What We Do?
Routers:
Routers are responsible for routing data packets between networks. Common series include ISR (Integrated Services Router) and ASR (Aggregation Services Router).
Installation and configuration for Cisco ISR Routers:
- ISR 4321
- ISR 4431
- ISR 4221
- ISR 4331
- ISR 1120
- ISR 1160
Installation and configuration for Cisco ASR Routers:
- ASR 920
- ASR 1000
Routing:
Network routing is the process of selecting a path across one or more networks. The principles of routing can apply to any type of network, from telephone networks to public transportation. In packet-switching networks, such as the Internet, routing selects the paths for Internet Protocol (IP) packets to travel from their origin to their destination.
Routing Protocols
-
RIP V1/V2
Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric. RIP defines how routers should share information when moving traffic among an interconnected group of local area networks. -
EIGRP
Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco proprietary advanced distance vector routing protocol used in computer networks. It combines the advantages of both distance vector and link-state routing protocols, offering features that improve network convergence and scalability. -
OSPF
Open Shortest Path First (OSPF) is a widely used Interior Gateway Protocol (IGP) designed for efficient and scalable routing within large enterprise networks and service provider networks. -
BGP
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol used to facilitate routing between autonomous systems (ASes) on the Internet. It is the protocol that underpins the global routing table and plays a critical role in ensuring that data packets traverse the Internet efficiently and securely.
Implementation of MPLS
Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on labels rather than network addresses.
Implementation of ACL
Implementing Access Control Lists (ACLs) involves configuring rules on network devices, typically routers and switches, to filter traffic based on specified criteria. ACLs are used to permit or deny traffic entering or exiting an interface based on IP addresses, protocols, port numbers, or other parameters.
Implementation of Policy-Based Routing
Policy-based routing (PBR) is a technique that forwards and routes data packets based on policies or filters. We can selectively apply policies based on specific parameters such as source and destination IP address, source or destination port, traffic type, protocols, access list, packet size, etc.
Switches:
A network switch connects devices within a network (often a local area network, or LAN) and forwards data packets to and from those devices.
Installation and Configuration of Cisco Catalyst Layer 2 and Layer 3 Switches
- Catalyst 2960X
- Catalyst 9500
- Catalyst 9200
- Catalyst 9600
- Catalyst 9300
Implementation of VLAN
A virtual local area network (VLAN) is a virtualized connection that connects multiple devices and network nodes from different LANs into one logical network.
Inter VLAN Routing
Inter-VLAN routing (IVR) is the process of sending traffic between Virtual LANs (VLANs).
EtherChannel
EtherChannel is a networking technique that combines multiple physical links between two network switches into a single logical link.
Spanning Tree Protocol
Spanning Tree Protocol (STP) is a Layer 2 network protocol used to prevent looping within a network topology.
Quality of Service
Quality of service (QoS) is a set of technologies that work on a network to guarantee its ability to dependably run high-priority applications and traffic under limited network capacity.
Port Security
We can enforce port security policies to restrict access based on MAC addresses or other criteria, preventing unauthorized devices from connecting to the network.
Installation and Configuration for NMS:
A Network Management Station (NMS) is a server that runs a network management application. Network elements communicate with the NMS to relay management and control information.
- PRTG
- Cacti
- WhatUp Gold
Installation and Configuration of Windows Server 2019/2022:
Windows Server is the platform for building an infrastructure of connected applications, networks, and web services, from the workgroup to the data center.
Installation and Configuration of Active Directory
Active Directory (AD) is a directory service that runs on Microsoft Windows Server. The main function of Active Directory is to enable administrators to manage permissions and control access to network resources.
Group Policy
Group Policy is an infrastructure that allows us to specify managed configurations for users and computers through Group Policy settings and Group Policy Preferences.
Remote Installation Services
Remote Installation Services (RIS) is a Microsoft-supplied server that allows PXE BIOS-enabled computers to remotely execute boot environment variables.
Web Server
Windows Server 2019/2022 uses Internet Information Services (IIS) as its web server. IIS is a general-purpose web server that can host websites, services, and applications, and share information with users on the internet, intranet.
File Server
A file server is a computer responsible for the storage and management of data files so that other computers on the same network can access the files.
Mail Server
Mail servers deliver email messages between mail clients by using email protocols, which tell the server how to process incoming requests, where to forward the messages, and how to deliver them to the intended mail client.
DNS Server
Domain Name System (DNS) server in Windows is a server that translates domain names into IP addresses, which helps users access websites.
DHCP Server
DHCP (Dynamic Host Configuration Protocol) server is a network server that automatically assigns IP addresses, default gateways, and other network parameters to client devices.
WSUS
Windows Server Update Services (WSUS) is a built-in Windows Server role that helps manage and distribute updates and hotfixes for Microsoft products to computers in a corporate environment.
Hyper-V
Hyper-V is a Microsoft Windows hypervisor that allows users to create, deploy, and manage virtual machines (VMs) on a Windows server.
HA on Hyper-V
Hyper-V high availability is a feature that provides automatic failover of virtual machines in the event of a physical server failure.
Firewall:
A firewall is a network security device that monitors traffic to or from the network. It allows or blocks traffic based on a defined set of security rules.
Configuration and Installation of Firewalls
- Sophos
- Fortinet
Configuration of Web Filtering
Configuration of Application filtering
Configuration of Firewall Rules and Policies
Site to Site IPsec VPN
IPsec Remote Access VPN
SDWAN Rules
Amazon Web Services:
Amazon Web Services (AWS) is a cloud platform that provides over 200 services to businesses and individuals for building solutions.
Configuration of Amazon EC2
Amazon Elastic Compute Cloud (EC2) is a web service that lets users create and run virtual machines (instances) in the Amazon Web Services (AWS) public cloud.
Configuration of Amazon RDS
Amazon Relational Database Service (Amazon RDS) is an easy-to-manage relational database service optimized for total cost of ownership.
Configuration of Amazon S3
Amazon Simple Storage Service (Amazon S3) is a cloud object storage service from Amazon Web Services (AWS) that allows users to store and retrieve any amount of data from anywhere, at any time.
Cloud Recording for NVR/DVR:
In today's digital age, the demand for reliable and efficient surveillance systems is on the rise. Traditional on-premise recording solutions are often limited in scalability, accessibility, and security. A cloud-based camera recording system offers numerous advantages, including remote access, scalability, and enhanced data security. This proposal outlines the implementation of a robust cloud camera recording system tailored to meet the needs of modern surveillance applications.