What We Do?

Routers:

Routers are responsible for routing data packets between networks. Common series include ISR (Integrated Services Router) and ASR (Aggregation Services Router).

Installation and configuration for Cisco ISR Routers:
  • ISR 4321
  • ISR 4431
  • ISR 4221
  • ISR 4331
  • ISR 1120
  • ISR 1160
Installation and configuration for Cisco ASR Routers:
  1. ASR 920
  2. ASR 1000

Routing:

Network routing is the process of selecting a path across one or more networks. The principles of routing can apply to any type of network, from telephone networks to public transportation. In packet-switching networks, such as the Internet, routing selects the paths for Internet Protocol (IP) packets to travel from their origin to their destination.

Routing Protocols
  1. RIP V1/V2
    Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric. RIP defines how routers should share information when moving traffic among an interconnected group of local area networks.
  2. EIGRP
    Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco proprietary advanced distance vector routing protocol used in computer networks. It combines the advantages of both distance vector and link-state routing protocols, offering features that improve network convergence and scalability.
  3. OSPF
    Open Shortest Path First (OSPF) is a widely used Interior Gateway Protocol (IGP) designed for efficient and scalable routing within large enterprise networks and service provider networks.
  4. BGP
    Border Gateway Protocol (BGP) is a standardized exterior gateway protocol used to facilitate routing between autonomous systems (ASes) on the Internet. It is the protocol that underpins the global routing table and plays a critical role in ensuring that data packets traverse the Internet efficiently and securely.
Implementation of MPLS

Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on labels rather than network addresses.

Implementation of ACL

Implementing Access Control Lists (ACLs) involves configuring rules on network devices, typically routers and switches, to filter traffic based on specified criteria. ACLs are used to permit or deny traffic entering or exiting an interface based on IP addresses, protocols, port numbers, or other parameters.

Implementation of Policy-Based Routing

Policy-based routing (PBR) is a technique that forwards and routes data packets based on policies or filters. We can selectively apply policies based on specific parameters such as source and destination IP address, source or destination port, traffic type, protocols, access list, packet size, etc.

Switches:

A network switch connects devices within a network (often a local area network, or LAN) and forwards data packets to and from those devices.

Installation and Configuration of Cisco Catalyst Layer 2 and Layer 3 Switches
  1. Catalyst 2960X
  2. Catalyst 9500
  3. Catalyst 9200
  4. Catalyst 9600
  5. Catalyst 9300
Implementation of VLAN

A virtual local area network (VLAN) is a virtualized connection that connects multiple devices and network nodes from different LANs into one logical network.

Inter VLAN Routing

Inter-VLAN routing (IVR) is the process of sending traffic between Virtual LANs (VLANs).

EtherChannel

EtherChannel is a networking technique that combines multiple physical links between two network switches into a single logical link.

Spanning Tree Protocol

Spanning Tree Protocol (STP) is a Layer 2 network protocol used to prevent looping within a network topology.

Quality of Service

Quality of service (QoS) is a set of technologies that work on a network to guarantee its ability to dependably run high-priority applications and traffic under limited network capacity.

Port Security

We can enforce port security policies to restrict access based on MAC addresses or other criteria, preventing unauthorized devices from connecting to the network.

Installation and Configuration for NMS:

A Network Management Station (NMS) is a server that runs a network management application. Network elements communicate with the NMS to relay management and control information.

  1. PRTG
  2. Cacti
  3. WhatUp Gold

Installation and Configuration of Windows Server 2019/2022:

Windows Server is the platform for building an infrastructure of connected applications, networks, and web services, from the workgroup to the data center.

Installation and Configuration of Active Directory

Active Directory (AD) is a directory service that runs on Microsoft Windows Server. The main function of Active Directory is to enable administrators to manage permissions and control access to network resources.

Group Policy

Group Policy is an infrastructure that allows us to specify managed configurations for users and computers through Group Policy settings and Group Policy Preferences.

Remote Installation Services

Remote Installation Services (RIS) is a Microsoft-supplied server that allows PXE BIOS-enabled computers to remotely execute boot environment variables.

Web Server

Windows Server 2019/2022 uses Internet Information Services (IIS) as its web server. IIS is a general-purpose web server that can host websites, services, and applications, and share information with users on the internet, intranet.

File Server

A file server is a computer responsible for the storage and management of data files so that other computers on the same network can access the files.

Mail Server

Mail servers deliver email messages between mail clients by using email protocols, which tell the server how to process incoming requests, where to forward the messages, and how to deliver them to the intended mail client.

DNS Server

Domain Name System (DNS) server in Windows is a server that translates domain names into IP addresses, which helps users access websites.

DHCP Server

DHCP (Dynamic Host Configuration Protocol) server is a network server that automatically assigns IP addresses, default gateways, and other network parameters to client devices.

WSUS

Windows Server Update Services (WSUS) is a built-in Windows Server role that helps manage and distribute updates and hotfixes for Microsoft products to computers in a corporate environment.

Hyper-V

Hyper-V is a Microsoft Windows hypervisor that allows users to create, deploy, and manage virtual machines (VMs) on a Windows server.

HA on Hyper-V

Hyper-V high availability is a feature that provides automatic failover of virtual machines in the event of a physical server failure.

Firewall:

A firewall is a network security device that monitors traffic to or from the network. It allows or blocks traffic based on a defined set of security rules.

Configuration and Installation of Firewalls
  1. Sophos
  2. Fortinet
Configuration of Web Filtering
Configuration of Application filtering
Configuration of Firewall Rules and Policies
Site to Site IPsec VPN
IPsec Remote Access VPN
SDWAN Rules

Amazon Web Services:

Amazon Web Services (AWS) is a cloud platform that provides over 200 services to businesses and individuals for building solutions.

Configuration of Amazon EC2

Amazon Elastic Compute Cloud (EC2) is a web service that lets users create and run virtual machines (instances) in the Amazon Web Services (AWS) public cloud.

Configuration of Amazon RDS

Amazon Relational Database Service (Amazon RDS) is an easy-to-manage relational database service optimized for total cost of ownership.

Configuration of Amazon S3

Amazon Simple Storage Service (Amazon S3) is a cloud object storage service from Amazon Web Services (AWS) that allows users to store and retrieve any amount of data from anywhere, at any time.

Cloud Recording for NVR/DVR:

In today's digital age, the demand for reliable and efficient surveillance systems is on the rise. Traditional on-premise recording solutions are often limited in scalability, accessibility, and security. A cloud-based camera recording system offers numerous advantages, including remote access, scalability, and enhanced data security. This proposal outlines the implementation of a robust cloud camera recording system tailored to meet the needs of modern surveillance applications.

Create better experiences with Crabtree

Overall Crabtree plays a crucial role in helping businesses leverage technology effectively to achieve their strategic objectives while ensuring the security, reliability, and efficiency of their IT infrastructure and systems.