Network Services - CompTIA A+ 220-1101 - 2.4

00:17:11
https://www.youtube.com/watch?v=nuJamkM4RsM

Resumen

TLDRO vídeo explora serviços essenciais em data centers, incluindo DNS, DHCP, servidores de arquivos, impressão e email, destacando a importância de cada um para a comunicação e operação contínua nas organizações. Aborda a segurança em redes, como gateways de email e firewalls, além de discutir a gestão de dispositivos IoT e sistemas legados. Mostra também como os balanceadores de carga garantem efetividade e disponibilidade do serviço, configurando uma visão abrangente dos desafios que os data centers enfrentam na manutenção e operação de suas infraestruturas.

Para llevar

  • 🖥️ O servidor DNS converte nomes de domínio em endereços IP.
  • 🔑 O DHCP atribui endereços IP automaticamente.
  • 📁 Servidores de arquivos possibilitam acesso remoto a documentos.
  • ✉️ Gateways de email filtram spam e ameaças.
  • ⚖️ Balanceadores de carga distribuem cargas de trabalho para evitar falhas.
  • 📡 Dispositivos IoT conectam eletrodomésticos à rede.
  • 🏛️ Sistemas legados podem ser difíceis de manter, mas são críticos.
  • 🔒 Firewalls e proxies adicionam segurança à rede.
  • 📈 A gestão centralizada de logs facilita monitoramento e resposta a incidentes.
  • 🔄 Segurança cibernética é essencial para proteger serviços e dados.

Cronología

  • 00:00:00 - 00:05:00

    Neste vídeo, a apresentação começa com uma visão geral de um data center, destacando a presença de servidores DNS e DHCP. O servidor DNS é fundamental para a conversão de nomes de domínio em endereços IP, enquanto o servidor DHCP fornece configurações automáticas de IP para dispositivos conectados à rede, garantindo que os usuários possam se conectar facilmente e usar os serviços disponíveis sem complicações. Além disso, é mencionado como as organizações mantêm múltiplos servidores para redundância e garantir a disponibilidade contínua do serviço.

  • 00:05:00 - 00:10:00

    Continuando, são discutidos servidores de arquivos e de impressão, que são essenciais em ambientes empresariais. O servidor de arquivos centraliza o armazenamento de informações, permitindo que os usuários acessem seus arquivos de qualquer dispositivo na rede. Os servidores de impressão, por sua vez, conectam impressoras à rede para facilitar o acesso aos serviços de impressão. O vídeo também menciona a importância dos servidores de e-mail e da agregação de logs, através de protocolos como Syslog, para centralizar a coleta de informações de eventos e facilitar a administração.

  • 00:10:00 - 00:17:11

    Por fim, é abordado o conceito de firewalls de próxima geração e servidores proxy, que aumentam a segurança das comunicações da rede. A utilização de balanceadores de carga melhora a disponibilidade e a gestão de recursos, otimizando o desempenho total do ambiente. Além disso, o vídeo cita sistemas SCADA e dispositivos IoT, destacando como a segurança e a segmentação adequada são fundamentais para proteger esses sistemas contra acessos não autorizados.

Mapa mental

Vídeo de preguntas y respuestas

  • O que é um servidor DNS?

    Um servidor DNS (Domain Name System) converte nomes de domínio em endereços IP, facilitando a navegação na web.

  • Para que serve o servidor DHCP?

    O DHCP (Dynamic Host Configuration Protocol) atribui automaticamente endereços IP e configurações de rede a dispositivos.

  • Qual é a função de um servidor de arquivos?

    Um servidor de arquivos armazena e gerencia arquivos de forma centralizada, permitindo acesso remoto aos usuários.

  • O que é um gateway de email?

    Um gateway de email gerencia o tráfego de emails entre a internet e a rede interna, filtrando spam e ameaças.

  • Como funciona um balanceador de carga?

    Um balanceador de carga distribui solicitações entre vários servidores, garantindo que o sistema permaneça disponível mesmo se um servidor falhar.

  • O que são dispositivos IoT?

    Dispositivos IoT (Internet das Coisas) conectam-se à rede para executar funções específicas, como automação e controle de ambientes.

  • Como se gerenciam sistemas legados em um data center?

    Sistemas legados geralmente permanecem em funcionamento devido à sua importância, mas podem apresentar desafios de suporte e manutenção.

Ver más resúmenes de vídeos

Obtén acceso instantáneo a resúmenes gratuitos de vídeos de YouTube gracias a la IA.
Subtítulos
en
Desplazamiento automático:
  • 00:00:02
    if you've ever worked in a data center
  • 00:00:03
    or you have an organization that has a
  • 00:00:05
    data center then this picture probably
  • 00:00:07
    looks familiar it's row after row after
  • 00:00:10
    row of 19-inch racks and those racks
  • 00:00:13
    have inside of them many different types
  • 00:00:15
    of computing systems in this video we'll
  • 00:00:18
    look at many different kinds of network
  • 00:00:20
    services and see what types of things
  • 00:00:22
    might be running inside of this
  • 00:00:23
    company's data center
  • 00:00:25
    almost every organization and every data
  • 00:00:28
    center has inside of it a dns server dns
  • 00:00:31
    stands for domain name system and it's a
  • 00:00:33
    service that's primarily responsible for
  • 00:00:35
    converting between fully qualified
  • 00:00:37
    domain names and ip addresses so if you
  • 00:00:40
    go into a browser and type
  • 00:00:41
    www.professormesser.com
  • 00:00:44
    that browser will ask the dns server
  • 00:00:46
    what's the ip address of
  • 00:00:49
    www.professormesser.com that ip address
  • 00:00:51
    will be provided to the browser and from
  • 00:00:53
    that point forward the browser uses the
  • 00:00:55
    ip address of my web server to
  • 00:00:57
    communicate back and forth to your
  • 00:00:59
    browser dns is a distributed naming
  • 00:01:02
    system which means you might have many
  • 00:01:04
    different dns servers in your
  • 00:01:05
    environment and outside of your
  • 00:01:07
    organization you're probably
  • 00:01:09
    communicating with many other dns
  • 00:01:11
    servers as well as you can probably tell
  • 00:01:13
    this conversion process between a fully
  • 00:01:15
    qualified domain name and an ip address
  • 00:01:18
    is critical for the entire
  • 00:01:19
    communications process it's usually
  • 00:01:21
    managed by your local i.t department or
  • 00:01:23
    an internet service provider and they
  • 00:01:26
    usually have multiple dns servers to
  • 00:01:28
    ensure that this service is always
  • 00:01:30
    available to your users
  • 00:01:32
    another common service that you'll find
  • 00:01:34
    in a data center is a dhcp server this
  • 00:01:36
    stands for dynamic host configuration
  • 00:01:39
    protocol and this is the service that
  • 00:01:41
    automatically assigns and configures ip
  • 00:01:43
    address settings on your local device
  • 00:01:45
    this is a service that we've become very
  • 00:01:47
    accustomed to having we can plug in or
  • 00:01:49
    connect to anyone's network and we're
  • 00:01:51
    automatically provided ip addresses dns
  • 00:01:54
    settings and everything else we need to
  • 00:01:56
    be able to communicate on that network
  • 00:01:58
    if you have a wireless router or cable
  • 00:02:01
    modem that's used for internet
  • 00:02:02
    connectivity then that device probably
  • 00:02:04
    is also running a dhcp server inside of
  • 00:02:08
    it if you're in an enterprise i.t
  • 00:02:09
    department there will probably be
  • 00:02:11
    multiple dhcp servers to provide
  • 00:02:13
    redundancy should one dhcp server become
  • 00:02:16
    unavailable here's a very simple dhcp
  • 00:02:19
    configuration on a home router you can
  • 00:02:22
    see that the lease time is set to one
  • 00:02:23
    week that's how long someone can retain
  • 00:02:25
    a single ip address before they have to
  • 00:02:28
    check back in and renew that address and
  • 00:02:30
    there's a range of ip addresses that are
  • 00:02:32
    assigned by this dhcp server starting at
  • 00:02:35
    10.1.10.10 all the way through
  • 00:02:37
    10.1.10.199
  • 00:02:40
    now that you can connect to the network
  • 00:02:42
    you can also store files on the network
  • 00:02:44
    in a file server this is a centralized
  • 00:02:46
    storage device usually with a set of
  • 00:02:49
    folders that you can use to store all of
  • 00:02:51
    your information and because these are
  • 00:02:53
    stored on the network you can log in
  • 00:02:55
    from any device and have access to your
  • 00:02:57
    personal files
  • 00:02:58
    the operating system you're using has a
  • 00:03:00
    common way to communicate to this file
  • 00:03:02
    server if you're in windows you're
  • 00:03:04
    probably using smb or the server message
  • 00:03:07
    block if you're using mac os you're
  • 00:03:10
    probably using afp or the apple filing
  • 00:03:12
    protocol from a user's perspective they
  • 00:03:15
    have no idea what protocols are in use
  • 00:03:17
    on the network all they see is some type
  • 00:03:19
    of file management front end and then
  • 00:03:21
    they can copy files delete files rename
  • 00:03:24
    files or do anything else they would do
  • 00:03:26
    on this file system located on the
  • 00:03:28
    centralized file server
  • 00:03:31
    if you work in an enterprise environment
  • 00:03:33
    we usually connect printers to the
  • 00:03:34
    network and then we put those printers
  • 00:03:36
    in centralized areas that are close to
  • 00:03:38
    the users we're able to connect to the
  • 00:03:40
    network by using a print server this is
  • 00:03:43
    usually hardware or software that allows
  • 00:03:45
    us to connect this printer to the
  • 00:03:47
    network so that everyone can access that
  • 00:03:49
    centralized resource this print server
  • 00:03:52
    may be software that's running on a
  • 00:03:53
    computer that has a printer connected to
  • 00:03:55
    it and everyone on the network would
  • 00:03:57
    send their print jobs to this computer
  • 00:03:59
    so that the print server can then access
  • 00:04:01
    those jobs and print them on the printer
  • 00:04:03
    many printers might also have a hardware
  • 00:04:06
    card like the one you see here that
  • 00:04:07
    plugs into the back of the printer
  • 00:04:09
    allows the printer to connect directly
  • 00:04:11
    to an ethernet connection some printers
  • 00:04:14
    also have wireless print servers inside
  • 00:04:16
    so you can simply connect to the
  • 00:04:17
    wireless network to provide those print
  • 00:04:19
    services there are usually some
  • 00:04:21
    standardized protocols that allow you to
  • 00:04:22
    send these print jobs to a print server
  • 00:04:25
    and usually you'd be running smb or
  • 00:04:27
    server message block especially if
  • 00:04:28
    you're running windows but you can also
  • 00:04:30
    use ipp or the internet printing
  • 00:04:32
    protocol or lpd or the line printer
  • 00:04:35
    daemon
  • 00:04:37
    another important service that often
  • 00:04:38
    requires 100 uptime and availability is
  • 00:04:41
    a mail server this is the server
  • 00:04:44
    responsible for sending and receiving
  • 00:04:46
    mail for your organization because the
  • 00:04:48
    service is so critical it's often
  • 00:04:50
    managed by our local it team or we may
  • 00:04:53
    be using an isp or cloud-based service
  • 00:04:55
    to provide these mail services we often
  • 00:04:58
    know very quickly if there's a problem
  • 00:04:59
    with the mail services because
  • 00:05:01
    practically everyone in the organization
  • 00:05:03
    is using them that's why there's usually
  • 00:05:05
    a 24-hour a day seven day a week support
  • 00:05:07
    service and if the mail server has a
  • 00:05:09
    problem you instantly can have someone
  • 00:05:11
    connect to that service to see exactly
  • 00:05:13
    how to troubleshoot the problem
  • 00:05:16
    we've already mentioned a number of
  • 00:05:18
    services for example the dns server the
  • 00:05:20
    dhcp server the file server and others
  • 00:05:24
    with all of these systems there are logs
  • 00:05:25
    and messages that are important for
  • 00:05:27
    administrators to be able to have access
  • 00:05:29
    to
  • 00:05:30
    instead of having the administrator
  • 00:05:32
    manually access the individual logs that
  • 00:05:34
    are located on each individual service
  • 00:05:37
    we can consolidate all of those logs
  • 00:05:39
    back to a central database one of the
  • 00:05:42
    protocols that allows us to consolidate
  • 00:05:44
    these log files is called syslog this is
  • 00:05:47
    a very common standard if your system
  • 00:05:49
    collects logs then it probably has the
  • 00:05:51
    option to send those logs to a
  • 00:05:53
    centralized database using syslog
  • 00:05:56
    in many organizations we use a security
  • 00:05:59
    information and event manager to collect
  • 00:06:02
    all of these log files we usually refer
  • 00:06:04
    to this as a sim as you can imagine log
  • 00:06:07
    files take a lot of room so the sim
  • 00:06:09
    usually has a very large drive array and
  • 00:06:12
    we're able to store a large number of
  • 00:06:14
    files over a very extended period of
  • 00:06:16
    time
  • 00:06:17
    many organizations will have one or many
  • 00:06:20
    different web servers and those servers
  • 00:06:22
    are responsible for responding to
  • 00:06:24
    browser requests that you would make
  • 00:06:25
    from your computer these use standard
  • 00:06:27
    protocols such as http or https and they
  • 00:06:31
    build pages out using specialized
  • 00:06:33
    languages such as html or html5 these
  • 00:06:37
    pages could be static pages that are
  • 00:06:39
    simply transferred across the network or
  • 00:06:41
    the web server may be responsible for
  • 00:06:43
    dynamically creating the page and then
  • 00:06:46
    sending that page down to the browser
  • 00:06:49
    in an enterprise we might often start
  • 00:06:51
    our day by logging in to our local
  • 00:06:53
    computer or we may be connecting from a
  • 00:06:55
    vpn and we would use a username and
  • 00:06:58
    password to provide that authentication
  • 00:07:00
    and often the authentication that we
  • 00:07:02
    would use between all of these different
  • 00:07:03
    services is identical so how does the
  • 00:07:06
    enterprise use the same authentication
  • 00:07:08
    method across all of these different
  • 00:07:10
    servers in most cases the organization's
  • 00:07:13
    using an authentication server which
  • 00:07:15
    centralizes all of those usernames and
  • 00:07:18
    passwords to a single service this isn't
  • 00:07:20
    something we would commonly use on a
  • 00:07:22
    home network because we don't have a lot
  • 00:07:24
    of services that we're logging into on
  • 00:07:26
    our local network but on an enterprise
  • 00:07:28
    network there are many different
  • 00:07:30
    services that we would want to access
  • 00:07:32
    and this centralized authentication
  • 00:07:33
    server provides us with a way to not
  • 00:07:36
    only provide access to those services
  • 00:07:38
    but do it in a way that our usernames
  • 00:07:40
    and passwords are protected
  • 00:07:42
    as you can imagine if the authentication
  • 00:07:44
    server is not available then no one
  • 00:07:46
    would be able to log in and use any of
  • 00:07:48
    the resources on your network for that
  • 00:07:51
    reason this is considered to be a very
  • 00:07:53
    critical resource and it's very common
  • 00:07:55
    for organizations to have multiple
  • 00:07:57
    authentication servers on their network
  • 00:07:59
    for redundancy
  • 00:08:01
    your mail client probably has a separate
  • 00:08:04
    folder already configured inside of it
  • 00:08:06
    called spam that spam folder takes any
  • 00:08:08
    messages which may be unsolicited
  • 00:08:11
    attempts at getting your attention and
  • 00:08:13
    puts all of those messages into a spam
  • 00:08:15
    folder so that you don't have to read
  • 00:08:18
    them the content of these spam messages
  • 00:08:20
    can vary widely these could be
  • 00:08:21
    commercial attempts to get you to buy
  • 00:08:23
    something it might be someone trying to
  • 00:08:25
    get you to click on a link that sends
  • 00:08:27
    you to a malicious website or maybe a
  • 00:08:30
    phishing attempt which is trying to get
  • 00:08:31
    you to give away some of your personal
  • 00:08:33
    information
  • 00:08:34
    managing all of these spam messages can
  • 00:08:36
    be complex it's already difficult to
  • 00:08:39
    identify the spam message and then we
  • 00:08:41
    also have to manage what we do with
  • 00:08:42
    those messages once they're identified
  • 00:08:45
    there are obviously security concerns we
  • 00:08:47
    have to think about where we're going to
  • 00:08:48
    store this information and for how long
  • 00:08:50
    we're going to keep these spam messages
  • 00:08:52
    stored in our databases
  • 00:08:54
    some organizations will have a separate
  • 00:08:56
    mail gateway in their network in this
  • 00:08:58
    example that mail is being sent and
  • 00:09:00
    received from the internet through a
  • 00:09:02
    firewall that then sends it to the mail
  • 00:09:04
    gateway on a screen subnet these mail
  • 00:09:07
    gateways can also be stored in the cloud
  • 00:09:09
    and there may be a third party provider
  • 00:09:11
    that's being used to provide that
  • 00:09:12
    functionality once the mail is scanned
  • 00:09:15
    it can then be sent to the internal
  • 00:09:17
    network and stored on a local internal
  • 00:09:19
    mail server this gives us the
  • 00:09:21
    opportunity to categorize mail as spam
  • 00:09:23
    or to completely reject the mail and
  • 00:09:25
    prevent its access to the internal
  • 00:09:27
    server
  • 00:09:29
    many organizations have begun
  • 00:09:31
    consolidating many of their security
  • 00:09:33
    functions on the network to a single
  • 00:09:35
    device often this is a next generation
  • 00:09:38
    firewall but you may find older systems
  • 00:09:40
    that do this called a unified threat
  • 00:09:42
    management device or a utm some people
  • 00:09:45
    often refer to this as a web security
  • 00:09:47
    gateway these devices can perform many
  • 00:09:49
    different security functions for example
  • 00:09:51
    you may have url filtering or content
  • 00:09:53
    inspection built into the device these
  • 00:09:55
    may be able to identify malware or the
  • 00:09:58
    transfer of files that may contain
  • 00:10:00
    malware these could be a spam filter on
  • 00:10:02
    their own you might also have other
  • 00:10:05
    networking features such as csu dsu
  • 00:10:07
    capabilities which allow you to connect
  • 00:10:09
    to a wide area network these devices
  • 00:10:12
    often act as routers and they usually
  • 00:10:14
    might also have switch interfaces on the
  • 00:10:16
    back of these devices and of course they
  • 00:10:18
    act also as a firewall so you can allow
  • 00:10:21
    or disallow certain traffic flows
  • 00:10:23
    through your network these devices can
  • 00:10:25
    often act as intrusion detection systems
  • 00:10:27
    or intrusion prevention systems which
  • 00:10:29
    can block known attacks from traversing
  • 00:10:32
    the network these devices can also act
  • 00:10:34
    as bandwidth shapers or quality of
  • 00:10:36
    service devices so that different
  • 00:10:38
    applications can be prioritized in real
  • 00:10:41
    time and if you need people to connect
  • 00:10:43
    to the network that are outside of your
  • 00:10:45
    facility you might want to use an
  • 00:10:47
    encrypted tunnel through a virtual
  • 00:10:49
    private network
  • 00:10:51
    in an enterprise environment we're very
  • 00:10:53
    sensitive to downtime if a server
  • 00:10:55
    becomes unavailable the user may not be
  • 00:10:57
    able to complete certain tasks or they
  • 00:10:59
    may not be able to buy anything from us
  • 00:11:01
    because the server's not responding to
  • 00:11:03
    be able to provide continuous uptime and
  • 00:11:06
    availability we need multiple servers
  • 00:11:08
    and the way that you would distribute
  • 00:11:10
    the load across those servers is with a
  • 00:11:12
    load balancer the load balancer is
  • 00:11:14
    responsible for checking in with all of
  • 00:11:16
    the servers that are connected to it and
  • 00:11:18
    if one particular server becomes
  • 00:11:20
    unresponsive it simply removes that
  • 00:11:23
    server from the load and continues
  • 00:11:25
    operating with the remaining servers
  • 00:11:27
    this is usually the primary reason a
  • 00:11:29
    load balancer is installed is to have
  • 00:11:31
    multiple servers and be able to
  • 00:11:33
    distribute the load across all of those
  • 00:11:35
    devices since the load balancer is
  • 00:11:37
    sitting in the middle of these
  • 00:11:39
    conversations it can also make changes
  • 00:11:42
    to the way certain protocols might work
  • 00:11:44
    for example it's common for a load
  • 00:11:45
    balancer to offload tcp so that it has a
  • 00:11:48
    constant connection between all of the
  • 00:11:50
    servers connected to it this load
  • 00:11:52
    balancer might also be providing ssl
  • 00:11:54
    offloading so all of the encryption and
  • 00:11:56
    decryption from these servers is
  • 00:11:58
    happening on the load balancer instead
  • 00:12:00
    of having the servers manage that
  • 00:12:02
    process themselves
  • 00:12:04
    these load balancers can commonly cache
  • 00:12:05
    information so that requests from the
  • 00:12:07
    internet may not have to go down to a
  • 00:12:09
    server instead the load balancer may
  • 00:12:11
    already have that information in a cache
  • 00:12:13
    and can simply respond back to the
  • 00:12:15
    internet without involving any of the
  • 00:12:17
    connected servers we can also perform
  • 00:12:20
    some very advanced configurations of the
  • 00:12:22
    traffic going through this load balancer
  • 00:12:24
    so we might configure certain web pages
  • 00:12:27
    or certain applications to have priority
  • 00:12:29
    over others we might also tell the load
  • 00:12:31
    balancer that certain applications
  • 00:12:33
    should prioritize to certain servers and
  • 00:12:36
    other applications or web pages can be
  • 00:12:38
    moved to other servers this content
  • 00:12:40
    switching capability allows the load
  • 00:12:42
    balancer to optimize communication with
  • 00:12:44
    the servers that can respond the best
  • 00:12:48
    some organizations have installed proxy
  • 00:12:50
    servers to add additional security to
  • 00:12:52
    their internet communications as the
  • 00:12:54
    name implies a proxy sits in the middle
  • 00:12:57
    of a conversation users will make a
  • 00:12:59
    request to the proxy the proxy then
  • 00:13:01
    makes the request to the third party
  • 00:13:03
    service receives a response from that
  • 00:13:06
    service and then examines the response
  • 00:13:08
    to make sure nothing within that
  • 00:13:09
    response is malicious once everything is
  • 00:13:12
    checked and everything looks okay that
  • 00:13:14
    response is then sent to the end user
  • 00:13:17
    this means that we can put a lot of
  • 00:13:19
    security controls into the proxy the
  • 00:13:21
    proxy connect is access control so it
  • 00:13:23
    may require a username and password to
  • 00:13:25
    gain access to the internet it can
  • 00:13:27
    perform caching it can filter by url and
  • 00:13:30
    many other security capabilities as well
  • 00:13:34
    if you work in an industrial environment
  • 00:13:36
    then you're probably already familiar
  • 00:13:38
    with scada or ics this stands for the
  • 00:13:40
    supervisory control and data acquisition
  • 00:13:43
    system you might also hear this referred
  • 00:13:45
    to as an industrial control system or
  • 00:13:48
    ics
  • 00:13:49
    the scada systems are responsible for
  • 00:13:52
    control and management of these
  • 00:13:54
    industrial machines so if you are part
  • 00:13:56
    of a power company and you have power
  • 00:13:58
    generation equipment or your
  • 00:13:59
    manufacturing company with these large
  • 00:14:01
    manufacturing equipment you might use
  • 00:14:04
    scada to be able to manage those devices
  • 00:14:06
    scada allows us to see exactly what's
  • 00:14:08
    happening on these devices and to be
  • 00:14:10
    able to manage and control these devices
  • 00:14:12
    across the network as you can imagine
  • 00:14:15
