Network Design Cookbook
Network Design Cookbook
No part of this book may be reproduced in any form or by any electronic or mechanical
means including information storage and retrieval systems, without permission in writing
from the author. The only exception is by a reviewer, who may quote short excerpts in a
review.
May 8, 2011
CCDE, CCIE, CCDP, CCIP, CCNP, CCVP, CCSP, CCDA, CCNA, CCENT, Cisco, Cisco IOS, Cisco Systems, the Cisco Systems
logo, and Networking Academy are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and
certain other countries. All other trademarks mentioned in this document or web site are the property of their respective owners.
Start Here - Introduction - 3
Michel Thomatis, CCIE #6778 (15 year) - Chief Network Architect & Lead Trainer
Michel has spent the last 18 years as a network engineer/architect. As a 15-year CCIE, Michel loves the
opportunity to provide training in a wide-array of network technologies. He formerly worked at Cisco, as
well as in government, banking, and non-profit organizations. He has published the “Network Design
Cookbook” and a science fiction novel called “The Dark End”. He has also published various iOS
applications (virtual Network Engineer, Circlefalls) that can be found on Apple’s iOS App Store. Other
software development experience includes python and SDN. Currently, Michel is the owner, Chief
Network Architect and Lead Trainer at RouteHub Group, LLC.
4 Start Here - Introduction -
Table of Contents
Start Here ................................................................................................................................................................... 1-6
Introduction ................................................................................................................................................................ 1-6
Design Process .......................................................................................................................................................... 1-9
Design PODs ........................................................................................................................................................... 1-11
Example ................................................................................................................................................................... 1-16
1. Frameworks .................................................................................................................................................... 1-71
1.1 Data Center........................................................................................................................................... 1-72
1.1.1 Spine-Leaf CLOS ............................................................................................................................. 1-80
1.1.2 Traditional 1-Tier Topology .............................................................................................................. 1-84
1.1.3 Traditional 2-Tier Topology .............................................................................................................. 1-85
1.1.4 Top of Rack (ToR) ............................................................................................................................ 1-89
1.1.5 Add-On Switches.............................................................................................................................. 1-90
1.2 LAN / Campus ....................................................................................................................................... 1-91
1.2.1 Traditional 1-Tier Topology .............................................................................................................. 1-96
1.2.2 Traditional 2-Tier Topology .............................................................................................................. 1-97
1.2.3 Add-On Switches............................................................................................................................ 1-100
1.3 WAN.................................................................................................................................................... 1-101
1.3.1 Single WAN .................................................................................................................................... 1-106
1.3.2 Dual WAN ...................................................................................................................................... 1-108
1.4 Internet ................................................................................................................................................ 1-111
2. Solutions ....................................................................................................................................................... 2-120
2.1 Collaboration ....................................................................................................................................... 2-122
2.1.1 Voice .............................................................................................................................................. 2-123
2.1.2 Messaging ...................................................................................................................................... 2-146
2.1.3 Call Center ..................................................................................................................................... 2-151
2.1.4 Conferencing .................................................................................................................................. 2-156
2.1.5 Presence ........................................................................................................................................ 2-159
2.1.6 Video .............................................................................................................................................. 2-162
2.2 Computing........................................................................................................................................... 2-165
2.2.1 Cloud Computing............................................................................................................................ 2-166
2.2.2 Unified Computing .......................................................................................................................... 2-170
2.3 Load Balancing ................................................................................................................................... 2-174
2.3.1 Local - Load Balancing ................................................................................................................... 2-176
2.3.2 Global - Load Balancing ................................................................................................................. 2-179
2.4 Network Management ......................................................................................................................... 2-180
2.4.1 NMS ............................................................................................................................................... 2-182
2.4.2 Deployment Management .............................................................................................................. 2-183
2.4.3 Security Management .................................................................................................................... 2-184
2.4.4 Desktop Management .................................................................................................................... 2-185
2.5 Optimization ........................................................................................................................................ 2-186
2.5.1 WAN Optimization .......................................................................................................................... 2-187
2.6 Security ............................................................................................................................................... 2-190
2.6.1 General Security............................................................................................................................. 2-195
2.6.2 Firewall ........................................................................................................................................... 2-199
2.6.3 VPN & Remote Access .................................................................................................................. 2-210
2.6.4 Identity Control ............................................................................................................................... 2-219
2.6.5 Encryption ...................................................................................................................................... 2-227
2.6.6 Advanced Threat Protection ........................................................................................................... 2-228
2.6.7 Web Security .................................................................................................................................. 2-230
2.6.8 Mail Security ................................................................................................................................... 2-232
2.6.9 Remote Desktop Security............................................................................................................... 2-236
2.6.10 DNS Security ............................................................................................................................. 2-237
2.6.11 Endpoint Security ...................................................................................................................... 2-238
2.6.12 Cloud Security ........................................................................................................................... 2-240
2.7 Software Defined Networks................................................................................................................. 2-241
2.7.1 Data Center (SDN) ......................................................................................................................... 2-242
2.7.2 WAN (SD-WAN) ............................................................................................................................. 2-246
2.8 Storage ............................................................................................................................................... 2-247
Start Here - Introduction - 5
Start Here
Introduction
Before you get started, I want to talk about how to use and navigate throughout the design cookbook in
this new edition. The network design cookbook has been a personal project on mine ever since I started
out in the networking field more than 20 years ago. My biggest personal attributes have always been with
structure and organization. I constantly try to build structure and organize every aspect that I interactive
with. Especially in areas that I am deeply passionate about such as networking. The biggest problem
that I saw in the networking field at the time, including today, is the lack of structure to build and design
networks.
It involved selecting design modules and connecting them together based on what was required. I
continued this approach for several years which eventually evolved into the first edition of the network
design cookbook.
Start Here - Introduction - 7
However, I wanted to improve on this structure further and I determined the root issue that my design
cookbook never addressed ........ why do network diagrams look so different from one another?
I have seen hundreds of diagrams over the years. Many of them I have always pondered on what the
diagram was trying to accomplish and why it was so different from what I would typically do.
I wanted the ability to provide a design structure that could be used to build a network design in several
different ways to mirror what could be produced with the different design diagrams out there. This
required me to look deeper into the problem to determine why network designs were not universally the
same. And it didn't take long to figure out exactly what was going on. With the hundreds of diagrams
that I have seen, many of them I agreed with the approach taken. While there were other diagrams that I
always questioned. Well, the answer was quite simple. Those designs I questioned were built in a way
that I would never do. And the diagrams that I agreed with simply mirrored what I would typically design.
That doesn't mean that the other diagrams were designed incorrectly, it only shows that there are many
ways to complete a network design. This was something I touched upon briefly in the first edition of the
network design cookbook.
A network design will be based on three main aspects: Requirements, Recommendations, and
Preferences
The individuals involved in the design process will typically be the following:
• Business Owner / Management / Other
• Engineer / Administrator / Technician
The requirements will typically come from the business owner, management, or some other group. They
will tell you what they need accomplish such as Internet access or that the users need to access a server
located at a different office. They will typically not give you any recommendations or preferences.
The recommendations and preferences will typically come from the network architect/engineer who is
tasked to build the design. These will be based on that engineer's experience and what has worked for
them in the past including their current skill set. They will have preferences for the type of hardware that
should be used to even the type of topology that will be deployed.
8 Start Here - Introduction -
For example, I have met network engineers who were very fearful of any Layer-2 configuration involving
VLANs, Trunking, to the dreadful Spanning Tree Protocol. I say dreadful because those network
engineers suffered major broadcast storm outages that brought down the entire network. That is
considered as an experience that the engineer will avoid at all cost in the future. Therefore, all of their
designs will involve a Layer-3 only topology with limited Layer-2 configuration. From their perspective,
they would not recommend using Layer-2 topologies due to possible broadcast storms. They are
speaking from experience and that will dictate the type of design they will deploy moving forward.
For me, I recommend Layer-2 topologies if the requirement calls for it. I have seen broadcast storms in
the past due to misconfiguration on the network switches. Again, based on my experience as a network
engineer.
This is the main reason that one design will be different from the next. The design will vary based on the
recommendations and the preferences of the network engineer who is building that design. With that
understanding, I revisited my design modules approach and organized it in a way that a network engineer
can make a choice for which module to use based on the business requirements and their own
professional preferences.
Here is an example for one of these design PODs and what they can provide:
This shows two Internet PODs and what that specific topology looks like. One POD shows one edge
router connecting to two ISP clouds and another POD shows one ISP cloud connected to dual edge
routers. If you believe that the ISP is typically the root cause for issues then the single router dual ISP
POD is what you may consider. If you believe that the router hardware is the likely cause of any issue,
then you may consider the dual router with single ISP POD for the Internet topology.
There are other PODs listed providing different scenarios that can be considered. In a nutshell, that is the
structure of the network design cookbook recognizing that each design can be different.
With that discussed let’s dive in and explain the design structure at a high-level and how it is integrated
within the design cookbook.
Start Here - Design Process - 9
Design Process
The network design cookbook is broken up into several sections in numbered order and below reflects
the flow for how a design should be completed:
• Framework
• Solutions
• Services
• Attributes
You first start off by building the framework of the network which can be a LAN, Data Center, WAN,
Internet, and/or Service Provider. All other solutions and services will overlay on-top of the framework.
You can treat the framework as the structure of a house. You can't put in the kitchen and furniture until
the structure of the house is built.
Once you complete the framework, you need to determine what other solutions will be used on-top of this
framework to provide a certain capability to the environment. These solutions can include Voice, SDN,
Firewall, to maybe WAN optimization. You can treat "Solutions" like the actual rooms in the house such
as the kitchen, living room, bedroom, to several bathrooms if needed.
Next, you want to determine what services will be deployed on-top of the framework and solutions
previously determined. These services can include Routing, Switching, VPN, to SNMP among others.
You can treat services like the actual furniture that exist inside the various rooms in the house such as
chairs, tables, a bed, stove, and so on.
10 Start Here - Design Process -
As you navigate your way through the design from foundation, solutions, then to services you will need to
consider what attributes the network will have. This isn't something that is done first or last, but in
conjunction (when needed) along the way. This will include attributes such as naming standards, IP
addressing standards, to what type of bandwidth services will be used between the various components
in the design. Using our house example, this would be how each room is organized and knowing where
to find something. For example, one cabinet in the kitchen will hold all glasses and another cabinet will
hold all pots & pans. This can be extremely valuable because if we need to locate something, we know
exactly where to go within the house to get it.
Start Here - Design PODs - 11
Design PODs
Now that you understand the design process, let’s go deeper and talk about what you will see in those
sections. Everything will be represented as a POD and there is different type of PODs that will be used in
design cookbook:
• Summary POD
• Basic POD
• Advanced POD
• Grid POD
• Configuration POD
A Summary POD will show all possible design PODs we can choose from. Some of the frameworks,
solutions, and services will have several PODs, so this can provide a type of legend for knowing all
possible PODs within that section. Below shows a summary of all possible Frameworks we can use:
Another type of POD in its simplest form is called a "Basic POD". There are other PODs that look like
this and will provide more information that we can use. Within this POD you will see three sections.
There is the title, the POD ID, and design items.
The title reflects the name for that actual POD. The POD ID is how this design POD is identified within
the design cookbook. This information is important because some PODs may require other PODs to be
selected first.
12 Start Here - Design PODs -
The design items will present a series of questions or resources that we can reference to determine if this
POD is needed or not. This type of POD will have a "When to use". This will outline the best scenario or
use-case for choosing that POD. This item provides the greatest value and proves why network designs
can be different.
There is another item called "Sub-PODs". This means there are additional design PODs that need to be
looked at and chosen for the overall network design. It may be informational or provide details for how
the design should be deployed.
Bringing all of this together and looking at an example Basic POD, this POD is for a LAN / Campus
framework. Its POD ID is "LAN". We should use this POD if we are building a network that will be heavily
focused on user endpoints. Therefore, if this POD will be used, we need to go to section 1.2 to continue
building the LAN design.
This will lead us to another POD type called the "Advanced POD" as shown below:
This will mirror the Basic POD, but it will provide a lot more details. The most noticeable addition is the
diagram picture. This shows a picture of the actual topology that is being referenced in the design POD.
This can provide us a picture that we can draw out and connect with other PODs that we chose along the
way.
Besides the diagram picture being included in the Advanced POD, it will show other design items such as
Prerequisites, Required, Components, and Description.
• Prerequisites means that one (or more) other design PODs are required before selecting this
POD. It will show the actual POD(s) based on its ID.
• Required means what other PODs must be added to our design process to be completed
• Components reflects the main network devices that are used in the POD and referenced in the
diagram picture
Start Here - Design PODs - 13
• Description explains the actual topology that is used in the POD and what is shown in the
diagram picture for reference
Bringing all of this together, this is a LAN Advanced POD for a Traditional 2-Tier LAN with a POD ID of
LAN-2T. We should use this POD if our LAN will consist of 48+ endpoints. Or if there will be multiple
wiring closets where the network equipment will be located.
In order to use this POD, we must select the "LAN" POD which is why we are here to begin with. And
using this POD will require the "Switching" POD (POD ID of SW).
This POD will consist of a Core switch and one (or more) access switches which we see in the provided
diagram picture and outlined in the description. We also see that this POD has additional PODs that we
need to look at for building our LAN. Therefore, we would need to go to section 1.2.2 within the design
cookbook where other PODs will be listed.
These PODs will either list a vendor solution or maybe a general best practice. For example, in the Grid
POD shown above, this will list vendor solutions that we can choose for a Load Balancing solution. It will
show the vendor and the product followed by "when to use" info for consideration.
For example, if we are building a local load-balancing solution then we need to determine which vendor
solution will be used for the components in that load-balancing POD. We need to select only one, so we
can use the F5 BIG-IP LTM for the load-balancing component in that topology.
14 Start Here - Design PODs -
These will provide details for how the network devices should be configured within that POD and
topology. There will be up to three type of configuration sections available:
• Required: this means configuration that is required on one (or more) network devices in order for
it to be operational
• Recommended: this will provide a list of recommended configuration or best practices to add to
the network devices in that POD if applicable. These are not required only recommended for
increase security and stability.
• Optional: this will provide a list of features and options that may be used in the topology.
The Configuration POD above is from the Local Load-Balancing POD section and what you can expect.
Start Here - Design PODs - 15
Lastly, there will be other sections in the design cookbook that will list design concepts for various
technologies such as IPv6, QoS (example below), to Security.
This will outline how to design those solutions/services by providing a unique design standard that is
established in the design cookbook.
16 Start Here - Example -
Example
We will now go through a simple example that will bring everything together and show how to use the
design cookbook to build your own design.
Here is a list of simple requirements and preferences that we will reference for this design:
• 100 Users
• Room: MDF (1) and Wiring Closet (1)
• Internet
• LAN
• Cloud Computing
• Wireless
• Hardware: Cisco (Switches, Routers), Fortinet (Firewall)
• No redundancy
(Step 1) Framework
First, we need to build the framework of our network. Therefore, we need to go to the "Framework"
section:
We need to select one (or more) of the following PODs. Here we would look at each POD and choose all
that apply based on the business requirements and/or our preferences.
Start Here - Example - 17
Looking at the available options, our network will heavily be focused on user endpoints and we do not
have any remote sites. But we do require access to the Internet. Therefore, we will select the LAN and
Internet PODs
• LAN POD
• Internet POD
Each of those has Sub-PODs available, so let’s complete the LAN POD first before we do the Internet
POD. Therefore, we need to go to section 1.2:
Once we go there, we need to first determine what vendor will be used for the network devices in the LAN
POD. My experience is heavy with Cisco router and switches, so the primary vendor will be Cisco. This
means using either Cisco Catalyst, Small Business, or Meraki Switches ideal for 100 user environments.
18 Start Here - Example -
As we move down the page, we get to the main design PODs for the LAN.
This will show a summary POD reflecting three possible PODs we can choose from and we can only
choose one of them. Again, we will look at each of the available PODs reading it’s "When to use" design
item.
Start Here - Example - 19
We will select the Traditional 2-Tier LAN POD since it is the most common and that there will be multiple
wiring closets with network devices.
Choosing this POD, we see that we need to previously select the "LAN" POD which we already did. And
we see that the "Switching" POD is required for this LAN topology.
20 Start Here - Example -
Selecting that POD, there are additional PODs available. Before we do that, there are add-on PODs we
could add this existing LAN POD:
Here we can select one (or more) of the following PODs. These are only applicable if you are using a 2-
Tier LAN which is what we will use. But among these add-on PODs we do not require a dedicated switch
for the server endpoints. There will be a few servers and they will be plugged directly into the Core
switch. We also don't require a dedicated switch for our network solutions like a firewall or WAN router.
We can plug those components into the Core switch. Furthermore, we don't have any requirements or
need for a custom switch to provide a specific function. These decisions are based on my preferences
and experiences. We don't need to add more hardware that isn't needed.
However, if you as the network architect want to use separate switches for network services or the server
farm then you can easily include that to your design. That is another example that shows why each
network design will be different and the available PODs listed shows the many possible ways how a
network can be built.
Start Here - Example - 21
Anyhow, since we don't have a need for any of these add-ons we can complete the design for the Tier-2
LAN, which has sub-PODs (section 1.2.2).
This will show different ways how our Traditional 2-Tier LAN can be deployed. The summary POD shows
5 possible options and we need to select one of them.
Our network doesn't have any redundancy requirements, so that will eliminate half of these PODs such as
"Physical Topology with FHRP", "Physical Topology with VSS" and "Physical Topology with
Chassis/Stack".
The "Unified Topology" is not a specific preference of mine plus some of the equipment will exist in
different rooms.
22 Start Here - Example -
This will require fixed-based Cisco switches for each of the components in the LAN POD. Using a
chassis-based switch or a stack-based switch is not required for our topology. Since there are no
available Sub-PODs we are done with the LAN POD. Below reflects what our LAN in the topology will
look like:
The number of access switches will depend on the port capacity and where they will located in the
building.
Start Here - Example - 23
Since the LAN is completed, we need to complete the Internet POD by going to section 1.4
Again, just like the LAN POD, we need to determine the vendor that will be used. This will only reflects
router if our chosen POD will consist of a router component. For now, we will use Cisco for the router
device and lets continue on until we get to the main PODs:
This will have several available PODs that we can choose from based on the summary POD. By looking
at the name some will consist of a router or firewall or both. Some of these PODs consist of redundant
routers, firewalls, and/or ISP. It is important to go through each POD to determine the best POD to use.
24 Start Here - Example -
For us, we don't have any redundancy requirements and I want to consider a firewall appliance instead of
a router device. Therefore, we will select the "Single Firewall & ISP" POD:
The prerequisite to use this POD is the "INET" POD which is what we determined initially. But we see
some requirements that must be added:
• Routing POD (POD ID: RT)
• NGFW appliance (POD ID: SEC-NET-FW)
• NAT POD (POD ID: NAT)
There are no additional Sub-PODs to choose from, therefore, the following diagram would be our Internet
topology and how it would be connected into the LAN Core which was mentioned in the description:
Start Here - Example - 25
The Internet POD also has some add-on PODs for including a DMZ or a custom network:
In our environment, we do not have any unique requirements for these additions to the Internet POD.
(Step 2) Solutions
Now we can determine what solutions should be added on-top of our Internet and LAN topology. This
means we need to go to section 2 to see our available options:
There are a lot of possible solutions that can be deployed and we can review each of these PODs to
determine which ones are required. For our example, based on the business requirements we know that
the environment will be using cloud computing services on the Internet. And they will require Wireless
capabilities since most of the employees will have laptops. This means the following solutions PODs will
be chosen:
• Computing
• Wireless
As the engineer we can recommend other solutions that the business won't necessarily know they need
such as network security or network monitoring. This is the value we bring to the customer as the
network architect/engineer. Therefore, we will include the following solution PODs to the design:
• Security
• Network Management
Looking at each of the solution PODs that our design will use, we need to look at its prerequisites. For
most of these solutions we must have a LAN or DC including an Internet POD. For us, we already
completed the design for the LAN and Internet topology.
Start Here - Example - 27
From here, we will need to go through each POD and complete the design for that solution. I will show
some of these solution in this example. We will begin with the "Computing" POD which is one of the
business requirements. This has a prerequisite for the LAN POD which we already completed. We also
see there are sub-PODs available so we need to go to section 2.2
There are two type of computing solutions. There is cloud computing and unified computing. We need to
select all computing PODs that are required in our environment and that will be the "Cloud Computing"
POD. This has a prerequisite for a LAN and Internet POD. Plus there are sub-PODs available which
means we need to go to section 2.2.1.
28 Start Here - Example -
Next, we need to select one or more of the following "cloud computing" PODs that will be used. Again,
we need to review all of the design items such as "When to use", the description, and if any sub-PODs
are available to complete this design POD. Among the available PODs here, we will only select the
"SaaS" POD since the business will be using computing services such as Office 365 and Dropbox.
Thus, we need to continue on to section 2.2.1.2.
And this will show Grid PODs reflecting some of the main SaaS categories followed by products that can
be considered unless the business specifically ask for it. For our example, the customer will be using
Office 365 (Mail & Office Applications) and Dropbox (Storage Applications).
Moving on to the "Wireless" POD which has a prerequisite of a LAN POD, we will proceed to section to
2.9:
This will reflect the different types of "Wireless" PODs we may build, but we will select the "Wireless LAN"
POD which is currently the only POD listed in the design cookbook. This has a requirement for the
following PODs:
• Switching
• POE
• DHCP
The Switching POD was previously added to our design list when we completed the LAN POD.
30 Start Here - Example -
Here we need to determine what Wireless vendor we want to consider for this solution. As the network
architect, we can choose one of the listed vendor solutions (or not listed) based on our preferences if it
meets the business requirements.
These are Grid PODs and they are grouped together based on the type which can be an on-premise
solution, a cloud solution, or a hybrid between the two. For our decision, we will select UniFi (Ubiquiti) for
the vendor solution which has been a favorite of mine for years.
Start Here - Example - 31
Next we will move down the page and get to the deployment PODs section. This will show all of the
possible ways the "Wireless" POD can be deployed in the environment based on the selected vendor
solution.
For us, we selected UniFi (Ubiquiti) which is a Hybrid vendor solution. Therefore, we will use the Hybrid
Deployment which will show how the solution will be deployed in the existing environment.
The design picture shows the main wireless components based on the vendor solution and where they
should connected on the LAN. This is why the LAN POD was a prerequisite for the "Wireless" POD
because we needed the topology to already exist. The description listed for that POD will also explain the
same thing.
32 Start Here - Example -
At this point, we are done with all of the solutions based on the business requirements. Here is an update
to our existing design which now includes the "Wireless" POD:
Start Here - Example - 33
We can continue the same process for the other solutions that we, as the network architect/engineer,
recommended.
We won't do the "Network Management" POD, but let’s do the "Security" POD mostly because we need
to anyway based on the "Internet" POD that we will use.
If you remember, the "Internet" POD will consist of a single firewall and ISP:
This requires the SEC-NET-FW POD and using a NGFW appliance which will be used within that POD.
Looking at the POD ID, it starts with SEC which is the prefix for the "Security" POD that we recommended
for this customer design. Therefore, let’s go to section 2.6 to build parts of the "Security" POD
34 Start Here - Example -
The "Security" POD is by far the largest section in the design cookbook providing security practices not
only on the network but with applications and the endpoints. Threats are evolving, as a result, so does IT
security. In the first part of this POD, it will outline the different types and layers to security. It is important
to read through the information presented here to understand how to build end-to-end security.
You will also see a summary POD reflecting the major categories for security:
These major categories are broken up further, but among them we will focus on Network Security. As
you scroll down the page you will reach the Network Security section which will list its own summary and
basic PODs:
Among these PODs, we will select only the firewall POD since that is required for this customer design.
Looking at the POD details we need to have an Internet POD completed and it requires a NAT POD with
our design.
Start Here - Example - 35
We need to go to section 2.6.2 to build out our firewall which exist inside of the Internet POD:
Just like the other solutions we completed so far we first need to determine the firewall vendor that will be
used. I have a strong preference for Fortinet's FortiGate NGFW so that will be selected for this customer
design.
36 Start Here - Example -
As we continue on with our firewall design we need to complete each of the listed deployment PODs that
are shown.
We will start with the Firewall Deployment POD since that doesn't have any extra prerequisites compared
to what we see under "Security Features". We need to go to section 2.6.2.1
Here, we need to select one of the following PODs that will be used for our firewall deployment within the
Internet POD. Again, we know there are no requirements for redundancy. This will eliminate the two
NGFW Redundancy PODs that we see listed here. The FW/ACL PODs only apply if we want to
implement firewall restrictions on the VLANs within the LAN/DC. Or on the edge router, but our design is
using a dedicated firewall appliance.
Start Here - Example - 37
Doing this will not change the overall look of our design in the Internet POD. As we move down the page,
there is a Configuration section with Required, Recommended, and Optional PODs which we covered
before.
These will simply list what we need to configure on that firewall appliance along with any other
recommended configuration. This can be extremely helpful to us and the network engineers who will
deploy this appliance on the network.
38 Start Here - Example -
We are done with the firewall deployment POD, so now we need to complete the security features POD
that we saw earlier:
Moving forward with this POD has some prerequisites and one of the POD IDs listed is what we choose
SEC-NET-FW-DEPLOY-STD (Standalone NGFW). Therefore, we can proceed on to its sub-PODs in
section 2.6.2.2
This will simply list Grid PODs with a list of security features that can be implemented on the firewall
appliance if it is supported. This can also provide a good list that we can follow for what security
enhancements we can enable. Or knowing what type of NGFW features are available. There are new
security features being released all the time and those additions can easily be added here in this section.
Start Here - Example - 39
This will show required, recommended, and optional configuration for the security features on the firewall
appliance. For example, it is required for the firewall appliance to have the necessary license and
subscriptions to use most of the security features listed in this POD. One of the recommendations
include block websites/applications in high security risk categories. Or access to inappropriate content
and file sharing categories among others.
There is another configuration POD that is focused on DoS Protection if that security feature will be
enabled (and supported) on the firewall appliance:
40 Start Here - Example -
At this stage we are done with everything that is required for the Security POD. As a result here is our
updated customer design:
Start Here - Example - 41
(Step 3) Services
Once we are done with the solution design we can continue on with the service design:
Here we need to select one or more of the service PODs that are listed here. We know that from our
foundation and solution design, the following services are required:
• Routing
• Switching
• POE
• DHCP
• NAT
Let’s focus on those for our customer design. Among the service PODs, let’s start with the "Energy /
Power" POD which is where "POE" is located
42 Start Here - Example -
The only prerequisite here is the LAN POD. Therefore lets go to section 3.1
Here we need to select one or more of the following PODs. For our design, we require the POE POD
which is required to work with our Wireless POD.
This has a prerequisite for having either IP phones and/or access points. Well, we do have access point
components that exist within the Wireless POD and it will require the access switches to support PoE.
Start Here - Example - 43
This will show how POE can be deployed on the network which is common within the LAN which is what
we are using. This deployment shows that the IP phones and access points should be connected to POE
enabled access switches in the LAN POD.
44 Start Here - Example -
This will show the available POE options that are supported including how it can be configured (or used)
on the LAN access switches.
Start Here - Example - 45
The next service POD will be NAT which was determined while building the Internet and Firewall PODs:
This has a prerequisite for the Internet POD and it has sub-PODs available:
This will show how NAT can be deployed on the network which is common within the Internet POD. The
POD details will show how they are deployed along with other details we can reference.
46 Start Here - Example -
This will show the NAT options including the required, recommended, and optional configuration for NAT
on the firewall appliance in our topology. For example, it is required for us to determine where NAT
services will be configured which will likely be the edge router or firewall. And it is recommended to
configure NAT port forwarding if you have a small set of Public IP addresses or only need a few ports
(e.g. HTTPS, RDP) to be forwarded to a server.
The next service POD will be the Routing POD based on our requirements.
This has a prerequisite for a LAN or DC POD including the Switching POD (if it is already added to our
list). Therefore, we will come back to this POD once we complete our Switching POD.
This has a prerequisite for a LAN or DC POD which we already have, so let’s go to the available sub-
PODs:
Great, now here we need to determine which Switching deployment will be used among the LAN POD.
This can be a hybrid, full Layer-2, or full Layer-3 deployment. It is important to look at each POD to
determine which one will align with the business requirements and match your preference as the network
architect/engineer. If you remember the example I gave in the beginning, if you want minimal layer-2 then
you might choose the "Full Layer-3 Deployment" POD.
48 Start Here - Example -
However, for our design I will choose the Hybrid Deployment which is the most common and allows us to
extend the various networks (configured as VLANs) across our LAN. This means, by referencing the
details in this POD, the Core switch would be a Layer-3 switch and our access switches will be Layer-2
switches.
You will also see that using this POD has a prerequisite for the LAN-2T (or LAN-3T) POD. If you
remember, our LAN POD is using a Traditional 2-Tier topology so we can use this switching POD for our
topology. We also see that the Routing POD is required which is great because we already have this on
our list.
We can see what configuration is required, recommended, and optional within the Switching POD. For
example, we see that it is required to enable VTP and STP on all of the LAN switches. It is
recommended to not use VLAN 1 for user/server traffic. And it is recommended to use VTP transparent
mode on all the switches due VTP configuration revision related issues. Again, the available
configuration PODs provide a guideline for how we should configure the devices on our network.
At this stage, we are finished with the Switching POD which will give us the following network topology:
50 Start Here - Example -
Now let’s complete the Routing POD and we see it has sub-PODs available. Therefore, let’s go to
section 3.9
Here we need to select one (or more) of the following routing services that will be used in the design. We
need to look at each POD to determine which ones would apply for our customer design. Most of the
PODs "When to use" states if we have 3 or more Layer-3 network devices (e.g. L3-Switch, Router,
Firewall).
For our customer design, we only have two Layer-3 devices. This means we can omit the OSPF, EIGRP,
and IS-IS routing PODs. We also don't require the BGP POD since we are not advertising any subnets
that we own.
Start Here - Example - 51
Furthermore, we do not have a direct requirement or need to use PBR, IP SLA, or IP CEF so those PODs
will also be omitted.
We will select the "Static" POD because our topology does have 1-2 network devices. This means that
static routing must be configured between the L3-Core switch and the firewall in which is mentioned in the
description.
Since there are no sub-PODs for static routing, we are finished with the Routing POD giving us the same
network topology.
52 Start Here - Example -
We still have one more service POD to complete and that is the DHCP POD. So let’s go back to the main
service page:
The DHCP POD is located under "Operations" which has a lot of other services we can consider.
Just like what we did for the solution design, we can include additional services based on our
recommendations and preferences as a the network architect/engineer. One of these services that we
will include is the security services:
We will also explore the services under the Operations category to see what else can be included:
This will start off listing the major category sections from User, network, to vendor specific operational
services.
Start Here - Example - 53
First off, under User Specific services, we see DHCP listed so let’s select that POD
There are no additional sub-PODs, but the description provides information and best practices in regards
to DHCP deployment in general.
Back on the Services - Operations page. Let’s look under the Network specific services:
These reflect services that are primarily used by the network devices themselves. Here we would need
to look at each POD to determine if that service POD should be used. Most will not point to any
additional sub-PODs like DHCP. But they will still provide details for when that service should be
configured along with any other best practices.
54 Start Here - Example -
• SNMP
• Syslog
• NTP
We included the SNMP and Syslog PODs because we already included the Network Management
solution. And if we select the NMS POD that will require SNMP and Syslog. Therefore, we know that we
need to configure SNMP and Syslog services on all of our network devices in the topology.
NTP was added as a best practice to provide accurate timestamps among the network devices and any
logs that are generated.
The other service PODs are not needed nor required for our customer design. Let’s review the Vendor
Specific services listed in this design cookbook:
This will show a long list of services that are specifically configured on Cisco products. This means other
vendor specific sections can easily be added here listing services only supported on their specific
products. Among the list of Cisco vendor specific services none of these are required nor needed in our
environment. Besides if there is a Cisco service that is required they will likely be listed as a requirement
for that POD such as VSS and VPC.
Furthermore, most of these services are only supported on certain Cisco hardware devices such as the
Cisco Nexus series. This will include services such as BIDI, Breakout, VPC, and VDC. We know that we
are not using Cisco Nexus hardware because that is typically used for Data Center frameworks not LANs.
Start Here - Example - 55
Lastly, just because we don't add any of these services initially to our design, doesn't mean we can't go
back to the list of operation services to determine what services we could use. For example, let’s say we
are using a Chassis-based or Stack-based switch for the hardware in the LAN. Well, we could go back to
the services page and determine what additional services we could implement along with any best
practices that are provided.
If we are using a Cisco Stack-based switch, we will learn that our hardware can support StackWise and
potentially StackPower.
Services are more flexible compared to solutions and especially frameworks. Using our house example
again, it’s easy to move furniture around in the house. However, it is harder if you want the kitchen to be
located in a different part of the house. And it is even more difficult if you want the house to have an extra
room or level. They are not impossible, but it will be very expensive and will require a lot of time to
complete. The same goes for deploying networks.
Before we conclude the services POD, we also added the security service PODs:
This doesn't have any prerequisites, so let’s go to the sub-PODs in section 3.10
56 Start Here - Example -
This will show the list of security related services we can consider. Let’s select the "General Best
Practices" POD and go to its sub-PODs:
This is a simple page showing a list of recommended configuration we should implement on the network
devices in the topology. These are services that the business will not think about and why they hired a
network architect/engineer to provide the best possible design based on their experience. As the network
architect we must consider not only the business requirements but also the technical objectives which
includes:
• Performance
• Scalability
• Security
• Reliability
• Flexibility
• Network Management
If those requirements and objectives are addressed then we can include our own professional
preferences to the design.
Start Here - Example - 57
(Step 4) Attributes
At this point our design is completed, but let’s run through the design attributes to complete the finishing
touches:
Here we can determine the physical location of the network devices and define the various standards that
will be used. Therefore, among these attributes PODs we will select all of the listed PODs. We will first
complete the location POD to determine the location for each network device in the topology design.
This has a prerequisite for the LAN, DC, and/or WAN POD. We will go to section 4.1:
58 Start Here - Example -
Here we need to determine all of the rooms, buildings, and locations will be connected together on the
network. This will be broken up as either a local location or a wide location.
We don't require the wide location POD because we do not have multiple sites. Therefore, we will select
the local location POD and go to section 4.1.1
This will show a list of Grid PODs with possible room locations that our customer may have. We need to
determine what type of rooms will exist and how they will be connected together based on the topology
that will be used.
Start Here - Example - 59
For our customer design, there will be single building with a MDF and two IDF rooms. The MDF room will
consist of the Core switch, Firewall appliance, servers, and the Internet connection itself. Each IDF room
will have a POE enabled access switch with access points and user endpoints connected.
Ethernet wiring would be connected between each IDF back to the MDF room.
60 Start Here - Example -
Another attribute is the connection POD which is required for each network device in the topology. We
need to determine the bandwidth services that will exist on that device
This section provides a full in-depth process (plus examples) to determine the type of ports, bandwidth
services, and how the network devices will be connected together.
Start Here - Example - 61
We won't go into that here in this example, but going through that section will give us something like the
following for our topology:
62 Start Here - Example -
The next attribute involve the network POD which is used to determine the type of networks the topology
will have.
When we go to section 4.3, that will show a list of possible networks that we could use and associate as a
VLAN within our LAN POD.
For our customer design, based on the business requirements, we will use the following networks:
• User
• Guest
• Server
As the network architect/engineer we will also include the following network(s) as a best practice:
• Management
• Transit
Start Here - Example - 63
For the next attribute, we can determine the type of standards that will be used.
There are different standards listed in the design cookbook ranging from a naming standard, addressing
standard, to even a VLAN standard.
We will skip the Data Center Standard since we only have a MDF room in the customer design. But let’s
cover the other standard PODs that are listed here:
64 Start Here - Example -
Starting with the Naming standard, we can follow a schema for naming devices on the network. There
are many different schemas we could use based on the available PODs shown:
For our customer design, we will keep things simple and use the "Standard #1" POD.
Start Here - Example - 65
For the VLAN standard, this has a prerequisite for the Switching POD which we already completed:
When we go to section 4.4.2, you will see a VLAN schema that can be used and align with the addressing
schema:
Start Here - Example - 67
For our customer design, we will use the following VLANs based on the networks that will be used:
• User - VLAN 10
• Guest - VLAN 200
• Server - VLAN 100
• Management - VLAN 250
• Transit - no VLAN required
68 Start Here - Example -
Lastly, we can determine what addressing standard we want to follow which will align with our VLAN
schema.
This will present a standard for IPv4 and IPv6 addressing. In our customer design, we only require IPv4
addressing so we will continue on to section 4.4.3.1 to see what IPv4 addressing schemas we can
consider:
Start Here - Example - 69
Here there are three different schemas that can be used for our internal network. For our customer
design, we will use schema #1 which is typically aimed for single sites without a WAN.
This means the addressing (along with our VLAN schema and the networks that will be used) will be
something like the following:
We are now done with the customer design using the many PODs listed in the network design cookbook.
That is how you can use the design cookbook to build your own network designs based on the business
requirements, technical objectives, to the engineer's professional preferences.
Frameworks - - 71
1. Frameworks
Select one (or more) of the following framework PODs that will be used in the design:
WAN Internet
POD: WAN POD: INET
• When to use: to build a network that will connect other • When to use: to build a network that requires access to
LAN and/or Data Center networks together the Internet and/or provide Public facing services
• Prerequisites: LAN and/or DC, ATT-LOC • Prerequisites: LAN and/or DC
• Required: ATT-NET • Required: ATT-NET
• Has Sub-PODs: Go to 1.3 • Has Sub-PODs: Go to 1.4
Service Provider
POD: SP
• When to use: to build a network that is heavily focused
on connecting enterprise customer networks together.
To build an Internet and/or WAN cloud used by customer
networks.
• Prerequisites: --
• Required: VRT
• Has Sub-PODs: --
72 Frameworks - Data Center -
Vendor Solutions
The hardware for the components in this framework consists of Data Center switches. Select one of the
following vendors that will be used:
Arista Switches
Arista 7000 Series for
Medium and Large DC networks
Frameworks - Data Center - 73
Main PODs
Select one of the following Data Center PODs that will be used:
• When to use: if there is a lot of server-to-server • When to use: if the Data Center is heavily focused on
communication and the server endpoints are running server-to-user communication. And all server endpoints
similar functions can be connected to a single network switch (fixed, stack,
• Prerequisites: DC or chassis-based).
• Required: DC-TR, SDN-DC or OVR-FP • Prerequisites: DC
• Has Sub-PODs: Go to 1.1.1 • Required: SW
• Components: Spine Switch, Leaf Switch • Has Sub-PODs: Go to 1.1.2
• Description: this POD will consist of one (or more) leaf • Components: Collapsed Core Switch
switches connecting to one (or more) spine switches. • Description: this POD will consist of one switch acting
The server endpoints would be connected to the Leaf as the core switch that all server endpoints and network
switches as shown in the picture above. Additional devices will be connected to. If there is a LAN core, it
Ethernet switches can also be connected to the Leaf would be connected into the Core switch.
switches with server endpoints attached.
74 Frameworks - Data Center -
• When to use: if the Data Center is heavily focused on • When to use: if you are looking for a validated pre-
machine-to-user communication and the server designed solution with unified computing, hypervisor,
endpoints will be spread-out across several racks in the storage, and/or network switches composed of Cisco
Data Center Data Center, VMware and NetApp (Storage)
• Prerequisites: DC components.
• Required: SW • Prerequisites: --
• Has Sub-PODs: Go to 1.1.3 • Required: --
• Components: Core Switch, Access Switch • Has Sub-PODs: --
• Description: this POD will consist of one (or more) • Components: Spine Switches, Leaf Switches, Storage
access switches connecting to one (or more) core Array, Cisco UCS, APIC controllers
switches. The server endpoints would be connected to • Description: this POD will consist of a two-tier topology
the access switches. If there is a LAN core, it would be with a spine and leaf layer using Cisco Nexis switches.
connected into the Core switch. The storage devices (NetApp), UC devices (Cisco UCS),
and the SDN controller (Cisco ACI) would plug into the
Leaf switches in the topology.
Frameworks - Data Center - 75
Add-On PODs
Select one (or more) of the following add-ons to include to the Data Center POD if needed:
• When to use: if you require connecting several Spine- • When to use: if you require connecting an Internet
Leaf PODs together. And require connecting beyond and/or WAN into the Data Center using a Spine-Leaf
2500 servers. topology
• Prerequisites: DC-CLOS • Prerequisites: DC-CLOS, INET and/or WAN
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Super Spine Switch • Components: Border Leaf Switch
• Description: this POD consists of one (or more) Spine- • Description: this POD will connect to either the Super
Leaf CLOS PODs connected to one (or more) Super Spine or Spine switches in a CLOS topology.
Spine switches to provide a high number of server
endpoints and forwarding performance.
76 Frameworks - Data Center -
• When to use: if multiple row of racks/cabinets exist in • When to use: if you require having a backup location (or
the Data Center and a 2-Tier topology will be deployed data center) that will host critical services and can be
• Prerequisites: DC-CLOS, DC-2T activated if a primary location (or data center) is no
• Required: -- longer available.
• Has Sub-PODs: Go to 1.1.4 • Prerequisites: DC-CLOS, DC-1T, or DC-2T
• Components: Access Switches • Required: WAN and/or INET
• Description: in this POD, you will determine if the • Has Sub-PODs: --
access/leaf switches will be deployed in every rack, • Components: Core Switch, WAN/Internet Router
every other rack, or in a single rack. • Description: in this POD, the DR site can be a hot (all
services running at full capacity), warm (partial services
running at the site), or cold (requires turning on all
services to be active) backup site for the network. All
servers and network devices would be connected to a
single Core switch. The DR location can be connected to
either the Internet (using VPN or direct access) or into a
L3 WAN as shown in the picture above.
Frameworks - Data Center - 77
• When to use: if you require a dedicated switch to be • When to use: if you require a dedicated switch to be
used for all network functions such as the Internet edge used for a specific purpose and not connected directly
routers, firewalls, and/or WAN routers instead of being into the Core switch
connected into the Core switch • Prerequisites: DC-2T
• Prerequisites: DC-2T • Required: --
• Required: -- • Has Sub-PODs: Go to 1.1.5
• Has Sub-PODs: Go to 1.1.5 • Components: Custom-purpose Switch
• Components: Network Services Switch • Description: this POD consists of one (or more)
• Description: this POD consists of one (or more) dedicated switches that are reserved for a specific
dedicated switches that are reserved for network function to the topology (e.g. business partner,
devices/solutions such as Internet edge routers, classroom, lab, etc.). This custom purpose switch would
firewalls, and WAN routers. This switch would be be connected to the core switch in the topology.
connected to the core switch in the topology.
78 Frameworks - Data Center -
• When to use: if you require deploying a standalone • When to use: if you require consolidating the computing,
storage solution and computing solution within the data storage, and network resources to a single platform to
center lower the number of systems used in the data center with
• Prerequisites: DC-CLOS, DC-1T, or DC-2T centralized management. HCI can also be used for VDI,
• Required: SAN, COMP-UC (COMP-UC-T-UNF and/or Remote Offices, and development environments.
COMP-UC-T-STD) • Prerequisites: DC-CLOS, DC-1T, or DC-2T
• Has Sub-PODs: -- • Required: COMP-UC (COMP-UC-HCI)
• Components: Storage components, compute • Has Sub-PODs: --
components, Data center switches (core, access) • Components: HCI based systems, Data center switches
• Description: this POD consists of separate storage (core, access)
components (e.g. technologies, switches and systems) • Description: in this POD the computing, storage, and
and computing components (e.g. unified computing) network resources are virtualized on a single platform
connected within the data center. (called a node) which is connected within the data center
with centralized management. Using HCI nodes will
require greater performance on the data center switches.
Frameworks - Data Center - 79
Management / OOB
POD: DC-MGMT
Small CLOS using 10GE Medium CLOS using 10GE Large CLOS using 10GE
Small CLOS using 40GE Medium CLOS using 40GE Large CLOS using 40GE
Hyperscale CLOS
• When to use: if you require support up to 32 10GE • When to use: if you require support up to 128 10GE
servers (or 320 1GE servers) within the CLOS using servers (or 1280 1GE servers) within the CLOS using
10GE uplinks 40GE uplinks
• Prerequisites: DC-CLOS • Prerequisites: DC-CLOS
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Spine Switch, Leaf Switch • Components: Spine Switch, Leaf Switch
• Description: in this POD, the CLOS consists of 8 leaf • Description: in this POD, the CLOS consists of 8 leaf
switches connected to 4 spine switches (each with a switches connected to 4 spine switches (each with a
bandwidth capacity of 80Gbps) using 10GE bandwidth capacity of 320Gbps) using 40GE
connections. Each leaf switch can support 4 10GE connections. Each leaf switch can support 16 10GE
servers (or 40 1GE servers). servers (or 160 1GE servers).
Frameworks - Data Center - Spine-Leaf CLOS 81
• When to use: if you require support up to 48 10GE • When to use: if you require support up to 192 10GE
servers (or 480 1GE servers) within the CLOS using servers (or 1920 1GE servers) within the CLOS using
10GE uplinks 40GE uplinks
• Prerequisites: DC-CLOS • Prerequisites: DC-CLOS
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Spine Switch, Leaf Switch • Components: Spine Switch, Leaf Switch
• Description: in this POD, the CLOS consists of 12 leaf • Description: in this POD, the CLOS consists of 12 leaf
switches connected to 4 spine switches (each with a switches connected to 4 spine switches (each with a
bandwidth capacity of 120Gbps) using 10GE bandwidth capacity of 480Gbps) using 40GE
connections. Each leaf switch can support 4 10GE connections. Each leaf switch can support 16 10GE
servers (or 40 1GE servers). servers (or 160 1GE servers).
82 Frameworks - Data Center - Spine-Leaf CLOS
• When to use: if you require support up to 128 10GE • When to use: if you require support up to 512 10GE
servers (or 1280 1GE servers) within the CLOS using servers (or 5120 1GE servers) within the CLOS using
10GE uplinks 40GE uplinks
• Prerequisites: DC-CLOS • Prerequisites: DC-CLOS
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Spine Switch, Leaf Switch • Components: Spine Switch, Leaf Switch
• Description: in this POD, the CLOS consists of 16 leaf • Description: in this POD, the CLOS consists of 16 leaf
switches connected to 8 spine switches (each with a switches connected to 8 spine switches (each with a
bandwidth capacity of 160Gbps) using 10GE bandwidth capacity of 640Gbps) using 40GE
connections. Each leaf switch can support 8 10GE connections. Each leaf switch can support 32 10GE
servers (or 80 1GE servers). servers (or 320 1GE servers).
Frameworks - Data Center - Spine-Leaf CLOS 83
Hyperscale CLOS
POD: DC-CLOS-HS
• When to use: if you require building a traditional Data • When to use: if you require building a traditional Data
Center using physical hardware for the core switch in Center using a single component but have a high port-
the topology with a low port-capacity requirement capacity requirement
• Prerequisites: DC-1T • Prerequisites: DC-1T
• Required: Fixed-based switch model • Required: Chassis/Stack-based Switches
• Has Sub-PODs: -- • Has Sub-PODs: --
• Description: the collapsed core switch in this topology • Description: the collapsed core switch can consist of
will consist of a fixed switch that isn’t a chassis or stack- several switches stacked together or using a single
based switch that all server endpoints and network chassis-based switch that all server endpoints and
devices would be connected to network devices would be connected to. This POD is
ideal if you require a high port-capacity but still want to
keep a 1-Tier Data Center topology.
Frameworks - Data Center - Traditional 2-Tier Topology 85
Physical Topology Physical Topology with FHRP Physical Topology with VPC
• When to use: if you require building a traditional Data • When to use: if you require building a traditional Data
Center using physical hardware for each component in Center using physical hardware with high-availability
the topology • Prerequisites: DC-2T
• Prerequisites: DC-2T • Required: Fixed-based switch model, REL-FHRP
• Required: Fixed-based switch model • Has Sub-PODs: --
• Has Sub-PODs: -- • Description: all components in this topology will use
• Description: all components in this topology will use fixed switches. For high-availability, the topology will
fixed switches that isn’t a chassis or stack-based switch consist of redundant core switches. A link should be
that all server endpoints and network devices would be connected between the two Core switches especially if
connected to. The access switches would be spread-out route summarization will be implemented for one (or
across several racks in the Data Center. more) networks within the Data Center. Each of the
access switches (spread-out across several racks) would
be connected to each of the core switches as shown in
the picture above. The core switches will be configured
to use a FHRP (e.g. HSRP or VRRP).
86 Frameworks - Data Center - Traditional 2-Tier Topology
Core Switch
L3-Switch
(Chassis, Stack)
Port Port
Channel Channel
• When to use: if you require building a traditional Data • When to use: if you require building a traditional Data
Center using physical hardware and want to achieve Center using physical hardware with high-availability
high-availability without using two physical core without using a FHRP
switches • Prerequisites: DC-2T
• Prerequisites: DC-2T • Required: Cisco Nexus series, OPS-CSCO-VPC
• Required: Chassis/Stack Switches, OPS-PC • Has Sub-PODs: --
• Has Sub-PODs: -- • Description: in this POD, redundant core switches are
• Description: in this POD, for high-availability, the core configured to support Virtual Port Channels (vPC). This
switch will consist of a chassis or stack-based switch. can allow a Port Channel to be implemented between
Each of the access switches (spread-out across several two redundant Core switches to each access switch
racks) would be connected to the core with multiple increasing the overall availability for the server endpoints
interfaces bundled together using a Port Channel. One on the switch. The access switch will think it is
connection would be plugged into a different line connected to a single Core switch in the topology.
module (using chassis-based switch) or a different stack
switch (using stack-based switch).
Frameworks - Data Center - Traditional 2-Tier Topology 87
• When to use: if you have many hypervisor hosts on the • When to use: if your traditional Data Center components
network with several virtual machines will exist in the same Data Center location which can be
• Prerequisites: DC-2T unified together to be managed as one logical switch
• Required: Cisco Nexus 1000V • Prerequisites: DC-2T
• Has Sub-PODs: -- • Required: Cisco Nexus 5K/7K/6K (Core) + Nexus 2000
• Description: in this POD, the access switches are Series (Access)
virtualized within the Hypervisor host that the virtual • Has Sub-PODs: --
servers are connected to. The virtual switches (and the • Description: in this POD, the core and access switch
Hypervisor host) would connect to the core switch in the components exist in the same room using unified-based
topology. hardware. The access switches (spread-out across
several racks) would be treated as line modules on the
core switch. As a result, the entire topology will be seen
as one logical switch (or fabric) that can be managed
from the core switch.
88 Frameworks - Data Center - Traditional 2-Tier Topology
• When to use: if you require placing an access switch at • When to use: if you require placing a single access
the top of each rack (or every other rack) to lower the switch (chassis/stack-based switch) at the end of each
amount of cabling across the Data Center row of racks in the Data Center to lower the amount of
• Prerequisites: DC-TR access switches to manage.
• Required: -- • Prerequisites: DC-TR
• Has Sub-PODs: -- • Required: --
• Description: in this POD, each access switch is placed • Has Sub-PODs: --
at the top of each rack (or every other rack) with servers • Description: in this POD, a single access switch is
in that rack connected to it directly. placed at the end of each row of racks with servers in
that row connected to it directly.
90 Frameworks - Data Center - Add-On Switches
• When to use: if you require building the add-on switch • When to use: if you require building the add-on switch
using a fixed switch and require low port-capacity using a single component but require a high port-capacity
• Prerequisites: DC-NS, DC-CUS, DC-MGMT • Prerequisites: DC-NS, DC-CUS, DC-MGMT
• Required: Fixed-based switches • Required: Chassis/Stack-based Switches
• Has Sub-PODs: -- • Has Sub-PODs: --
• Description: the add-on switch in this topology will • Description: the add-on switch can consist of several
consist of a fixed switch that isn’t a chassis or stack- switches stacked together or using a single chassis-
based switch that all specified server endpoints (or based switch that all specified server endpoints (or
network devices) would be connected to. network devices) would be connected to. This POD is
ideal if you require a high port-capacity.
Frameworks - LAN / Campus - 91
Vendor Solutions
The hardware for the components in this framework consists of LAN switches. Select one of the following
vendors that will be used:
Cisco Switches
Hardware
Cisco Catalyst Series for Large & Medium LAN Juniper Switches
Cisco Small Business for Small & SMB LAN Juniper EX Series for Medium and Large LAN
Cisco Meraki for Small and SMB LAN
92 Frameworks - LAN / Campus -
Main PODs
• When to use: if you have a LAN where all endpoints • When to use: if you have a LAN consisting over 48+
and network devices can be connected to a single endpoints and network devices. Or if there are multiple
switch located in a single room (e.g. Data Center) wiring closets where equipment will be located. This is
• Prerequisites: LAN the most common and recommended topology that is
• Required: SW used.
• Has Sub-PODs: Go to 1.2.1 • Prerequisites: LAN
• Components: Collapsed Core Switch • Required: SW
• Description: this POD will consist of one switch acting • Has Sub-PODs: Go to 1.2.2
as the core switch that all endpoints and network • Components: Core Switch, Access Switch
devices will be connected to. • Description: this POD will consist of one (or more)
access switches connected to one (or more) core
switches. The user endpoints would be connected to the
access switches. The server endpoints (if any) would be
connected directly into the core switch as shown in the
picture above. If there is a Data Center core, it would be
connected into the Core switch.
Frameworks - LAN / Campus - 93
Add-On PODs
Select one (or more) of the following add-ons to include to the LAN POD if needed:
• When to use: if you require using a single switch for all • When to use: if you require a dedicated switch to be
server endpoints used on the LAN used for all network functions such as the Internet edge
• Prerequisites: LAN-2T or LAN-3T routers, firewalls, and/or WAN routers instead of being
• Required: -- connected into the Core switch
• Has Sub-PODs: Go to 1.2.3 • Prerequisites: LAN-2T or LAN-3T
• Components: Server Farm Switch • Required: --
• Description: this POD consists of one (or more) • Has Sub-PODs: Go to 1.2.3
dedicated switches that are reserved for server • Components: Network Services Switch
endpoints. The server farm switch would be connected • Description: this POD consists of one (or more)
to one (or more) core switches in the topology. dedicated switches that are reserved for network
devices/solutions such as Internet edge routers, firewalls,
and WAN routers. This switch would be connected to
one (or more) core switches in the topology.
Frameworks - LAN / Campus - 95
Custom
POD: LAN-CUS
• When to use: if you require building a traditional LAN • When to use: if you require building a traditional LAN
using physical hardware with a low port-capacity using a single component but have a high port-capacity
requirement requirement
• Prerequisites: LAN-1T • Prerequisites: LAN-1T
• Required: Fixed-based switch model • Required: Chassis/Stack-based Switches
• Has Sub-PODs: -- • Has Sub-PODs: --
• Description: the collapsed core switch in this topology • Description: the collapsed core switch can consist of
will consist of a fixed switch that isn’t a chassis or stack- several switches stacked together or using a single
based switch that all endpoints and network devices chassis-based switch that all endpoints and network
would be connected to devices would be connected to. This POD is ideal if you
require a high port-capacity but still want to keep a 1-Tier
LAN topology.
Frameworks - LAN / Campus - Traditional 2-Tier Topology 97
Physical Topology Physical Topology with FHRP Physical Topology with VSS
• When to use: if you require building a traditional LAN • When to use: if you require building a traditional LAN
using fixed-based hardware for each component in the using fixed-based hardware with high-availability
topology • Prerequisites: LAN-2T
• Prerequisites: LAN-2T • Required: Fixed-based switch model, REL-FHRP
• Required: Fixed-based switch model • Has Sub-PODs: --
• Has Sub-PODs: -- • Description: in this topology, all the components will use
• Description: all the components in this topology will fixed-based switches. For high-availability, the topology
consist of fixed-based switches that isn’t a chassis or will consist of redundant core switches. A link should be
stack-based switch that all endpoints and network connected between the two Core switches especially if
devices would be connected to. The access switches route summarization will be implemented for one (or
will exist in different wiring closets. more) networks within the LAN. Each of the access
switches (located in different wiring closets) would be
connected to each of the core switches as shown in the
picture above. The core switches will be configured to
use a FHRP (e.g. HSRP or VRRP).
98 Frameworks - LAN / Campus - Traditional 2-Tier Topology
Core Switch
L3-Switch
(Chassis, Stack)
Port Port
Channel Channel
• When to use: if you require building a traditional LAN • When to use: if you require building a traditional LAN
using physical hardware and want to achieve high- using physical hardware for high-availability without using
availability without using two physical core switches FHRP. And the access switches will exist in different
• Prerequisites: LAN-2T wiring closets.
• Required: Chassis/Stack Switch, OPS-PC • Prerequisites: LAN-2T
• Has Sub-PODs: -- • Required: OPS-CSCO-VSS, OPS-PC, Hardware (Cisco
• Description: in this POD, for high-availability, the core Catalyst 6K series)
switch will consist of a chassis or stack-based switch. • Has Sub-PODs: --
Each of the access switches (located in different wiring • Description: in this topology, redundant core switches
closets) would be connected to the core with multiple are clustered together to appear as one logical switch
interfaces bundled together using a Port Channel. One using VSS. A Port Channel would be implemented from
connection would be plugged into a different line the two redundant Core switches down to each access
module (using chassis-based switch) or to a different switch increasing its overall availability for the connected
stack switch (using stack-based switch). endpoints on the switch. The access switch will assume
it is connected to a single Core switch in the topology.
Frameworks - LAN / Campus - Traditional 2-Tier Topology 99
Unified Topology
POD: LAN-2T-UNF
• When to use: if you require building the add-on switch • When to use: if you require building the add-on switch
using a fixed-based switch with low port-capacity using a single component with high port-capacity
• Prerequisites: LAN-SF, LAN-NS, LAN-CUS • Prerequisites: LAN-SF, LAN-NS, LAN-CUS
• Required: Fixed-based switches • Required: Chassis/Stack-based Switches
• Has Sub-PODs: -- • Has Sub-PODs: --
• Description: the add-on switch in this topology will • Description: the add-on switch can consist of several
consist of a fixed-based switch that isn’t a chassis or switches stacked together or using a single chassis-
stack-based switch that all server endpoints (or network based switch that all server endpoints (or network
devices) would be connected to. devices) would be connected to. This POD is ideal if you
require a high port-capacity with the add-on switch.
Frameworks - WAN - 101
1.3 WAN
Complete each of the design sections below for the solution.
Vendor Solutions
The hardware for the components in this framework consists of routers. Select one of the following
vendors that will be used:
Cisco Routers
Hardware
Main PODs
Single Router & WAN Single Router + Dual WAN Dual Router + Single WAN
• When to use: if you do not have high-availability (4- • When to use: if you require partial high-availability and
hours or longer downtime) requirements for providing have concerns that the WAN service provider is more
access into the WAN likely to fail than the WAN router
• Prerequisites: WAN • Prerequisites: WAN
• Required: RT • Required: RT
• Has Sub-PODs: Go to 1.3.1 • Has Sub-PODs: Go to 1.3.2
• Components: WAN router • Components: WAN router
• Description: in this POD, a single WAN router is • Description: in this POD, a single WAN router is
connected to a single WAN provider and to either the connected to two WAN providers. The WAN router is
Core switch (LAN/DC) or the Network Services switch in also connected down to either the Core switch (LAN/DC)
the topology. or the Network Services switch in the topology.
Frameworks - WAN - 103
• When to use: if you require partial high-availability and • When to use: if you require full high-availability using
have concerns that the hardware is more likely to fail redundant hardware and WAN clouds
than the WAN cloud (or its connection) • Prerequisites: WAN
• Prerequisites: WAN • Required: RT
• Required: Routing • Has Sub-PODs: Go to 1.3.2
• Has Sub-PODs: Go to 1.3.1 • Components: WAN router
• Components: WAN router • Description: in this POD, dual WAN routers are
• Description: in this POD, dual WAN routers are connected to dual WAN providers as shown in the picture
connected to a single WAN provider. The WAN routers above. The WAN routers will also connect down to either
are also connected down to either the Core switch the Core switch (LAN/DC) or the Network Services switch
(LAN/DC) or the Network Services switch in the in the topology.
topology.
104 Frameworks - WAN -
Add-On PODs
Select one (or more) of the following add-ons to include to the WAN POD if needed:
WAN Distribution
WAN Distribution
POD: WAN-DIST
• When to use: if you require the WAN router(s) to • When to use: if you require the WAN router(s) to
connect into a single L3 WAN to provide full mesh connect into a single L2 WAN to extend one (or more)
connectivity with all sites on the WAN VLANs with one (or more) sites on the WAN
• Prerequisites: WAN-SRW or WAN-DRSW • Prerequisites: WAN-SRW or WAN-DRSW
• Required: RT and/or OVR-OTV • Required: SW
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: WAN router(s), WAN cloud • Components: WAN router(s), WAN cloud
• Description: in this POD, the WAN router(s) would be • Description: in this POD, the WAN router(s) would be
connected to a single L3 WAN cloud provider enabled connected to a single L2 WAN cloud provider enabled to
for MPLS. The connection would be an Ethernet hand- support VLAN tagging. Using a L2 WAN can allow
off. Using a L3 WAN can provide direct access to any VLAN(s) to be used between sites connected to the
site connected to the WAN without going directly WAN. As an alternative, the WAN router can be omitted
through another site (e.g. Main office or Data Center). and the L2 WAN using an Ethernet hand-off can be
plugged directly into the LAN/DC Layer-3 Core switch as
shown in the picture above.
Frameworks - WAN - Single WAN 107
Single Internet WAN using VPN Single Internet WAN using LISP
POD: WAN-S-IWAN-VPN POD: WAN-S-IWAN-LISP
• When to use: if you require the WAN (or Internet edge) • When to use: if you require (1) the WAN (or Internet
router(s) to connect into the Internet and use secure edge) router(s) to connect into the Internet. (2) You want
VPN tunnels to provide connectivity with other sites to use LISP (for routing service) and GET VPN (for
• Prerequisites: INET, WAN-SRW or WAN-DRSW encryption services) to provide connectivity with other
• Required: RT, SEC-NET-VPN-SVPN sites. And (3) the equipment will consist of Cisco routers.
• Has Sub-PODs: -- • Prerequisites: INET, WAN-SRW or WAN-DRSW
• Components: WAN router(s), WAN cloud • Required: OVR-LISP, SEC-NET-VPN-GETVPN
• Description: in this POD, the WAN router would be • Has Sub-PODs: --
connected to a single Internet provider with other sites • Components: WAN router(s), WAN cloud
connected to the Internet. The WAN router in the • Description: in this POD, the WAN router would be
topology can either be (1) a dedicated WAN router(s) connected to a single Internet provider with other sites
that is connected to the Internet. Or (2) use the existing connected to the Internet. The WAN router in the
Internet router (or firewall appliance) located in the topology can either be (1) a dedicated WAN router(s) that
Internet POD. The WAN router component would build is connected to the Internet. Or (2) use the existing
secure VPN tunnels (e.g. IPsec, DMVPN) with other Internet edge router located in the Internet POD. LISP
sites connected to the Internet. would be used to provide routing services for connectivity
between the sites. And GET VPN would be used with
LISP to secure all data communication between the sites.
The WAN router component must be a Cisco router
device in the topology to support LISP and GET VPN
services.
108 Frameworks - WAN - Dual WAN
L3 WAN + Internet WAN using VPN L2 WAN + Internet WAN using VPN
• When to use: if you require the WAN router(s) to • When to use: if you require the WAN router(s) to
connect with two L3 WAN clouds to provide full mesh connect with two L2 WAN to extend one (or more)
connectivity and redundancy with all sites on the WAN VLANs with one (or more) sites on the WAN. And to
• Prerequisites: WAN-SRDW or WAN-DRW provide redundancy between the sites.
• Required: RT • Prerequisites: WAN-SRDW or WAN-DRW
• Has Sub-PODs: -- • Required: SW
• Components: WAN router(s), WAN cloud • Has Sub-PODs: --
• Description: in this POD, the WAN router(s) would be • Components: WAN router(s), WAN cloud
connected to two L3 WAN (e.g. MPLS) cloud providers • Description: in this POD, the WAN router(s) would be
to provide cloud redundancy. Using a L3 WAN can connected to two L2 WAN cloud providers enabled to
provide direct access to any site connected to the WAN support VLAN tagging and provide cloud redundancy.
without going through another site (e.g. Main office or Using a L2 WAN can allow VLAN(s) to be used between
Data Center). sites connected to the WAN. As an alternative, the WAN
routers can be omitted and the L2 WAN using an
Ethernet hand-off can be plugged directly into the
LAN/DC Layer-3 Core switches as shown in the picture
above.
Frameworks - WAN - Dual WAN 109
L3 WAN + Internet WAN using VPN L2 WAN + Internet WAN using VPN
POD: WAN-D-L3WAN-IWAN-VPN POD: WAN-D-L2WAN-IWAN-VPN
• When to use: if you require a L3 WAN, due to better • When to use: if you require a L2 WAN, to support
SLA guarantees, but want an affordable redundant extending VLAN(s), but want an affordable redundant
WAN cloud to be available if the primary WAN cloud WAN cloud to be available if the primary WAN cloud fails
fails • Prerequisites: INET, WAN-SRDW or WAN-DRW
• Prerequisites: INET, WAN-SRDW or WAN-DRW • Required: SW, RT, SEC-NET-VPN-SVPN
• Required: RT, SEC-NET-VPN-SVPN • Has Sub-PODs: --
• Has Sub-PODs: -- • Components: WAN router(s), WAN cloud
• Components: WAN router(s), WAN cloud • Description: in this POD, the WAN router(s) would be
• Description: in this POD, the WAN router(s) would be connected to two different WAN clouds. The primary
connected to two different WAN clouds. The primary WAN would be a L2 WAN (e.g. VPLS) cloud provider
WAN would be a L3 WAN (e.g. MPLS) cloud provider. enabled to support VLAN tagging which would be
And the secondary WAN would be an Internet WAN plugged directly into the LAN/DC Layer-3 Core switch.
configured to build secure VPN tunnels (e.g. IPsec, And the secondary WAN would be an Internet WAN
DMVPN) with other sites also connected to the Internet. configured to build secure VPN tunnels (e.g. IPsec,
The secondary WAN router in the topology can either DMVPN) with other sites also connected to the Internet.
be (1) a dedicated WAN router(s) that is connected to The secondary WAN router in the topology can either be
the Internet. Or (2) use the existing Internet edge router (1) a dedicated WAN router(s) that is connected to the
(or firewall appliance) located in the Internet POD. Both Internet. Or (2) use the existing Internet edge router (or
clouds can provide direct access to any site connected firewall appliance) located in the Internet POD. Using
to the WAN without going through another site (e.g. this option requires a complex level of configuration to
Main office or Data Center). However, it requires a support this topology.
complex level of configuration to support this topology.
110 Frameworks - WAN -
1.4 Internet
Complete each of the design sections below for the solution.
Vendor Solutions
The hardware for the components in this framework consists of Routers and/or Firewalls. Select one of
the following vendors that will be used for the Internet edge routers (if applicable):
Cisco Routers
Hardware
Main PODs
Single Router & ISP Single Firewall & ISP Single Router, Firewall, & ISP
Dual Router & ISP Dual Firewall & ISP Dual Router, Firewall & ISP
• When to use: if you require (1) a connection to the ISP • When to use: if you require (1) a connection to the ISP
using a T1 or ATM transport. (2) Basic firewall services using an Ethernet transport. (2) Advanced firewall
(IP, Protocol, Port). And (3) do not have high- services (NGFW, IPS, URL). And (3) do not have high-
availability requirements for Internet services. availability requirements for Internet services.
• Prerequisites: INET • Prerequisites: INET
• Required: RT, SEC-NET-FW (FW/ACL), NAT • Required: RT, SEC-NET-FW (NGFW), NAT
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Edge router • Components: Firewall appliance
• Description: in this POD, a single edge router is • Description: in this POD, a single next-generation
connected to a single ISP using one (or more) T1 or firewall appliance is connected to a single ISP using an
ATM connections. The edge router will be enabled for Ethernet connection. The firewall appliance will be
NAT and basic firewall services filtering based on the enabled for NAT and advanced firewall services (e.g.
IP, protocol, and port number. It is also connected application filtering, IPS). It is also connected down to
down to either the Core switch (LAN/DC) or the Network either the Core switch (LAN/DC) or the Network Services
Services switch in the topology. switch in the topology.
Frameworks - Internet - 113
• When to use: if you require (1) a connection to the ISP • When to use: if you require (1) a connection to the ISP
using a T1 or ATM transport. (2) Basic firewall services using an Ethernet transport. (2) Advanced firewall
(IP, Protocol, Port). And (3) require partial high- services (NGFW, IPS, URL). And (3) require partial high-
availability with concerns that the ISP is more unreliable availability with concerns that the ISP is more unreliable
than a router failure. than a firewall failure.
• Prerequisites: INET • Prerequisites: INET
• Required: RT, SEC-NET-FW (FW/ACL), NAT • Required: RT, SEC-NET-FW (NGFW), NAT
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Edge router • Components: Firewall appliance
• Description: in this POD, a single edge router is • Description: in this POD, a single next-generation
connected to two (or more) ISP providers using T1 or firewall appliance is connected to two (or more) ISP
ATM connections. The edge router will be enabled for providers using Ethernet connections. The firewall
NAT and basic firewall services filtering based on the appliance will be enabled for NAT and advanced firewall
IP, protocol, and port number. It is also connected services (e.g. application filtering, IPS). It is also
down to either the Core switch (LAN/DC) or the Network connected down to either the Core switch (LAN/DC) or
Services switch in the topology. the Network Services switch in the topology.
114 Frameworks - Internet -
• When to use: if you require (1) a connection to the ISP • When to use: if you require (1) a connection to the ISP
using a T1 or ATM transport. (2) Basic firewall services using an Ethernet transport. (2) Advanced firewall
(IP, Protocol, Port). And (3) require partial high- services (NGFW, IPS, URL). And (3) require partial high-
availability with concerns that the hardware is more availability with concerns that the hardware is more
unreliable than a failure with the ISP cloud (or its unreliable than a failure with the ISP cloud (or its
connection). connection).
• Prerequisites: INET • Prerequisites: INET
• Required: RT, SEC-NET-FW (FW/ACL), REL-FHRP (or • Required: RT, SEC-NET-FW (NGFW), NAT
RT), NAT • Has Sub-PODs: --
• Has Sub-PODs: -- • Components: Firewall appliance
• Components: Edge router • Description: in this POD, two next-generation firewalls
• Description: in this POD, two edge routers are (likely in an Active/Active configuration) are connected to
connected to a single ISP using T1 or ATM connections. a single ISP using Ethernet connections. The firewall
A link should be connected between the two edge appliance will be enabled for NAT and advanced firewall
routers. The edge router will be enabled for NAT and services (e.g. application filtering, IPS). It is also
basic firewall services filtering based on the IP, protocol, connected down to either the Core switch (LAN/DC) or
and port number. It is also connected down to either the Network Services switch in the topology.
the Core switch (LAN/DC) or the Network Services
switch in the topology. Furthermore, the dual edge
routers will be configured for FHRP or an IGP routing
protocol (e.g. OSPF, EIGRP) if it is already used on the
network.
Frameworks - Internet - 115
• When to use: if you require (1) a connection to the ISP • When to use: if you require (1) a connection to the ISP
using a T1 or ATM transport. (2) Basic firewall services using an Ethernet transport. (2) Advanced firewall
(IP, Protocol, Port). And (3) require full high-availability services (NGFW, IPS, URL). And (3) require full high-
using redundant hardware and ISP clouds. availability using redundant hardware and ISP clouds.
• Prerequisites: INET • Prerequisites: INET
• Required: RT, SEC-NET-FW (FW/ACL), REL-FHRP (or • Required: RT, SEC-NET-FW (NGFW), NAT
RT), NAT • Has Sub-PODs: --
• Has Sub-PODs: -- • Components: Firewall appliance
• Components: Edge router • Description: in this POD, two next-generation firewalls
• Description: in this POD, two edge routers are (in an Active/Active configuration) are connected to two
connected to two (or more) ISP providers using T1 or (or more) ISP providers using Ethernet connections. The
ATM connections. A link should be connected between firewall appliance will be enabled for NAT and advanced
the two edge routers. The edge routers will be enabled firewall services (e.g. application filtering, IPS). It is also
for NAT and basic firewall services filtering based on the connected down to either the Core switch (LAN/DC) or
IP, protocol, and port number. It is also connected the Network Services switch in the topology.
down to either the Core switch (LAN/DC) or the Network
Services switch in the topology. Furthermore, the dual
edge routers will be configured for FHRP or an IGP
routing protocol (e.g. OSPF, EIGRP) if it is already used
on the network.
116 Frameworks - Internet -
Single Router, Firewall & ISP Single Router & Firewall + Dual ISP
POD: INET-SRFI POD: INET-SRFDI
• When to use: if you require (1) a connection to the ISP • When to use: if you require (1) a connection to the ISP
using a T1 or ATM transport. (2) Advanced firewall using a T1 or ATM transport. (2) Advanced firewall
services (NGFW, IPS, URL). And (3) do not have high- services (NGFW, IPS, URL). And (3) require partial high-
availability requirements for Internet services. availability with concerns that the ISP is more unreliable
• Prerequisites: INET than a hardware failure.
• Required: RT, SEC-NET-FW (NGFW), NAT • Prerequisites: INET
• Has Sub-PODs: -- • Required: RT, SEC-NET-FW (NGFW), NAT
• Components: Edge router, Firewall appliance • Has Sub-PODs: --
• Description: in this POD, a single edge router is • Components: Edge router, Firewall appliance
directly connected to a single ISP using T1 or ATM • Description: in this POD, a single edge router is directly
connections. Connected in-line between the edge connected to two (or more) ISP providers using T1 or
router and the LAN/DC is a firewall appliance enabled ATM connections. Connected in-line between the edge
for NAT and advanced firewall services (e.g. application router and the LAN/DC is a firewall appliance enabled for
filtering, IPS). The firewall appliance would be NAT and advanced firewall services (e.g. application
connected down to either the Core switch (LAN/DC) or filtering, IPS). The firewall appliance would be connected
the Network Services switch in the topology. down to either the Core switch (LAN/DC) or the Network
Services switch in the topology.
Frameworks - Internet - 117
Dual Router & Firewall + Single ISP Dual Router, Firewall, & ISP
POD: INET-DRFSI POD: INET-DRFI
• When to use: if you require (1) a connection to the ISP • When to use: if you require (1) a connection to the ISP
using a T1 or ATM transport. (2) Advanced firewall using a T1 or ATM transport. (2) Advanced firewall
services (NGFW, IPS, URL). And (3) require partial services (NGFW, IPS, URL). And (3) require full high-
high-availability with concerns that the hardware is more availability using redundant hardware and ISP clouds.
unreliable than a failure with the ISP cloud (or its • Prerequisites: INET
connection). • Required: RT, SEC-NET-FW (NGFW), FHRP (or RT),
• Prerequisites: INET NAT
• Required: RT, SEC-NET-FW (NGFW), FHRP (or RT), • Has Sub-PODs: --
NAT • Components: Edge router, Firewall appliance
• Has Sub-PODs: -- • Description: in this POD, dual edge routers are directly
• Components: Edge router, Firewall appliance connected to two (or more) ISP providers using T1 or
• Description: in this POD, dual edge routers are directly ATM connections. A link should be connected between
connected to a single ISP using T1 or ATM connections. the two edge routers. Connected in-line between the
A link should be connected between the two edge edge routers and the LAN/DC are redundant firewall
routers. Connected in-line between the edge routers appliances enabled for NAT and advanced firewall
and the LAN/DC are redundant firewall appliances services (e.g. application filtering, IPS). The firewall
enabled for NAT and advanced firewall services (e.g. appliances would be connected down to either the Core
application filtering, IPS). The firewall appliances would switch (LAN/DC) or the Network Services switch in the
be connected down to either the Core switch (LAN/DC) topology. Furthermore, the dual edge routers will be
or the Network Services switch in the topology. configured for FHRP or an IGP routing protocol (e.g.
Furthermore, the dual edge routers will be configured OSPF, EIGRP) with the firewall appliance if it will be used
for FHRP or an IGP routing protocol (e.g. OSPF, in the environment.
EIGRP) with the firewall appliance if it will be used in the
environment.
118 Frameworks - -
Add-On PODs
Select one (or more) of the following add-ons to include to the Internet POD if needed:
• When to use: if you require a dedicated network for • When to use: if you require a dedicated network to be
public facing servers and don’t want servers located on used for a specific purpose within the Internet POD
the LAN/DC to be accessed directly from the Internet. • Prerequisites: INET-*
• Prerequisites: INET-* • Required: --
• Required: -- • Has Sub-PODs: --
• Has Sub-PODs: -- • Components: Custom-purpose Switch
• Components: DMZ switch • Description: this POD can consist of a dedicated switch,
• Description: in this POD, a dedicated switch is used for router, and/or firewall that is reserved for a specific
Public facing servers. The DMZ switch will typically be function to the topology (e.g. business partner). This
plugged into a dedicated port on the firewall appliance custom purpose network would be connected into a
as shown in the picture above. dedicated port on the firewall appliance as shown in the
picture above.
Frameworks - - 119
Custom (External)
POD: INET-CUS2
2. Solutions
Select one (or more) of the following solution PODs that will be used in the design:
Optimization Security
POD: OPT POD: SEC
• When to use: if you want to increase performance for • When to use: if you want to implement network,
user endpoints across a slow (high latency) network (e.g. application, endpoint, and/or data security for your
WAN) environment. Strongly recommended for selection. Or if
• Prerequisites: WAN the business has regulatory/compliancy requirements.
• Required: -- • Prerequisites: INET, LAN and/or DC
• Has Sub-PODs: Go to 2.5 • Required: --
• Has Sub-PODs: Go to 2.6
Solutions - - 121
Wireless
POD: WIFI
• When to use: if you require implementing wireless
capabilities that user endpoints can use for accessing the
network
• Prerequisites: LAN
• Required: --
• Has Sub-PODs: Go to 2.9
122 Solutions - Collaboration -
2.1 Collaboration
Select one (or more) of the following Collaboration PODs that will be used in the design:
Presence Video
POD: COL-PRS POD: COL-VIDEO
• When to use: if you require IM capabilities and learning • When to use: if you require using one (or more)
about a user’s availability within the voice solution dedicated video endpoints in conference rooms,
• Prerequisites: COL-VOICE boardrooms, auditoriums, and other shared environments
• Required: -- • Prerequisites: COL-VOICE
• Has Sub-PODs: Go to 2.1.5 • Required: QOS
• Has Sub-PODs: Go to 2.1.6
Solutions - Collaboration - Voice 123
2.1.1 Voice
Complete each of the design sections below for the solution.
Vendor Solutions
Select one of the following vendors that will be used for the voice solution:
Avaya - Aura
If you require between 1,000 to 36,000+ phone endpoints
using an enterprise on-site solution
Integrated / Cloud
3CX
If you require a cloud-based PSTN solution using either Shoretel – Connect Onsite / Cloud
an on-site or cloud-based phone system. This solution is If you require up to 100 phone endpoints using an SMB on-
based on the number of concurrent calls which can site (or cloud-based) solution. Includes support for
support between 4 and 1024 concurrent calls. Includes Messaging and Call Center.
support for Messaging and Call Center.
Solutions - Collaboration - Voice 125
Deployment
Select one (or more) of the following PODs that will be used in the voice solution:
Dial Plan
• When to use: if you require using voice services at a • When to use: if you require using voice services across
single location multiple sites using a phone system and voice gateway
• Prerequisites: COL-VOICE-TOP located at the main office
• Required: COL-VOICE-SYSTEM, COL-VOICE-VGW, • Prerequisites: WAN, COL-VOICE-TOP
COL-VOICE-PHONE • Required: COL-VOICE-SYSTEM, COL-VOICE-VGW,
• Has Sub-PODs: -- COL-VOICE-PHONE
• Components: Phone System, Voice Gateway/PSTN, • Has Sub-PODs: --
Phone Endpoints • Components: Phone System, Voice Gateway/PSTN,
• Description: in this POD, a phone system is deployed Phone Endpoints
at a single location likely connected into the Core or • Description: in this POD, a centralized phone system
within the server farm with other voice related servers. and voice gateway are deployed at the main office. They
The voice gateway, used for external calling, would be will likely be connected to the Core switch. The phone
connected into the Core switch. And the phone endpoints would be connected to the access switches.
endpoints would be connected into the access switches. At the remote sites, they would only have phone
endpoints attached to their access switches. All phones
would register with the phone system and all external
calling would occur from the voice gateway at the main
office.
Solutions - Collaboration - Voice 127
• When to use: if you require using voice services across • When to use: if you require using voice services across
multiple sites using a centralized phone system at the multiple sites without a WAN and don’t want to route
main office. And require each site to do external calling voice traffic over VPN tunnels. Or if voice services will be
locally and not over the WAN through another site. managed differently at each site.
• Prerequisites: WAN, COL-VOICE-TOP • Prerequisites: WAN, COL-VOICE-TOP
• Required: COL-VOICE-SYSTEM, COL-VOICE-VGW, • Required: COL-VOICE-SYSTEM, COL-VOICE-VGW,
COL-VOICE-PHONE COL-VOICE-PHONE
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Phone System, Voice Gateway/PSTN, • Components: Phone System, Voice Gateway/PSTN,
Phone Endpoints Phone Endpoints
• Description: in this POD, a centralized phone system is • Description: in this POD, a standalone phone system
deployed at the main office. They will likely be and voice gateway would be deployed at each site on the
connected to the Core switch. The phone endpoints network. They will likely be connected into their local
would be connected to the access switches. At the Core switch. All phone endpoints would be connected to
remote sites, they would have phone endpoints the access switches and will register with their local
attached to their access switches. All phones would phone system. Each site would have their own voice
register with the phone system. Each site would have gateway used for external calling at that local site. For
their own voice gateway router used for external calling inter-site calling, SIP trunks would be established
at that local site. between the phone systems where needed.
128 Solutions - Collaboration - Voice
Configuration
Below are required, recommended, and optional configuration when deploying the voice topology on the
network:
• Quality of Service (QoS): should be implemented on all edge ports (on the Access switch) and all
Required
uplink/downlink ports including the Router WAN ports. It is recommended to use AutoQoS if you are
using Cisco Catalyst switches.
Recommended
• Multicast: should be enabled in the environment to work with Music on Hold (MoH) services especially
if it will be used over a WAN to remote sites with voice endpoints.
• None Available
Optional
130 Solutions - Collaboration - Voice
Select one of the following phone system deployments that will be used:
Cloud Deployment
• When to use: if you require an on-site phone system to • When to use: if you require an on-site phone system to
support up to 500 and 1,000+ users without high support over 1,000 users and/or require high availability
availability • Prerequisites: Voice Topology (COL-VOICE-TOP-S or
• Prerequisites: Voice Topology (COL-VOICE-TOP-S or COL-VOICE-TOP-MS*), Vendor (On-Premise)
COL-VOICE-TOP-MS*), Vendor (On-Premise) • Required: --
• Required: -- • Has Sub-PODs: --
• Has Sub-PODs: -- • Components: Phone System(s)
• Components: Phone System • Description: in this POD, one (or more) phone systems
• Description: in this POD, a single phone system (physical or virtual) is deployed to support redundancy.
(physical or virtual) is deployed without any redundancy Or to support a higher number of phone endpoints.
requirements.
Solutions - Collaboration - Voice 131
• When to use: if you require an on-site single phone • When to use: if you require using a cloud-based phone
system integrated with the voice gateway to support up system and PSTN deployment
to 1,000 phone endpoints • Prerequisites: Voice Topology (COL-VOICE-TOP-CLD),
• Prerequisites: Voice Topology (COL-VOICE-TOP-S or Vendor (Cloud)
COL-VOICE-TOP-MS1 or MS3), Vendor (Integrated) • Required: --
• Required: -- • Has Sub-PODs: --
• Has Sub-PODs: -- • Components: Phone System (Cloud)
• Components: Integrated Phone System • Description: in this POD, the phone system and voice
• Description: in this POD, a single phone system gateway are deployed (managed) at a cloud provider.
(integrated with the voice gateway) is used for all voice The site would only have phone endpoints connected to
services as shown in the picture above. This includes the access switches and will register with the cloud-
support for SIP trunks, Analog lines, and/or PRI circuits based phone system for calling and access to the voice
for external calling based on the phone system. features.
132 Solutions - Collaboration - Voice
Configuration - General
Below are required, recommended, and optional configuration when deploying a general phone system
on the network:
• Base Phone Features: these are basic phone features supported on all phone endpoints without any
required configuration. They include Placing/Receiving Calls, Call Forwarding, Transfer, Call Park,
Speed Dial, and Redial.
• Conferencing: a phone feature that provides the ability to share a single call with multiple participants.
The user can build a conference call directly from their phone then add multiple callers to the active
conference that is setup. This is called an Ad-Hoc conferencing setup.
• Paging: a phone feature that allows callers to send one-way broadcast messages across the voice
network. Implementing the paging feature will vary based on the phone system that is used. You can
use a third-party paging system such as Bogen TAMB which connects into a stereo amp and to an FXO
Optional
port on the voice gateway router. Or there could be paging capabilities built-in with the phone system
which will use the IP phones as the speaker system.
• Intercom: a phone feature that allows callers to setup a two-way channel between two phones.
Implementing the intercom feature will vary based on the phone system that is used.
• Fax: if you require users to send and receive digital documents through the voice network.
Implementing fax services will vary based on the phone system that is used. You can use a standalone
analog fax machine which would be plugged into an FXS port for sending and receiving fax messages.
You can use a dedicated third-party fax machine server such as a Castelle Fax Server. Or fax
messages can be sent and received over IP (Fax over IP). The fax messages would be converted to a
TIFF format then emailed to the intended fax user. This will typically be T.37 or T.38 faxing depending
on what is supported in the voice environment.
Solutions - Collaboration - Voice 133
Below are required, recommended, and optional configuration when deploying a Cisco Unified CM (or
Unified CM Business Edition) phone system on the network:
• Partitions & Calling Search Spaces (CSS): to provide a level of security where voice endpoints (e.g.
IP Phones) can only place calls with devices (or directory numbers) within their group called a Calling
Search Space (CSS). Each directory number (e.g. extension) or route pattern would be associated to a
partition. These partitions are assigned to a CSS group.
• Regions: determine the codec used for calls within a location or between other locations across the
Required
WAN. By default, phones will use G.711 codec for intra/inter-site calling.
• Outbound Calling: determine the dial plan and its associated route patterns that will be used for
external calling out to the PSTN.
• Inbound Calling: determine the number of digits you want the PSTN provider to pass down. Most
PSTN providers will send the last four digits of the DID number to the client’s voice gateway. For
example, if someone is calling DID 925-230-2203 then the PSTN provider will only forward “2203” to the
voice gateway.
Silver, and Bronze. A "Gold CSS" will allow calls anywhere. "Silver CSS" will allow only Local, 911, LD,
and Internal calling. This is ideal for most phones and employees. And a "Bronze CSS" will allow only
Local, 911, and Internal calling. This is ideal for phones in the lobby and public areas.
• Calling Search Spaces based on Calling Hierarchy: create CSS groups based on a calling hierarchy
structure. For example, a "CSS_Base" group can be applied to all phones globally to allow 911 and
internal calling. Then one of the following CSS groups can be applied directly to a directory number.
(1) "CSS_LocalPSTN" allows only local calling. (2) "CSS_NationalPSTN" allows Local and LD calling.
And (3) "CSS_InternationalPSTN" allows Local, LD, and International calling.
• Regions for Intra-Site Calling: for calls within a site, the region should be configured for the G.722 or
G.711 codec (80 kbps per call). There are no limits to the number of calls allowed within a site.
• Regions for Inter-Site Calling: for calls between sites over the WAN, the region should be configured
for the G.729 codec (24 kbps per call). For sites with 500 users, the default setting is two inter-site calls
(48 kbps). For sites with 10,000 users, the default is eight inter-site calls (192 kbps).
134 Solutions - Collaboration - Voice
• LDAP Integration: for end-user authentication integrate the Directory Services (e.g. Active Directory,
Open Directory) environment using LDAP with the phone system (Cisco Unified CM and Unified CM
BE). This will allow users to access the “User Options” page using their AD credentials to make
Recommended (2/2)
changes to their IP Phone and directory number. This is a best practice for maintaining a single
centralized location for all user authentication on the network.
• Real-Time Monitoring Tool (RTMT): an application on Cisco Unified CM which connects to the phone
system to provide system resource reports (CPU, Memory), logs, and active call activity.
• Music-On Hold over WAN: MoH at the main office should be streamed using multicast from the phone
system. MoH at the branch offices should be streamed directly from its local voice gateway and not
across the WAN consuming network resources.
• AAR: if you require voice calls between sites over the WAN to be automatically re-routed across the
PSTN if there are several active calls being established at one time.
• Medianet: using Medianet technologies within the network will help to simply and improve the quality of
the voice deployment.
• Call Detailed Records (CDR): provide reports of calls placed and received by phones in the voice
environment.
• Transcoding: provides the ability to translate one codec (like G.729) to another codec (like G.711). If
Optional (1/2)
you are using a software conferencing solution among the remote sites, transcoding can be enabled on
the WAN Aggregation router (or Voice Gateway) where a conference call from a remote site to the main
office would use G.729. At the main office, the router would transcode that stream to use G.711 since
the software conferencing solution only supports G.711.
• Device Mobility: an enhanced feature that allows a user's IP phone to roam between sites. This
feature works when the Cisco Unified CM phone system uses the IP Phone's IP subnet to determine
the physical location of the phone.
Solutions - Collaboration - Voice 135
• Call Pickup: a phone feature that provides the ability to pick-up a ringing call from another phone within
the same group.
• Extension Mobility: a phone feature that can dynamically configure a phone according to an
authenticated user’s device profile. When a user login to an IP phone with their username and PIN,
their device profile will be uploaded to that IP phone.
Optional (2/2)
• Single Number Reach (Mobile Connect): a phone feature that provides the ability that a ringing
extension will ring other phone devices such as mobile phones.
• Conferencing: a phone feature that provides the ability to share a single call with multiple participants.
Conferencing can either be hardware based (from the voice gateway) or software based (from the
phone system). Conferencing can be setup where the user can build a conference bridge directly from
their phone and have callers dial directly into the conference call. This feature is called MeetMe on
Cisco Unified CM. Or the user can build a conference call directly from their phone then add multiple
callers to the active conference that is setup. This is called an Ad-Hoc conferencing setup
136 Solutions - Collaboration - Voice
Select one (or more) of the following voice gateway deployments that will be used:
Voice Gateway with Analog Voice Gateway with PRI Voice Gateway with SIP Trunk
• When to use: if you require up to 4 concurrent calls • When to use: if you require up to 23 (or higher)
(placed or received) in the voice environment. This is concurrent calls (placed or received) in the voice
common for small sized networks. environment. This is common for SMB, medium, to large
• Prerequisites: COL-VOICE-VGW sized networks.
• Required: Router (FXO) • Prerequisites: COL-VOICE-VGW
• Has Sub-PODs: -- • Required: Router (PRI)
• Components: Voice Gateway • Has Sub-PODs: --
• Description: in this POD, the voice gateway would be • Components: Voice Gateway
connected to the PSTN using one (or more) analog • Description: in this POD, the voice gateway would be
lines. Each analog line can support 1 concurrent call connected to the PSTN using one (or more) ISDN PRI
(placed or received). As a best practice, it is circuits. Each PRI circuit can support up to 23 concurrent
recommended to use no more than 4 analog call (placed or received) as shown in the picture above.
connections (using FXO module) on the voice gateway
router.
Solutions - Collaboration - Voice 137
Below are required, recommended, and optional configuration when deploying a voice gateway on the
network with Cisco Unified CM (or Unified CM BE) as the phone system:
• DSP Resources: if you are using a Cisco Voice Router, they are required to have packet voice digital
signal processor (DSP) modules installed to perform any voice, transcoding, and conferencing services.
Required
The number of DSP and PVDMs needed is based on the total number of voice sessions expected.
These voice sessions can be (1) voice calls, (2) transcoding, and (3) conferencing. For example, a
"PVDM3-64" can support up to 64 voice sessions. This means, that PVDM can accommodate up to
one voice T1 (24 voice sessions) and five 8-party conference sessions (40 voice sessions).
• SRST: this is recommended for all branch offices using a WAN to communicate back to the phone
system cluster. If the phone system fails (with no secondary phone system available) or if the WAN
connection fails for a remote site, the IP Phones can use SRST fallback. In SRST fallback mode, the
Recommended
phones will register with the local voice gateway to place and receive calls until the phone system is
available again.
• Redundant PRI Circuits: it’s recommended to use a second PRI or analog lines if the primary PSTN
circuit should fail. Using different PSTN providers can provide higher reliability, but there may be
challenges for using the same DID block between two different PSTN providers. This redundancy
option is common for most business size networks with moderate voice calling requirements.
Redundant PRIs can also be helpful if there is a high call volume in the environment.
• None Available
Optional
Solutions - Collaboration - Voice 139
Select one (or more) of the following type of phone endpoints that will be used:
Video Endpoint
Employees Executives
POD: COL-VOICE-PHONE-EMP POD: COL-VOICE-PHONE-EXC
• When to use: determine the number of phone • When to use: determine the number of phone endpoints
endpoints that will be used by regular employees in the that will be used by executives (or management) in the
voice environment voice environment
• Prerequisites: -- • Prerequisites: --
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Phone endpoint • Components: Phone endpoint
• Description: this endpoint will typically be a standard • Description: this endpoint will typically be a standard
phone with 1-2 line appearances with a gray-scale phone with 2-3+ line appearances with a color display
display as shown in the picture above (e.g. Cisco 7821). and other advanced capabilities as shown in the picture
above (e.g. Cisco 8841).
140 Solutions - Collaboration - Voice
• When to use: determine the number of phone • When to use: determine the number of phone endpoints
endpoints that will be used by receptionist and/or help that will be used in conference rooms in the voice
desk employees in the voice environment environment
• Prerequisites: -- • Prerequisites: --
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Phone endpoint • Components: Phone endpoint
• Description: this endpoint will typically be a standard • Description: this endpoint will typically be a conference
phone with multiple line appearances to support many room based phone with an advanced speaker-phone
incoming/outgoing calls as shown in the picture above configuration as shown in the picture above (e.g. Cisco
(e.g. Cisco 7861). 7937G).
Solutions - Collaboration - Voice 141
• When to use: determine the number of phone • When to use: determine the number of phone endpoints
endpoints that will be used in the lobby area, break that will be used by employees, executives, to
room, locker room to kitchens in the voice environment contractors in the voice environment that do not require a
• Prerequisites: -- physical phone
• Required: -- • Prerequisites: --
• Has Sub-PODs: -- • Required: --
• Components: Phone endpoint • Has Sub-PODs: --
• Description: this endpoint will typically be a basic • Components: Phone endpoint
phone with 1 line appearance with no display as shown • Description: this endpoint is a software-based phone
in the picture above (e.g. Cisco 6901). endpoint, as shown in the picture above, that can be
installed on person’s computer (or mobile device). This
phone choice is becoming very popular in the voice
environment today.
142 Solutions - Collaboration - Voice
Video Endpoint
POD: COL-VOICE-PHONE-VID
Configuration
Below are required, recommended, and optional configuration when adding phones on the network:
• DHCP: required for the IP Phones to know how to connect to the phone system (e.g. Cisco Unified CM).
DHCP can be configured either on the network or on a DHCP server (recommended). Add “Option
150” pointing to the IP address of the TFTP server (in most cases the phone system like Cisco Unified
Required
CM) which is responsible for the phones to download their configuration and the latest firmware.
• Phone Firmware: if you are using a Cisco Phone System, the default firmware on the phone endpoints
will be SCCP. Otherwise, the phone endpoint would use the SIP phone firmware. Note: Cisco phones
can also support SIP firmware if needed.
• Voice VLAN: as a best practice configure a Voice VLAN for all voice traffic (e.g. IP Phones, Voice
Gateway) separate from the production data network configured in one (or more) Data VLANs. Cisco
Discovery Protocol (CDP) is required to provide the Cisco IP phones configuration details such as the
Voice VLAN it should use, power requirements, and the ability to prioritize traffic. As a result, 802.1Q
Trunking is used between all switches and the IP Phone to provide Data and Voice VLAN assignment.
Recommended
• Phone with Switch Port: if you are using a physical phone endpoint, it is recommended to get a phone
with an integrated switch port. This way, the user’s PC would be connected to the phone and the
phone would be directly connected to the access switch enabled for PoE.
• Power over Ethernet (PoE): it is recommended to provide power to the IP Phones from its connected
access switch. This can avoid using a phone adapter for all phones which can cluster a user’s work
space.
• Phone Firmware using SIP: if you require the phone endpoints to use SIP firmware for connecting with
the phone system and supporting capabilities such as URI dialing. Including the ability to use affordable
soft-phones instead of a physical phone.
• Phone Components: determine the type of phone endpoints needed based on the number of line
Optional
appearances (for extensions and speed dials), display (e.g. Color, Gray-scale, Touchscreen), speaker-
phone support, to having an integrated switch port.
144 Solutions - Collaboration - Voice
Select one of the following extension schemas that will be used in the solution:
7-Digit Extension
Select one (or more) of the following dial plans that will be used in the solution:
2.1.2 Messaging
Complete each of the design sections below for the solution.
Vendor Solutions
Select one of the following vendors that will be used for the messaging solution:
On-Premise
Cisco – Unified BE
Combined
Deployment
Select one of the following messaging deployments that will be used in the solution:
Combined Deployment
• When to use: if you don’t require high-availability for • When to use: if you require high-availability for the
the messaging system messaging system to provide minimal downtime if there
• Prerequisites: COL-MSG, Vendor (On-Premise) is a failure
• Required: -- • Prerequisites: COL-MSG, Vendor (On-Premise, CUC)
• Has Sub-PODs: -- • Required: --
• Components: Messaging server • Has Sub-PODs: --
• Description: in this POD, a single messaging system is • Components: Messaging servers
located within the server farm with the other voice • Description: in this POD, multiple messaging servers
related servers. are clustered together using a publisher server and
multiple subscriber servers. This cluster is located within
the server farm with the other voice related servers.
Solutions - Collaboration - Messaging 149
Combined Deployment
POD: COL-MSG-COMB
Below are required, recommended, and optional configuration when deploying a Cisco Unity Connection
messaging solution on the network:
• Voicemail Accounts: determine the number of voice mailboxes that will be used.
• Pilot Numbers: pilot numbers are required for all voicemail/messaging services that will be used such
as access to the voicemail system, auto-attendant (AA) menu, and access to the greeting administration
menu to record the greetings for the AA menu.
Required
• Voice Ports: determine the number of ports used between the voicemail server and the phone system.
The ports relate to the total concurrent number of calls (1) sent to a subscriber’s voice mailbox. (2)
Users checking their voicemail messages. (3) Message Waiting Indicator (MWI) notifications. And (4)
callers routed to an Auto-Attendant (AA) menu. For the total number of voice ports, it is recommended
to dedicate 25% of the voice ports for MWI and the other 75% for voicemail and AA purposes.
• Backups: always do scheduled backups on the VM/UM server. This way you can rebuild the server in
Recommended
a couple of hours if the messaging system encounters a failure. Cisco Unity Connection provides
scheduled backups through the Disaster Recovery System, which is highly recommended.
• Strong Passwords: it is recommended to use complex PIN/passwords for the voicemail accounts for
increased security
• Password Reset Policy: voicemail account PIN/Passwords should be reset every 180 days
• Account Lockout: account lockouts should be enabled if three failed login attempts occur
• Auto-Attendant (AA): if you require providing an automated menu for callers to access a directory
listing and other information/resources available.
• Voice Recognition: if you require providing the capability for users to use voice commands to access
various voice features and placing calls.
Email Notifications: if you require voicemail messages to be sent via email as an attachment or
Optional
•
receive a notification email that a new message has arrived.
• Unified Messaging: provide TTS (Text-to-Speech) capabilities for users to have their actual email
messages read back to them through any phone endpoint. Unified messaging also provides
synchronization of voicemail messages with a user’s email inbox. If a user hears a new message
through their email client (e.g. Outlook), it will automatically sync that status back to the VM/UM server
turning off the notification (MWI) on the user’s phone.
Solutions - Collaboration - Call Center 151
Vendor Solutions
Select one of the following vendors that will be used for the call center solution:
On-Premise
Cisco – Unified BE
Combined
Deployment
Select one of the following call center deployments that will be used in the solution:
Combined Deployment
• When to use: if you don’t require high-availability for • When to use: if you require high-availability for the call
the call center system center system to provide minimal downtime if there is a
• Prerequisites: COL-CC, Vendor (On-Premise) failure
• Required: -- • Prerequisites: COL-CC, Vendor (On-Premise, CCX)
• Has Sub-PODs: -- • Required: --
• Components: Call Center server • Has Sub-PODs: --
• Description: in this POD, a single call center system is • Components: Call Center servers
located within the server farm with the other voice • Description: in this POD, multiple call center servers are
related servers. clustered together using a publisher server and multiple
subscriber servers. This cluster is located within the
server farm with the other voice related servers.
154 Solutions - Collaboration - Call Center
Combined Deployment
POD: COL-CC-COMB
Below are required, recommended, and optional configuration when deploying a call center solution on
the network:
• Calling Queues (CSQ): determine the type of queues that will be implemented in the call center. It will
likely be a Support queue and/or a Sales queue in the call center environment. Keep in mind that there
may be multiple support/sales queues (e.g. IT support, product support, etc.) that may need to be
considered.
• Agent Extension: each agent should have a dedicated extension that will be part of a call center queue
to receive calls.
• Supervisor & Teams: for each call queue, determine who will be the supervisor that will be able to
monitor the call activity for the queue. Next, determine the agents that will be part of a team covering
Required
• Agent Selection using Longest Available: if you require all new calls to be sent to agents that has
been in a “ready state” the longest. This selection ensures that all calls are distributed fairly among all
agents in a CSQ (Recommended).
• Agent Selection using Most Skilled: if you require your most skilled (tier2, tier3) agents to answer
Recommended
new calls before the least skilled (tier1) agents for providing premium level support.
• Agent Selection using Least Skilled: if you require all new calls to be sent to tier1 support agents
before they are routed to more skilled agents (tier2 support).
• Reason Codes: its recommended to setup Reason codes which reflects the reason why an agent logs
out. The recommended reason codes to setup should be: End of Shift, Break, Lunch, Meeting. For
example, when an agent needs to logout of a queue, within the agent program a window would pop-up.
The pop-up window would present a couple of choices which would be the reason codes. If the user
selects "Lunch" then that would be recorded and can be viewed in the generated reports by the
supervisor.
• Interactive Voice Response (IVR): determine if Interactive Voice Response (IVR) will be used. IVR
involves recorded messages or text-to-speech for responding to caller inputs using DTMF signaling or
Optional
2.1.4 Conferencing
Complete each of the design sections below for the solution.
Vendor Solutions
Select one of the following vendors that will be used for the conferencing solution:
Cisco - WebEx
On-Premise
If you require between 1,000 to 10,000+ phone endpoints If you require up to 5,000 phone endpoints using a
using an enterprise on-site solution with basic voice commercial on-site solution with basic voice conferencing.
conferencing. Includes support for Voice. Includes support for Voice, Messaging, and Presence.
158 Solutions - Collaboration - Conferencing
Deployment
Select one of the following conferencing deployments that will be used in the solution:
Combined Deployment
Combined Deployment
POD: COL-CONF-COMB
2.1.5 Presence
Complete each of the design sections below for the solution.
Vendor Solutions
Select one of the following vendors that will be used for the presence solution:
On-Premise
Cisco – IM&P
If you require a standalone on-site solution for presence
to support between 500 and 5000 users
Integrated / Cloud
3CX FreePBX
If you require a cloud-based PSTN solution using either If you require up to 1,000 phone endpoints using an open-
an on-site or cloud-based phone system with presence & source on-site solution with basic presence support. Includes
chat support support for Voice, Messaging, and Call Center
Combined
Cisco – Unified BE
If you require up to 5,000 phone endpoints using an
enterprise on-site solution with presence support for 1000
users. Includes support for Voice and Messaging
160 Solutions - Collaboration - Presence
Deployment
Select one of the following presence deployments that will be used in the solution:
Combined Deployment
• When to use: if you don’t require high-availability for • When to use: if you require high-availability for the
the presence system presence system to provide minimal downtime if there is
• Prerequisites: COL-PRS, Vendor (On-Premise) a failure
• Required: -- • Prerequisites: COL-PRS, Vendor (On-Premise, IMP)
• Has Sub-PODs: -- • Required: --
• Components: Presence server • Has Sub-PODs: --
• Description: in this POD, a single presence system is • Components: Presence servers
located within the server farm with the other voice • Description: in this POD, multiple presence servers are
related servers. clustered together using a publisher server and multiple
subscriber servers. This cluster is located within the
server farm with the other voice related servers.
Solutions - Collaboration - Presence 161
Combined Deployment
POD: COL-PRS-COMB
2.1.6 Video
Complete each of the design sections below for the solution.
Vendor Solutions
Select one of the following vendors that will be used for the video solution:
Cisco – Telepresence
On-Premise
Deployment
Select one (or more) of the following video deployments that will be used in the solution:
• When to use: if you require using a video solution to • When to use: if you require using a video solution to
present a real-life in-person video collaboration allow one (or two) video endpoints to be present in the
experience as if all attendees are in the same room. room for individual high-quality point-to-point conference
This is common for large conference rooms. calls. This is common for meeting rooms, boardrooms,
• Prerequisites: COL-VIDEO auditoriums, and other shared environments.
• Required: -- • Prerequisites: COL-VIDEO
• Has Sub-PODs: -- • Required: --
• Components: Phone System (UCM), CTS server • Has Sub-PODs: --
• Description: in this POD, two server endpoints are • Components: VCS server, MCU server
required: (1) a Cisco Unified CM system is required to • Description: in this POD, two server endpoints are
provide call control for the video endpoints. And (2) a required: (1) Video Communication Server (VCS) is
Cisco Telepresence Server (CTS) is required for needed to provide call control for the video endpoints.
conferencing capabilities with the solution. The And (2) a Codian Multipoint Control Unit (MCU) is
communication between the components including the required for conferencing capabilities with the solution.
video endpoints involve SIP connections. The two The MCU server component can join multiple video and
servers would likely be connected to the Core switch as voice participants in a single conference call. The two
shown in the picture above. servers would likely be connected to the Core switch as
shown in the picture above.
164 Solutions - Collaboration -
Configuration
Below are required, recommended, and optional configuration when deploying a video solution on the
network:
• Quality of Services: a best practice that should be implemented on the LAN for all ports according to
Required
the QoS design (edge ports, uplink/downlink ports, and Router WAN ports if applicable) running video
services.
• Multicast: should be implemented to provide broadcast video delivery efficiency across the network.
• Video over IP Network: it is recommended to run your video collaboration traffic over an IP network
rather than a public ISDN.
• Bandwidth Considerations: It's recommended to allow 23% of the WAN bandwidth for video calls.
Each video call will typically consume up to 1.5Mbps. This is a general baseline to start with.
• Budgetary Considerations: the price for Telepresence is very expensive. Therefore, if the total travel
Recommended
cost (air travel, hotel, car rental, food, and other related fees) per person exceeds the price of the video
endpoint itself then purchasing a Telepresence solution would make business sense.
• Conference Room Considerations: for the table in the conference room, it’s recommended to not use
dark colors, patterns or glass. Use a natural wood color instead. For the acoustics, do not allow more
than 25-30db of sound so it doesn't transmit through the walls.
• Medianet (Performance Monitor): used to help simply and improve the quality of the video
deployment. It can also help to provide better troubleshooting tools when issues arise on the video
network. This includes using media traces for viewing the health of the network components along the
path. Medianet services should be enabled on all components within the WAN (HQ & remote site) and
LAN PODs.
• Media Services: content recording server where you can record and stream video meetings
• Duo-Video for Sharing Presentations
Optional
• Far End Camera Control (FECC): allows remote sites to change their viewing angle during a video call
• Multisite Conferencing: allow video endpoints with conferencing capabilities to add a third device into
a video call
• Multiway conferencing: allow video endpoints to start an ad-hoc multi-point call using a standard MCU
Solutions - Computing - 165
2.2 Computing
Select one (or more) of the following Computing PODs that will be used in the design:
• When to use: if you require (1) providing access to • When to use: if you require building a compute system
cloud-based applications and services for the endpoints (traditional and/or HCI) to create a large number of virtual
(e.g. Office 365). (2) To provide the capability to machines based on the amount of storage and compute
manage your server farm in the cloud (e.g. Amazon resources they will have
EC2). Or (3) to build a cloud-based service offering that • Prerequisites: DC
will be accessed by other customer environments (e.g. • Required: --
IAAS) • Has Sub-PODs: Go to 2.2.2
• Prerequisites: INET, LAN/DC
• Required: --
• Has Sub-PODs: Go to 2.2.1
166 Solutions - Computing - Cloud Computing
PaaS - Platform
POD: COMP-CLD-PAAS
• When to use: if you require utilizing cloud-based
platforms
• Prerequisites: COMP-CLD
• Required: --
• Has Sub-PODs: Go to 2.2.1.3
• Description: this POD is an Internet based service which
is deployed within a hosted provider infrastructure
connected to the Internet. There is no topology
deployed. In a PaaS, the customer is responsible for
managing the applications installed and the data.
Solutions - Computing - Cloud Computing 167
Vendor Solutions
Select one of the following vendors that will be used for the IaaS framework:
Vendor Solutions
Select one (or more) of the following vendors that will be used for cloud-based applications:
Vendor Solutions
Select one (or more) of the following vendors that will be used for cloud-based storage and platforms:
Vendor Solutions
Amazon AWS - S3
If you require using Amazon AWS’s S3 as a storage
platform that will be used by other servers / services
170 Solutions - Computing - Unified Computing
Vendor Solutions
Select one of the following vendors that will be used for the Unified computing solution:
Cisco – UCS
Traditional
Cisco – HyperFlex
If you require building a HCI solution for your Data Center Nutanix – NX Series
using Cisco based hardware by virtualizing the If you require building a HCI solution for your Data Center
computing, storage, and network resources. HyperFlex using Nutanix based hardware by virtualizing the computing,
(HX220, HX240) is based on Cisco UCS hardware using storage, and network resources.
Xeon E5 processors. You must have at least 3 HCI
nodes which is scalable up to 8 nodes.
Hyper Converged (HCI)
Deployment
Select one (or more) of the following UC deployments that will be used in the solution:
• When to use: if you require using a traditional • When to use: if you require using a traditional
computing system with one (or more) Cisco UCS B- standalone computing system (using the Cisco UCS C-
Series or C-Series servers that can be managed from Series) that can be managed independently to host
the Cisco UCS Manager several virtual machines
• Prerequisites: Hardware (Traditional - Cisco UCS) • Prerequisites: Hardware (Traditional - Cisco UCS)
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: UCS system, Interconnect switch • Components: UCS system
• Description: in this POD, all of the UCS systems are • Description: in this POD, the UCS system is treated as a
connected to one (or two) Cisco Interconnect switches standard bare-metal server running a hypervisor to
where the entire computing solution can be managed support several virtual machines. Each standalone
from the Cisco UCS Manager (stored on the system would be connected with the other servers on the
Interconnect switches). The interconnect switch would network. They would be connected to either the DC
connect to the Data Center Core (in a Traditional DC access switch (in a Traditional 2-Tier DC topology / Cisco
topology) or to one of the Leaf switches (in a SDN Nexus 2200 series) or the Core switch (in a Traditional 1-
topology). Tier DC topology / Cisco Nexus 5500 series).
172 Solutions - Computing - Unified Computing
HCI Deployment
POD: COMP-UC-HCI
Below are required, recommended, and optional configuration when deploying a Cisco Unified Computing
solution on the network:
• Network Adapter: determine the network adapter that will be used in the selected UCS systems.
• Physical and Virtual Servers: determine the number of servers needed for the Data Center based on
whether they will use an entire physical blade server or if servers will be virtualized within a single blade
server. If there is a mixture of both physical and virtual servers include both numbers.
Required
• Server Resources: determine the resources that will be used for each physical and virtual server. This
will include resources such as CPU, Memory, LAN & SAN connectivity, throughput, and Boot media
(server booting from disk or the SAN). For example, maybe we require our virtual machines to support
3-4GB of memory with dual 4-Core CPUs. They will boot from the SAN. And the required LAN
throughout would be 300Mbps and the SAN throughput would be 400Mbps.
• Network Adapter using CNA: if you are using Cisco UCS C-series servers, it is recommended to use
a network adapter that will support both Ethernet and Fibre Channel over Ethernet (FCoE). This will
allow both data and storage traffic to share the same physical cabling (up to two 10-Gigabit Ethernet
interfaces to a server). This is also called a Unified wire. This adapter should be used when the
standalone server will be connected to either a Cisco Nexus 2232PP FEX (Data Center Access) or
directly to the Cisco Nexus 5500UP (Data Center Core) for data and storage traffic. The Cisco Nexus
5500UP switch fabric would be responsible for splitting the FCoE traffic off to the Fibre Channel
attached storage array. If FCoE will be used, the uplinks must use a fiber optic or Twinax connection to
maintain the bit error rate (BER) thresholds for Fibre Channel transport.
• Network Adapter using Fabric Extender (or IOM): if you are using a Cisco UCS B-series chassis
server on the network. The Cisco UCS 2200 Series Fabric Extenders is like a mini fabric interconnect
switch that exist within the Cisco UCS 5100 Series Blade Server Chassis with four 10GE/Fibre Channel
ports. This module would then connect into a Fabric Interconnect switch. The Fabric Extenders would
be responsible for extending the fabric from the interconnect switches to each chassis for Ethernet,
Recommended
FCoE, and management purposes. Only two IOM can exist in a single UCS chassis. Furthermore,
Mezzanine Cards are used as virtual adapters to build a virtual NIC on the blade servers and bind them
to the Fabric Extender for network connectivity.
• Physical Servers based on High Performance: the Cisco UCS server can support 24-96GB+ of
memory with Dual 4-8 Core CPU. In this configuration, you could support up to 24 virtual machines with
4GB of memory. Or up to 32 virtual machines with 3GB of memory.
• Physical Servers based on Medium Performance: the Cisco UCS server can support 8-12GB of
memory with Dual CPU or Dual 4-Core CPU. In this configuration, you could support up to 3 virtual
machines with 4GB of memory. Or up to 4 virtual machines with 3GB of memory.
• Physical Servers based on Standard Performance: the Cisco UCS server can support 4-24GB of
memory with a Single/Dual CPU. In this configuration, you could support up to 6 virtual machines with
4GB of memory. Or up to 8 virtual machines with 3GB of memory.
• Power Calculation: determine the power needed based on the Idle load and overall usage. This will
include the load usage at 50% and the maximum usage at 100%.
• End-Host Mode: it is recommended to configure the Cisco Fabric Interconnect switches in “end-host”
mode. This will allow the fabric interconnects to operate as transparent switches connecting up to the
Data Center Core layer.
174 Solutions - Computing -
• Network Adapter using HBA: if the Cisco UCS C-series server will be connected directly into a Fibre
Channel storage fabric (or SAN switch).
Optional
• Network Adapter using Cisco VICs: used with Cisco UCS B-series servers to allow each virtual
adapter to appear as a separate virtual interface on the fabric interconnects. It can support up to 256
total virtual interfaces split between the vNICs and vHBAs.
Solutions - Load Balancing - 175
Local Global
POD: LB-LOCAL POD: LB-GLOBAL
• When to use: if you require distribution of traffic across • When to use: if you require load balancing between sites
a group of servers for increased performance and in the event that a site goes down or the local load
availability balancing resources are exceeded
• Prerequisites: LB • Prerequisites: LB, DC
• Required: -- • Required: --
• Has Sub-PODs: Go to 2.3.1 • Has Sub-PODs: Go to 2.3.2
176 Solutions - Load Balancing - Local - Load Balancing
Vendor Solutions
Select one of the following vendors that will be used for the local load-balancing solution:
Microsoft – NLB
If you require building a software-based load-balancing Radware - AppDirector
solution supported on Microsoft Window servers. This is If you require building a hardware-based load-balancing
common for a small number of servers mainly due to cost. solution using Radware’s AppDirector OnDemand hardware
However, NLB has load balancing limitations that can platform. This is recommended for medium to large sized
affect overall performance and operations. NLB can networks.
support up to 32 servers (advertised) using HTTP.
Solutions - Load Balancing - Local - Load Balancing 177
Deployments
Select one of the following load balancing deployments that will be used in the solution:
• When to use: if you require deploying the LB appliance • When to use: if you require deploying the LB appliance
in-between the server farm and the rest of the data using one interface connected into either the server farm
center. This POD is the most common over an OOB or to the DC/LAN Core switch
deployment. • Prerequisites: LB-LOCAL
• Prerequisites: LB-LOCAL • Required: --
• Required: -- • Has Sub-PODs: --
• Has Sub-PODs: -- • Components: LB appliance, Servers
• Components: LB appliance, Servers • Description: in this POD, the LB appliance uses a single
• Description: in this POD, the LB appliance uses two interface connected to the Data Center Core (or within
interfaces which is typically in-line between the server the Server Farm). This is the simplest deployment type
farm and the rest of the Data Center network. One to setup as it is not directly in the path of the traffic flow.
interface (internal facing) connects to where the load- It only receives traffic that is intended to be load
balanced server farm exists. And the other interface balanced.
(external facing) connects to where client requests
would be terminated to when accessing an application
that will be load-balanced on the backend.
178 Solutions - Load Balancing - Local - Load Balancing
Configuration
Below are required, recommended, and optional configuration when deploying a local load-balancing
solution on the network:
• Server Pool: define the server pools that will be used within a server farm in the Data Center. Within
each server pool determine the application and ports that should be load-balanced
Required
• Load Balancing Methods: determine how the servers within the server pool will be load-balanced.
The available options include Round Robin, Least Connections, Fastest Server, Ratio, etc.
• Virtual Address: for each server pool, determine the virtual address and port that will be used for how
clients will access the server pool.
• Load Balancing using Least Connections: each new client request is sent to the server that has the
least number of connections. If the server hardware is the same, this method is recommended to
Recommended
• Persistence: if you require the client to stay connected to the same server within a server pool. The
available options include source IP address or using HTTP cookies.
• Persistence using HTTP Cookies: if you are using a web server farm
SSL Termination: determine if SSL termination to the virtual address (and its server pool) on the load
Optional
•
balance appliance is required. In this option, a single SSL certificate would be installed on the load
balancer for a virtual address. Client requests would then be load balanced using HTTP requests to the
local servers within the pool. The web servers in the pool do not require SSL certificates unless end-to-
end server-side security is required. In this case, the load balance appliance would build a secure SSL
tunnel with the client and each of the servers in the pool.
Solutions - Load Balancing - Global - Load Balancing 179
Vendor Solutions
Select one of the following vendors that will be used for the global load balancing solution:
Vendor Solutions
F5 – BIG-IP DNS
If you require building a hardware-based global load-
balancing solution using F5 BIG-IP hardware. This is
recommended for medium to large sized networks.
180 Solutions - Network Management -
2.4.1 NMS
Complete each of the design sections below for the solution.
Vendor Solutions
Select one (or more) of the following vendors that will be used for the NMS solution.
network devices using an on-site commercial solution diagrams along with troubleshooting tools available
Vendor Solutions
Select one of the following vendors that will be used for deployment management:
Puppet Chef
Vendor Solutions
If you require using a deployment management tool that is If you require using a deployment management tool that is
aimed for system administrators working in aimed for developers who are familiar with Git and Ruby
heterogeneous network environments. Puppet uses a working in heterogeneous network environments. Chef uses
master-client model where a separate server is used for a master-client model where a separate server is used for the
the master role and all servers that will be managed will master role and all servers that will be managed will be
be considered as clients. considered as clients.
184 Solutions - Network Management - Security Management
Vendor Solutions
Select one (or more) of the following vendors that will be used for security management:
Fortinet
There are several security management products for
Vendor Solutions
Vendor Solutions
Select one of the following vendors that will be used for desktop management:
2.5 Optimization
Select one (or more) of the following optimization PODs that will be used in the design:
WAN Optimization
WAN Optimization
POD: OPT-WAN
Vendor Solutions
Select one of the following vendors that will be used for the WAN optimization solution:
is a virtual edition and a physical appliance available. and a physical appliance available.
Cisco – WAAS
If you require building a hardware-based WAN
optimization solution using Cisco-based hardware. This is
recommended for medium to large sized networks.
188 Solutions - Optimization - WAN Optimization
Deployments
Select one of the following WAN optimization deployments that will be used in the solution:
• When to use: if you require all traffic to be sent to the • When to use: if you don’t require all traffic to be sent to
appliance for WAN optimization. This is ideal for remote the appliance for WAN optimization. This is ideal for
sites. This deployment is most commonly used for Data Centers which only needs to optimize traffic to the
WAN optimization. remote sites.
• Prerequisites: OPT-WAN, Vendor (Any) • Prerequisites: OPT-WAN, Vendor (Any)
• Required: -- • Required: OPS-WCCP
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: WAN optimization appliance • Components: WAN optimization appliance
• Description: in this POD, the WAN appliance uses two • Description: in this POD, the WAN appliance uses a
interfaces which is typically in-line between the WAN single interface connected to either the LAN/DC Core
cloud and the LAN/DC network. switch or directly with the WAN router. WCCP would be
used for redirecting traffic to the WAN appliance for traffic
optimization.
Solutions - Optimization - 189
Below are required, recommended, and optional configuration when deploying a Riverbed Steelhead
WAN optimization solution on the network:
• Interfaces: define all of the interfaces that will be used on the WAN optimization appliance. They
include the LAN facing interface which will connect into the LAN/DC Core switch. There is the WAN
facing interface which will connect to the WAN cloud (or WAN router). There is the Primary interface
which is used for managing the appliance and would be plugged into a management VLAN on the
LAN/DC. And there is a logical interface (in_path) which is used for auto-discovery, peering with other
appliances across the WAN, and for traffic optimization.
• Choosing Hardware: for each optimization appliance that will be used on the network, select the best
Required
hardware model based on the business size, office type (branch office, Data Center), number of
concurrent TCP connections, WAN bandwidth, and the data store size.
• Optimization Mechanisms: determine all of the optimization mechanisms that will be used on the
appliance to learn and optimize traffic over slow networks. This will include Data, Transport,
Application, and Management streamlining.
• Auto Discovery: used to locate remote Steelhead appliances in order to optimize traffic between them.
There is basic and enhanced auto discovery.
• In Path & Peering Rules: it is important to setup rules between the client-end and the server-end
appliances to signify what subnets (or traffic) should be optimized over the WAN.
• Auto Discovery using Basic: if there are only two Steelhead appliances along the path between the
Optional
client-end and the server-end. It is recommended to implement Enhanced Auto Discovery instead.
190 Solutions - Security -
2.6 Security
Select one (or more) of the following security PODs that will be used in the design:
General Security Network Security Application Security Endpoint Security Cloud Security
There are many security mechanisms available to protect networks, applications, to endpoints. It will
depend on how much security is required for your network. There are two levels of security enforcement:
Security Level 1 (Static): the first security level is the most common and provides static security
protection. This involves using next-generation firewalls, endpoint security, to application security
products. Static security deals with blocking known threats based on threat signatures, categories, or IP
addresses found in a block list. The table below shows all of the security POD’s used to provide level 1
security. It is really broken up into sub-levels based on what the firewall supports. Most environments
use security at level 1.2 which involves deploying a next-generation firewall enabled for several security
features. Implementing all of level 1 provides stronger security. For example, incoming traffic will first
check the reputation (1.1) of the source and block if needed. Next, (1.2) the next-generation firewall
appliance will inspect the traffic against several filters. And lastly, (1.3) additional security can be added
directly to the applications and endpoints that are used.
Network Security: Firewall – Security Features: Application Control, Web/URL Filtering, Anti-Virus, IPS,
1.0
1.2
Security Level 2 (Dynamic): the second security level provides dynamic security protection. This
provides an advanced level or deeper inspection for known and zero day (real-time) threats. This means,
learning the behavior of traffic from the security products at the first security level. It can also sandbox
some of the traffic for deeper analysis on how dangerous it can be such as malware variants. If it
determines that it is a new undefined threat, it can inform the first security level products to block the new
threat. Furthermore, it will send the new threat info to it vendors threat research team (in the cloud) so it
can be crafted as a new signature then updated to all security appliances, everywhere. Implementing
Advanced Threat Protection would be the second level of security that can be enforced in the
environment:
Therefore, determine what level 1 (and/or level 2) security PODs should be used in the design.
192 Solutions - Security -
Network Security
Select one (or more) of the following Network Security PODs that will be used in the design:
Application Security
Select one (or more) of the following Application Security PODs that will be used in the design:
Additional Security
Select one (or more) of the following PODs that will be used in the design:
Cloud Security
POD: SEC-CLD
• When to use: if you require providing additional
security for cloud-based applications (SaaS) that are
used in the environment
• Prerequisites: --
• Required: --
• Has Sub-PODs: Go to 2.6.12
Solutions - Security - General Security 195
an email to visit any site that is asking you to log in. Instead,
not send sensitive information such as credit card
type in the website address into your web browser to get to
numbers, SSN, to account numbers.
the required website.
Change Control
Identity Theft Any configuration change that must be completed on any
network device must be reviewed and approved before
This ideals with someone stealing and using a person's
applying. This can lower the chance of user error that can
information. Do not give any personal information over
cause an outage. Having a change control process can help
the phone nor email to unknown persons.
others to understand what changes are being made and how
to revert back if necessary.
Documentation
Creating documentation and keeping it updated is very
important for understanding how your network is
designed. This is good for troubleshooting purposes
including planning like adding a new network solutions.
Documentation is also important plus mandatory when a
company follows a particular compliancy such as SOX or
HIPPA. Network documentation can include: Network
Diagrams and Contact List (Vendors, Providers).
Solutions - Security - General Security 197
PCI/DSS FIPS
Required compliancy if the company network deals with Security best practices of encryption and random password
credit card processing generation used for US Government network environments
Standards
ANSI
Security best practices of encryption and authentication of
financial transactions used for US banking network
environments
198 Solutions - Security - General Security
Below are the 12 PCI requirements for network implementation to be PCI compliant:
2.6.2 Firewall
Complete each of the design sections below for the solution.
Vendor Solutions
Select one of the following vendors that will be used for the firewall solution:
Deployment
Select all of the PODs that will be used for the solution:
• When to use: if you require deploying a firewall • When to use: if you require using the Internet edge
appliance to provide security protection for one (or router for basic firewall services without using a firewall
more) trusted internal networks such as the LAN and appliance
Data Center. This is recommended for the firewall • Prerequisites: SEC-NET-FW, Vendor (Integrated)
solution if it will be connected to the Internet. • Required: SEC2-ACL-INET
• Prerequisites: SEC-NET-FW-DEPLOY, Vendor • Has Sub-PODs: --
(Combined/Standalone) • Components: Edge router
• Required: -- • Description: in this POD, ACL services are configured
• Has Sub-PODs: -- on the Internet edge router acting as a basic Stateful
• Components: Firewall appliance firewall as shown in the picture above. No firewall
• Description: in this POD, a next-generation firewall appliance is required; however, only basic firewall
appliance will be deployed in-line between a trusted services are supported.
network (LAN, DC) and an untrusted network (Internet),
as shown in the picture above, enabled with various
security features.
202 Solutions - Security - Firewall
• When to use: if you require basic filtering between • When to use: if you require advanced filtering (e.g. URL,
VLANs on the LAN (or Data Center) Application, Malware, IPS) between VLANs on the LAN
• Prerequisites: SEC-NET-FW, Vendor (Integrated) (or Data Center)
• Required: SEC2-ACL-LANDC • Prerequisites: SEC-NET-FW, Vendor
• Has Sub-PODs: -- (Combined/Standalone)
• Components: Core switch • Required: SW
• Description: in this POD, ACL services are configured • Has Sub-PODs: --
on the Core switch within the LAN/DC. ACL rules are • Components: Core switch, Firewall appliance
configured on the Layer-3 VLANs interfaces (SVI) to • Description: in this POD, a firewall appliance is
restrict communication between the VLANs (e.g. User connected directly on the Core switch. 802.1Q Trunking
VLAN, Server VLAN, Guest VLAN) as shown in the would be configured between the Core switch and
picture above. Only basic firewall services are firewall appliance for the VLANs (e.g. User VLAN, Server
supported. VLAN, Guest VLAN) you want to secure as shown in the
picture above. This will allow restricting traffic and
providing advanced security protection for those secure
VLANs.
Solutions - Security - Firewall 203
• When to use: if you require high-availability with the • When to use: if you require high-availability with the
firewall solution and want one firewall appliance to be firewall solution and want both firewall appliances to be
active while the other is in standby mode ready to take actively running at the same time
over • Prerequisites: SEC-NET-FW
• Prerequisites: SEC-NET-FW • Required: --
• Required: -- • Has Sub-PODs: --
• Has Sub-PODs: -- • Components: Firewall Appliances
• Components: Firewall Appliances • Description: in this POD, two firewall appliances are
• Description: in this POD, two firewall appliances are connected in-line between the two networks you want to
connected in-line between the two networks you want to protect which will typically be the Internet and the
protect which will typically be the Internet and the LAN/DC as shown in the picture above. One (or more)
LAN/DC as shown in the picture above. One (or more) connections would exist between the firewalls to
connections would exist between the firewalls to exchange state information and configuration. In an
exchange state information and configuration. In an active/active configuration, both firewalls are active at the
active/passive configuration, one device is active while same time providing both redundancy and load balancing
the other device is in standby monitoring the operational capabilities.
status of the primary device and ready to transparently
takeover if a failure occurs.
204 Solutions - Security - Firewall
Configuration
Below are required, recommended, and optional configuration when deploying a firewall appliance on the
network:
• Layer-3 Mode: determine how the firewall appliance will be deployed in-line between the two networks.
The available options are Layer-2 mode and Layer-3 mode. The most common type (and the default) of
a firewall deployment is using Layer-3 mode.
Security Policies: firewall policies are required for what should be allowed inbound and outbound
Required
•
between the various network zones (e.g. Trusted, Untrusted, DMZ). Determine what services require
direct inbound access from the untrusted network and only allow those services with an inbound policy.
For outbound filtering determine if a whitelist policy (recommended) and/or blacklist policy (optional) will
be used.
• Application Categories: define the application categories that should be blocked.
• Whitelist Security Policy: this policy structure is recommended for environments that want to provide a
higher level of security or have regulatory requirements. Whitelist policy rules will block all outbound
traffic except for specific applications/services should be allowed. The default action in a whitelist policy
would be to “deny all” traffic.
• Security Policies for RFC1918: rules that should be added to an inbound access policy to filter any
private IP addresses sourced from the Internet which should only consist of Public IP addresses.
• Security Policies for RFC2827 (Anti-Spoofing): rules that should be added to an inbound access
policy to filter any source IP addresses that should only exist behind the firewall/trusted environment.
For example, let’s say that the trusted network is using the 4.4.4.0 subnet. Any communication from
that Public subnet should only be the source for outbound connections. For inbound connections, it
should appear in the destination field. If a new IP connection comes into the Public facing interface of
Recommended
the firewall/router and see’s that the source is 4.4.4.X then the connection is likely being spoofed in
some type of attack. Hence, that connection should be blocked.
• Security Policies for SMTP: configure a rule to allow SMTP outbound access from a set of authorized
SMTP servers. This ensures that SMTP related attacks caused by infected computers don’t send large
amounts of SPAM messages from the network causing network congestion. It can also potentially
blacklist an email server for a company that uses a fixed IP address (common for small and SMB sized
networks).
• Security Policies for DNS: configure an inbound rule to allow DNS on UDP port 53 if there will be an
internal DNS server that will be accessed from the Internet. Furthermore, it is recommended to block
DNS on TCP port 53 if zone transfers between authoritative name servers is not required. Opening
DNS on TCP/43 can allow hackers to perform reconnaissance attacks to learn about the network
environment to do further damage.
• Inspection for Real-Time Applications: if SIP (or H.323) traffic will be flowing through the firewall
appliance, it is recommended to disable application inspection for those real-time applications so SIP
traffic can operate correctly.
Solutions - Security - Firewall 205
• Blacklist Security Policy: this policy structure is the simplest to maintain for environments over
whitelist policy rules. Blacklist policy rules will block outbound access for specific applications/services
that poses the greatest risk to the internal network. The default action in a blacklist policy would be to
“permit all” traffic.
• Layer-2 Mode: if you require adding the firewall appliance between other networks without re-
addressing the hosts and/or network devices.
Optional
• Virtualization: if you require the firewall appliance to be partitioned (or virtualized) on the same physical
firewall. Common for hosted networks with clients using a virtualized firewall. This would be
considered as a type of NFV that can be used.
• Rate Limiting / Traffic Shaping: if you require rate limiting/shaping traffic to a specific bandwidth rate
for a user or security policy.
• Security Policies for Applications (Non-Business): it’s recommended to block any application for
any category not considered business relevant such as social networking (e.g. Facebook, Twitter).
206 Solutions - Security - Firewall
SSL/TLS Decryption
If you require decrypting secure web pages for further
inspection of threats and exploits. This operation is Reputation
accomplished when the firewall intercepts a secure
If you require proactive security by filtering traffic based on
session initiated by an internal user. In return, the secure
known domains and IP addresses with poor reputations
tunnel is now established between the destination site
associated with malicious activity
and the firewall acting on behalf of the client.
Furthermore, the firewall builds another secure tunnel with
the user.
Configuration - General
Below are required, recommended, and optional configuration when implementing security features on
the firewall appliance:
• Subscription & Licensing: make sure to activate and license all security features that will be
configured on the firewall appliance to receive the most recent attack signatures and updates.
• Allowed / Blocked File Types: determine what file types should be allowed (or blocked) on the firewall
appliance.
• Reputation List: based on the vendor solution, determine how the reputation list will be obtained in
which the firewall appliance will look at first before going through the configured security policies. This
Required
may be a list of IP address, domains, and/or URLs provided by the vendor (recommended) or an
external list managed by a third-party source.
• IPS Mode: determine the IPS mode that will be used. The available options include Active (Block) and
Passive (Monitor only) Modes.
• Certificate for SSL/TLS Decryption (Deep Inspection): user endpoints must trust the certificate
generated on the firewall appliance using either group policies (GPO) and/or manually importing the
certificate into the user’s web browsers to avoid receiving a security warning.
• Block security risk categories: it’s recommended to detect and block content for malicious sites,
phishing, spyware, anonymizers, proxies, hacking, Spam URLs, Malware, Botnets, C2 (C&C), TOR
(dark web), Bogon and any other critical/high security risk categories for all security features
implemented.
• Block inappropriate content categories: it’s recommended to block content for adult/mature websites
such as pornography including violence, illegal activities, drugs, racism, hate, etc.
• Block file sharing (and bandwidth consuming) categories: it’s recommended to block content for
P2P and BitTorrent applications.
Recommended (1/2)
• Block Categories for Public facing Servers: If there will be servers accessed from the outside, it is
recommended to enable critical/high severity + server-based threats for IPS signatures based on the
applications (e.g. HTTP, FTP) that are used. Those IPS signatures should be set to block for any
application attack that occurs to that inbound server.
• IPS Active Mode (Block): the IPS engine will inspect all traffic on the network. If there is any type of
attack or malicious activity it will proactively block the connection. This offers greater security protection
for preventing attacks on the network.
• Executable File Types: it’s recommended to block executable file types
• Data Filtering for CC & SSN: it is recommended to scan and block files containing credit card (CC)
numbers and social security numbers (SSN) being uploaded/download in the environment.
• Events and Alerting: confirm the appropriate action to take if an attack is discovered such as receiving
alerts via email, SMS messages, and/or generating a log event that can be viewed on the firewall
appliance.
208 Solutions - Security - Firewall
• Dynamic Block Lists: it is recommended to use a block list of IP addresses, domains, and URLs
Recommended (2/2)
maintained by the vendor such as Cisco with its Security Intelligence feed. Using third-party block lists
may not be regularly updated (or trusted) to add new IP addresses (or domains) with poor reputations.
• Web Categories for SSL/TLS Decryption: it is recommended to decrypt malicious (or high risk) site
categories for deeper inspection. Decrypting web-sites that contain private information such as banking
or financial sites are typically excluded from SSL inspection.
• Block non-business categories: it’s recommended to block content for any web category not
considered business related such as social networking (e.g. Facebook, Twitter), video (YouTube,
Netflix), to web-based email (e.g. Gmail, Outlook).
• URL Filtering based on Individuals: if you require creating a web security policy unique for certain
individuals that is different from other groups.
Optional
• URL Filtering based on Subnets (or Groups): if you require a web security policy for an entire subnet
(or group).
• Data Filtering for Data Patterns: if you want to scan and block files that contain certain patterns based
on a security requirement from being uploaded/download in the environment.
• IPS Passive Mode (Monitor): in this mode, the IPS/IDS engine will only inspect traffic on the network
and if there is any type of an attack it will only report back to the management server, send a log, and/or
send an email to the security administrator. This is also called “promiscuous mode”.
Solutions - Security - Firewall 209
Below are required, recommended, and optional configuration when deploying DoS protection on the
network:
• DoS Mechanisms: determine the DoS protection mechanism(s) that will be enabled on the security
Required
appliance (standalone or combined). They can include flood protection (TCP SYN, ICMP, UDP),
reconnaissance protection (port scan), and IP Packet based protection.
• DoS Mechanism using Flood Protection: this is recommended to be enabled to protect against TCP
SYN, ICMP, and UDP flood attacks. For TCP SYN flood protection you can enable either Random
Early Drop (default) or SYN Cookies (recommended if supported). RED is the most common
mechanism supported to provide protection for TCP SYN, ICMP, and UDP packets. SYN Cookies is
supported to provide protection for TCP SYN packets only. Flood protection should be configured to
Recommended
generate an alert, active RED (or SYN Cookies) operations, and define a maximum threshold when a
certain number of packets per second (pps) has been reached.
• DoS Mechanism using Reconnaissance Protection: this is recommended to be enabled to protect
against port scans, host sweeps, and UDP scans.
• DoS Mechanism using Packet based Protection: this is recommended to be enabled to protect
against IP spoofing, fragmented traffic, mismatched TCP segments, and rejecting non-SYN TCP
packets. It is also recommended to block IP packets with certain IP options set such as strict source
routing, loose strict routing and record route. These options could be used to change the routing path
to evade security measures. Other IP packet based protections for ICMP include blocking ICMP
fragments and ICMP packets larger than 1KB.
• Flood Protection using Small Session Tables: if you require the security appliance to keep a small
session table for all TCP sessions established through the firewall. This is accomplished by setting the
thresholds to alert if there are 10,000 SYN packets per second. It would also activate the SYN
Cookies/RED operations when the first TCP SYN message arrives. And the maximum number should
be set to 1 million packets per second. Using this approach will increase the CPU usage on the
security appliance.
• Flood Protection using Large Session Tables: if you require the security appliance to keep a large
session table for all TCP sessions established through the firewall to keep the CPU usage low. This is
accomplished by setting the thresholds to alert if there are 10,000 SYN packets per second and it would
also activate the SYN Cookies/RED operations at the same time. The maximum number would be set
Optional
Vendor Solutions
Select one of the following vendors that will be used for VPN and/or remote access:
Deployment
Select all of the PODs that will be used for the solution:
Select one (or more) of the following PODs that will be used:
• When to use: if you require building a permanent • When to use: if you require building a remote access
secure tunnel between two (or more) locations over the solution where users can access network resources
Internet (or WAN) remotely using a VPN client program
• Prerequisites: SEC-NET-FW-TYPE • Prerequisites: SEC-NET-FW-TYPE
• Required: -- • Required: --
• Has Sub-PODs: Go to 2.6.3.3 • Has Sub-PODs: Go to 2.6.3.4
• Components: VPN appliance • Components: VPN appliance
• Description: in this POD, the VPN appliance would be • Description: in this POD, the VPN appliance would be
connected to the Internet and the LAN/DC. It would connected to the Internet and the LAN/DC where the
build one (or more) secure VPN tunnels with other VPN network resources would be located as shown in the
appliances as shown in the picture above. picture above. The users would connect to the VPN
appliance using the IP address of the WAN facing
interface on the appliance.
Solutions - Security - VPN & Remote Access 213
• When to use: if you require (or prefer) VPN services to • When to use: if you require (or prefer) VPN services to
be enabled on the firewall appliance along with other be deployed on its own dedicated security appliance.
security features enabled such as IPS and URL. This is This is used if there will be a high number of VPN
used if there will be a moderate number of VPN connections.
connections. • Prerequisites: SEC-NET-VPN, Vendor (Standalone)
• Prerequisites: SEC-NET-FW, SEC-NET-VPN, Vendor • Required: --
(Combined) • Has Sub-PODs: --
• Required: -- • Components: VPN appliance
• Has Sub-PODs: -- • Description: in this POD, VPN services would be
• Components: Firewall appliance enabled on a dedicated firewall appliance. The VPN
• Description: in this POD, VPN services would be appliance would be deployed in-line between the Internet
enabled on the existing firewall appliance in the and the DC/LAN as shown in the picture above.
environment as shown in the picture above.
214 Solutions - Security - VPN & Remote Access
Integrated Deployment
POD: SEC-NET-VPN-DEPLOY-INTG
Flex VPN
Deployment
Below are required, recommended, and optional configuration when deploying Site-to-Site VPN on the
network:
• Encryption: determine what encryption protocol should be used for the VPN tunnel. Encryption
provides confidentiality for IP packets. It is the process where a key (cipher) is used to encrypt and
decrypt an IP packet across a VPN connection. The most popular encryption protocols used include
AES and 3DES.
• Authentication: determine what authentication protocol should be used for the VPN tunnel.
Authentication is used to verify the integrity (and its origin) of an IP packet using a one-way hash. The
most popular authentication protocols used include SHA-1 and SHA-2. MD5 is a legacy authentication
Required
protocol.
• Key Management: this is used with all VPN protocols for key management between the VPN nodes.
The available options include using a pre-share key or using Certificates.
• VPN Traffic: determine what subnets need to communicate with other subnets across the VPN. This is
configured in an Access Control List (ACL) for all sites accordingly. Any subnet not listed in the ACL will
not be routed over the VPN tunnel.
• Network Address Translation (NAT): it is important to disable NAT for the subnets that will be used
over the VPN tunnel. Otherwise, the VPN device will try to translate all communication between the
sites.
• Encryption using AES: it is recommended to use AES for the encryption protocol. There are different
cipher algorithms that include 128-bit keys (AES-128), 192-bit keys (AES-192), or 256-bit keys (AES-
256) for encrypting IP packets. 3DES should only be used if AES is not supported on the VPN device.
• Authentication using SHA-2: it is recommended to use SHA-2 for the authentication protocol which
provides a higher hash operation. There are different SHA-2 standards available that include 256-bit,
Recommended
Select one of the following VPN technologies that will be used for the client VPN solution:
IPsec VPN
POD: SEC-NET-VPN-IPSEC2
• When to use: if you require users to connect to the
corporate network remotely using a VPN client program
installed on their system
• Prerequisites: SEC-NET-VPN-CVPN
• Required: SEC2-VPN-IPSEC, Hardware (Router/Firewall
supporting IPsec for client VPN)
• Has Sub-PODs: --
218 Solutions - Security - VPN & Remote Access
Configuration
Below are required, recommended, and optional configuration when deploying Client VPN on the
network:
• Encryption: determine what encryption protocol should be used for the VPN tunnel. Encryption
provides confidentiality for IP packets. It is the process where a key (cipher) is used to encrypt and
decrypt an IP packet across a VPN connection. The most popular encryption protocols used include
AES and 3DES.
• Authentication: determine what authentication protocol should be used for the VPN tunnel.
Authentication is used to verify the integrity (and its origin) of an IP packet using a one-way hash. The
Required
most popular authentication protocols used include SHA-1 and SHA-2. MD5 is a legacy authentication
protocol.
• Key Management: this is used with all VPN protocols for key management between the VPN nodes.
The available options include using a pre-share key or using Certificates.
• IP Address Pool: determine what dedicated subnet (or range of IP addresses) will be assigned to the
VPN clients once they are connected successfully into the network.
• Network Address Translation (NAT): it is important to disable NAT for the subnets that will be used
over the VPN tunnel. Otherwise, the VPN device will try to translate all communication between the site
and the client.
• Encryption using AES: it is recommended to use AES for the encryption protocol. There are different
cipher algorithms that include 128-bit keys (AES-128), 192-bit keys (AES-192), or 256-bit keys (AES-
256) for encrypting IP packets. 3DES should only be used if AES is not supported on the VPN device.
• Authentication using SHA-2: it is recommended to use SHA-2 for the authentication protocol which
provides a higher hash operation. There are different SHA-2 standards available that include 256-bit,
384-bit, and 512-bit. SHA-256 is commonly used if it supported.
• Key Management using Certificates: it is recommended to use certificates for the VPN clients if there
Recommended
will be a high number of users. Using certificates is more secure and easier to manage, but it requires
additional configuration that can be complex from a support perspective. An alternative would be to use
pre-shared keys if you have a small number of VPN clients.
• Key Management using Pre-Share: this is the most common key management method used and the
easiest to setup. It is also important to note that using pre-shared keys are typically flagged in security
audits. Therefore, it is recommended to either use a complex pre-share key that is changed regularly.
Or implementing SSL VPN instead which is recommended between the two.
• Split Tunnel: this is a recommended feature to specify what traffic should be routed over the secure
tunnel for the VPN client. For example, if the VPN clients want to access internal network resources
they would be routed over the VPN tunnel. For all other access (e.g. Internet access), they would be
routed over their Internet connection.
Solutions - Security - Identity Control 219
Vendor Solutions
Select one of the following vendors that will be used for identity control on the firewall:
Deployment
Select one of the following deployments that will be used for identity control on the firewall:
Combined Deployment
Combined Deployment
POD: SEC-NET-ID-FW-DEPLOY-COMB
Configuration
Below are required, recommended, and optional configuration when deploying identity control on the
firewall appliance:
• Authentication Mode: determine how users will be authenticated before accessing services on the
Required
Internet. The available options include Active Authentication and Passive Authentication.
• Using Active Authentication: recommended for guest users, contractors, or any user system not
Recommended
added to Active Directory. The user would be redirected to a web-page (captive portal) to authenticate
before gaining access to network resources based on the user group.
• Using Passive Authentication: recommended for corporate user’s that have computers added to
Active Directory. This allows the user to login with their AD account and will be able to access Internet
services based on the group they are associated to. They are not required to authenticate through a
captive portal.
• None Available
Optional
Solutions - Security - Identity Control 223
Vendor Solutions
Select one of the following vendors that will be used for Identity control on the LAN.
Deployment
Select one of the following deployments that will be used for identity control on the LAN:
Large Deployment
• When to use: if you require identity control up to 20,000 • When to use: if you require identity control up to 20,000
endpoints without high-availability with low traffic usage endpoints with high-availability with low traffic usage
• Prerequisites: SEC-NET-ID-LAN, Vendor (Cisco ISE) • Prerequisites: SEC-NET-ID-LAN, Vendor (Cisco ISE)
• Required: OPS-AUTH, OPS-SNMP, SEC2-8021X, • Required: OPS-AUTH, OPS-SNMP, SEC2-8021X,
CDP/LLDP CDP/LLDP
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: ISE appliance • Components: ISE appliances
• Description: in this POD, a single ISE appliance is • Description: in this POD, two ISE appliances are
connected to either the Core switch (or within the server deployed and connected to either the Core switch (or
farm) as shown in the picture above. Based on the ISE within the server farm) as shown in the picture above.
hardware that is used, a single ISE appliance can The primary node provides all of the configuration,
support a maximum of 20,000 endpoints. authentication, and policy capabilities. The secondary
Cisco ISE node operates in a backup role.
Solutions - Security - Identity Control 225
• When to use: if you require identity control up to 20,000 • When to use: if you require identity control up to 500,000
endpoints with high-availability with moderate traffic endpoints with high-availability with high traffic usage
usage • Prerequisites: SEC-NET-ID-LAN, Vendor (Cisco ISE)
• Prerequisites: SEC-NET-ID-LAN, Vendor (Cisco ISE) • Required: LB-LOCAL, OPS-AUTH, OPS-SNMP, SEC2-
• Required: OPS-AUTH, OPS-SNMP, SEC2-8021X, 8021X, CDP/LLDP
CDP/LLDP • Has Sub-PODs: --
• Has Sub-PODs: -- • Components: ISE appliances
• Components: ISE appliances • Description: in this POD, there can be up to 40 ISE
• Description: in this POD, there are five ISE appliances appliances based on the number of endpoints supported
connected to either the Core switch (or within the server for identity control. They will likely be connected to the
farm) as shown in the picture above. Two of the Core switch as shown in the picture above. There will be
appliances will be primary and secondary ISE nodes a single primary ISE server, a logging server, and several
configured for the administration and monitoring secondary ISE servers behind a load-balancer to
personas. The other three ISE appliances will provide optimize the routing of AAA requests to the next available
network access, posture, guest access, client server. All of the network devices would only require a
provisioning, and profiling services. single entry for the AAA servers pointing to a virtual
address defined on the load balancing device.
226 Solutions - Security - Identity Control
Below are required, recommended, and optional configuration when deploying identity control on the LAN
using Cisco ISE:
• Identity Services: determine how users (or endpoints) will be authenticated on the LAN. The available
Required
options include MAB, Profiling, Passive Authentication (802.1x), and Active Authentication (Web
Authentication).
• Identity Services using 802.1X: if you require a user or endpoint to be authenticated using a user
account (local accounts or from Active Directory domain). This option requires 802.1X to be enabled on
Recommended
the endpoint and the switch port configured for port authentication. The ISE appliance also needs to be
integrated with Active Directory or LDAP for user authentication. This is also called Passive
Authentication.
• Identity Services using Web Authentication: this is recommended for guest users or endpoints not
enabled for 802.1X or its MAC address not added to the ISE appliance. The user would be redirected
to a web portal to authenticate before gaining access to network resources. In a Cisco solution, these
guest accounts would be managed through a sponsor-based web portal.
• Identity Services using MAC Address Bypass (MAB): if you want the endpoint to be authenticated
using only its MAC address and not be prompted to authenticate using a user account. This is common
for servers or other network devices you don’t want to be authenticated using an account. This option
involves adding the MAC address of the endpoint on the ISE appliance in order for the endpoint to
bypass authentication.
Optional
• Identity Services using Profiling: if you want the endpoint to be discovered for the type of device it is
(e.g. Phone, Access List) and apply a specific security policy to its switch port. This is common for
implementing identity services with IP Phones or Access Points connected to the network. This option
involves setting up device profiles that will allow the ISE appliance to pull information from the LAN
switches to determine if the endpoint is an IP phone, an access point, or maybe a Windows/Apple
desktop system.
Solutions - Security - Encryption 227
2.6.5 Encryption
Select one (or more) of the following encryption PODs that will be used in the solution:
Vendor Solutions
Select one of the following vendors that will be used for advanced threat protection on the network:
Networks firewall appliance in the environment FortiGate firewall appliance in the environment
Deployment
Select one of the following PODs for how advanced threat protection will be deployed:
• When to use: if you require enabling advanced threat • When to use: if you require enabling advanced threat
protection on the existing firewall appliance using a protection on a standalone sandbox due to privacy and
cloud-based sandbox regulatory requirements
• Prerequisites: SEC-NET-ATP, Vendor (Combined) • Prerequisites: SEC-NET-ATP, Vendor (Standalone)
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Firewall, Sandbox • Components: Firewall, Sandbox
• Description: in this POD, advanced threat protection is • Description: in this POD, the sandbox appliance is
enabled on the existing firewall appliance and will use a connected to the Core switch and would be integrated
cloud-based sandbox to perform deeper inspection of with its supported firewall appliance to perform deeper
known and zero day (real time) threats. inspection of known and zero day (real time) threats.
230 Solutions - Security - Web Security
Vendor Solutions
Select one of the following vendors that will be used for the Web Application Firewall (WAF):
Hardware / Software
Fortinet - FortiWeb
If you require a hardware-based WAF solution using Sucuri Security - WAF
Fortinet hardware providing PCI DSS compliancy. It can
If you require a software-based WAF to work with web
provide server load balancing, SSL termination, and
servers running WordPress in the environment. It can also
vulnerability scanning (e.g. DoS attacks, bots, and other
provide malware scanning and server hardening.
malicious activity). FortiWeb has an extension to support
advanced threat protection (level 2 security).
232 Solutions - Security - Mail Security
Anti-Spam Anti-Virus
To provide email inspection of messages to determine if To provide email content inspection of messages for any
the message is clean (normal) or a potential spam virus content (e.g. ransomware) embedded that can
message compromise the desktop endpoint and spread internally
Firewall Restriction
Security Best Practices
Vendor Solutions
Select one of the following vendors that will be used for the email security appliance:
Deployment
Select one of the following email security deployments that will be used in the solution:
• When to use: if you have moderate email traffic and/or • When to use: if you have moderate email traffic and/or
require placing the email security appliance in the DMZ require placing the email security appliance in the server
• Prerequisites: SEC-NET-MAIL-SOL, INET-DMZ farm
• Required: -- • Prerequisites: SEC-NET-MAIL-SOL
• Has Sub-PODs: -- • Required: --
• Components: Email security appliance • Has Sub-PODs: --
• Description: in this POD, the email security appliance • Components: Email security appliance
is plugged into the DMZ which is connected to the • Description: in this POD, the email security appliance is
firewall appliance as shown in the picture above. plugged into the Server Farm that exist on the LAN or
Data Center as shown in the picture above.
Solutions - Security - Mail Security 235
In-Line Deployment
POD: SEC-APP-MAIL-SOL-IL
levels of access to systems on the network including capabilities which are based on permissions to ensure that
access to files and applications users are not able to install unapproved applications
Vendor Solutions
Select one of the following vendors that will be used for the security agent on the endpoints:
Fortinet – FortiClient
Palo Alto Networks – Traps If you require using a security agent on to integrate with the
If you require using a security agent to integrate with the existing FortiGate firewall appliance. The agent provides
existing Palo Alto Networks firewall appliance. The agent Anti-Virus, URL filtering, application filtering, to vulnerability
has an extension to support advanced threat protection scanning. The agent has an extension to support advanced
(level 2 security) to provide deeper inspection for known threat protection (level 2 security) to provide deeper
and zero day (real-time) threats such as malware. inspection for known and zero day (real-time) threats such as
malware.
If you require using a security agent to integrate with the Carbon Black – CB Protect
existing Cisco ASA Firepower firewall appliance. The
If you require whitelisting applications that can be installed on
agent has an extension to support advanced threat
user endpoints to provide stronger protection against
protection (level 2 security) to provide deeper inspection
ransomware.
for known and zero day (real-time) threats such as
malware.
Cisco – Umbrella
If you require using a cloud-based security agent to
provide URL filtering, reporting, to advanced threat
protection for known and zero day (real-time) threats such
as malware.
240 Solutions - Security - Cloud Security
Vendor Solutions
Select one of the following vendors that will be used for cloud security:
Cisco – Cloudlock
If you require visibility and security control for SaaS and
PaaS used in the environment. This cloud-based offering
provides on-demand scanning of data to detect threats
such as malware. It can provide reports for audit,
compliancy, to user activity with SaaS applications.
Solutions - Software Defined Networks - 241
• When to use: if there is a lot of machine-to-machine • When to use: if you require optimizing application traffic
communication with similar functions and you want to (based on performance and latency) between sites using
manage the entire network from a centralized controller low-cost connectivity options (e.g. Internet).
• Prerequisites: DC-CLOS • Prerequisites: WAN
• Required: -- • Required: --
• Has Sub-PODs: Go to 2.7.1 • Has Sub-PODs: Go to 2.7.2
• Components: Spine switch, Leaf Switch, SDN • Components: SD-WAN Appliance (or WAN router)
controller • Description: in this topology, a SD-WAN enabled device
• Description: this POD will consist of one (or more) leaf would be connected to one or more service providers as
switches connecting to one (or more) spine switches. shown in the picture above. The appliance will connect
The server endpoints would be connected to the Leaf down into to either the Core switch (LAN/DC) or the
switches. The topology will also consist of a SDN Network Services switch in the topology.
controller appliance connected to one (or more) of the
Leaf switches.
242 Solutions - Software Defined Networks - Data Center (SDN)
Vendor Solutions
Select one of the following vendors that will be used for the SDN solution:
Cisco hardware Fortinet hardware which also provides support for OpenFlow
Deployment
Select one of the following SDN deployment(s) that will be used in the solution:
Hardware Deployment
Hardware Deployment
POD: SDN-DC-DEPLOY-HW
Below are required, recommended, and optional configuration when deploying SDN using Cisco ACI:
• Hardware for Spine-Leaf Switches: the topology requires that the spine and leaf switches consist of
Cisco Nexus 9K series hardware
• Hardware for SDN Controller: the topology requires using Cisco APIC for the SDN controller.
• Tenant: first define a logical container that will hold all routing and switching functions
• Private Network: define a private network which will provide the IP address space for the tenant
previously added. This would be equivalent to adding a VRF instance.
• Bridge Domain: define all bridge domains that will be used which would be a Layer-2 domain that
would be associated to a Private network. This would be equivalent to adding a VLAN.
• Subnet: define all IP subnet blocks that will be used and associate them to a bridge domain. This
would be equivalent to adding a VLAN SVI to an existing VLAN (bridge domain) to make that network
routable.
• Application Profiles: a necessary component that is used to define what server endpoints can access
within the SDN topology.
• End Point Groups: one (or more) groups are defined inside of an existing application profile to
describe common services and policies that are used within a server farm.
• Switch Profiles: add a profile that will be used to group one (or more) leaf switches in the topology.
• Switch Selector: specify each Leaf switch in the topology. This would be associated to a switch profile.
Interface Profiles: add a profile that can be used for grouping a range of interfaces on a particular Leaf
Required
•
switch. This interface profile would be associated to a single switch profile.
• Access Port Selectors: define a switch port or a range of switch ports on the Leaf switch that may be
commonly configured. The access port selectors would be associated to an Interface profile.
• Interface Policy Groups: define all groups that will be used to configure a common group of ports or
Access Port Selectors. There are three types of Interface policy groups that can be added. There is
access port policies, port channel interface policies, and VPC interface policies. An interface policy
group would be a mapped to a single Access port Selector.
• Interface Policies: this will be policies added to an interface policy group that will specify how a group
of ports will be configured. Some of these interfaces policies include: (1) Link level interface policies for
1G and 10G. (2) CDP interface policies to define if CDP should be enabled or disabled. (3) LLDP
interface policies to define if LLDP should be enabled or disabled. (4) Port Channel interface policies
for LACP to define bundling multiple interfaces together.
• Attachable Access Entity Profiles (AEP): an AEP needs to be defined to map the physical interfaces
and the VLANs that will be defined.
• Domains: used to store different types of VLANs that can be used with a group of switch ports. A
domain can be setup as a physical domain which means a standard Layer-2 broadcast domain (e.g.
VLAN). It can be a VMM domain which is used to permit VLANs with a directly attached hypervisor
host. You can setup a Layer-2 external domain or a Layer-3 domain if the VLANs will be used
externally. This domain would be associated to an AEP and a VLAN pool.
• VLAN Pools: add all VLAN IDs that will be used and map them to its correct Domain.
Solutions - Software Defined Networks - Data Center (SDN) 245
• Define one Switch Profile (with a single Switch Selector) for each leaf switch in the topology
• Define one Switch Profile for each pair of leaf switches that will be used for VPCs. This switch profile
Recommended
will have two Switch Selectors listing each of the VPC enabled leaf switches.
• Define one Interface Profile for each Switch Profile
• Define one Access Port Selector for each switch port that will be used in a Switch Profile. Do not define
a range of switch ports.
• Add a single VLAN ID to a single VLAN Pool. This will provide more flexibility if you need to remove a
VLAN from a pool.
• Filtering between Server Groups: if you want to restrict access between different server farms within
the SDN topology, you first need to specify the “Filters” listing what protocols and ports should be
allowed such as TCP/80 and TCP/443. Next, a “Subject” needs to be created which will define one (or
more) filters. These subjects are like creating an application group. For example, we can add a Subject
Optional
called “Web” that will list filters for TCP/80 and 443. Lastly, associate the subject(s) to a “Contract”.
This contract would be applied to different end point groups to specify what clients can access within
the server farm.
• VPC Protection Groups: used to define a pair of switches that will be configured for Virtual Port
Channels.
246 Solutions - Software Defined Networks - WAN (SD-WAN)
Vendor Solutions
Select one of the following vendors that will be used for the SD-WAN solution:
2.8 Storage
Select one (or more) of the following Storage PODs that will be used in the design:
Array Servers using Dual Fibre Array using FCoE & Servers using Array using Fibre Channel &
Channel Switch iSCSI Servers using FCoE
• When to use: if you require the storage array and • When to use: if you require the storage array and
servers to be connected into the existing Data Center servers to be connected into the existing Data Center
switches using FCoE for the storage transport. This switches using Fibre Channel for storage transport. This
POD is typically recommended for a SAN. POD is typically not used nor recommended.
• Prerequisites: SAN • Prerequisites: SAN
• Required: FCOE • Required: FC
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Storage Array, Servers • Components: Storage Array, Servers
• Description: in this topology, the storage array is • Description: in this POD, the storage array is connected
connected into the DC core switch using FCOE. The into the DC core switch using FC. The servers (with
servers (with CNA) would be connected into the DC HBA) would also be connected into the DC access (or
access (or core switch) using FCoE as shown in the core switch) using FC as shown in the picture above.
picture above.
248 Solutions - Storage -
Array & Servers using Single FC Switch Array & Servers using Dual FC Switch
POD: SAN-FC2 POD: SAN-FC3
• When to use: if you require building an isolated storage • When to use: if you require building an isolated storage
network using Fibre Channel with no redundancy network using Fibre Channel with high-availability
• Prerequisites: SAN • Prerequisites: SAN
• Required: FC, FC switch • Required: FC, FC switch
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Storage Array, Servers, FC switch • Components: Storage Array, Servers, FC switch
• Description: in this POD, the storage array and the • Description: in this POD, the storage array and the
servers (with HBA) are connected into a dedicated servers (with HBA) are connected to a pair of redundant
storage switch using FC as shown in the picture above. (with separate fabrics) storage switches using FC as
shown in the picture above.
Solutions - Storage - 249
Array using FCoE & Server using ISCSI Array using FC & Server using FCoE
POD: SAN-FCOE-ISCSI POD: SAN-FC-FCOE
• When to use: if you require the storage array to be • When to use: if you require the storage array to connect
connected into the existing Data Center switches using into the existing Data Center switches using Fibre
FCoE. But the servers will connect into the storage Channel, but the servers will use FCOE.
fabric using iSCSI. • Prerequisites: SAN
• Prerequisites: SAN • Required: FCOE, FC
• Required: FCOE, ISCSI • Has Sub-PODs: --
• Has Sub-PODs: -- • Components: Storage Array, Servers
• Components: Storage Array, Servers • Description: in this POD, the storage array would be
• Description: in this POD, the storage array is connected into the DC core switch using Fibre Channel.
connected into the DC core switch using FCOE. The The servers (with CNA) would be connected into the DC
servers would be connected into the DC access (or core access (or core switch) using FCoE.
switch) and will use ISCSI to register with the storage
fabric.
250 Solutions - Storage -
Configuration
Below are required, recommended, and optional configuration when deploying a storage solution on the
network:
• Licensing: to enable the use of Fibre Channel and/or Fibre Channel over Ethernet (FCoE) on Cisco
Nexus switches (if applicable) it requires the appropriate license to be activated
• Virtual SAN (VSAN): used to build a logical fabric on a single SAN switch (e.g. Cisco MDS 9100).
Each VSAN has its own set of services and address space which prevents an issue in one VSAN from
affecting other VSANs. Each VSAN is completely isolated which is a strong recommendation.
Required
• Zoning: to provide a SAN fabric to restrict visibility and connectivity among devices connected to a
SAN. This can be done for controlling which initiators can see which targets. Targets are basically
disks or tape devices. Initiators are servers that connect to a disk (or tape) on the storage array. You
can configure a single initiator and a single target per zone. Or you can configure a single initiator to
multiple targets in the same zone. However, you should limit zoning to a single initiator and target.
Initiator-based zoning allows a switch port to be independent by using the world-wide name (WWN) of
the server endpoint.
• Device Aliases: it is recommended to use a user-friendly naming format for pWWNs in a SAN fabric.
For example, let’s say we have a device alias for "r1a-c210-srv1-hba0-p1". This means our server
Recommended
named SRV1 (Cisco UCS 210) is located in rack 1A in our data center. This server is plugged into a FC
switch port from its primary HBA (hba0) on port 1.
• Quality of Service (QoS) for FCoE: recommended to provide lossless data for all FCoE traffic end-to-
end across the Data Center.
• Management using Cisco DCNM: if you are using Cisco based Data Center hardware with storage
components, it is recommended to use the Cisco Data Center Network Manager (DCNM) for SAN
essentials for managing the storage configuration (e.g. VSANs, zones, device aliases).
• Fibre Channel over IP: if you require extending Fibre Channel traffic over an L3 WAN. Fibre Channel
Optional
connections can be extended across long distances (in a WAN solution) using Fibre Channel over IP
(FCoIP) on a supported SAN switch (e.g. Cisco MDS 9148).
252 Solutions - Wireless -
2.9 Wireless
Select one (or more) of the following Wireless PODs that will be used in the design:
Wireless LAN
POD: WIFI-LAN
Vendor Solutions
Select one of the following vendors that will be used for the Wireless LAN solution:
If you require using an enterprise on-site solution using If you require using an enterprise on-site solution using Cisco
Cisco Aironet and WLC (standalone) hardware. The WLC Aironet and WLC (integrated) hardware. The WLC appliance
appliance would be a standalone appliance in the would be integrated within a supported Cisco Catalyst switch
environment. in the environment.
Ubiquiti - UniFi
If you require using an enterprise and/or cloud-based
Hybrid
Deployment
Select one of the following wireless deployments that will be used in the solution:
• When to use: if you require implementing a standalone • When to use: if you require implementing an on-site
controller and access points at a single site that you will wireless solution where the controller is consolidated
manage for all administrative tasks. Or if 100+ access within the Core switch in the environment
points will be used in the environment. • Prerequisites: WIFI, Vendor (On-Premise – Catalyst 3K
• Prerequisites: WIFI, Vendor (On-Premise - WLC) with WLC)
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Wireless Controller (Local), Access • Components: Core Switch with Wireless Controller,
Points Access Points
• Description: in this POD, the access points are • Description: in this POD, the access points are
controlled by a centralized controller (local mode) which controlled by a centralized controller which is
will be connected to the Core switch or the Network consolidated within the Core switch as shown in the
services switch. The access points would be connected picture above. The access points would be connected
across one (or more) access switch on the LAN. This across one (or more) access switch on the LAN.
topology is also recommended if the environment will
have 100+ access points.
Solutions - Wireless - Wireless LAN 255
• When to use: if you require using a cloud-based • When to use: if you require implementing a standalone
controller that is not on-site, but will have access points controller and access points on-site that you will manage
connected physically at the site for all administrative tasks. Plus, support to manage the
• Prerequisites: INET, WIFI, Vendor (Cloud) wireless network from the Internet if needed.
• Required: -- • Prerequisites: WIFI, Vendor (Hybrid)
• Has Sub-PODs: -- • Required: --
• Components: Cloud-based Controller, Access Points • Has Sub-PODs: --
• Description: in this POD, the access points are • Components: Wireless Controller, Access Points
controlled by a centralized controller that is located on • Description: in this POD, the access points are
the Internet. The access points would be connected controlled by an on-site wireless controller connected to
across one (or more) access switch on the LAN. the Core switch or Network services switch. The wireless
network can also be managed via the Internet (Cloud
Dashboard). The access points themselves would be
connected across one (or more) access switch on the
LAN.
Solutions - Wireless - Wireless LAN 257
Configuration
Below are required, recommended, and optional configuration when deploying a Wireless LAN solution
on the network:
• Wireless Networks (SSID): determine what wireless networks (SSIDs) will be configured based on the
type of user groups. This can be a wireless network for Corporate users, Guest users, or some other
custom use-case. Each wireless network (SSID) should be associated to a VLAN. 802.1Q Trunking is
used to support multiple VLANs across the LAN.
• Wireless Standard: determine the 802.11 services that should be used for the wireless access points.
Current 802.11 bandwidth technologies include 802.11g, 802.11n, and 802.11ac
Required
• Wireless Security: determine the security that will be used with the wireless network based on the
encryption and authentication method. This includes methods such as WPA, PEAP, and EAP-TLS.
• Power over Ethernet (PoE) for Access Points: it is recommended to provide power to the access
points from its connected access switch. This can avoid using a power adapter for all access points.
• DHCP for Access Points: required for the access points to get an IP address and connect to the
wireless controller. If you are using a Cisco Aironet wireless solution, DHCP option 43 is required to
map the access points to the WLCs.
• Site Survey: it is highly recommended to conduct a wireless site survey for access point placement on
the network. The site survey should consider the number of potential wireless users and concurrent
wireless users in a particular area of the building. It should consider the building layout by referencing
the building blueprints to determine the square footage for the area you want the wireless network to
cover. It should determine all of the noise and interference components such as other 802.11 devices,
building material such as glass, concrete, and metal. Also determine if the wireless coverage will be
used inside or extended outside of the building(s).
• Wireless Network for Corporate Users: it's recommended to add a wireless network for employees to
access internal network resources and the Internet.
• Wireless Network for Guest Users (BYOD): it's recommended to add a wireless network to allow
access to the Internet. Access to other networks (e.g. internal networks) should be restricted.
Recommended
• Wireless Security for Guest Users (BYOD): it is recommended to enable open authentication for the
guest SSID, but also provide a method where connected Guest users access a centralized Guest portal
(or captive portal) page before gaining network access. The portal page may require user
authentication or accepting a disclaimer defined by a security policy.
• Wireless Standard using 802.11n/802.11ac: it is recommended to consider implementing either
802.11n and/or 802.11ac (Wave 2) for the wireless radios. 802.11n can provide data rates up to
300Mb/s per access point by using wider WIFI channels (40 MHz wide channels). And 802.11ac, also
called Gigabit WIFI, can provide data rates between 433Mbps to 1.3Gbps by combining two of the
40MHz wide channels to 80MHz. Furthermore, 802.11ac only supports 5GHz (not 2.4GHz).
• Wireless Encryption using WPA2/AES (802.11i): it is recommended to deploy WPA2 using AES for
wireless encryption for the wireless networks. If this is not supported, an alternative can be WPA using
TKIP.
• Wireless Authentication using PEAP MS-CHAPv2: this is recommended for wireless authentication
for corporate wireless networks. This would force a user to authenticate (against Active Directory using
RADIUS) before gaining network access. Certificates are only required on the RADIUS server.
258 Solutions - -
• Antennas on Access Points: determine the type of antennas that will be used to provide wireless
coverage in unique areas with interference and building material such as glass or concrete. It can also
provide wireless coverage across long distances if the wireless network extends to the outside (or
inside). If the site survey and the building has any of these components consider external antennas for
the access points in the design.
• Wireless Controller Redundancy: if supported by the Wireless controller, for redundancy, multiple
Wireless Controller appliances can be configured together to provide redundancy for the Access Points.
You can also add additional access points to provide continued coverage if (1) one or more access
point fails and (2) if an access point gets oversubscribed with connected users.
• Wireless Authentication using EAP-TLS and PEAP MS-CHAPv2: this is required for achieving the
most secure wireless authentication, but it is the most complex to administer. This method uses
certificates on the RADIUS server and the wireless clients, plus the users must authenticate before
gaining network access.
• VPN across Wireless Solution: for unique requirements that require connecting the wireless network
on the outside of the network. The corporate users would then VPN (using IPsec or SSL VPN) into the
Optional
network to access internal resources. This does provide an additional layer of security (integrity and
confidentiality) for the Wireless network. However, this is typically not common nor recommended.
• Link Aggregation (LAG): if you need to bundle multiple Ethernet connections between the wireless
controller (if supported) and the LAN core switch to achieve higher bandwidth resources. Port Channel
would be required on the LAN core switch if LAG will be setup.
• Cisco FlexConnect: used to locally switch wireless packets at remote sites. This should be used if
Lightweight access points are deployed at the remote site connecting to a controller located at the HQ
site. If FlexConnect is not enabled for the remote site access points, then traffic could be routed back to
the HQ site then to the remote site even for local traffic. Furthermore, with a remote site access point
enabled for FlexConnect, if the WAN is down and/or cannot communicate with the Wireless LAN
Controller, it will act as a standalone access point.
• Cisco CleanAir: this is a Cisco wireless tool that is built into an access point. It monitors radio
interference acting as a built-in spectrum analyzer to provide self-healing and self-optimization on the
wireless network. It doesn’t eliminate wireless interference nor pollution in the air, but it allows the
access points to dynamically adjust its signal to avoid it. Cisco CleanAir also provides performance
protection for 802.11n networks.
Services - - 259
3. Services
Select one (or more) of the following services that will be used in the design:
Routing Security
POD: RT POD: SEC2
• When to use: required if your network will consist of • When to use: if you require VPN and ACL services to be
3 or more network devices implemented on the network based on a chosen security
• Prerequisites: LAN/DC, SW solution. Including providing a list of best practices that
• Required: -- should be implemented on all network devices.
• Has Sub-PODs: Go to 3.9 • Prerequisites: SEC-NET-VPN, SEC-NET-FW
• Required: --
• Has Sub-PODs: Go to 3.10
Switching Virtualization
POD: SW POD: VRT
• When to use: if you require networks to be used by • When to use: if you require creating isolated networks or
various endpoints across a LAN and/or Data Center network functions that can be used for connecting
• Prerequisites: LAN and/or DC customer networks. This will provide traffic and route
• Required: -- separation between the customer networks.
• Has Sub-PODs: Go to 3.11 • Prerequisites: SP, LAN and/or DC
• Required: --
• Has Sub-PODs: Go to 3.12
Services - Energy / Power - 261
EEE
POD: PWR-EEE
• When to use: an optional feature similar to EnergyWise,
that can be enabled on Cisco Small Business switches
by reducing the device’s power consumption when
network traffic is idle or low.
• Prerequisites: --
• Required: Cisco Small Business switches
• Has Sub-PODs: --
262 Services - Energy / Power - Power over Ethernet
Configuration
Select one (or more) of the following PoE options that will be used:
Below are required, recommended, and optional configuration when deploying PoE services on the
network based on the available options:
• PoE Type: determine what type of PoE is needed based on the devices that will be used. The available
Required
• Using PoE+: it is recommended to consider PoE+ to support more of the enhanced IP phones and
gigabit wireless access points (e.g. 802.11ac) that exist today.
• Using Unified PoE: this is recommended if you will have virtual desktops that can be powered via PoE.
264 Services - IPv6 -
3.2 IPv6
Select one (or more) of the following IPv6 PODs that will be used in the design:
Concepts
The total bits within a IPv6 address is 128-bits long consisting of eight 16-bit fields. Within each 16-bit
field, it will consist of four sub-fields that is 4-bits long.
An IPv6 address uses hexadecimal values which ranges from 0 to 9 and A to F. This will provide 16
possible values that can be used for each sub-field in the address.
The Network-ID is broken down further based on the Network Prefix and the Subnet Prefix:
For example, the Network-ID may be fd00:1::/64. In this network-ID, the network prefix would be "fd00"
and the subnet prefix would be "1". Together they will make up the network-ID, similar to IPv4.
The /64 indicates that the first 64-bits are used to represent the network-ID and the last 64-bits are used
to represent the interface-ID.
266 Services - IPv6 - IPv6 Deployment
Deployment in LAN POD (Dual Stack) Deployment in LAN POD (ISATAP) Deployment in WAN POD
• When to use: if you require running both IPv4 and IPv6 • When to use: when most of the network hardware is
within the LAN/DC. This is the most common and IPv4 enabled. This will likely be for environments that are
recommended option compared to using ISATAP within using older network hardware that doesn't support IPv6.
the LAN. Dual Stack is recommended over ISATAP.
• Prerequisites: LAN • Prerequisites: LAN
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: LAN Core Switch & Access Switches • Components: Core, Access, ISATAP device
• Description: In this POD, each network device runs • Description: In this POD, the user endpoints will be
both protocol stacks (IPv4 and IPv6). Furthermore, the enabled for ISATAP. They will establish an ISATAP
user endpoints (e.g. Microsoft Windows, Apple OS X, tunnel to a ISATAP server which may be the Core switch,
Linux) will also run IPv4 and IPv6 protocol stacks. distribution switch, or a dedicated switch handling all
ISATAP services. The endpoint will be configured with a
IPv4 address, but they will automatically be assigned an
IPv6 address from the ISATAP server once the tunnel is
established.
Services - IPv6 - IPv6 Deployment 267
• When to use: if you require extending the IPv6 network • When to use: if you require access to the IPv6 Internet
over an existing IPv4 WAN that doesn’t support IPv6 from the IPv6 internal network.
• Prerequisites: WAN • Prerequisites: INET
• Required: -- • Required: IPV6-ADD-GL or IPV6-ADD-INT-GL
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: WAN router(s) • Components: Edge router (or Firewall appliance)
• Description: in this POD, the WAN routers are • Description: in this POD, the edge router (or firewall
connected to an IPv4 WAN. The routers can be appliance) are connected to an ISP enabled for IPv6
configured for IPv6 over IPv4 GRE, 6to4, or 6RD. using global addressing. If the network will connect to a
These tunneling technologies do not provide data single ISP then a Provider Assigned (PA) global space is
encryption and integrity services. 6to4 (or 6RD) is required. If the network will be connected to two (or
recommended to build automatic tunnels with other more) ISPs then a Provider Independent (PI) global
sites over an IPv4 network (Internet WAN or L3 WAN). space is required.
268 Services - IPv6 - IPv6 Deployment
Configuration
Below are required, recommended, and optional configuration when deploying IPv6 services:
• Do not use easily guessed interface-IDs like "DEADBEEF", "CAFE", or "C0FFEE" to ensure it isn't
easily discovered in a network scan
• Disable route advertisements on point-to-point connections
• Tune the ARP table by setting the timeout to 200 seconds matching the MAC-address aging timer
Recommended (1/2)
• Blocking Hop-by-Hop and Routing Header Type 0 Packets: it's recommended to block potentially
malicious traffic that could be directed towards the network itself such as the Routing Header Type 0
(RH0) and the Hop-by-Hop (HbH) values that can be set in the IPv6 Extension Header.
• /64 Prefixes: this is recommended for user and server endpoints. This is required for SLAAC using
SEND/CGA or EUI-64. Including ISATAP which embeds the IPv4 address in the last 32-bits of the IPv6
address. This prefix size is also used for the Embedded RP in IPv6 Multicast
• /127 Prefixes: this is recommended for point-to-point connections between network devices which can
help against ping-pong network discovery attacks. This prefix size only accommodates two IPv6
addresses.
• /128 Prefixes: this is recommended for loopback addresses on network devices.
Recommended (2/2)
• IPv6 Prefix Guard: a first-hop security protocol feature that blocks traffic from sourced IPv6 addresses
that are outside the prefix gleaned from router advertisements
Optional
3.3 Multicast
Select one (or more) of the following Multicast PODs that will be used in the design:
Deployment using PIM-SM (ASM) Deployment using Bi-Dir PIM (ASM) Deployment using PIM-SSM (SSM)
• When to use: (1) if the network will have a moderate • When to use: if you require using a very scalable
use of multicast sources and receivers across the multicast domain to support thousands of receivers and
network such as voice services. (2) If you require sources sending multiple streams (many-to-many
support for IPv6 Multicast services. (3) If you require communication) in the environment
implementing Multicast redundancy. • Prerequisites: --
• Prerequisites: -- • Required: --
• Required: -- • Has Sub-PODs: --
• Has Sub-PODs: -- • Components: RP (Core switch), Layer-3 devices (WAN
• Components: RP (Core switch), Layer-3 devices (WAN routers, L3 Access switches)
routers, L3 Access switches) • Description: Bi-Directional PIM uses an Any-Source
• Description: PIM-SM uses an Any-Source Multicast Multicast (ASM) topology. In this POD, Bi-Directional PIM
(ASM) topology. In this POD, PIM Sparse Mode routing is implemented for the selected multicast groups across
is implemented for the selected multicast groups across the LAN, DC, and WAN. The Core switch(s) are
the LAN, DC, and WAN. The Core switch(s) are configured as the RP using either Auto-RP or Static RP
configured as the RP using either Auto-RP or Static RP. which is used as a key for Bi-Dir PIM. Multicast traffic can
Multicast traffic would flow downstream from the RP flow upstream and downstream throughout the network
towards the receivers that have requested to join a with multiple sources and receivers spread-out across the
specific multicast group. network.
Services - Multicast - 275
Configuration
Below are required, recommended, and optional configuration when deploying Multicast services:
• Positioning: determine the location of all multicast source and receiver endpoints connected across the
network.
Deployment using Any Source Multicast (ASM): if you are using a PIM-SM or Bi-Directional PIM
Required
•
deployment, a Rendezvous Point (RP) is required for the topology.
• Deployment using Source Specific Multicast (SSM): if you are using a PIM-SSM deployment, it is
required to implement IGMPv3 for the Group Management protocol in the topology. PIM-SSM also
requires using 232.0.0.0/8 for the multicast address scope.
• Use administratively scoped addresses (239.0.0.0/8) unless PIM-SSM is used which requires
232.0.0.0/8 addressing
• Tune PIM query internal timers to 1 second
• Use IP multicast boundaries to control where certain multicast traffic can go such as Wireless, WAN,
and VPN networks.
• Multicast Support at Layer-2: it is recommended to enable IGMP snooping (using IPv4) and/or MLD
snooping (using IPv6) on all switches with connected receivers attached. This mechanism will forward
multicast traffic to the switch ports with connected receivers that have requested the multicast stream.
This will free network resources and bandwidth on the switch.
• Multicast Fast Drop (MFD) should be enabled to rate limit non-RPF traffic. Many cases this is enabled
by default.
• RP Placement: it is recommended to implement the RP at the center of the network. This will likely be
the Core switch in the topology.
• RP IP Address: it is recommended to use a loopback IP address for the RP address. It should be
configured with a host address mask (32 bits).
• Redundancy for PIM-SM: it is recommended to setup MSDP and Anycast RP to provide RP
redundancy (and load balancing) in the PIM-SM domain. MSDP and Anycast RP should be configured
between the two LAN/DC Core switches in the topology.
• RP for IPv4: it is recommended to setup Auto-RP (or BSR) if new multicast services will be added to
the network over time. This is used for multicast networks to provide dynamic RP management and is
supported on networks using Cisco hardware. This is ideal for medium to large networks (including
small or SMB) for better administration, flexibility, and scalability for managing the RP on Layer-3
devices on the multicast network. You can also use a Static RP among the routers if the multicast
services will not change on the network.
• RP for IPv6: it is recommended to use BSR for delivering the RP-to-group mapping information within
the LAN or Data Center. You can also use Embedded RP if IPv6 Multicast needs to be routed across
domain boundaries such as remote sites.
• RP using Auto-RP: for Auto-RP tune the PIM RP announce internal timer to be between 3 to 5
seconds (default is 60 seconds)
Services - Multicast - 277
• Keep multicast traffic on the shared path (optional). This will reduce the number of multicast states
(S,G) from the leaf routers by keeping traffic on the shared tree
• Secure Multicast: to secure multicast traffic using GDOI with IPsec encryption
• Rogue Source Protection: optional security mechanism to allow what valid sources and multicast
group addresses should register with the RP.
• Rogue RP Protection: optional security mechanism to configure IGMP group access control to specify
what multicast groups receivers can join.
• Auto-RP Protection: optional security mechanism to configure an RP Announce Filter for valid RPs
and multicast group addresses that should be used on the network.
278 Services - NAT -
3.4 NAT
Select one (or more) of the following NAT PODs that will be used in the design:
Configuration
Select one (or more) of the following NAT options that will be used:
Below are required, recommended, and optional configuring when deploying NAT services on the
network based on the available options:
• Positioning: determine where NAT will be implemented in the topology. This will likely be the edge
Required
• Using PAT (or NAT Overload): it is recommended to enable PAT for internal endpoints such as user
and guest endpoints accessing the Internet.
• Using NAT Port Forwarding: it is recommended to use this NAT option if you have a small set of
Recommended
Public IP addresses or only need a few ports (e.g. HTTPS, RDP) that need to be forwarded to a server.
• Using Static NAT: it is recommended to use this NAT option if a wide range of services/ports will be
used for translation to a single server.
• NAT with VPN: it is recommended to disable NAT translations for networks that will be used over a
VPN. Otherwise, all communication over the VPN tunnel will be translated.
• NAT Transparency (NAT-T): it is recommended to allow support for NAT-T (or IPsec over UDP) to
allow VPN clients to connect from behind a NAT-enabled device.
280 Services - Operations -
3.5 Operations
Below reflect the main categories for the operation PODs:
User Specific
Select one (or more) of the following user specific services that will be used:
DHCP DNS
DHCP DNS
POD: OPS-DHCP POD: OPS-DNS
• When to use: if you require endpoints to obtain their • When to use: if you require endpoints accessing the
IP address automatically from a server (or network Internet or network resources using domain names
device) • Prerequisites: --
• Prerequisites: LAN • Required: --
• Required: -- • Has Sub-PODs: --
• Has Sub-PODs: -- • Description: a public (or external) DNS server can be
• Description: it is recommended to use a dedicated used if the site doesn’t require accessing internal
DHCP server for medium and large sized networks. endpoints by name. An internal DNS server can be
DHCP server enabled on network devices is common deployed if the site requires accessing internal endpoints
for smaller sized networks. Create all of the DHCP by name. The internal DNS server can also be configured
scopes required to include the address pool, DNS to use an external DNS server as DNS forwarders to
server(s), lease, and any specific options (e.g. phone handle DNS requests for Internet-based websites.
system, wireless, etc.)
Services - Operations - 281
Network Specific
Select one (or more) of the following network specific services that will be used:
Netflow NTP
POD: OPS-NF POD: OPS-NTP
• When to use: if you want to view top-talker • When to use: recommended protocol that should be
information based on the IP address and applications enabled on all network devices to pull their date and time
recorded from traffic flows through a network device. from a time server for accurate timestamps
Other use-cases include network planning and billing • Prerequisites: --
purposes. • Required: --
• Prerequisites: -- • Has Sub-PODs: --
• Required: Cisco Router (Netflow) • Description: it is recommended to use a reliable time
• Has Sub-PODs: -- server source such as the NIST Internet Time Server
• Description: when configuring NetFlow it is important (time.nist.gov).
to know what version (plus if it is supported) will be
used. It is recommended to use version 9 which
provides the most flexibility with exporting Netflow
data that has been collected. You can also enable the
“top-talker” feature to view top bandwidth users. It
can also be used to track general traffic patterns for
monitoring and troubleshooting purposes.
282 Services - Operations -
SNMP Syslog
POD: OPS-SNMP POD: OPS-SYSLOG
• When to use: used for monitoring a network device’s • When to use: used for recording system and log events
performance and operational status including other that can be stored locally or sent to a Syslog server
statistics • Prerequisites: NM-NMS
• Prerequisites: NM-NMS • Required: --
• Required: -- • Has Sub-PODs: --
• Has Sub-PODs: -- • Description: this is recommended to be implemented on
• Description: SNMPv3 is recommended to provide all network devices. This allows system/security related
increased security over SNMPv2c which uses clear- events to be sent to a centralized log server, so when
text for all communication. SNMPv3 provides there is an issue, you can look at the logs based on the
encryption for all communication between the timestamp.
network device and the NMS system.
Select one (or more) of the following Cisco specific services that will be used:
BIDI Breakout
POD: OPS-CSCO-BIDI POD: OPS-CSCO-BOUT
• When to use: if you want to allow a 40GE to run over • When to use: if you want to take a 40GE port and
a single pair of multi-mode OM3 fiber configure it as four individual 10GE ports
• Prerequisites: -- • Prerequisites: --
• Required: Cisco Nexus 7K • Required: Cisco Nexus 7K
• Has Sub-PODs: -- • Has Sub-PODs: --
• Description: reduces cabling requirements for 40GE • Description: You can configure a 40GE port to be used
connections. BIDI optics are supported on Nexus as four independent 10GE interfaces. No reload or reset
7000/7700 F3 and M2 series modules is required for any of the components when you enable
breakout. These interfaces can be configured as routed
ports, switch ports, port channels or FEX interfaces.
EPLD EEM
POD: OPS-CSCO-EPLD POD: OPS-CSCO-EEM
• When to use: a Nexus feature that provides • When to use: a feature that can monitor key system
hardware functionality to the I/O modules components such as CPU utilization, interface errors,
• Prerequisites: -- counters, SNMP, and SYSLOG events
• Required: Cisco Nexus 7K • Prerequisites: --
• Has Sub-PODs: -- • Required: Cisco Nexus 7K
• Description: EPLD upgrades is a separate and • Has Sub-PODs: --
independent process from ISSU. The upgrade is • Description: Cisco IOS technology that runs on the
disruptive to traffic hence the module must be control plane. It is a combination of processes designed
powered down during upgrade. Lastly, EPLD to monitor key system parameters such as CPU
upgrades are not always required. It is utilization, interface errors, counters, SNMP, and
recommended to view the EPLD release notes for SYSLOG events.
more information.
NSF/SSO StackWise
POD: OPS-CSCO-NSF POD: OPS-CSCO-STW
• When to use: a recommended feature that should be • When to use: if you require using a stack-based Cisco
implemented on supported hardware to provide fast Catalyst 3700 series switch in the environment
switchover between supervisor engines in a chassis- • Prerequisites: LAN-1T-C/S, LAN-2T-C/S, DC-1T-C/S, or
based switch DC-2T-C/S
• Prerequisites: -- • Required: Cisco Catalyst 3750 series
• Required: Cisco Catalyst 6K, 4K • Has Sub-PODs: --
• Has Sub-PODs: -- • Description: Cisco StackWise Plus is supported on a
• Description: SSO provides fast transparent data selected number of Cisco Catalyst switches which can
plane switchover when there is a hardware failure. It stack up to 9 switches with sub-second failure recovery.
can synchronize its active processes and
configuration between two redundant supervisor
engines inside of a supported Cisco Catalyst chassis-
based switch. If a failure occurs, the NSF/SSO
convergence time is between 1-3 seconds, but the
links are not dropped and no convergence occurs on
the network. Furthermore, some features and
protocols may be NSF-aware like HSRP.
286 Services - Operations -
StackPower VDC
POD: OPS-CSCO-STPWR POD: OPS-CSCO-VDC
• When to use: if you require sharing power across a • When to use: if you require creating several virtual
stack of Cisco Catalyst 3750 switches used in the switches on Cisco Nexus hardware
environment • Prerequisites: --
• Prerequisites: LAN-1T-C/S, LAN-2T-C/S • Required: Cisco Nexus 7K
• Required: Cisco Catalyst 3750-X series • Has Sub-PODs: --
• Has Sub-PODs: -- • Description: you can create up to four logical switches.
• Description: provides capability of sharing power The default VDC on the Nexus switch is 1. Each VDC
across a stack of Cisco Catalyst 3750-X switches for runs its own independent processes to prevent
flexibility to use all power supplies available in the performance issues in other VDCs.
stack.
VPC VSS
POD: OPS-CSCO-VPC POD: OPS-CSCO-VSS
• When to use: a feature that allows building a port • When to use: an advanced feature that can make two
channel between two Cisco Nexus switches to physical switches appear as one logical switch
appear as one logical port channel connection • Prerequisites: LAN-2T-PHY-VSS
• Prerequisites: DC-2T-PHY-VPC or DC-2T-UNF-VPC • Required: Cisco Catalyst 6K, 4K
• Required: Cisco Nexus • Has Sub-PODs: Go to 3.5.3
• Has Sub-PODs: Go to 3.5.2 • Description: VSS is typically implemented on the LAN
• Description: VPC can be implemented down to DC Core switches to appear as one logical switch. VSS
access switches. Or with servers connected off of does not rely on STP and is limited to be configured
the DC access switches in the topology (called between only two switches. If a Port Channel is
Enhanced VPC). There is also extended VPC configured between the two VSS switches to a single
support for Data Center networks using FabricPath access switch, the access switch will assume it is really
called VPC+. See the VPC PODs for further design peering with a single switch increasing the overall
planning and details. availability for the connected hosts on the switch. See the
VSS PODs for further design planning and details.
Cisco Medianet
POD: OPS-CSCO-MN
• When to use: optional Cisco feature recommended
for networks enabled for Voice and Video solutions
• Prerequisites: COL
• Required: --
• Has Sub-PODs: --
• Description: Cisco Medianet has many capabilities
such as media monitoring and awareness to provide
increased visibility for the voice engineer. It can also
provide proactive management and troubleshooting
of network resources. The Cisco Medianet media
monitoring capabilities consist of Performance
Monitor, Mediatrace, and using the IP SLA Video
Operation (VO). The Cisco Medianet media
awareness capabilities consist of Flow Metadata, the
Media Services Interface (MSI), and the Media
Services Proxy (MSP).
Services - Operations - Port Channel (802.3ad) 287
Deployment in LAN/DC
Deployment in LAN/DC
POD: OPS-PC-STD
Configuration
Below are required, recommended, and optional configuration when deploying Port Channel services.
• Negotiation Protocol: determine what port channel protocol will be used for bundling multiple
interfaces and building a port channel with the neighboring device. The negotiation protocols include
Required
• Negotiation Protocol using LACP: recommended protocol to use since it is an industry standard
Recommended
protocol that can be used with Cisco and other vendor devices. This can include dual-homed servers
that may need to be port channeled to the Data Center switch. LACP can also support a higher number
of interfaces that can be bundled together.
• Load Balance Hash: a port channel is really load balancing between multiple interfaces that are
bundled together. The recommended hash algorithm to use for the port channel bundle is “src-dst-ip” or
“src-dst-port” depending on what hash algorithm is supported on the hardware.
• None Available
Optional
Services - Operations - Virtual Port Channel (VPC) 289
• When to use: if you require building a port channel • When to use: if you require extending VPC down to the
between two Cisco Nexus switches to appear as one DC access layer to allow servers to be dual-homed
logical port-channel connection to a DC access switch between two DC access switches
• Prerequisites: DC-2T-PHY-VPC or DC-2T-UNF-VPC • Prerequisites: DC-2T-PHY-VPC or DC-2T-UNF-VPC
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: VPC peers (DC Core switches), DC • Components: VPC peers (DC Core switches), DC
access Access, Servers
• Description: in this POD, VPC would be configured • Description: in this POD, VPC would be configured
between two DC core switches. The DC access switch between two DC core switches. The DC access switch
(using either Ethernet or FEX connections) would build (using either Ethernet or FEX connections) would build
a Port Channel between the two VPC peers as shown in Port Channels with one (or both) of the VPC peers. The
the picture above. This configuration is called a Multi- server would be dual-homed between two of the DC
Chassis EtherChannel (MEC). The DC access switches access switches as seen in the picture above. This
can have multiple uplinks in the port channel with the configuration is called an Enhanced VPC since the VPC
VPC peers to provide minimal resiliency. It is functions are pushed down to the DC access layer in the
recommended to use two Ethernet or FEX uplinks to the topology. It is recommended to use two Ethernet or FEX
VPC core. uplinks to the VPC core.
290 Services - Operations - Virtual Port Channel (VPC)
VPC+
POD: OPS-CSCO-VPC+
Configuration
Below are required, recommended, and optional configuration when deploying VPC services.
• Hardware: it requires using Cisco Nexus hardware, modules (Supervisor Engine, Line modules), and
OS software that support VPC
• Licensing: to enable the use of VPC on a Cisco Nexus switch it requires the appropriate license to be
activated
• Services: it is required to implement UDLD, Port Channel, Bridge Assurance, and a FHRP when
deploying VPC
• vPC Domain: it is required to define a single vPC domain that will include the two vPC enabled devices,
the vPC peer link, the vPC peer keepalive link, and all of the Port Channels created from the two vPC
Required
peers.
• vPC Peer Link: it is required to define an interface that will be used between the vPC peer devices for
synchronizing control plane traffic. You should have at least two 10-Gigabit Ethernet interfaces for the
peer link.
• vPC Peer Keepalive Link: this is more of a recommendation, but also define a dedicated interface that
will be used to monitor the health of the other vPC peer by sending periodic keepalive messages. No
data traffic is synchronized over this link.
• Layer-2 Connection for DC Access: it is required to configure Layer-2 vPC connections between the
VPC peers (Core layer) and the DC access switches.
• Priority: it is recommended to define which VPC switch in the domain will be the active/primary switch.
The default priority value is 32,768. It is recommended to configure a lower priority value, such as
16000, on the VPC switch that will be the active switch in the domain.
• It is recommended to enable “auto-recovery” on the VPC peers to increase resiliency
Recommended
• Maximum Fabric Uplinks: it is recommended to configure the maximum number of fabric uplinks using
either Twinax (CX-1) cabling or Fabric Extender Transceivers (FET) with OM3 multi-mode fiber
• Storage with Enhanced VPC: if EtherChannel servers will use FCoE, the storage traffic must be
isolated and cannot connect to both Core switches.
• Multicast: an unused VLAN for IP Multicast (“bind-vrf”) replication synchronization should be used
between the vPC switches. This VLAN cannot appear in the configuration, VLAN database, nor
included in any Trunk security list. It will automatically setup packet replication across the vPC peer link
when needed.
• Object Tracking: an optional vPC feature that can monitor the state of critical interfaces on the Data
Center Core (using Cisco Nexus 5500). It can track interfaces and perform an action which could
Optional
relinquish vPC domain control to the other vPC switch. This requires implementing a vPC peer
keepalive link within the vPC domain. Enabling this feature is recommended if the Data Center vPC
Core will connect to a LAN Core. Object tracking would be enabled on the physical ports that connect
into the LAN Core switch.
292 Services - Operations - Virtual Switching System
Configuration
Below are required, recommended, and optional configuration when deploying VSS services.
• Hardware: connect two Cisco Catalyst switches (e.g. Cisco Catalyst 6500 VSS 4T) together using
10GE connections supporting VSS to provide the Virtual Switch Link (VSL).
• VSS Domain & Switch ID: define a unique domain shared by both switches including a unique number
(e.g. switch ID) for each switch in the VSS domain
Required
• VSL Link: configure a VSL link between the two VSS switches. The VSL allows the supervisors to
communicate using SSO redundancy to keep the control plane synchronized between the two
supervisor engines. To build the VSL, use unique port channel numbers on each VSS switch.
• Virtual Mode Operation: enable the virtual mode operation which will renumber the interfaces to the
format of “interface [switch number]/[module number]/[interface on module]”. Doing this operation will
reboot both of the switches and the standby switch will display a "Standby" prompt.
• Dual-Active Detection Mechanism: setup Dual-Active detection mechanism using Fast Hello (VLSP)
between the two VSS switches. If the VSL link fails, both supervisors would resume the active control
plane role creating a dual-active condition. To prevent dual-active scenarios, VSS supports a dual-
active detection mechanism which will trigger VSS recovery mode. In VSS recovery mode, only one
supervisor is allowed to remain active while the supervisor on the other VSS switch goes into recovery
Recommended
mode. As a result, the VSS switch in recovery mode will shut down all of its interfaces except for the
VSL link to prevent instability. Once the VSL is restored, VSS would reload the switch that was in
recovery mode and return to a normal operating mode. Fast Hello (VLSP) is recommended using a GE
interface between the two VSS switches. This detection link is used for exchanging control plane hello
messages between the two switches.
• Virtual MAC Address: by default, the active switch in the VSS domain uses the default chassis-based
MAC address pool assigned to the switch. It’s recommended to set a virtual MAC address for the VSS
system, so that either active supervisor in the domain will use the same MAC address pool.
• VSS Quad Supervisor SSO (VS4O): recommended on LAN Core switches using Cisco Catalyst 6800
series hardware
• Enhanced Fast Software Upgrade (EFSU): provides the capability to upgrade IOS software on the
Optional
VSS Cisco Catalyst 6K switches. It is based on ISSU allowing support to perform IOS upgrades without
downtime. ISSU allows VSS to maintain 50% of bandwidth during software upgrade. It also allows for
different images to run on the Active and Standby Supervisor Engines.
294 Services - Overlay / Tunneling -
OTV LISP
POD: OVR-OTV POD: OVR-LISP
• When to use: if you need to extend VLANs across a • When to use: a naming service used by routers to get
WAN with other data centers routing information for reaching other sites (or Data
• Prerequisites: DC, WAN Centers)
• Required: Routers/L3-Switches • Prerequisites: DC, WAN
• Has Sub-PODs: Go to 3.6.3 • Required: Routers/L3-Switches
• Has Sub-PODs: Go to 3.6.2
VXLAN NVGRE
POD: OVR-VXLAN POD: OVR-NVGRE
• When to use: used in a IaaS environment with a large • When to use: an alternative to VXLAN which uses GRE
number of virtualized customer networks to scale beyond to tunnel Layer-2 packets over a Layer-3 network
VLANs (4000+) • Prerequisites: DC
• Prerequisites: DC-CLOS • Required: Routers/L3-Switches
• Required: Routers/L3-Switches • Has Sub-PODs: --
• Has Sub-PODs: Go to 3.6.5
3.6.1 FabricPath
Select one (or more) of the following FabricPath PODs that will be used in the design:
Deployment with Dual Spines Deployment with Multiple Spines Deployment with Border
• When to use: if the DC is using a Spine-Leaf CLOS • When to use: if the DC is using a Spine-Leaf CLOS
topology with dual Spine switches providing access to topology with 3-4 Spine switches providing access to the
the WAN, Internet, and/or Traditional DC WAN, Internet, and/or Traditional DC
• Prerequisites: DC-CLOS • Prerequisites: DC-CLOS
• Required: Cisco Nexus, OPS-CSCO-VPC+ • Required: Cisco Nexus, OPS-CSCO-VPC+
• Has Sub-PODs: -- • Has Sub-PODs: --
• Description: in this POD, FabricPath is enabled on the • Description: in this POD, FabricPath is enabled on the
interfaces (core ports) between the Spine and Leaf interfaces (core ports) between the Spine and Leaf
switches. The Leaf switches will have servers and/or switches. The Leaf switches will have servers and/or
Ethernet switches attached (e.g. Cisco Nexus FEX). Ethernet switches attached (e.g. Cisco Nexus FEX).
Connected off of the Spine layer will be access to other Connected off of the Spine layer will be access to other
network solutions such as WAN, Internet, LAN, to even network solutions such as WAN, Internet, LAN, to even a
a Traditional DC. The Spine switches will be configured Traditional DC. The Spine switches will be configured for
in a VPC+ domain including all VLAN SVI defined. Anycast HSRP.
296 Services - Overlay / Tunneling - FabricPath
• When to use: if the DC is using a Spine-Leaf CLOS • When to use: if the DC is using multiple Spine-Leaf
topology with a Border CLOS add-on to provide access CLOS PODs connected to a Super-Spine and using a
to the WAN, Internet, and/or Traditional DC Border CLOS add-on to provide access to the WAN,
• Prerequisites: DC-CLOS, DC-CLOS-B Internet, and/or Traditional DC
• Required: Cisco Nexus, OPS-CSCO-VPC+ • Prerequisites: DC-CLOS, DC-CLOS-SS, DC-CLOS-B
• Has Sub-PODs: -- • Required: Cisco Nexus, OPS-CSCO-VPC+
• Description: in this POD, FabricPath is enabled on the • Has Sub-PODs: --
interfaces (core ports) between the Spine, Leaf, and • Description: in this POD, FabricPath is enabled on the
Border switches. The Leaf switches will have servers interfaces (core ports) between the Spine and Leaf in
and/or Ethernet switches attached (e.g. Cisco Nexus each POD including the Super-Spine as shown in the
FEX). The Border switch will provide access to other picture above. The Spine switches in each of the PODs
network solutions such as WAN, Internet, LAN, to even would have Layer-3 interfaces up to the Border switches.
a Traditional DC. The Border switches will be The Leaf switches (in each POD) will have servers and/or
configured in a VPC+ domain including all VLAN SVI Ethernet switches attached (e.g. Cisco Nexus FEX). The
defined as shown in the picture above. Border CLOS will provide access to other network
solutions such as WAN, Internet, LAN, to even a
Traditional DC. Each of the Spine switches will be
configured in a VPC+ domain and for all VLAN SVI used
within that local Spine-Leaf POD.
Services - Overlay / Tunneling - FabricPath 297
Configuration
Below are required, recommended, and optional configuration when deploying FabricPath services:
• Hardware: it requires using Cisco hardware that support FabricPath such as the Nexus 5500, 6000,
and 7000 series.
• Positioning: determine where FabricPath will be implemented in the topology. It will be deployed
Required
among the Data Center Spine and Leaf switches in a Spine-Leaf CLOS to provide Layer-2 routing
capabilities.
• Licensing: to enable the use of FabricPath on a Cisco Nexus switch it requires the Enhanced Layer 2
license to the activated.
• FabricPath feature must be enabled on the default and non-default VDC
• Disable IS-IS hello padding on the Cisco Nexus 7000 (if applicable) when jumbo frames is enabled
• The MAC timer should be consistent on all devices in the Layer-2 topology
• Make the FabricPath Leaf switch the primary root bridge for all VLANs that are used within the Ethernet
domain that it is connected to
• Use port channels between the FabricPath switches to decrease the number of direct IS-IS
adjacencies.
• Configure the highest and second highest MDT root priority on the FabricPath Spine switches
• Anycast HSRP: this is recommended to provide up to four active default gateways (active-active
HSRP) on the network to achieve increased high-availability. This is recommended if you are using 3-4
Spine switches or Border switches that will be connected to a Layer-3 network to provide access to
other network solutions (e.g. WAN, Internet, LAN, Traditional DC) for the Spine-Leaf CLOS.
• VPC+: this is recommended to provide active/active HSRP forwarding including creating a virtual switch
that exist behind the VPC+ peers. This is recommended if you are using two Spine or Border switches
that will be connected to a Layer-3 network to provide access to other network solutions (e.g. WAN,
Internet, LAN, Traditional DC) for the Spine-Leaf CLOS.
• Traffic Engineering: provides the capability to statically configure routes into the forwarding table to
specific how traffic should be routed (paths and/or interfaces) across the FabricPath domain. This
Optional
3.6.2 LISP
Select one (or more) of the following LISP PODs that will be used in the design:
Configuration
Below are required, recommended, and optional configuration when deploying LISP services:
The map resolver act as the DNS server in the environment which deals with handling queries from the
LISP client routers (ITR role) for resolving EID-to-RLOC requests.
• WAN Routers as LISP Clients (xTR): this would be the WAN routers (or Internet edge routers)
connected to the WAN. They would operate as a LISP xTR which is comprised of both ITR and ETR
functions. The LISP client components would connect to the LISP server component for resolving and
connecting with other sites.
Recommended
• GET VPN over LISP: LISP does not provide data encryption, only data encapsulation. It is
recommended to deploy LISP as the framework between all sites. GET VPN would be built on-top of
the LISP topology providing tunnel-less encryption between sites. This will require adding GET VPN to
the design.
• OTV and LISP: OTV can be implemented with LISP to provide a “robust shortest routing path” method
Optional
for extending VLANs between Data Centers. This will require adding OTV to the design.
• Virtualization: the EID and RLOC namespaces can be virtualized within a larger LISP topology
300 Services - Overlay / Tunneling - OTV
3.6.3 OTV
Select one (or more) of the following OTV PODs that will be used in the design:
Configuration
Below are required, recommended, and optional configuration when deploying OTV services:
• Configure the overlay virtual interface referencing the WAN facing interface
• Setup the OTV site VLAN
• Define the VLANs that should be extended over the L3WAN cloud
• OTV using Multicast: IGMPv3 and Multicast services are required on each OTV device and across the
WAN provider network
• Do not use a user/server subnet for the OTV site VLAN. It should be its own dedicated VLAN.
• If multiple OTV edge devices (multi-homing capabilities) exist within the Data Center and will be
Recommended
connected to the L3WAN, Authoritative Edge Device (AED) should be enabled to avoid end-to-end
loops by not sending STP BPDU messages
• MTU Considerations: using OTV tunneling will introduce additional overhead between the two Data
Centers. It is recommended to implement either (1) Path MTU Discovery (PMTU) to dynamically
discover the smallest MTU size to use to avoid fragmentation and optimize application performance
over tunneled topologies. Or (2) use Jumbo Frames if supported over the L3 WAN.
• OTV and LISP: OTV can be implemented with LISP to provide a “robust shortest routing path” method
Optional
for extending VLANs between Data Centers. This will require adding LISP to the design.
302 Services - Overlay / Tunneling - VXLAN
3.6.4 VXLAN
Select one (or more) of the following VXLAN PODs that will be used in the design:
Configuration
Below are required, recommended, and optional configuration when deploying VXLAN services:
• Hardware: it requires using Cisco Nexus 9000 series hardware that support VXLAN
Positioning: determine where VXLAN will be implemented in the topology. Those devices will be
Required
•
configured as VXLAN Tunnel Endpoints (or VTEPs). It will be the Data Center leaf switches in the
Spine-Leaf CLOS that will build VXLAN tunnels with other VTEPs to extend VXLANs between the
virtual systems across the Data Center
Recommended
• It is recommended to use one VXLAN segment mapped to a single IP multicast group to provide
optimal multicast forwarding
• VXLAN Gateway: connects VXLAN and VLAN segments as one forwarding domain across the Layer-3
network. It can be enabled on a VTEP device to combine a VXLAN segment and a classic VLAN
segment into one common Layer-2 domain. A Cisco Nexus 9000 series switch can function as a
hardware-based VXLAN gateway (and VTEP device) providing encapsulation and de-encapsulation
Optional
EF
Voice 1 27 – 38%
CS3 / AF31
Platinum
• Traffic Classes: this column shows the type of traffic that may exist on the network. QoS is
usually implemented when voice/video services will be used. The traffic classes will also be
organized based on a medal tier system to show the level of priority across the network.
• Classes: based on the traffic class, this column reflects the number of classes/sub-classes that
can be used. Among the traffic classes that is listed, the Data Class can support up to 6 sub-
classes which could be Critical Data, Bulk Data, Transactional Data, etc.
• DSCP: based on the traffic class, this column reflects the recommended DSCP values to use for
classifying and marking that type of traffic across the network. The Data class has a large range
of DSCP values since it supports up to 6 sub-classes.
• Percent Allocation: based on the traffic class, this column reflects the bandwidth percentage you
can configure in a QoS policy for LLQ and CBWFQ.
The examples below show how you can use the chart above for building the QoS classification that is
needed in the environment:
306 Services - Quality of Service - QoS Traffic Classes
Example #1: let’s say that our network will consist of Voice and Data traffic. For Data, we can either use
the default class if we don’t have any special requirements to prioritize data traffic. Or we can use special
classes (up to 6) to prioritize data traffic in our environment. Let’s say that we do not have any special
requirements for classifying our data traffic. Network Control is required, so we will include that with our
classification.
The percentage range for the voice class is between 27 and 38%, which will vary based on the number of
concurrent calls over the WAN. If the number of calls is low, we can consider a lower number in that
range. If the number is higher, we can consider the higher number. Let’s choose the higher number in
that range. Therefore, the total % allocation for all classes would be: 5% + 38% + 25% = 68%
The following shows what we can use with our QoS policies:
Traffic Types Medal Tier Classes DSCP % Allocation for QoS Policies
EF
Voice Platinum 1 38%
CS3 / AF31
With that information, we could implement a configuration like the following on a WAN router:
Example #2: let’s do another example. Again, let’s say that our network will consist of Voice and Data
traffic types. However, this time we do want to prioritize the data traffic in our environment. Network
Control is required, so we will include that with our classification for reference. The percentage for the
voice class will continue to use the high number. For the Data class, since we are not using a Video
class, the percent range would be between 32% and 47%. Here is what we have so far:
Traffic Types Medal Tier Classes DSCP % Allocation for QoS Policies
EF
Voice Platinum 1 38%
CS3 / AF31
Gold AF21 – 23
Data 1-6 32 – 47% (without Video class)
Silver AF11 - 13
To determine the percentage we can use for the Data class, you can calculate the other percentages first.
That would be 5% + 38% + 25% = 68%.
This means 32% (100% - 68%) would be left for the Data classes. That percentage falls within the
allocated range we see in the chart. We can get a higher percentage if we lower the voice class
percentage. Next, we need to determine the number of Data classes (up to 6) we want to use. Let’s say
we will use two sub-classes: Exchange servers (marked using AF21) and Other servers (marked using
AF11). Between those two sub-classes, we need to divide the 32% between them. Therefore, we will
define 17% for “Exchange Servers” and 15% for “Other Servers”. Finally, below reflects what we can use
with our QoS policies:
Traffic Types Medal Tier Classes DSCP % Allocation for QoS Policies
EF
Voice Platinum 1 38%
CS3 / AF31
32%
Gold AF21 – 23
Data 1-6 Class 1: Exchange Servers = 17%
Silver AF11 - 13
Class 2: Other Servers = 15%
With that information, we could implement a configuration like the following on a WAN router:
Templates
Below are QoS templates that can be used for QoS Classifications:
• When to use: if the network consists of a LAN that will • When to use: if the network consists of a WAN that will
be deployed with QoS services be deployed with QoS services
• Prerequisites: LAN • Prerequisites: WAN
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: LAN Core Switch, LAN Access Switch • Components: WAN routers
• Description: in this POD, the LAN switches are • Description: in this POD, the WAN routers are
configured for trust boundaries, traffic classification, configured for traffic classification (and marking if
traffic markings, hardware queuing, and hardware required), software queuing, software dropping, and link
dropping. efficiency mechanisms based on the WAN link of the
routers.
Services - Quality of Service - QoS Deployment 311
Configuration
Below are required, recommended, and optional configuration when deploying QoS services:
• QoS Traffic Classes: it is required to determine the QoS classes that will be used based on the traffic
classes determined in the QoS Classification POD
using Access Control Lists (ACL). The ACL will list the network details and will mark traffic based on
the desired DSCP/CoS values. As a best practice, it is recommended to mark packets closer to the
source such as the LAN Access switches with connected IP phones and endpoints.
• QoS Classification: in the LAN POD, all traffic will be classified based on CoS values (on Layer-2
switches) and/or DSCP values (on Layer-3 switches and Routers).
match the bandwidth rate of the WAN connection. But, it could affect the delay over the link.
• Congestion Management (Software Queuing): it is recommended to use LLQ for voice and video
traffic classes. And use CBWFQ for the data, network control, and default traffic classes. Queuing is
enforced when congestion occurs on an interface.
• Congestion Avoidance (Software Dropping): it is recommended to use WRED for the data and
default traffic classes to prevent congestion or queues filling up. WRED deals with gracefully dropping
low priority packets before congestion occurs on a port. This is used on traffic classes with TCP type
traffic because TCP has mechanisms for doing retransmissions if data packets are dropped due to
congestion or loss. Implementing WRED can also increase overall throughput of TCP traffic flows.
• Maximum Reserve Bandwidth: by default, interfaces on a Cisco device with a total bandwidth
allocation cannot exceed 75% allowing 25% for network control related traffic. You can change the
maximum reserve bandwidth to 100% if CBWFQ will be configured within a QoS policy.
• Fragmentation: this is recommended when the WAN link speed on the router is below 1Mbps. And the
encapsulation is either PPP or Frame Relay. This is a QoS mechanism that will fragment or break-up
large packets into smaller packets to allow smaller packets (e.g. Voice) to be transmitted to avoid high
serialization delay and jitter. You can implement either Frame Relay Fragmentation (FRF.12) or Link
Fragmentation Interleaving (LFI).
• Compression: this is recommended when the WAN link speed on the router is below 1Mbps. And the
encapsulation is either PPP or Frame Relay. Compression RTP (cRTP) is used to compress Voice
RTP packets to smaller sized packets.
• TX-Ring Tuning: this is required when using an ATM WAN connection with a link speed below 1Mbps.
This will adjust the final interface output buffer (TX-ring) to optimal lengths for real-time traffic.
314 Services - Quality of Service -
the physical media for transit. It is recommended to configure an MTU size of 1412 (or 1400) and MSS
of 1360 on the Tunnel interface to avoid MTU related issues across the VPN tunnel.
• Traffic Policing: optional QoS feature to rate-limit a specific switch port to a certain bandwidth rate and
keep the delay consistent (unlike traffic shaping). Any traffic that exceeds the configured threshold will
be dropped.
Services - Reliability - 315
3.8 Reliability
Select one (or more) of the following reliability services that will be used in the design:
• When to use: if the network is using redundant Internet • When to use: if the network is using redundant LAN/DC
edge routers Layer-3 Core switches with configured VLAN SVI (e.g.
• Prerequisites: INET-DRSI, DRI, DRFSI, or DRFI Users, Servers)
• Required: -- • Prerequisites: LAN-2T-PHY-FHRP, DC-2T-PHY-FHRP
• Has Sub-PODs: -- • Required: --
• Description: in this POD, the two edge routers • Has Sub-PODs: --
connected to one (or more) Internet clouds are • Description: in this POD, the two LAN/DC Core switches
configured with a FHRP (e.g. HSRP, VRRP). The are configured with a FHRP (e.g. HSRP, VRRP) for all
Virtual IP address can be used as the default gateway VLAN SVI(s) defined. The Virtual IP address is used as
for the Core switch or firewall appliance that exist the default gateway for the endpoints where FHRP is
behind the edge routers. enabled on that VLAN SVI.
Services - Reliability - 317
Configuration
Select one (or more) of the following FHRP options that will be used:
HSRP GLBP
VRRP
If you require setting up two (or more) If you require setting up two (or
If you require setting up two (or more)
network devices to provide default more) network devices to provide
network devices to provide default gateway
gateway redundancy using Cisco default gateway redundancy and
redundancy
hardware load-balancing
Below are required, recommended, and optional configuration when deploying FHRP services on the
network based on the available options.
• Router Priority: among the FHRP-enabled devices, determine which one will be the primary/active
Required
• Timers: use sub-second timers using a hello timer of 250ms and a dead timer of 750ms in
environments with less than 150 VLAN instances. If those sub-second timers are not supported due to
IOS/hardware limitations set the hello timer to 1 second and the dead timer to 3 seconds. This will
provide a good balance of fast failover and sensitivity for traffic being sent to the control plane.
• Tracking: it is strongly recommended to enable tracking on the high critical interfaces (uplinks) for
robust failover between FHRP peers. This is common when implementing FHRP on Internet edge
Recommended
routers. The WAN facing interface would be tracked. If the WAN facing interface fails on the primary
FHRP device, the secondary FHRP device will take over.
• FHRP on Cisco Catalyst Switches: it is recommended to enable HSRP which is SSO aware which will
help to avoid HSRP flapping.
• GLBP in Redundant Three-Tier LAN Topology: it is recommended that "spanning-tree cost 2000” be
implemented on the Secondary STP root bridge switch (LAN distribution) to ensure that both uplinks
from the Layer-2 switches are active.
• HSRP and Multicast: if Multicast and HSRP will be configured on the same device, force all data
communication to use the same path. The HSRP active router should be the Designated Router (DR)
on the segment.
• Enhanced Object Tracking (EOT): an optional feature that deals with monitoring interfaces or routes
Optional
then informing FHRP (or IP SLA) to make certain actions for re-routing.
318 Services - Routing -
3.9 Routing
Select one (or more) of the following routing services that will be used in the design:
IP SLA IP CEF
OSPF EIGRP
POD: RT-OSPF POD: RT-EIGRP
• When to use: if your internal network will have 3+ • When to use: if your internal network will have 3+
network devices capable of routing network devices capable of routing and you will have all
• Prerequisites: RT Cisco-based hardware
• Required: Routers/L3-Switches • Prerequisites: RT
• Has Sub-PODs: Go to 3.9.1 • Required: Routers/L3-Switches
• Description: OSPF is a IGP internal routing protocol that • Has Sub-PODs: Go to 3.9.2
is configured within the LAN, Data Center, and sites • Description: EIGRP is a IGP internal routing protocol
across the WAN. It can provide dynamic routing with that is configured within the LAN, Data Center, and sites
multiple Cisco/non-Cisco L3 devices on the network. across the WAN. It can provide dynamic routing with
multiple Cisco routing devices on the network.
IS-IS BGP
POD: RT-ISIS POD: RT-BGP
• When to use: if your internal network will have 3+ • When to use: if you require advertising your own Public
network devices capable of routing. Plus, support for prefixes out to the Internet. And controlling routing in
additional IS-IS extensions. (and out) of your ASN.
• Prerequisites: RT • Prerequisites: INET, RT
• Required: Routers/L3-Switches • Required: Routers/L3-Switches
• Has Sub-PODs: -- • Has Sub-PODs: Go to 3.9.3
• Description: IS-IS is a IGP internal routing protocol that • Description: BGP is a EGP external routing protocol
is often used in service provider networks. It can be which is commonly used on the Internet and advertising
implemented on the LAN, DC, and WAN. Public address information to Internet providers.
Services - Routing - 319
IP SLA IP CEF
POD: RT-SLA POD: RT-CEF
• When to use: an optional feature that allows re- • When to use: if the LAN/DC topology has multiple paths
routing/failover between connections based on pre- and interconnections, it is recommended to implement
configured probes (or availability). CEF to provide ECMP.
• Prerequisites: INET-SRDI, INET-SRFDI, or WAN- • Prerequisites: RT
SRDW • Required: Cisco switches
• Required: Routers • Has Sub-PODs: --
• Has Sub-PODs: -- • Description: it is recommended to enable full IP CEF
• Description: IP SLA is typically configured on routers load-sharing using the L3/L4 hash algorithm to prevent
with dual Internet connections for redundancy. IP SLA CEF polarization. CEF polarization occurs when
can be configured to ping a certain IP address that is redundant paths are ignored for traffic forwarding. CEF
specified. If the IP address is not reachable through the will be able to load balance up to 8 parallel paths.
primary Internet connection, it will change the default
route towards the secondary ISP.
320 Services - Routing - OSPF
3.9.1 OSPF
Select one of the following OSPF PODs that will be used in the design:
• When to use: this is a standard deployment for OSPF • When to use: if you require extending OSPF over a
configured within the LAN, DC, and/or WAN (not using L3WAN managed by a service provider
MPLS) • Prerequisites: LAN/DC, WAN-S-L3WAN (or WAN-D-
• Prerequisites: LAN and/or DC L3WAN*)
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: OSPF routers • Components: OSPF routers
• Description: in this POD, the network consist of a • Description: in this POD, the network consist of a
backbone area with several standard areas connected backbone area with several standard areas connected.
as shown in the picture above. Using areas will break Using areas will break up the network into multiple
up the network into multiple flooding domains. This is a flooding domains. The backbone area would be extended
standard deployment if you not using a MPLS-enabled over the MPLS-enabled L3WAN and would be a Super
L3WAN in the environment. Backbone area as shown in the picture above. The
remote sites would connect to the Super Backbone area
along with standard areas connected internally.
Services - Routing - OSPF 321
Configuration
Below are required, recommended, and optional configuration when deploying OSPF services:
• Backbone Area: this is required for all OSPF networks. This area is typically deployed among the
Core, Distribution, and WAN routers in the topology.
• Standard Areas: determine the standard areas that will be connected to the Backbone area. These
areas will be LAN/DC Layer-3 access switch networks, endpoint networks (e.g. User, Server), and
Required
network solutions (e.g. Internet, Firewall). All routers that connect between the backbone area and a
standard area will be considered as an Area Border Router (ABR).
• Advertised Networks: determine the networks on each router that should be advertised among the
OSPF routers. This would be networks that are configured on interfaces (physical or SVI interfaces)
that are connected into the OSPF domain. This would involve adding that network and its associated
area under the OSPF routing process.
minimize the size of the routing table, reduce hardware resources (CPU, memory), and to limit LSA
flooding. It can also help to provide fast convergence from failures that may occur on the Layer-3
network. This can be implemented in several ways depending on the overall topology: (1) it can be
implemented on the distribution switches in a Tier-3 topology. It can summarize the user subnets which
would be advertised to the Core and other OSPF routers. (2) It can implemented on the Core if there
are several networks that can be summarized. This summarized route would be advertised to other
network devices (e.g. WAN routers, Internet router/firewall). (3) It can be implemented on the WAN
aggregation routers. It can summarize the remote site subnets which would be advertised to the Core
(and other OSPF devices).
• IP CEF: it is recommended to implement CEF switching on all OSPF enabled devices to provide fast
convergence and ECMP (if there are multiple paths available).
• Loopback Interfaces: it is recommended to use Loopback interfaces on all OSPF routers (IPv4 and
IPv6) in the topology which will be used as the router-ID for the OSPF router
• Stub or Totally Stub Areas: it is recommended to enable OSPF stub areas for the WAN remote sites
and LAN Access networks enabled for Layer-3 services (if applicable). This will help to minimize the
size of the routing table and to limit LSA flooding within an area. This includes preventing unnecessary
SPF calculations that may occur.
• Route Control/Filtering: it is recommended to control what routes are being sent and received
between OSPF routers using a distribute list (or route-map). This is commonly deployed with OSPF
routers that are managed by a different building/group.
• Network Type using Point-to-Point Network: this network type is recommended for point-to-point
connections between two OSPF devices.
322 Services - Routing - OSPF
• Network Type using Broadcast Network: this is the default network type for Ethernet networks. This
is recommended for full-mesh networks used on the WAN or OSPF routers connected in the same
VLAN. A DR and BDR are elected to reduce LSA flooding within the area. It is recommended for the
Recommended (2/2)
• Use Virtual links if there are two standard areas connected together
• Enable LSA Throttling in large-scale networks with hundreds of routers to provide fast convergence
within the OSPF topology. This will provide LSA rate-limiting in milliseconds compared to seconds.
This is enabled by default, but it can be tuned to control LSA flooding more efficiently when there is a
topology change.
• Enable SPF Throttling in large-scale networks with hundreds of routers to provide fast convergence for
SPF calculations in millisecond intervals when there is a topology change. The default behavior is
based on dynamic calculations, but it’s recommended to tune these values in larger OSPF
environments.
• Enable Incremental SPF (iSPF) in large-scale networks with hundreds of OSPF routers to provide SPF
Optional
optimization and fast convergence. This will allow OSPF routers to recalculate only the affected parts of
the topology and not waste router resources (CPU).
• BFD with OSPF: BFD can be configured in conjunction with OSPF to provide faster convergence if
there is an interface failure.
• Primary and Secondary Paths: if you have dual connections within the WAN or Internet POD, you can
designate a primary and secondary path by adjusting the OSPF cost. For example, the primary path
interface can be configured with a cost of 10. And the secondary path interface can be configured with
a cost of 1000. As a result, the primary path would be preferred instead of the secondary path.
• Route Redistribution: if you require integrating a different routing domain (e.g. EIGRP) with the
existing network running OSPF. Route Redistribution must be configured between the two routing
protocols. It is important to implement route filtering to control what routes should be advertised and
received between the two routing domains.
Services - Routing - EIGRP 323
3.9.2 EIGRP
Select one of the following EIGRP PODs that will be used in the design:
Standard Deployment
Standard Deployment
POD: RT-EIGRP-STD
Configuration
Below are required, recommended, and optional configuration when deploying EIGRP services:
• ASN: determine the Autonomous System Network (ASN) each EIGRP router will belong to for
exchanging route information. If an EIGRP router is not in the same ASN with other EIGRP routers it
will not be able to build a neighbor or exchange routes with other routers in the AS.
Required
• Advertised Networks: determine the networks on each router that should be advertised among the
EIGRP routers. This would be networks that are configured on interfaces (physical or SVI interfaces)
that are connected into the EIGRP AS. This would involve adding that network under the EIGRP
routing process.
• Passive Interfaces: it is recommended to enable passive interfaces to prevent rogue routing devices
from injecting bad routes into the network. It should be enabled on all Layer-3 interfaces where there
are endpoints and no EIGRP routers present on that segment. This will prevent hello messages being
sent and establishing any adjacencies with other EIGRP routers.
• Route Authentication: it is recommended to configure MD5 Authentication on all EIGRP routers to
provide higher security compared to implementing Passive Interfaces only. The password defined will
be required to form a neighbor relationship with other EIGRP routers on the network.
• Disable Auto Summarization: EIGRP will automatically summarize networks along major network
boundaries. It is recommended to disable auto-summarization and use manual summarization instead
(if required).
• Route Summarization: it is recommended to summarize multiple routes as a single route to help
minimize the size of the routing table, reduce hardware resources (CPU, memory), and to prevent
unnecessary EIGRP queries. It can also help to provide fast convergence from failures that may occur
on the Layer-3 network. This can be implemented in several ways depending on the overall topology:
(1) it can be implemented on the distribution switches in a Tier-3 topology. It can summarize the
endpoint subnets which would be advertised to the Core and other EIGRP routers. (2) It can
implemented on the Core if there are several networks that can be summarized. This summarized
route would be advertised to other network devices (e.g. WAN routers, Internet router/firewall). (3) It
can be implemented on the WAN aggregation routers. It can summarize the remote site subnets which
Recommended
• NSF with EIGRP: this should be enabled if the EIGRP enabled device is using a Cisco Catalyst switch
with redundant supervisor modules. If the primary supervisor fails, IP traffic would continue to be
forwarded in hardware and failover to the standby supervisor module. However, the supervisor needs
time to re-establish two-way peering with all connected EIGRP neighbors. Enabling NSF with EIGRP
can alert the connected neighbors about the switchover and allow time to re-establish all connections
gracefully.
• BFD with EIGRP: BFD can be configured in conjunction with EIGRP to provide faster convergence if
there is an interface failure
EIGRP Over the Top (OTP): if you require using WAN routers running EIGRP over the Internet without
Optional
•
using VPN tunnels. GET VPN can be configured with EIGRP OTP, which uses LISP, to provide
encryption services.
• Primary and Secondary Paths: if you have dual connections within the WAN or Internet POD, you can
designate a primary and secondary path by adjusting the EIGRP delay. For example, the primary path
interface can be configured with a delay of 10. And the secondary path interface can be configured with
a delay of 1000. As a result, the primary path would be preferred instead of the secondary path.
• Route Redistribution: if you require integrating a different routing domain (e.g. OSPF) with the existing
network running EIGRP. Route Redistribution must be configured between the two routing protocols. It
is important to implement route filtering to control what routes should be advertised and received
between the two routing domains.
326 Services - Routing - BGP
3.9.3 BGP
Select one (or more) of the following BGP PODs that will be used in the design:
Standard Deployment
POD: RT-BGP-STD
• When to use: if the Internet POD consists of one edge • When to use: if the Internet POD consists of multiple
router (or firewall appliance) connected to multiple ISPs. edge routers (or firewall appliances) located in the same
And you want to perform primary outbound routing ASN. And you want to perform primary outbound routing
through a specific router/firewall/ISP. through a specific router/firewall/ISP.
• Prerequisites: INET-SRDI, SFDI, or SRFDI • Prerequisites: INET-DRSI, DFSI, DRI, DFI, DRFSI, or
• Required: -- DRFI
• Has Sub-PODs: -- • Required: --
• Components: Edge router (or Firewall appliance) • Has Sub-PODs: --
supporting BGP Weight • Components: Edge routers (or Firewall appliances)
• Description: in this POD, a single edge router (or supporting BGP Local Preference
firewall appliance) within the Internet POD will be • Description: in this POD, the two edge routers (or
configured for BGP and will connect to two (or more) firewall appliances) within the Internet POD will be
ISP clouds as shown in the picture above. The BGP configured for BGP in the same ASN. The two BGP
attribute, Weight, would be implemented on each ISP routers would be connected to one (or more) ISP clouds
link for all inbound routes received from the two ISP as shown in the picture above. The BGP attribute, Local
clouds. The primary interface would have a higher Preference, would be implemented on both BGP routers
weight value compared to the secondary interface. As a for all inbound routes received from its connected ISP.
result, access to the Internet would go through the The primary device/path would have a higher local
primary interface. If there is an outage, Internet access preference value compared to the secondary device in
would be routed through the secondary interface. the topology. As a result, access to the Internet would go
through the primary device/path. If there is an outage,
Internet access would be routed through the secondary
device/path.
328 Services - Routing - BGP
• When to use: if the Internet POD consists of one (or • When to use: if your Internet POD consists of one (or
more) edge routers (or firewall appliances) connected to more) edge routers (or firewall appliances) connected to
multiple ISPs in the same ASN. And you want to multiple ISPs in different ASNs. And you want to perform
perform primary inbound routing through a specific edge primary inbound routing through a specific
router (or firewall appliance). router/firewall/ISP.
• Prerequisites: INET-DRSI,DFSI,DRI,DFI,DRFSI, or • Prerequisites: INET-DRSI,DFSI,DRI,DFI,DRFSI, or
DRFI DRFI
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: Edge routers (or Firewall appliances) • Components: Edge routers (or Firewall appliances)
supporting BGP MED supporting BGP AS Path Prepending
• Description: in this POD, one (or more) edge routers • Description: in this POD, one (or more) edge routers (or
(or firewall appliances) within the Internet POD will be firewall appliances) within the Internet POD will be
configured for BGP in the same ASN. Both edge configured for BGP in the same ASN. Both edge routers
routers (or firewall appliances) would connect to an ISP (or firewall appliances) would be connected to one (or
in the same ASN. The BGP attribute, MED, would be more) ISP located in different ASNs. AS Path
implemented on each edge router (or firewall appliance) Prepending would be implemented on the secondary
for all outbound routes advertised to the ISP. The device for all outbound routes advertised to its connected
primary device would advertise a low metric value ISP. The primary device would have the default AS path
compared to the secondary device in the topology. As a for the advertised networks. However, the secondary
result, access into the customer network would be device would have the AS Path prepended several times
routed through the primary device. If there is an outage, creating a longer undesired path. As a result, access into
inbound access would be routed through the secondary the customer network would be routed through the
device. The MED attribute is sometimes stripped by the primary device which has the shortest AS path into the
ISP, so it is important to confirm these details with the network. If there is an outage, inbound access would be
ISP. routed through the secondary device.
Services - Routing - BGP 329
Configuration
Below are required, recommended, and optional configuration when deploying BGP services:
• ASN: determine the Autonomous System Network (ASN) each BGP router will belong to. This ASN is
obtained through ARIN among other IP requirements. A private ASN can be used internally if BGP will
be configured with a provider that will translate it to a Public ASN.
• Peering (iBGP, eBGP): determine what BGP routers will be connected as peers. The edge
routers/firewall appliances in the topology (existing in the same ASN) would be considered as iBGP
Required
peers. The ISP cloud(s) would be eBGP peers (existing in a different ASN).
• Routes Advertised: determine what Public subnets will be advertised from your ASN
• Routes Received: determine what routes should be received from the ISP or EBGP peer. The ISP can
either send the full routing table (requires high-end hardware with a lot of memory), a partial routing
table, or just a BGP default route. A BGP default route is recommended for most customer networks
which doesn’t require high-end hardware. Larger networks or hosting/cloud provider networks will
typically require full routes for better control of routing to certain networks.
• MD5 Authentication: it is recommended to configure a password with the connected eBGP peer for
establishing a neighbor and exchanging route information. This can prevent against peering with rogue
BGP devices.
• Summarization: if you are advertising multiple Public subnets within a customer ASN, it is
recommended to summarize those routes first, if possible. This will create smaller routing tables and
use less hardware resources. It is a best practice to aggregate routes into longer-prefix routes on
eBGP connections (e.g. ISP).
• Soft Reconfiguration: this is recommended to allow graceful BGP neighbor restarts when changes
occurs. It should be enabled for all BGP peers to eliminate the need to reset a neighbor including the
routing table in a production environment.
• Route Control/Filtering: it is recommended to control what routes are advertised and received from
other BGP peers. This can prevent rogue BGP routers potentially bringing down the entire network.
Recommended
You can setup route filters using either Prefix Lists (recommended) or Distribution Lists.
• Synchronization: by default, routes on a BGP router that are not learned via an IGP routing protocol
will not be injected into the BGP routing table. Make sure that each network you list under the BGP
routing process has a matching route (dynamic, static, discard route) added.
• iBGP using Route Reflector or Confederation: if there are more than 3-4 iBGP routers within the
ASN, it is recommended to implement Route Reflectors or a Confederation to prevent a full-mesh of
iBGP neighbors. To prevent loops, route reflector client should never be peered to a route reflector
through another route reflector. Furthermore, a route reflector uses a cluster ID. It is important to define
the cluster ID carefully because a BGP router may reject routes if its local cluster ID is in the cluster list.
• Fast Convergence: you can implement Fast Failover to improve BGP convergence over a point-to-
point connection compared to the default BGP timers. This will use BGP Selective Address Tracking
and Fast External Neighbor Loss Detection. You can also configure Fast Peering Session
Deactivation to monitor BGP peers and provide fast convergence.
• Prefix Independent Convergence (PIC) and Add-Path: used to provide fast sub-second convergence
by creating a best path and a second best path to reach a destination network
• Peer Groups: all BGP neighbors that share the same identical outbound policies can be configured
together into a peer group to simplify the configuration of the BGP neighbors
Services - Routing - 331
• eBGP Multi-Hop: by default EBGP peers must be directly connected (TTL of 1). If the EBGP peer is
not directly connected then eBGP multi-hop must be added reflecting the number of hops to that
EBGP peer (up to 255 hops).
• BGP Communities: if you require specifying rules for how certain routes should be forwarded by BGP
routers in different ASNs.
Optional
• Conditional Advertisements: if you require BGP routers to only advertise its configured prefixes
through another eBGP peer if certain routes do not exist in the BGP routing table.
• Outbound Route Filtering (ORF): this is a feature used to filter outbound BGP route advertisements
from a neighboring BGP router.
• BGP Link State (BGP-LS): this is used to export IGP information from the network to a SDN controller
to build a topology map.
332 Services - Security -
3.10 Security
Select one (or more) of the following security service PODs that will be used in the design:
• RFC 1918 Addressing: it is recommended for all internal endpoints (e.g. users, servers) to use RFC
1918 private addressing and not public addressing
• Point-to-Point Connections: it is recommended to use /30 subnets for all point-to-point connections. If
OSPF is used, configure the network type on those interfaces to be “point-to-point”.
• Speed and Duplex: majority of network performance issues are related to speed and duplex
mismatching between the network port and the device. It is recommended for the endpoints and its
connected switch port to use auto negotiation for the speed and duplex settings.
• VTY Access using SSH: VTY is used for administrating a network device remotely using Telnet or
SSH. It is recommended to use SSH instead of Telnet which provides a secure connection between the
client and the network device for administration.
• Proxy ARP: disable proxy-arp services on all interfaces especially firewall interfaces which can cause
performance related issues on the network
• Unicast Reverse Path Forwarding (uRPF): this feature is used to protect against IP spoofing attacks
(not blocking DoS attacks). For each packet received on a uRPF enabled interface, it is checked
against the routing table. If the source IP is not from the correct interface in which it is received, the
packet will be dropped. Enable this feature on the edge router’s WAN facing interface(s). Implementing
uRPF requires CEF to be enabled globally on the network device.
Recommended (1/2)
• Scheduler: configure a scheduler on the Cisco network devices to allow adequate CPU processor time
to run control plane related services. This will help to prevent against fast flooding attacks that can
affect critical processes from running on the device. Set the schedule interval to 500ms.
• ACL for SNMP and NTP Services: for tighter security it is recommended to implement ACL policies for
SNMP and NTP services
• Time Services (NTP): it is recommended to enable time services on all network devices in the
environment. This will provide proper timestamps for logs and events that are reported. Therefore
configure NTP, service timestamps, and time-zones on all network devices.
• Unused Interfaces: any interface that is not used on a network device should either be placed in a
shutdown state or configured in a disabled VLAN.
• Security Login Banner: it is recommended to add a Message of the Day (MOTD) banner displaying
details who is authorized to access the device. Never use words like "Welcome" in the message
banner as it implies that anyone can access the device without authorization.
• Layer-3 Interfaces: Proxy-ARP, IP Unreachables, Directed Broadcast, and IP Mask Reply should be
disabled on all Layer-3 interfaces. IP Unreachables should be disabled to prevent denied ACL traffic
being leaked to the control plane (e.g. MFSC at 10pps per VLAN).
• Disable Services: as a general best practice the following services should be disabled globally on all
network devices: TCP and UDP small services, BOOTP services, Finger, Configuration Auto-load, and
PAD, HTTP services. Many of these are legacy services that are no longer used today.
• Logging (Syslog): it is recommended to setup logging on all network devices for recording network
events. The log messages can be stored locally or sent to a centralized Syslog server (recommended).
It is also recommended to implement time services and sequence numbers with log messages to view
the order of events logged.
334 Services - Security - General Best Practices
• CDP: it is recommended to enable CDP globally on the LAN access switches with IP phones attached.
However, it is recommended to disable CDP on interfaces that connect to a service provider or a
network under a different administration.
• Password Encryption: this should be enabled globally on all network devices to provide basic
password encryption in the configuration files. However, configuring MD5 passwords for increased
security is strongly recommended.
• Control Plane Protection: the following services can be implemented to protect control plane related
traffic on a network device. These services include CEF, CoPP, ACL, Broadcast Suppression,
Recommended (2/2)
Selective Packet Discard (SPD) checks, to Hardware Rate Limiters (if supported on the hardware).
• Data Plane Protection: the following services can be implemented to protect the data plane where
traffic is forwarded in hardware. These services include DHCP Snooping, Dynamic ARP Inspection
(DAI), and IP Source Guard. These are services referenced in the Switching POD. Other services
include RFC1918 filtering, RFC2728 (Anti-Spoofing) filtering, Traffic Policing, and implementing Unicast
Reverse Path Forwarding (uRPF).
• Configuration Rollback: this is a recommended feature (if supported) that allows replacing an active
running configuration with any saved configuration. This can be used to restore a previous
configuration file to a network device. It can automatically save the configuration file locally or be sent
to a server on the network. This feature is supported on most Cisco Catalyst and the Nexus series
switches.
• Network Monitoring & Troubleshooting: it is recommended to implement NTP, Logging, SNMP, and
NetFlow services among the network devices in the topology
• Role-Based Access Control (RBAC): a feature that provides restricted CLI access with different
privilege levels for technicians and engineers. This will simplify administration and avoid potential
misconfiguration resulting in outages.
Optional
• NULL (Black Hole) Routing: this is an optional security practice to configure static routes for host IP
Addresses (internal or external) that should be restricted for access across the network. The next hop
for these routes would be the NULL interface where packets to that IP would be discarded.
• Out-of-Band (OOB) Management: determine how the network devices will be accessed during
network outages. This can be through a dedicated Internet connection and/or an analog connection.
Services - Security - Access Control Lists (ACL) 335
• When to use: if ACL services will be implemented on • When to use: if ACL services will be implemented on the
the Internet edge router within the Internet POD Core switch within the LAN and/or DC POD
• Prerequisites: INET, SEC-NET-FW-DEPLOY-INTG1 • Prerequisites: LAN/DC, SEC-NET-FW-DEPLOY-INTG2
• Required: -- • Required: --
• Components: Edge router • Components: Core switch
• Description: in this POD, ACL services are enabled on • Description: in this POD, ACL services are enabled on
the Internet edge router’s WAN facing interface acting the Layer-3 Core switches VLANs interfaces (SVI) to
as a basic Stateful firewall as shown in the picture restrict communicate between the VLANs (e.g. User
above. VLAN, Server VLAN, Guest VLAN) as shown in the
picture above.
336 Services - Security - Access Control Lists (ACL)
Configuration
Select one (or more) of the following ACL options that will be used:
Below are required, recommended, and optional configuration when deploying ACL services on the
network based on the available options.
• Positioning: determine where ACL services will be implemented in the topology based on the firewall
Required
solution designed
• Stateful Firewall using rACL or CABC: it is recommended to implement a Stateful ACL feature-set
using either Reflexive ACLs or CBAC. From the two, I would recommend rACL to provide a software-
Recommended
based Stateful firewall on a router. I encountered some low throughput and HTTP related issues when
using CBAC as a Stateful firewall, which was easily fixed when rACL was configured.
• Using Standard ACL: if you require filtering based on the source IP address (or subnet). This should
be considered if the Layer-3 device doesn’t support a Stateful firewall feature-set.
• Using Extended ACL: if you require filtering based on the destination IP address, subnet, protocol,
and/or port number. This should be considered if the Layer-3 device doesn’t support a Stateful firewall
feature-set.
Services - Security - Virtual Private Network (VPN) 337
SSL VPN
Select one (or more) of the following IPsec VPN PODs that will be used in the design:
Configuration
Below are the available options for deploying IPsec based on what is required:
IPsec VPN
If you require (1) building a few point- L2TP over IPsec
to-point VPN tunnels for accessing IPsec VTI / IPsec over GRE If you require a remote access
network resources securely between If you require point-to-point VPN tunnels solution using a native VPN client to
sites without using dynamic routing for accessing resources securely between access network resources remotely.
protocols. (2) To support a remote sites. And supporting the use of dynamic This doesn’t require installing any
access solution using an installed VPN routing protocols, multicast, and QoS additional VPN software on the
program to access network resources client’s system.
remotely.
Below are required, recommended, and optional configuration when deploying IPsec on the network
based on the available options:
• VPN Support: based on the VPN enabled device (e.g. router, firewall) that will be used in the
Required
environment make sure it can support the IPsec VPN option that will be used.
• VPN Option: determine the VPN option(s) that will be configured within the WAN/Internet POD
• Using Main Mode: if you want to setup highly secure IPsec VPN tunnels by protecting the identity of
the hosts, it is recommended to disable Aggressive mode. Aggressive mode does not protect the
identity of the host setting up the VPN. It will send the host identities in clear-text across the network.
Disabling Aggressive mode is what many security audits will recommend especially if the network is
under a particular regulatory compliancy (e.g. SOX, PCI, HIPPA).
• NAT-T: this option is configured when using IPsec for remote access. NAT-T provides support for
Recommended
IPsec traffic to travel through NAT enabled devices by encapsulating both the IPsec SA and the
ISAKMP traffic in UDP packets. This option is enabled by default.
• MTU for IPsec VTI: the safest and recommended MTU to use for GRE enabled interfaces to avoid
fragmentation is 1400 bytes
• Pre-Fragmentation: this feature is enabled globally (default) to increase the decrypting router’s
performance by using CEF switching (high performance) instead of process switching
• Path MTU Discovery (PMTU): this is recommended to be implemented (if supported) to dynamically
discover the smallest MTU size to use to avoid fragmentation
• Using IPsec VTI: it is recommended to configure Tunnel mode (default) which supports pre-
fragmentation which is ideal for large sized packets. Using Transport mode does not support pre-
fragmentation, but saves 20 bytes compared to Tunnel mode.
340 Services - Security - Virtual Private Network (VPN)
3.10.3.2 DMVPN
Select one (or more) of the following DMVPN PODs that will be used in the design:
Single DMVPN Hub & Cloud Dual DMVPN Hub + Single Cloud Dual DMVPN Hub & Cloud
Dual DMVPN Hub + Single Cloud Dual DMVPN Hub and Cloud
POD: SEC2-VPN-DMVPN-DH1C POD: SEC2-VPN-DMVPN-DHC
• When to use: if you are using redundant WAN routers at • When to use: if you are using redundant WAN routers at
the main office (Hub) connected to a single Internet (or the main office (Hub) connected to dual Internet (or
WAN) cloud WAN) clouds
• Prerequisites: WAN-DRSW, WAN-S-IWAN-VPN • Prerequisites: WAN-DRW, WAN-D-IWAN
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Components: DMVPN Hub, DMVPN Spoke(s) • Components: DMVPN Hub, DMVPN Spoke(s)
• Description: in this POD, the main site is using two • Description: in this POD, the main site is using two WAN
WAN routers (DMVPN hub) connected to a single routers (DMVPN hub) connected to a different
WAN/Internet cloud. At the remote sites, the WAN WAN/Internet cloud. At the remote sites, the WAN
routers (DMVPN spokes) would also connect to a single routers (DMVPN spokes) would also connect to an
Internet/WAN cloud. In this topology, the two DMVPN Internet/WAN cloud. In this topology, the two DMVPN
hub routers would connect into the same logical DMVPN hub routers would connect into one of the DMVPN clouds
cloud using the same IP subnet as shown in the picture that will use its own IP subnet as shown in the picture
above. As a result, only one mGRE tunnel interface above. This option is recommended for providing the
needs to be configured on the DMVPN spoke routers best redundancy for DMVPN that rely on routing
connecting to both of the DMVPN hub routers. protocols inside of the VPN tunnels. However, the
DMVPN spokes will need to use mGRE tunnel interfaces
configured to each of the DMVPN Hub routers.
342 Services - Security - Virtual Private Network (VPN)
Configuration
Below are required, recommended, and optional configuration when deploying DMVPN services.
• DMVPN Hub: determine and configure the DMVPN hub device(s) in the topology. This will be the WAN
routers located at the main office or Data Center.
Required
• DMVPN Spoke: determine and configure all of the DMVPN spoke devices in the topology. This will be
the WAN routers at the remote sites that will build a permanent connection to the DMVPN Hub and
temporary connections (if needed) between the other sites.
• Routing Protocol: it is recommended to use EIGRP instead of OSPF for the dynamic routing protocol
• Use Dead Peer Detection (DPD)
• Use Path MTU Discovery (PMTU) to reduce the amount of IPsec fragmentation
• Use Digital Certificates (PKI) to provide better scalability if there are hundreds of DMVPN spokes
Recommended
• Subnet Considerations: it is recommended to use a /24 subnet for the DMVPN cloud if there will be
~254 remote sites. Or a /22 subnet if there will be ~400 remote sites.
• MTU: the recommended MTU size to use for Tunnel interfaces to avoid fragmentation is 1400 bytes. Or
you can use 1392 bytes (for unicast) or 1368 bytes (for multicast) if you are using MPLS over DMVPN.
• Call Admission Control (CAC) on DMVPN Spokes: it is recommended to setup IKE CAC to avoid
overloading the spoke routers. IKE CAC will limit the number of ISAKMP SAs to 25 (lower or higher as
needed). Configure the System CAC to limit the number of SAs on the system to be 80% (lower or
higher as needed).
• GET VPN over DMVPN: you can deploy DMVPN as the framework between all sites without
Optional
encryption. GET VPN can be deployed on-top of the DMVPN topology to provide tunnel-less encryption
between the sites. This will require adding GET VPN to the design.
Services - Security - Virtual Private Network (VPN) 343
Select one (or more) of the following GET VPN PODs that will be used in the design:
Configuration
Below are required, recommended, and optional configuration when deploying GET VPN services.
• Group Members: determine all of the routers that will act as group members. They will be responsible
for encrypting and decrypting traffic between the sites. The group members would be all of the WAN
routers (hub and spoke) in the topology.
Required
• Key Server(s): an additional router is added to the network and the WAN. The key server is
responsible for authenticating the Group Members and managing the security policies for what traffic
should be encrypted between the sites.
Recommended
• Key Server Redundancy: it is recommended to deploy redundant key servers which will operate in
cooperative mode. They would become Cooperative key servers (COOP KSs) which will share the
GDOI registrations for the group members.
• GET VPN over LISP: LISP is deployed as the framework between all sites without encryption. GET
VPN can be deployed on-top of the LISP topology providing tunnel-less encryption between the sites.
This will require adding LISP to the design.
Optional
• GET VPN over OTP: GET VPN can be configured with EIGRP OTP, which uses LISP, to provide
encryption services.
• GET VPN over DMVPN: you can deploy DMVPN as the framework between all sites without
encryption. GET VPN can be deployed on-top of the DMVPN topology to provide tunnel-less encryption
between the sites. This will require adding DMVPN to the design.
Services - Security - Virtual Private Network (VPN) 345
Select one (or more) of the following SSL VPN PODs that will be used in the design:
Configuration
Below are the available options for deploying SSL VPN based on what is required:
Below are required, recommended, and optional configuration when deploying SSL VPN services on the
network based on the available options.
• Hardware: it requires using router/firewall hardware that support SSL VPN (and its supported modes)
Required
• SSL Mode: determine what SSL VPN modes will be deployed on the edge router or firewall appliance
Recommended
• SSL Mode using Web Mode: if you require a VPN solution that doesn’t involve installing VPN software
on the user endpoints
• SSL Mode using Tunnel Mode: if you require a VPN solution where the client can access any network
resource (browser-based, native application) from any location on the Internet including Hotspot
locations (e.g. Hotel, Airport, Coffee shops) using a basic Internet plan (if applicable).
• None Available
Optional
Services - Security - 802.1x 347
3.10.4 802.1x
Select one (or more) of the following 802.1X PODs that will be used in the design:
Configuration
Below are required, recommended, and optional configuration when deploying 802.1X services:
• Services: using 802.1X requires implementing RADIUS services on the network device
Required
Recommended
• 802.1X for Guest Users: if a non-802.1x user is connected to an 802.1X enabled switch port or if they
do not authenticate they will be placed into a Guest VLAN that is specified in the configuration
• Authentication Fail: this is an option that is similar to the Guest option which specifies which VLAN a
user who fails authentication will be placed into
• MAC Authentication Bypass: an option administrated from the RADIUS server that can bypass any
Optional
user authentication via 802.1X using the MAC address of the connected system
Services - Switching - 349
3.11 Switching
Select one of the following Switching PODs that will be used in the design:
Hybrid Deployment
POD: SW-HYBRID
• When to use: if you require (1) using one (or more) • When to use: if you require no VLANs to be extended
VLANs across the entire network. And (2) if there will across the network and/or to provide minimal Layer-2
be no (or little) inter-communication between the configuration in the environment to avoid Layer-2 related
VLANs. This is more common for small-sized networks outages (e.g. broadcast storm).
that don’t want to use a Layer-3 Core switch due to • Prerequisites: LAN-2T (or LAN-3T), DC-2T
cost. • Required: RT (OSPF or EIGRP)
• Prerequisites: LAN-2T (or LAN-3T), DC-2T, INET • Has Sub-PODs: --
• Required: RT • Description: in this POD, all of the network switches
• Has Sub-PODs: -- (e.g. Core switch, Access switches) would be Layer-3
• Description: in this POD, all of the network switches switches supporting both routing and VLAN/802.1Q
(e.g. Core switch, Access switches) are Layer-2 capabilities. Each VLAN (if required) will be configured
switches supporting only VLANs and 802.1Q Trunking. with a Layer-3 VLAN interface (e.g. SVI) on its locally
Each VLAN (if required) will be configured with a Layer- connected switch to allow inter-communication in the
3 VLAN sub-interface (e.g. SVI) on the edge Layer-3 environment. Layer-3 interfaces would be
router/firewall appliance located in the Internet POD as configured between all of the switches as shown in the
shown in the picture above. 802.1Q Trunking would be picture above. Any VLANs configured are confined to a
configured between all switches if multiple VLANs need single access switch or wiring closet. Furthermore, it is
to be extended. Or those switches could be added to a recommended to implement an IGP routing protocol (e.g.
single VLAN on the Core switch. OSPF, EIGRP) among all of the Layer-3 network devices
in the environment.
Services - Switching - 351
Configuration
Below are required, recommended, and optional configuration when deploying Switching services.
• Trunking using 802.1Q: if more than one VLAN will be used across the network then 802.1Q Trunking
should be configured on interfaces between the switches. Including other devices that require
supporting multiple VLANs.
• VLAN Trunking Protocol (VTP): specify a VTP domain name and use VTP Transparent mode on all
switches in the topology to avoid configuration revision meltdowns.
Virtual LAN (VLAN): add all of the VLANs based on the networks that will be used
Required
•
• Spanning Tree Protocol (STP): it is required to enable STP on all switches in the environment to
prevent loops and broadcast storms. It is recommended to enable Rapid Spanning Tree (802.11w)
instead of legacy STP as it provides fast convergence (~900ms) in the event of a failure on the Layer-2
network.
• Extended VLANs: if 1000 to 4000 VLANs will be used on the network then the system ID needs to be
extended on all Layer-2/Layer-3 switches, which is something that is configured with the Spanning Tree
Protocol (STP).
•
encapsulation protocol that is used for the Trunking interface, which is 802.1Q. This will put the port
into a permanent Trunking mode and will not allow the port to generate DTP frames. In general, always
try to avoid any type of protocol negotiation between critical devices.
• Native VLAN for Trunking Ports: the Native VLAN is the only VLAN that is untagged and can be
exploited in VLAN Hopping attacks. Therefore, as a best practice configure the native VLAN for 802.1Q
ports to use a bit-bucket VLAN (e.g. VLAN999) that is in a shutdown state and not routable with other
networks/VLANs.
• Root Bridge: each VLAN configured on the network must use a Layer-2/Layer-3 switch to be the root
bridge. It is recommended to implement the root bridge on the Core (in a tier-2 topology) or the
Distribution (in a tier-3 topology).
• Root Guard: it is recommended to configure Root Guard on all downlink ports to the LAN access
switches to prevent the port in becoming a root port, hence, acting as the root bridge on the Layer-2
network.
• Loop Guard: enabled globally on all Access and Core switches to prevent a blocked port from
transitioning to listening after the MaxAge timer has expired. This should be implemented if Bridge
Assurance is not supported on the switch.
• Source Guard: to protect against IP address spoofing attacks on the network. This feature should be
configured on all Access Switches.
352 Services - Switching -
• Broadcast Suppression: to avoid the spread of a broadcast storm it is important to control the amount
of broadcast traffic across the Layer-2 network. Broadcast suppression should be configured on
downlink ports towards the LAN Access switches since a broadcast storm is more likely to be caused by
a user endpoint creating a loop. For the percentage, most environments can start with 20% and adjust
(up or down) as needed.
• BPDU Guard / Filter: BPDU Guard can be used on endpoint switch ports to prevent unauthorized
(rogue) switches being plugged into the network. This is recommended to prevent possible global
switching failures and should be enabled globally on all Access Switches. An alternative would be to
filter inbound and outbound BPDU messages. This feature is good for implementing on known edge
ports or switches you don’t want to include as part of your Layer-2 domain.
• Bridge Assurance (BA): deals with what ports should send BPDU messages when STP PortFast is
Recommended (2/2)
configured. It is recommended to enable the endpoint ports for “PortFast Edge” and the
uplink/downlink ports for “PortFast Network”. However, as a best practice it is recommended to set the
global default to “Network” which helps to avoid unidirectional links and potential software issues.
These recommendations also apply for Cisco Nexus series hardware.
• DHCP Snooping: used to prevent rogue DHCP servers from being plugged into the network that is not
trusted which can cause DHCP starvation attacks. DHCP snooping should be enabled on the LAN
Access switches where DHCP services should not exist. Make sure to mark all uplink/downlink switch
ports on the Access switches to be “trusted”. Lastly, DHCP snooping inspection should be rate limited
to “100” to protect the control plane and the switch itself.
• Dynamic ARP Inspection (DAI): prevents against ARP spoofing, poisoning, and starvation on the
network. This feature should be configured on all Access Switches. It should be rate limited to “100” to
protect the control plane and the switch itself. And make sure to mark all uplink/downlink switch ports
on the Access switch to be “trusted”.
• ARP Aging/Timeout: tune ARP aging timers close or equal to the CAM/MAC-address aging value
(default is 200 seconds). The default ARP age/timeout is 4 hours, so tune the timeout to be 200
seconds.
• Port Security: used to allow a specific host to be connected to a dedicated switch port based on the
MAC address (also called a secure MAC address). Or to limit the number of MAC addresses that can
be active on a switch port. The secure MAC address can be configured statically on the switch port or it
can dynamically learn the addresses (called “sticky addresses”). This will help against CAM attacks
(e.g. MAC flooding) and DHCP starvation.
• Flex Link: a locally significant feature that creates a primary and backup switch port on a Layer-
2/Layer-3 switch. This is an optional feature that can be implemented on Access switches if it is
supported. For the configuration, specify the primary uplink to the Core/Distribution switch to be the
primary port. The secondary Core/Distribution switch that the Access switch is connected to would be
the backup port. Keep in mind that this feature does not create a loop-free network, so using STP is still
recommended for the design.
Uplink Fast: enable on Access switches to quickly move a blocked port to a forwarding port
Optional
•
automatically if there is a link failure when the switch doesn’t support Rapid Spanning Tree.
• STP Path Cost: change the STP Path Cost method to “long” globally on Data Center switches (LAN
Switches can also be considered). This causes STP to use 32-bit based values when determining the
port path cost compared to the default 16-bit value which improves the root path selection when a Port
Channel using PAgP is configured.
• Protected Ports: an optional feature configured on switch ports to prohibit communication with other
protected switch ports on the local switch in the same VLAN. Communication with non-protected ports
within the same VLAN is allowed. This feature does not provide isolation of protected ports located on
different switches.
• Private VLANs: optional feature that can create sub-VLANs within a single VLAN. Private VLANs are
used to provide stronger security between hosts in the same VLAN. This is an uncommon VLAN
mechanism deployed in LAN/Data Center switching environments unless unique security requirements
are required.
Services - Virtualization - 353
3.12 Virtualization
Select one (or more) of the following virtualization PODs that will be used in the design:
Virtual Routing & Forwarding (VRF) Network Functions Virtualization (NFV) L3VPN - MPLS
• When to use: if you require creating isolated virtual • When to use: if you require creating isolated virtual
networks with no routing between other virtual networks networks with the ability to allow routing between other
• Prerequisites: -- virtual networks
• Required: VRF-enabled hardware • Prerequisites: --
• Has Sub-PODs: -- • Required: VRF-enabled hardware
• Description: in this POD, a VRF instance is created on • Has Sub-PODs: --
all supported network devices for each virtual network. • Description: in this POD, a VRF instance is created on
VLANs and 802.1Q Trunking are used for extending all supported network devices for each virtual network.
that isolated network between the other VRF-enabled VLANs and 802.1Q Trunking are used for extending that
network devices as shown in the picture above. It’s isolated network between the other VRF-enabled network
important to note that implementing VRF does not devices. An additional Layer-3 device, a Zone router is
encrypt traffic across the network. added to the topology to act as a transit for access
between the isolated networks as shown in the picture
above. A firewall appliance is placed in-line with the
Zone router to provide security enforcement between the
virtual networks. It’s important to note that implementing
VRF does not encrypt traffic across the network.
Services - Virtualization - Virtual Routing & Forwarding 355
Configuration
Below are the available options for deploying VRF based on what is required
Below are required, recommended, and optional configuration when deploying VRF services on the
network based on the available options:
• Hardware: it requires using Cisco hardware that support EVN or VRF-lite services such as the Cisco
ISR and ASR series
• VRF Definition: define all of the VRF instances (virtual networks) that will be used on the network.
Each VRF should be configured on each VRF-enabled device globally in the topology.
• Assign VRF to Interfaces: assign the VRF to all of the necessary Layer-3 interfaces that will be part of
Required
• Using Easy Virtual Network (EVN): it is recommended to use EVN instead of VRF-lite to minimize the
overall configuration required. EVN can also virtualize the control-plane and data-plane for each VRF
instance per platform allowing a hop-by-hop data path through the network.
• EVN is backwards compatible with VRF-Lite. However, the 802.1Q tag (used with VRF-lite) and the
Recommended
VNET tag (used on the EVN-enabled device) must match between the connected network devices.
• When creating a VRF name do not use the name "global"
• VNET List: it is recommended to implement VNET trunk security to specify what VRFs are allowed
across an interface. This feature works similar to 802.1Q trunk security. VNET trunk security must be
configured equally between the connected devices.
• VRF and Voice using Cisco CME: VRF and Cisco CME cannot be configured together on the same
router platform. It is recommended to use a single WAN branch router where VRFs exist for all
networks except for voice, which is not in a VRF.
356 Services - Virtualization - Virtual Routing & Forwarding
• Route Replication: if you require sharing routes between VRFs and will use Cisco EVN. You can use
a feature called "Route Replication" to specify what routes within a VRF can be redistributed into
another VRF instance. This does not require route targets, imports, nor exports under the VRF
definition.
• Routing and Security between VRFs: if you require routing between the isolated VRF instances you
can add a Zone router to the topology. This router is not enabled for VRF and will contains all routes on
Optional
the network. A firewall appliance would then be placed in-line between the Zone router and the Core
switch (LAN or Data Center) to provide security enforcement between the virtual networks. The
interface on the Zone router connected into the Core would be a 802.1Q trunk interface with multiple
VLAN tags. Each of those VLAN will have an SVI which would be associated to a VRF instance on the
Core switch. This is important for send routing information within a VRF up to the Zone router.
• DMVPN per VRF: used to extend a VRF across a DMVPN network using VRF-lite. The WAN routers
would be treated as CE/PE devices.
Services - Virtualization - L3VPN - MPLS 357
• When to use: if you require a standard deployment of • When to use: if you require a scalable deployment of
MPLS in a service provider network (medium or large) MPLS to support a high number of clients in a service
• Prerequisites: SP provider network (large). It will also provide faster
• Required: -- convergence in the topology.
• Has Sub-PODs: -- • Prerequisites: SP
• Components: MPLS routers (P, PE) • Required: --
• Description: in this POD, the service provider network • Has Sub-PODs: --
consist of several MPLS routers enabled for LDP, IGP, • Components: MPLS routers (P, PE), Route Reflectors
and MP-BGP. This is the simplest deployment of MPLS (RR)
as shown in the picture above. It’s important to note • Description: this POD will resemble a Traditional MPLS
that implementing MPLS does not encrypt traffic across but with hierarchical parts of a core and distribution layer
the network. as shown in the picture above. PE routers would exist in
different distribution blocks with a local MPLS Provider
RR. Each RR would also be connected into the Core
layer. Furthermore, each distribution block will run its
own IGP separate from the other distributions and the
core itself. The entire Unified MPLS topology will exist in
a single BGP ASN. This will be used for building MP-
BGP connections between some of the other PE routers.
It’s important to note that implementing MPLS does not
encrypt traffic across the network.
358 Services - Virtualization - L3VPN - MPLS
Configuration
Below are required, recommended, and optional configuration when deploying MPLS services:
• MPLS Provider Edge (PE): determine all of the MPLS routers that will be directly connected to a
customer site (CE) and into the MPLS network. These would be considered as Provider Edge (PE)
routers. The VRF instances would be configured directly on the PE routers and will use MP-BGP for
communicating with other PE routers to exchange VRF routing information. The MPLS PE is
considered as the access layer in the MPLS topology with client facing networks.
• MPLS Provider (P): any MPLS router in the topology that isn't directly connected to a customer site,
but used as a transit across the MPLS is considered as a Provider (P) router. They will connect to PE
and other P routers making up the MPLS Backbone. VRF’s are not configured on the P routers, only
LDP is configured for extending the MPLS labels between the routers.
• IGP Routing Protocol: an IGP routing protocol (EIGRP, OSPF, IS-IS) is required to be configured on
the network between the MPLS routers. This is important for the MPLS PE routers to establish MP-
BGP connections. It is recommended to use either OSPF or IS-IS especially if Traffic Engineering will
Required
• VRF RD Naming Standard: it is recommended to create a naming standard for naming the VRF Route
Distinguishers (RD) on the network
• Loopback Interfaces: it is recommended to configure loopback interfaces on all of the MPLS routers.
Recommended
This should be used for all LDP, IGP, and MP-BGP peering among the MPLS routers
• Route Reflectors in Traditional MPLS: it is recommended for all PE routers to peer with a dedicated
BGP router that is configured as a route reflector. This will provide better scalability, management, and
redundancy for IBGP peering between the PE routers. The route reflectors would be connected into the
Core of the MPLS network.
• MTU Considerations: using MPLS VPN tunneling will introduce additional overhead across the
network. It is recommended to use Jumbo Frames if supported over the MPLS topology.
Services - Virtualization - L3VPN - MPLS 359
fragmentation would be 1392 bytes (for unicast) or 1368 bytes (for multicast). This is applicable when
using MPLS over DMVPN.
• Quality of Service (QoS): this is required if customer networks will mark packets locally within their
network and will be sent across the MPLS. The MPLS network can be implemented for Uniform, Short
Pipe, or Pipe mode depending on what QoS operation is required.
• Route Target Constraint (RTC): an optional feature used to restrict what routes are received from
other PE routers. This is recommended for scalable MPLS environments with Route Reflectors. The
RR will implement outbound filtering to send the necessary routes to another PE router based on its
route target configuration.
360 Services - Virtualization - L2VPN – Metro Ethernet
• When to use: if you require building Layer-2 point-to- • When to use: if you require building a mesh (point-to-
point connections between two customer sites across multipoint) of Layer-2 connections between multiple
the existing MPLS network customer sites across the existing MPLS network
• Prerequisites: VRT-L3VPN • Prerequisites: VRT-L3VPN
• Required: -- • Required: --
• Has Sub-PODs: -- • Has Sub-PODs: --
• Description: in this POD, the L2VPN topology would • Description: in this POD, the L2VPN topology would
overlay on-top of the existing MPLS network already overlay on-top of the existing MPLS network already
built. There are several different Layer-2 point-to-point built. There are several different Layer-2 point-to-
technologies that can be used. They include Ethernet multipoint technologies that can be used. They include
over MPLS (EoMPLS, AToM), L2TPv3, VPWS, EPL VPLS, EPLAN (Port-Based), and EVPLAN (VLAN-
(Port-Based), and EVPL (VLAN-based). based). There are considerations to keep in mind which
include the MAC address table size and flooding of
unknown frames across the service provider network.
These could affect the overall performance and reliability
of the L2VPN infrastructure.
Services - - 361
4. Attributes
Select one (or more) of the following attributes that will be used in the design:
Standards Resources
Locations Connections
POD: ATT-LOC POD: ATT-CON
• When to use: to determine the location for each network • When to use: to determine what network connections
device used in the topology and bandwidth services is required for the various
• Prerequisites: -- components on the network
• Required: -- • Prerequisites: ATT-LOC, LAN/DC, INET, WAN
• Has Sub-PODs: Go to 4.1 • Required: --
• Has Sub-PODs: Go to 4.2
Networks Standards
POD: ATT-NET POD: ATT-STD
• When to use: to determine the type of networks that will • When to use: to determine what standards will be used
be used in the topology on the network for better organization
• Prerequisites: LAN/DC, INET • Prerequisites: --
• Required: -- • Required: --
• Has Sub-PODs: Go to 4.3 • Has Sub-PODs: Go to 4.4
Resources
POD: ATT-RES
• When to use: additional design resources that can be
referenced
• Prerequisites: --
• Required: --
• Has Sub-PODs: Go to 4.5
Attributes - Locations - 363
4.1 Locations
Complete each of the following PODs to determine all of the rooms, buildings, and locations that will be
used on the network:
Classroom
Lab A classroom location that consist of students with multiple
computer systems. Either individual ports could be wired
Similar to a Data Center, but dedicated for testing or lab
back to a MDF, IDF, or Data Center through a patch panel.
devices that may be wired back to a Data Center, MDF,
Or using a single cable (or more) leading back to a MDF, IDF,
and/or IDF.
or Data Center where the classroom has a dedicated switch
that all computer devices would be connect to.
Custom
Any other computer or wiring room consisting of network
equipment not easily placed in any of the other local room
locations.
Attributes - Locations - Wide Area Locations 365
Center.
Data Center
Determine if a dedicated Data Center location will be Custom
connected into the WAN. The Data Center will consist of
Any site that isn’t classified as a main office, branch office, or
servers accessed by users at the main and branch
Data Center that will be connected into the WAN.
offices. This can also be considered as a Disaster
Recovery site for the environment.
366 Attributes - Connections -
4.2 Connections
Complete each of the following PODs to build the connections and bandwidth services between the
network devices in the design:
For each network device in the topology, determine all of the different port
types that will exist. Below are the possible port types that can be identified:
Internal Uplink Ports (UI ports) External Uplink 1 Ports (UE1 ports)
These are ports that connect up to another switch These are ports that connect up to a network device
within the LAN/DC that has UE2 port(s)
Example
Look at the following diagram below. It is a simple topology that shows how to identity the ports on each
network device:
• Firewall Device: this device will have UE2 and DE ports. The UE2 port would connect up to the
ISP cloud. And the DE port would connect down towards the LAN/DC, in this case, the Core
switch.
• Core Switch: this device will have a mix of DI, UE1, and E ports. The UE1 port would connect
up to the firewall since that device is located in the Internet POD. And another UE1 port
connected to the WAN router. The DI ports would connect down to each of the access switches.
And there will be servers directly connected to this device. So those ports would be identified as
E ports.
• Access Switch #1: this device will have UI and E ports. Its UI port will connect up to the Core
switch. And the E ports is where the user endpoints would be connected.
• Access Switch #2: this device will have UI, DI, and E ports. The UI port would connect up to the
Core switch. But it will also have downlink ports to another switch, so that port would be identified
as a DI port. This device would also have E ports that will have user endpoints connected.
• Access Switch #3: this device will mirror Access Switch #1. It will have UI and E ports. Its UI
port will connect up to Access Switch #2. And the E ports is where the user endpoints would be
connected.
• WAN Router: this device would be similar to the firewall appliance, but this device is located in
the WAN POD. This device will have UE2 and DE ports. Its UE port would connect up to the
WAN cloud. And its DE port would connect down to the Core switch.
For each network device select one of the following PODs based on the type of ports it will have:
UE2 and DE Port Deployment UE1 and DE Port Deployment UE Port Deployment
• When to use: if the network device only has internal • When to use: if the network device has internal Uplink
Uplink ports. This will either be an access switch or and Downlink ports. This will either be (1) a Distribution
some custom/standard switch. switch in a 3-tier topology. Or (2) an access switch within
• Prerequisites: -- a group of daisy-chained switches (not recommended).
• Required: ATT-CON-BW-UI, ATT-CON-BW-E • Prerequisites: --
• Description: in this deployment, the access switch (or • Required: ATT-CON-BW-UI, ATT-CON-BW-DI, ATT-
standard/custom switch) will have uplinks port(s) CON-BW-E (if applicable)
connected up to the Core switch as shown in the picture • Description: in this deployment, the distribution switch
above. The access switch will also have edge ports (or access switch within a daisy-chain) will have an uplink
with connected endpoints (e.g. user, server). port(s) connected up to the Core switch as shown in the
picture above. The switch would also have a downlink
ports(s) connected down to access switches (or other
switches).
370 Attributes - Connections - Connection Deployment
• When to use: if the network device has an internal • When to use: if the network device has external Uplink
Downlink port and an external Uplink port. This will and Downlink ports. This will either be a WAN router,
likely be the Core switch in the topology. Edge router, or Firewall appliance that is directly
• Prerequisites: -- connected into the Internet/WAN cloud.
• Required: ATT-CON-BW-UE1-DE, ATT-CON-BW-DI, • Prerequisites: --
ATT-CON-BW-E (if applicable) • Required: ATT-CON-BW-UE2, ATT-CON-BW-UE1-DE
• Description: in this deployment, the Core switch (in a • Description: in this deployment, the network device will
2-tier or 3-tier topology) will have downlink port(s) to have an external uplink port(s) connected to a service
access switches. The Core switch will also have an provider (e.g. Internet, WAN) as shown in the picture
external Uplink connected to an external device which above. It will also have an external downlink port
could be a WAN router, Edge router, and/or Firewall connected to the Core switch. Or to another network
appliance as shown in the picture above. device within the Internet/WAN POD such as a firewall
appliance.
Attributes - Connections - Connection Deployment 371
• When to use: if the network device exists within the • When to use: if the network device will only have an
Internet/WAN POD and is directly connected to a external Uplink port. This will likely be a Collapsed Core
network device that has a UE2 port. This will be a switch in a 1-Tier topology.
network device that is in-line between the WAN/Internet • Prerequisites: --
devices and the LAN/DC (e.g. firewall, WAN • Required: ATT-CON-BW-UE1-DE, ATT-CON-BW-E (if
optimization appliance) applicable)
• Prerequisites: -- • Description: in this deployment, the Core switch (in a 1-
• Required: ATT-CON-BW-UE1-DE Tier topology) would have an external Uplink port
• Description: in this deployment, a network device connected to either a WAN router, Edge router, and/or
would be in-line between the Internet/WAN and the Firewall appliance as shown in the picture above.
LAN/DC network as shown in the picture above. This
device could be a firewall appliance that is in-line
between the edge router and the LAN/DC. Or a WAN
optimization appliance in-line between the WAN router
and the LAN/DC.
372 Attributes - Connections - Connection Deployment
Example
Continuing with our same topology example, below would be the connection deployment for each device:
Bandwidth Services for UE2 Ports Bandwidth Services for UE1 and DE Ports
POD: ATT-CON-BW-UE2 POD: ATT-CON-BW-UE1-DE
• When to use: if the network device has UE2 port(s) • When to use: if the network device has UE1 and/or DE
• Prerequisites: ATT-CON-DEPLOY-UE2-DE port(s)
• Has Sub-PODs: Go to 4.2.2.2 • Prerequisites: ATT-CON-BW-UE2
• Description: the bandwidth service for the UE2 port will • Has Sub-PODs: Go to 4.2.2.3
be based on the average bandwidth per user at the site. • Description: the bandwidth service for the UE1/DE port
The bandwidth should consider the number of users and must be within the bandwidth range determined for the
the type of applications/services that will be used. UE2 port for the Internet/WAN.
Example
Continuing with our same topology example, we would need to determine the bandwidth service for the
ports on each network device in the topology.
• Bandwidth Services for UI Ports: Access Switch #1, Access Switch #2, Access Switch #3
• Bandwidth Services for DI Ports: Core Switch and Access Switch #2
• Bandwidth Services for UE2 Ports: Firewall and WAN router
• Bandwidth Services for UE1 and DE Ports: Core Switch, Firewall, and WAN Router
• Bandwidth Services for E Ports: Access Switches 1-3, Core Switch
Attributes - Connections - Bandwidth Services 375
Select one of the following bandwidth services that will be used for the UI ports based on the number of
edge ports and the required performance:
Bandwidth Service for UI Port Total Edge Ports Bandwidth per Endpoint
24 ports 41Mbps
1GE
48 ports 21Mbps
24 ports 416Mbps
10GE
48 ports 208Mbps
4 ports 10Gbps
40GE 24 ports 1.7Gbps
48 ports 833Mbps
Note: this chart shows some of the possible combinations and doesn’t show the port capacity for a
chassis/stack-based switch.
376 Attributes - Connections - Bandwidth Services
Example
Continuing with our same topology example, we need to determine the bandwidth for all UI ports in the
topology. We look at the chart provided in this section. On the left-side column, these are possible
bandwidth services we can use for the actual UI port. This port will be based on the number of total edge
ports and the average bandwidth per endpoint attached to one of those E ports.
Let’s start with Access Switch #1 which has a UI port up to the Core switch. For the UI port, it can be a
1GE, 2GE, up to 40GE. Let’s say that the wiring closet, with AS01, will support up to 30 endpoints.
Attributes - Connections - Bandwidth Services 377
Looking at the chart, if the UI port is a 1GE connection using a 48-port switch, the average bandwidth per
user endpoint would be 21Mbps. If that bandwidth is too low then we can consider the following
alternatives:
1- Deploying two 24-port access switches in the wiring closet, which would then provide an average
bandwidth of 41Mbps per user endpoint.
2- Or deploy the UI port as a 2GE connection on the 48-port switch, which would then provide an
average bandwidth of 41Mbps per user endpoint.
Therefore, you either increase the port speed for the UI port or decrease the total number of edge ports.
378 Attributes - Connections - Bandwidth Services
In our example, Access Switch #1 will have 48-ports and the Uplink will be a 1GE connection supporting
an average bandwidth of 21Mbps per endpoint (internally).
For Access Switch #2, this will be a little different because this switch has a DI port connecting to
another access switch with edge ports. So, let’s step back and determine the UI port for Access Switch
#3. For Access Switch #3, this will be a 24-port switch with a 1GE uplink to Access Switch #2. This
would support an average bandwidth of 41Mbps per endpoint. But that will soon change.
Attributes - Connections - Bandwidth Services 379
For Access Switch #2, we need to consider all edge ports locally on the switch plus all edge ports on
Access Switch #3 since it is directly connected to it. We will assume that Access Switch #2 will also be a
24-port switch with endpoints attached. This means a total of 48 edge ports between those two switches.
If the uplink is a 1GE connection, again, it would provide an average bandwidth of 21Mbps per endpoint.
If we want that number to be higher, then again, we can increase the UI port on both switches to maybe
2GE providing 41Mbps per endpoint. We will choose 1GE for all of the uplink connections between those
switches.
380 Attributes - Connections - Bandwidth Services
In order to determine the bandwidth service for the UE2 port, we need to understand the performance
required.
Trying to determine the bandwidth for an Internet (or WAN) connection can be challenging because the
traffic conditions cannot be easily calculated starting out. You have to establish a baseline to understand
what type of traffic is typically used across your network and the amount of bandwidth utilized. This
includes the number of concurrent users that typically access network resources at the same time. Doing
all of that can take time which may not be possible for building a new business network with no baseline
established.
You can determine the bandwidth using one (or more) of the following methods:
You can determine the bandwidth by manually calculating what the performance will be based on the
traffic services and the type of users that will exist in the environment.
The table below will show three main groups based on the bandwidth usage for a user (low, moderate, or
high). Each of these groups will list traffic services that can be used based on the user type. You will
also see an estimated bandwidth range per user that you can consider for calculating the bandwidth
needed for the Internet connection.
~130kbps to 256kbps
Basic to Moderate Email Services
Basic to Moderate Web Browsing Services
Basic File Downloads Note: If a user will use more than one
Moderate Performing User Cloud Services of the services from the traffic services
VoIP Services list, you should consider a higher
Streaming Services (Audio, Video) bandwidth rate within the range
provided
Design Consideration: if you are unsure of the number of low, moderate, or high performing users in the
environment, you can use 130kbps per user (average baseline). This is typically used to calculate the
Internet performance.
382 Attributes - Connections - Bandwidth Services
Based on the performance calculated, determine the best bandwidth service that should be used for the
UE2 port. Use the table below as a reference to make your decision:
Bandwidth Calculator
Another alternative to determine the bandwidth service for the UE2 port is using an on-line bandwidth
calculator. This does have some risk because the bandwidth calculator that you use will be based on one
(or more) mathematical mechanisms. Those mechanisms will vary from tool to tool based on the
creator’s experience. One specific mechanism may not apply directly with your environment. Therefore,
use the information in any bandwidth calculator as a starting point that you can consider for the potential
bandwidth service for the UE2 port.
This can be used along with the bandwidth per user calculation method to provide a solid baseline for the
bandwidth range that should be considered.
Below is an example for what you can find on-line to calculate the best bandwidth service to use. This
bandwidth calculator specifically shows the type of traffic that will be used to even the number of users in
the company. You can do a search for “bandwidth calculator” to view several websites that provide these
calculations. I’m not listing the URL for this specific bandwidth calculator because it may not be available
in the foreseeable future and we are not the owners of that site. A lot of websites come and go over the
years creating a lot of dead links in documentation. Therefore, again it is recommended to search for
these types of tools on-line.
384 Attributes - Connections - Bandwidth Services
Example
For the next set of ports, that will be the UE2 ports which exist on the Firewall and WAN router. Here we
need to determine the Internet and WAN connection speed up to the service provider. Let’s say we have
~140 users (or endpoints) that will access the Internet/WAN. We can do this from two different
approaches for calculating the performance required.
• Approach #1: If we don't know how many users are low, moderate, or high performing users, we
can consider the average bandwidth of 130Kbps per user. Doing the math that would be 140
users x 130Kbps. That would be ~19Mbps. This means we want to consider a bandwidth
technology that can support 19Mbps or higher.
• Approach #2: We can determine the estimated number of low, moderate, and high performing
users. Let’s say that we will have 100 low performing users that require basic email and web
browsing services. And let’s say that we will have 40 high performing users.
Since the high performing user type has a recommended range between 256kbps to 512kbps, we need to
understand what type of traffic services will be used. Let’s say that those high performing users will use
the following services:
• Moderate to Heavy Email and Web Browsing Services
• Large File Downloads
• Cloud Services
Therefore, let’s choose a bandwidth rate that is right in the middle or higher within that range (256kbps to
512kbps). That would be 384kbps, so that is the rate we will use for our high performing users. Doing
the math, we will first calculate the two group of users then add the two numbers together:
• 100 users x 90kbps = 9Mbps
• 40 users x 384kbps = 15.3Mbps
Therefore, those network devices will have a ~24Mbps connection to the Internet and to the WAN. So,
the bandwidth service for those UE2 ports will be FE/GE ports.
Attributes - Connections - Bandwidth Services 385
Depending on the port type consider the following for the bandwidth service:
• UE1 and DE Ports: the bandwidth service for the UE1/DE port(s) must be within the bandwidth
range determined for the UE2 port on the Firewall, Edge router and/or WAN router
• DI Ports: the bandwidth service for the DI port(s) must match what exist on the connected
device’s UI port
• E Ports on Network Devices with a UI Port Deployment: the bandwidth service for the E ports
will be based on the average bandwidth per endpoint that was determined for the UI port
• E Ports on Network Devices with a UE1 and DI Port Deployment: this will likely be a Core
switch with one (or more) access switches connected. The bandwidth service for the E ports
need to consider intra-communication between the server endpoints locally on the same Core
switch. And inter-communication between the user endpoints and the server endpoints.
Below are the bandwidth services that can be used for the DI, UE1, DE, and E ports:
Example – DI ports
Moving along to the DI ports, this would apply for our Core switch which is connected down to Access
Switches #1 and 2. We also have Access Switch #2 which has an internal downlink port to Access
Switch #3. Now in order to determine the bandwidth service for all DI ports, you must have completed the
bandwidth service POD for all UI ports which is listed as a prerequisite.
For us, we did complete this POD. For the DI port, this process is very simple. The bandwidth services
for the DI port must match what exist on the connected device’s UI port.
For the Core Switch, it has a DI port connected to a UI port on Access Switch #1 and #2 which are GE
ports. Therefore, the DI ports on the Core switch will also be GE ports matching what is on the other side.
For Access Switch #2, it’s DI port will also be a GE port matching what exist on Access Switch #3.
Attributes - Connections - Bandwidth Services 387
With the UE2 ports figured out, we can now determine the bandwidth services for the UE1 and DE ports.
Starting with the UE1 ports, these types of ports exist on our Core switch which connect to the Firewall
and over to the WAN router.
The bandwidth service for the UE1 port must be within the bandwidth range determined for the UE2 port
on the Firewall and WAN router. This means, for the Firewall appliance, its UE2 port is 24Mbps using a
FE/GE port.
Therefore, the bandwidth service for the UE1 port on the Core must be within the 24Mbps bandwidth
range. It will also use a FE/GE port. The same would apply for the UE1 port that connects over to the
WAN router.
388 Attributes - Connections - Bandwidth Services
For the DE ports, which exist on the Firewall and WAN router, the bandwidth service must also be within
the bandwidth range determined for the UE2 port. Therefore, FE/GE would be used for those ports:
Attributes - Connections - 389
Example – E ports
Lastly, we need to determine the bandwidth services that will be used for all E ports. Among all of the
access switches, we see the average bandwidth per endpoint that was calculated earlier. Well, we simply
need to choose a bandwidth service that is within that range. Since the number is ~21Mbps, we are
looking at either FE/GE for the actual E ports on those switches:
Now, for the Core switch, we never determined what the bandwidth average would be since these are
likely server endpoints that will be accessed from other endpoints through an uplink port (e.g. access
switches). Therefore, there are two considerations we need to keep in mind when it comes to selecting
the best bandwidth service for those E ports.
• Intra-communication between the server endpoints locally on the same Core switch
• Inter-communication between the user endpoints and the server endpoints
If there will be servers connected to the Core which will communicate together locally, it’s important to
understand the performance requirements. Furthermore, it is also important to understand the number of
concurrent users who will access a server that is connected to the Core. For example, we know that the
average bandwidth per endpoint for all user E Ports is ~21Mbps, which is based on the UI port speed of
1GE. Let’s say that all endpoints connect to a single server at 21Mbps. This would be an aggregated
total of 2Gbps. All endpoints accessing a single server at the same time and at that bandwidth rate is
very unlikely, but if it did then the server E-ports would need to be 2GE or 10GE ports. Since that is
unlikely especially for user endpoints, we can use GE for the E-ports on the Core switch.
390 Attributes - Networks -
4.3 Networks
Select one (or more) of the following type of networks that will be used in the design:
User Network
Dedicated subnets should be used for user endpoints on Guest Network
the LAN which include desktops, laptops, and printers. Dedicated subnet(s) should be used for all guest users and
Multiple user subnets should be considered based on the contractors in the environment.
department, building, or quadrant.
Management Network
Dedicated subnet(s) should be used for managing and
monitoring all network devices. Most network devices will Infrastructure Network
have a dedicated management interface which can be
Dedicated subnet(s) should be used for specific network
configured with a management IP address from this
functions and solutions such as Wireless, VPN and WAN.
network. This network can also be integrated with an
OOB solution for remote administration if the network is
not accessible.
4.4 Standards
Select one (or more) of the following standards that will be used:
cs01tra asr01rh
Core Switch (cs01) located in Tracy, CA (tra) Cisco ASR router (asr01) for the client RouteHub (rh)
• When to use: this naming standard is ideal for networks • When to use: this naming standard is ideal for consulting
located at a single location or sites located in different groups that manage network devices for a client. The
cities in the same state. This is typically used for small name will reflect the hardware that is used followed by a
and SMB sized networks unique client ID.
component-deviceID-location hardware-deviceID-client
• Component: the network device type • Hardware: hardware of the network device using a short
• Device ID: the network device number. This is acronym
important if there are multiple devices on the network • Device ID: the network device number. This is
• Location: the location or city where the device is important if there are multiple devices on the network
located • Client: the client name represented as an acronym
Attributes - Standards - Naming Standards 393
as01-idf1-sc02-ca rh-er01-tra-ca
Access Switch (as01) in IDF1 (idf1) located in building 2 in Edge Router (er01) for the client RouteHub (rh) located in
Santa Clara (sc02) California (ca) Tracy (tra), CA (ca)
• When to use: this naming standard is ideal for • When to use: this naming standard is ideal for
environments that have multiple network devices located consulting groups that manage network devices for
in different states, cities, and/or buildings. clients with multiple sites
component-deviceID-room-location-state client-component-deviceID-location-state
• Component: the network device type • Client: the client name represented as an acronym
• Device ID: the network device number. This is • Component: the network device type
important if there are multiple devices on the network • Device ID: the network device number. This is
• Room: the room (using a room number ID) where the important if there are multiple devices on the network
network device is located • Location: the location or city where the device is located
• Location: the location or city where the device is located • State: the state where the device is located
• State: the state where the device is located
394 Attributes - Standards - VLAN Standards
VLAN 10 - 49 VLAN 50 - 99
Data VLANs (e.g. User Endpoints) Voice VLANs (e.g. IP Phones)
VLAN Schema
This VLAN schema aligned with the IPv4 Addressing schema. For example, VLAN11 (Data VLAN) could
have an IP address schema of 192.168.11.0 /24.
This VLAN standard can be used for Small, SMB, Medium, and some Large sized networks.
Attributes - Standards - Addressing Standards 395
Select one of the following IPv4 addressing schemas that will be used:
Schema #1
Schema #2
Description: this schema is used if there are multiple sites (up to 254 sites) connected to the WAN
Schema #3
Description: this schema is used if there are multiple sites with up to 15 different type of networks
Select one of the following IPv6 addressing schemas that will be used:
Schema #1
Description: this schema is focused on the location and services for larger networks
Schema: [IPv6 network prefix] [IPv6 subnet prefix = XYZA] [Interface-ID] /64
• [IPv6 network prefix] - this can be a global prefix, unique-local prefix, or site-local prefix
• [IPv6 subnet prefix ]
o X = 4 Bits to define the regional prefix (0-F) ; /52
o Y = 4 Bits to define the site prefix (0-F) ; /56
o Z = 4 Bits to define the service/function prefix (Users, Wireless, DMZ) (0-F) ; /60
o A = 4 Bits to define the subnet ID prefix ; /64
• [Interface-ID] - this is the unique host ID
Example: fd00::1161:aaaa:bbbb:cccc:1
• fd00 = this is a private IPv6 address using a unique-local prefix (fd00::/8)
• 1 = Region #1 (e.g. North America)
• 1 = Site #1 (e.g. San Francisco office)
• 6 = Server network
• 1 = Server network - voice server farm
• aaaa:bbbb:cccc:1 = interface-ID of voice server
400 Attributes - Standards - Addressing Standards
Schema #2
Description: this schema is focused on the location based on the country, state, and city which is typical
for larger networks
Schema: [IPv6 network prefix] [IPv6 subnet prefix = XYZA] [Interface-ID] /64
• [IPv6 network prefix] - this can be a global prefix, unique-local prefix, or site-local prefix
• [IPv6 subnet prefix ]
o X = 4 Bits to define the country prefix (0-F) ; /52
o Y = 4 Bits to define the state prefix (0-F) ; /56
o Z = 4 Bits to define the city prefix (0-F) ; /60
o A = 4 Bits to define the service/function prefix (Users, Wireless, DMZ) (0-F) ; /64
• [Interface-ID] - this is the unique host ID
Example: fd00::1116:aaaa:bbbb:cccc:1
• fd00 = this is a private IPv6 address using a unique-local prefix (fd00::/8)
• 1 = United States (US)
• 1 = California
• 1 = San Francisco office
• 6 = Voice server network
• aaaa:bbbb:cccc:1 = interface-ID of voice server
Attributes - Standards - Addressing Standards 401
Schema #3
Schema: [IPv6 network prefix] [IPv6 subnet prefix = XYZZ] [Interface-ID] /64
• [IPv6 network prefix] - this can be a global prefix, unique-local prefix, or site-local prefix
• [IPv6 subnet prefix ]
o X = 4 Bits to define the location type (building, site) (0-F) ; /52
o Y = 4 Bits to define the organization/department prefix (0-F) ; /56
o ZZ= 8 Bits to define the service/function prefix (Users, Wireless, DMZ) (0-F) ; /64
• [Interface-ID] - this is the unique host ID
Example: fd00::1106:aaaa:bbbb:cccc:1
• fd00 = this is a private IPv6 address using a unique-local prefix (fd00::/8)
• 1 = Building based network
• 1 = Engineering department
• 06 = QA server network
• aaaa:bbbb:cccc:1 = interface-ID of QA server
402 Attributes - Standards - Addressing Standards
Schema #4
Schema: [IPv6 network prefix] [IPv6 subnet prefix = XYZZ] [Interface-ID] /64
• [IPv6 network prefix] - this can be a global prefix, unique-local prefix, or site-local prefix
• [IPv6 subnet prefix ]
o X = 4 Bits to define the site code prefix (0-F) ; /52
o Y = 4 Bits to define the organization/department prefix (0-F) ; /56
o ZZ = 8 Bits to define the service/function prefix (Users, Wireless, DMZ) (0-F) ; /64
• [Interface-ID] - this is the unique host ID
Example: fd00::1106:aaaa:bbbb:cccc:1
• fd00 = this is a private IPv6 address using a unique-local prefix (fd00::/8)
• 1 = Site #1
• 1 = Engineering department
• 06 = QA server network
• aaaa:bbbb:cccc:1 = interface-ID of QA server
Attributes - Standards - Addressing Standards 403
Schema #5
Description: this schema is focused on the services used in smaller networks with multiple sites
Schema: [IPv6 network prefix] [IPv6 subnet prefix = XXZZ] [Interface-ID] /64
• [IPv6 network prefix] - this can be a global prefix, unique-local prefix, or site-local prefix
• [IPv6 subnet prefix ]
o XX = 8 Bits to define the site code prefix (0-F) ; /52
o ZZ = 8 Bits to define the service/function prefix (Users, Wireless, DMZ) (0-F) ; /64
• [Interface-ID] - this is the unique host ID
Example: fd00::0106:aaaa:bbbb:cccc:1
• fd00 = this is a private IPv6 address using a unique-local prefix (fd00::/8)
• 01 = Site #1
• 06 = Voice server network
• aaaa:bbbb:cccc:1 = interface-ID of voice server
404 Attributes - Standards - Addressing Standards
Schema #6
Schema: [IPv6 network prefix] [IPv6 subnet prefix = XXXX] [Interface-ID] /64
• [IPv6 network prefix] - this can be a global prefix, unique-local prefix, or site-local prefix
• [IPv6 subnet prefix ]
o XXXX = 16 Bits to define the service/function prefix (Users, Wireless, DMZ) (0-F) ; /64
• [Interface-ID] - this is the unique host ID
Example: fd00::6:aaaa:bbbb:cccc:1
• fd00 = this is a private IPv6 address using a unique-local prefix (fd00::/8)
• 6 = Voice server network
• aaaa:bbbb:cccc:1 = interface-ID of voice server
Attributes - Standards - Data Center Standards 405
Data center facilities involves environmental (e.g. cooling, air flow, power), management (e.g. cabling,
labeling), and equipment (e.g. racks, cabinets, trays) elements. These are really a design in itself, but
below are best practice components that should be considered for any data center deployment.
• Power: any network equipment (e.g. routers, switches, servers) connecting into a single power
circuit should never use more than 75 to 78% of the allocated current (amp) for that circuit as a
best practice. For example, if the power circuit is a 20 amp circuit and connected is a power strip
with servers, switches, and routers then the equipment’s power usage should not exceed 15
amps.
• Cooling: it is recommended to ensure proper cooling for the data center so the network
equipment do not over-heat and shutdown. Some of the options include: In-row cooling,
overhead cooling, raised floor with underfloor cooling, and wall-mounted cooling systems.
• Racks (or Cabinets): all equipment (routers, switches, servers, etc.) should be placed into a rack
(or cabinet) that is bolted down to the floor and earthquake protected. Determine if a 2-post or 4-
post rack will be used. Most Data Center racks will be 4-post racks (42-inch deep cabinets
supporting up to ~45RU) which can provide more flexibility for cable and power management.
• Rack Mounts: most servers come with rack mounts that use square hole–style vertical cabinet
rails. The racks should use the square rail mounting options.
• Cable Management and Trays: this should be used for network connections between patch
panels and other network devices (e.g. switches). This will provide good cable management and
organization in the data center.
• Labeling: all devices and cables should be labeled for better management and organization
• Uninterruptible Power Supply (UPS): critical network equipment (e.g. Core switch, servers)
should be connected to a UPS unit in the event of a power failure. When choosing a UPS
system, it’s important to determine the following aspects: (1) determine the battery load it can
carry and for how long. A UPS system can switchover the current load to a set of internal or
external batteries if it is supported. (2) Determine if the UPS system can operate as an on-line
system (power is filtered through the batteries all of the time) or a switchable system (the
batteries are only used during a power loss).
• Power Strips: it’s recommended to use Smart or IP enabled power strips that would connect into
the network devices. The power strips would then connect into a UPS unit. With IP enabled
power strips this can allow engineers to remotely power cycle equipment when needed. Smart
Power Strips have the ability to monitor the current Amps that is used for better awareness of the
power usage.
• Temperature: the temperature in the data center must not be colder than 50 degrees Fahrenheit
or hotter than 95 degrees Fahrenheit. It is recommended to keep the data center at an ambient
temperature which is between 68 to 77 degrees Fahrenheit.
• Air Flow: confirm the airflow for the hardware that will be used. It can be front (intake) to back
(exhaust) or right (intake) to left (exhaust), which is NEBS compliant. This is important for cooling
and airflow in the Data Center which is discussed further under Hot Aisle and Cold Aisle
o Use blanking panels to maintain proper airflow for the hardware in a rack/cabinet
o Use proper vent placement and partitioning of space for the hardware
o Standalone servers and network chassis (using vertical modules), the air-flow goes front-
to-back.
o For network chassis’ (using horizontal modules), the air flow goes left-to-right
• KVM/ILO (OOB): this is recommended to provide console access to server equipment if the
engineer is unable to access the server directly over the network.
• Hot Aisle / Cold Aisle: Use Hot Aisle and Cold Aisles to achieve cooling efficiency. It is
important to understand the air flow of the equipment that will be used. You want cool air to flow
through the intake of the equipment. Then blowing the hot air out the exhaust and sent through
Attributes - Standards - Data Center Standards 407
the AC unit. The picture below provides a best practice for how data center air flow aisles should
be used.
408 Attributes - Standards - Data Center Standards
Cooling within your Data Center or any server related room is strongly recommended. Otherwise some of
the equipment could shut down if the temperature exceeds 95 degrees for any length of time. The ideal
temperature for a server room is typically ~68 degrees. But it’s also important to understand that you
don't want the Data center to be too cold. Otherwise, that will create a possible condensation problem
when the outside air has a high level of humidity leaving moisture on the equipment.
Any electrical component will emit heat, therefore it’s important to understand the amount of heat (in
Watts) that each device may give off. You also need to consider other related elements that give off heat
such as people. People typically give off ~100 watts of heat. Those numbers may be important if you
have staff members that work inside of the Data Center for any extended period of time.
To determine the best cooling system needed for the Data Center (or server room) you need to calculate
the total wattage for all equipment in that room. Then you factor in the recommended power usage of
75%.
For example, if all of the equipment in the room is 2500 watts. That would be 2500 x 75% which would
be 1,875 Watts.
The AC systems will provide cooling power represented in either Tons or BTU (British Thermal Unit):
• To determine the cooling power based on Tons: (Total Wattage x 75%) / 3500 = Tons
• To determine the cooling power based on BTU: (Total Wattage x 75%) x 3.41 = BTU per hour
Back to our example, we calculated that the total wattage in our Data Center is 1,875 Watts. We can
then calculate the cooling power based on Tons or BTU needed in that room.
• Cooling Power based on Tons: 1875 watts / 3500 = ~0.54 tons
• Cooling Power based on BTU: 1875 watts x 3.41 = ~6394 BTU
Therefore, we can consider a power cooling system that can support those requirements. There is a
portal air conditioner unit by KwiKool that supports a cooling power up to 2 tons or 24,000 BTU (picture
shown on the right).
Those numbers fall well within our cooling power requirements and recommendations. However, it’s
always important to factor in scalability for additional equipment added to the Data Center over time.
Attributes - Standards - 409
It's important to understand the total power (in Watts) that will be used for all network and
computer/server equipment. As mentioned earlier, network equipment connecting into a single power
circuit should never use more than 75 to 78% of the allocated current (amp) for that circuit. This includes
if you are using a UPS for power backup with your critical devices. You can determine the total wattage
by calculating the Wattage from all devices. You can typically get this information from the power adapter
and/or documentation. You can also calculate the wattage if the voltage and Amps is provided. That
formula would be: Watts = Voltage x Amps
It's also important to understand what type of power circuits will be used. This will be based on the
Voltage and Amps. For example, most dedicated power circuits will be 120v 20amp circuits. The total
power wattage for that circuit would be 2400 watts (120 x 20 = 2400). You can take that calculated total
and multiple it by 75% which will be 1800 watts (2400 x 75% = 1800). This means as a best practice all
network/server equipment plugged into a 120v 20amp circuit should support up to 1800 watts.
Let's say we have a small data center with four servers, two small business switches, and a firewall
connected to the Internet. All of these components would be plugged into a single 120v 20amp circuit.
The estimated wattage for those devices would be the following:
• Server (250 watts)
• Switch (80 watts)
• Firewall (60 watts)
Doing the math that would be: (4 servers x 250 watts) + (2 switches x 80 watts) + (1 firewall x 60 watts) =
1220 watts
This would be below the recommended usage of 1800 watts for that power circuit. If the number of
servers grow over time then a second 120v 20amp power circuit will be required.
This is how you should approach the power design for your Data Center based on the hardware and the
power circuits that will be used.
410 Attributes - Resources -
4.5 Resources
Below are the following design resources available in the design cookbook:
For example, a business solution would be something like Collaboration. That isn’t a solution by name
that would be deployed by an engineer. A network engineer would deploy a Voice or Unified
Communication Solution to provide Collaboration to the business.
Data Loss Prevention (DLP) Firewall (2.6.2), Mail Security (2.6.8.1), Cloud Security (2.6.12)
Internet of Everything (IoE) Data Center (1.1), LAN (1.2), Internet (1.4), Wireless (2.9)
Internet of Things (IoT) Data Center (1.1), LAN (1.2), Internet (1.4), Wireless (2.9)
Understanding the business size is important to provide a baseline when choosing the right hardware for
a solution. For example, the Cisco ASA 5506-X firewall is recommended for Small sized networks
(around 20-50 users). Therefore, we can start with that model and go up (or down) as needed.
However, the hardware may not align with the business requirements. For example, a Microsoft Gold
Partner with 30 employees was looking for a new phone system. Based on the business size they would
be an SMB sized network. The Cisco Unified Communication Manager Express (CME) solution would
easily support this client based on their business size. However, they had unique SIP requirements that
wasn't supported on Cisco Unified CME (at the time), so we deployed the Cisco Unified Communications
Manager solution (suited for larger networks) to meet their technical requirements.
Keep these considerations in mind for all hardware selections in the environment.