All language subtitles for Free-CCNA-WAN-Architectures-Day-53-CCNA-200-301-Complete-Course_en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:03,779 --> 00:00:06,910 This is a free, complete course for the CCNA. 2 00:00:06,910 --> 00:00:10,759 If you like these videos, please subscribe\n 3 00:00:10,759 --> 00:00:15,458 Also, please like and leave a comment, and\n 4 00:00:18,170 --> 00:00:20,699 In this video we’ll look at WAN architectures. 5 00:00:20,699 --> 00:00:28,050 Specifically, we’ll be covering topic 1.2.d,\n 6 00:00:30,748 --> 00:00:36,619 Both of these exam topics use the term ‘describe’,\n 7 00:00:36,619 --> 00:00:42,469 You just need a basic understanding of some\n 8 00:00:42,469 --> 00:00:46,100 Note that we’ll be looking at WANs from\n 9 00:00:46,100 --> 00:00:51,730 the customer of a service provider, not from\n 10 00:00:51,729 --> 00:00:57,259 To learn more about the service provider perspective,\n 11 00:00:58,429 --> 00:01:01,939 Here’s what we’ll cover in this video. 12 00:01:01,939 --> 00:01:05,849 First I’ll give an introduction to WANs\n 13 00:01:05,849 --> 00:01:11,439 Then I’ll introduce one type of connection\n 14 00:01:11,439 --> 00:01:17,280 Then another WAN technology known as MPLS,\n 15 00:01:17,280 --> 00:01:21,750 us with a kind of VPN, virtual private network. 16 00:01:21,750 --> 00:01:26,489 Then I’ll introduce some options for internet\n 17 00:01:26,489 --> 00:01:31,349 VPNs, which allow us to create virtual private\n 18 00:01:31,349 --> 00:01:37,469 So, we’ll cover a lot of topics, but we\n 19 00:01:37,469 --> 00:01:42,769 To cover just the topic of MPLS in depth,\n 20 00:01:42,769 --> 00:01:46,359 least as long as this entire CCNA course. 21 00:01:46,359 --> 00:01:50,769 For the CCNA exam, all that’s expected is\n 22 00:01:50,769 --> 00:01:53,810 technologies and their purpose. 23 00:01:53,810 --> 00:01:58,120 As always, make sure to watch until the end\n 24 00:01:58,120 --> 00:02:04,430 from Boson Software’s ExSim for CCNA, the\n 25 00:02:04,430 --> 00:02:09,229 Okay let me introduce the concept of WANs\nfirst. 26 00:02:09,229 --> 00:02:14,099 As you know already, WAN stands for Wide Area\n 27 00:02:16,449 --> 00:02:21,048 A WAN is a network that extends over a large\ngeographic area. 28 00:02:21,049 --> 00:02:24,620 For example, between cities, between countries,\netc. 29 00:02:24,620 --> 00:02:28,739 So, WANs are used to connect geographically\nseparate LANs. 30 00:02:28,739 --> 00:02:34,218 For example, if a company has an office in\n 31 00:02:34,218 --> 00:02:40,299 in London, each of those offices is a LAN,\n 32 00:02:40,299 --> 00:02:44,090 them form a WAN, Wide Area Network. 33 00:02:44,090 --> 00:02:48,968 Although the Internet itself can be considered\n 34 00:02:48,968 --> 00:02:53,789 to an enterprise’s private connections that\n 35 00:02:55,169 --> 00:03:00,639 So, as I said the Internet can be considered\n 36 00:03:02,709 --> 00:03:06,669 Although there is another kind of technology\n 37 00:03:08,750 --> 00:03:14,378 Over public and shared connections like the\n 38 00:03:14,378 --> 00:03:16,578 can be used to create private connections. 39 00:03:16,579 --> 00:03:20,799 I’ll show you a few kinds of VPNs in this\nvideo. 40 00:03:20,799 --> 00:03:24,489 Note that there have been many different WAN\n 41 00:03:24,489 --> 00:03:28,560 Depending on the location, some will be available\n 42 00:03:28,560 --> 00:03:32,509 I won’t cover every possible WAN technology\nin this video. 43 00:03:32,509 --> 00:03:37,938 Also, technologies which are considered legacy\n 44 00:03:39,590 --> 00:03:44,359 Legacy basically means old and no longer used\nor rarely used. 45 00:03:47,669 --> 00:03:51,808 This enterprise has a central data center\nand some offices. 