I've inherited a somewhat bodged together network. It (mostly) does the job, but there are a few issues that need ironing out!
So a background:
50-60 office based employees
~10 remote users
~60 workstations
15 servers
Up until last month, we were running 3 ADSL lines (~10Mb each), and having severe internet problems, we have since upgraded to a 20Mb dedicated microwave link, which has made a huge difference, but we're still having a few drop-outs here and there. It's not the internet connection that's the issue, as having a continuous ping running (e.g. to Google) doesn't drop out, but we get "page not found" errors in browsers (which resolve when you refresh the page). VPN users also temporarily lose connectivity (not enough to drop the connection, but causes issues with open files and TFS)
our DNS/DHCP is hosted on the primary DC, with secondary DNS on the backup DC, forwarders set to the ISPs DNS servers.
For VPN we use PPTP RRAS on the DCs (although apparently this is not advised, so I might look at moving it to another server)
Our firewall/gateway is a Cisco SA520 (which I have a feeling isn't up to the job as it's rebooted itself out a couple of times since the internet was upgraded). We also have an ASA5505 - but I've looked at setting this up to see if it's any better and the config isn't straightforward (I've had no Cisco training and very minimal experience)
The whole network is on a single subnet, and I'm wondering if it's just the level of traffic that's causing these issues?
I'm hoping to separate the network into VLANs, i.e. infrastructure, servers, clients, wifi and guest (maybe printers too?) to try and control the traffic, but the work I've done with VLANs is somewhat limited and so I don't want to go borking it!!
Our switches are Netgear ProSafe managed switches, but I believe these are only layer 2, so I'm not sure what to do about a layer 3 device to allow communication between VLANS, e.g. for clients to talk to servers (as far as I'm aware the SA520 only supports 3 VLANS). The alternative being to use the ANS options on the server NICs to create multiple virtual connections (one on each VLAN).
Anyway, just throwing ideas out there, and would really appreciate any input.
Also, if anyone could suggest a "teach yourself" book so I can increase my knowledge on this stuff, that would be great!!
Cheers guys
So a background:
50-60 office based employees
~10 remote users
~60 workstations
15 servers
Up until last month, we were running 3 ADSL lines (~10Mb each), and having severe internet problems, we have since upgraded to a 20Mb dedicated microwave link, which has made a huge difference, but we're still having a few drop-outs here and there. It's not the internet connection that's the issue, as having a continuous ping running (e.g. to Google) doesn't drop out, but we get "page not found" errors in browsers (which resolve when you refresh the page). VPN users also temporarily lose connectivity (not enough to drop the connection, but causes issues with open files and TFS)
our DNS/DHCP is hosted on the primary DC, with secondary DNS on the backup DC, forwarders set to the ISPs DNS servers.
For VPN we use PPTP RRAS on the DCs (although apparently this is not advised, so I might look at moving it to another server)
Our firewall/gateway is a Cisco SA520 (which I have a feeling isn't up to the job as it's rebooted itself out a couple of times since the internet was upgraded). We also have an ASA5505 - but I've looked at setting this up to see if it's any better and the config isn't straightforward (I've had no Cisco training and very minimal experience)
The whole network is on a single subnet, and I'm wondering if it's just the level of traffic that's causing these issues?
I'm hoping to separate the network into VLANs, i.e. infrastructure, servers, clients, wifi and guest (maybe printers too?) to try and control the traffic, but the work I've done with VLANs is somewhat limited and so I don't want to go borking it!!
Our switches are Netgear ProSafe managed switches, but I believe these are only layer 2, so I'm not sure what to do about a layer 3 device to allow communication between VLANS, e.g. for clients to talk to servers (as far as I'm aware the SA520 only supports 3 VLANS). The alternative being to use the ANS options on the server NICs to create multiple virtual connections (one on each VLAN).
Anyway, just throwing ideas out there, and would really appreciate any input.
Also, if anyone could suggest a "teach yourself" book so I can increase my knowledge on this stuff, that would be great!!
Cheers guys
