From the course: Cisco Certified Network Associate (CCNA) v1.1 (200-301) Cert Prep
Virtualized devices
From the course: Cisco Certified Network Associate (CCNA) v1.1 (200-301) Cert Prep
Virtualized devices
(upbeat chiming) - [Instructor] In this video, let's talk about device virtualization. For example, let's say that we had a need for three different servers. We need to have an Ubuntu Linux server, we need a Microsoft Windows Server 2022, and maybe we need a Red Hat Enterprise Linux server. One option is to buy three physical servers and install the appropriate operating system on each of those servers, but now, we're taking up extra space, we might have extra power consumption, and if we look at the resource utilization of those individual servers, maybe one or two are just barely using any resources at all. An alternative to that, which might be more cost efficient, is to run those servers virtually on a single physical server, and that single physical server is running software called a hypervisor. And a hypervisor, that's software that can create start, stop, and monitor multiple virtual machines or VMs, and I say virtual machines instead of virtual servers because we can virtualize lots of things. We can have a virtual firewall, a virtual switch, a virtual server, and lots of other virtualized devices. And there are two types of hypervisors I'd like you to know about. The first one is called a Type 1 hypervisor, also known as a native or a bare metal hypervisor. This is where we install the hypervisor software directly on the physical server. In other words, that server's not running Microsoft Windows, and then we put the hypervisor on top of Windows. No, the operating system that server is running is the Type 1 hypervisor. That's what gets installed directly on the server. As an example, I have a couple of physical servers. They each have four network interface cards in them. And on those, I've installed Type 1 hypervisors. Specifically, I'm using VMware ESXi, and on those Type 1 hypervisors, I'm running multiple virtual servers, I'm running virtual routers, a virtual wireless LAN controller, and virtual switches. I'm able to have a complete topology contained in those servers. That's as opposed to a Type 2 hypervisor, also known as a hosted hypervisor. This is going to run on top of a traditional operating system. For example, the machine I'm on right now is a MAC Studio and it's running MacOS. However, from time to time, I need to use some Microsoft Windows applications. So I have a type two hypervisor, it's called Parallels. That is software that's running on this macOS operating system, and it lets me install a virtual Windows 11 computer. So I can be running my macOS apps side-by-side with Microsoft Windows apps, and each virtual machine or VM that we install on this physical server running a hypervisor, each of those VMs are going to have one or more virtual network interface cards or virtual NICs. And if our physical server running the hypervisor has a single physical NIC, then we can use that same physical NIC for all of our VMs to connect out to a switch. If we zoom in on what that looks like, let's say that we're running three VMs, they each have their own virtual NIC, we've got virtual NICs one, two, and three, they connect to a virtual switch that the hypervisor is running, and we can have that virtual switch connect out to a physical NIC, but typically on VMs that I set up, I'll get a physical server that has at least four physical network interface cards, and I can plug some of those network interface cards, maybe into switch ports on VLAN 10, maybe another one on VLAN 20, maybe another one on VLAN 30, all depending on the needs of the VMs running in this hypervisor. But a couple of terms I want you to know, I want you to know what a virtual NIC is. That's our virtual network interface card. That's actually software running on the hypervisor that's acting as a network interface card for a VM, and it's going to have a unique MAC address just as a physical network interface card would have its own MAC address, and we could have multiple virtual NICs plugged into one or more virtual switches running on this hypervisor. In fact, you can have a fairly elaborate topology within your hypervisor. You might have a couple of virtual machines going into one virtual switch, which goes into a virtual router, which then goes to another virtual switch on a different subnet, which then connects out to other virtual devices. All of this can be running inside of a single physical machine.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Lesson 2: Common network architectures and designs2m
