Having tackled the setup required for implementing this Policy Routing structure you want to move on to bigger projects. Luckily you have been selected to assist in incorporating a recently acquired company into the corporate network fabric.
This company has three different connections into the core network:
The first connection is the Internet and is mediated from an existing firewall you have no control over.
The second connection is the primary vendor who has provided a connection to their ordering system.
The third connection is the primary transport supplier who has provided a connection into their scheduling system.
The network connections all terminate into a single Token Ring network. Currently there are four small ...