77
CISCO SYSTEMS USERS MAGAZINE FIRST QUARTER 2005 CISCO.COM/PACKET BUSINESS RESILIENCE IT Strategies to Keep Your Business Moving 30 Adaptive Security for a Changing World 19 When Data and Voice Teams Converge 59 SPECIAL REPORT: Broadband Explosion 49 Reprinted with permission from Packet ® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

packetQ1-05

Embed Size (px)

DESCRIPTION

BUSINESS RESILIENCE

Citation preview

Page 1: packetQ1-05

CISCO SYSTEMS USERS MAGAZINE FIRST QUARTER 2005

PA

CK

ET

FIR

ST

QU

AR

TE

R2

00

5V

OL

17

NO

1

CISCO.COM/PACKET

BUSINESS RESILIENCEIT Strategies to Keep Your Business Moving 30

Adaptive Security for a Changing World 19

When Data and Voice Teams Converge 59

SPECIAL REPORT:Broadband Explosion 49

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 2: packetQ1-05

How Resilient Is Your Business? 30

Successful business operation depends on the continuity

of IT systems. And because everything upon which a

business depends is part of an interconnected system,

the entire system must be resilient. Read how network

strategies that enhance operations can also protect your

business.

Recipe for Resilience 35

An effective resilience strategy for your business

involves building resilience into campus, branch office,

and teleworker IT systems. Learn about the Cisco

products and technologies that increase business agility

and flexibility.

Ready for Anything 40

Enterprises that incorporate resilience into consolidated

data centers can build secure, virtualized frameworks

that adapt to future applications and technologies.

Adventures in Resilience 45

Four Cisco customers tell how they successfully main-

tained business continuity in the face of floods, fires,

and power outages.

30

CISCO SYSTEMS USERS MAGAZINE FIRST QUARTER 2005

VOLUME 17, NO. 1

PACKET

35

ON THE COVER

Broadband Explosion 49

Broadband is proving to be the ideal platform on which to

converge consumer applications for voice, video, and data.

This report looks at the state of broadband technology

worldwide—what it means for consumers and service

providers alike.

SPECIAL REPORT

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 3: packetQ1-05

Metro Ethernet Coming Your Way 69

Metro Ethernet gives service providers the flexibility and quality of service to

deliver real broadband services—and customers are buying.

The IP NGN Journey 72

On the journey toward IP next-generation networks (IP NGN), Cisco innovation

and product advancements are helping service providers make the trip.

Spinning IOS into Gold 75

How to turn IOS technologies into profitable services.

Wireless Patrol 55

Two cities in the US and the UK demonstrate how mobile networks can enhance

public safety and law enforcement.

When Organizations Converge 59

Lessons learned by companies and employees that have successfully adopted

converged IP networks.

Technology Wakeup Call 65

Hotel operators look to IP networks to vanquish fierce competition and indulge

sophisticated guests.

SECURITY: Looming Security Challenges 19

Zombies, Trojans, “bots,” and worms: What have we wrought?

WIRELESS: Fixed-Mobile Convergence 23

Bringing wireless LAN and wireless WAN radio access technologies together

for a seamless service offering.

SECURITY: Cisco MPLS VPN over IP 27

Extending MPLS VPN to operate over IP networks with the same overall

architecture and service experience.

Passing the Test 77

Early Field Trials participants discuss the challenges and benefits of working with

pre-release products.

Who’s at Your Service? 81

Setting up support contracts for your technology requires flexibility on both

sides of the negotiating table.

From the Editor 1

Business Resilience and Network

Relics

User Connection 5

New CCIE Storage Certification •

CCNA Prep Center • Worldwide

Technology News

Tech Tips & Training 9

Enterprise Segmented Extranets •

Reader Tips

Technically Speaking 83

Peter Lei and Randall Stewart on new

Rate-Based Satellite Control Protocol

feature in Cisco IOS Software.

New Product Dispatches 84

What’s new from Cisco over the

past quarter.

NetPro Expert 88

Advice from Cisco’s Gilles Dufour

on load balancing with Cisco CSM,

CSS, and their SSL modules.

Mail 3

Calendar 6

Acquisitions 5

Networkers 6

Tech Tips 17

Advertiser Index 89

Cache File 90

The 5th Wave 90

IN EVERY ISSUE

SERVICE PROVIDER SOLUTIONS

ENTERPRISE SOLUTIONS

SMALL AND MIDSIZED BUSINESSES

55

69

77

DEPARTMENTS

TECHNOLOGY

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 4: packetQ1-05

FROM THE EDITOR

Business Resilience

and Network Relics

IP networks are no longer merely a way to intercon-nect computer resources; they are now a main-stream method of communicating and interactingwith customers, employees, and partners. Organiza-tions worldwide rely on their IT infrastructures tobe more efficient, productive, agile, and competitive.

Mobility solutions such as virtual private net-works (VPNs) and wireless LANs (WLANs) pro-vide anytime, anywhere access to business-criticalapplications such as customer relationship man-agement, sales force automation, and enterpriseresource planning. IP telephony not only helpsslash costs, it fundamentally changes the way busi-ness communicates. In short, the role of IP net-works has shifted from a largely opaque supportmechanism (read: cost center) to an integral part of business operations (read: competi-tive advantage).

If the network is so important to the business, then it follows that network resilience isvital to business resilience. What is business resilience, you ask? Business resilience refersto the operational and technological readiness that prepares organizations to make day-to-day operations efficient and cost-effective, respond quickly to opportunities with thepotential to increase competitive advantage, and react appropriately to unplanned events.

But network resilience is only part of the story. An organization’s business resiliencestrategy should consider how IT systems interact with each other. You can’t just look atpoint products or single systems; you have to consider how all IT systems interoperate toachieve your goals for business agility and continuity. How resilient is your business?Turn to our feature articles on business resilience, beginning on page 30, to find out.

While an aspect of overall business resilience has to do with longevity of the individualproducts that make up the network—continuously having to pull out and replace boxescan wreak havoc on network availability and stability—we have a hunch that some ofyou network folks can take the notion of investment protection to the extreme. Do youhave a Cisco museum piece still running on your network? An AGS router or a Catalyst2500 Series Switch, perhaps? If so, we want to hear about it.

We’re looking for the oldest, continuously running Cisco equipment in a productionnetwork across a variety of product series. Visit cisco.com/packet/museum for contestrequirements, a list of product series that qualify, and details on how you can enter thecontest. You could be featured in an upcoming issue of Packet, be included in otherCisco PR activities, or even receive a free upgrade to the “latest and greatest” replace-ment equipment.

While you’re searching for that ancient artifact hiding in your network, ask yourselfhow it could be contributing to or hindering the resilience of your business.

PACKET MAGAZINE

David BallEditor in ChiefJere KingPublisherJennifer RedovianManaging EditorSusan BortonSenior EditorKim Austin PetersonSMB EditorKaren DalalStaff EditorJoanie WexlerContributing Editor

Robert J. Smith Sunset Custom PublishingProject Manager

Amy Mackey, Nicole Mazzei, Mark Ryan, Norma TennisSunset Custom PublishingProductionJeff BrandArt DirectorEmily BurchDesignerEllen SokoloffDiagram IllustratorBill LittellPrint Production ManagerCecelia Glover TaylorCirculation DirectorValerie MarliacPromotions ManagerGetty ImagesCover Photograph

Advertising Information:Kristen Bergman, [email protected]

Publisher Information: Packet magazine (ISSN 1535-2439) is publishedquarterly by Cisco Systems and distributed freeof charge to users of Cisco products.Please send direct address corrections and othercorrespondence to [email protected].

Aironet, Catalyst, CCDA, CCIE, CCNA, Cisco, Cisco IOS, CiscoNetworking Academy, Cisco Press, the Cisco Powered Networklogo, the Cisco Systems logo, Cisco Unity, IOS, iQ, Linksys,Packet, and PIX are registered trademarks or trademarks of Cisco Systems, Inc., and/or its affiliates in the USA and certainother countries. All other trademarks mentioned in this publica-tion are the property of their respective owners.

Packet copyright © 2005 by Cisco Systems, Inc. All rightsreserved. Printed in the USA.

No part of this publication may be reproduced in any form, orby any means, without prior written permission from CiscoSystems, Inc.

This publication is distributed on an “as-is” basis, without war-ranty of any kind either express or implied, including but not lim-ited to the implied warranties of merchantability, fitness for a particular purpose, or noninfringement. This publication couldcontain technical inaccuracies or typographical errors. Laterissues may modify or update information provided in this issue.Neither the publisher nor any contributor shall have any liabilityto any person for any loss or damage caused directly or indirectlyby the information contained herein.

This magazine is printed on recycled paper.

10%TOTAL RECOVERED FIBER

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 1

Ro

b B

rod

man

David BallEditor in [email protected]

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 5: packetQ1-05

MAIL

Deciphering AESThe article “BundledSecurity” [FourthQuarter 2004, page38], states that “AESsupports 128-, 192-,and 256-bit blockcipher lengths andencryption key sizes.”The actual Advanced Encryption Standard(AES), which is available at csrc.nist.gov/publications/fips/fips197/fips-197.pdf,only supports 128-bit block cipherlengths. The original Rijndael algorithm(on which AES is based) supported addi-tional block sizes, but they are not part ofthe AES standard. —Jim Burtoft, Blair Technology Group,Altoona, Pennsylvania, USA

The AES standard is 128-bit cipherlength and 128, 192, and 256 keylength. The original Rijndael algorithmhad a variable cipher length of 192 and256, but they were not adopted by theNational Institute of Standards andTechnology (NIST). The Federal Infor-mation Processing Standards (FIPS) 197standard you mention validates thatpoint: “using cryptographic keys of 128,192, and 256 bits to encrypt anddecrypt data in blocks of 128 bits.” Thesentence you pointed out in Packetshould actually state: “AES supports128-, 192- and 256-bit encryption keysin 128-bit block ciphers.”—Editors

Bullish on TorrusPacket readers might be interested in afree open-source product for collectingand monitoring data series. For morethan two years I have been working onthe Round Robin Database Framework(RRFW) platform, soon to be releasedwith the new name Torrus (torrus.org).

Most users use Torrus as a Simple Net-work Management Protocol (SNMP) col-lector, but its functionality is muchbroader. A single server can handle a few

hundred network devices, and its SNMPdiscovery engine supports many vendorsand device types, including Cisco routersand switches and some Cisco-specific fea-tures such as SAA agents, temperaturesensors, and CPU and memory statistics.It is also the first complete open-sourceimplementation of Cisco class-basedquality of service (QoS) monitoring. Thethreshold monitor daemon can periodi-cally check if the values and rates are inaccordance with specified limits. TheWeb interface provides great flexibility inorganizing the data sources, and in man-aging user access rights.

Torrus is distributed under GNU GeneralPublic License and commercial support isprovided by a Swiss company.—Stanislav Sinyagin, CCIE No. 5478,GPS-Technik AG, Schlieren, Switzerland

Looking for the PenaltyBoxSometime ago I read a very interestingPacket article about a network administra-tor who had created scripts to reducebandwidth usage in a university campusenvironment. He devised some policiesthat he put on the switches to preventbandwidth overuse by students and others.Where can I find this article?—Claus Berntsen, CCNP, TDC Totalløs-ninger, Odense, Denmark

The article you are looking for is “ThePenalty Box,” from our Second Quarter2004 issue. You can find it on our Websiteat cisco.com/packet/171_2a1.—Editors

Why No Picture?Your article, “The VT Advantage,”[Packet, Second Quarter 2004] mentionsbody language, but you overlooked theobvious fact that body language includesthe eyes. In describing Cisco’s videotelephony solution you failed to include apicture of the video capability. A picturespeaks for itself and can be accompanied

by a precise, short description, makingextra words unnecessary. If your readerswant more information, why not referthem to another Web link for the details?The eyes are the most important aspectof body language, so please include aphoto of the video telephony solution.—Egnio F. Reyes, Verizon

Thank you for your suggestion. Althoughthe article on Packet Online does notinclude a photo of the VT Advantagesolution, the print version of the maga-zine does. You can download a PDF ofthe article, including the photo, from ourWebsite at cisco.com/packet/171_2a2.Scroll to the end of the article and clickon the PDF icon. For ease of use andreadability we have redesigned PacketOnline and the PDF’s of current articlesare now easier to find at the top rightside of article Web pages.—Editors

Send your comments to Packet

We welcome your comments andquestions. Reach us through e-mail [email protected]. Be sure toinclude your name, company affilia-tion, and e-mail address. Letters maybe edited for clarity and length.

Note: The Packet editorial staff cannotprovide help-desk services.

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 3

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 6: packetQ1-05

USER CONNECTION

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 5

Building on the success of three specialist certificationsthat validate storage networking design, support, andsales skills, Cisco now offers an expert-level CCIE certi-fication in storage networking.

Although there are no formal prerequisites for CCIE certi-fication, candidates are encouraged to have 3–5 years of experi-ence with end-to-end storage networking. The certificationprocess includes a written exam covering theoretical conceptsand a hands-on lab exam featuring devices such as storage areanetwork (SAN) switches and directors, routers, and storage man-agement solutions.

Candidates are expected to demonstrate expertise configuringintelligent storage solutions using transport technologies such asFibre Channel, Small Computer System Interface over IP (iSCSI),Fibre Channel over IP (FCIP), and IBM Fiber Connection(FICON).

Business Value of Storage

“New storage demands are rapidly outstripping the way inwhich data storage is managed at most organizations today,”says Mike Quinn, vice president, Cisco Technical Support

Group. “Cisco is offering storage networking certifica-tions that are evolving in step with what the market andour customers are demanding for optimizing productiv-ity and performance.”

Companies are using storage networking to improve disas-ter recovery and network performance, and to take advantage ofnetwork services such as volume management, data replication,and enhanced integration with servers and storage appliances(see “Ready for Anything” on page 40).

Exam Availability

The CCIE Storage Networking written exam is expected to beavailable by March 2005. The corresponding lab exam is expectedto be announced soon after. Initially, the lab exam will be availableat Cisco offices in San Jose, California; Research Triangle Park,North Carolina; and Brussels, Belgium.

Cisco also offers CCIE certifications in routing and switching,network security, service provider networks, and voice.

For more information, visit cisco.com/go/ccie.

New CCIE Storage Certification

Acquired

Airespace, Inc.

BCN Systems, Inc.

Jahi Networks, Inc.

Perfigo, Inc.

Protego Networks, Inc.

Employees

175

45

20

31

38

Location

San Jose, California, USA

Santa Clara, California, USA

San Jose, California, USA andHyderabad, India

San Francisco, California, USA

Sunnyvale, California, USA

Recently Announced Cisco Acquisitions

Provider of wireless local area network (WLAN) systems, including WLAN controllers, access points,management software, and intrusion detection sys-tem capabilities. Its employees will join Cisco’s DataCenter, Switching, and Wireless Technology Group.

Provider of networking software infrastructure designthat will contribute to the evolution of Cisco’s next-generation IP technology. Its employees will join theCisco Routing Technology Group.

Provider of network management appliancesdesigned to simplify device deployment, configura-tion, and management. Its employees will join Cisco’sNetwork Management Technology Group.

Developer of network access control solutions thatanalyze endpoint devices, scan for vulnerabilities,and enforce network access policies. The Perfigoteam will join Cisco’s Security Technology Group.

Provider of security monitoring and managementappliances that can detect, correlate, and mitigatenetwork security threats. Its employees will join theCisco Security Technology Group.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 7: packetQ1-05

6 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

USER CONNECTION

For anyone starting on the path to Cisco certification, the CCNAPrep Center is an online resource available to all candidatespreparing for associate-level CCNA certification exams.

The site provides sample questions, labs and simulations, e-learningmodules, tips and advice from CCNA certified professionals and

other networking experts, candidate success stories, peer discussionforums, and more. For additional training and support, candidatesare encouraged to contact Cisco Learning Partners or companiesthat are authorized by Cisco to administer career certification train-ing courses.

To access the site, you must be a Cisco.com registered user. VisitCisco.com for registration information. For more informationabout the CCNA Prep Center, visit cisco.com/go/prepcenter.

CCNA Help Is Only a Click Away

April 4–5, 2005 April 12–14, 2005April 25–27, 2005

May 3–5, 2005June 7–9, 2005 June 19–24, 2005Sept. 19–22, 2005Nov. 1–3, 2005

Cisco Partner Summit, Vancouver, B.C., Canada Storage Networking World, Phoenix, Arizona, USACisco Powered Network Marketing SummitSan Diego, California, USANetworld + Interop, Las Vegas, Nevada, USASupercomm, Chicago, Illinois, USANetworkers, Las Vegas, Nevada, USANetworkers Australia, Gold Coast, AustraliaNetworkers Korea, Seoul, Korea

CISCO WORLDWIDE EVENTS

cisco.com/warp/public/688/events.html

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 8: packetQ1-05

USER CONNECTION

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 7

Cisco Invests in Japan-Based R&D Center

Cisco opened a new research and development facility in Tokyo,Japan, in February 2005, with plans to invest US$12 million over thenext five years. With a projected staff of 10 engineers, the new centerwill focus on the development of IP-based networking technologies,including routers, Cisco IOS XR Software, IP version 6 (IPv6), IP Multicast, wireless, network security, and quality of service.

Japanese service provider networks carry loads that are five timeshigher than in the US, and broadband access is growing at morethan 500 percent a year. “Products and technologies produced tomeet Japan’s demand for intelligent bandwidth will be robustenough to handle any other market in the world,” says MikeVolpi, senior vice president and general manager of Cisco’s Rout-ing Technology Group. For more information, read a Q&A withVolpi at cisco.com/packet/171_3b1.

Cisco and NetHope Deliver NetRelief Kits to Tsunami Areas

Cisco is working with the NetHope consortium, which includescompanies and nongovernmental associations, to make “NetRe-liefKits” (NRKs) available in the disaster areas stricken by theAsian tsunami of December 2004. The kits make it easy for non-technical people to set up and operate a communications hubwhere normal communications infrastructure is absent ordestroyed. The NRK is a rugged, suitcase-sized, wireless voice anddata communications device, with access to the Internet through amobile or fixed satellite station. For more information aboutNetHope and deployment of the kits, visit nethope.org.

Hewlett-Packard and Cisco Worldwide Support Services

Hewlett-Packard (HP) and Cisco will deliver co-branded supportservices through a single point of contact to help customersmaintain their enterprise networks. The agreement is part ofCisco’s Global Services Alliance program, which was establishedby Cisco in June 2004 to focus on support services.

Initially, HP and Cisco will provide a single source for networksupport and problem resolution, and ready access to Cisco prod-uct knowledge and expertise. Over time, the combination of HPand Cisco offerings will be designed to address the full lifecycle ofservices, from planning through deployment to management andsupport, providing greater consistency worldwide and helpingcustomers with global operations to realize greater return on theirnetwork investments. For more information about the GlobalCertified Partner designation, visit cisco.com/packet/171_3b2.

Networking Academy Program Expands Reach in Vietnam

and the Philippines

The Cisco Networking Academy Program (cisco.com/go/netacad), which teaches students and others how to design,build, and maintain computer networks, will gain access tounderserved areas of Vietnam because of an expanded relation-ship with the United Nations Development Programme (UNDP).

A UNDP-sponsored United Nations Volunteer (UNV) has been

appointed to widen the availability of the Cisco program in smallVietnamese cities such as Cantho, Dalat, Danang, and Hue.UNVs support Networking Academy expansion in remote areasthroughout the Asia-Pacific region. UNVs are working inBangladesh, Cambodia, China, India, Indonesia, Mongolia,Nepal, Sri Lanka, Thailand, and now in Vietnam. For moreinformation about UNVs, visit unvolunteers.org.

AMA Computer University (AMACU) is the first NetworkingAcademy in the Philippines to offer the professional-level CiscoCCNP curriculum. Successful completion of the 280-houradvanced CCNP curriculum will prepare AMACU students forthe CCNP exam, which is a prerequisite for CCNP certification.

“AMACU’s qualification as the first CCNP Academy in thePhilippines will accelerate the growth of a highly skilled work-force that will provide the foundation of the Philippines’ abilityto compete in the global economy,” said Luichi Robles, countrymanager, Cisco Systems Philippines.

First launched in 1997, the Cisco Networking Academy Programnow has 10,000 Academies in more than 145 countries world-wide. For more information about CCNP certification, visitcisco.com/go/ccnp.

Netherlands Cable Operator to Test Internet Speeds

Up to 30 Mbit/s

Cable operator UPC Nederland started field trials in Almere, theNetherlands, with the goal of offering Internet services withdownload speeds of 30 Mbit/s. At these speeds, an average 7-GBdigital movie could be downloaded in 30 minutes compared to 16hours with a 1-Mbit/s cable or asymmetric DSL (ADSL) service.

In 2006 UPC plans to run a trial in Amsterdam with speeds ashigh as 50 Mbit/s. The goal of both trials is to show that thecompany’s fiber-optic cable network is ready to meet futuredemands for high-speed Internet connections. For the Almeretrial, UPC will set the cable modems of 300 subscribers to 30Mbit/s for downloads and 1 Mbit/s for uploads. Various otherspeeds will be tested as well.

For more information about these announcements, visitcisco.com/go/news and enter a relevant search term.

Cisco Technology News from

Around the World

Is There a Museum Piece in Your Network?

Do you have an AGS router, a Catalyst 2500 switch, or any otherantique Cisco products still running on your network? If so, we wantto hear about them. We’re looking for the oldest, continuously run-ning Cisco equipment in a production network across a variety ofproduct series. Visit cisco.com/packet/museum for contest require-ments, a list of the products that qualify, and details on how you canenter the contest.You could be featured in an upcoming issue ofPacket, be included in other Cisco PR activities, or even receive afree upgrade to the latest replacement equipment.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 9: packetQ1-05

As enterprises grow, gaining a competitive advantagemost often entails building strategic partnerships. Oneincreasingly popular way for business partners toexchange information is via extranets.

Organizations use the extranet—a limited part of acompany’s intranet that is extended to users outsidethe company—to exchange data, share product infor-mation, collaborate with other companies, developand implement training programs, and provide oraccess services. Extranets require security and pri-vacy, including such mechanisms as firewall servermanagement, digital certificates or similar means ofuser authentication, and message encryption. Anextranet VPN is a virtual private network thatenables companies to securely share some informa-tion or operations with suppliers, vendors, partners,customers, or other businesses.

Because extranet VPNs allow external traffic to tra-verse the same links as a corporate intranet, enter-prises understandably raise several questions. Forexample, how will routing and data separation behandled? What about address changes? And security?A Multiprotocol Label Switching VPN (MPLS VPN)addresses most of these enterprise concerns.

Routing and Data Separation

An MPLS VPN achieves routing separation in twoways. One way is by assigning each extranet VPN toa Virtual Routing and Forwarding (VRF) instance.Each VRF on the customer router is populated withroutes from a unique VPN, either through staticallyconfigured routes or through routing protocols thatrun between the customer routers.

The second way is by adding a unique VPN identifier(a route distinguisher) to Multiprotocol-BorderGateway Protocol (MP-BGP). MP-BGP exchangesVPN routes between associated extranet edgerouters, which keep routing information in VPN-specific VRFs. Using the route distinguisher ensuresthat routing across the customer intranet networkremains separate for each extranet VPN and sepa-rate from the intranet global routing table.

No Address Changes

An extranet VPN service should not require majorchanges to an enterprise’s internal IP network,desktops, or servers. For cost and security reasons,

enterprises want to retain their existing addressingscheme. IP VPNs allow for overlapping addressspaces and, as such, the hosting enterprise mightneed to provide and control Network AddressTranslation (NAT) services and proper routing.

Segmentation and Encrypted Communications

Enterprises can exercise tradeoffs between securityand cost when provisioning an extranet with a part-ner. In all cases, the enterprise maintains full controlover VPN separation. The enterprise treats theextranet customer as untrusted and accepts only pureIP packets from them. Not only is the extranet traffickept separate from the enterprise intranet network,extranet partners can also be kept separate from eachother. Firewalls and intrusion detection devices maybe used with the VPN in the shared services networkfor host protection as well.

An enterprise has the option of sending encryptedtraffic through a properly configured extranet serv-ice, enabling regulatory compliance and enhancingdata security. Encryption operates between enter-prise routers. MPLS VPN and IP Security (IPSec)encryption work well in combination, but propri-etary or application-level encryption schemes arealso compatible if packet payload is transparent tothe enterprise network.

IP Tunneling

Using IP tunneling technologies, you can build anextranet with all the benefits of MPLS VPN over anIP infrastructure. Tunneling bridges disparate net-work segments. In the case of extranets, tunnelingadds segmentation policies that need to be preserved.When using any tunneling technology, note the maxi-mum transmission unit (MTU) size. Adding tunnelheaders and VPN labels adds size to the IP packets.Because the encapsulation layers add overhead to theoriginal data payload, MTU must be considered.

Besides the IP and higher-level layer payload, youalso need to account for a VPN label and possibly aLabel Distribution Protocol (LDP) label, which areboth 4 bytes in length; a Generic Routing Encapsula-tion (GRE) header, which is 24 bytes; and Layer 2Tunneling Protocol version 3 (L2TPv3), which can beup to 16 bytes in length. This information is relevant

Enterprising Extranets

Providing Enterprise Segmented Extranet Services Using IP-Based VPN

TECH TIPS & TRAINING

By Laure Andrieux, Zaheer Aziz, and James Kline

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 9

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 10: packetQ1-05

when deciding whether fragmentation is needed inthe network and where to perform it.

MPLS VPNs, Extranet VPN Solutions

MPLS VPNs allow the separation of customer addressspace (extranet VPN customers) on the extranet edgerouter (using what would be the normal functionalityof the provider edge, or PE, router). When extranettraffic enters the extranet edge router, a unique VPNlabel is appended to the incoming IP packet, and thepacket is then switched across a tunnel label switchpath (LSP). In this case, the LSP is composed of tun-nels that traverse the enterprise intranet.

The VPN labels, along with VPN routes, are distrib-uted between extranet edge routers using the MP-BGPextensions, and the label is appended to customer traf-fic prior to traversing the core network. Then the IPtunnel header (which replaces the outer label) is usedto route traffic between the enterprise intranet routersuntil the traffic reaches the destination extranet edgerouter. The tunnel IP header and the VPN label areremoved just before sending the traffic to the destina-tion network. Label and tunnel header imposition anddisposition are completely transparent to the extranetcustomer. This service requires that the enterprise isparticipating in the extranet customer routing at theextranet edge-to-enterprise edge demarcation.

Following is a look at two of the options for provid-ing extranet VPN services: MPLS VPN over GREtunnels and MPLS VPN over L2TPv3 tunnels (seefigure, page 11). Both approaches are based on theInternet Engineering Task Force (IETF) RFC 2547.

MPLS VPN over GRE Tunnels

GRE takes packets or frames from one network systemand places them inside frames from another networksystem in a peer-to-peer configuration. GRE consists ofa packet header with components that allow it to iden-tify data for processing when it arrives at the associ-ated peer. These components include an IPv4 tunnelingor delivery header; a GRE header with optional fieldsthat include tunnel key, checksum, and sequencingfields; and the payload (or tunneled Layer 3 packet).

MPLS VPN over L2TPv3 Tunnels

L2TP is primarily used by service providers to deployVPNs directly to their business customers, by ISPs in a

wholesale dial scenario, and by enterprises to supportremote users. L2TP is an industry standard that com-bines components of the proprietary Microsoft Point-to-Point Tunneling Protocol (PPTP) and Cisco Layer 2Forwarding (L2F) protocols.

L2TPv3, currently an IETF draft standard, expandsL2TP to include several new service models. It alsosupports tunneling alternate Layer 2 protocol dataunits (PDUs) rather than just PPP. The primary appli-cation of L2TPv3 is for service providers to consoli-date multiple Layer 2 networks onto a single high-speed IP network infrastructure for operationalsavings, or to allow traditional Layer 3 serviceproviders to offer conventional Layer 2 services with-out building out an entirely separate core. In the con-figuration example on page 11, we will transport theMPLS VPN service over the L2TPv3 tunnel instead ofa Layer 2 service.

Note: Cisco IOS Software Release 12.0.(29.4).S2 wasused for proof-of-concept testing in the followingGRE and L2TPv3 tunnel configuration examples.

Sample Configuration: MPLS VPN over GRE Tunnels

The sample configuration below shows the extranetrouters as MP-eBGP peers using the tunnel interfacesas BGP peers. LDP is not needed in this configuration.If running MP-iBGP, it might be necessary to run LDPon the tunnel interfaces, and transport LDP label willbe needed if the tunnels are not fully meshed. In thisexample, only one side of the tunnel is given. Therouter at the other side of the tunnel would be a mirror of this example.

Enterprise-C-Router#ip cefip vrf extranet-customerdescription extranet customer vrfrd 200:1route-target export 200:1route-target import 300:1!!interface Loopback0ip address 20.1.1.1 255.255.255.255no ip directed-broadcast!interface Loopback1description Tunnel5 source interfaceip address 20.121.121.1 255.255.255.0no ip directed-broadcast!interface Tunnel5ip address 120.120.120.1 255.255.255.0no ip directed-broadcastmpls bgp forwardingtunnel source 20.121.121.1tunnel destination 20.129.129.1!interface Ethernet0/0

10 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

LAURE ANDRIEUX is a network engineer focusing on MPLS VPNsand MPLS network management in Cisco’s Solution EngineeringGroup. She can be reached at [email protected].

ZAHEER AZIZ is a technical leader focusing on IP VPNs in ServiceProvider Solution Engineering at Cisco. He is co-author of the CiscoPress book Troubleshooting IP Routing Protocols. He can be reachedat [email protected].

JAMES KLINE is a network engineer focusing on MPLS networks inCisco’s Solution Engineering Group. He is a CCIE with specializationsin both Routing & Switching and Security. He can be reached at [email protected].

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 11: packetQ1-05

description Interface Facing the Enterprise IP Coreip address 21.20.1.1 255.255.255.0no ip directed-broadcast!interface Ethernet1/0description Extranet Customer Facing Interfaceip vrf forwarding extranet-customerip address 30.1.1.1 255.255.0.0no ip directed-broadcast!router eigrp 200network 21.20.1.0network 20.1.1.0network 20.121.121.0!router bgp 200no bgp default ipv4-unicastbgp log-neighbor-changestimers bgp 10 30neighbor 120.120.120.9 remote-as 300!address-family ipv4no auto-summaryno synchronizationexit-address-family!address-family vpnv4neighbor 120.120.120.9 activateneighbor 120.120.120.9 send-community extendedexit-address-family!address-family ipv4 vrf extranet-customerredistribute connectedno auto-summaryno synchronizationexit-address-family!

Sample Configuration: MPLS VPN over L2TPv3 Tunnels

The following sample shows the extranet routers asMP-iBGP peers using the loopback interfaces as BGPpeers. LDP is not needed when running L2TPv3, sothere is never an additional label. The L2TPv3 end-points will be auto-discovered via tunnel address familyin BGP. In this example, only one side of the tunnel isgiven. The router at the other side of the tunnel wouldbe a mirror of this example.

Enterprise-C-Router#

ip cef

ip vrf l3tunnelrd 200:101!ip vrf extranet-customerdescription extranet customer vrfrd 200:1route-target export 200:1route-target import 300:1!!interface Loopback0ip address 20.2.2.2 255.255.255.255no ip directed-broadcast!interface Tunnel6ip vrf forwarding l3tunnelip address 121.121.121.2 255.255.255.0no ip redirectsno ip directed-broadcasttunnel source Loopback0tunnel mode l3vpn l2tpv3 multipoint!interface Ethernet0/0

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 11

TUNNEL VISIONMPLS VPN over GREtunnels works in a peer-to-peer configuration.The L2TPv3 tunnelingoption expands L2TP toinclude several newservice models.

EXTRANET VPN SERVICES OVER GRE AND L2TPv3 TUNNELS

ExtranetPartner

ExtranetPartner

VRF VRF

VRFC Router C Router

EnterpriseIntranet-IP

EnterpriseIntranet-IP

PE PE

Service ProviderIP WAN orMPLS VPN

SharedServicesNetworkCECE

Extranet Between C Routers ProvidesSegmentation from Enterprise Intranet Transparency

for Extranet Partners to Shared Resources

Between C Routers:MP-BGP PeersMPLS VPN over GREMPLS VPN over L2TPv3

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 12: packetQ1-05

12 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

description Interface Facing the Enterprise IP Coreip address 20.20.2.2 255.255.255.0no ip directed-broadcast!interface Ethernet1/0description Extranet Customer Facing Interfaceip vrf forwarding extranet-customerip address 30.2.2.1 255.255.0.0no ip directed-broadcast!router eigrp 200network 20.2.2.0network 20.20.2.0!router bgp 200no bgp default ipv4-unicastbgp log-neighbor-changestimers bgp 10 30neighbor 20.8.8.8 remote-as 200neighbor 20.8.8.8 update-source Loopback0!address-family ipv4no auto-summaryno synchronizationexit-address-family!address-family ipv4 tunnelneighbor 20.8.8.8 activateexit-address-family!address-family vpnv4neighbor 20.8.8.8 activateneighbor 20.8.8.8 send-community extendedneighbor 20.8.8.8 route-map rewriteNH inexit-address-family!address-family ipv4 vrf extranet-customerredistribute connectedno auto-summaryno synchronizationexit-address-family!address-family ipv4 vrf l3tunnelno auto-summaryno synchronizationexit-address-family!ip classlessip route vrf l3tunnel 0.0.0.0 0.0.0.0 Tunnel6! !access-list 6 permit anyroute-map rewriteNH permit 10match ip address 6set ip next-hop in-vrf l3tunnel

Alternative Solutions for Extranet Services

Following is a brief look at three alternative solutionsfor offering extranet services: VRF-Lite, Carrier Sup-porting Carrier (CSC), and virtual LAN (VLAN)-based extranet.

VRF-Lite. Network segmentation can be provided onthe CE router using the VRF-Lite feature (also referredto as Multi-VRF CE), supported in Cisco IOS Soft-ware Release 12.2(20)EWA and higher. This featureenables the Cisco Catalyst 4500 Series Switch to sup-port multiple VPN routing/forwarding instances in CEdevices. With the VRF-Lite option, it is assumed thatthe enterprise might combine VRF-Lite with an exist-ing MPLS VPN or Frame Relay service using multipleinterfaces/subinterfaces to segment traffic.

With VRF-Lite, logical traffic separation can beextended from service provider PE router to enter-prise CE router. However, both the service providerPE and CE must configure separate interfaces orsubinterfaces, separate VRF contexts, and separaterouting protocols on a per-extranet basis.

Carrier Supporting Carrier. CSC is an attractive solu-tion for offering extranet services at the enterprise CErouter but requires label transport service from theservice provider. The label transport service assumesthat the enterprise has a current MPLS VPN serviceand the service provider supports the CSC deploy-ment. If CSC deployments increase, enterprises canbenefit from extranet provisioning ease because theythemselves act like the MPLS VPN provider.

VLAN-based extranet. The enterprise CE can config-ure separate VLANs for extranets but would have tomanage inter-VLAN traffic using access control lists(ACLs) or policy-based routing (PBR). This becomes aless attractive solution, because once the extranet traf-fic reaches the Layer 3 global routing table, it becomesvery difficult to control. Managing ACLs and PBR inlarge deployments is not an easy undertaking.

◆ ◆ ◆

Cisco offers many solutions for implementing inex-pensive, reliable internetwork connections betweenenterprise global networks and their partners. Thisarticle has provided an overview of how enterprisescan benefit from MPLS VPN solutions to provideextranet services, regardless of how the enterprisesthemselves get WAN connectivity from their serviceproviders.

FURTHER READING

■ IETF RFC 2547 “BGP/MPLS VPNs”cisco.com/packet/171_4a1

■ Designing MPLS Extensions for CE Routerscisco.com/packet/171_4a2

■ MPLS for VPNscisco.com/packet/171_4a3

■ MPLS VPN Carrier Supporting Carriercisco.com/packet/171_4a4

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 13: packetQ1-05

TECH TIPS & TRAINING

ConfigurationCreating Access Control Lists

Our group creates access control lists (ACLs) with asource and destination MAC address as follows:

router(config)#access-list ?

<700-799> 48-bit MAC address access list

access-list 711 permit 0002.7df5.40010000.0000.0000access-list 711 deny 0050.dab7.655c0000.0000.0000access-list 711 permit 0000.0000.0000ffff.ffff.ffff

—Rodrigo J. Mastropietro, São Paulo, Brazil

Including and Excluding Character Strings in

Startup Configurations

In Cisco IOS Software Release 12.0 and later, a nicetrick is to use the +, -, and / characters with the sh runand sh start commands to search for specific strings(or exclude strings) in a configuration. This is similarto “include | exclude” pipe-sentences, but is availablein startup or “live” running configurations. (See the“Reader Tips” in Packet, Third Quarter 2003, atcisco.com/packet/171_4d1, and Packet, SecondQuarter 2004, at cisco.com/packet/171_4d2.

For example, to use include to search for “voice” inthe current startup or running configuration, type:

Router# sh run | incl voicevoice-card 2voice class permanent 1no voice hpi capture buffervoice-port 2/0/0dial-peer voice 123456 voipRouter#

As with include, to exclude strings from output, pipesh run with exclude and the string you want to filter(sh run | excl voice).

With the sh run or sh start commands, if your termi-nal is set to display one page at a time, when the

display stops scrolling at the bottom of the screen usethe “+”, “-”, and “/” characters to search configura-tion lines. For example, type +voice to get the sameoutput as sh run| incl voice:

+voicevoice-card 2voice class permanent 1no voice hpi capture buffervoice-port 2/0/0dial-peer voice 123456 voipRouter#

Type a hyphen (-) to skip lines that contain the stringyou want to exclude. You can add several strings toinclude or exclude, grouping them with the pipe (|)character. Do not allow spaces between the pipes (forexample, -voice|description|line). This feature stillsupports regular expression matching (anchoring,etc.). The forward slash (/) character lets you find thefirst occurrence of the given string. It stops at the firstoccurrence of the string to search for the next linethat contains the string, so to continue searching,type “/” and the string you want to find again.

—Gabriel Zicarelli, Grupo López Léon, BuenosAires, Argentina

Stacking the Cisco Catalyst 3750 Switch

In large-scale deployments, a consistent approach toswitch numbering can help in reducing overall down-time due to scheduled or unscheduled maintenance. Ihave found the following basic, stacking-related con-siderations for the Cisco Catalyst 3750 Switch helpful.

A switch numbering scheme example: Stack membersshould always be numbered from top to bottom, e.g.,in a three-unit stack. First switch (top) should be“switch 1,” second switch (middle) should be“switch 2,” and the third switch (bottom) should be“switch 3.” When staging the stack, switch power onsequence might affect the switch numbering as thedefault number of each new switch is set to “1.” Sub-sequent additions to the stack are allocated the nextavailable number by the stack master. A switch maybe renumbered using the following command:

cat3750(config)#switch 1 renumber 1WARNING: Changing the switch number may result in aconfiguration change for that switch. The interfaceconfiguration associated with the old switch numberwill remain as a provisioned configuration.Do you want to continue?[confirm]Changing Switch Number 1 to Switch Number 1New Switch Number will be effective after next reboot

TIP

TIP

TIP

Reader Tips

14 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

Packet thanks all of the readers who have submit-ted technical tips. Each quarter we receive manymore tips than we have space to include. Whileevery effort has been made to verify the followingreader tips, Packet magazine and Cisco Systemscannot guarantee their accuracy or completeness,or be held responsible for their use.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 14: packetQ1-05

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 15

cat3750(config)#switch 2 renumber 2WARNING: Changing the switch number may result in aconfiguration change for that switch. The interfaceconfiguration associated with the old switch numberwill remain as a provisioned configuration.Do you want to continue?[confirm]Changing Switch Number 2 to Switch Number 2New Switch Number will be effective after next reboot

cat3750(config)#switch 3 renumber 3WARNING: Changing the switch number may result in aconfiguration change for that switch. The interfaceconfiguration associated with the old switch numberwill remain as a provisioned configuration.Do you want to continue?[confirm]Changing Switch Number 3 to Switch Number 3New Switch Number will be effective after next rebootcat3750#show switch neighborsSwitch # Port 1 Port 2-------- ------ ------

1 2 32 3 13 1 2

Interfaces for each switch in the stack would be num-bered as per switch number (also referred as interfaceof a slot number):interface FastEthernet3/0/12switchport access vlan 999shutdowninterface GigabitEthernet1/0/2description IXIA Card 9switchport access vlan 60speed nonegotiate

If you need to upgrade software, do not use the copytftp: flash: command. Instead you can use the follow-ing procedure (steps 1 through 4).

Editor’s note: The new Cisco Network Assistantgreatly simplifies the software upgrade process. It isavailable for free at cisco.com/go/networkassistant.Also, starting in Cisco IOS Software Release12.2(25)SE, a new switch device manager allows easysoftware upgrade via an intuitive Web interface.

Step 1: Verify the flash memory space

cat3750#dir Directory of flash:/ 2 -rwx 736 Mar 1 1993 00:00:51 +00:00 vlan.dat 10 drwx 192 Mar 1 1993 00:14:41 +00:00 c3750-i9-mz.121-19.EA1c 6 -rwx 10018 Aug 12 2004 19:58:47 +00:00 config.text 3 -rwx 1543 Aug 12 2004 19:58:47 +00:00 private-config.text

4 drwx 192 Jul 22 2004 15:27:05 +00:00 c3750-i9k91-mz.122-20.SE 15998976 bytes total (1488896 bytes free) cat3750#

Editor’s note: The above output shows the flashmemory space on the master stack switch. To verifythe flash memory space on the slave switches, use thedir flash[switch#1]: global command. For example,for switch #3 in the stack, the command would bedir flash3:.

Step 2: Note the existing Cisco IOS Software Releaseshow version command

cat3750#sh ver | b SwitchSwitch Ports Model SW Version SW Image------ ----- ----- ---------- --------1 26 WS-C3750-24TS 12.2(20)SE C3750-I9K91-M*2 26 WS-C3750-24TS 12.2(20)SE C3750-I9K91-M3 26 WS-C3750-24TS 12.2(20)SE C3750-I9K91-M

<. . .output truncated. . .>

Step 3: Set up a TFTP server with new image file witha .tar extension (e.g., c3750-i5k91-tar.122-20.SE.tar)

Step 4: Start image download process (preferablyusing a terminal server)

Enough space on flash memory:

cr1162-ch8#archive download-sw /leave-old-swtftp://146.180.60.42/c3750-i5k91-tar.122-20.SE.tarLoading c3750-i5k91-tar.122-20.SE.tar from146.180.60.42 (via Port-channel7):!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!<. . .output truncated. . .>

Not enough space on flash memory. You might needto delete old images files and remove correspondingdirectories:

cr1162-ch8#archive download-sw /overwritetftp://146.180.60.42/c3750-i5k91-tar.122-20.SE.tarLoading c3750-i5k91-tar.122-20.SE.tar from146.180.60.42 (via Port-channel7):!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!<. . .output truncated. . .>

After downloading, the .tar file switch will expand itautomatically and create requisite directories. In thecase of a multi-unit stack, the stack master automati-cally upgrades remaining stack members with newimage. Once installation is complete, the followingmessage should be displayed by the switch:

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 15: packetQ1-05

Installing (renaming): `flash:update/c3750-i9k91-mz.122-20.SE' ->`flash:c3750-i9k91-mz.122-20.SE'

New software image installed in flash:c3750-i9k91-mz.122-20.SE

Installing (renaming): `flash2:update/c3750-i9k91-mz.122-20.SE' ->`flash2:c3750-i9k91-mz.122-20.SE'

New software image installed in flash2:c3750-i9k91-mz.122-20.SE

Installing (renaming): `flash3:update/c3750-i9k91-mz.122-20.SE' ->`flash3:c3750-i9k91-mz.122-20.SE'

New software image installed in flash3:c3750-i9k91-mz.122-20.SE

All software images installed

—Aamer Kaleem, CCIE No. 11443, UBS AG,Chicago, Illinois, USA

TroubleshootingClearing a CLI Session on a Router

Sometimes it is impossible to log into a routerbecause all the vty lines are engaged in a command-line interface (CLI) session. You can clear one CLIsession if you have Simple Network ManagementProtocol (SNMP) write access on the device. The fol-lowing command clears vty 0 on “router” with thecommunity-string “private”: snmpset router private.1.3.6.1.4.1.9.2.9.10.0 i 0.

This simple UNIX script enables you to clear a sessionso that your next Telnet attempt will be successful:

#!/bin/zshif [[ $1 = “” || $2 = “” || $3 = “” ]]thenecho “”echo “\tUsage: $0 IP_address community-string

vty_line_number\n\n”exit

fisnmpset $1 $2 .1.3.6.1.4.1.9.2.9.10.0 i $3

—Alain Moretti, Transpac USC du Midi, Toulouse,France

Troubleshooting LAN Switch Ports on the Cisco

Catalyst Platform

To properly troubleshoot, isolate, and fix LANswitch port issues for Cisco Catalyst 3750, 3550,2970, 2950/2955, 2940, and 2900/3500 XL switchesrunning Cisco IOS Software, use the command:

sh controller Ethernet-controller <interface-number>

This command allows you to demarcate and fix knowncommon LAN device issues and identify whether the

problem is with the cabling or switch port, or whetherit is caused by a faulty network interface card.

If the FCS error fields increment when you use thecommand, you probably have a physical layer prob-lem and need to change the media. Incrementing align-ment errors indicate that the switch port has notprocessed an even number of frames and is unaligned.This is a network interface issue and needs to be solvedby a LAN administrator or help-desk technician.

IOSwitch01#sh controller Ethernet-controller fa0/1

Transmit Receive5755681 Bytes 1335670 Bytes78090 Frames 16070 Frames75520 Multicast frames 19456789 FCS errors1588 Broadcast frames 6011 Multicast

frames0 Pause frames 34 Broadcast

frames0 Single defer frames 0 Control frames0 Multiple defer frames 0 Pause frames0 1 collision frames 0 Unknown opcode

frames0 2-15 collisions 1000 Alignment

errors1 Late collisions 0 Length out of

range0 Excessive collisions 0 Symbol error

frames0 Total collisions 8 False carrier

errors0 Control frames 0 Valid frames,

too small0 VLAN discard frames 0 Valid frames,

too large0 Too old frames 0 Invalid

frames, too small72639 Tagged frames 0 Invalid

frames, too large1 Aborted Tx frames 0 Discarded

framesTransmit and Receive5017 Minimum size frames87837 65 to 127 byte frames1030 128 to 255 byte frames265 256 to 511 byte frames0 512 to 1023 byte frames10 1024 to 1518 byte frames0 1519 to 1522 byte frames

—Major J. Ward III, Hollis, New York, USA

Editor’s note: FCS and alignment errors are two ofthe most common errors seen on an Ethernet port.FCS (Frame Check Sequence) errors are the numberof times that an Ethernet frame was received by theswitch port from the attached device and the cyclicredundancy check (CRC) for the frame was not cor-rect. The FCS check is used to detect corruption in

TIP

TIP

16 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 16: packetQ1-05

the frame. A frame with an FCS error is dropped bythe port that received it on the switch, and the FCScounter is incremented for that port.

Alignment errors are the number of times that anEthernet frame was received by the switch portfrom the attached device and the frame was notbyte-aligned and had a bad FCS. All frames shouldend on an 8-bit boundary (1 byte = 8 bits); other-wise the frame is dropped by the port that receivedit on the switch, and the alignment error counter isincremented for that port.

FCS and alignment errors usually indicate a physicalproblem (cabling, bad port, NIC card, etc.) but canalso indicate a duplex mismatch between the portand the attached device. When the cable is first con-nected to the port, some of these errors might occur.Also, for a switch port configured for half-duplexoperation, Ethernet collisions can result in some ofthese errors being seen by that port.

For descriptions of other counters in the output of showcontroller ethernet-controller, visit cisco.com/packet/171_4d3.

For Catalyst 6000 and 4000 series IOS-based switches,you can use show interfaces counters errors to track FCS(CRC) and alignment errors seen by their ports. Thiscommand is also supported on other IOS-based Cisco

Catalyst switches running Cisco IOS Software Release12.1 or higher.

Troubleshooting Firewall Connectivity Problems

When connectivity problems occur with customer-managed firewalls, customers often assume the prob-lem is the service provider’s network. To find theactual problem, we obtain a list of allowable IP, TCP,or UDP ports in customers’ firewalls.

From the remote router, we use the IOS command tel-net x.x.x.x port_number to establish a session with thedestination server. The Telnet shows an “Open” if it isconnected; if not it just hangs. This helps us prove toour customers that client workstations are possiblyaccessing TCP ports that are blocked by their own fire-walls. You can set the source IP address of your IOSTelnet session by typing ip telnet source-interface Fa0.

—Choy Wai Yew, AT&T Singapore, Singapore

TIP

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 17

Help your fellow IT professionals by submitting your most ingenious technical tip to [email protected]. When submitting a tip,please tell us your name, company, city, and country. Tips are edited for clarity and length.

SUBMIT A TIP

Configure VPN load balancing on the Cisco Content

Switching Module (CSM) in Directed Mode. Using virtualprivate network (VPN) load balancing you can intelligently distribute VPN sessions along a set of VPNconcentrators or VPN headend devices. This configura-tion example takes you through the process step by step.cisco.com/packet/171_4e1

Create a certificate signing request on the Cisco SSL

Services Module. Find out how to create a certificatesigning request (CSR) on the Secure Sockets Layer Module(SSLM) and import the certificate using copy and paste inprivacy-enhanced mail (PEM) format.cisco.com/packet/171_4e2

Troubleshoot Address Resolution Protocol on the Cisco

Content Switching Module. This new tech note, “Under-standing CSM ARP Behavior,” includes information onhow CSM handles issues relating to ARP requests.cisco.com/packet/171_4e3

Configure and troubleshoot the CT3 on the Cisco AS5000

Series. This new document describes how to configureand troubleshoot port adapters, multichannel T3 (plat-forms such as the Cisco 7200 and Cisco 7500 series), andthe channelized T3 Trunk Card (CT3) for the AS5800 andAS5400 series. cisco.com/packet/171_4e4

Recover Cisco Guard and Traffic Anomaly Detector

passwords. Learn how to recover the password of the rootuser in a Cisco Guard or a Cisco Traffic Anomaly DetectorDistributed Denial of Service (DDoS) mitigation appliancewith this new document. cisco.com/packet/171_4e5

Troubleshoot Cisco Unity outbound fax service. The CiscoUnity IP Fax Configuration Wizard enables you to use e-mailto send faxes over the PSTN. Refer to this new document totroubleshoot problems. cisco.com/packet/171_4e6

Tech Tips

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 17: packetQ1-05

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 19

TECHNOLOGY

Looming Security Challenges

Zombies, Trojans, “bots” and worms: What have we wrought?

