Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:02,068 --> 00:00:05,839
In our previous video, we talked
about how services have port numbers
2
00:00:05,839 --> 00:00:10,343
that they use so that other devices
can communicate and use those services.
3
00:00:10,610 --> 00:00:14,614
We refer to these as well known
port numbers, because both the server
4
00:00:14,614 --> 00:00:19,285
and the client need to know exactly what
port number they'll use to communicate.
5
00:00:19,753 --> 00:00:22,222
This is not only important for the server
and the client,
6
00:00:22,222 --> 00:00:24,124
but it's also important for any firewalls
7
00:00:24,124 --> 00:00:26,393
that may be in the middle
of that communication.
8
00:00:26,393 --> 00:00:30,130
Firewalls have to decide whether to allow
or disallow this traffic,
9
00:00:30,330 --> 00:00:33,333
and they often make that decision
based on the port number.
10
00:00:33,633 --> 00:00:35,468
As we go through this video,
you'll see that
11
00:00:35,468 --> 00:00:38,138
there are a lot of different port numbers
that you should use,
12
00:00:38,138 --> 00:00:39,072
and if you've never worked
13
00:00:39,072 --> 00:00:42,809
with port numbers before,
this will seem like rote memorization.
14
00:00:42,909 --> 00:00:44,344
But the port numbers themselves
15
00:00:44,344 --> 00:00:47,981
become easier and easier to remember
as you continue to use them.
16
00:00:48,314 --> 00:00:50,283
It's important to know these port numbers
17
00:00:50,283 --> 00:00:53,553
and what protocols are often
used by a particular port number.
18
00:00:53,720 --> 00:00:57,090
But it's also important to know
when you would use these protocols.
19
00:00:57,223 --> 00:01:01,561
For example, your exam might ask you
what port number is used by an application
20
00:01:01,561 --> 00:01:04,864
that transfers data in a particular way
across the network.
21
00:01:05,765 --> 00:01:06,266
Let's start
22
00:01:06,266 --> 00:01:10,603
our conversation of port numbers
with FTP or the File Transfer Protocol.
23
00:01:10,637 --> 00:01:11,738
As the name implies,
24
00:01:11,738 --> 00:01:15,241
this is a protocol that transfers files
from one device to another.
25
00:01:15,508 --> 00:01:18,378
There are two port numbers used by FTP.
26
00:01:18,378 --> 00:01:20,346
One is TCP port 20.
27
00:01:20,346 --> 00:01:24,350
This is for data
transfers and TCP port 21,
28
00:01:24,350 --> 00:01:27,353
which is used to control the data
transfer.
29
00:01:27,454 --> 00:01:32,358
FTP is a generic way to transfer data
between devices, but it commonly requires
30
00:01:32,358 --> 00:01:35,795
some type of authentication
to log in to that remote device.
31
00:01:35,962 --> 00:01:39,999
So you might use a username and password,
although some systems will allow you
32
00:01:39,999 --> 00:01:43,837
to log in as anonymous
and use any password to gain access.
33
00:01:44,270 --> 00:01:45,305
The FTP protocol
34
00:01:45,305 --> 00:01:46,139
also includes
35
00:01:46,139 --> 00:01:49,876
a number of file management functions,
so when you connect to an FTP server,
36
00:01:49,876 --> 00:01:51,978
you can list all of the files
on that server.
37
00:01:51,978 --> 00:01:55,682
You can add, delete, rename and perform
other file management
38
00:01:55,682 --> 00:01:57,717
functions, all by using FTP.
39
00:01:58,718 --> 00:01:59,819
There may be times when
40
00:01:59,819 --> 00:02:03,623
you need to connect to a remote device
through a terminal or command line.
41
00:02:03,623 --> 00:02:04,457
Front end.
42
00:02:04,457 --> 00:02:07,393
It's common to use secure shell or SSH
43
00:02:07,393 --> 00:02:10,396
to provide this terminal connection
to a remote device.
44
00:02:10,697 --> 00:02:14,501
SSH commonly communicates
over TCP using port 22,
45
00:02:14,634 --> 00:02:19,105
and it has this text based front end
to be able to access that remote device.
