Post Job Free

Resume

Sign in

Network Infrastructure Wireless

Location:
Hyderabad, Telangana, India
Posted:
March 08, 2024

Contact this candidate

Resume:

PROFESSIONAL SUMMARY:

Over * years of hands-on experience in designing, integrating, deploying, maintaining and supporting broad range of Network and security infrastructure.

Strong hands-on experience in layer-3 Routing and layer-2 Switching. Dealt with Nexus models like 9K,7K, 5K,2K series, Cisco router models like 7200, 4400, 3900, 3800, 2900, 2800, 1900, 1800 series and Cisco catalyst 6500,4500, 3750, 3500, 2900 series switches, WLC’s, WAP’s, Proxies. V

•Experienced in Deploying Wireless Network Infrastructure and Wireless Survey Best Practices. Experience with Cisco wireless solutions including 2504, 5508, 5520, 8500 WLCs.

Advanced knowledge in TCP/IP suite and IPAM, routing protocols, such as OSPF, EIGRP, ISIS, and BGP.

Advanced knowledge, design, installation, configuration, maintenance and administration of Juniper SRX Firewall, Juniper EX and Juniper MX devices.

Experience in monitoring, debugging, and resolving Cisco infrastructure issues like routing, Network Hardware/Software failure, configuration, WAN outages, and performance issues.

Working experience on Cisco Virtual Office solution.

In-depth knowledge and experience on IP Addressing, Subnetting, VLSM, and ARP, Ping concept, working knowledge on OSI model, TCP/IP, 802.1q.

Experience in performing system administration for Red Hat Linux, Microsoft Windows 2008 Enterprise Server, Windows 2003 Standard/ Enterprise Server, Windows 2000 Standard/ Advanced Server, Windows98/XP/Vista/7.

Experience with working on latest cisco switches like Nexus 2000, 5000, 6000 and 7000 series switches while implementing advanced features like VDC, VPC, OTV and Fabric Path.

Used DHCP to dynamically assign reusable IP addresses to DHCP clients using Infoblox IPAM and resolved IP address conflicts.

Installed and implemented & troubleshoot the Network Virtualization through VM Ware and NSX. Configure, Manage, Analyze, and Optimize Network Performance, Traffic, SDWAN, VPNs, Security, Firewalls, & Policies

Designed and managed Meraki network solutions for seamless connectivity and simplified network management.

Strong troubleshooting skills using Packet capture in Cisco devices and FW monitor and TCP dump in Checkpoint devices and analyzing them in Wireshark & NetScout.

Experience in configuring and Troubleshooting BIG-IP F5 load balancer LTM & GTM.

Experience in Design and configuring of OSPF, BGP on Juniper Routers (MX960, MX480).

Complete understanding of basic and advance F5 load balancer configurations, including migrating configurations from Cisco ACE to F5 load balancer and general troubleshooting of the F5 load balancers.

Used Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.

Installed and implemented & troubleshoot the Network Virtualization through VM Ware and NSX. Configure, Manage, Analyze, and Optimize Network Performance, Traffic, SDWAN, VPNs, Security, Firewalls, & Policies

Experience with converting Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Palo Alto rules.

Implemented and managed Juniper Mist wireless networking solutions to optimize network performance and enhance user experience.

Hands on experience with ACI (Application Centric Infrastructure) with spine and leaf architecture.

Responsible for the secure development lifecycle for Cisco's Nexus line of products, including Application Centric Infrastructure (ACI), Application Policy Infrastructure Controller (APIC) - Cisco's Software Defined Network (SDN) solution, as well as the Cisco Nexus 9000, 7000, 6000, 5000, 4000, 2000.

Experience in Physical cabling, IP addressing, configuring and supporting TCP/IP.

Hands on experience with ACI (Application Centric Infrastructure) with spine and leaf architecture.

Responsible for maintenance and utilization of VLANs, Spanning tree, HSRP, VTP of the switched multi-layer backbone with catalyst switches.

Written Python and Power shell scripts for the automation of deployments and integrating with the CI tool.

Deploy, scale and automate network across multiple global datacenters supporting Amazon Web Services (AWS).

Worked with I.T. Departments on "Best Practices" for Blackberry Server, Exchange/Active Directory Deployment, Windows 7 and Office 2010 Rollouts.

Great exposure to SDN and network function virtualization (NFV) technologies like Cisco ACI.

