Dual multi homed BGP to ISP - full table or default route? Networking |
- Dual multi homed BGP to ISP - full table or default route?
- Basic Juniper Routers for Lab?
- Seeking design help
- Are you using CIDR?
- Netflow and bandwidth utilization
- SMBv2 File transfer issue
- Advice on Fibre vs Ethernet
- Best virtual network tool for troubleshooting practice?
- Ruckus 7025 / Cisco 3850s / Nexus 7K
- Network Mesh recommendation across the Mall
Dual multi homed BGP to ISP - full table or default route? Posted: 22 Sep 2018 03:40 AM PDT We have 4 core routers, each with an independent ISP BGP peer. Currently we take full tables from each peer. Internally we are running ibgp between our 4 routers. The issue we are having is that if one router loses its ISP BGP sessions then it has knock on effects to the other routers, namely high cpu and dropped traffic as the routing tables reconverge etc. In the past the majority of our business has been internet based - providing internet connectivity for customers and hosting services that they would connect to over the internet. We are currently transitioning the business to be predominantly based on conference calling - SIP carrier connections back to our dc's where we have a number of conference bridges of various forms. Would you recommend moving to default routes from each external ISP rather than the current full tables we receive? Core routers are 4 x mx80s. They have plenty of ram to store the tables but they don't seem to cope very well with the cpu demands of processing said routes in convergence event [link] [comments] |
Basic Juniper Routers for Lab? Posted: 22 Sep 2018 02:13 PM PDT I would like to add a couple Juniper routers to a small home lab that is mostly FortiNet, Ubiquit, ZyXEL, NetGear, and the like. I don't need firewall features on the Juniper routers but don't mind if they're there. It's a mostly copper 1Gbps network, with 1 Gbps up/down (if I let the lab call out anyway) but if the Juniper routers are a little slower that's fine. I'll mostly be testing vlans and IPsec between FortiNet and Juniper, but will throw in some dynamic routing and other stuff as well. Any suggestions on what to get that won't break the bank (now or with service renewals) but will let me test this out and teach myself Junos OS? It looks like a couple SRX300 or SRX100 might do it? Thanks for any thoughts on this. [link] [comments] |
Posted: 22 Sep 2018 04:16 PM PDT I used to do work on cisco devices about 5 years ago (mostly setup of site to site VPNs)... but I would not consider myself a networking guy. That being said I have no problem learning/teaching myself how to do things, I have plenty of systems/infrastructure experience, and my current role is as a developer but I also manage all our infrastructure/systems in AWS. In a couple weeks I'll have a rack with a pair of upstream drops and I am currently trying to design the network. I already have a pair of ASA 5510's and a pair of Catalyst 3650 POE-24 switches (free from a good friend). Initially I was planning to put the firewalls on the edge, but they cap out at 300Mbit and the switches look like they have 2 SFP ports, so I am now thinking I should request fiber drops from the datacenter and put the switches on the edge, and then use traffic shaping on the upstream ports to avoid massive overages (I think that's the way to do it). Is there a strong/obvious reason to put the firewall on the edge vs the switches? I don't want to pay someone to set this up for me, since I need to manage it going forward I really want to understand the setup, and I have these devices sitting on my desk at home so I've got 2 weeks worth of my evenings to tinker and setup in preparation for racking them in the datacenter. Is there a good place to get this kind of design feedback, is this a good place? I have some instincts on how to do things, I understand the concepts and how to do the configuration, but I fear I might just be doing it completely backwards since this isn't something I have real life experience with. [link] [comments] |
Posted: 22 Sep 2018 04:21 PM PDT Asking anyone working in big data centers or with a large IT infrastructure (schools, office etc). Are you using any significant subnetting beyond the usual classes /8, /16, /24? What are your reasons for or against it? The reason I am asking is really just curiosity. I am going to trade school right now to become an Hope a basic question like this is ok. [link] [comments] |
Netflow and bandwidth utilization Posted: 21 Sep 2018 11:26 PM PDT I am using both Solarwinds Netflow Traffic Analyzer and PRTG Netflow sensors to get a sense of how the bandwidth at our campus is utilized. Both tools report top talkers and top conversations. The display in both cases reports the amount of data transmitted over the link (in megabytes). Although this is useful, what I'm more interested in his how much of the connection is being used by these top talkers., that is, I'd like to see how many mb/s of bandwidth these top talkers are using at a particular moment in time. Not sure if this is possible or even logical. Suggestions and feeedback is welcome. Wayne Hann [link] [comments] |
Posted: 22 Sep 2018 12:58 PM PDT Hey guys, I need some advice. I work for an ISP as a Network Engineer. A customer of ours is using SMBv2 to transfer files to there Colo hosted in a DC. They have a 1gbit connection to the DC. I recently did some Iperf3 testing to our demarc in the DC from their site and with 10 parallel stream we were capable of achieving around 900mbit, so the results were fine with Iperf. I understand there are multiple factors involved in how much throughput you can get get. The latency we can to our demarc is about 1ms. To the customer is about the same, so I don't think latency is an issue. There is is also no packet loss to the DC either. Give that the Iperf3 testing was fine, I don't believe there is any issue with the network and is most likely due to the application is use. Are there any other applications I can use to rule out the network being the issue. Applications which are most effective in transferring files maybe? Thanks, Your fellow network engineer [link] [comments] |
Posted: 22 Sep 2018 12:36 PM PDT Hello, I'm currently creating a DIY NAS for my home using Ironwolf Pro drives. Would using a fibre NIC good or should I go Ethernet NIC if so which ones. Budget doesn't really matter for me so no problem on price. Thanks for your help. [link] [comments] |
Best virtual network tool for troubleshooting practice? Posted: 21 Sep 2018 09:41 PM PDT Hi, I got my diploma in IT at TAFE a couple of years ago, and am looking to practice fixing various network issues so I can get a job in IT or start a software technician business. What's the best virtual networking program (like GNS3, packet tracer etc) for this task? Also, if anyone knows of a similar thing for actual computer issues, please let me know. [link] [comments] |
Ruckus 7025 / Cisco 3850s / Nexus 7K Posted: 21 Sep 2018 10:15 PM PDT Weird issue at work today we have some Ruckus 7025 devices still in our network and we started having an issue with those devices losing communication with the ZD. When looking at the switches that they are connected to we see the interfaces constantly bouncing. Keep in mind this is property wide across more than 10 switches. We also noticed (not sure if related) the mac address table disappears on the vlan the 7025's use to communicate to the ZD. and other VLANs as well (for ex. admin vlan) on the Core N7K. Any ideas? [link] [comments] |
Network Mesh recommendation across the Mall Posted: 21 Sep 2018 05:08 PM PDT I have 2 business inside a Mall One store can get fiber the other is a Koisk limited to DSL 1.5 MB I want to Beam Wifi to the Koisk What device should I get to and which mode should they be configured to thank you. Inline store is 200 feet from Koisk [link] [comments] |
You are subscribed to email updates from Enterprise Networking news, blogs and discussion.. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment