We provide IT Staff Augmentation Services!

Sr. Network Engineer Resume

2.00/5 (Submit Your Rating)

Newark, NJ

SUMMARY:

  • Cisco Certified Network Engineer with 11+ years of experience in the industry which includes Designing, Implementation, Installation, Configuration, Deployment, Troubleshooting, Network Operations, Administration Support and Network Security.
  • Modified and worked in the following platforms to support customer Voice: Cisco Unified Call Manager 6.x through 8.x, Cisco Unity Connection, voice gateways.
  • Hands on experience on Cisco WLC's and Access Points. Experience in Physical cabling, IP addressing (IPv4 & IPv6), Wide Area Network configurations (Frame - relay & MPLS), Routing protocol configurations (RIP, EIGRP, OSPF, IS-IS, BGP).
  • Excellent knowledge and experience on different vendor's like Cisco, Juniper, Palo Alto, Checkpoint, F5 And VMware.
  • Strong hands on experience in layer-3 Routing and layer-2 Switching. With Cisco switches (2900, 3550, 3750, 6500, MDS 9000, 5000), Nexus (3k,5k & 7k), Juniper (EX, QFX, QFabric) switches, Juniper (MX960, MX480, LN, CTP) routers, Cisco (2500, 2600, 2800, 3600, 3800, 7200) series Routers.
  • Experience in Configuring and implementing Palo Alto Firewalls, checkpoint firewalls, PIX Firewall (506, 515, 525, 535), cisco ASA (5505,5510,5520) Firewall, Cisco ISE (Identity Service Engine) Juniper (SRX 220,300) series firewalls.
  • Supports multiple business lines and a network of global data centers through the administration of SSL certificates.
  • Up-grading and degrading the OS (IOS, NX-OS, JUNOS) for switches and routers as per requirement
  • Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP Ether channel, STP, RSTP and MST.
  • Functional Understanding of DNS, DDOS and DOS threats and mitigation techniques.
  • Responsible for installation, configuration and troubleshooting of Cisco NAC on both client end and Manager Server.
  • Strong Knowledge of the 7 layers, TCP/IP, IP Addressing and IPV6.
  • Load Balancing using Cisco ACE, Kemp, ADC, F5, Security Device Manager (SDM).
  • Engineered traffic management solutions, including designing, low level engineering for F5 LTM, GTM, ASM, APM environment
  • Performed F5 appliance (LTM, GTM, APM, and ASM) maintenance and system upgrades including hot fixes and security configurations.
  • In-depth knowledge and experience in WAN technologies including OC3, E3/T3, E1/T1, Point to Point, MPLS and Frame Relay.
  • Configured and troubleshooting the F5 LTM and APM and providing level 2 support for the customers.
  • Wide experience in implementing and managing F5 BIG-IP load balancing, including GTM, APM, ASM, and custom iRule development.
  • Responsible for the secure development lifecycle for Cisco's Nexus line of products, including Application Centric Infrastructure (ACI), Application Policy Infrastructure Controller (APIC) - Cisco's Software Defined Network (SDN) solution
  • Monitored system security to maintain protection and align processes with corporate objectives, including review of security certification, configuration plans, and risk compliance.
  • Experience in using NetScout sniffer analysis for testing the performance of the network.
  • Configured and maintained NetScoutngenius 4200 series packet flow switch as load balancer.
  • Expertise in Virtualization with vSphere, VMware ESXi 5/4.1/4 and 3.x hosts and Virtual Center server
  • Design nextgen data centers with nexus 9500/9300 ACI, Openstack, DCI, EPGs/bridge domains, OTV, and VXLAN.
  • Implementation, configuration and management (manually and using iApps templates) of F5 2400 Viprion series using 2100 series blades, and Brocade (Foundry) devices in a multi-platform network/storage environment.
  • Implementation of Firemon for firewall policy compliance, rules cleanup, and complexity reduction.
  • Outstanding experience in designing and configuring of Layer 2 / 3 networking features such as VLAN, ISL, STP, VTP, 802.1X, Port Security, L2PT and SPAN.
  • Implementation and Troubleshooting of WAN authentication protocols- PPP, CHAP and PAP.
  • IP addressing and IP address scalability by configuring NAT/PAT.
  • Experienced working on network monitoring and analysis tools like, Solar Winds, Cisco Works, River Bed, Cisco Prime, NETQOS.
  • Problem Analysis and Troubleshooting (Wireshark, Solarwind, Cisco Prime, MRTG, & Custom Scripts)
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NAT with the firewalls as per the design.
  • Design and build Windows 2000, 20, Servers.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.
  • Support Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.
  • Experience with BlueCoat URL filtering with whitelisting and blacklisting URL, creating rules for content filtering.
  • Experience in Network Intrusion detection/Intrusion Prevention System.
  • Experience on working with Netcracker, Cramer.
  • Worked with ticketing tools like ServiceNow, Remedy tool.
  • Hands on experiences on McAfee EPO with deploying and removing agent on client's machine, removing virus and manually updating DAT files.
  • Knowledge on Python scripting.
  • Strong Knowledge on SDN (software defined network).

PROFESSIONAL EXPERIENCE:

Sr. Network Engineer

Confidential - Newark, NJ

Responsibilities:

  • Responsible for fitting the infrastructure surroundings with majority of Cisco ISE & Palo Alto appliances except for varied different instrumentality.
  • Efficiently exploitation ServiceNow tool for generation of tickets, distribution severity to incidents, following up with incident standing and troubleshooting incidents.
  • Excellently used Splunk to research and monitor incident management and incident resolution issues.
  • Perform 24x7 log monitoring - review and analyze system security logs.
  • Monitored & analyzed system logs on Symantec Endpoint Protection anti-virus, Symantec Data Center Security.
  • Responsible for implementation/installation of LAN/WAN/SAN, Aruba Switches, Aruba Wireless AP's and Aruba Virtual Controllers.
  • Installing and configuring CISCO Wireless LAN Controllers (WLC) with active/ standby state with controlling more 100 Cisco access points.
  • Hands-on experience and expert knowledge of Cisco Intelligent WAN (IWAN).
  • Install and configure Tufin orchestration suite and manage the Tufin tool from the scratch.
  • Deployed Tufin in a distributed architecture with central server and remote collectors.
  • Upgraded Showtime content network with Arista switches.
  • Solution program manage TrustSec and SecureX cross multiple Business Units.
  • Made recommendations for the findings, what rules and which ones to be turned on within the IDS.
  • Administration of Cisco Meraki Network switches, routers and teleworker gateways.
  • Support, Trouble shoot and upgrade small Aruba Wireless Networks at 2,200 remote dialysis clinics across the united states.
  • Policy provisioning, access to specific segments of the networks through Cisco ISE.
  • Engineered, configured and deployed routers using Cisco ISE.
  • Daily responsibilities included design, implementation, support and administration of multiple security products running CheckPoint Provider-1, SourceFire.
  • Modified existing ACL's, IPsec and preform network translations. WAAS installed for increased network efficiencies and speed. Setup InfloBox for local DHCP & DNS configuration.
  • Using InfloBox - Grid Manager - to Assign IP address to new server Builds, Production DNS System - Used for IPAM.
  • Deployed Intelligent WAN (IWAN) in both Hybrid and Dual-ISP branches to provide an increase in bandwidth capacity, security and reliability.
  • Work with layer 2 technologies including Ethernet multi-mode fiber, single mode fiber and media converters.
  • Maintained/monitored a multi-vendor LAN/WAN consisting of Juniper, Cisco, and ATM equipment in a multicast heavy network environment.
  • Implemented and configured Cisco NAC-L2-802.1X and performed Riverbed RIOS operating system upgrades throughout enterprise architecture.
  • Managed a team with serval team members to Upgrade ASA's from 8.x to 9.x, Install Firepower and FireAMP for Endpoints, Sourcefire.
  • Investigates traces with TCP, UDP, SCTP, IP, S1AP, GTPv2 and Diameter.
  • Linux / Unix systems integration with puppet, pulp and RHSAM.
  • Linux and UNIX systems integration with Microsoft Active Directory.
  • Security Device - Palo Alto/ASA Firewalls, Sourcefire IPS/IDS, Cisco Identity Services Engine (ISE), VPN

