Solved

ospf deployment

Posted on 2014-11-03
5
207 Views
Last Modified: 2014-11-12
Hello Experts,

We are an ISP and have deployed ospf recently, moving from layer 2 to 3, before all traffic used to come to core switch, where we could do bandwidth shaping, but now only traffic to internet comes out of OSPF cloud, if a client is making connection to another client then that cannot be controller, i have request for client to client connection, with QOS, but i cannot do that as i do not have control over that. How do i control and allocate such traffic using ospf ?

many thanks.
0
Comment
Question by:skywalker7
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 18

Assisted Solution

by:Akinsd
Akinsd earned 250 total points
ID: 40421212
0
 
LVL 28

Expert Comment

by:mikebernhardt
ID: 40422231
Or MPLS, which is what most ISPs use to create private networks within their cloud.
0
 
LVL 1

Author Comment

by:skywalker7
ID: 40427812
I already have MPLS on the network, the issue was how to handle client to client connectivity. I will try and read the docs link provided.

Many thanks.
0
 
LVL 28

Accepted Solution

by:
mikebernhardt earned 250 total points
ID: 40429084
Policy routing is probably not what you want. If you set up the client with their own VRF, they will have a private network, including a private OSPF process on your routers. You can leak your default route into their VRF in order to give them internet access.

I would suggest going to Cisco's web site and search for "configuring VRF."  Without knowing more about your network it's hard to be more specific. Maybe you could provide a drawing if you need more advice.
0
 
LVL 1

Author Closing Comment

by:skywalker7
ID: 40438424
Thanks for the suggestions.
0

Featured Post

Why Off-Site Backups Are The Only Way To Go

You are probably backing up your data—but how and where? Ransomware is on the rise and there are variants that specifically target backups. Read on to discover why off-site is the way to go.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Where is the second IP address? 8 50
Programmable Firewall Router? 3 25
Move WSUS to Server 2016 3 42
can you connect modem to 2 routers 42 27
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question