Solved

mpls - or any WAN connection - ISP askes for cusomer L3 router at each end

Posted on 2014-04-09
3
354 Views
Last Modified: 2014-05-07
Hi - Can someone explain why? Im pretty sure its do with MAC tables getting to large for ISP?

Is that the case? if so why is this problem for them? - Technical answer would be good thanks.

They say we MUST have L3 routers -each end - not direct into L2 switch
0
Comment
Question by:philb19
3 Comments
 
LVL 50

Expert Comment

by:Don Johnston
ID: 39988841
It sounds like the provider is only offering layer 3 services.

If you want a layer 2 circuit, you'll need to find a provider that is offering that.
0
 

Author Comment

by:philb19
ID: 39988865
Hi DOn,

No its a MPLS (layer 2.5 VPN) ISP service. Point is they say 'We" need to have L3 router each end. - this is common for all L2 ISP WAN provided setups. - I remember from years ago that I just plugged their termination straight into a switch - they rang me a month later (even though working)  - I had to replace with L3 router. - I just cant for the life of me remember why - it was MAC table issue I believe - thanks
0
 
LVL 26

Accepted Solution

by:
skullnobrains earned 500 total points
ID: 39997172
if you use l2 and misconfigure a device for example by using an ip or mac address already present on the network, you'll cause problem to the corresponding device, which might be the ISPs or another customer's. the ISP will also not have proper control on the number of IPs you use (not relevant if you have your own AS). it's pretty weird it even worked at some point and displays poor security. and yes, cluttering each client's network with the ARP addresses of all others is also a problem.
0

Featured Post

Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now