All language subtitles for Free-CCNA-Software-Defined-Networking-Day-62-CCNA-200-301-Complete-Course_en

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:03,410 --> 00:00:06,620 This is a free, complete course for the CCNA. 2 00:00:06,620 --> 00:00:10,330 If you like these videos, please subscribe\n 3 00:00:10,330 --> 00:00:14,868 Also, please like and leave a comment, and\n 4 00:00:17,609 --> 00:00:21,390 In this video we will look at software-defined\nnetworking. 5 00:00:21,390 --> 00:00:25,599 In the first video of this network automation\n 6 00:00:25,599 --> 00:00:30,509 such as centralizing the control plane in\n 7 00:00:32,070 --> 00:00:39,579 So, in this video we’ll take a more in-depth\n 8 00:00:40,600 --> 00:00:44,410 We’ll cover exam topics 6.3 and 6.4. 9 00:00:44,409 --> 00:00:49,439 You’ll learn new terms like overlay, underlay,\n 10 00:00:49,439 --> 00:00:52,500 SDN that we haven’t covered yet. 11 00:00:52,500 --> 00:00:56,058 Here’s what we’ll cover in this video. 12 00:00:56,058 --> 00:00:59,570 First I’ll briefly review the points about\n 13 00:01:01,149 --> 00:01:05,760 Then I’ll introduce Cisco’s SD-Access,\n 14 00:01:07,609 --> 00:01:12,760 I’ll also introduce Cisco’s DNA Center\n 15 00:01:12,760 --> 00:01:18,520 part of SD-Access, and compare it to traditional\n 16 00:01:18,519 --> 00:01:23,189 Make sure to watch until the end of the video\n 17 00:01:23,189 --> 00:01:26,890 ExSim, the best practice exams for the CCNA. 18 00:01:26,890 --> 00:01:31,099 Let’s reviews some points about SDN. 19 00:01:31,099 --> 00:01:36,129 SDN is an approach to networking that centralizes\n 20 00:01:38,340 --> 00:01:42,299 Traditional control planes use a distributed\n 21 00:01:42,299 --> 00:01:44,780 device has its own control plane. 22 00:01:44,780 --> 00:01:49,030 The control planes of each network device\n 23 00:01:49,030 --> 00:01:54,129 each other and share routing information,\n 24 00:01:55,129 --> 00:01:58,310 That’s a distributed control plane. 25 00:01:58,310 --> 00:02:03,430 An SDN controller centralizes control plane\n 26 00:02:03,430 --> 00:02:08,159 Network devices no longer use OSPF to share\n 27 00:02:08,159 --> 00:02:12,799 share information with the controller, which\n 28 00:02:14,650 --> 00:02:19,938 Now, depending on the SDN solution the entire\n 29 00:02:19,938 --> 00:02:24,799 SDN controller, or perhaps only part of the\n 30 00:02:24,800 --> 00:02:29,130 functions on the individual network devices. 31 00:02:29,129 --> 00:02:34,579 The controller can interact programmatically\n 32 00:02:34,580 --> 00:02:39,049 Specifically it uses what we call the southbound\n 33 00:02:39,049 --> 00:02:43,120 Then there is also the northbound interface,\n 34 00:02:43,120 --> 00:02:45,840 controller using our scripts and applications. 35 00:02:45,840 --> 00:02:52,560 Okay, those are the fundamental points of\n 36 00:02:52,560 --> 00:02:57,128 And here’s one more look at the SDN architecture\n 37 00:02:58,519 --> 00:03:02,730 The applications are on top, the controller\n 38 00:03:03,840 --> 00:03:07,859 Actually, these three ‘layers’ of the\narchitecture have names. 39 00:03:07,859 --> 00:03:10,099 On top there is the application layer. 40 00:03:10,098 --> 00:03:14,438 This layer contains scripts and applications\n 41 00:03:16,780 --> 00:03:21,218 Note that this isn’t the application layer\n 42 00:03:22,218 --> 00:03:24,269 We’re not talking about the OSI model here. 43 00:03:24,269 --> 00:03:27,099 Anyway, next is the control layer. 