We provide IT Staff Augmentation Services!

Sr. Network Consultant Resume

5.00/5 (Submit Your Rating)

Phoenix, AZ

SUMMARY:

  • 8 years of Experience in IT & Network Administration, management, strategic planning, effective budgeting cost control, networking, installing, configuring and maintaining network and server devices including instalments and configurations of physical networks (servers, switches, routers, panels, ports & hubs).
  • Expert Level Palo Alto, Cisco ASA Firewalls Administrator.
  • Proficient in Cisco IOS for configuration & troubleshooting of routing protocols: MP - BGP, OSPF, LDP, EIGRP, RIP, MPLS.
  • Windows & Red Hat Servers Network Configuration including User Management Active directory and mail servers - Exchange and Cloud.
  • Highly experienced in VPN Implementation IPsec VPN and SSL VPN Server-to-Server and Client-to-Server.
  • Worked extensively on firewalls and VPN gateways including Blue Coat Web Gateway, CISCO, GUI and Shell.
  • Configuring/Managing Intrusion Prevention System (IPS) and Intrusion Detection System (IDS): Cisco IPS/IDS.
  • Worked extensively on implementation and configuration of F5 LTM 6400 Load Balancers
  • Experience in deploying and maintaining layer 7 appliances like Infoblox
  • Configured IP helpers on the VLAN’s as requested by the customers as per their DHCP settings on Infoblox
  • Maintain accurate software and hardware inventories.
  • Repair and replace hardware including installing PCI cards dims, motherboards.
  • Hands on Experience in configuring and troubleshooting Cisco routers, WIFI wireless Controller, Cisco catalyst, Nexus switches, Citrix net scalar, ASA, Palo Alto Next generation and Firepower Threat Defense FTD Next generation Cisco Firewalls.
  • Manage and monitor multiple commercial-sourcing agreements such as Master Service agreement (MSA), Statement of work (SOW) and 120+ service level agreements (SLA).
  • Installation of Windows 2003 enterprise and standard editions, R2, Windows 2000 standard and advanced server editions.
  • Experienced in DHCP, DNS, NIS, SMTP, IMAP, ODBC, FTP, TCP/IP, LAN, WAN, LADP, security management and system troubleshooting skills.
  • Thorough knowledge of the installation, termination and troubleshooting of the physical layer and data link layer of the OSI model.
  • Proficiently implemented traffic filters using Standard and Extended access-lists, Distribute-Lists, Route Maps and route manipulation using Offset-list.
  • Access control server configuration for RADIUS and TACACS+.
  • Efficient in configuring and implementing load balancers like F5 BIG-IP LTM series like 3900, 6900, 8900.
  • Experience in implementing network security using NAT, PAT, ACL, IDS, IPS and ASA firewalls.
  • Experience with Firewall migrations from Cisco ASA, to Cisco Firepower.
  • Experience on working with Wireless enterprise (Cisco & Aruba)
  • Established relationships and network connectivity with vendors via site to site VPN.
  • In-depth knowledge and hands on experience in Tier-2 ISP Routing policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, Firewalls.
  • Good experience of OSI model, TCP/IP networking standards and with protocols like SNMP, IPv6.
  • Hands on experience in deployment of GRE tunneling, SSL, Site-Site IPSEC VPN and DMVPN.
  • Extensive knowledge and troubleshooting experience in different networking protocols including DHCP, DNS, FTP, TFTP, SNMP, Quality of Service (QOS), PAP, CHAP, HTTPS, SSH, Telnet and ICMP.
  • Implemented IPv4 migration to IPv6 (NAT-PT, Tunnelling, etc.)
  • Managed F5 Big IP GTM/LTM appliances to include writing iRules, SSL offload and everyday task of creating WIP and VIPs
  • Created pools for the nodes and assigned Virtual IP’s to those pools on F5
  • Experience in configure and implementing load balancing features to an in-production web server.
  • Experience in design, Deploying & Troubleshooting F5 load balancer Includes BIGIP Series 5050V, 10000V, 8900, 6900, and 3900.
  • Planned and worked on design with Network team to Re-architect F5 load-balancers to load-balance traffic anywhere in the company network.
  • Expert in performing deep packet analysis to troubleshoot network and application issues using Wireshark.
  • Experience with design and implementation of Data center migration and ACI.
  • Implemented VDC, VPC, VRF and OTV on the Nexus 5505 and 7009 switches.
  • Developed Merge jobs in Python in order to extract and load data into MySQL database and used Test driven approach for developing applications.
  • Adept in handling network monitoring tools such as Wireshark, Netflow, SNMP and SYSLOG.
  • Strong understanding of current and future technologies including TCP/IP, IPv4/v6, RIP, EIGRP, OSPF, BGP, Frame Relay, ACL, VPN, Wireless LAN and configuration of VLANs.
  • Strong communicator: able to interact effectively and positively with individuals of all technical abilities; An Out-of-the-Box Thinker, Believe in Team Work & Team Spirit, Decision Maker, Proactive, Customer Focused & Good Documentation / Presentation Skills.

