Resume

Sign in

Cisco Engineer

Location:
Hackensack, New Jersey, United States
Posted:
February 27, 2018

Contact this candidate

Resume:

+Anjaneyulu M

Sr. Network Engineer

Ph No:469-***-****

Email id: ac4mwc@r.postjobfree.com

Professional Summary:

* ***** ** ********** ** Network design, Security, Tier support of Networks in various environments.

Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.

Extensive experience working on Cisco and Juniper routers/switches in complex environments with multiple ISPs.

Experience working on Cisco Catalyst Series3750, 4500, 4900, 6500; Nexus 2000, 5000, 6000 and 7000 series switches.

Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, 6500 and Nexus 5K series switches and Sound knowledge of Routing and Switching concepts and MPLS design.

Expert in dealing with Networking Protocols and Standards such as TCP/IP, OSI, UDP, Layer 2 (VLANs, STP, VTP), Routing Protocols (RIP, EIGRP, OSPF, BGP), WAN technologies (Frame relay, IPSec, VPNs, MPLS), QoS.

Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.

Experience in troubleshooting NAT configurations, Access-Lists (ACL), and DNS/DHCP related issues within the LAN network.

In-depth expertise in the analysis, implementation, troubleshooting & documentation of LAN/WAN architecture and good experience on IP servers.

Experience in installing and configuring DNS, DHCP server.

Configure VRRP & GLBP and VLAN Trunking 802.1Q & ISL, STP, Port Security on Catalyst 6500 switches.

Experience working on Cloud Computing Virtualization using VM ware ESXi 4.0 and Windows Hyper-V.

Installed and implemented & troubleshoot the Network Virtualization through VM Ware and NSX.

Experience on Network Monitoring & Testing tools such as Wireshark/Ethereal, Cisco Works, and IXIA.

Troubleshoot end-to-end call flow issues in enterprise market involving various VoIP elements.

Intensive applications of Network automation tools and testing for network automation and configuration management using Ansible, Python scripting.

Working Experience on web content filter and gateways like Blue Coat, Websense.

Extensive working experience in AAA protocols such as RADIUS, TACACS+ and Cisco ACS.

implemented VSS on Cisco catalyst 6509 and 6513 switches.

Experience on Monitoring and Management tools such as HP Open view, Splunk, TCP dump, Solar Winds and Wireshark, Cisco Prime, NetFlow, Riverbed.

Extensively used TCP/IP tool like TELNET for remote login to the routers and SSH for secure login.

Working experience performing Incident, change management using ticketing tools such as ServiceNow, Remedy.

Utilize Remedy ticket system to update network status. Exposure to Cisco WAAS, WCS.

Installed and configured Cisco Unified Communications Manage(UC).

Experience in working with Cisco Nexus Switches and Virtual Port Channel configuration.

Responsible for Configuration and administration of firewalls, which includes Checkpoint, Juniper, and Cisco ASA firewalls.

Experience in risk analysis, security policy, rules creation and modification of Cisco ASA networks.

Checkpoint Firewall troubleshooting and policy change requests for new IP segments that either come on line or that may have been altered during various planned network changes on the network.

Replaced aging Checkpoint firewall architecture with new next generation Palo Alto appliances serving as firewalls and URL and application inspection.

Designed security policies on Palo Alto network firewall for controlling what traffic needs to be allowed or blocked based on customer requirements.

Configure and implementing Fortinet Security systems Firewall. Assisted in managing global Fortinet FortiGate firewall infrastructure.

Involved in monitoring network traffic and its diagnosis using performance tools like SNORT.

Experience in configuration of Juniper security appliances SRX 220, SRX 240, SRX 550, NS 50, SSG 550M, SSG 520M.

Established VPN tunnels between Cisco routers and Cisco Firewalls and Palo Alto Firewalls.

Familiar with products such as Cisco ISE, Cisco ASA 5500 series firewalls and Cisco ACE 4710 Load balancers.

Performed IOS Software upgrades on switches 6509, 4510, 3750 and Cisco ASR for compatibility with Cisco ISE.

Implemented Cisco Application Centric Infrastructure (ACI) as a solution for data centers using a Spine and Leaf architecture.

