BootCamp1:NMA Network Master Associate, Cisco, Microsoft2020
4.9 (8 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
205 students enrolled

BootCamp1:NMA Network Master Associate, Cisco, Microsoft2020

Microsoft Server 2019, Cisco ASA & ACS, VOIP CUCM & CME, Sophos Firewall, GNS3, VMware, VPN, RIPv2, OSPF and much more
4.9 (8 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
205 students enrolled
Created by Dante Leo
Last updated 12/2019
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 8 hours on-demand video
  • 2 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Integrate Microsoft server, Cisco devices, VOIP, ASA firewalls and Sophos in 1 network
  • Design and implement real network "3 offices"
  • GRE+DMVPN WAN link configuration by using Cisco and other vendors routers
  • Domain controllers, DHCP & GPO of Windows Server 2019
  • Integration of Sophos with Active directory
  • Integration of VOIP systems with Active directory
  • VLAN implementation
  • Implementation of security devices like Cisco ACS, ASA
Requirements
  • CCNA
  • Prior knoweledge with VMware and GNS3 is desirable
Description

Course description:

This course is to implement Microsoft, Cisco, Firewalls and Security devices in 1 network.

The main goal of this course is to learn how to implement a real network in IT industry from the scratch.


Important Note:

In this course you need to have your own images for Cisco devices like CUCM, ACS .. etc.

Otherwise; you can download the images and evaluation licenses for around $15 from this link

"The link to be send for you with automatic enrollment message once you enroll to this course"

**Please watch Lecture 2: Prerequisites for NMA Bootcamp for more details..


Project Description:

GravityCyber is an IT solutions that has three branch offices as the followings:

• VIC-Site

• Perth-Site

• DC-Site

And it's ordered their network engineers for designing and implementing its networks on each site, connecting them together with a DMVPN over GRE WAN link.


VIC-GW, PERTH-GW, DC-GW-1 and DC-GW-2, are connected to the ISP for an internet connection with a public IP assigned to each, and using this mechanism of connection, they've been configured in a GRE+DMVPN WAN link, making VIC-GW is a hub, and all the rest are considered as peripherals spokes.


Requirements:

• Configure WAN links between VIC-Core-1, VIC-Core-2, VIC-DSW-1 and VIC-DSW-2.

• Configure OSPF between VIC-Core-1, VIC-Core-2, VIC-DSW-1 and VIC-DSW-2 to be in area 0.

• Configure trunk ports on VIC-DSW-1 and VIC-DSW-2, VIC-Access-1, VIC-Access-2, VIC-Access-3 and VIC-Access-4.

• Configure VTP version 3 "GravityCyber .com" on VIC-DSW-1 to be in the primary server mode with an authentication key with cisco.

• Configure VTP version 3 "GravityCyber .com" on VIC-DSW-2, VIC-Access-1, VIC-Access-2, VIC-Access-3 and VIC-Access-4 to be in the client mode with an authentication key with cisco.

• Configure VLANs as shown in the table for VIC-Site, on VIC-DSW-1.

• Configure VIC-DSW-1 to be the default-gateway for VLAN 10 and VLAN 20.

• Configure VIC-DSW-1 to be the default-gateway for VLAN 30 and VLAN 40.

• Configure helper-address on VIC-DSW-1 and VIC-DSW-2 so all hosts on VIC-Site can get an IP from the DC+DHCP-Server and Backup DC+DHCP-Server as an alternate DHCP-Server.

• Configure access-ports on VIC-Access-1, VIC-Access-2, VIC-Access-3 and VIC-Access-4.

• Permit for VLAN 10, VLAN 20, VLAN 30 and VLAN 40 only to go into trunk ports.

• Configure interfaces IP configuration on Sophos-UTM, setting the default-gateway for eth1 and eth2.

• Configure OSPF on eth1, eth0 and eth2 on Sophos-UTM to be on area 0.

• Configure default-route to be announced from Sophos-UTM to VIC-Switches.

