Techit Tricks

You can download videos of CCNA | Azure | Vmware | AWS | Citrix | HP

CCNA DataCenter DCICN 640-911 [Updated 2017] - Part 4

Hi Folks,

Welcome to the 4th part of CCNA Data Center videos DCICN.
I have uploaded more videos in my previous post inlcuded CCNA Security, Windows Azure, AWS, etc.

If you want any videos specifically please comment below let me upload it in my upcoming video.

Okay, let download the pending 4 videos here.



13. How to Use NX-OS Download Video 13

14. VLANs in NX-OS Download Video 14

15. 802.1Q Truncks in Datacenter Download video 15

16. VTP in DataCenter Download Video 16



Thank you for download all the 16 videos from my blog..

Stay tuned.. keep sharing :)

If you want to thank me.. comment below.

 

CCNA DataCenter DCICN 640-911 [Updated 2017] - Part 3

CCNA Data Center Free videos download - part 3

You can download these videos for free anywhere else, so please share this blog to you friends

I have upload all the videos in 4 parts Each parts contains 4 videos

This is the third part... please stay tuned for another part 




Frame Delivery process Download Video 9

Data Center LAN Switching download video 10

Introducing NX-OS Software Download Video 11

NX OS Features Download Video 12




To download another 4 videos Click here

If you want to thank me comment below

CCNA DataCenter DCICN 640-911 [Updated 2017] - Part 2

CCNA Data Center Free videos download.

You can download these videos for free anywhere else, so please share this blog to you friends

I have upload all the videos in 4 parts Each parts contains 4 videos

This is the second part... please stay tuned for another part 



5. Number Conversion fun Download Video 1

6. Network Layer Addressing Download Video 2

7. Subnetting Download Video 3

8. TCP-IP Transport Layer Download Video 4



To download another 4 videos Click here

If you want to thank me comment below


[FREE download] CCNA DataCenter DCICN 640-911 [Updated 2017]

The Introducing Cisco Data Center Networking (DCICN) exam (200-150) is a hour and a half, 55–65 inquiry appraisal. This exam is one of the exams related with the CCNA Data Center Certification. This exam tests a hopeful's learning of server farm physical foundation, server farm organizing ideas, and server farm stockpiling organizing. The course, Introducing Cisco Data Center Networking v6 (DCICN), will enable possibility to get ready for this exam, as the substance is lined up with the exam points.

The accompanying themes are general rules for the substance liable to be incorporated on the exam. In any case, other related subjects may likewise show up on a particular conveyance of the exam. Keeping in mind the end goal to better mirror the substance of the exam and for lucidity purposes, the rules underneath may change whenever without take note.





I have upload all the videos in 4 parts Each parts contains 4 videos

1. Mastering OSI Model  

Download here

2. Classic Network Devices 



Download Here

3. History of Ethernet 



Download Here

4. Characterizing Datacenter Network


Download Here


To Download next 4 videos click here

Free Download CCNA Security Videos Bundle updated - Zone-Based Firewall - [2017] - Part 3

With the Zone-Based Firewall, we assume interfaces and position them into another coherent switch structure called a zone. A zone is utilized to characterize interfaces that will share a security treatment. Cisco consequently assigns a unique zone for us called the Self Zone. This imperative zone is utilized for controlling movement that is sourced from or coordinated to the switch itself.



The zones we make are put into zone sets. An awesome illustration is having a straightforward Inside Zone matched with an Outside Zone. You at that point apply a unidirectional security treatment to the zone match. Uncommon reason security class-maps are utilized to characterize the movement that we need to apply arrangement to. Beyond any doubt enough, unique reason strategy maps are utilized to characterize the approach, lastly, benefit arrangements are utilized to dole out these zone-based strategy maps to zone sets. For those perusers comfortable with the decade-in addition to old MQC on Cisco switches, this sounds extremely well-known in reality.

When you are doling out strategy to a zone match in a specific heading, you utilize the alternatives of DROP, PASS, or INSPECT. DROP is self-evident. The movement coordinating the class-delineate dropped. PASS is additionally self-evident. The movement is not treated or broke down in any unique way; it is essentially passed starting with one zone then onto the next and characterized in the zone match. The INSPECT choice is the imperative one. This does stateful review (think CBAC) on the activity as characterized in the class-maps.

Here is an illustration. Maybe you have Fa0/0 and Fa0/1 that interface with private systems in your organization. Your interface S0/0 associates with general society Internet. The means for the Zone-Based Firewall setup are as per the following:

Step 1 Define and populate zones.

Step 2 Define the class-maps that distinguish movement streaming between zones.

Step 3 Configure a strategy delineate indicates activities for the movement.

Step 4 Configure the zone match and apply the arrangement.

Click the below link to  download the  second part of security video

Security Video part 3


To download other part of video browse this site.




[Dynamic Port] Free Download CCNA Security Videos Bundle updated [2017] - Part 2

Dynamic port security is incredible however shouldn't something be said about when you interface changes to switches or different gadgets that should be secured in an approach to counteract unapproved gadget swapping in the system. For instance you have a little site area with a 1841 switch and a 3560-8pc switch and an end client gets the splendid thought to swap the 1841 with a WRT54G on the grounds that he needs remote and wired system availability. 




For this situation you can sticky the port that the wan switch is associated with forestalling unapproved gadget swaps like such. 

There are two approaches to arrange a sticky port. The main way being that you arrange a static MAC address while designing port-security on a particular interface. The following way which is more helpful is to arrange a "Sticky" MAC address and leave the maximum MAC delivers to its default estimation of one. At the point when port-security is arranged along these lines, the principal MAC address learned on the switch port will be naturally statically designed into the running-setup as though you physically determined the MAC address.

Click the below link to  download the  second part of security video

Security Video part 2

To download other part of video click here