Solved

Sonicwall VPNs and Shoretel Phone systems in remote offices

Posted on 2014-04-08
4
567 Views
Last Modified: 2014-04-26
I would like a bit of guidance for my current senario, to find the most efficient setup for managebility.

Site A (HQ - alternate route to data center))
Site B (Datacenter where phone infrastructure is located)
Sites 1-66 (remote offices)

Currently there are sites 1 through 66 have two site to site vpns set up. One to Site A and one to Site B. Site A also has a site to site vpn set up to Site B

We will be rolling out shoretel phones to the remote sites 1-66

All remote site phones need to talk to eachother as well and id rather not have to mesh all sites to all sites at each remote site.

Id like to be able to use qos and BWM to prioritize phone traffic.

Anyone with sonicwall and shoretel phone experience have another way for me to configure this senario without having to add 66 address objects to a group at each location? Would route based vpns solve this? and if so how would they be configured at the remote sites? am I going to have 66 new tunnel interfaces on the data center firewall?

Thank you in advance
0
Comment
Question by:Larsen1982
  • 3
4 Comments
 
LVL 15

Expert Comment

by:getzjd
ID: 39988605
Is your voice on a separate vlan and subnet at each site?  For example:  Data for all sites is 10.x.x.x  and voice is 192.168.x.x ?  You could then create generic QoS and BWM rules just based on something like 192.168.0.0 255.255.0.0

Speaking from experience ( with ShoreTel) and Sonicwall)though, you will still have the occasional hiccups with service due to the outside forces of the internet acting on your routes and bandwidth.
0
 

Author Comment

by:Larsen1982
ID: 39988649
Most of the remote offices are small and don't have managed switches or vlans. At the datacenter the phone system is on it's own interface.

I could probably do the same in the remote offices and give the phones their own subnet/interface but I believe only half of the sites have an open sonicwall port.
0
 

Accepted Solution

by:
Larsen1982 earned 0 total points
ID: 40013900
Route based VPNs was what I was looking for. After some testing it is good to go, and I only have to change the site to site vpns to tunnel interfaces instead of creating a mesh group on each site.
0
 

Author Closing Comment

by:Larsen1982
ID: 40024341
My own testing and research resolved this solution.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Screen Recorder Recommendations 10 57
Replacing a switch in a 3com 5500 switch stack 2 45
Windows 10 VPN? 6 46
EIGRP Full Mesh 2 36
Healthcare providers, insurance companies and other covered entities trust eFax Corporate to transmit their most sensitive documents. eFax Corporate can help your organization implement a HIPAA compliant cloud faxing solution.
Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now