Sr. Network Engineer Resume
Moline, IL
SUMMARY
- CCNP and CCNA certified with 8+ years of professional experience in Network Planning, Implementing, Configuring, Troubleshooting and testing of networking system on both Cisco and Juniper Networks.
- Experience with the escalation problems & point - of-contact for Routing, Switching and WAN connectivity issues using ticketing system Remedy.
- Technical responsibilities included but were not limited to system performance and troubleshooting virtual and physical environments of various LAN/WAN technologies, server and enterprise applications and desktop technologies.
- Responsible for Check Point, Palo Alto and Cisco ASA firewall administration across global networks.
- Experience in Cisco Routing, Switching and Security with strong Cisco hardware/software experiences with Cisco Routers such as 800, 1800, 1900, 2900, 3900, 7200 Cisco ASR-1k/9k, Cisco Multilayer Switches 4500, 6500, Cisco Nexus 2k/3k/5k/7k/9k and Juniper M320, MX80, MX480, MX960, PTX1000 Routers and EX4200, EX8200 switches.
- Experience of routing protocols like EIGRP, OSPF, RIP, and BGP and setup of Access-Lists, and RIP, EIGRP, and tunnel installations.
- Proficiency in configuration of VLAN setup on variousCiscoRouters and Switches.
- Experienced in troubleshooting both connectivity issues and hardware problems on Cisco based networks.
- Well experienced in configuring gateway redundancy protocols like HSRP, GLBP, and VRRP.
- Experience with the implementation of multicast/MPLS/l2vpn.
- Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
- Experience in physical cabling, IP addressing and Subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
- Access control server configuration for RADIUS & TACAS+.
- Expertise with 802.11x wireless technology.
- Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Lab & Production Environments.
- Good knowledge of CISCO NEXUS data center infrastructure with 5000 and 7000 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (2232, 2248)
- Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.
- Good Knowledge on Juniper SRX configurations on various platforms of Junos.
- Installed and configured firewalls, IPS, IPSec VPNs and various screens for intrusion prevention on Juniper SRX equipment.
- Install, turn-up and configured Juniper hardware for Matrix & CPA test labs; routers, switches and test equipment.
- Wrote MoPs to configure Juniper and Tellabs interfaces 10Ge Trunks, OSPF, CoS, QoS, VPLS, EVPL, RSVP.
- Juniper hardware support of MX960e, MX480e, M10, M120, M320, T1600, T640, and Tellabs 8860.
- Managed Datacenter of F5 load balancers, Cisco 4500, Juniper M120 and Extreme switches
- Support for Juniper M120 & J series, Cisco 3745, 6500, Extreme Summit, GPRS CGSN, and Memotec switch.
- Devised and Implemented procedures for configuration and management of up to 400 Juniper Ex3300 access switches, including planning and development of a standard configuration template.
- Upgrade network equipment, software and hardware components and system configuration.
- Used SD- WAN technologies like Viptela, Versa and SilverPeak for centralized control function to securely and intelligently direct traffic across the WAN.
- Expertise on Cisco IOS, Cisco IOS-XR, Cisco CatOS, Cisco NX-OS, JUNOS.
- Expertise with monitoring tools like Solar Winds & network packet capture tools like Wire-shark
- Hands on experience with Linux and Unix OS Platforms
- Adept knowledge in preparing technical documentation and presentations using Microsoft Visio/ Office.
- Provided L3 support for Checkpoint and Palo Alto firewalls.
- Deployment of the Cisco ISE 2.2 in the current multi-vendor enterprise network to improve the port-security, for centralized monitoring and to manage the whole enterprise network.
- Automated network implementations and tasks and designed monitoring tools using python scripting.
- Configuring BGP/OSPF routing policies and designs, worked on implementation strategies for the expansion of the MPLS VPN networks.
- Responsible for Check Point and Cisco ASA firewall administration across global networks.
- Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.
- Worked on F5 LTM, GTM, ASM series like 6400, 6800, 8800 for the corporate applications and their availability.
