skdmaster
Active Member
- Reaction score
- 107
- Location
- Millville, DE
Here is the scenerio:
20 floor condominium with approximately 400 condos divided between a north and south tower. The complex provides a network jack wired into the unit and then the owner can connect how they want (direct, install their own router, etc).
The current setup that another company did is very wrong - used desktop switches on all of the floors and connected everything to two SonicWall TZ100 units so basically each tower has everyone on the same network. They had many issues last year with someone bringing down the entire tower for various reasons. The use a 50Mbps modem in the winter and spin up another 50Mbps for summer with each tower having its own.
My thought process is managed switches on each floor and do VLANs for each unit so floor 10 unit 4 would be VLAN ID 1004. The feeds to the units would be 10/100 with 10 units per floor per tower - the uplink to the control room would connected via gigabit port on the switch as a trunk port to a 24-port managed switch in the control room. There would be one feed coming up for each floor for ports 1-20 on the switch which is 10/100/1000. I tried to find a firewall that could support the load of 200 VLAN tags and eventually decided on the Watchguard XTM545 for the concurrent connections and VLAN support.
Where I am getting a bit confused is all of the switches say they support the 4096 VLAN tags but other things I read is most Layer2 switches have a 64 VLAN limitation for addressing. I spoke with one friend that does networking for a national company and his suggestion was I might have to VLAN trunk 4 ports from the control room switch instead of 1 trunk to carry the load. The control room switches I was looking at are Dell PowerConnect 2824. Anyone have any insight or experience deploying a large amount of VLANs in one location?
20 floor condominium with approximately 400 condos divided between a north and south tower. The complex provides a network jack wired into the unit and then the owner can connect how they want (direct, install their own router, etc).
The current setup that another company did is very wrong - used desktop switches on all of the floors and connected everything to two SonicWall TZ100 units so basically each tower has everyone on the same network. They had many issues last year with someone bringing down the entire tower for various reasons. The use a 50Mbps modem in the winter and spin up another 50Mbps for summer with each tower having its own.
My thought process is managed switches on each floor and do VLANs for each unit so floor 10 unit 4 would be VLAN ID 1004. The feeds to the units would be 10/100 with 10 units per floor per tower - the uplink to the control room would connected via gigabit port on the switch as a trunk port to a 24-port managed switch in the control room. There would be one feed coming up for each floor for ports 1-20 on the switch which is 10/100/1000. I tried to find a firewall that could support the load of 200 VLAN tags and eventually decided on the Watchguard XTM545 for the concurrent connections and VLAN support.
Where I am getting a bit confused is all of the switches say they support the 4096 VLAN tags but other things I read is most Layer2 switches have a 64 VLAN limitation for addressing. I spoke with one friend that does networking for a national company and his suggestion was I might have to VLAN trunk 4 ports from the control room switch instead of 1 trunk to carry the load. The control room switches I was looking at are Dell PowerConnect 2824. Anyone have any insight or experience deploying a large amount of VLANs in one location?