44 00:03:27,098 --> 00:03:31,438 This contains the SDN controller that receives\n 45 00:03:32,979 --> 00:03:37,149 Although this is a separate concept from the\n 46 00:03:37,150 --> 00:03:41,090 contains the centralized control plane of\nthe network. 47 00:03:41,090 --> 00:03:44,908 And finally there is the infrastructure layer,\n 48 00:03:44,908 --> 00:03:48,028 responsible for forwarding messages across\nthe network. 49 00:03:48,028 --> 00:03:53,709 I didn’t mention these layers in earlier\n 50 00:03:53,709 --> 00:03:58,950 The application layer contains apps and scripts\n 51 00:03:58,950 --> 00:04:03,229 layer contains the SDN controller, and the\n 52 00:04:04,340 --> 00:04:09,989 Okay, so I’ve told you the basics of what\n 53 00:04:09,989 --> 00:04:12,378 looked at a specific example of SDN. 54 00:04:12,378 --> 00:04:19,110 So, let’s take a look at one, Cisco Software-Defined\nAccess. 55 00:04:19,110 --> 00:04:23,720 Cisco SD-Access is Cisco’s SDN solution\n 56 00:04:23,720 --> 00:04:28,170 So, office wired and wireless LANs, for example. 57 00:04:28,170 --> 00:04:33,819 Cisco has other SDN solutions, for example\n 58 00:04:33,819 --> 00:04:37,699 their SDN solution for automating data center\nnetworks. 59 00:04:37,699 --> 00:04:41,740 Remember when I explained spine-leaf architecture\n 60 00:04:41,740 --> 00:04:46,009 That is used extensively in ACI data center\nnetworks. 61 00:04:46,009 --> 00:04:50,529 Cisco also has SD-WAN, their SDN solution\nfor automating WANs. 62 00:04:50,529 --> 00:04:54,279 But for now let’s look at SD-Access. 63 00:04:54,279 --> 00:05:01,750 Cisco DNA, Digital Network Architecture, Center\n 64 00:05:01,750 --> 00:05:07,310 In the previous video about REST APIs we sent\n 65 00:05:08,600 --> 00:05:12,720 Okay, let’s look at the basic SD-Access\narchitecture. 66 00:05:12,720 --> 00:05:16,500 At the center, in the control layer, we have\nDNA Center. 67 00:05:16,500 --> 00:05:21,699 And then under it we have the network devices\n 68 00:05:21,699 --> 00:05:27,930 These devices form the fabric of SD-Access,\n 69 00:05:27,930 --> 00:05:33,379 In the application layer we have our scripts\n 70 00:05:33,379 --> 00:05:38,829 These could be tools we develop, third-party\n 71 00:05:38,829 --> 00:05:43,680 DNA Center itself also has a GUI that we can\nuse to control it. 72 00:05:43,680 --> 00:05:48,439 Okay, so that’s the basic architecture of\nCisco’s SD Access. 73 00:05:48,439 --> 00:05:53,081 Notice how it fits perfectly into the SDN\n 74 00:05:54,970 --> 00:05:57,300 Next let’s look at that term ‘fabric’. 75 00:05:57,300 --> 00:06:01,930 To understand the fabric, you need to understand\n 76 00:06:01,930 --> 00:06:07,240 First, the underlay is the underlying physical\n 77 00:06:07,240 --> 00:06:14,400 and wireless, which provide IP connectivity,\n 78 00:06:14,399 --> 00:06:18,679 Usually I’d use OSPF as an example, since\n 79 00:06:18,680 --> 00:06:24,629 protocol, but soon you’ll see why I chose\n 80 00:06:24,629 --> 00:06:29,209 Basically the underlay is a bunch of multilayer\n 81 00:06:29,209 --> 00:06:34,769 Then the overlay is the virtual network built\n 82 00:06:34,769 --> 00:06:41,990 For example, SD-Access uses a protocol called\n 83 00:06:41,990 --> 00:06:47,150 And fabric is the term we use to refer to\n 84 00:06:47,149 --> 00:06:50,659 the physical and virtual network as a whole. 85 00:06:50,660 --> 00:06:53,580 For example, this is the underlay network. 86 00:06:53,579 --> 00:06:57,639 The physical multilayer switches and their\n 87 00:06:57,639 --> 00:07:04,899 perhaps running IS-IS to share routing information\n 88 00:07:04,899 --> 00:07:11,250 Then the overlay network consists of VXLAN\n 89 00:07:11,250 --> 00:07:15,339 When hosts in the LAN communicate with each\n 90 00:07:19,000 --> 00:07:24,879 And the fabric refers to the physical and\n 91 00:07:24,879 --> 00:07:27,670 Both are necessary to make SD-Access work. 92 00:07:27,670 --> 00:07:32,449 Okay, now let me give a little more detail\n 93 00:07:32,449 --> 00:07:36,209 So, let’s talk about the underlay. 94 00:07:36,209 --> 00:07:40,659 The underlay’s purpose is to support the\n 95 00:07:40,660 --> 00:07:44,930 To make a virtual network of tunnels, the\n 96 00:07:44,930 --> 00:07:49,750 to reach other of course, so the underlay\nis very important. 97 00:07:49,750 --> 00:07:53,230 There are three different roles for switches\nin SD-Access. 98 00:07:53,230 --> 00:07:58,080 Those are edge node, these are switches that\n 99 00:07:59,959 --> 00:08:05,219 Then there are border nodes, which connect\n 100 00:08:05,220 --> 00:08:08,450 for example connecting to a WAN router. 101 00:08:08,449 --> 00:08:14,399 And finally there are control nodes, which\n 102 00:08:14,399 --> 00:08:17,229 Protocol, to perform various control plane\nfunctions. 103 00:08:17,230 --> 00:08:22,390 I think LISP is far beyond what you need to\n 104 00:08:22,389 --> 00:08:26,110 used for the control plane of SD-Access. 105 00:08:26,110 --> 00:08:30,800 Note that you can add SD-Access on top of\n 106 00:08:33,029 --> 00:08:39,088 This is called a brownfield deployment, when\n 107 00:08:39,089 --> 00:08:44,620 If you’re curious which hardware supports\n 108 00:08:44,620 --> 00:08:49,950 matrix’, but you don’t have to know the\n 109 00:08:49,950 --> 00:08:54,370 And also note that in this case DNA center\n 110 00:08:54,370 --> 00:08:59,009 could be a major risk to the current working\nproduction network. 111 00:08:59,009 --> 00:09:03,850 Ideally you will be using a greenfield deployment,\n 112 00:09:06,528 --> 00:09:12,299 In this case DNA center will configure the\n 113 00:09:12,299 --> 00:09:16,998 For example, all switches are layer 3 and\n 114 00:09:16,999 --> 00:09:20,909 That’s why I mentioned IS-IS in the example\nearlier. 115 00:09:20,909 --> 00:09:26,649 Additionally all links between switches are\n 116 00:09:28,500 --> 00:09:33,929 And edge nodes, so access switches, act as\n 117 00:09:33,929 --> 00:09:38,828 This is known as a routed access layer, we’ve\n 118 00:09:38,828 --> 00:09:41,409 switches that end hosts connect to. 119 00:09:41,409 --> 00:09:44,068 Let me demonstrate with a diagram. 120 00:09:46,899 --> 00:09:53,730 Notice that STP is used to avoid layer 2 loops,\n 121 00:09:53,730 --> 00:09:58,659 the distribution layer switches to provide\n 122 00:09:58,659 --> 00:10:03,870 So, to send traffic out of their local network,\n 123 00:10:09,019 --> 00:10:14,699 In an SD-access underlay, however, all connections\n 124 00:10:14,700 --> 00:10:17,790 used to exchange routing information. 125 00:10:17,789 --> 00:10:22,649 Note that STP is no longer needed, and an\n 126 00:10:22,649 --> 00:10:27,679 Instead, the access layer switches are the\n 127 00:10:27,679 --> 00:10:31,679 Now we have a routed access layer. 128 00:10:31,679 --> 00:10:36,229 Now let me briefly introduce a few aspects\n 129 00:10:36,230 --> 00:10:39,850 First, LISP provides the control plane of\nSD-Access. 130 00:10:39,850 --> 00:10:44,180 A list of mappings of EIDs to RLOCs is kept. 131 00:10:46,220 --> 00:10:53,509 EIDs, endpoint identifiers, identify end hosts\n 132 00:10:53,509 --> 00:10:58,490 locators, identify the edge switch which can\n 133 00:10:58,490 --> 00:11:02,430 Of course, there is a lot more detail to cover\n 134 00:11:02,429 --> 00:11:05,899 can see how it differs from the traditional\ncontrol plane. 135 00:11:05,899 --> 00:11:10,820 Instead of a traditional routing table to\n 136 00:11:13,509 --> 00:11:20,019 Cisco TrustSec, CTS, provides policy control\n 137 00:11:20,019 --> 00:11:25,740 Just remember that name, Cisco TrustSec, you\n 138 00:11:25,740 --> 00:11:30,528 And finally VXLAN provides the data plane\n 139 00:11:30,528 --> 00:11:33,188 actually forward traffic in the data plane. 140 00:11:33,188 --> 00:11:37,500 Let’s look at how VXLAN tunnels work with\nLISP. 141 00:11:37,500 --> 00:11:43,100 Notice that SW3 is a control node, so it is\n 142 00:11:43,100 --> 00:11:49,670 PC2 is connected to SW2, and it tells the\n 143 00:11:53,188 --> 00:11:58,659 Now PC1 wants to send traffic to PC2, so it\n 144 00:11:58,659 --> 00:12:02,610 SW1 asks SW3, how can I reach PC2? 145 00:12:02,610 --> 00:12:06,249 And SW3 informs it that PC2 is reachable via\nSW2. 146 00:12:06,249 --> 00:12:12,379 So, the message from PC1 is forwarded over\n 147 00:12:12,379 --> 00:12:15,980 Okay, that’s all I’ll say about the overlay\nfor now. 148 00:12:15,980 --> 00:12:20,558 VXLAN does more than just create tunnels,\n 149 00:12:20,558 --> 00:12:23,159 which I won’t get into in this video. 150 00:12:23,159 --> 00:12:28,669 Just know the difference between fabric, overlay,\n 151 00:12:28,669 --> 00:12:36,419 like edge node, border node, and control node,\n 152 00:12:36,419 --> 00:12:39,308 Now let’s look a bit more at DNA Center. 153 00:12:39,308 --> 00:12:42,338 DNA Center itself has two main roles. 154 00:12:42,339 --> 00:12:48,220 First, it is the SDN controller used in SD-Access,\n 155 00:12:48,220 --> 00:12:53,060 Additionally it can be a network manager in\n 156 00:12:53,059 --> 00:12:58,688 In that case, although it doesn’t provide\n 157 00:12:58,688 --> 00:13:02,620 point to monitor, analyze, and configure the\nnetwork. 158 00:13:02,620 --> 00:13:07,499 Although I will mention both purposes, for\n 159 00:13:08,948 --> 00:13:14,599 Note that DNA Center is a software application\n 160 00:13:14,600 --> 00:13:19,159 I mentioned Cisco UCS in the virtualization\n 161 00:13:19,159 --> 00:13:25,549 DNA Center has a REST API, as you already\n 162 00:13:25,549 --> 00:13:31,389 And its southbound interface supports protocols\n 163 00:13:31,389 --> 00:13:37,519 protocols Telnet, SSH, and SNMP to control\nand monitor devices. 164 00:13:37,519 --> 00:13:44,310 DNA Center enables something called intent-based\n 165 00:13:44,309 --> 00:13:49,428 Basically, the goal is to allow the engineer\n 166 00:13:49,428 --> 00:13:54,778 to DNA Center, and then DNA Center will take\n 167 00:13:57,639 --> 00:14:01,549 It simplifies the process, and allows engineers\n 168 00:14:01,549 --> 00:14:05,370 analyzing and configuring policies on devices\none at a time. 169 00:14:07,980 --> 00:14:11,990 Traditional security policies using ACLs can\n 170 00:14:11,990 --> 00:14:16,818 For example, ACLs can have thousands of entries,\n 171 00:14:16,818 --> 00:14:21,178 with time and as engineers leave and new engineers\ntake over. 172 00:14:21,178 --> 00:14:25,259 Looking at another engineer’s configurations\n 173 00:14:27,428 --> 00:14:31,389 And configuring and applying ACLs correctly\n 174 00:14:32,730 --> 00:14:38,440 DNA Center, on the other hand, allows the\n 175 00:14:38,440 --> 00:14:43,040 for example this group of users can’t communicate\n 176 00:14:43,039 --> 00:14:48,099 this server but not that server, etc, and\n 177 00:14:51,490 --> 00:14:55,278 This is what configuring policies on DNA Center\nlooks like. 178 00:14:55,278 --> 00:14:57,958 Notice on the left here we have source groups. 