Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,300 --> 00:00:05,680
In our next section we will talk about the controller based networks.
2
00:00:05,980 --> 00:00:16,780
Guys let's say that you're managing a huge network which consists of 1000 to outers 1000 switches and
3
00:00:16,820 --> 00:00:20,260
1000 wireless access points.
4
00:00:20,260 --> 00:00:26,430
OK then for example let's say you need to make a change into network for example.
5
00:00:26,440 --> 00:00:35,010
You want to make a configuration change for a device and you should implement this one for 1000 devices.
6
00:00:35,140 --> 00:00:44,220
So instead of configuring each device each one thousand two separately you have another option.
7
00:00:44,230 --> 00:00:48,990
And we are naming these guys as controllers.
8
00:00:49,000 --> 00:00:55,990
Controllers are used to manage more than one device from a central or central point.
9
00:00:56,010 --> 00:01:03,340
And you just implement some solutions on the controller itself and controller is just communicating
10
00:01:03,400 --> 00:01:08,650
the devices and make a related change to the devices.
11
00:01:08,650 --> 00:01:09,600
OK.
12
00:01:09,760 --> 00:01:17,230
Controllers are used in VoIP networks and also we have the wireless controllers that you can configure
13
00:01:17,260 --> 00:01:19,260
their wireless access points.
14
00:01:19,290 --> 00:01:30,410
OK Cisco have a new solution for this one and this name is Cisco DNA center Cisco DNA center is a way
15
00:01:30,410 --> 00:01:38,060
to manage our network using a graphical and programming interface for enterprise networks.
16
00:01:38,240 --> 00:01:46,880
Cisco DNA center is an appliance we can install our network or there is an option for having DNA in
17
00:01:46,880 --> 00:01:55,730
cloud also you can add and configure network devices and monitor and troubleshoot your network by using
18
00:01:55,730 --> 00:02:02,650
Cisco's Cisco DNA and DNA center is mainly focuses on five areas.
19
00:02:02,660 --> 00:02:10,330
You can see on the screen and they are design policy provision assurance.
20
00:02:10,370 --> 00:02:19,040
And the platform when we're stuck with the design we can take a map of world and we can add an area
21
00:02:19,070 --> 00:02:21,740
and we can save within that area.
22
00:02:21,740 --> 00:02:29,540
We have got this building or there is another area within an area we can put a floor on the building
23
00:02:29,570 --> 00:02:38,180
we can import a floor plan and we can drag and drop devices onto that floor plan we can say what our
24
00:02:38,540 --> 00:02:40,840
IP address allocation is.
25
00:02:40,850 --> 00:02:50,060
And this is way for us to design our network to this graphical interface in addition to that Cisco DNA
26
00:02:50,090 --> 00:02:52,180
can apply policy.
27
00:02:52,490 --> 00:03:01,400
We can assume policies into our group may be a loving and denying them accessing to something and we
28
00:03:01,400 --> 00:03:08,670
could do IP based access control or we can apply Q or as to our devices also.
29
00:03:09,140 --> 00:03:14,110
We can also do provisioning in Cisco DNA center.
30
00:03:14,120 --> 00:03:22,850
We can essentially do plug and play for our devices and we can have a new network that was set to whatever
31
00:03:22,850 --> 00:03:31,130
location what is going to be configured and when the device moves up it's going to go out and get some
32
00:03:31,190 --> 00:03:39,080
IP address information from DHS GP including some DNS server information and it is going to resolve
33
00:03:39,110 --> 00:03:47,660
IP address of DNA is central server and it is going to go up that server and based on its serial number
34
00:03:47,930 --> 00:03:55,010
it's going to be able to download the configuration file with just prepared profile for that device
35
00:03:55,040 --> 00:04:05,420
and to nothing more device gets the configuration automatically from DNA center Cisco DNA center also
36
00:04:05,420 --> 00:04:12,760
provides assurance and helps us to monitor the health of our network.
37
00:04:12,800 --> 00:04:20,630
This is going to be helping us with troubleshooting surely and if there are existing faults we can see
38
00:04:20,630 --> 00:04:21,710
what those are.
39
00:04:21,710 --> 00:04:30,170
And based on experiences of Cisco TAC Cisco DNA Center will give us feedback about what we should do
40
00:04:30,890 --> 00:04:33,380
to resolve this issue this summer.
41
00:04:33,770 --> 00:04:42,140
And let's say there is a rich ability problem between your two locations and let's say there's an access
42
00:04:42,140 --> 00:04:44,390
list causing this issue.
43
00:04:44,390 --> 00:04:53,030
And Cisco DNA center in this case will give us a graphical representation and show us exactly where
44
00:04:53,030 --> 00:05:01,310
that ACL lives that is blocking our traffic and last important feature of Cisco DNA center is.
45
00:05:01,360 --> 00:05:02,430
It is a bill.
46
00:05:02,430 --> 00:05:06,840
Ability to act as a programming platform.
47
00:05:06,840 --> 00:05:15,070
We have a large collection of API is application programming interfaces that will allow us to do why
48
00:05:15,070 --> 00:05:23,400
our program what we could do graphically if you want to provision or set a policy or gather troubleshooting
49
00:05:23,490 --> 00:05:33,540
information we can do that with a python script for example using some of these APIs so Cisco is providing
50
00:05:33,600 --> 00:05:42,270
us ad team a platform also for Cisco DNA if you want to experience Cisco DNA center yourself you can
51
00:05:42,270 --> 00:05:47,910
just browse the sandbox the NEC that Cisco dot com.
52
00:05:47,910 --> 00:05:54,030
Okay let's go there and check what's going on for Cisco DNA.
53
00:05:54,170 --> 00:05:55,120
There we go.
54
00:05:59,500 --> 00:06:05,490
User name is down at the user and we enter a related password.
55
00:06:06,110 --> 00:06:06,420
Okay.
56
00:06:06,420 --> 00:06:12,800
Once we broke these Cisco DNA them page you can see the options.
57
00:06:12,910 --> 00:06:20,370
A design policy provision and assurance we have already talked about and how they are used and what
58
00:06:20,370 --> 00:06:22,350
is the purpose of using that one.
59
00:06:22,780 --> 00:06:23,150
Okay.
60
00:06:23,160 --> 00:06:25,050
Let's have a look.
61
00:06:25,050 --> 00:06:34,880
What is included in an insurer assurance page you can check the network health in here basically and
62
00:06:35,300 --> 00:06:43,550
you can have some great graphical interfaces which is showing network devices and wired clients and
63
00:06:43,550 --> 00:06:49,980
wireless clients and you can also check if there is any global issue in here.
64
00:06:50,210 --> 00:06:53,420
For example let them load
65
00:06:56,280 --> 00:07:01,310
and you can manage some scheduled captures and sense of driving tests.
66
00:07:01,380 --> 00:07:06,780
Also you have dashboards for your sensors
67
00:07:10,580 --> 00:07:15,560
when we check the provision you can check you.
68
00:07:15,570 --> 00:07:24,780
You can see your each device and the what is the device family what is IP address serial number uptime.
69
00:07:24,820 --> 00:07:34,990
And when you check the policy also you can create group based access control policies IP based application
70
00:07:34,990 --> 00:07:44,620
traffic copy and virtual network policies and when it comes to the design you can do your own designing.
71
00:07:44,660 --> 00:07:56,410
And yes Cisco DNA is really cool and a big topic actually but for Cisco's yet CCMA XOM you will just
72
00:07:56,410 --> 00:08:00,760
be responsible from the things that you already talked about.
73
00:08:00,760 --> 00:08:03,970
So I don't want to go deeper for this one.
74
00:08:03,970 --> 00:08:05,660
OK let's go ahead.
75
00:08:05,800 --> 00:08:15,610
As I explained do we have also wireless controllers and wireless controller w Lan is a wireless architecture
76
00:08:15,610 --> 00:08:24,400
that aims to meet changing network demands and wireless controller manage wireless network access points
77
00:08:24,700 --> 00:08:29,230
that allow wireless devices to be to connect to the network.
78
00:08:29,230 --> 00:08:37,840
Basically what a wireless access point does for your network is similar to what an amplifier does for
79
00:08:37,840 --> 00:08:39,130
your home stereo.
80
00:08:39,130 --> 00:08:47,950
For example guys it takes the benefit coming from a router and stretches it so that many devices can
81
00:08:47,950 --> 00:08:55,810
go on the network from farther distances away a wireless controller is used in combination with the
82
00:08:55,810 --> 00:09:05,890
lightweight access point to control LW APB to manage light fade access points in large quantities by
83
00:09:05,890 --> 00:09:13,810
the network administrator or network operations center the wireless controller automatically handles
84
00:09:13,810 --> 00:09:22,150
the configuration of wireless access points so you don't need to go at each access point and you don't
85
00:09:22,150 --> 00:09:25,510
need to configure or separate the all of them.
9484
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.