Currently in our data center, we have a Cisco 6513 as the core ,a single Dell m1000e blade center containing a pair of Cisco 3130G switches, and a pair of Cat 3550 switches for the DMZ (plus a load of other stuff not needing to be mentioned here). The 6513 and the DMZ 3550 switches are separated by a PIX firewall. The blade center 3130G switches are trunked back to the 6513 via a 4Gb etherchannel using the copper ports. The 6513 is the VTP server and the 3130G switches are VTP clients in the same domain. The Cat 3550 switches in the DMZ are VTP servers for the DMZ domain (see "Blade Center Switch-Current.jpg" for topology).
The server guys are looking to add a second Dell m1000e blade center chassis to the data center and are asking if they can have some ports/blades (not an entire switch within the Dell m1000e chassis) in the DMZ and the rest of the ports/blades in the internal VLANs.
I figured this may be a good time to redo a few things and have some questions.
1- I was thinking of connecting the new Dell m1000e blade center chassis to the current Dell m1000e blade center via stackwise cables for better throughput and less of a possibility for spanning-tree considerations. Does this sound like the best approach?
2- As far having some ports/blades to be available for the DMZ as well as the internal network, is it possible to make a trunk from the DMZ to one or two of the 3130G switches and not compromise security?
3- Since the DMZ servers are the VTP servers for the DMZ domain and the 6513 is the VTP server for the internal network, what is a good way to deal with that? Do I need to make the 3550 and/or the 3130G switches VTP transparent?
Thanks for the advice in advance.