Solved

System Question - connecting two locations with a T-3

Posted on 2004-08-24
3
198 Views
Last Modified: 2010-04-11
Everything IP

I've got two locations. They will be connected by a T-3. I need to connect to the T-3's and break the T-3 out into various 10/100 Meg ethenets.

All data between the T-3's must be encrypted.

I'm thinking this is a common problem. What devices do I need to do this. A T-3 DSU/CSU? A router (I looked at a Cisco 3735. Looks like it would work - but pretty expensive.)
0
Comment
Question by:rfr1tz
3 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 250 total points
ID: 11883804
Anything that you use to terminate the T-3 and provide encryption will not be cheap by any means.
Cisco 3725 is the lowest-end for full T3 support. Add the encryption feature set and you're good to go.
Use a switch on the Ethernet side with VLAN trunking to support multiple Ethernet segments.
0
 
LVL 16

Assisted Solution

by:OliWarner
OliWarner earned 100 total points
ID: 11883897
you could look at it as 2 networks:

have a VPN server running on one end
have the router at the other end connect to the VPN and map everything through that - encryption comes as a standard, and if you use smoothwall you could probably get away with using 2 P3 boxes saving you and your company a lot of hassle and even more money.
0
 
LVL 11

Assisted Solution

by:PennGwyn
PennGwyn earned 150 total points
ID: 11884174
The 3725 supports a 16-port switch module -- I believe you could install a T3 module and two such switch modules.  I'm not sure whether it will support trunking over those ports, but if it does then it's a great choice.

0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Booster, Repeater, or Wireless Access Point 9 50
NAS with google authentication 6 98
Cisco 5508 controller parsing error 4 56
How to limit traffic to Netscaler 10.5 VIP 3 61
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now