Multilayer Campus Architecture and Design Principles BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Enterprise-Class Availability Resilient R ili t C Campus C Communication i ti F Fabric bi Campus Systems Approach to High Availability Network-level redundancy System-level y resiliency y Enhanced management Human u a ea ear notices ot ces tthe e difference in voice within 150–200 msec—10 consecutive G711 packet loss Ultimate Goal……………..100% Next-Generation Apps Video conf., Unified Messaging, Global Outsourcing, E-Business E Business, Wireless Ubiquity Mission Critical Apps. Databases, Order-Entry, CRM, ERP Video loss is even more noticeable 200 msec end-to end-campus convergence Desktop Apps E-mail, File & Print APPLICATIONS DRIVE REQUIREMENTS FOR HIGH AVAILABILITY NETWORKING BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Next Generation Campus Design U ifi d C Unified Communications i ti E Evolution l ti VoIP is now a mainstream technology Ongoing evolution to the full spectrum of Unified Communications High High-Definition Definition Executive Communication Application requires stringent Service-Level Agreement (SLA) Reliable Service—High Availability Infrastructure Application Service Management—QoS BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 3 Agenda Data Center Services Block Multilayer Campus Design Principles Foundation Services Campus Design Best Practices IP Telephony Considerations Si Si QoS Considerations Security Considerations Si Putting It All Together © 2008 Cisco Systems, Inc. All rights reserved. Si Si Si Si Si Distribution Blocks Summary BRKRST-2031 14457_04_2008_c2 Si Si Cisco Public 4 High-Availability Campus Design Structure Modularity Structure, Modularity, and Hierarchy Access Si Distribution Si Core Distribution Access BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Si Si Si WAN Cisco Public Si Si Si Si Si Si Si S Data Center Si Si Internet 5 Hierarchical Campus Network Structure, Modularity and Hierarchy Not This!! Si Si Si Si Si Si Si Si Si Si Si Si Server Farm WAN BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Internet PSTN 6 Hierarchical Network Design Without a Rock Solid Foundation the Rest Doesn’t Matter Access Offers hierarchy—each layer has specific role Modular topology—building topology building blocks Distribution Easy to grow, understand, and troubleshoot Si Si Creates small fault domains— domains clear demarcations and isolation Core Promotes load balancing and y redundancy Si Si Promotes deterministic traffic patterns Distribution Access BRKRST-2031 14457_04_2008_c2 p balance of both Layer y 2 Incorporates and Layer 3 technology, leveraging the strength of both Utilizes Layer 3 routing for load balancing fast convergence, balancing, convergence scalability, and control © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Si Si Building Block 7 Access Layer Feature Rich Environment It It’ss not just about connectivity Layer 2/Layer 3 feature rich environment; convergence, HA, security, QoS, IP multicast, etc. Core Si Intelligent network services: QoS, trust boundary, broadcast suppression, IGMP snooping Intelligent g network services: PVST+, Rapid PVST+, EIGRP, OSPF, DTP, PAgP/LACP, UDLD, FlexLink, etc. Si Distribution Si Si Cisco Catalyst integrated security features IBNS (802.1x), (CISF): port security, DHCP snooping, DAI, IPSG, etc. Automatic phone discovery, conditional trust boundary boundary, power over Ethernet, auxiliary VLAN, etc. Access Spanning tree toolkit: PortFast, UplinkFast BackboneFast UplinkFast, BackboneFast, LoopGuard LoopGuard, BPDU Guard, BPDU Filter, RootGuard, etc. BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 8 Distribution Layer Policy, Convergence, QoS, and High Availability Availability Availability, load balancing balancing, QoS and provisioning are the important considerations at this layer y Core Si Si Aggregates wiring closets (access layer) and uplinks to core Protects core from high density peering and problems in access layer Route summarization, fast convergence, redundant path load sharing Distribution Si Si Access HSRP or GLBP to provide first hop p redundancy y BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 9 Core Layer Scalability, High Availability, and Fast Convergence Backbone for the network—connects network building blocks Core Si Si Performance and stability vs. complexity— less is more in the core Distribution Aggregation point for distribution layer Si Separate core layer helps in scalability during future growth Si Access Keep the design technology-independent BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 10 Do I Need a Core Layer? It’s Really a Question of Scale Complexity Scale, Complexity, and Convergence No Core Fully meshed distribution layers Physical Ph i l cabling bli requirement Routing complexity Second Building Block–4 New Links 4th Building Block 12 New Links 24 Links Total 3rd Building Block 8 New Links 12 Links Total 8 IGP Neighbors BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. 5 IGP Neighbors Cisco Public 11 Do I Need a Core Layer? It’s Really a Question of Scale Complexity Scale, Complexity, and Convergence Dedicated Core Switches Easier to add a module Fewer links in the core Easier bandwidth upgrade Routing protocol peering reduced Equal q cost Layer y 3 links for best convergence 2nd Building Block 8 New Links 4th Building Block 4 New Links 16 Links Total 3rd Building Block 4 New Links 12 Links Total 3 IGP Neighbors BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. 3 IGP Neighbors Cisco Public 12 Design Alternatives Come Within a Building (or Distribution) Block Layer 2 Access Routed Access Virtual Switching System Access Si Distribution Si Core Distribution Access BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Si Si Si Si Si Si Si WAN Cisco Public Si S Data Center Si Si Internet 13 Layer 3 Distribution Interconnection Layer 2 Access—No VLANs Span Access Layer Tune CEF load balancing Match CatOS/IOS EtherChannel settings and tune load balancing Summarize routes towards core Limit redundant IGP peering STP Root and HSRP primary g or GLBP to load balance tuning on uplinks Set trunk mode on/no-negotiate Disable EtherChannel unless needed Set port host on access layer ports: Disable Trunking Di bl T ki Disable EtherChannel Enable PortFast RootGuard or BPDU-Guard Use security features BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Si Si Layer 3 Si Point to Point Link Core Distribution Si Access VLAN 20 Data 10.1.20.0/24 VLAN 120 Voice 10.1.120.0/24 Cisco Public VLAN 40 Data 10.1.40.0/24 VLAN 140 Voice 10.1.140.0/24 14 Layer 2 Distribution Interconnection Layer 2 Access—Some VLANs Span Access Layer Tune CEF load balancing Match CatOS/IOS EtherChannel settings and tune load balancing Summarize routes towards core Limit redundant IGP peering STP Root and HSRP primary or GLBP and STP port cost tuning to load balance on uplinks Set trunk mode on/no-negotiate Disable EtherChannel unless needed RootGuard on downlinks LoopGuard on uplinks Set port host on access Layer ports: Disable Trunking Disable EtherChannel Enable PortFast RootGuard or BPDU-Guard Use security features BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Si Si Layer 2 Si Trunk Si VLAN 20 Data VLAN 40 Data 10.1.20.0/24 10.1.40.0/24 VLAN 120 Voice VLAN 140 Voice 10.1.120.0/24 10.1.140.0/24 VLAN 250 WLAN 10.1.250.0/24 Cisco Public Core Distribution Access 15 Routed Access and Virtual Switching System Evolutions of and Improvements to Existing Designs Si Si Si Si Core VSS Link Si Layer 3 New Concept Si Distribution P-t-P Link VLAN 20 Data 10.1.20.0/24 VLAN 120 Voice 10.1.120.0/24 VLAN 20 Data 10.1.20.0/24 VLAN 40 Data 10.1.40.0/24 VLAN 120 Voice 10.1.120.0/24 VLAN 140 Voice 10 10.1.140.0/24 1 140 0/24 VLAN 250 WLAN 10.1.250.0/24 VLAN 40 Data 10.1.40.0/24 VLAN 140 Voice 10.1.140.0/24 Access See RST-3035—Advanced Enterprise Campus Design Alternatives: Routed Access and Virtual Switching System (VSS) BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 16 Virtual Switch System (VSS) Hub and Spoke VLANs can Span Access Layer Tune CEF load balancing Match CatOS/IOS EtherChannel settings and tune load balancing Summarize routes towards core Set trunk mode on/nonegotiate Multi Chassis Use PaGP and Multi-Chassis EtherChannel RootGuard on downlink (MEC) LoopGuard on uplink (MEC) Set port host on access Layer ports: Si Si VSS Link New Concept Si Si – Disable