That sounds like a reasonable plan. I'll work on the proposal.

Thanks as always,

Kurt

On Tue, May 3, 2016 at 7:04 AM, Andrew S. Baker <asbz...@gmail.com> wrote:

> While it will likely be impossible to get down to a single standard access
> configuration that you support, I think you should aim for 4 or 5, based on
> the most popular methods you support today.
>
> Grandfather all of the existing folks in (to some point), or maybe just
> grandfather all the existing configurations in, but move towards something
> you could build redundancy for on the back-end.
>
> If you want support for providing a set of standard, supported configs
> (let's say 5 of them), then simply price out two options:
>
> A -- Building redundant VMs that can support 5 different remote access
> configurations (possible 10-15 VMs in total), and keep them live all at
> once.
>
> B -- Building single or redundant VMs to cover all the various
> configurations and keep them online for patching, etc.
>
> Show management plan B, indicating the need for security, etc.   When they
> push back, suggest plan A, with some approach to moving to a steady state
> with each client.
>
> What you are looking to do will be manpower intensive and then require
> lots of custom automation to facilitate, making the whole process somewhat
> fragile.
>
> Having a smaller number of supported configurations will allow for greater
> redundancy on your end, and facilitate patching and integration testing
> when new versions of components and devices come online.
>
> Regards,
>
>  *ASB*
>  *http://XeeMe.com/AndrewBaker <http://xeeme.com/AndrewBaker>*
>
>  *Providing Expert Technology Consulting Services for the SMB market…*
>
> * GPG: *1AF3 EEC3 7C3C E88E B0EF 4319 8F28 A483 A182 EF3A
>
>
>
> Sent with Mixmax
> <https://mixmax.com/s/WMB47Rd39yDNPFfWo?utm_source=mixmax&utm_medium=email&utm_campaign=signature_link&utm_content=sent_with_mixmax>
>
>
>
> On Mon, May 2, 2016 8:21 PM, Kurt Buff kurt.b...@gmail.com wrote:
>
>> The access (again, AFAIK) is pretty much all SSL VPN. But each rev of
>>
>> each vendor's device introduces incompatibility, as does the
>>
>> customer's requirements for AV on our support desktops.
>>
>>
>> This isn't a problem that's going to go away.
>>
>>
>> Kurt
>>
>>
>>
>> On Mon, May 2, 2016 at 4:25 PM, Michael B. Smith <mich...@smithcons.com>
>> wrote:
>>
>> > I know that this won’t be popular – but at some point you have to
>> establish
>>
>> > SOME set of supported environments.
>>
>> >
>>
>> >
>>
>> >
>>
>> > I like clients – and when I was in my early days, I would extend myself
>> to
>>
>> > do almost anything to retain a client – but now, it just isn’t worth it.
>>
>> >
>>
>> >
>>
>> >
>>
>> > PPTP, L2TP (IPSec), SSL VPN, and DirectAccess – I support all these. If
>> a
>>
>> > client says they want something else, I say “I’m sorry, but this is
>> what I
>>
>> > support”…
>>
>> >
>>
>> >
>>
>> >
>>
>> > From: listsadmin@lists.myitforum.com [mailto:
>> listsadmin@lists.myitforum.com]
>>
>> > On Behalf Of Micheal Espinola Jr
>>
>> > Sent: Monday, May 2, 2016 7:12 PM
>>
>> > To: ntsys...@lists.myitforum.com
>>
>> > Subject: Re: [NTSysADM] Looking for some ideas
>>
>> >
>>
>> >
>>
>> >
>>
>> > I hope for and look forward to a healthy discussion about this! I've
>> never
>>
>> > come across one that comes to a conclusion.
>>
>> >
>>
>> >
>>
>> > --
>>
>> > Espi
>>
>> >
>>
>> >
>>
>> >
>>
>> >
>>
>> >
>>
>> > On Mon, May 2, 2016 at 3:01 PM, Kurt Buff <kurt.b...@gmail.com> wrote:
>>
>> >
>>
>> > All,
>>
>> >
>>
>> > $Company has a set of support engineers whose job it is to connect
>>
>> > with customer sites which run our product. There are over 50 of these
>>
>> > customer sites, and of course we hope to get more.
>>
>> >
>>
>> > Our systems at the customer sites are not normally the customers' main
>>
>> > set of IT resources, but are usually critical to their operations, so
>>
>> > their IT staffs have their own opinions on how to grant access for us
>>
>> > to their environments.
>>
>> >
>>
>> > Therefore, each site has different requirements for remote access,
>>
>> > having a multitude of different VPN units (Sonicwall, Juniper, Cisco,
>>
>> > etc.) and requirements for different brands of Antivirus installation,
>>
>> > and whether or not split tunneling is allowed, etc.
>>
>> >
>>
>> > Currently our support engineers are using 3 desktop machines with
>>
>> > varied OSes, and using a set of VMs running in VMware player, but not
>>
>> > nearly enough of them, so that there are frequent conflicts in the
>>
>> > configurations of the VMs, what with different versions of VPN and AV
>>
>> > software.
>>
>> >
>>
>> > I expect normally no more than 4 or 5 VMs to be in use at a time - and
>>
>> > usually only 1 or 2.
>>
>> >
>>
>> > My thought currently is to have a set of VMs (one per customer) on a
>>
>> > small cluster in a DMZ - our support engineers would be able to access
>>
>> > the host, start the required VM, and be on their way.
>>
>> >
>>
>> > My solution starts to run into conceptual problems, however, when I
>>
>> > think about how to power down VMs that aren't in use, and also how to
>>
>> > wake up VMs periodically so that they keep patches and antivirus
>>
>> > updates. Are there products our there for a given platform that will
>>
>> > detect VMs not in use and shut them down, and that will also wake
>>
>> > those not running, to let them get patches and AV updates, then shut
>>
>> > them down? I'm platform agnostic - we run both VMware (production) and
>>
>> > Hyper-V (DMZ) here, and I don't care which one I implement.
>>
>> >
>>
>> > Of course, whatever solution is proposed should detect machines in
>>
>> > use, and not shut them down.
>>
>> >
>>
>> > Thoughts, input, suggestions?
>>
>> >
>>
>> > Thanks,
>>
>> >
>>
>> > Kurt
>>
>> >
>>
>> >
>>
>>
>>
>>
>>

Reply via email to