TesseracT wrote: » Hey guys I'm not sure if this is the right forum for this but it is a design question + I'm studying for the DA and DP as we speak. We're using a basic hub & spoke topology / star topology here at work and I'm wondering if there's any way to improve it. At the core is an ASA which all the satellite offices connect to (around 10 remote offices). These offices all connect back via an IPSEC site to site VPN and in most cases the satellite offices can communicate with eachother. This is all done via static routes Is there a better way of doing this? MPLS would be nice but way too expensive. Also, these offices are literally all around the globe each in a different country. DMVPN would be nice but not available for the ASA as far as I'm aware. Can an IGP be used here in the place of static routes? Considering the topology and the fact that site to site tunnels are used here I'm not really convinced that it's an option. What would you guys do in this situation? Everything works ok at the moment but wondering how scalable this solution is if we hit some fast growth...
TesseracT wrote: » Thanks for bringing me back to reality guys I think I'm reading too much design stuff at the moment so I feel the need to over-engineer everything. The network is running fine as well, I just thought there was maybe a way to clean up the config on the ASA. I guess it's still pretty tidy though, compared to how many site-to-site tunnels you can create on these things. I guess just after doing the CCNP and studying for the CCDP I wan't to put my knowledge to the test... I just guess that my production network isn't the place for it must. resist. urge. to. break. network.
Forsaken_GA wrote: » A few years of experience, and you start looking at the texts in a different light - as you're reading, instead of thinking 'wow, that sounds cool!', you start thinking 'what kind of crack are they on, if I did this, it'd break this, this and this' or 'great, more cisco marketing drivel, skip!'
TesseracT wrote: » yeah, some of the design 'best practices' have me scratching my head a bit. I'm not sure if it was in the CCDA or CCDP guide but I remember reading that you should confine 1 VLAN per access layer switch rather than spanning multiple VLANs across them... what? How the hell are you meant to separate voice and data traffic then? I can see it might be useful in some rare cases but nearly all the networks I've worked on need multiple VLANs accross the access layer.
Forsaken_GA wrote: » Take the CCDA/DP material with a grain of salt. I am not a fan of the Design track (and I *am* a CCDP), because they do far too much cheerleading for Cisco solutions. As I was reading through the material, I was sitting and thinking of other solutions to the problems they were presenting. Non-cisco solutions. Papa John does not always know best. In particular, I had serious issues with their firewall and security solutions. Most of their security solutions are EOL, and given the transitory nature of Cisco security products, you have to be absolutely brain dead or getting one hell of a kick back to try and sell your management on it. I'm also not a fan of their load balancing solutions. I can do much better with F5's, or even a linux box. The design material has some good information in it, but learning how to seperate it from the marketing bullshit is a challenge. For anything outside of routing and switching, always always ALWAYS look for solutions that will cover your needs that may not be imprinted with the Cisco logo.
Forsaken_GA wrote: » Understand completely. I have to rein myself in when it comes to play with new tech, or new concepts as well. I got into some heated arguments because I wanted to implement 802.1x network wide. I thought it was a good idea, and I wanted to see it actually work (that was not my argument of course, security, authentication, the lifeblood of the company, blah blah blah. I thought it was cool. I wanted to do it. My entire motivation, regadless of what I said to those above my paygrade). Well when I was told no, I decided to go ahead and implement it in my own lab. After the pain in the ass of making RADIUS work with LDAP (the x509 certs are, comparatively, painless), I'm rather glad they told me no. It's not a trivial project, and has far reaching consequences. That's the one thing about reading all these books on tech. They never tell you about the real world side effects of all this crap, save for Network Warrior. A few years of experience, and you start looking at the texts in a different light - as you're reading, instead of thinking 'wow, that sounds cool!', you start thinking 'what kind of crack are they on, if I did this, it'd break this, this and this' or 'great, more cisco marketing drivel, skip!'
shodown wrote: » i would have wanted to strangle you. A site I was working a VOIP install, they wanted to implement it for 2500 users they maybe had cisco guys in the entire building on top of supporting 2 networks, with wireless for both and around 5 remote sites (1 of them 500) users some security person got the idea to do this. As a contractor doing voip I even had to get involved in the push back. She eventually backed down, but she had strong support for a while, but that many changes on the switches, plus all moving around that is normally done there would have made that place a nightmare.