ccna videos by keith barker
Hi Folks,
Welcome to the 4th part of CCNA Data Center videos DCICN.
I have uploaded more videos in my previous post inlcuded CCNA Security, Windows Azure, AWS, etc.
If you want any videos specifically please comment below let me upload it in my upcoming video.
Okay, let download the pending 4 videos here.
13. How to Use NX-OS Download Video 13
14. VLANs in NX-OS Download Video 14
15. 802.1Q Truncks in Datacenter Download video 15
16. VTP in DataCenter Download Video 16
Thank you for download all the 16 videos from my blog..
Stay tuned.. keep sharing :)
If you want to thank me.. comment below.
CCNA Data Center Free videos download - part 3
You can download these videos for free anywhere else, so please share this blog to you friends
I have upload all the videos in 4 parts Each parts contains 4 videos
This is the third part... please stay tuned for another part
Frame Delivery process Download Video 9
Data Center LAN Switching download video 10
Introducing NX-OS Software Download Video 11
NX OS Features Download Video 12
To download another 4 videos Click here
If you want to thank me comment below
CCNA Data Center Free videos download.
You can download these videos for free anywhere else, so please share this blog to you friends
I have upload all the videos in 4 parts Each parts contains 4 videos
This is the second part... please stay tuned for another part
5. Number Conversion fun Download Video 1
6. Network Layer Addressing Download Video 2
7. Subnetting Download Video 3
8. TCP-IP Transport Layer Download Video 4
To download another 4 videos Click here
If you want to thank me comment below
The Introducing Cisco Data Center Networking (DCICN) exam (200-150) is a hour and a half, 55–65 inquiry appraisal. This exam is one of the exams related with the CCNA Data Center Certification. This exam tests a hopeful's learning of server farm physical foundation, server farm organizing ideas, and server farm stockpiling organizing. The course, Introducing Cisco Data Center Networking v6 (DCICN), will enable possibility to get ready for this exam, as the substance is lined up with the exam points.
The accompanying themes are general rules for the substance liable to be incorporated on the exam. In any case, other related subjects may likewise show up on a particular conveyance of the exam. Keeping in mind the end goal to better mirror the substance of the exam and for lucidity purposes, the rules underneath may change whenever without take note.
I have upload all the videos in 4 parts Each parts contains 4 videos
1. Mastering OSI Model
Download here
2. Classic Network Devices
Download Here
3. History of Ethernet
Download Here
4. Characterizing Datacenter Network
Download Here
To Download next 4 videos click here
With the Zone-Based Firewall, we assume interfaces and position them into another coherent switch structure called a zone. A zone is utilized to characterize interfaces that will share a security treatment. Cisco consequently assigns a unique zone for us called the Self Zone. This imperative zone is utilized for controlling movement that is sourced from or coordinated to the switch itself.

The zones we make are put into zone sets. An awesome illustration is having a straightforward Inside Zone matched with an Outside Zone. You at that point apply a unidirectional security treatment to the zone match. Uncommon reason security class-maps are utilized to characterize the movement that we need to apply arrangement to. Beyond any doubt enough, unique reason strategy maps are utilized to characterize the approach, lastly, benefit arrangements are utilized to dole out these zone-based strategy maps to zone sets. For those perusers comfortable with the decade-in addition to old MQC on Cisco switches, this sounds extremely well-known in reality.
When you are doling out strategy to a zone match in a specific heading, you utilize the alternatives of DROP, PASS, or INSPECT. DROP is self-evident. The movement coordinating the class-delineate dropped. PASS is additionally self-evident. The movement is not treated or broke down in any unique way; it is essentially passed starting with one zone then onto the next and characterized in the zone match. The INSPECT choice is the imperative one. This does stateful review (think CBAC) on the activity as characterized in the class-maps.
Here is an illustration. Maybe you have Fa0/0 and Fa0/1 that interface with private systems in your organization. Your interface S0/0 associates with general society Internet. The means for the Zone-Based Firewall setup are as per the following:
Step 1 Define and populate zones.
Step 2 Define the class-maps that distinguish movement streaming between zones.
Step 3 Configure a strategy delineate indicates activities for the movement.
Step 4 Configure the zone match and apply the arrangement.
Click the below link to download the second part of security video
Security Video part 3
To download other part of video browse this site.
Dynamic port security is incredible however shouldn't something be said about when you interface changes to switches or different gadgets that should be secured in an approach to counteract unapproved gadget swapping in the system. For instance you have a little site area with a 1841 switch and a 3560-8pc switch and an end client gets the splendid thought to swap the 1841 with a WRT54G on the grounds that he needs remote and wired system availability.
For this situation you can sticky the port that the wan switch is associated with forestalling unapproved gadget swaps like such.
There are two approaches to arrange a sticky port. The main way being that you arrange a static MAC address while designing port-security on a particular interface. The following way which is more helpful is to arrange a "Sticky" MAC address and leave the maximum MAC delivers to its default estimation of one. At the point when port-security is arranged along these lines, the principal MAC address learned on the switch port will be naturally statically designed into the running-setup as though you physically determined the MAC address.
Click the below link to download the second part of security video
Security Video part 2
To download other part of video click here