Our sister site had a new building and the network it was supposed to resemble the network on this site with link redundancy as far as the edge switches.
After 6 months asking for the password to the equipment I finaly got it and started to plan the deployment of some phones, I got a little confused as to the layout of what had been done as CDP was not showing what I had expected.
I then used CNA to map out the site.
We have 1 main server room (at the top of the picture with the two 4507 cores and a number of fixed config 1U switches)
And 3 further wiring rooms at other points in the building with fixed config 1U switches.
(And a wan link to this site)
In my opinion the design as it stands is significantly flawed in redundacny with multiple points of failure, and its efficiency is very poor.
If it were me, and I had total control of what to put in I would do the following.
1) Set up an etherchannel with at least 2 links, have one etherchannel going to one dist switch, and another going to the other. That would you have 4 total physical links for redundancy, but 2 logical.
2) It looked like some of your switches were cascaded from other switches, I would make them have direct access to the dist switch using the same etherchannel setup as above.
3) I don't know how your routing is, but I would try to make sure there are reundant paths between dist and core as well asn between core and core.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...