I am starting on a hyper-v project. I have just worked the vlan's and networkadapters out, but I am having "problems" with the switch. My network will have 4 networks:
* Management for networdevices and hyper-v server
* DMZ network
I am going to implement vlan's on the switch for each of these networks. I think this is a good implementation?
But what happens to the connection from the firewall to the switch? Do I need a seperate connection to each vlan on the switch? I think this is necessary for the following reasons but I am not sure:
*LAN: well the clients need to have internet access so they need a connection to the firewall
*Backup: A backup server will be present at another location. So the backup vlan should be
connected to the firewall so replication to another backupserver over the internet is
*DMZ: The firewall is directly connected to a NIC on the hyper-v server because it hosts a
virtual webserver which needs to be put into a dmz.
*Management: Just so I can the firewall an IP-address in this vlan and I can manage it only when I have connection to this vlan.
I was thinking about just 1 trunking interface but will it be enough for the load and will this also work? What are the good and bad things about trunking?
I hope you can help me.