46
00:02:19,472 --> 00:02:22,842
Although we see plain text on our screen,
any communication
47
00:02:22,842 --> 00:02:25,845
sent over
the network is sent as encrypted data.
48
00:02:25,845 --> 00:02:27,714
That's where the secure comes from.
49
00:02:27,714 --> 00:02:29,949
In the name Secure Shell.
50
00:02:29,949 --> 00:02:31,050
There's another way to connect
51
00:02:31,050 --> 00:02:34,754
to a remote device using this text
based or console front end,
52
00:02:34,921 --> 00:02:38,791
and it's using telnet
or the telecommunication network protocol.
53
00:02:38,992 --> 00:02:43,263
Telnet commonly uses TCP port 23
to provide this connection.
54
00:02:43,563 --> 00:02:46,833
Just like SSH, telnet provides
this text based front end
55
00:02:46,833 --> 00:02:50,203
that allows us to connect
to the remote console of another device.
56
00:02:50,436 --> 00:02:55,041
But unlike SSH, all of the communication
between this telnet front end
57
00:02:55,041 --> 00:02:59,379
and the telnet server
is all sent in the clear or not encrypted.
58
00:02:59,612 --> 00:03:02,682
This means that anyone
who might be capturing packets between
59
00:03:02,682 --> 00:03:06,419
these two devices will see everything
that you're sending over this link,
60
00:03:06,419 --> 00:03:09,722
including usernames, passwords,
and everything else.
61
00:03:10,023 --> 00:03:12,992
This is why we often say
that you shouldn't use telnet
62
00:03:12,992 --> 00:03:14,427
on your production networks,
63
00:03:14,427 --> 00:03:18,264
and instead you should always use
SSH for terminal communication.
64
00:03:19,499 --> 00:03:22,502
There
are probably millions of email servers
65
00:03:22,502 --> 00:03:26,139
that are located on the internet,
and the protocol that those email server
66
00:03:26,139 --> 00:03:31,377
use to communicate with each other is
the Simple Mail Transfer Protocol or SMTp.
67
00:03:31,744 --> 00:03:35,815
SMTp commonly uses TCP using port 25.
68
00:03:36,049 --> 00:03:39,619
Not only is SMTp
used to communicate between mail servers,
69
00:03:39,752 --> 00:03:43,890
but it's also used for our mail clients
to send mail to a mail server.
70
00:03:44,023 --> 00:03:48,061
So if you're using a mail client on your
mobile device or your desktop computer
71
00:03:48,061 --> 00:03:51,965
and you're sending an email message,
you could be using SMTp.
72
00:03:52,532 --> 00:03:55,602
Although it's common to use SMTp
to send mail,
73
00:03:55,668 --> 00:03:59,339
receiving mail is done using a completely
different set of protocols.
74
00:03:59,439 --> 00:04:03,843
So if you were to look at your email
client, you're probably using iMap or Pop3
75
00:04:03,843 --> 00:04:08,715
to be able to receive mail
and SMTp to be able to send mail.
76
00:04:09,782 --> 00:04:13,052
If you need to connect to
a remote website, you would probably type
77
00:04:13,052 --> 00:04:17,090
into your browser dub dub, dub dot
Professor Messer com and hit enter.
78
00:04:17,357 --> 00:04:19,926
Behind the scenes,
your system needs to be able
79
00:04:19,926 --> 00:04:22,729
to communicate
with the Professor Messer web server,
80
00:04:22,729 --> 00:04:26,432
but it has no idea what the IP address is
for that server
81
00:04:26,699 --> 00:04:31,170
to be able to resolve an IP address
from that fully qualified domain name.
82
00:04:31,304 --> 00:04:34,874
Your system will use DNS
or the Domain Name System.
83
00:04:35,208 --> 00:04:38,011
DNS commonly uses UDP port 53
84
00:04:38,011 --> 00:04:41,581
to be able to make this connection
between you and the DNS server.
85
00:04:41,948 --> 00:04:44,417
These are obviously
very critical resources
86
00:04:44,417 --> 00:04:48,921
because we don't often memorize
IP addresses of servers, and very often
87
00:04:48,921 --> 00:04:52,492
server IP addresses can change
without any type of notification.