46 00:03:51,808 --> 00:03:55,329 For the purpose of this video we’re not\n 47 00:03:55,330 --> 00:04:01,389 of the devices in each LAN, but each of these,\n 48 00:04:04,419 --> 00:04:09,170 Each office is connected to the data center\n 49 00:04:09,169 --> 00:04:12,018 physical connection between two sites. 50 00:04:12,019 --> 00:04:16,310 This is not a shared connection, it’s not\n 51 00:04:16,310 --> 00:04:20,030 connection that the company uses to connect\nits sites together. 52 00:04:20,029 --> 00:04:24,809 By the way, do you know a word for this kind\n 53 00:04:26,939 --> 00:04:32,589 In the last video I introduced the term star\n 54 00:04:32,589 --> 00:04:35,689 a more common term is hub and spoke. 55 00:04:35,689 --> 00:04:41,100 The central site, the data center, is called\n 56 00:04:43,750 --> 00:04:49,439 One major advantage of a hub-and-spoke topology,\n 57 00:04:49,439 --> 00:04:54,290 it’s easier to centrally control what traffic\n 58 00:04:54,290 --> 00:04:59,520 All traffic between offices can be sent to\n 59 00:04:59,519 --> 00:05:02,899 and it can control which traffic is allowed\nand which isn’t. 60 00:05:02,899 --> 00:05:06,269 So, remember that term, hub and spoke topology. 61 00:05:06,269 --> 00:05:11,829 Now, I have to say that this diagram is actually\n 62 00:05:14,228 --> 00:05:17,370 This is a better representation of what’s\nactually going on. 63 00:05:17,370 --> 00:05:22,620 Rather than a single physical cable directly\n 64 00:05:22,620 --> 00:05:26,189 a service provider, which connects the sites\ntogether. 65 00:05:26,189 --> 00:05:30,699 I will introduce leased lines soon, but these\n 66 00:05:30,699 --> 00:05:36,250 I briefly introduced serial connections in\n 67 00:05:36,250 --> 00:05:41,800 2 encapsulations like HDLC and PPP, not Ethernet. 68 00:05:41,800 --> 00:05:47,829 However these days WAN connections via Ethernet\n 69 00:05:47,829 --> 00:05:52,990 Optical fiber connections allow much longer\n 70 00:05:52,990 --> 00:05:58,569 cables, so these days WANs using Ethernet\n 71 00:05:58,569 --> 00:06:03,620 Note that the CCNA focuses on the WAN connection\n 72 00:06:05,300 --> 00:06:09,500 So we won’t spend much time talking about\n 73 00:06:09,500 --> 00:06:14,259 provider network, the gray box in this slide\n 74 00:06:14,259 --> 00:06:19,180 If you want to learn more about that, consider\n 75 00:06:20,250 --> 00:06:25,639 Now, the Internet can also be used for an\n 76 00:06:25,639 --> 00:06:29,079 However, the Internet itself is not a private\nnetwork. 77 00:06:29,079 --> 00:06:34,468 It’s a shared, public network, so sending\n 78 00:06:36,470 --> 00:06:40,320 In this case, note that each site has a physical\n 79 00:06:40,319 --> 00:06:45,699 However, to send traffic between sites the\n 80 00:06:46,699 --> 00:06:52,110 We’ll cover these in greater detail soon,\n 81 00:06:52,110 --> 00:06:55,889 so that the contents can only be read by the\n 82 00:06:55,889 --> 00:07:01,129 Then, the encrypted packet is encapsulated\n 83 00:07:01,129 --> 00:07:06,430 This means that the original packet will remain\n 84 00:07:06,430 --> 00:07:10,110 Okay, so that was a quick introduction to\na few WAN options. 85 00:07:10,110 --> 00:07:16,240 Now let’s take a slightly deeper look at\n 86 00:07:16,240 --> 00:07:21,360 A leased line is a dedicated physical link,\n 87 00:07:21,360 --> 00:07:26,660 As I mentioned before, they use serial connections\n 88 00:07:26,660 --> 00:07:29,879 So, these aren’t Ethernet links. 89 00:07:29,879 --> 00:07:35,419 The layer 2 encapsulation is not Ethernet,\n 90 00:07:35,418 --> 00:07:39,589 There are various standards that provide different\n 91 00:07:41,740 --> 00:07:44,710 This chart from Wikipedia shows some of the\nstandards. 