was so hard to understand why we use reelin on the first day of my networking days.
3
00:00:14,100 --> 00:00:18,770
But after day by day it was easier to get it.
4
00:00:18,790 --> 00:00:26,720
Generally we're making virtue local area networks on the same switch and making them to communicate.
5
00:00:26,730 --> 00:00:35,880
The main reason we are using realigns is separating the broadcast traffic as you know our local network
6
00:00:36,060 --> 00:00:40,680
broadcasts are not forwarded over rather.
7
00:00:40,860 --> 00:00:47,380
But if you use re-aligned you don't need the rudder to eliminate the broadcast traffic.
8
00:00:47,520 --> 00:00:53,770
You can use relearns on the sense of each and broadcast traffic is not forward.
9
00:00:53,790 --> 00:01:03,960
But when that will pass it will it has on its broadcast traffic lines are not used on Plug and Play
10
00:01:03,960 --> 00:01:05,680
which are the dummy.
11
00:01:05,690 --> 00:01:06,480
So it's.
12
00:01:06,510 --> 00:01:15,390
And please keep in mind that different religions tenets communicate each other without a layer 3D wise
13
00:01:15,390 --> 00:01:23,500
such as a rudder or firewall maybe listicle to the wheel and communication.
14
00:01:23,500 --> 00:01:27,550
Here we have the latest twitchy as you can see in here.
15
00:01:27,760 --> 00:01:38,540
And we have two different religions and we have these two one two three and four in here.
16
00:01:38,550 --> 00:01:43,560
First there is zero one and face it is zero.
17
00:01:43,570 --> 00:01:54,060
Two can communicate with each other because they're on the same Melanne face zero of three and faces
18
00:01:54,070 --> 00:02:04,270
are 0 4 also which are PC 3 and PC four can communicate with each other because they are on this same
19
00:02:04,290 --> 00:02:17,410
wheel and two but there is zero one can not communicate with Prestatyn 0 3 and face the 0 4 because
20
00:02:17,410 --> 00:02:22,080
they are on the difference with Lance.
21
00:02:22,300 --> 00:02:33,610
If you want to establish a connection between first then 0 1 and 3 and 4 with we need to use Layer 3
22
00:02:33,940 --> 00:02:40,190
the word searches or rather or maybe a firewall or something like that.
23
00:02:40,390 --> 00:02:48,910
Let's take a look to the benefits of religion well as proof of the following benefits the first benefit
24
00:02:48,970 --> 00:02:58,420
is security separating systems that have sensitive data from the rest of the network decreases the chances
25
00:02:58,420 --> 00:03:05,200
that people will gain access to the information they are not authorized to see.
26
00:03:05,200 --> 00:03:14,830
The second benefit is logical grouping when users on a real Moochie a new physical location but continue
27
00:03:14,830 --> 00:03:17,460
to perform the same job function.
28
00:03:17,670 --> 00:03:22,600
The station of those users do not need to be reconfigured.
29
00:03:22,600 --> 00:03:29,460
Similarly if users change their job functions they need not physically move.
30
00:03:29,560 --> 00:03:38,140
Changing the membership of the End station to that of the Deity team makes the users and stations local
31
00:03:38,140 --> 00:03:41,260
to the resources of the new team.
32
00:03:41,260 --> 00:03:51,070
The third benefit is will reduce the need of rudders will reduce the need to have rudders deployed on
33
00:03:51,070 --> 00:03:59,290
a network to contain broadcast traffic polluting of a packet is limited to the switch ports that belong
34
00:03:59,600 --> 00:04:10,120
to it to the two that will do for the benefit of the villain is reducing of the network traffic by confining
35
00:04:10,150 --> 00:04:18,310
the broadcast domains and stations on a villain are prevented from listening to or receiving broadcasts
36
00:04:18,640 --> 00:04:21,110
not intended for them.
37
00:04:21,270 --> 00:04:30,160
Moreover if a router is not connected between the Whelan's and stations of a real and cannot communicate
38
00:04:30,160 --> 00:04:38,000
with the installations of the other willen Let's talk about the real Antibes.
39
00:04:38,000 --> 00:04:41,330
Now we have six types of Relafen.
40
00:04:41,330 --> 00:04:44,430
The first type is the default villa.
41
00:04:44,450 --> 00:04:50,100
This is basically where all ports belong to by default guys.
42
00:04:50,300 --> 00:04:56,890
This is technically real one and it can't be deleted from the switch.
43
00:04:56,900 --> 00:05:02,870
The second thing is that the second type of the villans are the they Whelan's.
44
00:05:02,960 --> 00:05:11,360
This is the normal reelin where the traffic is carried and where the client data goes through the local
45
00:05:11,360 --> 00:05:12,680
or network.
46
00:05:12,680 --> 00:05:21,640
The third is the voice we learn the voice we lands are Coover your to carry the voice traffic there
47
00:05:21,690 --> 00:05:23,360
for is the management.
48
00:05:23,450 --> 00:05:30,400
Learn this religion is used on a different network for management purposes.
49
00:05:30,650 --> 00:05:34,520
The fifth is the need to learn the nature we learn.
50
00:05:34,530 --> 00:05:43,430
Is that why Q only concept terrific belonging do need we learn is not taxed.
51
00:05:43,490 --> 00:05:50,550
Not that by default mealand Brown is the native learn on all Cisco catalysed.
52
00:05:50,720 --> 00:05:59,030
So its you can this ignored any Whelan's or as your native land on your switch and not that it need
53
00:05:59,030 --> 00:06:03,730
to merge on both ends of the trunk connection.
54
00:06:03,860 --> 00:06:11,110
The last time we are going to focus on is the research we learn there are some bills that are researched
55
00:06:11,190 --> 00:06:20,390
internally over yours to which in order to use them on other M.R. the environments like FDDI suckering
56
00:06:20,630 --> 00:06:22,190
and something like that.
57
00:06:22,260 --> 00:06:32,560
This specific villans used for these two networks are between 1000 and two and 1000 then five
58
00:06:35,170 --> 00:06:37,770
listicle to the voice feel an operation.
59
00:06:38,220 --> 00:06:45,310
It is always recoupment the two separate data and most terrific and most of the times we are using a
60
00:06:45,580 --> 00:06:49,140
separate We learned to carry was traffic.
61
00:06:49,240 --> 00:06:55,510
Usually I phone sit next to a computer on the same desk guys.
62
00:06:55,690 --> 00:07:02,470
They record the same you pick cables as computers and also use the Internet.
63
00:07:02,470 --> 00:07:06,760
This will work but it has some disadvantages.
64
00:07:06,820 --> 00:07:11,480
You need to install a new cable from the switchboard to the IP phone.
65
00:07:11,620 --> 00:07:21,120
Or maybe you will lose a switch port for the IP phone to Solti's most IP phones including Cisco where
66
00:07:21,460 --> 00:07:30,580
three port switch inside of the IP phone one port connects to the two edge one porch connects to the
67
00:07:30,850 --> 00:07:36,120
computer one internal port connects to the phone.
68
00:07:36,160 --> 00:07:44,380
This the ellos as to connect the IP phone and computer like you see in the screen right now as you can
69
00:07:44,380 --> 00:07:45,450
see in here.
70
00:07:45,700 --> 00:07:58,480
We have a switch and we have an IP phone envy ever PC in here with just one cable coming to our IP phone
71
00:07:59,170 --> 00:08:03,800
and IP form has two different ports.
72
00:08:03,810 --> 00:08:09,840
One of them are local or in a port they are either port.
73
00:08:09,840 --> 00:08:11,760
Is the PC part.
74
00:08:11,920 --> 00:08:20,380
We're terminating the cable coming from switch on the local or in a port and we're terminating the cable
75
00:08:20,380 --> 00:08:27,460
coming from PC on our PC port of the IP phone to Vienna in a year.
76
00:08:27,520 --> 00:08:29,490
We are also different.
77
00:08:29,500 --> 00:08:39,940
We last we're vigilant tend to carry the day of the PC and we're also Villon 30 to carry the voice traffic
78
00:08:39,940 --> 00:08:43,210
coming from the IP phone to the switch.
79
00:08:43,330 --> 00:08:50,800
And here is the configuration we're coming into the interface mode by typing interface and first the
80
00:08:50,800 --> 00:08:56,850
third 0 or 16 for this configuration then to define.
81
00:08:56,890 --> 00:09:05,120
And that's a Willam we are chirruping switch port access will learn and the villain number.
82
00:09:05,290 --> 00:09:07,540
This is the access we learn.
83
00:09:07,840 --> 00:09:17,440
And we're also defining voice we learn as you can see and the command is switch poort voice real and
84
00:09:17,590 --> 00:09:24,520
and the real number which is thought for this situation.
85
00:09:24,950 --> 00:09:26,940
Let's take to the wheel and trying to.
86
00:09:26,940 --> 00:09:37,940
Now we have two modes of switch ports and they are access or trunk and access port can carry a single
87
00:09:37,940 --> 00:09:48,430
will then however truck ports can transport in multivalent information but when we last each frame sets
88
00:09:48,450 --> 00:09:58,670
the real the information and that is known as tagging to for example in here we need to define the big
89
00:09:58,680 --> 00:10:02,840
0 1 as an access port.
90
00:10:03,080 --> 00:10:09,020
We need to define the gig 0 2 as oxers poor.
91
00:10:09,320 --> 00:10:21,030
We need to define the Dijk 0 1 and 0 2 off to see which to also as oxers ports but we need to define
92
00:10:21,080 --> 00:10:32,180
this guy's gig 0 three guys as a trunk port because we're going to carry two different Villines which
93
00:10:32,180 --> 00:10:39,030
are Willum 100 and we learn 200 for example.
94
00:10:39,260 --> 00:10:41,800
Let's go with the wheel and try again.
95
00:10:42,290 --> 00:10:49,100
Trunks are used to carry traffic that belongs to multiple violence between devices all the same link
96
00:10:49,470 --> 00:10:56,180
and diverse can that are mine which will and the traffic belongs to by it's villaine identifier the
97
00:10:56,180 --> 00:11:02,040
villain identifier is a pack that is encapsulated with the data.
98
00:11:02,200 --> 00:11:10,790
I asked the L and the DOT why Q Are two types of encapsulation that are used to carry data for a multiple
99
00:11:10,800 --> 00:11:13,300
villans over trunk lengths.
100
00:11:13,550 --> 00:11:23,120
I asked Al is this guy is a Cisco proprietary protocol for the interconnection of multiple surveys and
101
00:11:23,450 --> 00:11:29,810
maintenance of information as traffic goes between Swades and that mine.
102
00:11:29,810 --> 00:11:41,920
Q Is there I threw Bill EastEnder for taking friends on their trike Let's go ahead with implementing
103
00:11:41,980 --> 00:11:45,130
Whelan's and Bil'in security.
104
00:11:45,130 --> 00:11:50,320
We have different Willum range for different purposes.
105
00:11:50,370 --> 00:11:58,520
The relearns zero and four thousand ninety five are used for system use only.
106
00:11:58,530 --> 00:12:03,410
And their research we love than is the default.
107
00:12:03,430 --> 00:12:11,110
We learn as you know relations between two and one thousand and one that are used for the Internet.
108
00:12:11,170 --> 00:12:23,410
Lance Williams between 1002 and 1005 are used for Cisco defaults for FDDI and the token rent and relearns
109
00:12:23,410 --> 00:12:32,110
between 1000 and twenty five and forty thousand ninety four are the extended range Rylands and they
110
00:12:32,110 --> 00:12:36,540
are used for internet Whelan's only.
111
00:12:36,910 --> 00:12:43,630
Let's take a look to the real and configuration now to configure real and that's pretty straight forward.
112
00:12:43,660 --> 00:12:53,780
On the configuration mode we are typing replan and we're defining every number in here.
113
00:12:54,630 --> 00:13:01,440
On the switch one as you can see we are using two Whelan's Well I'm 100 and we are on two hundred end
114
00:13:01,450 --> 00:13:09,630
by typing Villon and the real number we are getting into the config mill mud on the coffee will melt.
115
00:13:09,810 --> 00:13:19,830
We can do anything to our relearns as you can see which is I tene year and which is HRO for Villon 200
116
00:13:20,640 --> 00:13:21,920
after opening.
117
00:13:21,920 --> 00:13:29,120
Our relations are for after core figuring them globally though we are getting into the interface mode.
118
00:13:29,130 --> 00:13:39,270
For example for interface gigs 0 1 we are defining the switch port mode as access because that's carrying
119
00:13:39,270 --> 00:13:45,430
just Bombay and then is then we are saying our switch port to the related.
120
00:13:45,460 --> 00:13:49,460
We learn as you can see this same thing in here also.
121
00:13:49,710 --> 00:13:57,030
Let's take a look to the trunk configuration only digs 0 3 we are going to make trunk of figuration
122
00:13:57,030 --> 00:14:05,030
because I'm going to carry multiple relay any information from here which are we and one hundred answers
123
00:14:05,150 --> 00:14:08,730
which are real and 100 and 200.
124
00:14:08,970 --> 00:14:17,460
So to define in thrang we're configuring switch port thrang and we are typing the.
125
00:14:17,480 --> 00:14:22,380
Are encapsulation type which is that why Kuna here.
126
00:14:22,690 --> 00:14:31,620
There we are typing switch port mod's through this time instead of access.
127
00:14:31,640 --> 00:14:38,480
Lastly we are typing the switchboard TURANGA elde and we are typing the Meilan numbers that we are allowing
128
00:14:38,480 --> 00:14:49,610
to go from that try Let's take a look to the dynamic TripIt trying Porthcawl DTP now DDP is this is
129
00:14:49,730 --> 00:14:50,770
appropriate.
130
00:14:50,770 --> 00:14:56,860
We're trying to protocol which is used to automatically negotiate throwing spit when it's got quite
131
00:14:56,890 --> 00:14:57,420
severe.
132
00:14:57,460 --> 00:15:05,400
So it's dynamic trunking Porthcawl DTP can be used to negotiate the enformed trunk connection but this
133
00:15:05,400 --> 00:15:13,910
could switch dynamically dynamic trunking protocol can operate in different throwing modes as shown
134
00:15:13,910 --> 00:15:24,440
in the graphic if you want to create truckling between two suites usually use for example to rank and
135
00:15:24,610 --> 00:15:26,500
rank on board.
136
00:15:26,800 --> 00:15:28,380
You can use twang.
137
00:15:28,400 --> 00:15:31,810
And also you Cale's throng.
138
00:15:31,880 --> 00:15:34,480
And are terrible.
139
00:15:34,520 --> 00:15:38,300
You can use Aalto and throng.
140
00:15:38,360 --> 00:15:44,360
Also indiscernible and also retailers that terrible with the throng.
141
00:15:44,410 --> 00:15:47,390
Also and the terrible So
142
00:15:50,770 --> 00:15:58,350
as you can see in here one site is configured as switch poor mode dynamic.
143
00:15:58,510 --> 00:16:06,250
The Super Bowl and the other side is outsole And as I showed you on the previous slide that's horrible
144
00:16:06,310 --> 00:16:09,520
and output is forming the trunk link.
145
00:16:09,700 --> 00:16:14,340
But in here we're defining also on both ends.
146
00:16:14,530 --> 00:16:26,350
But we cannot tronc we cannot perform a trunk link to where they are transport's we are using show interfaces
147
00:16:26,810 --> 00:16:28,160
to run commands.
148
00:16:28,180 --> 00:16:34,010
And we can see the front porch which are making an actual train King.
149
00:16:34,090 --> 00:16:43,770
At that moment and other very fine command is show interfaces and interface name and the switch port
150
00:16:43,900 --> 00:16:48,580
we can see the administratively or the operational mode.
151
00:16:48,640 --> 00:16:59,730
If they are trying or not let's say go to the come on we learn at tech types as to which interface which
152
00:16:59,730 --> 00:17:07,590
is connected to and and the ways a computer may be Grise or a printer are normally in Access mode and
153
00:17:07,860 --> 00:17:16,650
that and they will have to access to its own real traffic from the other religions are not forwarded.
154
00:17:16,770 --> 00:17:25,470
Wired that interface as you know consider a situation where an attacker is connected to a switch interface
155
00:17:25,740 --> 00:17:28,300
which is configured with either dynamic.
156
00:17:28,300 --> 00:17:38,580
There is this terrible dynamic out or trunk Mobbs if the Ebtekar can generate DTP messages from his
157
00:17:38,580 --> 00:17:45,400
computer directing at truckling can be formed between his computer and the switch.
158
00:17:45,570 --> 00:17:54,000
Another method of switch spoofing is by connecting by connecting Rook's which an interface configured
159
00:17:54,120 --> 00:17:55,290
with dynamic.
160
00:17:55,290 --> 00:17:59,450
These are both dynamic ultra or strong modes.
161
00:18:01,160 --> 00:18:04,630
Let's take a look to the double tagging attack.
162
00:18:04,640 --> 00:18:14,490
Lastly double tagging real and hoping ETEC takes advantage of my Q and that like tagging and tags removed.
163
00:18:14,490 --> 00:18:23,990
Process of many types of surveys many surveys review all the data mining to tack you double taking ETEC
164
00:18:24,020 --> 00:18:34,250
and Ebtekar change the or regional frame to add to the land tax and out-of tag which is of his own land
165
00:18:34,340 --> 00:18:37,830
and an inner hidden tag of the victims.
166
00:18:37,940 --> 00:18:42,290
We'll then hear the errors PC must belong to the net.
167
00:18:42,290 --> 00:18:50,960
We love to try and link when double Turks frame reaches the switch one meaning in this example the switch
168
00:18:50,960 --> 00:19:00,470
can only see the outer Whelan of the wheel and that the interface really belongs to this switch so which
169
00:19:00,470 --> 00:19:08,510
one will know remailed all too real and tech and will forward to all the ports belong to Natsu will
170
00:19:08,510 --> 00:19:16,640
land and in this example there is villaine one one copy of that frame is forward to the trunk link to
171
00:19:16,640 --> 00:19:22,090
reach the next switch which is switched to when the frame reaches the switch to.
172
00:19:22,100 --> 00:19:27,070
It will open the frame to see the second tech switch to real.
173
00:19:27,080 --> 00:19:34,310
Now assume that frame blanks to Villon 100 and it is forward will on 100.
19245
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.