- Has experience in Bash and Python scripting with focus on DevOps tools, CI/CD and AWS Cloud Architecture and hands-on Engineering
- Worked with scripting Automation for JavaScript, Linux/Unix toolbox, Python, Perl, Bash, ESX, VMware Virtual Switch with Design/Implementation
- Worked on multiple projects related to Branch networks, Campus networks, external clients and Data Center Environments involving data center migrations.
TECHNICAL SKILLS
Cisco & other vendor Equipment: Nexus 9k, 7K, 5K, 2K & 1K, Cisco routers (7600, 7200, 3900, 3600, 2800, 2600, 2500, 1800, 2900, 4300 series) & Cisco Catalyst switches (6500, 4500, 4900, 3750, 3500, 4500, 2900, 9200, 9300, 9500 series). PIX Firewall (506/515/525/535 ), ASA (5505/5510/5580 ), Meraki MX, Meraki vMX, Cisco ACE Load Balancers and Checkpoint (IP Series/NGX R65/IPSO)
Routing Protocols: OSPF, EIGRP, BGP, RIP v1/v2, PBR, Route Filtering, Redistribution, Summarization, and Static Routing, IS-IS, ICMP, FTP, SMTP, HTTP/HTTPS
Cloud Networking: AWS, Azure. Google Cloud
Scripting Languages: C, C++, Java, Python, Perl, Bash, Ruby
Switches: Nexus 2K/5K/7K, Cisco Catalyst 6500, 4500, 3850,3560, 3750, 2960; UCS-C, UCS-D, UCS-M, CUCM
Switching: LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Etherchannels, Transparent Bridging.
Network Security: Cisco ASA 5540, ACL, IPSEC, F5 Load Balancer, Checkpoint, Blue Coat, SCADA, Process Control Domain (PCD), NGFW Palo Alto, Panaroma, FirePower, CiscoISE, Juniper on JUNOS ASA, Zero Trust Security, XDR, Zscaler Tufin, Forcepoint, Cloud, CheckPoint, F5's BIG-IP, Fortinet, Barracuda, Juniper
Juniper Platforms: SRX, MX, EX Series Routers and Switches
Load Balancer: F5 Networks (Big-IP) LTM 8900 and 6400, GTM, Cisco CSM, APM
LAN: Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet
WAN & SD-WAN: PPP, HDLC, Channelized links (T1/T3), Meraki MX, Meraki vMX, Fiber Optic Circuits, Frame Relay, MPLS, ISP Leased Lines, SilverPeak, SONET, Viptella, Versa.
WLAN: Autonomous AP’s, Lightweight AP’s, WLC, Channels- 802.11b/g; Air Magnet, Ekahau, Map Info
Comm. Protocols: ARP, Wi-Fi, WiMax, CDMA, 3G
Gateway Redundancy: HSRP and GLBP
DHCP and DNS: Infoblox, QIP
Various Features & Services: IOS and Features, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP, FTP.
AAA Architecture: TACACS+, RADIUS, Cisco ACS.
Network Management: Wireshark, SNMP, Solar winds, HP Open View, KTLO, Cisco Prime, Infoblox, HP OpenView, Cisco Prime, Splunk, Security Device Manager (SDM), Cisco, TCP Dump and Sniffer; SolarWinds Net Flow Traffic Analyzer, XSOAR, Forcepoint, NetScout, Network Performance Monitor (NPM), XDR, Network Configuration Manager (NCM), SAM, IP Address Manager, Additional Polling Engine.
PROFESSIONAL EXPERIENCE
Confidential, Moline, IL
Sr. Network Engineer
Responsibilities:
- Worked extensively with Cisco 6500, 4500, Nexus 9K, 7K, 5K series switches, cisco 2960s series switches and cisco 3560/3750s switches. Juniper switches 2200/ EX3300/EX4200/EX4300/EX4500, QFX5100/5200.
- Responsible for Date Centre migration and its operation including the change from 6500 switches to nexus series switches, configured VPC/VDC on nexus 2k, 5k, and 7k.
- Implemented and Managed Cisco Nexus 7018, 7700 and Nexus 5596UP Switches configured with FEX 2248 extenders.
- Involved in switching Technology Administration including creating and managing VLAN’S, port security, Trucking, STP, Inter VLAN routing, LAN security etc.
- Installation and troubleshooting of firewalls Cisco ASA, and juniper firewalls.
- Experience with Cisco Firepower 9300 and 4120 Fire Sight.
- Supported the technologies like IWAN solutions, APIC-EM, prime Infrastructure and Cisco ASA.
- Deals with creating VIP pools, nodes and created custom iRules for the virtual server like cookies persistency and redirection of URL on F5 ASM cookies issues and configures ASM polices.
- Completed migration of physical Meraki MX to Meraki vMX in AWS.
- F5 VIRRION hardware products like LTM, GTM series like 6400, 6800, 8800.
- Complete implementation of Firepower Firewall protect threat from External attack. Unified Threat Management, Configuration of Remote VPN connectivity to remote location.
- Worked onCiscoLayer 2 switches (spanning tree, VLAN).
- Installed and configured four PIX 525 and two ASA 5520 in customer locations. In addition to that, two PIX firewall configured for the Guest access.
- Deployment of Cisco 6500 switches in standalone and VSS modes with SSO and NSF
- Supporting EIGRP, OSPF and BGP based network by resolving level 1 &2 problems of internal Sites.
- Providing daily network support for Global wide area network consisting of MPLS, VPN and point-to point site.
- Configuring, Administering and troubleshooting the Checkpoint and ASA firewall.
- Successfully Set up a Checkpoint firewall system in multiple locations, with IPS, Mobility and Web Content filtering blades.
- Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.
- Experience in Design, Implement, migration & troubleshooting of Juniper switches, routers and firewalls and with Juniper: EX-2200, EX-4200, EX-4500, MX-480, M Series, Junos and Screens, SRX210, SRX240.
- Implemented various routing protocols such as BGP, EIGRP and OSPF on Cisco Router & Juniper MX routers also taking care of issues such as discontinues networks.
- Successfully implemented iWAN technology more than 1000+ site.
- Leads the team to consistently accomplish organizational and corporate goals, as measured by consistent adherence Service Level Agreement.
- Work in the incident team to solve emergency and high priority Network issues.
- Responsible for managing the schedule for all shifts on the NOC (including weekends) as well as technician PTO requests, sick days, travel to facilities, and any other event that requires the schedule to be altered.
- Installation and management of overall administration of LAN, WAN system involving design of network layout, configuration and maintenance, commissioning Routers & Switches, firewalls, IPS and ensuring maximum uptime during side development to Data/VoIP & Wireless.
- Conducted a POC on SilverPeak, Versa and Viptella SD-WAN solution as a team and worked on evaluating the solutions.
- Designed, implanted and installation on AWS cloud engineering for AWS internal business units.
- Configured various BGP attributes such as Local Preference, MED, Extended communities, Route-Reflector clusters, Route-maps and route policy implementation.
- Maintained multi-vendor devices (Cisco, Juniper, Checkpoint, Arista etc) of the AWS.
- Configured Cisco ASA 5555-X in HP Pair, migrated all the sites to sites VPN’S from Cisco routers, Palo Alto firewalls and Net Screen firewalls to Cisco ASA. Responsible for configuring site to site VPN’s and Remote access ANYCONNECT services.
- Key responsibility of LAN and WAN maintenance and troubleshooting any network related problems.
- Tuned according to the requirement of the organization for developing and maintaining the routers and switching.
- Responsible for resolving service request tickets from the help desk which involved in providing complete technical support.
- Provided high level of security to the network by installing ASA 5520 along with ACLs.
