You have a number of choices available to you, see the multihoming white paper on my web site for an overview. Whether or not you need to use BGP will depend upon what applications you are supporting and what your performance requirements are. If you are not using BGP, you have two challenges which you need to resolve: how to let ISP 1 know how to get traffic to you sent from your ISP 2 address (ditto for ISP2) and how to discover that the link to ISP1 is down so you (and ISP 1, don't forget traffic must go both ways to work) know to use the route via ISP 2 (and, of course, ditto for the link to ISP 2).
You also MUST add some protection to your router if you want to keep it under your control. In particular, turning off telnet, SNMP, and other vulnerable services, blocking illicit traffic from the Internet, etc. You would probably find Chapter 8 of my book interesting reading as well, although it may be too advanced. But it does include working examples of router security, BGP multihoming, and multihoming without BGP.
Hi everyone, I would like to thank you in advance for any help you can provide a newcomer like myself!
Im studying the 100-105 book by Odom and am currently on the topic of Port security. I purchased a used 2960 and I'm trying to follow a...
While deploying a number of 18xx/2802/3802 model access points (APs), which run AP-COS as their operating platform. It can be observed on some occasions that while many of their access points were able to join the fabric WLC withou...
I am going to design and build an LAN network under a tunnel underground with long distance between the switches.
I will have 2 Catalyst switches and 8 Industrial IE3000, and they will be connected with fiber.
For now I am planning on use Layer-2 s...