should probably get a Juniper router.
--Greg
-Original Message-
From: vkp [mailto:[EMAIL PROTECTED]]
Sent: Friday, May 17, 2002 1:08 PM
To: Munkhbayar.B
Cc: [EMAIL PROTECTED]
Subject: Re: Best VLAN supporting Switch
Our consideration is security.
We are now
PM
To: Munkhbayar.B; [EMAIL PROTECTED]
Subject: Re: Best VLAN supporting Switch
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
That's a great choice.. I'd stick with that. We've deployed a 3500 node
network with 200+ cisco switch's using multiple vlan's. In this case
cisco is the only choice
:[EMAIL PROTECTED]]
Sent: Sunday, May 19, 2002 4:03 PM
To: [EMAIL PROTECTED]
Subject: RE: Best VLAN supporting Switch
3548 is end of life. Don't buy them.
At 02:20 PM 5/17/2002 -0500, Vachon, Scott wrote:
We are going to deploy VLAN on 10/100 LAN and about 200 users.
Our consideration
Foundry all the way, Cisco is not very good at switching.Cisco works but
Foundry is superior. Cisco is mainly good for routing purposes until you
hit the 12,000 stage, then you should probably get a Juniper router.
LOL. I have to ask on what basis you make the above statements. Have you
tested
3548 is end of life. Don't buy them.
At 02:20 PM 5/17/2002 -0500, Vachon, Scott wrote:
We are going to deploy VLAN on 10/100 LAN and about 200 users.
Our consideration is security.
We are now focusing on Cisco Catalyst 2900 XL.
Is it good choice? Or?
What is your recommended Brand and
Our consideration is security.
We are now focusing on Cisco Catalyst 2900 XL.
Definitely Cisco .. may be 3550 XL ... I think it has rounting
capabilities built in.
Is it good choice? Or?
What is your recommended Brand and Model.
We are going to deploy VLAN on 10/100 LAN and about 200 users.
Our consideration is security.
We are now focusing on Cisco Catalyst 2900 XL.
Is it good choice? Or?
What is your recommended Brand and Model.
I assume you will use the 2950 ?? Have you considered the 3548xl ? Both are
good, the
If you are going to VLANs, perhaps you would want to consider Layer 3
switching for inter-VLAN traffic. This will give you some additional
security by providing access lists defining who can initiate sessions to
what VLAN, and whatnot. If you don't expect much growth, perhaps a
Catalyst 4006
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
That's a great choice.. I'd stick with that. We've deployed a 3500
node network with 200+ cisco switch's using multiple vlan's. In this
case cisco is the only choice. I recommend however, that you trunk
your Vlan's using dot1q instead of ISL