keatron wrote: Setup is a 10 station workgroup office (no dc) connected to a 40 station hdq (dc present). Right now they're traversing between the offices with a lackluster vpn solution. I'm going to propose to put a cisco device on both ends, drop a dc at the remote office (which currently does not have one), and try and set up a secure vpn between the two. Any suggestions on Cisco hardware for this. Speed is of great concern, however, they're currently using a T1 line at each office which also serves as their internet access to vpn across. From the surface (based on what I was told over the phone) it appears they only have a fractional T1, so along with other reccomendations, I'm considering an upgrade to at least a full T1. I'm old to IT and very new to Cisco, so your advice will be greatly appreciated.
tunerX wrote: A PIX is good if you are running ethernet but I would go with some 26XX XM with encryption AIMs, Firewall IOS, and wic 1 DSU modules. If they are using two different networks, with routing architectures, I would set up an IPSec/GRE tunnel interface for any traffic moving between sites. This gives the benefit of maintaining both networks independently, with separate routing. You should also look into queueing for the traffic between sites. Check the amount of traffic between them and types of applications/protocols. You can then specify that traffic to the internet will go unencrypted out the local router. Anything between the sites will be tunneled/encrypted and authenticated. You could also recommend future upgrades. If they are using analog Key systems or a PBXs you could set up NM-HD-1V (or something else) with a DID card, and forward calls between sites over the Internet. If call volume between sites is high then you could save money. You will have to compare costs of the voice equipment, call hours /cost, and service costs. You can then calculate how long the upgrade will pay itself out and start saving costs based on the converged architecture.
rossonieri#1 wrote: i agree with tunerX to set up via GRE tunnel (IPSec is much too complicated) - but unfortunately it is now obsolete because many ISP has block the traffic passing through their network. and so does the analog VOIP. I think better to consult first with your ISP do they permit those kind of traffics.