Network redesigning / security hardening updates / thoughts needed

Author
SmokeyMountian Tech
New Member
  • Total Posts : 16
  • Scores: 0
  • Reward points: 0
  • Joined: 2020/07/13 13:06:17
  • Location: East Tennessee
  • Status: offline
2020/11/18 08:16:32 (permalink)
0

Network redesigning / security hardening updates / thoughts needed

So we're replacing our existing 100D's in HA with 600E's.
I'm only about 3 months in with a new company managing their networks.
It consists of 1 primary location with roughly 200-300 users and about 20 remote locations with 200-300 total users.
The current setup is:
  1. 100D's in HA at main site with Aruba 5406R-zl2 (Aruba is doing routing for local VLANs)
    1. 10.1.x.x through 10.9.x.x Each subnet will be on its own VLAN. (in the process now)
    2. Dual WAN
    3. OSPF for remote sites that are on the private LAN
    4. FortiManager / FortiAnalyzer (Still working on getting the setup)
  2. most remote sites are sitting on Private 50-100Mb Fiber LAN back to our main office using OSPF
    1. The private Lan is using a 10.255.255.x subnet and the connections are using NAT
    2. Backup 4G internet W/IPSec tunnel
  3. Non-private lan remote sites are using IPSec split tunnels 
    1. Backup 4G internet W/IPSec tunnel
  4. Remote users:
    1. work from home users: Have a 30E Firewall and also use SSL from behind their 30E
    2. SSL VPN for remote access when needed.
I'm planning on building up the 600E's from scratch because I know there's a lot of config in the 100D's that is not needed/old.
Some question I have and what I'm thinking for our new 600E's is:
  1. Thinking of setting up the new firewalls in tandem with the existing firewalls and moving internal and external sites over to it 1 at a time.
  2. I'm thinking of setting the new firewalls up to do all the interoffice routing instead of the Aruba so we can apply security profiles to interoffice networks.
  3. Thinking of migrating to SDWAN in the process. (Are there any reason not to start using SDWAN?)
  4. Thinking we can set up the 30E's to have dynamic IPSec split tunnels for the home users so they don't have to SSL from behind the 30E.
  5. Will be setting up a new subnet/VLAN for mobile devices that will have internet access only and isolation.
    1. I'm thinking we have the new 600's handle this network so we don't have to pass traffic to our Windows DHCP servers.
Other thoughts:
  1. For our remote offices on private LAN, is there any security benefit to NAT'ing the traffic? or should we just pass the traffic un NAT'd and use policies to apply security?
  2. We're also looking to set up a management VLAN, any tips/thoughts?
  3. We're slowing getting into the VOIP scene and have been setting them up on their own VLAN
  4. Should we make 1 large Printer VLAN for all sites? and lock down access to each site/users that need to print to multiple sites? (Currently, we have a print server and we enable "Branch Office Direct Printing")
  5. We're starting to put CC machines on their own VLAN on each Subnet.
I want to make sure security practices are being followed and we're not making management harder than it needs to be.
TIA.
#1

0 Replies Related Threads

    Jump to:
    © 2020 APG vNext Commercial Version 5.5