179 00:14:57,958 --> 00:15:02,698 Of course, you’d have to define the groups\n 180 00:15:02,698 --> 00:15:05,490 And here we have those same groups as destination. 181 00:15:05,490 --> 00:15:09,860 Up here we have the legend for the colors\nin the policy grid. 182 00:15:09,860 --> 00:15:12,558 Note that the entire grid is white now, so\ndefault. 183 00:15:12,558 --> 00:15:17,990 However, let’s say any traffic sourced from\n 184 00:15:17,990 --> 00:15:20,810 for the Test_Servers group should be permitted. 185 00:15:20,809 --> 00:15:23,818 Now, what about traffic sourced from the guest\ngroup? 186 00:15:23,818 --> 00:15:28,349 They shouldn’t be able to access our servers,\n 187 00:15:28,350 --> 00:15:30,899 How about users in the employees group? 188 00:15:30,899 --> 00:15:35,471 Maybe that depends on various factors, we\n 189 00:15:35,471 --> 00:15:39,220 we would want to make a custom policy for\nthat. 190 00:15:39,220 --> 00:15:43,149 We can go ahead and define policies like this,\n 191 00:15:43,149 --> 00:15:48,009 of creating and applying policies across the\n 192 00:15:48,009 --> 00:15:51,139 No need to configure policies on devices one\nat a time. 193 00:15:51,139 --> 00:15:55,379 I’m not showing the whole process here of\n 194 00:15:55,379 --> 00:15:59,860 engineer can write an explanation for each\n 195 00:16:01,730 --> 00:16:07,149 Okay, now let’s take a look at some of the\n 196 00:16:07,149 --> 00:16:11,730 In the menu on the left side you can see there\n 197 00:16:13,639 --> 00:16:19,379 Here we can build the network hierarchy, manage\n 198 00:16:19,379 --> 00:16:22,610 DNS servers, etc, among other things. 199 00:16:22,610 --> 00:16:28,079 Here, for example, I’m looking at one site,\nSJC-20, on a map. 200 00:16:28,078 --> 00:16:31,659 You can map your enterprise’s sites all\n 201 00:16:35,039 --> 00:16:39,419 In the policy menu you can configure policies\n 202 00:16:39,419 --> 00:16:43,669 You tell DNA Center how the network devices\n 203 00:16:43,669 --> 00:16:47,639 that into configurations on the devices in\nthe network. 204 00:16:47,639 --> 00:16:50,568 For example, here’s that group-based access\ncontrol page again. 205 00:16:50,568 --> 00:16:54,919 A simple and logical way to configure network\npolicies. 206 00:16:54,919 --> 00:16:59,849 In the provision menu we can manage our device\n 207 00:16:59,850 --> 00:17:03,220 Other services are available as well, as you\n 208 00:17:06,059 --> 00:17:10,759 In the side bar you can see that there are\n 209 00:17:10,759 --> 00:17:15,199 By default, when you add devices to DNA Center\n 210 00:17:15,199 --> 00:17:18,120 you assign them to a specific site. 211 00:17:18,119 --> 00:17:22,109 You can see their status of ‘managed’\n 212 00:17:22,109 --> 00:17:25,078 DNA Center, they are not independent devices. 213 00:17:25,078 --> 00:17:29,859 This is also the default setting when you\n 214 00:17:29,859 --> 00:17:32,909 Here you can see the compliance status of\nthe devices. 