Network Security Engineer Resume
Santa Clara, CA
SUMMARY:
- 8+ years of professional experience and having Certifications Cisco CCNA, CCNP in Network & security engineering, operations, performing network analysis, design, implementation, capacity planning with a focus on performance tuning and support of large Networks.
- Experience in managing and migration of large scale enterprise networks, extensive knowledge in developing test plans, procedures and testing various LAN/WAN products and protocols.
- Strong knowledge in cisco routing, switching and security with cisco hardware /software experience
- Experience working on Cisco catalyst series 32150, 4500, 4900, 6500 and Experience in layer - 3 routing and layer-2 switching. deal with Nexus model like 7k,5k,2k series, Cisco router model likes 7200, 3800, 3600, 2800, 2600, 2500,1800 series and Cisco catalyst 6500,4500,3750,3500,2900 series switches.
- Advanced knowledge of OSI model, TCP/IP, Internet technologies, system security, firewall infrastructure, network architecture and Cisco network routing / switching (Layer 2 and 3) experience, including LAN and WAN, design and implementation which includes Layer 1 to Layer 7 experience
- Working knowledge of frame relay, MPLS services, OSPF, BGP and EIGRP routing protocols, NAT, sub-netting, also including DNS, WINS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RTSP & Multicasting protocols
- Strong knowledge on Wireless Standards and Technologies, i.e. Ethernet, WAN, LAN, IEEE 802.11a, b, g, n (Wi-Fi). Cisco Wireless Management system, Cisco Meraki Products, PCI standards. Very good knowledge on IEEE 802.15.1 (Bluetooth), Mesh networks, etc.
- Moderate knowledge in configuring and troubleshooting Cisco Wireless networks; LWAPP, WLC, WCS, stand-alone apps, roaming, wireless security basis, IEEE 802.11a/b/g, RF spectrum characteristics
- Experience working with Cisco Nexus 2148 fabric extender and Nexus 5000 series to provide a flexible access solution for data center access architecture and involved in installing, configuring, and troubleshooting Juniper Ex switches (EX2200, EX2500)
- Designing 802.11n wireless networks for diverse scenarios: considering architecture, range, performance, and RF issues
- Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, Ether Channel, STP, RSTP AND MST. Implementation of HSRP, VRRP for Default Gateway Redundancy
- Experience in Intrusion Detection, DMZ, encryption, IPsec, proxy services, Site to Site VPN tunnels, MPLS/VPN, SSL/VPN.
- Experience with F5 load balancers and Cisco load balancers (ACE and GSS).
- Firewall technologies including general configuration, risk analysis, security policy, rules creation and modification of Check Point R65, R70 & R77, Palo Alto and Cisco ASA.
- Conduct network vulnerability assessments using tools to evaluate attack vectors, identify system vulnerabilities and develop remediation plans and security procedures
- Unix/Linux systems administrator with experience configuring, monitoring, upgrading, and maintaining systems hardware, software, and related infrastructure
- Proficient in using Solar Winds Network Management tools like Network Performance Monitor (NPM), Net flow Traffic Analyzer, Network Configuration Manager (NCM) and Cisco Prime.
- Experience working with JUNOS OS on juniper routers and Switches.
- worked on leading research and engineering team on rapid prototyping next generation cloud computing and software defined networking (SDN) products and services
- Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tool
- Experience on dealing with VoIP information deployment including troubleshooting protocols like Session Initiation Protocol (SIP)
- Experience in designing and deploying enterprise-wide network security and high availability Confidential for ASA.
- Implementing security policies using cryptography, ACL, ASDM, IPsec, VPN and AAA Security on different series of routers.
- Architecture, design, install, configure VMware ESX, ESXi, within VI3, vSphere 4 and vSphere 5 environments with Virtual Center management, Lab Manager, vCloud Director
- Experience installation and maintenance of various Aruba products and extending support to Enterprise customers and partners worldwide.
- Involved in configuring and implementing of composite network models consist of ASR 9k
- Experience on IPS and/or DLP, Administration of McAfee anti-virus.
- Knowledge on VxLAN and/or Application Centric Infrastructure (ACI).
TECHNICAL SKILLS:
Firewall &Load Balancers: Cisco ASA 5585, 5550, 5540, Juniper SRX 5400, 5600, 5800, Juniper Net screen 6500, 6000, 5400. Juniper SSG Firewalls, Check point, Palo Alto PA-3060/2050, F-5 BIG-IP LTM (3900 and 8900), Blue Coat SG8100, AV 510, AV810, A10 Load Balancers.
Routers: Cisco routers (1900, 2600, 2800, 2900, 3600, 3800, 3900, 7200, 7600), Cisco L2 & L3, Juniper routers (M7i, M10i, M320).
Switches: Cisco switches (3560, 3750, 4500, 4900 & 6500), Nexus (2248, 5548 &7010)
Routing: RIP, EIGRP, OSPF & BGP, Route Filtering, Redistribution, Summarization, Static routing.
Routing Protocols: RIP, OSPF, EIGRP, and BGP.
Switching Protocols: VTP, STP, RSTP, MSTP, VLANs, PAgP, and LACP.
LAN Technologies: Ethernet, Fast Ethernet, Gigabit Ethernet, NAT/PAT, FDDI.
WAN Technologies: FRAME RELAY, ISDN T1/E1, PPP, ATM, MPLS, leased lines, DSL modems.
Secure access control: TACACS+/Radius.
VOIP Devices & Wireless Technologies: Cisco IP phones, QOS, Avaya, CUCM, UCCX, CIPC and UCS.
Wireless: LWAPP, WLC, WCS, Standalone APs, Client Roaming, Wireless Security Basics, AP groups, WLANS, Cisco Prime Site Maps.
Network management: SNMP, Cisco Works LMS, HP Open View, Solar winds, ACI, Ethereal.
Layer 3 Switching: CEF, Multi-Layer Switching, Ether Channel.
Carrier Technologies: MPLS, MPLS-VPN.
Redundancy protocols: HSRP, VRRP, GLBP
Security Protocols: IKE, IPsec, SSL, AAA, Access-lists, prefix-lists.
QOS: CBWFQ, LLQ, WRED, Policing/Shaping.
Monitoring Tools: packet tracer, Wire shark, Opnet, GNS3, InfoBlox and Solar winds.
Security Technologies: Cisco FWSM/PIX/ASDM, Nokia Checkpoint NG, Juniper SRX, McAfee proxy servers, Fortinet, Bluecoat.
Operating Systems: Microsoft XP/Vista/7, 10, UNIX, LINUX, Redhat.
Programming languages: c, python.
PROFESSIONAL EXPERIENCE:
Confidential, Santa Clara, CA
Network Security Engineer
Responsibilities:
- Installation and maintenance of network infrastructure and Configure, administer, and document, infrastructure. Managed the deployment, rules migrations, and network administration and responsible for converting rule base onto new platforms
- Performed Network implementation that includes configuration of routing protocols, VLANs and IOS upgrades and installations.
- Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4, Spanning Tree, 802.1q. Configured IP access filter policies
- Expertise in working with various Cisco routers such as CISCO 6500, 7613, CISCO-GSR, CISCO-GSR-XR, CRS-16/S.
- Experience in SolarWinds Network Performance Monitor, Network Configuration Manager, Network Traffic Analyzer (Net flow) and IP Address Manager.
- Involved in the activity of DATA-Center migration of regular Cisco catalyst switches with the new Nexus 2148, 2224T, 5548
- Responsible for Checkpoint and Cisco ASA firewall administration across global networks.
- Hands-on experiences in configuring Cloud platform (Virtual Networks Multi-site, Cross-site, VMs, VNETs, Azure, Load Balancers, Azure SQL, Service Bus, Azure API gateway/Management
- Experience on dealing with Cisco Application Centric Infrastructure (ACI) by integration hardware and software products as per network layout
- Configuring and managing Aruba Instant Access Points 215, 225 and troubleshoot network connectivity issues
- Worked with layer2 switching technology architecture. Implemented L2 and L3 switching functionality, which includes the use of VLANS, STP, VTP and their functions as they relate to network infrastructure requirements including internal and external treatment, configuration, and security.
- Install, upgrade and configure Next-Gen Palo Alto Firewall series PA-500, 3000, 5000, 7000.Installed Palo Alto PA-3060 Firewalls to protect Data Center.
