DISCUSSION ON THE PROPOSED DESIGN

1252 Words3 Pages

DISCUSSION ON THE PROPOSED DESIGN

In this design, quad wan SSL VPN firewall will be used and placed at the main office as a perimeter firewall, the firewall will be connected to two layer 3 switches, which will act as a distribution point of the network, another three layer 2 manageable switches will replace the existing switches as the access layer.

All the servers will be positioned at a single access switch forming the sever-farm, there will be redundant connections linking both the distribution switches and the servers; this option is selected in order to unify the servers’ connectivity, as well as to eliminate the number of hops connecting workstations and servers, while offering redundant route to the servers.

The communication between different VLANs will be controlled by the Layer 3 switches. In order to increase redundancy and bandwidth to the servers’ dual up link cables will be used between the switches.

A new demilitarized zone (DMZ) will be introduced, this will separate the sever access for services that can be accessible from external users, while still limiting access to internal services to external users. The selected design diagram is represented in figure 5.1.

Internet telephony (VOIP) network will be incorporated into the new design instead of the way it exists now.

5.2.1 SCALABILITY

The design provides an easier manner of adding new workstations, switches, IP phones, applications and services to the network without affecting the network design, to add a workstations to the network, in the proposed design it only requires to add the workstation to the correct access switch in the right VLAN port for that workstation to be operational in that section. The switches recommended in collapsed core will ...

... middle of paper ...

... VLANs for visitors and network management was introduced, the VLAN for visitors will only give access to the Internet for all visitors and limit access to the server and internal network, therefore increasing security in the network. The management VLAN will be used to control all the switches and network devices hence allow these devices to be managed remotely.

Therefore the final outlook of the virtual network is as described in table 5.1

The native VLAN will be left as VLAN 1, though the management VLAN will changed to VLAN 90, the reason for this change is because leaving VLAN 1 for remote access and management functions can lead to security risks. In order to avoid unwanted devices connecting to the network all unused ports in the switches will be placed into a VLAN 199, which is a black hole, where no access no IP addressing will be assigned to this VLAN.

More about DISCUSSION ON THE PROPOSED DESIGN

Open Document