Solved

Cisco-based ISDN solution for temporary/backup comms

Posted on 2007-03-29
3
342 Views
Last Modified: 2007-12-19
Hi all,

I'm researching a new solution for providing temporary comms at a remote site. The comms will be ISDN based until the primary comms link is in place. Due to the nature and location of the remote site ISDN calls will be very expensive.

My plan would be to use two Cisco routers with BRI interfaces to achieve the following:

1. Establish “Connectivity Windows” during which users will be aware that comms are up and be able to access remote data, applications, etc.

1a. The remote site will connect automatically at the beginning of a “Connectivity Window” and disconnect automatically at the end of the window.

1b. The line will disconnect automatically if idle for a certain amount of time but will reconnect upon seeing interesting traffic if during a “Connectivity Window”.

2. Calls should only be established from the remote site; however IT users should have the ability to establish a call from our central site if required.

3. If/when the primary comms are in place the ISDN connection should only be used as a backup if the primary comms were to fail.

I’ve used Cisco routers, but using ISDN lines is fairly new to me and certainly the implementation of the above is beyond my current knowledge.

I’m confident in configuring the ISDN interfaces and establishing a connection. What I’m hoping for is some pointers, comments, and feedback on how best to configure the connection to satisfy my requirements.

TIA.


0
Comment
Question by:rj-smith
  • 2
3 Comments
 
LVL 28

Accepted Solution

by:
mikebernhardt earned 250 total points
ID: 18819645
1a: ISDN connections require a "dialer list" which defines what traffic is "interesting." In other words, which traffic will bring up and keep up a connection. What you can try it to set up time-based access lists, so that what is interesting can vary with the time of day:

http://www.cisco.com/en/US/products/sw/iosswrel/ps1830/products_feature_guide09186a0080087456.html

1b: You don't need to make the link automatically connect at the right time- ISDN is quick to come up and the first traffic to be interesting will bring up the link. After that, it will stay up or go down as needed, based on your dialer idle-timeout setting. The counter on the idle timeout is reset by packet that match the dialer list.

2: Again, the dialer list can define this.
3. You do this be creating a floating static route to the ISDN dialer interface. As long as the primary link presents a better route, it will use that.
0
 
LVL 6

Author Comment

by:rj-smith
ID: 18841937
Thanks for the information Mike, that sounds pretty promising.

I won't be implementing for a few weeks so I'm not in a position to test or verify the information but I will happily award you the points.

0
 
LVL 28

Expert Comment

by:mikebernhardt
ID: 18844311
Your ISDN backup solution is common and easy to implement, and I've done it many times. The more unique part is integrating it with the time-based access list, but ultimately it's just an access list that can be used for any purpose including yours. Let me know how it works!
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Can Cisco resolve internet address internally 4 44
SD - WAN 2 55
HSRP not working on N7K-c7018 3 53
using BGP Attributes 2 83
The Cisco RV042 router is a popular small network interfacing device that is often used as an internet gateway. Network administrators need to get at the management interface to make settings, change passwords, etc. This access is generally done usi…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

815 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now