Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

OSPF design choices

Posted on 2011-02-14
4
Medium Priority
?
468 Views
Last Modified: 2012-05-11
I am setting up a couple of new links to a remote office and would like to use OSPF for dynamic routing.  The primary link will be a 2MB Mpls link and the secondary will be a GRE vpn tunnel over the internet.  I am still in the planning/design phase and I am wondering about the best choice and best practice in terms of assigning the router-id's as I understand this will dictate which router will become the DR.  I am looking for a suggestion on whether or not I should use a loopback address or just manually configure the router-id?  Also,  what IP addressing is the safest to use for router-id scheme and also what would be the best router to choose as the DR assuming all the routers are the same in terms of processing power and memory?

thanks
0
Comment
Question by:FREDARCE
  • 2
  • 2
4 Comments
 
LVL 50

Expert Comment

by:Don Johnston
ID: 34890036
The loopback/router ID method was created so we could have control over the router ID. Once the "router-id" command was implemented, using the loopback interface method was no longer needed. Personally, I like using the "router-id" command.

As for addressing, I like to use numbers that stand out from IP addresses. For example, I typically use 1.1.1.1, 1.1.1.2, 1.1.1.3, etc.

But since it's a just a router ID, you can use any 32-bit dotted decimal number you want.
0
 

Author Comment

by:FREDARCE
ID: 34890101
thanks donjohnston,

What about deciding which router should be the DR?  What would be the influences for determining this?
0
 
LVL 50

Accepted Solution

by:
Don Johnston earned 2000 total points
ID: 34890132
If the connection is a point-to-point link, there is no DR. If it's not (and a DR election takes place), I would go with the router that has more CPU and memory.
0
 

Author Closing Comment

by:FREDARCE
ID: 34890153
thanks
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

879 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question