20+ years of experience in the IT industry Fulfilled number of roles as Senior Technical consultant with expertise on Networking, Security, Infrastructure, Wireless and VOIP Design, Implement, Configure, Maintenance and Migration.
Flexible and productive team player working in different environments with solid work ethic who experts effort in successfully completing tasks.
Good Knowledge of Implementing and Configuring IP Addressing, TCP/IP, Layer 2/Layer 3, Routing and switching with Networking Routing Protocols.
Designed and Deployed VPN technologies: DMVPN, GET VPN, FlexVPN, MPLS Layer -3 VPNs, Multicast VPN (MVPN), IPsec site-to-site VPNs, L2TPv2/3 remote access VPNs, IPsec remote access VPNs, SSL remote access VPNs, VPLS and MPLS.
Good Experience in configuring and designing network securities such as AAA, TACACS+, RADIUS, SSH, IPsec, ACL, RBACL, Firewalls, NAT, IDS/IPS, NGFW / NGIPS, ISE 1.4 / 2.X and Content Filter (web,email).
Good Experience Virtualization environments like VMware ESXi 5.X, 6.X. vSphere suite, Cisco UCS, AWS EC2, Hyper-V, Citrix and Private / Public Cloud Services.
Good Experience with Firewall and Load Balancer Products like Checkpoint , Palo Alto, ASA / FTD , Fortinet Firewalls, Load Balance products like Citrix NetScaler, Big F5, and KEMP.
Good Experience in Designing and implementing Enterprise Campus Network Core, Distribution, Access Layer network, Using core as Cisco 6500, 6800, 9500, Distribution Cisco 6500, 4500, 9400, Access layer as 2900, 3500,3600, 3700, 3800, 9200, 9300.
Good Experience in Designing and implementing Data Centers using latest network devices and Technologies including 10 Gig Fabric, vPC, vDC, Cisco UCS (5108, B and C series servers, 61XX, 62XX, 2104, 2208), Nexus 1000v, Cisco (VSG), Cisco Nexus 9K/7K/5K/3K, Nexus 2K FEX, Cisco MDS SAN Switches, ASA Cluster with Multi-Context, Juniper VMX, SRX Firewall/Router and EX Series Switches.
Implemented Many PoC and moved to Live network in the area of SDN, Cloud, vXLAN, NSX, Express Route, Splunk, ELK, LogRhythm, InfoBlox, Mail Marshall, MoveIT, Cattools, Solarwinds – NTA, NPM, NCM, Safenet Token, NPAS.
Good skills on Service-Now – Service Ticket Manamgent and Change Managment Process.
Better Understanding of Coding Knwoledge Like, HTML,CSS,PHP,.NET,Perl, Shell, Python,YANG, XML, PowerShell.
Better Underanding of Databases like, MySQL, MSSQL, ORACLE, PGSQL.
20+ years of experience in the IT industry Fulfilled number of roles as Senior Technical consultant with expertise on Networking, Security, Infrastructure, Wireless and VOIP Design, Implement, Configure, Maintenance and Migration.
Flexible and productive team player working in different environments with solid work ethic who experts effort in successfully comp
Bceause of flexibility, so that you do not required to change the hardware while your WAN requirement increases.
I understand your question, This what it is as product.
... View more
Look at the example :
if both are standalone and root you need to set as root
station-role repeater <-- check this
https://mrncciew.com/2013/01/20/autonomous-ap-repeater/
... View more
Baisc Steps to follow :
1. Iam sure you have correct Console Cable
2. Suggest to download minicom ( since you have tried all)
3. While PC is plugged into the console port, power cycle the ME3400
4. When the message "Send break character to prevent autobooting." appears, send the break signal.
5. In "minicom" the key sequence is CTRL-F ( try couple of times until you see below prompt.
s witch: flash_init
Password recovery :
Issue the following commands at the switch prompt: switch:rename flash:config.text flash:config.old switch: boot The router will now boot into the initial startup dialogue. At the prompt "Press RETURN to get started!" Press the Enter key. At the prompt "Would you like to enter the initial configuration dialog? [yes/no]:" Enter no and press the Enter key. Issue the following commands at the switch prompt: Switch>en Switch#rename flash:config.old flash:config.text Note: Confirm this name change by just pressing the Enter key. Switch#copy flash:config.text run At this point you will be able to configure (reconfigure) the users/passwords and enable secret password for the device
If the password-recovery mechanism is disabled, you see below messages.
The password-recovery mechanism has been triggered, but
is currently disabled. through the password-recovery mechanism is disallowed at
this point.reset back to the default system configuration, access
to the boot loader prompt can still be allowed.
... View more
If no Server traffic around, there is no reason for Nexus 9K.
Campus core always Cat 9500 is the best choice for you. (if you looking Modular, for now still 6800 is best choice)
i have been hearing cisco coming soon with Catalyst 9XXX series modular, when no idea yet, but hearing that soon.
... View more
Some of the features to tweak only TAC can do with an tunnel access.
I do not believe admin have all the Access the same access what TAC have it.
... View more
Just look high level you do not have proper interface configured correctly
interface Ethernet0/0
nameif outside
bridge-group 1
security-level 0
!
interface Ethernet0/1
nameif inside
bridge-group 2
security-level 100
!
interface Ethernet0/2
nameif inside2
bridge-group 2
security-level 100
!
interface Ethernet0/3
shutdown
no nameif
no security-level
example guide for reference and correct it
https://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/interface_complete_transparent.pdf
... View more
You can make 2 Tunnels UP from remote site to main office, and using IP SLA track the Tunnel 0 - Main one the one working.
if that fails to IP SLA can move to Tunnel1
Since we dont know the device to office exact config : here is the reference guide :
https://www.cisco.com/c/en/us/td/docs/ios/12_2/12_2y/12_2yx11/feature/guide/ft_vpnha.html
... View more