-
(Locked)
Three-tier vs. collapsed core architectures5m 1s
-
(Locked)
Spine-leaf design for data centers3m 22s
-
(Locked)
Wide area network (WAN) topologies10m 45s
-
(Locked)
Small office and home office (SOHO) architecture2m 18s
-
(Locked)
Cloud deployment models4m 21s
-
(Locked)
-
-
(Locked)
Lesson 3: Network cabling2m 29s
-
(Locked)
Coax cables and connectors4m 17s
-
(Locked)
Twisted pair cables and connectors6m 29s
-
(Locked)
Ethernet standards for twisted pair cables3m 49s
-
(Locked)
Straight through vs. crossover cables5m 15s
-
(Locked)
Fiber optic cables4m 1s
-
(Locked)
Fiber optic connectors2m 51s
-
(Locked)
Ethernet standards for fiber optic cables4m 4s
-
(Locked)
Power over Ethernet (PoE)5m 35s
-
(Locked)
Troubleshooting common cabling issues6m 24s
-
(Locked)
-
-
(Locked)
Lesson 4: Subnetting2m 24s
-
(Locked)
The need for subnetting6m 33s
-
(Locked)
Calculating available subnets3m 44s
-
(Locked)
Calculating available hosts3m 56s
-
(Locked)
Subnetting practice exercise #14m 8s
-
(Locked)
Subnetting practice exercise #23m 31s
-
(Locked)
Calculating usable ranges of IPv4 addresses5m 52s
-
(Locked)
Subnetting practice exercise #34m 12s
-
(Locked)
-
-
(Locked)
Module 3: IPv6 addressing1m 39s
-
(Locked)
Lesson 1: IPv6 address format and communication2m 16s
-
(Locked)
Hexadecimal numbering7m 31s
-
(Locked)
IPv6 address format3m 57s
-
(Locked)
Shortening an IPv6 address3m 6s
-
(Locked)
IPv6 address shortening exercise2m
-
(Locked)
IPv6 traffic flows2m 39s
-
(Locked)
-
-
(Locked)
Lesson 2: IPv6 address types2m 47s
-
(Locked)
IPv6 global unicast2m 51s
-
(Locked)
IPv6 multicast4m
-
(Locked)
IPv6 link-local2m 54s
-
(Locked)
IPv6 unique local2m 10s
-
(Locked)
IPv6 loopback1m 33s
-
(Locked)
IPv6 unspecified2m 40s
-
(Locked)
IPv6 solicited-node multicast3m 34s
-
(Locked)
Manual IPv6 address assignment6m 42s
-
(Locked)
EUI-642m 56s
-
(Locked)
Dynamic IPv6 address assignment10m 55s
-
(Locked)
-
-
(Locked)
Lesson 5: Spanning Tree Protocol (STP)3m 30s
-
(Locked)
STP port states9m 5s
-
(Locked)
STP exercise7m 24s
-
(Locked)
STP convergence times2m 59s
-
(Locked)
PVST+ theory and configuration13m 36s
-
(Locked)
Portfast4m 14s
-
(Locked)
Root guard6m 14s
-
(Locked)
Loop guard6m 56s
-
(Locked)
BPDU filter6m 53s
-
(Locked)
BPDU guard7m 32s
-
(Locked)
MSTP theory2m 43s
-
(Locked)
Rapid PVST+ theory9m 10s
-
(Locked)
Rapid PVST+ configuration6m 58s
-
(Locked)
-
-
(Locked)
Module 6: Wireless networks1m 20s
-
(Locked)
Lesson 1: Overview of wireless networks1m 49s
-
(Locked)
Wireless access points5m 41s
-
(Locked)
Wireless LAN (WLAN) designs2m 48s
-
(Locked)
Access point modes7m
-
(Locked)
Service set terminology3m 47s
-
(Locked)
Radio frequency (RF) basics10m 10s
-
(Locked)
Wireless interference2m 2s
-
(Locked)
-
-
(Locked)
Lesson 4: Network management services1m 35s
-
(Locked)
Options for network management access6m 40s
-
(Locked)
Artificial intelligence (AI) for network management12m 9s
-
(Locked)
Simple Network Management Protocol (SNMP) theory4m 46s
-
(Locked)
SNMP configuration7m 53s
-
(Locked)
Syslog5m 52s
-
(Locked)
Configuring remote access with secure shell (SSH)3m 34s
-
(Locked)
FTP and TFTP6m 58s
-
(Locked)
-
-
(Locked)
Module 8: Network security2m 6s
-
(Locked)
Lesson 1: Threats and defense3m 55s
-
(Locked)
CIA triad4m 16s
-
(Locked)
Threats vs. vulnerabilities2m 14s
-
(Locked)
Social engineering attacks7m 43s
-
(Locked)
Denial-of-service attacks5m 42s
-
(Locked)
Other common attacks9m 10s
-
(Locked)
Password protection of Cisco devices11m 19s
-
(Locked)
Authentication, authorization, and accounting (AAA)8m 42s
-
(Locked)
Multifactor authentication2m 12s
-
(Locked)
Encryption9m 23s
-
(Locked)
Virtual private networks (VPNs)10m 14s
-
(Locked)
Password best practices3m 58s
-
(Locked)
Wireless security protocols10m 9s
-
(Locked)
Configuring a wireless LAN for WPA2 with a pre-shared key2m 3s
-
(Locked)
-
-
(Locked)
Lesson 3: Layer 2 security features1m 17s
-
(Locked)
DHCP snooping theory4m 4s
-
(Locked)
DHCP snooping configuration3m 46s
-
(Locked)
Dynamic ARP Inspection (DAI) theory4m 9s
-
(Locked)
Dynamic ARP Inspection (DAI) configuration15m 33s
-
(Locked)
Port security theory5m 16s
-
(Locked)
Port security configuration7m 34s
-
(Locked)