Your question could be : is it wise to have many remote sites branch reachable via a single IP subnet ?
There are some drawbacks: some routing protocols like OSPF or EIGRP have limitations on the maximum number of neighbors that can be in the same broadcast domain for the way they work.
Control of multicast traffic flowing to the branches can be minimum if all of them are in the same subnet.If a multicast group has to be sent out on the VPLS attached interface it can reach all the sites even if not necessary.
QoS application also can be a problem: using hierarchical qos with two levels of service policy can be a problem on the hub routers if the number of remote is 200 or more.
On the other hand if remote sites need any-to-any connectivity it will be there.
But usually remote sites need to talk much more with headquarters to contact company wide servers of any kind.
I would suggest to use multiple subnets if the number or remote sites is more then 40.
Many thanks for the very usefull update. Yes you have understood my question correctly.
Yes I understand that it could be a problem with large number of spoke routers. But , what I thought was something like follwos;
If I have 200 remote branches, rather than to have 200 differant VPLS instances one per each branch , I can have few VPLS instances, for example, I can have about 40 remote branches in one single VPLS subnet.
In this way I can avoid large numbers of VPLS instances creation at the head office.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...