manual

Table Of Contents
Copyright © 2010, Juniper Networks, Inc. 5
APPLICATION NOTE - Branch Office Connectivity Guide
When a device sends traffic to other devices, it sends the traffic to an upper layer router. The process repeats until
the traffic arrives at the specified router with visibility to forward the traffic down to a lower layer. Because devices
on the top layer are usually fully meshed, they can send the traffic to the appropriate router. The traffic is then
forwarded down the layer chain until it reaches its final destination.
The obvious advantage of using a tiered layer approach is scalability. Any-to-any connectivity is required only for routers
on the higher layer. Routers on lower layers require only a single connection (although for redundancy purposes it is
common to provide more than one). This scalable approach reduces the minimum topology to a tree topology whereby
each device requires only one or two connections (except for the devices on the top-most layer), effectively reducing the
traditional scalability challenge to a linear function bound to the number of devices in the network.
Considering enterprises’ scalability requirements, a two-tier design is sufficient to accommodate network needs.
Because each VPN concentrator can terminate in excess of 2,000 tunnel connections, there is no need to further
segment the design.
The resulting topology consists of a set of remote branches interconnected through a tier of data centers (or regional
offices), as shown in Figure 4.
Figure 4: Two-tier network design for data centers
Note: Whenever traffic patterns require a hybrid design, Juniper Networks recommends using Auto Connect VPN
(AC VPN). As an example, AC VPN is well suited if the group of branches has high demands of inter-branch traffic.
The AC VPN feature can ease the provisioning burden while providing full-mesh connectivity. For further details
concerning AC VPN, see Using AC VPN to Create Branch-to-Branch IPsec Tunnels.
The proposed two-tier network design refers to the topology of the overlay IPsec network and not to the underlying
physical network. Physically, the network resembles the diagram, as shown in Figure 2, Branch Office Reference
Architecture.
Routing Information Protocol
Several designs for the routing topology were considered. On one side, a robust, scalable, and standards-based
solution is desired. On the other side, ease of configuration and deployment is more appealing (considering the large
number of sites expected). To address these concerns, different routing protocols (RIP, BGP, and OSPF) are discussed
with their associated benefits and problems. For further details concerning BGP, see Using BGP for Large Networks.
Juniper Networks recommends RIP as the routing protocol for enterprise networks that connect between 100
to 1,000 branch office locations. Using a RIP-based IPsec routing implementation provides a cost-effective and
secure alternative when employing leased lines and other expensive L2 networking technologies. However, some
of the challenges as well as the trade-offs of each design decision are presented here. The proposed routing
architecture’s goal is to balance complex implementation with design scalability, but still be well-suited for small to
medium-sized organizations.
TIER-1TIER-2