I have 4 remote sites on FR connections coming back to the head office on ATM. Each site has one voice, three data and one management VLAN. All VLANs are trunked with dot1Q.
My frame-relay/ATM provider is upgrading us to a product which amounts to a metro ethernet type solution, with remote branches running at 10Mb/s and the central office being 45Mb/s. There isn't enough room here to ask the questions I have in my head, but here are a few things I am in a quandry about.
1. Should I simply move the meat of my current branch router configs to L2/L3 capable switches, transfer all of the VLAN data to them and make one interface the routed one.
2. VTP? Is there any downside to running it in server mode at the core central office and client in all of the branches.
3. I have SRST for my voice system setup through analog lines in each branch connected to fxo/fso modules in each router. Is there anyway to do SRST without a router sitting in each branch?
If you can think of other issues I may run into, please let me know.
One thing that you'd better not do is spanning your vlans across a WAN link, not even when it's ethernet. This will make your broadcast domains too large and result in bad response and all kinds of other problems. Hence, also no vtp across the WAN. keep your vtp domains local, one per site.
The best way to utilize such a link is as a routed connection. You can use routers or L3 switches for this.
My plan was to definitely route on the Cat 3560 switches in each branch. But I haven't done this before so I am pouring over Cisco docs to see what to do after I execute the "no switchport" command. Is L3 configuration as versatile as with a router when you have the EMI image installed?
"Is L3 configuration as versatile as with a router when you have the EMI image installed?" I would say it is, at least it knows eigrp and ospf which are both suitable as routing protocols for this environment.
Instead of putting in "no switchport" you may also implement the entire Metro-WAN as one vlan. Using ports in access mode gives you untagged traffic and is virtually identical to the above. I personally find this solution gives more structure to the config than working with "no switchport".
When you say "implement the entire Metro-WAN as one vlan" how would I then handle the segregation of my trusted data and voice traffic from my untrusted data and wireless traffic. I achieve the isolation now by having multiple vlans in each branch, encapsulated and sent through ethernet subinterfaces on a router.
Something else just struck me...the routers all have a Loopback0 configured like this:
ip address 172.18.180.254 255.255.255.0
h323-gateway voip interface
h323-gateway voip bind srcaddr 172.18.180.254
Is this config required or possible or needed on an L3 switch?
[toc:faq]The ProblemOn traditional switches whenever we have a trunk
interface we use the VLAN tag to demultiplex the VLANs. The switch needs
to determine which MAC Address table to look in for a forwarding
decision. To do this we require the switch to do...
[toc:faq]Introduction:Netdr is a tool available on a RSP720, Sup720 or
Sup32 that allows one to capture packets on the RP or SP inband. The
netdr command can be used to capture both Tx and Rx packets in the
software switching path. This is not a substitut...
IntroductionOSPF, being a link-state protocol, allows for every router
in the network to know of every link and OSPF speaker in the entire
network. From this picture each router independently runs the Shortest
Path First (SPF) algorithm to determine the b...