Post Job Free

Resume

Sign in

Network Engineer

Location:
Broomfield, CO
Salary:
$60
Posted:
October 26, 2017

Contact this candidate

Resume:

Anjaneyulu M

Sr. Network Engineer

Ph No:908-****-****

Email id: ac2yyb@r.postjobfree.com

Professional Summary:

7+ years of experience in Network design, Security, Tier support of Networks in various environments.

Experience working with security devices such as Firewalls, VPN switches and Intrusion Detection Systems.

Extensive experience working on Cisco and Juniper routers/switches in complex environments with multiple ISPs.

Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, 6500 and Nexus 5K series switches and Sound knowledge of Routing and Switching concepts and MPLS design.

Familiar with products such as Cisco ISE, Cisco ASA 5500 series firewalls and Cisco ACE 4710 Load balancers.

Experience in configuration of Juniper security appliances SRX 220, SRX 240, SRX 550, NS 50, SSG 550M, SSG 520M.

Configuration and administration of firewalls, which includes Checkpoint, Juniper, and Cisco ASA firewalls.

Cisco ASA/Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.

Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection

Experience in Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering)

Expert in dealing with Networking Protocols and Standards such as TCP/IP, OSI, UDP, Layer 2 (VLANs, STP, VTP), Routing Protocols (RIP, EIGRP, OSPF, BGP), WAN technologies (Frame relay, IPSec, VPNs, MPLS), QoS.

Cisco ASA and FWSM, Fortinet FortiGate; F5 AFM, A10 WAF, IDS/IPS systems, and general knowledge of security features and protocols

Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.

Implemented redundancy with HSRP, VRRP, GLBP, Ether channel technology (LACP, PAgP).

Experience in F5 Load balancers such a BIG-IP LTM Modules.

Experience working on Cloud Computing Virtualization using VMware ESXi 4.0 and Windows Hyper-V.

Experience on Network Monitoring & Testing tools such as Wireshark/Ethereal, Cisco Works, and IXIA.

Good understanding of VoIP implementation and protocols such as H.323, RTP, and SIP.

Expertise in Configuration of Virtual Local Area Networks (VLANS) using Cisco routers and multi-layer Switches and supporting STP, RSTP, PVST, RPVST along with trouble shooting of inter-VLAN routing and VLAN Trunking using 802.1Q.

Experience in troubleshooting NAT configurations, Access-Lists (ACL), and DNS/DHCP related issues within the LAN network.

In-depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN architecture and good experience on IP services.

Good understanding of cable management such as CAT3/4/5, Fiber-Optic (Multi & Single mode fibers).

worked on Subnetting IPv4/IPv6 addresses and IP address management..

Hands-on experience with TCP/IP, LANs, WANs, and WLANs (Wi-Fi) Cisco VPN Concentrators, F5 Fire pass SSL VPN, 6509 Core Datacenter designs.

Extensive working experience in AAA protocols such as RADIUS, TACACS+ and Cisco ACS.

Experience on Monitoring and Management tools such as HP Open view, Solar Winds and Wireshark

Managed inventory of all network hardware, Management and Monitoring by use of SSH, Syslog, SNMP, NTP.

Expert Level Knowledge about TCP/IP and OSI models.

Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support...

.Exposure to Cisco WAAS, WCS.

Technical Skills:

Operating Systems

Windows (Server 2003/2008, Vista, Windows 7), Linux OS

Routers

Cisco GSR12016, ASR1001, 2900, 3900, 7200, 7600 & ASR9000

Switches

Cisco 3750, 3850, 4507, 4510 & 6500 series switches, Nexus 5010, 7010, 5548

Routing

MPLS, OSPF, EIGRP, BGP, RIP-2, PBR, IS-IS, Route Filtering, Redistribution, Summarization, Static Routing

Switching

LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging.

Network security

Cisco (ASA, PIX) 5510, Palo Alto, juniper SRX, ACL, IPSEC VPN, GRE VPN, NAT/PAT, Filtering, Load Balancing, IDS/IPS,

Load Balancer

F5 Networks (Big-IP) LTM Module, Cisco ACE 30 load balancer

LAN

Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet.

WAN

Leased lines 128k - 155Mb (PPP / HDLC), Channelized links (T1/DS3/OC3/OC12), Fiber Optic Circuits, Frame Relay, ISDN, Load Balancing. Various Features & Services: IOS and Features, HSRP, GLBP, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP and FTP Management

AAA Architecture

TACACS+, RADIUS, Cisco ACS

Network Management

SNMP, Solar Winds, HP open view, and Wire shark

Reports and Network Diagrams

Microsoft (Visio pro.)

ac2yyb@r.postjobfree.com

Professional Experience:

Level 3 Communications, Broomfield CO Apr 16 - Present

Sr. Network Engineer

Responsibilities:

Installing and configuring new Cisco equipment including Cisco catalyst switches 3850, 3750, Nexus 5548 and Nexus 2k as per the requirement of the Organization.

Design, Install and consolidation of local server farms in multiple branch locations with Cisco 4500-X at distribution and 4948’s replacing the 3750’s at access level.

Configuring, Monitoring and Troubleshooting Cisco’s ASA 5500 security appliance, Failover DMZ zoning and configuring VLANs/routing/NATing with the firewalls as per the design.

Established IPSEC-VPN tunnels with ASA 5500 series Firewall between some branch offices & headquarters

Successfully installed Palo Alto PA-3060 firewalls to protect Data Center and provided L3 support for routers/ switches/ firewalls.

Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.

Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering). Configuring Rules and Maintaining Palo Alto 3060 & Analysis of logs using various tools Successfully installed Palo Alto PA 3060 to protect Data Center and provided L3 support for routers/switches/firewalls. Addition and removal of services from virtual server configuration on Citrix net scalar load-balancer.

Firewall Policy provisioning on Palo Alto devices using Web UI as well as PANORAMA. Provide day-to-day operational support for all firewall and VPN platforms including Checkpoint and Palo Alto firewalls

Implemented failover (Active-standby and Active-Active) on Palo alto firewall

Experience with working on Palo Alto Next-Generation Firewalls Security profiles.

Exposure to Wild fire advance malware detection using IPS feature of Palo Alto.

Worked on F5 LTM series like 1600, 6400 and Viprions for the corporate applications and their availability.

Worked on F5 Enterprise Manager 3.1 version to manage multiple F5 LTM devices from single-pane view.

Hands on Experience configuring and testing F5 iRules using Browser(IE), HTTP watch.

Installing and configuring F5 Load balancers and firewalls with LAN/WAN configuration.

worked on F5 LTMs & GTMs to improve web application delivery speed and replication through and between distributed global data centers.

Implemented various EX, SRX & J series Juniper devices.

Experience on Juniper environment including SRX/Junos Space.

Experience working with Cisco Nexus 2148 Fabric Extender and Nexus 7010 5000 series to provide a Flexible Access Solution for datacenter access architecture.

Managed multiple distribution VDC's in a Nexus 7010 environment and implemented VPC/FEX over Nexus 5596 and 2248

Configure Intrusion Detection and Prevention on Juniper SRX firewalls.

Implemented ACLs on various routers and Cisco platforms (ASR/ISR/Catalyst/Nexus)

Configured Nexus 7010 including NX-OS Virtual Port Channels, Nexus port profiles, Nexus Version 4.2 and 5.0, Nexus VPC peer links

Experience working with High performance data centre switch like nexus 9000, 7000 series

Hands on experience on Open Case with juniper JTAC/ATAC to resolve network critical issues

Experience working with Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240 and Juniper J series j230, M 320 and MX960 routers. Worked on Juniper EX4200 & EX4550 switches..

implementing Security Solutions in Juniper SRX and Netscreen SSG firewalls by using NSM.

Worked on Juniper SRX 5800 firewalls to create policies using J-Web User Interface.

Worked with the installation of Palo Alto firewall, migrated with a team from predominantly checkpoint environment to Palo Alto global solution.

