All language subtitles for 2. VLANs Part 2

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal) Download
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:08,940 --> 00:00:14,220 Send this example let's assume A is sending a frame to D. 2 00:00:14,440 --> 00:00:17,260 So the source address that led to will be a. 3 00:00:17,380 --> 00:00:19,370 And the destination address will be D. 4 00:00:19,600 --> 00:00:27,010 I will send the frame to switch one which one will then copy that frame to all ports based once again 5 00:00:27,010 --> 00:00:28,380 on the switch architecture. 6 00:00:28,510 --> 00:00:34,480 The central async will check the destination in the camp table and let's assume for the moment that 7 00:00:34,480 --> 00:00:37,990 does not answer which ones can table or MAC Address table. 8 00:00:38,230 --> 00:00:44,050 So the frame will attempt to go out of this port to 0 2 but because the internal tagged color is red 9 00:00:44,050 --> 00:00:44,880 for that frame. 10 00:00:44,920 --> 00:00:46,590 And this is a Greenport. 11 00:00:46,720 --> 00:00:49,280 The frame is not permitted out of 0 2. 12 00:00:49,600 --> 00:00:52,040 However on this port because it's a trunk link. 13 00:00:52,210 --> 00:00:57,400 And let's assume for the moment that all the lands are allowed across this trunk that frame will be 14 00:00:57,400 --> 00:01:04,220 sent out of port 0 3 to switch to however just before the frame is sent out. 15 00:01:04,220 --> 00:01:06,760 It needs to be tagged with the villain number. 16 00:01:07,100 --> 00:01:10,080 So in this case the villain identifier would be red. 17 00:01:10,130 --> 00:01:15,750 Now as mentioned in switches villans identified by numbers but to keep these examples simple we are 18 00:01:15,760 --> 00:01:17,310 going to use colors. 19 00:01:17,330 --> 00:01:24,470 So this would in actual fact be a number from 0 to 4000 and 96 bedframe is then sent across the trunk 20 00:01:24,830 --> 00:01:32,120 to switch to who then receives the frame once again the frame is processed internally. 21 00:01:32,120 --> 00:01:37,430 Now this switch reads the villain identify an edited or one Q header and sees that it belongs to the 22 00:01:37,430 --> 00:01:44,540 red Villon that is tagged internally within the switch the frame is sent to Allport 0 2 as well as 0 23 00:01:44,540 --> 00:01:45,160 1. 24 00:01:45,260 --> 00:01:50,630 And let's assume once again that the MAC address table is switched to does not contain the MAC address 25 00:01:50,630 --> 00:01:51,570 of D. 26 00:01:51,650 --> 00:01:58,040 So when the frame is attempting to go to port 0 1 it is denied because the color of the frame is red 27 00:01:58,430 --> 00:02:00,760 and this interface is in the green Villon. 28 00:02:00,920 --> 00:02:02,710 So the frame is dropped. 29 00:02:02,730 --> 00:02:08,840 However out of this interface the frame is permitted because the port is in the red villain and the 30 00:02:08,840 --> 00:02:14,920 frame is tagged with the red villaine all tagging is stripped out of this port. 31 00:02:14,960 --> 00:02:19,340 So it's same as a normal Ethernet frame to PCD. 32 00:02:19,340 --> 00:02:24,080 Once again the PCs are oblivious to the fact that they have been put into villains. 33 00:02:24,110 --> 00:02:26,660 They just see stented Ethernet. 34 00:02:26,660 --> 00:02:32,420 So a standard frame where the source address of a destination address a D is transmitted out of port 35 00:02:32,420 --> 00:02:40,450 0 to and processed by the PC edited in one key trunked have a spatial villain known as the native villaine 36 00:02:41,050 --> 00:02:46,270 native villans are untagged when a port on the switch is set up as a trunk. 37 00:02:46,630 --> 00:02:53,800 For instance this interface on switch one and switch to that interface can receive and transmit tagged 38 00:02:53,800 --> 00:03:01,450 frames frames belonging to the native villaine do not carry violent tags when sent over this trunk by 39 00:03:01,450 --> 00:03:07,480 the same token if an untagged frame were received on the trunk port that frame would automatically be 40 00:03:07,480 --> 00:03:11,030 associated with the native land for the sport. 41 00:03:11,050 --> 00:03:15,030 Now specific management traffic will go across the native land. 42 00:03:15,220 --> 00:03:22,090 So for instance spanning tree BPT use will use the native Villon and so will dynamic trunking critical 43 00:03:22,930 --> 00:03:28,450 dynamic trunking protocol is a way that switches negotiate to set up a trunk between themselves automatically 44 00:03:28,900 --> 00:03:31,010 and I'll show you an example of that in a moment. 45 00:03:32,130 --> 00:03:38,370 Certain management traffic always uses villaine one if you have left the line one as the native LAN 46 00:03:38,760 --> 00:03:45,480 traffic like CPV DP AGP and you DL D will be transmitted across the native land. 47 00:03:45,540 --> 00:03:52,650 Untagged if I ever The native land is changed to something other than land one these protocols will 48 00:03:52,650 --> 00:03:59,280 then be tagged in that specific villaine CTP was explained in the ICD 1 portion of this course. 49 00:03:59,340 --> 00:04:05,190 It allows us to view directly connected devices and trunking protocol we are going to discuss in the 50 00:04:05,190 --> 00:04:06,550 next few slides. 51 00:04:06,600 --> 00:04:13,350 It is a way to dynamically update other switches with changes made on a single switch in a VTB domain 52 00:04:13,960 --> 00:04:21,330 AGP or port aggregation protocol is a protocol used for the automatic creation of ether channels and 53 00:04:21,330 --> 00:04:28,380 you DLT or you need directional linked detection is used to monitor the physical configuration of cables 54 00:04:28,380 --> 00:04:32,120 between devices and detect unique directional links. 55 00:04:32,130 --> 00:04:35,330 This allows us to detect incorrectly cabled links. 56 00:04:35,340 --> 00:04:40,380 The important thing to take note of here is that trunk links there is a special villain known as the 57 00:04:40,380 --> 00:04:46,770 native land where traffic is sent untagged if left at the default of Villa and one a lot of management 58 00:04:46,770 --> 00:04:49,880 traffic will be sent across that native land. 59 00:04:49,890 --> 00:04:56,460 Its important that the native land on both sides of the trunk be the same if they not set the same. 60 00:04:56,460 --> 00:05:00,620 The searchers will notify you by telling you that theres a native villaine mismatch. 61 00:05:01,080 --> 00:05:06,990 The issue that arises if the native lands are not the same is that traffic from one villain on the switch 62 00:05:07,170 --> 00:05:11,750 will automatically be associated and end up in a different than on another switch. 63 00:05:11,760 --> 00:05:17,400 And obviously the whole concept of feline's is to separate traffic into a specific Thielen. 64 00:05:17,430 --> 00:05:23,100 In other words a separate broadcast domain or separate subnet traffic from one VLAN should not end up 65 00:05:23,160 --> 00:05:28,320 in another villaine because of a native villaine misconfiguration. 66 00:05:28,340 --> 00:05:31,360 Now this is something you probably not see in networks today. 67 00:05:31,580 --> 00:05:38,510 In theory with a native villaine a switch like switch one could say tagged frame's to switch to and 68 00:05:38,600 --> 00:05:40,680 untagged frames to this MacBook. 69 00:05:40,820 --> 00:05:47,030 So by using the native Villon this MacBook or a PC would still be able to communicate with the network 70 00:05:47,330 --> 00:05:53,360 even though it doesn't understand tagged frames edited or one keyframes or tagged frames are used for 71 00:05:53,360 --> 00:05:58,040 communicating via information between networking devices like switches. 72 00:05:58,040 --> 00:06:03,410 This device wouldn't necessarily understand edited or one keyframes but could still communicate with 73 00:06:03,410 --> 00:06:05,840 the network by using the native villaine. 74 00:06:06,110 --> 00:06:07,800 However that's not common today. 75 00:06:07,970 --> 00:06:16,130 What is more typical Today is a scenario like this where you have a PC connected to an IP phone connected 76 00:06:16,130 --> 00:06:17,770 to a Cisco switch. 77 00:06:17,780 --> 00:06:25,010 Now Cisco IP phone has a built in three way switch one port is connected back to the network infrastructure. 