I have a customer who ownes an office building. They want to give internet access to all of his tennants. What would be the best way to do this?
Im thinking maybe a 3550 with each port going to one of the suites, and each port being in a diffrent VLAN and have the 3550 routing each vlan. And maybe another vlan where there will be a PIX sending all of this to the internet. Does this sound ok? Do I want to use Private vlans for this?
PVLANs aren't supported on the 3550. Protected Port functionality is supported, which is basically a chopped-down version of PVLANs. So that's an option -- make all the client ports Protected and they won't be able to talk to each other even though they're in the same VLAN. The PIX's port is then Unprotected so that each host can talk to it.
Separate VLANs along with ACLs are an option but this would require each VLAN be on it's own subnet, which is ugly. Protected Ports sound like a better option here.
I don't know if it will do so by default -- you'd have to test it. But if it does you should be able to prevent it from doing so via ACLs. For example, if all the hosts are on 10.10.0.0/16, you'd put an ACL on the PIX which blocks traffinc from 10.10.0.0/16 to 10.10.0.0/16.
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...