NETWORK REQUIREMENTS DEFINITION

Defining the exact requirements (in terms of network hardware and network bandwidth) provides the key component of design and implementation. Referring to the CME case study and Figure 17-1 later in this chapter, WAN requirements are calculated first.

image from book
Figure 17-1: The layered security hierarchy

WAN Requirements

Considering known values (site role, location, available connectivity, use load, and so on), the CME network designers reviewed existing resources and developed WAN bandwidth and hardware requirements per site.

Current WAN Hardware

The CME infrastructure was upgraded from a wide range of low-end, multivendor devices, many of which were somewhat antiquated, to an enterprise-class foundational equipment suite. Over the last three years , some of the equipment deployed or retained to support corporate sites has become end-of-life (EOL) and must be replaced. Sites are connected to CME-CORP via high-cost, low-bandwidth dedicated frame relay virtual circuits carried on multiple T1 facilities. CME-CORP needs to maintain standardized devices and configurations as much as possible to ensure interoperability and simplify network management and configuration control. After analyzing the inventory, designers determined that the resources in Table 17-1 should be replaced or reallocated. The exact sequence of replacement and redeployment must be included on the master project timeline.

Table 17-1: WAN/Security Hardware Replacement

WAN Hardware

Current Site

Quantity

Projected Status

Future Use

Cisco 1760 Router

Atlanta, GA

1

Keep

Atlanta, GA

 

Detroit, MI

1

Keep

Detroit, MI

 

Helena, MT

1

Keep

Helena, MT

 

Miami, FL

1

Keep

Miami, FL

 

Minneapolis, MN

1

Keep

Minneapolis, MN

 

New Orleans, LA

1

Keep

Salt Lake City, UT

 

Salt Lake City, UT

1

Keep

Salt Lake City, UT

 

San Antonio, TX

1

Keep

San Antonio, TX

 

Winnipeg, MB

1

Keep

Winnipeg, MB

 

CME Corp

2

Replace

Sales Offices

 

CME-WEST

2

Replace

Sales Offices

 

CME-MEX

1

Replace

Sales Offices

 

CME-TNG

1

Keep

CME-TNG

Cisco PIX-515E w/FO

CME Corp

1

Replace

CME-WEST

Cisco PIX-515E

CME-WEST

1

Replace

CME-MEX

 

CME-EUR

1

Keep

CME-EUR

Cisco PIX-506E

CME-TNG

1

Delete

Sales Offices

 

CME-MEX

1

Replace

Sales Offices

WAN Bandwidth

The bandwidth requirements fall into two basic types of service: dedicated private WAN and Internet-based VPN WAN. The three main sites have significantly different bandwidth needs than the typical sales office site. CME-CORP must be able to handle the aggregate bandwidth of all remote sites, as it hosts the enterprise core . CME-WEST needs high bandwidth to CME-CORP to support replication of date and services in support of disaster recovery, as well as a reasonably robust Internet presence to allow CME-WEST to assume the role of the corporate server farm in the event of a catastrophic failure. Table 17-2 details engineering calculations for WAN bandwidth.

Table 17-2: WAN Bandwidth Calculation Worksheet

Site

Connection Method

# Of Sites

Concurrent Citrix Users

Citrix B/W 0@ 30KB/ User

Citrix Printing B/W

Internet B/W Overhead

Video Overhead

IPSec Overhead

Excess Bandwidth

Required Bandwidth

Service Type

Provisioned B/W per Site

VC/PVC Required

CME Corp (WAN)

Private WAN

1

1000

512

30552

ATM

35000

VBR-NRT

CME Corp (Internet)

ISP

1

5000

 

n/a

1000

24476

ATM

25000

UBR

CME-WEST (WAN)

Private WAN

1

100

3000

128

1000

4228

ATM

6000

VRB-NRT

CME-WEST (Internet)

ISP

1

512

512

ATM

1500

UBR

CME-EUR

VPN WAN

1

100

3000

620

128

1124

4972

ATM

5000

UBR

CME-MEX

VPN WAN

1

100

3000

620

128

1124

512

5484

ATM

6000

UBR

CORP-Sales (Typical)

Private WAN

30

10

300

60

155

155

680

Frame relay

768

768KB CIR

WEST-Sales (Typical)

VPN WAN

10

10

300

60

155

155

680

ANY

768

n/a

EUR-Sales (Typical)

VPN WAN

10

10

300

60

155

155

680

ANY

768

n/a

CME-TNG

Private WAN

1

5

150

30

78

128

512

903

ATM-DSL

1000

VBR-NRT

Suplier MSAM Access

ISP

n/a

10

300

310

n/a

none

none

Mobile Citrix Users

ISP

n/a

50

1500

300

1850

n/a

none

none

Mobile VPN Users

ISP

n/a

20

600

120

216

956

n/a

none

none

Dial-Up RAS

PSTN

n/a

23

1472

n/a

n/a

n/a

n/a

n/a

1536

ISDNPRI

ISDNPRI

none

Required bandwidth for the CME-CORP private WAN reflects aggregated bandwidth equal to virtual circuits for all sites plus additional overhead. The 35MB "provisioned" capacity will in fact require ATM DS3 service.

