Let's see...

Folks at the site screw up and take themselves off-line

Same folks demand admin rights to their own firewall

They think they can snitch bandwidth from their neighbor using their own 
firewall, but...

...their own firewall is downstream from the switch where bandwidth is 
allocated (and thus, they would need access to that switch as well)

Even if they were "computer savvy", wouldn't there be PCI, Change Control / 
auditing issues, etc?  Need documentation from the other office allowing such 
changes more or less at will?
--
richard

From: [email protected] [mailto:[email protected]] On 
Behalf Of J- P
Sent: Wednesday, September 25, 2013 10:13 AM
To: [email protected]
Subject: [NTSysADM] Traffic shaping before the firewall

Hi all,

I have a location that shares internet with another office, I had a port based 
vlan firewall that would take the pipe and split it into the switch of each 
office respectively and it also allowed me to allocate X bandwidth to each lan.

Long story short, someone was rewiring something one day and caused a loop that 
led one of the offices to lose internet-

Now they are demanding to have main  firewall removed  , and each office have 
its own firewall (simple , i know, put a switch between the ISP and the two 
firewalls and give each one its public ip), here is the problem , they want to 
be able  to have one of the people in the office (none of which are computer 
savvy) have the ability easily change the allocated bandwidth on any given day -

The reason behind this is because when they have an event , or a conference 
etc.. they want to be able to allocate say 15 of the 20 megs to the lan with 
wifi.

And of course they dont want to have to pay any extra for me, or anyone to go 
onsite and do the adjusting at each firewall.








The information contained in this e-mail, and any attachments hereto, is from 
The American Society for the Prevention of Cruelty to Animals® (ASPCA®) and 
is intended only for use by the addressee(s) named herein and may contain 
legally privileged and/or confidential information. If you are not the intended 
recipient of this e-mail, you are hereby notified that any dissemination, 
distribution, copying or use of the contents of this e-mail, and any 
attachments hereto, is strictly prohibited. If you have received this e-mail in 
error, please immediately notify me by reply email and permanently delete the 
original and any copy of this e-mail and any printout thereof.

Reply via email to