Forsaken_GA wrote: » You need to identify specifically what it is you need before anyone can give you any real advice. Do you need a layer 2 link between the two sites? MetroE or VPLS will work fine. Are you going to have a router on each site and you need them to share routes? Ok, then you want an MPLS L3VPN Personally, I prefer layer 3 links. Layer 2 links can do some interesting things... broadcast storms across WAN links are not fun If you do not have a good solid grasp of layer 2 network design, I strongly suggest staying away from a layer 2 circuit.
Forsaken_GA wrote: » If cost is an issue, consider just getting a normal bigger pipe on both ends, and then setting up an IPSEC tunnel between the two end points.
Bl8ckr0uter wrote: » What would be the advantage of going layer 3 vs layer 2 in your opinion (or vise versa)?
I am sure we would want a different internet link (with a different provider) for DR purposes as well as load balancing. To me we could easily solve this by getting a bigger primary internet pipe and then a seperate pipe for replication traffic but that could be because of my lack of knowledge of WAN solutions.
Forsaken_GA wrote: » So get some Netflow collection going on and find out what's happening on your network, then you'll be able to make decisions more intelligently.
Bl8ckr0uter wrote: » You are absolutely correct. I really need to get on that. Do you have any suggestions for some light to moderate WAN technology reading? I downloaded some Cisco design pdfs and I plan on picking up some MPLS pdfs as well. I don't think I am ready for any of the dedicated MPLS books yet but I would like a real world resource for WAN technology information.
Forsaken_GA wrote: » Well, I don't really think this is much of a you need more info on WAN technology kind of issue. Getting down into the nitty gritty details of the tech doesn't really do much to help you. And honestly, for most of the service provider solutions, the customer isn't really involved. The magic all happens on the backend, which you won't have any control over. If you get a layer 2 circuit end to end, as far as your switch is concerned, it's hooked directly to another switch at your other site, and there's no network in between. If you get a layer 3 vpn MPLS solution, all you generally need to do is configure a BGP session to the service provider on both ends, and then you're good to go. I believe you're already familiar with establishing IPSEC tunnels over the public internet. You need to do some more reading on practical network design and management, and there aren't any really good texts out for those, since there's so many different variables, and design/management strategy is ultimately driven by the needs of the business. The Network Administrator's Survival Guide is a good place to start, but honestly, the only real way to learn this crap is to get into it, and make your mistakes, tempered with advice from other folks who've made the mistakes before. The very first thing you need to get a handle on is the traffic flow in your network. If you don't know the types of traffic that are on your network, and the paths they take to move around, you're just flailing in the dark.
Bl8ckr0uter wrote: » I'll pick up the book (8 bucks used on amazon) and take your suggestion. Thanks.
Forsaken_GA wrote: » No problem Things like this is also why I heavily advocate that network guys should get good with Unix. There are so many good and free tools that can make getting the information you need available, but you have to know how to use them. There are some really great Windows based tools (We use Solarwinds Orion here, and I love it), but most of them come at a premium, and the bosses generally like it when I do everything I can to keep capex and opex as low as possible
networker050184 wrote: » If you are going for any kind of bandwidth intensive replication between sites I'd try to get a pipe that is as dedicated as possible. What ever you go with make sure you get a nice SLA with bandwidth and delay guarantees.
networker050184 wrote: » Personally, I'd try to get some dedicated fiber run as my first preference. This option can be very expensive and depends on availability in your area though. Second would be the Metro-E or other type of MPLS circuit. I definitely wouldn't go with IPSEC tunnels over the internet. You probably aren't going to get much of an SLA on that.
Forsaken_GA wrote: » Hehe, virtually none. That's why we use them as a backup option. For a small company though, getting some dedicated fiber may not be an option, especially since they usually want very long contract times. And for DB replication, the SLA gives me someone to yell at, but more money is lost if that data gets too far out of sync than I could possibly recoup for an SLA infraction, so redundancy is a *boatload* more important
networker050184 wrote: » Yeah, but that redundancy doesn't do much for you when your replication fails over the crappy IPSEC tunnel.
Bl8ckr0uter wrote: » Looks like it will be a good read although I am sure it will be a bit dated. I am ordering it in a few minutes. I really need to study windows/servers from a network engineers perspective. Like how things look on the network, spotting trouble, etc. I think the wireshark book will be valuable in that regard. How's gsec going?
Bl8ckr0uter wrote: » I guess i'll tack this on to this thread. For a traffic study is something like a netflow an ok substitute for actual packets or is it best to have the actually pcaps?
Panzer919 wrote: » Who is your current provider? I know an ISP in your area that does Q-in-Q tunnels for these kind of applications.
Panzer919 wrote: » TWCBC does fiber q-in-q tunnels, it would allow you to just have a pipe offsite and on a different network for backups
wolverene13 wrote: » You might as well go with Ethernet. And I'd have to disagree with the assertion that MPLS "just works." MPLS is going to be far more complicated than your typical Ethernet setup (which is normally Q in Q) being that there is much more configuration involved and the Layer 3 aspect is added to the equation.
Forsaken_GA wrote: » From the customer side? The customer usually has very little to do with the MPLS setup. In the case of a layer 3 VPN, there's no special configuration involved on the customer's side of the link, so from that aspect, yes, it just works. The voodoo all happens on the service provider's end.
wolverene13 wrote: » Sorry, I should have clarified. I tend to word things from the provider's perpective. What I meant is that if you want reliability, Ethernet is your better bet. There is much more that can go wrong in the provider's cloud with MPLS being that the provider has to configure much more with MPLS. One little misconfiguration on the provider side can easily hose your connectivity to your other sites or the Internet, but with Ethernet, the provider normally just has a Layer 2 network and uses QinQ tunneling to connect everything, so there is less of a chance that a mishap will occur. Both are pretty much equal with respect to amount of configuration on the customer end.