- Experience in enterprise anti-virus/anti-spam/anti-malware Confidential, including Symantec Endpoint Protection.
- Configuring rules and maintaining checkpoint VSX, Palo Alto Firewalls & Analysis of firewall logs using various tools.
- Implemented Zone-Based Firewalling and Security Rules on the Palo Alto Firewall.
- Experience in troubleshooting SAN related issues and firmware up gradations of SANs in VMware
- Troubleshooting and analysis of hardware and software failures for various UNIX servers.
- Maintenance and troubleshooting of 4 Citrix Farms running on 2003 Citrix servers + Windows 2008 servers
- Supported core Network consisting Cisco 7200 series routers running multi area OSPF.
- Configured EIGRP and OSPF as interior Gateway protocol route filtering and route redistribution. Troubleshoot complex LAN/WAN infrastructure that includes routing protocols EIGRP, OSPF and BGP
- Configuring and troubleshooting Bluecoat SG9000 WAN acceleration appliances including WCCP, CIFS and creating overlays
- Accessed Cisco Prime NCS/WCS and 5508 series Wireless Controller to manage wireless networks
- Implemented a Cisco Identity Services Engine (ISE) solution (wired, wireless, and VPN users) for a commercial client with converged access switches and Cisco ASA firewalls
- Implemented and validated various cloud Confidential based on Cisco and 3rd party products such as Nexus 9K/7K/1Kv, CSR1000v, ASA, NetScaler 1000v, UCS VMware vSphere and NetApp.
- Configuration of Juniper M320s as PE's, Cisco CRS-1 as Core, Cisco Catalyst 6500/7600
- Configuration of OSPFv3, BGPv6 on Juniper M and J Series Routers. Configuration on SRX firewalls series.
- Security firewall products SRX 1400/3400/110/210/ series, SSG-Secure Services Gateways, IDP and IPS.
- Created standard access lists to allow SNMP, NTP and logging servers.
- Experience administering, configuring, and supporting McAfee EPO.
- Configured of MPLS L2 VPN's, VPLS on Juniper M and J Series Routers
- Designed and implemented the F5 LTM's (3600, 4500, 6900, 8950 etc.)
- Implemented F5 in both Active/Active & Active/Standby mode
- Implemented programs in Python to monitor virtual machine usage data using VMware API calls.
- After testing on completed site will be placed back on either dual circuits or with IWAN backup circuit
- Executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM
- Responsible for all aspects of TCP/IP functionality across multiple Enterprise environments.
- Performed OSPF, BGP, DHCP profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
- Configure and deployed BIG-IP LTM 6900 for providing application redundancy and load balancing.
- performed Network address translation on Cisco ASA 8.2,8.3 and 9.1 versions
- Performed the ACL request changes for various clients by collecting source and destination information from them.
- Created MPOS (method of procedures) and sought the Approval of peers to perform configuration changes.
- Configured ASA 5500-X series firewalls to provide highly secure high-performance connectivity between the site locations.
- Configured client VPN technologies including cisco's VPN client via IPSEC.
Environment: Cisco 7k,5k and 3k switches, Cisco routers 7200,3800,3600,2800, cisco catalyst 6500,4500,3750, network monitoring tools NCM, CHECKPOINT, ASA Firewalls 5500-X series BGP,OSPF,STP,MPLS,VTP,EIGRP,VPN AND NAT
Confidential, Bloomington, IL
Network Security Engineer
Responsibilities:
- Installation and maintenance of network infrastructure and Configure, administer, and document firewall infrastructure. Managed the firewall deployment, rules migrations, and firewall administration and was responsible for converting existing rule base onto new platforms.
- Installation of Palo Alto (Application and URL filtering, Threat Prevention, Data Filtering).
- Successfully installed Palo Alto PA-3060 Firewalls to protect Data Center.
- Implemented Positive Enforcement Model with the help of Palo Alto Networks.
- Administration and L3 support of our Infoblox DDI deployment and F5 GTM's and configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, and HA) on F5 BIG IP appliances.
- Installed Solar Winds Network Performance Monitor with emphasis on traffic analysis and virtualization management.
- Handling of citrix farm creation, zone creation, citrix server’s installation, and configuration and managing of citrix servers.
