Time
11 hours
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello. Welcome back.
00:02
Cisco Certified Design Associate Module seven. Bison 7.4
00:07
I'm your instructor, wink.
00:11
In previous video, we talked about enterprise of what architecture in the competent.
00:16
From this video, we will begin to introduce Enterprise Branch Architecture and the Town Work or delight.
00:22
Here's a pre assessment question. What branch designed supports 100 doll users on integrates essay firewalls, a small be medium See large, the actual large and what we see large. We'll discuss this further in the falling slight.
00:40
Here's the topic about this guys
00:44
branch connectivity. There are three common deployment Amato's of our branch connectivity, each with its own problems and a constant rate. Amateurs What single or do rotter? I'm sure it's V P M. Hi Burrito one, right, I'm sure, is via an Internet you can
01:00
injury, want
01:02
single or do rotter? Intern Ivy Kiet, I'm sure, is why moves a single or do rodders have pulled up? You know, I'm trying to peek in connections. I'm trusted. One provides it for the highest, and I sell a guarantees for both US capabilities and network habitability. However, these option is the most expensive,
01:22
and you need to be tied into the provider in this case,
01:26
Highbury one combines and charts VPN on the Internet. Bognor Last single rotter speed between a pair of the rodders. This developed deployment Amato offers balance that cost option between the higher costs. I'm sure it's a VPN connection, and then the lower cost Internet he can for back up
01:44
where the hybrid Aware
01:46
traffic can be split between them and tries a beacon for higher priority basted traffic on Internet. Be careful. Lower priority based. The Traffic Internet Why include a single rotter on you rodders using Internet based the we can only this deployment. Amato is the lawyers the cost option.
02:05
But relax that serves level agreements,
02:07
as always, curious capabilities offered by carriers. In this case, the enterprise would be responsible for providing any s always today and users
02:17
small brandy dessert
02:20
as recommended for branch offices that do not require hardware redundancy. On that, I have a small user basis supporting up to 50 users. These profile cause this off on AKs is rotter providing what Internet service sees connections for the land surfaces.
02:38
The axis rotter can connected the layer to assuage pores
02:40
in one of the three ways integrated a layer to switching, using an optional either switch module data provides 16 to 4 83 reports for client connections. Some module's air support Pio eat right external layer to swinging using are trying connection to an access wage
03:00
that aggregate of the evil and connections.
03:04
The access, which can also include a p o. E. T. To support ikey foes on a word to say keys logically. Third channel interface between the arias are and the access, which is using the ether switch. Margo the accents witches get also provided Kyo he has needed
03:22
Media Branch. It is like right the media branch of these. I has recommended of our branch offices off 5200 users, which is similar to the small branch by with an additional access rotter in the what hatch
03:36
slightly larger, allowing for me tendencies. Tracy's technically to 29 21 or 29 50 point rodders are used to support the one on the Internet. On a separate access, wages are used to provide line. Could activity
03:50
the instructor come competence are due axes, rodders externally or 23 switches. Laptops, desktops, rangers and ikey foes do Ethernet, the wild lynx provided the tribunal Western Seas, which are used to connect it back to the corporate offices via both over the access rodders.
04:09
They're three protocols of such as Yet Artie
04:12
are technically deployed because there are two writers hostin by rodder protocol, h S r P o r g o b B can be used to provide every tending the gateway certainties.
04:24
Que es can also be used to provide a guarantee to be in a way, the for boy and policing can be used to restrict their certain tracking crosses from overwhelming the
04:33
available being with Sister Laura Wise the futures. That's okay. Ask US access control list on a rep yet dark beast up rotting capabilities are available in the land based the future set, but advance that I came out a cost of rotting oh SPF years. RPP, Tiki and the motor cost the rotting protocols
04:53
team as them as as M require on upgraded ikey, sort of his future set.
04:59
The medium of branch desire supports using a higher density external assuage
05:03
were using. Lee has the first wage model with the eyes are to create the trunks to the external access wages. This Cisco callous of the 38 50 serious stretches have stacked wise technology, allowing multiple switches to be connected on a manager as one.
05:20
These also increases the poor density available for a user connections with Cisco Stack Wise technology customers can create a single forehand, a G chaos assuaging unit. They can connect up to the O
05:34
9 38 50 serious reaches using a variety of a fiber and copper port, allowing creator flexibility with the connection options.
05:44
So this diagram illustrates the medium branch. Does I using do rodders back to the corporate office where the corporate resources are okay, right?
05:56
Your honors,
06:00
there's a Primary Inc is back over
06:04
the large branch design is the largest of the branch of profiles supporting between 100. And after all you ***. This design for fire is similar to the medium branch design in that is
06:18
also provides a do access rodders in the one at in traditional do adaptive security appliance essays are using the first a full firewall future ring
06:29
on do distributions reaches provided the multi bear sway to incompetent. The one service is using the Androids deployment model where they do wanna links into the one proud Because they're argued, brothers read, Ending the never rotting can be achieved through the HR people bouncing
06:46
on the distribution layer sweeties First, the harboring identity protocols of such as H S R P J L B P can be used to provide
06:54