92 00:07:44,709 --> 00:07:48,978 Now, there are a lot here and I don’t think\n 93 00:07:48,978 --> 00:07:53,300 Of course, if you want you can make flashcards\n 94 00:07:53,300 --> 00:07:58,288 and their speeds, but I think that will be\n 95 00:08:00,499 --> 00:08:06,639 In North America the standard names begin\n 96 00:08:06,639 --> 00:08:11,199 I will include flashcards for these three\n 97 00:08:11,199 --> 00:08:16,300 one except a few people at Cisco know exactly\n 98 00:08:16,300 --> 00:08:19,978 to you if you want to memorize more or not. 99 00:08:19,978 --> 00:08:26,758 In Europe, as well as other regions, the standards\n 100 00:08:26,759 --> 00:08:30,530 Again, I will include flashcards for these\nthree standards. 101 00:08:30,529 --> 00:08:36,000 Now, as I mentioned before Ethernet WAN technologies\n 102 00:08:39,269 --> 00:08:44,509 It’s because leased lines tend to have a\n 103 00:08:44,509 --> 00:08:48,700 meaning it takes a longer time to actually\n 104 00:08:48,700 --> 00:08:51,680 speeds than Ethernet connections provide. 105 00:08:51,679 --> 00:08:56,969 Okay let’s move on to another WAN option,\nMPLS. 106 00:08:56,970 --> 00:09:01,120 MPLS stands for Multi Protocol Label Switching. 107 00:09:01,120 --> 00:09:06,370 Similar to the Internet, service providers’\n 108 00:09:06,370 --> 00:09:12,090 many customer enterprises connect to and share\n 109 00:09:12,090 --> 00:09:18,070 However, the label switching in the name of\n 110 00:09:18,070 --> 00:09:23,690 to be created over the MPLS infrastructure\n 111 00:09:23,690 --> 00:09:27,880 These labels are used to separate the traffic\n 112 00:09:27,879 --> 00:09:33,850 the shared infrastructure, and make sure it\n 113 00:09:33,850 --> 00:09:36,950 There are a few basic terms you should know\nfor MPLS. 114 00:09:36,950 --> 00:09:40,450 CE router means Customer Edge router. 115 00:09:40,450 --> 00:09:45,190 This is the customer’s router that is connected\n 116 00:09:47,700 --> 00:09:52,070 Finally there are P routers, these are the\n 117 00:09:52,070 --> 00:09:56,100 edge of the network and don’t connect to\ncustomer routers. 118 00:09:56,100 --> 00:09:59,019 This diagram should make it easier to understand. 119 00:09:59,019 --> 00:10:03,370 Notice the CE routers are at the edge of the\n 120 00:10:03,370 --> 00:10:07,370 PE routers, the provider edge routers. 121 00:10:07,370 --> 00:10:11,440 Within the provider network there are also\n 122 00:10:11,440 --> 00:10:16,380 infrastructure of the service provider’s\n 123 00:10:18,389 --> 00:10:24,350 When the PE routers receive frames from the\n 124 00:10:24,350 --> 00:10:29,620 This label is actually placed in between the\n 125 00:10:29,620 --> 00:10:35,200 header, so sometimes MPLS is called a Layer\n2.5 protocol. 126 00:10:35,200 --> 00:10:39,580 These labels are then used to make forwarding\n 127 00:10:42,200 --> 00:10:47,290 In regular IP routing the router checks the\n 128 00:10:47,289 --> 00:10:50,459 table to decide where to forward the packet. 129 00:10:52,000 --> 00:10:57,539 MPLS routers use the MPLS label to decide\n 130 00:10:57,539 --> 00:11:04,319 Now, the CE routers do not use MPLS, it is\n 131 00:11:04,320 --> 00:11:09,650 The CE routers do not have to run MPLS or\n 132 00:11:09,649 --> 00:11:15,549 Now, there are a few different kinds of VPNs\n 133 00:11:15,549 --> 00:11:23,179 When using a Layer 3 MPLS VPN, the CE and\n 134 00:11:24,759 --> 00:11:29,659 Now, it doesn’t have to be OSPF, it could\n 135 00:11:29,659 --> 00:11:35,039 Or the customer could just write static routes,\n 136 00:11:35,039 --> 00:11:38,069 But let’s assume a routing protocol is being\nused. 137 00:11:38,070 --> 00:11:45,640 For example, in the diagram below office A’s\n 138 00:11:45,639 --> 00:11:48,519 CE will peer with the other PE, like this. 139 00:11:48,519 --> 00:11:55,110 Then, office A’s CE will learn about office\n 140 00:11:55,110 --> 00:11:58,690 B’s CE will learn about office A’s routes,\ntoo. 141 00:11:58,690 --> 00:12:02,000 So, this is a Layer 3 MPLS VPN. 142 00:12:02,000 --> 00:12:07,929 The CE routers either form dynamic routing\n 143 00:12:07,929 --> 00:12:12,639 they use the PE routers as the next hop of\ntheir static routes. 