• Configure load-balancing between eth1 and eth2 on Sophos-UTM putting eth1 as an active link and eth2 as a standby link.

• Configure interfaces IP configuration on ISP, NAT configuration and default route configuration so any site can connect to the internet.

• Configure interfaces IP configuration on VIC-GW, NAT configuration, OSPF configuration and default route configuration so VIC-Site can go to the internet.

• Configure interfaces IP configuration on Perth-GW, NAT configuration, OSPF configuration and default route configuration so Perth-Site can go to the internet.

• Configure interfaces IP configuration on DC-GW-1 and DC-GW-2, NAT configuration, RIPv2 configuration and default route configuration so DC-Site can go to the internet.

• Configure GRE+DMVPN on VIC-GW, Perth-GW, DC-GW-1 and DC-GW-2 so PERTH-Site, VIC-Site and DC-Site can be connected together.

• Configure EIGRP over DMVPN network between Perth-Site, VIC-Site and DC-Site.

• Configure interfaces IP configuration on Perth-Master-GW, OSPF configuration and VRRP configuration to be master for VLAN 10 and backup for VLAN 20 with an authentication key with cisco.

• Configure interfaces IP configuration on Perth-Backup-GW, OSPF configuration and VRRP configuration to be master for VLAN 20 and backup for VLAN 10 with an authentication key with cisco.

• Configure helper-address on Perth-Master-GW and Perth-Backup-GW.

• Configure trunk ports on Perth-Core, Perth-Access-1 and Perth-Access-2.

• Configure VTP version 3 "GravityCyber .com" on Perth-Core and set it as a primary server with an authentication key with cisco.

• Configure VTP version 3 "GravityCyber .com" on Perth-Access-1 and Perth-Access-2 and set them as a client with an authentication key with cisco.

• Configure Port-Channel on Perth-Core, Perth-Access-1 and Perth-Access-2 to be operating on PAgP.

• Configure access-ports on Perth-Access-1 and Perth-Access-2.

• Configure interfaces IP configuration on DC-GW-3 and RIPv2.

• Inject ASDM on ASA-Firewall and configure interfaces IP configuration.

• Set security level with 100 for all ASA-Firewall interfaces.

• Enable ICMP on ASA-Firewall.

• Configure RIPv2 on ASA-Firewall set the inside interface as a passive interface.

• Configure domain controller on DC+DHCP Server and DHCP pools for all VLANs on the other two sites.

• Configure backup domain controller on Backup D.C+DHCP Server and backup DHCP pools for all VLANs on the other two sites.

• Configure OUs for each site and OUs for each VLAN on A.D on D.C+DHCP-Server.

• Configure group policy so deny access for USB ports, CD-Room, control panel for each VLAN.

• Add the domain controller in the Sophos-UTM as an authentication server and synchronize Sophos with active directory.

• Enable web-filter for each VLAN on VIC-Site so VLAN 10 can't access the any website without authenticating, VLAN 20 can't access only to facebook .com, VLAN 30 can't access only to twitter .com, and VLAN 40 can't access any HTTP/HTTPs website.

• Configure ACS-Server to be a TACACS+ authenticator.

• Configure AAA model on VIC-GW, Perth-GW, Perth-Master-W, Perth-Backup-GW, DC-GW-1, DC-GW-2 and DC-GW-3 so any console access can be authenticated via ACS-Server or local password access.

• Configure CME-Server to be a call-manager for VLAN 10, VLAN 20, VLAN 30 and VLAN 40 on VIC-Site.

• Configure CUCM-Server to be a call-manager on DC-Site.

• Configure dial-peer between CME-Server and CUCM-Server so any phone from VLAN 10, VLAN 20, VLAN 30 and VLAN 40 can contact any phone from DC-Site.



This project is comprising of 12 Sections

Section 1

Introduction


Section 2

VMware Tool Installation

GNS3 Tool Installation


Section 3

ASA-Firewall LAB Preparation

Sophos-UTM LAB Preparation

CUCM-Server LAB Preparation

ACS-Server LAB Preparation


Section 4

DC-Site Configuration Part 1


Section 5

VIC-Site Configuration Part 1

VIC-Site Configuration Part 2

VIC-Site Configuration Part 3


Section 6

Sophos-UTM Basic Configuration

Sophos-UTM OSPF Configuration

Sophos-UTM Load-Balancing


Section 7

Perth-Site Configuration Part 1

Perth-Site Configuration Part 2

DC-Site Configuration Part 1

DC-Site Configuration Part 2


Section 8

ASA-Firewall Basic Configuration

ASA-Firewall RIPv2 Configuration


Section 9

Connecting Sites to Internet Part 1

Connecting Sites to Internet Part 2

Connecting Sites Using GRE+DMVPN


Section 10

Configuring Primary Domain Controller

Configuring Backup Domain Controller

Configuring Primary DHCP-Scopes

Configuring Backup DHCP-Scopes

Configuring Group-Policy Objects


Section 11

Configuring VOIP-Telephony using CME

Configuring VOIP-Telephony using CUCM

Configuring Dial Peers with CUCM+CME


Section 12

Configuring TACACS+ with ACS-Server


Section 13

Sophos-UTM Web-Filtering Configuration

Sophos-UTM Access-Lists Mastery

Sophos-UTM Authentication With AD


Section 14

By end of this bootcamp

Who this course is for:
  • Students who finished CCNA and want to improve their skills
  • Students who finished CCNA security and want to improve their skills
  • Students who finished MCSA and want to improve their skills
  • ITs who want to learn how to design and implement a real network
  • Helpdesks who want to learn System admins level 1
  • System admins who want to learn VOIP
  • Admins who want to learn other vendors firewall like sophos
Course content
Expand all 67 lectures 07:49:28
+ Introduction
6 lectures 42:40
Course description & Network
09:43
Buy server or laptop
03:53
Expand your job search
03:02
+ VMWare & GNS3
18 lectures 01:59:12
Concept of Virtualization
05:38
Install VMware
01:43
Virtual network editor
14:11
Virtual network practise
07:17
Virtual network setting
05:15
License error fix
04:05
Server 2019 source installation
03:04
Win 10 source installation
03:03
Sysprep
03:34
Cloning
07:38
Graphical Network Simulator(GNS)
02:47
Install GNS3
10:41
Install GNS3 VM
05:57
GNS3 Engines
09:06
GNS3 Servers Configuration
11:14
GNS3 Upload Images
08:10
Create our first topology
06:26
GNS3 VMware Integration
09:23
+ Cisco ASA, Sophos, CUCM, ACS
19 lectures 02:24:21
Contents of this section
02:56
ASA Introduction
02:25
ASA very important notes
02:47
ASA appliance
08:45
ASAv VMware
11:18
TFTP
08:20
ASDM
09:31
Sophos Introduction
08:29
Sophos installation
17:10
CUCM Introduction
05:21
CUCM Vm
06:07
CUCM Network
04:14
Install CUCM Part -1
10:36
Install CUCM Part -2
07:45
Install CUCM Part -3
03:01
CUCM web access
06:07
ACS introduction
03:13
ACS Installation
09:13
ACS basic configuration
17:03
+ DC-Site
14 lectures 02:30:04
Introduction
02:27
Clone DC1 & DC2 - ICT
16:12
Promote DC1
08:03
Trouble shoot GNS3 & VMware integration
13:31
Promote DC2
13:10
Change network symbols
02:08
Add CUCM to the network
12:03
Add ACS & ASA to the network
09:18
Fix ACS & ASA ip address settings
12:49
FIX ACS 2 network adaptors problem
08:31
Fix ASA 3 network adaptors problem
10:45
DC site final connectivity test
11:31
ACS AD integration - Problem detection
13:27
Integrate ACS with AD
16:09