?
Solved

HP router with BGP

Posted on 2014-01-07
3
Medium Priority
?
457 Views
Last Modified: 2014-01-08
We are looking at an HP MSR50-40  (JD433A) as an enterprise perimeter gateway router that will be attached to two unique ISPs using BGP.  Enterprise size: 1500 persons.  The JD433A will be located outside our firewall.

We are fishing for pros and cons of this product.
0
Comment
Question by:dts3909
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 6

Expert Comment

by:Jordan Medlen
ID: 39762618
The biggest con that I see so far is the limitation of routing tables size. 100,000 routes for IPv4 and another 100,000 for IPv6. You wont be able to carry a full internet routing table from either provider. This may not be a bad thing if all you care about is ECMP across two default routes. You may be able to accept routes within the ISPs ASN and those directly attached. This would allow for traffic to take the best AS path to it's destination.

If you're going to have traffic beyond 3Gbps, then you'll want to consider a different router. However this may not be a problem either, I just don't know the particulars of your usage on the Internet.

Could you elaborate how the Internet access is used at your organization? This may better help determine if this is the right system for your needs.
0
 

Author Comment

by:dts3909
ID: 39765654
Our ISP connection speeds are 100Mbps each.  At present, we do not download any bgp routes, we let the ISP manage the bgp routing.

Our daily bandwidth average is 3Gbps each direction.
0
 
LVL 6

Accepted Solution

by:
Jordan Medlen earned 1500 total points
ID: 39766084
You should be fine with this router then, that being the case.
0

Featured Post

Enroll in August's Course of the Month

August's CompTIA IT Fundamentals course includes 19 hours of basic computer principle modules and prepares you for the certification exam. It's free for Premium Members, Team Accounts, and Qualified Experts!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Arrow Electronics was searching for a KVM  (Keyboard/Video/Mouse) switch that could display on one single monitor the current status of all units being tested on the rack.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses
Course of the Month13 days, 19 hours left to enroll

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question