In June 2004, a large network of zombified PCs, also known asrobots or “bots,” attacked Google, Yahoo, and other major Web-sites, blocking access to those sites for two hours. Securityexperts were able to identify the bot network, or “botnet” thatappeared to be operating and managed to shut it down, stoppingthe attack. However, the attack was just one in what USA Todayrecently described as “wave after wave of infectious programs[that] have saturated the Internet, causing the number of PCshijacked by hackers and turned into so-called zombies to soarinto the millions.” (usatoday.com, September 8, 2004)

Zombie computers are present-day technical versions of themindless corpses that rose from the grave to terrorize the living inthe horror movies of the 1960s. In 2005, these zombies operate incyberspace, proliferating across both private networks and theInternet. Botnets are a prime example of the power and complex-ity of today’s security threats.

Rogue developers create such threats by using worms, viruses, orapplication-embedded attacks. With botnets, for example, roguedevelopers can use worms or application-embedded attacks, thatis an attack that is hidden within application traffic such as webtraffic or peer-to-peer shared files, to deposit “Trojans.” Trojansare small executable programs that are left on a user’s computer(see sidebar, “The Trojan Horse: An Old Concept Revisited,” inthis article). When an unsuspecting user logs on to the Internet(which happens automatically on a cable modem or DSL connec-tion), the bots log into a server to await commands from the“zombie master.” Similar to what occurred in the June 2004 inci-dent, hackers can launch virus attacks that deposit Trojans onthousands of computers, unbeknownst to the computer owners.A zombie master can then use these applications to flood a par-ticular site with packets in a distributed denial of service (DDoS)attack or to generate large amounts of spam (see figure on page 21).

According to a recent report on Internet threats by Symantec, morethan 30,000 computers are “recruited” into botnets every day.

“Botnets illustrate just how complicated and distributed the net-work threat environment has become,” says Scott Pope, a prod-uct marketing manager in the Security Technology Group atCisco. “And, unfortunately, the situation continues to worsen ashackers have grown more sophisticated and creative in theattacks they generate.”

This combination of attack techniques––a virus or worm used todeposit a Trojan, for example––is relatively new and is known asa blended attack. A blended attack can also occur in phases: aninitial attack of a virus with a Trojan that might open up an unse-cured port on a computer, disable an access control list (ACL), or

disarm antivirus software, with the goal of a more devastatingattack to follow soon after.

In its 2004 semi-annual Internet Security Threat Report (cisco.com/packet/171_5a1), Symantec’s analysis of malicious code—worms,viruses, Trojans, backdoors, and blended threats––indicates thatmalware is increasingly being designed to steal personal data, par-ticularly financial information and passwords. This data-stealingtrend contributes to making all firms––but particularly banks ande-commerce companies handling payment transactions over theInternet––ever more vulnerable to compromise.

Evolving Security Landscape

Changes in network architectures and evolving threats create newsecurity challenges. As well, the concept of the network perimeteris changing. In the past, users could only access the networkthrough a few ingress or egress points—usually where the Inter-net connected to the enterprise network. Enterprises stackedsecurity at the Internet perimeter using firewalls and intrusiondetection systems (IDS).

By contrast, many more means of gaining entry to the networkexist today. The perimeter has been extended and distributed, sosecurity must be applied at each of these new ingress and egresspoints to avoid damaging threats, thus complicating security

By David Barry

Ric

card

o S

tam

pat

ori

Continued on page 21

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 18: packetQ1-05

architectures. Virtual private networks (VPNs), forexample, allow enterprise users remote access to thecorporate network and are much more widely usedthan just a few years ago. Whereas previously enter-prises might have insisted that VPN software run on aspecific enterprise-configured computer, today users runVPNs from their own PCs or even from kiosks at copycenters or other businesses. This phenomenon allowsmany more entryways to the enterprise network andpresents a significant challenge to IT departments. Isthe computer equipped with virus protection? Is thevirus software current? Did a worm become embeddedin the computer?

Wireless LANs (WLANs) pose additional securitychallenges. Users operating on an unsecured wirelessnetwork at a local coffee house may be unaware thata rogue PC, also using the same wireless subnet, isdepositing a virus on the PC. When that PC is laterdocked into the corporate network, the virus couldgain entry to the network.

At the same time, as the network is becoming morevulnerable to attack because of the expanding num-ber of ingress and egress points, the threats them-selves are changing. In addition to Trojans and bot-nets, newer, even more dangerous threats lurk. Twoof the most troublesome are flash threats and self-mutating worms.

Flash threats are so named because of the speed withwhich viruses or worms can spread. In 1999, a virusdubbed “Melissa,” one of the earliest and most wide-spread viruses at the time, took 16 hours to spreadglobally, according to Network Associates Inc. InJanuary 2003, the Slammer virus managed to infectmore than 90 percent of the vulnerable hosts world-wide within 10 minutes using a well-known vulnera-bility in Microsoft’s SQL Server. New viruses in thecoming months and years are expected to spread evenfaster. According to Pope, “It may be possible that anew type of virus will be able to infect millions ofhosts within 60 seconds. So whatever defenses wecreate must be able to identify the threat and respondmuch more quickly than ever before.”

The other looming threat is the self-mutating worm.Today’s worms are relatively unintelligent. They areprogrammed to follow a specific set of instructions,such as to infiltrate one machine through a specific portand once on the machine compromise it in some way,for example, causing a buffer overflow and planting aTrojan. If anything interferes with these plannedinstructions, the worm lacks the ability to adjustand dies.

Now, however, rogue developers are adding intelli-gence and logic to worms so that if they can’t com-plete a specific task worms can mutate and pursueother lines of attack.

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 21

DDoS VULNERABILITIES

Attack Zombies:• Use Valid Protocols• Spoof Source IP• Are Massively Distributed• Launch a Variety of Attacks

POP

Peering Point

Access Line

Provider Infrastructure:• DNS, Routers, Links

Entire Data Center:• Servers, Security

Devices, Routers• E-Commerce, Web,

DNS, E-Mail, etc.

Multiple Threats and Targets

AttackedServer

ISP BackboneAttack Zombies

Attack Zombies

Attack Zombies

ZOMBIE ATTACK Botnetsare a prime example ofthe power and complexityof the security threatsprevalent today.

Security Challenges, Continued from page 19

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 19: packetQ1-05

“The security dilemma is like Moore’s Law inreverse,” says Pope. “Whereas Moore’s Law postu-lates that processor performance will double every 18months while costs will decline dramatically, securityis moving in the opposite direction—networks arebecoming less secure while the cost to defend them isincreasing.”

This prognosis is supported by mi2g (mi2g.org), aresearch firm in the UK that specializes in computersecurity. Mi2g reports that the economic damagefrom malevolent network security attacks reachedsomewhere between US$157 billion and US$192 bil-lion worldwide in 2004.

Combating New Threats

The current security defense paradigm is to deploymore and more of the existing security technologiesthroughout every segment of the network. Thisincludes firewalls and ACLs to block access and per-form application inspection, intrusion protection sys-tem (IPS) technology to provide very granular trafficinspection and identify known threats, encryptionsoftware to counter eavesdropping, anomaly detec-tion to detect worms or DoS attacks, and antivirussoftware to battle viruses. Many of today’s securitytechnologies were developed to perform their specificfunction with little context of the overall networkthreat environment. Operating alone, however, thesetechnologies are less effective in stopping the newerattacks, as well as the changing ways in which usersaccess networks, because of the “security gaps” thatexist between each technique’s capability.

With the increased complexity of threats, such as theblended threats that use a combination of techniquesto disrupt networks, security technologies must oper-ate in a coordinated fashion to stop attacks and bet-ter control network activity and applications.

Unfortunately, over the years, many companies haveaddressed nagging security concerns by constantlyadding devices and software to address each particu-lar problem. This has led to separate antivirus protec-tion, firewalls, VPNs, and intrusion prevention.

While addressing short-term needs, this approachcreates an entirely new and bigger problem: manag-ing multiple systems that operate independently ofone another. As more advanced threats emerge, Popeand many others believe that network security mustbecome more holistic; security technologies must actin coordination to detect and defend against moresophisticated threats.

“There is a growing need for devices that can assem-ble the puzzle pieces and lock down the gaps thatexist in conventional network security systems,”Pope explains. “Today, a huge problem exists withthe misclassification of threats and organizations tak-ing inappropriate action, or even worse, missingthreats altogether.”

Adaptive Security for a Changing World

Transforming chaos into clear and manageable secu-rity policy is essential, which is why future networksecurity systems need to focus on convergence andconsolidation. In network security, a proactiveapproach is critical. The idea is to accurately identifyand stop attacks as early and as far from the destina-tion host as possible, while simultaneously simplify-ing the security architectures required to do this.Converging numerous security functions into a singleadaptive device or system enables these combinedfunctions to operate as a coordinated defense (insteadof silos) that stops a broader range of attacks andgreatly reduces the number of diverse devices thatmust be deployed, thereby simplifying security designand management.

Historically, firewalls have generally been consideredfairly simple devices, but they are effective at whatthey do: either block a packet or let it through basedon Layer 3 and Layer 4 information and sessionstate. They can provide some level of applicationinspection but do not perform the detailed inspectionof some other technologies. An IPS device can pickup where a traditional firewall leaves off by peeringmore deeply into a packet’s contents to see whetherthe data within conforms to company policy. But IPSdevices lack the breadth of mitigation actions andresilience of a firewall that network security adminis-trators require. Combined, however, a firewall and anIPS device can be more effective than either one by

22 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

The Trojan Horse: An OldConcept Revisited

In network security parlance, a Trojan horse is adestructive program that masquerades as a benignapplication. Unlike viruses, Trojan horses do not repli-cate themselves but they can be just as destructive.One of the most insidious types of Trojan horse is aprogram that claims to rid your computer of virusesbut instead introduces viruses onto your computer.

The term comes from the Greek story of the TrojanWar, in which the Greeks give a giant wooden horseto their foes in the city of Troy, the Trojans, ostensiblyas a peace offering. But after the Trojans drag thehorse inside their city walls, Greek soldiers sneak outof the horse’s hollow belly and open the city gates,allowing their compatriots to pour in and capture Troy.

Source: webopedia.com

Continued on page 87

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 20: packetQ1-05

TECHNOLOGY: Wireless

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 23

It’s a widely held belief that most network accesseventually will be untethered. Personal digital assis-tants (PDAs), cell phones, laptops, and IP-basedappliances will all make use of radio technology forconnecting to the network. The best solution willstem from a combination of wireless LAN radiosbased on IEEE 802.11 technologies for high per-formance in a local area, such as a hotel, airplane,or office building, and a mobile radio service forubiquitous access when on the move (wirelessWAN). This common, seamless blending of wirelessLAN/broadband and mobile phone services is calledfixed-mobile convergence.

The mobile radio options include CDMA2000 andits high-speed data overlay EV-DO (evolution-dataoptimized), and GSM/UMTS with its high-speed dataoverlay HSDPA (high speed downlink packet access).In addition to these options, there are two newmobile technologies coming out of the IEEE that willsoon make their way to the market. They are knownas 802.20 and 802.16 (WiMAX).

There are a number of other mobile data technologiesin use, including General Packet Radio Service(GPRS), EDGE, CDMA 1x, and UMTS, which carry

voice and data together on the same RF carrier; how-ever, this is not the most advantageous data solutionin terms of spectral efficiency, because the needs ofvoice are very different from the needs of data. Thenew high-performance radio options put voice on oneRF carrier and data on another.

The benefits of fixed-mobile service convergence forend users are better connectivity by always utilizingthe best available radio signal for that time and place.This approach is especially beneficial when using amobile phone in-building, because that is where Wi-Fiis at its best and where mobile signals can sometimesbe at their weakest.

Among the benefits of fixed-mobile service conver-gence for mobile operators is that it allows them topick up a lot of the in-building minutes that often goto wireline operators, thereby accelerating fixed-mobile substitution. It also provides a very strongresponse to the voice-over-broadband providers thatare showing up in all geographies. These providersuse voice over IP (VoIP) over broadband to pick upthe in-building minutes, and they do it at a muchlower price point than do traditional operators. The

Fixed-Mobile Convergence

Bringing Wireless LAN and Wireless WAN Radio Access Technologies Together for a Seamless Service Offering

By Steve Hratko

A TELECOM PERFECTSTORM Several factorson the mobility andbroadband fronts arecoming together to fuelthe trend toward fixed-mobile convergence.

FIXED-MOBILE CONVERGENCE

More than 1 BillionMobile Phones in UseWorldwide and Growing

More than 130 MillionBroadband LinesWorldwide and Growing

Strong Desire Among Many Users to Substitute Their Wireline Phone with Mobile

WLAN Momentum inEnterprises, Homes,and Hotspots

Fixed-MobileConvergence

Wi-Fi

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 21: packetQ1-05

dual-mode phone is a great response to this threatbecause it provides voice over broadband with fullmobility. The bottom line for operators is a muchbetter user experience, which should improve theircompetitive position and reduce churn.

Stitching Together Different Radio Access Technologies

Mobile operators will use a variety of approaches toallow the different radio access technologies tocooperate in delivering a converged service offering.These include:

■ Unlicensed Mobile Access (UMA) is a new Layer 2technology ideally suited to offering seamless voiceservices using the mobile operator’s mobile switchingcenter (MSC) for call control over a GSM or broad-band IP access network. With a broadband IP net-work, the GSM voice signaling and bearer is tunneledacross the IP network and back to the mobile oper-ator’s domain. As the user moves between Wi-Fi andGSM coverage, the network will seamlessly hand offthe call. With a properly engineered IP network, theuser experiences no service degradation. This tech-nology is especially suited to deployments where cel-lular coverage needs to be supplemented within-building Wi-Fi coverage, and could start to emergein the next 12 to 18 months.

■ Mobile IP is a Layer 3 technology ideally suited tolaptop-based data services (no voice call controlrequired). Operators such as Swisscom Mobile(swisscom-mobile.ch) are already offering servicesthat make use of tri-mode PCMCIA cards that sup-port Wi-Fi, GPRS, or UMTS radios for connectivity.The laptop selects the best available radio signal, andMobile IP enables seamless handoff as the usermoves across different radio coverage areas. Thestrength of Mobile IP is that it allows the laptop tokeep its IP address as the user moves about. Thistechnology is readily available, and deployments existin many parts of the world.

■ Session Initiation Protocol (SIP) application-layermobility is the future direction for many of theworld’s service providers. It will enable support forreal-time multimedia service in the all-IP world ofintelligent endpoints. One of the great advantages ofusing SIP for service convergence is that it allows theuser to transfer an application session between devices.For example, a session could be initiated on a laptopin the home, passed to a PDA as the user leaves homeand gets into his car, and passed back to the laptopwhen the user reaches the office. SIP’s requirement forreal-time, IP-based multimedia does necessitate sub-stantial investment in the public wireless networks andso will likely roll out over many years.

Stitching together a combination of different radioaccess technologies into a seamless service offering is

technically challenging, and so it is worthwhile totake a look at just why this undertaking is necessary.

Wireless LANs

The dominant technology for wireless LANs is basedon the IEEE 802.11 standard. This technology iswidely deployed, cost effective, fast, and uses unli-censed spectrum. The latter has significant implica-tions on how the technology can be deployed—andunlicensed doesn’t mean unregulated. The use ofunlicensed bands puts limitations on the amount ofpower that an 802.11 radio can emit. Higher poweroutput risks interfering with other users of that band.

As such, this technology is primarily being used tosupport wireless LAN services. These services caninvolve a single access point in a coffee shop or alarge number of access points to cover an airport or ahot zone in a downtown area.

Wireless LANs will typically have a performanceadvantage over mobile services. The reasons for thisinclude the simple physics of radio waves. RF signalstrength drops off as the square of the distance (andeven faster in some instances). Therefore, the closerusers are to the access point the stronger the signaland the higher the performance of the service. Publicwireless LANs are usually found in heavily traffickedareas (hotels, airports, and convention centers), andthey only need to propagate a signal a few hundredfeet. A mobile wireless service must be able to propa-gate signals over many tens of kilometers.

