Your 70-532 Developing Microsoft Azure Solutions Exam Study Tracker

July 30, 2018 at 8:28 pm

70-532

Here is the latest study tracker! There are four major sections – if you are not seeing them all below – be sure to click the READ MORE option. Enjoy your studies!

Section 1: Create and Manage Azure Resource Manager Virtual Machines (20-25%)

  • Deploy workloads on Azure Resource Manager (ARM) virtual machines (VMs)
    • Identify workloads that can and cannot be deployed; run workloads including Microsoft and Linux; create and provision VMs including custom VM images; deploy workloads using Ansible and Terraform; leverage Azure Reserved Instances (RIs)
  • Perform configuration management
    • Automate configuration management by using PowerShell Desired State Configuration (DSC) or VM Agent (custom script extensions); enable remote debugging; implement VM template variables to configure VMs
  • Scale ARM VMs
    • Scale up and scale down VM sizes; implement Accelerated Networking; deploy ARM VM Scale Sets (VMSS); configure ARM VMSS auto-scale
  • Design and implement ARM VM storage
    • Configure disk caching; plan for storage capacity; configure shared storage; configure geo-replication; implement ARM VMs with Standard and Premium Storage; implement Azure Disk Encryption for Windows and Linux ARM VMs; implement Azure Disk Storage; implement StorSimple
  • Monitor ARM VMs
    • Configure ARM VM monitoring; configure alerts; configure diagnostic and monitoring storage location; enable Application Insights at runtime; Monitor VM workloads by using Azure Application Insights; monitor VMs using Azure OMS Log Analytics; monitor Linux and Windows VMs by using the Azure Diagnostics Extension; monitor VMs by using Azure Monitor
  • Manage ARM VM availability
    • Configure multiple ARM VMs in an availability set for redundancy; configure each application tier into separate availability sets; combine the Load Balancer with availability sets; perform automated VM maintenance; use availability zones to protect from datacenter failures
  • Design and Implement DevTest Labs
    • Create and manage custom images and formulas; configure a lab to include policies and procedures; configure cost management; secure access to labs; use environments in a lab; claim and un-claim VMs; use artifacts to deploy and set up applications

How Juniper Standard Firewall Filters Evaluate Packets

July 28, 2018 at 1:00 pm

Juniper

This post is critical for those students studying for their Enterprise Routing and Switching Certifications.

Firewall Filter Packet Evaluation Overview

The following sequence describes how the device evaluates a packet entering or exiting an interface if the input or output traffic at a device interface is associated with a firewall filter.

Packet evaluation proceeds as follows:

  1. The device evaluates the packet against the terms in the firewall filter sequentially, beginning with the first term in the filter.
  2. If the packet matches all the conditions specified in a term, the device performs all the actions specified in that term.
  3. If the packet does not match all the conditions specified in a term, the device proceeds to the next term in the filter (if a subsequent term exists) and evaluates the packet against that term.
  4. If the packet does not match any term in the firewall filter, the device implicitly discards the packet.

Unlike service filters and simple filters, firewall filters support the next term action, which is neither a terminating action nor a nonterminating action but a flow control action.

If the matched term includes the next term action, the device continues evaluation of the packet at the next term within the firewall filter.

If the matched term does not include the next term action, evaluation of the packet against the given firewall filter ends at this term. The device does not evaluate the packet against any subsequent terms in this filter.

A maximum of 1024 next term actions are supported per firewall filter configuration. If you configure a firewall filter that exceeds this limit, your candidate configuration results in a commit error.

The device stops evaluating a packet against a given firewall filter when either the packet matches a term without the next term action or the packet fails to match the last term in the firewall filter.

Network+ N10-007 Filtering with ACLs

July 17, 2018 at 5:43 pm

Enjoy this Nugget from the 2018 Network+ course from CBT Nuggets! This course is amazing as it features myself, Keith Barker, Network Chuck, and Jemery Cioara!

N10-007

Juniper iBGP Peering Example

July 16, 2018 at 11:10 pm

This Sneak Peek Nugget is from my BGP – Peering module at CBT Nuggets. This is one module of three on BGP that are currently complete and live on CBT Nuggets. These modules consist of many videos that provide detailed coverage on BGP with both Cisco and Juniper examples.

Juniper

Several Seats Have Opened in the CCIE RS Prep Club!

July 14, 2018 at 11:57 pm

Evolving Technologies

Have you been waiting for this? A chance to join our private study group for the CCIE RS written and lab exams? In fact, we have several in the group pursuing CCNA, CCNP, then CCIE RS.

Now is your chance! Several seats have opened up.

Here are the details involving our incredible study group…

  • Daily content (quizzespostschecklistsvideoslab task challenges)
  • Private Slack chat workspace access
  • 50 members total that are just like you – MOTIVATED
  • The latest news (and even rumors) surrounding the CCIE R&S exams and material
  • Valuable, downloadable resources including study tools and software
  • Checkpoint assessments to validate readiness in exam areas
  • Private email access to our trainer(s)
  • Special offers from AJSnetworking.com partners

Visit this page to join!

Join Us

Your 200-105 ICND2 Study Tracker

July 14, 2018 at 10:41 am

ICND2

Here is your exam objectives tracker for ICND2. Remember – there are five parts. So if you are not seeing all five below – be sure to click on the READ MORE button!

1.0 LAN Switching Technologies
1.1 Configure, verify, and troubleshoot VLANs
(normal/extended range) spanning multiple switches
1.1.a Access ports (data and voice)
1.1.b Default VLAN
1.2 Configure, verify, and troubleshoot interswitch connectivity
1.2.a Add and remove VLANs on a trunk
1.2.b DTP and VTP (v1&v2)
1.3 Configure, verify, and troubleshoot STP protocols
1.3.a STP mode (PVST+ and RPVST+)
1.3.b STP root bridge selection
1.4 Configure, verify, and troubleshoot STP-related optional features
1.4.a PortFast
1.4.b BPDU guard
1.5 Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel
1.5.a Static
1.5.b PAGP
1.5.c LACP
1.6 Describe the benefits of switch stacking and chassis aggregation
1.7 Describe common access layer threat mitigation techniques
1.7.a 802.1x
1.7.b DHCP snooping
1.7.c Nondefault native VLAN

Your 100-105 ICND1 Study Tracker

July 11, 2018 at 10:30 am

ICND1

If you know anything about my approach to certifications, you will know that I am a huge proponent of building a tracker to make sure you are studying the right topics and to measure your progress and keep yourself accountable. Here is a tracker you can copy for ICND1.

NOTE: I only show Section 1 below – you need to click the READ MORE link in order to see the other sections 2 – 5.

1 Network Fundamentals
1.1 Compare and contrast OSI and TCP/IP models
1.2 Compare and contrast TCP and UDP protocols
1.3 Describe the impact of infrastructure components in an enterprise network
1.3.a Firewalls
1.3.b Access points
1.3.c Wireless controllers
1.4 Compare and contrast collapsed core and three-tier architectures
1.5 Compare and contrast network topologies
1.5.a Star
1.5.b Mesh
1.5.c Hybrid
1.6 Select the appropriate cabling type based on implementation requirements
1.7 Apply troubleshooting methodologies to resolve problems
1.7.a Perform fault isolation and document
1.7.b Resolve or escalate
1.7.c Verify and monitor resolution
1.8 Configure, verify, and troubleshoot IPv4 addressing and subnetting
1.9 Compare and contrast IPv4 address types
1.9.a Unicast
1.9.b Broadcast
1.9.c Multicast
1.1 Describe the need for private IPv4 addressing
1.12 Configure, verify, and troubleshoot IPv6 addressing
1.13 Configure and verify IPv6 Stateless Address Auto Configuration
1.14 Compare and contrast IPv6 address types