As a seasoned tech expert in Silicon Valley with over 20 years of experience as a Computer Engineer and more than a decade as an IT Instructor, I’ve launched this channel to share my knowledge and guide you towards achieving your educational and career aspirations. Let's embark on this journey together and unlock your full potential! 💪
Areas I cover on this channel:
🚀 IT Career Development & Industry Insights!
👨💻 Network Engineering & Sales Engineering!
📚 Certifications: CCNA, CCNP & More!
If you follow this channel, I guarantee that you will find super valuable content that will turn you into a productivity monster and take your career to the next level. So what's holding you back? Hit subscribe and let's go 🚀
Пікірлер
Correction: At minute 8:14 in the video, I meant to say Fabric Extender (FEX), not Fabric Interconnect (FI). The FI connects to the UCS chassis through I/O Modules (IOMs) or FEX using high-speed Ethernet or FCoE cables. My apologies for the mistake and thanks to @jploehn for pointing this out.
Hi Naj... I like your You Tube videos. They are usually very accurate. You made a mistake on this one by identifying the IO Modules on the back of the Cisco UCS blade chassis as Fabric Interconnects. Those are IO Modules that uplink to the Fabric Interconnects. You might want to correct your video for accuracy.
Thank you so much for your kind words and for pointing out the mistake in the video. I appreciate your support and your sharp eye for detail! Unfortunately, KZread doesn't allow me to edit the video after it's been published. However, I've provided a written correction and pinned it as the top comment so viewers can easily spot the mistake. Thank you again for helping me ensure the accuracy of my content!
@@NajQazi my pleasure Naj. You produce some great stuff and only want the best for you and your subscribers. Keep those videos coming!!
Thank you sir
Great explanation! Thanks for sharing!
Glad it was helpful!
Great video! TY
Glad you enjoyed it!
Nobody wants to run ciscos monster mash of lisp lets be real.
The Cisco Catalyst Center, formerly DNA Center or SD-Access, is a powerful tool. Customers who have it deployed often find that once they overcome the initial learning curve, they enjoy its capabilities. This is because it can automate the deployment, management, and monitoring of the entire campus network fabric.
Dude I hit 15k a day😂
Love it. I'm happy for you. Keep it up! I just started hitting the gym lifting weights 4 days a week. At the same time I'm challenging myself to hit 5k steps a day. Overtime I would love to increase that target to 10k steps a day. My average last week was about 7.5k steps a day. So I might get there sooner than later.
Love the inspiration, Naj
😊
Dear Naj, Thank you so much for sharing. I just love your course and the way you present it. Signed, The ONLY ONE on planet Earth who did not knew vlan1 is default vlan. (you made my day with this one)
Wow, I really appreciate your support! Thanks for subscribing, and I'm thrilled that you're loving my content!
Well has that prov when connecting 3com kit to cisco before
Short and concise video. Thank you
Appreciate your feedback. Glad it was helpful!
thx alot bro 💐
Keep shining, keep burning my love❤️
Love you and appreciate you 😘
Sir.first i wanna appreciate you for everything you have done here.May God in His infinite and majestic love and grace continue to be with you and yours.please i do have a question. Can i be able to take the cisco exam after taking this course?
Your kind words mean a lot. This course is your key to success. I recommend getting the official CCNA study guide to ensure you're fully prepared. You can find the link to the study guide in the video description. I hope this guidance proves valuable to you!
Always great content
Thank you!
Hi My Freind Pls start ACI Series thanks
Thanks so much for your feedback! I have a lot of topics to cover in the coming weeks and months, so I won't be able to focus exclusively on ACI. I hope you understand, and I really appreciate you sharing your thoughts!
Music so annoying.
This is one of my initial videos, and I was still learning how to create content. I admit that I could have done better without including music.
crisp and clear video mate !
Glad you liked it
Hi there, Could you please advise me the best way to move forward in terms of Studying, CCNA.. Would it be possible if you can guide me on this issue? Because I'm new to this and I would like to study it and move on to 1 day. Get a job in that field.
Absolutely! Here are the steps in simpler terms: 1. **Learn the Basics:** Start with the basics of networking. My course offers a great starting point. 2. **Get Study Materials:** Use Cisco's official CCNA study guide. 3. **Practice Hands-on:** Use tools like Cisco Packet Tracer to practice what you learn. 4. **Join a Group:** Study with others to stay motivated and get support. 5. **Do Practice Tests:** Take practice exams to get used to the test format. 6. **Be Consistent:** Study regularly and stick to your schedule. 7. **Network:** Connect with professionals in the field for advice and job leads. Stay focused, keep learning, and you'll get there. Good luck!
clear: ip route network ip address you with to target the netmask of this ip address then ip address of the next router's interface pointing towards us.
*IP ROUTE* followed by *DESTINATION NETWORK & SUBNET MASK* followed by *NEXT HOP IP*
1. Is it possible to upload slides and provide a link in the description? If so, share slides. 2. What about CCNP & CCIE course are you planning to make its courses. Your way of explaining concept is exceptional and to the point. 👍👍👍
I will share the presentation slides shortly. In the coming days, I intend to create content covering AI, Cybersecurity, and Cloud technologies and provide industry insights.
VTP stands for Vlan Trunking Protocol not Virtual Trunking Protocol.
You're absolutely right and thank you for pointing that out for others. I'll also make a note for others. Have a wonderful day ahead!
@@NajQazi Thanks for your efforts and work!
Go over eigrp please
Cisco Software-Defined Access (SDA) primarily leverages Intermediate System to Intermediate System (IS-IS) as the underlying routing protocol for its control plane. While Enhanced Interior Gateway Routing Protocol (EIGRP) is supported in the broader Cisco DNA architecture, it is not the default or recommended protocol for the SDA fabric control plane. EIGRP can be used in traditional network segments that connect to the SDA fabric, but the SDA fabric itself will rely on IS-IS for internal routing. Hope this helps!
@@NajQazi thank you sir
Another great video on SDN platform and thank you very much for all the hardwork
Music to my ears. Appreciate your feedback!
hey man thanks but i dont wana watch this video if thats cool?
LOL. Does AI scare you?
Thanks for the explainer video. This will help me immensely in a presentation later this week about AI and SDA! #cisco #AI
Glad it was helpful. Best of luck, brother!
Best video found over internet on sdwan ,thank you
Glad it was helpful!
Thank you so much Best explanation out there you are very underrated
I appreciate that!
Thanks a lot. I completely understand now.
Glad it helped!
Thank you
You're welcome
Amazing!
Thanks!
This might be a dumb question but is it possible to have traffic route automatically to different address if that certain address is down.
Great question! The simple answer is yes, you can use object tracking to achieve this. Object tracking allows you to monitor and track various objects. If you have an active/passive architecture, you can track the next hop of the primary route, which would be the IP address of your service provider's PE device. In the event that it goes down, object tracking can automatically facilitate failover. Hope this helps!
maybe i am just stupid.. but could u make ur explanation simpler
Could you elaborate?
What is interface here?
I am referring to a physical or logical interface on a Cisco router, switch, or firewall. I hope this helps!
Nice post, Thank You!
Glad you enjoyed it
Sir at 7:32:01, the example you solved involved /17, and you calculated out it will have 512 subnets, can you recheck and tell me as I did according you told to check the least significant bit in the modified subnet mask which I did it was only 1 so we will do 2 the power 1 which will be two so we will be having 2 subnets for /17, am I right, kindly confirm me and correct if I am wrong.
To determine the decimal number of the last network bit position in the modified third octet for a /17 subnet mask: *1. Subnet Mask /17 Analysis:* --> First octet (8 bits): 89. --> Second octet (8 bits): Fully utilized. --> Third octet (1 bit): Network bit. *2. Positioning in the Third Octet:* --> The first bit in the third octet is used for the network, and the remaining 7 bits are for hosts. *3. Binary Representation of the Third Octet:* --> Network bit: 1xxxxxxx (where x represents host bits). *The decimal equivalent of the bit position in the third octet:* --> The last network bit position in the third octet is 10000000 in binary. --> Converting 10000000 to decimal gives 128. *Summary:* --> The decimal number of the last network bit position in the modified third octet is 128. Hope this helps!
i luv u
Appreciate the love!
