08-12-2013 06:20 AM - edited 03-07-2019 02:52 PM
Hello,
We would like to update some of our equipment, as some it is very old, however since we have many users we would like as little downtime as possible. I have attached a diagram which includes what we currently have (on the right), and what we would like to add in (on the left). Currently all traffic routing resides on the Cisco 6509 and it pushes up towards the firewall and out to the internet. We would like routing services turned off of the 6509 and to be soley on the two new Cisco 4500x switches. Also, all VLANs are defined on the 6509 and the 6509 has all trunk links to the 4006s. Traffic currently flows from 4500x switch on top right down to the firewall and then then the 6509 to the access 4006.
My question is more of a design question and if this looks good or not. Please all advise, feedback, and criticism are welcomed. We would like the 4500x switches to carry all the routes and layer 3 traffic, and be redundnant, so if one fails the network can still function. Here's how I invision it: I uplink the two new 4500x with Layer 3 uplinks to the Edge routers. Then, uplink each 4500x switch to the 6509 using trunk ports. This is so the 4500x switch will know about all the VLANs. I will use EIGRP between th new 4500x switches and the Cisco 1900 and 4500x to share routing info. I would also like to uplink the two 4500x switches together and use HSRP to create floating SVI for each VLAN between the two.
Once this is in place, I will then switch the 4500x switch on top right to route its traffic towards the 4500x switches. My question here is how can I do this in a load balancing fashion? Is there a layer 3 floating IP I could use or something to that effect? This routing change will virtually remove the firewall from the equation, but for temporily that is fine.
Traffic will then flow from the 4500x switch on top right to the 4500x switches on the left, to the 6509 and then to the 4006. Then, one by one we can replace the 4006 chassis switches with newly pruchased 4507s that uplink to the new 4500x switches instead of the 6509.
Please advise if the above seems reasonable, and if you see any trouble from this, again any criticism is welcomed, and thanks in advance!
08-12-2013 07:58 AM
I think I understand. A few points and questions:
08-12-2013 08:08 AM
It looks generally reasonable. I did a similar upgrade for a customer late last year.
You should consider linking the 4500X's together in a VSS. That makes them look like a single switch and allows the uplinks from the new 4507s to be 20 Gbps L2 portchannel instead of 2 x 10 Gbps links with one forwarding and one blocking in spanning-tree. That also removes the need to run HSRP between the 4500X cores and removes the concern about balancing the load between the edge 4500X and the core. If you want to add resiliency between the edge and core, you can make that a L3 portchannel.
You should run the latest IOS-XE release - currently 3.4.1SG - if you use VSS. The initial 3.4.0SG release had a bug that could cause the switch to crash. If you decide against adopting VSS then the recommendation is 3.3.1SG.
08-12-2013 08:41 AM
Shillings/Marvin Rhoads,
Thna you guys so much for youre input! Please see my below responses.
Shillings
1. Both 4500x switches will uplink to both WAN routers, sorry if the image didn't portray that.
2. We will not load balance between providers, but I was asking if we could looad balance internally, which VSS seems like the solution there.
3. I think the firewall will be behind the 4500x switches, and redundant firewalla will be purchased if in budget.
4. I wasn't aware and thank you so much for this info.
Marvin Rhoads,
1. Even with VSS configured, can I have it uplink to the core with layer 3 uplinks using like EIGRP, and uplink it to the 6509 using trunk ports?
08-12-2013 11:50 AM
3. I think the firewall will be behind the 4500x switches, and redundant firewalla will be purchased if in budget.
I presume you mean that the firewall/s will sit between the 4500-X core switches and the Internet edge devices - is that correct?
08-12-2013 11:52 AM
Yes, either there or in between the 4500x switches and the 6509.
08-12-2013 12:07 PM
You're getting rid of the 6509 long term though, correct?
Just bear in mind that your firewall can't route between VLANs at anything like the speed of layer-3 switches, be that the proposed 4500-X pair or your existing 6509. And once that firewall CPU is max'd out, which could be easy to acheive, then your entire network will grind to a hault.
08-12-2013 12:09 PM
Ah, understod. So in between the 4500x and core devicesis where it should go. Thanks!
One more question. Even with VSS configured, can I have it uplink to the core with layer 3 uplinks using like EIGRP, and uplink it to the 6509 using trunk ports?
Thanks again Shillings!
08-12-2013 12:16 PM
Ah, understod. So in between the 4500x and core devicesis where it should go.
No, a firewall would normally be positioned at your Internet edge. In other words, between Internet edge router/s and the collapsed core/distribution layer. Basically, you would point a default route at the firewall on a routed link. You wouldn't trunk all your VLANs up to the firewall and expect it to route between them, and also forward traffic to the Internet, if required.
08-13-2013 05:12 AM
Thanks Shillings! Is there currently any simulator I could use to simulate VSS before bringing it online with the hardware, or do I have to use the hardware itself?
08-13-2013 05:42 AM
John,
Re the different types of links, you can mix and match them - routed to the edge and layer 2 trunked toward the 6509 is a perfectly fine option. In either case they can also be combined into Etherchannels.
Re simulating, there's no simulation software to allow you to run a 4500X VSS cluster (that I know of). Even when I took the Cisco partner training, we remotely interacted with real hardware in their labs.
When we put these in for customers, we typically stage the equipment on out lab workbench first to work out the exact configuration (and familiarize ourselves with the gear if it's the first time with a particular model or software image, ensure functional parts, etc.) before scheduling the production cutover.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide