Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Mike Lewis on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

VLAN setup with 3 summit24e3 switches

Status
Not open for further replies.

lwslarry

MIS
Feb 19, 2004
6
US
I'd like to setup two 24e3s(each w/1 GBIC) to connect to a 3rd 24e3 (w/2GBICs) as the core. The core 24e3 will connect to a Cisco Router. Can any one help me set up an IP scheme to setup mutiple VLANS the three switches? Currently there are 3 taged VLANs on the router setup and a layer 2 switch. My basic requirement is to share router internet connection and Network services accros the vlans. Such as Exchange, IIS and sharepoint. I would also like to establish VPN connections to each of the Vlans.

Any help is greatly appreciated.
 
How many VLAN's? Where are the VPN's connecting from? and what is the IP range if it's from another site. Where is the VPN terminating? It would need to terminate at a public IP. You should really work out the IP ranges yourself, it's a security breech for people out side your company to know you network layout. Also, what are you going to use for a firewall, allow external users to access your core switch, even if the internal IP is not routeable, isn't very secure.
 
Per RFC 1597: Section 3: Private Address Space, The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks: 10.0.0.0 - 10.255.255.255 , 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.254.
 
Thanks for the response,I intend to setup 8 VLANs across the Three switches. Currently there are 3 working VLANS on the Cisto and a Layer 2 switch. Two of the Current VLANs are public IP addresses, One goes to a Law office that has its own VPN/FireWall/Router, the second goes to a Windows Small Busines server running ISA and the third is a private IP range. The Cisco router does NAT Translation to for the private IP subnet. The company is expanding to three buildings and I have had fiber installed between the 3 buildings. Only a couple of the 8 VLANs I'm proposing would span more that one Switch. The real concern I have is share VPN access to services (exchange, Terminal Services, IIS(sharepoint), SQL to all the VLANs. I am not sure if it would be better to purchase a inexpensive VPN/Firewall device between the Router and the Extreem switch.

But what is the settings for passing request for services accreoss VLAN's?
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top