That was an awesome and clear explanation of what ACLs and ACEs are, but it would have been nice to see some examples of the function of real ACLs, like DENY ICMP or some other traffic manipulation... There seems to be so many logic bombs with ACLs, you can find yourself locked out of your own switch if you aren't careful...
I'm glad you enjoyed the video. I agree with you about the importance of being careful when applying ACL to a switch/router/FW to avoid locking yourself out. It's crucial to thoroughly consider and understand the direction in which the ACL needs to be applied.
Its a great course and also im grateful to learn from you sir i have a doubt whether labs used in this course is enough or do i need to do more labs can you guide me further ❤
I recommend purchasing the CCNA official study guide, which contains plenty of labs. I have mentioned this in the introduction, and there is also a link to the study guide in the video description. Best of luck with your exam!
Which course is this video originally a part of?
CCNA
You're the best bro
Appreciate the love 😊
Hi Naj, Really liked your videos and would like to be part of your students if you can provide me with detailed information on how I can Easly make it pleases..II
Happy to help. Can you elaborate on what you're looking to achieve?
my favorite mnemonic for OSI model is from layer 1: P-D-N-T-S-P-A Please Do Not Throw Sausage Pizza Away
Love it
CCNA jobs I want to get in Canada
LinkedIn is your friend
@@NajQazi I don't want to be jobless due to AI
recently started it, Thank GOD I found this video, its super helpful, thanks a ton sir!
You're very welcome!
Hi Naj, I am so eager to be atleast somewhere in this field could youd pls help me on this at least to archieve some certifications?
Great to see your enthusiasm! Start by identifying what interests you most. If networking is your focus, this channel is a great resource. Learn a bit every day, and don't get discouraged if progress isn't immediate-worthwhile achievements take time. Hope this helps!
@@NajQazi Thanks Naj, and of course Networking is my field of interest I will try doing my best to achieve my certifications, thanks again for the kind of motivation
On logging server which type of service (ftp, tftp, ???) is required for collecting and storing syslog.
FTP is not typically used for collecting and storing syslog messages. Instead, a dedicated syslog service is required. Common services for this purpose include: - Syslog-NG - rsyslog - Kiwi Syslog Server - Splunk - Graylog These services specifically handle the reception, storage, and management of syslog messages over the network using the syslog protocol (typically UDP port 514 or TCP port 514). Hope this helps!
How does authoritative dns server knows who was the original requestor?
The authoritative DNS server doesn't know the identity of the original requestor. Here's why: The recursive resolver is the middleman: When you type a domain name into your browser, your request typically first goes to a recursive DNS resolver (often provided by your ISP or a third-party service like Google DNS). This resolver acts as an intermediary, performing the various steps to find the IP address associated with the domain. Queries are stateless: Each query sent to an authoritative DNS server is independent and doesn't carry information about the previous queries in the chain. The authoritative server simply responds to the query with the requested DNS records (e.g., the IP address). It doesn't maintain any information about who initiated the original request. Privacy considerations: Revealing the original requestor's IP address to authoritative DNS servers could have privacy implications. This is one of the reasons why DNS resolvers act as intermediaries, shielding the original requester's identity. Exception: There's a potential exception if your resolver is configured to use DNS over HTTPS (DoH) or DNS over TLS (DoT). In these encrypted protocols, the resolver's IP address is visible to the authoritative server. However, even in this case, the authoritative server still wouldn't know the identity of the original device or user who initiated the request on your local network. Hope this helps!
Ive watched almost the full 20hrs of both of these. Thank you for your depth of knowledge
Appreciate your kind words and I'm glad you enjoyed watching my CCNA Course
Got my CCNA last August, start my new job soon and am watching this as an awesome refresher. Thanks!!
You're welcome and best of luck!
Thank you so much for this.
You are welcome!
Thanks, simple and perfect explination
Glad you liked it!