Required bandwidth for the CME-CORP Internet reflects aggregated bandwidth equal to all inbound and outbound Internet traffic for all sites, including VPN-connected sites based on their maximum provisioned data rate, as well as Mobile VPN, Mobile Citrix, and supplier extranet bandwidth projections. The 25MB "provisioned" capacity will in fact require dual ATM DS3 service, with each DS3 pipe carrying a 15MB virtual circuit.

CME-WEST requirements are somewhat deceptive. Both Internet and private WAN access is provided over ATM DS3 facilities. The WAN bandwidth is increased (well above the level justified by user access) to support ongoing off-hours data replication to CME-WEST as the "hot site." Additionally, by providing service over DS3 facilities, the sales office site virtual circuits could be reterminated in the event of a catastrophic failure at CME-CORP. Internet bandwidth is similarthe day-to-day requirement is a mere 1.5MBbut the DS3 ATM service allows the virtual circuit to change to 15MB or more to reterminate site-to-site VPNs in a disaster scenario.

For both CME-EUR and CME-MEX, bandwidth is based on availability of ATM service. Both will be sites within the Windows Server 2003 Active Directory Domain, and printing will be via network printers through the VPN (outside the Citrix ICA channel) to allow bandwidth management of VPN traffic by the PacketShapers. CME-MEX bandwidth appears artificially low based on the number of users at the site, but the majority of the users are Plant Floor production workers with only occasional access to Citrix or the CME-CORP services.

North American (CORP) sales offices will be provisioned as "inter-worked" circuits, re-encapsulated from frame relay (site end) to ATM (CORP end).

Several peripheral bandwidth calculations are included: Extranet bandwidth is not "supplied" by CME, but as the remote activities terminate at CME-CORP, it is included in the overall load. Dial-up RAS does not impact the raw bandwidth but must be included in specifying the CME-CORP security hardware. CME-CORP will reuse their existing RAS hardware.

WAN Hardware

Basic WAN hardware suites are consistent across similar sites to ease configuration management and allow for easier network management. Again, CME-CORP and CME-WEST are unique, given their enterprise roles. As a significant segment of the corporate WAN is VPN-based, VPN termination hardware (firewalls for site-to-site connections and a VPN concentrator for client-to-site connections) is included. Table 17-3 lists the hardware the designers have selected. Newer capabilities in the Cisco Integrated Services Router (ISR) line will be leveraged to provide link encryption of all data and eventually to allow extension of the corporate WAN to selected sites via generic routing encapsulation (GRE) over IPsec tunnels. The GRE over IPsec implementation will allow most of the "single- homed " sales office sites to dynamically restore connectivity in case of a last-mile failure of the frame relay network.

Table 17-3: WAN and Security Hardware

Site

Purpose

Quantity

Description

CME-CORP (WAN)

Private WAN Router

1

Cisco 7401ASR, 128MB Flash, 512MB DRAM, (2) FE/GE ports, T3-ATM Port Adapter, IOS Advanced Security

CME-CORP (Internet)

Internet Router

2

Cisco 7401ASR, 128MB Flash, 512MB DRAM, (2) FE/GE ports, T3-ATM Port Adapter, IOS IOS Advanced Security

 

Firewall/VPN

2

Cisco ASA 5540 With SSM-20 IDS

 

Access Gateway

2

Citrix Access Gateway 4.2

 

VPN (IPSEC Clients )

2

Cisco VPN 3030, Redundant Power Supplies

CME-WEST (WAN)

Private WAN Router

1

Cisco 7401ASR, 128MB Flash, 512MB DRAM, (2) FE/GE ports, T3-ATM Port Adapter, IOS IOS Advanced Security

CME-WEST (Internet)

Internet Router

1

Cisco 7401ASR, 128MB Flash, 512MB DRAM, (2) FE/GE ports, T3-ATM Port Adapter, IOS IOS Advanced Security

 

Firewall/VPN

1

Cisco 535-UR and 535-FO ( fail-over ), (2) 66 MHZ GE Interfaces, (2) 66 MHZ 4-Port FE interfaces, (2) VPN Accelerator+ (reallocated from CME Corp)

CME-EUR

Internet Router

1

As determined by host nation and ISP. Use Cisco 3825 ISR, 64MB Flash, 256MB DRAM, IOS IOS Advanced IP Services

 

Firewall/VPN

 

Cisco 515E Redundant (failover) w/IPSEC 3DES/AES

CME-MEX

Internet Router

1

As determined by host nation and ISP. Use Cisco 3825 ISR, 64MB Flash, 256MB DRAM, IOS IOS Advanced IP Services

 

Firewall/VPN

1

Cisco 515E Redundant (failover) w/IPSEC 3DES/AES

CORP-Sales (Typical)

