cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
672
Views
0
Helpful
13
Replies

Routing Decision

Docklands
Level 1
Level 1

We are designing a network for connection to our clients WAN. There will be two separate connections  to the WAN via ASA devices. The client will use one connection for monitoring the new network using SNMP traffic and the other for all other traffic (FTP, HTTP). They use Policy Based Routing

The network we are designing comprises 5 layer 2 switches supporting local VoIP, PABX and workstations used in conjunction with the telephones. Each switch will each be connected to two routers running HSRP to provide redundant gateway. VLSM is used on the network for the VLAN's.

What is the best method to connect the two routers to the two ASA devices?

We understand that it is not good practice to connect the HSRP routers directly to the ASA devices, so we are considering inserting intermediary routers and running EIGRP.

Any advice?

Thanks

2 Accepted Solutions
13 Replies 13

Philip D'Ath
VIP Alumni
VIP Alumni

There is nothing wrong with using HSRP to provide default gateway protection for ASA's.

Are these standalone ASA's, or an active/standby ASA configuration?

The ASA's are standalone

I would just use HSRP with the routers.  If you want you could dual connect the ASA's using the "Redundant" interface feature, or single connect them as you feel is needed.

Thanks for the advice Philip.

We are considering using the 2960 at the edge. What equipmnet would you recommend for the HSRP routers?

How much throughput will the routers need, and how many interfaces?  Any Ethernet only interfaces?

Since you need to buy switches, sometimes it works out better to just get layer 3 switches, like Cisco 3850's.  If you use a stack you don't need redundant connections or HSRP.  Nice and simple, and reliable.

The original logical design is shown in the attached. The throughput is quite low - 10-12Mb.

As long as it has enough interfaces you could get by with a local cost Cisco 891F.

Looks a good option but if we wanted 16 ports is there an alternative?

Ps. what did you think of the logical design?

What does R2 and R3 gain you?  If you removed them from the solution would it affect anything (apart from making it simpler)?

If everything was dual connected to R1 and R4 wouldn't you get a similar result?

I originally included them so there would be an alternative route out of the network via either firewall. eg. if R2 failed the route to F1 would be lost.

If F1 where connected to R2 and R3 there was concern it may cause instability on F1.

What if R1 or R4 failed - which is just as likely.

Review Cisco Networking for a $25 gift card