Used Cisco ACI Fabric which is based on Cisco Nexus 9000 series switches and Cisco Application Virtual Switch (AVS).

Assisting with the design and deployment of a Cisco Firepower cluster in the core.

Knowledge of JUNOS platform and worked with JUNOS upgrade of Juniper devices.

Cisco ASA and FWSM, Fortinet FortiGate; F5 AFM, A10 WAF, IDS/IPS systems, and general knowledge of security features and protocols.

Experience in F5 Load balancers such a BIG-IP LTM and GTM modules.

Mapped, Network Diagrams and physical identification in MS Visio.

Managing UNIX Infrastructure and EMC storage involving maintenance of the servers and troubleshooting problems in the environment.

Provide hands on management of Data Center services, including rack and cable management.

Active Certifications:

Cisco Certified Network Associate (CCNA)- CSCO13269421

Cisco Certified Network Professional (CCNP)- CSCO13269421

Palo Alto Accredited Configuration Engineer (ACE).

Technical Skills:

Operating Systems

Windows (Server 2003/2008, Vista, Windows 7), Linux OS

Routers

Cisco GSR12016, ASR1001, 2900, 3900, 7200, 7600 & ASR9000

Switches

Cisco 3750, 3850, 4507, 4510 & 6500 series switches, Nexus 5010, 7010, 5548

Routing

MPLS, OSPF, EIGRP, BGP, RIP-2, PBR, IS-IS, Route Filtering, Redistribution, Summarization, Static Routing

Switching

LAN, VTP, STP, PVST+, RPVST+, Inter VLAN routing & Multi-Layer Switch, Multicast operations, Layer 3 Switches, Ether channels, Transparent Bridging.

Network security

Cisco (ASA, PIX) 5510, Palo Alto, juniper SRX, ACL, IPSEC VPN, GRE VPN, NAT/PAT, Filtering, Load Balancing, IDS/IPS,

Load Balancer

F5 Networks (Big-IP) LTM Module, Cisco ACE 30 load balancer

LAN

Ethernet (IEEE 802.3), Fast Ethernet, Gigabit Ethernet.

WAN

Leased lines 128k - 155Mb (PPP / HDLC), Channelized links (T1/DS3/OC3/OC12), Fiber Optic Circuits, Frame Relay, ISDN, Load Balancing. Various Features & Services: IOS and Features, HSRP, GLBP, IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, TFTP and FTP Management

AAA Architecture

TACACS+, RADIUS, Cisco ACS

Network Management

SNMP, Solar Winds, HP open view, and Wire shark

Reports and Network Diagrams

Microsoft (Visio pro.)

Professional Experience:

Level 3 Communications, Broomfield CO Apr 16 - Present

Sr. Network Engineer

Responsibilities:

Installing and configuring new Cisco equipment including Cisco catalyst switches 3850, 3750, Nexus 5548 and Nexus 2k as per the requirement of the Organization.

Designing and Implementation of (LAN) VLANs, VTP, Spanning Tree (STP), Trunking (dot1q and ISL) and Ether channel on CISCO Catalyst Switches 3500, 3650, 3850 6500, 7600.

Configuring, Monitoring and Troubleshooting Cisco’s ASA 5500 security appliance, Failover DMZ zoning and configuring VLANs/routing/NAT with the firewalls as per the design.

Established IPSEC VPN tunnels with ASA 5500 series Firewall between some branch offices & headquarters.

Successfully Design and installed Palo Alto PA-3060 firewalls to protect Data Center and provided L3 support for routers/ switches/ firewalls.

Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools.

Experience with working on Palo Alto Next-Generation Firewalls Security profiles.

Worked with the installation of Palo Alto firewall, migrated with a team from predominantly checkpoint environment to Palo Alto global solution.

Modified and reconfigured Two factor authentication BIG-IP APM authentication.

Created Access policies on APM module using AD and LDAP authentication for external clients.

Worked on F5 Enterprise Manager 3.1 version to manage multiple F5 LTM devices from single-pane view.

Hands on Experience configuring and testing F5 I Rules using Browser(IE), HTTP watch.

Worked on F5 LTM series like 1600, 6400 and Viprions for the corporate applications and their availability.