trunking Disable EtherChannel Enable PortFast E bl P tF t RootGuard or BPDU-Guard on VLAN 20 Data 10.1.20.0/24 access ports VLAN 120 Voice Use securityy features 10 1 120 0/24 10.1.120.0/24 VLAN 40 Data 10.1.40.0/24 VLAN 140 Voice 10 1 140 0/24 10.1.140.0/24 VLAN 250 WLAN 10.1.250.0/24 BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Core Distribution Access 17 Virtual Switching System 1440 Network System Virtualization Core/Distribution Si Si Data Center Access Si Si Si Si Si Si Features Benefits of VSS Network System Virtualization Increased Operational Efficiency via i Simplified Si lifi d Network N t k Inter-Chassis Stateful Switch Over ((SSO)) Boost Non-stop Communication Multi-Chassis EtherChannel (MEC) Scale the System Bandwidth Capacity to 1.4 Tbps BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 18 Agenda Data Center Services Block Multilayer Campus Design Principles Foundation Services Campus Design Best Practices IP Telephony Considerations Si Si QoS Considerations Security Considerations Si Putting It All Together © 2008 Cisco Systems, Inc. All rights reserved. Si Si Si Si Si Distribution Blocks Summary BRKRST-2031 14457_04_2008_c2 Si Si Cisco Public 19 Foundation Services Layer 1 physical things Layer 2 redundancy—spanning tree Layer 3 routing protocols Trunking protocols—(ISL/.1q) Unidirectional link detection Load balancing g EtherChannel link aggregation CEF equal cost load balancing HSRP First hop redundancy protocols VRRP, HSRP, and GLBP BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Spanning Tree 20 Best Practices— Layer 1 Physical Things Use point point-to-point to point interconnections—no L2 aggregation points between nodes Use fiber for best convergence (debounce timer) Si Si Si Si Si Si Cisco Public Si Si WAN Si Layer 3 Equal Cost Links Si Use configuration on the physical interface not VLAN/SVI when possible © 2008 Cisco Systems, Inc. All rights reserved. Si Layer 3 Equal Cost Links Tune carrier delay timer BRKRST-2031 14457_04_2008_c2 Si Si Si Data Center Internet 21 Redundancy and Protocol Interaction Li k N Link Neighbour i hb F Failure il D Detection t ti Indirect link failures are harder to detect With no direct HW notification of link loss or topology change convergence times are dependent on SW notification Hellos Si Si Hub Si Indirect failure events in a bridged environment are detected by Spanning Tree Hellos In certain topologies the need for TCN updates or dummy multicast flooding (uplink fast) is necessary for convergence You should not be using hubs in a high availability il bilit d design i BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public BPDU BPDUs Si Si Hub Si S 22 Redundancy and Protocol Interaction Li k Redundancy Link R d d and dF Failure il D Detection t ti Direct point-to-point fiber provides for fast failure detection IEEE 802.3z and 802.3ae link negotiation define the use of Remote Fault Indicator and Link Fault Signaling mechanisms Bit D13 in the Fast Link Pulse (FLP) can be set to indicate a physical fault to the remote side Do not disable auto-negotiation on GigE and 10GigE interfaces The default debounce timer on GigE and 10GigE fiber linecards is 10 msec The minimum debounce for f copper is 300 msec Carrier-Delay 3560, 3750 and 4500—0 msec 6500—leave it set at default BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 3 2 Cisco IOS Throttling: C i D Carrier Delay l Ti Timer Linecard Throttling: Debounce Timer 1 1 Si Remote IEEE Fault Detection Mechanism Si 23 Redundancy and Protocol Interaction L Layer 2 and d 3—Why 3 Wh Use U R Routed t d IInterfaces t f Configuring L3 routed interfaces provides for faster convergence than an L2 switch port with an associated L3 SVI L2 L3 Si Si Si 1. Link Down 1. Link Down 2. Interface Down 2. Interface Down 3. Routing Update 3. Autostate 4 4. SVI Down 5. Routing Update ~ 8 msec loss ~ 150 150-200 200 msec loss 21:38:37.042 UTC: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet3/1, changed state to down 21:38:37.050 UTC: %LINK-3-UPDOWN: Interface GigabitEthernet3/1, changed state to down 21:38:37.050 UTC: IP-EIGRP(Default-IP-RoutingTable:100): Callback: route_adjust GigabitEthernet3/1 BRKRST-2031 14457_04_2008_c2 Si © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 21:32:47.813 UTC: %LINEPROTO-5-UPDOWN: %LINEPROTO 5 UPDOWN: Line protocol on Interface GigabitEthernet2/1, changed state to down 21:32:47.821 UTC: %LINK-3-UPDOWN: Interface GigabitEthernet2/1, changed state to down 21:32:48.069 UTC: %LINK-3-UPDOWN: Interface Vlan301,, changed state to down 21:32:48.069 UTC: IP-EIGRP(Default-IP-RoutingTable:100): Callback: route, adjust Vlan301 24 Best Practices— Spanning Tree Configuration Only span VLAN across multiple access layer switches when you have to! Use Rapid PVST+ for best convergence More common in the d data center Required to protect against ‘user side’ loops p Required to protect against operational accidents (misconfiguration or hardware failure) Take advantage of the spanning tree toolkit Layer 2 Loops Si Si © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Si Si Si Si Si Si Si Si Layer 3 Equal Cost Links Layer 3 Equal Cost Links Si Si WAN BRKRST-2031 14457_04_2008_c2 Same VLAN Same VLAN Same VLAN Si Si Data Center Internet 25 Multilayer Network Design Layer 2 Access with Layer 3 Distribution Si Vlan 10 Si Vlan 20 Si Vlan 30 Each access switch has unique VLANs No layer 2 loops Layer 3 link between distribution No blocked links BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Vlan 30 Si Vlan 30 Vlan 30 At least some VLANs span multiple access switches Layer 2 loops Layer 2 and 3 running over link between distribution Blocked links 26 Optimizing L2 Convergence PVST+, Rapid PVST+ or MST Rapid-PVST+ greatly improves the restoration times for any VLAN that requires a topology convergence due to link UP Rapid-PVST+ also greatly improves convergence time over backbone fast for any indirect link failures Traditional spanning p g tree implementation Rapid PVST+ (802.1w) Scales to large size (~10,000 logical ports) Easy to implement, proven, scales MST (802.1s) (802 1s) Permits very large scale STP implementations (~30,000 logical ports) Time to Restore Data T a Flows (se ec) PVST+ (802.1d) Not as flexible as Rapid PVST+ http://www.cisco.com/en/US/products/hw/switches/ps708/products_co nfiguration_example09186a00807b0670.shtml BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 35 30 Upstream 25 Downstream 20 15 10 5 0 PVST+ Rapid PVST+ 27 Layer 2 Hardening Spanning Tree Should Behave the Way You Expect Place the root where you want it LoopGuard STP Root Root primary/secondary macro The root bridge should stay where you put it Si Si RootGuard RootGuard LoopGuard LoopGuard UplinkFast UDLD Only end-station traffic should be seen on an edge g p port UplinkFast BPDU Guard BPDU Guard or RootGuard PortFast Port Security RootGuard PortFast Port-security BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 28 Best Practices— Layer 3 Routing Protocols Typically deployed in distribution to core, and core to core interconnections Used to quickly re-route around d ffailed il d node/links d /li k while hil providing load balancing over redundant paths g not squares q for Build triangles deterministic convergence Only peer on links that you intend to use as transit Insure redundant L3 paths to avoid black holes Summarize distribution to core to limit EIGRP query diameter or OSPF LSA propagation Tune CEF L3/L4 load balancing hash to achieve maximum tili ti off equall costt paths th utilization (CEF polarization) BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Si Si Si Si Si Layer 3 Equal Cost Links Layer 3 Equal Cost Links Si Si Si Si Si Si WAN Si Si Si Data Center Internet 29 Best Practice— Build Triangles Not Squares Deterministic vs. Non-Deterministic Triangles: Link/Box Failure Does NOT Require Routing Protocol Convergence Si Si Si Si Model A Squares: Link/Box Failure Requires Routing Protocol Convergence Si Si Si Si Model B Layer 3 redundant equal cost links support fast convergence Hardware based—fast recovery to remaining path Convergence is extremely fast (dual equal-cost paths: no need for OSPF or EIGRP to recalculate a new path) BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 30 Best Practice— Passive Interfaces for IGP Limit OSPF and EIGRP Peering Through the Access Layer Limit unnecessary peering using passive interface: Distribution Si Si Routing Updates F Four VLANs VLAN per wiring i i closet l t 12 adjacencies total Memory and CPU requirements increase with no real benefit Access Creates overhead for IGP OSPF Example: EIGRP Example: Router(config)#routerospf 1 Router(config-router)#passiveinterfaceVlan 99 Router(config)#routereigrp 1 Router(config-router)#passiveinterfaceVlan 99 Router(config)#routerospf 1 Router(config-router)#passiveinterface default Router(config-router)#no passiveinterface Vlan 99 Router(config)#routereigrp 1 Router(config-router)#passiveinterface default Router(config-router)#no passiveinterface Vlan 99 BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 31 Why You Want to Summarize at the Distribution Limit EIGRP Queries and OSPF LSA Propagation It is important to force summarization at the distribution towards the core For return path traffic an OSPF or EIGRP re-route t is required By limiting the number of peers query y or an EIGRP router must q the number of LSAs an OSPF peer must process we can optimize this re-route EIGRP example: interface Port-channel1 description to Core#1 ip address 10.122.0.34 255.255.255.252 ip hello-interval eigrp 100 1 ip hold-time eigrp 100 3 ip summary-address eigrp 100 10.1.0.0 255.255.0.0 5 No Summaries Q Queries i Go G Beyond B d the th Core C Rest of Network Core Si Distribution Si © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Si Access 10.1.1.0/24 BRKRST-2031 14457_04_2008_c2 Si 10.1.2.0/24 32 Why You Want to Summarize at the Distribution Reduce the Complexity of IGP Convergence It is important to force summarization at the distribution towards the core For return path traffic an OSPF or EIGRP re-route t is i required i d By limiting the number of peers an EIGRP router must query or the number of LSAs an OSPF |peer must process we can optimize his re-route For EIGRP if we summarize at the distribution we stop queries at the core boxes for an access layer ‘flap’ For OSPF when we summarize at the distribution (area border or L1/L2 border) the flooding of LSAs is limited to the distribution switches;; SPF now deals with one LSA not three BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Summaries St Q Stop Queries i att the th Core C Rest of Network Core Si Si Summary: 10.1.0.0/16 Si Distribution Si Access 10.1.1.0/24 10.1.2.0/24 33 Best Practice— Summarize at the Distribution Gotcha—Distribution-to-Distribution Link Required Best practice—summarize at the distribution layer to limit EIGRP queries or OSPF LSA p propagation p g Gotcha: Upstream: HSRP on left distribution takes over when link fails Core Si Si Summary: 10.1.0.0/16 Distribution Return path: old router still advertises summary to core Si Return traffic is dropped on right distribution switch Si Summarizing requires a link between the distribution switches Alternative design: Use the access layer for transit BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Access 10.1.1.0/24 10.1.2.0/24 34 Provide Alternate Paths What happens if fails? No route to the core anymore? Si Core Si Single Si l Path P th to Core Allow the traffic to go through the access? Do you want to use your access switches it h as ttransit it nodes? d ? How do you design for scalability if the access used for transit traffic? Si Distribution Si Install a redundant link to the core Best practice: install redundant link to core and utilize L3 link between bet ee d distribution st but o Layer aye (summarization—coming) BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Access A B 35 EIGRP Design Rules in the Campus L Leverage th the T Tools l P Provided id d The greatest advantages of EIGRP are gained when the network has a structured addressing plan that allows for use of summarization and stub routers when appropriate 10.10.0.0/16 EIGRP provides the ability to implement multiple tiers of summarization and route filtering Minimize the number and time for query response to speed up convergence Si Si 10.10.128.0/17 10.10.0.0/17 Summarize distribution block routes upstream to the core If routing in the access configure all access switches as EIGRP stub routers Si Si Si Si If routing in the access layer filter routes sent down to access switches BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 36 OSPF Design Rules in the Campus Wh Where Are A th the Areas? A ? Area design based on address summarization Area boundaries should define buffers between fault domains Summarize routes from the distribution block upstream into the core Minimize the number of LSAs and routes in the core Reduce the need for SPF calculations due to internal distribution block changes ABR for a regular area forwards Summary LSAs (Type 3) ASBR summary (Type 4) Specific externals (Type 5) Area 100 Area 110 Area 120 Si Si Si Si Si Si Area 0 Si Si Si Si Si Si Si Si Stub area ABR forwards Summary LSAs (Type 3) Summary default (0.0.0.0) A totally stubby area ABR forwards WAN Data Center Internet Summary default (0.0.0.0) BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 37 Equal Cost Multi Multi-Path Path Optimizing CEF Load-Sharing Depending on the traffic flow patterns and IP Addressing in use one algorithm may provide better load-sharing results than another Be careful not to introduce polarization in a multimulti tier design by changing the default to the same thing in all tiers/layers of the network Si 30% of Flows Si 70% of Flows Si C t l t 4500 Load-Sharing Catalyst L d Sh i Options O ti Original Src IP + Dst IP Universal* Src IP + Dst IP + Unique ID Include P t Port Src IP + Dst IP + (Src or Dst Port) + Unique ID Load-Sharing Simple Catalyst 6500 PFC3** Load-Sharing Options Default* Src IP + Dst IP + Unique ID Full Src IP + Dst IP + Src Port + Dst Port Full Exclude Port Src IP + Dst IP + (Src or Dst Port) Simple Src IP + Dst IP Full Simple Src IP + Dst IP + Src Port + Dst Port Load-Sharing Full Simple Si Si Si Si Load-Sharing Simple Si * = Default Load-Sharing Mode ** = PFC3 in Sup720 and Sup32 Supervisors BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 38 CEF Load Balancing Avoid Underutilizing Redundant Layer 3 Paths Redundant Paths Ignored Distribution Default L3 Hash Si L Core Default L3 Hash Distribution Default L3 Hash BRKRST-2031 14457_04_2008_c2 Si Si R Si © 2008 Cisco Systems, Inc. All rights reserved. Imbalance/overload could occur Redundant paths are ignored/underutilized g The default CEF hash ‘input’ is L3 L R Si CEF polarization: without some tuning CEF will select the same p path left/left or right/right Si Cisco Public We can change the default to use L3 + L4 information as ‘input’ input to the hash derivation 39 CEF Load Balancing Avoid Underutilizing Redundant Layer 3 Paths All Paths Used Distribution L3/L4 Hash Si L R Core Default L3 Hash Distribution L3/L4 Hash BRKRST-2031 14457_04_2008_c2 Si L Si L R Si R Si © 2008 Cisco Systems, Inc. All rights reserved. Si Cisco Public The default will for Sup720/32 and latest hardware ((unique q ID added to default). However, depending on IP addressing, and flows imbalance could occur Alternating L3/L4 hash and L3 hash will give us the best load lts balancing res results Use simple in the core and full simple in the distribution to add L4 information to the algorithm at the distribution and maintain differentiation tier-to-tier 40 Best Practices Practices—Trunk Trunk Configuration Typically deployed on interconnection between access and distribution layers Use VTP transparent mode to decrease potential for operational error Hard set trunk mode to on and encapsulation negotiate off for optimal convergence Change the native VLAN to something unused to avoid VLAN hopping Manually prune all VLANS exceptt those needed th d d Disable on host ports: CatOS: set port host Cisco IOS: switchport host BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 802.1q Trunks Si Si Si Si Si Layer 3 Equal Cost Links Layer 3 Equal Cost Links Si Si Si Si Si Si WAN Si Si Si Data Center Internet 41 VTP Virtual Trunk Protocol Centralized VLAN management Set VLAN 50 Trunk VTP server switch propagates VLAN database to VTP client switches A F Server Trunk Transparent Trunk Runs only on trunks Ok, I Just Learnt VLAN 50! Four modes: Server: updates clients and servers Client Transparent: let updates pass through Off: ignores VTP updates © 2008 Cisco Systems, Inc. All rights reserved. Client Ok, I Just L Learnt t VLAN 50! B Trunk Client: receive updates— cannot make changes BRKRST-2031 14457_04_2008_c2 Pass Through Update Cisco Public Drop VTP Updates Off C 42 DTP Dynamic Trunk Protocol Automatic formation of trunked switch-to-switch interconnection On: always O l b be a ttrunk k Desirable: ask if the other side can/will Auto: if the other sides asks I will Off: don’t become a trunk Si On/On Trunk Si Si Auto/Desirable Trunk Si Si Off/Off NO Trunk Negotiation of 802.1Q or ISL encapsulation p ISL: try to use ISL trunk encapsulation 802.1q: try to use 802.1q encapsulation p Negotiate: negotiate ISL or 802.1q encapsulation with peer Non-negotiate: always use encapsulation that is hard set BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Si Si Si Off/On, Auto, Desirable NO Trunk 43 Optimizing Convergence: Trunk Tuning Trunk Auto/Desirable Takes Some Time DTP negotiation tuning improves link up convergence time CatOS> (enable) set trunk <port> nonegotiate dot1q <vlan> IOS(config-if)# switchport mode trunk IOS(config-if)# switchport nonegotiate Time to Co onverge in S Seconds 25 2.5 2 1.5 Two Seconds of Delay/Loss T Tuned d Away A 1 0.5 Voice Data 0 BRKRST-2031 14457_04_2008_c2 Si Trunking Desirable © 2008 Cisco Systems, Inc. All rights reserved. Trunking Nonegotiate Cisco Public 44 Trunking/VTP/DTP Quick Summary Trunking/VTP/DTP—Quick VTP Transparent should be used; there is a trade off between administrative overhead and the temptation to span existing VLANS across multiple access layer switches Emerging technologies that do VLAN assignment b name (IBNS by (IBNS, NAC NAC, etc.) t ) require i a unique i VLAN database per access layer switch if the rule: A VLAN = A Subnet = AN access layer switch is going to be followed One can consider a configuration that uses DTP ON/ON and NO NEGOTIATE; there is a trade off between performance/HA impact and maintenance and operations implications An ON/ON and NO NEGOTIATE configuration is faster from a link up (restoration) perspective than a desirable/desirable alternative. However, in this configuration DTP is not actively monitoring the state of the trunk and a misconfigured trunk is not easily identified. g It’s reallyy a balance between fast convergence and your ability to manage configuration and change control … BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 45 Best Practices Practices—UDLD UDLD Configuration Typically deployed on any fiberoptic interconnection Use UDLD aggressive mode for best protection Turn on in global configuration to avoid operational error/“misses” Si Si Si Si Si Fiber Interconnections Layer 3 Equal Cost Links Layer 3 Equal Cost Links Si Si Config example Si Si Si Si Si Si Si Cisco IOS: udld aggressive WAN BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Data Center Internet 46 Unidirectional Link Detection Protecting Against One Way Communication Highly-available Highly available networks require UDLD to protect against one-way communication or partially failed links and the effect that they could have on protocols like STP and RSTP Primarily used on fiberoptic links where patch panel errors could cause link up/up with mismatched transmit/receive pairs Si Each switch port configured for UDLD will send UDLD protocol packets (at L2) containing the port’s own device/port ID, and the neighbor’s device/port IDs seen by UDLD on that port Are You ‘Echoing’ M Hellos? My H ll ? Neighboring ports should see their own device/port ID (echo) in the packets received from the other side If the port does not see its own device/port ID in the incoming UDLD packets for a specific duration of time, the link is considered unidirectional and is shutdown BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Si 47 UDLD Aggressive and UDLD ‘Normal’ Normal Si Si Timers are the same—15 same 15 second hellos by default Aggressive Mode—after aging on a previously bi-directional link— tries 8 times (once per second) to reestablish connection then err-disables port UDLD—Normal Mode—Only err-disable the end where UDLD detected other end just sees the link go down UDLD—Aggressive—err-disable BOTH ends of the connection due to err-disable when aging g g and re-establishment of UDLD communication fails BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 48 Best Practices— EtherChannel Configuration Typically deployed in distribution to core, and core to core interconnections Used to provide link redundancy—while reducing peering complexity Tune L3/L4 load balancing g hash to achieve maximum utilization of channel members Deploy in powers of 2 (2, 4, or 8) Match CatOS and Cisco IOS PAgP settings p 802.3ad LACP for interop if you need it Disable unless needed CatOS: set port host p Cisco IOS: switchport host BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Si Si Si Si Si Layer 3 Equal Cost Links Layer 3 Equal Cost Links Si Si Si Si Si Si WAN Si Si Si Data Center Internet 49 Understanding EtherChannel Li k Negotiation Link N ti ti O Options—PAgP ti PA P and d LACP Packet Aggregation Protocol Si Si Si Si Si On/On Channel On/Off No Channel Auto/Desirable Channel Si Si Si Si Si Si On/Off No Channel Active/Passive Channel Si Si Si Si Passive/Passive N Ch No Channell On: always be a channel/bundle member Desirable: ask if the other side can/will Auto: if the other side asks I will Off: don’t become a member of a channel/bundle © 2008 Cisco Systems, Inc. All rights reserved. On/On Channel Si Off/On, Auto, Desirable No Channel BRKRST-2031 14457_04_2008_c2 Link Aggregation Protocol Cisco Public On: always be a channel/bundle member Active: ask if the other side can/will Passive: if the other side asks I will Off: don’t become a member of a channel/bundle 50 PAgP Tuning PAgP Default Mismatches Matching EtherChannel Configuration on Both Sides p Link Restoration Convergence g Times Improves set port channel <mod/port> off Time e to Converrge in Seconds 7 6 4 3 2 1 0 BRKRST-2031 14457_04_2008_c2 As Much As Seven Seconds of Delay/Loss Tuned Away 5 PAgP Mismatch © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public PAgP Off 51 EtherChannels or Equal Cost Multipath 10/100/1000 How Do You Aggregate It? 10GE and 10GE 10GE 10 GE channels Core T i l 4 :1 Typical Data OverOverSubscription Si Distribution Si Typical 20 20::1 Data OverOverSubscription BRKRST-2031 14457_04_2008_c2 Si Si Access © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 52 EtherChannels or Equal Cost Multipath Reduce Complexity/Peer Relationships More links = more routing peer relationships and associated overhead Si Si Si Si Si EtherChannels allow you to reduce peers by creating single logical interface to peer over Si On single link failure in a bundle Layer 3 Equal Cost Links Layer 3 Equal Cost Links Si Si OSPF running on an IOS-based switch will reduce link cost and re-route re route traffic OSPF running on a hybrid switch will not change link cost and may overload remaining links Si Si Si Si WAN BRKRST-2031 14457_04_2008_c2 Si EIGRP may not change link cost and may overload remaining links Si Data Center © 2008 Cisco Systems, Inc. All rights reserved. Internet Cisco Public 53 EtherChannels or Equal Cost Multipath Why 10-Gigabit Interfaces More links = more routing peer relationships and associated overhead Si Si Si Si Si Layer 3 Equal Cost Links Layer 3 Equal Cost Links Si Si Si Si Si Si WAN BRKRST-2031 14457_04_2008_c2 EtherChannels allow you to reduce peers by creating single logical interface to peer over Si Si Si Data Center © 2008 Cisco Systems, Inc. All rights reserved. Internet Cisco Public However, a single link failure is not taken into consideration by protocols. routing out g p otoco s Overload O e oad possible. Single 10-Gigabit links address both problems. problems Increased bandwidth without increasing complexity or compromising routing protocols ability gp y to select best path. 54 EtherChannels Quick Summary EtherChannels—Quick For Layer Layer-2 2 EtherChannels: Desirable/Desirable is the recommended configuration so that PAgP is running across all members of the bundle insuring that an individual link failure will not result in an STP failure For Layer Layer-3 3 EtherChannels: One can consider a configuration that uses ON/ON. There is a trade-off between performance/HA impact and maintenance and operations implications. An ON/ON configuration g is faster from a link-up p ((restoration)) p perspective p than a Desirable/Desirable alternative. However, in this configuration PAgP is not actively monitoring the state of the bundle members and a misconfigured bundle is not easily identified. Routing