All language subtitles for Free-CCNA-Wireless-Architectures-Day-56-CCNA-200-301-Complete-Course_en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:02,399 --> 00:00:07,359 Welcome to Jeremy’s IT Lab. This is\xa0\n 2 00:00:08,320 --> 00:00:11,679 If you like these videos, please\xa0\n 3 00:00:12,400 --> 00:00:16,320 Also, please like and leave a comment, and\xa0\n 4 00:00:16,320 --> 00:00:22,399 series of videos. Thanks for your help. In this\xa0\n 5 00:00:23,280 --> 00:00:28,000 In the previous video we looked at various\xa0\n 6 00:00:28,000 --> 00:00:32,799 but in this video we’ll look at some more\xa0\n 7 00:00:33,759 --> 00:00:38,000 By architectures, I mean how the wireless\xa0\n 8 00:00:38,000 --> 00:00:44,240 network as a whole, including the wired network\xa0\n 9 00:00:44,799 --> 00:00:50,719 access points, 1.1.e, controllers,\xa0\n 10 00:00:52,240 --> 00:00:57,760 Here’s what we’ll cover. Before covering wireless\xa0\n 11 00:00:57,759 --> 00:01:05,920 messages and the 802.11 frame format. 802.11\xa0\n 12 00:01:05,920 --> 00:01:11,040 wired Ethernet LANs, so there are some\xa0\n 13 00:01:11,040 --> 00:01:17,680 is different as well. Then we’ll cover different\xa0\n 14 00:01:17,680 --> 00:01:23,200 lightweight, and cloud-based. Finally we’ll look\xa0\n 15 00:01:24,079 --> 00:01:29,599 We didn’t cover WLCs in the previous video.\xa0\n 16 00:01:29,599 --> 00:01:34,239 access points, and are essential in large\xa0\n 17 00:01:34,239 --> 00:01:39,599 thousands of wireless access points. Make\xa0\n 18 00:01:39,599 --> 00:01:45,039 for a bonus question from Boson Software’s\xa0\n 19 00:01:46,799 --> 00:01:53,200 So let’s look at the 802.11 frame format first.\xa0\n 20 00:01:53,200 --> 00:01:59,200 802.3 Ethernet frame. 802.11 frames are\xa0\n 21 00:01:59,760 --> 00:02:05,920 but for the CCNA you don’t have to learn it in as\xa0\n 22 00:02:05,920 --> 00:02:12,319 I’ll just provide a high-level overview. First\xa0\n 23 00:02:12,319 --> 00:02:18,799 header than an Ethernet header, but depending on\xa0\n 24 00:02:18,800 --> 00:02:24,800 the fields might not be present in the frame. For\xa0\n 25 00:02:24,800 --> 00:02:31,920 but not all messages use all 4 address fields.\xa0\n 26 00:02:31,919 --> 00:02:38,559 frame control. It’s 2 bytes, 16 bits, in\xa0\n 27 00:02:38,560 --> 00:02:44,159 message type and subtype. I’ll talk about\xa0\n 28 00:02:45,439 --> 00:02:52,240 Next is the Duration/ID field. As the name\xa0\n 29 00:02:53,280 --> 00:02:58,719 Depending on the message type it can indicate\xa0\n 30 00:02:58,719 --> 00:03:04,879 dedicated for transmission of the frame. Or\xa0\n 31 00:03:04,879 --> 00:03:09,359 the connection, between the wireless\xa0\n 32 00:03:09,360 --> 00:03:14,560 field is similar to the Ethernet type/length\xa0\n 33 00:03:16,960 --> 00:03:22,640 Next up the addresses. Up to four addresses\xa0\n 34 00:03:23,520 --> 00:03:27,280 Which addresses are present, and their\xa0\n 35 00:03:28,319 --> 00:03:32,239 The four addresses that can be\xa0\n 36 00:03:32,240 --> 00:03:39,600 DA. This is the final recipient of the frame. The\xa0\n 37 00:03:40,639 --> 00:03:46,719 The receiver address, RA. This is the immediate\xa0\n 38 00:03:46,719 --> 00:03:53,280 final destination. And the transmitter address,\xa0\n 39 00:03:53,280 --> 00:03:57,199 but not necessarily the original sender,\xa0\n 40 00:03:58,479 --> 00:04:02,879 Having four addresses like this isn’t\xa0\n 41 00:04:02,879 --> 00:04:09,199 but 802.11 wireless networks have unique\xa0\n 42 00:04:09,199 --> 00:04:16,000 control. It’s used to reassemble fragments and\xa0\n 43 00:04:16,000 --> 00:04:20,720 control, which as you probably guessed is\xa0\n 44 00:04:21,920 --> 00:04:30,240 After that is a field called HT, high throughput,\xa0\n 45 00:04:30,240 --> 00:04:36,720 throughout operations. I didn’t mention\xa0\n 46 00:04:36,720 --> 00:04:45,440 Wi-Fi 4, is also known as high throughput\xa0\n 47 00:04:45,439 --> 00:04:53,199 is also known as Very High Throughput, VHT, Wi-Fi.\xa0\n 48 00:04:53,199 --> 00:04:59,199 and after it is the frame body, which is the\xa0\n 49 00:05:00,399 --> 00:05:04,560 And finally there is the FCS, frame\xa0\n 50 00:05:05,439 --> 00:05:11,120 Just like in an Ethernet frame, this is used to\xa0\n 51 00:05:11,120 --> 00:05:17,360 for 802.11 frames. Remember, not all of these\xa0\n 52 00:05:18,240 --> 00:05:24,720 It all depends on the version of 802.11 being used\xa0\n 53 00:05:24,720 --> 00:05:29,920 and their operations can be much more complicated\xa0\n 54 00:05:29,920 --> 00:05:34,400 in wireless networks you should definitely learn\xa0\n 55 00:05:36,160 --> 00:05:42,720 Next, before 802.11 message types, I want\xa0\n 56 00:05:42,720 --> 00:05:45,040 which I only briefly mentioned in the last video.\xa0\xa0 57 00:05:46,399 --> 00:05:51,199 Access points are used to bridge traffic\xa0\n 58 00:05:51,199 --> 00:05:57,039 for example hosts connected to the wired network.\xa0\n 59 00:05:57,600 --> 00:06:03,200 it must be associated with the AP, and there is a\xa0\n 60 00:06:04,319 --> 00:06:09,839 There are three connection states. First, when\xa0\n 61 00:06:09,839 --> 00:06:15,759 with the AP. Second, when the station is\xa0\n 62 00:06:16,800 --> 00:06:22,560 And finally, when the station is authenticated\xa0\n 63 00:06:22,560 --> 00:06:28,319 be authenticated and associated with the AP to\xa0\n 64 00:06:28,319 --> 00:06:34,879 simple version of that process. First, the station\xa0\n 65 00:06:34,879 --> 00:06:40,959 APs and BSSs are available, and the AP sends\xa0\n 66 00:06:42,079 --> 00:06:47,680 Note that there are actually two ways for a\xa0\n 67 00:06:47,680 --> 00:06:52,879 scanning, where the station sends probe requests\xa0\n 68 00:06:53,839 --> 00:06:59,119 That’s what I show in the diagram on the left.\xa0\n 69 00:06:59,120 --> 00:07:05,680 station listens for beacon messages from an AP.\xa0\n 70 00:07:05,680 --> 00:07:12,959 the BSS. Okay, so using either active or passive\xa0\n 71 00:07:12,959 --> 00:07:19,519 BSS. However it’s still in that first connection\xa0\n 72 00:07:20,560 --> 00:07:26,000 Then there is an authentication exchange, for\xa0\n 73 00:07:26,000 --> 00:07:31,600 and the AP authenticates it. If this is\xa0\n 74 00:07:31,600 --> 00:07:37,680 authenticated but not yet associated. Finally,\xa0\n 75 00:07:38,319 --> 00:07:42,159 and if this is successful we have\xa0\n 76 00:07:42,160 --> 00:07:47,520 authenticated and associated. Finally the\xa0\n 77 00:07:48,720 --> 00:07:54,560 Now, all of these messages, probe,\xa0\n 78 00:07:54,560 --> 00:07:59,759 are the same type of 802.11 message.\xa0\n 79 00:08:01,360 --> 00:08:06,800 There are three 802.11 message types.