As a seasoned tech expert in Silicon Valley with over 20 years of experience as a Computer Engineer and more than a decade as an IT Instructor, I’ve launched this channel to share my knowledge and guide you towards achieving your educational and career aspirations. Let's embark on this journey together and unlock your full potential! 💪
Areas I cover on this channel: 🚀 IT Career Development & Industry Insights! 👨💻 Network Engineering & Sales Engineering! 📚 Certifications: CCNA, CCNP & More!
If you follow this channel, I guarantee that you will find super valuable content that will turn you into a productivity monster and take your career to the next level. So what's holding you back? Hit subscribe and let's go 🚀
When I see Packet Tracer labs, they often show networks with five to ten routers. I understand this is for learning about routing, but in a campus network design for a large company, is it really necessary to have that many routers? Wouldn't it be more common to have just one or two routers and use more switches and other devices to manage the network? For example, would a company like a hotel really need as many routers as we see in Packet Tracer labs? I understand that an ISP would, but would a company need that many?
The Cisco Catalyst Center, formerly DNA Center or SD-Access, is a powerful tool. Customers who have it deployed often find that once they overcome the initial learning curve, they enjoy its capabilities. This is because it can automate the deployment, management, and monitoring of the entire campus network fabric.
Love it. I'm happy for you. Keep it up! I just started hitting the gym lifting weights 4 days a week. At the same time I'm challenging myself to hit 5k steps a day. Overtime I would love to increase that target to 10k steps a day. My average last week was about 7.5k steps a day. So I might get there sooner than later.
Dear Naj, Thank you so much for sharing. I just love your course and the way you present it. Signed, The ONLY ONE on planet Earth who did not knew vlan1 is default vlan. (you made my day with this one)
Sir.first i wanna appreciate you for everything you have done here.May God in His infinite and majestic love and grace continue to be with you and yours.please i do have a question. Can i be able to take the cisco exam after taking this course?
Your kind words mean a lot. This course is your key to success. I recommend getting the official CCNA study guide to ensure you're fully prepared. You can find the link to the study guide in the video description. I hope this guidance proves valuable to you!
Thanks so much for your feedback! I have a lot of topics to cover in the coming weeks and months, so I won't be able to focus exclusively on ACI. I hope you understand, and I really appreciate you sharing your thoughts!
Hi there, Could you please advise me the best way to move forward in terms of Studying, CCNA.. Would it be possible if you can guide me on this issue? Because I'm new to this and I would like to study it and move on to 1 day. Get a job in that field.
Absolutely! Here are the steps in simpler terms: 1. **Learn the Basics:** Start with the basics of networking. My course offers a great starting point. 2. **Get Study Materials:** Use Cisco's official CCNA study guide. 3. **Practice Hands-on:** Use tools like Cisco Packet Tracer to practice what you learn. 4. **Join a Group:** Study with others to stay motivated and get support. 5. **Do Practice Tests:** Take practice exams to get used to the test format. 6. **Be Consistent:** Study regularly and stick to your schedule. 7. **Network:** Connect with professionals in the field for advice and job leads. Stay focused, keep learning, and you'll get there. Good luck!
clear: ip route network ip address you with to target the netmask of this ip address then ip address of the next router's interface pointing towards us.
1. Is it possible to upload slides and provide a link in the description? If so, share slides. 2. What about CCNP & CCIE course are you planning to make its courses. Your way of explaining concept is exceptional and to the point. 👍👍👍
I will share the presentation slides shortly. In the coming days, I intend to create content covering AI, Cybersecurity, and Cloud technologies and provide industry insights.
Cisco Software-Defined Access (SDA) primarily leverages Intermediate System to Intermediate System (IS-IS) as the underlying routing protocol for its control plane. While Enhanced Interior Gateway Routing Protocol (EIGRP) is supported in the broader Cisco DNA architecture, it is not the default or recommended protocol for the SDA fabric control plane. EIGRP can be used in traditional network segments that connect to the SDA fabric, but the SDA fabric itself will rely on IS-IS for internal routing. Hope this helps!