144 00:12:12,639 --> 00:12:19,500 A Layer 2 MPLS VPN can also be used, in which\n 145 00:12:19,500 --> 00:12:25,230 So, the entire service provider network is\n 146 00:12:25,230 --> 00:12:30,420 Although the CE routers will physically connect\n 147 00:12:30,419 --> 00:12:33,189 CE routers are directly connected. 148 00:12:33,190 --> 00:12:36,600 Their WAN interfaces will be in the same subnet. 149 00:12:36,600 --> 00:12:40,930 If a routing protocol is used, the two CE\n 150 00:12:42,779 --> 00:12:47,720 In this case, the service provider network\n 151 00:12:47,720 --> 00:12:51,940 it’s doing so in a way that it’s like\n 152 00:12:51,940 --> 00:12:55,370 a big switch connecting the two CE routers\ntogether like this. 153 00:12:55,370 --> 00:13:01,060 The CE routers are physically connected to\n 154 00:13:01,059 --> 00:13:05,429 is operating like a big switch connecting\n 155 00:13:05,429 --> 00:13:12,289 Now, MPLS is a technology that runs in the\n 156 00:13:12,289 --> 00:13:16,699 technologies, many different kinds of connections,\n 157 00:13:16,700 --> 00:13:20,430 provider’s MPLS network for WAN service. 158 00:13:20,429 --> 00:13:25,569 In this case office A and office B are connecting\n 159 00:13:25,570 --> 00:13:31,590 Perhaps office C is connecting to the service\n 160 00:13:31,590 --> 00:13:37,610 Office D might be connecting via CATV, a cable\n 161 00:13:39,309 --> 00:13:44,639 And office E might use a serial connection,\n 162 00:13:46,289 --> 00:13:52,029 So, these sites are connecting to the service\n 163 00:13:52,029 --> 00:13:56,500 and they will all be able to communicate with\n 164 00:14:00,639 --> 00:14:07,449 For the CCNA exam, you should know that MPLS\n 165 00:14:07,450 --> 00:14:12,060 You should know the terms CE router, PE router,\nand P router. 166 00:14:12,059 --> 00:14:17,969 You should know that Layer 3 MPLS VPNs have\n 167 00:14:17,970 --> 00:14:24,990 using a routing protocol such as OSPF, whereas\n 168 00:14:24,990 --> 00:14:27,409 are all directly connected to each other. 169 00:14:27,409 --> 00:14:32,529 The service provider routers are totally transparent,\n 170 00:14:34,240 --> 00:14:39,289 As I mentioned at the beginning of this video,\n 171 00:14:39,289 --> 00:14:45,000 a huge course to cover in depth, but let’s\n 172 00:14:45,000 --> 00:14:50,659 Before focusing on Internet VPNs, let’s\n 173 00:14:50,659 --> 00:14:54,539 There are countless ways for an enterprise\n 174 00:14:54,539 --> 00:15:00,129 For example, private WAN technologies such\n 175 00:15:00,129 --> 00:15:03,980 to connect to a service provider’s Internet\ninfrastructure. 176 00:15:03,980 --> 00:15:08,810 Although the leased line or MPLS VPN itself\n 177 00:15:08,809 --> 00:15:12,859 means to access the public network that is\nthe Internet. 178 00:15:12,860 --> 00:15:18,509 In addition, technologies such as CATV and\n 179 00:15:18,509 --> 00:15:22,529 for home Internet access, can also be used\nby an enterprise. 180 00:15:22,529 --> 00:15:28,289 I’m repeating myself, but for both enterprise\n 181 00:15:28,289 --> 00:15:33,250 ethernet connections are growing in popularity\n 182 00:15:34,889 --> 00:15:39,370 But now let’s briefly look at two Internet\n 183 00:15:43,279 --> 00:15:47,480 First let’s look at DSL, which stands for\n 184 00:15:47,480 --> 00:15:52,950 DSL provides internet connectivity to customers\n 185 00:15:52,950 --> 00:15:55,660 line that is already installed in most homes. 186 00:15:55,659 --> 00:16:00,469 So, this is very convenient for both the service\n 187 00:16:00,470 --> 00:16:04,870 Now, there is one extra device here that I\n 188 00:16:04,870 --> 00:16:07,830 except for a brief mention in the previous\nvideo. 189 00:16:08,980 --> 00:16:15,000 A modem, which stands for modulator-demodulator,\n 190 00:16:15,000 --> 00:16:18,190 suitable to be sent over the phone lines. 191 00:16:18,190 --> 00:16:22,880 The modem might be a separate device, as in\n 192 00:16:24,690 --> 00:16:29,140 This connects the network to the service provider\n 193 00:16:29,139 --> 00:16:33,230 But there is another common kind of communication\n 194 00:16:38,370 --> 00:16:42,649 Cable Internet is a similar concept to DSL,\n 195 00:16:45,419 --> 00:16:51,539 But it provides Internet access via the same\n 196 00:16:52,539 --> 00:16:59,870 So, just like DSL, it takes advantage of already-installed\n 197 00:16:59,870 --> 00:17:05,400 Like DSL, a cable modem is required to convert\n 198 00:17:07,970 --> 00:17:13,059 And also like a DSL modem, the cable modem\n 199 00:17:14,759 --> 00:17:19,338 Now, for a home user, having one connection\n 200 00:17:19,338 --> 00:17:24,539 It’s a bit annoying if you lose Internet\n 201 00:17:24,539 --> 00:17:28,730 However, for many companies Internet access\n 202 00:17:28,730 --> 00:17:33,500 So, it’s best to have redundant Internet\n 203 00:17:34,779 --> 00:17:40,920 First, if you have 1 connection to 1 ISP,\n 204 00:17:40,920 --> 00:17:44,019 This is like a standard home Internet connection. 205 00:17:44,019 --> 00:17:49,029 For an enterprise, this is not ideal, because\n 206 00:17:49,029 --> 00:17:53,769 If you have 2 connections to that same ISP,\n 207 00:17:53,769 --> 00:17:57,849 This provides some redundancy, but still not\nideal. 208 00:17:57,849 --> 00:18:02,589 If you have 1 connection to each of 2 ISPs,\n 209 00:18:02,589 --> 00:18:07,369 This improves the redundancy because if something\n 210 00:18:09,869 --> 00:18:15,239 And finally there is dual multihomed, 2 connections\n 211 00:18:15,240 --> 00:18:17,660 This provides the most redundancy. 212 00:18:17,660 --> 00:18:21,910 Depending on the company, this might not be\n 213 00:18:21,910 --> 00:18:24,820 So, make sure you know these four terms. 214 00:18:24,819 --> 00:18:28,960 Single homed, dual homed, multihomed, and\ndual multihomed. 215 00:18:28,960 --> 00:18:32,049 Okay, that’s enough about Internet access\nfor now. 216 00:18:32,049 --> 00:18:37,710 Let’s move on to the final topic, Internet\nVPNs. 217 00:18:37,710 --> 00:18:43,390 Private WAN services such as leased lines\n 218 00:18:43,390 --> 00:18:49,240 traffic is separated by using dedicated physical\n 219 00:18:49,240 --> 00:18:51,240 tags that separate the traffic. 220 00:18:51,240 --> 00:18:56,769 However, when using the Internet as a WAN\n 221 00:18:58,440 --> 00:19:04,840 So, to provide secure communications over\n 222 00:19:06,660 --> 00:19:10,350 We will cover two kinds of Internet VPNs. 223 00:19:10,349 --> 00:19:18,029 First, site-to-site VPNs using IPsec, and\n 224 00:19:18,029 --> 00:19:23,319 So let’s get right into the first one, site-to-site\n 225 00:19:23,319 --> 00:19:28,990 A site-to-site VPN is a VPN between two devices\n 226 00:19:31,109 --> 00:19:36,179 In the diagram below office A and office B\n 227 00:19:36,180 --> 00:19:41,460 will use a site-to-site VPN between them so\n 228 00:19:43,910 --> 00:19:49,650 In a site-to-site VPN, a VPN tunnel is created\n 229 00:19:49,650 --> 00:19:55,060 original IP packet with a VPN header and a\nnew IP header. 230 00:19:55,059 --> 00:20:01,069 When using IPsec, the original packet is encrypted\n 231 00:20:01,069 --> 00:20:03,490 This is what makes IPsec secure. 232 00:20:03,490 --> 00:20:09,230 So, the router will take the original packet,\n 233 00:20:09,230 --> 00:20:15,069 an IPsec VPN header and a new IP header, and\n 234 00:20:15,069 --> 00:20:18,019 Let me demonstrate that process in the diagram. 235 00:20:18,019 --> 00:20:21,789 We have configured an IPsec tunnel between\nthese two routers. 236 00:20:21,789 --> 00:20:27,430 The PC at office A wants to send traffic to\n 237 00:20:27,430 --> 00:20:31,259 unencrypted data to its default gateway, the\nrouter. 