Troubleshooting and problem resolution of Virtualization (vSphere 4.1\5.1\5.5) Infrastructure.

Provided second/third level technical support for ACI (Application Centric Infrastructure) technologies.

TECHNICAL SKILLS:

Networking Technologies

LAN/WAN Architecture, TCP/IP, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP

Networking Hardware

Cisco Switches, Cisco Routers, ASA/Pix/Palo Alto/Fortinet/Juniper firewalls.

Routing Protocols

OSPF, ISIS, EIGRP, RIP, MPLS, IS-IS, BGP, Multicasting

Security Technologies

PAP, CHAP, Cisco PIX, Blue Coat, Palo Alto, ASA, Fortinet, Checkpoint

Network Monitoring

SolarWinds, Wireshark, HRping, Whatsupgold, Infoblox

Operating Systems

Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR, IOS-XE, NX-OS

Routers

1800, 2611, 2800, 3600, 3845, 3900,4300, 4400, 4500, ASR 1000X, 7206VXR, Juniper M & T Series.

Load Balancers

F5 Networks (BIG-IP), NetScaler (Citrix)

Capacity & performance

Cascade Riverbed (Flow Monitor), WAN Killer

Switches

CISCO 2960,3750,3850, CAT 9300, CAT9400, CAT 9500,4500,6500,6800 Nexus 7k,5k,2k

WAN AND SD- WAN Technologies

MPLS, ISP Leased Lines, SONET, Viptella, Versa.

Programming Languages

C, C++, Perl, Power Shell, Python

Simulation Tools

GNS3, VMware, OPNET IT GURU, OPNET Modeler, Cadence

Firewalls

Juniper Net Screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA (5520/5550/5580), McAfee Web Gateway, Checkpoint, Palo Alto firewalls.

AAA Architecture

TACACS+, RADIUS, Cisco ACS

Features & Services

IOS and Features, HSRP, GLBP, VRRP, IPAM IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management, Open Stack, IVR’s, HLD and LLD documents, Dell equal logics

EDUCATION:

Bachelor’s Degree in Electronics and Communication Engineering, Karunya University-Coimbatore, India.

CERTIFICATION:

(CCNA) – Cisco Certified Network Associate

(CCNP) – Cisco Certified Network Professional

(PCNSE)- Palo Alto Certified

PROFESSIONAL EXPERIENCE:

Client: Signet Jewelers Aug 23 – Till Date

Location: Akron, OH

Role: Sr. Network Engineer

Managed and configuring Cisco Switches and Routers, Developed network project Hands-on experience in layer-2 Switching Cisco catalyst 3850,9300,9500 series switches. Hands-on experience with Cisco DNA and Strong understanding of DNAC Administration.

•Deploying Wireless Network Infrastructure and Wireless Survey Best Practices. Experience with Cisco wireless solutions including 2504, 5508, 5520, 8500 WLCs.

Led the deployment, and optimization of SDA for wired and wireless infrastructure using Cisco DNAC.

Collaborated with vendors, managers, and network engineers to design and validate the performance, quality, and reliability of wireless networks.

Configured and troubleshooted WAN, LAN, and wireless setups, including Routing Protocols (BGP, IS-IS, OSPF), QoS, and LAN Technologies.

Advanced knowledge in TCP/IP suite and IPAM, Routing protocol, such as OSPF, EIGRP, ISIS, and BGP.

Experience with Installation, rack and stack, deployment, operations, software upgrades, migrations, and builds in Campus and Data Center Environments.

Experience with switching using Cisco equipment. Worked on Campus refresh projects that include IDF/MDF builds, Cabling, Power, endpoint authentication, DHCP, Monitoring, IOS upgrades, and migration from legacy to new equipment in Access, Distribution, and Core layers.

Worked on setting up the Access layer and top-of-the-rack switches in data centers. Worked with storage, Server, and Virtualization teams to serve the network needs, Configuration of ports, and system-level redundancy for end hosts—experience with upgrade procedures, and migrations in Wireless AP's.Switching Protocol Expertise – Worked on VLANs, Inter VLAN routing, trunking, 802.1q, Port Channel- LACP, PAGP, Gateway Redundancy, VRRP, STP, RSTP, PVST, MST, VSS, CLAG,MLAG, VPC, Ethernet, SPAN.

Experience with RIP, EIGRP, OSPF, BGP, and IS-IS routing protocols. Worked on multiple topologies with the multi-protocol environment, routing configuration for Campus, remote sites, data center, and Internet connectivity. Worked in operations, and deployment of new routing requirements.Other Routing Expertise – VRF, Route leaking, Cisco UCS, MPLS, MP-BGP, ISP fail overs, BGP attributes, Route Redistribution, Spine Leaf Architecture, EVPN.

Worked on Cisco ACS, ISE. Operations and Deployment experience with ISE and integration with WLAN controllers.

Experienced working on network monitoring and analysis tools like, SOLAR WINDS, CISCO works and SDWAN by Riverbed steelhead, L3VPN over network, multi-tenant segment routing, Cisco ASA firewall 9.x, OSPFv3, EIGRP classic and name-mode (wide metrics), VxLan, SDWAN, VRF and VRF-lite, VMWare NSXVDCWorked together with different vendors for company products, solutions, and performance.

Implemented Meraki security appliances and switches, enhancing network security and performance.

Worked on Windows DNS and DHCP solutions.Monitoring and Logs . Experience with Solar Winds. Configuration of Alerts, Polling agents, SMTP, etc on monitoring tools.

Documentation and Workflow– Experience with VISIO, word, and PPT. Experience with project cycles, Workflow processes, Ticketing tools, CAB, Change Controls, Maintenance windows, vendor Communications, and SOP.

Assisted in Migrating checkpoint 41k firewalls to Palo Alto 5250 and Installing Virtual Appliance (Palo Alto VM) in Azure Cloud.

Client: Key Bank Oct’21 – Aug 23

Location: Cleveland, OH

Role: Sr. Network Security Engineer

Managed and developed network projects designed to strengthen network continuity and deploy security elements in an attempt to meet and exceed contract requirements, including system analysis & troubleshooting.

Created new redundant ethernet interfaces with enabling LACP and created new VLAN’s under each reth interfaces.

Implemented new eBGP relationship between Juniper QFX Spine switches and Firewalls for route advertisement.

Configured and troubleshooting HSRP, BGP, OSPF, DMVPN, MPLS WAN, QoS and Route Maps.

Written delegations from DNS Server to F5 GTM.

Created Route leaks and Route Filters to advertise routes between multiple virtual routing instances.

Installing and Configuring Nexus 9k, Cisco 6500, 4500, 3800 and 3600 switching platforms according to deployment plans.

Successfully lead a project to mitigate the F5 Security vulnerability on software code 13.1.3.3 by upgrading over 150 F5 devices within 45 days.

Configure Service end point on the Vnet to connect to Azure services over an optimized route over the Azure backbone network.

Implemented new eBGP relationship between Juniper QFX Spine switches and Firewalls for route advertisement.

Conducted regular audits and assessments of Meraki networks to ensure compliance with industry standards.

Engineered and implemented Device service clustering devices of BIG IP LTM & GTM in ACTIVE/STANDBY

Guided the end-to-end implementation of Software-Defined Access (SDA) via Cisco DNAC, seamlessly harmonizing the integration of wired and wireless infrastructure for optimal functionality.

Maintained core switches, creating VLAN's and configuring VTP.

Designed and Implemented PA 7080’s and Migrated workloads from Legacy and Existing DR Data Center SRX Firewalls to Next Gen Palo Alto Firewalls.

Configured and maintained Citrix virtualization solutions to optimize application delivery and enhance end-user experience.

Created multiple Virtual systems on Palo Alto and connected virtual system-1 to Juniper QFX Spines for supporting Juniper QFabric to QFX Migrations and Connecting virtual system-2 to Cisco Border Leafs for supporting workload migration to Vx Block.

Collaborated with IT teams to troubleshoot and resolve Citrix and Netscaler-related issues efficiently.

Wrote the F5 LTM Standard Build document and the F5 GTM Standard Build document for Key Bank.

Involved in simplifying Network architecture by consolidating almost 30 Virtual Routers from legacy devices to 6 virtual routers in new environment.

Upgrade and maintenance of all production Juniper, Cisco and Palo Alto network devices.

Involved in Application failover testing between datacenters and Datacenter DR testing.

Configured and managed DNAC to enforce consistent policies across wired and wireless components, enhancing network security and compliance.

Created Virtual Routers in Palo Alto Firewalls using Hub Spoke architecture. Route redistribution concept is used to advertise routes with route filters on Hub.

