1 00:00:00,000 --> 00:00:03,390 I have the opportunity to live in Las Vegas, Nevada. 2 00:00:03,390 --> 00:00:05,720 And one of the sayings I've heard about Las Vegas 3 00:00:05,720 --> 00:00:09,030 is that what happens in Vegas stays in Vegas. 4 00:00:09,030 --> 00:00:12,540 Or now, what happens in Vegas, goes on social media. 5 00:00:12,540 --> 00:00:15,980 In a world of VLANs and Layer 2 broadcast domains, 6 00:00:15,980 --> 00:00:18,260 whatever happens in a broadcast domain 7 00:00:18,260 --> 00:00:20,201 stays in that broadcast domain. 8 00:00:20,201 --> 00:00:21,200 But what about computer? 9 00:00:21,200 --> 00:00:23,150 Like, Computer 1 sitting here needs 10 00:00:23,150 --> 00:00:26,270 to communicate with a computer over at the branch office 11 00:00:26,270 --> 00:00:26,990 out here. 12 00:00:26,990 --> 00:00:27,810 How is that done? 13 00:00:27,810 --> 00:00:30,260 How do we get the traffic out of our local network 14 00:00:30,260 --> 00:00:33,590 and send it across the network to the remote location? 15 00:00:33,590 --> 00:00:35,720 And the answer is we're going to leverage 16 00:00:35,720 --> 00:00:39,650 some additional addressing in the TCP/IP protocol stack 17 00:00:39,650 --> 00:00:41,930 and that is addressing at Layer 3, referred 18 00:00:41,930 --> 00:00:44,522 to as IP addressing. 19 00:00:44,522 --> 00:00:45,980 And when we use that IP addressing, 20 00:00:45,980 --> 00:00:49,070 we have devices on a network that forward packets based 21 00:00:49,070 --> 00:00:50,900 on that Layer 3 IP addressing. 22 00:00:50,900 --> 00:00:52,940 Those devices are referred to as routers. 23 00:00:52,940 --> 00:00:54,920 So here we have router 1. 24 00:00:54,920 --> 00:00:56,930 And that's a router primary purpose in life, 25 00:00:56,930 --> 00:01:00,500 is to look at packets and look at the Layer 3 information, 26 00:01:00,500 --> 00:01:02,264 and if those packets need to be forwarded, 27 00:01:02,264 --> 00:01:04,180 those routers-- to the best of their ability-- 28 00:01:04,180 --> 00:01:06,140 will go ahead and forward that packet 29 00:01:06,140 --> 00:01:07,980 to the next device in the path. 30 00:01:07,980 --> 00:01:10,730 So if Computer 1 was trying to reach a PC at the branch 31 00:01:10,730 --> 00:01:13,070 office, the data would need to go here from the computer 32 00:01:13,070 --> 00:01:15,530 to the local router, and then from the local router 33 00:01:15,530 --> 00:01:17,030 and this topology to the firewall, 34 00:01:17,030 --> 00:01:19,010 and then from the firewall to this router, 35 00:01:19,010 --> 00:01:20,384 and then from this router however 36 00:01:20,384 --> 00:01:21,920 it routes out to the remote site. 37 00:01:21,920 --> 00:01:24,140 And that process of forwarding packets 38 00:01:24,140 --> 00:01:26,090 based on that Layer 3 information 39 00:01:26,090 --> 00:01:28,670 is referred to as IP routing. 40 00:01:28,670 --> 00:01:30,320 And although we have separate Nuggets 41 00:01:30,320 --> 00:01:33,110 on the nitty gritty details of IP addressing, 42 00:01:33,110 --> 00:01:35,570 the basic concept of IP addressing 43 00:01:35,570 --> 00:01:38,300 is very similar to streets in a city. 44 00:01:38,300 --> 00:01:40,880 For example, it's very likely that the place that you live, 45 00:01:40,880 --> 00:01:43,340 whether it's a condo, or a house, or apartment 46 00:01:43,340 --> 00:01:45,670 is connected to or on a street. 47 00:01:45,670 --> 00:01:46,880 It has an address. 48 00:01:46,880 --> 00:01:50,300 And all of the other buildings and houses on that same street 49 00:01:50,300 --> 00:01:53,210 have something in common, and that's that common street name. 50 00:01:53,210 --> 00:01:56,420 Well in the world of IP networks, each of our networks 51 00:01:56,420 --> 00:01:59,450 is also going to have a name, very similar to a street name, 52 00:01:59,450 --> 00:02:01,521 except we call it a network address. 53 00:02:01,521 --> 00:02:03,020 So for our discussion, let's imagine 54 00:02:03,020 --> 00:02:05,870 that this is one network here at the corporate office, 55 00:02:05,870 --> 00:02:09,229 and that we've assigned a street name for an IP network address. 56 00:02:09,229 --> 00:02:10,820 And let's imagine that the first three 57 00:02:10,820 --> 00:02:15,136 numbers of this IPv4 address represents the network. 58 00:02:15,136 --> 00:02:16,760 So all the devices here on this network 59 00:02:16,760 --> 00:02:19,370 are going to have an IP address that starts with 10.1.0. 60 00:02:19,370 --> 00:02:20,660 That's like the street name. 61 00:02:20,660 --> 00:02:24,660 And then they'll have individual host numbers or host addresses. 62 00:02:24,660 --> 00:02:28,100 So the printer's at dot 13, Computer 1's at dot 11. 63 00:02:28,100 --> 00:02:30,680 So each of their addresses on this local network 64 00:02:30,680 --> 00:02:34,961 would appear as 10.1.0 dot followed by that last number. 65 00:02:34,961 --> 00:02:36,710 Another network that we have this topology 66 00:02:36,710 --> 00:02:40,900 is this DMZ network up here, and it is network 10.2.0, 67 00:02:40,900 --> 00:02:41,990 for our discussion. 68 00:02:41,990 --> 00:02:43,910 So just imagine the first three numbers 69 00:02:43,910 --> 00:02:45,944 represent the actual network address. 70 00:02:45,944 --> 00:02:47,610 And then over here at the branch office, 71 00:02:47,610 --> 00:02:51,650 we've assigned it the network address of 10.5.0 72 00:02:51,650 --> 00:02:54,620 And we've got some PCs and other devices at that location. 73 00:02:54,620 --> 00:02:57,500 For example, one of our PCs ends in dot 55. 74 00:02:57,500 --> 00:02:59,450 There's a router connected to that network. 75 00:02:59,450 --> 00:03:00,920 It ends in dot 2. 76 00:03:00,920 --> 00:03:02,660 So here's the play by play. 77 00:03:02,660 --> 00:03:05,180 If the user right here at Computer 1 78 00:03:05,180 --> 00:03:08,150 wanted to do a ping request just to verify 79 00:03:08,150 --> 00:03:10,820 that it had connectivity over to the device 80 00:03:10,820 --> 00:03:15,560 at the branch office that was at 10.5.0.55, 81 00:03:15,560 --> 00:03:17,810 the user would get out their command prompt 82 00:03:17,810 --> 00:03:22,490 and they would type in "ping," space "10.5.0.55," 83 00:03:22,490 --> 00:03:24,800 and press Enter, and just hope for the best. 84 00:03:24,800 --> 00:03:28,707 But behind the scenes is where it really gets interesting. 85 00:03:28,707 --> 00:03:30,290 The local computer says, OK, I'm going 86 00:03:30,290 --> 00:03:32,540 to go ahead put together a ping request that's 87 00:03:32,540 --> 00:03:36,942 destined to the Layer 3 IP address of 10.5.0.55 88 00:03:36,942 --> 00:03:38,150 and it's going to be from me. 89 00:03:38,150 --> 00:03:40,100 My source address-- my IP address-- 90 00:03:40,100 --> 00:03:42,200 is 10.1.0.11. 91 00:03:42,200 --> 00:03:44,180 And that goes in the Layer 3 header. 92 00:03:44,180 --> 00:03:46,100 In fact, as a point of convenience, 93 00:03:46,100 --> 00:03:48,800 it might look just like this, the source 94 00:03:48,800 --> 00:03:51,590 address 10.1.0.11 with the destination address 95 00:03:51,590 --> 00:03:53,900 being 10.5.0.55. 96 00:03:53,900 --> 00:03:55,280 But the computer also says this. 97 00:03:55,280 --> 00:04:00,090 Uh oh, I'm on 10.1.0, says PC 1, and the destination 98 00:04:00,090 --> 00:04:03,030 is on a different street-- a different network-- at 10.5.0. 99 00:04:03,030 --> 00:04:06,590 And so at that point, Computer 1, behind the scenes, 100 00:04:06,590 --> 00:04:08,840 realizes that it needs some help. 101 00:04:08,840 --> 00:04:11,570 And if Computer 1 has been configured 102 00:04:11,570 --> 00:04:14,900 to use a default gateway-- 103 00:04:14,900 --> 00:04:18,200 and in this topology, a really good default gateway, 104 00:04:18,200 --> 00:04:20,480 the person to go to, like, the Obi-Wan Kenobi 105 00:04:20,480 --> 00:04:21,680 device-- help us, Obi-Wan. 106 00:04:21,680 --> 00:04:24,080 You're our only hope to get out of this network. 107 00:04:24,080 --> 00:04:25,760 In this case, a good default gateway 108 00:04:25,760 --> 00:04:28,040 that Computer 1 should be configured to use 109 00:04:28,040 --> 00:04:31,479 is the router with the IP address of 10.1.0.1 right here. 110 00:04:31,479 --> 00:04:33,020 And if Computer 1 has been configured 111 00:04:33,020 --> 00:04:35,840 to use that, what Computer 1 will do, 112 00:04:35,840 --> 00:04:38,120 when it creates the Layer 2 frame, 113 00:04:38,120 --> 00:04:41,637 it will put its own Layer 2 address as the source MAC 114 00:04:41,637 --> 00:04:43,970 address, the source hardware address, the source Layer 2 115 00:04:43,970 --> 00:04:47,030 address, and it will put the router's Layer 2 address 116 00:04:47,030 --> 00:04:48,830 as the destination at Layer 2. 117 00:04:48,830 --> 00:04:51,580 So here, if we go back to this frame that's been captured, 118 00:04:51,580 --> 00:04:54,720 the source is PC 1 source address, 119 00:04:54,720 --> 00:04:57,350 which is this bad boy right here in black, 120 00:04:57,350 --> 00:05:00,370 and it's putting the destination Layer 2 address of the router 121 00:05:00,370 --> 00:05:03,280 interface right here in the Layer 2 frame, which 122 00:05:03,280 --> 00:05:04,900 is this guy right there. 123 00:05:04,900 --> 00:05:07,820 And then Computer 1 spits that out on the network. 124 00:05:07,820 --> 00:05:09,730 The switches forward that information 125 00:05:09,730 --> 00:05:11,140 based on the Layer 2 address. 126 00:05:11,140 --> 00:05:14,837 That frame arrives at the router, who opens it up, takes 127 00:05:14,837 --> 00:05:16,670 a look at the Layer 3 information, and says, 128 00:05:16,670 --> 00:05:18,460 hmm, this packet needs to be delivered 129 00:05:18,460 --> 00:05:20,540 to the 10.5.0 network. 130 00:05:20,540 --> 00:05:22,200 So if it knows where to forward it, 131 00:05:22,200 --> 00:05:24,909 it would then make a forwarding decision of that packet. 132 00:05:24,909 --> 00:05:26,950 And at Layer 2, it would send the Layer 2 address 133 00:05:26,950 --> 00:05:28,420 of the next hop in the path. 134 00:05:28,420 --> 00:05:29,680 In this case, it would be the firewall. 135 00:05:29,680 --> 00:05:31,150 And then the firewall would get it. 136 00:05:31,150 --> 00:05:33,600 It would also look at the Layer 3 destination address. 137 00:05:33,600 --> 00:05:35,170 And if it knows how to forward it, 138 00:05:35,170 --> 00:05:37,300 it would rewrite the Layer 2 header 139 00:05:37,300 --> 00:05:39,840 and send it to the next router in the path. 140 00:05:39,840 --> 00:05:42,250 And that would repeat until it gets to its destination 141 00:05:42,250 --> 00:05:42,880 network. 142 00:05:42,880 --> 00:05:44,830 And that, my friends, is an overview 143 00:05:44,830 --> 00:05:46,810 of how IP addresses at Layer 3 can 144 00:05:46,810 --> 00:05:49,030 be used by routers to make forwarding 145 00:05:49,030 --> 00:05:51,290 decisions across the network. 146 00:05:51,290 --> 00:05:53,470 I hope this has been informative for you. 147 00:05:53,470 --> 00:05:57,120 And I'd like to thank you for viewing.