Another advantage wireless LANs have over mobileservices is in the channel width of the carrier. WirelessLANs operate in higher frequency bands and use widerchannels. Today’s systems use 20-MHz channels, andthe future will most likely include both wider and nar-rower channel options. Wider channels support muchhigher data rates. While the higher frequency bandsdon’t penetrate structures as well as cellular bands do,this can be an advantage when using unlicensed fre-quencies because it helps limit interference.

Wireless WANs

Conversely, wireless WAN (mobile) systems operatein lower frequency bands and with narrower chan-nels. Narrower channels mean lower data rates, pri-marily due to the economics of RF spectrum. Lower

24 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

STEVE HRATKO is manager of new prod-uct development in the Mobile WirelessGroup at Cisco. With more than 20 years ofexperience in the industry, he has workedextensively with enterprises and serviceproviders (primarily mobile operators) todevelop voice and data opportunities. Hecan be reached at [email protected].

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 22: packetQ1-05

frequency spectrum is much more valuable thanhigher frequencies and is thus auctioned off in nar-rower channel widths.

For mobile applications, the optimal frequencies arebelow 1 GHz. In fact, various parts of the world haveenjoyed success with mobile services operating at 450MHz, where one cell tower can cover the same areaas more than a dozen towers operating at 1.9 GHz(there is a lot of variability here depending on ter-rain). In addition to greater propagation ranges, thelower frequencies can also pass through structuresmore effectively to reach users deep inside buildings.This is very important to operators and subscriberswho want ubiquitous connectivity.

Operators of mobile wireless networks face a chal-lenging decision regarding how to evolve their net-works to support high-speed data services. It isanticipated that these data-oriented networks will beimplemented as overlay networks using dedicated RFspectrum, e.g., using RF carriers devoted to HSDPA,EV-DO, or IEEE 802.16. If high-speed data weremade to share RF spectrum with voice, this coulddegrade the spectrum’s ability to support business-critical voice traffic.

All of the data-oriented mobile wireless technologies(HSDPA, EV-DO, 802.20, and 802.16) will offersomewhat similar performance on a bit/sec/Hz basis.As a general rule, users can expect to see about 500 to600 Kbit/s on the downlink and 100 to 200 Kbit/s onthe uplink. The numbers will vary widely dependingon such variables as distance from the cell tower, load-ing on the tower, terrain, and user movement/speed.These rates are only rough approximations and willimprove as the technology evolves.

A Closer Look at 802.16 for Mobile Wireless

Of the various mobile wireless technologies, IEEE802.16 (also known as WiMAX) has been getting sig-nificant attention—a result of successful marketing bythe WiMAX Forum, strong support from merchantchip vendors such as Intel, and participation from allof the major Radio Access Network (RAN) vendors.

WiMAX originated as a fixed wireless technologythat could be used in microwave backhaul applica-tions as well as for fixed wireless access. WiMAX hasrecently begun adding support for mobility.

The primary advantages of WiMAX-based solutionsinclude the following:

■ Very reasonable intellectual property rights licensingthat comes with the IEEE’s reasonable and non-discriminatory (RAND) licensing policy

■ A strong marketing organization (WiMAX Forum)devoted to promoting the technology

■ Intel’s support, which should translate into inexpen-sive mobile client devices as WiMAX technology isintegrated into laptops and PDAs

This last point is worth emphasizing, because the costof the mobile client device is a considerable part ofthe cost of a mobile wireless service and often mustbe subsidized by the mobile operator.

The primary disadvantage of WiMAX technology isthat true standards-based mobile network deploy-ments will probably not occur until at least 2006. Inthe meantime, solutions based on EV-DO and HSDPAare becoming available. Markets for WiMAX tech-nology include the following:

■ Microwave backhaul—The genesis of WiMAX,much of this market centers on backhauling voicefrom cell towers, which is typically done at very highfrequencies (>10 GHz) using line-of-sight radios. Thevendors in this market all have proprietary solutions,and a standard should reduce costs.

■ Fixed wireless access—This market is fairly small andfocused on areas lacking DSL or cable service. Fixedwireless has had trouble competing with wired solu-tions, when these solutions are available. WiMAXhas the potential to drive fixed wireless technologyinto laptops and PDAs and make it portable. Userscan then enjoy a wireless DSL service that followsthem as they move about. But this starts to sound alot like a mobile service.

■ Huge mobile market—Worldwide mobile operatorcapital expenditures exceed US$80 billion per year,and the client device business is even bigger. IfWiMAX can succeed as a high-speed mobile dataoverlay, it will drive the volumes that will help bringdown the cost of the technology for all applications

WiMAX will not be a viable competitor to Wi-Fi inthe LAN. It is a WAN technology, and it will competewith the other WAN technologies.

◆ ◆ ◆

Fixed-mobile convergence will be one of the dominanttrends in the service-provider market over the nextdecade. It will involve the use of at least three differentservice convergence architectures (UMA, Mobile IP,and SIP) and a variety of radio technologies. IEEE802.11 and extensions to this standard will be thedominant technology in the LAN. In the wirelessWAN, a variety of different mobile solutions will bedeployed, including HSDPA, EV-DO, and WiMAX.All three should do very well going forward.

You bet, it’s going to become a wireless world.

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 25

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 23: packetQ1-05

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 27

Multiprotocol Label Switching virtual private network(MPLS VPN) introduced a peer-to-peer model thatenables large-scale IP VPN implementations. Thismodel greatly simplifies routing and manageability forthe VPN customer and the service provider while guar-anteeing proper isolation between VPNs. To implementthis model, MPLS VPN relies on extensions to existingIP routing protocols and an MPLS transport network.Cisco MPLS VPN over IP, supported in Cisco IOSSoftware Release 12.0(28)S and higher, reuses the samefunctionality as MPLS VPN, but replaces the MPLStransport with an IP transport. VPN traffic is carriedby an IP tunnel instead of an MPLS Label SwitchedPath (LSP). This feature enables MPLS VPN serviceson IP networks that have not been enabled with MPLS.

Applications, Services, and Architecture

Cisco MPLS VPN over IP retains the same applicationand service characteristics whether implemented overan IP or MPLS backbone. For example, an organiza-tion can use this technology to segment an IP networkto support different groups within its structure or toprovide a private IP service to other parties. Such seg-mentation would support overlapping addresses andflexible traffic forwarding topologies. In anotherscenario, a network engineer could use this technol-ogy to build a centralized server infrastructure thatcan be shared across multiple VPN instances.

Cisco MPLS VPN over IP brings new application andservice opportunities for providers and subscribers ofVPN services. An example: A provider of MPLS VPNservices can extend the reach of its offering to net-works that are not MPLS-enabled using an inter-autonomous system configuration. Similarly, twoproviders can make peering agreements for their MPLSVPN services even if IP transport is used. As anotherexample, MPLS VPN subscribers can partition theirVPN service to create their own internal VPN services.This application brings increased flexibility in theimplementation of hierarchical VPN configurationsbecause little coordination is needed between sub-scriber and provider. Figure 1 shows two exampleapplications using Cisco MPLS VPN over IP.

Cisco MPLS VPN over IP extends the original MPLSVPN architecture with a collection of multipoint IPtunnels and a separate address space. Each provideredge (PE) has one multipoint tunnel interface thatconnects the PE to all other PEs that are part of theVPN service. The tunnel forwards the VPN packetsto the appropriate destination PE making VPN pack-ets transparent to intermediate nodes. Each PE auto-matically discovers other PEs reachable through thetunnel (i.e., tunnel endpoints).

TECHNOLOGY: Security

Cisco MPLS VPN over IP

Extending MPLS VPN to Operate over IP Networks—With the SameOverall Architecture and Service Experience

By Santiago Alvarez

EXAMPLE APPLICATIONS USING CISCO MPLS VPN OVER IP

IP IP/MPLS

PE

CE

PE

PE

CE

PE

CE

PE

CE

IP(VPN A)

IP(VPN A) IP

(VPN B)IP

(VPN B)

IP/MPLS

IP(VPN A)

Hierarchical VPNVPN ServiceExtension

PE

FIGURE 1 Shown are two example applicationsusing Cisco MPLS VPNover IP: VPN serviceextension and hierarchi-cal VPN.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 24: packetQ1-05

The PE discovery process uses simple extensions toBorder Gateway Protocol (BGP) multiprotocol thatbuild on top of the BGP extensions already presentfor any type of MPLS VPN. A separate address spacefor the multipoint tunnels provides isolation for theVPN traffic. This architecture retains the same scala-bility characteristics as a classic MPLS VPN servicewhile it is extensible to multiple IP tunneling tech-nologies. See Figure 2.

Traffic Forwarding and Encapsulation

The basics of Cisco MPLS VPN packet forwarding areindependent of the backbone transport choice (MPLSor IP). In both cases, VPN traffic is kept separatewithin a PE by using Virtual Routing and Forwarding(VRF) instances for each VPN the PE supports. How-ever, packet encapsulation varies according to thetransport network in Cisco MPLS VPN. There are twoencapsulation components when using an IP trans-port: a tunnel header and a VPN header. The tunnelheader transports the packet to the egress PE while theVPN header identifies the appropriate VPN packetprocessing at that location.

The current implementation of Cisco MPLS VPN overIP uses Layer 2 Tunneling Protocol version 3 (L2TPv3)as the IP tunneling technology. The tunnel header usesthe L2TPv3 Session ID field to identify the packet asan IP VPN packet requiring MPLS VPN processing,and uses the Cookie field to provide spoofing protec-tion. The last part of the encapsulation, the VPNheader, uses a VPN label identical to that used forMPLS VPNs over an MPLS transport. Figure 3 showsan encapsulation comparison of an MPLS VPN servicebeing offered over different transports.

L2TPv3 provides intrinsic protection for the VPNtraffic against external attacks. A malicious usermight attempt to inject packets into a VPN by sending

VPN-encapsulated packets toward a PE. This type ofattack is generally prevented when using an MPLStransport by rejecting MPLS packets coming fromVPN subscribers on customer-facing access interfaces.When implementing MPLS VPN over an IP transport,PE devices are generally more vulnerable to IP spoofingattacks. Network boundaries or the PEs themselvesrequire special configuration and extra processing(e.g., access control lists, or ACLs) to identify andblock spoofed VPN packets. L2TPv3 thus provides itsown spoofing protection as close to the customer aspossible by incorporating strong spoofing protectiondirectly within the PE. So, with or without IP ACLs,L2TPv3 prevents external spoofing attacks on a givenVPN because every PE forwards packets using a pre-signaled, cryptographically random 64-bit Cookie.

A successful blind spoofing attack against a deploy-ment of Cisco MPLS VPN over IP would require morethan 6000 years to accomplish at foreseeable attackrates (100 million pps). A malicious user would needto know the IP addresses of the ingress and egress PE,the L2TPv3 Session ID and Cookie, plus the VPNlabel, to inject traffic into a VPN from the outside. Theeffort required to guess a random (64-bit) L2TPv3Cookie value rules out the possibility of a successfulattack. The other fields provide marginal incrementalprotection beyond what the L2TPv3 Cookie offers,because they generally cannot be chosen in a crypto-graphically random manner and are not large enoughto inhibit a determined attacker guessing values.

MPLS VPN could use other IP tunnel encapsulationssuch as MPLS over IP or Generic Routing Encapsula-tion (GRE) when a non-cryptographic solution isrequired. An MPLS VPN implementation using a plainIP tunneling encapsulation (MPLS over IP) would bethe simplest but most susceptible. Assuming a mali-cious user has discovered the source and destination IPaddresses for the PEs, this user only needs to guess avalid VPN label (20 bits). A breach could be expectedin seconds even at low attack rates (thousands of pps).

A second alternative involves using the GRE proto-col, which has a reserved key (32-bit) field thatremains undefined. If this key were used in a mannersimilar to the L2TPv3 Cookie (e.g., defined to befilled with a cryptographically random value), itwould still provide inadequate anti-spoofing protec-tion. A breach would be possible in a matter of hoursat relatively low attack rates (less than 12 hours at

28 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

NETWORK LOGICAL VIEW USING CISCO MPLS VPN OVER IP

PE2

PE5

PE4

PE3

PE1

PE6

IP

FIGURE 2 A logical viewof a network using CiscoMPLS VPN over IP.

SANTIAGO ALVAREZ, CCIE No. 3621, is a technical marketing engineer inCisco’s Internet Technologies Divisionand focuses on MPLS and QoS technolo-gies. He has been a regular speaker atNetworkers and a periodic contributor to Packet. He can be reached at [email protected].

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 25: packetQ1-05

100,000 pps). As such, GRE would add little value inthis application and bring unnecessary overhead withmyriad optional fields to check and verify.

VPN Route Distribution, Tunnel Endpoint Discovery

MPLS VPN uses the same mechanisms for VPN routedistribution regardless of the backbone transport (IPor MPLS). However, VPN route resolution operatessomewhat differently in Cisco MPLS VPN over IPand MPLS VPN over MPLS. MPLS VPN, in general,requires that PEs perform a recursive route lookup onBGP next hops when an incoming VPNv4 BGPupdate is processed. When an MPLS backbone ispresent, the PE is expected to match the next hopwith an existing LSP. When an IP backbone is pres-ent, the PE is expected to match the next hop with anexisting tunnel endpoint.

A successful match selects the multipoint tunnel asthe output interface for the packet. This processguarantees that the packet will be appropriately for-warded through the tunnel and with the correctencapsulation. To achieve proper resolution, theBGP next hop is resolved in the separate addressspace associated with the tunnel. Otherwise, resolu-tion would be attempted against the global routingspace in search of an LSP that would not exist.

Cisco MPLS VPN over IP provides automatic tunnelendpoint discovery and signaling of tunnel parame-ters. Each PE needs to know which other PEs (i.e.,endpoints) are reachable via the multipoint tunnelbefore proper VPNv4 BGP next hop resolution cantake place. In addition, each PE needs to know theL2TPv3 Session ID and Cookie that other PEs expect,so VPN packets can be encapsulated appropriately.Manual configuration of this information is not scal-able; as the number of PEs increases, the simplicity

of the tunnel’s multipoint nature is destroyed.

PEs take advantage of the existing Multiprotocol BGP(MP-BGP) infrastructure to distribute tunnel endpointinformation. Cisco MPLS VPN over IP defines a newtunnel address family extension in MP-BGP. Thisaddress family is used to signal L2TPv3 tunneladdress, Session ID, and Cookie. L2TPv3 is usedexclusively as an encapsulation mechanism. The nativeL2TPv3 control plane is not employed. The opera-tional and processing impact of this extension ismarginal given that MP-BGP is already required todistribute VPNv4 route information. In contrast,when MPLS is used as transport, endpoint discovery istied to VPNv4 advertisements and there is no signalingof encapsulation type (MPLS) and its (LSP) parame-ters. For more on the tunnel endpoint informationlearned via MP-BGP, visit cisco.com/packet/171_5c1.

◆ ◆ ◆

Cisco MPLS VPN over IP uses L2TPv3 as the IP tun-neling technology, offering inherent anti-spoofingprotection that IP alone and GRE both lack. Controlplane operation is extended to support tunnel end-point discovery and VPNv4 next hop resolutionthrough a tunnel. With Cisco MPLS VPN over IP,MPLS VPNs can be deployed over any IP network ina scalable, secure manner today.

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 29

ENCAPSULATION COMPARISON

CE1 CE2IP/

MPLSIP

L2TP

IP

IP

IP(VPN)

PE1 PE2 CE1 CE2PE1 PE2

TunnelHeader Session Id

Cookie

src add

dst add

src add

dst add

src add

dst add

src add

dst add

src add

dst add

src add

dst add

data data data data data data

IGP LabelVPN LabelVPN Label

Tunnel src addTunnel dst add

FIGURE 3 Side-by-sideencapsulation compari-son of an MPLS VPNservice being offeredover an IP network andover an MPLS network.

FURTHER READING

■ Cisco MPLS VPN over IP Documentationcisco.com/packet/171_5c2

■ BGP/MPLS IP VPNs over L2TPv3 IETF Draftcisco.com/packet/171_5c3

■ Encapsulation of MPLS over L2TPv3 IETF Draftcisco.com/packet/171_5c4

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 26: packetQ1-05

IF YOUR ENTERPRISE lacks a comprehensive strategyfor using its IT systems to optimize businessresilience, you’re not alone. Business resilienceincludes strategies for business continuance—main-taining operations during and after a disruption—butalso improves the organization’s overall ability to doits business. It refers to the operational and techno-logical readiness that prepares organizations to makedaily operations efficient and cost-effective, respondquickly to opportunities with the potential toincrease competitive advantage, and react appropri-ately to unplanned events.

Enterprises need agility to roll out new applications,react to market changes and competitive threats, sup-port business processes, and communicate withemployees, partners, suppliers, and customers. TheIT resources many enterprises rely on today includenot only the data center, but also the company’s LANinfrastructure, storage area network (SAN), and theWAN that interconnects all locations, applications,and users. Successful business operation depends onthe continuity of all of these systems. Because every-thing upon which a business depends is part of aninterconnected system, the entire system must beresilient. Therefore, a business resilience strategytakes into account how IT systems interact with eachother. “You can’t just look at point products or singlesystems,” says Glen Fisher, manager of the EnterpriseMarket Management Group at Cisco. “Businessresilience is holistic. You have to consider how all ITsystems interoperate to achieve your goals for busi-ness agility and continuity.”

Cisco identifies six components in a business resiliencestrategy: network resilience, applications resilience,communications resilience, workforce resilience,security, and network management.

Network Resilience

As a strategic business asset, the network is the foun-dation for business activities and communicationsthat translate to revenue. Network resilience is theresult of deliberate design, implementation, and oper-ational practices using an integrated architecture sup-ported by lifecycle services to attain a flexible, secureinfrastructure that maintains connectivity, optimizesnetwork performance, and delivers intelligent serv-ices during ordinary and atypical circumstances.

Network resilience begins with a high-availabilitynetwork, which integrates network domains andtechnologies into an interoperable system that auto-matically reroutes around failures and ensures consis-tent conformity to security policies.

Some enterprises deploy lowest-cost, point-productsolutions from several vendors without realizing howthat approach diminishes their ability to deployfuture products and services, and without countingthe cost of network downtime. Robbing the organi-zation of the benefits of system-wide network intelli-gence can increase the complexity and expense ofnetwork operations.

30 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

HOW RESILIENT

BUSINESS?IS YOUR

By GAILMEREDITHOTTESON

NETWORK STRATEGIES THAT ENHANCE OPERATIONS AS THEY PROTECT YOUR BUSINESS

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 27: packetQ1-05

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 28: packetQ1-05

Today many more enterprises are deploy-ing a resilient network, which providesflexibility to adapt an infrastructure tofuture services and applications with mini-mal disruption. One emerging technologyis radio-frequency identification (RFID),which facilitates inventory management inthe shipping and warehousing industries.RFID technology may be adapted to futureapplications in other industries. Enter-prises that already have a resilient networkcan easily incorporate RFID systems whenthey need them. A resilient network hasend-to-end intelligence that segments(through virtual LANs, virtual SANs, orWANs), prioritizes (through quality ofservice), and protects (through encryp-tion) RFID traffic without requiring majorupgrades, just configuration of existingfeatures. To facilitate adaptation to emerg-ing technologies, enterprises also need astrong relationship with a networkingvendor that offers worldwide, world-classservice and support. This relationshiphelps enterprises track and solve problemsquickly with access to online training,documentation, and software upgrades, a24-hour help desk, rapid sparing, andonsite assistance as required.

Applications Resilience

“Most companies might not fully under-stand the value of the network to theirbusiness,” explains Bobby Guhasarkar,senior solutions marketing manager inEnterprise Marketing at Cisco. “But theydo understand the value of applicationsto their business.”

Vital to a business resilience strategy,business continuance systems maintainoperations during and after unplannedevents. While disruptions certainly resultfrom major events such as earthquakes,flooding, or hurricanes, even more oftenthey are brought on by a power outage ora car that won’t start.

While some applications might requiredata center mirroring to preserve transac-tions, others might have higher tolerancesfor data loss, application downtime, anduser accessibility. “The level of businesscontinuance you need depends on thefunction. Many companies try to imple-ment a uniform business continuanceplan. As a result, they overspend on somesolutions and underspend on others,”says Zeus Karravala, vice president ofEnterprise Infrastructure at The YankeeGroup research firm.

A resilient network increases applicationsresilience. Network intelligence comple-ments server and storage technologies tomaintain application availability. Offload-ing processor-intensive tasks such asencryption, compression, and load balanc-ing into the network increases applicationresilience and scalability by freeing serverand storage processors to perform theircore duties.

The trend toward data center consolida-tion redefines how enterprises attainoptimal applications resilience. It beginswith redundant network components andserver clusters. Cisco partnerships withleading server vendors prove interoper-ability between servers and networkcomponents with tested configurations.Server virtualization technologies protectapplications, preventing faults that occurin one application from affecting the per-formance of others. For more informa-tion on data center resilience, see “Readyfor Anything,” page 40.

Intelligent storage networking improvesboth availability and utilization of storageresources. “Acquisition-prone companiescan end up with storage resources from

several vendors. Cisco applies networkingconcepts, such as virtual SANs to storage,allowing IT managers to consolidatemultiple SAN islands from differentvendors into one integrated fabric withenterprise-wide access,” says JacquelineRoss, vice president for storage in Prod-uct and Technology Marketing at Cisco.“Virtualization technologies make iteasier to match application service-levelrequirements with the appropriate classof storage.”

Regulatory compliance often requiresenterprises to build geographically dis-persed, redundant data centers. SANextension technologies, such as FibreChannel over IP (FCIP) and optical net-works support synchronous and asyn-chronous transaction and data mirroring.Should a catastrophe take all or part of adata center off line, mirrored resources ina backup or hot-standby data center cantake over business-critical activities with-out session loss.

“Regulatory compliance helps peopleimplement things they should have doneyears ago,” says Karravala. “There isn’t

32 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

ENTERPRISE BUSINESS RESILIENCE

Workforce

Communications

Applications

Network

Data Center Campus WAN Branch Teleworker

Man

agea

bili

ty

Sec

uri

ty

BE PREPARED Business resilience integrates systems throughout the enterprise to achieve both market agility and rapiddisaster recovery.

Continued on page 34

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 29: packetQ1-05

34 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

a company I talk to that doesn’t saybusiness continuity is important, butwhen they actually have to spend themoney, they always find something elseto do instead, and they could get to itnext year.” A Gartner study found that88 percent of enterprises were ready todeal with a power outage, but only 38percent can adapt to a loss of trans-portation infrastructure, and a scant 13percent can accommodate a majorworker disruption.

Communications Resilience

“Many enterprises have yet to take fulladvantage of IP communications,” saysRick Moran, vice president for IP com-munications in Product and TechnologyMarketing at Cisco. “They install an IPPBX [private branch exchange] but stopthere. However, IP voice applications canbe part of restructuring the way theyincrease agility. It’s easy and inexpensiveto do over an IP network.”

Converged networks dramatically enhancecommunications flexibility for both dailyoperations and disaster recovery. Featuressuch as extension mobility allow employ-ees to use their own phone numbers fromany IP phone in the global enterprise net-work. Unified communications simplifymessage retrieval by combining voice mailand e-mail into one service that employ-ees can access through a computer or tele-phone. IP videoconferencing and IP videotelephony reduce the need for travel.

Telephone service is the IT function mostessential to conducting business; there-fore, the network that supports it must behighly available. Branch-office routersmust include features that maintain localtelephone service and PSTN accessshould the WAN link to the central man-agement service fail. IP call centersshould allow remote agent access fromhome when weather conditions makecommuting difficult or dangerous.

Workforce Resilience

Closely aligned to applications and com-munications resilience is workforceresilience, which strives for anytimeemployee accessibility to applications andservices from any location. In the campus,conference rooms with wireless LANaccess eliminate the traditional “battle forports.” Road warriors can carry a precon-figured broadband router and IP phone kit

that allows them to connect to the corpo-rate network from a hotel room and enjoythe same services they would have access toif they were directly connected at the cam-pus. Teleworkers use a similar means to setup home offices with secure, always-onVPN access to the corporate network. Suchflexibility increases employment options,worker satisfaction, and productivity.

Multilayer Security

The most highly available and intelligentnetwork isn’t resilient without adequateprotection. “An integrated approach toresilience makes it easier to apply andenforce consistent security policiesthroughout the enterprise,” says Fisher.

Attacks such as distributed denial-of-service (DDoS), information theft, andworms and viruses can cripple an organi-zation’s ability to do business. For exam-ple, after surfing the Internet, an employeecan innocently introduce a worm or virusto the corporate network through aremote-access connection (see “LoomingSecurity Threats,” page 19). Endpointsecurity such as Cisco Security Agent,coupled with network-based policyenforcement such as Cisco NetworkAccess Control (NAC), stop the infectionbefore it spreads by prescreening userPCs before allowing them to log into thenetwork. This cooperation between com-puting and network elements creates asynergy that provides stronger protectionthan either system can accomplish alone.This principle is the basis for multilayer,modular security blueprints such as CiscoSAFE (cisco.com/go/safe).

While worm and virus attacks oftenmake the news, an IT operator can intro-duce an exploitable vulnerability througha simple misconfiguration of a router,switch, or firewall. Configuration tem-plates such as Cisco Smartports can helpoperators avoid common configurationmistakes, increasing network availabilityand implementing security policies at thesame time.

Network Operations

Both elusive and critical to a successfulbusiness resilience strategy is networkoperations. Many enterprises purchasemultimillion-dollar IT infrastructures,then manage them manually, which is onereason why so many organizations strug-gle to control operational expenditures.According to Sage Research, 39 percent of

network outages are caused by configura-tion errors, 27 percent by upgrade errors,and 10 percent by data entry errors. ACisco poll found that 62 percent of itsseminar attendees preferred using a man-ual command-line-interface (CLI) for con-figuring and managing their networks.

Investing in and using integrated manage-ment systems, network operators caneliminate configuration errors and speedup routine processes through automation.“You need to pry the intelligence out ofyour devices using tools,” says Brian Jun-nila, senior manager for network manage-ment in Product and Technology Market-ing at Cisco. “One process that benefitsfrom automation and tools is change man-agement. If you do the same task differ-ently every time, you’ll never progressbeyond basic management.” For example,it takes 93 hours per year for an operatorto manually change passwords in 800devices each quarter, with a 5 percenterror rate. Automating that process usingCiscoWorks Resource Manager Essentialsdrops the error rate to zero and takes lessthan one hour per year.

Assess Your Resilience

As with any journey, enterprises can plan acost-managed path toward resilience goalswhen they know how resilient their ITsystems are today. Assessments offer valu-able insights about what an enterprise isalready doing well and identify areaswhere it can improve both infrastructureand operations. The Cisco Advanced Ser-vices team offers extensive lifecycle-basedservices to help enterprises with assess-ment, design, implementation, and opera-tions for high availability networking,security, network operations, and more.

FURTHER READING

■ Cisco Business Ready Solutionscisco.com/go/businessready

■ CiscoWorks Network Managementcisco.com/go/ciscoworks

■ Cisco Advanced Servicescisco.com/packet/171_6a1

■ Cisco Smartports Solution cisco.com/go/smartports

■ Cisco High Availability Networking Servicescisco.com/packet/171_6a2

■ Cisco Business Resilience Planning Servicescisco.com/packet/171_6a3

Business Resilience, Continued from page 32

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 30: packetQ1-05

BUILDING RESILIENCE INTO CAMPUS, BRANCH OFFICE, AND TELEWORKER IT SYSTEMS

By GAIL MEREDITH OTTESON

THERE IS a big difference between conceptand delivery. Creating useful businessresilience strategies and building business-resilient IT systems requires substantialinvestment and deliberate focus. Ciscoassists enterprises with a comprehensiveapproach to building resilient IT systemsthat increase business agility and with-stand disruption. This approach traversesthe entire organization, focusing on net-work, applications, communications, andworkforce resilience.

First, Measuring Resilience

Resilience itself is difficult to measure,because it entails both quantifiable statis-tics such as network uptime and less tangi-ble factors such as customer satisfaction.

“The appropriate IT perspective for measuring resilience should be serviceavailability. To understand how resilient aservice is, the IT organization as a wholehas to marry its systems to businessprocesses,” says Bobby Guhasarkar, seniorsolutions marketing manager in EnterpriseMarketing at Cisco. “Many organizationsdo not measure service availability, butcomponents of it. Business resilience ismeasured as the sum of application, server,and network availability combined withbusiness processes.”

RECIPEFOR

RESILIENCE

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 31: packetQ1-05

Enterprises can begin to understand the resilience of their IT sys-tems by measuring uptime. Service providers have long reliedupon the “five nines” (99.999 percent) concept for planneddowntime. But this metric can play a numbers game with avail-ability without considering the true business impact of an outage.An IT group can justify meeting service-level agreements (SLAs)through statistical interpretation. For example, a 99.5 percentavailability target allows a 50-minute weekly service outage. Ifan enterprise experiences one business-critical application outageof 100 minutes in a given month, the IT group can say it isexceeding SLAs while the business itself might suffer short-termrevenue loss, customer dissatisfaction, or possible penaltiesresulting from regulatory noncompliance and litigation.

It’s more useful to measure the resilience of IT systems from theend-user perspective. At the service level, metrics for measuringavailability to users include:

■ Mean time between failure (MTBF)—how long a service isoperational before it might fail. The maximum MTBF is limitedby the MTBF of the least resilient service component.

■ Mean time to repair (MTTR)—how long it takes to restore afailed service. The minimum MTTR is impacted by the MTTRof the least resilient service component.

Network Resilience

A high-availability network is the foundation of service resilience.According to Guhasarkar, enterprises that take a short-term, low-cost view toward network resilience are flirting with disaster. Notonly do they lose the agility benefits of advanced services deliv-ered through end-to-end network intelligence, they can scramblefor hours trying to locate and troubleshoot failures, and then per-haps endure dealing with multiple vendors to solve the problem.

As IT research and analysis firm Gartner, Inc. discusses in itsreport on “The Real-Time Enterprise,” a high-availability net-working strategy represents substantial investment in both capitaland operational expenditures, but pays off with significantlyhigher uptime, greater customer satisfaction, increased revenues,and reduced exposure to regulatory penalties.

Cisco’s strategy for high-availability networking includes the following components:

■ Reinforced network infrastructure■ Real-world network design■ Realigned network operations■ Real-time network management■ Relentless network support

Reinforced Network Infrastructure

There are four pillars to building highly available networkinfrastructures: device-level resilience, network-level resilience,manageability, and self-protection. For optimal device-levelresilience, enterprises should select hardware platforms withhigh MTBF and software technologies that lower MTTR. Hard-ware is more resilient when it includes redundant componentssuch as power supplies, supervisor engines, and routing engines.

Network-level resilience provides multiple links among criticaldevices, especially in the campus core. Branch offices might needsecondary or backup WAN connectivity to a headquarters datacenter. Cisco IOS Software features reduce MTTR in case ofdevice- or network-level failure by detecting imminent or certainoutages and automatically failing over to a hot-standby compo-nent or converging around a failed link.

“Network convergence for a routing table with over 125,000unique routes is now less than one second,” says Guhasarkar.“That’s a remarkable accomplishment from a mathematicalpoint of view.”

Cisco IOS Software also includes embedded manageability andself-protection features (see sidebar, “Designing Cisco IOSSoftware for Resilience”).

Real-World Network Design

Of equal importance to resilient hardware and software, networkdesigns must be proven in real-world scenarios—then tested,tested, and tested. A dedicated team of Cisco engineers developsand tests high availability design best practices for various appli-cations and vertical industries, and publishes reference design

36 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

DESIGNING CISCO IOS SOFTWARE FOR RESILIENCE

The Cisco IOS Software development team has a systematic, end-to-end approach to developing features that reduce networkdowntime. The three-pronged strategy includes:

System-level redundancy—combines redundant hardware compo-nents and resilience protocols that reduce MTTR of system failuresand downtime and protect remote devices. These features includeNonstop Forwarding with Stateful Switchover (NSF with SSO), HotStandby Router Protocol (HSRP), Gateway Load Balancing Protocol(GLBP), Stateful Failover for IP Security (IPSec), Stateful NetworkAddress Translation (NAT), Warm Reload, and Warm Upgrade.

Network-level redundancy—provides faster network convergence,protection, and restoration in case of a network outage. EmbeddedCisco NSF Awareness creates an intelligent protocol fabric, whileconvergence and self-healing routing protocols such as IntermediateSystem-to-Intermediate System (IS-IS), Border Gateway Protocol(BGP), and Open Shortest Path First (OSPF) dynamically reroutetraffic around link failures. Some other features are IP Event Damp-ening and multicast subsecond convergence.

Embedded management—delivers proactive fault or event manage-ment, configuration management, and availability measurement thatinteract with automated features in CiscoWorks and tested third-party management tools. Example capabilities are Cisco IOS Embed-ded Event Manager and Cisco IOS in-service software upgrades.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 32: packetQ1-05

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 37

guides for enterprise network domains such as campuses, branchoffices, data centers, and teleworkers (see cisco.com/packet/171_6b1 and cisco.com/packet/171_6b2). Cisco also collaborateswith third-party laboratories to validate its design recommenda-tions and provide feedback to the product design groups.