Private WAN Router & Firewall

30

Cisco 1841 ISR, 64MB Flash, 256MB DRAM, 2FE, T1 CSU/DSU, ADSL WIC, IOS Advanced IP Services

WEST-Sales (Typical)

Internet Router & Firewall

10

As determined by host nation and ISP, use CME-owned Cisco 1841 ISR, IOS Adv IP Services w/ appropriate interface cards where possible

EUR-Sales (Typical)

Internet Router

10

As determined by host nation and ISP, use CME-owned Cisco 1841 ISR, IOS Adv IP Services w/ appropriate interface cards where possible

CME-TNG

Private WAN Router & Firewall

1

Cisco 1841 ISR, 64MB Flash, 256MB DRAM, 2FE, ADSL WICs, IOS Advanced IP Services

Dial-Up RAS

PSTN

1

Re-use existing Lucent PortMaster

The "standard" high-capacity WAN router has more than adequate horsepower for CME's WAN connections and can easily be seen as "overkill" for CME-WEST.

Aside from the obvious answer, that CME-WEST may need to assume CME-CORP's role, standardizing on the same model for all high-bandwidth sites ensures the redundant Internet router at CME-CORP can restore service for any other router without loss of service. It is effectively a global spare that is in service to support load balancing and redundancy for CME-CORP's Internet connectivity.

The redundant (fail-over) firewall with gigabit interfaces ensures low latency throughput between the Internet router and the corporate LAN.

Although traffic load for the client access VPN is not high, redundancy is still required. As an additional benefit, the VPN concentrator can support site-to-site tunnels with multiple authentication methods .

Much of the typical IPsec traffic load will be phased out for the Cisco VPN 3030 hardware as clients move to the Citrix Access Gateway's SSL VPN.

Primary (Internet) routers for sites outside the U.S. and Canada remain "to be determined." Hardware installed outside the U.S. usually requires both host nation approval (HNA) and acceptance by the servicing ISP. In many countries , the PSTN is a pseudo-governmental entity and protects itself from competition by restricting the hardware that can be connected. In cases where the host nation and the ISP are amendable, CME-owned routers (Cisco 3825 or Cisco 1841) would be used.

LAN Requirements

Per-site LAN requirements are based on metrics similar to the WAN calculations. The primary factor is obviously the number of hosts (Ethernet devices) at a given site; it assumes 10/100MB switched Fast Ethernet connectivity unless higher throughputFast Ethernet port aggregation via Fast EtherChannel (FEC), Gigabit Ethernet, or Gigabit Ethernet port aggregation via Gigabit EtherChannel (GEC)is required. All sales offices and CME-TNG will use identical hardware. Regional offices and the manufacturing plant (CME-WEST, CME-EUR, and CME-MEX) are similar but with more capacity at CME-WEST to support data center reconstitution. CME-CORP is designed as a highly robust fault-tolerant infrastructure. At the four primary sites, server requirements (network cards) are identified to help calculate the number of FEC, Gigabit, and GEC ports needed.

Current LAN Hardware

The current LAN infrastructure at the four primary sites uses was rebuilt three years ago and requires few, if any, upgrades. The sales office hardware was reallocated from available manageable resources and remains fully usable, but phased replacements will be scheduled, as many of the items are EOL. LAN switches will be replaced with current-generation hardware to allow future expansion of voice and video to all sites.

Sales Office LAN Hardware

Sales offices share a common set of attributes: fewer than 48 users; no requirement for Gigabit Ethernet, FEC, or GEC, and originally, and a single LAN segment with no need for Layer 3 switching. Pending rollouts of video and Voice over IP (VoIP) will require segmentation of the sales office LANs to support new technologies. CME designers had a choice of LAN switchesCisco 3560-Series 48-port or Cisco 3750-Series 48-port. Designers elected to go with the more expensive 3750 switches to allow "stacking" and redundancy for larger sales offices and to allow for consolidation and simplified management of the switch stacks.

CME-MEX LAN Hardware

CME-MEX has a full Layer 3 switching solution. The majority of the 300 users are associated with the manufacturing floor and need only occasional LAN (or Citrix) access; hence the reallocation of switches from CME-CORP three years ago met requirements. Host connectivity requirements are

  • 10/100MB Ethernet (Plant Floor), 210 distributed connections, isolated from the administrative/server LAN segment by access lists (Layer 3)

  • 10/100MB Ethernet (Administrative/Servers), 135 centralized connections, isolated from the Plant Floor LAN segment by access lists (Layer 3)

  • 10/100MB Ethernet (Uplink to WAN equipment), five centralized connections, isolated by access lists (Layer 3)

  • Gigabit Ethernet (Downlink to 3508XL-EN switch), one connection Table 17-4 summarizes the additional LAN hardware needed for CME-MEX.

