i
Tech Mahindra
Filter interviews by
I applied via Approached by Company and was interviewed in Sep 2023. There were 4 interview rounds.
Fortigate IPsec tunnel is a secure connection established between two Fortigate devices for secure communication.
IPsec tunnel is used to encrypt data traffic between two Fortigate devices
Fortigate devices authenticate each other using pre-shared keys or certificates
IPsec tunnel can be configured using the Fortigate web interface or CLI commands
Fortigate HA cluster is a high availability setup where two or more Fortigate devices work together to ensure continuous network security.
Fortigate HA cluster involves setting up two or more Fortigate devices in an active-passive or active-active configuration.
In active-passive setup, one device is active while the other is on standby, ready to take over in case of failure.
In active-active setup, both devices actively ...
Packet flow in Fortigate involves ingress, inspection, routing, and egress stages.
Ingress stage: Packet enters the Fortigate device through a physical or virtual interface.
Inspection stage: Packet is inspected by security policies, firewall rules, and security services like antivirus and IPS.
Routing stage: Packet is routed based on destination IP address and routing table.
Egress stage: Packet exits the Fortigate device...
posted on 8 Nov 2024
I applied via Approached by Company and was interviewed in May 2024. There were 3 interview rounds.
Firewall traffic flow refers to the movement of data packets through the firewall based on defined rules and policies.
Firewall inspects incoming and outgoing traffic to determine if it should be allowed or blocked
Traffic flow can be controlled using access control lists (ACLs) and security policies
Firewall can also perform Network Address Translation (NAT) to hide internal IP addresses
Examples of traffic flow include a...
Firewall architecture involves packet filtering, stateful inspection, and application layer filtering to protect networks.
Firewall acts as a barrier between internal network and external network
Packet filtering examines packets based on predefined rules to allow or block traffic
Stateful inspection tracks the state of active connections to make decisions on allowing or blocking traffic
Application layer filtering inspect...
I am seeking new challenges and opportunities for growth in my career.
Seeking new challenges to expand my skills and knowledge
Opportunities for career growth and advancement
Desire for a change in work environment or company culture
I was interviewed in Aug 2023.
ARP generates and sends packets to map IP addresses to MAC addresses in a network.
ARP request is broadcasted to all devices on the network
The device with the matching IP address responds with its MAC address
ARP table is updated with the IP-MAC mapping
ARP packets have source and destination MAC addresses, IP addresses, and ARP operation code
CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. It is a network protocol used in Ethernet networks to avoid data collisions.
CSMA/CD is used in Ethernet networks to regulate access to the network medium.
Before sending data, a device using CSMA/CD listens to the network to check if it is busy.
If the network is clear, the device sends the data. If a collision is detected, the device stops transm...
I applied via Referral and was interviewed in Aug 2022. There were 2 interview rounds.
BGP routing tables store information about routes to different networks and the best path to reach them.
BGP uses a path-vector routing protocol to determine the best path for a packet to reach its destination.
BGP routing tables contain information about the network prefixes, the next hop to reach them, and the path attributes that determine the best path.
BGP routers exchange routing information with their neighbors to ...
NAT is a technique used to map private IP addresses to public IP addresses. Port numbers are used to identify specific applications.
NAT stands for Network Address Translation
It is used to allow devices with private IP addresses to access the internet using a public IP address
Port numbers are used to identify specific applications or services
Common port numbers include 80 for HTTP, 443 for HTTPS, and 22 for SSH
Default single port range when neither port range in source NAT pools nor default port range are configured.
When neither port range in source NAT pools nor default port range are configured, the default single port range is 1024 through 63,487.
This range is used for outbound traffic initiated by the device.
It is important to configure the port range to avoid conflicts with other devices on the network.
For example, if m...
MSS in TCP refers to the maximum segment size, which is the largest amount of data that can be sent in a single TCP segment.
MSS is negotiated during the TCP three-way handshake
It is determined by the maximum transmission unit (MTU) of the network
MSS can be adjusted by the sender or receiver using TCP options
A smaller MSS can help prevent fragmentation and improve network performance
Packet drops can be caused by various factors. Troubleshooting involves identifying the root cause and implementing a solution.
Check for network congestion or bandwidth limitations
Verify if the packet is being dropped at the source or destination
Inspect network devices for errors or misconfigurations
Use packet capture tools to analyze the traffic
Consider implementing Quality of Service (QoS) policies
Update firmware or
To check port and duplex setting, MSS and MTU, and link utilization in network engineering.
Use command 'show interface' to check port and duplex setting.
Use command 'ping -f -l
Use command 'netstat -s' to check MSS.
Use command 'show interface' or 'show interfaces utilization' to check link utilization.
I applied via Naukri.com and was interviewed in Feb 2023. There were 2 interview rounds.
I applied via Naukri.com and was interviewed in Nov 2022. There were 5 interview rounds.
General mathematics calculation are in appititude test
Last 2 round test selected students are talking one topic in rounded table. This is GD round
I applied via Approached by Company and was interviewed in Apr 2022. There were 4 interview rounds.
The interview was very good as they asked me my experiences(good & bad) from the day I am professional. How to handle the situations when a senior person makes a mistake. What are the ways of learning that you prefer.
I have worked with a variety of tools as a Network Engineer.
Cisco Packet Tracer
Wireshark
SolarWinds Network Performance Monitor
Nmap
GNS3
Ping
Traceroute
I have worked on a variety of technologies as a Network Engineer.
Cisco networking equipment
Routing and switching protocols (e.g. OSPF, BGP)
Firewalls and security appliances (e.g. Cisco ASA, Palo Alto)
Network monitoring and management tools (e.g. SolarWinds, Wireshark)
Virtualization technologies (e.g. VMware, Hyper-V)
Load balancers (e.g. F5, Citrix NetScaler)
Wireless networking (e.g. Cisco Meraki, Aruba)
Network troubles
based on 2 reviews
Rating in categories
Software Engineer
26.4k
salaries
| ₹2 L/yr - ₹9.1 L/yr |
Senior Software Engineer
21.2k
salaries
| ₹5.5 L/yr - ₹22.5 L/yr |
Technical Lead
11.5k
salaries
| ₹9.2 L/yr - ₹37 L/yr |
Associate Software Engineer
5.2k
salaries
| ₹1.8 L/yr - ₹6 L/yr |
Team Lead
4.9k
salaries
| ₹5.2 L/yr - ₹16.7 L/yr |
Infosys
Cognizant
Accenture
Wipro