Great question! The simple answer is yes, you can use object tracking to achieve this. Object tracking allows you to monitor and track various objects. If you have an active/passive architecture, you can track the next hop of the primary route, which would be the IP address of your service provider's PE device. In the event that it goes down, object tracking can automatically facilitate failover. Hope this helps!
Sir at 7:32:01, the example you solved involved /17, and you calculated out it will have 512 subnets, can you recheck and tell me as I did according you told to check the least significant bit in the modified subnet mask which I did it was only 1 so we will do 2 the power 1 which will be two so we will be having 2 subnets for /17, am I right, kindly confirm me and correct if I am wrong.
To determine the decimal number of the last network bit position in the modified third octet for a /17 subnet mask: *1. Subnet Mask /17 Analysis:* --> First octet (8 bits): 89. --> Second octet (8 bits): Fully utilized. --> Third octet (1 bit): Network bit. *2. Positioning in the Third Octet:* --> The first bit in the third octet is used for the network, and the remaining 7 bits are for hosts. *3. Binary Representation of the Third Octet:* --> Network bit: 1xxxxxxx (where x represents host bits). *The decimal equivalent of the bit position in the third octet:* --> The last network bit position in the third octet is 10000000 in binary. --> Converting 10000000 to decimal gives 128. *Summary:* --> The decimal number of the last network bit position in the modified third octet is 128. Hope this helps!
That was an awesome and clear explanation of what ACLs and ACEs are, but it would have been nice to see some examples of the function of real ACLs, like DENY ICMP or some other traffic manipulation... There seems to be so many logic bombs with ACLs, you can find yourself locked out of your own switch if you aren't careful...
I'm glad you enjoyed the video. I agree with you about the importance of being careful when applying ACL to a switch/router/FW to avoid locking yourself out. It's crucial to thoroughly consider and understand the direction in which the ACL needs to be applied.
Its a great course and also im grateful to learn from you sir i have a doubt whether labs used in this course is enough or do i need to do more labs can you guide me further ❤
I recommend purchasing the CCNA official study guide, which contains plenty of labs. I have mentioned this in the introduction, and there is also a link to the study guide in the video description. Best of luck with your exam!
Hi Naj, Really liked your videos and would like to be part of your students if you can provide me with detailed information on how I can Easly make it pleases..II
Great to see your enthusiasm! Start by identifying what interests you most. If networking is your focus, this channel is a great resource. Learn a bit every day, and don't get discouraged if progress isn't immediate-worthwhile achievements take time. Hope this helps!
@@NajQazi Thanks Naj, and of course Networking is my field of interest I will try doing my best to achieve my certifications, thanks again for the kind of motivation
FTP is not typically used for collecting and storing syslog messages. Instead, a dedicated syslog service is required. Common services for this purpose include: - Syslog-NG - rsyslog - Kiwi Syslog Server - Splunk - Graylog These services specifically handle the reception, storage, and management of syslog messages over the network using the syslog protocol (typically UDP port 514 or TCP port 514). Hope this helps!
The authoritative DNS server doesn't know the identity of the original requestor. Here's why: The recursive resolver is the middleman: When you type a domain name into your browser, your request typically first goes to a recursive DNS resolver (often provided by your ISP or a third-party service like Google DNS). This resolver acts as an intermediary, performing the various steps to find the IP address associated with the domain. Queries are stateless: Each query sent to an authoritative DNS server is independent and doesn't carry information about the previous queries in the chain. The authoritative server simply responds to the query with the requested DNS records (e.g., the IP address). It doesn't maintain any information about who initiated the original request. Privacy considerations: Revealing the original requestor's IP address to authoritative DNS servers could have privacy implications. This is one of the reasons why DNS resolvers act as intermediaries, shielding the original requester's identity. Exception: There's a potential exception if your resolver is configured to use DNS over HTTPS (DoH) or DNS over TLS (DoT). In these encrypted protocols, the resolver's IP address is visible to the authoritative server. However, even in this case, the authoritative server still wouldn't know the identity of the original device or user who initiated the request on your local network. Hope this helps!