Table 17-4: CME-MEX LAN Hardware

LAN Hardware

Purpose

Description

Cisco Catalyst 4507 System

LAN Core

Cisco 4507 7-slot Chassis, redundant power supplies, (2) Catalyst Supervisor 4 with Enhanced Layer 3 IOS software, (3) 48-port 10/100/100 Ethernet modules

Cisco Catalyst 3508 System

Distribution

Cisco 3508-XL-EN Chassis (Excess form CME Corp), (1) 1000BaseTX GBIC, (5) 1000BaseSX GBIC

Cisco Catalyst 3550 System

Plant Access

(5) Cisco 3550-48-SMI Chassis (Excess from CME Corp), (5) 1000BaseSX GBIC

CME-EUR LAN Hardware

CME-EUR is similar to CME-MEX in scope but does not currently require a Layer 3 switching solution. To maintain consistency of hardware and position CME-EUR for future Layer 3 initiatives, the site will be built as Layer 3 from the beginning. The 200 users are associated with management and administration of the European Region sales force, as well as limited engineering functions. Host connectivity requirements are

  • 10/100MB Ethernet (Administrative/Servers), 212 centralized connections, isolated by access lists (Layer 3)

  • 10/100MB Ethernet (Uplink to WAN equipment), five centralized connections, isolated by access lists (Layer 3)

Table 17-5 summarizes the LAN hardware needed for CME-EUR.

Table 17-5: CME-EUR LAN Hardware

LAN Hardware

Purpose

Description

Cisco Catalyst 4507 System

LAN Core

Cisco 4507 7-slot Chassis, redundant power supplies, (2) Supervisor 4 with Enhanced Layer 3 IOS software, (5) 48-port 10/100/100 Ethernet modules

CME-WEST LAN Hardware

The CME-WEST LAN is similar to CME-EUR in its day-to-day role, but the site's scope as the CME Disaster Recovery "Hot Site" requires basic additional capacity as well as the ability to incrementally expand services. The 200 users are associated with management and administration of the West Region sales force and have limited engineering functions. Host connectivity requirements are

  • 10/100MB Ethernet (administrative), 217 centralized connections, isolated by access lists (Layer 3)

  • 10/100 Ethernet (servers), four centralized connections, isolated by access lists (Layer 3)for site support servers (domain controller, DNS, and so on)

  • Gigabit Ethernet (servers), 16 centralized connections, isolated by access lists (Layer 3)for stand-by servers in the Citrix farm, domain controllers, and data storage and archive subsystems needed to reconstitute CME-CORP servers

  • Gigabit Ethernet (disaster recovery)

    • Ten centralized connections for stackable switches during disaster recovery

    • Sixteen centralized connections for reconstituted servers during disaster recovery

  • 10/100 Ethernet (disaster recovery), 24 centralized connections for reconstituted servers and peripherals during disaster recover

  • 10/100 Eth10/100 Ethernet (servers), four centralized connections, isolated by access lists (Layer 3)for site support servers (domain controller, DNS, and so on)

  • 10/100MB Ethernet (uplink to WAN equipment), five centralized connections, isolated by access lists (Layer 3)

Table 17-6 summarizes the LAN hardware needed for CME-WEST.

Table 17-6: CME-WEST LAN Hardware

LAN Hardware

Purpose

Description

Cisco Catalyst 6513 System

LAN Core

Cisco 6513 13-slot Chassis, Redundant power supplies, (2) Supervisor 720 with Enhanced Layer 3 IOS software, (6) 48-port 10/100/100 Ethernet modules, (2) 16-Port Gigabit Ethernet (TX) modules, (1) 16-port Gigabit Ethernet (GBIC) module, (10) multimode fiber- optic GBIC modules

CME-CORP LAN Hardware

CME-CORP, as the enterprise core, requires significantly more resources than any other site. Requirements unique to CME-CORP include a redundant core using 1000BaseTX for servers, 1000BaseSX for infrastructure equipment such as distribution switches, and 10/100/1000BaseTX for other peripherals and low-load servers:

  • Gigabit Ethernet (1000BaseTX):

    • Sixty-eight production Citrix server connections (34 per core switch)

    • Eight dual-gigabit Ethernet connections (16 ports, eight ports/four servers per core) for special-purpose production Citrix servers (high-bandwidth applications)

    • Six test/development Citrix server connections (three per core) for application test and development

    • Twenty connections for infrastructure servers (domain controllers, print servers, mainframe, and so on)

    • Ten dual-gigabit Ethernet connections (20 ports, ten ports/five servers per core) for special-purpose high-load servers like Oracle, Microsoft Exchange, Microsoft SQL, profile/home directory file servers, and backup servers

  • Gigabit Ethernet (1000BaseSX):

    • Twenty connections to campus distribution layer concentration points (two per campus switch, two uplinks to the private WAN, and two uplinks to the VPN WAN/Internet)

    10/100/1000BaseTX Ethernet:

    • Up to 48 connections per core switch for load servers and peripherals, to include compatibility with 10MB Ethernet devices

    • Private WAN interconnect switch

  • Four 1000BaseSX connections and two 10/100/1000BaseTX connections:

    • VPN WAN/Internet interconnect switch (DMZ distribution switch) Gigabit Ethernet (1000BaseTX)

  • Four dedicated connections for firewall interconnects

  • Gigabit Ethernet (1000BaseSX)

  • Eight connections for links to the ACCESS DMZ aggregation switch, routers, core switches, and PacketShaper

  • 10/100/1000BaseTX Ethernet

  • Up to 48 connections for a firewall and DMZ servers

  • Intrusion detection module

  • Content services module

    • Campus distribution switches (eight required)

  • Up to 288 10/100/100 Ethernet connections per chassis for each of eight building concentration points

  • A minimum of four Gigabit fiber optic uplinks per chassis to build backbone connectivity:

    • Wireless LAN access switches for each campus building

Table 17-7 summarizes the primary LAN hardware needed for CME-CORP.

Table 17-7: CME-CORP LAN Hardware

LAN Hardware

Purpose

Quantity

Description

Cisco Catalyst 3550-12G System

OUTSIDE Access Switch, ACCESS DMZ, Access Switch, Spare Access Switch

3

Cisco 3550-12G, Enhanced Layer 3 IOS, (2) 1000BaseTX ports, (10) Gigabit Interface Converter (GBIC) slots; (3) 1000BaseSX Multimode fiber-optic GBIC modules

Cisco Catalyst 6506 System

DMZ Distribution Switch

1

Cisco Catalyst 6506 6-Slot Chassis; redundant power supply; (2) Supervisor2/MSFC2 with Enhanced Layer 3 IOS; (1) 16-Port Gigabit Ethernet (GBIC) module; (1) intrusion detection system (IDS) module; (1) Content Switching Module; (1) 48-Port 10/100/1000 (TX) Module; (8) 1000BaseSX Multimode fiber-optic GBIC modules, (4) 1000BaseTX GBIC modules

Cisco Catalyst 6513 System

LAN Core (A & B)

2

Cisco Catalyst 6513 13-slot Chassis; Redundant Power Supply; (2) Catalyst Supervisor 720 with Enhanced Layer 3 IOS software, 1GB DRAM, 64MB Flash; (1) 2-port 10GB dCEF720 Switching module; (5) 16-port (GBIC) Gigabit Ethernet dCEF256 Switching modules; (1) 48-port 10/100/100 CEF256 Ethernet module; (1) (65) multimode fiber-optic GBIC modules; (2) single-mode fiber-optic modules

Cisco Catalyst 4506 System

Distribution Switch (Corp-A), Distribution Switch (Admin-A), Distribution Switch (Admin-B), Distribution Switch (Sales-A), Distribution Switch (Eng-A), Distribution Switch (Eng-B), Distribution Switch (Eng-C)

1

Cisco 4506 6-Solt Chassis; redundant power supply; (1) Supervisor 4 with Enhanced Layer 3 IOS; (1) 2-GBIC/ 32-port 10/100 Ethernet module; (4) 48-port 10/100/100 Ethernet module; (3) 1000BaseSX GBIC

Cisco Catalyst 4506 System

Distribution Switch (IT-A)

1

Cisco 4506 6-Solt Chassis; redundant power supply; (1) Supervisor 4 with Enhanced Layer 3 IOS; (1) 2-GBIC/ 32-port 10/100 Ethernet module; (3) 48-port 10/100/100 Ethernet module; (4) 1000BaseSX GBIC

Cisco Catalyst 3524 System

Wireless LAN Access Switches

1

(5) Cisco 3524XL-EN-PWR, 24-port 10/100 Ethernet with power injection, (6) 1000BaseSX GBIC, (1) 1000BaseTX GBIC

CME-CORP Wireless LAN Requirements

The CME-CORP Wireless LAN (WLAN) provides coverage for roaming users as well as on-demand coverage for outside events on campus (the "Courtyard"). The initial deployment was based on the 802.11b wireless standard (11.0 MBps/2.4 GHz). The radio equipment has been upgraded to the 802.11g/a standard to provide up to 54 MBps access at 2.4 GHz and 5 GHz. Table 17-8 summarizes the WLAN hardware. The combination of omnidirectional and low-gain directional antennas will be installed (on the basis of a site survey) to assure coverage throughout the campus while minimizing radiation beyond the campus boundaries.

Table 17-8: CME-CORP WLAN Hardware

LAN Hardware

Quantity

Description

Cisco Aironet 1200

32

Cisco Aironet 1200-series Wireless Access

Wireless Access Point

 

Point configured for 802.11a/b/g

Omni Antenna

20

Indoor Omni Antenna. 2.4 GHZ

Omni Antenna

20

Indoor Omni Antenna. 5.8 GHZ

Directional Antenna

12

Indoor//Outdoor Directional Diversity Patch Antenna 2.4 GHZ

Directional Antenna

12

Indoor/Outdoor Directional Patch Antenna 5.8 GHZ

Bandwidth Management Requirements

For most of the private WAN network and segments of the VPN WAN network, CME designers established requirements for advanced bandwidth management, primarily to protect latency-sensitive traffic from burst, ill-behaved traffic such as NetBIOS over IP, HTTP, and printing. Per-site hardware listed in Table 17-9 is based on the site bandwidth to be "shaped."

