Jeremy, I really want to thank you, I am taking a CCNP ENCOR course in an academy, after 4 classes, I have seen everything you teach here, now I understand how complete this course is, that in a way, it leads you to the CCNP, it really takes you I congratulate you, for your work and effort, you are the best.
Hello Jeremy, I passed the CCNA on 07/09/21. Thank you for all the help with your amazing course. I supplemented your course with Wendell Odom's CCNA guide and passed on the first try. I will definitely be subscribing to show my appreciation.
At, 04:15 we say that we can configure the maximum number of MAC addresses able to be learned by the switch, but do we ever go through the configuration ? presumably something like SW1# port-security max ?
Information dense video especially in terms of memorizing the commands. I rewatched almost the whole video taking notes, writing down the commands etc. Thank you for this video
I have ccna in two days, and im so sorry I didnt find ur videos sooner! I get three chances and so if I dont pass first time, i know its ok because ill learn from you and be proficient on the fundamentals of networking. great great content. thx
@@DreadNought-n2b if you watched all Jeremy's videos, the course is not complete yet...I think this is about 80% complete. Wait till Jeremy finish all the topics so you can be sure to pass otherwise you need to do your own research on those topics not yet covered...automation, security and wireless topics...download the exam topics for CCNA from Cisco.com for your reference. Also Jeremy has a link showing which topics he already covered. Master Ip routing, static and dynamic.....ospf configuration....LACP PAGP also came up...
@@Michael-yl9rl 😢😢😢 wow, was hoping on someone shedding more light, cause I was comparing the time limit it'll take for that or a software developer, but with your ccna, one can earn a standard salary (not minimum wage or something close to working in a gas station?)
Thanks for the awesome videos - I'm about to take my CCNA soon and just rewatching your videos once more and applying what I learned through my other resources. Also, small thing I noticed, there's a bird of some kind that you can hear crowing at the 5:06-5:07 timestamp. I just noticed it and thought it was funny lol
19:32 "Mac addresses dynamically learned or statically configured on a port security enabled port, are called secure MAC add. By default, secure mac add will not age out." 21:03 "Now, only dynamically learned mac add will age out.." is this contradicting?
I don't know if it was omitted on purpose but the 'switchport port-security maximum ' is important. You refer to the default maximum being one MAC address and refer to cases - such as supporting IP phones - when more than one is needed. But you don't show how to increase the maximum.
Hi Jeremy, I have a question after viewing Day 49 (Port security) and day 20-22 (STP/RSTP). How Port security work with STP/RSTP as the the network path is automatically reconfigured in case of failure of one link in the network? Hope my question is clear.
Hi, Jeremy! Many thanks to your channel for these amazing videos. I just realized you missed explaining how to configure the maximum mac address allowed on the port. I googled it though and tried it on PT.
Thanks again for your explanation. I want to understand, what the use of using mac address aging time feature in port security? Normally a secure Mac-Address learned should remain in the mac-address table but can be changed manually if ever the need be, so that only the desirable device can access the network. What happen if at the time the aging process exhausted(using type absolute), a rogue device is connected on the same port (by unplugging the cable).
Security is always a trade-off, making things less convenient to use etc. So aging is just a convenient feature that you can decide to use or not to use, although it is a trade-off for slightly less security.
At 6:48 , the attacker would have to know the addresses that are allowed, no? Edit , it's 6:44 . Talking about an attacker manually configuring the Mac address.
An access port can have only one VLAN configured on the interface; it can carry traffic for only one VLAN. A trunk port can have two or more VLANs configured on the interface; it can carry traffic for several VLANs simultaneously.
Hi Jeremy. Thanks for the best course. Could you please tell me what command you used in minute of 14:16 of this video to see how many seconds are left for "err-disabled" to go away?
Port security is such a scary feature because you know you're going to get a million helpdesk tickets from people saying "the ethernet port broke itself". I think one of the hardest things about an IT job is trying to maintain a secure, available network without upsetting end users that don't know anything about how it works. At my previous job these kinds of things caused a lot of hostility towards the IT department.
Hi Jeremy thanks again for this great course. I have a question. If i have a Cisco Switch Access-Switch for example C9300L and i configure a port that Lightweight AP will connect to and Wireless-Clients will connect to that AP. If i give IOS command: Config-if#Switchport port-security maximum 1. Will it go to shutdown state? because clients have MAC addresses and AP has MAC. Does switchports learn Wireless clients MAC addresses? Thank you in advance.
