Topic > Router - 801

The company president requested a workable solution to deploy the recently purchased new building (B2) network onto the existing network in a building (B1) located 500 meters away. It has been requested that new employees who will be located in B2 have full access to all network resources in B1, including Internet access. The new building will be used for research and development. Information processed in this building must be protected and segmented by employees in B1. It was also requested that B1 employees have limited access to B2 resources. B1 uses a Cisco edge router as both a firewall and a router. There are several factors I would consider before making a recommendation:1. How many end users are expected to employ and the growth rate2. The connection between B1 and B2 must be encrypted3. How many VLANs, if any, are needed for the new building Taking into account the above considerations, I would choose a secure virtual private network connection between B1 and B2 using between two routers. There should be at least one VLAN connection from B2 extending to B1. This VLAN connection will be protected over the VPN connection while IPsec is enabled. Inter-VLAN routing will be configured on the internal switches located in B1 so that B2 network traffic is segmented from B1 production data. All relevant switches in the network will be configured for trunking so that all VLAN data can traverse the entire network domain. Security mechanisms such as port security will be enabled on network switches for an additional layer of security. To complete this type of connection from B2 to B1, a high-power switch, such as a Catalyst 6500 series that has lay......middle of the paper......AN data to be propagated to all related switches with having to create separate VLANs on everyone. The VTP or VLAN trunking protocol reduces administration on the switched network. VLAN configuration data is shared via VTP. This data is encapsulated between switches, so B2 data will not be accessible for viewing by B1 employees. Port security and ACL will be configured on the switches. Port security allows you to grant exclusivity to specific nodes via the MAC address to a switchport on a network switch. If a device is connected to the network outlet configured for a different device, the port will be automatically disabled. VPN, VLAN, VTP, trunking, nating and port security are the methods I recommend to satisfy the president's request. These protocols ensure the establishment, segmentation and security of communication between B1 and B2.