Environment: Cisco routers 7200; Cisco Catalyst switches 6500, 4500, 2950; Cisco PIX Firewalls 535, 525 Routing Protocols OSPF, BGP; STP, VTP, VLAN; VPN, MPLS, HSRP, GLBP, Big-IP F5 Load Balancer, Cisco Works; MS Visio, Checkpoint, Cisco ASA and Palo Alto firewalls, Blue Coat Proxy, Infoblox, Solar winds.

Sr. Network Engineer

Confidential - McLean, VA

Responsibilities:

  • Upgraded and updated Cisco IOS from 12.3T to 12.4. Accustomed DHCP to mechanically assign reusable information science addresses to DHCP shoppers.
  • Palo Alto style and installation (Application and URL filtering, Threat bar, information Filtering).
  • Deployments of top of rack (TORs) switches using Arista DCS-7050SX and Cumulus Edge-Core to allow network connectivity via MLAG/CLAG of a new environment built from Dell, HPs and Super micros servers
  • Generate a wide variety of reports on firewall and IDS activity notifying the end customer concerning suspicious traffic.
  • Configuring rules and Maintaining Palo-Alto Firewalls & Analysis of firewall logs exploitation varied tools.
  • Upgrading the equipment with latest OS (IOS, NX-OS, JUNOS).
  • Black listing and White listing of web URL on Bluecoat Proxy Servers.
  • Performing URL filtering and content filtering by adding URL's in Bluecoat Proxy SG's.
  • Serve as the primary data point for internal and external auditing processes, including third-party data for quarterly and annual reports.
  • Configured and maintained NetScout, ngenius 4200 series packet flow switch as load balancer.
  • Successfully put in Palo Alto PA 3060 firewalls to protects information Center and provided L3 support for routers/switches/firewalls.
  • Integrated ISE with an MDM solution for mobile devices including onboarding using EAP- TLS.
  • Maintained SIPRNet Cisco ACS (TACACS) servers.
  • Deployment, configuration, and management of 802.1x solutions to include Cisco Identity Services Engine (ISE), ACS (Radius and TACACS+), and Cisco Prime Infrastructure.
  • Integrated TACACS and LDAP for user authentication on webpage and device
  • Implemented Zone primarily based Firewalling and Security Rules on the Palo Alto Firewall Exposure to wild hearth feature of Palo Alto.
  • Investigates traces with TCP, UDP, SCTP, IP, S1AP, GTPv2 and Diameter.
  • Maintained and managed networks running EIGRP and BGP routing protocols.
  • Regularly performed firewall audits around stop Firewall-1 solutions for purchasers.
  • Provided tier 3 support for stop Firewall-1 software system to support customers.
  • Work on stop Platform together with supplier sensible Domain Manager. Worked on configuring, managing and supporting stop Gateways.
  • Configuration of routing protocols EIGRP and BGP for little to medium sized branches supported company branch standards, together with distribution and route maps.
  • Experience configuring multiple models of Cisco ASA, 3750, 6500, 7600, 3800, ASR 1k/9k, and ISR platforms.
  • Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices and configure 2k, 3k,7k,9K series Routers.
  • Helping remote and local's users daily technical issues for e.g. related to windows 7 and 10, Internet Application access issue, Shared or mapped folder access issue, office 365.
  • Build Incognito DHCP server using Debian O/S and configure rules and classes for DOCSIS headend.
  • Access purpose refresh and implementation at varied sized branches and locations.
  • Used network observation tools like Spectrum to confirm network property and protocol analysis tools to assess and pinpoint networking problems inflicting service disruption.
  • Build IT security infrastructure together with stop, Juniper and Palo Alto firewalls
  • Configuring F5 Load Balancers and adding virtual IPs, nodes, pools and health observation.
  • Configuring Juniper NetScreen Firewall Policies between secure zones exploitation NSM (Network Security Manager).
  • Implementing AAA, Access Control Server configuration for RADIUS and TACACS+.
  • Handling Break/Fix things, monitor, configure, policy creation on Checkpoint's sensible Center Server running on Secure Platform
  • Monitoring Traffic and Connections using cisco prime and solar winds
  • Manage project task to migrate from Cisco ASA firewalls to examine purpose firewalls
  • Worked extensively in Configuring, observation and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover demilitarized zone sectionalizing & configuring VLANs/routing/NAT with the firewalls as per the planning