PROFESSIONAL EXPERIENCE:

Confidential, Phoenix, AZ

Sr. Network Consultant

Responsibilities:

  • A Senior Network engineer responsible for managing the Network operations and support during technology implementation and their day-to-day activities
  • Tier 4 Network Engineer, Responsible for Re-architecture and Implementing Cisco Next Generation Firewalls across the Network.
  • Participate in IT infrastructure Planning & designing network projects, involved in network designing, Technical proposal write up and documentation for data center migration.
  • Created a wide range of technical documentation (HLD, LLD, Transitions phases, migration test plans, Migration Checklists, Risks and Impact analysis, LAN standards).
  • Developed Data center Migration Runbook (Migration Approach, Pre-Cutover Activities, Cutover day Activities, Post cutover Activities, Communication Plan, Monitoring plan, Rollback plan)
  • Implementing and troubleshooting firewall rules in Palo Alto, Cisco ASA 5540, 5585
  • Responsible for Cisco ASA and Palo-Alto firewalls configuration and administration across global networks for providing IPS/IDS.
  • Experience installing and administering firewall and IDS/IPS systems in enterprise networks including in Data center
  • Implementing security Solutions using Palo Alto Pa-5000/3000, Cisco ASA
  • Installed and upgraded antivirus, applied security patches as per policy and monitored network security compliance.
  • Provide Health Check support for End Customers with Cisco WSA Appliances.
  • Services expert responsible for effectively communicating, educating, and positioning Infoblox service programs within the partner community and customer base.
  • Installation, Configuring and maintenance of Cisco Layer 3 switches 2960-X,2960-XR 2960C, 3750, 3850, 4500-X, 4507,4509, 6506, 6509, 4510, Nexus 7K/5K/2K/3K switches, ASR4431, ISR1009, 2600, 2900,VG 224 Routers, ASA 5585 firewall, Citrix NetScaler, Brocade, and Dell, devices
  • Configured F5 GTM Wide IP, Pool load Balancing Methods, probers and monitors recreating Http and https redirect VIP's to client from data servers
  • Working experience with Load Balancers F5 LTM like 3900, 6900, 4200V over various environments.
  • Installed high availability Big IP F5 LTM and GTM to provide uninterrupted service to customers.
  • Implementation and Configuration (Profiles, I Rules) of F5 Big-IP LTM-6400 load balancers
  • Upgraded load balancer from Redware to F5 Big IP v9 which improved functionality and scalability in the enterprise.
  • Experience on dealing with Cisco Application Centric Infrastructure (ACI) by integration hardware and software products as per network layout
  • In corporate Cisco Nexus 9000 NXOS to ACI fabric to work in concert with existing Nexus 7000s and ASRs for Multi-Protocol Label Switching (MPLS)
  • Expertise in the administration, support and operation of the Orion Solar Winds platform including Network Performance Monitoring (NPM), Network Configuration Manager, Server & Application Monitor (SAM), NetFlow, Traffic analyser and IP address Manager.
  • Implemented Cisco ISE for delivering consistent, highly secure access control across wired and wireless multivendor networks and remote VPN connections.
  • Used Bluecoat Proxy SG Appliances to effectively secure Web communications and accelerate delivery of business applications.
