Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:02,399 --> 00:00:07,359
Welcome to Jeremy’s IT Lab. This is\xa0\n
2
00:00:08,320 --> 00:00:11,679
If you like these videos, please\xa0\n
3
00:00:12,400 --> 00:00:16,320
Also, please like and leave a comment, and\xa0\n
4
00:00:16,320 --> 00:00:22,399
series of videos. Thanks for your help. In this\xa0\n
5
00:00:23,280 --> 00:00:28,000
In the previous video we looked at various\xa0\n
6
00:00:28,000 --> 00:00:32,799
but in this video we’ll look at some more\xa0\n
7
00:00:33,759 --> 00:00:38,000
By architectures, I mean how the wireless\xa0\n
8
00:00:38,000 --> 00:00:44,240
network as a whole, including the wired network\xa0\n
9
00:00:44,799 --> 00:00:50,719
access points, 1.1.e, controllers,\xa0\n
10
00:00:52,240 --> 00:00:57,760
Here’s what we’ll cover. Before covering wireless\xa0\n
11
00:00:57,759 --> 00:01:05,920
messages and the 802.11 frame format. 802.11\xa0\n
12
00:01:05,920 --> 00:01:11,040
wired Ethernet LANs, so there are some\xa0\n
13
00:01:11,040 --> 00:01:17,680
is different as well. Then we’ll cover different\xa0\n
14
00:01:17,680 --> 00:01:23,200
lightweight, and cloud-based. Finally we’ll look\xa0\n
15
00:01:24,079 --> 00:01:29,599
We didn’t cover WLCs in the previous video.\xa0\n
16
00:01:29,599 --> 00:01:34,239
access points, and are essential in large\xa0\n
17
00:01:34,239 --> 00:01:39,599
thousands of wireless access points. Make\xa0\n
18
00:01:39,599 --> 00:01:45,039
for a bonus question from Boson Software’s\xa0\n
19
00:01:46,799 --> 00:01:53,200
So let’s look at the 802.11 frame format first.\xa0\n
20
00:01:53,200 --> 00:01:59,200
802.3 Ethernet frame. 802.11 frames are\xa0\n
21
00:01:59,760 --> 00:02:05,920
but for the CCNA you don’t have to learn it in as\xa0\n
22
00:02:05,920 --> 00:02:12,319
I’ll just provide a high-level overview. First\xa0\n
23
00:02:12,319 --> 00:02:18,799
header than an Ethernet header, but depending on\xa0\n
24
00:02:18,800 --> 00:02:24,800
the fields might not be present in the frame. For\xa0\n
25
00:02:24,800 --> 00:02:31,920
but not all messages use all 4 address fields.\xa0\n
26
00:02:31,919 --> 00:02:38,559
frame control. It’s 2 bytes, 16 bits, in\xa0\n
27
00:02:38,560 --> 00:02:44,159
message type and subtype. I’ll talk about\xa0\n
28
00:02:45,439 --> 00:02:52,240
Next is the Duration/ID field. As the name\xa0\n
29
00:02:53,280 --> 00:02:58,719
Depending on the message type it can indicate\xa0\n
30
00:02:58,719 --> 00:03:04,879
dedicated for transmission of the frame. Or\xa0\n
31
00:03:04,879 --> 00:03:09,359
the connection, between the wireless\xa0\n
32
00:03:09,360 --> 00:03:14,560
field is similar to the Ethernet type/length\xa0\n
33
00:03:16,960 --> 00:03:22,640
Next up the addresses. Up to four addresses\xa0\n
34
00:03:23,520 --> 00:03:27,280
Which addresses are present, and their\xa0\n
35
00:03:28,319 --> 00:03:32,239
The four addresses that can be\xa0\n
36
00:03:32,240 --> 00:03:39,600
DA. This is the final recipient of the frame. The\xa0\n
37
00:03:40,639 --> 00:03:46,719
The receiver address, RA. This is the immediate\xa0\n
38
00:03:46,719 --> 00:03:53,280
final destination. And the transmitter address,\xa0\n
39
00:03:53,280 --> 00:03:57,199
but not necessarily the original sender,\xa0\n
40
00:03:58,479 --> 00:04:02,879
Having four addresses like this isn’t\xa0\n
41
00:04:02,879 --> 00:04:09,199
but 802.11 wireless networks have unique\xa0\n
42
00:04:09,199 --> 00:04:16,000
control. It’s used to reassemble fragments and\xa0\n
43
00:04:16,000 --> 00:04:20,720
control, which as you probably guessed is\xa0\n
44
00:04:21,920 --> 00:04:30,240
After that is a field called HT, high throughput,\xa0\n
45
00:04:30,240 --> 00:04:36,720
throughout operations. I didn’t mention\xa0\n
46
00:04:36,720 --> 00:04:45,440
Wi-Fi 4, is also known as high throughput\xa0\n
47
00:04:45,439 --> 00:04:53,199
is also known as Very High Throughput, VHT, Wi-Fi.\xa0\n
48
00:04:53,199 --> 00:04:59,199
and after it is the frame body, which is the\xa0\n
49
00:05:00,399 --> 00:05:04,560
And finally there is the FCS, frame\xa0\n
50
00:05:05,439 --> 00:05:11,120
Just like in an Ethernet frame, this is used to\xa0\n
51
00:05:11,120 --> 00:05:17,360
for 802.11 frames. Remember, not all of these\xa0\n
52
00:05:18,240 --> 00:05:24,720
It all depends on the version of 802.11 being used\xa0\n
53
00:05:24,720 --> 00:05:29,920
and their operations can be much more complicated\xa0\n
54
00:05:29,920 --> 00:05:34,400
in wireless networks you should definitely learn\xa0\n
55
00:05:36,160 --> 00:05:42,720
Next, before 802.11 message types, I want\xa0\n
56
00:05:42,720 --> 00:05:45,040
which I only briefly mentioned in the last video.\xa0\xa0
57
00:05:46,399 --> 00:05:51,199
Access points are used to bridge traffic\xa0\n
58
00:05:51,199 --> 00:05:57,039
for example hosts connected to the wired network.\xa0\n
59
00:05:57,600 --> 00:06:03,200
it must be associated with the AP, and there is a\xa0\n
60
00:06:04,319 --> 00:06:09,839
There are three connection states. First, when\xa0\n
61
00:06:09,839 --> 00:06:15,759
with the AP. Second, when the station is\xa0\n
62
00:06:16,800 --> 00:06:22,560
And finally, when the station is authenticated\xa0\n
63
00:06:22,560 --> 00:06:28,319
be authenticated and associated with the AP to\xa0\n
64
00:06:28,319 --> 00:06:34,879
simple version of that process. First, the station\xa0\n
65
00:06:34,879 --> 00:06:40,959
APs and BSSs are available, and the AP sends\xa0\n
66
00:06:42,079 --> 00:06:47,680
Note that there are actually two ways for a\xa0\n
67
00:06:47,680 --> 00:06:52,879
scanning, where the station sends probe requests\xa0\n
68
00:06:53,839 --> 00:06:59,119
That’s what I show in the diagram on the left.\xa0\n
69
00:06:59,120 --> 00:07:05,680
station listens for beacon messages from an AP.\xa0\n
70
00:07:05,680 --> 00:07:12,959
the BSS. Okay, so using either active or passive\xa0\n
71
00:07:12,959 --> 00:07:19,519
BSS. However it’s still in that first connection\xa0\n
72
00:07:20,560 --> 00:07:26,000
Then there is an authentication exchange, for\xa0\n
73
00:07:26,000 --> 00:07:31,600
and the AP authenticates it. If this is\xa0\n
74
00:07:31,600 --> 00:07:37,680
authenticated but not yet associated. Finally,\xa0\n
75
00:07:38,319 --> 00:07:42,159
and if this is successful we have\xa0\n
76
00:07:42,160 --> 00:07:47,520
authenticated and associated. Finally the\xa0\n
77
00:07:48,720 --> 00:07:54,560
Now, all of these messages, probe,\xa0\n
78
00:07:54,560 --> 00:07:59,759
are the same type of 802.11 message.\xa0\n
79
00:08:01,360 --> 00:08:06,800
There are three 802.11 message types.\xa0\n
80
00:08:06,800 --> 00:08:12,480
are used to manage the BSS. For example, the\xa0\n
81
00:08:13,040 --> 00:08:17,360
beacon, probe, authentication, and\xa0\n
82
00:08:18,160 --> 00:08:23,280
There are more management messages than these,\xa0\n
83
00:08:23,279 --> 00:08:29,599
is control. These frames are used to control\xa0\n
84
00:08:29,600 --> 00:08:36,080
assist with the delivery of management and data\xa0\n
85
00:08:36,080 --> 00:08:40,800
send messages, which I very briefly mentioned\xa0\n
86
00:08:41,759 --> 00:08:46,960
Also, ACK messages, used to acknowledge that\xa0\n
87
00:08:47,919 --> 00:08:53,839
The third type of message is data. These are\xa0\n
88
00:08:54,720 --> 00:08:57,600
Okay, here’s a brief overview of\xa0\n
89
00:08:58,320 --> 00:09:03,520
I can’t say exactly which information you’ll be\xa0\n
90
00:09:03,519 --> 00:09:08,559
good idea to have a basic understanding of these\xa0\n
91
00:09:10,159 --> 00:09:15,279
First up we are going to talk about different ways\xa0\n
92
00:09:16,240 --> 00:09:22,399
There are three main wireless AP deployment\xa0\n
93
00:09:23,120 --> 00:09:29,519
I’ll introduce autonomous APs first. Autonomous\xa0\n
94
00:09:29,519 --> 00:09:36,559
on a WLC, wireless LAN controller. Hence the\xa0\n
95
00:09:36,559 --> 00:09:42,000
that means they are configured individually.\xa0\n
96
00:09:42,000 --> 00:09:51,360
remotely via telnet or SSH, or also an HTTP or\xa0\n
97
00:09:51,360 --> 00:09:57,039
small networks this is fine, but configuring\xa0\n
98
00:09:57,039 --> 00:10:03,599
becomes unrealistic. Note that an IP address for\xa0\n
99
00:10:03,600 --> 00:10:10,800
so you can connect via telnet, SSH, or HTTP to\xa0\n
100
00:10:10,799 --> 00:10:15,759
as how much power it should use to transmit and\xa0\n
101
00:10:15,759 --> 00:10:23,039
manually per AP. Security policies, for example\xa0\n
102
00:10:24,399 --> 00:10:30,240
Other settings such as QoS are also configured\xa0\n
103
00:10:30,240 --> 00:10:36,000
management of the APs. So, as I said before,\xa0\n
104
00:10:37,840 --> 00:10:43,759
Here’s an example network with autonomous\xa0\n
105
00:10:43,759 --> 00:10:49,600
should connect to the wired network with a\xa0\n
106
00:10:49,600 --> 00:10:54,879
so it might be obvious that a trunk connection\xa0\n
107
00:10:55,519 --> 00:11:01,360
but even if the AP provides only one SSID,\xa0\n
108
00:11:02,159 --> 00:11:06,559
It’s because the management traffic used\xa0\n
109
00:11:06,559 --> 00:11:10,319
as well as the other devices, the\xa0\n
110
00:11:11,200 --> 00:11:15,840
I might not have mentioned this earlier in the\xa0\n
111
00:11:15,840 --> 00:11:20,800
traffic separate from regular data traffic\xa0\n
112
00:11:22,080 --> 00:11:26,160
So, there are trunk links between each of\xa0\n
113
00:11:26,159 --> 00:11:33,199
for the wireless clients, as well as VLAN99 for\xa0\n
114
00:11:33,840 --> 00:11:38,800
data traffic from wireless clients has a very\xa0\n
115
00:11:38,799 --> 00:11:44,799
wireless clients associated with the same AP.\xa0\n
116
00:11:44,799 --> 00:11:49,039
you’ll understand it when you see the path that\xa0\n
117
00:11:50,399 --> 00:11:57,600
So, with an autonomous AP traffic between these\xa0\n
118
00:11:57,600 --> 00:12:03,440
and then to the other AP and PC. Or between\xa0\n
119
00:12:03,440 --> 00:12:08,320
there’s no need for the traffic to even go\xa0\n
120
00:12:08,320 --> 00:12:12,240
this is different compared to the traffic\xa0\n
121
00:12:13,440 --> 00:12:19,280
Notice that each VLAN has to stretch across the\xa0\n
122
00:12:19,279 --> 00:12:25,519
bad practice. Why is that? Why is it bad to have\xa0\n
123
00:12:26,240 --> 00:12:32,879
Well, there are many reasons, but here are a\xa0\n
124
00:12:32,879 --> 00:12:37,439
is a broadcast domain, and if the VLANs are\xa0\n
125
00:12:37,440 --> 00:12:40,320
each broadcast message will be\xa0\n
126
00:12:41,360 --> 00:12:44,159
The second reason is that\xa0\n
127
00:12:45,120 --> 00:12:49,919
A big focus of modern network design is\xa0\n
128
00:12:49,919 --> 00:12:56,079
because disabling links means a reduction in total\xa0\n
129
00:12:56,080 --> 00:13:02,720
labor-intensive if it has to be done over dozens\xa0\n
130
00:13:02,720 --> 00:13:08,240
autonomous APs can be used in small networks, but\xa0\n
131
00:13:09,200 --> 00:13:13,520
A large network can have thousands of APs,\xa0\n
132
00:13:13,519 --> 00:13:20,000
APs one-by-one is not realistic. Finally,\xa0\n
133
00:13:20,000 --> 00:13:25,279
in the modes covered in the previous video,\xa0\n
134
00:13:27,039 --> 00:13:33,279
Now let’s talk about the next major deployment\xa0\n
135
00:13:33,279 --> 00:13:40,720
of an AP can be split between the AP and a\xa0\n
136
00:13:40,720 --> 00:13:44,720
handle real-time operations like transmitting\xa0\n
137
00:13:45,360 --> 00:13:49,759
encryption and decryption of traffic,\xa0\n
138
00:13:50,799 --> 00:13:56,719
However, other functions are carried out by\xa0\n
139
00:13:56,720 --> 00:14:02,000
and QoS management, client authentication,\xa0\n
140
00:14:02,000 --> 00:14:07,840
etc. The WLC centrally controls all of\xa0\n
141
00:14:08,879 --> 00:14:13,439
This is called split-MAC architecture,\xa0\n
142
00:14:13,440 --> 00:14:19,920
because the functions are split between the\xa0\n
143
00:14:19,919 --> 00:14:26,479
also used to centrally configure the lightweight\xa0\n
144
00:14:26,480 --> 00:14:30,800
and manually configure them one-by-one,\xa0\n
145
00:14:32,480 --> 00:14:38,399
Note that the WLC can be located in the same\xa0\n
146
00:14:38,399 --> 00:14:45,600
or in a different subnet and VLAN. I’ll talk about\xa0\n
147
00:14:45,600 --> 00:14:50,720
and lightweight APs authenticate each other using\xa0\n
148
00:14:51,679 --> 00:14:54,319
These certificates follow the X.509 standard,\xa0\xa0
149
00:14:54,960 --> 00:15:00,560
which is the same that websites use to prove their\xa0\n
150
00:15:00,559 --> 00:15:06,159
only authorized APs can join the network, so an\xa0\n
151
00:15:07,600 --> 00:15:13,200
Here’s an example network, with a wireless\xa0\n
152
00:15:13,200 --> 00:15:18,720
lightweight APs use a protocol called CAPWAP,\xa0\n
153
00:15:18,720 --> 00:15:25,600
points, to communicate. CAPWAP is based on\xa0\n
154
00:15:25,600 --> 00:15:32,639
access point protocol. For communications, two\xa0\n
155
00:15:32,639 --> 00:15:36,399
like this. Note that each of\xa0\n
156
00:15:36,399 --> 00:15:39,840
represents two separate tunnels,\xa0\n
157
00:15:40,799 --> 00:15:47,519
So, let’s see what those two tunnels are. One is\xa0\n
158
00:15:48,480 --> 00:15:54,320
There’s another port number for you to remember,\xa0\n
159
00:15:55,279 --> 00:15:59,839
So, this tunnel is used to configure the\xa0\n
160
00:16:00,879 --> 00:16:04,559
Note that all traffic in this tunnel is\xa0\n
161
00:16:05,759 --> 00:16:12,559
The second tunnel is the data tunnel, using UDP\xa0\n
162
00:16:12,559 --> 00:16:18,639
sent through this tunnel to the WLC. It does not\xa0\n
163
00:16:18,639 --> 00:16:24,399
to another client associated with the same AP.\xa0\n
164
00:16:25,679 --> 00:16:30,799
Now, of course in reality the traffic does pass\xa0\n
165
00:16:31,679 --> 00:16:37,039
However it is encapsulated with new headers to\xa0\n
166
00:16:37,039 --> 00:16:43,279
IPsec tunnels in the WAN video. Note that traffic\xa0\n
167
00:16:43,279 --> 00:16:49,199
but you can configure it to be encrypted using\xa0\n
168
