We are using three cisco 3750 stackable switches as our core. All the user traffic comes to relevant SVIs which configure in core, from the core there is a default route which goes to our perimeter firewall which is checkpoint. Actually we want to implement internal firewall to monitor internal traffic behavior and want to know the best practices and how the routing should be configure ?
If you're just wanting to monitor, you could configure your 3750 to set the internal firewall as the default gateway, and then you'd set the existing firewall as the default gateway on the new internal firewall. You could control traffic and everything on your internal firewall just as you would on the existing one.
Inviting all network professionals in operations! We'd like to understand what would be valuable for you in a mobile application. Your response will help Cisco improve a product feature that could benefit you. Thanks!
Click here to take the sur...
Cisco’s software-defined wide area network (SD-WAN) solution allows user to quickly and seamlessly establish an overlay fabric to connect an enterprise’s data centers, branch and campus locations, as well as colocation facilities in order to imp...
1. Log into CLI of DNAC:
ssh maglev@< DNAC appliance IP> -p 2222
2. Run this curl command to get token to get member id:
curl -X POST -u admin:<admin user password> -H -V https://<CLUSTER-IP>/api/system/v1/identitymgmt/token
Enterprise Switching Business Unit is glad to announce Beta release 16.12.2 for all Catalyst 9200/9300/9400/9500/9600 and Catalyst 3650/3850 Platforms. This release is made available to allow users to test, evaluate and share fee...
Purpose of the document
This document describes the general recommendations or best practices when designing and deploying the Cisco SD-Access technology. The document assumes that the reader has a general overview of Cisco's SD-Access for Distributed C...