I am trying to add some resilience to my network design by install my internet router outside of our data center so I can route it to my 2nd (outside date center) core router incase of a business continuity event with my data center. My intention was to extend a non-routed vlan out to the internet router. This causes an issue as I want to connect this to an existing "internet switch" in our data center that supplies connectivity to several VPN & firewall devices. I'm not sure if it's an issue or not, but I do not want to have a direct connection between my core and "the internet" even though it is "contained" within a non-router vlan.
Our "Security Engineer" turned several shades of purple as I explaind this to him. My idea was to bring this non-routed vlan into of ASA as a DMZ, with a security setting of 0 (same as normal internet). This would prevent a direction connection between the core and the internet switch.
This is actually a pretty cool feature, i didn't even know it existed until I was looking for a solution to advertise a subnet (prefix in BGP talk), only if a certain condition existed. This is exactly what conditional advertisements does
j ai une question j ai achete un routeur cisco 887VA-k9 , je le configuré avec la configuration ci- dessous
si je le lier avec mon pc portable sur l un de ses ports directement ça marche toute est bien ( la connexion internet + m...
Attached policy provides CLI access to the Cisco 4G router over text messaging. Two files are in the attached .tar file:
2. PDF with instructions on how to load and use the .tcl file.