Table 17-9: CME Bandwidth Management Hardware

LAN Hardware

Purpose

Quantity

Description

PacketShaper 8500 System

CME Corp Private WAN

1

PacketShaper 8500 with (1) two-port 1000BaseSX fiber-optic

PacketShaper 6500 System

CME Corp Internet

l

PacketShaper 6500 with (1) two-port 1000BaseSX fiber-optic LEM, licensed for 45MB shaping

PacketShaper 6500 System

CME-WEST Private WAN

l

PacketShaper 6500, licensed for 45MB shaping

PacketShaper 2500 System

CME-MEX Private WAN CME-EUR Internet

2

PacketShaper 2500, licensed for 10MB shaping

PacketShaper 1550 System

Private WAN Sites

30

PacketShaper 1550, licensed for 2MB shaping

Primary Internet Connection (CME-CORP)

CME depends heavily on its Internet upstream to deliver VPN WAN connectivity (IPsec), roaming client access (VPN and Citrix), and extranet access for key suppliers, as well as to allow public access to the CME Web site. Although these are considered the critical requirements, most outbound Internet access is provided through these same connections and competes for throughput. The upstream ISPs cannot guarantee that router-based QoS values such as IP Precedence or DSCP will be honored, so a Packet-Shaper is essential.

Private WAN

Bandwidth management of the private WAN encompasses both the CME-CORP side and the remote site side of each virtual connection. The aggregate number of sites to be managed and monitored requires a solution that is both standardized and centrally managed.

Remote Sites All remote sites funnel through CME-CORP for all services. To ensure traffic is policed to protect Citrix and other critical traffic flows, remote sites will use low-end Packeteer units as part of a distributed bandwidth management solution.

CME-TNG CME-TNG has far more bandwidth than the assigned staff will need. As this is not a production site, bandwidth management is desirable, not mandatory. Extensive application-level identification and control is not required, so management will be exercised via QoS features on the link routers.

CME-CORP From the network core looking out to the remote private WAN sites, 31 separate locations must be managed. All have virtually identical parameters. A central unit capable of 30-plus individual partitions is required.

CME-WEST

CME-WEST bandwidth management is participative with the main unit on the CME-CORP private WAN connection. During normal business hours, preferential treatment is given to latency-intolerant traffic (Citrix and H.323 Video Teleconferencing [VTC]). After hours, priority is given to bulk data replication from the network core to ensure data archives at CME-WEST are current enough to reconstitute CME's business. There is no current requirement to manage bandwidth utilization over the Internet connection; however, in the event of a catastrophe at CME-CORP, the CME-WEST Internet pipe would become the lifeline for CME-EUR and CME-WEST sales offices and would require bandwidth management.

CME-MEX and CME-EUR

Bandwidth management for both sites is somewhat limited in scope. The primary concern is to ensure the limited set of authorized outbound Internet users do not degrade performance of traffic destined for the network core via the VPN tunnel. Traffic must be managed behind the firewall.

Network Security Requirements

CME's fundamental security concept is one of layered security and least-privilege. Default security levels have been assigned to ensure all firewalls offer equivalent protection, and a precise written security plan details what traffic may or may not enter (or exit) at any given level of the security model (see Figure 17-1).

With the large number of security devices (firewalls, IDS, VPN concentrator) deployed in the Enterprise, a single-source management system was needed to maintain the secure environment, track configuration changes, and monitor and respond to security- related events. CME selected Cisco's CiscoWorks VPN/Security Management Solution (VMS) with additional Cisco Security Agents (CSA) for host-based IDS on exposed servers. Mirror-image systems will be deployed at both locations with all configuration changes deployed from the CME-CORP management suite. CiscoWorks VMS will manage all security devices, including the embedded IDS module in the DMZ Distribution switch.

Intrusion Detection for the private WAN segment is monitored by a Cisco 4235 IDS Sensor appliance managed by the CiscoWorks VMS suite.

Finally, to ensure security on network devices, authenticate VPN and RAS user identity, and enforce security and authentication on wireless segments, CME will deploy a redundant pair of RADIUS servers using Cisco Secure Access Control Server (CSACS) at CME-CORP, with a tertiary unit at CME-WEST. Table 17-10 identifies the components of the security management solution.