  • PCI Compliance auditing with Cisco/Aruba Wireless Security Assessments & also Wireless Site Surveys
  • Design and setup of Aruba Controllers 531, redundant 7211, 3200, 3400 and 6000 series
  • Air Magnet & Aruba Airwave Setup, Maintenance & Troubleshooting
  • Configuring, troubleshoot and support WAN arena and reengineering using MPLS, OSPF, EIGRP, BGP, DMVPN, NetFlow, ACL, NAT /PAT protocols and IP-Readdressing on Routers and firewalls.
  • Implemented Static, BGP, EIGRP, redistributing protocols, Route-reflector, Route-Maps
  • Configured Advanced technologies vDC, vPC, Fabric path (Spine and Leaf), FEX, VSS, QOS, site to site VPN on production environment
  • Configured and Deployed Firepower Threat defence with IPS, IDS, AMP and URL filtering and integrated with Firepower Management Center FMC for 4100 series.
  • Deployed 19 Next generation Palo Alto Firewalls 5200s (5280 and 5260),3200s and 3000s and integrated them to Panorama (Centralized management center), configuring S2S tunnels, ACLS, NATs and static routes with Wildfire enabled on it for Sandboxing Malware viruses. Good Hands-on knowledge on PAN-OS adhering to compliances
  • Deployed several Cisco 2700,2800,3800s and Aruba 315,335,305 access points integrating them to the respective Cisco and Aruba wireless controllers and upgrading Wireless controllers to the recent Cisco version 8.8.
  • Experience in Cisco Routing, Switching and Security with strong Cisco hardware/software experiences with Cisco Routers such as 1900, 2900, 3900, Cisco ASR-1k/9k, Cisco Multilayer Switches 4500, 6500, Cisco Nexus 2k/5k/7k/9k
  • Aruba Switch s3500 & 1200 Complex Stacking topologies and profile configurations
  • Adding Websites to blocked list on the bluecoat proxies based upon business requirements.
  • Provide support and for 2Tier and 3Tier firewall architecture, which includes various Cisco ASA firewalls and Palo-Alto firewalls.
  • Hands on Experience on Infoblox tools. DNS and DHCP and allocating IP ranges on Infoblox.
  • Implementing IP addressing schemes, LAN/WAN protocols, IP Services, to meet network requirements in different environments.
  • Worked on various WAN technologies like E1/T1/E3/T3, HDLC, MPLS
  • Generating RCA (Root Cause Analysis) for LAN/WAN critical issues.
  • Worked on Cisco IronPort web Proxy and configured cisco, Aruba wireless controllers (7210,7220) and access points AP330, AP315, AP210
  • Performed IOS and NXOS Upgrades on cisco router and switches as per company standards.
  • Decommissioned of EOL/EOS devices in Data Center, which involved working with Partner Companies.
  • Setup the DMZ, Internal and External VLANs, Trunking and IP addressing on the leaf switches
  • Enabled PIM-SM in the transport network and EIGRP in the control plane for optimal routing of traffic and equal-cost multipathing (ECMP) in the fabric between the leaf and spine switches
  • Integrated Tufin products into complex security environments with all Cisco Firewalls, SIEM (IDS/IPS), switches, routers and other security tools
  • Configuration of Palo alto series firewalls and implementation for outbound traffic via blue coat proxy server.
  • Configuration of Azure API gateway service.
  • Worked with level-2 team on migration project of CMA's from one Provider-1 to other Provider-1.
  • Worked on changing global objects and global rules to local objects and local rules for migration project.

Environment:: In Corporate office architecture with highly reliable & secured network including) Palo Alto 5020, 5060, Cisco ASA, Routing Protocols (EIGRP, RIP, OSPF, BGP), 3550, 3560, 2924, 1400, 6513, 6504, 6503, 6506, 6500 series switches, Switching protocols (VTP, STP, GLBP), Cisco WSA Citrix NetScaler, Nexus 7K/5k/2K, Microsoft Azure, Multicasting, Bluecoat Proxy, VPN, Tufin, Data Center Migration .

Confidential, New York City, NY

Sr. Network and security Consultant

Responsibilities:

  • Responsible for installation, troubleshooting of firewalls (Cisco firewalls) and related software, and LAN/WAN protocols.
  • Configuration, Troubleshooting and Maintenance of Palo Alto Firewalls (160+ firewalls) - PA200, PA2000 series, PA3000 series, PA4000 series and PA5000 series.
  • Installed and configured Cisco IronPort ESA and WSA appliances. Installed and administered ACS servers (3.x, 4.x. 5.x) to provide AAA services for VPN, wireless, device administration. Plan and Migrate ACS from 4.0 to 5.x appliance.
  • Install network backbone, wireless controllers and wireless access points (Cisco, Aruba, Ruckus)
  • Building configurations for Cisco routers with features like port security, VLANS, VTP, PVST+.
  • Maintained Aruba Network, in two different data centres, for over 1500 remote home users (VPN)
  • Selected as the one person hired from the contractor to maintain the wireless network
  • Reengineered the LAN to provide more reliable services and to reduce the latency, analysed the NT domain in the Austin office to determine all the problems
  • In-depth knowledge and hands-on experience in Tier II ISP Routing Policies, Network Architecture, IP Subnetting, VLSM, TCP/IP, NAT, DHCP, DNS, FT1 / T1 / FT3 / T3 Sonet POS OCX / GigE circuits, Firewalls.
  • Primary responsibility is to design and deploy various network security & High Availability products like Cisco ASA other security products
  • Responsible for Palo Alto and Cisco ASA firewall administration across global networks.
  • Drive the project for implementing WAN solutions at the DaVita Global solutions headquarters giving highest redundancy and increased efficiency with 2 ISP links and 2 MPLS circuits saving $20,000 per year cost baseline.
  • Excellent knowledge of FISMA, HIPAA and NIST Compliance usage, rules and regulations
  • Assist in the creation of an end-to-end technology strategy for SIEM to address current and future security concerns, emerging threats, regulatory compliance and alignment with technology and the business
  • Configured and maintained the networks consisting of Cisco 2800 and 3800 routers, and catalyst 2950, 3560, and 3750 switches.
  • Configured Citrix NetScaler ADC for load balancing and assigned virtual server IP (VIP) address to virtual servers.
  • Responsible for designing Fully Wireless & Wired Networks Solution For Multi-Vendor Like Aruba, HP, Cisco
  • Delivering high quality technical collateral for the Aruba Wireless (WLAN) product line for customer, partner and SEs.
  • Managed and completed installing/upgrading client's wireless infrastructure to Aruba.
  • Installed and provisioned close to 2000 AP's and RAP's.
  • Configured Guest Access using ISE. Created security Profiles based on the company's requirement
  • Worked extensively in Configuring, Monitoring and Troubleshooting Checkpoint, Cisco’s ASA 5500/PIX security appliance, Failover DMZ zoning & configuring VLANs/routing/Natting with the firewalls as per the design.
  • Access Control Server configuration for RADIUS & TACACS+.
  • Utilized Fluke Network's Air Magnet software to conduct wireless surveys, and verify coverage.
  • Generated survey reports with proposed solutions on problematic areas falling below the required dB criteria.
  • Utilized Aruba's Airwave server to manage and monitor the network for issues.
  • Performed Aruba server upgrades to accommodate the newer versions of AOS code.
  • Utilizing Aruba's built in analytical, management and security features to troubleshoot wireless issues.
  • Worked on Palo Alto PA-3000 Series to manage network traffic flows using dedicated processing and memory for networking, security, threat prevention and management
  • Created subnets (on these switches) from the given Class B and Class C addresses to support the VLANs.
  • Responsible for developing and deploying Solar Winds which includes WAN/LAN and server monitoring, reporting, and alerting and Configure Orion alerts.
  • Installed and upgraded antivirus, applied security patches as per policy and monitored network security compliance.
  • Configured Citrix NetScaler responder policy and to maximize the performance and availability of all applications and data and provide secure remote access to any application from any device.
  • Implemented inter-VLAN routing on Cisco Layer 3 switches among the VLANs to allow communication on larger internetworks.
  • Implemented extended ACLs on Palo alto and ASA to allow communication between the required networks, and to restrict other communications.
  • Monitored system logs and root's email for important messages such as errors and warnings or hardware failure errors on Cisco IronPort ESA.
  • Implementing Proxy requests, maintaining Proxy incidents and troubleshooting proxy issues using McAfee web gateway.
  • Adding external websites to the McAfee Web gateway and blocking them when they categorized as an uncategorized URL.
  • Used the Wireshark and other traffic analysers to troubleshoot network issues.
  • Knowledge of McAfee web gateways and other web filtering technologies and giving access to personal email accounts based on Organization's security policy standard.
  • Responsible for adding Cisco IronPort ESA for the company's spam filter.
  • Implemented various routing protocols such as RIP, EIGRP, and OSPF; also, taking care of issues such as discontinuous networks.
  • Configured route redistribution on 3800 routers to exchange routes from RIP to IGRP domains, and vice versa.
  • Manage Cisco IronPort ESA Email Security Appliance for email gateway.
  • Second-tier technical support for production servers and workstations, problem determination and resolution with vendor contact/interface for production technical support
  • Managed disk file systems, server performance, user’s creation and granting file access permissions
  • Recreating customer environments, as necessary, for troubleshooting and resolution of complex issues.
  • Troubleshot connectivity issues in layer 2 and layer 3 networks. Configuring buffer and console logs, and enable debugs for troubleshooting.
  • Performing the testing on the new hardware platforms bought as per the network requirements.
  • Performed the network designs and devices with new features, devices, and technologies for migrating to the latest technologies.
  • Implemented the Spanning Tree Protocol optional features such as BPDU Guard and Root Guard etc. as required on the network.
  • Installed and enabled the Syslog servers to collect alerts and logs for proactive network monitoring.

