Post Job Free

Resume

Sign in

Network Engineer Data Center

Location:
Plano, TX
Salary:
75
Posted:
August 31, 2023

Contact this candidate

Resume:

Amruth

Senior Network Engineer

Phone: +1-667-***-****

Email-Id: adzdn4@r.postjobfree.com

PROFESSIONAL SUMMARY:

Network Engineer & Security Analyst with 9 years of working experience in Network Infrastructure, Security which includes designing, deployment and providing network support, installation, and analysis for a broad range of LAN / WAN protocols, routing, switching, configuring, implementation, troubleshooting of complex networking system and experience in Linux Kernel programming.

Working experience with Routers, Switches, Load Balancers, Firewalls and Proxies.

Excellent hands-on experience in configuring Cisco Nexus 2248T, 2224T, 5548P, 5596T, 6000, 7010, 7018, 7710 switches. Also implemented VDC and VPC on the Nexus 5505, 7010, 7710 switches.

Experience in performing various configurations on Access, Distribution and Core layer switches like Cisco Catalyst 2960, 3750, 4507, 4010, 6506, 6509, & 9200 switches.

Experience in implementing and troubleshooting Switch technologies such as STP, VTP, 802.1q, VLAN and MPLS.

Experienced in troubleshooting purposes, used diagnostics techniques available on the NetScaler GUI to run ns-trace and analyzed the trace using Wireshark.

Experienced in configuring, deploying, maintaining, and troubleshooting of routing protocols like RIP, OSPF, EIGRP and BGP on Cisco 1800, 2600, 3600, 7200 and 7600 routers. And performed Policy based routing. Proficient in configuring and troubleshooting route Re-distribution between Static, RIP, EIGRP, OSPF, and BGP protocols and in Route Manipulation.

Worked on Microsoft Azure cloud to create and manage Virtual network’s End Points, Storage Account and Affinity Groups in Azure Portal and provided support to client by deploying Terraform Configs.

Experience with automation tools such as Terraform, Ansible, Salt, Puppet, Chef and working with various types of APIs: REST, SOAP, etc.

Experience with Troubleshooting AWS EC2 instances for Status check through System Status checks and Instance Status checks alerts and rectifying if necessary.

Expert level knowledge on IP Addressing, Subnetting, VLSM, OSI model, TCP/IP model. Using IP Address Manager (IPAM) provides a centralized management of the IP address space, including IPv4 and IPv6 Address Management.

Experiences with Cisco Nexus Fabric Extender (FEX) (222, 2248). Experience in design, Deploying & Troubleshooting F5 Load Balancer Includes BIGIP Series 5050V, 10000V, 8900, 6900, and 3900.

Experience in dealing with iRules, TMSH CLI which includes TMOS 10.2.4V - 11.6.0V and various troubleshooting tools like QKView, IQdump and iHealth diagnostic tool. Experience in Deploying & Troubleshooting policy management on Web Proxies.

Experiences dealing with OS upgrading/CISCO (IOS, NX-OS), PANOS, JUNOS, Web sense, Bluecoat.

Experience in administration and designing web proxies which includes Bluecoat. Experience in dealing with centralized management tools for rule-based policy like Solsoft.

Experience with MacAfee and Splunk SIEM tools for log analysis and threat management analysis.

Experience in design, installation, configuration, maintenance, migration, and administration of Check Point Firewall R55 up to R77. Experience in Policy based filtering using Palo Alto Firewalls.

Experienced Senior Network Engineer/Architect with extensive carrier, ISP and enterprise client experience designing.

Experience working with Palo Alto GUI Panorama. Experience in migrating Check point to the Cisco ASA Devices and also migrating from Cisco to Palo Alto.

Extensively used packet capture tools like TCP dump, Wireshark, and snoop on the devices to identify the potential network issues.

Designed, deployed, and supported Zscaler Cloud based Infrastructure across various Data Centers and Disaster Recovery environments.

Manage and configure Bluecoat, Zscaler proxy devices.

Migrating the policies from on premise Bluecoat to Cloud Based Zscaler Proxy service in tandem with various application owners.

Understand the Traffic Flows for both Https (web Traffic) standard and custom application-based traffic and accordingly design solution around it for Firewalling and Proxy services.

Whitelisted IP space for various Project team to access external vendors access to ensure safe and secure connectivity.

Complete Understanding on both ZIA and ZPA.

TECHNICAL SKILLS:

Network Configuration

Advanced switch/router configuration (Cisco IOS access list, Route redistribution/propagation).

Routing Protocols

RIP, IGRP, EIGRP, OSPFv2, OSPFv3, IS-IS, BGP v4, MP-BGP

WAN Protocols

HDLC, PPP

Circuit switched WAN:

T1/E1 – T3/E3/OCX (Channelized, Fractional & full).

Security Technologies

Cisco FWSM/PIX/ASDM, Palo Alto, Cisco ASA, Checkpoint, Blue Coat proxy server. Port Security, DHCP Snooping, IP Source Guard (IPSG).

Cisco Routers

Cisco ISR-1000, ISR-4000, ASR-1000, ASR-9000, ASR-5500, Meraki vMX 100.

Redundancy and Management

HSRP, VRRP, GLBP, RPR, NSF/NSR, STP, Wireshark, SolarWinds, SNMP

Physical interfaces

Fast Ethernet, Gigabit Ethernet, Serial, HSSI, Sonet (POS)

Layer 2 technology

VLAN, VXLAN, HSRP, VRRP, GLBP, STP, RSTP, PVST+, MST, PVLAN, Optimizing STP (Port Fast, Uplink Fast, Backbone Fast, Root Guard, BPDU Guard),

Layer 3 Switching

CEF, MLS, Ether channel (PAGP & LACP, Load Balancing)

Switches

Catalyst 9400, 3850, 3650, 2960; Nexus 2k, 3k, 5k, 7k, 9k

Operating Systems

Microsoft XP/Vista/7, Windows Servers 2003/2008, Windows MS-Office, Microsoft project server 2013

Zscaler

ZIA, ZPA, ZCC

EDUCATIONAL DETAILS:

Qualification

Board

GPA

YEAR

Bachelor’s on Technology – Computer Science

Jawaharlal Nehru Technological University

6.94

2014

PROFESSIONAL EXPERIENCE

State Street Bank, Boston, MA Jun’22 - Till Date

Senior Network Engineer

Responsibilities:

The Network Security Engineer with Zscaler Exp (Level 3) is responsible for analyzing, designing, installing, configuring, supporting of network and network security infrastructure and application components.

Dealing with escalations from level-1 engineers and taking up fresh cases for critical customer accounts.

Daily cases include issues related to non-working internet, non-working websites and applications, network slowness, Virtual Private Networks (VPN), Generic routing encapsulation (GRE), HTTP, HTTPS, DNS, and proxy troubleshooting.

Configuring and troubleshooting Data leakage prevention (DLP) and file type control

Helping customers to configure IPsec and GRE from their on-premises firewalls or routers towards Zscaler.

Take Wireshark captures on Zscaler data center nodes to analyze issues.

Troubleshooting on ZEN nodes/ZEN DCs Installed, configured Cisco Meraki equipment and web-based monitoring platform for MR32 wireless access points.

Working with Cisco Meraki Wireless Switches (MX 33) and SDWAN (MX100).

Troubleshooting on URL based Policy involves (URL Filtering Policy and Cloud App control Policy WEB2.0) issues for user and location-based traffic forwarding.

Engaging with customers to troubleshoot complex security/network problems.

Performing in-depth diagnostics and troubleshooting using networking tools

Reproducing customer issues, Interface with Engineering, Product management and cloud operations and assisting the customer with testing new tools and patches.

Prioritize outstanding customer issues and ensure timely resolution.

Manage customer satisfaction for the Zscaler product family.

Incident and Escalation handling/management

Cross-functional team engagement for critical Incidents/Bugs/ERs

Deploying Zscaler Product during Implementation phase

Building good-will, trust and confidence with Customer.

Good at understanding Customer business problems and provide technical solution.

Adding URLs to SIPA Application Segments in ZPA

Live troubleshooting with end user to enable access.

Verizon, Cary, NC Apr’21 - June’22

Senior Network Engineer

Responsibilities:

Managed and developed network projects designed to strengthen network continuity and deploy security elements to meet and exceed contract requirements, including system analysis & troubleshooting.

Implemented Active-Passive cluster setup between two Juniper SRX’s and Active-Active pair on Juniper MX 960 Routers for high availability.

Extensive involvement in Designing Azure Resource Manager Template and in designing custom build steps using PowerShell.

Designed and developed Cloud Service projects and deployed to Web Apps, PaaS, and IaaS.

Good at Manage hosting plans for Azure Infrastructure, implementing & deploying workloads on Azure virtual machines (VMs).

Created new redundant ethernet interfaces with enabling LACP and created new VLAN’s under each reth interfaces.

Implemented new eBGP relationship between Juniper QFX Spine switches and Firewalls for route advertisement.

Configured and troubleshooting HSRP, BGP, OSPF, DMVPN, MPLS WAN, QoS and Route Maps.

Created Route leaks and Route Filters to advertise routes between multiple virtual routing instances.

Installing and Configuring Nexus 9k, Cisco 6500, 4500, 3800 and 3600 switching platforms according to deployment plans.

Designed IP Addressing schemes, VLANs and Switch port assignments, Ether-channel implementation.

Implemented, configured redundancy protocols HSRP VRRP, GLBP for Default Gateway Redundancy.

Implementing, configuring, and troubleshooting various routing protocols like OSPF, iBGP, eBGP.

Interacted with application owners to understand their application flow for migrating servers to new DR Data Center.

Performance monitoring of applications and web servers to maintain quality of service and network stability.

Maintained core switches, creating VLAN's and configuring VTP.

Designed and Implemented PA 7080’s and Migrated workloads from Legacy and Existing DR Data Center SRX Firewalls to Next Gen Palo Alto Firewalls.

Using Aruba firewall to establish each connection to be stable and secure.

Created multiple Virtual systems on Palo Alto and connected virtual system-1 to Juniper QFX Spines for supporting Juniper QFabric to QFX Migrations and Connecting virtual system-2 to Cisco Border Leafs for supporting workload migration to Vx Block.

Involved in simplifying Network architecture by consolidating almost 30 Virtual Routers from legacy devices to 6 virtual routers in new environment.

Upgrade and maintenance of all production Juniper, Cisco, and Palo Alto network devices.

Involved in Application failover testing between datacenters and Datacenter DR testing.

Troubleshooted data center network issues and WAN backhaul network issues.

Created Virtual Routers in Palo Alto Firewalls using Hub Spoke architecture. The route redistribution concept is used to advertise routes with route filters on Hub.

Configured Firewalls with multiple virtual routers and assigned security zones to respective virtual routers.

High availability setup between two Palo Alto devices with Link monitoring enabled and testing in different conditions.

Connected Enterprise and Data center Firewalls to Panorama M-600’s for management purposes.

Configured different security profiles like Antivirus, Anti-spyware, Vulnerability protection, URL Filtering and DOS protection profiles to defend against flood attacks, Reconnaissance attacks, viruses, trojans, malware and unauthorized access etc. and attaching them to security policies.

Created Admin Roles, Server Profiles, Authentication Profiles and log settings, Interface Management and Zone protection profiles.

In-Depth Knowledge and experience of various wireless 802.11 standards, controllers, Access Points, Wi-Fi analytics from various vendors (Cisco Meraki, HPE, D-Link and Net gear).

Migrated IPSEC Tunnels from Juniper to Palo Alto.

Created NAT and Security policies using APP-ID concept on Palo alto and tagging each security policy based on application to make management simpler.

Suggesting Best Practices for network and security perspective workload migration to make migrations smooth.

Hands on experience on different F5 load balancing options and features to include Persistence, SSL offload functions, HTTP profiles, iRules, etc.

Change management, monitoring network performance with network tools.

Prepared and maintained documentation using MS Visio.

Environment: Nexus 9k, 7k Cisco 6800, 6500, 4500, 3800 and 3600 switches, Juniper MX 960, MX 480, Juniper EX 4600, 9200, QFX 10008, SRX 3600, 5800, 240, F5 BIG-IP, Palo Alto 7080, PAN M-600, VRRP, iBGP, eBGP, OSPF, DMVPN, MPLS WAN, QoS, Route Maps, VTP, Proxy ARP’s, Route based Forwarding, PBF, Route Filtering, Route Reflectors, Route Re-distribution, Port Forwarding

Twitter, San Jose, CA Aug’19 - Apr’21

Network Engineer

Responsibilities:

Designing and supporting the consolidation of data centers utilizing Cisco 6500, Nexus 2K, 5K and 7K infrastructure.

Configure and maintain all Palo Alto Networks Firewall models (PA-2k, PA-3k, PA-5k etc.) as well as a centralized management system (Panorama) to manage large scale Firewall deployments.

Hands on experience on all software blades of Check Point Firewall. 24x7 on-call step-up support as a part of the safety operations team.

Using Aruba to create security solutions to enable and manage data.

Working closely with knowledge center management to investigate the information center sites for cabling necessities of assorted network instrumentation.

Migration from Checkpoint firewall cluster to Cisco ASA 5580 firewalls in a failover pair configuration.

Provided application-level redundancy and accessibility by deploying F5 load balancers long-term memory.

Experience with converting Checkpoint VPN rules over to the Cisco ASA solution. Migration with Cisco ASA VPN experience.

Provided Level-3 Network support for Cisco Switches and Cisco ASA 5500 Series Security.

Implemented Site-to-Site VPNs over the Internet utilizing 3DES, AES/AES-256 with ASA Firewalls.

Experience in converting PIX rules over to the Cisco ASA solution.

Designing and assisting in deploying enterprise-wide Network Security and High Availability Solutions for ASA.

Worked extensively in Configuring, observation and Troubleshooting Cisco's ASA 5500/PIX security appliance, Failover demilitarized zone socialization & configuring VLANs/routing/NAT.

Managing a TACACS server for VPN user authentication and network devices authentication.

Used SDWAN to make the network automatically adaptable to real time changes including network congestion, transport outage conditions and brownouts.

Performed Imperva Secure Sphere DAM on WAF Health Checks.

Managing and providing support to numerous project groups with regards to the addition of recent instrumentation like routers switches and firewalls to the DMZs.

Implementing traffic engineering on existing Multiprotocol Label Switching (MPLS) network and Open Shortest Path First (OSPF).

Provided redundancy in a very multi homed Border Gateway Protocol (BGP) network by tuning AS-path.

Handling enterprise outages effectively and driving towards the resolution. Coordination of fault escalations in conjunction with the first high-level technical management of high priority or technically complicated calls.

Involved in complete LAN, WAN development (including IP address planning, designing, installation, configuration, testing, maintenance etc.)

Configured and troubleshooting Riverbed WAN optimization software to improve the network acceleration at the user end.

Earlier efforts included verification of DOCSIS upstream logical channels, proprietary RF spectrum.

management algorithms, system high availability, etc.

Support vendors with product and service requirements based on Charter business needs and internal customer requests. My position requires technical skills and working knowledge of DOCSIS Specifications including the following technologies DOCSIS 2.0, DOCSIS3.0, DOCSIS 3.1, Packet Cable 1.0, Packet Cable 1.5, and Packet Cable 2.0.

Deploy, scale, and automate networks across multiple global datacenters supporting Amazon Web Services (AWS).

Knowledge and skill on 802.11 a/b/g/n LAN normal for wireless Technology.

Used Cisco ACI Fabric which is based on Cisco Nexus 9000 Series Switches and the Cisco Application Virtual Switch (AVS).

Worked on implementing lab for SDN using Cumulus Linux for test-driving part of DC migration to SDN.

Coordinating, documenting, and managing cases and routing support calls with the Tier 1, Tier 2, and Tier 3 Support engineers at HPE and AT&T.

Configure the best route map configurations in the new Cisco IOS XR Routing Protocol Language (RPL).

Supporting EIGRP and BGP supported network by partitioning level two & three issues of internal groups & external customers of all locations.

Performing troubleshooting on slow network property problems, routing problems that involves OSPF, BGP and distinctive the foundation reason for the problems.

Extensive active expertise with complicated routed local area network and WAN networks, routers, and switches.

Design and Building Software-Defined Data Center environment, including VMware, VCenter, NSX and Cisco ACI.

Hands-on expertise with Ether Channel, Spanning Tree, Trucking, ACLs, Syslog. Expertise with the setup of HSRP, Access-Lists, and RIP, EIGRP, and tunnel installations.

Proficiency in configuration of VLAN setup on varied Cisco Routers and Switches.

Work allotted tickets to see the purpose of failure and resolve issues remotely utilizing obtainable tools and different Operation Center resources.

Monitor the network using cisco prime, HRping.

Provide step-up support to L1 members of network team.

Efficient at use of Microsoft VISIO/Office as technical documentation and presentation tools.

Configured Windows Clusters, Windows NLB, H/W Load Balancers (F5, NetScaler). Deployed, configured, and troubleshooting runtime errors related to .Net applications on 7.0/7.5 Web Servers and Windows Server 2008/2008 R2 in Dev, QA & Pre-prod environments.

Environment: Nexus 2k/5k/7k, Cisco 6500/7500/7200 Routers, Cisco 3550/4500/6500 switches, Juniper SRX100, Fortinet Next Generation Fire Walls, LAN, WAN, OSPF, RIP, BGP, EIGRP, HSRP, VPN, Checkpoint, Cisco ASA, AWS, TCL, Riverbed, Clustered SQL server 2014/2012/2008R2/2008/2005, DC migration, Active-Active& Active-Passive Clustering, Windows 2012/2008R2/2008/2003

Salesforce, Dallas, TX Dec’17 - Aug’19

Network Engineer

Responsibilities:

Configure/Troubleshoot CISCO 12000, 7500, 3800 series routers and 3560 series switches for LAN/WAN connectivity.

Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks.

Performing standard network operations via ITIL standard with Incident Management and Change Management.

Experience in configuring VPC, VDC and ISSU software upgrade in Nexus 7010.

Used SDWAN for better application performance, profit, customer satisfaction and business productivity.

Actively involved in Switching Technology Administration including creating and managing VLANS, Port security- 802.1x, Trucking 802.1Q, RPVST+, Inter-VLAN routing, and LAN security on Cisco Catalyst Switches4507R+E, 6509-E and Cisco Nexus Switches 2232, 5596, 7009.

Comfortable with Data Center virtualization technologies such as VXLAN and Nexus Data Center Fabric Controller (NDFC).

Familiarity with Security technologies-SASE/SSE, Stealthwatch, Network Admission Control.

Troubleshooting of complex LAN/WAN infrastructure that include routing protocols EIGRP, OSPF & BGP, MPLS

Experience with deploying PIM Sparse-mode/Dense-mode multicasting in Campus locations.

Serve as part of a team of network engineers responsible for base wide network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches.

Design, implement and administer IPv4 enterprise network infrastructure utilizing Juniper routers like Juniper MX80, MX 480 and MX960.

Devised new VPN solution utilizing Cisco Firepower and Cisco AnyConnect

Designed perimeter security policy; Implemented Firewall ACL's; Allowed access to specified services; Enabled IDS/IPS signatures in Firewall & fine-tuned TCP & UDP.

Design and implement Catalyst/ASA Firewall Service Module for various LAN’s.

responsible for managing Cisco routers, switches, HP switches, F5 load-balancers using SNMP MIBs for fault detection and for fault isolation.

Working for Wi-Fi alliance and WLAN testing & pre and post deployment wireless security WEP, WPA, EAP

Responsible for troubleshooting on Cisco ISE added new devices on network based on policies on ISE.

Implemented Cisco ISE 1.2 for Wireless 802.1x Authentication and Authorization with Flex Connect

Configured and performed software upgrades on Cisco Wireless LAN Controllers 2504, 4404,5508 for Wireless Network Access Control integration with Cisco ISE.

Upgrading Cisco ISE appliances company wide. Recently rolled out OpenDNS including onsite VM appliances.

Experienced in Cisco ISE and advanced technologies like QOS, Multicasting, MPLS and MPLS-VPN and Bluecoat proxy server SG.

Troubleshoot Fortinet Firewall, issues, edited policies and created rules.

Fortinet Firewall administration configuration of FortiGate 3000, 3815 series as per network diagram

Understand OSPF configuration and authentication settings to migrate routing over to the Firepower platform.

Involved in Configuration of Access lists (ACL) on checkpoint firewall for the proper network routing for the B2B network connectivity.

Integrate Microsoft active directory (LDAP) into checkpoint for identity awareness and user authentication.

Rapid firewall security assessments through Python automation.

Created the AAA servers for LDAP and AD authentication in F5 APM.

Configure and manage LDAP User management with Checkpoint Smart Directory. Implemented the policy rules and DMZ for multiple clients of the state on the Checkpoint firewall.

Worked with several network engineers for the understanding of Juniper SRX firewalls along with the changeover to Palo Alto. Palo Alto Firewall Management-Panorama.

Configured and deployed Cloud Lifecycle Management (CLM) DNS solution to automate IP address assignment and DNS record updating for new servers created in the CLM environment.

Experienced in handling and installing Palo Alto Firewalls

Serve as part of a team of network engineers responsible for base wide network upgrade from Cisco Layer 3 Catalyst switches to Juniper Layer 3 EX4200 & EX3200 switches.

Performed configuration for end users on CUCM, IM&P, Jabber, WebEx, Telepresence Video Communication Server, SX80 and end points DX80's, SX20's and SX10's.

Configured and managed APM as an SSL VPN solution for remote management.

Provided Layer-3 redundancy by implementing HSRP and GLBP for High availability.

Implementation and Configuration (Profiles, iRules) of F5 Big-IP, GTM, APM, Viprions, LTM-6400 load balancers

Implemented Access lists and policy mapping on Juniper router installed in each branch across all the states.

Worked on configuration commissioning and upgradation of the MPLS circuits for various branch offices. Disabling all unused ports and putting them in unused VLAN.

Implemented, analyzed, and recommended appropriate system for the out of band management monitoring. Utilizing SolarWinds for primary and disaster recovery sites.

Enhanced the performance and reliability of an application by using Solarwinds database and Cluster management tools.

Monitored and responded to network anomalies utilizing SolarWinds/Orion's software and recommended appropriate network solutions for issues. Configured additional Orion alerts.

Provided expertise in improving a reporting system that meets the needs of client and create additional Orion reports.

Reviewed business requirements and improved monitoring of the Orion Platform.

Environment: Cisco 12000, 7500, 3800 series routers and Cisco 3560 series switches, Juniper EX4200, EX3200 Switches, Juniper MX80, MX480, MX960 Routers, F5 ADC, FHRP: HSRP, GLBP, ASR 9000, Cisco Firepower, Juniper SSG-140, Cisco Nexus Switches 2232, 5596, 7009, Checkpoint Firewall, VLAN, 802.1Q Trunking.

Ericsson, IND Jul’14 - Nov’17

Network Security Engineer

Responsibilities:

Worked on Cisco routers 7200, 3700 and Cisco switches 4900, 2900. Key contributions include troubleshooting of complex LAN/WAN infrastructure that include.

Configured firewall logging, DMZs, related security policies and monitoring. Creating private VLANs & preventing VLAN hopping attacks and mitigating spoofing with snooping & IP source guard

Installed and configured Cisco PIX 535 series firewall and configured remote access IPSEC VPN on Cisco PIX Firewall. Enabled STP enhancements to speed up the network convergence that include Port-fast, Uplink-fast, and backbone-fast.

Work with application team and Information security for ACL renewals and ACLS aging. Hands on Experience on IPAM tool used for periodical scans a subnet and provides the availability status of IP addresses in that subnet.

Experience in configuration of Palo Alto firewalls like PA2020, PA3050, and PA5050. Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall. Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls. Worked on Palo Alto dashboard to monitor servers and status of firewalls.

Experience in configuring firewalls like FTD, FMC, ISE and CDO.

Involved in design and implementation of Data Center Migration, worked on implementation strategies for the expansion of the MPLS VPN networks. Implemented DHCP, DNS, IPAM configuration on the servers to allocate, resolute the IP addresses from Subnet.

Experienced with Checkpoint VPN rules over Cisco ASA VPN. Which filters traffic by inspecting the application layer.

Involved in Configuration of Access lists (ACL) on checkpoint firewall for the proper network routing for the B2B network connectivity. Signature Updates Deployment on the Management Components and all the Individual IPS/IDS devices

Team player in a data analytics environment, maintaining network capacity, integrity, and performance of client connectivity and data centers leveraging Devices, Solar winds as the primary toolset and VPLS as the key technology.

Environment: Cisco routers 7200, 3700, Cisco switches 4900, 2900, VLANs, TCP/IP, MGCP, and MPLS, ACL, Cisco Voice (H323/MGCP/SIP, CUCME, CUE), protocols BGP, EIGRP, OSPF and DNS, F5 Load balancer, Data Center Migration



Contact this candidate