Utilized Python for data analysis, scripting, and integration with various APIs, enhancing overall system functionality.

Regularly participated in system upgrades, code fixes and patch management of f5 BIG-IP Devices (VCMP guests, Virtual editions, and cloud editions).

Migrated legacy F5 Hardware device running BIG-IP 6000 series v 11.x to Virtual editions running BIG-IP v 13.x while ensuring 99.999 percent availability with minimal or no downtime.

Connected Enterprise and Data center Firewalls to Panorama M-600’s for management purposes.

Configured different security profiles like Antivirus, Anti-spyware, Vulnerability protection, URL Filtering and DOS protection profiles to defend against flood attacks, Reconnaissance attacks, viruses, trojans, malware and unauthorized access etc and attaching them to security policies.

Implemented High performance access policy that delivers access control using F5 APM and BIG IQ.

Deploy application security policies manually and into automated CI/CD pipelines leveraging F5 AWAF/ASM to Protect against OWASP top 10 vulnerabilities and other known vulnerabilities.

Migrated IPSEC Tunnels from Juniper to Palo Alto.

Created NAT and Security policies using APP-ID concept on Palo alto and tagging each security policy based on application to make management simpler.

Environment: Nexus 9k, 7k Cisco 6800, 6500, 4500, 3800 and 3600 switches, Juniper MX 960, MX 480, Juniper EX 4600, 9200, QFX 10008, SRX 3600, 5800, 240, F5 BIG-IP, Palo Alto 7080, PAN M-600, VRRP, iBGP, eBGP, OSPF, DMVPN, MPLS WAN, QoS, Route Maps, VTP, Proxy ARP’s, Route based Forwarding, PBF, Route Filtering, Route Reflectors, Route Re-distribution, Port Forwarding.

Client: Equifax Sep’19– Sep ’21

Location: St Louis, MO

Role: Sr. Network /Security Engineer

Responsibilities:

Designing and supporting the consolidation of data centers utilizing Cisco 6500, Nexus 2K, 5K and 7K infrastructure.

Configure and maintain all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.

Hands on experience on all software blades of Check Point Firewall. 24x7 on-call step-up support as a part of the safety operations team.

Develop and implemented security recommendation for patch management on enterprise Linux and F5 BIG-IP network environment.

Migration from Checkpoint firewall cluster to Cisco ASA 5580 firewalls in a failover pair configuration.

Provided application-level redundancy and accessibility by deploying F5 load balancers long-term memory.

Experience with converting Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.

Implemented cloud-based solutions, leveraging services from major cloud providers like AWS, for improved scalability and flexibility.

Executed migration of on-premises infrastructure to the cloud, minimizing downtime and reducing operational costs.

Ensured compliance with cloud security best practices and implemented disaster recovery plans for cloud-based environments.

Provided Level-3 Network support for Cisco Switches and Cisco ASA 5500 Series Security.

Implemented Site-to-Site VPNs over the Internet utilizing 3DES, AES/AES-256 with ASA Firewalls.

Experience in converting PIX rules over to the Cisco ASA solution.

Built and deployed F5 LTMs to support Anycast DNS.

Proficient using the F5 based profiles, monitors, VIPs, pools, pool members, iRules for virtual IPs Involved in scripting the iRules using TCL for HTTP redirection. Managed SSL certificates through the Venafi tool for all the environments (Production and Non-Production).

Designing and assisting in deploying enterprise-wide Network Security and High Availability Solutions for ASA.

Worked extensively in Configuring, observation and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover demilitarized zone socialization & configuring VLANs/routing/NAT.

Managing a TACACS server for VPN user authentication and network devices authentication.

Performed Imperva Secure Sphere DAM on WAF Health Checks.

Managing and providing support to numerous project groups with regards to the addition of recent instrumentation like routers switches and firewalls to the DMZs.

Configured and troubleshooting Riverbed WAN optimization software to improve the network acceleration at the user end.

Earlier efforts included verification of DOCSIS upstream logical channels, proprietary RF spectrum. Management algorithms, system high availability etc.

Support vendors with product and service requirements based on Charter business needs and internal customer requests. My position requires technical skills and working knowledge of DOCSIS Specifications including the following technologies DOCSIS 2.0, DOCSIS3.0, DOCSIS 3.1, Packet Cable 1.0, Packet Cable 1.5 and Packet Cable 2.0.