    these power generation systems and
  • 00:14:17
    manufacturing equipment can be very
  • 00:14:19
    expensive systems and an outage of these
  • 00:14:21
    systems might have a dramatic impact for
  • 00:14:24
    those reasons scada systems are usually
  • 00:14:26
    segmented from the rest of the network
  • 00:14:27
    and you very often need additional
  • 00:14:29
    rights permissions and connections to
  • 00:14:31
    even gain access to these very important
  • 00:14:34
    systems
  • 00:14:36
    one common theme with data centers is
  • 00:14:38
    once a service is installed it's very
  • 00:14:41
    difficult to get that service removed
  • 00:14:43
    from the data center and often devices
  • 00:14:46
    and services may sit in the data center
  • 00:14:48
    for 10 years or even more we often refer
  • 00:14:51
    to these systems as legacy systems and
  • 00:14:53
    although they're very old they usually
  • 00:14:55
    have an extremely important service
  • 00:14:57
    that's running on them very often these
  • 00:14:59
    legacy systems are running on older
  • 00:15:01
    software or older hardware and it might
  • 00:15:03
    be very difficult to resolve a problem
  • 00:15:05
    with this device just because the
  • 00:15:07
    software and hardware are not well
  • 00:15:09
    supported or may be difficult to obtain
  • 00:15:12
    another type of service you might find
  • 00:15:14
    in your data center is an embedded
  • 00:15:16
    system these are systems where you
  • 00:15:17
    normally don't have access to the
  • 00:15:19
    operating system or any other aspect
  • 00:15:21
    inside of the device instead it is a
  • 00:15:23
    purpose-built device that's designed for
  • 00:15:26
    you to only have access to the service
  • 00:15:28
    or the application that that device
  • 00:15:30
    provides this might be something like an
  • 00:15:32
    alarm system or a door security system
  • 00:15:35
    or perhaps the time card system that you
  • 00:15:37
    use to keep track of when people come to
  • 00:15:39
    work and when they leave those devices
  • 00:15:41
    commonly don't have an operating system
  • 00:15:43
    that we can update or even view and
  • 00:15:45
    because of that we rely on the
  • 00:15:46
    manufacturer of these purpose-built
  • 00:15:48
    systems to be able to provide us with
  • 00:15:50
    support and ongoing maintenance
  • 00:15:54
    and one of the newest category of
  • 00:15:56
    systems that you now find in the
  • 00:15:57
    enterprise are internet of things
  • 00:16:00
    devices or iot we're starting to find an
  • 00:16:03
    increasing number of iot devices not
  • 00:16:06
    only on our enterprise networks but our
  • 00:16:08
    home networks it seems that everything
  • 00:16:10
    we're connecting to a power plug in our
  • 00:16:12
    home is also connecting to our network
  • 00:16:14
    for example we're starting to see
  • 00:16:16
    appliances such as refrigerators and
  • 00:16:18
    ovens connect to the wireless network we
  • 00:16:21
    have smart devices like speakers that
  • 00:16:22
    are responding to our voice commands or
  • 00:16:25
    we might have air control systems that
  • 00:16:26
    allow us to manage the temperature of a
  • 00:16:28
    room all from a centralized app on our
  • 00:16:31
    mobile device these iot devices may also
  • 00:16:34
    be responsible for access at our
  • 00:16:35
    facilities so they might be a smart
  • 00:16:37
    doorbell or they might be responsible
  • 00:16:39
    for unlocking a door or garage this is
  • 00:16:42
    another case where the security of these
  • 00:16:44
    devices is relatively important we
  • 00:16:47
    wouldn't want somebody gaining access to
  • 00:16:48
    our systems because they have access to
  • 00:16:50
    these iot devices so commonly we segment
  • 00:16:53
    iot devices onto their own network or we
  • 00:16:56
    can have additional security and limit
  • 00:16:58
    anyone else from accessing those systems
  • 00:17:10
    you
Etiquetas
  • data center
  • DNS
  • DHCP
  • servidor de arquivos
  • impressão
  • email
  • segurança
  • IoT
  • sistemas legados
  • balanceador de carga