\xa0\n 80 00:08:06,800 --> 00:08:12,480 are used to manage the BSS. For example, the\xa0\n 81 00:08:13,040 --> 00:08:17,360 beacon, probe, authentication, and\xa0\n 82 00:08:18,160 --> 00:08:23,280 There are more management messages than these,\xa0\n 83 00:08:23,279 --> 00:08:29,599 is control. These frames are used to control\xa0\n 84 00:08:29,600 --> 00:08:36,080 assist with the delivery of management and data\xa0\n 85 00:08:36,080 --> 00:08:40,800 send messages, which I very briefly mentioned\xa0\n 86 00:08:41,759 --> 00:08:46,960 Also, ACK messages, used to acknowledge that\xa0\n 87 00:08:47,919 --> 00:08:53,839 The third type of message is data. These are\xa0\n 88 00:08:54,720 --> 00:08:57,600 Okay, here’s a brief overview of\xa0\n 89 00:08:58,320 --> 00:09:03,520 I can’t say exactly which information you’ll be\xa0\n 90 00:09:03,519 --> 00:09:08,559 good idea to have a basic understanding of these\xa0\n 91 00:09:10,159 --> 00:09:15,279 First up we are going to talk about different ways\xa0\n 92 00:09:16,240 --> 00:09:22,399 There are three main wireless AP deployment\xa0\n 93 00:09:23,120 --> 00:09:29,519 I’ll introduce autonomous APs first. Autonomous\xa0\n 94 00:09:29,519 --> 00:09:36,559 on a WLC, wireless LAN controller. Hence the\xa0\n 95 00:09:36,559 --> 00:09:42,000 that means they are configured individually.\xa0\n 96 00:09:42,000 --> 00:09:51,360 remotely via telnet or SSH, or also an HTTP or\xa0\n 97 00:09:51,360 --> 00:09:57,039 small networks this is fine, but configuring\xa0\n 98 00:09:57,039 --> 00:10:03,599 becomes unrealistic. Note that an IP address for\xa0\n 99 00:10:03,600 --> 00:10:10,800 so you can connect via telnet, SSH, or HTTP to\xa0\n 100 00:10:10,799 --> 00:10:15,759 as how much power it should use to transmit and\xa0\n 101 00:10:15,759 --> 00:10:23,039 manually per AP. Security policies, for example\xa0\n 102 00:10:24,399 --> 00:10:30,240 Other settings such as QoS are also configured\xa0\n 103 00:10:30,240 --> 00:10:36,000 management of the APs. So, as I said before,\xa0\n 104 00:10:37,840 --> 00:10:43,759 Here’s an example network with autonomous\xa0\n 105 00:10:43,759 --> 00:10:49,600 should connect to the wired network with a\xa0\n 106 00:10:49,600 --> 00:10:54,879 so it might be obvious that a trunk connection\xa0\n 107 00:10:55,519 --> 00:11:01,360 but even if the AP provides only one SSID,\xa0\n 108 00:11:02,159 --> 00:11:06,559 It’s because the management traffic used\xa0\n 109 00:11:06,559 --> 00:11:10,319 as well as the other devices, the\xa0\n 110 00:11:11,200 --> 00:11:15,840 I might not have mentioned this earlier in the\xa0\n 111 00:11:15,840 --> 00:11:20,800 traffic separate from regular data traffic\xa0\n 112 00:11:22,080 --> 00:11:26,160 So, there are trunk links between each of\xa0\n 113 00:11:26,159 --> 00:11:33,199 for the wireless clients, as well as VLAN99 for\xa0\n 114 00:11:33,840 --> 00:11:38,800 data traffic from wireless clients has a very\xa0\n 115 00:11:38,799 --> 00:11:44,799 wireless clients associated with the same AP.\xa0\n 116 00:11:44,799 --> 00:11:49,039 you’ll understand it when you see the path that\xa0\n 117 00:11:50,399 --> 00:11:57,600 So, with an autonomous AP traffic between these\xa0\n 118 00:11:57,600 --> 00:12:03,440 and then to the other AP and PC. Or between\xa0\n 119 00:12:03,440 --> 00:12:08,320 there’s no need for the traffic to even go\xa0\n 120 00:12:08,320 --> 00:12:12,240 this is different compared to the traffic\xa0\n 121 00:12:13,440 --> 00:12:19,280 Notice that each VLAN has to stretch across the\xa0\n 122 00:12:19,279 --> 00:12:25,519 bad practice. Why is that? Why is it bad to have\xa0\n 123 00:12:26,240 --> 00:12:32,879 Well, there are many reasons, but here are a\xa0\n 124 00:12:32,879 --> 00:12:37,439 is a broadcast domain, and if the VLANs are\xa0\n 125 00:12:37,440 --> 00:12:40,320 each broadcast