Table 17-10: Security Management Hardware/Software

Security Software

Quantity

Description

CiscoWorks VMS

2

CiscoWorks VMS (Unrestricted)

Cisco Security Agent (Server)

1

25-Agent Bundle

Cisco Secure Access Control Server

3

CSACS, primary and redundant for CME Corp, backup for CME-WEST

Cisco IDS Sensor

1

Cisco 4235 IDS Sensor

Network Infrastructure Management Requirements

Management of the network infrastructure encompasses a primary NMS site at CME-CORP and a secondary, albeit limited, NMS capability at CME-WEST as a backup. For seamless interoperability, CME will use CiscoWorks products, specifically CiscoWorks

LAN Management Solution (LMS) for the corporate campus, CiscoWorks Routed WAN Management Solution for maintaining the status and state of the private WAN network, and CiscoWorks Wireless LAN Solutions Engine to manage the corporate WLAN segment. To control PacketShaper configurations and monitor the status of enterprise bandwidth, CME will use Packeteer's PolicyCenter and ReportCenter products. The Cisco-Works network management solution components listed in Table 17-11 share a common interface with the security management products discussed previously.

Table 17-11: Infrastructure Management Hardware/Software

Security Software

Quantity

Description

CiscoWorks LMS

1

LAN Management Solution

CiscoWorks RWAN

2

Routed WAN Management

CiscoWorks WLSE

1

Wireless LAN Management

Packeteer PolicyCenter

1

Centralized management of Packeteer devices

Packeteer ReportCenter

1

Centralized reporting and analysis

Network Naming, Addressing, and Routing Requirements

Hierarchical network design implies that the network addressing scheme must support the selected routing protocol (classful/classless) and should lead to simpler routing tables. In concert with the addressing, an equally logical naming scheme is required to allow administrators to correlate network node name to function and expected address, and hence geographic location.

The Host Naming Scheme

After extensive discussions and arguments, CME elected to use a host naming system that met most of their design requirements: short, self-documenting , and extensible. The most complex issue, how to easily differentiate between the 1841 router in Athens, GR, and the one in Athens, GA, was resolved by basing the site name on the International Airline Travel Association (IATA) three-letter code for the major airport. Greece becomes "HEW" and Georgia becomes "AHN".

Figure 17-2 shows a partial breakdown of the naming conventions.

image from book
Figure 17-2: The CME host naming scheme (partial)

The Addressing Scheme

CME's internal IP addressing scheme uses the ranges specified by RFC 1918, Address Allocation for Private Internets , and was designed to ensure adequate capacity for growth in terms of additional main corporate campus infrastructure and users, expansion of existing primary sites, and addition of more sales offices on demand. More important, the design was intended to be generally hierarchical to allow summarization of routing information at key points such as the DMZ distribution switch and the private WAN distribution router.

The sample of the overall scheme shown in Table 17-12 does not include details on how addresses are assigned within each LAN segment subnet (DHCP ranges versus static address range or standardized ranges for specific equipment within the static range).

Table 17-12: Internal Network Addressing Scheme (Partial)

SUBNET

MASK

USE

10.0.0.0

/8

CME Master RFC 1918 Address Space

10.1.0.0

/16

CME-CORP Address Space

10.1.0.0

/24

CME-CORP Servers Core-A

10.1.1.0

/24

CME-CORP Servers Core-B

10.1.32.0

/24

CME-CORP LAN CORP

10.1.33.0

/24

RESERVED LAN CORP Growth

10.1.34.0

/24

CME-CORP LAN ADM

10.1.35.0

/24

CME-CORP LAN ADM

10.1.36.0

/24

RESERVED LAN ADM Growth

{ ------------------------ Sequence Continues ----------------------- }

10.1.44.0

/24

CME-CORP LAN IT

10.1.45.0

/24

RESERVED LAN IT Growth

10.1.46.0

/24

RESERVED LAN Growth

10.1.47.0

/24

RESERVED LAN Growth

10.2.0.0

/24

CME-CORP Point-to-Point Links

10.2.0.0

/24

Point-to-Point Links to Private WAN

10.2.0.0

/30

ORD-SCO-A to ORD-SDI-I

10.2.0.4

/30

ORD-SCO-B to ORD-SDI-I

10.2.0.8

/29

ORD-SDI-I to ORD-RPVT-A

10.2.0.16

/30

ORD-RPVT-A to ORD-RTNG-A

10.2.0.20

/30

ORD-RPVT-A to Private WAN Sales Site

{ ------------------------- Sequence Continues ----------------------- }

10.2.0.252

 

ORD-RPVT-A to Private WAN Sales Site

SUBNET

MASK

USE

10.201.0.0

/16

CME VPN-WAN-Connected Sites LAN

10.201.0.0

/22

CME-EUR LAN

10.201.4.0

/22

CME-MEX LAN

10.201.8.0

/22

Future Primary Site LAN

10.201.12.0

/22

Future Primary Site LAN

10.201.32.0

/24

CME VPN WAN Sales Office LAN

10.201.33.0

/24

CME VPN WAN Sales Office LAN

{ ------------------------- Sequence Continues ----------------------- }

10.201.255.0

/24

CME VPN WAN Sales Office LAN

10.254.0.0

/16

CME-CORPDMZAddress Space

10.254.0.0

/24

CME-CORPPUBLIC DMZ

10.254.1.0

/22

CME-CORPSECURE PUBLIC DMZ

10.254.4.0

/22

CME-CORPACCESS DMZ

10.254.4.0

/24

CME-CORPACCESS-DMZ Interconnect (ICF)

10.254.5.0

/24

CME-CORPACCESS DMZ CORPWLAN Pool

10.254.6.0

/24

CME-CORPACCESS DMZALT WLAN Pool

10.254.7.0

/24

CME-CORPACCESS DMZ RAS Pool

10.254.8.0

/23

CME-CORPSECUREACCESS DMZ

10.254.8.0

/24

CME-CORPSECUREACCESS DMZ ICF

10.254.9.0

/24

CME-CORPSECUREACCESS DMZ VPN Pools

SUBNET

MASK

USE

10.2.1.0

/24

Point-to-Point Links to CME-CORP LAN

10.2.1.0

/30

ORD-SCO-A to ORD-SCO-B

10.2.1.4

/30

ORD-SCO-Ato ORD-SDMZ-A

10.2.1.8

/30

ORD-SCO-B to ORD-SDMZ-A

10.2.1.12

/30

ORD-SCO-A to Future ORD-SDI-?

{ ------------------------- Sequence Continues ----------------------- }

10.2.1.28

/30

 

10.2.1.32

/30

ORD-SCO-A to ORD-SDI-A

10.2.1.36

 

ORD-SCO-A to ORD-SDI-B

10.2.1.40

 

ORD-SCO-A to ORD-SDI-C

{ ------------------------- Sequence Continues ----------------------- }

10.2.1.62

/30

ORD-SCO-A to ORD-SDI-?

10.2.1.64

/30

ORD-SCO-B to ORD-SDI-A

10.2.1.68

/30

ORD-SCO-B to ORD-SDI-B

10.2.1.72

/30

ORD-SCO-B to ORD-SDI-C

{ ------------------------- Sequence Continues ----------------------- }

10.2.1.92

/30

ORD-SCO-B to ORD-SDI-?

10.101.0.0

/16

CME Private-WAN-Connected Sites LAN

10.101.0.0

/22

CME-WEST LAN

10.101.4.0

/22

Future Primary Site LAN

10.101.8.0

/22

Future Primary Site LAN

10.101.12.0

/22

Future Primary Site LAN

10.101.32.0

/24

ORD-TNG LAN

10.101.33.0

/24

CME Private WAN Sales Office LAN

{ ------------------------- Sequence Continues ----------------------- }

10.101.255.0

/24

CME Private WAN Sales Office LAN

Public (Internet routable) IP addresses are from CME's registered block of addresses. For the purposes of the case study, CME owns 20.20.20.0/22 (20.20.20.0 to 20.20.23.254). The range 20.20.20.0/23 (20.20.20.0 to 20.20.21.254) is assigned to CME-CORP and dynamically routed via two different upstream service providers. 20.20.22.0/24 is assigned to CME-WEST for support of the disaster recovery site.

Routing Protocols and Methods

The complexity of the CME network mandates careful selection of routing protocols. Given that CME's internal and external (Internet) segments will never directly exchange routing information (due to RFC 1918 addressing and security constraints), separate interior gateway protocols (IGPs) and exterior gateway protocols (EGPs) are used.

Interior Networks Of the three logical choices for dynamic IGPs, the Interior Border Gateway Protocol (IBGP) was considered too complex and ill-suited for the large number of small (/24 or smaller) networks. Further, the cost of resources to handle IBGP at private WAN sites was prohibitive and redistributing IBGP routes into another IGP made little sense. Of the two remaining options, Open Shortest Path First (OSPF) and Cisco's Enhanced Interior Gateway Routing Protocol (EIGRP), EIGRP is more suited to a meshed network (like the CME corporate campus), and was the most appropriate choice, with one exception: the DMZ. CME will use their registered Autonomous System Number (ASN) from BGP for their EIGRP implementation, but for the sake of illustration, configurations in the case study will use Cisco Systems register ASN (109). The exception to using EIGRP as the IGP is in the DMZ: Internet routers, firewall OUTSIDE interfaces, and VPN concentrators will all run an instance of OSPF to meet the requirement that BGP can only announce routes learned from an IGP. On the other side of the security boundary, the firewall, the DMZ distribution switch (6509), and the VPN concentrator will run a separate instance of OSPF to propagate DMZ routes to the internal network. The DMZ distribution switch will redistribute OSPF routes into the EIGRP process.

Exterior Networks The registered ASN does dual-duty: The registration process is mandatory for use with Exterior Border Gateway Protocol (EBGP, the Internet routing protocol) to ensure interoperability with different ISP upstream providers and allow local copies of the full Internet routing table to be maintained ; the same ASN is used for EIGRP and OSPF, even though the EIGRP ASN is never exposed outside the private network.



Citrix Access Suite 4 for Windows Server 2003. The Official Guide
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
ISBN: 0072262893
EAN: 2147483647
Year: 2004
Pages: 137

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net