Filter interviews by
I applied via Referral and was interviewed before Mar 2023. There were 3 interview rounds.
Top trending discussions
HSRP (Hot Standby Router Protocol) and VRRP (Virtual Router Redundancy Protocol) are network protocols used for providing high availability in routing.
HSRP and VRRP are used to provide redundancy for routers in a network.
They allow for automatic failover in case of a router failure.
HSRP is a Cisco proprietary protocol, while VRRP is an open standard protocol.
Both protocols use a virtual IP address that clients use as t...
BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different networks on the internet.
BGP is used by internet service providers to make routing decisions.
It operates on TCP port 179.
BGP uses path attributes to determine the best route to a destination.
BGP can be configured in different ways such as eBGP (external BGP) and iBGP (internal BGP).
I applied via Referral and was interviewed in Mar 2022. There were 3 interview rounds.
BGP is a routing protocol used to exchange routing information between different networks. MPLS is a protocol used for efficient data transfer. Basic router commands include show ip route, show interfaces, etc.
BGP stands for Border Gateway Protocol and is used to exchange routing information between different networks.
MPLS stands for Multiprotocol Label Switching and is used for efficient data transfer.
Basic router com...
I have the necessary skills, experience, and passion for the job.
I have a strong background in network engineering with experience in designing, implementing, and maintaining complex networks.
I am proficient in various network technologies such as Cisco, Juniper, and Palo Alto.
I have excellent problem-solving skills and can troubleshoot network issues quickly and efficiently.
I am a team player and can work collaborativ...
My family background is diverse and multicultural.
My parents are from different countries and cultures, which has given me a unique perspective on the world.
Growing up, I was exposed to different languages, traditions, and customs.
My family values education and hard work, which has motivated me to pursue a career in network engineering.
I am a network engineer with 5 years of experience in designing, implementing and maintaining complex networks.
I have a Bachelor's degree in Computer Science
I am proficient in Cisco and Juniper routers and switches
I have experience in configuring firewalls and VPNs
I am a team player and have excellent communication skills
I am always eager to learn and keep up with the latest technologies
Looking for growth opportunities and to expand my skill set.
Current job lacks opportunities for growth and learning
Seeking a more challenging and dynamic work environment
Interested in exploring new technologies and expanding my skill set
I am open to discussing a salary that is commensurate with my experience and the responsibilities of the role.
I am looking for a fair and competitive salary based on industry standards and my qualifications.
I am willing to negotiate and consider other benefits such as healthcare, retirement plans, and vacation time.
I am open to discussing performance-based incentives and bonuses.
I am aware of the salary range for this ...
I worked as a Network Engineer at XYZ Company.
Designed and implemented network infrastructure for multiple clients
Configured and maintained network devices such as routers, switches, firewalls
Troubleshot network issues and provided solutions to clients
Managed network security and implemented security protocols
Collaborated with cross-functional teams to ensure smooth network operations
I applied via Naukri.com and was interviewed before Jan 2022. There were 5 interview rounds.
Aptitude questions. Not much considered for final selection.
I applied via Company Website and was interviewed in Dec 2020. There was 1 interview round.
Access is a port that allows a single VLAN while trunk is a port that allows multiple VLANs.
Access ports are used to connect end devices like computers, printers, etc. to the network.
Trunk ports are used to connect switches to each other and carry traffic for multiple VLANs.
Access ports are assigned to a single VLAN while trunk ports can carry traffic for multiple VLANs.
Access ports do not tag frames while trunk ports ...
LAN is a local area network that connects devices within a limited area, while WAN is a wide area network that connects devices over a large geographical area.
LAN is typically used in homes, offices, or schools, while WAN is used to connect different LANs across cities, countries, or even continents.
LAN has a higher data transfer rate and lower latency compared to WAN.
Examples of LAN technologies include Ethernet, Wi-F...
To convert access into trunk, we need to configure the switch port as a trunk port.
Configure the switch port as a trunk port using the 'switchport mode trunk' command.
Verify the trunk configuration using the 'show interfaces trunk' command.
Ensure that the VLANs allowed on the trunk are configured using the 'switchport trunk allowed vlan' command.
Ensure that the native VLAN is configured using the 'switchport trunk nati
Load balancer distributes incoming network traffic across multiple servers to improve performance and availability.
Load balancer acts as a reverse proxy server
It distributes traffic based on various algorithms such as round-robin, least connections, IP hash, etc.
It monitors server health and redirects traffic to healthy servers
It can be hardware-based or software-based
Examples of load balancers include F5, HAProxy, Ngi
Trunk is used to carry multiple VLANs between switches, while access is used to connect end devices to the network.
Trunk is used to connect switches together and carry multiple VLANs
Access is used to connect end devices like computers, printers, etc. to the network
Trunk ports are configured with VLAN tagging, while access ports are not
Examples of trunk ports are inter-switch links, while examples of access ports are po
Port-based security involves controlling access to network resources based on the physical port of the device.
Port security can be implemented by limiting the number of MAC addresses that can be learned on a port.
It can also involve configuring the port to only allow traffic from specific VLANs.
Port security can be used to prevent unauthorized access to the network by limiting the devices that can connect to it.
It can ...
I applied via Approached by Company and was interviewed before Mar 2021. There were 2 interview rounds.
LSA Types are used in OSPF to describe the type of information contained in the LSA.
Type 1: Router LSA - contains information about the router and its directly connected networks
Type 2: Network LSA - describes the networks connected to a multi-access network
Type 3: Summary LSA - contains information about networks outside of the area
Type 4: ASBR Summary LSA - describes the ASBR router to the rest of the OSPF domain
Type...
BGP attributes are used to determine the best path for routing traffic between autonomous systems.
BGP attributes include: AS Path, Next Hop, Local Preference, Weight, Multi-Exit Discriminator (MED), Origin, and Community
AS Path is a list of autonomous systems that the route has passed through
Next Hop is the IP address of the next router in the path
Local Preference is used to indicate the preferred path for outbound tra...
Senior Engineer
143
salaries
| ₹5.8 L/yr - ₹19 L/yr |
Design Engineer
124
salaries
| ₹2 L/yr - ₹10.4 L/yr |
Product Design Engineer
68
salaries
| ₹3.2 L/yr - ₹10.3 L/yr |
Lead Engineer
62
salaries
| ₹12.5 L/yr - ₹23 L/yr |
Engineer
56
salaries
| ₹4.5 L/yr - ₹9.5 L/yr |
Siemens
ABB
Schneider Electric
Honeywell International India