Home

Sr. Network Engineer - Hrithik Reddy - Sr. Network Engineer
[email protected]
Location: Remote, Remote, USA
Relocation: Remote
Visa:
Professional Summary:
Experience in Networking, including hands-on experience in IP network design providing network support, installation, and analysis.
Network Professional with 8 Plus years of experience in Designing and troubleshooting LAN,
WAN, MPLS in Branch, Campus, and Data Center environments.
Implementation of traffic filters on Cisco routes using Standard, extended Access list.
Expert Level Knowledge about TCP/IP and OSI models.
In-depth expertise in analysis, implementation, troubleshooting & documentation of LAN/WAN
Architecture and good experience on IP services.
Extensively worked on Juniper models EX-2200, EX-4200, EX-4500, MX-480, M Series, SRX210 and SRX240.
Experienced in installation, configuration and maintenance of Cisco ASR 9K, 7200, 3900, 2800, 2600, 2500 and 1800 series Router / Cisco Nexus 9500, 7010, 5548, 2148 Catalyst Cisco 6500 (sup 720), 4500 (SUP 6), 3750, 2950 series Switches, sd-wn.
Experience configuring Virtual Device Context in Nexus 9k, 7k, 5k and 2k.
Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP-BGP, OSPF,
LDP, EIGRP, RIP, BGP v4, MPLS
Migration from Cisco to Palo Alto Firewalls platforms PA 4000 and PA 500 and PA- 200 firewalls.
Hands on Experience testing iRules using Browser (IE), HTTP watch, curl, Scripts (shell/batch file/Perl) and host files.
Configuring and testing Multicast for both IPv4 and IPv6 routing in Data Environment
Technical Knowledge on Cisco DMZ, ASA 5500 series firewalls.
Knowledge of implementing and troubleshooting complex layer 2 technologies such as VLAN
Trunks, VTP Ether channel, STP, RSTP and MST.
Experience in troubleshooting network issues including boundary protection devices, Cisco.
Nortel/Avaya and Bluecoat Proxy Servers
Configuring Cisco routers and switches to enable and troubleshoot a variety of features such as
Trunk, Vlan, Ether channel, port security, routing protocols including EIGRP, OSPF & BGP and Other related technologies such as multicasting, IP Telephony & IP Video.
Hands-on configuration and experience in setting up Cisco routers to perform functions at the
Access, Distribution, and Core layers.
Experience with F5 load balancers - LTM, GTM series like 6400, 6800, 8800 for the corporate
Applications and their availability
Worked on Cisco Routers, Active /Passive Hubs, Switches, Cisco PIX Firewall, NOKIA Firewalls
Nortel VPN Concentrators TCP/IP, NAT and Checkpoint ESX/GSX firewall.
Good knowledge on the IDS and IPS Of the Firepower services
Experience using Cisco ASR 1K, 9K series switches.
Working knowledge of frame relay, MPLS services, IPSecVPN's, OSPF, BGP and EIGRP routing protocols, NAT'ing, sub-netting, also including DNS, WINS, LDAP, DHCP, http, HTML, HTTPS, TCP/IP, UDP, SNMP, OSPF, RIP, IPSEC, PPTP, VLAN, STP (Spanning tree Protocol), RTSP.

Technical Skills:
Cisco Routers: (1800, 2500, 2600, 2800, 3600, 3750, 3800, 7200), ASR 1K and 9K.
Cisco Switches: (2900, 3500, 4000, 4500, 5000, 5800, 6500, and 7600 Nexus 2k, 3k, 5k and 7k 9k), MSFC, MSFC2.
Palo Alto: PA 5250, PA 460, PA 3200, PA 5270, PA 3200, PA 7000 Series Firewalls.
Juniper: E series, J series and M series. Juniper SRX & Netscreen, T -Series, MX-Series Routers.
Routing Protocol: (BGP, OSPF, EIGRP, ISIS, IGRP, LDAP, IGMP, RIP), Routed Protocol TCP/IP, SIP, Multicasting (PIM), 802.1Q.
LAN Protocol: VLAN, PVLAN, VTP, IPX, Inter-VLAN routing, ISL, dot1q, STP, IS-IS, RSTP, MSTP, IPVST, LACP, HSRP, GLBP, VPC, VDC, Ethernet, Port security.
WAN Technology: Frame Relay, ISDN, ATM, WAAS, PPP, ICMP, WiSM Module in 6509, X.25, L2VPN, L3VPN, E1/T1/DS1/DS3
Network Management: SNMP v2, v3, Syslog, HP Open View NNM, Net flow Analyzer, Sniffer, Wireshark, Cisco Works, Cyber Ark, VSphere5.0, 3Com Network Analyzer, SolarWinds, Orion.
AAA Architecture: TACACS+, RADIUS, Cisco ACS.
Operating systems: Linux, UNIX, DOS, Windows XP/2007/2008, Windows 2003 server and Windows 2008 server
Network Security: NAT/PAT, Ingress &Egress Firewall Design, VPN Configuration Internet Content Filtering, Knowledge of Firewall, ASA, Cisco FWSM/PIX/ASDM, Cisco NAC, IPSEC, Nokia Checkpoint NG, SPLAT, IPS/IDS (Snort), IPS 4260.
Application Protocols: DHCP, DNS, FTP, HTTP, SMTP, TFTP.
Programming Languages: Power Shell, Python.
Documentation: Microsoft Office, Visio

Professional Qualifications:

Cisco Certified Network Associate (CCNA)
Cisco Certified Network Professional (CCNP)

Educational Details:
BTECH in electrical and electronics engineering from JNTU 2015.
Master s in information systems from Lindsey Wilson 2020.



Professional Experience:

Biogen Inc, REMOTE Sep 2022 Present
Sr. Network Security Engineer
Demonstrated understanding of network security concepts and systems including Palo Alto, Bluecoat proxy, F5 ASA
Configured and maintained IPSEC and SSL VPN S on Palo Alto Firewalls (PA 2050) and implemented Zone Based Firewall and Security Rules on the Palo Alto Firewall.
Create new network across the enterprise in-order to implement micro-segmentation for manufacturing lab machines using zones and firewall policies.
Configure and make changes in DMZ to allow access or whitelist devices for Information security recommended hosts.
Monitored performance and analyzed network irregularities using tool such as SolarWinds.
Integrated Palo Alto next-gen firewalls with overlay VMware NSX SDN network
Migrated SAP based applications from old Cisco ACE load balancers to new VMware NSX edges.
Create firewall filters in Juniper SRX series.
Redistribute BGP routes into ISIS using import/export policies to route AWS, and remote site connectivity.
Designed and managed multiple SSIDs to segregate network traffic, allowing for guest access, corporate access, and IoT devices.
Configured security protocols for SSIDs, including WPA2/WPA3, to protect against unauthorized access and ensure data confidentiality.
Designed and implemented Azure networks and AWS VPC and connected directly to on-prem datacenter.
Monitor AWS infrastructure for Clients and when needed upgrade and administer resources to virtual machines when needed.
Configures and troubleshoots Cisco Nexus 7K and 9K features, such as VPC, OTV, and VXLAN.
Deploying and troubleshooting internetworking such as eBGP/iBGP, OSPF, EIGRP, VPC, OTV, Cisco Fabric Extender (FEX), STP, VLAN, MPLS - VPN, DMVPN.
Created new network and implemented micro-segmentation by using zones and security policies.
Support global protect VPN connectivity for employees.
Updated Fortinet firewall configurations programmed switch ports and cameras and maintained asset information.
Built SD-WAN test network design using multiple cases to look client data center networks simpler to manage, operate, and maintain.
Knowledge of Cisco Meraki Cloud managed Switches (MS250, MS350, MS410) and SD-WAN (MX 65, Viptella, Versa).
Troubleshoot connectivity issues for users on daily basis on Palo Alto.
Worked on cleanup of several legacy rules of ASA and created a migration path to Palo Altos, configured for Global protect VPN, User ID, Wildfire set up, SSL decryption, license, and policy management on Palo Alto appliances.
Configured and involved in Citrix NetScaler responder policy configuration and Citrix NetScaler Access gateway configurations.
Configured Citrix NetScaler Load Balancer to provide local and DR site Load Balancing.
Deployed Palo Alto 5060 within Data Centers. Worked with Palo Alto firewalls using Panorama performing changes to monitor/block/allow the traffic on the firewall.
Created security policies, address objects and AD groups to restrict access as per requirements.
Extensive experience working with Panorama and manage Palo alto PA 5250, PA 470 firewall through Panorama.
Performed software version upgrades for Panorama and Palo Alto devices.
Extensive experience working with Aruba 7000 series controllers.
Assisted in planning and design of VeloCloud SD- WAN Deployment.
Participated in planning and implementation of Cisco Systems and SD-WAN solutions in direct support of targeted objectives.
Involved in L2/L3 Switching Technology Administration including creating and managing VLANs, VxLAN, Port security, Trunking, STP, Inter-Vlan routing, LAN security.
Deployed VXLAN on the Nexus 9000 to map the physical VLANs to the Virtual Overlay VLANs.
Worked on Next Gen Firewall features like Application and URL filtering, SSL Forward Proxy, SSL Decryption, Web-filter, SD- WAN in FortiGate firewalls.
Worked on Orion Solar winds to estimate the capactity of Gigamon, Cisco ASR 1001 Routers, Cisco 37XX,29XX switches VMware ESXI sandvine policy traffic manager (PTS)for all the Teleports in production LAX Datacenter environments to come up with replacement with advanced equipments.
Worked on Next Gen Firewall features like Application and URL filtering, SSL Forward Proxy, SSL Decryption, Web-filter, SD-WAN in FortiGate firewalls.
Managed and performed countless hours troubleshooting for FortiGate Firewalls.
Configuring & managing Security Devices that includes Juniper (Net Screen) Firewalls, F5 Big IP Load balancers, Blue Coat Proxies and Plug Proxies.
Worked on network based F5 Load balancers with software module Access Policy Manager (APM) & Checkpoint Load Sharing on checkpoint clusters.
Worked with network based F5 Load balancers with software module GTM and experience with network based F5 Load balancers with software module Access Policy Manager (APM) & Cisco Load Sharing on Cisco clusters.
Integrate services appliances to Cisco ACI deployments to include Application Delivery Controllers and Firewalls.
Dealing with Cisco Application Centric Infrastructure (ACI) by integration hardware and software products as per network layout
Responsible for installation and maintaining Cisco ASA firewalls, Riverbed WAN accelerators.

Environment: Juniper (SRX 5400, 3600, 1500, 650,240h, 210he, 100), Juniper Net screens ISG1000, SSG-550, 2000 cisco ASA 5585, 5580 Cisco Routers (1900, 2900, 3900, ASR 7200, 9000), Juniper M20, switches (6500/3750/3550 3500/2950), Nexus 7K,5K &2K , BGP, OSPF, SSLVPN, Site-to-Site VPN, MPLS, Ether Channels, Cisco Catalyst Switches, JUNO Space, NSM (Network and Security Manager) and Pulse secure, Panorama, Algosec (Firewall analyzer), JUNO Space, NSM (Network and Security Manager) and, Splunk tools.


KPMG Watsonville, CA Nov 2020 Aug 2022
SDN Network Engineer/ Network Automation Consultant
Responsibilities:
Involved in dealing with Composite Network models that consists of Ciena 39 series and ACX Platforms.
Responsible in troubleshooting on Cisco ISE added new devices on network based on policies on ISE.
Implemented Cisco ISE 1.2 for Wireless 802.1x Authentication and Authorization with Flex Connect
Configured and performed software upgrades on Cisco Wireless LAN Controllers 2504, 4404 ,5508 for Wireless Network Access Control integration with Cisco ISE.
Upgrading Cisco ISE appliances company wide. Recently rolled out OpenDNS including onsite VM appliances.
Automation practice and coding in Terraform and Ansible.
Develop SD-WAN Low Level Design to address network problems with traditional enterprise network.
Configuring, installing SD-WAN devices, running shipping and receiving department, and day-to- day operations.
Worked on Network Configurations of different models related to automation.
Configured Blue Coat Proxy, SG Web Application Reverse Proxy for securing.
Worked on bluecoat proxies with ids and IP s sensors.
Developed standard operating procedures (SOPs), runbooks, and network architectural documentation in conjunction with cross-functional teams for AWS network configurations and deployments.
Configured and performed software upgrades on Cisco (WLC) Wireless LAN Controllers 5508 for Wireless Network Access Control integration with Cisco ISE
Worked with snipping tools like Ethereal (Wireshark) to analyze the network problems.
Maintenance and troubleshooting of network connectivity problems using PING, Trace Route.
Performed scheduled Virus Checks & Updates on all Servers & Desktops.
Implementing Routing and Switching using the following protocols: OSPF, BGP on Juniper M series routers.
Worked on firewalls like CISCO ASA 5500 series (5510,5540), JUNIPER SRX series and Palo Alto (pa-3060, pa-5060), etc.
Worked on design, configuring, and managing Blue Coat Proxy Servers. Experience with F5 load balancers and Cisco load balancers (CSM, ACE and GSS). Configured Cisco Access Control Server (ACS) to enforce security policy in User Groups.
Used Cisco ACI (Application Centric Infrastructure) SDN architecture to reduce operating costs, automate IT tasks, for greater scalability and visibility in a data center environment.
Configured and Managed User group, permission, Role, Resource pool on VMware virtual center.
Streamlined operations by automating and scripting processes with Palo Alto Networks Next Gen Firewalls.
Successfully decommissioned Nexus 9K supervisors and implemented the latest software upgrades, adeptly troubleshooting any issues that arose during the process.
Designed and implemented security policies on Palo Alto network firewalls, tailored to meet specific customer requirements for traffic control.
Proficiently configured and maintained IPSEC and SSL VPNs on Palo Alto Firewalls, implementing Zone-Based Firewalling and Security Rules to enhance security.
Collaborated with the Palo Alto Networks Technical Assistance Center (TAC) to diagnose and resolve complex cases, ensuring optimal network performance.
Extensive experience working with Cisco Firewalls, including Cisco(506E/515E/525) and ASA 5500 (5510/5540) Series.
Proficient in designing and configuring OSPF and BGP protocols on Juniper Routers and SRX Firewalls.


Environment: CISCO, Ciena 39xx series, ADC, MX 10003, ACX Platforms. Protocols: OSPF, BGP. TFTP Server. Scripting: Yang, XML, Python.

First Republic Bank, San Francisco, CA Oct 2018 Sep 2020
Sr. Network Engineer
Responsibilities:
Migration and implementation of Palo Alto Next-Generation Firewall series PA-500, PA-3060, PA-5060 from Cisco ASA.
Worked on BGP routing protocol, configuring BGP sessions and troubleshooting on Nexus 2K, 5K, 7K, Juniper MX-960 routers and cisco ASR routers.
Installed and maintained production servers for client services (web, dns, dhcp, mail). Experienced on working with Palo Alto Next Generation firewall with security, networking, and management features such as URL filtering, Anti-virus, IPsec VPN, SSL VPN, IPS, Log Management etc.
Coordinated with the Application Teams to develop effective Application validations involving F5 LTM and GTM components.
Designed perimeter security policy, Implemented Firewall ACL's, allowed access to specified services, Configured Client VPN technologies including Cisco's VPN client via IPSEC.
Installed and configured LAN/WAN Networks, Hardware, Software, and Telecommunication services-Cisco Routers and Switches like Cisco 3750, 3750 Gig, 6500, Nexus 7k, ASR 9k etc.
Helping Team members to build a new cloud platform for existing legacy application using Azure technologies. Part of designing the new architecture.
Configuring firewall rules in Juniper SRX firewall using cli and NSM.
Extensively worked in backend development using Python.
Using Amazon VPC (Virtual Private Cloud), AWS Transit Gateway, and VPC peering, scalable, fault-tolerant network topologies were designed and implemented on AWS to guarantee maximum performance and high availability.
Areas of focus included development of NFVI specification for centralized NFV services, development of SD-WAN services.
Worked with a team of network engineers to design and implement industry leading SD-WAN infrastructure to provide secure, carrier independent WAN connectivity across the enterprise. Integrated with existing BGP environment to redistribute routes.
Developed entire frontend and backend modules using Python on Flask Web Framework
Configuration and deployment of cisco ASA 5540 firewall for internet Access requests for servers, Protocol Handling, Object Grouping.
Worked on Cisco wireless LAN technologies and switching. Configured Virtual server, service groups, Session persistence, Health monitors and Load balancing methods in new F5 and A10 LTMs.
Worked on Infoblox to update the DNS host and A records to assist the part of the migration.

Environment: Cisco ASA 5585-SSP-20, 5525, 5510, 5520, Cisco Routers (1900, 2900, 3900, ASR 7200, 9000), Nexus 7K,5K & 2K, BGP, OSPF, MPLS, Ether Channels, Cisco Catalyst Switches, ASDM Launcher, Firepower, F5 Load Balancer.

MUFG, Dallas, TX Jan 2018 Sep 2018
Sr. Network Engineer
Responsibilities:
Demonstrated expertise in network engineering, encompassing the design, planning, and implementation of WAN and LAN infrastructures. Analyzed and mitigated single point failures, resulting in a resilient WAN structure that ensures network continuity in the event of device or link failures.
Proficiently worked with Cisco IOS on 3600/7200 class hardware within a complex WAN environment and demonstrated in-depth experience with Cisco OS and IOS on CAT6500 switches in a sophisticated data center setting.
Created and managed device groups in Panorama, enabling consistent policy application across multiple firewalls.
Used Panorama to monitor firewall activity, analyze logs, and generate reports for compliance and security audits.
Configured and designed LAN networks, deploying Access layer switches such as Cisco 4510, 4948, and 4507 switches. Proficient in setting up VLANs and configuring ISL trunk connections on Fast-Ethernet channels between switches.
Skillfully configured Riverbed Steelhead to optimize individual remote connections to the data center over WAN or Internet, enhancing network performance.
Developed a comprehensive SD-WAN test network design, streamlining client data center networks for improved manageability, operability, and maintainability.
Acquired proficiency in managing Cisco Meraki Cloud managed Switches (MS250, MS350, MS410) and SD-WAN solutions (MX 65, Viptella, Versa).
Demonstrated expertise in L2 and L3 solutions involving Cisco routers and switches, including but not limited to models 2850, 2921, 3945, 3750, and 3850.
Successfully deployed, tuned, and provided support for Cisco Firepower 9300 and ASA firewall, including the enabling of URL License.
created and put into place robust and scalable network infrastructures on AWS, making use of services like Direct Connect, Amazon VPC, Route 53, and Transit Gateway to guarantee peak availability and performance.
directed the planning and implementation of the on-premises network infrastructure move to AWS, providing a low downtime and a smooth integration with the current systems.
Provided comprehensive end-to-end network support for L2 and L3 switches, ensuring network stability and performance.
Proficiently configured Virtual Private Cloud (VPC) with networking subnets housing servers, ensuring secure and efficient data flow.
Configured wireless networks, including SSIDs, authentication schemes, and radio settings, to ensure robust and secure connectivity.
Designed network architecture on AWS VPC, including subnets, Internet Gateway, Route Table, and NAT Setup for optimal cloud-based vstructure.
Installed and implemented the monitoring tool "Infoblox" for DNS and DHCP migration, enhancing network management and reliability.
Implemented security measures to protect business LANs from unauthorized access, utilizing Palo Alto and Cisco ASA firewalls. Also, performed special projects as required.
Successfully set up a NetScaler appliance for internal server and Exchange load balancing, as well as VDI Streaming Servers and TFTP load balancing.
Configured Nexus 9500 switches, including NX-OS Virtual Port Channels, Nexus port profiles, and managed Nexus Version 4.2 and 5.0, alongside Nexus VPC peer links.
Spearheaded the implementation, troubleshooting, tuning, and training for the Cisco Firepower Intrusion Prevention System (IPS).
Deployed Palo Alto and Cisco ASA firewalls and IDS, strengthening network security to the application layer.

Environment: Technical writing, DDI, Infoblox 6.x, REST API, Perl API, Red Hat Linux 6.x, Tivoli (TSM), VMware ESX, NFS share, Perl Scripting, Korn shell Scripting, HP Service Manager.


AT&T, Dallas, TX Oct 2016 - Dec 2017
Sr. Network Engineer
Responsibilities:
Successfully executed the migration from Cisco ACE load balancer to F5 LTM load balancer in a data center environment.
Skillfully transitioned PIX rules to the Cisco ASA solution.
Proficiently managed Cisco Nexus 2148 Fabric Extender and Nexus 9500, 7010, 5000 series for flexible data center access architecture.
Led the migration of VLANs from Cisco Nx-5k to Nexus 9k switches.
Implemented VLAN deployment and decommissioning on core ASR 9K, Nexus 9K, 7K, 5K, and associated downstream devices.
Expertly installed and configured Nexus 9000 switches.
Demonstrated expertise in data center relocation, transitioning from Cisco 6500-based data centers to hybrid Cisco 6500 and Nexus-based data centers.
Effectively configured and managed Palo Alto Next Generation Firewall and Panorama Management Appliances.
Proficiently maintained subnets and host records, including CNAME, PTR, A, etc., with DHCP scopes using GUI and IBCLI (Infoblox command line interface).
Administered network security measures encompassing NAT/PAT, ACL, and ASA/PIX Firewalls.
Successfully integrated Meraki MX65, MX64, Meraki MS220, and MR33 at 36 locations, managing them through a unified dashboard.
Integrated Active Directory/LDAP with Palo Alto Next Generation Firewalls.
Configured and maintained rules for Palo Alto and Global Protect Client VPNs with LDAP integration.
Expertly handled firewall configuration and analysis, including the migration from Cisco to Palo Alto firewall platforms.
Skillfully configured Site-to-Site and Remote Access VPNs on Cisco ASA and Check Point firewalls, including Check Point VSX with firewall virtualization.
Implemented and managed IPSEC and SSL VPNs on Palo Alto Firewalls, including Zone-Based Firewalling and Security Rules.
Managed changes through CSV spreadsheet export/import on Infoblox web interface.
Worked with ACE and F5 load balancers, including F5 LTM, GTM series (e.g., 6400, 6800, 8800) for corporate applications and availability.
Configured and managed Cisco ASA devices for customer VPNs, IPS, IDS, and Firewalls.
Troubleshooted network issues related to Palo Alto Firewalls, including IPsec/SSL VPNs, LDAP user authentication, network connectivity, and security policies.
Expertly implemented, configured, and troubleshooted Virtual Servers, pools, nodes, and certificates on F5 Load Balancer.
Configured and maintained Bluecoat SG510 gateways for HTTP and HTTPS traffic across the network, updating the Visual Policy Manager (VPM) as needed.
Regularly upgraded Bluecoat devices to the desired feature set OS level.
Managed F5 LTM and GTM series (e.g., 6400, 6800, 8800) for corporate applications and availability.
Oversaw hardware maintenance and RMAs through F5 Support.
Installed and maintained Meraki WIFI Access points MS-33 and deployed and configured over 500 MS-120 and MS-250 High Power POE switches.
Managed Meraki equipment for the office network, supporting 60 staff members.
Established Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256 with PIX Firewalls.
Conducted system-level monitoring on Linux and Infoblox Appliances, monitoring process and service statuses using tools like iostat, vmstat, netstat, nfsstat, etc.
Collaborated with vendors (Infoblox, F5, Cisco) and other State Ram services teams, including Network services, Security, Cloud Services, and Windows Support, for activities such as inventory management.
Installed and troubleshooted LAN, WAN, and Multi-Layer Switching.
Demonstrated hands-on experience with Nexus 9500, 7010, 5020, 2148, and 2248 devices.


Environment: IPsec, SSL, SIP, and H.323, as well as VPN configuration, Cisco ASA, Cisco Nexus switches, Cisco ACE, F5 LTM and GTM load balancers, Meraki equipment, Palo Alto and Check Point, VSX with firewall virtualization, Infoblox, F5, and Cisco, LDAP.



Incigol Solution s, India Aug 2015 Aug 2016
Network Engineer
Responsibilities:
Worked on troubleshooting customer related issues related to router Configuration, Layer 1/Layer 2 issues.
Worked on Frame Relay switches.
Worked on OSPF using features like TSA, SA, NSSA and route summarization.
Configured EBGP/IBGP policies also tested BGP attributes such as Local preference, MED, AS-PATH, Community and Weight.
Configured and maintained Cisco and Meraki switches.
Led the conversion of Checkpoint VPN rules to the Cisco ASA solution, with expertise in both Checkpoint and Cisco ASA VPNs.
Acted as the Subject Matter Expert (SME) for NetScaler load balancing SSL VPN configuration.
Successfully migrated ASA, McAfee, and Check Point firewalls to the Palo Alto Networks platform.
Utilized REST Web API, Perl API, Korn Shell, and shell scripting on Red Hat Linux, Solaris, and
Configured EIBGP load balancing and ensured stability of BGP peering interfaces.
Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes also route filtering using Route-maps.
Configured Virtual link between discontinuous backbone areas in the network also established authentication between all OSPF routers using MD5 authentication.
Keywords: active directory information technology ffive hewlett packard microsoft California Idaho Pennsylvania South Dakota Texas

To remove this resume please click here or send an email from [email protected] to [email protected] with subject as "delete" (without inverted commas)
[email protected];3262
Enter the captcha code and we will send and email at [email protected]
with a link to edit / delete this resume
Captcha Image: