1 00:00:00,420 --> 00:00:06,600 Well, now, in this lecture, we're going to talk about the media convertors and the next generation 2 00:00:06,600 --> 00:00:12,660 firewall's, we have actually talked about firewall's in the earlier sections, but I had kept a Next-Generation 3 00:00:12,660 --> 00:00:16,190 Firewall that is NGF w for this lecture. 4 00:00:16,980 --> 00:00:23,380 OK, so media converters are used when you need to convert one type of cabling to another type. 5 00:00:23,880 --> 00:00:30,300 This might be required to convert from one type of fiber to another or from Ethernet to fiber, for 6 00:00:30,300 --> 00:00:35,340 example, a figure on your screen shows and Ethernet to fiber conversion box. 7 00:00:35,740 --> 00:00:40,310 Obviously the location of these devices depends on where the conversion needs to take place. 8 00:00:40,800 --> 00:00:43,230 Media converters operate at layer one. 9 00:00:43,440 --> 00:00:44,910 That is the physical layer. 10 00:00:45,450 --> 00:00:48,510 Now the next is Next-Generation Firewall. 11 00:00:48,780 --> 00:00:58,140 That is NGF w Next-Generation Firewalls, or category of devices that attempt to address traffic inspection 12 00:00:58,380 --> 00:01:04,730 and application of any shortcomings of a traditional stateful firewall without hampering the performance 13 00:01:05,460 --> 00:01:06,540 of other devices. 14 00:01:06,540 --> 00:01:08,460 Also attempt to address these issues. 15 00:01:08,760 --> 00:01:14,510 The need to use a separate internal engine to perform individual security functions. 16 00:01:15,180 --> 00:01:21,390 Well, this means a packet may be examined several times by different engines to determine whether it 17 00:01:21,390 --> 00:01:28,260 should be allowed into the network now Next-Generation firewalls or application of it, which means 18 00:01:28,530 --> 00:01:35,130 they can distinguish between specific applications instead of allowing all the traffic coming in, are 19 00:01:35,140 --> 00:01:36,080 typical ports. 20 00:01:36,840 --> 00:01:43,380 Morogo, they examine packets only once during a deep packet inspection fees, which is required to 21 00:01:43,380 --> 00:01:45,210 detect malware and anomalies. 22 00:01:46,200 --> 00:01:47,630 Well, that's it. 23 00:01:47,640 --> 00:01:52,440 We have completed all the networking devices that you needed to know for this section. 24 00:01:52,920 --> 00:01:55,350 In the next section, in the next lecture, I'm sorry. 25 00:01:55,590 --> 00:02:01,710 In the next lecture, we'll just see the benefits of routers and finally will conclude this section 26 00:02:01,710 --> 00:02:07,740 by having a quick recap and what you actually need to remember from this section. 27 00:02:07,740 --> 00:02:11,370 And I will tell you about a next section which are going to study. 28 00:02:11,850 --> 00:02:16,770 So I'll see you in the next lecture where we will discuss a few benefits of routers and why do we need 29 00:02:16,770 --> 00:02:17,790 routers in the Internet?