Routers

801 Words2 Pages

The company president has requested a viable solution to implement the recently purchased new building (B2) network to the existing network in a building (B1) that is 500 yards away. It was requested that the new employees that will be located in B2 have full access to all network resources in B1 including internet access. The new building will be used for research and development. The information processed in this building needs be protected and segmented from employees in B1. It was also requested that B1 employees have limited access to resources in B2. B1 is using a Cisco edge router as both the firewall and router. There are several factors that I would consider first before making a recommendation: 1. How many end users are expected to occupy and the rate of growth 2. Does the connection between B1 and B2 have to be encrypted 3. How many VLAN’s is needed if any for the new building With taking account of the aforementioned considerations I would choose a secure Virtual Private Network connection between B1 and B2 utilizing between to routers. There should be at least VLAN connection from B2 extending into B1. This VLAN connection will be protected over the VPN connection while IPsec is enabled. Inter-VLAN routing will be configured on the inside switches located in B1 so that the B2 network traffic is segmented from B1 production data. All relative switches in the network will be configured for trunking so that all VLAN data will be able to traverse throughout the network domain. Security mechanisms like port security will be enabled on the network switches for an added layer of security. In order to complete this type of connection from B2 to B1 a high powered switch for instance like a Catalyst 6500 series that has laye... ... middle of paper ... ...AN data to propagate to all relative switches with having to create separate VLAN’s on all of them. VTP or VLAN trunking protocol reduces administration on the switched network. VLAN configuration data is shared through the VTP. This data is encapsulated between the switches therefore B2 data will not be accessible to view by B1 employees. Port security and ACL will be configured on the switches. Port security allows for exclusivity to granted to specific nodes by the MAC address to a switchport on a network switch. If a device is plugged into the network drop that is configured for a different device then that port will automatically be disabled. VPN, VLAN, VTP, trunking, nating and port security are the methods I recommend to fulfill the president’s request. These protocols ensure the establishment, segmentation and security of communication between B1 and B2.

Open Document