Huge Networking change.

Hi

I have to rebuild our network this weekend using the following hardware and  I need help with the best way to do it.

I have the following
ASA 5505  Fw
Core switch is HP V1910 POE
User Switch  HP V1850G 24
WLC is a  MSN760
6 HP WAPs
10 Polycom IP phones  (internal Hosted)

I would like to  Create a
 mangament VLAN 501  IP  10.50.10.0/24
Production VLAN      502  IP  10. 60.10.0/24
Video VLAN                503  IP 172.16.123. 0 ./24
Voice  VLAN                 504 IP 192.168.1.0/24

Can the above be setup  on the  
HP V1910 POE  or would I need a full layer 3 switch  ? what network would I need on the firewall would I need all 4 vlans set up on it  ?
thombieAsked:
Who is Participating?
 
stu29Commented:
easiest would be to contain your routing on your switch and have your firewall on its own VLAN.

If you need controls between subnets for security, then using the Firewall ports would be the easiest.
0
 
stu29Commented:
Your 1910 should support 8 VLANs. So this is an option
Your ASA 5505 has plenty of ports so you could subnet here also.

Your routing table would be maintained on whichever device you decide to subnet on, so you do not need to worry about supernetting.  Both devices offer QoS so you can prioritize traffic (VOIP/Video etc)
0
 
thombieAuthor Commented:
so on the  v1910 I just need  create the Vlans and tag the ports  for each VLAN  ? and for the none voip switch just create a trunk  ?
0
Ultimate Tool Kit for Technology Solution Provider

Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy now.

 
stu29Commented:
Yes on the v1910.  For you non voip switch .. you can get away with just hanging it of the appropriate VLAN on the 1910.

Remember .. you Firewall will need to know about all your subnets to allow traffic and route correctly
0
 
thombieAuthor Commented:
on the firewall  I should create  static routes to each subnet  ?
0
 
stu29Commented:
This depends on how you will set this up.  Will you put your Firebox on its own VLAN and route your traffic on the switch to use this VLAN as your gateway .. or will you connect up each VLAN to a port on the Firewall?

If your firewall is on its own subnet, then no routes are required.  All you have to tell your firewall that those subnets exist on that one interface and it should do the rest.

If you go for the VLAN to FW Port option, then the firewall will know they all exist and you will then create all your access rules across subnets.
0
 
thombieAuthor Commented:
I need the most easy solution.  what do you suggest  ?
0
 
thombieAuthor Commented:
Thanks This solutions has worked for me.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.