Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Checkpoint firewall troubleshooting interview questions

20/11/2021 Client: muhammad11 Deadline: 2 Day

Praharsha Kanna Muddana
Email: muddanakanna@gmail.com
Objective: Securing a position which will allow me the opportunity to display exceptional analytical, problem-solving and technical skills within Network and Information Security.

Technical Skills Summary:

Functional Areas

Endpoint Security Management, Network Security and Information Security Management, System Administration, Desktop Support, Active Directory, Help Desk Support, DNS.DHCP

Monitoring & ticketing tools

Remedy, Nagios, HP service manager, Tufin, Hp NNMI, Kibana, Easy IP

Routers & Switches

Cisco 3640, Cisco 3600, 3800, ASR, ACI

Catalyst 6500, 4500, 3700, 3500, Nexus 1k, 2k, 5k, 7k, 9k

Routing Protocols

RIP, IGRP, EIGRP, OSPF, BGP V4, MP-BGP.

Vulnerability management

Nessus 4.8, Splunk

Firewalls

Checkpoint (R75, R77), Cisco ASA, Palo Alto

Antivirus

Symantec Endpoint protection, MacAfee

Proxy Servers

Bluecoat

Load Balancer

F5 (BIGIP) LTM VIPRION

Programming Skills

C, C++, SQL, python, bash script, HTML

Others

RSA two factor authentications 7.1

Certifications:

· Cisco Certified Network Associate

· Checkpoint Certified Security Administrator

· Microsoft Certified Technology Specialist: Windows 7 Configuration

Academic Experience:

· Master’s in computer science 2015-2016

University of Alabama in Huntsville

· Bachelor of Technology in Computer Science 2008-2012

GITAM University

Experience Summary:

6+ years’ experience within Information Technology, specializing in Information Security and Network Administration, including both Professional and Academic applications.

Employer: Cardlytics

Designation: Network Engineer II

Period: September 2018 – Present

Responsibilities

• Designed and implemented BGP/OSPF based connectivity solutions for AWS and Extranet. • Maintain and manage ASA, Juniper SSG, FTD, Palo alto & Zone based firewalls. • Designed and implemented partner router setup for B2B IPSEC VPNs. • Manage Cisco Nexus & Juniper based data canters. • Designed and implemented Meraki wireless network solution for HQ and remote sites. • Lead a team of Engineers and generate reports to management. • Build and troubleshoot IKEv1/IKEv2 IPSEC and GRE tunnels. • Maintain Big-IP F5 LTMs & GTMs, NAC solutions- ISE & Forescout. • Currently working on ACI and Silver peak SD-WAN data centre build. • Escalation point for complex network issues and participate in on-call rotation.

Client: Capital one

Designation: Network and Security Engineer

Period: June 2016 – September 2018

Responsibilities

· Troubleshoot Routers and Switches Configuration and work on incident, problem and change management.

· Manage all Datacenter Network Operations.

· Write and implement scripts/configuration on network devices during fault incident, Service improvement Plan, Urgent maintenance activities.

· Maximizing network performance by monitoring performance, troubleshooting network problems and outages; scheduling upgrades; collaborating with network architects on network optimization.

· Troubleshoot the proxy servers and firewalls, Packet capturing to resolve operational issues.

· Troubleshooting network link/device/configuration issues, isolating the problem, fixing the problem.

· Ability to packet capture using tools such as Wireshark and tcp dump. Track the top talkers using riverbed tool.

· Ability to Prioritize, execute tasks and make sound decisions in high pressure situation.

· Undertake routine preventative measures and implement, maintain and monitor network security

· Configure, support, and troubleshoot Checkpoint firewalls and Palo Alto firewalls.

· Tenaciously manage network security environment to ensure it is operating at optimal levels through proactive monitoring.

· Configure, support, and troubleshoot Checkpoint firewalls and Palo Alto firewalls.

· Configure, support and troubleshoot F5 Local Traffic Manager (LTM).

· Configure, support and troubleshoot Blue Coat Proxy SG servers.

· Identifying whether a host is behind a firewall using scripts and other resources.

· Working on firewall traffic logs to determine whether a firewall is allowing or blocking traffic between any given hosts

· Using Tufin to analyse firewall policies to determine whether a firewall is allowing or blocking traffic between any given hosts

· Compare firewall policies from different dates to determine when a specific rule change occurred and who made the change

· Using Tufin Secure Track to compare firewall policies from different dates to determine when a specific rule change occurred and who made the change

· Working on firewall failover events and troubleshooting the issues that caused them and restore them.

· Using Splunk to solve firewall failover issues reviewing firewall system logs in Splunk

· Evaluating the severity of incidents and determining when and how to implement an emergency change to resolve the incident

· Performing all tasks on the Check Point High Severity Checklist

· Running tcpdumps on Check Point firewalls as per client requirements to solve issues.

· Performing firewall pre/post validations during network maintenances

· Opening a support case with Check Point

· Reviewing firewall & proxy traffic logs in Kibana to monitor the health of the company and troubleshoot the issues as per requirement

· Write iRules to assign certain behaviors to individual application-specific connections. iRules can search the content of a traffic, such as an HTTP request or response, and direct the traffic accordingly.

· Insert header data into application-specific requests, such as HTTP requests, and then direct the request based on that header data.

· Using the BIG-IP tools to configure session persistence, based on data such as HTTP cookies, source IP addresses, destination IP addresses, and SSL session IDs.

· Monitor the health or performance of servers in a pool.

· Implementing load-balancing algorithm to assess the current load on a server.

· Enhancing traffic-management performance by configuring the system’s traffic management microkernel service.

· Balancing traffic to tune and distribute server load on the network for scalability.

· Off-loading standard server tasks, such as HTTP data compression, SSL authentication, and SSL encryption to improve server performance.

· Monitoring the health and performance of servers on the network for availability.

· Establishing and managing session and connection persistence.

· Handling application-traffic authentication and authorization functions based on user name/password and SSL certificate credentials.

· Managing packet throughput to optimize performance for specific types of connections.

· Improving performance by aggregating multiple client requests into a server-side connection pool.

· Applying configuration settings to customize the flow of application-specific traffic (such as HTTP and SSL traffic).

· Content filtering management of Controlled access to the Internet as per the company IT Security Policy with Bluecoat Proxy

· Provide Conditional & specific Internet access to specified groups and users as per client requirements in Bluecoat Proxy.

· Inbound & outbound scanning of Emails for virus, Spam & other infections

· Content filtering solution to reduce the unwanted mail volume,

School: University of Alabama in Huntsville

Course: Master’s in computer science

Period: January 2015 – May 2016

Projects

· Computer Networks: Application to measure the sound levels of the things around us and transmit it to another device in the same network to show it graphically - spring 2016.

· Computer Security: Chat application to implement (RSA, DES) algorithms both build-in and programmer implementation - spring 2016.

· Database: An online shopping cart is an e-commerce web application which provides a platform for users to purchase a wide range of products online - spring 2015.

· Computer graphics: Developing a 2D drawing program which allows users to draw 2D objects, programing a 2D robot and animating its motion using 3D camera on OPEN GL and GLUT - fall 2015.

Company: Wipro Technologies

Client: Southern Water Services

Designation: Network and Security Administrator/ System Administrator

Period: June 2012 – December 2014

Responsibilities

· Management of NAV Primary server for Symantec Antivirus Server and updates.

· Ensure all clients are enforced with the EPS policy configuration with Symantec Antivirus

· Management of quarantine and prevent the other systems from getting infected with virus.

· Virus removal on the infected systems by automated or manual process.

· Advice to desktop and server team on virus detection and procedure for clean-up.

· Content filtering management of Controlled access to the Internet as per the company IT Security Policy with Bluecoat Proxy

· Provide Conditional & specific Internet access to specified groups and users as per client requirements in Bluecoat Proxy.

· Inbound & outbound scanning of Emails for virus, Spam & other infections

· Content filtering solution to reduce the unwanted mail volume

· Communicating to the users about new vulnerabilities and patches available

· Monitoring security logs to report events and provide utilization report.

· Authentication Mechanism to Citrix through RSA Server.

· Working on the issues on the RSA Server and resolving them.

· Assigning of RSA hardware tokens to user accounts.

· Complete installation of RSA software token on windows, android, iPhone, desktop, laptops.

· Monitoring logs and generating reports on expired tokens and providing them with new RSA tokens.

· Logging service requests with RSA and working with them to resolve the issue.

· Secure the network traffic over LAN & WAN and access to the applications through company firewall.

· Experience on installing, maintaining and troubleshooting Check Point R75, R77.30 Gaia.

· Demonstrated experience in developing, implementing, auditing Checkpoint firewall (R77.30) configurations and analyzing, optimizing rule sets.

· Hands on experience and good working knowledge with Checkpoint Firewall policy provisioning.

· Upgraded the data center network environment from Cisco ASA 5520 to Checkpoint R77 firewalls.

· Performed routine monitoring of Checkpoint firewall from security perspective and troubleshooting the connectivity issues.

· Involved in configuring Checkpoint (R77) Firewall rule base and objects as per the requirements.

· Troubleshooting checkpoint firewall connectivity related issues using Smart view tracker.

· Experience in reviewing and recertification of rule sets and involved in creation, validation and maintenance of enterprise check point (R77.30) firewall policies.

· Configured ACL's in Cisco 5520 ASA firewall for internet Access requests for servers, Protocol Handling, Object Grouping and NAT.

· Good experience with checkpoint VSX, IDS, IPS as well as encryption techniques.

· Worked on Checkpoint firewalls in creating and implementing the policies required by the company.

· Migrated legacy Cisco ASA firewalls to Checkpoint firewalls using migration tools in the enterprise environment.

· Preparing and providing the Quarterly, Monthly reports.

· Managing Dashboard of vulnerability management tools like Nessus.

· Vulnerability analysis and reporting

· Secluding scans and implementing new scan templates

· Monitor IP address management, network utilization for routers and switches.

· Preparing and publishing network daily health Checks report on critical links.

· Well versed in Vendor Management on Logging WAN (ADSL, ISDN, IP-VPN, Leased Lines, PSTN) link faults/Service Requests, Hardware replacements on any failures.

· Experienced upgrading Firmware Versions of ADSL Routers.

· Administering network services & troubleshooting network problems

· Administering NetFlow Analyser on all the sites (ADSL, IP-VPN), by observing the traffic and accordingly publishing the report on high Bandwidth Utilization.

· Experienced with switching – duplex, speed changes, port-security requests, VLAN creation, addition & user moves, PCI compliance configurations changes, etc.

· Activating / deactivating ports as per the requirement.

· Providing WAN & LAN connectivity to new customer location.

· Cabling and Patching the PCs to the Network switches.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Homework Tutor
High Quality Assignments
Top Essay Tutor
Engineering Solutions
Engineering Guru
Engineering Help
Writer Writer Name Offer Chat
Homework Tutor

ONLINE

Homework Tutor

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$36 Chat With Writer
High Quality Assignments

ONLINE

High Quality Assignments

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$33 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$31 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$19 Chat With Writer
Engineering Guru

ONLINE

Engineering Guru

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$28 Chat With Writer
Engineering Help

ONLINE

Engineering Help

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$29 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Reflection - Loss of individuality in the handmaid's tale - Fl calder college liverpool - 5 paragraph discussion - The ruum questions and answers - Sport obermeyer case study answers - How to calculate 1st quartile in excel - Sense Assignment - What are watson patterns - Business - Which act of macbeth contains the exposition - Marketing excellence nike case study solution - Bob nale is the owner of nale's quick fill - All about me math poster - Constellation stories for students - Calculating time and distance - Week 7 - Harry atkinson reef gps marks - Gre standard deviation and normal distribution - Unisa online study material - How to make non functional requirements visible in scrum - Ssl / tls renegotiation handshakes mitm plaintext data injection - Kim - Edit My Resume - What's the Start line? - #18 - MSCB WK7 DQ1 - Goventure ceo strategy - More than a motorcycle the leadership journey at harley davidson - Nectar in a sieve questions and answers - Corneal suture removal cpt code - Discussion with 350 words - Please atttach the plagiarism report - Foreign exchange market quiz - Webmail qed qld gov au - Alexandra wing broadgreen hospital - Businesspeople who compose messages for mobile devices should - Xray vision light bar - Difference between alternator and synchronous generator - Com 201 - John gaus ecology of public administration - Famous people in psychology - My brother's peculiar chicken moral lesson - A sharecropping contract 1866 voices of freedom - Density of diesel in kg mm3 - 300 words - Commemorative speech about my father - 8.3 mortgage application process answers - Robin williams on tiger woods - Assignment: Experiential Versus Narrative Family Therapies - Width of a thumbtack in metric units - Liver enzyme lab worksheet answers - Concur expense quick reference guide - Sample interpersonal process recording nursing - HR - 5-3-1 activity: historical context chart - I need 900 words on Project Planning Techniques - Katherine knight crime scene - Linux implementation proposal - Hey pretty one come talk me - 1nd law of thermodynamics - Health Care Management - Jb hi fi phone insurance - Week 4 - Marie curie fellows association - Structural strain theory social movements - Food web for the arctic - A sickeningly sweet baby boy case study answers - What is a folktale - PREVENT OF UTIs - Powerpoint presentation and note - Frankfort nachmias and nachmias 1996 - CC W 6 D - File allocation strategies in os - Disposition of nonconforming material - Root canal anatomy blogspot - How to splice 8 strand rope - Apple retail iphone upgrade program - Conclusion on why cell phones should be allowed in school - The middle passage documentary by steven spielberg - Writing a paragraph - Incident investigation procedure flowchart - Annotated Bibliography on ERM - Best sentence starters for essays - Cessna 310r for sale australia - Charlie and the chocolate factory chocolate castle - 4 discussion - Major fish diseases and their control ppt - Wiat ii standard score descriptors - Level 3 principles of ict systems and data security answers - The circle of governments machiavelli summary - 12/10-12 carver place dundas valley - Sandtoft new rivius slate - Confiscation, expropriation, and domestication are classified as - Interpersonal communication movie analysis paper - Forensic factor lasting impressions answers - Be good little migrants by uyen loewald - Skills and techniques for human service professionals - Tph group pty ltd mona vale - Vertical sweep efficiency - Math 221 statistics for decision making week 6 lab answers - Ethical and legal implications of prescribing drugs for nurse practitioners