protocols may not have visibility into the state of an individual member of a bundle. LACP and the minimum links option can be used to bring the entire bundle down when the capacity is diminished. OSPF has visibility to member loss (best practices pending investigation) investigation). EIGRP does not not… When used to increase bandwidth—no individual flow can go faster than the speed of an individual member of the link Best B t used d to t eliminate li i t single i l points i t off ffailure il (i (i.e. lilink k or port) t) d dependencies d i from a topology BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 55 Best Practices Practices—First First Hop Redundancy Used to provide a resilient default gateway/first hop address to end-stations 1st Hop Redundancy HSRP HSRP, VRRP VRRP, and GLBP alternatives Si VRRP, HSRP and GLBP provide id millisecond illi d titimers and excellent convergence performance Si BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Si WAN Si Si Si Si Cisco Public Si Layer 3 Equal Cost Links Si Si Preempt timers need to be tuned to avoid black-holed traffic Si Layer 3 Equal Cost Links d VRRP if you need multivendor interoperability GLBP facilitates uplink load balancing Si Si Si Data Center Internet 56 First Hop Redundancy with VRRP IETF Standard RFC 2338 (April 1998) A group of routers function as one virtual router by sharing one virtual IP address and one virtual MAC address R1—Master, Forwarding g Traffic; R2,—Backup p VRRP ACTIVE R2 R1 Si Si Distribution-B VRRP Backup Distribution-A VRRP Active The rest of the routers act as “back back up” up in case the master router fails Access-a Backup routers stay idle as far f as packet forwarding f from the client side is concerned © 2008 Cisco Systems, Inc. All rights reserved. IP: 10.0.0.253 MAC: 0000.0C78.9abc vIP: vMAC: IP: 10.0.0.254 MAC: 0000.0c12.3456 vIP: 10.0.0.10 vMAC: 0000.5e00.0101 One (master) router performs packet forwarding for local hosts BRKRST-2031 14457_04_2008_c2 VRRP BACKUP IP: MAC MAC: GW: ARP: Cisco Public 10.0.0.1 aaaa.aaaa.aa01 01 10.0.0.10 0000.5e00.0101 IP: MAC MAC: GW: ARP: 10.0.0.2 aaaa.aaaa.aa02 02 10.0.0.10 0000.5e00.0101 IP: MAC MAC: GW: ARP: 10.0.0.3 aaaa.aaaa.aa03 03 10.0.0.10 0000.5e00.0101 57 First Hop Redundancy with HSRP RFC 2281 (March 1998) A group of routers function as one virtual router by sharing one virtual IP address and one virtual MAC address R1—Active, Forwarding Traffic; R2—Hot Standby, Idle HSRP ACTIVE © 2008 Cisco Systems, Inc. All rights reserved. R2 R1 Si Si Distribution-B HSRP Backup Distribution-A HSRP Active The rest of the routers provide “hot hot standby” standby in case the active router fails BRKRST-2031 14457_04_2008_c2 IP: 10.0.0.253 MAC: 0000.0C78.9abc vIP: vMAC: IP: 10.0.0.254 MAC: 0000.0c12.3456 vIP: 10.0.0.10 vMAC: 0000.0c07.ac00 One (active) router performs packet forwarding for local hosts Standby routers stay idle as far f as packet forwarding f from the client side is concerned HSRP STANDBY Access-a IP: MAC MAC: GW: ARP: Cisco Public 10.0.0.1 aaaa.aaaa.aa01 01 10.0.0.10 0000.0c07.ac00 IP: MAC MAC: GW: ARP: 10.0.0.2 aaaa.aaaa.aa02 02 10.0.0.10 0000.0c07.ac00 IP: MAC MAC: GW: ARP: 10.0.0.3 aaaa.aaaa.aa03 03 10.0.0.10 0000.0c07.ac00 58 Why You Want HSRP Preemption Spanning Tree Root and HSRP Primary aligned When Spanning Tree Root is re re-introduced, introduced traffic will take a two-hop path to HSRP Active Si Spanning Tree Root HSRP HSRP Preempt Active Core Si HSRP Active Si HSRP Preemption will allow HSRP to follow Spanning Tree topology Si Distribution Spanning Tree Root Access Without Preempt Delay HSRP Can Go Active Before Box Completely Ready to Forward Traffic: L1 (Boards), L2 (STP), L3 (IGP Convergence) standby 1 preempt delay minimum 180 BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 59 First Hop Redundancy with GLBP Cisco Designed, Load Sharing, Patent Pending All the benefits of HSRP plus load balancing of default gateway utilizes all available bandwidth A group of routers function as one virtual router by sharing one virtual IP address but using multiple virtual MAC addresses g for traffic forwarding Allows traffic from a single common subnet to go through multiple redundant gateways using a single virtual IP address R1- AVG; R1, R2 Both Forward Traffic R1 © 2008 Cisco Systems, Inc. All rights reserved. IP: 10.0.0.253 MAC: 0000.0C78.9abc vIP: 10.0.0.10 vMAC: 0007.b400.0102 IP: 10.0.0.254 MAC: 0000.0c12.3456 vIP: 10.0.0.10 10 0 0 10 vMAC: 0007.b400.0101 R1 Si Distribution-A GLBP AVG/ AVF, SVF IP: MAC MAC: GW: ARP: BRKRST-2031 14457_04_2008_c2 GLBP AVF, SVF GLBP AVG/AVF, SVF Cisco Public 10.0.0.1 aaaa.aaaa.aa01 01 10.0.0.10 0007.B400.0101 Si Distribution-B GLPB AVF, SVF Access-a IP: MAC MAC: GW: ARP: 10.0.0.2 aaaa.aaaa.aa02 02 10.0.0.10 0007.B400.0102 IP: MAC MAC: GW: ARP: 10.0.0.3 aaaa.aaaa.aa03 03 10.0.0.10 0007.B400.0101 60 First Hop Redundancy with Load Balancing Cisco Gateway Load Balancing Protocol (GLBP) Each member of a GLBP redundancy group owns a unique virtual MAC address for a common IP address/default gateway When end-stations ARP for the common IP address/default gateway they are given a load balanced virtual MAC address Host A and host B send traffic to different GLBP peers but have the same default gateway GLBP 1 ip 10.88.1.10 vMAC 0000.0000.0001 vIP 10.88.1.10 R1 .1 GLBP 1 ip 10.88.1.10 vMAC 0000.0000.0002 R2 .2 2 ARP Reply 10.88.1.0/24 .4 ARPs for 10.88.1.10 Gets MAC 0000.0000.0001 BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. .5 A B Cisco Public ARPs for 10.88.1.10 Gets MAC 0000.0000.0002 61 Optimizing Convergence: VRRP HSRP VRRP, HSRP, GLBP Mean, Max, and Min—Are There Differences? VRRP not tested with sub-second sub second timers and all flows go through a common VRRP peer; mean, max, and min are equal HSRP has sub-second timers; however all flows go through same peer so there is no difference between mean,, max,, and min HSRP p Si Si GLBP has sub-second timers and distributes the load amongst the GLBP peers; so 50% of the clients are not affected by an uplink failure Time in Seconds to Converge e Distribution to Access Link Failure Access to Server Farm 1.2 VRRP HSRP GLBP 50% of Flows Have ZERO Loss W/ GLBP 1 0.8 GLBP Is 50% Better 0.6 0.4 0.2 0 BRKRST-2031 14457_04_2008_c2 Longest © 2008 Cisco Systems, Inc. All rights reserved. Shortest Cisco Public Average 62 If You Span VLANS, VLANS Tuning Required By Default, Half the Traffic Will Take a Two-Hop L2 Path Both distribution switches act as default gateway Blocked uplink caused traffic to take less than optimal path Core Layer 3 Distribution Layer 2/3 Core Distribution-A GLBP Virtual MAC 1 Distribution-B GLBP Virtual MAC 2 Si Si Access Layer 2 BRKRST-2031 14457_04_2008_c2 F: Forwarding B: Blocking Access-a Access-b VLAN 2 VLAN 2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 63 Agenda Data Center Services Block Multilayer Campus Design principles Foundation Services Campus Design Best Practices IP Telephony Considerations Si Si QoS Considerations Security Considerations Si Putting It All Together © 2008 Cisco Systems, Inc. All rights reserved. Si Si Si Si Si Distribution Blocks Summary BRKRST-2031 14457_04_2008_c2 Si Si Cisco Public 64 Daisy Chaining Access Layer Switches Avoid Potential Black Holes Return Path Traffic Has a 50/50 Chance of Being ‘Black Black Holed’ Holed Core Layer 3 Si Si 50% Chance That Traffic Will Go Down Path with No Connectivity Layer 3 Link Distribution Layer 2/3 Distribution-A Distribution-B Si Si Access Layer 2 BRKRST-2031 14457_04_2008_c2 Access-a Access-n Access-c VLAN 2 VLAN 2 VLAN 2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 65 Daisy Chaining Access Layer Switches New Technology Addresses Old Problems Stackwise/Stackwise-Plus technology eliminates the concern Loopback links not required No longer forced to have L2 link in distribution If you use modular (chassis-based) switches, these problems are not a concern Forwarding Si HSRP Active Layer 3 Forwarding Si HSRP Standby Catalyst 3750-E or Catalyst 2975 BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 66 What Happens if You Don’t Link the Distributions? STPs slow convergence can cause considerable periods of traffic loss STP could cause non-deterministic traffic flows/link load engineering STP convergence g will cause Layer 3 convergence STP and Layer 3 timers are independent Unexpected Layer 3 convergence and re-convergence could occur Even if yyou do link the distribution