I am trying to figure out how to leverage two high speed circuits we have.
One of the circuits is 100Mb and the other is 45Mb. We use OSPF for our routing protocol. If you reference the attached file, I am trying to get the 192.168.5.0 /24 address to go accross the 100Mb link to the 172.20.5.0 /24 address. Then I need the 192.168.1.0 /24 address to cross the 45 Mb link to the 172.20.1.0 /24 address.
The idea behind splitting the traffic is that we want to send our less latency sensitive traffic on the 45Mb link and our more important production data on our 100Mb link. In the event that either link fails, we would want all the traffic to traverse the other link.
I had originally looked at PBR with the thought to doing Source-Based routing. Since my two WAN routers are not directly connected, in this situation there is a chance of redundancy failure. One WAN router cannot track the availability of the WAN side interface of the other WAN router. It would then continue to route packets back towards the failed circuit in this scenario based on what I saw.
The other idea I had was to try and modify the routing protocol metrics, but I could not seem to accomplish that. It appeared after testing that the metric was not modified at all after passing through the route-map. If someone has more insight into how to modify the routing metrics at different points along the path, I would love to hear about it.
Any other ideas? Or did I miss something in the PBR section that you had ment for me to notice?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...