message will be\xa0\n 126 00:12:41,360 --> 00:12:44,159 The second reason is that\xa0\n 127 00:12:45,120 --> 00:12:49,919 A big focus of modern network design is\xa0\n 128 00:12:49,919 --> 00:12:56,079 because disabling links means a reduction in total\xa0\n 129 00:12:56,080 --> 00:13:02,720 labor-intensive if it has to be done over dozens\xa0\n 130 00:13:02,720 --> 00:13:08,240 autonomous APs can be used in small networks, but\xa0\n 131 00:13:09,200 --> 00:13:13,520 A large network can have thousands of APs,\xa0\n 132 00:13:13,519 --> 00:13:20,000 APs one-by-one is not realistic. Finally,\xa0\n 133 00:13:20,000 --> 00:13:25,279 in the modes covered in the previous video,\xa0\n 134 00:13:27,039 --> 00:13:33,279 Now let’s talk about the next major deployment\xa0\n 135 00:13:33,279 --> 00:13:40,720 of an AP can be split between the AP and a\xa0\n 136 00:13:40,720 --> 00:13:44,720 handle real-time operations like transmitting\xa0\n 137 00:13:45,360 --> 00:13:49,759 encryption and decryption of traffic,\xa0\n 138 00:13:50,799 --> 00:13:56,719 However, other functions are carried out by\xa0\n 139 00:13:56,720 --> 00:14:02,000 and QoS management, client authentication,\xa0\n 140 00:14:02,000 --> 00:14:07,840 etc. The WLC centrally controls all of\xa0\n 141 00:14:08,879 --> 00:14:13,439 This is called split-MAC architecture,\xa0\n 142 00:14:13,440 --> 00:14:19,920 because the functions are split between the\xa0\n 143 00:14:19,919 --> 00:14:26,479 also used to centrally configure the lightweight\xa0\n 144 00:14:26,480 --> 00:14:30,800 and manually configure them one-by-one,\xa0\n 145 00:14:32,480 --> 00:14:38,399 Note that the WLC can be located in the same\xa0\n 146 00:14:38,399 --> 00:14:45,600 or in a different subnet and VLAN. I’ll talk about\xa0\n 147 00:14:45,600 --> 00:14:50,720 and lightweight APs authenticate each other using\xa0\n 148 00:14:51,679 --> 00:14:54,319 These certificates follow the X.509 standard,\xa0\xa0 149 00:14:54,960 --> 00:15:00,560 which is the same that websites use to prove their\xa0\n 150 00:15:00,559 --> 00:15:06,159 only authorized APs can join the network, so an\xa0\n 151 00:15:07,600 --> 00:15:13,200 Here’s an example network, with a wireless\xa0\n 152 00:15:13,200 --> 00:15:18,720 lightweight APs use a protocol called CAPWAP,\xa0\n 153 00:15:18,720 --> 00:15:25,600 points, to communicate. CAPWAP is based on\xa0\n 154 00:15:25,600 --> 00:15:32,639 access point protocol. For communications, two\xa0\n 155 00:15:32,639 --> 00:15:36,399 like this. Note that each of\xa0\n 156 00:15:36,399 --> 00:15:39,840 represents two separate tunnels,\xa0\n 157 00:15:40,799 --> 00:15:47,519 So, let’s see what those two tunnels are. One is\xa0\n 158 00:15:48,480 --> 00:15:54,320 There’s another port number for you to remember,\xa0\n 159 00:15:55,279 --> 00:15:59,839 So, this tunnel is used to configure the\xa0\n 160 00:16:00,879 --> 00:16:04,559 Note that all traffic in this tunnel is\xa0\n 161 00:16:05,759 --> 00:16:12,559 The second tunnel is the data tunnel, using UDP\xa0\n 162 00:16:12,559 --> 00:16:18,639 sent through this tunnel to the WLC. It does not\xa0\n 163 00:16:18,639 --> 00:16:24,399 to another client associated with the same AP.\xa0\n 164 00:16:25,679 --> 00:16:30,799 Now, of course in reality the traffic does pass\xa0\n 165 00:16:31,679 --> 00:16:37,039 However it is encapsulated with new headers to\xa0\n 166 00:16:37,039 --> 00:16:43,279 IPsec tunnels in the WAN video. Note that traffic\xa0\n 167 00:16:43,279 --> 00:16:49,199 but you can configure it to be encrypted using\xa0\n 168 00:16:49,200 --> 00:16:55,200 layer security. I mentioned TLS, transport\xa0\n 169 00:16:56,240 --> 00:17:02,240 DTLS is basically the same thing, but it\xa0\n 170 00:17:03,600 --> 00:17:06,960 Now, here’s another difference between\xa0\n 171 00:17:07,920 --> 00:17:12,400 Because all traffic from wireless clients\xa0\n 172 00:17:13,279 --> 00:17:18,639 APs connect to switch access ports, not\xa0\n 173 00:17:18,640 --> 00:17:22,240 if you want, but there’s no need for\xa0\n 174 00:17:22,960 --> 00:17:27,519 To make that clear, let me demonstrate the\xa0\n 175 00:17:29,440 --> 00:17:34,880 Okay, I’ve simplified the diagrams. On the\xa0\n 176 00:17:34,880 --> 00:17:41,760 a lightweight AP and a WLC. On the right we have\xa0\n 177 00:17:41,759 --> 00:17:48,160 local-MAC architecture. As you know, when using\xa0\n 178 00:17:48,160 --> 00:17:54,560 with a trunk link. There should be a VLAN for\xa0\n 179 00:17:54,559 --> 00:18:00,799 network device management. If a wireless client\xa0\n 180 00:18:00,799 --> 00:18:05,440 it sends the frame to its wireless access point,\xa0\n 181 00:18:05,440 --> 00:18:10,880 the wired network, which will then forward it\xa0\n 182 00:18:10,880 --> 00:18:16,240 wants to send traffic to another device associated\xa0\n 183 00:18:16,240 --> 00:18:21,279 the wired network. The frame is sent to the AP\xa0\n 184 00:18:22,160 --> 00:18:27,759 When using a split-MAC architecture, this is all\xa0\n 185 00:18:27,759 --> 00:18:33,200 have to connect to the switch with a trunk, an\xa0\n 186 00:18:33,200 --> 00:18:40,160 needed to connect the WLC to the wired network. In\xa0\n 187 00:18:40,160 --> 00:18:46,160 a VLAN and forming the border between the wired\xa0\n 188 00:18:47,359 --> 00:18:54,479 Traffic from a wireless client is sent to the\xa0\n 189 00:18:54,480 --> 00:18:58,799 sends it over the wired network to the default\xa0\n 190 00:19:00,000 --> 00:19:05,440 Even if the traffic is destined for a host\xa0\n 191 00:19:05,440 --> 00:19:11,840 to the WLC, and then tunneled back and sent to\xa0\n 192 00:19:11,839 --> 00:19:16,879 demonstrate the differences between the traffic\xa0\n 193 00:19:18,400 --> 00:19:24,640 There are some key benefits to using a split-MAC\xa0\n 194 00:19:24,640 --> 00:19:28,720 don’t have to memorize it, but you should\xa0\n 195 00:19:29,599 --> 00:19:37,199 First, scalability. With a WLC, or even multiple\xa0\n 196 00:19:37,200 --> 00:19:43,120 and support a network with thousands of APs. That\xa0\n 197 00:19:44,400 --> 00:19:50,640 WLCs also provide dynamic channel assignment.\xa0\n 198 00:19:50,640 --> 00:19:55,040 each AP should use, so you don’t have to\xa0\n 199 00:19:56,160 --> 00:20:02,480 The WLC can also automatically set the appropriate\xa0\n 200 00:20:02,480 --> 00:20:09,440 coverage without interfering with other APs.\xa0\n 201 00:20:09,440 --> 00:20:17,440 coverage. So, when an AP stops functioning, the\xa0\n 202 00:20:17,440 --> 00:20:24,960 to avoid coverage holes. Seamless roaming is also\xa0\n 203 00:20:24,960 --> 00:20:32,960 noticeable delay. Another benefit is client load\xa0\n 204 00:20:32,960 --> 00:20:39,840 the WLC can associate the client with the\xa0\n 205 00:20:39,839 --> 00:20:46,720 the last benefit I’ll mention is security and QoS\xa0\n 206 00:20:46,720 --> 00:20:53,279 policies ensures consistency across the network.