Realigned Network Operations

Enterprises must not underestimate how humans can uninten-tionally contribute to downtime. According to Gartner, one-third of unplanned network downtime incidents are caused byhuman error. Sage Research puts that number closer to two-thirds of the total. To achieve the highest service levels fromhigh-quality products and excellent network design, enterprisesneed well-trained operations teams that develop and stick todisciplined operations processes. One of these processes is athoroughly written, consistently enforced security policy fordevice access and management.

Cisco Advanced Services publishes operational best practicesand assessment guidelines for the software lifecyle, change man-agement, and service-level management (see sidebar, “Resourcesfor Resilience,” page 38). Cisco also offers expertise with itsportfolio of High Availability Networking services spanning thenetwork lifecycle: planning, design, implementation, operation,and optimization.

Real-Time Network Management

Enabling highly efficient network operations is a comprehensivesuite of network management tools, designed to communicatewith Cisco network systems to improve the speed and accuracyof fault, configuration, accounting, provisioning, and security(FCAPS) management. Automation features in CiscoWorks toolssubstantially improve how network managers use their time.

CISCO WIDE AREA FILE SERVICES

LAN

CIFSNFS

LAN

CIFSNFS

Branch Office

Edge File Engine

Core File Engine

WAFS CentralManager

File Servers NAS

Backup

Data Center

Files

WAN

CLOSE TO HOME Using WAFS technology, the Cisco File Engine gives enterprises LAN-like performance for accessing central files from remote locations.

They can spend less time doing routine tasks and devote moreeffort to projects that increase business resilience.

Consistent configuration enhances network availability. CiscoSmartports is a solution for Cisco Catalyst switches that simplifiesthe configuration of critical features for Ethernet networks. Requir-ing minimal effort and expertise, Smartports features pre-testedswitch port configurations based on Cisco best practices. Macrosenable consistent, reliable configuration of essential security, avail-ability, quality of service (QoS), and manageability features recom-mended for Cisco Business Ready Campus solutions.

Cisco also collaborates with best-of-breed management companiesto offer enterprises a portfolio of problem management, root-causeanalysis, and change management systems appropriate for a vari-ety of budgets and resilience goals. Cisco and third-party partnertools help enterprises reduce network downtime with improvedoperational response times. For example, OPNET’s NetDoctorand IT Sentinel products validate configuration changes and auto-mate configuration auditing.

Relentless Network Support

In addition to an ongoing focus on providing support documen-tation and resources available online, Cisco provides specializednetwork certifications and training, sparing strategies, SMARTNetcoverage, and a worldwide, always-there Technical AssistanceCenter (TAC) with more than 1600 support engineers including400 with CCIE certification.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 33: packetQ1-05

38 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

Pervasive Security

Enterprises building a resilient IT infrastructure must invest inend-to-end security. A single unchecked virus or worm can crip-ple basic business activities (such as e-mail) for days. A denial-of-service (DoS) attack can render business-critical applicationsunavailable. Information theft can expose organizations to loss ofcustomer confidence and regulatory violations.

Current trends that can create potential vulnerabilities include wire-less networking and using the Internet in lieu of private-line WANservices. Enterprises must balance the advantages of workforcemobility and cost containment with security policies and systemsthat address these vulnerabilities. The Cisco SAFE blueprints pro-vide extensive information about the threats and vulnerabilities foreach network domain, along with reference architectures for miti-gation with multilayer security solutions (cisco.com/go/safe).

In increasingly complex IT environments, a robust security policy ismore important than ever when a business wants to remain resilientduring a “day zero” attack. Cisco offers expert security assessmentservices that assist enterprises with identifying the current securityposture of IT systems and developing security solutions and opera-tional best practices to address identified issues. For more on theseassessment services, visit cisco.com/packet/171_6b3.

Throughout campus and branch office networks, Cisco NetworkAdmission Control (NAC) is a system-level defense solutionincorporating routers, access servers, endpoints, and virus protec-tion software. Cisco NAC allows the network to identify andrestrict user and device access, logically isolate unauthorized orcorrupted components, and rapidly respond to threats accordingto policy guidelines.

Firewalls and intrusion detection and prevention devicesthroughout the campus and branch offices help identify and con-tain DoS attacks and thwart deliberate hacking or phreakingactivities. The CiscoWorks Security Information ManagementSystem (SIMS) gathers, correlates, and analyzes the massiveamount of security data generated by hundreds of these devices,scaling it into meaningful guidance for identifying and respond-ing to attacks in progress. In concert with Cisco Traffic AnomalyDetectors, Cisco Guard DDoS mitigation appliances let normaloperations continue during a DoS attack by filtering DoS trafficfrom flows and allowing legitimate traffic to continue. In campuswireless LANs, Cisco Aironet solutions provide IEEE 802.1xauthentication, wireless encryption, and new wireless LANintrusion detection.

RESOURCES FOR RESILIENCE

To learn more about high availability networking, pervasive security, and buildingresilience into your network, applications,communications, and workforce, Ciscorecommends the following online resources.

Cisco Business Ready Architectures

cisco.com/go/businessready

High Availability Networking

Cisco Best Practices for High AvailabilityNetworkingcisco.com/packet/171_6b4IP Journal: “High Availability in IP Routing”cisco.com/packet/171_6b5Packet: “Around-the-Clock Uptime”cisco.com/packet/171_6b6Packet:: “High Availability Networking” cisco.com/packet/171_6b7Packet:: “High Availability for Campus Networks” cisco.com/packet/171_6b8Packet:: “Calculating New Routes Faster”cisco.com/packet/171_6b9 Cisco Smartportscisco.com/go/smartports

Pervasive Security

Cisco SAFEcisco.com/go/safe Cisco AutoSecurecisco.com/packet/171_6b10Cisco Guard DDoS Mitigation Appliancescisco.com/packet/171_6b11Planning Services for Network Securitycisco.com/packet/171_6b12

Communications Resilience

Cisco AutoQoScisco.com/packet/171_6b19Cisco 3800 Series ISRcisco.com/packet/171_6b20Cisco 2800 Series ISRcisco.com/packet/171_6b21Cisco CallManager Expresscisco.com/packet/171_6b22Cisco Survivable Remote Site Telephonycisco.com/packet/171_6b23Cisco Unity Expresscisco.com/packet/171_6b24Enhanced Security for IP Communicationscisco.com/packet/171_6b25

Applications Resilience

Data Center: SAN Extension for BusinessContinuance Overviewcisco.com/packet/171_6b13Understanding the Alternatives for Extending SANs cisco.com/packet/171_6b14Cisco WAFS and Cisco File Enginescisco.com/packet/171_6b15Branch office router-based content cachingcisco.com/packet/171_6b16Branch office router-based compressioncisco.com/packet/171_6b17cisco.com/packet/171_6b18Optical Networking Solutionsfor Business Continuancecisco.com/packet/171_6b27

Workforce Resilience

Cisco Business Ready Teleworkercisco.com/packet/171_6b26

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 34: packetQ1-05

and manage users and permissions or manage cache capacity. Itrequires no client software and no local storage.

In step with providing enterprises with solutions suited to storageconsolidation over wide-area networks, Cisco recently enteredinto an agreement with EMC to sell and support EMC NS500and NS700 Series/integrated NAS solutions together with theCisco File Engine. With this integrated offering, IT administra-tors will be able to take advantage of centralized resources forbackup and disaster recovery of their branch-office data. Theintegrated EMC/Cisco solution will be sold and supported byCisco directly and through its worldwide partner channel.

Cisco also offers branch office acceleration and WAN compressionfunctions in network modules for Cisco 2600 and 3700 Seriesrouters and the new Cisco 2800 and 3800 Series Integrated Ser-vices Routers. The Content Engine Network Module intelligentlydelivers a number of different file types, including Real WindowsMedia Technologies (WMT), Darwin, HTTP, PDF, Flash, Shock-wave, FTP, and Multimedia Messaging Service (MMS) content,using the demand-pull caching and pre-positioning technologiesprovided by Cisco Application and Content Networking (ACNS)software. This solution helps enterprises accelerate the delivery ofsoftware files, security patches, business video, HTML content,and more to improve application and WAN bandwidth perform-ance. The WAN Compression Module, available for Cisco multi-service and integrated services routers, optimizes WAN bandwidthutilization without sacrificing throughput rates by reducing framesize and thereby allowing more data to be transmitted over a link.With this module, network managers can increase application per-formance and service availability for end users without expensiveinfrastructure upgrades.

Resilient Communications

The most essential component of a business resilience strategy isresilient communications, which alone justifies the need for ahigh availability network. While organizations can withstandlimited interruption in many IT applications, near-continuouscommunication systems are vital to employee safety and businessflow, especially during and immediately after a disruption.

The high availability network carrying IP telephony, video, andunified messaging traffic uses QoS mechanisms to prioritize andexpedite time-sensitive voice and video traffic. In Cisco Catalystswitches, Cisco AutoQoS incorporates value-added intelligencein Cisco IOS Software and Catalyst OS (CatOS) Software to pro-vision and manage large-scale QoS deployments. It encapsulatesCisco expertise for best practices based on actual deployments.Compared to manual methods, Cisco AutoQoS can reducedeployment cost and time by as much as two-thirds. The firstphase of Cisco AutoQoS automates voice-over-IP (VoIP) deploy-ments for enterprises who want to deploy IP telephony but lackthe expertise or staff time to plan and deploy IP QoS.

Like its public telephony counterpart, Cisco designed its IP com-munications solutions for resilience from the ground up. It haslong offered clustering of Cisco CallManagers, redundant clus-tering in secondary data centers, and features such as Power overEthernet (PoE) to IP phones, extension mobility, 911 locatorsupport, and remote agent capabilities for call center personnel.

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 39

Branch offices expose campus networks and data centers to back-door attacks. Security operators can use Cisco VPN, IPSec, andencryption technologies to secure branch office connections.Operators also need the ability to quickly lock down branch officerouters. A feature of Cisco IOS Software, Cisco AutoSecure, offersa “one touch,” remote device lockdown process. It scans therouter, closes offending ports, finds vulnerabilities, and suggestsconfiguration changes to prevent future attacks.

Resilient Applications

When it comes to ensuring that business applications are alwaysavailable and accessible, the data center is the focus of attention.Cisco provides a full range of optical and IP storage area network-ing (SAN) extension solutions over a variety of media using CiscoONS 15000 optical networking solutions and the Cisco MDS9000 Family of multilayer directors and fabric switches. Amongthe technologies that reside in the data center to address both syn-chronous and asynchronous replication are local and global serverload balancing, intelligent storage networks such as virtual SANs(VSANs), security (e.g., intrusion detection and firewall security),and business continuance. These and other solutions critical toproviding applications resilience within the data center are coveredin greater detail in the article “Ready for Anything,” page 40.

In addition to providing data center solutions for enterprises andservice providers globally, Cisco has been working on providingenterprises with an end-to-end storage consolidation solution forbranch-office data, which involves network-attached storage(NAS). To date, this work has largely centered on Cisco WideArea File Services (WAFS) technology, which gives enterprisesLAN-like performance for accessing central files from remotelocations. Cisco WAFS uses sophisticated protocol-level caching,compression, and network-optimization techniques to minimizelatency penalties associated with file-server access over theWAN. Branch-office users find application performance remainsacceptable. Using this technology, the Cisco WAFS Edge FileEngine located in the branch office corresponds with a WAFSCore File Engine collocated to the departmental servers in thecentral data center. The WAFS Central Manager is a manage-ment module that provides Web-based facilities for centralizedmanagement, configuration, monitoring, and maintenance of allfile engines distributed throughout the enterprise (see figure,page 37).

Client file server requests in the branch office are directed tothe local edge file engine, which determines whether to managethe request locally using its file system cache or forward therequest to the remote file server. In the latter case, the edge fileengine encapsulates the Common Internet File Server (CIFS) orNetwork File System (NFS) request and sends the request overthe WAN to the core file engine using the Cisco WAFS trans-port protocol. This protocol restricts the chattiness of CIFS andNFS protocols over the WAN, protecting bandwidth usage forend-user data retrieval. The core file engine decodes the CiscoWAFS request into CIFS or NFS, issues the request to the fileserver, and encapsulates the response into the Cisco WAFS pro-tocol for transmission to the branch office edge file server, thento the client. The edge file engine behaves as a pure caching andacceleration system for remote file servers, as opposed to anactual file server. This characteristic simplifies WAFS opera-tions and maintenance, because it eliminates the need to define Continued on page 89

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 35: packetQ1-05

RESILIENCE is most important in the data center: theheart of the IT infrastructure. The trend of consolidat-ing applications, servers, and storage into the data cen-ter presents a unique opportunity for organizations toincrease their business resilience. IT organizationsembarking on consolidation projects must ensure thatthey build a secure and resilient foundation for currentand future applications and technologies. IT managerswho adopt resilient data center architectures can alsoincrease business agility as they realize the benefits ofservice-oriented infrastructure that can rapidlyrespond to new application requirements.

Network Resilience

The Cisco Business Ready Data Center provides aresilient network architecture. Properly deployed, adata center network with IP, storage, and opticalcomponents creates a foundation for optimal appli-cation service levels. This approach can substantiallyreduce data center operating expenditures, which canchew up the IT budget.

Essential to network resilience is a high availabilitydesign poised for future capacity and service growth.The network investment is a small portion of datacenter total cost of ownership, yet the META Group(April 2004) states that “the impact of a suboptimalnetwork design can have grave consequences andnegate all other investments the business may havemade in the design and implementation of a highavailability data center.” For a look at the basics ofbuilding highly available networks, see the article“Recipe for Resilience,” page 35.

The first tenet for data center resilience is resilientnetwork elements that offer high mean time betweenfailure (MTBF). In large data centers, the aggrega-tion layer of the Cisco IP network is typically basedupon the Cisco Catalyst 6500 Series Switch, a highlyresilient, scalable, intelligent platform that optimizesand secures access to and between business-criticalapplications. Its redundant supervisor option offersstateful failover, while specialty service modules allowintegration of intelligent network services—such asfirewalling, encryption, load balancing, and networkanalysis—directly into the network fabric. CiscoIOS Software resilience features such as NonstopForwarding with Stateful Switchover, Stateful Failoverfor IP Security (IPSec), and Hot Standby RouterProtocol (HSRP) ensure rapid recovery and sessionprotection in case of component or device failure.

Storage Innovation

The Cisco data center storage network is based uponthe Cisco MDS 9000 intelligent SAN switch productfamily. High availability features such as nondisrup-tive software upgrades and stateful failover are hall-marks of the MDS 9500 Series. In addition,throughout the MDS SAN switch family, Cisco hasintroduced several technology innovations in storagenetworking that address network resilience. One suchinnovation, virtual storage area networks (VSANs),was recently adopted as a standard by the ANSI T.11Fibre Channel Committee. VSANs allow consolidationof isolated storage “islands” into a single, scalable,

40 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

READY FOR ANYTHINGBUILDING RESILIENT DATA CENTERS

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 36: packetQ1-05

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 41

By GAILMEREDITHOTTESON

centrally managed and administered physical networkwithout impact on the availability or security of logi-cally separate SANs. Cisco has also added networkresilience with inter-VSAN routing, an innovation thatcombines the flexibility of routing with the stabilityand scalability of VSANs. With inter-VSAN routing,connectivity can be established between devices acrossVSAN boundaries while still maintaining the fabricisolation of VSANs. This innovation facilitates com-mon resource sharing (such as tape backup systems)among several VSANs and is essential for scalabledata center consolidation.

Resilient network elements within the data center areimportant, but increasingly customers expect SANextension solutions to address business continuancerequirements. These solutions must offer the samedegree of availability and security as the SANs withinthe data center. Cisco’s resilient SAN extensionoptions provide the ability to match applicationrequirements to the most cost-effective connectivityoption. These options include Fibre Channel over IP(FCIP), which can leverage a customer’s existingWAN infrastructure, and optical solutions such asdense wavelength-division multiplexing (DWDM)and Fibre Channel over SONET or SDH for high-performance, low-latency application requirements.

Supporting hundreds of gigabits-per-second through-put and 50-ms recovery times, optical networking is anattractive solution for business continuance demands,and has become more affordable (see “Adventures inResilience,” page 45). By supporting voice, video, data,and storage, multiservice optical solutions such as theCisco ONS 15454 consolidate costly redundant WANnetworks onto a single highly efficient solution.

All of these network elements must be incorporatedinto a highly resilient network design that ensures fast,seamless recovery from any foreseeable disruption tothe network or attached servers and storage devices.Cisco provides best-practice reference design guidesbased on tested and validated configurations to helpachieve this level of resilience. High availability techni-cal reference guides intended specifically for data cen-ter networks are available at cisco.com/go/datacenter.

