We provide IT Staff Augmentation Services!

Cloud Front Network Engineer Resume

2.00/5 (Submit Your Rating)

Seattle, WA

PROFESSIONAL SUMMARY:

  • Experience in Networking, including hands - on experience in IP network design providing network Support, installation and analysis.
  • Network Professional with 8 years of experience in Designing and troubleshooting LAN, WAN, MPLS in Branch, Campus and Data Center environments.
  • Expert level knowledge of troubleshooting, implementing, optimizing and testing of static and Dynamic routing protocols such asEIGRP, OSPF,BGP; ability to interpret and resolve complex route table problems.
  • Expert Level experienced in Wireshark for network analysis purposes and to Analyze packet traces.
  • Implementation of traffic filters on Cisco routes using Standard, extended Access list.
  • Expert Level Knowledge about TCP/IP and OSI models.
  • In-depth expertise in analysis, implementation, troubleshooting & documentation of LAN/WAN
  • Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.
  • Testing and Installation of Cat 5/6 network cabling as well as fiber optic cabling.
  • Experienced in installation, configuration and maintenance of Cisco ASR 9K, 7200, 3900, 2800, 2600, 2500 and 1800 series Router / Cisco Nexus 7010, 5548, 2148 Catalyst Cisco 6500 (sup 720), 4500 (SUP 6), 3750, 2950 series Switches.
  • Experience configuring Virtual Device Context in Nexus 7k, 5k and 2k.
  • Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF,
  • LDP, EIGRP, RIP, BGP v4, MPLS
  • Hands on Experience testing iRules using Browser(IE), HTTP watch, curl, Scripts (shell/batch file/Perl) and host files
  • Configuring and testing Multicast for both IPv4 and IPv6 routing in Data Environment
  • Technical Knowledge on Cisco DMZ, ASA 5500 series firewalls.
  • Trunks, VTP Ether channel, STP, RSTP and MST.
  • Experience in troubleshoot network issues including boundary protection devices, Cisco Nortel/Avaya and Bluecoat Proxy Servers.
  • Experience with hardware load balancer administration and support, preferably with F5 and Cisco ACE load balancers.
  • Strong knowledge base in the design and deployment of Blue Coat Proxy SG and Checkpoint firewalls
  • Proficient in design, implementation, management and troubleshooting of Check Point firewalls, Cisco PIX, NetScreen Firewalls, Check Point Provider-1 / VSX, Nokia VPN, Palo Alto IDS, Foundry / F5 Load Balancers, and Blue Coat Packet Shaper systems.
  • Configuring Cisco routers and switches to enable and troubleshoot a variety of features such as Trunk, Vlan, Ether channel, port security, routing protocols including EIGRP, OSPF & BGP and Other related technologies such as multicasting, IP Telephony & IP Video.
  • Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 8800 for the corporate
  • Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco PIX Firewall, NOKIA Firewalls
  • Nortel VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall.
  • Creating and provisioning Juniper SRX firewall policies.
  • Experience working with JUNOS OS on JuniperRouters and Switches.
  • Working knowledge of frame relay, MPLS services, IPSecVPN's, OSPF, BGP and EIGRP routing protocols, NAT'ing, sub-netting, also including DNS, WINS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RTSP & Multicasting protocols.
  • Experience in the setup of Access-Lists, and RIP, EIGRP, and tunnel installations.
  • Good knowledge and experience in Installation, Configuration and Administration of Windows
  • Servers 2000/2003, Active Directory, FTP, DNS, DHCP, TFTP, Linux OS under various WAN environments.

TECHNICAL SKILLS:

Routers: (1800, 2500, 2600, 2800, 3600, 3750, 3800, 7200), ASR 1K and 9K.

Cisco Switches: (2900, 3500, 4000, 4500, 5000, 5800, 6500, and 7600 Nexus 2k, 3k, 5k and 7k), MSFC, MSFC2.

Juniper: E series, J series and M series. Juniper SRX & Netscreen, T -Series, MX-Series Routers.

Routing Protocol: (BGP, OSPF, EIGRP, ISIS, IGRP, LDAP, IGMP, RIP), Routed Protocol TCP/IP, SIP, Multicasting (PIM), 802.1Q.

LAN Protocol: VLAN, PVLAN, VTP, IPX, Inter-VLAN routing, ISL, dot1q, STP, IS-IS, RSTP, MSTP, IPVST, LACP, HSRP, GLBP, VPC, VDC, Ethernet, Port security.

WAN Technology: Frame Relay, ISDN, ATM, WAAS, PPP, ICMP, WiSM Module in 6509, X.25, L2VPN, L3VPN, E1/T1/DS1/DS3

Network Management: SNMP v2, v3, Syslog, HP Open View NNM, Net flow Analyzer, Sniffer, Wireshark, Cisco Works, 3Com Network Analyzer, Solarwinds, Orion.

AAA Architecture: TACACS+, RADIUS, Cisco ACS.

Operating systems: Linux, UNIX, DOS, Windows XP/2007/2008, Windows 2003 server and Windows 2008 server

Network Security: NAT/PAT, Ingress &Egress Firewall Design, VPN ConfigurationInternet Content Filtering, Knowledge of Firewall, ASA, Cisco FWSM/PIX/ASDM, Cisco NAC,IPSEC, Nokia Checkpoint NG, SPLAT, IPS/IDS (Snort), IPS 4260.

Application Protocols: DHCP, DNS, FTP, HTTP, SMTP, TFTP.

Documentation: Microsoft Office, Visio

Languages: Basic understanding of the UNIX/LINUX operating environments with the ability to navigate.

PROFESSIONAL EXPERIENCE:

Confidential, Seattle, WA

Cloud Front Network Engineer

Responsibilities:

  • My major duties are to plan and build the new POP for clients on premise infrastructure to Confidential could, monitor the Confidential ’s network internal tools like AWS deployment portal for could front (AWS).
  • As per changing the clients demand working on restriping the ports and increase the capacity form 10G to 100G and decommission the 10G links.
  • Working with team for architecture decisions and working for ongoing migrations efforts.
  • Designing, installing, administering and optimizing the hybrid cloud components to ensure business continuity. (i.e. VPN Gateways, AWS internal portals)
  • Configuring and building the Juniper border and transit MX-series (MX960, MX420, MX480, QFX series) routers.
  • Assisted in effective operation and maintenance of enterprise based network solutions and applications.
  • Using tools like TT for ticketing, GenevaBuilder, NetworkConfig Builder, Git, AWS deployment dashboard, NetCircuit etc.
  • Doing Migration for the existing links from MX960 routers to QFX10002 routers on bank1 and bank2.
  • Strong knowledge on networking concepts like TCP/IP, MPLS, DWDM, LACP, Routing and Switching.
  • Testing BGP features such as as-override, Local pre, EBGP load balancing
  • Good hands on experience JUNOS CLI experience across the QFX, EX, MX, and PTX series.
  • Configured VLANs on a switch for inter-VLAN communication. Configured VLAN Trunking Protocol (VTP) on Core Switches. Configured various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches for STP, VTP Domain, VLAN, Trucking, Fast Ether Channel configuration.
  • Worked with network services like DNS, DHCP, DDNS, IP4, IP6, IPsec, VPN etc.
  • Implementing, Monitoring, Troubleshooting and Convergence in Frame-Mode MPLS inside the core.
  • Configured Multicasting protocol for IPTV and Multicast over GRE tunnels.
  • Experience in EX 4300/4600/9200, QFX10002, QFX5100, QFX5110 and MX and SRX routers.
  • Developed project plans and related documentation in coordination with project managers.
  • Suggested capacity planning techniques for optimal performance of network services
  • Coordinated with internal technical groups for delivery of telecommunication services and network infrastructure
  • Confidential, Madison, WI

    Sr Network Engineer

    Responsibilities:

    • Performed network engineering, design, planning (WAN & LAN) & implementation. Studied single point failures & designed WAN structure in such a way that there are no failures in network in case of any device or link failure.
    • Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.
    • Configured Cisco ASR routers such as ASR 1013, 1009-X, 1006, 1006-X, 1004, 1002-HX, 1002-X, 1001-X routers.
    • Primary roles includeSIEM monitoring and investigation of any alerts using tools such as Arcsight ESM, Arcsight Logger, HBSS, NetScout, Site Protector IDS, and Wireshark Protocol Analyzer.
    • Actively involved in Switching Technology Administration including creating and managing VLANS, Port Security-802.1x, Trucking 802.1Q, RPVST+, Inter-VLAN routing and LAN security on Cisco Catalyst Switches 4507R+E, 6509-E and Cisco Nexus Switches 2232,5596,7009
    • Setting up VLANS and configuring ISL trunk on Fast-Ethernet channel between Switches.
    • Network-wide implementation ofF5Traffic steering nodes with TCP acceleration,
    • Juniper, Checkpoint Cisco ASA, Cisco PIX and Palo Alto Firewalls Administration Checkpoint Firewall Deployment, Upgrade and Administration
    • Design and Implement Catalyst/ASA Firewall Service Module for various LAN’s.
    • Experience in Adding Rules and Monitoring Checkpoint Firewall traffic through smart dashboard and smart view Tracker applications: First we monitored the whole traffic through checkpoint firewall and if see any Suspicious Activity in network we have to stop it that’s why we were adding some rules to stope those kinds of activities.
    • Worked with Checkpoint firewalls R75/R77 such as installing/deleting and troubleshooting the networks, Created Virtual Servers on F5 Load balancer.
    • Writing i-Rules and i-Apps on the F5 load Balancer and Renewing the Certificates.
    • Deployment of enterprise firewalls (Palo Alto Networks, Cisco ASA, Check Point) in production environments.
    • Worked with network services like DNS, DHCP, DDNS, IP4, IP6, IPsec, VPN etc.
    • Implemented security policies using ACL, Firewall, IPSEC, SSL, VPN, IPS/IDS AAA (TACACS+ & RADIUS), Managed Cisco PIX firewall for ACL and VPN.
    • Performed load balancing and application level redundancy by deploying F5 BIG-IP LTM 3900
    • Blocking Websites with Content Filtering and Layer 7 Firewall Rules
    • Configuring Content Filtering to block user access to groups of websites or individual sites
    • Successfully integrate and validate Openstack Liberty withCisco ACI platform ML2 plugin as the next generation network infrastructure for Cisco Cloud
    • Improve scalability and ease of deployments of the Openstack underlay network by migrating from Standalone Nexus toCisco ACI platform
    • Distributed system and infrastructure. Clustered distributed controller forCisco Application Centric Infrastructure (ACI), SDN. Model-basedACI/SDN controller. Network orchestration.
    • Application Centric Infrastructure (ACI) L4-L7 services deployment: Develop L4 to L7 service chaining and traffic steering forACIcontroller. DevelopACImodel and implement resource management for service deployment
    • Configuring Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210
    • Support remote access for virtual private networks (VPN), network computing NCD and wireless devices.
    • Troubleshoot Remote Access issues.
    • Implementing, Monitoring, Troubleshooting and Convergence in Frame-Mode MPLS inside the core.
    • Configuring VLAN, spanning tree, VSTP, SNMP on EX series switches
    • Understand the JUNOS platform and worked with IOS upgrade of Juniper devices
    • Designed and implemented security policies using ACL, firewall. Configured and maintained 26 NOS network security team devices including IDS, Palo Alto firewalls, Bluecoat web proxies, and load-balancers.
    • Cisco ISE 1.3 Deployment and Profiling Policies
    • Worked with Splunk Monitoring and Reporting
    • Creating FirePass access for users to use F5 Network
    • Worked extensively on Cisco Firewalls, Cisco (506E/515E/525/) & ASA 5500(5510/5540) Series
    • Setup and maintained of Virtual Local Area Networks (VLANS) using Cisco routers and multilayer Switches and supporting STP, RSTP, PVST, RPVST along with troubleshooting of inter VLAN routing and VLAN trunking using 802.1q.
    • Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
    • Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches
    • Worked extensively on Controlling the Traffic, creating the groups SSL of load and SSL certification on F5 load balancer
    • Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.
    • Configuring and implementation of Juniper Firewall, SSG Series, Netscreen Series ISG 1000, SRX Series.
    • Configured routing policy for BGP. Switching related tasks included implementing VLANs and configuring ISL trunk and 802.1Q on Fast-Ethernet channel between switches
    • Implemented Cisco IOS Firewall IDS using 2600 series router.
    • Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers and Cisco ASR 9K routers, Improve QOS Configurations
    • Master a BGP roll-out and master allQOS deployments
    • Provided application level redundancy and availability by deploying F5 load balancers LTM.
    • Troubleshooting on network problems with Wire shark, identify problem and fix.
    • Configured Nexus 2000 Fabric Extender(FEX) which acts as a remote line card(module) forthe Nexus 5000.
    • Understand the JUNOS platform and worked with IOS upgrade of Juniper devices
    • Redistributed the routing protocols and Frame-Relay configurations.
    • Configured and troubleshooting type of routing to route traffic flow per customer requirement as primary, backup/ F5 load balanced and load splitting.
    • Operation and troubleshooting of Juniper routers, HP/H3Cnetwork switches and Riverbed accelerators
    • Deployed and decommissioned the VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices
    • Performed the maintenance of Active Directory and replication scheme, DNS/DHCP services and time services; wrote step-by-step procedures for implementing upgrades.
    • Dealt with creating VIP (virtual servers), pools, nodes and applying iRules for the virtual servers like cookie persistency, redirection of the URL
    • Configured VLANs on a switch for inter-VLAN communication. Configured VLAN Trunking Protocol (VTP) on Core Switches. Configured various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches for STP, VTP Domain, VLAN, Trunking, Fast Ether Channel configuration.
    • Documented all the work done by using Visio, Excel & MS word.

    Confidential New Jersey, Jersey City, NJ

    Sr. Network Engineer

    Responsibilities:

    • Experienced with converting Cisco ACE load balancer to F5 LTM load Balancer in data center environment: As cisco is going to stop the production of cisco ACE we need to find some alternative solution which will take position. We were using DevCentral which included several scripts to assist with the configuration migration process. In theAdvanced Design and Config wiki, we’ve created a topic aptly with the titled “Cisco” that includes scripts to convert ACE configurations into its F5 counterpart.
    • Experienced with converting PIX rules over to the Cisco ASA solution: In this scenario, we were using Cisco PIX-to-ASA migration tool which is recommended and easy to convert.
    • Experienced working with Cisco Nexus 2148 Fabric Extender and Nexus 7010 5000 series to provide a Flexible Access Solution for datacenter access architecture: Cisco Nexus 2148 Fabric Extender provides highly scalable unified server-access platform across a range of 100 Megabit Ethernet and 1 to 10 Gigabit Ethernet which helps to create reliable datacenter access architecture.
    • Managed, maintained and support Checkpoint Firewalls, IPS,IDS, and Endpoint servers, PKI and network security Infrastructure.
    • Engineer and Support the agencies security infrastructure consisting of Firewalls,IDS, Proxies, Endpoint Security products and PKI.
    • Improved QOS Configurations
    • Testing and Installation of Cat 5/6 network cabling as well as fiber optic cabling.
    • Reviewed and corrected the deployment of Lync application QOS policies
    • Master a BGP roll-out and master allQOS deployments
    • CiscoASA firewall service and Citrix NetScaler Load balancing service deployment onACIwith Microsoft Azure Pack configuringCiscoApplication Centric Infrastructure (ACI) andCiscoAPIC
    • Security infrastructure engineering experienced as well as a Microsoft Windows, UNIX, Checkpoint Firewalls, Juniper firewalls, PIX firewalls, Blue Coat Proxies, Juniper Intrusion Prevention devices, and wireless switch Security Management
    • Successfully installed Palo Alto PA-3060 firewalls to protects Data Center and provided L3 support for routers/switches/firewalls
    • ImplementedCisco Application Centric Infrastructure (ACI) as a solution for data centers using a Spine and Leaf architecture
    • Blocked Websites with Content Filtering and Layer 7 Firewall Rules on Palo Alto.
    • Configured Content Filtering in Palo Alto to block user access to groups of websites or individual sites.
    • Performed Checkpoint firewall upgrade of 50 firewalls from R55 to R65. The firewalls were on Nokia IP 1220 platforms. Administered Juniper 50, 200, 500, and SSG 520 firewalls.
    • Worked extensively on Controlling the Traffic, creating the groups SSL of load and SSL certification on citrix load balancer.
    • Performed extensivetestingaround the upgrade, migration and configuration functionality of our software
    • Deployed and decommissioned of VLANs on core ASR 9K, Nexus 7K, 5K and its downstream devices
    • Strong knowledge on networking concepts like TCP/IP, Routing and Switching
    • Dealt with monitoring tools like (Solar Winds, Cisco Works), network packet capture tools like Wireshark
    • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair
    • Demonstrated topics of CISCO switching & routing to team as per training sessions.
    • Configuration of Cisco ASR routers such as ASR 1013, 1009-X, 1006, 1006-X,1004, 1002-HX, 1002-X, 1001-X routers
    • Implemented configuration scripts and necessary changes on switches & routers as per Confidential .
    • Extended support on access layer, distribution layer and core layer device of Confidential as per assigned.
    • Moved data center from one location to another location, from Cisco 6500 based data center to both Cisco 6500 & Nexus based data center.
    • Switching tasks include VTP, ISL/ 802.1q, IPSec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP.
    • Involved in design and deploying various network security & High availability products like Cisco ASA and other security products.
    • Configured, troubleshoot, installed, and managed Juniper J and M series routers, Juniper NetScreen firewalls to include ISG 2000, NS-5200, and SSG series.
    • Administered multiple Firewall of Juniper / NetScreen, in a managed distributed environment. Fulfilled routine change requests of Net Screen OS Firewall and resolved trouble tickets, maintained and monitored firewalls.
    • Configured of LAN/WAN/WLAN links using ATM, Frame Relay, PPP, HDLC, IEEE 802.1q, VLAN, NAT, DHCP, 802.1Q-in-Q protocols and cross connections
    • Setup and maintained of Virtual Local Area Networks (VLANS) using Cisco routers and multilayer Switches and supporting STP, RSTP, PVST, RPVST along with troubleshooting of inter VLAN routing and VLAN trunking using 802.1q
    • Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with PIX Firewalls.
    • Knowledge of MP-BGP and MPLS LDP protocols
    • Migration of existing IPSEC VPN tunnels from Pre-Shared key to Certificate Authority for purpose of scaling
    • Health check and automated IOS and script updates applied via voyance application (now EMC).
    • Best practice implemented on Cisco & Juniper routers and switches.
    • Successfully implemented EOL project alias 'End of life equipment' assigned as per Confidential guidelines in live environment.
    • Extended end to end network support on L2 and L3 switches.
    • Network Redesign for Small Office/Campus Locations. That included changes to both the voice and data environment.
    • Installed and trouble-shooting of LAN, WAN & Multi-Layer Switching.
    • Act as first point of contact to diagnose an issue and drive it to closure Troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.
    • worked with Nexus 7010, 5020, 2148, 2248 devices.
    • Experienced with communicating with different customers, IT teams in gathering the details for the project: Different clients have different requirements so we as a team gathered all the requirements from the clients and then design the whole network according to requirements.
    • Ensured all devices are running with latest IOS as per Confidential along with latest passwords.
    • Implemented changes in configuration as per task assigned within scheduled change window and ensure backups of device before and after the change.
    • Co-ordinates with Vendors to replace the faulty hardware like power supply, fans, modules, cables, sfp, access points & laps.
    • All Juniper firewalls are managed through NSM. Site to site VPN for all b2b and vendor tunnels with Checkpoint and Cisco VPN’s. MacAfee was the anti-virus used at the desktop and server levels within Mass Mutual

    Confidential, Columbus, OH

    Network Engineer

    Responsibilities:

    • Responsible for Internal and external accounts and, managed LAN/WAN and checking for Security
    • Configured, installed, & managed DHCP, DNS, & WINS servers
    • Configured & maintained of Cisco2600 series routers with OSPF.
    • Configured and maintained of Cisco ASR routers such as ASR 1013, 1009-X, 1006, 1006-X,1004, 1002-HX, 1002-X, 1001-X routers
    • Configured and implemented various protocols on 2800 series router for efficient performance of network.
    • Managed a TACACS server for VPN user authentication and network devices authentication
    • Upgraded the network by translating protocols like EIGRP to OSPF.
    • Monitor, evaluate & report on health of both Wide & Local Area (WAN/LAN) Networks.
    • Maintained the whole network and troubleshooting the network issues for efficient performance.
    • Configured and supported to Juniper Netscreen firewalls and Palo Alto firewalls.
    • Testing and Installation of Cat 5/6 network cabling as well as fiber optic cabling.
    • Managed the Netscreen SSG550 and ISG1000 and 2000 firewalls with the NSM.
    • Team member of Configured ofCisco7206 router and Configured of Catalyst switches.
    • Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
    • Installed and configured F5 Load balancers and firewalls with LAN/WAN configuration.
    • Worked on various Nexus Products 7010, 7009, 2248.
    • Created and testedCisco routers and switching operations using OSPF routing protocol.
    • To secured configurations of load balancing in F5, SSL/VPN connections, Troubleshooting CISCO ASA firewalls, and related network security measures.
    • Experienced working with Layer 1-7 switching, TCP/IP, OSPF and load balancing (Cisco L2/L3 switches, firewalls, load balancers.
    • Worked extensively on Controlling the Traffic, creating the groups SSL of load and SSL certification on citrix load balancer.
    • Managed customer Firewall's (FW), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) and other security threat data sources on Check point and Juniper FW's.
    • Installed and configured Cisco ASA 5500 series firewall and configured remote access IPSEC VPN on Cisco ASA 5500 series
    • Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls per design.
    • Workedwith security issue like applying ACL's, configuring NAT and VPN
    • Experienced in configuring routing protocols like EIGRP, RIP v2, OSPF & BGP and Cisco ACS protocols like RADIUS and TACACS.
    • Troubleshoot issues related to connectivity, STP, VLANs, Trunking, VTP, Layer 2/3switching, Ether Channels, Inter-VLAN routing, log messages, high CPU utilization and parameters that can degrade Performance of the network.
    • Tested BGP features such as as-override, Local pre, EBGP load balancing
    • Maintained complex LAN/WAN networks with several VLANS and provided support for routing protocols and also providing secure sessions over internet using IPSec and SSL encryption.
    • Configured Multicasting protocol for IPTV and Multicast over GRE tunnels.

    Confidential

    Network Engineer

    Responsibilities:

    • Worked on troubleshooting customer related issues related to router Configuration, Layer 1/Layer 2 issues.
    • Worked on Frame Relay switches.
    • Testing and Installation of Cat 5/6 network cabling as well as fiber optic cabling.
    • Worked on OSPF using features like TSA, SA, NSSA and route summarization.
    • Configured EBGP/IBGP policies also tested BGP attributes such as Local preference, MED, AS-PATH, Community and Weight.
    • Configured EIBGP load balancing and ensured stability of BGP peering interfaces.
    • Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.
    • Configured Virtual-link between discontinuous backbone areas in the network also established authentication between all OSPF routers using MD5 authentication.
    • Involved in effective communication with vendors, peers and clients in resolution of problems, equipment RMA’s and provided 24x7 support.
    • Monitored network performance accompanying company service level agreements (SLA’s) using Network management tools such as Cisco works and also provided necessary recommendations to improve network performance.

We'd love your feedback!