• Breaking News

    [Android][timeline][#f39c12]

    Saturday, October 31, 2020

    ibgp next-hop-self vs. advertising external links Networking

    ibgp next-hop-self vs. advertising external links Networking


    ibgp next-hop-self vs. advertising external links

    Posted: 31 Oct 2020 09:56 AM PDT

    What are the pros and cons of using next-hop-self or advertising the external links:

    This is what comes tomy mind, but I'm curious what service provider guys think.

    Advertising the external link into the IGP:

    -feels a bit more natural. you just add one more route advertisement to the network, rather than altering the default behavior of bgp.

    -If the external link fails, the border router will withdraw the external routes in both cases. But if the external link is advertised (rather than the next-hop-self command being used), the failure of the link will cause the IGP to withdraw the external next hop, thus the other IBGP routers will also find out through the IGP that something is wrong, and stop using those routes. The IGP is likely to be faster than iBGP, especially when a route reflector is in use. The IGP also only has to withdraw one route versus the potentially hundreds of thousands that iBGP would have to , thus bringing everything down very quickly and allowing for a faster failover.

    Using next-hop-self command:

    - You don't advertise the external links, thus you don't expose that network to any external attacks. At an Internet Exchange, that might be a shared network, and you would not only expose yourself, but also others. It may be that in such a setup the IX would require that you use next-hop-self, but what do I know?

    -You get to choose the next hop addresses. Since these will be very important in your network design, you should take care when you design the network that these are easy to remember. This will make it much easier to read BGP tables, if you know the next hops, whereas if there are multiple peers, you are unlikely to remember the link addresses used to peer with them.

    Later edit: Ok, so the votes so far are for next-hop-self as being the better option. Why, I wonder is this not the default behavior then, and requires a switch to be flipped to enable it? Is this different in other OSes, from different vendors? Do they have this on by default?

    submitted by /u/paulzapodeanu
    [link] [comments]

    Design question: Network Racks

    Posted: 31 Oct 2020 11:09 AM PDT

    Hello guys

    I have a chance to set up a new network room in new construction the way I want to. I want to get one of those "very wide" cabs with cable management facilities built into the sides.

    In this rack, I'm going to have about 4 1U servers, about 200 strands of fiber terminating into a few panels, and likely 2 QFX5100-48S Switches. I'd like to have the cable management on the sides as well as actually rack mounted ones between the QFX's. I picture the patch leads coming from patch panel to the left, into some kind of vertical cable managers, down to the U of the cable manager in between QFX, out into that, then up into the QFX in the right spot.

    What brands+models should I be looking at other than APC and TrippLite?

    Thanks

    submitted by /u/dbh2
    [link] [comments]

    Wireless and Wired Users on Same Vlan

    Posted: 31 Oct 2020 10:06 AM PDT

    So whats the official verdict on this in 2020?

    I've seen it go either way depending on who you ask. Historically, best practice was separate vlans to prevent half-duplex wireless clients getting flooded by broadcast/multicast traffic. But now with BCMC suppression and other features on Wireless Controllers is that a factor any more?

    • Would be nice to have a single vlan/subnet instead of duplicates.

    • Is there any official best practice to check on Aruba WLCs to make sure BCMC is suppressed? I've seen a few different knobs but not entirely sure which combination works well

    submitted by /u/nest11111111
    [link] [comments]

    How many VLANs make sense?

    Posted: 30 Oct 2020 08:58 PM PDT

    Hi all. I've got a new manufacturing customer with approx 225 devices. Fortigate, 8 switches, a point to point connection to another building, maybe 10 servers, and 13 access points. In the past with other clients, VLANing has been set up and I haven't need to touch it.

    I'm thinking management, data, voice, guest, machinery. But, since I have a clean slate to work with, I was thinking about breaking off printers and servers to their own VLANs as well.

    How far do you guys generally go with it? How many is too many? I mean, I could get away with data, phone, and guest and be good with it as I'm not running out of addresses, but just curious as to how you guys think about what NEEDS a VLAN as I'm not extremely verses in best practices.

    Thanks for any input!

    submitted by /u/Alar44
    [link] [comments]

    Setting up a cisco router to a switch for small homelab, seller provided a rollover cable, what else do I need to setup this router?

    Posted: 31 Oct 2020 03:05 PM PDT

    Hey guys, I bought a cisco router and a cisco switch and when I plug the cable going from ISP router into the cisco router, no link lights show up. The seller provided a rollover cable, and I read somewhere that this is this way by default and you have to configure the router to work on your network.

    What do I need to go from ISP equipment -> Router -> Switch?

    Do I need a RS232 to usb cable so I can remote into the router to configure it?

    I'm super new to network equipment so go easy on me lol. Thanks!

    submitted by /u/shanebagel
    [link] [comments]

    Ubiquiti AP- Unifi vs Airmax interesting stats

    Posted: 31 Oct 2020 02:29 PM PDT

    Good Evening,

    I know there's a Ubiquiti page...but I figured this gave us a slightly larger forum discussion. So here:

    I find it very interesting and helpful that Unifi has their design page for rough, theoretical AP signal radiation circles. However, trying to design a deployment that's going to possibly use 80 wifi APs, and working off a very very limited budget that I'm already over, I had an interesting idea.

    My most important aspect in the design is range. I don't need any users getting any serious speed (10mb/s is plenty), but I need to hit a lot of clients. Rocket M5 radios are cheap right now...like $20 a radio. Look at these stats, and then maybe people can weigh in how far these are realistically going to shoot. I'm only comparing 5Ghz bands so I get apples for apples here.

    1. Unifi Mesh AP Pro $199

    8dBi antenna with 22dBm transmission power

    1. Airmax Aircube AC $75 (but stock is hard right now)

    5dBi antenna with 23dBm transmission power

    1. Airmax Rocket M5 Radio $20 plus omni directional antenna

    27dBm (omni can't handle that, but still) with 10-13dBi antenna

    What makes the Unifi all that much better? Range is most important to me here...although obviously cell phones and laptops only fire so far.

    Wouldn't the unifi and aircube be pretty close in range here?

    The Rocket should have the largest range by far albeit a speed cap because of the 100mb/s port, agreed?

    Thanks

    submitted by /u/Sassriverrat
    [link] [comments]

    Looking for advice on spanning tree configuration when connecting with someone else's network

    Posted: 31 Oct 2020 04:49 AM PDT

    Hi all,

    We rent a rack in the datacenter and have a fairly simple setup with a pair of ToR switches connecting to the servers. We currently use RPVST+ as spanning-tree mode. Currently however, no settings are made with regards to the spanning tree priority. Everything runs on default. We get the occasional topology change message, but it hasn't given us any noticable issues.

    We are having some growth however and are now looking at renting a second rack. I've been reading up a lot on best practices since we have a "new chance" with the new rack and I would like to do it right. This post has been very informative on that: https://www.reddit.com/r/networking/comments/7rguqi/about_stp/

    Since we are so small we do not have separate core/spine switches. It's just two racks with ToR switches and two cables in between the racks that we can configure with LACP for redundancy so we can do communication between the two racks. I realize this is not ideal but budget unfortunately at this point does not allow for setting up a network in a spine/leaf model. This is something I'm also still reading up on and I think if we grow further to a third/fourth/etc... rack we would need to build something like that since otherwise we cannot really scale well, but at the moment it is not possible.

    Above some context on what we are running now... Now my actual question is: I am unable to find what the best practices are when connecting to another network. I have two concrete examples:

    1. The uplink ports to the internet will be redundantly connected through LACP and the uplink is on a tagged vlan. However of course "behind" this port on the ISP side are a whole bunch of routers/switches/etc... to connect to the internet and I would assume they all have their own spanning-tree priorities and configurations that I am unaware of. How do I ensure that does not conflict with my own configuration, i.e. the ISP networking becoming the spanning-tree topology root? Should it be an "edge" port? Should it have bpduguard? Or other setting?

    2. Somewhat similar to the above; we also have some connections to other racks in the datacenter. Sometimes this will be a LACP connection, sometimes just a single cable to a switch with a tagged VLAN. These other racks are outside of my control and are being ran by a completely different organization. Of course their switches also have their own spanning tree configuration I know nothing about. We just use those connections to access a few IP-addresses over a direct line instead of having to do that through the WAN link. I tend to think they should be configured as "edge" port with bpduguard but the cisco docs suggest otherwise:

    Warning: portfast should only be enabled on ports connected to a single host. Connecting hubs, concentrators, switches, bridges, etc... to this interface when portfast is enabled, can cause temporary bridging loops. Use with CAUTION

    Could anyone suggest what is the best practice for these type of connections?

    Thank you!

    submitted by /u/KamiNuvini
    [link] [comments]

    L2TPv3 not on Cisco 9300?

    Posted: 31 Oct 2020 12:06 AM PDT

    Our network has grown and is a mess of vlans : ospf / dhcp relays / etc. I've been reading up on network overlays and was excited to try L2TPv3. Got ready to set it uo on a Cisco 9300, and it wasn't an option. 'MPLS' is the only encapsulation option on 'pseudo wire'.

    Was hoping to claw back up IPv4 pools for a bunch if vlans and make some bigger pools in the data center. Any suggestions?

    Goal: leave native IPv6 everywhere/distributes get IPv4 centralized.

    submitted by /u/sfxsf
    [link] [comments]

    EVE NG | failed to write configuration file

    Posted: 31 Oct 2020 04:24 AM PDT

    Couldn't find anything on Google about this so I thought i share:

    I wasn't able to save or erase config on the IOL routers in EVE:

    R1#wr
    Building configuration...
    % failed to write configuration file[OK]

    R1#wr er
    Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
    % failed to write configuration file[OK]
    Erase of nvram: complete

    I exported the config and cloned the lab. Then I was able to save again. Thank you, colleague!

    submitted by /u/wilziak89
    [link] [comments]

    Firewall Core

    Posted: 31 Oct 2020 03:54 AM PDT

    Hello!!

    Is it a good or bad idea to use firewalls as a core?

    I would plug 3 switch stacks to them. 4 VLANs, 300-400 users max. They already have 2x Meraki MX100 for SD-WAN. 750Mbps throughput and they have an MPLS circuit + 1Gbps Internet breakout circuit. Corporate VPN traffic flow on top of the MPLS and Internet traffic gets out locally on the 1Gbps circuit. All their services are in our DC so very low traffic between VLANs.

    I had the idea of buying a Core but our company is Cisco only and these 9400-9500 core switches are just too expensive. I'm not sure it's worth the price for them.

    MX100 only supports SFP, no 10G. They don't support port channels as well so we're looking at 1G connections from the switch stack.

    Let me know your thoughts!

    submitted by /u/Jubacho
    [link] [comments]

    Anyone use Packet Fence for NAC in an Enterprise environment?

    Posted: 30 Oct 2020 04:52 PM PDT

    We have about 15 sites, 2200 clients, not including servers and such. Anyone have experience with Packet Fence for network access control? What are your thoughts on this product?

    submitted by /u/stlmnstr
    [link] [comments]

    Moving routing to our core router

    Posted: 30 Oct 2020 05:48 PM PDT

    We have a core router, CR1, which is the gateway for our main subnet/vlan 1 and a separate physical router ,SR1 , which routes a secondary subnet. The secondary subnet was only added to extend available addresses. There is no need to separate them with a firewall. My goal is to remove SR1.

    CR1 address 192.168.1.1 routes 192.168.1.0/24 SR1 address 192.168.2.2 routes 192.168.2.0/24

    From my research I believe all I need to do is to make sure vlan 1 on CR1 has a secondary address such as 192.168.2.1 and then update all the clients on that subnet to point to this address for gateway. I would say I have intermediate knowledge of networking. I get confused with routes/when a static route is needed. Is there a route I need to confirm as well? Does adding a secondary address cause any disruption for vlan1 traffic?

    submitted by /u/Rock844
    [link] [comments]

    Startup config

    Posted: 30 Oct 2020 05:25 PM PDT

    Is it better to wipe startup config clean, load image, and load config or can you just copy over startup config with new config needed and avoid wiping the iOS on the switch?

    submitted by /u/dv8_z1d
    [link] [comments]

    No comments:

    Post a Comment

    Fashion

    Beauty

    Travel