00:16:49,200 --> 00:16:55,200
layer security. I mentioned TLS, transport\xa0\n
169
00:16:56,240 --> 00:17:02,240
DTLS is basically the same thing, but it\xa0\n
170
00:17:03,600 --> 00:17:06,960
Now, here’s another difference between\xa0\n
171
00:17:07,920 --> 00:17:12,400
Because all traffic from wireless clients\xa0\n
172
00:17:13,279 --> 00:17:18,639
APs connect to switch access ports, not\xa0\n
173
00:17:18,640 --> 00:17:22,240
if you want, but there’s no need for\xa0\n
174
00:17:22,960 --> 00:17:27,519
To make that clear, let me demonstrate the\xa0\n
175
00:17:29,440 --> 00:17:34,880
Okay, I’ve simplified the diagrams. On the\xa0\n
176
00:17:34,880 --> 00:17:41,760
a lightweight AP and a WLC. On the right we have\xa0\n
177
00:17:41,759 --> 00:17:48,160
local-MAC architecture. As you know, when using\xa0\n
178
00:17:48,160 --> 00:17:54,560
with a trunk link. There should be a VLAN for\xa0\n
179
00:17:54,559 --> 00:18:00,799
network device management. If a wireless client\xa0\n
180
00:18:00,799 --> 00:18:05,440
it sends the frame to its wireless access point,\xa0\n
181
00:18:05,440 --> 00:18:10,880
the wired network, which will then forward it\xa0\n
182
00:18:10,880 --> 00:18:16,240
wants to send traffic to another device associated\xa0\n
183
00:18:16,240 --> 00:18:21,279
the wired network. The frame is sent to the AP\xa0\n
184
00:18:22,160 --> 00:18:27,759
When using a split-MAC architecture, this is all\xa0\n
185
00:18:27,759 --> 00:18:33,200
have to connect to the switch with a trunk, an\xa0\n
186
00:18:33,200 --> 00:18:40,160
needed to connect the WLC to the wired network. In\xa0\n
187
00:18:40,160 --> 00:18:46,160
a VLAN and forming the border between the wired\xa0\n
188
00:18:47,359 --> 00:18:54,479
Traffic from a wireless client is sent to the\xa0\n
189
00:18:54,480 --> 00:18:58,799
sends it over the wired network to the default\xa0\n
190
00:19:00,000 --> 00:19:05,440
Even if the traffic is destined for a host\xa0\n
191
00:19:05,440 --> 00:19:11,840
to the WLC, and then tunneled back and sent to\xa0\n
192
00:19:11,839 --> 00:19:16,879
demonstrate the differences between the traffic\xa0\n
193
00:19:18,400 --> 00:19:24,640
There are some key benefits to using a split-MAC\xa0\n
194
00:19:24,640 --> 00:19:28,720
don’t have to memorize it, but you should\xa0\n
195
00:19:29,599 --> 00:19:37,199
First, scalability. With a WLC, or even multiple\xa0\n
196
00:19:37,200 --> 00:19:43,120
and support a network with thousands of APs. That\xa0\n
197
00:19:44,400 --> 00:19:50,640
WLCs also provide dynamic channel assignment.\xa0\n
198
00:19:50,640 --> 00:19:55,040
each AP should use, so you don’t have to\xa0\n
199
00:19:56,160 --> 00:20:02,480
The WLC can also automatically set the appropriate\xa0\n
200
00:20:02,480 --> 00:20:09,440
coverage without interfering with other APs.\xa0\n
201
00:20:09,440 --> 00:20:17,440
coverage. So, when an AP stops functioning, the\xa0\n
202
00:20:17,440 --> 00:20:24,960
to avoid coverage holes. Seamless roaming is also\xa0\n
203
00:20:24,960 --> 00:20:32,960
noticeable delay. Another benefit is client load\xa0\n
204
00:20:32,960 --> 00:20:39,840
the WLC can associate the client with the\xa0\n
205
00:20:39,839 --> 00:20:46,720
the last benefit I’ll mention is security and QoS\xa0\n
206
00:20:46,720 --> 00:20:53,279
policies ensures consistency across the network.\xa0\n
207
00:20:53,279 --> 00:20:57,599
but definitely be aware that the split-MAC\xa0\n
208
00:20:59,599 --> 00:21:05,439
Now, just as autonomous APs can function as\xa0\n
209
00:21:05,440 --> 00:21:12,559
APs have different modes as well. First is local\xa0\n
210
00:21:12,559 --> 00:21:19,519
a BSS, or multiple BSSs for clients to associate\xa0\n
211
00:21:19,519 --> 00:21:27,440
of an AP. Next is FlexConnect mode. In this mode\xa0\n
212
00:21:27,440 --> 00:21:34,400
associate with, but it adds extra functionality.\xa0\n
213
00:21:34,400 --> 00:21:39,920
forward traffic between the wired and wireless\xa0\n
214
00:21:41,680 --> 00:21:45,759
So, here on the left are some standard\xa0\n
215
00:21:46,720 --> 00:21:49,120
All traffic is tunneled to the WLC first.\xa0\xa0
216
00:21:50,240 --> 00:21:56,000
But what if connectivity to the WLC is lost,\xa0\n
217
00:21:56,000 --> 00:22:01,200
a problem if FlexConnect is enabled, because\xa0\n
218
00:22:01,200 --> 00:22:07,840
like an autonomous AP, no need to tunnel the\xa0\n
219
00:22:09,359 --> 00:22:15,039
The next mode is sniffer mode. In this mode\xa0\n
220
00:22:15,839 --> 00:22:19,919
Instead it is dedicated to capturing 802.11 frames\xa0\xa0
221
00:22:19,920 --> 00:22:25,600
and sending them to a device running software\xa0\n
222
00:22:25,599 --> 00:22:29,919
traffic and then sends those packets to\xa0\n
223
00:22:31,119 --> 00:22:37,839
The next mode is Monitor mode. Again, it doesn’t\xa0\n
224
00:22:37,839 --> 00:22:44,720
to receiving 802.11 frames to detect rogue\xa0\n
225
00:22:44,720 --> 00:22:50,799
device, an AP can send de-authentication messages\xa0\n
226
00:22:52,160 --> 00:22:58,400
The next mode, rogue detector mode, is similar\xa0\n
227
00:22:58,400 --> 00:23:04,240
AP does not even use its radio. Instead it\xa0\n
228
00:23:04,240 --> 00:23:11,599
but it receives a list of suspected rogue clients\xa0\n
229
00:23:11,599 --> 00:23:17,199
ARP messages on the wired network and correlating\xa0\n
230
00:23:17,920 --> 00:23:24,400
it can detect rogue devices. Okay, the next is\xa0\n
231
00:23:24,400 --> 00:23:32,880
clients. That is SE-connect, or spectrum expert\xa0\n
232
00:23:32,880 --> 00:23:38,880
spectrum analysis on all channels. It can send\xa0\n
233
00:23:38,880 --> 00:23:45,200
Expert on a PC to collect and analyze the data.\xa0\n
234
00:23:47,519 --> 00:23:49,839
Okay, the next mode is bridge/mesh mode.\xa0\xa0
235
00:23:50,720 --> 00:23:56,160
Like the autonomous AP’s outdoor bridge mode,\xa0\n
236
00:23:56,160 --> 00:24:02,240
between sites, even over long distances. A mesh\xa0\n
237
00:24:03,440 --> 00:24:08,559
Here’s an example similar to what we saw in the\xa0\n
238
00:24:10,079 --> 00:24:14,319
And here’s an example that looks more like\xa0\n
239
00:24:14,319 --> 00:24:20,559
potentially long distances. Now there’s\xa0\n
240
00:24:20,559 --> 00:24:26,399
which basically adds flexconnect functionality\xa0\n
241
00:24:26,400 --> 00:24:31,840
access points to locally forward traffic\xa0\n
242
00:24:33,039 --> 00:24:37,839
Here’s that complete list. This is a lot\xa0\n
243
00:24:37,839 --> 00:24:43,439
looked at each one, but that’s okay. If you\xa0\n
244
00:24:43,440 --> 00:24:48,080
Cisco has documentation about each of them\xa0\n
245
00:24:48,079 --> 00:24:53,359
but for the CCNA exam you should just be able to\xa0\n
246
00:24:54,319 --> 00:24:59,839
I don’t recommend memorizing this list,\xa0\n
247
00:25:00,880 --> 00:25:06,960
Now let’s look at the last main type of AP\xa0\n
248
00:25:06,960 --> 00:25:12,640
architecture is in between autonomous AP and\xa0\n
249
00:25:12,640 --> 00:25:19,280
functions. Basically, it involves autonomous\xa0\n
250
00:25:20,160 --> 00:25:26,000
An example is Cisco Meraki, and because the\xa0\n
251
00:25:26,000 --> 00:25:32,160
you should be aware of for the CCNA. The Meraki\xa0\n
252
00:25:32,720 --> 00:25:37,600
can be used to configure APs, monitor the\xa0\n
253
00:25:37,599 --> 00:25:44,959
etc. Just like I mentioned for WLCs, Meraki\xa0\n
254
00:25:44,960 --> 00:25:51,200
what transmit power to use, etc. However,\xa0\n
255
00:25:51,839 --> 00:25:56,319
It is sent directly to the wired\xa0\n
256
00:25:56,319 --> 00:26:01,200
So, only what we call management traffic\xa0\n
257
00:26:02,400 --> 00:26:08,960
Let’s see an example. Information such as RF\xa0\n
258
00:26:08,960 --> 00:26:14,160
is sent to servers in the Meraki cloud.\xa0\n
259
00:26:14,160 --> 00:26:19,200
PCs communicating with each other, is direct and\xa0\n
260
00:26:20,160 --> 00:26:25,440
So, I think you can see how the functionality\xa0\n
261
00:26:27,279 --> 00:26:33,680
Here’s an image from Meraki demonstrating the same\xa0\n
262
00:26:33,680 --> 00:26:39,920
the green arrow, is sent to the Meraki cloud.\xa0\n
263
00:26:39,920 --> 00:26:44,880
is sent directly to its intended destination\xa0\n
264
00:26:46,000 --> 00:26:50,880
Here’s another image from that same Meraki\xa0\n
265
00:26:51,680 --> 00:26:56,720
This is where you monitor the wireless network,\xa0\n
266
00:26:57,920 --> 00:27:03,519
I use the Cisco Meraki solution in my job and\xa0\n
267
00:27:03,519 --> 00:27:08,879
and the Meraki dashboard makes it easy to monitor\xa0\n
268
00:27:10,000 --> 00:27:14,480
Okay, that’s all for the cloud-based\xa0\n
269
00:27:14,480 --> 00:27:20,480
between autonomous AP and split-MAC architecture.\xa0\n
270
00:27:22,640 --> 00:27:28,560
The final topic for today is WLC deployment\xa0\n
271
00:27:28,559 --> 00:27:32,720
LAN controllers, this applies\xa0\n
272
00:27:32,720 --> 00:27:40,079
not autonomous AP or cloud-based AP architectures.\xa0\n
273
00:27:40,079 --> 00:27:46,319
four ways to deploy a WLC in your network. I’ll\xa0\n
274
00:27:46,319 --> 00:27:54,240
them first. First, a unified WLC deployment. The\xa0\n
275
00:27:54,240 --> 00:28:00,640
device, in a central location of the network.\xa0\n
276
00:28:01,200 --> 00:28:06,400
The WLC is a VM running on a server,\xa0\n
277
00:28:07,279 --> 00:28:11,839
Keep in mind that this is not the same as the\xa0\n
278
00:28:12,799 --> 00:28:19,039
In this case the APs are not cloud-based, they\xa0\n
279
00:28:19,039 --> 00:28:28,319
here simply refers to where the WLC is. In an\xa0\n
280
00:28:28,319 --> 00:28:33,519
in a switch in the network. And finally\xa0\n
281
00:28:34,079 --> 00:28:39,839
the WLC functionality is actually integrated\xa0\n
282
00:28:41,920 --> 00:28:47,920
So here is an example of a unified WLC, a\xa0\n
283
00:28:48,480 --> 00:28:55,039
that is deployed in a central location of the\xa0\n
284
00:28:55,039 --> 00:29:02,000
6000 APs, and if you need more than that you can\xa0\n
285
00:29:02,000 --> 00:29:08,240
suitable for a large enterprise campus. Here’s\xa0\n
286
00:29:08,960 --> 00:29:13,680
Of course the larger models are more powerful\xa0\n
287
00:29:15,119 --> 00:29:22,079
Next is the cloud-based WLC. In this case the\xa0\n
288
00:29:22,079 --> 00:29:29,279
a private cloud in a data center. This kind of\xa0\n
289
00:29:29,279 --> 00:29:35,440
and again if more are needed you can add\xa0\n
290
00:29:35,440 --> 00:29:41,200
a split-MAC architecture with a cloud-based WLC\xa0\n
291
00:29:41,200 --> 00:29:47,840
we looked at earlier. These are lightweight APs,\xa0\n
292
00:29:49,839 --> 00:29:55,119
Next, embedded WLCs. In this case\xa0\n
293
00:29:56,079 --> 00:30:01,759
This type of WLC can support up to about 200\xa0\n
294
00:30:01,759 --> 00:30:07,839
more switches with embedded WLCs. Embedded\xa0\n
295
00:30:09,440 --> 00:30:18,000
Finally, Cisco Mobility Express places the WLC\xa0\n
296
00:30:18,000 --> 00:30:25,519
internal CAPWAP tunnels to it, and the other\xa0\n
297
00:30:25,519 --> 00:30:32,079
up to about 100 APs, and you’ll have to add\xa0\n
298
00:30:32,079 --> 00:30:37,359
to support more APs. This kind of deployment\xa0\n
299
00:30:38,960 --> 00:30:42,319
Here’s that summary of the\xa0\n
300
00:30:42,319 --> 00:30:45,839
and I’ve added information about how\xa0\n
301
00:30:46,720 --> 00:30:49,839
Definitely be familiar with these\xa0\n
302
00:30:52,079 --> 00:30:56,799
Okay, here’s what we covered in this video.\xa0\n
303
00:30:56,799 --> 00:31:03,839
different kinds of 802.11 messages and the\xa0\n
304
00:31:04,400 --> 00:31:08,320
Because wireless networks have different\xa0\n
305
00:31:08,319 --> 00:31:14,639
there are quite a few differences between 802.3\xa0\n
306
00:31:15,519 --> 00:31:21,839
We then covered the three main kinds of APs,\xa0\n
307
00:31:21,839 --> 00:31:27,519
sure you know the basic characteristics of each\xa0\n
308
00:31:27,519 --> 00:31:31,839
the different wireless LAN controller deployment\xa0\n
309
00:31:32,960 --> 00:31:36,160
Make sure to watch until the end\xa0\n
310
00:31:36,160 --> 00:31:41,759
question from Boson Software’s ExSim for\xa0\n
311
00:31:44,400 --> 00:31:50,720
What kind of message is an 802.11 probe request?\xa0\n
312
00:31:55,519 --> 00:32:02,000
Okay, the answer is C, management. Here are\xa0\n
313
00:32:02,000 --> 00:32:05,920
with a few examples of each.\xa0\nOkay, let’s go to question 2.
314
00:32:08,000 --> 00:32:10,799
Which of the following AP\xa0\n
315
00:32:11,359 --> 00:32:14,479
Pause the video now to select\xa0\nthe best answer, select two.
316
00:32:18,880 --> 00:32:22,080
Okay, the answers are C, lightweight, and D,\xa0\xa0
317
00:32:22,079 --> 00:32:29,039
cloud-based. Lightweight APs are centrally managed\xa0\n
318
00:32:29,039 --> 00:32:34,960
are centrally managed by a cloud server such\xa0\n
319
00:32:37,519 --> 00:32:41,519
Which of the following AP\xa0\n
320
00:32:41,519 --> 00:32:43,839
Pause the video now to select the best answer.
321
00:32:48,480 --> 00:32:55,279
Okay, the answer is C, lightweight. Lightweight\xa0\n
322
00:32:55,279 --> 00:33:00,879
two tunnels, a control tunnel and a data\xa0\n
323
00:33:03,759 --> 00:33:07,920
Which of the following lightweight\xa0\n
324
00:33:08,640 --> 00:33:11,440
Pause the video to select\xa0\nthe best answers, select two.
325
00:33:15,599 --> 00:33:22,319
Okay, the answers are A, local and C, flexconnect.\xa0\n
326
00:33:23,200 --> 00:33:28,000
FlexConnect offers the additional ability\xa0\n
327
00:33:28,000 --> 00:33:32,880
even if the tunnels to the WLC go\xa0\n
328
00:33:36,160 --> 00:33:40,400
Which of the following WLC deployments\xa0\n
329
00:33:41,039 --> 00:33:43,359
Pause the video now to select the best answer.
330
00:33:47,759 --> 00:33:56,079
Okay, the answer is D, unified. Embedded WLCs\xa0\n
331
00:33:56,079 --> 00:34:02,399
mobility express about 100, and unified\xa0\n
332
00:34:02,960 --> 00:34:08,032
Now let’s take a look at a bonus practice\xa0\n
28434
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.