\xa0\n 207 00:20:53,279 --> 00:20:57,599 but definitely be aware that the split-MAC\xa0\n 208 00:20:59,599 --> 00:21:05,439 Now, just as autonomous APs can function as\xa0\n 209 00:21:05,440 --> 00:21:12,559 APs have different modes as well. First is local\xa0\n 210 00:21:12,559 --> 00:21:19,519 a BSS, or multiple BSSs for clients to associate\xa0\n 211 00:21:19,519 --> 00:21:27,440 of an AP. Next is FlexConnect mode. In this mode\xa0\n 212 00:21:27,440 --> 00:21:34,400 associate with, but it adds extra functionality.\xa0\n 213 00:21:34,400 --> 00:21:39,920 forward traffic between the wired and wireless\xa0\n 214 00:21:41,680 --> 00:21:45,759 So, here on the left are some standard\xa0\n 215 00:21:46,720 --> 00:21:49,120 All traffic is tunneled to the WLC first.\xa0\xa0 216 00:21:50,240 --> 00:21:56,000 But what if connectivity to the WLC is lost,\xa0\n 217 00:21:56,000 --> 00:22:01,200 a problem if FlexConnect is enabled, because\xa0\n 218 00:22:01,200 --> 00:22:07,840 like an autonomous AP, no need to tunnel the\xa0\n 219 00:22:09,359 --> 00:22:15,039 The next mode is sniffer mode. In this mode\xa0\n 220 00:22:15,839 --> 00:22:19,919 Instead it is dedicated to capturing 802.11 frames\xa0\xa0 221 00:22:19,920 --> 00:22:25,600 and sending them to a device running software\xa0\n 222 00:22:25,599 --> 00:22:29,919 traffic and then sends those packets to\xa0\n 223 00:22:31,119 --> 00:22:37,839 The next mode is Monitor mode. Again, it doesn’t\xa0\n 224 00:22:37,839 --> 00:22:44,720 to receiving 802.11 frames to detect rogue\xa0\n 225 00:22:44,720 --> 00:22:50,799 device, an AP can send de-authentication messages\xa0\n 226 00:22:52,160 --> 00:22:58,400 The next mode, rogue detector mode, is similar\xa0\n 227 00:22:58,400 --> 00:23:04,240 AP does not even use its radio. Instead it\xa0\n 228 00:23:04,240 --> 00:23:11,599 but it receives a list of suspected rogue clients\xa0\n 229 00:23:11,599 --> 00:23:17,199 ARP messages on the wired network and correlating\xa0\n 230 00:23:17,920 --> 00:23:24,400 it can detect rogue devices. Okay, the next is\xa0\n 231 00:23:24,400 --> 00:23:32,880 clients. That is SE-connect, or spectrum expert\xa0\n 232 00:23:32,880 --> 00:23:38,880 spectrum analysis on all channels. It can send\xa0\n 233 00:23:38,880 --> 00:23:45,200 Expert on a PC to collect and analyze the data.\xa0\n 234 00:23:47,519 --> 00:23:49,839 Okay, the next mode is bridge/mesh mode.\xa0\xa0 235 00:23:50,720 --> 00:23:56,160 Like the autonomous AP’s outdoor bridge mode,\xa0\n 236 00:23:56,160 --> 00:24:02,240 between sites, even over long distances. A mesh\xa0\n 237 00:24:03,440 --> 00:24:08,559 Here’s an example similar to what we saw in the\xa0\n 238 00:24:10,079 --> 00:24:14,319 And here’s an example that looks more like\xa0\n 239 00:24:14,319 --> 00:24:20,559 potentially long distances. Now there’s\xa0\n 240 00:24:20,559 --> 00:24:26,399 which basically adds flexconnect functionality\xa0\n 241 00:24:26,400 --> 00:24:31,840 access points to locally forward traffic\xa0\n 242 00:24:33,039 --> 00:24:37,839 Here’s that complete list. This is a lot\xa0\n 243 00:24:37,839 --> 00:24:43,439 looked at each one, but that’s okay. If you\xa0\n 244 00:24:43,440 --> 00:24:48,080 Cisco has documentation about each of them\xa0\n 245 00:24:48,079 --> 00:24:53,359 but for the CCNA exam you should just be able to\xa0\n 246 00:24:54,319 --> 00:24:59,839 I don’t recommend memorizing this list,\xa0\n 247 00:25:00,880 --> 00:25:06,960 Now let’s look at the last main type of AP\xa0\n 248 00:25:06,960 --> 00:25:12,640 architecture is in between autonomous AP and\xa0\n 249 00:25:12,640 --> 00:25:19,280 functions. Basically, it involves autonomous\xa0\n 250 00:25:20,160 --> 00:25:26,000 An example is Cisco Meraki, and because the\xa0\n 251 00:25:26,000 --> 00:25:32,160 you should be aware of for the CCNA. The Meraki\xa0\n 252 00:25:32,720 --> 00:25:37,600 can be used to configure APs, monitor the\xa0\n 253 00:25:37,599 --> 00:25:44,959 etc. Just like I mentioned for WLCs, Meraki\xa0\n 254 00:25:44,960 --> 00:25:51,200 what transmit power to use, etc. However,\xa0\n 255 00:25:51,839 --> 00:25:56,319 It is sent directly to the wired\xa0\n 256 00:25:56,319 --> 00:26:01,200 So, only what we call management traffic\xa0\n 257 00:26:02,400 --> 00:26:08,960 Let’s see an example. Information such as RF\xa0\n 258 00:26:08,960 --> 00:26:14,160 is sent to servers in the Meraki cloud.\xa0\n 259 00:26:14,160 --> 00:26:19,200 PCs communicating with each other, is direct and\xa0\n 260 00:26:20,160 --> 00:26:25,440 So, I think you can see how the functionality\xa0\n 261 00:26:27,279 --> 00:26:33,680 Here’s an image from Meraki demonstrating the same\xa0\n 262 00:26:33,680 --> 00:26:39,920 the green arrow, is sent to the Meraki cloud.\xa0\n 263 00:26:39,920 --> 00:26:44,880 is sent directly to its intended destination\xa0\n 264 00:26:46,000 --> 00:26:50,880 Here’s another image from that same Meraki\xa0\n 265 00:26:51,680 --> 00:26:56,720 This is where you monitor the wireless network,\xa0\n 266 00:26:57,920 --> 00:27:03,519 I use the Cisco Meraki solution in my job and\xa0\n 267 00:27:03,519 --> 00:27:08,879 and the Meraki dashboard makes it easy to monitor\xa0\n 268 00:27:10,000 --> 00:27:14,480 Okay, that’s all for the cloud-based\xa0\n 269 00:27:14,480 --> 00:27:20,480 between autonomous AP and split-MAC architecture.\xa0\n 270 00:27:22,640 --> 00:27:28,560 The final topic for today is WLC deployment\xa0\n 271 00:27:28,559 --> 00:27:32,720 LAN controllers, this applies\xa0\n 272 00:27:32,720 --> 00:27:40,079 not autonomous AP or cloud-based AP architectures.\xa0\n 273 00:27:40,079 --> 00:27:46,319 four ways to deploy a WLC in your network. I’ll\xa0\n 274 00:27:46,319 --> 00:27:54,240 them first. First, a unified WLC deployment. The\xa0\n 275 00:27:54,240 --> 00:28:00,640 device, in a central location of the network.\xa0\n 276 00:28:01,200 --> 00:28:06,400 The WLC is a VM running on a server,\xa0\n 277 00:28:07,279 --> 00:28:11,839 Keep in mind that this is not the same as the\xa0\n 278 00:28:12,799 --> 00:28:19,039 In this case the APs are not cloud-based, they\xa0\n 279 00:28:19,039 --> 00:28:28,319 here simply refers to where the WLC is. In an\xa0\n 280 00:28:28,319 --> 00:28:33,519 in a switch in the network. And finally\xa0\n 281 00:28:34,079 --> 00:28:39,839 the WLC functionality is actually integrated\xa0\n 282 00:28:41,920 --> 00:28:47,920 So here is an example of a unified WLC, a\xa0\n 283 00:28:48,480 --> 00:28:55,039 that is deployed in a central location of the\xa0\n 284 00:28:55,039 --> 00:29:02,000 6000 APs, and if you need more than that you can\xa0\n 285 00:29:02,000 --> 00:29:08,240 suitable for a large enterprise campus. Here’s\xa0\n 286 00:29:08,960 --> 00:29:13,680 Of course the larger models are more powerful\xa0\n 287 00:29:15,119 --> 00:29:22,079 Next is the cloud-based WLC. In this case the\xa0\n 288 00:29:22,079 --> 00:29:29,279 a private cloud in a data center. This kind of\xa0\n 289 00:29:29,279 --> 00:29:35,440 and again if more are needed you can add\xa0\n 290 00:29:35,440 --> 00:29:41,200 a split-MAC architecture with a cloud-based WLC\xa0\n 291 00:29:41,200 --> 00:29:47,840 we looked at earlier. These are lightweight APs,\xa0\n 292 00:29:49,839 --> 00:29:55,119 Next, embedded WLCs. In this case\xa0\n 293 00:29:56,079 --> 00:30:01,759 This type of WLC can support up to about 200\xa0\n 294 00:30:01,759 --> 00:30:07,839 more switches with embedded WLCs. Embedded\xa0\n 295 00:30:09,440 --> 00:30:18,000 Finally, Cisco Mobility Express places the WLC\xa0\n 296 00:30:18,000 --> 00:30:25,519 internal CAPWAP tunnels to it, and the other\xa0\n 297 00:30:25,519 --> 00:30:32,079 up to about 100 APs, and you’ll have to add\xa0\n 298 00:30:32,079 --> 00:30:37,359 to support more APs. This kind of deployment\xa0\n 299 00:30:38,960 --> 00:30:42,319 Here’s that summary of the\xa0\n 300 00:30:42,319 --> 00:30:45,839 and I’ve added information about how\xa0\n 301 00:30:46,720 --> 00:30:49,839 Definitely be familiar with these\xa0\n 302 00:30:52,079 --> 00:30:56,799 Okay, here’s what we covered in this video.\xa0\n 303 00:30:56,799 --> 00:31:03,839 different kinds of 802.11 messages and the\xa0\n 304 00:31:04,400 --> 00:31:08,320 Because wireless networks have different\xa0\n 305 00:31:08,319 --> 00:31:14,639 there are quite a few differences between 802.3\xa0\n 306 00:31:15,519 --> 00:31:21,839 We then covered the three main kinds of APs,\xa0\n 307 00:31:21,839 --> 00:31:27,519 sure you know the basic characteristics of each\xa0\n 308 00:31:27,519 --> 00:31:31,839 the different wireless LAN controller deployment\xa0\n 309 00:31:32,960 --> 00:31:36,160 Make sure to watch until the end\xa0\n 310 00:31:36,160 --> 00:31:41,759 question from Boson Software’s ExSim for\xa0\n 311 00:31:44,400 --> 00:31:50,720 What kind of message is an 802.11 probe request?\xa0\n 312 00:31:55,519 --> 00:32:02,000 Okay, the answer is C, management. Here are\xa0\n 313 00:32:02,000 --> 00:32:05,920 with a few examples of each.\xa0\nOkay, let’s go to question 2. 314 00:32:08,000 --> 00:32:10,799 Which of the following AP\xa0\n 315 00:32:11,359 --> 00:32:14,479 Pause the video now to select\xa0\nthe best answer, select two. 316 00:32:18,880 --> 00:32:22,080 Okay, the answers are C, lightweight, and D,\xa0\xa0 317 00:32:22,079 --> 00:32:29,039 cloud-based. Lightweight APs are centrally managed\xa0\n 318 00:32:29,039 --> 00:32:34,960 are centrally managed by a cloud server such\xa0\n 319 00:32:37,519 --> 00:32:41,519 Which of the following AP\xa0\n 320 00:32:41,519 --> 00:32:43,839 Pause the video now to select the best answer. 321 00:32:48,480 --> 00:32:55,279 Okay, the answer is C, lightweight. Lightweight\xa0\n 322 00:32:55,279 --> 00:33:00,879 two tunnels, a control tunnel and a data\xa0\n 323 00:33:03,759 --> 00:33:07,920 Which of the following lightweight\xa0\n 324 00:33:08,640 --> 00:33:11,440 Pause the video to select\xa0\nthe best answers, select two. 325 00:33:15,599 --> 00:33:22,319 Okay, the answers are A, local and C, flexconnect.\xa0\n 326 00:33:23,200 --> 00:33:28,000 FlexConnect offers the additional ability\xa0\n 327 00:33:28,000 --> 00:33:32,880 even if the tunnels to the WLC go\xa0\n 328 00:33:36,160 --> 00:33:40,400 Which of the following WLC deployments\xa0\n 329 00:33:41,039 --> 00:33:43,359 Pause the video now to select the best answer. 330 00:33:47,759 --> 00:33:56,079 Okay, the answer is D, unified. Embedded WLCs\xa0\n 331 00:33:56,079 --> 00:34:02,399 mobility express about 100, and unified\xa0\n 332 00:34:02,960 --> 00:34:08,032 Now let’s take a look at a bonus practice\xa0\n 28434

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.