switches dependence on STP and link state/connectivity can cause HSRP irregularities and unexpected state transitions BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Core STP Root and HSRP Active STP Secondary Root and HSRP Standby Hellos Si Si F 2 B 2 Access-a VLAN 2 Traffic Dropped Until Transition to Forwarding; As much as 50 Seconds Access-b VLAN 2 Traffic Dropped Until MaxAge Expires Then Listening and Learning 67 What if You Don Don’t? t? Black Holes and Multiple ‘Transitions’ … Core Layer 3 Core STP Root and HSRP Active Distribution Layer 2/3 STP Secondary Root and HSRP Standby Hellos Si Si Aggressive HSRP timers limit black hole #1 Backbone fast limits time (30 seconds) HSRP Active to event #2 (Temporarily) Even with Rapid PVST+ at least one second before event #2 F: Forwarding B: Blocking Access Layer 2 Access-a Access-b VLAN 2 VLAN 2 MaxAge Seconds Before Failure Is Detected… Then Listening and Learning Blocking link on access-b will take 50 seconds to move to forwarding traffic black hole until HSRP goes active on standby HSRP peer After MaxAge expires (or backbone fast or Rapid PVST+) converges HSRP preempt causes another transition Access-b used as transit for access-a’s traffic BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 68 What if You Don Don’t? t? Return Path Traffic Black Holed … Core Layer 3 Core STP Root and HSRP Active Distribution Layer 2/3 STP Secondary Root and HSRP Standby Hellos Si Si Access Layer 2 802 802.1d: 1d: up to 50 seconds PVST+: backbone fast 30 seconds Rapid PVST+: address by the protocol (one second) F: Forwarding g B: Blocking Access-a Access-b VLAN 2 VLAN 2 Blocking link on access-b access b will take 50 seconds to move to forwarding return traffic black hole until then BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 69 Asymmetric Routing (Unicast Flooding) Affects redundant topologies with shared L2 access One path upstream and two paths downstream CAM table entry ages out on standby HSRP Without a CAM entry packet is flooded to all ports in the VLAN Asymmetric Equal Cost Return Path CAM Timer Has Aged out on Standby HSRP Si Upstream Packet Unicast to Active HSRP Downstream Packet Flooded VLAN 2 BRKRST-2031 14457_04_2008_c2 Si © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public VLAN 2 VLAN 2 VLAN 2 70 Best Practices Prevent Unicast Flooding Assign one unique data and voice VLAN to each access switch Traffic is now only flooded down one trunk A Access switch it h unicasts correctly; no flooding to all ports If you have to: Asymmetric Equal Cost Return Path Downstream Packet Flooded on Single Port Si Si Upstream Packet Unicast to Active HSRP Tune ARP and CAM aging timers; CAM timer exceeds ARP timer Bias routing metrics t remove equall to cost routes BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. VLAN 3 Cisco Public VLAN 4 VLAN 5 VLAN 2 71 Agenda Data Center Services Block Multilayer Campus Design Principles Foundation Services Campus Design Best Practices IP Telephony Considerations Si Si QoS Considerations Security Considerations Si Putting It All Together © 2008 Cisco Systems, Inc. All rights reserved. Si Si Si Si Si Distribution Blocks Summary BRKRST-2031 14457_04_2008_c2 Si Si Cisco Public 72 Building a Converged Campus Network Infrastructure Integration, QoS, and Availability Access layer Auto phone detection Inline power Q S scheduling, QoS: h d li trust boundary and classification Fast convergence Access Si Si Si Si Si Si Distribution Distribution Di t ib ti llayer High availability, redundancy, fast convergence Policy enforcement QoS: scheduling, trust boundary and classification Core Core Distribution High availability, redundancy, fast convergence QoS: scheduling, trust boundary BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Layer 3 Equal Cost Links Si Si Si Si Layer 3 Equal Cost Links Si Si Si Si A Access WAN Cisco Public Data Center Internet 73 Infrastructure Integration Extending the Network Edge Switch Detects IP Phone and Applies Power CDP Transaction Between Phone and Switch IP Phone Placed in Proper VLAN DHCP Request Req est and Call Manager Registration Phone contains a three-port three port switch that is configured in conjunction with the access switch and CallManager BRKRST-2031 14457_04_2008_c2 1. Power negotiation 2. VLAN configuration 3. 802.1x interoperation 4 4. QoS configuration 5. DHCP and CallManager registration © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 74 Infrastructure Integration: First Step Power Requirement Negotiation Cisco pre pre-standard standard devices initially receive 6.3 6 3 watts and then optionally negotiate via CDP 802 802.3af 3af devices initially receive 12.95 12 95 watts unless PSE able to detect specific PD power classification Class Usage Minimum Power Levels Output at the PSE Maximum Power Levels at the Powered Device 0 Default 15.4W 0.44 to 12.95W 1 Optional 4.0W 0.44 to 3.84W 2 Optional 7.0W 3.84 to 6.49W 3 Optional 15.4W 6.49 to 12.95W 4 Reserved for Future Use Treat as Class 0 Reserved for Future Use: a Class 4 Signature Cannot Be Provided by a Compliant Powered Device BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 75 Enhanced Power Negotiation 802.3af Plus Bi-Directional CDP (Cisco 7970) PD Plugged in PSE—Power Source Equipment Cisco 6500,4500, 3750 3560 3750, Switch Detects IEEE PD PD Is I Classified Cl ifi d Power Is Applied Phone Transmits a CDP Power Negotiation Packet Listing Its Power Mode Switch Sends a CDP Response with a Power Request PD—Powered Device Cisco 7970 Based on Capabilities p Exchanged g Final Power Allocation Is Determined Using bi-directional bi directional CDP exchange exact power requirements are negotiated after initial power-on BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 76 Design Considerations for PoE Power Management Switch manages power by what is allocated not by what is currently used Device power consumption is not constant A 7960G requires q 7W when the p phone is ringing g g at maximum volume and requires 5W on or off hook Understand the power behavior of your PoE devices Utilize static power configuration with caution Dynamic allocation: power inline auto max 7200 Static allocation: power inline static max 7200 Use power calculator to determine power requirements http://www.cisco.com/go/powercalculator Discover Cisco Enhanced PoE at the World of Solutions BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 77 Infrastructure Integration: Next Steps VLAN, QoS and 802.1x Configuration Phone VLAN = 110 (VVID) 802.1Q encapsulation with 802.1p Layer 2 CoS PC VLAN = 10 (PVID) Native VLAN (PVID) No Configuration Changes Needed on PC During initial CDP exchange phone is configured with a Voice VLAN ID (VVID) Phone also supplied with QoS configuration via CDP TLV fields Additionally switch port currently bypasses 802.1x authentication for VVID if detects Cisco phone BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 78 Agenda Data Center Services Block Multilayer Campus Design principles Foundation Services Campus Design Best Practices IP Telephony Considerations Si Si QoS Considerations Security Considerations Si Putting It All Together © 2008 Cisco Systems, Inc. All rights reserved. Si Si Si Si Si Distribution Blocks Summary BRKRST-2031 14457_04_2008_c2 Si Si Cisco Public 79 Best Practices Practices—Quality Quality of Service Must be deployed end-toend to be effective; all layers play different but equal roles End to End QoS Ensure that mission critical applications are not impacted by link or transmit queue congestion Aggregation and rate transition points must enforce QoS policies Si Si Si Si Si Si Si Si Cisco Public Si Layer 3 Equal Cost Links Si WAN © 2008 Cisco Systems, Inc. All rights reserved. Si Layer 3 Equal Cost Links Multiple queues with configurable admission criteria and scheduling are required BRKRST-2031 14457_04_2008_c2 Si Si Si Data Center Internet 80 Transmit Queue Congestion 10/100m Queued 128k Uplink p WAN R Router 100 Meg in 128 Kb/S out—Packets Serialize in Faster than They Serialize out P k t Queued Packets Q d as They Th Wait W it to t Serialize S i li outt Slower Sl Link Li k 1 Gig Link Distribution Switch Queued 100 Meg Link Access Switch 1 Gig In 100 Meg out—Packets Serialize in Faster than They Serialize out Packets Queued Q as They Wait to Serialize S out Slower S Link BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 81 Auto QoS VoIP—Making VoIP Making It Easy … Configures QoS for VoIP on Campus Switches Access-Switch(config-if)#auto qos voip ? cisco-phone cisco phone Trust the QoS marking of Cisco IP Phone cisco-softphone Trust the QoS marking of Cisco IP SoftPhone trust Trust the DSCP/CoS marking Access-Switch(config-if)#autoqosvoipcisco-phone ( g ) q p p Access-Switch(config-if)#exit ! interface FastEthernet1/0/21 srr-queue bandwidth share 10 10 60 20 srr-queue bandwidth shape 10 0 0 0 Mls qos trust device cisco-phone Mls qos trust cos auto qosvoipcisco-phone end BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 82 Agenda Data Center Services Block Multilayer Campus Design principles Foundation Services Campus Design Best Practices IP Telephony Considerations Si Si QoS Considerations Security Considerations Si Putting It All Together © 2008 Cisco Systems, Inc. All rights reserved. Si Si Si Si Si Distribution Blocks Summary BRKRST-2031 14457_04_2008_c2 Si Si Cisco Public 83 Best Practices Practices—Campus Campus Security New e stu stuff tthat at we e will co cover! e Catalyst Integrated Security Feature Set! Dynamic Port Security, DHCP Snooping, Dynamic ARP Inspection, IP Source Guard End-to-End Security Things you already know— we won’t cover… Si Use SSH to access devices instead of Telnet Enable AAA and roles-based access control (RADIUS/TACACS+) for the CLI on all devices Enable SYSLOG to a server. server Collect and archive logs When using SNMP use SNMPv3 Disable unused services: no service tcp-small-servers i udp-small-servers d ll no service Use FTP or SFTP (SSH FTP) to move images and configurations around—avoid TFTP when possible Install VTY access-lists to limit which addresses can access managementt and d CLI services i Enable control plane protocol authentication where it is available (EIGRP, OSPF, BGP, HSRP, VTP, etc.) Apply basic protections offered by implementing filt i on external t l edge d inbound i b d RFC2827 filtering interfaces Si Si Si Si Si Si WAN Si Si Si Si Si Si Si Internet For More Details, See BRKSEC-2002 Session, Understanding and Preventing Layer 2 Attacks BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 84 BPDU Guard Prevent Loops via WLAN (Windows XP Bridging) Problem: WLAN APs do not forward BPDUs STP Loop Formed BPDU Guard Disables Port Multiple Windows XP machines can create a l loop iin th the wired i d VLAN via the WLAN BPDU Generated Solution: BPDU Guard configured on all end-station end station switch ports will prevent loop from forming BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Win XP Bridging Enabled BPDU Discarded Win XP Bridging Enabled 85 Problem: Prevalence of Rogue APs Example: 59 APs in Seven Miles in SJ Commute The majority of WLAN deployments are unauthorized by well intended employees (rogue APs)—many are insecure A daily drive to work taken within the car at normal speeds with an IPAQ running a freeware application (mix of residences and enterprises) Insecure APs Insecure enterprise rogue AP’s are a result of: – Well intentioned staff install due to absence of sanctioned WLAN deployment – An infrastructure that is not “wireless ready” to protect against rogue AP’s 59 APs Found War Chalking BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 86 Basic 802.1x 802 1x Access Control Controlling When and Where APs Are Connected Who Are You? I Am Joe Cisco Authorized User No 802.1x H Here 802.1x Enabled on “user” Facing Ports o ts Who Are You? Rogue AP Disabled D on Authorized WLAN AP Ports © 2008 Cisco Systems, Inc. All rights reserved. Cisco IOS Configuration Example radius-server host 10.1.125.1 radius-server key cisco123 aaa new-model aaa authentication dot1x default group radius aaa authorization default group radius aaa authorization config-commands dot1x system-auth-control Cisco IOS Per-Port configuration int range fa3/1 - 48 dot1x port-control auto A h i d AP Authorized BRKRST-2031 14457_04_2008_c2 CatOS Configuration Example set dot1x system-auth-control enable set dot1x guest-vlan 250 set radius server 10.1.125.1 auth-port 1812 primary set radius key cisco123 set port dot1x 3/1-48 port-control auto Cisco Public 87 Securing Layer 2 from Surveillance Attacks Cutting off MAC-Based Attacks Only 3 MAC Addresses Allowed on the Port: Shutdown 00:0e:00:aa:aa:aa 00 0 00 00:0e:00:bb:bb:bb 250,000 Bogus MACs per Second SOLUTION: PROBLEM: “Script Kiddie” Hacking Tools Enable Attackers Flood Switch CAM Tables with Bogus Macs; Turning the VLAN into a “Hub” and Eliminating Privacy Switch CAM Table Limit Is Finite Number of Mac Addresses BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Port Security Limits MAC Flooding Attack and Locks down Port and Sends an SNMP Trap switchport switchport switchport switchport switchport port-security port-security port-security port-security port-security maximum 10 violation restrict aging time 2 aging type inactivity 88 DHCP Snooping Protection Against Rogue/Malicious DHCP Server 1 DHCP Server 1000s of DHCP R Requests t tto Overrun the DHCP Server 2 DHCP requests (discover) and responses (offer) tracked R Rate-limit t li it requests t on ttrusted t d interfaces; i t f limits li it D DoS S attacks tt k on DHCP server Deny responses (offers) on non trusted interfaces; stop malicious or errant DHCP server BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 89 Securing Layer 2 from Surveillance Attacks Protection Against ARP Poisoning Dynamic ARP inspection protects against ARP poisoning (ettercap, dsnif arpspoof) dsnif, Uses the DHCP snooping binding g table Tracks MAC to IP from DHCP transactions Gateway = 10.1.1.1 MAC=A Gratuitous G i ARP 10.1.1.50=MAC_B Gratuitous ARP 10.1.1.1=MAC_B Rate-limits ARP requests from client ports; stop port scanning Drop BOGUS gratuitous ARPs; stop ARP poisoning/MIM i i /MIM attacks tt k BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Si Attacker Att k = 10.1.1.25 10 1 1 25 MAC=B Victim Vi ti = 10.1.1.50 10 1 1 50 MAC=C 90 IP Source Guard Protection Against Spoofed IP Addresses IP source guard Gateway = 10.1.1.1 protects against MAC=A p IP addresses spoofed Si Uses the DHCP p g binding g table snooping Tracks IP address to port associations Dynamically programs port ACL to drop traffic not originating from IP address assigned via i DHCP BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Hey, I’m 10.1.1.50 ! Att k = 10.1.1.25 Attacker 10 1 1 25 Vi ti = 10.1.1.50 Victim 10 1 1 50 91 Catalyst Integrated Security Features Summary Cisco IOS ipdhcp snooping IP Source S Guard G d ipdhcp snooping vlan 2-10 iparp inspection vlan 2-10 Dynamic ARP Inspection ! interface fa3/1 DHCP Snooping switchport port-security Port Security switchport port-security max 3 switchport port-security violation restrict Port security prevents MAC g attacks flooding DHCP snooping prevents client attack on the switch and server Dynamic y ARP Inspection p adds security to ARP using DHCP snooping table IP source guard adds security t IP source address to dd using i DHCP snooping table BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public switchport port-security aging time 2 switchport port port-security security aging type inactivity iparp inspection limit rate 100 ipdhcp snooping limit rate 100 ip verify source vlandhcp-snooping ! Interface gigabit1/1 ipdhcp snooping trust iparp inspection trust 92 Agenda Data Center Services Block Multilayer Campus Design principles Foundation Services Campus Design Best Practices IP Telephony Considerations Si Si QoS Considerations Security Considerations Si Si Putting It All Together Si Summary BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Si Si Si Si Si Distribution Blocks Cisco Public 93 Hierarchical Campus Access Si Si Si Si Si Si Distribution Core Si Si Si Si Si Si Si Distribution Si Access WAN BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Data Center Cisco Public Internet 94 Layer 3 Distribution Interconnection Layer 2 Access—No VLANs Span Access Layer Tune CEF load balancing Match CatOS/IOS EtherChannel settings and tune load balancing Summarize routes towards core Limit redundant IGP peering STP Root and HSRP primary tuning or GLBP to load balance on uplinks li k Set trunk mode on/nonegotiate Disable EtherChannel unless needed Set port host on access layer ports: Si Si Layer 3 Si Point to Point Link Distribution Si sab e Trunking u g Disable Disable EtherChannel Enable PortFast RootGuard or BPDU-Guard Use security features BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Core