Time
6 hours 28 minutes
Difficulty
Intermediate
CEU/CPE
7

Video Transcription

00:00
Welcome back to the Sarah Recourse in building your info cycle up on your host. An instructor, Kevin Hernandez.
00:06
In our last lesson, we look at the hardware we require for building a left. Most specifically, the PC
00:13
in today's lesson will be started looking at Smart Switch
00:17
Lesson for smarts, lectures and vigilance. Before we start looking into the hardware,
00:23
let's first talk about what is a villain
00:27
of virtual in. It's basically a logical something network. Think about it like, um,
00:33
segregation, right? And the purpose of this and benefits. It's basically efficiency of the network
00:39
devices that will constantly talk to themselves. You want to be having a little corner right by themselves. That way, it doesn't bother the rest of the traffic. Also, overall security up the neck. Were you, for example, happier, Let's say
00:52
baby monitor right network based baby monitor. You know, make sure that only authorized spices assets that network instead of anyone that's nearby.
01:03
No, if you see the packaging is fairly simple,
01:07
and you can actually bring some zip ties, and this is a clipping mechanism over here, and basically, if you look at this clip big clip that leads to where the cables are gonna be. If if, for example, the cable, the little clip is on the front,
01:23
cables will be more towards the front and or discuss the top end or the Ford
01:29
off the picture.
01:30
Well, in the other hand,
01:33
if the Clippers in the bottom like in this picture, the cables will tend to be more towards the wall. That's why, in my particular scenario, I ended up putting two cables towards the bag. Funny part about this switch is that even though I perform, uh, sent maps can
01:49
I was unable to find it all a trade connecting it to it manually following instructions, and I wasn't able to find it. But here, able to actually downloading the proceeds plus configuration utility from the website, I was able to finally detected and be able to configure it.
02:07
However, so someone different sub nets it does not allow me to manage.
02:15
You know, if you're having issues where your I P address and your located on my peanut or are different,
02:21
it might be because you're looking at your pre configure I P address, not at the HDP shatters.
02:28
And if that's the case, you won't be able to log in and make senator switch.
02:31
I found this article
02:34
on the neck. Your community, which will show you how to troubleshoot That
02:38
basically tells you it's gonna Internet on pluck, switch, reconnect imminent Rip Lux, which once you do that,
02:46
you will get be able to access your switch figure.
02:50
Once looked in, it will be able to see a different information about how your ports ripping use.
02:55
You want a disabled unable to speed speed if it connected on over here, you can see the actual violence
03:02
and enable it base in port
03:07
and based clean.
03:09
Once in a while, you'll be able to see which feeling the terminus to each group.
03:15
We'll be using this a lot once you start configuration our firewall.
03:20
For the moment, let's keep a disabled. For the moment, we'll keep this configuration disabled.
03:25
The lesson of parts The eatery is atrocious
03:31
now. Why don't have you learned today? Basically learn what is the villain right of virtual land. Its benefits, which basically it lets you group to gather traffic that constantly talk to each other. For example, cameras with Darryl Server and also at additional layers to that type of devices, right? In this case,
03:51
you don't want anyone to accept your baby monitor order than you, right?
03:54
Also, we look at the hardware land regardless of being a smart switch like the one I just shown you or built in features within your router.

Up Next

Building an InfoSec Lab

This course will guide you through the basics of incorporating several Information Security Engineering Tools in your home and/or lab. By building this lab you will be able to obtain corporate-level security within your home network, as well as a higher understanding of the capabilities and advantages these tools bring to your network.

Instructed By

Instructor Profile Image
Kevin Hernandez
Instructor