Time
11 hours
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello, Welcome back. Cisco Certified Design associate Marjo, 15 Lice and 15.2 I'm your instructor Wink.
00:08
In the previous video, we talked about a simple network management protocol. From this video, we will begin to introduce other network and management of technologies.
00:18
Here's the pre assessment question. Our mom one provides information at what levels of the OS Emoto a dead link and a physical be network data link a physical see transport and the network. The application to Never o B A
00:35
are No. One is focusing on the dead link on the physical layers over the always a motto.
00:41
Here's the topic or discuss
00:44
our long is the standard of monitoring specification that enables network monitoring devices and the council systems to exchange a network monitoring data. Are amount provides more information that's in them. Pee by more sophisticated a data collection devices network of probes are needed. Our amount looks I have Mac lir
01:03
data provides aggregate information on the status takes and the land traffic
01:10
enterprise networks deploying that rika probes on several networks. Second chance these probes report back to the arm on council are monologues, never status sticks to be collected even able to fit her alters issue in the Pro and of the Arm own counsel Armel one is defined by Dr C's
01:27
17 57 and 28th 19
01:30
on auditions for our Among Two are defined of our R F C 2021 the Our Mom a visit located at I Sold on Oregon. Gotta d o D the internet dot mgt. Dollar M i B r r Mom ordered by the equivalent Object descriptor
01:51
Wendorf readout six. I wonder to wander 16.
01:53
Arma won the finest nine monitoring groups. Each group provides a specific set of data. One more group is a defining for token ring. Each group is optional, so vendors did not need to support all the groups in the myth. This table shows that our mom one groups
02:12
ramon too.
02:13
Arm One is focusing on the data link and a physical layers of the same model as showing his diagram. Our amount to provides an extension for monitoring up earlier particles.
02:24
Right?
02:27
Define about RFC 2021 R amount to extended. There are among groups with the meat groups of listed on his table
02:35
system. Airflow allows the tracking of i ke flows as they are past the through rodders and multilayer switches. On I P flow is a set of ah kee package within a space difficult time slot that a share a number of the properties,
02:50
such as the same sores address destination address type of the service protocol number.
02:55
Neff Low information forwarded never. Data analyzer. Network planning tours are modifications or accounting, and a bidding applications net flow allows for network planning. Traffic engineering usage based the never competing a conking denial of service monitoring capabilities on the application Monitoring.
03:15
One thing benefit is that a net flow provides the necessary data for bidding off network usage
03:22
the most. The recent inversion of Anak Flow is an Afro Burson night, which is defining RFC 39 54. The night flow protocol itself has been suppress it It'd buy Internet protocol flow information Export I ke F i X.
03:38
Based on the national version, I implementation
03:42
I p fixes on the E. T. F. A. Standard is track with our FCC 70 11 and a 70 15 as showing in this diagram. There flow consists of a free major conference. Nephila counting cracks I p data flows entering router or switch interfaces on a prepared data for export
04:01
enables the accumulation of data on flows with the unique characteristics
04:06
such as I P addresses application and across of a service. C E O s
04:12
flow Collector engines captures exported data for a mobile rodders and the future's an aggregated the data according to customer policies on their stores. This is summarized, are aggregated the data Examples of a collectors are Siskel national collector Sala Wins and a C A Net QS
04:30
network That analyzer. This plays a graphical user interface glee and analyzes NFL O data collected from flow collector files. These allows users to complete a near real time virtual ization or training, announces of a recorded and aggregated the flow data.
04:48
Users can specify the router and aggregation scheme
04:51
on the desire time interval. The benefits of the using their flow included the following ability to opt in detailed information with a minimal impact of the never devices ability to customize the data captures for each interface ability to include that that time stacking
05:10
across a large number of the devices
05:13
ability to meet her never traffic of providing data for bidding. Based on that world music used to detect on the mitigate. The frights, routers and switches are the network car conking devices Data. Gather the status sticks. This device is aggregated data and export the information.
05:30
Each unit direction on that would flow is that identified by both source and the destination. Archy Addresses on a transport layer. Poor numbers.
05:39
Night flow can also identify flows based on protocol number type of the service on input interface. NEH flow data records contain the following information source in the destination i p address source in the destination TC PEUT reports type of the service to US
05:57
packet and a bite. Cons. Start and a time. Staffs
06:01
input and output interface numbers. TCP Flax and the encapsulated The Protocol, TCP and UDP Routing information. Next top address source in the destination on condoms. That system member That's the nation critics. A mask.
06:15
Dana now analyzers the airflow export our transport magnetism, sense of the net flow data to a collection engine or a network management collector. Full collector engines perform data collection and the future. The aggregate data from several devices and a steward information
06:33
different, and their flow data analyzers can be used. The based on the intended purpose.
06:40
Nah. Flow data can be analyzed. The full appalling key applications accounting at a building used by service providers for charging based on piano and then applications usage on the quality of service. US Network Planning and Analysis. Lincoln. A rotter capacity network at a security monitoring,
07:00
visualize real time traffic patterns,
07:01
application monitoring and a profound ING time based view off application usage. User monetary and providing identifies Customer User that rugged civilization and the resource application Now flow data warehousing and a mountain Any
07:16
never flow data can be warehoused for later Retrieve. Oh, on analysis.
07:23
Cisco Discovery Particle CDP is a Cisco appropriately Prada goal that him he used to discover only Siskel never devices. CDP is a media and protocol independent. So it works over Ethan ad from really a TM and other media. The requirement is that
07:40
the media support some network axis prodigal has an 80 snap encapsulation.
07:46
CDP runs out of the data link layer off the O S m 00 c d p uses the hollow messages package. Are his chan unity between neighbors? But CDP information's not forwarded. In addition to routers and switches,
08:00
I P foes and the Cisco Unified Communication Manager Seo CM servers also advertises CTV information
08:07
being perotta Goal. The Media Independent as a city. CD peas Biggest advantage over other network management technologies. CDB provides a key information about the neighbors, including platforms, capabilities and ikey addresses, which is a significant for network discovery.
08:22
It is useful when that's an empty community. Streams are unknown when performing in our discovery. With displaying CDP neighbors, you can opt in the following information
08:33
local interface. Local interviews that are connected to the discovered a neighbor device i. D. Name over the neighbor device and a Mac address or Sierra number device ikey Address I P address over the neighbor. Hold time, Holland Seconds to hold it. A neighbor information device capabilities
08:50
type of devices discovered rodders wage Transparent bridge Host idea Pure repeater
08:56
version. IOS or Sweet Joe *** person platform rodder or switch model number. Part I D interface over the neighbouring device Network management devices Getting Upton CDP information for data gathering CDP should be this a vote untrusted the interfaces such as those that faced the Internet.
09:16
Their party networks are other secure networks.
09:18
CDP works on Lee all Cisco devices
09:22
the Linge Layer Discovery Protocol Elodie P. Defining an IEEE a zero to that Want a b R O d P specification is an option of discovering that were devices in multi vendor networks.
09:35
L O D P performance functions a similar to a seedy P without all DP devices sending information out of fixed the interval from each other. They are interfaces in the form of an Ethernet frame
09:46
with either type of it is your axe 88 cc ah. The information shared include the following system, name description, poor name and a description of villain name if he management the address system capabilities. Mac Physical Layer Information. Lean Congregation.
10:07
This is the protocol is defining RFC 31 64 says Lage. Chance minutes event notification messages over the network network devices sending the event messages to an event. A server for aggregation network devices include the routers, switches, server's firewalls and the network appliances,
10:26
says Log operates over UDP,
10:28
so messages are not a sequence star, acknowledged the system. All of the messages are also stored on a device that it generates to the message, and it can be viewed. The local re says logging messages are generated in many broad areas. These areas are called of facilities. Cisco IOS has more than 500 facilities.
10:48
Common facilities include i p C D P o S p f p c p interface I p sac
10:54
says operating system security authorization spanning tree protocol STP each. This log message has a level that's this log level determines the events a critical low t right lorises log levels are more important. This table lists of this is locked level
11:13
this, Dave Oh, summarizes the sum over the protocols were disguising here.
11:22
Learning check question number one. Which solution gathers information that it can be used for our continent? A bidding applications A Our mom being a flow. See CDP thesis lock.
11:35
We'll go in the net flow flow allows for a never planning traffic engineering painting a continent application monitoring question Number two What is the cdp? A client server Particle Be hollow base The protocol CIA Network Management agent The request response particle will go in the B
11:54
CDP is a Holloway's two particle
11:58
in today's brief lecture with disgust The other network management technologies
12:03
Any questions? Feel free to contact me. Otherwise I'll see you in the future courses. Bye for now

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect
Instructor