19:45 min By default, secure mac addresses will NOT 'age out'. then 21:07 min by default only dynamically -learned secure mac addresses will age out. I am confused. there are 3 types of secure mac add: static, sticky and dynamically-learned
By default, secure MAC addresses will not age out because the timer is 0. If an aging timer is set, by default only dynamically-learned secure mac addresses will age out.
Thx for that Just tell us is there other topic network fundamental 1.1.c all along til 1.1g still to cover sir Just question and as always God bless for all ure help thx again
Got the Boson Exam question wrong at the end. Is there a reason why port security wouldn't drop all packets coming from the Hub, since technically a Hub will have its own MAC address that will be added to the SWA table?
Dumb question: default port-security means that only the first MAC plugged in is valid, but what happens if that first device is a switch? Since source/destination MACs change with each hop--and assuming we don't put port-security on this downstream switch--would any device connected to the switch be considered valid? Since, if I'm understanding correctly, PC A, B, and C would all read as the same MAC if filtered through a switch.
@@ThatOneSix Yep, the router will change the source MAC to that of its own interface, and the destination to the MAC of the next hop router (or the destination host, if it is the last router in the path).
Can't thank you enough for such an amazing course, Jeremy! I have a question though, in this lecture, you say at first: by default secure MAC addresses will not 'age out', and later on you say: by default only dynamically-learned secure MAC addresses will age out. Can't seem to find what I had missed there!
If aging of secure MAC addresses is enabled (so, you change the timer to something other than 0), by default only dynamically-learned secure MAC addresses will age out.
@JeremysITLab you didn't show how to configure port security to enable an interface accept two or more Secured MAC addresses in a case where PC is connected to an IP phone then to a switch interface. You said something about it but did not show the configuration. Thank you
Just in case, anyone needs to see this. The interface sub-command is: switchport port-security maximum [number of MAC addresses allowed] You are configuring the total number of MAC addresses allowed on that interface. "Total" meaning: Statically configured + dynamically learned.
Hi all I don’t get the last question The switch connected to the hub so the first MAC address learned by the switch is the hubs MAC address So the 2 hosts frames need to be dropped ?!? Or hub don’t have MAC address on their interfaces ?
Hubs are layer 1 which means no mac addresses (mac addresses are layer 2). The hub will forward both mac addresses from both PC's but will not have a mac address for itself as it doesn't generate its own traffic.
The Boson question confuses me.. If the switch does not remove already learned MAC addresses, how does it learn a MAC address? It has already learned the MAC of both PCs.
Hi Mr, Jeremy, I tried the lab in GNS3 using vios_l2 switch Version 15.2, and I've noticed that the Security Violation Count doesn't reset unless I go to the interface, disable port security and re-enable it again. I have a physical home lab but being lazy to power up the devices and set up all the cables, 😫 I didn't try it.
Hello , Mr. Please , can you inform me if that all the channel of ccna 200-301 topic are included in exam ccna 200-301 , Because there some topic do not exist in the exam as example DTP , VTP Thank you very much
So one time just for sh*ts and giggles I brought in my lap top to work. I work at one of the top 10 fortune 500 companies (Not going to say which). I figured their security policy would be very explicit. To test it, I changed the mac address and IP address of my personal laptop to reflect that of my work laptop. I plugged the ethernet into my laptop, Then I started a wireshark capture. I had access to all of the companies private data (encrypted of course) that was being broadcast in my subnet. So how would one go about implementing port security in a situation like that? It was quite easy for me to see the traffic and get on to the companies internal (not guest) network from my personal machine?
Not sure if others ran into this issue, but in packet tracer, it seems that by default my switch shuts down a port whenever I "unplug" it, so I wasn't able to simulate any of this unless I kept the host connected to the switchport and just manually changed it's mac address. Strange, another odd incongruency between my version of packet tracer and yours, it's becoming very common and definitely more than a nuisance at this point.
re: Boson, Wouldn't the port be err-disabled if prior to doing command "switchport port--security", there were 2 MAC addresses in the switch's mac address table for that port?
