i picked up a brand spanking new SMC Tigerswitch 10/100 6716L3 switch from someone who didn't know it's value... don't ask how much i paid... you'll either be shocked or get really pissed off and say that i ripped the person off... which i didn't... 'cause he mentioned the price... i simply paid him.
anyways... i digress.
so... i have setup an OpenBSD firewall with a system with 5 interfaces. each interface, as you obviously have determined, has a different network element (servers, internal, external, router, mystery).
now this is a HUGE assumption... but i figured since all these networks were connected to one device, that device would be able to route traffic to each network based on the pf.conf file. i'm assuming, i don't need to enable any type or routing since it's routing traffic between its own interfaces.
so now i have this layer 3 switch, which not only does VLANing... but since it is a layer3 device, i'm assuming it can route between the VLANs w/o the need to another layer3 device.
so now here's the question. should i simply have the switch route traffic between the VLANS, fullfilling it's role as a layer 3 device, or should i simply isolate the networks with the VLAN and have all traffic forwarded to the firewall to be routed?
is this a redundancy? i know that i have more control with ACLs on the firewall. this switch model doesn't support ACL's the way it's replacement does.
also, will i need to enable 802.1Q on the OpenBSD box to allow for inter-VLAN communication? i know normally, you need to because of the larger framesize, but does OpenBSD compensate for this w/o the need for extra configuration?
anyways... i digress.
so... i have setup an OpenBSD firewall with a system with 5 interfaces. each interface, as you obviously have determined, has a different network element (servers, internal, external, router, mystery).
now this is a HUGE assumption... but i figured since all these networks were connected to one device, that device would be able to route traffic to each network based on the pf.conf file. i'm assuming, i don't need to enable any type or routing since it's routing traffic between its own interfaces.
so now i have this layer 3 switch, which not only does VLANing... but since it is a layer3 device, i'm assuming it can route between the VLANs w/o the need to another layer3 device.
so now here's the question. should i simply have the switch route traffic between the VLANS, fullfilling it's role as a layer 3 device, or should i simply isolate the networks with the VLAN and have all traffic forwarded to the firewall to be routed?
is this a redundancy? i know that i have more control with ACLs on the firewall. this switch model doesn't support ACL's the way it's replacement does.
also, will i need to enable 802.1Q on the OpenBSD box to allow for inter-VLAN communication? i know normally, you need to because of the larger framesize, but does OpenBSD compensate for this w/o the need for extra configuration?