Jan

30

2021

BootCamp1:NMA Network Master Associate, Cisco, Microsoft2020

supnatural 30 Jan 2021 16:13 LEARNING » e-learning - Tutorial

BootCamp1:NMA Network Master Associate, Cisco, Microsoft2020
BootCamp1:NMA Network Master Associate, Cisco, Microsoft2020
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .srt | Duration: 67 lectures (7h 49m) | Size: 2.14 GB

Microsoft Server 2019, Cisco ASA & ACS, VOIP CUCM & CME, Sophos Firewall, GNS3, VMware, VPN, RIPv2, OSPF and much more What you'll learn:
Integrate Microsoft server, Cisco devices, VOIP, ASA firewalls and Sophos in 1 network
Design and implement real network "3 offices"
GRE+DMVPN WAN link configuration by using Cisco and other vendors routers
Domain controllers, DHCP & GPO of Windows Server 2019
Integration of Sophos with Active directory
Integration of VOIP systems with Active directory
VLAN implementation
Implementation of security devices like Cisco ACS, ASA

Requirements
CCNA
Prior knoweledge with VMware and GNS3 is desirable

Description
Course description:

This course is to implement Microsoft, Cisco, Firewalls and Security devices in 1 network.

The main goal of this course is to learn how to implement a real network in IT industry from the scratch.

Important Note:

In this course you need to have your own images for Cisco devices like CUCM, ACS .. etc.

Otherwise; you can download the images and evaluation licenses for around $15 from this link

"The link to be send for you with automatic enrollment message once you enroll to this course"

**Please watch Lecture 2: Prerequisites for NMA Bootcamp for more details..

Project Description:

GravityCyber is an IT solutions that has three branch offices as the followings:

• VIC-Site

• Perth-Site

• DC-Site

And it's ordered their network engineers for designing and implementing its networks on each site, connecting them together with a DMVPN over GRE WAN link.

VIC-GW, PERTH-GW, DC-GW-1 and DC-GW-2, are connected to the ISP for an internet connection with a public IP assigned to each, and using this mechanism of connection, they've been configured in a GRE+DMVPN WAN link, making VIC-GW is a hub, and all the rest are considered as peripherals spokes.

Requirements:

• Configure WAN links between VIC-Core-1, VIC-Core-2, VIC-DSW-1 and VIC-DSW-2.

• Configure OSPF between VIC-Core-1, VIC-Core-2, VIC-DSW-1 and VIC-DSW-2 to be in area 0.

• Configure trunk ports on VIC-DSW-1 and VIC-DSW-2, VIC-Access-1, VIC-Access-2, VIC-Access-3 and VIC-Access-4.

• Configure VTP version 3 "GravityCyber .com" on VIC-DSW-1 to be in the primary server mode with an authentication key with cisco.

• Configure VTP version 3 "GravityCyber .com" on VIC-DSW-2, VIC-Access-1, VIC-Access-2, VIC-Access-3 and VIC-Access-4 to be in the client mode with an authentication key with cisco.

• Configure VLANs as shown in the table for VIC-Site, on VIC-DSW-1.

• Configure VIC-DSW-1 to be the default-gateway for VLAN 10 and VLAN 20.

• Configure VIC-DSW-1 to be the default-gateway for VLAN 30 and VLAN 40.

• Configure helper-address on VIC-DSW-1 and VIC-DSW-2 so all hosts on VIC-Site can get an IP from the DC+DHCP-Server and Backup DC+DHCP-Server as an alternate DHCP-Server.

• Configure access-ports on VIC-Access-1, VIC-Access-2, VIC-Access-3 and VIC-Access-4.

• Permit for VLAN 10, VLAN 20, VLAN 30 and VLAN 40 only to go into trunk ports.

• Configure interfaces IP configuration on Sophos-UTM, setting the default-gateway for eth1 and eth2.

• Configure OSPF on eth1, eth0 and eth2 on Sophos-UTM to be on area 0.

• Configure default-route to be announced from Sophos-UTM to VIC-Switches.

• Configure load-balancing between eth1 and eth2 on Sophos-UTM putting eth1 as an active link and eth2 as a standby link.

• Configure interfaces IP configuration on ISP, NAT configuration and default route configuration so any site can connect to the internet.

• Configure interfaces IP configuration on VIC-GW, NAT configuration, OSPF configuration and default route configuration so VIC-Site can go to the internet.

• Configure interfaces IP configuration on Perth-GW, NAT configuration, OSPF configuration and default route configuration so Perth-Site can go to the internet.

• Configure interfaces IP configuration on DC-GW-1 and DC-GW-2, NAT configuration, RIPv2 configuration and default route configuration so DC-Site can go to the internet.

• Configure GRE+DMVPN on VIC-GW, Perth-GW, DC-GW-1 and DC-GW-2 so PERTH-Site, VIC-Site and DC-Site can be connected together.

Download

http://nitroflare.com/view/C2AFC69E3187A0C/BootCamp1NMA_Network_Master_Associate__Cisco__Microsoft2020.part1.rar
http://nitroflare.com/view/CCB9A6D54DC50D9/BootCamp1NMA_Network_Master_Associate__Cisco__Microsoft2020.part2.rar
http://nitroflare.com/view/1A35B6F6E1C39D9/BootCamp1NMA_Network_Master_Associate__Cisco__Microsoft2020.part3.rar

or
http://rapidgator.net/file/a4e41716718743d4dac9ea32a93bed7f/BootCamp1NMA_Network_Master_Associate__Cisco__Microsoft2020.part1.rar.html
http://rapidgator.net/file/d27dd4cb78ad4eca1db53fd7c540a514/BootCamp1NMA_Network_Master_Associate__Cisco__Microsoft2020.part2.rar.html
http://rapidgator.net/file/b7febfaf1321402f910705f799bc0018/BootCamp1NMA_Network_Master_Associate__Cisco__Microsoft2020.part3.rar.html

High Speed Download

Add Comment

  • People and smileys emojis
    Animals and nature emojis
    Food and drinks emojis
    Activities emojis
    Travelling and places emojis
    Objects emojis
    Symbols emojis
    Flags emojis