manual

Table Of Contents
4 Copyright © 2010, Juniper Networks, Inc.
APPLICATION NOTE - Branch Office Connectivity Guide
Configuration Simplicity: Provisioning is easy. When the number of sites is large, it is important to reduce the
complexity of the configuration on a per-site basis, where possible. That is, requiring multiple configurations
should be as simple as possible.
Link-Failure Detection: Link-failure detection mechanisms are required. Because IPsec tunnels use a Layer 3
infrastructure, routing (and sometimes link routing) failures are possible where the tunnel termination points
are not notified of the malfunction. Therefore, the control and data plane keep-alive protocols should be used to
detect the malfunctions.
Unified Threat Management (UTM): UTM features and firewalls should be enabled at the branches. For both
to function properly, it is mandatory to guarantee that both ingress and egress traffic flows across the same
firewall. The same is true for data centers. Traffic symmetry enforcement is required to ensure that each
particular traffic flow (and sometimes groups of flows, as is the case with protocols that use more than one
connection) is presented across the same set of inspection devices.
Routing Architecture
To ensure connectivity, a minimum of one IPsec tunnel between each branch office and the central office is required.
With N remote locations, a full mesh of tunnels would equal N*(N-1)/2 total tunnels. In particular, if implementing a
VPWAN solution (having 1,000 sites), this solution requires a minimum of 499,550 tunnels. Clearly, it would not only
be quite difficult to manage but also requires each branch to terminate at least 999 tunnels.
Note: Enterprise networks in general have an asymmetric traffic profile—that is, most of the internal traffic travels
from the branches to the data center and vice versa. Generally, traffic between branches does not constitute the bulk
of the traffic carried across the network.
Tiered Network Approach—Layering the Network for Scalability
To circumvent the N2 scalability problem, it is customary to partition the network into several layers. Devices on each
layer connect only to devices located on an upper and lower layer, as shown in Figure 3.
Figure 3: Multi-tiered/layered network architecture
TIER-1
TIER-2
Device
(n-1)
Device N
Device 1
TIER-3
TIER-N
Device 2