Installing and configuring F5 Load balancers and firewalls with LAN/WAN configuration.

worked on F5 LTMs & GTMs to improve web application delivery speed and replication through and between distributed global data centers.

Involved in iRule management like loading rules, writing iRule syntax using TCL language.

Worked with Blue coat and handled the Trouble Tickets on F5 Load Balancers.

Configuring Virtual servers (standard and performance layer 4), pools and nodes on Viprions.

Configured Local & Central Bypass list for blue coat proxy server.

Experience working with Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240 and Juniper J series j230, M 320 and MX960 routers. Worked on Juniper EX4200 & EX4550 switches.

Responsible for installing and configuring Juniper QFX3500 switch. Rebuilt old HQ with core and distribution with new Juniper QFX core switches and EX4300 distribution switches.

Worked on Juniper SRX 5800 firewalls to create policies using J-Web User Interface.

Dealt with implementation of Cisco ASA 5585 devices and Juniper SRX 550 devices to apply security policies on it.

Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience.

Migration from Cisco firewalls to Palo Alto firewalls platforms PA 4000 and PA 500 and PA- 200 firewalls network technologies including Optical VoIP VPN SAN switching and routing.

Manage Cisco VOIP Networks using Cisco Unified Call Manager (Version 11.x,10.x,9.x,8.x), Cisco Telepresence, Voice Gateways, UCCX.

Configured and troubleshooting Cisco unified UC560 manager VoIP systems.

I Upgraded ASA 5505S to 5525X with Firepower.

Setup high availability ASA pair with Firepower.

Implemented Cisco Application Centric Infrastructure (Cisco ACI) as a solution for data centers using a Spine and Leaf architecture.

Troubleshot complex routing and switching issues in a HSRP and GLBP environment.

Performed Troubleshooting and monitored routing protocols such RIP, OSPF, EIGRP & BGP.

Configuration and Monitoring of Citrix NetScaler (Both MPX and VPX).

Worked on VM Ware migration from physical servers to virtual servers.

Worked on Python, shell scripting and automation Rest APIs integrations.

Used Python scripting for network sniffing and managed parameters for pool of servers and updated, automated and migrated different services and software by means of Ansible.

Coordinate with multiple vendors (Cisco, Juniper, etc.) to troubleshoot network outages and issues.

Configuration and troubleshooting of CSM, integration with ASA devices.

Working on security levels with RADIUS, TACACS+.

Create a Virtual Network on Windows Azure to connect all the servers.

Configured inside ACL, outside ACL, inside, outside interfaces.

Configuring Static, BGP and OSPF Routing Protocols on Cisco Routers

Environment: Cisco 3850/3750/3500/3650/6500/7600 switches, SÁ 5500 firewall, Palo Alto PA-3060 firewall, ASR router 1002/1006, juniper EX-2200, EX-4200, M-320 router, juniper SRX 5800 Fire wall, F5 LTM 1600/6400, OSPF, BGP, EIGRP, VLANS, LAN, WAN,

Federal Home Loan Banks, Topeka, KS Oct 13 – Mar 16

Network Operations Engineer

Responsibilities:

Maintain, upgrade and commission of branch and campus sites connectivity into data centers and create a seamless network hardware standard across all North American branches.

Installing, Configuring and troubleshooting Cisco Routers (ASR1002X, 3945, 3845, 2800, 3600) and Switches to perform functions at the Access, Distribution, and Core layers.

Installing, Maintaining and Troubleshooting of Cisco ASR 1K, 7200, 3925E and 2951E Routers and Cisco 6500, 4510, 4500-X, 4948, 3560X, 3750X and 2960S Switches for deployment on production.

Responsibilities include software upgrade, license activation, configuring/installing new ASR router 1002, 1006, Nexus switch 9000, 5000,3000, 9504, 9300, 3200, 2308, F5-5050 and maintaining network documentation.

Experience working with High performance data center switch like nexus 9000, 7000 series.

Experience in configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018.

Worked extensively in Configuring, Monitoring and Troubleshooting Cisco's ASA 5500.

Designed and implemented DMZ for Web, Mail & FTP Servers using Cisco ASA5500 Firewalls.

Configured Nexus 2000 Fabric Extender (FEX), which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.

Configuration of Fabric path and connectivity between Nexus 5K and Nexus 7k.

Worked as a part of data center deployment where we converted from Cisco 6500 to Nexus.

Experience with configuring FCOE using Cisco nexus 5548.

Hands-on Experience with CISCO Nexus 7000, Nexus 5000, and Nexus 2000 platforms.

Automated network implementations and tasks and designed monitoring tools using python scripting.

Worked on F5 BIG IP LTM 3600 load balancers to configure Nodes, Pools and VIP’s on a need basis.

Involved in troubleshooting of DNS, DHCP and other IP conflict problems.

Configured DNS and DHCP for servers using Infoblox.

Used F5 GTM for external DNS resolutions configured all listeners and created all zone files, A record and Names.

Completed basic configurations on the F5 Big-IP LTMs and GTM load balancer on existing network to split traffic on web-servers.

Server load-balancing utilizing F5 LTM-Big IP, including APM, ASM and viprion device modules.

Configured one-time password for BIG-IP APM to add more security at the time of initialization of the application

Experience with Using GTM, APM & LTM F5 component to provide 24"7 access to applications.

Experience with SDN/NFV technologies including Open Stack Neutron, VM ware, NSX, Open flow, Open daylight, Open v Switch, Open Contrail, or Cisco ACI.

Configure EPG, update APIC, implement access and fabric policies in Cisco ACI environment.

Provisioning ports in Cisco ACI to support SAN, VoIP, and hypervisors.

Responsible for Adding-Removing SIP depending on the requirement and upgrading IOS by using Communication Manager.

Configured Voice ports and dial peers on the call manager for the VoIP call to reach remote destination.

Experience with UCCX scripting, Cisco collaboration and Unified Communication portfolio.

Configured and Created wireless sites using the Cisco Meraki System dashboard.

Implemented site to site VPN on Cisco Meraki MX64, MX65, MC84, and MX400.

Implementing Cisco Meraki Wireless network.

Experience with LAN protocols like VSS, STP, RSTP, MST, VTP, VLAN.

Administrated LAN and WAN with of TCP/IP, NAT, PPP, ISDN and associates network protocols and services.

Configured Cisco ISE for Domain Integration and Active Directory Integration.

Configured Cisco ISE for Wireless and Wired 802.1x Authentication on Cisco Wireless LAN Controllers, Catalyst Switches, and Cisco ASA Firewalls.

Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.

Configured and troubleshooting Aruba Wireless products like Access Points and Mobility Access Switches.

Performed site refreshes on Cisco switching and Aruba wireless infrastructure.

Hands on experience in Aruba S2500 switches, Aruba 7200, 3600 series wireless controllers.

Migrated from Cisco 3650 switches to Aruba 3810 series switches.

Experience with Virtualization technologies like installing, configuring, VMWare vSphere. Creation, management, administration and maintenance of virtual servers and clients.

Experience with deployment of Palo Alto firewalls for different NAT, video conferencing traffic.

Integrating Panorama with Palo Alto Firewalls, managing multiple Palo Alto Firewall using Panorama.

Extensive Packet level debugging and troubleshooting on Palo Alto Firewalls to resolve numerous network issues.

Monitoring and maintaining LAN/WAN networks using SNORT and sniffer trace.

Worked with Enterprise Intrusion Detection / IPS (Snort, Source fire, Juniper IDP, IBM ISS).

Implementation of L3 MPLS-VPN and Migration of branches to the new MPLS cloud4.

Building the VPN tunnel and VPN encryption.

Configured Site to Site IPsec VPN tunnels to peer with different clients and each of client having different specifications of Phase 1 and Phase 2 policies using Cisco ASA 5500 series firewalls.

Configured Easy VPN server and SSL VPN to facilitate various employees’ access internal servers and resources with access restrictions

Coordinating with Vendors for creating and modifying firewall and NAT rules and Maintaining Site to Site and SSL VPN.

Configured EBGP load balancing and Ensured stability of BGP peering interfaces

Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.

Implemented site to site VPN in Juniper SRX as per customer.

