Enterprise network as an ISP with a single huge customer

Hello,

I'm sure lots of you work for big enterprises, and some of you work for biggest of them.

How many of you architect your network as an ISP, with that enterprise as the biggest customer ? Office networks in l3vpn, VPLS/EVPN on top of your own network for DCI, etc ? Or is it usually just a single IGP domain with no unnecessary bells and whistles ?

Do you think one approach is better than the other ? If so, why ?

I understand that it usually comes down to specific circumstances and most likely scale but I'd still love to hear about your experience.

it's nice to have the tools to segregate traffic/users/things...
mpls/etc is one method to do that... I don't know that many
enterprises pursue this path though :frowning: which is sad (I think).

it's nice to have the tools to segregate traffic/users/things...
mpls/etc is one method to do that... I don't know that many
enterprises pursue this path though :frowning: which is sad (I think).

i have seen a lot of this done with firewall devices and vlans. with
vlans or mpls, you can make spaghetti without wires, one wheat and one
semolina.

randy

oh absolutely. you can use many tools to lop off your fingers, my
point was that things like mpls (or vlans) provide a nice other tool
to use along with your firewalls and such.

of course you ought not willy-nilly go crazy with this, but... imagine
if the 'hr department' were in one contiguous 'VRF' which had a
defined set of 2-3 exit points to control access through... while
those willy 'engineers' could be stuck in their own ghetto/VRF and
have a different set of 2-3 exit points to control.

Expand your network over many locations and in large buildings and ...
it can be attractive to run a 2547 network that the company is a
'customer' of, or so I was thinking :slight_smile:

i have seen a lot of this done with firewall devices and vlans. with
vlans or mpls, you can make spaghetti without wires, one wheat and one
semolina.

oh absolutely. you can use many tools to lop off your fingers, my
point was that things like mpls (or vlans) provide a nice other tool
to use along with your firewalls and such.

of course you ought not willy-nilly go crazy with this, but... imagine
if the 'hr department' were in one contiguous 'VRF' which had a
defined set of 2-3 exit points to control access through... while
those willy 'engineers' could be stuck in their own ghetto/VRF and
have a different set of 2-3 exit points to control.

Expand your network over many locations and in large buildings and ...
it can be attractive to run a 2547 network that the company is a
'customer' of, or so I was thinking :slight_smile:

i have seen people successful with this with mpls and with vlans with
non-mpls tunnel tech (e.g. ipsec for the paranoid). i have seen them
screw the pooch with both.

randy

13.06.2015 05:35, Randy Bush wrote:

i have seen a lot of this done with firewall devices and vlans. with
vlans or mpls, you can make spaghetti without wires, one wheat and one
semolina.

oh absolutely. you can use many tools to lop off your fingers, my
point was that things like mpls (or vlans) provide a nice other tool
to use along with your firewalls and such.

of course you ought not willy-nilly go crazy with this, but... imagine
if the 'hr department' were in one contiguous 'VRF' which had a
defined set of 2-3 exit points to control access through... while
those willy 'engineers' could be stuck in their own ghetto/VRF and
have a different set of 2-3 exit points to control.

Expand your network over many locations and in large buildings and ...
it can be attractive to run a 2547 network that the company is a
'customer' of, or so I was thinking :slight_smile:

i have seen people successful with this with mpls and with vlans with
non-mpls tunnel tech (e.g. ipsec for the paranoid). i have seen them
screw the pooch with both.

randy

You can compartmentalize your network in lots of ways. What I'd like to know is what ways failed harder in other peoples experience (or at least faster).

I'm not sure doing it ISP style is better, but I think it has some benefits. Then again, the opposite is true as well, less complexity means more stability. Usually.

What I have done is leverage the production data center redundancy to
provide connectivity services to any nearby offices in the same region,
basically using our colo as the office ISP for internet connectivity but as
far as doing vpls services and the like, it has been so far cheaper to
contract that out as the places where I have worked have had many more
offices than production internet sites with one might call "hardened"
internet services. It's just cheaper in most cases to go with a third
party vendor to provide a VPLS mesh of all of the offices globally than it
is for us to do it. Offices move, close, colos change locations. I can
call a vendor, tell them we are moving an office to a different building,
they worry about moving the circuit.

Trying to mesh everything from Sydney to Bangalore to London to San
Francisco and all the branch offices in between is great if you have a
bunch of people sitting around who are otherwise unoccupied but if you run
a lean headcount anyway, farming this out pays in the long run for the
shops where I have worked. Not saying this holds true for every scenario,
though. If we had production PoPs in the cities where we had offices,
yeah, it might make some sense.

It will also depend greatly on the knowledge of the design team / person and the operations team. If the designer is ex-SP or has a strong knowledge of both SP and Enterprise then yes, a good design may result.

There are plenty of people out there that will use MPLS / multiple tables for the wrong reasons just so they can say that's what they're doing.

Regards,

Tim Raphael

Concur 100%.

I also agree with both Chris and with Randy with regards to pros and cons of this general approach.

In my subjective experience, relatively few enterprises have the technical and operational savvy to design, deploy, operate, and troubleshoot a network designed in such a manner, or even understand the appropriate usage of these technologies, much less reap the benefits thereof. Unless they've invested in hiring people with the right skillsets and breadth/depth of actual operational experience, this can be a path fraught with significant risk.

We run a commercial ISP network that provides IP and other non-IP
services to our customers.

On top of that, our corporate/enterprise network is a customer.
Implementation is l3vpn with firewalls at each office sitting between
the l3vpn and public Internet. Enterprise and Internet traffic is routed
accordingly.

DCN network is a combination of l2vpn and l3vpn, depending on what part
of the network the DCN needs to touch.

Mark.

In my subjective experience, relatively few enterprises have the
technical and operational savvy to design, deploy, operate, and
troubleshoot a network designed in such a manner, or even understand
the appropriate usage of these technologies, much less reap the
benefits thereof.

i have seen many universities and large enterprises with as much clue as
your serious isp. where they fall behind your avaerage nanogger is
testosterone poisoning.

randy

i have seen many universities and large enterprises with as much clue as your serious isp.

I've seen a few, but not many. All of the ones I've seen who fall into that category operate significant public-facing infrastructure, so they have personnel with the necessary skillsets and experience.

where they fall behind your avaerage nanogger is testosterone poisoning.

I couldn't agree more.

Hello,

I'm sure lots of you work for big enterprises, and some of you work
for biggest of them.

How many of you architect your network as an ISP, with that
enterprise as the biggest customer ? Office networks in l3vpn,
VPLS/EVPN on top of your own network for DCI, etc ? Or is it usually
just a single IGP domain with no unnecessary bells and whistles ?

We do at $dayjob (public service radio station network). We try to stay
away from the TE side of MPLS, but the other knobs are in pretty much use.

A lot of our newer uses for the network are realtime audio in
hi-fi quality. Latency is our enemy, and so we don't do TCP, we skip
retransmits, buffers to be able to wait for a late packet are so short
it rarely matters, etc. That means a lot of prioritisation being done. It
is easier in our "isp-type" network.

As a very distributed company (in meatspace, but at the same time very
unified in infrastructure) we sure need the flexibility. Doing
this on usual VLAN/routing would not fly very well. A lot of the devices
we run aren't really fit for living with other networked devices,
especially those devices fondled by Users. We usually just push them in
another VRF.

Do you think one approach is better than the other ? If so, why ?

I'd love to have a single flat routing domain. But I do not think it
works with the kind of legacy stuff (some of it brand new...) we run.