Find Jobs
Hire Freelancers

Cisco 1811 New Router configuration(repost)

$30-5000 USD

Cancelado
Publicado hace más de 16 años

$30-5000 USD

Pagado a la entrega
The project involved the configuration of a new Cisco 1811 router with DSL. The following items should be configured: 1. 2 WAN interfaces with redundancy. 2. Firewall with DMZ and one server in it. 3. Incoming ports and a few incoming port ranges. 4. Security, Easy VPN. 5. Access rules. inside to dmz, inside to outside, outside to DMZ. 6. DDNS. 7. Routes All configuration should be done using IOS and not SDM. Pleas take a look at the deliverables section for more information. ## Deliverables Detailed Project Specs: Network Description/Configuration Requirements: Our network consists of the following items: 1. Client Computers ??" 5 Computers 2. Servers ??" 6 Servers with custom applications that require internet connection. 2 out of the 6 servers are web/app servers that will be open the Internet and should be placed in a DMZ. All servers have 2 NIC s (Currently one is not connected however can be connected if needed) 3. VOIP ??" I have one Linksys PAP-NAT adapter for Vonage and one Sipura 3000 box. The Linksys adapter requires DHCP and an outgoing connection while the SIpura box requires outgoing and a range of incoming ports that should be opened. 4. KVM over IP ??" Avocent DSR4020, allows me to use KVM functionality over IP. Access to KVM should be available from a VPN connection and from the internal network. 5. Wireless Linksys WRT54G ??" My Cisco router does not include the wireless functionality and as such, I am using the Linksys router for wireless connectivity. 6. Switch ??" I am using the SMC 24 ports, 1 GB managed switch. I can define VLANs on that switch. I might add another switch if needed for security purposes. 7. Remote reboot card ??" Each one of the servers has a remote reboot card which has a web server interface and connects to the switch. Access to the remote reboot card should be allowed to VPN and Internal clients. WAN Interfaces: There are 2 WAN interfaces, one is connected to AT&T DSL modem and need PPPoE dialing and the other one is connected to a Comcast Modem and should get an external IP using DHCP. Both interfaces should be always kept on. I want to use the DSL line as a primary connection for certain computers for mainly Internet browsing while the cable connection will be used for a few applications that I am running on separate servers. If the DSL line crashes, all clients should get redirect to the Cable connection and vice versa. If both connections fail, the dial up connection should be dialed and all connections should get redirected to it. As for subnets, IP address etc, I am leaving it up to you to decide on its’ configuration, as External IP Address: The DSL Line has a static IP address while the Cable line has a dynamic IP address. I want to use DynDNS DDNS with the cable connection. Network Segments ??" I want to have the following network segments: Internal Network ??" Internal client computers. Should have full access to DMZ, Servers segment and Internet. All clients but 2 laptops will have static IP. Laptops should get a fixed DHCP IP address (Is it possible in the cisco router to reserve assign specific IP address by MAC address? DMZ ??" Servers that are open to the internet. I would like to have full access from the internal network to the DMZ and SQL Server 2005 connectivity from DMZ to a specific server that is on the servers segment. VPN ??" Clients who connect using VPN. Those clients should have full access to internal network and remote desktop/terminal services access to all servers. P2P ??" P2P computer will usually be off however when it’s on, I want it to be in a different segment due to the risks. P2P computer will connect using Cable connection. IF POSSIBLE: when cable connection fails it will not get redirected to the DSL line. P2P computer should not have any access to other segments, internal network should have files, HTTP and remote desktop access to P2P server, P2P server should have 4 incoming ports that are open to the internet. VPN ??" The only VPN that should be configured is the Easy VPN for access of clients using the Cisco VPN client. Clients should have full access to internal network at Terminal services access to DMZ and Servers segment. Client will use routers’ local authentication. VOIP ??" Segment for all voip equipment, I might add more equipment soon. Should have full access outside, specific ports from outside to inside (will be provided) and open HTTP (Each box can have a custom HTTP port) ports from Internal/VPN networks to VOIP boxes. Firewall/Access Rules summary: DMZ Client ??" Outgoing to HTTP, HTTPS, POP3, SMTP, Terminal Services, FTP. Incoming from Internet: One of the servers is a web server and should have incoming HTTP/HTTPS traffic. Internal Network: All clients should have full access to the internet, 2 IP addresses should have access to SDM and DMZ, one client will use MSN with video session (I am not sure if it requires an incoming port…) VPN Clients: Will have full access to internal network (Outside of File server) and terminal services access to DMZ computers. Other Considerations SDM should be enabled and accessible from 2 specific IP addresses in the internal network. Current ROM Info: System Bootstrap, Version 12.3(8r)YH6, RELEASE SOFTWARE (fc1) ??" If needed, you can upgrade the version. ## Platform Cisco 1811, IOS
ID del proyecto: 3611847

Información sobre el proyecto

4 propuestas
Proyecto remoto
Activo hace 16 años

¿Buscas ganar dinero?

Beneficios de presentar ofertas en Freelancer

Fija tu plazo y presupuesto
Cobra por tu trabajo
Describe tu propuesta
Es gratis registrarse y presentar ofertas en los trabajos
4 freelancers están ofertando un promedio de $217 USD por este trabajo
Avatar del usuario
See private message.
$144,50 USD en 14 días
4,8 (48 comentarios)
4,8
4,8
Avatar del usuario
See private message.
$510 USD en 14 días
5,0 (5 comentarios)
4,4
4,4
Avatar del usuario
See private message.
$127,50 USD en 14 días
5,0 (5 comentarios)
3,1
3,1
Avatar del usuario
See private message.
$85 USD en 14 días
5,0 (5 comentarios)
1,3
1,3

Sobre este cliente

Bandera de UNITED STATES
Miami, United States
5,0
77
Forma de pago verificada
Miembro desde mar 3, 2009

Verificación del cliente

¡Gracias! Te hemos enviado un enlace para reclamar tu crédito gratuito.
Algo salió mal al enviar tu correo electrónico. Por favor, intenta de nuevo.
Usuarios registrados Total de empleos publicados
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Cargando visualización previa
Permiso concedido para Geolocalización.
Tu sesión de acceso ha expirado y has sido desconectado. Por favor, inica sesión nuevamente.