Environment: Series T1 Controllers, DS3 Lines (T3 Lines), Palo Alto (PA-4000/PA-2000) Fiber and Ethernet cabling, Cisco ESA, Nexus 7010, 5020, McAfee Web Gateway, Security Analytics, Citrix NetScaler. Cisco 4500, 6500 VSS, Nexus vDC, vPC

Confidential, Wilson, NC

Network Engineer

Responsibilities:

  • Design traffic flows in BGP using standard and extended access-lists, Distribute-list and Route Maps, MED and Local Preference to load balance traffic across multiple ISP links.
  • Design and develop infrastructure software for network management system and monitoring for one of the largest networks, containing SDN, traditional routed and traditional optical mode.
  • Part of the team that manages the IP|MPLS VPN and Clients Enterprise Network to ensure all services and
  • SLA's are met for all internal and external customers. Third level of escalation incident management to support post sale solution during the live cycle of the services.
  • Cisco Systems ESA Email appliance (150/170 series), switches (2900/3500 series), and Routers (3200/3600/3800 series).
  • Design and implemented Cisco VoIP infrastructure for a large enterprise and multi-unit office environment.
  • Lead design and implementation engineer for VoIP projects consisting from, 000 IP Phones and Analog devices.
  • Designing, Implementing LAN/WAN configurations on Cisco Nexus 5k, Catalyst 6500 switch.
  • Assist customers with Certificate Updates, Load balancing through Citrix NetScaler.
  • Configuring and resolving various OSPF issues in an OSPF multi area environment.
  • Configured and designed Access layer switches such as Cisco 4510, 4948, 4507 switches.
  • PCO (Provisioning Control Office) function in support of Mobility Network Provisioning.
  • Responsibilities are including managing the order process which encompasses order tracking, validating engineering, documenting and publishing daily reports. This is involving all aspects of the provisioning process CISCO including, Ethernet, PPP and other duties.
  • Configuration and maintenance of PIX and ASA firewall systems.
  • Configured DHCP scopes for voice and data VLAN segments.
  • Manage and implement solution on Telephonic Global MPLS Network
  • Configuration and troubleshooting of Cisco catalyst 6509, 7613 with supervisor cards.
  • Redistribution of OSPF and EIGRP into BGP with the correct tagging parameters from the old legacy network to route and to utilize the correct MPLS VRF VPN’s provided from the bearers.
  • Implemented, Configured BGP WAN routing, converting OSPF routes to BGP (OSPF in local routing).
  • Expertise in maintenance of layer 2 switching tasks- VLAN, VTP, RSTP, configuration of ether channel with LACP and PAGP along with troubleshooting of inter-VLAN routing.
  • Implemented Cisco Ironport Security Management Appliance and IronPort ESA in DR site to provide redundancy across data centers for email flow.
  • Conducted site surveys and installation of wireless Area network.
  • Guided a team of 15 junior Network Engineers for deployment of Cisco LAN/WAN/WLAN infrastructure.
  • Responsible for service request tickets generated by helpdesk in all phases such as troubleshooting, maintenance, upgrades, patches and fixes with all around technical support.
  • Supporting EIGRP and BGP based PwC network by resolving level 2 and 3 problems of internal teams and external customers of all locations.
  • Estimated project cost and created documentation for project funding approvals.
  • Created and delivered internal training on BGP.
  • Experience with Cisco LAN controllers (8500, 5760, 5500) Cisco Aironet Access Points (3700, 2700, 1600, 700W), Cisco Mobility Platform.
  • Planning, deploying LANs/WANs voice interconnection using protocols VoIP, H.323, SIP, ISDN, L1-L3.
  • Worked on Route-Reflectors to troubleshoot BGP issues related to customer route prefixes and route filtering using Route-maps.
  • Have applied ACLs for Internet access to servers using Cisco 5550 ASA firewall and performed NAT.
  • Worked on WAN (ATM/Frame Relay), Routers, Switches, TCP/IP, Routing protocols (BGP/OSPF) and IP addressing.

