Hi All, wondering if someone could lend some ideas for a highly redundant network architecture I'm working on. I'm doing this mostly to help me on my path toward CCNP, but this could also serve as a template for a redundant branch office. My questions revolve around how to best handle redundancy with the L3 Switches, ASA and ISP connections.
My first thought was to use GLBP on the pair of switches and setup an Active/Active ASA cluster with IP SLA. I'm not looking for step by step config info, just general concepts to push me in the right direction. Diagram attached. Thanks!
Thanks Leo! Cisco is need of a curriculum update then because all they talk about in CCNP Switching is HSRP, VRRP and GLBP. :)
Great stuff though and this is exactly why I post. People like you come up with entirely new and different ways of getting from A to B. I also learned that ASA v9.x now offers clustering. http://www.youtube.com/watch?v=0fm_v5kHqMU
Leo, similar but not the same! :) If you notice, he's only providing redundancy at the ASA/ISP level (probably tracking). My design provides redundancy at that level and at the core switch level using GLBP, HSRP/VRRP or switch clustering. However, both are likely based off the many similar designs one would find in their CCNP studies, thus the similarities.
On another note, I'll be taking my CCNP Switch 642-813 test next week. Cheers!
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...