88
00:04:52,692 --> 00:04:56,162
It's DNS that provides that resolution
between a name
89
00:04:56,162 --> 00:05:00,033
that we're typing in on the browser,
and the IP address that will be used for
90
00:05:00,033 --> 00:05:01,401
the actual communication.
91
00:05:02,735 --> 00:05:03,303
If you've ever
92
00:05:03,303 --> 00:05:07,173
used your mobile device
on the Wi-Fi network of a coffee shop,
93
00:05:07,407 --> 00:05:11,811
then you've automatically received an IP
address that you can use on that network.
94
00:05:12,045 --> 00:05:15,014
This IP address was assigned
automatically using
95
00:05:15,014 --> 00:05:18,951
the Dynamic Host Configuration Protocol,
or Dhcp.
96
00:05:19,319 --> 00:05:22,088
The well-known ports for Dhcp are UDP
97
00:05:22,088 --> 00:05:25,091
port 67 and UDP port 68.
98
00:05:25,291 --> 00:05:29,228
Of course, you need a Dhcp server
to assign these IP addresses
99
00:05:29,228 --> 00:05:32,699
to devices on your network,
but that functional is commonly built
100
00:05:32,699 --> 00:05:36,069
into the routers and wireless
access points that we use these days.
101
00:05:36,402 --> 00:05:39,972
This Dhcp server
will have a large pool of IP addresses
102
00:05:39,972 --> 00:05:42,975
that can then be assigned
to devices on your network.
103
00:05:43,076 --> 00:05:45,678
All of these
IP addresses are assigned in real time,
104
00:05:45,678 --> 00:05:50,183
so when you start up your computer,
it queries the Dhcp server, and the Dhcp
105
00:05:50,183 --> 00:05:53,886
server assigns your device
all of your IP configuration details.
106
00:05:54,520 --> 00:05:58,424
Dhcp uses a leasing system
to assign these IP addresses,
107
00:05:58,558 --> 00:06:02,161
so you are only using this IP address
for certain amount of time.
108
00:06:02,261 --> 00:06:05,498
And after that lease expires
and you're no longer on the network,
109
00:06:05,498 --> 00:06:08,901
that IP address goes back in the pool
for someone else to use.
110
00:06:09,502 --> 00:06:12,772
Network administrators can also configure
Dhcp servers
111
00:06:12,772 --> 00:06:16,409
to always assign
the same IP address to certain devices.
112
00:06:16,509 --> 00:06:20,880
So if there are routers, firewalls,
switches, and other infrastructure devices
113
00:06:20,880 --> 00:06:21,848
on your network,
114
00:06:21,848 --> 00:06:25,918
your network administrator
may configure Dhcp reservations.
115
00:06:25,918 --> 00:06:30,723
So those devices always receive the same
IP address every time they're booted up.
116
00:06:31,157 --> 00:06:34,827
This also means that if you need to change
any of the IP configurations
117
00:06:34,827 --> 00:06:37,630
on these devices,
you don't have to go to the devices
118
00:06:37,630 --> 00:06:41,100
to make those changes,
you simply make them on the Dhcp server.
119
00:06:41,134 --> 00:06:44,971
The next time that device requests
the Dhcp address, it will receive
120
00:06:44,971 --> 00:06:46,139
the new configuration.
121
00:06:47,373 --> 00:06:48,441
If you've ever used a
122
00:06:48,441 --> 00:06:52,512
web browser,
then you've used Http and Https.
123
00:06:52,745 --> 00:06:56,582
Http is the Hypertext Transfer Protocol,
and this is
124
00:06:56,582 --> 00:07:00,319
the common protocol used by our browsers
to communicate to web servers.
125
00:07:00,620 --> 00:07:03,723
There are two different protocols
depending on the type of communication
126
00:07:03,723 --> 00:07:04,824
that you'll be doing.
127
00:07:04,824 --> 00:07:08,561
If you're communicating in the clear
or in a non encrypted form.
128
00:07:08,594 --> 00:07:13,232
You would be using the Http protocol
which uses TCP and port 80.
129
00:07:13,499 --> 00:07:15,001
If your browser's communicating
130
00:07:15,001 --> 00:07:19,272
over an encrypted connection,
then it's probably using Https.
131
00:07:19,272 --> 00:07:23,843
The s being for secure
and that uses TCP port 443.
132
00:07:25,144 --> 00:07:27,880
We mentioned earlier
that sending email messages
133
00:07:27,880 --> 00:07:31,384
can use SMTp
or the Simple Mail Transfer Protocol,
134
00:07:31,651 --> 00:07:35,988
but to receive email messages,
you would commonly use Pop3 or iMap.
135
00:07:36,222 --> 00:07:41,661
Pop3 is the Post Office Protocol version
three, and it commonly uses TCP port 110.
136
00:07:41,961 --> 00:07:44,764
Pop3 was designed to retrieve
email messages
137
00:07:44,764 --> 00:07:48,968
to an email client, but it wasn't built
for multiple email clients.
138
00:07:48,968 --> 00:07:52,104
And of course, these days
we tend to walk around with many different
139
00:07:52,104 --> 00:07:55,808
mobile devices,
all accessing the same email inbox
140
00:07:56,042 --> 00:07:59,178
to be able to synchronize across
all of these different mailboxes.
141
00:07:59,212 --> 00:08:04,350
We commonly use iMap for or the Internet
Message Access Protocol version four.
142
00:08:04,617 --> 00:08:10,156
iMap commonly uses TCP port 143 to be able
to download and manage that mailbox.
143
00:08:11,491 --> 00:08:14,927
Many operating systems have their own
method of transferring
144
00:08:14,927 --> 00:08:18,831
files and information between devices
using that operating system.
145
00:08:19,065 --> 00:08:22,969
Windows
commonly uses server message block or SMB
146
00:08:22,969 --> 00:08:24,971
to be able to provide this connection.
147
00:08:24,971 --> 00:08:28,040
This is the protocol
commonly used by Microsoft Windows,
148
00:08:28,074 --> 00:08:30,409
so if you're transferring files
between devices
149
00:08:30,409 --> 00:08:34,380
or you're sending a print job
to a printer, it's probably using SMB.
150
00:08:34,747 --> 00:08:39,919
You might also hear SMB referenced as CIFs
or the Common Internet File System.
151
00:08:40,286 --> 00:08:43,923
SMB uses a number of different protocols
to be able to communicate,
152
00:08:43,923 --> 00:08:45,958
and if you're communicating to an older
windows
153
00:08:45,958 --> 00:08:49,762
machine, you're probably using net
bias over tcp IP.
154
00:08:49,795 --> 00:08:53,099
Net Bios is the network basic
input output system.
155
00:08:53,366 --> 00:08:57,203
This uses UDP port 137
as a name service function,
156
00:08:57,236 --> 00:09:00,973
so that it can find devices
on your network by the name, and uses
157
00:09:00,973 --> 00:09:05,745
TCP port 139 to set up a session
and transfer data between devices.
158
00:09:06,345 --> 00:09:09,415
In most modern versions of windows
that Bios isn't used,
159
00:09:09,415 --> 00:09:13,352
devices can communicate directly
between each other using TCP IP.
160
00:09:13,586 --> 00:09:16,355
In those cases, it would use a direct SMB
161
00:09:16,355 --> 00:09:19,392
connection using TCP port 445.
162
00:09:19,625 --> 00:09:21,627
This allows us to have a direct SMB
163
00:09:21,627 --> 00:09:25,698
communication
between two devices by using only TCP, IP.
164
00:09:26,699 --> 00:09:29,268
If you plan on doing any work as a network
administrator,
165
00:09:29,268 --> 00:09:33,973
you'll become very familiar with S&P
or the Simple Network Management Protocol.
166
00:09:34,206 --> 00:09:38,578
S&P allows a network management device
to query these infrastructure devices
167
00:09:38,578 --> 00:09:42,481
for performance details,
and receive those metrics in return.
168
00:09:42,715 --> 00:09:46,385
This uses UDP port 161 to perform
these queries.
