Central Site Router Equipment

© 2004 Cisco Systems, Inc. All rights re

© 2004 Cisco Systems, Inc. All rights re

Choose the router that supports the WAN protocols that you will use. As illustrated in the figure, the router and network modules will support the interfaces in the network topology that are used in this course.

These routers are typical Cisco Systems equipment for a central site:

■ Cisco 2600 Series

■ Cisco 3600 Series

■ Cisco 3700 Series

■ Cisco 7200/7500 Series

Branch Office Considerations

This topic describes branch office considerations.

Branch Office Considerations

• Must be able to access the central site

© 2004 Cisco Systems, Inc. All rights re

• Must be able to access the central site

© 2004 Cisco Systems, Inc. All rights re

A remote site or branch office typically has fewer users than the central site, and therefore needs a smaller WAN connection.

Remote sites connect to the central site and to some other remote sites. Telecommuters may also require access to the remote site. A remote site can use the same or different media.

Remote site traffic can vary, but is typically sporadic. The network designer must determine whether it is more cost-effective to offer a permanent or dialup solution.

The remote site must have a variety of equipment, but does not require as much as the central site. Typical WAN technologies connecting a remote site to the central site include:

Leased line

Frame Relay

Broadband services (cable or DSL)

Typical considerations for setting up a remote site WAN connection are:

■ Multiple access connections: Users will connect to the branch site using various media. Branch site WANs must allow for multiple media options and simultaneous access by multiple users. It must also have the connectivity to the Central or SOHO site.

■ Cost: Sometimes called path cost, cost is an arbitrary value that is typically based on hop count, media bandwidth, or other measures. Cost is assigned by a network administrator to compare various paths through an internetwork environment. Cost values are used by routing protocols to determine the most favorable path to a particular destination; the lower the cost, the better the path.

■ Access control: To prevent unauthorized traffic, routers and firewalls use a set of rules that permit or deny certain traffic. Access control is commonly applied to router interfaces and can be configured to control which data sessions can pass and which can fail. Users can gain secure access by using VPN solutions to connect to corporate intranets.

Redundancy: In internetworking, duplicate devices, services, or connections can perform the work of original devices, services, or connections in the event of a failure.

■ Authentication: The remote site must be able to authenticate itself to the central site.

■ Availability: Service providers may not offer certain WAN services in some regions. This consideration generally becomes more critical as sites are set up in more remote locations.

0 0

Post a comment