Solved

Edge Network Design, Dual Connections

Posted on 2014-03-03
3
333 Views
Last Modified: 2014-03-08
Hey, Im building a new network datacenter…dual everything(physically)

Is it a good idea to setup redundant connections(in RED) from the routers to each edge switch(there in a stack)?  If so, would you use port-channel or bridge from the router to the switch-stack?

Thanks
diagram-EE.jpg
0
Comment
Question by:800LM
  • 2
3 Comments
 
LVL 26

Expert Comment

by:Soulja
ID: 39900978
You should do point to point layer 3 connections between them. Assign a /30 network for each link between the stack and said router.

On the switch stack you would just create a routed port for each connection leading to each router. Asssign that port to a /30 and the router port to that /30 subnet. Do the same for the other connection to the other router, just on a different /30 subnet.
0
 

Author Comment

by:800LM
ID: 39905306
If I use the /30s..  Would it be internal addresses or external..  Also normally  I would have the same IPs inside the router connected to the firewall layer, normally my bgp IPs ...  Should I just have my external bgp IPs on my firewall layer...and do a private IPs for the middle switch to router inside?  Just trying to rap my head around it.
0
 
LVL 26

Accepted Solution

by:
Soulja earned 500 total points
ID: 39907255
If I use the /30s..  Would it be internal addresses or external.

Internal addresses


Should I just have my external bgp IPs on my firewall layer...and do a private IPs for the middle switch to router inside?

Yes.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Before I go to far, let's explain HA (High Availability) and why you should consider it.  High availability is the mechanism used to provide redundancy to any service at the same site and appears as a single service to the users of that service.  As…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now