Environment: Cisco 6500, 4500, Nexus 9K, 7K, 5K, Cisco 2960s, 3560/3750s, Juniper 2200/ EX3300/EX4200/EX4300/EX4500, QFX5100/5200, VPC/VDC on nexus 2k, 5k, and 7k, Cisco Nexus 7018, 7700 and Nexus 5596UP, FEX 2248, VLAN’S, port security, SilverPeak, Versa, Viptella, SD-WAN, Trucking, STP, Inter VLAN routing, LAN security, Cisco ASA, Juniper firewalls, Cisco Firepower 9300 and 4120, IWAN, APIC-EM, Cisco ASA, F5 ASM, LTM, GTM, 6400, 6800, 8800, Spanning tree, VLAN, PIX 525, ASA 5520, EIGRP, Meraki MX, Meraki vMX, OSPF and BGP, MPLS, VPN, Checkpoint and ASA firewall, EX-2200, EX-4200, EX-4500, MX-480, M Series, Junos and Screens, SRX210, SRX240, Data/VoIP & Wireless.
Confidential, Chicago, IL
Lead Network Engineer
Responsibilities:
- This global role helped expand my expertise into other areas such as Cisco UCS, Checkpoint Firewalls, Cisco ASA, and VMware NSX
- Manages and configures VPN’s, NATing and Object group-based ACL’s on Cisco ASA Firewalls.
- Migrated SAP based applications from old Cisco ACE load balancers to new VMware NSX edges.
- Deploying and decommission of VLANs on core ASR 9K, MIX routers, Nexus 9k, 7K, 5K, HP switches and its downstream devices.
- Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
- Deploying Site to Site VPN’s, Cisco Any Connect VPN Clients and SSL based Citrix Clients is part of my daily activities
- Worked on Multisite distributed ISE 2.0 (10 VM nodes) Design, Implement, Configure, Planned and migrated ACS existing configured devices like WLC, Radius, Tacacs+, 802.1x, Guest portal, posture policies and VPN authentication.
- Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5580 security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
- Managed and Upgraded the SecureAuth, UCS Firmware and Mobile Iron.
- Extensively worked with different senior engineers in troubleshooting SAN/VMware related issues.
- Use and maintain routing protocols EIGRP, OSPF and BGP on the ISR Router models like 2951, 3845, 3945, 7206 in the network & also worked on BGP Route Reflectors, Confederations.
- Configured a large-scale HSRP solution to improve the uptime of collocation customers, in the event a core router became unreachable.
- Installed and configured firewalls, IPS, IPSec VPNs and various screens for intrusion prevention on Juniper SRX equipment.
- Install, turn-up and configured Juniper hardware for Matrix & CPA test labs; routers, switches and test equipment.
- Test network resilience & failover by oversubscribing links, capacity planning, apply vendor software updates.
- Write MoPs to configure Juniper and Tellabs interfaces 10Ge Trunks, OSPF, CoS, QoS, VPLS, EVPL, RSVP.
- Juniper hardware support of MX960e, MX480e, M10, M120, M320, T1600, T640, and Tellabs 8860.
- Managed Datacenter of F5 load balancers, Cisco 4500, Juniper M120 and Extreme switches.
- Support for Juniper M120 & J series, Cisco 3745, 6500, Extreme Summit, GPRS CGSN, Memotec switch.
- Devised and Implemented procedures for configuration and management of up to 400 Juniper Ex3300 access switches, including planning and development of a standard configuration template.
- Upgrade network equipment, software and hardware components and system configuration.
- Maintain technical detailed documentation of LAN and WAN systems and applications.
- Configured and Managing LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches. Juniper firewall rules deployments. Provide JUNOS administrator worldwide. Juniper firewalls 50.
- Configured and sponsored portal Cisco ISE for access to the wireless devices.
- Install and configure two new Juniper switch environments. The new models; Juniper EX4200 & EX4550 switches. The EX4200s to become their new CORE switches and the EX4550 for customer's new Storage environment.
- This also involved Virtual Chassis and OSPF configuration for EX4200 Cores and bonded twinax for EX4550's for their storage environment. Configured Multihoming BGP routing on customer's Juniper SRX firewall infrastructure.