Worked on Migration of Juniper SRX firewalls for isolation of network segments and VPN's, ASR (9k, […]

Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.

Migration from Cisco to Palo alto firewall & Cisco to Checkpoint firewall

Migration from Cisco firewalls to Palo Alto firewalls platforms PA 4000 and PA 500 and PA- 200 firewalls

network technologies including Optical VoIP VPN SAN switching and routing.

Responsible for the analysis/troubleshooting of large scale enterprise VoIP networks

Generated security documentation including security assessment reports and security plans.

Configured NAT and PAT policies..

Responsibilities include software upgrade, license activation, configuring/installing new ASR router 1002, 1006, Nexus switch 9000, 5000,3000, 9504, 9300, 3200, 2308, F5-5050 and maintaining network documentation .

Dealt with implementation of Cisco ASA 5585 devices and Juniper SRX 550 devices to apply security policies on it.

Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel on CISCO Catalyst Switches 3500, 3650, 3850 6500, 7600.

Troubleshot complex routing and switching issues in a HSRP and GLBP environment.

Performed Troubleshooting and monitored routing protocols such RIP, OSPF, EIGRP & BGP.

Designed OSPF Areas for reliable Access Distribution and for Core IP Routing.

Configuration and Monitoring of Citrix NetScaler (Both MPX and VPX

Coordinate with multiple vendors (Cisco, Juniper, etc.) to troubleshoot network outages and issues

Configuration and troubleshooting of CSM, integration with ASA devices.

Configuring VLANs/routing/NATing with the firewalls as per the network design.

Working on security levels with RADIUS, TACACS+.

Configured inside ACL, outside ACL, inside, outside interfaces.

Experience in migration of VLANS.

Configuring Static, BGP and OSPF Routing Protocols on Cisco Routers

Designed and Implemented Firewalls, F5 Viprion deployments to Front end and DMZ customers

Maintained Extensive audit work on VIPRION 2400 Chassis regarding scaling improves

Configuring Virtual servers (standard and performance layer 4), pools and nodes on Viprions

Experience with Using GTM, APM & LTM F5 component to provide 24"7 access to applications

Modified and reconfigured Two factor authentication BIG-IP APM authentication.

Created Access policies on APM module using AD and LDAP authentication for external clients

Environment: Cisco 3850/3750/3500/3650/6500/7600 switches, Nexus 9000,5000,3000,9504,9300,3200,2308 switches, Nexus 2k/5k routers, ASA 5500 firewall, Palo Alto PA-3060 firewall, ASR router 1002/1006, juniper EX-2200, EX-4200, M-320 router, juniper SRX 5800 Fire wall, F5 LTM 1600/6400, OSPF, BGP, EIGRP, VLANS, LAN, WAN, WLC.

Federal Home Loan Banks, Topeka, KS Oct 13 – Mar 16

Network Operations Engineer

Responsibilities:

Maintain, upgrade and commission of branch and campus sites connectivity into data centers and create a seamless network hardware standard across all North American branches. Installing, Maintaining and Troubleshooting of Cisco ASR 1K, 7200, 3925E and 2951E Routers and Cisco 6500, 4510, 4500-X, 4948, 3560X, 3750X and 2960S Switches for deployment on production network.

Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500.

Designed and implemented DMZ for Web, Mail & FTP Servers using Cisco ASA5500 Firewalls.

Worked as a part of data center deployment where we converted from Cisco 6500 to Nexus.

Experience with configuring FCOE using Cisco nexus 5548

Automated network implementations and tasks and designed monitoring tools using python scripting

Experience in configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018

Worked on F5 BIG IP LTM 3600 load balancers to configure Nodes, Pools and VIP’s on a need basis.

Worked extensively on Cisco ASA 5500(5510/5540) and experience with deploying rules to the Cisco ASA solution.

Implemented site to site VPN in Juniper SRX as per customer.

Rebuilt old HQ and Airway offices with core and distribution with new Juniper QFX core

switches and EX4300 distribution switches

Develop migration plan and strategy to migrate from MX480 to QFX 10008

Upgraded existing network to Juniper QFX5100 and QFX10k switches, as well as Juniper PTX routers also Provide support installing, configuring, and troubleshooting hardware and software

Installed and configured Juniper QFX3500 switch.

Configured Policies on Juniper Netscreen and SRX firewalls and Palo alto as well..

Configured and set up Juniper SRX gateways.

Palo Alto design and installation, which includes Application and URL Filtering, Threat Prevention and Data Filtering.

Responsible for Palo Alto and Cisco ASA fire wall administration across global networks.

Configuration and troubleshooting of CSM, integration with ASA devices.

Worked extensively in Configuring, Monitoring and Troubleshooting Cisco ASA 5500.

Provided proactive threat defense with ASA that stops attacks before they spread through the network.

Designed and implemented DMZ for Web servers, Mail servers & FTP Servers using Cisco ASA5500 Firewall.

Experience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018

Hands-on Experience with CISCO Nexus 7000, Nexus 5000, and Nexus 2000 platforms.

Experience with configuring FCOE using Cisco Nexus 5548

Configuration of Fabric path and connectivity between Nexus 5K and Nexus 7k.

Worked on F series module on Nexus 7010.

Used F5 GTM for external DNS resolutions configured all listeners and created all zone files, A record and Names.

worked on F5 VIPRIONS 2400 model with dual blades also had licensed this chassis with vCMP which can run multiple instances and versions of BIG-IP.

Configuring and Troubleshooting BIG-IP F5 load balancer LTM & GTM.

Completed basic configurations on the F5 Big-IP LTMs and GTM load balancer on existing network to split traffic on web-servers.

Configured Nexus 2000 Fabric Extender (FEX), which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.

Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification and administration.

Skilled at administering & installing Windows 2000/2003/2008/R2/2012, MAC OSX Leopard, Snow Leopard Servers, Active Directory, DNS, GPO, Citrix PS 4.0/4,5, XenApp 5.0/6.0/6.5, XenServer 5.6/6.0, Xen Desktop 5.0/5.5/5.6, EdgeSight5.3/5.4, Citrix NetScaler9.3 VPX/MDX/SDX.

Experience with Virtualization technologies like installing, configuring, VMware vSphere. Creation, management, administration and maintenance of virtual servers and clients

Experience with deployment of Palo Alto firewalls for different NAT, video conferencing traffic.

Installed and Powered F5, Palo-Alto Firewall

Implementation of L3 MPLS-VPN and Migration of branches to the new MPLS cloud4.

Building the VPN tunnel and VPN encryption.

Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.

Configured Easy VPN server and SSL VPN to facilitate various employees’ access internal servers and resources with access restrictions

Coordinating with Vendors for creating and modifying firewall and NAT rules and Maintaining Site to Site and SSL VPN

Comprehensive knowledge of MPLS (LDP and RSVP-TE) and QoS

Implementation of Access Lists for allowing/blocking desired traffic.

Configured EBGP load balancing and Ensured stability of BGP peering interfaces

Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.

Juniper Platforms SRX, MX, EX Series Routers and Switches.

Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.

Experience with configuring Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module)

Experience in setting up Juniper Q-Fabric lab including QFX3100-Director Device, QFX-3600 and QFX-3008-Interconnect Devices

Maintain and configure L2 and L3 services in MPLS.

configured RT, RD and VRF for L3 MPLS services.

Understand the JUNOS platform and worked with IOS upgrade of Juniper devices.

Worked with engineering team to resolve tickets and troubleshoot L3/L2 problems efficiently.

Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support..

Experience on 2400 Viprion model, creating Guest's, upgrading new F5 hardware, installing, licensing, configuring and upgrading.

Server load-balancing utilizing F5 LTM-Big IP, including APM, ASM and viprion device modules.

