Solved

How can I use the cisco catalyst 3750 as a router for our police and fire departments

Posted on 2007-04-10
2
956 Views
Last Modified: 2012-05-05
Hello Experts
I have 4 cisco Catalyst 3750 switches with IOS ™ C3750 Software (C3750-I9-M), Version 12.1(19)EA1d RELEASE SOFTWARE (fc1)
we need to connect our police and fire departments to cityhall with fiber. the 3 locations are on 3 different class b subnets.
My question is can I plug the fiber directly into a fiber GBIC on the 3750's and create VLANs and Route between them internally with the 3750. And if so how is this done. I have very little knowlege in working with cisco switches. I've done some internet searches but everything is so cryptic its hard to tell if what I'm reading is what I need to do.
0
Comment
Question by:bcinfosys
  • 2
2 Comments
 
LVL 1

Accepted Solution

by:
culturaltrust earned 500 total points
ID: 18909845
Yes you can connect your fiber to SFP (mini-GBIC)  fiber connectors on the 3750 and router between you VLAN's, you are on the correct IOS ver. to do this as well.  I would suggest setting up a WAN segment subnet with loopbacks on each switch, and NATing between them.  If this is not priv fiber, and security is an issue, I would suggest firewalls with NAT and VPN between them.

subnet1 -> NAT to Loopback inter switch 1 -> Loopback inter switch 2 -> Subnet 2.

Brushing up on routing protocols is not a bad idea either.

some suggest reading..

http://www.cisco.com/en/US/tech/tk389/tk815/technologies_configuration_example09186a008015f17a.shtml#prereq

http://www.cisco.com/en/US/products/hw/switches/ps5023/products_configuration_guide_book09186a00801cdea9.html

Hope this helps...
0
 
LVL 1

Expert Comment

by:culturaltrust
ID: 18909859
I would like to correct, after reading up a little more the 3750's do not support NAT, but they do support interVLAN routing, so you could just connect all three subnets to VLAN's in city hall and route between them.

sorry...
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

I see many questions here on Experts Exchange regarding switch port configurations and trunks. This article is meant for beginners in the subject to help to get basic knowledge about Virtual Local Area Network (VLAN (http://en.wikipedia.org/wiki/Vir…
I eventually solved a perplexing problem setting up telnet for a new switch.  I installed a new Cisco WS-03560X-24P switch connected to an existing Cisco 4506 running a WS-X4013-10GE Sup II-Plus. After configuring vlans and trunking,  I could no…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now