238 00:20:31,259 --> 00:20:36,769 The router encrypts the data, and adds a VPN\n 239 00:20:36,769 --> 00:20:40,910 Then the encrypted data in the new packet\n 240 00:20:42,599 --> 00:20:47,250 The receiving router decrypts the data, and\n 241 00:20:47,250 --> 00:20:51,779 That’s a very basic overview of how IPsec\nVPNs work. 242 00:20:54,730 --> 00:20:59,740 When the router receives a packet that is\n 243 00:20:59,740 --> 00:21:06,609 packet and a session key, also called an encryption\n 244 00:21:06,609 --> 00:21:11,699 Then the sending device, the router, encapsulates\n 245 00:21:13,250 --> 00:21:17,710 The new packet is then sent to the device\n 246 00:21:19,210 --> 00:21:23,720 This device then decrypts the data to get\n 247 00:21:25,630 --> 00:21:30,040 Of course, this is an oversimplification of\n 248 00:21:31,490 --> 00:21:37,920 Now, note that in a site-to-site VPN a tunnel\n 249 00:21:37,920 --> 00:21:41,480 for example the two routers connected to the\nInternet. 250 00:21:41,480 --> 00:21:46,269 All other devices in each site don’t need\n 251 00:21:46,269 --> 00:21:50,650 They can send unencrypted data to their site’s\n 252 00:21:50,650 --> 00:21:53,600 it in the tunnel as described above. 253 00:21:53,599 --> 00:21:59,569 The next type of VPN we will look at, remote\n 254 00:21:59,569 --> 00:22:04,000 Before looking at remote-access VPNs, I want\n 255 00:22:05,170 --> 00:22:11,269 First, IPsec doesn’t support broadcast and\n 256 00:22:11,269 --> 00:22:15,589 This means that routing protocols such as\n 257 00:22:15,589 --> 00:22:18,919 routing protocols rely on multicast traffic. 258 00:22:18,920 --> 00:22:23,560 We can solve this with GRE over IPsec, which\nwe’ll look at next. 259 00:22:23,559 --> 00:22:27,599 Another potential problem for large networks\n 260 00:22:27,599 --> 00:22:30,899 between many sites is a labor-intensive task. 261 00:22:30,900 --> 00:22:35,610 It takes a lot of time and careful planning\n 262 00:22:35,609 --> 00:22:38,209 This problem can be solved with Cisco’s\nDMVPN. 263 00:22:38,210 --> 00:22:41,680 Let’s briefly look at each of the above\nsolutions. 264 00:22:45,480 --> 00:22:51,681 GRE, which stands for Generic Routing Encapsulation,\n 265 00:22:51,681 --> 00:22:55,600 encrypt the original packet, so it is not\nsecure. 266 00:22:55,599 --> 00:23:00,750 However it has the advantage of being able\n 267 00:23:00,750 --> 00:23:03,630 as well as broadcast and multicast messages. 268 00:23:03,630 --> 00:23:11,870 So, to get the flexibility of GRE with the\n 269 00:23:11,869 --> 00:23:17,139 The original packet will be encapsulated by\n 270 00:23:17,140 --> 00:23:23,050 the GRE packet will be encrypted and encapsulated\n 271 00:23:23,049 --> 00:23:25,859 So, here’s the original IP packet. 272 00:23:25,859 --> 00:23:30,149 A GRE header and new IP header are added to\nit. 273 00:23:30,150 --> 00:23:35,420 Then this new packet is encrypted, and an\n 274 00:23:35,420 --> 00:23:37,580 We have combined GRE with IPsec. 275 00:23:37,579 --> 00:23:41,409 That’s all I’ll say about GRE over IPsec\nfor now. 276 00:23:41,410 --> 00:23:43,910 You don’t need to know more than this for\nthe CCNA. 277 00:23:43,910 --> 00:23:50,500 Now, regarding the problem of configuring\n 278 00:23:50,500 --> 00:23:56,929 DMVPN, which stands for Dynamic Multipoint\n 279 00:23:56,929 --> 00:24:01,650 routers to dynamically create a full mesh\n 280 00:24:01,650 --> 00:24:04,059 configure every single tunnel. 281 00:24:04,058 --> 00:24:08,799 This is a major oversimplification, but let\n 282 00:24:08,799 --> 00:24:12,960 First, you configure IPsec tunnels to a hub\nsite. 283 00:24:12,960 --> 00:24:17,470 Notice that the router at the top is the hub,\n 284 00:24:17,470 --> 00:24:20,880 to that hub router, but not to the other spoke\nrouters. 