Environment: Nexus 2k/5k/7k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, HP (7510,7506) switches, Brocade VPX, ICX series switches, Palo Alto Firewalls, Viprion 2400 BlueCoat proxy server, LAN, WAN, WLAN, OSPF, RIP, SNMP, BGP, LDAP, IGMP, SSH, EIGRP, HSRP, PPP, VPN, Checkpoint, Cisco ISE.

Network Security Engineer

Confidential - Spring, TX

Responsibilities:

  • Design, deployment and maintenance of security/network devices and datacenters of enterprise.
  • Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (36+ firewalls) - PA2000 series, PA3000 series, PA4000 series and PA5000 series.
  • Successfully installed Palo Alto PA-5000, PA-3000 firewalls to protect Data Center and provided L3 support for routers/switches/firewalls and also configured and maintained IPSEC and SSL VPN's on Palo Alto firewalls.
  • Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering).
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using Panorama.
  • Deployed Site to Site and Client to Site VPNs utilizing Checkpoint Firewall-1/VPN-1.
  • Successfully done with Network device renaming in tools like Open NMS, BNA, ESM, nGenius, EMURALD, Infoblox DNS.
  • Basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 and general troubleshooting of the F5 load balancers.
  • Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches.
  • Implemented Cisco Application Centric Infrastructure (ACI) as a solution for data centers using a Spine and Leaf architecture.
  • Monitor and troubleshoot BGP, EIGRP, TI circuits, and cellular backup circuits via ICMP and SNMP ticketing systems. Cisco IOS upgrades.
  • Working on Cisco 6509 and 4507 series switches for LAN requirements that include managing VLANs, Port Security and troubleshooting LAN issues.
  • Expertise in networking technologies like LAN, MAN, WAN and peripheral devices and working with VPN tunnels, DS1, DS3 & T1 links.
  • Troubleshooting of EBGP sessions with customer carriers in the MPLS cloud which is made up of routers Cisco housed in different datacenters (Cisco 7609).
  • Experience configuring Catalyst (2900, 3500, 3700 and 6500 Series), Nexus (7000, 5000 and 2000 Series) Switches, and Routers (2800, 3600, 4400 Series) and Wireless AP's (1260, 3600) using CLI and GUI.
  • Supporting EIGRP and BGP based network by resolving level 2 &3 problems of internal teams & external customers of all locations.
  • Configure trunk ports and implement granular control of VLANs and VXLANs using NX-OS to ensure virtual and flexible subnets that can extend further across the network infrastructure than previous generation of switches.
  • Integrating Configuring Cisco Wireless LAN Controllers WLC with ISE to perform Dot1x authentication for Wireless users.
  • Design and Implementation of 802.1x Wired/Wireless User Authentication using Cisco ISE Radius Server.
  • Performed all maintenance tasks on the Nexus Switches, ASR Routers, Checkpoint Firewalls, F5 Load balancers InfoBlox DNS etc.
  • Migration of core DNS, DHCP and NTP services from Microsoft to Infoblox.
  • Supported Infoblox appliances grid environment for DNS, DHCP and IP Address Management tools (IPv4)

Network Engineer

Confidential - Sunnyvale, CA

Responsibilities:

  • Configuration 7609, 7606 with OSPF, Juniper (EX, QFX, QFabric) switches with various VLAN's.
  • Firewall technologies including general configuration, risk analysis, security policy, rules creation and modification of Check Point R65, R70 & R77, Fortinet NGFW series firewalls and Cisco ASA.
  • Hands on experience on all software blades of Check Point Firewall.
  • Active Directory Installation, Maintenance and Upgrades.
  • Responsible for All Software Installations on Both the Servers and Workstations. This Includes Antivirus Software and Any Custom Applications.
  • Install network backbone, wireless controllers and wireless access points (Cisco, Aruba, Ruckus).
  • Troubleshoot layer 2 issues, routing, HTTP, FTP, SSL Certificates and IPSec VPN tunnels.
  • Experience in Network administration, management and monitoring using Solarwinds, Tivoli, Info block, ACS and ISE.
  • Configured new SSID's on Wireless LAN Controller (WLC) with VLAN's, Security and other needed requirements.
  • Policy Reviewing, Audit and cleanup of the un-used rule on the firewall using Tufin and Splunk.
  • Worked on Cisco ISE with Access control and AAA protocols.
  • Implemented Layer 2 and Layer 3 security on routers & switches
  • Perform network engineering, design, planning LTM & GTM, APM load balancing implementation and scheduling infrastructure related tasks by coordinating with other teams.
  • Server load-balancing utilizing F5 LTM-Big IP, including APM, ASM and Viprion device modules.
  • Create and test Cisco router and switching operations using OSPF routing protocol.
  • Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches.
  • Optimized performance of the WAN network consisting of Cisco 3550/4500/6500 switches by configuring VLANs.
  • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
  • Configured BPDU Guard, port-fast, uplink fast and other spanning tree features.
  • Configuration and troubleshooting of Cisco 6500, 7500, 7200 Series routers.
  • Extensively worked on Nexus 5k and 7k configured and troubleshoot.
  • Managing and supporting large scale MPLS & Frame relay on Cisco environment for more than 5000 Retail sites, 100 Distribution centers, 100 offices and 3 datacenters.
  • Troubleshooting issues related to Layer 1/2/3 skills like switching / routing, WAN /Hardware and critical network links by coordinating with the vendor.
  • Involved in Configuration of Access lists (ACL) on ASA firewall for the proper network routing for the B2B network connectivity.
  • Performed troubleshooting, while maintaining trouble ticket tracking, following internal/external escalation procedures and customer notifications. Configured Cisco Routers for OSPF, RIP, IGRP RIPv2, EIGRP, Static and default route.
  • Configured the Cisco router as IP Firewall and for NATing.
  • Developed a detailed test plan and executed test cases using IXIA for traffic generation.
  • Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel. Design and implemented network
  • Involved in Switching Technology Administration including creating and managing VLANS's, Port security, Trunking, STP, Inter-VLAN routing, LAN security etc.
  • Deploying Layer 2 security in Server Farms by configuring switch for 802.1x port based authentication.
  • Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.

Environment: Juniper (EX, QFX, QFabric) Switches, Broadcom(PEX), Fortinet, CheckPoint, Palo Alto Firewalls, Cisco ACI, Viprion 2400 Cisco 6500/7500/7200 Routers, Nexus, 5K,7K, LTM, GTM, F5 Load Balancer, ASA, OSPF, SNMP, BGP, LDAP, IGMP, SSH, EIGRP, RIP, LAN, WAN, SSL/VPN.

Network Engineer

Confidential - Charlotte, NC

Responsibilities:

  • Configured and deploying Cisco catalyst 6506, 4948E, 4510 switches, Broadcom(PEX), Cisco 3660, 3845, and 7609 series Routers.
  • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500.
  • Experience in migration of VLANS.
  • Manage project task to migrate from Cisco ASA firewalls to Check Point firewalls
  • Involved in the troubleshooting aspects of complex network infrastructure using the routing protocols like EIGRP, OSPF & BGP.
  • Implementation of Access Lists for allowing/blocking desired traffic.
  • Configuring VLANs/routing/NATing with the firewalls as per the network design.
  • Responsible for Cisco ASA firewall administration, Rule Analysis, Rule Modification.
  • Configuration and maintenance of Cisco PIX and ASA firewall systems.
  • Good knowledge in systems integration, software hardware emulation experience.
  • Responsible for Configuring, Maintaining, And Repairing All Servers, Workstations, Laptops, And Peripherals.
  • Worked on change management documentation of Network infrastructure design using Microsoft Visio, SYSLOG.
  • Perform setup of test scenarios, both hardware and software components, and perform troubleshooting.
  • Experience working in Datacenter environment, configuration changes as per the needs of company.
  • Configured and performed troubleshooting on link state protocols like OSPF in single area and multiple areas.
  • Configure iBGP and eBGP peering between L3 routers and core routers
  • Configuring, implementing and troubleshooting VLAN's, VTP, STP, Trucking, Ether channels.
  • Designing, implementing LAN/WAN configurations on Cisco 5K, catalyst 6500 switches.
  • Installing, configuring Cisco 2500, 2600, 2800, 3600 series routers and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design.
  • Experience in configuring, upgrading and verifying the NX-OS operation system.
  • Troubleshoot issues with network connectivity and issues related to neighbor relationship and peers
  • Experience working with Nexus 7010, 5020, 2148, 2248 switches.
  • Experience configuring Virtual Device Context in Nexus 7k series switch.
  • Strong knowledge on networking concepts like TCP/IP, Routing and Switching.
  • Designed, configured, implemented site-site VPN on Cisco ASA 5500 firewall.
  • Implemented, configured redundancy protocols HSRP, VRRP, GLBP for Default Gateway Redundancy.
  • Worked in projects converting P2P circuits into MPLS circuits, commissioning and decommissioning of the MPLS circuits for branch offices.
  • Configuring and resolving various OSPF issues in an OSPF multi area environment.
  • Implemented, configured BGP WAN routing, converting OSPF routes to BGP (OSPF in local routing).
  • Packet capturing, troubleshooting on network problems with Wireshark, identifying and fixing problems.
  • Implementing, configuring, and troubleshooting various routing protocols like RIP, EIGRP, OSPF, and BGP
  • Performing network monitoring, providing analysis using various tools like Wire Shark, Solar winds.

Environment: CheckPoint, CISCO ASA, PIX, Broadcom, Cisco 6500/7500/7200 Routers, Nexus, 5K,7K, LTM, GTM, CISCO ASA, OSPF, BGP, EIGRP, RIP, LAN, WAN, SSL/VPN.

Network Engineer

Confidential - Newark, NJ

Responsibilities:

  • Performed Troubleshooting and observed directing conventions such OSPF, EIGRP & BGP.
  • Involved in composing investigating rules for MPLS VPN.
  • Experience with conventions, for example, Frame Relay, IEEE 802.11 and VLAN, OSPF and BGP, DNS, DHCP, FTP, NTP, SNMP, SMTP and TELNET.
  • Installed, designed (through CLI & SDM) and oversaw CISCO Routers and Catalyst switches.
  • Set up Internet, executing Networking items like Servers, Proxy servers, Switches, Firewalls, Routers.
  • Involved in client accelerations and investigating issues identified with integration, STP, VLAN, Trunking, VTP, Layer 2/3 exchanging, Ether channels, Inter-VLAN directing, log messages, high CPU usage and parameters that can debase execution of system.
  • Strong hands on experience on PIX, Firewalls, ASA 5500 series firewalls. Implemented Security Policies using ACL, IPSEC, SSL, VPN, IPS/IDS, AAA (TACACS+ & RADIUS)
  • Configured VLANS on different impetus switches performed investigating on TCP/IP system issues, Administered Frame-Relay and systems.
  • Provided specialized backing and issue determination for the LAN and its surroundings by breaking down the issue, recognizing the reason and circumstances of the issues and discovering an answer for the distinguished issue.
  • Good knowledge in Configuring Access Control List (ACL).

Environment: Windows Server, Windows NT, CISCO 2600, 2800 and 3200 series routers, CISCO 3300 and 2950 switches, TCP/IP, Proxy servers, Switches, Firewalls, Routers.

We'd love your feedback!