SolvedPrivate

site - site VPN

Posted on 2017-03-28
3
35 Views
Last Modified: 2017-04-19
Hello EE,

I have a main site that will have pbx and voice box. The main site will have VPN connection to all the other branch sites.

I need to know if VPN can handle this type of setup. I don't have much details but I could get the details that are needed to make this work or what is the recommended way of doing this?

another good point I need to mention is there will be layer 3 switches at each office and a firewall device what will be used to setup the vpn.

Thanks,
0
Comment
Question by:Zak
3 Comments
 
LVL 37

Expert Comment

by:bbao
ID: 42069100
basically, if the VPN bandwidth is good enough, that should not be problem.
0
 
LVL 29

Expert Comment

by:Predrag Jovic
ID: 42069144
Generally VPN can support anything. Additionally What VPN type we are talking about?
If we are talking about service provider managed VPN then you should have VPN with QoS support since voice traffic is sensitive to jitter and delay.
If you are using VPN tunnel that is controlled by you and SP will not participate actively in transport SP will tippically ignore QoS markings and you can suffer from many voice problems.
1
 
LVL 11

Accepted Solution

by:
DIPRAJ earned 500 total points
ID: 42075911
hi..
as per information given by you, there should not be any challenge for any kind of voice traffic movement.

1. you need to identify voice ports first
2. if you found that the ports are blocked check your firewall settings.
3. if firewall settings are OK..ask your bandwidth service provide to unblock/ release those ports for your network.

thanks.
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Join & Write a Comment

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question