i
Ensono
Filter interviews by
I applied via Naukri.com and was interviewed in Jun 2023. There were 2 interview rounds.
Top trending discussions
I applied via Naukri.com and was interviewed in Dec 2021. There was 1 interview round.
VLANs can be configured using switch management interfaces or command line interfaces.
Identify the VLANs needed and assign them a VLAN ID
Configure the switch ports to be members of the appropriate VLAN
Configure the VLAN interfaces on the switch
Configure VLAN trunking protocol (VTP) if necessary
Verify the VLAN configuration using show commands
ACL can be configured by defining rules to permit or deny traffic based on source/destination IP, port, and protocol.
Identify the traffic that needs to be controlled
Define the rules for permitting or denying traffic
Apply the ACL to the appropriate interface or VLAN
Regularly review and update the ACL to ensure it meets the changing needs of the network
I applied via Naukri.com and was interviewed in Dec 2020. There was 1 interview round.
The OSI model is a conceptual framework used to describe the communication functions of a network.
The model has 7 layers, each with a specific function.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer communicates with the layer above and below it.
The model helps ensure interoperability between different network devices and software.
Example: When you visit a web...
SSL offloading is a process of removing SSL encryption from incoming traffic and decrypting it before sending it to the backend servers.
SSL offloading is performed by a load balancer like F5 to reduce the processing load on backend servers.
It improves server performance and reduces latency by offloading SSL processing to a dedicated hardware or software.
F5 SSL offloading can be configured to support multiple SSL certif...
SNAT stands for Secure Network Address Translation and is a feature in F5 that allows for the translation of IP addresses.
SNAT is used to translate the source IP address of outgoing traffic to a different IP address.
This can be useful in scenarios where multiple devices are sharing a single public IP address.
SNAT can also be used to improve security by hiding the actual IP address of a device from the public internet.
F...
STP, HSRP, and FRRP are network protocols used for redundancy and failover. HSRP and VRRP are similar but HSRP is preferred.
STP (Spanning Tree Protocol) prevents loops in a network by disabling redundant links
HSRP (Hot Standby Router Protocol) and VRRP (Virtual Router Redundancy Protocol) provide redundancy by allowing multiple routers to share a virtual IP address
FRRP (Fast Router Redundancy Protocol) is a Cisco propr...
The xlate table in ASA is used to keep track of translations between internal and external IP addresses. It is important for IPsec tunnel troubleshooting.
The xlate table is used to map internal IP addresses to external IP addresses
It is important for troubleshooting IPsec tunnels because it allows you to see if traffic is being translated correctly
You can view the xlate table using the 'show xlate' command in the ASA C...
Senior Systems Engineer
72
salaries
| ₹9 L/yr - ₹26 L/yr |
Senior Administrator
54
salaries
| ₹7 L/yr - ₹22.7 L/yr |
System Engineer
52
salaries
| ₹6.5 L/yr - ₹18.5 L/yr |
Data Center Operations Analyst
45
salaries
| ₹5 L/yr - ₹15 L/yr |
Mainframe System Programmer
35
salaries
| ₹6.5 L/yr - ₹26 L/yr |
Wipro
TCS
HCLTech
Tech Mahindra