285 00:24:22,599 --> 00:24:27,730 Then, the hub router gives each router information\n 286 00:24:28,859 --> 00:24:34,169 So, we only configured hub-and-spoke tunnels,\n 287 00:24:34,170 --> 00:24:36,650 of IPsec tunnels on their own. 288 00:24:36,650 --> 00:24:42,540 To summarize, DMVPN provides the configuration\n 289 00:24:42,539 --> 00:24:48,428 router only needs one tunnel to be configured,\n 290 00:24:48,429 --> 00:24:53,820 because spoke routers can communicate directly\n 291 00:24:53,819 --> 00:24:58,230 Some companies might want all traffic to flow\n 292 00:24:58,230 --> 00:25:02,950 can control the traffic, but other companies\n 293 00:25:02,950 --> 00:25:05,980 communication that a full mesh provides. 294 00:25:05,980 --> 00:25:12,808 Now let’s move on to the other major type\n 295 00:25:12,808 --> 00:25:16,829 Whereas site-to-site VPNs are used to make\n 296 00:25:16,829 --> 00:25:23,109 over the Internet, remote VPNs are used to\n 297 00:25:23,109 --> 00:25:27,449 to access the company’s internal resources\n 298 00:25:27,450 --> 00:25:33,720 Remote-access VPNs typically use TLS, transport\n 299 00:25:33,720 --> 00:25:36,950 VPNs which typically use IPsec. 300 00:25:36,950 --> 00:25:40,529 TLS is also what provides security for HTTPS,\nHTTP secure. 301 00:25:40,529 --> 00:25:47,690 It was formerly known as SSL, Secure Sockets\n 302 00:25:47,690 --> 00:25:51,480 renamed to TLS when it was standardized by\nthe IETF. 303 00:25:51,480 --> 00:25:59,240 VPN client software, for example Cisco AnyConnect,\n 304 00:25:59,240 --> 00:26:03,150 laptops that employees use to work from home. 305 00:26:03,150 --> 00:26:07,370 If you work for a company from home, your\n 306 00:26:09,859 --> 00:26:14,229 These end devices then form secure tunnels\n 307 00:26:16,990 --> 00:26:21,720 This allows the end users to securely access\n 308 00:26:21,720 --> 00:26:25,250 without being directly connected to the company\nnetwork. 309 00:26:25,250 --> 00:26:28,789 Here’s a diagram to help you visualize it. 310 00:26:28,789 --> 00:26:33,389 The end devices on the left want to access\n 311 00:26:35,470 --> 00:26:39,799 They all have Cisco AnyConnect installed,\n 312 00:26:41,099 --> 00:26:46,819 So, the devices each form a TLS VPN tunnel\n 313 00:26:46,819 --> 00:26:51,859 securely communicate with the company’s\n 314 00:26:51,859 --> 00:26:58,230 Note that, just like IPsec, TLS involves encrypting\n 315 00:26:58,230 --> 00:27:00,990 for the sake of time we’ll skip over those\ndetails. 316 00:27:00,990 --> 00:27:07,470 So, finally let’s briefly compare site-to-site\n 317 00:27:07,470 --> 00:27:13,769 Site-to-site VPNs typically use IPsec, and\n 318 00:27:13,769 --> 00:27:18,109 Both of them are protocols that you don’t\n 319 00:27:18,109 --> 00:27:24,019 but you should definitely know their names\n 320 00:27:24,019 --> 00:27:28,619 Site-to-site VPNs provide service to many\n 321 00:27:28,619 --> 00:27:33,759 One IPsec tunnel between two routers or firewalls\n 322 00:27:33,759 --> 00:27:36,000 the sites they are connecting. 323 00:27:36,000 --> 00:27:41,160 On the other hand, remote-access VPNs provide\n 324 00:27:43,349 --> 00:27:49,089 Instead of connecting two sites together,\n 325 00:27:49,089 --> 00:27:54,699 Site-to-site VPNs are typically used to permanently\n 326 00:27:54,700 --> 00:27:59,850 And remote-access VPNs are typically used\n 327 00:27:59,849 --> 00:28:04,259 that want to securely access company resources\n 328 00:28:06,130 --> 00:28:11,059 These two types of VPNs are specifically mentioned\n 329 00:28:11,058 --> 00:28:13,250 know the differences between them. 330 00:28:13,250 --> 00:28:18,640 Okay, before moving on to the quiz let’s\nreview what we covered. 331 00:28:18,640 --> 00:28:23,340 This video was just a shallow look at various\n 332 00:28:23,339 --> 00:28:27,959 Each topic in this video is very important\n 333 00:28:27,960 --> 00:28:32,319 you’re just starting your journey you don’t\n 334 00:28:32,319 --> 00:28:35,609 and the CCNA exam doesn’t expect you to\nknow them all. 335 00:28:38,480 --> 00:28:44,740 Wide Area Networks are used to connect geographically\n 336 00:28:44,740 --> 00:28:50,029 For example, to connect two offices together\n 337 00:28:50,029 --> 00:28:53,369 Then, we looked at leased lines. 338 00:28:53,369 --> 00:28:57,599 Leased lines are dedicated physical connections\n 339 00:28:59,559 --> 00:29:03,559 For many reasons they are being replaced by\n 340 00:29:08,130 --> 00:29:14,690 MPLS allows enterprises to form WANs over\n 341 00:29:14,690 --> 00:29:19,100 Although the traffic of many different customers\n 342 00:29:19,099 --> 00:29:25,579 the label-switching aspect of MPLS allows\n 343 00:29:25,579 --> 00:29:30,500 If you want to really learn how MPLS works,\n 344 00:29:32,500 --> 00:29:38,940 Then we looked at a few ways to connect to\n 345 00:29:38,940 --> 00:29:45,880 And finally Internet VPNs, specifically site-to-site\n 346 00:29:47,609 --> 00:29:51,889 These provide secure connectivity over the\n 347 00:29:54,460 --> 00:29:58,960 Make sure to watch until the end of the quiz\n 348 00:29:58,960 --> 00:30:02,930 ExSim for CCNA, the best practice exams for\nthe CCNA. 349 00:30:02,930 --> 00:30:08,170 Okay, let’s go to quiz question 1. 350 00:30:08,170 --> 00:30:14,029 Which of the following leased line standards\n 351 00:30:14,029 --> 00:30:20,609 Pause the video now to select the correct\nanswer. 352 00:30:22,539 --> 00:30:24,839 Here’s that wikipedia chart again. 353 00:30:24,839 --> 00:30:29,209 I doubt that you’ll have to memorize all\n 354 00:30:29,210 --> 00:30:30,860 hurt to be familiar with them. 355 00:30:30,859 --> 00:30:33,639 Okay, let’s go to quiz question 2. 356 00:30:33,640 --> 00:30:39,800 Jeremy’s IT Lab Professional IT Training\n 357 00:30:41,759 --> 00:30:44,720 Which of the following routers does NOT run\nMPLS? 358 00:30:44,720 --> 00:30:50,710 Pause the video to select the correct answer. 359 00:30:53,269 --> 00:31:00,609 In MPLS, PE, provider edge, and P, provider\n 360 00:31:02,940 --> 00:31:07,890 However, there is no need for the CE, customer\n 361 00:31:13,210 --> 00:31:18,720 Which of the following MPLS VPN types allows\n 362 00:31:20,130 --> 00:31:24,490 Pause the video to select the best answer. 363 00:31:24,490 --> 00:31:31,190 Okay, the answer is A, Layer 2 MPLS VPN. 364 00:31:31,190 --> 00:31:35,940 Although MPLS is sometimes called a Layer\n 365 00:31:35,940 --> 00:31:42,820 between the Layer 2 and Layer 3 headers, there\n 366 00:31:42,819 --> 00:31:49,048 And in Layer 3 MPLS VPNs, the OSPF peerings\n 367 00:31:51,150 --> 00:31:57,350 In a Layer 2 MPLS VPN, the entire service\n 368 00:31:57,349 --> 00:32:02,109 and it is as if the service provider network\n 369 00:32:07,690 --> 00:32:12,558 Which of the following Internet access technologies\n 370 00:32:13,558 --> 00:32:17,480 Pause the video to select the best answer. 371 00:32:22,679 --> 00:32:27,250 Digital Subscriber Line provides connectivity\n 372 00:32:27,250 --> 00:32:32,339 over phone lines, which are typically already\n 373 00:32:32,339 --> 00:32:37,209 As a bonus, it allows users to access the\n 374 00:32:37,210 --> 00:32:41,779 which was not allowed in previous technologies\n 375 00:32:45,740 --> 00:32:49,950 Which of the following protocols can be used\n 376 00:32:49,950 --> 00:32:54,539 flexibility by allowing multicast traffic\n 377 00:32:54,539 --> 00:32:58,849 Pause the video now to select the best answer. 378 00:33:03,750 --> 00:33:09,099 Generic Routing Encapsulation is more flexible\n 379 00:33:09,099 --> 00:33:12,719 well as broadcast packets to be encapsulated\n 380 00:33:12,720 --> 00:33:17,929 However, GRE isn’t secure because it doesn’t\n 381 00:33:17,929 --> 00:33:23,900 So, the GRE packet can be encrypted and then\n 382 00:33:26,009 --> 00:33:28,089 Okay, that’s all for the quiz. 383 00:33:28,089 --> 00:33:47,418 Now let’s take a look at a bonus question\n 31593

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.