Sir when I'm statically configure my pc mac address in switch which is connected to it.. It is not allowing the command. Showing duplicate mac address found... Why is that
I enable port security on a switchport, by simply using " sw port-security" but when I attach a second device to the port it simply learns the new device's mac address and doesn't block the port or go into err-disabled. Anyone know why? I have done absolutely no other configurations to the port in question regarding port security. It is however, sw access vlan 10.
Images in GNS3 do not work exactly the same as real Cisco devices, I tried the lab today using real Catalyst 3750 and then 2960G with a 2911 router, if you disconnect a cable, the switch will immediatly drain its MAC address table unless you manually configure the interface with [switchport port-security mac address H.H.H or sticky] but in GNS3 it doesnt. Also, the violation counter will reset to 0 only if you shutdown then up the inteface and connect it to the device with autorized MAC and the last source MAC will not disappear, however, in GNS3 if you disable port-security and re-enable it again, everything will reset to 0. these are not major problems in GNS3, but when it comes to spanning-tree it real sucks.
He protec
He attac
He stop network attac
pinned 😂
hero 🤣🤣🤣🤣🤣
Congrats Steve Harveyy. You win my award for favorite comment of the course so far.
I get a rush of serotonin every time he says '...but you don't need to remember this for the ccna.'
Just passed the CCNA with a 983 score! Thanks Jeremy, I am at a uni and this will definitely help me when I'll be searching for my first job.
Awesome, congrats! That's an awesome score. Best of luck in your future studies and career
983?? That is freaking brilliant man!!! Do you mind sharing with us what resources you used to obtain that grade? And did you buy any practice exams?
@@devilsadvocate2163 Nobody will replay after they successed with their exam :) That's human nature..
How amazing are you! Way to go!
how many questions was the exam, and is it all multiple choices? or there is writing code in it? would love an answer if you can
Jeremy, I really want to thank you, I am taking a CCNP ENCOR course in an academy, after 4 classes, I have seen everything you teach here, now I understand how complete this course is, that in a way, it leads you to the CCNP, it really takes you I congratulate you, for your work and effort, you are the best.
You are an angel sent by the gods. You cover things more than just CCNA. You cover important off topics as well. You have my respect!
Hello Jeremy,
I passed the CCNA on 07/09/21. Thank you for all the help with your amazing course. I supplemented your course with Wendell Odom's CCNA guide and passed on the first try. I will definitely be subscribing to show my appreciation.
Hi were u new to networking or did u have some experience??
Thank you very much Jeremy . There is no doubt that you are one of the best CISCO instructors.
Thank you, Arash :)
I passed my CCNA exam in part by watching your videos. Thank you for your work.
At, 04:15 we say that we can configure the maximum number of MAC addresses able to be learned by the switch, but do we ever go through the configuration ?
presumably something like SW1# port-security max ?
Yea he forgot to add it to this video, but it's in the next lab video
Information dense video especially in terms of memorizing the commands. I rewatched almost the whole video taking notes, writing down the commands etc. Thank you for this video
I have ccna in two days, and im so sorry I didnt find ur videos sooner! I get three chances and so if I dont pass first time, i know its ok because ill learn from you and be proficient on the fundamentals of networking. great great content. thx
Soo, how'd you do? It as intimidating as they make it seem?
I failed actually. Im repeating it next monday
@@maircosta422 youll kill it the 2nd time. What did you use to study the 1st time around? Did you lab alot as well?
@@maircosta422 hey did you pass the 2nd time around?
Tysm for asking. I did pass! Yes, labs are important. I got trunking, subnetting a /24 to a /28 and etherchannel.
❤❤❤ I already pass the CCNA, but still I'm watching Jeremy's videos. The best CCNA Guru ever....
How big was the syllables for the exam?
@@DreadNought-n2b if you watched all Jeremy's videos, the course is not complete yet...I think this is about 80% complete. Wait till Jeremy finish all the topics so you can be sure to pass otherwise you need to do your own research on those topics not yet covered...automation, security and wireless topics...download the exam topics for CCNA from Cisco.com for your reference. Also Jeremy has a link showing which topics he already covered. Master Ip routing, static and dynamic.....ospf configuration....LACP PAGP also came up...
@@Michael-yl9rl 😢😢😢 wow, was hoping on someone shedding more light, cause I was comparing the time limit it'll take for that or a software developer, but with your ccna, one can earn a standard salary (not minimum wage or something close to working in a gas station?)
