Associate
- Joined
- 27 Oct 2002
- Posts
- 343
- Location
- St Albans
Hi,
I have a client who are looking to expand the useable IP range of there network and have been looking towards using VLAN's to do it.
Currently the network is using a class C range that is full.
I have been looking at deisgn to do this and am thinking about the following...
VLAN0: 192.168.0.x - Firewall & Common Network Applicances (Traffic Compression Device, Internet Proxy)
VLAN1: 192.168.1.x - Servers and Printers
VLAN2: 192.168.2.x - Client DHCP Range
The switch is a Cisco 4500 Series Layer 3 device which will be configured with the VLAN's and will provide the routing between them.
Devices on each VLAN will point to the switch as there default gateway (ie VLAN0 192.168.0.1, VLAN1 192.168.1.1 etc) and there will be a default route on the Switch to route any non VLAN to traffic to the Firewall.
The compnay has various LAN2LAN VPN's configured which terminate at the Firewall (Cisco ASA) so the Firewall will need routes back to the switch for the VLAN's it hosts.
I was wondering if anyone has any observations about this design or recommendation about expanding the current class C range?
Thanks
Tim
I have a client who are looking to expand the useable IP range of there network and have been looking towards using VLAN's to do it.
Currently the network is using a class C range that is full.
I have been looking at deisgn to do this and am thinking about the following...
VLAN0: 192.168.0.x - Firewall & Common Network Applicances (Traffic Compression Device, Internet Proxy)
VLAN1: 192.168.1.x - Servers and Printers
VLAN2: 192.168.2.x - Client DHCP Range

The switch is a Cisco 4500 Series Layer 3 device which will be configured with the VLAN's and will provide the routing between them.
Devices on each VLAN will point to the switch as there default gateway (ie VLAN0 192.168.0.1, VLAN1 192.168.1.1 etc) and there will be a default route on the Switch to route any non VLAN to traffic to the Firewall.
The compnay has various LAN2LAN VPN's configured which terminate at the Firewall (Cisco ASA) so the Firewall will need routes back to the switch for the VLAN's it hosts.
I was wondering if anyone has any observations about this design or recommendation about expanding the current class C range?
Thanks
Tim