Time
11 hours
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello. Welcome back. Cisco Certified Design Associate Module five License 5.2 I'm your instructor, Wayne.
00:08
In the previous video we talked about a definitely and standards. From this video, it will begin to introduce a sisterly unify wireless network.
00:17
Here's the pre assessment question. Which three are features of Ah, L W a pee pee
00:24
Choose three. Let week. The access point protocol is a Cisco Standard of Control messaging for set up authentication on operations between a Keys and the Devil Lang Tours. Right? Iow BP has Bean depreciated about
00:40
in favor of the capital half. So let's go over the options they gave it. Does a firm where synchronization
00:48
be local management of a piece C configuration changes manually. Thinks the encryption Off control channel E configuration data only on the O. C. Wires Control Free Operation
01:04
G Replaces agent of the 11 1 acts for authentication wireless connections. But as we're gonna be a d and E right, it is a firmware synchronization
01:15
being friction of the channel control channel configuration data only on the devices the sea centralized the configuration.
01:23
So be local management of a P. It's not a purpose of eligible a GP configuration changes manually. Think this, you know need to be automatically sink. Where does control free operation control? Free operation is in the impossible.
01:41
Do you replace the easier that one? Actually, no, it's not intentionally replace this one. We actually need the easier that one acts for authentication.
01:52
Here's the topic about this. Gus
01:57
Cisco. You double and architecture with the explosion of world solutions in and out of the enterprise, designers must have creative solutions. They provide mobility, and business of service is, well maintaining our security.
02:13
This is W W An architecture combines elements of a wireless and a wired networks
02:19
to deliver scalable, manageable and secure the lance. This is go you double and architecture is composed. The fiber elements Caryn devices This include laptops, Workstations are People's Pts and manufacturing devices. The axes of the land. Right
02:36
access points these devices to provide access to the wireless networks.
02:40
AP Zehr placed in strategic locations to minimise interference network, the unification the devil and systems you to be able to a support wireless applications by providing security policies, US intrusion prevention, radio frequency management,
02:59
Cisco Devil and contours provide this functionality and the integration
03:02
into all major switching and routing platforms.
03:07
Network management This is the wireless control system. W. W. C s provides a central management, a tour that lights you desire in control and the monitor. Where's networks Mobility service is this include a guest access the location service sees the voice of service is on a Friday detection and a medication.
03:27
Let's go
03:28
you Dublin provides the following benefits. Reduced the total cause of ownership TCO and the visibility out of control. And I make our f A management. Definitely. And Security unified a wired on a wireless network and apprise mobility. It has the productive D on a collaboration.
03:49
He's a centralized, the development of architecture in a centralized the devil and architecture Autonomous A peas are replaced by it. Let wait access point away piece. These alley peas are then configured and the manager, by the way, risk lank torturer. But really, I was C
04:06
for the more user. Traffic is a place in the wear. The network out of controller, not out of the L. A P wireless Age of 11. Traffic is placed in the cap Web tunnel
04:17
Kapetanos Through the over these, there's a three word of network traffic. It then goes from W L C to its destination back haul to the world of network.
04:32
All the control configuration Navigator will be done on the policy, although AP started Light Weighted
04:42
I. W P P. Lad WAY to Access Point Protocal out Double P p is a Cisco standard for a control messaging for set up, a multiplication and operations between a piece on the devil and controllers L W A B P has been the creek aided in favor of a cap lab
05:00
L A P P control message is gonna be transported at layer to Thanos or their three tunnels layer to l W A. PP tunnels were the first Mathur develop a 1,000,000,000 wagered a piece. They not requiring the ikey address that this advantage of a layer to our A p p was that
05:18
the double L C media to be on every seven at our way today p recites
05:24
they're two l A P p is a deep predicated. A solution for Cisco on Layer three out W P. P. Was the preferred solution before capital web in the configuration there to earlier three transparent moods can be selected,
05:40
was said to layer free the out double A p p uses i p addresses The communicated with the access points
05:46
he's i p addresses air collected from a mandatory the edges to be server. We decide to layer to the l double l. A p p uses a procreative recode it to communicate with the access points
05:59
layer three out w ap P Thanos are used to between a. L A P and that W L C messages from double I was he uses user that a port UDP port 1 to 2 to three for a control on the UDP port. 12222 for data message ings
06:15
In this solution, AP is required in the i p address, but the W L C does not need to recite all the same segment.
