Hi,
A question about the network design of PacketFence.
I understand that we use PacketFence to manage the access layer switches
which connect to the end users' devices. For example desktop computers,
wireless devices, etc. So that an unauthorized user won't be able to access
the network.
In our network, we also have so many VM servers connected to another
switches (Let's call them server switches), and inside these switches there
are different vlans. Should I also have these (server) switches managed by
PacketFence? To me it does not make sense to do so because unlike the
(desktop) switches, once the vlans inside the (server) switches have been
created, and the switch port(s) have been assigned to the specific vlan,
there is no need to change it anymore. I mean, at least for a long time.
And these switch ports don't connect to the cubicle area. So I guess there
should not be any security concern on these (server) switches, unless
someone break into our server room and plug a device into these (server)
switches.
Also some (server) switch ports are connected to VM Host NIC, which could
have tens of VM servers behind one NIC. How do I configured the switch to
handle these mac addresses when they pass through one switch port?
Is there any other problem I need to consider and have the (server)
switches managed by PacketFence? I would like to hear the opinion from you
experts. Much appreciate if you could share me with some information in
your real scenario.
Thanks again.
Regards,
Jacky
------------------------------------------------------------------------------
Managing the Performance of Cloud-Based Applications
Take advantage of what the Cloud has to offer - Avoid Common Pitfalls.
Read the Whitepaper.
http://pubads.g.doubleclick.net/gampad/clk?id=121054471&iu=/4140/ostg.clktrk
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users