Post Job Free

Resume

Sign in

Data Center Network Engineer

Location:
Plano, TX
Salary:
$80/hr
Posted:
August 04, 2023

Contact this candidate

Resume:

Siva Reddy

Senior Network Engineer

Contact No: 302-***-****

Email: adypqb@r.postjobfree.com

Professional Summary:

Senior Network/Network Security/Application Delivery Engineer/Wireless Engineer with overall experience of 8+ years in healthcare, Financial, Retail, Product and Government Clients.

Experience with various Network Topologies, LAN, WAN, Campus, Data Center, ISP Connectivity, WLAN, VOIP environments. Worked in Global environments with network spanned across globe in multiple regions.

Worked on Next generation Network Engineering trends and have hands on experience in migration projects from legacy to latest technologies and equipment. Very flexible and enthusiastic to learn new technologies and work on any new vendor equipment.

Team player and has experience working with various teams like server, Project Management, Virtualization, Storage, Cabling, Application etc.

Thorough with Documentation Skills from end-to-end Project implementation, VISIO Diagramming, MS Project, MS word and Presentations wherever necessary.

Switching experience which includes campus and Data Center Switching, Worked on Cisco, Juniper, Arista, Aruba and Dell Switching gear.

Experience with IDF/MDF Architecture, remote sites switching with access and Distribution layers, Data Center Top of the Rack switching, Distribution and core in DC.

Campus Switching and Routing Hardware includes – Cisco 3750, 3850, Cat 9K, 4500, cisco ISR routers, 2300, 7200 series routers Juniper EX 4300, 3400 in access and EX 4600 in Distribution. Aruba 2530, 2540, 3810 and 5400R switches.

Data Center Switching and Routing Hardware Includes Cisco Nexus 2K, 5K, 3K and 7K modules. ASR 1K, 9K, Cisco Juniper QFX Series, MX series routers, Arista 7000 series.

High Level understanding and implementation experience in VLAN, STP, RSTP, MST, 802.1X, DHCP, DNS, HSRP, VRRP, GLBP, IPv4, IPv6, OSPF, EIGRP, IS-IS, BGP, RIP, Static Routing, VSS, MLAG- VPC, MEC, VDC, VXLAN, EVPN Protocols.

Extensive experience working with Network Firewalls. Worked on Cisco ASA, Cisco Firepower, Palo Alto Next Gen Firewalls, Checkpoint, Fortigate and Sonic Firewalls.

Experience with Perimeter Firewalls, VPN firewalls, Server Farm Firewalls using Standard and Extended ACL, All types of NAT, URL Filtering, SSL Forward Proxy, SSL Decryption, Threat ID, User ID and APP ID based Security policies.

Implementation of Firewalls from Scratch and migration from Legacy to Next Generation firewalls with Layer 7 security features.

Worked on Internet Web Security Proxies which includes Cisco Iron Ports, Bluecoat Proxies, Zscaler Cloud Proxies. Worked on PAC files, Whitelist and Blacklist policies, AD group-based policies, User based, location-based Policies on proxies.

Experience with Application delivery controllers which include Cisco ACE, F5 LTM, GTM, APM, ASM modules, Citrix Netscalers. Worked on Virtual servers, Pools, SNAT, persistence, Profiles, iRule Scripting, DNS, Topology based load balancing on F5. Migration experience from ACE to F5.

Worked on all major vendor-based application load balancing which includes Microsoft Office 365, Secure email Gateways, Citrix VDI, ICA proxy, tenant restrictions etc.

Experience with Overlay and Underlay networks which includes VXLAN tunneling, OTV. Software defined networks using Cisco ACI and Arista Cloud Vision. Experience configuring Bridge Domains, Application templates, VNI, VTEPS, Symmetric and Asymmetric IRB in Spine and Leaf Architecture. Worked on Nexus 9K in ACI and non ACI modes.

Experience with remote site connectivity to Data centers using SD-WAN in MPLS WAN. Worked on Versa, Viptella and Meraki SD WAN solutions. Experience with vSmart, vBond, vEdge and vManage components in SD-WAN.

Worked on Cisco, Meraki and Aruba Wireless solutions. Worked on configuration of WLAN controllers, AP groups, SSID, RF parameters, Anchor controllers, BYOD policies, Integration with RADIUS servers for Authentication. Experience with Cisco Prime, Aruba Airwave.

Worked on Cisco ISE, Aruba ClearPass for RADIUS and TACACS Authentication. Integration with WLAN controllers. Wired and Wireless Authentication using Cert based and MAB. Very good understanding in 802.1X.

Enhanced level of knowledge with, PPP, PAP, CHAP, ATM, T1 /T3 Frame-Relay, SD-WAN MPLS.

Experience with DNS and DHCP servers which Include Infoblox, Windows DNS and DHCP, BlueCat DNS. DHCP scopes, IPAM, DNS Zones, Forwarders, Delegations to F5 GTM for WideIP, sub Domains, External, Internal and Cache grids for DNS.

Worked on SNMP for network monitoring which includes SolarWinds, Netbrain, Whatsup Gold.

Experience with Cisco and Avaya VOIP environment. Worked on Configuration of Call Managers, H.323, SIP trunks, QOS policies, VOICE VLANS, CUCM, VOIP gateways etc.

Basic Knowledge in Network Automation using Ansible and Python Scripting.

Technical Skills:

Networking Technologies

LAN/WAN Architecture, TCP/IP, Frame Relay, VPN, VLAN, VTP, NAT, PAT, STP, RSTP, PVST, MSTP

Networking Hardware

Cisco Switches, Cisco Routers, ASA/Pix/Palo Alto/Fortinet/Juniper firewalls.

Routing Protocols

OSPF, ISIS, EIGRP, RIP, MPLS, IS-IS, BGP, Multicasting

Security Technologies

PAP, CHAP, Cisco PIX, Blue Coat, Palo Alto, ASA, Fortinet, Checkpoint

Network Monitoring

SolarWinds, Wireshark, HRping, Whatsupgold, Infoblox

Operating Systems

Windows 7, Vista, XP, 2000, LINUX, Cisco IOS, IOS XR, IOS-XE, NX-OS

Routers

CISCO 4300, 4400, 4500,2600, 2800,3800,7200, Juniper M & T Series, ASR 1000

Load Balancers

F5 Networks (BIG-IP), NetScaler (Citrix)

Capacity & performance

Cascade Riverbed (Flow Monitor), WAN Killer

Switches

CISCO 2960,3750,3850, CAT 9300, CAT9400, CAT 9500,4500,6500,6800 Nexus 7k,5k,2k

Programming Languages

C, C++, Perl, Power Shell, Python

Simulation Tools

GNS3, VMware, OPNET IT GURU, OPNET Modeler, Cadence

Firewalls

Juniper Net Screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA (5520/5550/5580), McAfee Web Gateway, Checkpoint, Palo Alto firewalls.

AAA Architecture

TACACS+, RADIUS, Cisco ACS

Features & Services

IOS and Features, HSRP, GLBP, VRRP, IPAM IRDP, NAT, SNMP, SYSLOG, NTP, DHCP, CDP, DNS, TFTP and FTP Management, Open Stack, IVR’s, HLD and LLD documents, Dell equal logics

Education Details:

Bachelor of Technology from National institute of Technology, Kurukshetra.

Certifications:

CCNA

CCNP (Routing & Switching)

PCNSE (Palo Alto Firewall)

F5 201 TMOS Administrator

Professional Experience:

Client: Comcast, Mount Laurel, NJ Nov 2021 - Present

Role: Sr. Network Engineer

Description: My role is migrating from Cisco ASA 5500 series Firewalls to Palo Alto 5030. F5 LTM and GTM installation in primary and redundant data centers. Network operations on Nexus family, Juniper EX series switches. Migration from Iron ports to Zscaler Cloud Proxies. Worked on Infoblox, Panorama, SolarWinds NPM, NCM and IPAM. Experience with Cisco ACI and ISE. POC on Cumulus Switches and AVI networks Load Balancing.

Responsibilities:

Configuration and Administration of Cisco and Juniper Routers, Switches and mixed vendor Firewalls.

Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices. Worked on 40 gig and 100 gig switching chassis with QSFP. Worked on Cumulus Switching POC on Mellanox devices.

Deploying and decommission of VLANs on core ASR 9K, Nexus 9K, 7K, 5K and its downstream devices also configure 2k, 3k, 7k series Routers

Experience configuring VPC (Virtual Port Channel), VDC (Virtual Device Context) in Nexus 7010/7018

Experience with configuring FCOE using Cisco nexus 5548

Created documents for various platforms including Nexus 7k, ASR9k, and ASR1k enabling successful deployment of new devices on the network.

Installation and Configuration of Cisco Catalyst switches 6500, 3850 & 2960, 9300 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy it also includes the configuration of port channel between core switches and server distribution switches

Migrated to Juniper EX series switches from Cisco 3500 series and 6500 series switches

Experience with moving data center from one location to another location, from 6500 based data centers to Nexus based data center.

Worked on Zscaler Cloud proxies, Implementation of Policies, PZen Configuration, GRE tunnels to Cloud, PAC file configuration, DLP policies.

Worked with HP switches, Extra hop, F5 Load Balancer.

Implement changes on switches, routers, load balancers (F5 and CSS), wireless devices per engineer’s instructions and troubleshooting any related issues.

Configured Nexus 2000 Fabric Extender (FEX) which acts as a remote line card (module) for the Nexus 5000 to connect servers and storage devices.

Experience with setting up MPLS Layer 3 VPN cloud in data center and working with BGP WAN towards customer.

Experience with configuring Cisco 6500, 6800, 4500 VSS in Distribution layer. Configuring and managing F5 LTM (Local Traffic manager) in large scale environment.

Configure and troubleshoot Juniper EX/SRX series switches.

Network security including NAT/PAT, ACL, and ASA/SRX/Palo Alto/Fortinet Firewalls.

Good knowledge with the technologies Site to Site VPN, DMVPN, SSL VPN, WLAN and Multicast.

Well Experienced in configuring protocols HSRP, GLBP, PPP, PAP, CHAP, and SNMP.

Work with Load Balancing team to build connectivity to production and disaster recovery servers through F5 Big IP LTM load balancers

Install, manage and monitored Large scale Palo Alto Firewalls through Panorama.

Experience with communicating with different customers, IT teams in gathering the details for the project

Experience in installing and configuring DNS, DHCP servers.

Convert WAN links from TDM circuits to MPLS and to convert encryption from IP Sec/GRE to Get VPN.

Worked with Palo Alto firewalls PA250, PA4050, PA3020 using Panorama servers, performing changes to monitor/block/allow the traffic on the firewall. Technical assistance for LAN/WAN management and complex customer issues.

Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls and their implementation.

Adding and removing checkpoint firewall policies based on the requirements of various project requirements.

Experience with convert Checkpoint VPN rules over to the Cisco ASA solution. Migration with both Checkpoint and Cisco ASA VPN experience

Worked on Python scripting for generation the firewall security policy through web visualization tool in checkpoint firewall.

Strong hands on experience on, ASA Firewalls, Palo Alto Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL VPN, IPS/IDS, AAA (TACACS+ & RADIUS).

Implemented Zone Based Firewalls and Security Rules on the Palo Alto Firewall. Exposure to wildfire feature of Palo Alto. Supported Blue Coat Proxy in explicit mode for users trying to access Internet from Corp Network.

Palo Alto design and installation (Application and URL filtering, Threat Prevention, Data Filtering). Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.

Worked with the Python 2 & 3 version

Dealt with Aruba wireless access points 200,300 series supporting 802.11 ac.

Setting Aruba Access to link distribution switch system and then to WLAN controller.

Installed and configured Meraki (MX80, MX60) Appliance via Meraki MX400 Cloud.

Installed and configured Cisco Meraki (MR66, MR74, MR84) wireless Access points in the warehouses.

Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, prevention where needed.

Environment: Cisco ASA Firewalls, F5 ADC, Cisco 3900,4300,4400,4500 Routers, Cisco Catalyst switches 6500, 3750, 3550, 2960,4500,6500,6800,9300,9400 Switches, Juniper SSG-140, Palo Alto Wildfire, Juniper EX series switches, Nexus 9k, 7k, 5k, ASR 9k, ASR 1k, Nexus 2000 FEX, Juniper SRX, Routing Protocols: BGP, OSPF, AAA (TACACS+ & RADIUS), TCL Scripting, ACL Configuration.

Client: State Street Bank, Boston, MA Jan 2020- October 2021

Role: Sr. Network Engineer

Description: Worked in deployment team and assisting Architecture team in implementing new technologies in Network and Security Domains. Palo Alto Firewall Administration, Viptella SD-WAN implementation, F5 Operations and implementations, Cisco ISE, Infoblox, Cisco ACI.

Key Responsibilities:

Installed and configured LAN/WAN, SD-WAN Networks, Hardware, Software, and Telecommunication services- Cisco Routers and Switches. Implemented IPv4 and IPv6 on PTX platforms.

Worked on Cisco wireless LAN technologies, Integration with Cisco ISE. Worked on WLAN AP profiles, Authentication roles, RF properties, AP configuration, WLAN upgrades, Anchor controllers, Cisco prime.

Implementation and administration of PKI to include Enterprise Root CA and Subordinate CA design.

Worked on SD-WAN implementation for remote site connectivity using Viptella. Configuration of Application policies, vEdge, vManage, vSmart and vBond in Viptella.

Routing protocol configuration such as OSPF, IS-IS, EIGRP and BGP, Router redundancy configuration (HSRP, VRRP and GLBP) and Wireless LAN (Access point, LWAPP).

Experience with network management protocols/tools (TACACS, NTP, SNMP, SYSLOG, etc.)

Working experience on complex Checkpoint, Cisco ASA & Palo Alto Firewalls Environment.

Experienced on working with Palo Alto Next Generation firewall with security, networking, and management features such as URL filtering, Anti-virus, IPsec VPN, SSL VPN, IPS, Log Management.

Experience working with Juniper devices like EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX650, SRX240 and Juniper J series j230, M 320 and MX960 routers.

Resolved Customers request to create firewall policies for Cisco ASA, juniper SRX, Fortinet and NX-OS.

Infrastructure configuration and troubleshooting for Windows Azure environments.

Monitoring and troubleshooting traffic on PaloAlto firewall through Panorama. Creating and modifying rules and objects on PaloAlto firewall through Panorama.

Riverbed Steelhead 550H WAN optimization installation and configuration

Strong experience in Networking, including hands-on experience in providing network support, installation and analysis for a broad range of LAN/WAN communication systems.

Involved in the Team of Data Center Operations to perform duties like administration and monitoring of Cisco Routers and Switches according to the organization requirements.

Configuring and implementing Remote Access Solution: IPsec VPN, AnyConnect, SSL VPN.

Provided technical support services for DNS and IPAM services.

Implemented Quality of Service throughout the network infrastructure, was responsible for policy routing and provided SDN architecture.

Integrate services appliances to Cisco ACI deployments to include Application Delivery Controllers and Firewalls

Involved in Network Designing, Routing, DNS, IP Subnetting, TCP/IP protocol.

Worked with Cisco Catalyst 6500, 4500, 3750, 3500, 2960 switches and Cisco 2800, 3600, 3800, 7200, 7600 and ASR 1000,2000.3000,7000,9000 series Routers.

Installed and maintained routers and switches in various network configurations supported VLANs, QoS, VoIP, Call Manager and advanced access-lists.

Designed and implemented a set of tools to provide fully automated configuration of F5 Networks BIG-IP load balancing systems.

Strong hands on experience on PIX Firewalls, ASA (5540/5550) Firewalls. Implemented Security Policies using ACL, Firewall, IPSEC, SSL.

Configured & maintained IPSEC Site-to-Site VPN using cisco IOS.

Experienced in Configuring/Troubleshooting Routing Protocols EIGRP/OSPF/BGP/RIP.

Installed and Configured A10 (AX2500) load balancer as SLB for various application in backend.

Troubleshoot layer1, layer2 and layer3 technologies for customer escalations.

IP Allocation & Maintenance for users and other needs throughout company.

Designed perimeter security policy, Implemented Firewall ACL's, allowed access to specified services, Configured Client VPN technologies including Cisco's VPN client via IPSEC

Experience with converting Cisco 6500 IOS to Cisco Nexus NX-OS in the data center environment.

Install and maintain the wireless infrastructure (Aruba, HP controllers) Configuration of SSID, VLAN binding, security management.

Assigning RADIUS and TACACS for new deployments in production environment. AAA for users to implement changes on production devices. Most of these devices are cisco propriety.

Developed/Modified/Enhanced existing and new Perl Packages, Perl frameworks and tools

Built alert & monitoring scripts for applications & servers using Python & Shell Script

Environment: Cisco 12000, 7500, 3800 series routers and Cisco 3560 series switches, Juniper EX4200, EX3200 Switches, Juniper MX80, MX480, MX960 Routers, F5 ADC, FHRP: HSRP, GLBP, ASR 9000, Juniper SSG-140, Cisco Nexus Switches 2232, 5596, 7009, Checkpoint Firewall, VLAN, 802.1Q Trunking.

