ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Do I Need A Layer 3 Core Switch?

    IT Discussion
    5
    47
    7.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • wrx7mW
      wrx7m
      last edited by wrx7m

      I am going to completely refresh the hardware for my Ethernet infrastructure because most of the hardware is over 8 years old, I need more ports for edge devices and need to add 10GE. I have the following diagram for my switches, wireless APs and controller and firewall. I am keeping the firewall and wireless equipment. So far, I am planning on using Extreme Summit Series stackable switches for edge and TOR (a mix of POE and non-POE 1Gb and several 10GE for virtual hosts) switching and am wondering if I should look at a Layer 3 Core switch and move my WiFi traffic through it, instead. I have several SSIDs and each of those is on its own VLAN with the firewall having several virtual interfaces and respective firewall rules to allow/deny traffic and RADIUS authentication for some, provided by a Windows server on VLAN 1. The firewall is also the DHCP server for all wireless VLAN virtual interfaces.

      What would you do?

      EXISTING NETWORK TOPOLOGY
      0_1455830601774_Network Only Physical Topology 02-18-16.png

      dafyreD 1 Reply Last reply Reply Quote 0
      • DashrenderD
        Dashrender
        last edited by

        after only reading the title - no.

        1 Reply Last reply Reply Quote 0
        • DashrenderD
          Dashrender
          last edited by

          3 wireless VLANs - non of the wireless is on VLAN1?

          wrx7mW 1 Reply Last reply Reply Quote 0
          • wrx7mW
            wrx7m @Dashrender
            last edited by

            @Dashrender Correct. The reason I did this is because I needed to effectively split the existing POE switch into 2 switches. Half the ports are on VLAN 1, for various devices like phones and desktops and the other half was exclusively for the WiFi network.

            1 Reply Last reply Reply Quote 0
            • dafyreD
              dafyre @wrx7m
              last edited by

              @wrx7m said:

              I am going to completely refresh the hardware for my Ethernet infrastructure because most of the hardware is over 8 years old, I need more ports for edge devices and need to add 10GE. I have the following diagram for my switches, wireless APs and controller and firewall. I am keeping the firewall and wireless equipment. So far, I am planning on using Extreme Summit Series stackable switches for edge and TOR (a mix of POE and non-POE 1Gb and several 10GE for virtual hosts) switching and am wondering if I should look at a Layer 3 Core switch and move my WiFi traffic through it, instead. I have several SSIDs and each of those is on its own VLAN with the firewall having several virtual interfaces and respective firewall rules to allow/deny traffic and RADIUS authentication for some, provided by a Windows server on VLAN 1. The firewall is also the DHCP server for all wireless VLAN virtual interfaces.

              What would you do?

              EXISTING NETWORK TOPOLOGY
              0_1455830601774_Network Only Physical Topology 02-18-16.png

              Is the Firewall currently doing all of your routing now?

              wrx7mW 1 Reply Last reply Reply Quote 0
              • wrx7mW
                wrx7m @dafyre
                last edited by

                @dafyre Yes it is currently handling all routing.

                dafyreD 1 Reply Last reply Reply Quote 0
                • dafyreD
                  dafyre @wrx7m
                  last edited by

                  @wrx7m said:

                  @dafyre Yes it is currently handling all routing.

                  What drives you to consider a L3 Switch?

                  wrx7mW 1 Reply Last reply Reply Quote 0
                  • wrx7mW
                    wrx7m
                    last edited by

                    All wireless traffic ingresses the Sophos and egresses the LAN or WAN

                    1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller
                      last edited by

                      From a quick look an L3 or an L2+ core switch makes sense. You don't want the firewall handling that duty if you can avoid it.

                      1 Reply Last reply Reply Quote 1
                      • wrx7mW
                        wrx7m @dafyre
                        last edited by

                        @dafyre Since I am replacing all the switches, I want to see if it is better practice to move the wifi traffic from the firewall to a layer 3 switch.

                        1 Reply Last reply Reply Quote 1
                        • DashrenderD
                          Dashrender
                          last edited by

                          Something to keep in mind, your firewall is currently able to keep all traffic on those VLANs out of the normal network.

                          I'm not sure if L3 or L2+ switches have firewall like features to prevent cross VLAN communications.

                          wrx7mW 1 Reply Last reply Reply Quote 0
                          • wrx7mW
                            wrx7m @Dashrender
                            last edited by

                            @Dashrender Really? I thought that was the point of a VLAN.

                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @wrx7m
                              last edited by

                              @wrx7m said:

                              @Dashrender Really? I thought that was the point of a VLAN.

                              Well, no. A VLAN is just a LAN, it's not a thing on its own. If you connect them all together through a router or switch, by default you've joined them all into a single thing. Just routed between them, rather than switched. VLANs are not "for" anything specific. You have to build in the functionality that you want from them.

                              wrx7mW 1 Reply Last reply Reply Quote 1
                              • wrx7mW
                                wrx7m @scottalanmiller
                                last edited by

                                @scottalanmiller Sure, I meant that I thought the whole point of a VLAN was to segregate traffic/keep broadcasts domains smaller while utilizing the same physical switches.

                                scottalanmillerS 1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller @wrx7m
                                  last edited by

                                  @wrx7m said:

                                  @scottalanmiller Sure, I meant that I thought the whole point of a VLAN was to segregate traffic/keep broadcasts domains smaller while utilizing the same physical switches.

                                  Segregating traffic to broadcast domains for layer 2 doesn't imply that L3 isn't wide open between the subnets. In a typical network, you'd be wide open between them.

                                  wrx7mW 1 Reply Last reply Reply Quote 1
                                  • wrx7mW
                                    wrx7m @scottalanmiller
                                    last edited by

                                    @scottalanmiller That is true, however, I am running in access mode to prevent cross communication and would like it to remain that way. Would a Layer 3 switch have the features to create ACLs for traffic on multiple VLANs across the same ports?

                                    scottalanmillerS 1 Reply Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller @wrx7m
                                      last edited by

                                      @wrx7m said:

                                      @scottalanmiller That is true, however, I am running in access mode to prevent cross communication and would like it to remain that way. Would a Layer 3 switch have the features to create ACLs for traffic on multiple VLANs across the same ports?

                                      Generally they will, but that was @Dashrender concern, that it would not.

                                      1 Reply Last reply Reply Quote 1
                                      • wrx7mW
                                        wrx7m
                                        last edited by

                                        OK. Got it. So since that is the goal, based on the size of the network and addition of 10GE for virtual hosts, I should consider a Layer 3 switch?

                                        1 Reply Last reply Reply Quote 0
                                        • DashrenderD
                                          Dashrender
                                          last edited by

                                          The 10 Gb in this case doesn't play a part in the decision making process, as far as I can see.

                                          wrx7mW 1 Reply Last reply Reply Quote 0
                                          • wrx7mW
                                            wrx7m @Dashrender
                                            last edited by

                                            @Dashrender The layer 3 portion was for the inter-vlan traffic but the core aspect would be to provide the backbone bandwidth

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 1 / 3
                                            • First post
                                              Last post