06:25
Captain Webb
06:27
control out of provisioning for wireless access. Point kept WEP is an i e. T f standard RFC 5415
06:34
for control. Massive demand for set up authentication on the operations between the peas and a double sees in controllers Software. 5.2 Siskel. LAPD's Use a capital communication between the double O. C and L. A piece
06:48
cap Web is dinner two out Double A GP, except for the following differences. Cap Lab uses data Graham Chest for layer Security de TRS for authentication and the encryption to protect the traffic between a piece on a controller's l. A P P. Uses a yes
07:09
cap. Webb has a dynamic and maximum and transmission unit. I'm too you Discovery. Magnetism kept Web control messages run over you. D. P 5246 Kept Web data messages using you to be
07:23
5 to 47 Cap Web uses a layer three tunnel between the L A. Key on the double l C. Right.
07:30
The AP is often anarchy. Had residue by idea. Chasity Onley AP site All the control and the data messages using up you to be poor that is derived from ah hash Each Napi Mac addresses
07:46
AP modes a piece operating in one of the six different modes of local mode. These is the default mode of operation in a smoker. Every 180 seconds of the AP matters in the ways of four and the interference and scans for ideas, events, this scanning activity Yonkers. I use the channels on the
08:05
lasted for 60 milli seconds.
08:07
Hybrid A remote edge. A p h r GHT mode This is mode Enables L. A P ri site across a one link and still be able to communicate with the policy provided the functionality off the regular Our 88. Also local Mac right monitor mode
08:26
monitor mode is a future designed to a law specific. Spicy fired, A capital. Abby nibbled a piece
08:33
excluded themselves, the drama handily and data traffic between clients and the infrastructure.
08:39
The instead of act as dedicated sensors for location based. The service's LBS rogue AP detection and the intrusion detection i. D. S. When they pee. Sorry. In monitor mode, they cannot serve clients and continuously ah, cycle through all configured channels listening in to each channel for all proximately 60 minutes seconds. Rocca detector mode.
09:03
LAPD's that operated a rogue Attacked a remote monitor for okay, Peace. They do not a chance. Leonora content rogue a piece. The idea is that the Rocca Detector RD should be able to see all of the lands in the network because
09:20
Rowe gave he's gonna be connected to do any over the billions in the network. The Year four We can't do a 20 Port
09:26
The last, which sends all a rogue A P client Mac address listed the rt There are indeed then forwards those to the TOC to compare with the Mac address off clients that Theeighties has heard over the air.
09:41
Even America Dress match the double r. O. C. Knows that the rogue AP the wage of those clients aren't connected is on that wire. The network
09:50
sniffer mode Ah, cap WAP that operating and stay for mode functions as a sniffer and it captures in the forward all the packets on the particular channel toe remote machine that arrest arrow peek breakin mode
10:03
application supported our point a point bridging point to multiple in breaking point of point of wireless access. Way of the integrated, the wires back all
10:11
on a point of moral point of where this accident with integrated Where is back or
10:18
learning? Jack Question What a Where is lying? Client is ascending Trafficking to the wire The land client What path wheel? The packet had taken the reach of the destination and pointed a latte. Wait. A wireless deployment Ace Wedge control Order a P client be controller AP switch and a client
10:37
see AP Controller Sweet and a client
10:41
thesis which ap controller and kinda travel through the 81st and then controller and to switch and the switch to the client s seek
10:52
question number two What denies entry to use for WSOC with firmer version six or later. So on a P
11:01
can determine the controllers. Ikey, address a Siskel L Webb Controller P d and s a record with the controllers of those name C D H cp Option for the free thes is go cap Web controller it The answer is this Siskel cap WAP contender is the
11:22
in today's for reflection. We discussed the Cisco Unified Worse Network. Any questions? Feel free to contact me. Otherwise they're gonna see you in the next video Bye for now.

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect
Instructor