Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,690 --> 00:00:03,720
It on a section we're going to go to the side to side.
2
00:00:03,890 --> 00:00:05,450
With the security.
3
00:00:05,520 --> 00:00:14,720
And let's start with the P.N. weepie an extensive procurement network across the public networks such
4
00:00:14,720 --> 00:00:22,760
as the Internet enables the users to send and receive that data across shared or public networks as
5
00:00:22,760 --> 00:00:30,830
if they are competing devices were directly connected to the private network we Prempro.
6
00:00:30,840 --> 00:00:39,180
It's mainly 3:03 benefits and they are the Firstly reduced cost because the area where is yeah like
7
00:00:39,180 --> 00:00:45,670
your office in WI PM you do not need to travel to your office to connect your local area network.
8
00:00:45,680 --> 00:00:47,980
No problem if you're in a cafe.
9
00:00:48,060 --> 00:00:52,200
No problem if you're in a restaurant or wherever you are.
10
00:00:52,200 --> 00:01:00,540
Everywhere may be your office in WI PM and the second benefit is scale ability because the Internet
11
00:01:00,540 --> 00:01:08,080
based we peons enable organizations to use the Internet infrastructure within ISP and devices.
12
00:01:08,190 --> 00:01:17,190
And the third security because VPN can provide high level security by using Edwins authorization and
13
00:01:17,430 --> 00:01:26,190
encryption protocols and we have three main parts of the VPN and they are side to side plans remote
14
00:01:26,190 --> 00:01:34,930
access re-appears and the EM repair that's going to be the site to site re-appears site.
15
00:01:34,980 --> 00:01:42,690
So we plan all those employees in a geographical and disparate offices to share one Kwesi with all their
16
00:01:42,690 --> 00:01:50,940
work in this type of VPN host may not have the VPN client software they send and receive normal TCAP
17
00:01:50,950 --> 00:02:00,240
IP refrig through air we can get away and the VPN gateway is responsible for encapsulating and encrypting
18
00:02:00,300 --> 00:02:08,760
outbound traffic sending it through a VPN tunnel over the Internet to a peer weepie and get at the target
19
00:02:09,000 --> 00:02:09,980
site.
20
00:02:10,380 --> 00:02:17,980
And as you can see an area of worry has offices in your wheelchair office a office B and D office C
21
00:02:18,240 --> 00:02:27,740
and we had the whooping gateway devices and the second measles we're going to focus on is the remote
22
00:02:27,740 --> 00:02:37,970
access VPN remote access VPN allows employees to access the companies Internet from home or while traveling
23
00:02:38,060 --> 00:02:46,240
outside the office in this type of weepin we pay class gain secure access to the enterprise network
24
00:02:46,270 --> 00:02:54,470
wire a VPN server and VPN client so they may be required for the connection.
25
00:02:54,530 --> 00:02:58,610
And as you can see in here we have some Another uses.
26
00:02:58,850 --> 00:03:06,790
As you can see for example home users the user in the hotel there are more buyers are in here and buy
27
00:03:06,790 --> 00:03:10,090
one another user in the conference center and something like that.
28
00:03:10,250 --> 00:03:17,430
And these guys are connected to the corporate network by the help of VPN server in here.
29
00:03:19,120 --> 00:03:28,330
And last minute we're going to focus on is the DMB p.m. dynamic multi-point VPN then we P.N. is running
30
00:03:28,330 --> 00:03:36,760
technique we can use to build a VPN network with multiple sites without having to statically configuring
31
00:03:36,790 --> 00:03:38,460
all devices.
32
00:03:38,500 --> 00:03:46,420
It is a hub and spoke network as you can see in the figure where the spokes are will be able to communicate
33
00:03:46,420 --> 00:03:51,410
with each other directly without having to hop.
34
00:03:51,480 --> 00:03:59,620
Encryption is also supported to the SEC which makes the army pen a popular choice for connectome different
35
00:03:59,620 --> 00:04:02,750
sites using regular internet connection.
36
00:04:04,260 --> 00:04:13,500
That's going to decide to site Jeery Talos Jeery is the most basic talent pool local they will up by
37
00:04:13,500 --> 00:04:21,600
Cisco that allows the anchor isolation of world wide sea of network Les porticoes inside the point to
38
00:04:21,600 --> 00:04:30,240
point links in this technique and virtual tunnel is created between two end points and packets are sent
39
00:04:30,240 --> 00:04:33,740
through the Jeery tunnel as you can see in here.
40
00:04:33,750 --> 00:04:41,460
We have a source and we have another hosting here and they can communicate by the end of the tunnel
41
00:04:41,520 --> 00:04:48,270
which is the most basic tunneling technique you are eternal and we have no encryption or something like
42
00:04:48,270 --> 00:04:50,200
that in the GOP.
43
00:04:50,970 --> 00:04:59,430
And the future of the Jeery there's no full control because there is no encryption Jeery is now secure
44
00:04:59,650 --> 00:05:05,200
and jury report for the cell and for the communication.
45
00:05:05,320 --> 00:05:13,170
And here's the configuration of the jury to configure Deery on I rather we're getting into the Tarnow
46
00:05:13,170 --> 00:05:19,470
interface by typing interface tunnel and the town name.
47
00:05:19,670 --> 00:05:28,300
And we're defining our IP address in here as you can see here we are typing term for the one warm.
48
00:05:28,500 --> 00:05:36,510
And the we are typing our subnet mask as well then we're defining our tunnel mode as the Jeery Jeery
49
00:05:36,510 --> 00:05:41,870
IP and we're defining at source and the total destination.
50
00:05:41,970 --> 00:05:51,040
And they are the public IP address as you can see here to a jury configuration we can use these two
51
00:05:51,040 --> 00:06:00,490
ip interface brief command and Shergar if our Tunnell interface is up or not let's go ahead with the
52
00:06:00,490 --> 00:06:01,860
IPs sec.
53
00:06:03,130 --> 00:06:11,820
IP that is the political shoot for secure IP communications that works by authenticating and ankar thing.
54
00:06:11,850 --> 00:06:19,170
Each IP packet of communications session in this tunneling technique that will travel securely is the
55
00:06:19,170 --> 00:06:24,900
key point guys from a pro and network over the public IP network.
6602
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.