Access VLAN 20 Data 10.1.20.0/24 VLAN 120 Voice 10.1.120.0/24 Cisco Public VLAN 40 Data 10.1.40.0/24 VLAN 140 Voice 10.1.140.0/24 95 Layer 2 Distribution Interconnection Layer 2 Access—Some VLANs Span Access Layer Tune CEF load balancing Match CatOS/IOS EtherChannel settings and tune load balancing Summarize routes towards core Limit redundant IGP peering STP Root and HSRP primary or GLBP and STP port cost tuning to load balance on uplinks Set trunk mode on/nonegotiate Disable EtherChannel unless needed RootGuard on downlinks LoopGuard on uplinks Set port host on access Layer ports: Disable Trunking Disable EtherChannel Enable PortFast RootGuard or BPDU-Guard Use security features BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Si Si Layer 2 Si Trunk Si VLAN 20 Data VLAN 40 Data 10.1.20.0/24 10.1.40.0/24 VLAN 120 Voice VLAN 140 Voice 10.1.120.0/24 10.1.140.0/24 VLAN 250 WLAN 10.1.250.0/24 Cisco Public Core Distribution Access 96 Routed Access and Virtual Switching System Evolutions of and Improvements to Existing Designs Si Si Si Si Core VSS Link Si Layer 3 New Concept Si Distribution P-t-P Link VLAN 20 Data 10.1.20.0/24 VLAN 120 Voice 10.1.120.0/24 VLAN 20 Data 10.1.20.0/24 VLAN 40 Data 10.1.40.0/24 VLAN 120 Voice 10.1.120.0/24 VLAN 140 Voice 10 10.1.140.0/24 1 140 0/24 VLAN 250 WLAN 10.1.250.0/24 VLAN 40 Data 10.1.40.0/24 VLAN 140 Voice 10.1.140.0/24 Access See RST-3035—Advanced Enterprise Campus Design Alternatives: Routed Access and Virtual Switch System (VSS) BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 97 High Availability Campus Design Simplified with VSS Access Si Si Si Si Si Si Si Si Si Si Si Si Si Si Si Distribution Core Si Si Si Si Si Si Distribution Access BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Si Si Si Si Si Si Si Si WAN WAN WAN Cisco Public Si Si Data Data Data Center Center Center Si Si Si Si Internet Internet Internet 98 SmartPorts—Predefined Configurations Access-Switch#show parser macro brief default global : cisco-global default interface: cisco-desktop p default interface: cisco-phone default interface: cisco-switch default interface: cisco-router default interface: cisco-wireless Si Si Access-Switch(config-if)#$ macro apply cisco-phone $access_vlan 100 $voice_vlan 10 Access-Switch#show run int fa1/0/19 ! interface FastEthernet1/0/19 switchport access vlan 100 switchport mode access switchport voice vlan 10 switchport port-security maximum 2 switchport port-security switchport port-security aging time 2 switchport port-security violation restrict switchport port-security port security aging type inactivity srr-queue bandwidth share 10 10 60 20 srr-queue bandwidth shape 10 0 0 0 mls qos trust device cisco-phone mls qos trust cos macro description cisco cisco-phone phone auto qosvoipcisco-phone spanning-tree portfast spanning-tree bpduguard enable BRKRST-2031 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 14457_04_2008_c2 end Si Si 99 Agenda Data Center Services Block Multilayer Campus Design principles Foundation Services Campus Design Best Practices IP Telephony Considerations Si Si QoS Considerations Security Considerations Si Si Putting It All Together Si Summary BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Si Si Si Si Si Distribution Blocks Cisco Public 100 Summary Off Offers hierarchy—each hi h h llayer has specific role Access Modular topology— building blocks Easy to grow, understand, and troubleshoot Si Si Si Si Si Si Distribution Creates small fault domains— Clear demarcations and isolation Promotes load balancing and redundancy Promotes deterministic traffic patterns Incorporates balance of both Layer 2 and Layer 3 technology, leveraging the strength of both Utilizes Layer 3 Routing for load balancing, g, fast convergence, scalability, and control BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Layer 3 Equal Cost s Links Si Si Si Si Layer 3 Equal Cost Links Si Si Si Core Distribution Si Access WAN Cisco Public Data Center Internet 101 Q and A BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 102 Hierarchical Network Design Without a Rock Solid Foundation the Rest Doesn’t Matter Access Distribution Si Si Core Si Si HSRP Distribution Si Access Routing g Si Spanning Tree Building Block BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 103 Reference Materials http://www.cisco.com/go/srnd High Availability Campus Design Guide High Availability Campus Convergence Analysis High Availability Campus Design Guide— Routed Access EIGRP and OSPF BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 104 BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 105 Optimal Redundancy When Is More Less? Core and distribution engineered with redundant nodes and links to provide maximum redundancy and optimal convergence Network bandwidth and capacity engineered to ith t d node d withstand or link failure 120–200ms to converge around most events Access Si Distribution Si Si Si Si Si Redundan t Nodes Core Si Distribution Si Si Si Si Si Si Si Access WAN BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Data Center Internet 106 Single Points of Termination SSO/NSF Avoiding Total Network Outage L2 = SSO L3 = SSO/NSF Access Distribution Si Si Si Si Si Si Core Si Si The access layer is candidate for supervisor redundancy L2 access layer SSO L3 access layer SSO and NSF Network outage until physical replacement or reload vs. one to three seconds BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 107 Supervisor Processor Redundancy Stateful Switch Over (SSO) Active/standby supervisors run in synchronized mode SP RP PFC Redundant supervisor is in ‘hotstandby’ mode standby Active Supervisor SP RP Switch processors synchronize L2 port state information, ((e.g., g , STP,, 802.1x,, 802.1q) q) PFCs synchronize L2/L3 FIB, NetFlow and ACL tables PFC DFCs are populated with L2/L3 FIB, NetFlow and ACL tables Standby Supervisor Line Card—DFC Line e Ca Card—DFC d C Line Card—DFC BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 108 Non Stop Forwarding (NSF) Non-Stop NSF Recovery DFC enabled line cards continue to forward based on existing FIB entries Following SSO recovery and activation of standby Sup synchronized PFC continues ti tto forward f d traffic t ffi based b d on existing FIB entries “Hot-Standby” MSFC RIB is detached from the FIB isolating FIB from RP changes “Hot-Standby” MSFC activates routing processes in NSF recovery mode MSFC re-establishes adjacency indicating this is an NSF restart Peer updates restarting MSFC with it’s routing information Restarting MSFC sends routing updates to the peer RIB reattaches to FIB and PFC C and DFCs updated with new FIB entries BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Si Si No Route Flaps During Recovery 109 Non Stop Forwarding (NSF) Non-Stop NSF Capable vs. NSF Awareness Two roles in NSF neighbor graceful restart NSF-Aware – NSF Capable – NSF Aware An NSF-Capable router is ‘capable’ of continuous forwarding while undergoing a switchover Si Si An NSF-Aware NSF Aware router is able to assist NSF-Capable routers by: – Not resetting adjacency – Supplying routing information for verification after switchover NSF capable and NSF aware peers cooperate using Graceful Restart extensions to BGP, OSPF, ISIS and EIGRP protocols BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public Si NSF-Capable 110 Design Considerations for NSF/SSO NSF and Hello Timer Tuning? NSF is intended to provide availability through route convergence avoidance Fast IGP timers are intended to provide availability through fast route convergence Neighbor Loss, Loss No Graceful Restart Si Si In an NSF environment dead timer must be greater than SSO Recovery + RP restart + time to send first hello Switches running Native IOS – OSPF 2/8 seconds for hello/dead – EIGRP 1/4 seconds for hello/hold Switches running Hybrid – OSPF 3/12 seconds for hello/dead – EIGRP 2/8 seconds for hello/hold BRKRST-2031 14457_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 111 Design Considerations for NSF/SSO Where Does It Make Sense? Redundant topologies with equal cost paths provide sub-second convergence NSF/SSO provides superior availability in environments with non-redundant paths ? Second ds of Los st Voice 6 5 4 RP Convergence Is Dependent on IGP and Tuning Si Si 3 2 Si 1 0 BRKRST-2031 14457_04_2008_c2 Link Failure Node Failure © 2008 Cisco Systems, Inc. All rights reserved. NSF/SSO Cisco Public OSPF Convergence 112