Experience in configuring and managing F5 Web Accelerator module and Application Security Module (ASM)

Configured one-time password for BIG-IP APM to add more security at the time of initialization of the application

Experience with Using GTM, APM & LTM F5 component to provide 24"7 access to applications

Environment: Cisco 6500/4510/4500X/4948/3560X switches, Cisco ASR 1k/7200/3925E/2951E Routers, Nexus 2k/5k, Cisco Nexus 7000, ASA 5500/5510/5540 fire walls, Windows 2000/2003/2008/R2/2012, Juniper SRX firewall, juniper SRX, MX routers, Juniper gate way, F5 load balancer LTM &GTM, BGP, EGBP, VPC, VDC, OSPF

USAC, Washington, DC Dec 12 – Sep 13

Network Operations Engineer

Responsibilities:

Installing, Configuring and troubleshooting Cisco Routers (ASR1002X, 3945, 3845, 2800, 3600) and Switches to perform functions at the Access, Distribution, and Core layers.

Configuring, upgrading and deployment of Nexus 7010, 5596 and 2248.

Installation and deployment of new class 9X and class 10 Server farms in multiple silos.

Designing and installing new branch network systems. Resolving network issues, running test scripts and preparing network documentation.

Working with Cisco Nexus 2248 Fabric Extender and Nexus 5500 series to provide a Flexible Access Solution for datacenter access architecture.

Worked on Extensively on Cisco Firewalls, Cisco PIX (506E/515E/525) & ASA 5500(5510/5540) Series.

Experience with converting PIX rules over to the Cisco ASA solution.

Configuring VPN, clustering and ISP redundancy in Checkpoint firewall.

Configuring, maintaining and troubleshooting IPS and IPS-1 in Checkpoint.

Worked on Checkpoint Platform including Provider Smart Domain Manager.

Worked on configuring, managing and supporting Checkpoint Gateways

Experienced with Checkpoint VPN rules over Cisco ASA VPN. Which filters traffic by inspecting the application layer.

Implementation configuration and troubleshooting of Checkpoint firewall R 77.

Verified Firewall status with Checkpoint. f5. Monitored Checkpoint Tracker system logs daily for failures.

Involved in Configuration of Access lists (ACL) on checkpoint firewall for the proper network routing for the B2B network connectivity.

Assist with configuring Juniper SRX's as a VPN/Firewall Solution

Testing of VOIP devices - (Lines, Router, Server)

Provided level 2 phone and email support and troubleshooting of networking and VoIP issue

Deploying a multisided IP Telephony, VoIP with Cisco Unified Communications Manager (CUCM 8.6.2, 10.5.2), Cisco Unified Contact Center (UCCX 8.5, 10.5.2) and Unity Connections (CUC 8.6.2, 10.5.2).

Supported and troubleshooting Checkpoint site-to-site VPN/IP Sec functionality

Working with wireless technologies troubleshooting and configuration.

Working with BGP, OSPF protocols in MPLS Cloud.

Establishing VPN Tunnels using IPSec encryption standards and also configuring and implementing site-to-site VPN, Remote VPN.

Developed redundant load-balancing design based on four Juniper MX 960 and two SRX 5600 using route leaking and policy routing.

Configure BGP features such as as-override, Local pre, EBGP load sharing on client connections

Configured and resolved various OSPF issues in an OSPF multi area environment between multiple branch routers..

Providing daily network support for national wide area network consisting of MPLS, VPN and point-to-point site.

Configuring HSRP between the 3845 router pairs of Gateway redundancy for the client desktops.

Configuring GLBP, VLAN Trunking 802.1Q, STP, Port security on Catalyst 6500 switches.

Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.

Providing Level 3 support to customers, resolving issues by attending to conference calls.

Configuring BGP, MPLS in Cisco IOS XR.

Configuring multiple route reflectors within a cluster.

Working on HP open view map for Network Management System and Ticketing.

Working on a broad range of topics such as routing and switching, dedicated voice access, planning and implementation, large-scale high-visibility outages, change management coordination, proactive monitoring and maintenance, disaster recovery exercise and core network repairs.

Involved in L2/L3 Switching technology administration including creating and maintaining VLANs, Port security, Trunking, STP, Inter Vlans Routing, LAN security

Implementation, configuration and management (manually and using iApps templates) of F5 2400 Viprion series using 2100 series blades, and Brocade (Foundry) devices in a multi-platform network/storage environment..

installation, Administration and support of F5 load balancers, Big IP 3600 LTM with APM and 5200v with APM and VCMP.

Dealt with creating VIP pools, nodes and created custom iRules for the virtual servers like cookie persistency and redirection of URL on F5 ASM cookies issues and configures ASM policies

Configured the automatic policy builder using the deployment wizard tool in ASM.

Environment: Cisco ASR 1002X/3945/3845/2800/3600 Routers, Nexus 7010/5596/2248, ASA 5500/5510/5540, checkpoint fire wall R77, Juniper JUNOUS M & MX routers, VLAN, LAN, STP, BGP, MPLS, OSPF.

TCS, India Jan 12 – Nov 12

Network Engineer

Performed network engineering, design, planning (WAN & LAN) & implementation. Studied single point failures & designed WAN structure in such a way that there are no failures in network in case of any device or link failure.

Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.

Worked on Extensively on Cisco Firewalls, Cisco (506E/515E/525/) & ASA 5500(5510/5540) Series

Responsible for Checkpoint firewall management and operations across our global networks.

Working with Checkpoint Support for resolving escalated issues.

Configuring Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210

Setting up VLANS and configuring ISL trunk on Fast-Ethernet channel between Switches.

Deployed a large-scale HSRP solution to improve the uptime of collocation customers, in the event a core router became unreachable.

Implementing, Monitoring, Troubleshooting and Convergence in Frame-Mode MPLS inside the core.

Understand the JUNOS platform and worked with IOS upgrade of Juniper devices

Designed and implemented security policies using ACL, firewall.

Configured routing policy for BGP. Switching related tasks included implementing VLANs and configuring ISL trunk and 802.1Q on Fast-Ethernet channel between switches

Implemented Cisco IOS Firewall IDS using 2600 series router.

Troubleshooting on network problems with Wire shark, identify problem and fix.

Performed the maintenance of Active Directory and replication scheme, DNS/DHCP services and time services; wrote step-by-step procedures for implementing upgrades.

Dealt with creating VIP (virtual servers), pools, nodes and applying iRules for the virtual servers like cookie persistency, redirection of the URL

Configured VLANs on a switch for inter-VLAN communication. Configured VLAN Trunking Protocol (VTP) on Core Switches. Configured various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches for STP, VTP Domain, VLAN, Trunking, Fast Ether Channel configuration.

Documented all the work done by using Visio, Excel & MS word.

Environment: Cisco 4510/4948/4507 switches, Juniper switches EX-4200 switches, Cisco CAT 2900,3550,4500,6509 switches, DNS/DHCP server, Firewalls SRX-210, BGP, VLAN, WAN& LAN, ACl.

Sonata Software, India Jul 09 – Dec 11

Network Admin

Responsibilities:

Involved in implementation of trunking using Dot1Q, and ISL on Cisco Catalyst Switches.

Involved in Local Area Network (LAN) design, troubleshooting, and maintenance as per company’s requirements.

Worked with snipping tools like Ethereal to analyze the network problems..

Configured VLANS to isolate different departments.

Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.

Configured IPSEC VPN on SRX series firewalls.

Used TFTP server to backup Cisco configuration files.

Network layer tasks included configuration of IP Addressing using FLSM, VLSM for all applications and servers throughout the company.

Configured STP for loop prevention on Cisco Catalyst Switches.

Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing.

Involved in configuring and implementing of Composite Network models consists of Cisco 3750, 2620 and, 1900 series routers and Cisco 2950, 3500 Series switches.

Implemented various Switch Port Security features as per the company’s policy

Configured RIP, and EIGRP on 2901 and 3925 Cisco routers.

Environment: Cisco 3750/2620/1900 Routers, Cisco 2950,3500 switches, LAN, VLAN, EIGRP, RIP, SRX firewall, VTP.



Contact this candidate