I recently ran into some problems concerning the use of a Cisco layer 3 switch (3560) as an Internet edge device to perform a simple static route between the customers network and the ISP POP router. Although this device can perform the routing at the edge for Internet traffic, I am concerned that this device has limitations when it comes to functions such as traffic shaping to the subscribed bandwidth of the Metro Ethernet access to the Internet. Since the 3560 could not conform to the 20 Mbps of subscribed bandwidth, any traffic beyond 20 Mbps was dropped causing performance issues with applications that use TCP. I am trying to find design documents or white papers that would either support or not support using a layer 3 switch as an Internet perimeter device instead of a router. I would like to know if Cisco has a specific perspective on this subject and whether or not they would ever recommend actually using a layer 3 switch model that is a 37XX or below? I am interested in any other opinions as well.
If we disregard the budget for a moment, I would like to focus strictly on the technical aspect of using a switch vs a router as an Internet perimeter device.
So far I have the following:
1. Switch performs well as long as the provider delivers service at line rate, either 10 or 100 or 1000 Mbps.
2. Switch will not perform advanced QoS, i.e. traffic shaping.
3. In addition to advanced QoS services a router can also provide NetFlow.
...... Are there any other points when comparing these two types of devices?
Comparatvely speaking, the lower end ISRG2's perform quite well at Ethernet speeds with the 2901 going up to 25 Mbps. Taking these items into consideration, I am looking for someone that can reference a white paper or a best practices document or something of that nature when it comes to enterprise edge design for Internet connectivity over Ethernet. I want to know if Cisco has a documented stated position on this specifically.
The number one rule is understanding your customer business and technical requirements then match the equipment that could do the job. Please note, the business requirement is often overlooked (i.e. we need to encrypt data because we failed our audit).
Hi everyone, I would like to thank you in advance for any help you can provide a newcomer like myself!
Im studying the 100-105 book by Odom and am currently on the topic of Port security. I purchased a used 2960 and I'm trying to follow a...
While deploying a number of 18xx/2802/3802 model access points (APs), which run AP-COS as their operating platform. It can be observed on some occasions that while many of their access points were able to join the fabric WLC withou...
I am going to design and build an LAN network under a tunnel underground with long distance between the switches.
I will have 2 Catalyst switches and 8 Industrial IE3000, and they will be connected with fiber.
For now I am planning on use Layer-2 s...