- Implemented Zone-Based Firewalling and Security Rules on the Palo Alto Firewall.
- Configuring and providing management support for Palo Alto and Checkpoint Firewall (R75, R76, R77).
- Configuring, Troubleshooting, and Marinating Palo Alto Firewalls (36+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
- Successfully configured and maintained site to site IPSEC and SSL VPN’s on Palo Alto firewalls.
- Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering).
- Successfully installed Palo Alto PA-3060 firewall then configured and troubleshoot using CLI an worked with Panorama management tool to manage all Palo Alto firewall and network from central location.
- Manage the Cisco Identity Services Engine (ISE) 2.2 in the distributed deployment to provide the authentication to the endpoint devices also monitor the networking devices in the network.
- Working on the Cisco ISE 2.2 in enterprise network security infrastructure including profiling utilization, MAB, 802.1x for Wired/LAN connection etc.
- MS Switch Setup, Enable & Configure Routing on the Switch
- MR Wireless Setup, Wireless Reconfiguration for Optimizing Deployment
- Worked on the Migration project for security levels with AAA, TACACS+.
- Work Closely with Cisco SD-WAN Viptela & Versa.
- Solution as for SD-WAN we need to have Cisco AVC deployed first to know the apps and bandwidth utilized by apps in network.
- Experienced provisioning SD-WAN service as automated failover solution for MPLS VPN by Cisco Meraki MX 80 Firewall
Environment: Cisco UCS, Checkpoint Firewalls, VMware NSX, VPN’s, NATing Cisco ASA Firewalls, Cisco ACE load balancers, ASR 9K, MIX routers, Nexus 9k, 7K, 5K, HP switches, OSPF, BGP, DHCP Profile, HSRP, IPV6, ISE 2.0 WLC, Radius, Tacacs+, 802.1x, SecureAuth, UCS Firmware, SAN/VMware, EIGRP, OSPF and BGP BGP Route Reflectors, Confederations, HSRP, IPS, IPSec, Juniper SRX, OSPF, CoS, QoS, VPLS, EVPL, RSVP, MX960e, MX480e, M10, M120, M320, T1600, T640, and Tellabs 8860, Cisco ISE, Palo Alto Firewall, Cisco SD-WAN Viptela, Versa, Meraki MX 80 Firewall.
Confidential, Bridgewater, NJ
Sr. Network Engineer
Responsibilities:
- Experience with moving data center from one location to another location, from Cisco 6500 based data center to both Cisco 6500 & Nexus based data center.
- Experience with implementing Cisco 6500 VSS at the distribution/core switches.
- Designed and Deployed QOS on entire LAN and WAN edge devices (Cisco & Juniper) in place of existing non-consistent QOS policy
- Responsible for entire LAN and WAN maintenance and troubleshooting of the company network.
- Involved in the Team of Data Center Operations to perform duties like administration and deployment of Cisco Routers and Switches according to the organization requirements.
- Involved in the team for designing and Configured Nexus 7000/5000/2000 in Top of Rack & End of Row Architecture for a Scalable Production Network that supports Rack & Blade server architecture in a Multi-Tenancy environment using VPC, VDC & VRF
- Experience in Configuring, upgrading and verifying the NX-OS operation system
- Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/NATing with the firewalls as per the design.
- Experience working with BGP attributes such as Weight, Local-Preference, MED and AS-PATH to influence inbound and out bound traffic
- Involved in Switching Technology Administration including creating and managing VLANs, Port security, Trunking, STP, InterVlan routing and LAN security.
- Use and maintain routing protocols EIGRP, OSPF and BGP on the ISR Router models like 2951, 3845, 3945, 7206 in the network & also worked on BGP Route Reflectors, Confederations
- Deployed a large-scale HSRP solution to improve the uptime of collocation customers, in the event a core router became unreachable.
- Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.
- Installed, configured and managed Cisco Meraki firewall MX250
- MX Security Appliance Setup, setting up Security Policies on MX, Auto VPN & Redundancy, Securing & Shaping Guest Wireless Access, configuring SD-WAN (Software-Defined WAN).
- Created AWS Route53 to route traffic between different
- Worked on multiple projects related to Branch networks, Campus networks, extranet clients and Data Center Environments involving in data center migrations from one data center to another.
- Provided estimated bandwidth requirements for data replication, to best determine adequate timing for migration service levels
- Created data migration strategies to help with completion of migration of data center from one point to another.
- Configuring various advanced features (Profiles, monitors, iRules, Redundancy, SSL Termination, Persistence, SNATs, HA on F5 BIG IP appliances SSL termination and initiation, Persistence, Digital Certificates, Executed various migration/upgrade projects across F5 and hands on with F5 BIG IP LTMs/EM.
- Network Segmentation-application migrations for enterprise Private Data Firewall and data behind ASA 5585-Xs.
Environment: Cisco 6500, Nexus, QOS Cisco & Juniper, Cisco Routers and Switches, Nexus 7000/5000/ VPC, VDC & VRF, NX-OS, Cisco's ASA 5500/PIX, VLANs, routing, BGP attributes, Trunking, STP, InterVlan routing, LAN security, EIGRP, OSPF, BGP, Cisco 4510, 4948, 4507 switches, Cisco Meraki firewall MX250, SD-WAN (Software-Defined WAN), AWS, SNATs, F5 BIG IP LTMs/EM.
Confidential, Richardson, TX
Network Engineer
Responsibilities:
- Experience working with Cisco IOS-XR on the ASR9000 devices for MPLS deployments
- Experience with migrating from OSPF to BGP WAN Routing protocol
- Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with PIX Firewalls
- Configured, Installed, Maintained and involved in troubleshooting edge routers that has router models like 2951, 3845, 3925.
- Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches
- Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer
- Experience with moving data center from one location to another location, from 6500 based data center to Nexus based data center
- Experience in communicating with different customers, IT teams in gathering the details for the project
- Configuration 7609, 7606 with OSPF and catalyst 6505, 4500, 3550 switches with various VLAN.
- Create and testCisco router and switching operations using OSPF routing protocol, ASA Firewalls, and MPLS switching for stable VPNs
- Redesign of Internet connectivity infrastructure for meeting bandwidth requirements
- Configured HSRP and VLAN trucking 802.1Q, VLAN Routing on Catalyst 6500 switches
- Optimized performance of the WANnetworkconsisting of Cisco 3550/4500/6500 switches by configuring VLANs
- Configured BPDU Guard, port-fast, uplink fast and other spanning tree features
- Configuration and troubleshooting of Cisco 2500, 2600, 3000, 6500, 7500, 7200 Series routers
- Experience in WAN technologies like T1/T3, DS3, STM1 and STM4 circuit types
- Configured Security policies including NAT, PAT, VPN, Route-maps and Access Control Lists
- Worked on F5 LTM, GTM series like 6400, 6800, 8800 for the corporate applications and their availability
- Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco PIX Firewall, Nortel VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall
- Having Data Center Design Experience, installing and Configuring Network Devices in a Data Center including patching the cables in the Patch Panel. Design and implemented network infrastructure and configured the entire network Infrastructure devices including Network Printers and Register.
Environment: Cisco IOS-XR, ASR9000, OSPF, BGP WAN, 3DES, AES/AES-256 PIX Firewalls, Cisco Catalyst switches 6500, 3750 & 3550 series OSPF, EIGRP, BGP, MPLS Layer 3 VPN, 6505, 4500, 3550 switches, 802.1Q Catalyst 6500 switches, Cisco 3550/4500/6500 , BPDU Guard, 2500, 2600, 3000, 6500, 7500, 7200 Series routers, T1/T3, DS3, STM1,STM4, NAT, PAT, VPN, F5 LTM, GTM series 6400, 6800, 8800, Cisco PIX Firewall, Nortel VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall