Cisco – How to split static IPs from an ISP for separate usage

ciscoswitch

I have a lot of IT experience/consulting, but want to test what I have done against some of the real experts hre in the networking field so I can keep learning and do what's best.

I have ISPs with 5 usable static IPs assigned. To split them so I can use separate IPs for particular usage scenarios, I have simply plugged in a small Netgear managed switch from the ISP modem, made sure the ports are running duplex and as high as they can go, and then from the Netgear plugged in and configured my main SonicWall with one IP, another two routers for some other work, etc.

Is this the proper/best performance way of splitting up the IPs? I ask because this method appears to work OK, but for a Gateway to Gateway VPN I have setup (one office has 100Mbs fiber up/down, and the other side is 50MBs up/down), I have found the performance a little underwhelming even for simple file copies between sites (can get no more then 10MBs, and then it seems to saturate the bandwidth, or CPU power of the router, dunno…). I am worried there is something asymmetrical in this approach. The routers for the VPN are Cisco RV042G and Cisco RV320, which frankly, am not sure are great routers to start with. I've assured by both ISPs there are is no throttling going on.

Hopefully this makes sense. Any constructive thoughts would be appreciated. many thanks

D

Best Answer

There are two basic options:

  1. You use a switch to connect all your devices directly to your ISP router/handover port. If you use a managed switch, make sure you secured everything: remove management/IP interface from the (WAN) VLAN, disable CDP, LLDP, MSTP/RSTP/RPVST and all other functions that could be used to compromise or disturb your network. Use ACLs on the switch to create a (very basic) firewall.
  2. Map virtual IPs on the Sonicwall to DMZ (private) IP addresses (or only TCP/UDP ports). Make sure the Sonicwall responds to ARP on those IP addresses, so the ISP router can forward appropriately. Set up firewall policies to allow the connections you require. I'd seriously recommend this option for any device that is not Internet-hardened.

These options can also be combined, so you could connect a VPN gateway directly to the switch/VLAN and map other IPs to servers/services through the Sonicwall.

PS:

made sure the ports are running duplex and as high as they can go

Do NOT manually configure Ethernet ports EVER unless you can configure them identically on both sides (and there's a need to in the first place). Especially configuring one side for manual full-duplex deactivates Autonegotiation which a) disables Gigabit Ethernet completely (where Autoneg is mandatory) and b) causes the other side to fall back to half duplex (legacy mode). This in turn creates a nasty duplex mismatch which causes very poor performance.

Related Topic