Configured Fortinet UTM for IP/Port, DMZ, Web-filter, IPS, Email, DLP & App-controls. (Fortigate, Forti Analyzer and Forti Manager)
Implemented OSPF routing on Cisco routers & Fortinet firewall between nationwide sites.
Configured High-Availability (Active-Active) mechanism between Fortinet devices.
Configured Policy-based routing, Ether-Channel, ACL & Port security on Cisco 6500, 3800 & Juniper EX3200 & EX4200 series switches.
Configured Juniper & Cisco routers to accommodate network needs of corporate clients.
Implemented 2-Factor (OTP) authentication (Hardware/Software tokens) on Fortinet Authenticator for LDAP users.
Involved in Data/IP based project for DSL users to use NCCPL applications over internet to remove legacy ISDN connection.
Configured Forti Clients for IP-Sec VPN / DSL users.
Configured and administrated IPSec Site-to-Site VPN between Fortigate and Cisco ASA.
Managed Cisco wireless controllers 2500 series for binding Mac-addresses to provide secure environment by using Cisco AIRCAP 1600 & 2700 series APs.
Configured Web filtering and Email filtering in Fortinet firewall, allowing and restricting specific domains for specific users as per NCCPL policy.
Monitoring for overall Network Infrastructure by using NMS (WhatsUpGold).
Verifying MTS broadcasting UDP ports by using wireshark packet sniffer.
Provided technical presentation and explanation to the customer technical team to facilitate business.
Verifying all devices and dark core links status and documenting check list on daily basis.
Analyzing and verifying overall email logs which has been blacklisted / spammed.
Coordinating with different vendors for SLA / RMA activities and ISPs for L2 & dark core links maintenance.
Modifying firewall rules and policies to allow or deny different services as per NCCPL Policy.
Monitoring tunnels connectivity among HO, DR, ISB and LHR Office using different NMS Servers.