Solved

System Question - connecting two locations with a T-3

Posted on 2004-08-24
3
216 Views
Last Modified: 2010-04-11
Everything IP

I've got two locations. They will be connected by a T-3. I need to connect to the T-3's and break the T-3 out into various 10/100 Meg ethenets.

All data between the T-3's must be encrypted.

I'm thinking this is a common problem. What devices do I need to do this. A T-3 DSU/CSU? A router (I looked at a Cisco 3735. Looks like it would work - but pretty expensive.)
0
Comment
Question by:rfr1tz
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 250 total points
ID: 11883804
Anything that you use to terminate the T-3 and provide encryption will not be cheap by any means.
Cisco 3725 is the lowest-end for full T3 support. Add the encryption feature set and you're good to go.
Use a switch on the Ethernet side with VLAN trunking to support multiple Ethernet segments.
0
 
LVL 16

Assisted Solution

by:OliWarner
OliWarner earned 100 total points
ID: 11883897
you could look at it as 2 networks:

have a VPN server running on one end
have the router at the other end connect to the VPN and map everything through that - encryption comes as a standard, and if you use smoothwall you could probably get away with using 2 P3 boxes saving you and your company a lot of hassle and even more money.
0
 
LVL 11

Assisted Solution

by:PennGwyn
PennGwyn earned 150 total points
ID: 11884174
The 3725 supports a 16-port switch module -- I believe you could install a T3 module and two such switch modules.  I'm not sure whether it will support trunking over those ports, but if it does then it's a great choice.

0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question