78 00:06:25,130 --> 00:06:32,030 So a Cisco switch a second port allows the PC to connect to the infrastructure through the phone and 79 00:06:32,030 --> 00:06:38,600 a third port allows for voice traffic from the handset to be prioritized over data when sent to the 80 00:06:38,600 --> 00:06:40,000 network infrastructure. 81 00:06:40,340 --> 00:06:46,970 So the phone has a built in three way switch always proud rising voice over data. 82 00:06:47,020 --> 00:06:52,510 The thing to take note of here though is that the phone can be configured in a separate Villon to the 83 00:06:52,510 --> 00:06:53,380 PC. 84 00:06:53,380 --> 00:06:57,900 So the phone could be in the red violin and the PC could be in the green line. 85 00:06:58,030 --> 00:07:00,610 There are a lot of advantages to doing it this way. 86 00:07:00,850 --> 00:07:07,270 So usually from a security point of view this PC will not be able to sniff voice traffic and therefore 87 00:07:07,330 --> 00:07:09,760 listening on the voice conversation. 88 00:07:09,760 --> 00:07:14,600 Now there are a lot of caveats relating to Cisco phones and different models are set up different ways 89 00:07:14,830 --> 00:07:21,160 but in theory the concept is that the phone is in a separate violent to the PC and therefore the PC 90 00:07:21,160 --> 00:07:24,090 is not able to see the voice traffic. 91 00:07:24,100 --> 00:07:29,740 There are applications like Cain and Abel which is a very powerful hacking tool that allow you to sniff 92 00:07:29,740 --> 00:07:36,820 the network capture the voice traffic and then replay that traffic as a file on your local PC so you 93 00:07:36,820 --> 00:07:39,000 can replay the voice conversation. 94 00:07:39,340 --> 00:07:44,950 But if the phone is in a separate Villon security is enhanced because the PC is not able to see the 95 00:07:44,950 --> 00:07:47,920 voice traffic from a quality of service point of view. 96 00:07:47,920 --> 00:07:53,130 This is also a lot better because its easier to prioritize the voice traffic over the data traffic. 97 00:07:53,290 --> 00:07:59,530 If its in a separate VM setting up your network this way also has the advantages of easier IP address 98 00:07:59,530 --> 00:08:03,680 management because you can assign a separate subnet to your phones. 99 00:08:03,690 --> 00:08:07,380 This is your PCs and thus scale your IP addressing. 100 00:08:07,420 --> 00:08:13,030 So what happens is the switch is configured with what's called a voice Freelon and a native villaine 101 00:08:13,420 --> 00:08:19,780 the voice feel is tagged so tagged frames get sent to the phone and the phone with its boltin threeway 102 00:08:19,840 --> 00:08:26,650 switch is able to read the edited or one keyframes untagged frames are saved on what's called the native 103 00:08:26,660 --> 00:08:28,960 illum or data line. 104 00:08:29,110 --> 00:08:34,730 That information is sent to the phone and the phone just switches that to the PC. 105 00:08:34,840 --> 00:08:41,440 So the PC receives the untagged on native land frames and the phone receives that tagged or voice file 106 00:08:41,440 --> 00:08:46,040 and frames no configuration and the phone is necessary to enable this. 107 00:08:46,150 --> 00:08:51,280 You literally typed a few commands on the switch telling the switch what the voice the land is and what 108 00:08:51,280 --> 00:08:52,550 the DTV Bil'in is. 109 00:08:52,750 --> 00:08:59,020 And this happens automatically because when the phone's boot up they query the switch through CGP to 110 00:08:59,020 --> 00:09:01,010 find out which feel they belong to. 111 00:09:01,270 --> 00:09:06,530 So the switch up dates the phone's configuration through the use of CTP. 112 00:09:06,850 --> 00:09:11,580 So this is a very common implementation of native lands in the real world today. 113 00:09:12,530 --> 00:09:18,410 So just to sum up how ports are assigned to villans seriously they can be statically assigned by an 114 00:09:18,410 --> 00:09:19,490 administrator. 115 00:09:19,520 --> 00:09:25,460 So to use an administrator go into an interface and steadily put that port into a villain. 116 00:09:25,460 --> 00:09:30,980 The second option is to create what are called Dynamic villains using a villain membership policy server 117 00:09:31,700 --> 00:09:39,170 dynamic villans allow for a ports deal and to be done emic updated based on the Mac address of the device 118 00:09:39,170 --> 00:09:40,600 attached to that port. 119 00:09:40,910 --> 00:09:46,400 So in a boardroom for example when a director plugs in a laptop based on the Mac address of that laptop 120 00:09:46,490 --> 00:09:52,640 that port is dynamically assigned to the directors the plan when a manager plugs his laptop into that 121 00:09:52,640 --> 00:09:59,020 same port the next day for example that Villon is automatically updated to the managers Villon. 122 00:09:59,030 --> 00:10:04,400 So based on the source Mac address of frame's received in the port the port is automatically assigned 123 00:10:04,580 --> 00:10:12,400 to different lands and last year we have voice villans which are used specifically for IP phones BTP 124 00:10:12,490 --> 00:10:19,720 or villaine trunking protocol is a Cisco proprietary layer to protocol which allows for the Propagation 125 00:10:19,720 --> 00:10:25,980 of the information from one switch to another rather than telnetting to multiple switches. 126 00:10:26,080 --> 00:10:32,710 You can Karaite delete or rename the lands on one switch and have that information automatically propagated 127 00:10:33,100 --> 00:10:35,610 to other switches across trunk links. 128 00:10:35,620 --> 00:10:38,750 Notice the name villaine trunking protocol. 129 00:10:38,770 --> 00:10:42,820 This information can only be propagated across trunk links. 130 00:10:42,820 --> 00:10:48,820 Now ETP can save you a lot of time that has a lot of Sisk engineers will tell the BTP can cause you 131 00:10:48,850 --> 00:10:50,190 a lot of headaches. 132 00:10:50,200 --> 00:10:55,960 Switches can have the entire villaine configuration wiped out if a new switch is added to the network 133 00:10:56,200 --> 00:10:58,320 without following a proper procedure. 134 00:10:58,570 --> 00:11:04,540 So a lot of Cisco engineers will not enable VCP in modern environments because of the inherent risks 135 00:11:04,540 --> 00:11:06,340 associated with this protocol. 136 00:11:07,440 --> 00:11:13,650 GTP messages are sent to the following Mac address which is a well-known multicast address for flooding 137 00:11:13,770 --> 00:11:16,950 of the CTP and DTP protocols. 138 00:11:16,950 --> 00:11:19,400 There are three types of messages in DTP. 139 00:11:19,410 --> 00:11:25,950 You have some free advertisement subset advertisements and advertisement requests and I'll explain each 140 00:11:25,950 --> 00:11:28,790 of these in more detail in the upcoming slides. 141 00:11:28,890 --> 00:11:35,380 But please be aware that there are three message typed when setting up DP devices will by default belong 142 00:11:35,380 --> 00:11:38,560 to the null domain VDB to work. 143 00:11:38,560 --> 00:11:45,490 You need to configure and put the devices into a specific VTB domain only devices within the same DTP 144 00:11:45,490 --> 00:11:49,460 domain will be updated with the line information. 145 00:11:49,480 --> 00:11:56,920 A switch can only be configured in a single VTB domain at any given time by default Cisco switches are 146 00:11:56,920 --> 00:12:04,450 in the nold domain or no management domain until they receive an advertisement for a domain over trunked 147 00:12:04,450 --> 00:12:04,980 link. 148 00:12:05,080 --> 00:12:08,350 Or until you manually configure a management domain. 149 00:12:08,580 --> 00:12:14,830 So in this example let's assume that these devices have been put into the VTB domain with the name of 150 00:12:14,830 --> 00:12:15,750 Cecka. 151 00:12:16,030 --> 00:12:22,300 Remember these VCP is a layer to protocol and requires trunked links for communication. 152 00:12:22,540 --> 00:12:29,860 So VDB will not traverse Harada an important concept to understand NVP is the concept of a revision 153 00:12:29,860 --> 00:12:30,490 number. 154 00:12:31,380 --> 00:12:38,260 Every time it changes made to the villain database the revision number in BTP will increment by 1. 155 00:12:38,460 --> 00:12:45,410 So let's assume that all devices in this apology have a revision number of 1 yours in a ministry to 156 00:12:45,600 --> 00:12:51,720 a villain let's say we three to the switch it's revision number will then increment from a vision number 157 00:12:51,720 --> 00:12:59,320 1 to revision number 2 that information will then be advertised to all other switches in the VTB domain 158 00:12:59,650 --> 00:13:05,410 so that they can synchronize their databases to the latest revision number which is revision number 159 00:13:05,410 --> 00:13:06,440 2. 160 00:13:06,550 --> 00:13:11,680 So the switch at the top will send what is called a GTP summary advertisement to all of the switches 161 00:13:11,710 --> 00:13:14,860 informing them that a change has been made. 162 00:13:14,860 --> 00:13:17,610 Remember this is sent using a multicast address. 163 00:13:17,740 --> 00:13:21,070 So all of these devices will see that message. 164 00:13:21,070 --> 00:13:26,440 They will then request the latest information using an advertisement request and the switch at the top 165 00:13:26,620 --> 00:13:31,800 will send them detailed information about the change using a subset advertisement. 166 00:13:31,810 --> 00:13:37,150 The net result is that the revision numbers and all of these switches will increment to the same revision 167 00:13:37,150 --> 00:13:40,740 number as a switch where the change was made. 168 00:13:40,780 --> 00:13:46,210 So Viola and three will appear in all the databases of the switches and the revision number will be 169 00:13:46,210 --> 00:13:48,100 set to revision number two. 170 00:13:48,250 --> 00:13:54,430 The whole concept with VTB is that you can make changes on an individual device as those changes are 171 00:13:54,430 --> 00:13:55,190 made. 172 00:13:55,300 --> 00:14:00,700 All other switches are informed of the change and they will synchronize their databases to the latest 173 00:14:00,700 --> 00:14:06,130 revision number so that they end up having the same B plans and maybe Lenn databases. 174 00:14:06,130 --> 00:14:11,680 That means that you as the administrator only to make changes on one switch rather than five switches 175 00:14:11,680 --> 00:14:18,300 in the apology please note ports are put into individual villans by for example an administrator. 176 00:14:18,610 --> 00:14:25,300 The DP does not put ports into individual villans it just updates the database so that the switches 177 00:14:25,300 --> 00:14:31,770 know which villains exist use an administrator still need to put those ports into the relevant villans. 178 00:14:31,990 --> 00:14:38,230 So this is just a villain database update mechanism so that switches know the villains that exist in 179 00:14:38,230 --> 00:14:40,810 the typology. 180 00:14:40,820 --> 00:14:43,500 So let's look at the VDB messages in more detail. 181 00:14:43,520 --> 00:14:46,760 The first stop of VDB message is a summary advertisement. 182 00:14:46,760 --> 00:14:51,620 This is sent every five minutes or whenever there's a change. 183 00:14:51,620 --> 00:14:58,340 So whenever an administrator makes a change on a switch by for instance adding a Villon a summary advertisement 184 00:14:58,340 --> 00:15:03,590 will be sent out on the well-known multicast address to all of the switches in the domain. 185 00:15:03,590 --> 00:15:10,190 So this is used to inform other switches of the current VCP domain and the current configuration revision 186 00:15:10,190 --> 00:15:10,910 number. 187 00:15:11,210 --> 00:15:17,510 So as an example on switch one the administrator adds another villain let's say villain for the revision 188 00:15:17,510 --> 00:15:19,150 number will be incremented. 189 00:15:19,150 --> 00:15:23,160 So if the revision number was three it would not be incremented to 4. 190 00:15:23,660 --> 00:15:29,660 This switch will say in a summary advertisement to all neighboring switches informing them of the current 191 00:15:29,660 --> 00:15:36,740 VTB domain and the new configuration revision number switches that receive that summary advertisement 192 00:15:37,060 --> 00:15:43,310 will then send back a summary request asking for detailed information of the changes that have been 193 00:15:43,310 --> 00:15:44,160 made. 194 00:15:44,180 --> 00:15:50,240 There are three situations when some requests are used Firstly when a switch has been reset or when 195 00:15:50,240 --> 00:15:57,250 the VTB domain name is being changed or when the switch has received a VTB summary advertisement with 196 00:15:57,250 --> 00:16:00,500 a higher configuration revision number than its own. 197 00:16:00,500 --> 00:16:07,370 So because switch to received the summary advertisement from one indicating a high revision number. 198 00:16:07,490 --> 00:16:12,170 In other words the revision number and which one is revision before and the revision number on switch 199 00:16:12,170 --> 00:16:20,090 2 is revision number 3 switch 2 will now request information from switch 1 so that it can update its 200 00:16:20,090 --> 00:16:26,750 database with the latest the information that detailed information is sent from which one to switch 201 00:16:26,750 --> 00:16:28,520 to using what's called a subset. 202 00:16:28,550 --> 00:16:29,780 Advertisement. 203 00:16:29,780 --> 00:16:36,890 This contains a list of the information and if they are several villans more than one subset advertisement 204 00:16:36,890 --> 00:16:42,280 may be required to update and synchronize the databases of other switches. 205 00:16:42,290 --> 00:16:47,370 So essentially what this is is detailed information of the changes that have been made. 206 00:16:47,540 --> 00:16:52,910 The summary advertisement just informs the switch in summary format of the latest revision number and 207 00:16:52,910 --> 00:16:54,290 BTP domain. 208 00:16:54,500 --> 00:17:00,860 If the local switch sees that it's out of date it will request detailed information so that it can synchronize 209 00:17:00,860 --> 00:17:06,500 its database and that information will be provided using a subset advertisement. 210 00:17:06,530 --> 00:17:12,290 The switch is now able to synchronize the local databases to the database of the switch with the latest 211 00:17:12,290 --> 00:17:13,140 information. 212 00:17:14,310 --> 00:17:16,910 Now there are three modes in BTP. 213 00:17:17,100 --> 00:17:25,500 The default mode is server a VTB switch in server mode can create villans modify villains and delete 214 00:17:25,500 --> 00:17:26,370 villans. 215 00:17:26,400 --> 00:17:29,650 It also sends and forwards advertisements. 216 00:17:29,790 --> 00:17:34,040 So if it received an advertisement from another switch it would forward that on. 217 00:17:34,290 --> 00:17:39,070 If you made changes on the local switch it would send some real advertisements. 218 00:17:39,090 --> 00:17:43,340 It would also synchronize its local database to the latest revision number. 219 00:17:43,650 --> 00:17:47,460 And it also saves the villain configuration information locally. 220 00:17:47,460 --> 00:17:52,500 So this is the device where you're going to make your changes multiple switches can be configured as 221 00:17:52,500 --> 00:17:56,530 VTB servers but you need to be really careful with this. 222 00:17:56,580 --> 00:18:03,780 The second mode is VTB client a VTB client can not create change or delete villans. 223 00:18:04,020 --> 00:18:10,050 It is also able to send forward advertisements so it can say in any violence currently listed in its 224 00:18:10,050 --> 00:18:17,310 database to other VTB switches it can also forward advertisement receive from other switches. 225 00:18:17,310 --> 00:18:23,760 Thirdly it would also synchronize its database to the latest configuration revision number this is a 226 00:18:23,760 --> 00:18:29,970 major potential issue with GTP and has burned to many Cisco engineers in the past. 227 00:18:29,970 --> 00:18:33,670 A lot of Cisco engineers will not use VTB because of this issue. 228 00:18:33,930 --> 00:18:36,020 So he has a sample typology. 229 00:18:36,240 --> 00:18:41,850 Now we have a VTB server and it's a scene that all of the switches at the top are configured as VTB 230 00:18:41,850 --> 00:18:48,600 clients the host machines are in the raid Villano green Bil'in and currently the revision number for 231 00:18:48,660 --> 00:18:50,320 the domain is the revision number. 232 00:18:51,790 --> 00:18:57,200 So the latest configuration revision number is to the VTB domain. 233 00:18:57,220 --> 00:19:03,580 Is Cisco and the villains that have been configured on the switches are villains red and green. 234 00:19:03,580 --> 00:19:06,880 Please note once again that the switches have a villain database. 235 00:19:06,880 --> 00:19:13,030 That is what VTB updates the individual ports and the switches need to manually be put in the correct 236 00:19:13,030 --> 00:19:14,460 the. 237 00:19:14,500 --> 00:19:21,000 Now someone plugs a nother switch into the topology from for instance a lab environment. 238 00:19:21,400 --> 00:19:27,270 The reason why this is dangerous is that in a lab environment the lens may have been added and removed 239 00:19:27,610 --> 00:19:32,200 and thus the revision number may be a lot higher than the production network. 240 00:19:32,200 --> 00:19:38,020 So let's assume for the moment that the revision number is 50 this switch only has the blue villaine 241 00:19:38,020 --> 00:19:39,430 configured on it. 242 00:19:39,430 --> 00:19:44,140 So the green and red villans do not exist in the villain database. 243 00:19:44,140 --> 00:19:49,750 A lot of people make the mistake of assuming that as long as the switches configured as a VTB client 244 00:19:50,260 --> 00:19:53,290 it will not cause any problems on the network. 245 00:19:53,290 --> 00:19:58,210 So an administrator plugged in the switch and configures this port as a trunk. 246 00:19:58,510 --> 00:20:02,610 Please note once again that ETP advertisement only sent across trunk ports. 247 00:20:02,710 --> 00:20:08,880 So let's assume that throughout the network all of these links are configured as trunk's as soon as 248 00:20:08,880 --> 00:20:11,380 this client is added to the VCP domain. 249 00:20:11,520 --> 00:20:17,980 And what's really scary is that this client can be automatically updated with the VCP information. 250 00:20:18,030 --> 00:20:23,130 In other words if it's configured with a nold domain it can automatically join the current VCP domain 251 00:20:23,130 --> 00:20:23,920 of Cisco. 252 00:20:24,180 --> 00:20:29,490 And as soon as that happens the devices will synchronize their databases to the latest configuration 253 00:20:29,490 --> 00:20:35,160 revision number which in this case is 50 sun all switches in the live domain. 254 00:20:35,160 --> 00:20:41,730 The revision number is changed to 50 because all of the switches including the VTB server will synchronize 255 00:20:41,760 --> 00:20:49,080 automatically to the VTB client the current villans red and green are automatically removed from the 256 00:20:49,080 --> 00:20:55,230 violent database and the only villain that will now be available in the violent databases of all of 257 00:20:55,230 --> 00:20:58,800 these switches is violently. 258 00:20:58,800 --> 00:21:05,960 Now all of the ports on all the switches that have manually been put into the green or red Villon or 259 00:21:06,090 --> 00:21:07,650 heire disabled. 260 00:21:07,650 --> 00:21:14,810 The issue here is that a port belongs to the red Villon but the red Villon does not exist in the database. 261 00:21:14,910 --> 00:21:17,510 So the port is automatically disabled. 262 00:21:17,790 --> 00:21:23,500 That means that no traffic can be sent or received on the sport and the same thing happens on all other 263 00:21:23,520 --> 00:21:24,720 switches. 264 00:21:24,750 --> 00:21:30,030 Essentially what happens is that the entire network is brought down by the introduction of the single 265 00:21:30,030 --> 00:21:31,200 switch. 266 00:21:31,200 --> 00:21:37,350 That's extremely worrying to say the least that the introduction of a single switch can bring down an 267 00:21:37,350 --> 00:21:39,690 entire enterprise network. 268 00:21:39,810 --> 00:21:46,830 The only way to fix this is to physically connect to the VTB server and then manually add the villans 269 00:21:46,920 --> 00:21:49,200 that have been deleted. 30286

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.