Deploy, scale and automate network across multiple global datacenters supporting Amazon Web Services (AWS).

Knowledge and skill on 802.11 a/b/g/n LAN normal for wireless Technology.

Used Cisco ACI Fabric which is based on Cisco Nexus 9000 Series Switches and the Cisco Application Virtual Switch (AVS).

Performing troubleshooting on slow network property problems, routing problems that involves OSPF, BGP and distinctive the foundation reason for the problems.

Extensive active expertise with complicated routed local area network and WAN networks, routers and switches.

Design Software-Defined Data Center environment, including Vmware, VCenter, NSX and Cisco ACI.

Hands-on expertise with Ether Channel, Spanning Tree, Trucking, ACLs, Syslog. Expertise with the setup of HSRP, Access-Lists, and RIP, EIGRP, and tunnel installations.

Proficiency in configuration of VLAN setup on varied Cisco Routers and Switches.

Work allotted tickets to see the purpose of failure and resolve issues remotely utilizing obtainable tools and different Operation Center resources.

Monitor the network using cisco prime, HRping.

Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.

Configured Windows Clusters, Windows NLB, H/W Load Balancers (F5, Netscaler). Deployed, configured and troubleshooting runtime errors related to .Net applications on 7.0/7.5 Web Servers and Windows Server 2008/2008 R2 in Dev, QA & Pre-prod environments.

Environment: Nexus 2k/5k/7k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, Juniper SRX100, Fortinet Next Generation Fire Walls, LAN, WAN, OSPF, RIP, BGP, EIGRP, HSRP, VPN, Checkpoint, Cisco ASA, AWS, TCL, Riverbed, Clustered SQL server 2014/2012/2008R2/2008/2005, DC migration, Active-Active& Active-Passive Clustering, Windows 2012/2008R2/2008/2003

Client: Intel corporation Aug ’17– Aug’ 19

Location: Folsom, CA

Role: Network /Security Engineer

Responsibilities:

Managing and configuring Cisco Switches and Routers independently.

Managed VPN, IPSec, Endpoint-Security, status policy, and Application control, IPS, Monitoring, Anti-Spam, Smart Provisioning and DLP using Checkpoint Firewalls.

Responsible for design and implementation/migration from Cisco wireless platform to Aruba wireless platform.

Migration of existing IPSEC VPN tunnels from pre-Shared key to Certificate Authority for purpose of scaling.

Design, support and configure Cisco legacy wireless and WLSE networks and devices using Cisco Prime.

Involved in upgrading Rios Riverbeds and IOS upgrade of switches and routers.

Standardized Splunk agent deployment, configuration and maintenance across a variety of UNIX and Windows platforms.

Managed F5 advanced feature modules including Web Accelerator.

Experience with wireless survey tools (AirMagnet or Ekahau Site Survey).

Experience with wireless survey methodologies for office, factory, warehouse, outdoor, and mesh designs.

Maintenance and configuration of Cisco ASR1000 series and 7200VXR routers at data center and deployment of 3900, 3800, 2951 and 2821 for branch connectivity.

Configuring and implementing F5 BIG-IP, LTM, GTM load balancers to maintain global and local traffic.

Experience in Cisco switches and routers: IP addressing, WAN configurations, LAN cabling in compliance with CAT6 standards.

Managed break/fix hardware issues and RMAs through F5 Support.

Implementation of Active Directory infrastructure and Network fundamentals, protocols (such as TCP/IP, DHCP, DNS), Group Policy and Profile Management.

Co-ordinate with end users and departments in configuring special applications to use Active Directory authentication.

Configuration and troubleshooting link state protocols like OSPF in multiple areas.

Configured HSRP and VLAN trunking 802.1Q, VLAN Routing on Catalyst 6500 switches.

Installed, configured and set security policies on Cisco and checkpoint firewalls, VPN.

Experience working with Nexus 7010, 5020, 2148, 2248 devices.

Monitoring Network infrastructure using SNMP tools HPNNM, Solar-winds and Opnet.

Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000.

Packet capturing, troubleshooting on network problems with Wireshark, identifying and fixing problems.

Worked on Cisco ISE to prevent unauthorized access to the network.

Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.

Deploying Service Packs and Security patches bi-monthly on BGIT Application servers (Product Studio and VSTFS)., which include windows 2008, 2012 R2 and MS SQL server 2008 and 2012R2 Servers.

Implementing, configuring, and troubleshooting various routing protocols like RIP, EIGRP, OSPF, and BGP.

Performing network monitoring, providing analysis using various tools like Wireshark, Solar winds.

PCI compliance responsibilities; provide all documents, configs, diagrams for PCI audit.

Environment: Cisco switches - 2948/3560/4500/3560/3750/3550/3500/2960 6500 and Cisco Nexus 7K/5K, Cisco ASA 500, Cisco routers - 1200/3640/7200/3845/3600/2800, Cisco ISE, F5 BIGIP LTM, RIP, OSPF, BGP, EIGRP, LAN, WAN, VPN, HSRP, TCL, SQL Server 2005 Integration services packages.

Client: Virtusa

Location: Hyderabad, India July’15– July’17

Role: Network Engineer

Responsibilities:

Created and designed network layout as well as documented network system design with detail information using Visio.

Performed IOS upgrades/Password recover on 2900, 3500 series Cisco Catalyst switches and 1800, 2600, 3600 series Cisco routers using TFTP.

Responsible for Cisco ASA firewall administration across global networks and for check points.

Implementing and troubleshooting complex layer 2 technologies such as VLAN Trunks, VTP, and Ether channel, STP, RSTP and MST.

Configuring STP for switching loop prevention and VLANs for data and voice along with configuring port security for users connecting to the switches.

Configured Cisco IOS Feature Set, NAT and Simple Network management protocol (SNMP) for Network security implementation.

Supported clients with establishing high availability applications with load distribution by F5 BigIP LTM/GTM.

Work included configuring devices through the CLI and GUI, configuration updates, and application migration.

Involved in troubleshooting aspects of complex network infrastructure using routing protocols like EIGRP, OSPF and BGP.

Implemented redundant load balancing technique with internet applications for switching and routing.

Maintained redundancy on Cisco 2600, 2800 and 3600 routers with HSRP.

Support Network Technicians as they require training & support for problem resolution including performing diagnostics & configuring network devices.

Documented the company's design, implementation and troubleshooting procedures.

Performed routine network maintenance checks as well as configure and manage printers, copiers, and other miscellaneous network equipment.

Got Hands-on experience in maintaining and troubleshooting RIP, OSPF and EIGRP routing protocols.

Configured RIP and EIGRP on 2600, 2900 and 3600 series Cisco routers.

Implemented VTP and Trunking protocols (802.1q and ISL) on 3560, 3750 and 4500 series Cisco Catalyst switches.

Worked on installation, maintenance, and troubleshooting of LAN/WAN (NAT, DHCP, TCP/IP).

Configured Access List (Standard, Extended, and Named) to allow users all over the company to access different applications and blocking others.

Configured STP for loop prevention and VTP for Inter-VLAN Routing.

Troubleshooting of TCP/IP problems and connectivity issues in multi-protocol Ethernet environment.

Deployed catalyst switches 6500, 4508, 4500 and 3750 in the distribution and access layer.

Implementing VoIP and hoc network with SIP Proxy Server and multiple Clients, capturing the Installed and maintained Wireless Access Points throughout the building.

Configuring and managing layer-2 technologies like VLANs, STP, VTP & port-security.

Provided technical assistance for LAN/WAN management & troubleshooting complex client issues.

Performed RIP, OSPF, EIGRP routing protocol administration.

Monitoring of data flow and troubleshooting in wireless systems for multiple clients using the cisco ISE platform and configuring a small wireless system for VOIP and wireless activity.

Tested various BGP attributes like local preference, MED, Weight and replicated customer issues in the testing environment lab.

Switching related tasks included implementing VLANS and configuring ISL trunk on Fast-Ethernet channel between switches.

Involved in providing access to user machines and partners outside our network by SSL and IPSec VPN tunneling.

Performance monitoring of various applications and web servers to maintain quality of service and network stability.

Environment: Catalyst Switches – 3750, 4500, 4508, 6500, Cisco Routers - 2600, 3600, 7613, Switches - 3750, 4500 and 6500 series and Cisco Firewall ASA 5585-X, Solar Winds, Checkpoint Firewall, Routing Protocols (EIGRP, OSPF, RIP), Switching protocols (VTP, STP, GLBP, HSRP)



Contact this candidate