Environment: Cisco 5550 ASA, Cisco LAN controllers (8500, 5760, 5500) Cisco Aironet Access Points (3700, 2700, 1600, 700W), SolarWinds.

Confidential, Reston, VA

Network Administrator

Responsibilities:

  • Responsible for installation Configuration of Server Windows server Operating System 2008R2
  • Provided value added customer services by attending to customer queries and issues
  • Analysed the performance of the Linux system to identify memory, disk I/O and network problem
  • Monitoring the servers via IP monitor
  • Added User accounts, maintained security
  • Systems and Server Level Support
  • Responsible for planning and Execution of system Backup and recovery
  • Monitoring all the clients globally and solving the problem raised by IMS
  • Responsible for providing online support to other offices, remote installation at their ends through VNC, Remote admin and terminal Services
  • Handling server Check List.
  • Support and administer the network infrastructure for including deployment of new equipment and services to handle increased customer demand.
  • Optimized performance of the WAN network consisting of Cisco 3550/4500/6500 switches by configuring VLANs.
  • Performed OSPF, BGP, DHCP Profile, HSRP, IPV6, Bundle Ethernet implementation on ASR 9K redundant pair.
  • Responsible for equipment in support of voice services, CATV, and voice/data integration.
  • Develop and enforce best practice standards for installation and deployment of access layer hardware.
  • Interact and manage outside contractors in support of wiring infrastructure.
  • Developed automation process using K-shell for WLS install, upgrade patches, deployment, monitor, tuning and configuration of Apache application server in multi cluster server environment
  • Managed all network deployments and equipment in a mission critical and high availability environment
  • Installed, configured and maintain with the latest updates on the 3700, 3800, 7200 and 7600 Cisco Routers and 2960, 3750, 3560, 6500 Switches.

Environment : Router 1800, 2600, 800; Switch 2960, 3550; Cat5 & Cat 6 Cabling Infrastructure.

Confidential

NOC Engineer

Responsibilities:

  • Configuring and troubleshooting multi-customer ISP network environment.
  • Involved in network monitoring, alarm notification and acknowledgement.
  • Implementing new/changing existing data networks for various projects as per the requirement.
  • Troubleshooting complex networks layer 1, 2(frame relay, ATM, Point to Point, ISDN) to layer 3 (routing with MPLS, BGP, EIGRP, OSPF and RIP protocols) technical issues.
  • Used Wireshark for network packet capture.
  • Providing support to networks containing more than 2000 Cisco devices.
  • Performing troubleshooting for IOS related bugs by analysing history and related notes.
  • Sought out new peering relationships, at both public exchange points as well as via private interconnects.
  • Carrying out documentation for tracking network issue symptoms and large scale technical escalations.
  • Managing the service request tickets within the phases of troubleshooting, maintenance, upgrades, fixes, patches and providing all-round technical support.
  • Commissioning and Decommissioning of the MPLS circuits for various field offices.
  • Preparing feasibility report for various upgrades and installations.
  • Installation and maintenance of new network connections for the customers.
  • Installing new equipment to RADIUS and worked with MPLS-VPN and TACACS configurations.
  • RF Design, Network Planning and Optimization Experience of Leading Mobile Network Operator Airtel.
  • Installing and maintaining local as well as network printers.
  • Installing and maintaining Windows NT Workstations and Windows NT Server.
  • Providing technical support to LAN & WAN systems.
  • Monitoring Memory/CPU on various low-end routers in a network.

We'd love your feedback!