Avatar of cfan73
cfan73

asked on 

Campus network/security design

A new customer building consists of 7-8 floors, 14-16 IDFs and an MDF split between two sides of the same floor. All equipment has already been procured, which consists of Cisco Catalyst 9K (fully Layer-3 licensed) throughout.

We had a design call with them last week, and their intended logical design was to make everything Layer 2 in this new building, pulling all routing and security back over the fiber connections across the street to Nexus 7K switches currently serving as the core for everything. (So, all VLANs/subnets would extend outside of the building back to the core across the street.)

The logic here would be that they want to have a central policy point/device through which all traffic would traverse and thus be inspected. They're aware of Cisco ISE/SGT technology, but seem at this point convinced that the best approach would be NOT to Layer 3 segment the new building, even at the core pair in the MDF.

My initial input on the call was to heavily advise Layer 3 at the building "core" (two Cisco Catalyst 9600 chassis in a logical pair), if not also to roll out a routed access design (L3 at the edge).

The guy that recommended this "all L2 in the new building" design comes from a security background, and I've seen this approach quite a bit, trying to hairpin all traffic back to a pair of firewalls. This doesn't make much sense to me from a design and scale standpoint. Maybe it'd work in smaller data centers, but for new campus building location?

I'm looking for input to either combat or support this customer design.

  • If we implemented a routed design (within the building and back to the core across the street), what would we leverage for centralized policy. Would this be a Cisco ISE/SGT design?
  • Do we agree that extending potentially 100 subnets/VLANs (thus, broadcast domains) outside of a 600-uesr building back to a different site would be a ridiculous risk and failure domain?
  • Anything else?
CiscoSecurity

Avatar of undefined
Last Comment
cfan73
Avatar of kevinhsieh
kevinhsieh
Flag of United States of America image

I am not really up on Cisco ISE/SGT.
I do not agree that pulling 600 users and 100 VLANs across the street is necessarily a risk. Questions to ask and answer are what are the expected traffic patterns, both in terms of volume, and where are the endpoints of communication? Is there enough bandwidth and security inspection capacity to hairpin all traffic? If they are going to do firewall inspection and sniffing of traffic, can it operate at 10 Gbps? 20? how about 40 Gbps, or 100? What happens if the traffic exceeds inspection capacity? What traffic are they willing to be able to miss?

It is likely that core services such as DNS, authentication, 802.1x, Internet, etc. would be located at the older campus facilities. In such case, the new campus wouldn't be able to do much while separated from the older campus, so there isn't much point in trying to make it "survivable". In other words, the failure domain is likely to be unavoidably large. If they're planning on placing redundant data center resources in the new campus building, then having a separate failure domain makes more sense. Customer should also be looking at having second set of firewalls and other network inspection infrastructure.
Avatar of cfan73
cfan73

ASKER

@kevinhsieh 

Thanks for your feedback. Aside from survivability concerns (for which your comments above are certainly valid), my other concern around an "all Layer 2" setup (no routing within the new building), would be regarding BUM traffic propagation throughout the building and over the external links. All broadcast frames traverse all links, which also opens them up to a potential entire network failure if one device starts misbehaving.

Thoughts around this?

Thanks again

ASKER CERTIFIED SOLUTION
Avatar of kevinhsieh
kevinhsieh
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of cfan73
cfan73

ASKER

ok, I'll award, but still not in 100% agreement. If all of the routing was handled by the switches across the street, then all VLANs would be permitted on these trunks, and thus nothing could be pruned. Also, this would still expose all of the links to a misbehaving device transmitting at full throttle (thus potentially taking down everything), yes?


Security
Security

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.

32K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo