I'd appreciate some input in here. I'm relatively new to design decisions. Here's the plan so far, feel free to completely change it given your experiences.
I have about 10 vlan's in office A, this is connected to various other sites via WAN's. In Office A I have an internet vlan and the rest of the vlan's are restricted access via acl's on the vlan, (3750-E switches). Moving forward I want to evaluate whether this is the best decision. Shall I keep the current setup or is there a better way i.e add a firewall or separate the network somehow?
3) No, remote sites don't utilise the local internet connection. Each site has their own internet connection.
4) I've just joined the company and here all vlan's are locked down by acl's restricting access in and out of the vlan. I wanted to address this and see if it can be implemented better in any way. Basically we have different trading environments each in their own vlan, with internet enabled pc's in an internet vlan.
5) I am going to introduce VOIP this year, and managing these lists is becoming a bit of a head ache.
Thanks for taking the time, if you need more please let me know as I'm not 100% sure what information is needed to address this question.
I'm working on a project that includes basic router configurations. I configurated everything including: line console 0, line vty 0 15 and secret passwords. There are 3 routers in the network and every LAN is going t...
Desire to create Terminal Server ("TS" in this document) out of 2811 Cisco Router with HWIC-16A card (with Octal cables)
Desire to use SSH over Telnet
TS is ip'ed, SSH access configured (to the TS)
Python based Script to BULK Import/Delete devices using Cisco Prime API
Check my Repo on GitHub for all the details ( see below link )