Client: Bristol Myers Squibb, Lawrenceville NJ Oct 2018 – Jan 2020

Role: Network Security Engineer

Key Responsibilities:

Worked primarily as a part of the security team and daily tasks included firewall rule analysis, rule modification and administration.

Worked on configuring and troubleshooting of routing protocols such as OSPF and BGP for effective communication. Maintain LAN/ SD-WAN communication between Servers/Workstations.

Remediation of firewall rules from checkpoint firewalls to Cisco ASA firewalls, installing and configuring new juniper EX, MX, SRX series firewalls to meet day to day work.

Configure and implement voice gateways (H323/MGCP/SIP), SRST for remote sites, CUCME and CUE distributed design.

Responsible for implementing, engineering, & level 2 support of existing network technologies / services & integration of new network technologies / services

Key contributions include troubleshooting of complex LAN /WAN infrastructure that includes routing protocols EIGRP.

Responsible for turning up new BGP peering and customer sessions, as well as debugging BGP routing.

Managed, operated, and analyzed data from corporate security systems including Sourcefire IDS.

Performed extensive traffic engineering to best utilize upstream transit providers and peering relationships, resulting in significant fiscal savings.

Managed deployment and testing of code updates for wireless systems, such as WCS, WiSM, and WLC.

Configured and managed Cisco access layer routers and switches.

Support Network Technicians as they require training & support for problem resolution including performing diagnostics, & configuring network devices

Ensured that data center stayed as immaculate as possible to prevent unnecessary damage to computer.

Recommended Security considerations for the Intranet data center, integrating security, providing solution design details and configuration details.

Designed WAN structure to prevent single point of failure in case of link failure.

Maintenance and troubleshooting of connectivity problems using Ping, Trace route.

Planning and Implementation of Subnetting, VLSM to conserve IP addresses.

Configured STP for loop prevention and VTP for Inter-VLAN Routing.

Troubleshooting issues and outages on Trunks and Router interfaces extensively.

Technical assistance for LAN/WAN management and complex customer issues.

Provided support for troubleshooting and resolving Customer reported issues.

Performed route redistribution & manipulated route updates using distribute lists, route-maps.

Worked on load balancers like F5 10050s, 10250v to troubleshoot and monitor DNS issues and traffic related to DNS and avoid DDoS

Installed and configured SSH (Secure Shell) encryption to access securely on Ubuntu and Red hat Linux.

Deployment of Palo Alto firewall into the network. Configured and wrote Access-list policies on protocol based services.

Configured network access servers and routers for AAA security (RADIUS/ TACACS+)

Implementing and troubleshooting (on-call) IPsec VPNs for various business lines and making sure everything is in place

Installing and configuring new cisco equipment including Cisco 1900, 2900, 3900 series routers, Cisco catalyst switches 6807, 7010, Nexus 5500 and Nexus 2k as per the requirement of the company.

Problem Solving and maintain documentation throughout the project life cycle.

Environment: Cisco 3750/3550/3500/2960 switches and Cisco 3640/12000 /7200/3845/3600/2800 routers, Cisco ASA5510, Checkpoint, F5 Load Balancer Cisco Nexus7K/5K, Checkpoint, Cisco ASA

Client: Cigna, Hartford, CT Nov 2017 – Sept 2018

Role: Network Engineer

Key Responsibilities:

Installing and configuring juniper M series router along with juniper switches QFX series

Working Knowledge of frame relay, MPLS- SD-WAN services, IPSec VPN's, OSPF, BGP and EIGRP routing protocols, NATing, sub-netting, also including DNS, WINS, LDAP, DHCP, TCP/IP, UDP, SNMP, OSPF, IPSEC, PPP, VLAN, VTP, STP (Spanning tree Protocol), RSTP & Multicasting protocols.

Installed, configured and maintained several Cisco DMVPN routers servicing smaller sites, several Edge router running BGP and MPLS- SD-WAN to Internet service providers.

Experience on F5 load balancer to maintain balance in the network system with application specific usage. Experience with Firewall administration, Rule analysis, Rule modification.

Troubleshoot traffic passing managed via logs and packet captures

Responsible for reviewing current and planned network designs, particularly F5 load balancer implementations. Identified opportunities for implementation of network best practices.

Worked and engaged with Service Providers like AT&T, Verizon to test and turn up the CER routers throughout different sites in California.

Implemented Quality of Service (QOS), Policy Maps, Class-maps, Policy Routing in the network infrastructure throughout all the different sites.

Played responsible role for implementing, engineering, & level 2 support of existing network technologies / services & integration of new network technologies / services

Worked with Cisco Layer 3 switches 3560, 3750, 4500, 6500; Cisco Nexus 5000 and 7000 in multi VLAN environment with the use of inter-VLAN routing, 802.1Q trunk, ether channel.

Key contributions include troubleshooting of complex LAN /WAN infrastructure that include routing protocols EIGRP, OSPF & BGP.

established peering relationships with external ISPs, transit providers and partner networks at national Internet exchanges.

Performed route filtering and route manipulation by applying distribute-lists, route-maps & offset lists respectively.

Installed redundant BigIP F5 LTM and GTM load balancers to provide uninterrupted service to customers.

Configured and deployed BIG-IP LTM 8900 for providing application redundancy and load balancing.

Involved in design, implementation and configuration of HSRP for load balancing on L3 switches on different location of office on the switched network

Identify opportunities and solutions for improving efficiencies with emerging technologies, including Cisco routers/switches and wireless systems.

Deployed 7613 as PE and CE router and configured and troubleshoot the edge routers

Generating RCA (Root Cause Analysis) for critical issues of layer1/layer2/layer3 problems

Environment: Cisco 3925, 2620, 1900 routers, Cisco 3750, 2950 Switches, Routing protocols: EIGRP, RIP, OSPF, BGP, FHRP: HSRP, Sniffing Tools: Ethereal, Wireshark, Port Security, SRX Firewall, VLAN, 802.1Q Trunking, Cisco ASA 5500.

Digilytics, Gurgaon, India. May 2015 – Oct 2017

Role: L1/L2 Network Engineer,

Key Responsibilities:

Configuring/Troubleshoot issues with the following types of routers Cisco (7200, 6500, 4500, 1700, 2600 and 3500 series), to include: bridging, switching, routing, Ethernet, NAT, DNS, DNAT, NTP, IPAM, DHCP and SNMP, as well as assisting with customer LAN /WAN- SD-WAN

Hands-on experience with WAN (ATM/Frame Relay), routers, switches, TCP/IP, routing Protocols (BGP/OSPF), and IP addressing

Firewall policy administration and support on Checkpoint as well as Cisco ASA Firewalls.

Configured firewall logging, DMZs, related security policies and monitoring.

Creating private VLANs & preventing VLAN hopping attacks and mitigating spoofing with snooping & IP source guard.

Performed network administration tasks such as creation and management of VLANS, Port security, Trunking, RPVST+, Inter-VLAN routing, and LAN security

Worked with Cisco Catalyst 6500, 4500, 3500, 4900 switches and Cisco 2800, 3600, 3800, 7200, 7600 series and ASR 5k/9k series Routers.

Performed extensive traffic engineering to best utilize upstream transit providers and peering relationships.

Developed scripts for migration or config push for Maintenances using Python and Shell

Developing scrips for automating the deployment process/ config push in to cisco devices using python

Provided port binding, port security and router redundancy through HSRP

Hands on experience working with security issue like applying ACL’s, configuring NAT and VPN.

Involved in troubleshooting of DNS, DHCP and other IP conflict problems

Responsible for the installation, configuration, maintenance and troubleshooting of the company network. Duties included monitoring network performance using various network tools to ensure the availability, integrity and confidentiality of application and equipment.

Experience in Cisco switches and routers, Physical cabling, IP addressing, WAN configurations.

Involved in configuration & troubleshooting of routing protocols: MP-BGP, OSPF, EIGRP, RIP, BGP v4.

Switching related tasks included implementing VLANS, VTP, STP & Trunking protocols (802.1q and ISL) and configuring on the Fast Ethernet channel between switches.

Performed troubleshooting of connectivity problems using PING, and Trace route.

Done troubleshooting of TCP/IP problems and connectivity issues in multi-protocol Ethernet environment.

IOS upgrade 1900, 2900, 3500 series Cisco Catalyst switches and 2500, 2600, 3600 series Cisco routers using TFTP



Contact this candidate