215 00:17:32,910 --> 00:17:37,370 The top device is compliant with our policies,\n 216 00:17:37,369 --> 00:17:43,918 I clicked on one of the non-compliant devices,\n 217 00:17:43,919 --> 00:17:48,049 The software image, the version of IOS, is\nnot up to date. 218 00:17:48,048 --> 00:17:54,000 The version should be 17.03.03, but currently\nit is 16.11.1c. 219 00:17:54,000 --> 00:17:57,730 We can use DNA Center to update that later\nif we want. 220 00:17:57,730 --> 00:18:03,099 And here you can see that it is also non-compliant\n 221 00:18:03,099 --> 00:18:07,439 Anyway moving on, in the assurance section\n 222 00:18:08,599 --> 00:18:12,689 You can make sure the devices are all up and\n 223 00:18:12,690 --> 00:18:16,640 For example, here I can see which devices\n 224 00:18:18,048 --> 00:18:22,558 3 of 4 devices are in good health, and 1 of\n 225 00:18:22,558 --> 00:18:26,930 Okay, that’s all we’ll look at for now,\n 226 00:18:26,930 --> 00:18:33,120 yourself you can check out the DevNet sandbox\n 227 00:18:33,119 --> 00:18:35,379 the username and password here. 228 00:18:35,380 --> 00:18:40,670 I highly recommend checking it out and looking\n 229 00:18:40,670 --> 00:18:46,340 Okay, that was a quick look at DNA Center,\n 230 00:18:46,339 --> 00:18:49,859 with all of the functions of DNA Center for\nthe CCNA. 231 00:18:49,859 --> 00:18:54,770 Basically, just understand its role as a network\n 232 00:18:54,770 --> 00:18:59,549 also understand that it can be a network management\n 233 00:18:59,549 --> 00:19:04,808 However, the exam topics do state that you\n 234 00:19:04,808 --> 00:19:07,558 device management with traditional device\nmanagement. 235 00:19:07,558 --> 00:19:13,039 Actually, I’ve covered most of these points\n 236 00:19:13,039 --> 00:19:14,589 but let’s review to make sure. 237 00:19:14,589 --> 00:19:19,808 First, let’s review some characteristics\n 238 00:19:19,808 --> 00:19:23,980 Devices are configured one-by-one via SSH\nor console connection. 239 00:19:23,980 --> 00:19:27,670 This is what we’ve been doing throughout\n 240 00:19:27,670 --> 00:19:31,288 Devices are manually configured via console\n 241 00:19:31,288 --> 00:19:33,960 This means when deploying a new device to\na network. 242 00:19:33,960 --> 00:19:39,069 You first have to manually set it up before\n 243 00:19:39,069 --> 00:19:42,579 Configurations and policies are managed per-device,\n 244 00:19:42,579 --> 00:19:45,298 There is no central management. 245 00:19:45,298 --> 00:19:49,609 New network deployments take a long time due\n 246 00:19:49,609 --> 00:19:54,109 Setting up dozens of new devices manually\n 247 00:19:54,109 --> 00:19:57,308 are more likely due to increased manual effort. 248 00:19:57,308 --> 00:20:01,918 Now, I don’t want to make it seem like traditional\n 249 00:20:01,919 --> 00:20:05,080 be aware of these potential downsides. 250 00:20:05,079 --> 00:20:09,769 Now some characteristics of DNA Center-based\nnetwork management. 251 00:20:09,769 --> 00:20:14,369 Devices are centrally managed and monitored\n 252 00:20:16,759 --> 00:20:21,879 In this video I showed you the DNA Center\n 253 00:20:21,880 --> 00:20:25,889 can be used to interact with DNA Center too. 254 00:20:25,888 --> 00:20:31,349 With DNA Center, the administrator communicates\n 255 00:20:31,349 --> 00:20:37,039 which changes those intentions into configurations\n 256 00:20:37,039 --> 00:20:40,000 Configurations and policies are centrally\n 257 00:20:42,259 --> 00:20:44,319 Software versions are also centrally managed. 258 00:20:44,319 --> 00:20:49,139 DNA Center can monitor cloud servers for new\n 259 00:20:50,829 --> 00:20:55,589 In this video you saw an example of DNA Center\n 260 00:20:57,380 --> 00:21:01,929 Finally, with DNA Center new network deployments\n 261 00:21:01,929 --> 00:21:07,420 New devices can automatically receive their\n 262 00:21:08,420 --> 00:21:12,740 Not only is this faster, human error is reduced\n 263 00:21:12,740 --> 00:21:16,000 Okay, that’s all I’ll say about this. 264 00:21:16,000 --> 00:21:19,419 Most of these points we have already covered,\n 265 00:21:19,419 --> 00:21:21,580 it is mentioned on the exam topics. 266 00:21:21,579 --> 00:21:24,369 Okay, let’s review what we covered. 267 00:21:24,369 --> 00:21:29,719 We first reviewed SDN, and I newly introduced\n 268 00:21:31,200 --> 00:21:37,048 Then, as an example of SDN, I introduced some\n 269 00:21:37,048 --> 00:21:41,569 The main takeaways from this section are the\n 270 00:21:41,569 --> 00:21:44,439 Make sure you understand those concepts. 271 00:21:44,440 --> 00:21:48,860 Then I showed you some functions of Cisco\n 272 00:21:48,859 --> 00:21:52,000 with DNA Center to traditional network management. 273 00:21:52,000 --> 00:21:57,410 Remember, DNA Center is an SDN controller\n 274 00:21:57,410 --> 00:22:03,179 be used as a general network management tool\n 275 00:22:03,179 --> 00:22:07,950 Make sure to watch until the end of the quiz\n 276 00:22:07,950 --> 00:22:10,980 ExSim, the best practice exams for the CCNA. 277 00:22:10,980 --> 00:22:14,460 Okay, let’s go to quiz question 1. 278 00:22:14,460 --> 00:22:20,190 Which of the following terms describes the\n 279 00:22:20,190 --> 00:22:24,538 Pause the video now to select the best answer. 280 00:22:24,538 --> 00:22:29,339 Okay, the answer is A, underlay. 281 00:22:29,339 --> 00:22:33,949 The underlay refers to the underlying physical\n 282 00:22:35,700 --> 00:22:38,740 The combination of underlay and overlay is\ncalled the fabric. 283 00:22:42,980 --> 00:22:46,589 In which of the following layers would you\n 284 00:22:47,929 --> 00:22:52,538 Pause the video now to select the best answer. 285 00:22:52,538 --> 00:22:57,548 Okay, the answer is B, application. 286 00:22:57,548 --> 00:23:01,940 In SDN architecture, the application layer\n 287 00:23:01,940 --> 00:23:05,620 to interact with the controller, which is\nin the control layer. 288 00:23:05,619 --> 00:23:09,719 Finally the bottom layer is the infrastructure\n 289 00:23:14,190 --> 00:23:18,538 Which of the following is a characteristic\n 290 00:23:20,630 --> 00:23:25,120 Pause the video now to select the best answer. 291 00:23:25,119 --> 00:23:31,469 Okay, the answer is B, all links between switches\nare layer 3. 292 00:23:31,470 --> 00:23:35,390 This means that spanning tree is not needed,\n 293 00:23:35,390 --> 00:23:37,519 there is no risk of layer 2 loops. 294 00:23:37,519 --> 00:23:41,500 Okay, let’s go to question 4. 295 00:23:41,500 --> 00:23:46,028 Which protocol is used to create virtual tunnels\n 296 00:23:46,028 --> 00:23:50,640 Pause the video now to select the best answer. 297 00:23:50,640 --> 00:23:55,669 Okay, the answer is D, VXLAN. 298 00:23:55,669 --> 00:23:59,250 It is used to create virtual tunnels in the\noverlay network. 299 00:23:59,250 --> 00:24:03,480 And although we didn’t cover any details\n 300 00:24:03,480 --> 00:24:06,140 extensible LAN’ is very important. 301 00:24:06,140 --> 00:24:10,049 It means that VXLAN supports many different\n 302 00:24:10,048 --> 00:24:15,009 Okay, let’s go to question 5. 303 00:24:15,009 --> 00:24:18,538 Which of the following are valid switch roles\n 304 00:24:18,538 --> 00:24:24,769 (select three) Pause the video now to select\nthe best answers. 305 00:24:24,769 --> 00:24:32,359 Okay, the answers areA, C, and D. Control,\n 306 00:24:32,359 --> 00:24:36,459 These are the three different switch roles\n 307 00:24:40,539 --> 00:24:45,839 Now let’s take a look at a bonus question \n 25298

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.