gateway redundancy. The do A s. A configuration allows for re tendency on a staple feel over qs and service is is that he has a shaping and placing can be applied to all the routers and switches that record
07:06
to meet the requirements off the larger user base distribution layer off amount of air switches is added to aggregate the connected to access witches.
07:16
I'm only leader sway to provide the additional lan switching capabilities. To me, that report density requirements are not laws of flexibility to support additional never devices.
07:28
A couple of the hardware options for this desire are the Cisco counter to the 38 fifties away the stack wise technology and are using modular approach with Siskel campus. The 4500
07:40
the Sisko 38 50 series of the switches provide greater creative poor density options and can even provide the retention power.
07:48
This is the 4500 switch proper form in the modular chances based up. Swear to that it not only allows for flexibility but increasing part densities through additional modules, but it can also provided Rettendon the power
08:03
and internally for the entire chances about using do power supplies all over the streets. Audio's Avenue P o E. Options available for both i triple Yaser to doctor 1/2 pillowy on Tripoli. A 2.3 80 Pou plus the Cisco carries the Fortify +07 switch.
08:22
Also support to do a supervisor capabilities or apply availability types of the moments
08:28
the Siskel fortify handers, which is also so poor. The virtual switching system. The SS feature we to virtually these a pair of a 45 100 switches, allowing them to act as a single switch. The Del Streaming Devices
08:43
and Francisco Paris. The 35 60 and 38 50 sweeties are used. Additional layer to security features of such a dynamic address resolution protocol are for the inspection
08:54
that I need a host. The control protocol with the agency if he's hoping on P source card can be used to provide additional security enhancements, right. This diagram industry to the large branch design using dual rodders essays end up
09:11
on the distribution sweet cheeks Right
09:16
now a day the newest branches rate is will be 9300 sweeties
09:24
out of the remote edges off. The never is another branch office known as the Enterprise Teleworkers. Cisco developed a solution. Connor Cisco Virtue Office Social, which has designed with the enterprise data worker in mine As organizations continually try to reduce costs and improve employee protective ity
09:41
that working from home is becoming on
09:45
increasingly popular option for businesses and organizations. These approach allows employees to manage their net work schedules more effectively and increase their productivity. These also resulting greater job satisfaction and the flexibility in the network. You know, work schedules.
10:03
The work from home hair worker is an extension of the enterprise, and a serves as the basis for the enterprise teleworkers solution
10:13
and fries. Town workers need to be differentiated from the occasional remote worker right food Time Enterprise Data worker has more extensive application access out of requirement, then occasional removal worker.
10:26
Well, did you know only remote users connect to the corporate network at how spot, but generally they do not have the same application demands over the enterprise type of worker
10:37
generally ever is that workers connected to a local I s P through ah, cable or D s l connection in their residents. This is go virtual offices solution for the enterprise That worker as incriminating using the Cisco 100 years I s arms each I s r has integrated the switch port They
10:56
them connected the users or broadband connection The solution uses permanent always on the second week in town all back to the corporate network
11:05
Thes architecture provides for centralized I t security management incorporated pushing the security policies on the integrated identity Stratasys in addition and its solution supports of the enterprise can America needs through advanced applications of such as voice and a video,
11:22
for example, the first out of worker can take advantage of told that pass
11:26
voicemail on dance the IKI form teachers not available in the p s t m I s R. Zafer teleworkers. This is going a 60 80 series offer integrated service. He's out of propaganda speeds of first small offices and the enterprise that workers
11:43
the renewal notices Go ahead, receivers, I s are selected
11:46
features include their support for data Security and the warrants Technologies
11:52
Question number one. I have 10. Work is required to access the branch office of Via Secure I p sec. Uh, the PM connection. Which technology has recommended that provided the underlying transport II s d and B Metarie Trey. See from early the 80 s l e a t m.
12:11
I see. You know the second you can over Internet, right?
12:16
Ah, cross number two. Which one of these are statements? This grabs a Why? From a design perspective, a managing to be can approach for enterprise 10 workers is most effective. Am managed to VPN solution uses a cost effective on demand. We can count all back to the enterprise B. This solution supports all 10 workers who do not require boys or video.
12:39
See, these architecture provides a centralized the management where the enterprise can up by security policies and the push configurations the air provides a complete flexibility for remote access is through awareness Hospital were aghast network at a hotel. In addition to a remote office,
12:56
the answer will be See these architecture provides centralized management of where the enterprise can apply security policies. Pushy configurations, right is an honor right because it's not demand. BPM begins Always all
13:11
B. I's not right because you know all those type of workers also needs of waste in the video or Vo De isn't all right, right?
13:24
OK. In today's brief lecture, we discussed Enterprise Branch architecture and title character design.
13:30
Any questions? Few free. Contact me. Otherwise
13:33
I was feeling extra video bye for now.

Up Next

CCDA (Cisco Certified Design Associate)

In this CCDA training you will learn the knowledge and skills involved in attaining your Cisco Certified Design Associate (CCDA) certification.

Instructed By

Instructor Profile Image
Wayne Xing
Network Solutions Architect
Instructor