Solved

Sonicwall VPNs and Shoretel Phone systems in remote offices

Posted on 2014-04-08
4
585 Views
Last Modified: 2014-04-26
I would like a bit of guidance for my current senario, to find the most efficient setup for managebility.

Site A (HQ - alternate route to data center))
Site B (Datacenter where phone infrastructure is located)
Sites 1-66 (remote offices)

Currently there are sites 1 through 66 have two site to site vpns set up. One to Site A and one to Site B. Site A also has a site to site vpn set up to Site B

We will be rolling out shoretel phones to the remote sites 1-66

All remote site phones need to talk to eachother as well and id rather not have to mesh all sites to all sites at each remote site.

Id like to be able to use qos and BWM to prioritize phone traffic.

Anyone with sonicwall and shoretel phone experience have another way for me to configure this senario without having to add 66 address objects to a group at each location? Would route based vpns solve this? and if so how would they be configured at the remote sites? am I going to have 66 new tunnel interfaces on the data center firewall?

Thank you in advance
0
Comment
Question by:Larsen1982
  • 3
4 Comments
 
LVL 15

Expert Comment

by:getzjd
ID: 39988605
Is your voice on a separate vlan and subnet at each site?  For example:  Data for all sites is 10.x.x.x  and voice is 192.168.x.x ?  You could then create generic QoS and BWM rules just based on something like 192.168.0.0 255.255.0.0

Speaking from experience ( with ShoreTel) and Sonicwall)though, you will still have the occasional hiccups with service due to the outside forces of the internet acting on your routes and bandwidth.
0
 

Author Comment

by:Larsen1982
ID: 39988649
Most of the remote offices are small and don't have managed switches or vlans. At the datacenter the phone system is on it's own interface.

I could probably do the same in the remote offices and give the phones their own subnet/interface but I believe only half of the sites have an open sonicwall port.
0
 

Accepted Solution

by:
Larsen1982 earned 0 total points
ID: 40013900
Route based VPNs was what I was looking for. After some testing it is good to go, and I only have to change the site to site vpns to tunnel interfaces instead of creating a mesh group on each site.
0
 

Author Closing Comment

by:Larsen1982
ID: 40024341
My own testing and research resolved this solution.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question