Hi I m Cisco certified network and security engineer hands on experience on firewall as well proxies devices Namely Cisco asa checkpoint palo alto to name few.
Server Solutions:
-Experienced in installing, configuring, and administering all Linux and Windows Ldap CentOS, Redhat, Debian, Ubuntu Servers
-Expert in Apache, Nginx, DNS, Shell Scripting, WHMCS, Puppet, Vmware,mail, ftp, proxy, socks ...
-Specialist in Migration of servers without any down time.
Clients worked for HCL, Electorlux, Direct Energy, TEN, Oxford University Press,Accenture,IBM to name few.
Key skills: Troubleshooting Design and implementation Corporate Training up to CCNP level Hands on experience on Cisco juniper
and checkpoint security devices as well as VPN (Remote and site to site.
IPsec SSL DHCP DNS Routing Dynamic Rip and ospf Switching concepts (Vlans trunks STP and RSTP)
As per your requirement you need to create a topology that will shut down the port of abusing pc so you need to create a batch file for the same. Allow me to have access to the network and i will help you with this. As you want to detect the traffic at layer 2 there are couple of techniques like we can monitor the interface and then set a threshold for the same once the interface threshold is succeeded it will drop the packets. 2 we can change the state of interface from allow to block once it reaches the threshold.
Do let me know if we can do a small talk
Regards
Akash Thakur
9990811775