I cannot thank you enough Jeremy. Your videos are amazing.
Jerry is Great..trust me you helping alot of guys out there..your tutorial are simple and detailed
The great jeremey 🙏, you are really great.
Waiting for you are ccnp videos.
Thanks for the awesome videos - I'm about to take my CCNA soon and just rewatching your videos once more and applying what I learned through my other resources. Also, small thing I noticed, there's a bird of some kind that you can hear crowing at the 5:06-5:07 timestamp. I just noticed it and thought it was funny lol
Thanks again for a great lesson
19:32 "Mac addresses dynamically learned or statically configured on a port security enabled port, are called secure MAC add. By default, secure mac add will not age out."
21:03 "Now, only dynamically learned mac add will age out.."
is this contradicting?
I don't know if it was omitted on purpose but the 'switchport port-security maximum ' is important. You refer to the default maximum being one MAC address and refer to cases - such as supporting IP phones - when more than one is needed. But you don't show how to increase the maximum.
One of the subjects I was waiting for your explanation.goood
Hi Jeremy, I have a question after viewing Day 49 (Port security) and day 20-22 (STP/RSTP). How Port security work with STP/RSTP as the the network path is automatically reconfigured in case of failure of one link in the network? Hope my question is clear.
Jeremy is the King for real. we love you.
Hi, Jeremy! Many thanks to your channel for these amazing videos. I just realized you missed explaining how to configure the maximum mac address allowed on the port. I googled it though and tried it on PT.
The command I used is SW1(config-if)# switchport port-security maximum 2
would you care to explain please .....12:28 why security violation count should not go higher than 1?
Why would it go higher than 1? Check the sentence before that to see why it won't.
@@JeremysITLab thanx for ur time bro......good day.
it's a very good lecture, thorough, in depth, and in detail, quiz is very good.
Great lesson! I like how you explain the importance of status values and how they will behave in real world situations. Thanks!
Thanks again for your explanation. I want to understand, what the use of using mac address aging time feature in port security? Normally a secure Mac-Address learned should remain in the mac-address table but can be changed manually if ever the need be, so that only the desirable device can access the network. What happen if at the time the aging process exhausted(using type absolute), a rogue device is connected on the same port (by unplugging the cable).
Security is always a trade-off, making things less convenient to use etc. So aging is just a convenient feature that you can decide to use or not to use, although it is a trade-off for slightly less security.
At 6:48 , the attacker would have to know the addresses that are allowed, no?
Edit , it's 6:44 . Talking about an attacker manually configuring the Mac address.
Yes, that's correct. For example they could identify the MAC address of the device that is usually connected to the port.
is the saying on 20:25 alright ? isnt that contradictary ?
Yes, it's correct. The MAC address ages out, but can be re-learned if another frame that MAC address is received - no contradiction.
*from that MAC addresss?@@JeremysITLab
An access port can have only one VLAN configured on the interface; it can carry traffic for only one VLAN. A trunk port can have two or more VLANs configured on the interface; it can carry traffic for several VLANs simultaneously.
Mind blowing very-very details and easy to understand thank you sir
Thank Jeremmy for your tutorials, i really appreciate.
Hi Jeremy. Thanks for the best course. Could you please tell me what command you used in minute of 14:16 of this video to see how many seconds are left for "err-disabled" to go away?
Thanks for the kind words! The command is shown in that slide ;)
Thanks very much for this wonderful videos
Please could you explain the changes in the Cisco certs ?
Thank you 💞
Thanks for making learning fun Jeremy.
.Static mac addresses do not age out but does dynamic secure mac addresses age out ?
Thank you Jeremy, your videos are amazing
Port security is such a scary feature because you know you're going to get a million helpdesk tickets from people saying "the ethernet port broke itself". I think one of the hardest things about an IT job is trying to maintain a secure, available network without upsetting end users that don't know anything about how it works. At my previous job these kinds of things caused a lot of hostility towards the IT department.
Thank you Jeremy! Loved the content
Great lessons, have watched all of them so far :) Will you also be doing a CCNP ENCOR course in the future, if not for free then to purchase?
We can do it let's goooooo!!!!!!!!!!!!!!!!!!!
hi Jeremy, what about DHCP limit rate can we use it to prevent DHCP exhaustion
Yes! I will explain it in the DHCP snooping video.
Great lessons jeremy.
Thank you so much, Jeremy.
I really appreciate your work.
Thank you.
Thanks, Andrei :)
Hi Jeremy thanks again for this great course.
I have a question.
If i have a Cisco Switch Access-Switch for example C9300L and i configure a port that Lightweight AP will connect to and Wireless-Clients will connect to that AP.
If i give IOS command:
Config-if#Switchport port-security maximum 1.
Will it go to shutdown state?
because clients have MAC addresses and AP has MAC.
Does switchports learn Wireless clients MAC addresses?
Thank you in advance.
Hi Jeremy, I hope you are well, one question, until this class, what topics remain to be seen? Greetings
You can check the course progress here: jeremysitlab.com/ccna-course-progress
19:45 min By default, secure mac addresses will NOT 'age out'. then 21:07 min by default only dynamically -learned secure mac addresses will age out. I am confused. there are 3 types of secure mac add: static, sticky and dynamically-learned
By default, secure MAC addresses will not age out because the timer is 0.
If an aging timer is set, by default only dynamically-learned secure mac addresses will age out.
@@JeremysITLab thanks
Thanks always J
I'm really enjoying your tutorials. Please make a video for me how to configure a vpn on cisco switch
Thx for that Just tell us is there other topic network fundamental 1.1.c all along til 1.1g still to cover sir Just question and as always God bless for all ure help thx again
Thank you, sir. Got all points
Got the Boson Exam question wrong at the end. Is there a reason why port security wouldn't drop all packets coming from the Hub, since technically a Hub will have its own MAC address that will be added to the SWA table?
A hub does not have a mac address. Hubs count as Layer 1 - they are basically fancy wire splitters.
Dumb question: default port-security means that only the first MAC plugged in is valid, but what happens if that first device is a switch? Since source/destination MACs change with each hop--and assuming we don't put port-security on this downstream switch--would any device connected to the switch be considered valid? Since, if I'm understanding correctly, PC A, B, and C would all read as the same MAC if filtered through a switch.
Switches don’t change the src/dst of frames! They just forward them.
@@JeremysITLab Oh, my mistake. So routers change MACs, then?
@@ThatOneSix Yep, the router will change the source MAC to that of its own interface, and the destination to the MAC of the next hop router (or the destination host, if it is the last router in the path).
@@JeremysITLab Ahhhhh, okay. I had just gotten confused and thought both routers and switches did that. Thank you for clarifying!
protected is more restricted than restrict!
Your Vedios are very helpful ❤
Thank you Jeremy
Thanks Jeremy ☺️
How many videos will it take to complete this course.
Can't thank you enough for such an amazing course, Jeremy! I have a question though, in this lecture, you say at first: by default secure MAC addresses will not 'age out', and later on you say: by default only dynamically-learned secure MAC addresses will age out. Can't seem to find what I had missed there!
If aging of secure MAC addresses is enabled (so, you change the timer to something other than 0), by default only dynamically-learned secure MAC addresses will age out.
@@JeremysITLab Thank you! God bless.
thank you , really amazing
Thanks :)
I think you forgot to teach us the command to configure a maximum mac address to be allowed. Thanks!
Well explained :)
excellent video bro!
Thank you :)
To re enable the interface from err disabled, do we have to do shutdown first then no shutdown, or just no shutdown will work?
You have to use 'shutdown' and then 'no shutdown'
@JeremysITLab you didn't show how to configure port security to enable an interface accept two or more Secured MAC addresses in a case where PC is connected to an IP phone then to a switch interface. You said something about it but did not show the configuration. Thank you
Just in case, anyone needs to see this. The interface sub-command is:
switchport port-security maximum [number of MAC addresses allowed]
You are configuring the total number of MAC addresses allowed on that interface. "Total" meaning: Statically configured + dynamically learned.
Hello sir which concepts are coming under switching ? I hope you will give replay thank you
Fantastic! Thanksss!
Hi all
I don’t get the last question
The switch connected to the hub so the first MAC address learned by the switch is the hubs MAC address
So the 2 hosts frames need to be dropped ?!?
Or hub don’t have MAC address on their interfaces ?
Hubs are layer 1 which means no mac addresses (mac addresses are layer 2). The hub will forward both mac addresses from both PC's but will not have a mac address for itself as it doesn't generate its own traffic.
