01-09-2026 06:39 AM - edited 01-09-2026 12:09 PM
Hello Experts,
Hello Team,
Currently, we have two cloud environments (AWS and GCP) connected to our COLO endpoint devices through two transit hubs, with ECMP enabled across the paths.
Existing Design
Transit Hub Architecture
Transit Hub 1 (TR-HUB1)
Transit Hub 2 (TR-HUB2)
Endpoint Connectivity
Requirement
We need the ability to control traffic originating from the cloud (for example, AWS) such that:
Questions
Solved! Go to Solution.
01-11-2026 02:56 AM
Hello
Ingress traffic from ebgp cloud- suggest as-prepending /or conditional route advertisement
outbound traffic towards isp - local preference
01-11-2026 01:26 PM
The simplest way to prioritize your traffic is to consider "normal conditions" and/or "contingency conditions" scenarios and let the protocol handle them automatically.
The suggestion is:
- For traffic from the cloud, you could use AS Prepend.
- For outbound traffic to your ISP, use Local Preference.
Both scenarios include traffic selection.
Regards
01-10-2026 12:16 AM
Hi,
In network design, the more you can achieve with less configuration, without bloating it, the better the sign, it's called the KISS principle. So, given that you have iBGP, I recommend using Local Preference to ensure the following:
1. Choose which is your primary path, secondary path, etc
2. Ensure left-to-right an right-to-left, traffic is symmetric, aka follows same preferred path that you choose
Thanks,
Cristian.
01-10-2026 02:14 PM - edited 01-10-2026 02:28 PM
BGP is configured across the WAN and iBGP between internal routers. There is no Layer 2 redundancy mechanism (for example, HSRP) configured between the Nexus vPC peers.
The topology is as follows:
Cloud ↔ eBGP ↔ Transit Hub 1 / Transit Hub 2
Transit Hub Switch 1 ↔ iBGP ↔ Transit Hub Switch 2
Transit Hub 1 / Transit Hub 2 ↔ eBGP ↔ Endpoint devices
On the transit hub switches, BGP is configured using source VLAN interfaces within each VRF . Additionally, each transit hub switch uses a dedicated VLAN per BGP peering. For example:
Transit Hub 1 – Switch 1 uses VLAN 101 (/30) as the BGP source interface
Transit Hub 1 – Switch 2 uses VLAN 102 (/30) for another BGP peering
both switches are part of transit hub in same rack.
This design intentionally avoids the use of HSRP or any other Layer 2 gateway redundancy protocol. The current configuration is deployed in the production network and is operating successfully.
Objective
While the existing design is stable and functional, there is interest in optimizing the architecture to reduce CPU utilization on the transit hub switches and to redesign the BGP behavior to operate in an Active/Passive model rather than fully active. Guidance is requested on best practices or architectural changes that could achieve this optimization without compromising stability or resiliency.
01-11-2026 02:56 AM
Hello
Ingress traffic from ebgp cloud- suggest as-prepending /or conditional route advertisement
outbound traffic towards isp - local preference
01-11-2026 01:26 PM
The simplest way to prioritize your traffic is to consider "normal conditions" and/or "contingency conditions" scenarios and let the protocol handle them automatically.
The suggestion is:
- For traffic from the cloud, you could use AS Prepend.
- For outbound traffic to your ISP, use Local Preference.
Both scenarios include traffic selection.
Regards
01-12-2026 02:18 AM - edited 01-12-2026 05:46 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide