Computer networking & security tutorials, and possibly random videos of social outings to prove to the world that I do, on occasion, step away from the computer!
I'm nine years late, but thank you for sharing this video! I was struggling with understanding how the dynamic routing protocol fits into DMVPNs and NHRP and this video helped me greatly.
Hi Jack, yes I have a CompTIA Network Plus course published through Pearson IT Certification. It's available to the public but also included in many university and public education programs. Maybe for free through your library if in the US. www.pearsonitcertification.com/store/comptia-network-plus-n10-008-complete-video-course-9780137507412
Just found this after trying to understand it by reading multiple online sources and the SVPN official cert guide material. Thanks, Ryan. Your videos are awesome.
The ICMP wiki page has been updated to say it is Layer 3. "ICMP is a network-layer protocol, this makes it layer 3 protocol by the 7 layer OSI model." and "There is no TCP or UDP port number associated with ICMP packets as these numbers are associated with the transport layer above." -- What are your thoughts today on this?
There is a lot of bad information out there, thanks for asking. All ICMP messages (ping , mtu , redirect etc) are included withing a header (ICMP) which is carried within (encapsulation) an IP header. ICMP, IGMP, TCP, UDP, OSPF, GRE are all alike these are messages carried by IP,. Layer 4 goes into Layer 3, always. Check out how many layer 4 protocols exist it's wild :) www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
@@RyanLindfield I agree, the way you explain it, and by all technical accounts you are correct, I am surprised to see such push back elsewhere. Are you still putting out content, where can we find it? Excellent teacher.
I usually watch these at 1.5 times, happy to say it's one of the first videos that made me do a spit take and slow it down to 1.0 times haha. Good content.
I truly regret Ryan stopped adding videos , one of the best networking lecturer , this lesson here , best explanation of differences between ESP and AH , take care Ryan
Thanks so much for your kind words, I'm glad you found the video helpful, it's a tricky thing to explain with words alone.. I promise to release more content in 2023 :).
your explanation is not that much clear. new engineer can not understand. only experienced engineer can understand. if some one experienced, then why does he need your video?
A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their connections Which of the following pieces of equipment would be able to handle this requirement? (A). A VPN concentrator (B). A load balancer (C). A wireless controller (D). A RADIUS server
im very new to this, however is firewalking really done by trace routing and then using ping ttl to be dead on arrival but still knock on the door so to speak? or am i completely off the mark?
@@gareginasatryan6761 You bet, if you change the view to "diagram mode" you'll see it in order from the ethernet header carrying IP which carries ICMP header as it's payload.
Als SSL-VPN (englische Schreibweise: SSL VPN ohne durchkoppelnden Bindestrich) bezeichnet man Systeme, die den Transport privater Daten über öffentliche Netzwerke ermöglichen (siehe VPN) und als Verschlüsselungsprotokoll TLS (alte Bezeichnung: SSL) verwenden. Prinzipiell ist SSL als Verschlüsselungsprotokoll für VPN sowohl für Site-to-Site- als auch End-to-Site-VPNs geeignet. In den 1990er-Jahren gab es Systeme, die SSL als Sicherungsschicht für Site-to-Site-VPNs einsetzten. Mit der Entwicklung von IPsec und der zunehmenden Vernetzung über Organisationsgrenzen hinaus hat das standardisierte, interoperable IPsec sich als Alternative etabliert. Der entscheidende Vorteil von SSL-VPN gegenüber IPsec ist die Bereitstellung des Netzwerk- und Applikationszugriffs für mobile Anwender, da die Konfiguration der Clients einfacher möglich ist als mit einer Lösung durch IPsec. de.wikipedia.org/wiki/SSL-VPN
zenmap, nmap and visualtraceroute are very useful tools that can be used to have resources to deflect a lot of these hacking technologies that are out there. zenmap / nmap can help "map" out on how certain services may work through the internet and how they interconnected. visualtraceroute will assists on locating on where the service may be hosting at geographically and studies on how the communication works with delay if there is.