Cover photo
Sansbound - Students' page
34 followers|71,911 views


Only for Sansbound students…

Name of the company: AGS Health
Company Address: 05-02 Tidel park, 4 canal bank road,
South A-block. Chennai- 600113
Telephone: 044-45104520
No. Of Vacancies: 5
Type (Professional Practice / Direct Placements) Direct Placements (Confirmation only after 6 months’ performance review)
Place of Posting: Chennai
Technical Skills Required:
Strong Communication.

Networking Concepts

CCNA Security certification is must

Strong Knowledge on Cisco Routers – Routing Protocols, Access Lists, QOS, Security, NAT, SNMP, Net flow and Syslog

Strong Knowledge on Cisco Switches – VLAN, STP, Stacking Concepts and Securing Switches

Knowledge on Cisco Firewalls – Access Lists, NAT, Site to Site VPN, SSL VPN and IPS

Knowledge on Routers, Switches and Firewalls apart from Cisco will be an added Advantage

Knowledge on Wi-Fi Technologies.

Knowledge on Network Monitoring tools

Graduation Preference (if any): Any Graduate
% of Marks N/A
Personality/Communication requirements: Learning attitude and moderate communication skills
Salary & other terms and Conditions: As per fresher grade
Other Specifications Like: Nil
Requirement for Vehicle: N/A
Procedure for selection: 1. Written test
2. Technical Interview
3. HR
Date and time for selection: : 7-Jul-16 @ 10:30AM
Add a comment...
Why you need NTP (Network Time Protocol)?

What would happen if you and your friends decide to go for a vacation and the train is scheduled at some fixed time, but none of you have a watch which shows the correct time? No one will reach at the right time. Some may even miss the train. That is why we have a standard time called UTC (Universal Time Constant) and all the clock across the world runs in sync with it. According to the timezone the time may vary but all the clocks in the same timezone (should) show the same time. Indian Standard Time (IST) is 5hrs and 30mins ahead of UTC hence all the clock in India follows UTC+5½hrs.

In Network management it is vital that all the devices follow the same time. Why? you ask, here are some reasons listed:

Sync your watch’s time.
To launch that rocket scheduled for Mars.
Have an online party to start.
Catch a flight on time.
Monitor a network and know when the router/switch/firewall/system broke down.
If you were to read news in a News paper and find out when that news took place you would look at the date of publishing on the News paper. We need an anchor, a constant, that we all agree to follow in order to relate to the events happening in our lives. similarly when we talk about IT infrastructure a good IT Engineer will also make sure he checks that time when a particular event happen.

Lets look at some examples.
Eg.1: 50 of the 200 clients start experiencing connectivity issue. You (the IT support guy) started receiving email and call to your desk, from the users, stating that they are unable to login to their system. Immediately you check the Monitoring system and find that out of 4 Active Directory (AD) servers one has some issue with Network Card. You quickly replace the Network card and the issue gets resolved.

In the above example the issue is very straight forward. Yet you had to relate the time of occurance of the issue (clients’ issue) with the events that took place elsewhere (AD down). In the same example if the users started calling you from 1pm and you find that the AD went down at 2pm. You can be sure that the lack of connectivity is not due to AD but something else. You see that the timing of the events will make you take a different troubleshooting path.

Eg. 2: We backup our files every night at 10pm and we let it copy all the files from one server to another over internet. Usually it takes 2-4 hours. You start the backup and go home to sleep. Next morning you get a call from office stating that they do not have any internet connectivity. Upon reaching your office you find the FTP backup was successful. How do you know find out when the Internet failed?

This is where you turn to your Monitoring tools, which can tell you which device failed by collecting information from the device database. Lets say you find the syslogs of the gateway router and start reading them line by line. You find that the router got rebooted at around 8pm the previous day which resulted in disconnection of internet. This shocks you as you know the internet was working till 10pm, as you initiated the backup only at 10pm. Only then you realize that the router has been restarting regularly and every time it restarts it resets its clock to 12am. This resulted in the wrong reporting of time by the router.

Eg. 3: A user calls to tell that he is unable to open many of the web pages. Upon investigation you find that the user is unable to open only https pages and http pages are loading fine. With this clue you now know that something relating to SSL (https uses ssl) has gone wrong. Something in the user’s computer does not get the SSL certificate to encrypt/decrypt the https traffic. Rest of the users in your network do not have any such issues. Upon investigation you find that upon restarting the system looses its time and resets the clock to 12am due to faulty CMOS battery.

This is where you change the system’s CMOS battery and reset the time and find that the issue is resolved. The user was unable to open https webpages because the SSL certificates are valid only for a certain time frame. Which means if your system’s time resets to an old time (say 2010) then the browser will not take the certificate which is valid from future (say 2016).

ntp-server-sigma-modThere are many other examples where a wrong Clock time in one or many device can result in confusion and make it difficult to find the problem. On the other hand there are many examples where a proper implementation of
NTP will help all the devices sync to a common time and help IT support guys to troubleshoot better.

Add a comment...
Difference Between Object Based NAT and Table Based NAT in Checkpoint
This article discusses about the difference between the 2 type of NAT which can be configured in the checkpoint firewall. NAT is a idea of translating IP address in the IP packet and mainly used to provide communication between Private network to Public network.
This NAT can be configured in so many devices i.e. router, firewall, etc. And configuration of NAT is one of the simplest process especially in Checkpoint firewall. And the NAT can be configured in 2 difference methods.
1.Object Based
2.Table Based

1.Object Based
1.Create a node or network object in the checkpoint firewall the object and check the option “Add automatic Translation” the object
4.Then a NAT rule will automatically implemented in the for the above object
5.Install the policy
That’s it. Now that private network or host of the object can communicate to the public network
2. Table Based
1.Go to NAT policy tab
2.Create a new policy in NAT
3.Add the network or host object as the source in the original packet section
4.Create a new host object for the IP address of the External interface of the checkpoint firewall
5.Now add the above mentioned object as the source in the translated packet section
6.And when it is added, select Hide mode to update the object
7.Install the policy
That’s it. Now that private network or host of the object can communicate to the public network
But there is a difference. If we enable NAT on the object, then it is not possible to mention the service separately. that obviously means that the node or the network of the object can communicate any service to any host of the public network. And the NAT rule implemented for the object can not be modified in the table
If we enable NAT by creating rule, manually in the NAT table, then it is possible to set the destination object in the destination column and also the service object in the service column. And that rule can be modified at any time in the table. So we can decide which host can communicate which destination for which service.
Add a comment...
How-to change SSH port number in RHEL-7
SSH is a networking protocol used for accessing the CLI(shell) remotely with applications. In RHEL7, ssh will be by default running as a daemon service called sshd in port 22,
systemctl status sshd.service
It is installed by the package called openssh, which will act as both as server and client, if it is not installed, install it with the command
yum install openssh*
EX: To access
which will open the shell of using the default port 22 after entering the password

Two ways you can login to remote host with ssh
with password – less secure (because it uses passwords for authentication)
without password – more secure (because it uses keys for authentication)
In this blog I want to show you how to secure the ports of SSH
We know that ssh server will by default runs in port number 22,
To Make SSH Server runs on Port number 222 when SELinux and Firewalld is enabled, you have to edit the file /etc/ssh/sshd_config in server
Port 222 ‪#‎Line‬ no 17
Allow firewall for this port
firewall-cmd --add-port=222/tcp --permenent
firewall-cmd --reload
Manage Port for SELinux
semanage port -a -t ssh_port_t -p tcp 222
semanage port -l | grep ssh ‪#‎to‬ verify
Restart the Service
systemctl restart sshd.service
Acess the server from client machine with the new port which you only knows
ssh -p 222

Add a comment...

No of Openings:5


Venue:Ganapathy Complex

Greetings from Hi-Focus Electronics India PVT Limited.

Tech Support-Executive:

B.E, B.Tech, Diploma, B.Sc. graduates with computer science or IT back ground is preferred.
Candidates with CCNA/ Networking courses certified only should apply.
Should have excellent communication Skill.
Hindi /Telugu/Malayalam Speaking is Mandatory.(Either one)
Should have some basic knowledge in system hardware.(Optional).
Terms & Conditions:

Please ensure that the candidates should stay with us at least for a period of 2 years.
Selection process is completely depends upon their performance in the Interview
Depending upon their performance, Salary will be finalized.
Shortlisted candidates will be having a final discussion with our GM at our office.
Add a comment...
Sansbound - Students' page's Collections
Contact Information
Contact info
No 40, Circular Road, United India Colony, Kodambakkam, Chennai 600024
No 2, Annadurai Building, 1st Floor, Kirupashankari Street, West Mambalam, Chennai 600033
Sansbound - The Networking school.
Sansbound has been training networking since 1998. More than 15,000 successful Engineers certified in Cisco, Microsoft, RedHat and CheckPoint will testify for Sansbound.