1.Configured Policies on Juniper Net screen and SRX firewalls and Palo alto as well.

Design and configuring of OSPF, BGP on Juniper Routers and SRX Firewalls.

Managed deployment and integration with Microsoft Lync of skype for business (sfb).

Maintain and configure L2 and L3 services in MPLS.

configured RT, RD and VRF for L3 MPLS services.

Responsible network engineer to configure EMC RSA secure ID authentication manager to verify identity with stored database.

Administration, Configuration and support for Microsoft windows Azure IAAS for us clients for migration.

Worked with engineering team to resolve tickets and troubleshoot L3/L2 problems efficiently.

Responsible for service request tickets generated by the helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.

Environment: Cisco 6500/4510/4500X/4948/3560X switches, Nexus 9000, 5000,3000, 9504, 9300, 3200, 2308,Cisco ASR 1k/7200/3925E/2951E Routers, Cisco ISE, Aruba 7200/3600 wireless controller, Nexus 2k/5k/9k, Cisco Nexus 7000, ASA 5500/5510/5540 fire walls, Windows 2000/2003/2008/R2/2012, Juniper SRX firewall, juniper SRX, MX routers, Juniper gate way, SSLVPN, F5 load balancer LTM &GTM, BGP, EGBP, VPC, VDC, OSPF

USAC, Washington, DC Dec 12 – Sep 13

Network Operations Engineer

Responsibilities:

Working with Cisco Nexus 2248 Fabric Extender and Nexus 5500 series to provide a Flexible Access Solution for datacenter access architecture.

Configuring, upgrading and deployment of Nexus 7010, 5596 and 2248.

Worked on upgrading Cisco ISE 3300 Appliances and 1.0.4 Cisco ISE software on VM ware's.

Worked with Cisco ISE to identify threats in the network for rapid containment and remediation.

Worked on Extensively on Cisco Firewalls, Cisco PIX (506E/515E/525) & ASA 5500(5510/5540) Series.

Experience with converting PIX rules over to the Cisco ASA solution.

Configuring VPN, clustering and ISP redundancy in Checkpoint firewall.

Worked on Checkpoint Platform including Provider Smart Domain Manager.

Worked on configuring, managing and supporting Checkpoint Gateways.

Experienced with Checkpoint VPN rules over Cisco ASA VPN. Which filters traffic by inspecting the application layer.

Implementation configuration and troubleshooting of Checkpoint Firewall R 77.

Involved in Configuration of Access lists (ACL) on checkpoint firewall for the proper network routing for the B2B network connectivity.

Worked with Host Master for shared web hosting and managed Web Application firewall (WAF), DNS and DHCP management using Infoblox and Analyzed networks using Wireshark.

Provided level 2 phone and email support and troubleshooting of networking and VoIP issue.

Configured the automatic policy builder using the deployment wizard tool in ASM.

Dealt with creating VIP pools, nodes and created custom iRules for the virtual servers like cookie persistency and redirection of URL on F5 ASM cookies issues and configures ASM policies.

Experience in Deploying and decommissioning Cisco switches, Cisco Meraki Products and their respective software upgrades.

Implemented site to site VPN on Cisco Meraki MX64, MX65, MC84, and MX400.

Deployed and managed Cisco Meraki products SD-WAN including Cisco Meraki Security Appliances (MX25, MX450, MX400, MX600 and MX100), Cisco Meraki switches and Cisco Meraki Wireless Aps (MR84, MR74, MR52).

Working with BGP, OSPF protocols in MPLS Cloud.

Establishing VPN Tunnels using IPSec encryption standards and configuring and implementing site-to-site VPN, Remote VPN.

Experience in white listing webpages and blocking webpages with Blue Coat Proxy SG and Blue Coat reporter.

Configured and resolved various OSPF issues in an OSPF multi area environment between multiple branch routers.

Providing daily network support for national wide area network consisting of MPLS, VPN and point-to-point site.

Configuring BGP, MPLS in Cisco IOS XR.

Working on HP open view map for Network Management System and Ticketing.

Involved in L2/L3 Switching technology administration including creating and maintaining VLANs, Port security, Trunking, STP, Inter VLANS Routing, LAN security

Environment: Cisco ASR 1002X/3945/3845/2800/3600 Routers, Cisco ISE, Nexus 7010/5596/2248, ASA 5500/5510/5540, checkpoint fire wall R77, Juniper JUNOUS M & MX routers, VLAN, LAN, STP, BGP, MPLS, OSPF.

TCS, India Jan 12 – Nov 12

Network Engineer

Responsibilities:

Performed network engineering, design, planning (WAN & LAN) & implementation. Studied single point failures & designed WAN structure in such a way that there are no failures in network in case of any device or link failure.

Configured and designed LAN networks with Access layer switches such as Cisco 4510, 4948, 4507 switches.

Configured VLANs on a switch for inter-VLAN communication. Configured VLAN Trucking Protocol (VTP) on Core Switches. Configured various LAN switches such as CISCO CAT 2900, 3550, 4500, 6509 switches for STP, VTP Domain, VLAN, Trucking, Fast Ether Channel configuration.

Worked on Extensively on Cisco Firewalls, Cisco (506E/515E/525/) & ASA 5500(5510/5540) Series

Responsible for Checkpoint firewall management and operations across our global networks.

Configuring Virtual Chassis for Juniper switches EX-4200, Firewalls SRX-210.

Understand the JUNOS platform and worked with IOS upgrade of Juniper devices.

Setting up VLANS and configuring ISL trunk on Fast-Ethernet channel between Switches.

Deployed a large-scale HSRP solution to improve the uptime of collocation customers, in the event a core router became unreachable.

Implementing, Monitoring, Troubleshooting and Convergence in Frame-Mode MPLS inside the core.

Designed and implemented security policies using ACL, firewall.

Configured routing policy for BGP. Switching related tasks included implementing VLANs and configuring ISL trunk and 802.1Q on Fast-Ethernet channel between switches.

Done troubleshooting of TCP/IP problems and connectivity issues in multi-protocol Ethernet environment.

Troubleshooting on network problems with Wire shark, identify problem and fix.

Worked on FTP, HTTP, DNS, DHCP servers in windows server-client environment with resource allocation to desired Virtual LANs of network

Performed the maintenance of Active Directory and replication scheme, DNS/DHCP services and time services; wrote step-by-step procedures for implementing upgrades.

Worked with the server team to get the DHCP scope created for Voice, Data and wireless networks for the new Site setup.

Environment: Cisco 4510/4948/4507 switches, Juniper switches EX-4200 switches, Cisco CAT 2900,3550,4500,6509 switches, DNS/DHCP server, Firewalls SRX-210, BGP, VLAN, WAN& LAN, ACl.

Sonata Software, India Jul 09– Dec 11

Network Admin

Responsibilities:

Models consist of Cisco 3750, 2620 and, 1900 series routers and Cisco 2950, 3500 Series switches. Involved in implementation of Trucking using Dot1Q, and ISL on Cisco Catalyst Switches.

Involved in Local Area Network (LAN) design, troubleshooting, and maintenance as per company’s requirements.

Configuring, managing and troubleshooting networks using routing protocols like RIP, EIGRP and OSPF (Single Area and Multi Area).

Configured TCP/IP addressing scheme to assigned IP blocks.

Worked with snipping tools like Ethereal to analyze the network problems.

Configured VLANS to isolate different departments.

Troubleshoot issues related to VLAN, VLAN Trunking, HSRP failovers, related issues.

Configured IPSEC VPN on SRX series firewalls.

Used TFTP server to backup Cisco configuration files.

Network layer tasks included configuration of IP Addressing using FLSM, VLSM for all applications and servers throughout the company.

Configured STP for loop prevention on Cisco Catalyst Switches.

Configured VTP to manage VLAN database throughout the network for Inter-VLAN Routing.

Monitor, troubleshoot, test and resolve Frame Relay, ATM, MLPPP, PPP, and Dial-up.

Implemented Cisco Wireless Access Points and WLC’s at various corporate sites fort 11n Infrastructure and its legacy technologies.

Environment: Cisco 3750/2620/1900 Routers, Cisco 2950,3500 switches. LAN, VLAN, EIGRP, RIP, SRX firewall, VTP.



Contact this candidate