- implemented Azure VM storage good understanding on Implementing images and disks Configure, monitor Azure VM networking resiliency
- Performed the juniper SRX 5800 deployment to replace the Net Screen 5200/5400 firewalls in the Data Center.
- Configuring and Troubleshooting the Juniper SRX100 and 110 series, Juniper Net Screen routers
- Deploying and decommission of VLANs on core ASR 9K, Nexus 9k, 7K, 5K and its downstream devices.
- Deployed the Nexus 9000 Application Virtual switch to support network telemetry applications and 9000 Core with VPC and 3172 TOR
- Configured Cisco Wireless Access Points 1100, 3600 through Cisco NCS Prime.
- Configuring rules and maintaining checkpoint VSX, Palo Alto Firewalls & Analysis of firewall logs using various tools.
- Implemented virtual Linux server and Windows server using VMware and Xen when needed for testing.
- Configured and troubleshooting Cisco unified UC560 manager VoIP systems
- Created standard access lists to allow SNMP, NTP and logging servers.
- Configuring rules and maintaining Palo Alto Firewalls & Analysis of Firewall logs.
- Implemented Zone-Based Firewalling and Security Rules on the Palo Alto Firewall.
- Researched, designed, and replaced aging Checkpoint Firewall architecture with new next generation Palo Alto appliances serving as Firewalls and URL and application inspection.
- Configured and maintained IPsec and SSL VPN's on Palo Alto Firewalls.
- Investigation and resolution of 3rd line network support incidents.
- Configuration, support and administration of Palo Alto and Checkpoint and to migrate all gateways and management servers to new hardware and software
- To secure configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.
- Installed and Configured the F5 BIG-IP LTM, configured virtual servers and associate them with pools for internal web servers.
- Configuring Virtual Server, Service Groups, and Load balancing methods in new A10 LTM
- Configuring WIDE IP and WIDE IP pool on F5 GTM's to support Load balancing between data centers.
- Experience on IPS and/or DLP, Administration of McAfee anti-virus.
- Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to VPN.
- Experience on dealing with Cisco ISE Secure Network Server 3515 and other network security products.
- Monitor mitigate threats using Cisco Firepower IPS using custom correlation events and built-in tools
- Installed, tested, and deployed monitoring Confidential with Splunk services
- Implemented Zone-Based Firewalling and Security Rules on the Palo Alto Firewall.
- Configured and maintained IPsec and SSL VPN's on Palo Alto Firewalls.
- Maintained and managed assigned systems, Splunk related issues and administrators
- Web Filtering Confidential from Bluecoat/Websence/Cisco etc.
- Worked on bluecoat web application firewall to improve application performance and to perform checks on HTTP, HTTPS, TCP, ICAP and ICMP in order to monitor web content servers.
- Redesign current security network and implement Cisco IDS/IPS and Network Access Control (NAC) to the maximum security.
- Experienced to maximize network performance by monitoring performance troubleshooting network problems and outages scheduling upgrades.
- utilized python in the handling of all hits on configuration and other application
- Implemented and administered Websence Web Security Gateway for web content filtering and DLP
- Improved network and system security through setup and ongoing maintenance of Riverbed IPS and fire eye
- Experience in enterprise anti-virus/anti-spam/anti-malware Confidential, including Symantec Endpoint Protection.
- Implemented the Inter VDOM Routing through the Fort iGATE Firewalls and also the Router.
- Implemented the Policy Rules, DMZ and Multiple VDOM's for Multiple Clients of the State on the Fortigate Firewall
- Installation of ESX server and creation of VMs and install different guest OS
- Problem resolution of leveraged and dedicated SIEM Environment.
- Hands-on experience on Cisco switches 2960, 3750, 3560, Cisco routers 2821 ISR
Environment: Cisco 2948/3560/4500/3560/3750/3550/3500/2960/6500 switches.Cisco 3640/12000/7200/3845/3600/2800 routers, PAL ALTO 2k,3k, checkpoint firewall, PA 3060 Cisco ASA remembering, RIP, OSPF, BGP, EIGRP,MPLS, LAN, WAN, VPN, HSRP
Confidential, Memphis, TN
Network Engineer
Responsibilities:
- Maintained a network lab with more than 30 routers (3600 series), 50+ switches (2900 series), firewall and other network devices like DHCP, DNS servers and VPN concentrators.
- Experience working with ASR 9000 series switches with IOS-XR.
- Switching related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet and Gigabit Ethernet channel between switches.
- Maintained the network team to install new switches and routers and configure the IOS according to the requirement which included VLAN, OSPF, Subnetting, EIGRP, BGP, VTP, spanning - tree, IP Sub netting, wireless access points, T1 circuits and PIM-SM using auto RP.
- Configuring rules and maintaining checkpoint VSX, Palo Alto Firewalls & Analysis of firewall logs using various tools.
- Installed Solar Winds Network Performance Monitor with emphasis on traffic analysis and virtualization management.
- Configured Fortigate 5000 series firewall through FortiOS operating System which delivers up to 1 Tbps throughput
- Implemented Zone-Based Firewalling and Security Rules on the Palo Alto Firewall
- Troubleshooting the Juniper SRX100 and Juniper Net Screen routers with Site-Site VPN, and firewalls
- Design network system architecture and implement the prototype of the system using SDN
- Executed various migration/upgrade projects across F5 and hands on with F5 BIGIP LTMs/EM.
- Assisted in backing up, restoring and upgrading the Router and Switch IOS.
- Assisted campus for VOIP network management and troubleshoot.
- Troubleshooting Aruba Wireless issues like slow performance, intermittent connectivity, authentication failure, low signal strength, Replacing AP's and controllers
- Provided single-point-of-contact resolution and dispatched ISP and network vendors to client repair sites
- Involved in configuration and troubleshooting of Juniper SRX100, 110, 3600 and 5800 series, Juniper Net Screen routers.
- Configuration, support and administration of Palo Alto and Checkpoint and to migrate all gateways and management servers to new hardware and software
- Experience on dealing with Infoblox traffic control products to simplify DNS load balancing operations
- Configure Cisco ASR 9001/9010/9910 and Catalyst 6509 routers for L3 Vlans with HSRP
- Designed, configured and administrated Silver-Peak WAN Optimization devices.
- Implemented Site-to-Site VPNs over the Internet utilizing 3DES, AES/AES-256 with ASA Firewalls.
- Experience with migrating from Cisco ASA 8.2 version to Cisco ASA 8.4 Version.
- Experience with convert PIX rules over to the Cisco ASA solution.
- DDoS remediation using SDN techniques
- Implemented core backbone network consisting of global point of presence ( Confidential ) in support of new iWAN network.
- Installing various patches on Windows Server 2003/2008 to ensure the stability of the server OS
- F5 configuration for newly setup web sites and bluecoat ProxySGS.
- Create and test Cisco router and switching operations using OSPF routing protocol, ASA Firewalls for stable VPNs.
- Implementation and maintained intrusion detection/ prevention (IDS/IPS) system to protect enterprise network and sensitive corporate data. For Fine-tuning of TCP and UDP enabled IDS/IPS signatures in Firewall.
- Configuration the access-list rules, network object-service group based on well-known port the port i.e. FTP/SFTP, SSH, HTTPS/HTTPS (SSL) and etc.
- Deployed a Cisco Identity Services Engine (ISE) solution (wired, wireless, and VPN users) for a commercial client with converged access switches and Cisco ASA firewalls.
- implemented core backbone network consisting of global point of presence ( Confidential ) in support of new iWAN network
- Experience working on Cisco ASR 9001 ASR 1006.
- Conduct trade analysis for the selection of enterprise services on cloud based infrastructure as a service solution.
- Responsible for Cisco ASA firewall administration across our global networks.
- Worked with LAN protocols like STP, RSTP, MST, VTP, VLAN and Port Channel Protocols like LACP.
- Used Linux LVS load balancers controlled by custom Perl-based software to access active-active redundant servers
- Creation of PERL scripts to check the QA of network device configurations via SNMP and configuration file checks
- Design and configuring Overlay Transport Virtualization (OTV) on Cisco NX-OS devices like Nexus 7000.
- Experience working with migration from 6500 series devices to 4500 Series switches in Campus deployments at Core, Distribution and Access Layers.
- Implementation on VMware ESXi and VMware Infrastructure.
- Migrate Physical Servers to Virtual Server using VMware Converter (P2V Converter)
- Hands-on experience with McAfee EPO deploying agent either with EPO.
- Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
- Implementing, configuring, and troubleshooting routing protocols such as RIPv2 HSRP, GLBP
- Installation & configuration of Microsoft Proxy Server 2.0 & Bluecoat Proxy.
Confidential
Network Administrator
Responsibilities:
- Supported core network consisting of Cisco routers running multi area OSPF. Implemented stub/Totally stub areas as per requirements
- Deployed Cisco ACS using TACACS+ for Authentication, Authorization, and Accounting of access to network devices
- Installation, configuration, and testing cisco equipment’s, IOS updates, and configuration changing, troubleshooting various LAN/WAN technologies issues for internal and external clients, monitoring network performance, defining network policies and procedures
- Resolve customer WAN/LAN/wireless/load balancing networking issues
- Installed and configured Solarwinds server.
- Actively participated in upgrading fast Ethernet, Layer 3 switched/routed LAN infrastructure from Cisco 3640 to Cisco 2811 ISR routers and switches at access level to 2950, 3550.
- Configuring IPsec VPN Site-site, GRE Tunneling and SDM along with troubleshooting.
- Firewall and router configuration changes as per the business requirement.
- Provide technical assistance and support for incoming queries and issues related to Networks, computers systems, software’s, and equipment’s hardware.
- Implemented virtual Linux server and Windows server using VMware and Xen when needed for testing.
- Worked with Backup team to install and configure networker client on the Linux servers
- Evaluating network performance, including availability, utilization, throughput, and latency
- Optimized OSPF and EIGRP network reducing network multicast traffic
- Experience in troubleshooting SAN related issues and firmware up gradations of SANs in VMware and different environments
- Handled installation of Windows NT Server and Windows NT Workstations.
- provided systems design, feasibility and cost studies and recommend cost-effective cloud Confidential
- Installed Linux OS, and configured required network on the virtual machines.
- Greatly enhanced network manageability using SNMP, NTP, SSH and SolarWinds
- Installed Operating System and configured kernel parameters for Linux /UNIX servers.
- Performed configuration and management of network and circuits. Documented and updated network physical and logical layout
- Extensive day to day work with Spanning Tree Protocol and multiple VLANs
Environment: Cisco 6505/4500/3550 Switches, Cisco 6500/7500/7200 Routers, LTM, GTM, MPLS, TACACS+, ASA, OSPF, BGP, EIGRP, RIP, LAN, WAN, SSL/VPN.
Confidential
Network Engineer
Responsibilities:
- Maintenance responsibilities included software & hardware installation & configuration
- Maintaining and creating login credentials, privacy settings and user privileges for the employees in the company.
- Replacement of the older routes and switches with new routers and switches with the configuration set up.
- Assigned a task to set up their LAN. Worked on the entire project from cabling to IP addressing assignment.
- Configured 2600 series routers with OSPF protocol.
- Configured and maintained Cisco 2500, 4000, 7000 and 7500 Series Routers as well as Catalyst 5000 and 5500 Series switches
- VLAN Configuration to different applications with RSTP, STP, VTP.
- Switching related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel.
- Configured Cisco IOS Feature Set, NAT and Simple Network Management Protocol (SNMP) for Network Security implementation.
- Performed troubleshooting tasks on Routing and switching and isolated the problem and finding the cause.
- LAN/WAN hardware including, Ethernet Hubs, Cisco Switches, switch panel's installation, configuration and troubleshooting, Frame-Relay configured support.
- Routing related tasks included providing cisco router configuration and change management, providing technical support for Cisco Router configurations and installation for Customer. Configuring IP RIP, EIGRP, OSPF and BGP.
- Redistributing from OSPF to RIP and vice versa by implementing hub and spoke topology with a Frame Relay Switch in between • Troubleshoot TCP/IP problems; troubleshoot connectivity issues in multi-protocol Ethernet, Environment.
- Configuring static NAT, dynamic NAT, inside Global Address Overloading, TCP overload distribution,
- Overlapping Address Translation.
- Physical cabling, IP addressing, Wide Area Network configurations (Frame-relay).
Environment: Cisco 2500, 2600, 3601 and 4000 series routers. RSTP, STP, VTP, VLANs, MPLS, IP RIP, EIGRP, OSPF, BGP, NAT.