The Boson question confuses me.. If the switch does not remove already learned MAC addresses, how does it learn a MAC address? It has already learned the MAC of both PCs.
How long more is the course
Hi Mr, Jeremy,
I tried the lab in GNS3 using vios_l2 switch Version 15.2, and I've noticed that the Security Violation Count doesn't reset unless I go to the interface, disable port security and re-enable it again.
I have a physical home lab but being lazy to power up the devices and set up all the cables, 😫 I didn't try it.
hi Jermy can we have automation and wireless please. I appreciate your hard work. but its taking too long to warp up course.can we finish ASAP.
I know appreciate your work.please take your time.I am just addicted to your course.
Hello , Mr.
Please , can you inform me if that all the channel of ccna 200-301 topic are included in exam ccna 200-301 ,
Because there some topic do not exist in the exam as example DTP , VTP
Thank you very much
If I include something in the course, I put it there for a reason.
So one time just for sh*ts and giggles I brought in my lap top to work. I work at one of the top 10 fortune 500 companies (Not going to say which). I figured their security policy would be very explicit. To test it, I changed the mac address and IP address of my personal laptop to reflect that of my work laptop. I plugged the ethernet into my laptop, Then I started a wireshark capture. I had access to all of the companies private data (encrypted of course) that was being broadcast in my subnet. So how would one go about implementing port security in a situation like that? It was quite easy for me to see the traffic and get on to the companies internal (not guest) network from my personal machine?
Hi Jeremy, are there hands-on config questions on the ccna 200-301 exam or everything is multiple choice questions?
Hi! If I'm not mistaken, all the questions are multiple choice :)
Not sure if others ran into this issue, but in packet tracer, it seems that by default my switch shuts down a port whenever I "unplug" it, so I wasn't able to simulate any of this unless I kept the host connected to the switchport and just manually changed it's mac address. Strange, another odd incongruency between my version of packet tracer and yours, it's becoming very common and definitely more than a nuisance at this point.
re: Boson, Wouldn't the port be err-disabled if prior to doing command "switchport port--security", there were 2 MAC addresses in the switch's mac address table for that port?
Thank you
When u will be finished with full course??
Btw great job u r the best teacher.
This year!
Thanks Jeremy 🔑
Thanks for good job
Thank you :)
Thanks Jeremy!
Sir when I'm statically configure my pc mac address in switch which is connected to it.. It is not allowing the command. Showing duplicate mac address found... Why is that
Did you already configure the same MAC address on a different interface?
the best
I enable port security on a switchport, by simply using " sw port-security" but when I attach a second device to the port it simply learns the new device's mac address and doesn't block the port or go into err-disabled. Anyone know why? I have done absolutely no other configurations to the port in question regarding port security. It is however, sw access vlan 10.
Images in GNS3 do not work exactly the same as real Cisco devices, I tried the lab today using real Catalyst 3750 and then 2960G with a 2911 router, if you disconnect a cable, the switch will immediatly drain its MAC address table unless you manually configure the interface with [switchport port-security mac address H.H.H or sticky] but in GNS3 it doesnt.
Also, the violation counter will reset to 0 only if you shutdown then up the inteface and connect it to the device with autorized MAC and the last source MAC will not disappear, however, in GNS3 if you disable port-security and re-enable it again, everything will reset to 0.
these are not major problems in GNS3, but when it comes to spanning-tree it real sucks.
Thanks for the videos, Jeremy.
But why did you snub poopgirl at the end of your video? 🤔
Take a guess lol
Thanks!
Thanks!!
Must keep going
thanks!
tysm
Quiz 4 is incorrect - c) Unplugging the unauthorized device will also re enable the interface after 300 seconds like you showed
My head Hurts 🥲
Did you passed?😄
hello just to inform you i couldn't reach the page thx
Hi, which page couldn't you reach?
@@JeremysITLab the page about the courses progress
@@majiddehbi9186 What is the link address?
@@JeremysITLab links where we could check out the courses progress by the way i send screenshot of the page on ure email
why didn't you annouce poopgirl for the jcnp channel members list?
😂
Port security only worked for me when statically configured, don't you love P.T😂😂😂
😁
I think 1 sub would be not enough so I subbed twice for you.
1 of my main account, 1 of my second.
Thanks, Sir. Hope you doing well.