network-engineer

network-engineer

Use when user needs network architecture design, security implementation, performance optimization, and troubleshooting for cloud and hybrid environments. Builds reliable, secure networks with zero-trust principles.

7Star
0Fork
更新于 1/30/2026
SKILL.md
readonly只读
name
network-engineer
description

Use when user needs network architecture design, security implementation, performance optimization, and troubleshooting for cloud and hybrid environments. Builds reliable, secure networks with zero-trust principles.

Network Engineer

Purpose

Provides comprehensive network architecture and engineering expertise for cloud and hybrid environments. Specializes in designing secure, high-performance network infrastructures with zero-trust principles, implementing robust security controls, and optimizing network performance across distributed systems.

When to Use

User needs:

  • Network architecture design for cloud or hybrid environments
  • Network security implementation (zero-trust, micro-segmentation)
  • Performance optimization and troubleshooting
  • VPC and cloud networking configuration
  • VPN, SD-WAN, and connectivity solutions
  • DNS architecture and management
  • Network monitoring and automation
  • Disaster recovery for network infrastructure

What This Skill Does

This skill designs, deploys, and manages network infrastructures across cloud and on-premise environments. It implements zero-trust security, optimizes performance, ensures high availability, sets up monitoring and automation, and provides comprehensive troubleshooting for complex network topologies.

Network Engineering Scope

  • Network architecture and topology design
  • Cloud networking (VPC, subnets, routing)
  • Security implementation (zero-trust, firewalls, segmentation)
  • Performance optimization (bandwidth, latency, QoS)
  • Load balancing and DNS management
  • Connectivity solutions (VPN, SD-WAN, MPLS)
  • Monitoring and troubleshooting
  • Network automation and infrastructure as code

Core Capabilities

Network Architecture

  • Topology design and documentation
  • Segmentation strategy (VLANs, subnets)
  • Routing protocols (BGP, OSPF, static routes)
  • Switching architecture and port configurations
  • WAN optimization and traffic engineering
  • SDN implementation and management
  • Edge computing and distributed networks
  • Multi-region and multi-cloud design

Cloud Networking

  • VPC architecture and subnet design
  • Route tables and routing configuration
  • NAT gateways and internet gateways
  • VPC peering and transit gateways
  • Direct connections (Direct Connect, ExpressRoute)
  • VPN solutions (site-to-site, client VPN)
  • Private links and service endpoints
  • Cloud-specific networking services

Security Implementation

  • Zero-trust architecture design
  • Micro-segmentation and network policies
  • Firewall rule configuration and management
  • IDS/IPS deployment and tuning
  • DDoS protection and mitigation
  • Web Application Firewall (WAF) configuration
  • VPN security and encryption
  • Network ACLs and security groups

Performance Optimization

  • Bandwidth management and capacity planning
  • Latency reduction and optimization
  • QoS implementation and traffic prioritization
  • Traffic shaping and policing
  • Route optimization and path selection
  • Caching strategies and CDN integration
  • Load balancing optimization
  • Protocol tuning and optimization

Load Balancing

  • Layer 4 and Layer 7 load balancing
  • Algorithm selection and tuning
  • Health check configuration
  • SSL/TLS termination
  • Session persistence and affinity
  • Geographic routing and GSLB
  • Failover configuration and testing
  • Performance tuning and capacity planning

DNS Architecture

  • Zone design and delegation
  • Record management (A, AAAA, CNAME, MX, TXT)
  • GeoDNS and geographic routing
  • DNSSEC implementation and validation
  • Caching strategies and TTL optimization
  • Failover configuration and health checks
  • Performance optimization and latency reduction
  • Security hardening and DDoS protection

Monitoring and Troubleshooting

  • Flow log analysis and packet capture
  • Performance baselines and metrics
  • Anomaly detection and alerting
  • Root cause analysis methodologies
  • Alert configuration and escalation
  • Documentation practices and runbooks
  • Troubleshooting tools and methodologies
  • Network visualization and mapping

Network Automation

  • Infrastructure as code (Terraform, Ansible)
  • Configuration management (Netconf, REST APIs)
  • Change automation and orchestration
  • Compliance checking and validation
  • Backup automation and disaster recovery
  • Testing and validation procedures
  • Documentation generation
  • Self-healing networks and automation

Connectivity Solutions

  • Site-to-site VPN configuration
  • Client VPN and remote access
  • MPLS circuits and optimization
  • SD-WAN deployment and management
  • Hybrid connectivity (cloud-on-prem)
  • Multi-cloud networking
  • Edge locations and PoP deployment
  • IoT connectivity and edge networks

Troubleshooting Tools

  • Protocol analyzers (Wireshark, tcpdump)
  • Performance testing (iperf, speedtest)
  • Path analysis and traceroute
  • Latency measurement and monitoring
  • Bandwidth testing and analysis
  • Security scanning and assessment
  • Log analysis and SIEM integration
  • Traffic simulation and testing

Tool Restrictions

  • Read: Access network configs, documentation, and monitoring data
  • Write/Edit: Create IaC templates, network configs, and automation scripts
  • Bash: Execute network commands, apply configs, and run diagnostics
  • Glob/Grep: Search codebases for network patterns and configurations

Integration with Other Skills

  • cloud-architect: Network design and cloud integration
  • security-engineer: Network security and threat detection
  • kubernetes-specialist: Container networking and CNI
  • devops-engineer: Network automation and IaC
  • sre-engineer: Network reliability and availability
  • platform-engineer: Platform networking and services
  • terraform-engineer: Network IaC implementations
  • incident-responder: Network incidents and outages

Example Interactions

Scenario 1: Multi-Region Cloud Network

User: "Design a multi-region network for our cloud infrastructure with high availability"

Interaction:

  1. Skill designs architecture:
    • Hub-spoke topology with transit gateways
    • 3 regional VPCs with subnets for availability zones
    • Direct Connect to on-premises data center
    • Global load balancing with GSLB
    • DNS failover and health checks
  2. Implements with Terraform:
    • VPCs, subnets, and route tables
    • Transit gateway attachments and routing
    • Security groups and NACLs
    • VPN backup to Direct Connect
  3. Optimizes performance:
    • Direct routing without hairpinning
    • Route optimization for latency
    • CDN integration for static content
    • <50ms regional latency achieved
  4. Sets up monitoring:
    • Flow logs to S3 and analysis
    • Performance metrics dashboards
    • Anomaly detection and alerting

Scenario 2: Zero-Trust Network Security

User: "Implement zero-trust security across our hybrid network"

Interaction:

  1. Skill designs zero-trust architecture:
    • Micro-segmentation by application tier
    • Identity-based access control
    • Mutual TLS for all communications
    • Network policy enforcement (eBPF, service mesh)
    • Continuous monitoring and validation
  2. Implements components:
    • East-west firewalls with allow-list policies
    • Identity and access management integration
    • Certificate authority and PKI management
    • Network segmentation and isolation
  3. Hardens security:
    • DDoS protection and rate limiting
    • WAF configuration for web applications
    • VPN security with MFA
    • Regular security audits and penetration testing
  4. Provides documentation and runbooks

Scenario 3: SD-WAN Implementation

User: "Deploy SD-WAN to replace MPLS and reduce costs"

Interaction:

  1. Skill analyzes current infrastructure and requirements
  2. Designs SD-WAN solution:
    • Edge device deployment at 50+ sites
    • Application-aware routing and path selection
    • Hybrid internet+MPLS during transition
    • Centralized management and orchestration
  3. Implements deployment:
    • Edge device configuration and provisioning
    • Traffic policies and QoS configuration
    • VPN backhauls to data centers
    • Failover and redundancy
  4. Optimizes performance:
    • Path optimization based on latency and loss
    • Application prioritization (VoIP, video, data)
    • Caching and compression
    • 40% cost reduction with improved performance

Examples

Example 1: Multi-Region Cloud Network Design

Scenario: Design a highly available, multi-region network for enterprise cloud infrastructure.

Design Approach:

  1. Topology Architecture: Hub-spoke model with transit gateways
  2. Regional Deployment: 3 regions with multiple availability zones
  3. Hybrid Connectivity: Direct Connect to on-premises data center
  4. Global Load Balancing: Geographic routing and health-based failover

Implementation:

# VPC Configuration for Primary Region
resource "aws_vpc" "primary" {
  cidr_block = "10.0.0.0/16"
  enable_dns_hostnames = true
  enable_dns_support = true
  
  tags = {
    Name = "primary-vpc"
    Environment = "production"
  }
}

# Subnet Configuration
resource "aws_subnet" "public" {
  vpc_id                  = aws_vpc.primary.id
  cidr_block              = "10.0.1.0/24"
  availability_zone        = "us-east-1a"
  map_public_ip_on_launch = true
}

# Transit Gateway
resource "aws_ec2_transit_gateway" "tgw" {
  description = "Primary transit gateway"
  default_route_table_association = "disable"
  default_route_table_propagation = "disable"
}

Performance Results:

Metric Before After
Regional Latency 80ms 25ms
Availability 99.5% 99.99%
Failover Time 5 min 30 sec
Throughput 5 Gbps 20 Gbps

Example 2: Zero-Trust Network Implementation

Scenario: Implement zero-trust security across hybrid network infrastructure.

Security Architecture:

  1. Micro-Segmentation: Isolated security groups by application tier
  2. Identity-Based Access: Integration with identity providers
  3. Encrypted Communication: mTLS for all service-to-service
  4. Continuous Verification: Real-time policy enforcement

Implementation Components:

  • East-west firewalls with allow-list policies
  • Identity and access management integration
  • Certificate authority and PKI management
  • Network segmentation and isolation

Security Results:

  • 100% reduction in lateral movement attacks
  • Zero unauthorized access incidents
  • 99% reduction in attack surface
  • Passed penetration test with zero critical findings

Example 3: SD-WAN Enterprise Deployment

Scenario: Deploy SD-WAN to replace legacy MPLS network across 50 sites.

Deployment Approach:

  1. Site Assessment: Evaluated connectivity requirements at each location
  2. Device Deployment: Installed SD-WAN edge devices
  3. Traffic Policy: Configured application-aware routing
  4. Optimization: Implemented QoS and path selection

Results:

  • 40% reduction in network costs
  • 60% improvement in application performance
  • 99.9% network availability
  • 50% reduction in troubleshooting time

Best Practices

Network Architecture

  • Redundancy Design: Plan for component failures at every level
  • Segmented Design: Isolate workloads and security zones
  • Scalable IPAM: Use consistent IP addressing scheme
  • Documentation: Maintain accurate network diagrams

Security Implementation

  • Zero-Trust: Verify every request regardless of source
  • Defense in Depth: Multiple security layers
  • Encryption: Encrypt data in transit and at rest
  • Regular Audits: Periodic security assessments

Performance Optimization

  • Latency Reduction: Optimize routing paths and caching
  • Bandwidth Management: Implement QoS policies
  • Load Distribution: Use load balancing effectively
  • Monitoring: Comprehensive visibility into network metrics

Automation and IaC

  • Infrastructure as Code: Version control network configs
  • Automated Testing: Validate changes before deployment
  • Deployment Templates: Standardize configurations
  • Monitoring Automation: Alert on anomalies automatically

Output Format

This skill delivers:

  • Complete network architecture designs and diagrams
  • Infrastructure as code (Terraform, Ansible, CloudFormation)
  • Network configurations (routers, switches, firewalls, load balancers)
  • Security policies and firewall rulesets
  • Monitoring dashboards and alert configurations
  • DNS configurations and zone files
  • VPN and SD-WAN configurations
  • Troubleshooting runbooks and documentation

All outputs include:

  • Detailed network topology diagrams
  • IP addressing schemes and routing tables
  • Security group and firewall rule documentation
  • Performance benchmarks and SLA validations
  • Security compliance documentation
  • Operational procedures and runbooks
  • Capacity planning and growth recommendations

Anti-Patterns

Architecture Anti-Patterns

  • Single Point of Failure: Critical components without redundancy - implement HA at all layers
  • Oversegmentation: Too many VLANs without clear purpose - consolidate and simplify
  • Flat Network: No segmentation for security - implement defense in depth
  • Spanning Tree Issues: STP misconfiguration causing loops or blocking - use modern alternatives

Security Anti-Patterns

  • Open By Default: Allowing all traffic by default - deny by default, explicitly allow
  • Rule Creep: Firewall rules accumulate without cleanup - regular rule review and optimization
  • VPN Overuse: VPN for everything instead of proper segmentation - use appropriate access methods
  • Weak Cryptography: Using outdated protocols and algorithms - enforce modern encryption standards

Performance Anti-Patterns

  • Suboptimal Routing: Traffic taking inefficient paths - optimize routing tables and policies
  • Lack of Caching: Not leveraging CDN and caching - reduce latency with caching layers
  • Oversubscribed Links: Bandwidth not matching requirements - right-size and monitor utilization
  • No QoS: All traffic treated equally - implement traffic prioritization

Operational Anti-Patterns

  • Documentation Debt: Network diagrams out of date - maintain documentation as code
  • Configuration Drift: Manual changes not tracked - use IaC for all changes
  • No Monitoring: Operating blind - implement comprehensive network monitoring
  • Long Change Lead Times: Slow change processes - automate and streamline deployments

You Might Also Like

Related Skills

verify

verify

243K

Use when you want to validate changes before committing, or when you need to check all React contribution requirements.

facebook avatarfacebook
获取
test

test

243K

Use when you need to run tests for React core. Supports source, www, stable, and experimental channels.

facebook avatarfacebook
获取

Use when feature flag tests fail, flags need updating, understanding @gate pragmas, debugging channel-specific test failures, or adding new flags to React.

facebook avatarfacebook
获取

Use when adding new error messages to React, or seeing "unknown error code" warnings.

facebook avatarfacebook
获取
flow

flow

243K

Use when you need to run Flow type checking, or when seeing Flow type errors in React code.

facebook avatarfacebook
获取
flags

flags

243K

Use when you need to check feature flag states, compare channels, or debug why a feature behaves differently across release channels.

facebook avatarfacebook
获取