169
00:09:46,652 --> 00:09:49,689
You can also configure
the infrastructure device to monitor
170
00:09:49,689 --> 00:09:52,758
for certain metrics,
and if it exceeds any of those metrics,
171
00:09:52,925 --> 00:09:55,828
it can send an alert
to the management station.
172
00:09:55,828 --> 00:10:00,866
We refer to these alerts as traps,
and the traps use UDP port 162.
173
00:10:01,400 --> 00:10:04,170
If you're configuring SMP on a device,
it will ask you
174
00:10:04,170 --> 00:10:05,671
if you're using version one.
175
00:10:05,671 --> 00:10:07,974
Version two, or version three.
176
00:10:07,974 --> 00:10:11,210
Version one was obviously
the original SNMp version.
177
00:10:11,410 --> 00:10:14,013
It sends structured information
across the network.
178
00:10:14,013 --> 00:10:18,084
But all of this information was sent
in the clear or in a non encrypted form.
179
00:10:18,384 --> 00:10:22,288
We introduced a newer version of SMP
with us AMP version two,
180
00:10:22,388 --> 00:10:25,625
which allowed us to do
bulk transfers of information.
181
00:10:25,625 --> 00:10:29,795
But still all of that information
was being sent in a non encrypted form.
182
00:10:30,062 --> 00:10:33,332
To be able to include additional security
with us and AMP.
183
00:10:33,532 --> 00:10:35,935
You need to use S&P v3.
184
00:10:35,935 --> 00:10:39,071
This includes encryption
that allows us to have message integrity
185
00:10:39,238 --> 00:10:42,642
authentication
and encryption of all of the SNMp data.
186
00:10:44,076 --> 00:10:47,480
We use directories extensively
on our modern networks.
187
00:10:47,480 --> 00:10:52,251
And one very common protocol
to use to query these directories is Ldap.
188
00:10:52,351 --> 00:10:55,321
Ldap is the Lightweight
Directory Access Protocol,
189
00:10:55,388 --> 00:10:58,391
and it commonly uses TCP port 389.
190
00:10:58,624 --> 00:11:03,362
There are many implementations of Ldap,
but one of the most popular is Microsoft
191
00:11:03,362 --> 00:11:07,199
Active Directory, which allows you
to query that Active Directory Server
192
00:11:07,199 --> 00:11:10,202
using the Ldap protocol.
193
00:11:10,436 --> 00:11:13,305
If you've ever worked in a support role
or on a helpdesk,
194
00:11:13,305 --> 00:11:17,810
then you've probably performed some type
of remote access to someone's desktop.
195
00:11:18,044 --> 00:11:21,313
One very popular protocol
to provide this remote communication
196
00:11:21,480 --> 00:11:24,450
is RDP or the Remote Desktop Protocol.
197
00:11:24,717 --> 00:11:28,554
This is the standard protocol
used by windows for the remote sharing,
198
00:11:28,654 --> 00:11:32,091
and it commonly uses TCP port 3389.
199
00:11:32,491 --> 00:11:36,362
These remote desktop services
are available in many different editions
200
00:11:36,362 --> 00:11:37,163
of windows,
201
00:11:37,163 --> 00:11:40,232
and if you're using windows today,
then you probably have built
202
00:11:40,232 --> 00:11:43,302
into the operating system
the ability to connect to
203
00:11:43,436 --> 00:11:46,439
or receive a remote desktop session.
204
00:11:46,472 --> 00:11:50,109
RDP can be used to take over and control
an entire system,
205
00:11:50,276 --> 00:11:53,579
or just to run a single application
from that server.
206
00:11:53,813 --> 00:11:58,150
Although you'll find servers
running RDP almost exclusively on windows,
207
00:11:58,150 --> 00:12:01,754
there are clients that you can run on
almost any operating system.
208
00:12:01,921 --> 00:12:06,592
So if you're running Linux, Mac OS,
Android, or any other operating system,
209
00:12:06,592 --> 00:12:09,395
there's probably an application
you can load that will allow you
210
00:12:09,395 --> 00:12:13,332
to connect to a windows device
using the Remote Desktop Protocol.
20066
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.