The final component of network resilience is a disci-plined operations team that consistently follows highavailability networking best practices, especially forchange management. The continually changing datacenter environment requires collaboration betweenthe groups that are responsible for servers, applica-tions, storage, optical transport/security, businesscontinuance, and the network. Operational proceduresneed to standardize processes, enforce accountability,and use management tools that automate routineprocesses. Sage Research traced two-thirds ofunscheduled network outages to management errors,most of which can be eliminated through a strict

change management system based on tools such asCiscoWorks Resource Manager Essentials.

Applications Resilience

A major concern during data center consolidation ishow to maintain application security, availability,and service levels on a consolidated infrastructure.Unconsolidated, siloed applications offer physicalseparation, leading to the false belief that they reducethe risk of downtime or security breaches.

“Data center managers must consolidate theirresources, because siloed applications and infrastruc-tures are rigid and inefficient,” says Jonathan Gilad,solutions manager of Data Center Networking atCisco. “A well-designed consolidation doesn’t sacri-fice security or application service levels; it actuallyimproves application resilience.”

One technology that accelerates data center consoli-dation is Cisco Wide Area File Services, which pro-vides high-capacity file services in branch offices,encouraging branch office personnel to relocate allfiles into the highly available and secure data centerwithout suffering performance degradation.

The trend toward building applications resilience in aconsolidated data center focuses on virtualization,which uses networks to present available server andstorage resources as logical entities for security andmanagement purposes.

The Cisco Business Ready Data Center offers both IPand storage network virtualization solutions. In theIP network, Cisco IOS Software enables applicationisolation using virtual LANs (VLANs). Trafficremains logically separate so that application misbe-havior such as broadcast storms cannot spread toother applications. Firewalls isolate resources to mini-mize the spread and impact of security breaches or virusand worm infections. The integrated Cisco FirewallServices Module (FWSM) can be configured as multi-ple virtual firewalls, one for each VLAN, reducingboth complexity and expense. Within each securityzone, server health monitoring and load balancingservices in the Cisco Content Switching Module opti-mize higher-layer application performance acrossserver clusters.

Cisco enables intelligent SAN virtualization servicesthrough its Cisco MDS 9000 family of SANswitches. “Moving storage virtualization into thenetwork increases applications resilience,” says JasonWarner, senior technical marketing engineer in theStorage Virtualization Group at Cisco. “Applicationsdon’t need to know where data is physically located,only that they can access it. One vendor-independentinterface allows storage resources to remain online

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 37: packetQ1-05

during migrations associated with datacenter consolidation projects or mergersand acquisitions.”

The Cisco MDS 9000 family provides anopen platform for hosting and centrallymanaging intelligent storage services frommultiple partners. These intelligent fabricapplications include network-hosted vir-tualization, data migration, and backup.With this open platform approach, stor-age managers have the ability to choosestorage virtualization and managementapplications that best meet their needs.Cisco is also driving industry standards inthis area as the technical editor for theFabric Application Interface Specification(FAIS) draft standard.

Business Continuance

In this 24-by-seven world, organizationsneed IT infrastructure that supports

their business processes, no matter whathappens. Business continuance is the artand science of protecting and restoringIT assets in case of disruption. A businessimpact analysis identifies those applica-tions that need nonstop service and thosethat can withstand limited downtimewithout adversely affecting the busi-ness. These parameters dictate the scopeof business continuance systems that anorganization needs to protect itself andcontrol costs.

Cisco supports several IP and Fibre Chan-nel SAN extension options for businesscontinuance between data centers. Forshort to medium (200–600 km) distances,Fibre Channel directly over DWDM orSONET/SDH is typically optimal due tothe high bandwidth and low latenciessupported. The Cisco ONS 15000 product

line is qualified for the broadest range ofreplication and mirroring applicationsfrom leading storage vendors and man-aged service providers. Fibre Channelover IP (FCIP) allows enterprises to lever-age their current WAN infrastructure tocontrol costs. Unlike Fibre Channel,which uses buffer credits that limit prac-tical transport distance, FCIP relies uponTCP for transport control, enablingtransoceanic or intercontinental trans-port up to 20,000 km. This storage-opti-mized version of TCP supports a 32-MBmaximum window size.

42 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

CISCO BUSINESS READY DATA CENTER

Production Data Center

ApplicationServers

Cisco MDS SAN Switch

CiscoMDSSAN

Switch

FibreChannelover IP

FibreChannelover IP

EnterpriseStorageArrays

EnterpriseStorageArrays

Metro Optical—DWDM/SONET/SDH

• Up to 600 km (DWDM) or 2300 km (SONET/SDH)• Supports Synchronous and Asynchronous Data Replication Services• Very High Bandwidth, Low-Latency, Multiservice

Enterprise-ClassTape Arrays

Backup and/orHot-StandbyServers

Disaster Recovery Data Center

IP WAN

SONET/SDH

Cisco ONS Solutions

DWDMNetwork

ESCONover

DWDM

Fibre Channel over IP (FCIP)

• Typically Not Distance Limited• Hardware-Enabled Encryption and Compression• Supports Synchronous and Asynchronous Data Replication Services• WAN Characterization and Tuning Is Critical

Fibre Channelover SONET/SDH

LONG-RANGE SAN Cisco SAN extension enables transparent SAN extension between data centers across town, distances as far away as 20,000 km, or halfway around the globe.

PACKET ONLINE EXCLUSIVEFor a design guide on data center disasterrecovery and load distribution using InteriorGateway Protocol (IGP) and Border GatewayProtocol (BGP), visit cisco.com/packet/171_6c1.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 38: packetQ1-05

SAN Extension

The introduction of SAN-OS 2.0 for theCisco MDS family enhances SAN exten-sion services with improved performanceand security, as well as support for hard-ware-based compression. Cisco MDSSAN switches also support tape accelera-tion and disk write acceleration to sup-port replication over longer distancesbetween sites. Both acceleration featurespush exchanges to a remote tape backupor disk array without waiting foracknowledgments to each exchange,increasing transfer rates and reducing theimpact on application performance by upto 100 percent.

Replication mode—synchronous or asyn-chronous—determines the SAN extensionsolution architecture. A high availabilitysolution uses dual switches at each end,with one or more VSANs across eachlink. Client protection features withinarrays perform error recovery and datavalidation. The Cisco MDS 9000 aug-ments this protection with PortChanneltechnology. Analogous to EtherChannelin Ethernet switching, PortChannel logi-cally groups up to 16 Fibre Channel orFCIP links for load balancing and capac-ity reasons. Each PortChannel can trunkmultiple VSANs, and boosts the transferspeed of a Fibre Channel connection from2 Gbit/s to 32 Gbit/s.

In combination with write acceleration,FCIP can service synchronous and asyn-chronous replication with performancesimilar to Fibre Channel over optical.The new SAN Extension Tuner feature inSAN-OS version 2 allows storage man-agers to set minimum and maximumavailability and other parametersaccording to available bandwidth andround-trip time.

Data Center Security

The data center is an attractive target formalicious activity. Hackers, worms, anddistributed denial-of-service (DDoS)attacks can cause considerable havocand costly damage when a center is notproperly secured. As data center man-agers consolidate resources such asservers, storage, networks, and applica-tions, they must consider how thesechanges affect the security posture andapplication resilience. Security and net-work managers must collaborate tounderstand the particular vulnerabilitiesand threats to data center resources so

that they can develop a network securityarchitecture that protects against threatsthat often pervade the enterprise. Ciscosecurity solutions provide comprehen-sive protection through a multilayerdeployment of secure connectivity, threatdefense, and trust and identity solutions.

The Cisco Business Ready Data Centerachieves optimal end-to-end security, per-formance and manageability by integrat-ing security directly into the networkinfrastructure. It takes advantage of theadvanced integrated security capabilities ofCisco Catalyst switching and Cisco MDS9000 intelligent SAN switches. Integratedsecurity software and service modules forthe Cisco Catalyst 6500 platform offerfirewall, intrusion detection system (IDS),Secure Sockets Layer (SSL), DDoS, and IPSecurity (IPSec) virtual private network(VPN) services at the higher performancelevels required for bandwidth-intensivedata center environments.

In storage networks, the Cisco MDS 9000switches employ Secure Shell, Secure FTP,RADIUS, SNMPv3, and role-based accesscontrol (RBAC) against unauthorizedmanagement access. In addition, FibreChannel Security Protocol (FC-SP) delivers IPSec-like functionality to FibreChannel fabrics and ensures secureswitch-to-switch communication. FC-SP,an ANSI T11 standard co-authored byCisco, provides confidentiality, data originauthentication, and connectionlessintegrity across the fabric. VSANs alsoprovide security by dividing a commonphysical SAN infrastructure into separatevirtual SAN islands.

Among the many options available forsecurity data centers, enterprises shouldconsider the following:

■ Infrastructure security with tools suchas hardware rate limiters and controlplane protection

■ Stateful session inspection with inte-grated Cisco firewalls

■ Endpoint protection with Cisco Secu-rity Agent in publicly accessible servers

■ DDoS mitigation with Cisco Detectorsor intrusion detection devices deployedthroughout all data center domains anda Cisco Guard to filter traffic, allowinglegitimate sessions to continue

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 43

FURTHER READING

■ Cisco Business Ready Data Centercisco.com/go/datacenter

■ White paper on high availability datacenter networkingcisco.com/packet/171_6c2

■ Cisco storage networkingcisco.com/packet/171_6c3

■ White paper on extending SANscisco.com/packet/171_6c4

■ Cisco SAN extension productscisco.com/packet/171_6c5

■ “Five Steps to Building an IntelligentNetworking Infrastructure for BusinessContinuance” cisco.com/packet/171_6c6

■ Cisco High Availability Networking Servicescisco.com/packet/171_6c7

■ Trust and identity protection throughrole-based access control

■ Perimeter and domain protection withfirewalls and intrusion detection andprevention devices

Communications Resilience

Data center consolidation often includesCisco IP communications services andapplication servers. For resilient commu-nications, every data center location withIP communications services should have adirect gateway to the PSTN. A Cisco mul-tiservice or integrated services voice gate-way router provides a wide range ofpacket telephony-based voice interfacesand signaling protocols. Cisco CallMan-agers can be clustered for high availabil-ity. Backup or hot standby clusters canreside in secondary data centers for rapidIP telephony recovery in case of majordisruption. Likewise, backup Cisco UnityUnified Messaging and IP Contact Centerservers in the secondary data center canpreserve message integrity and ensurecontinuous contact center service.

◆ ◆ ◆

A thoughtfully considered data centerconsolidation project helps enterprisesachieve greater business agility throughresilience. Cisco stands ready to helpenterprises plan, implement, and operatesecure, consolidated data centers withsolutions, operational best practices, andreference designs that address the techni-cal complexities and operational realitiesof the data center.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 39: packetQ1-05

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 45

HOW FOUR ENTERPRISES MAINTAINED BUSINESS CONTINUITY IN THE FACE OF FLOOD, FIRE, AND POWER OUTAGES

By RHONDARAIDER

FOR A COMPANY without a resilience strategy, an event as trivial as tripping over a cable or a missed fiber installation deadlinecan threaten business continuity. But for a company with effectiveresilience measures for the network, applications, communications,and workforce, even a catastrophe can be weathered without business disruption. In fact, catastrophes, either natural or man-made, often provide the impetus for resilience projects. That certainlywas the case when Hurricane Floyd struck in 1999, flooding a build-ing at East Carolina University (ECU) in North Carolina, and shut-ting down the network—and the university—for two weeks. “Torestore even limited phone service we had to jump through hoops,including hard-wiring connections to our phone switch, which took aday and a half,” recalls Rob Hudson, director of network services atECU. “That’s a long time when family members are worried abouteach other’s safety.”

Determined not to repeat this experience, the ECU IT group upgraded its data network the next year to bolster network and communications resilience, with risk mitigation as the chief objec-tive. “An important component of our disaster recovery strategy wasIP telephony,” says Martin Jackson, manager for network engineer-ing. “That would give us more control and the flexibility to restorephone service when unexpected events occurred.”

ADVE

NTU

RES

IN RESILIENCE

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 40: packetQ1-05

Today the university can instantly establish an Emergency Oper-ation Center (EOC) to provide phone service, using only thecontents of a strongbox containing a Cisco Catalyst 4500 SeriesSwitch with 25 Cisco IP phones. The IT group prepared threepotential on-campus locations for the EOC by connectingarmored fiber directly to the Campus PSTN Gateway. A sitegenerator powers the phones. “We have instant phone servicethat’s not dependent on any other network links being up,” saysHudson. “The center can be up and running within one hour.”

Rapid Restoration for Campus Network

As part of its overall network and communications resiliencestrategies, the university also has redundant Cisco CallManagerservers and Cisco 3640 multiservice access routers in two sepa-rate locations on campus. To date, 10 percent of the university’s8500 extensions have been converted to IP telephony. Most build-ings on campus have dual paths to the carrier: “Even if we lose aremote shelf for voice, we can still keep critical numbers opera-tional,” says Jackson. And in the event of an outage in the copperor fiber, IT can take advantage of wireless—a resilience tactic thathas paid dividends twice since being deployed in 2001.

The first occasion was when a cut fiber took down a segment of theon-campus medical center network, preventing staff and physiciansfrom accessing patients’ electronic medical records (EMRs) andimages. Demonstrating workforce resilience as well as networkresilience, IT averted the potentially life-threatening outage byrestoring the network in just 45 minutes. Jackson recalls, “We justinstalled a couple of spare Cisco Aironet 1200 Series wirelessaccess points, one in a window of the medical school building andanother in the window of a building with connectivity across thestreet. That extended the network from one building to the other.”

In 2004, the innate resilience of IP communications was vali-dated again for ECU—this time when a vendor missed the dead-line for installing fiber in a new building scheduled to open itsdoors to 200 employees the next week. “Without a phone sys-tem, the building cutover date would have been delayed, affect-ing the personnel whose major job function was fundraising,”says Hudson. This time IT installed a Cisco Aironet 1400 54-MBbridge to provide connectivity to a nearby building’s network,enabling workforce resilience. “The employees, who were usedto having a 100-MB connection from their desktops, didn’t evennotice the difference in application performance or phone serv-ice, so no productivity was lost,” says Hudson.

Borrowing TDM Connectivity: Kaye Scholer LLP

Paired Cisco Aironet receivers also saved the day for KayeScholer LLP, a global law firm headquartered in New York City.On a Saturday in October 2004, a massive fire swept through thelaw offices, forcing the company to scramble to find space for1000 employees for the one month needed for repairs. Evenmore challenging than finding instant office space in New YorkCity was acquiring phone service. “We were moving sight unseeninto four separate buildings, two without existing phone serv-ice,” says John Palefsky, director of technology services. “In onebuilding we had two contiguous floors and one more floor 30levels below, and in the building across the street we had two dis-contiguous floors. Getting phones wired in this situation wouldordinarily take weeks.” If ever there was a predicament requiringcommunications and workforce resilience, this was it.

Kaye Scholer’s Frankfurt, Germany offices had recently deployeda Cisco CallManager server and Palefsky had a hunch its flexibil-ity might serve the current situation, as well. He called the Ciscopartner that had deployed the solution, Dimension Data. “OnThursday I asked for 600 phones, and the system was up and run-ning on the following Wednesday. That included ordering, pur-chasing, shipping, and configuring. Amazing.”

Dimension Data installed new Cisco Catalyst 4506 switches intwo of the buildings, interconnecting them within each buildingwith fiber that Kaye Scholer had quickly installed after takingover the space. Kaye Scholer’s technology staff moved existingCisco Catalyst switches from its damaged building to the remain-ing two buildings to complete the network. The building with theCisco CallManager had three dishes. A Cisco Aironet dish linkedwith its counterpart in the window of a building across the streetto extend the Ethernet network there. Another Cisco Aironet dishfaced its counterpart in a building that already had phone serviceone-half mile away to share connectivity with the PSTN througha Cisco 3745 Multiservice Access Router. A third dish, acquiredfrom an Internet-over-microwave vendor, provided Internet con-nectivity to the complex. “Acquiring phone service in the tradi-tional way from the phone company would have taken one totwo weeks—not an option,” says Palefsky. “And yet with wirelessconnectivity, one Cisco CallManager server and Cisco Unityserver supplied phone and voice-mail service to five floors in twobuildings. It’s even more remarkable that the whole project wascompleted in less than one week. With any other solution itwould have taken five times as long.”

Shearman and Sterling LLP

Network and applications resilience is top of mind for New York-based businesses, whose experiences include both the September11, 2001 terrorist attacks and the August 2003 power grid failure.International law firm Shearman and Sterling LLP, headquarteredin New York, deploys a remote, lights-out data center. “Our mainobjective was to mitigate the risk, which we assessed to be high, ofhaving a data center within our world headquarters,” says TonyCordeiro, chief information officer. Of primary concern is theavailability of mission-critical messaging applications, used glob-ally. “Our practitioners simply cannot afford to be out of touch

46 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 41: packetQ1-05

with their clients,” says Cordeiro. “We wanted to be able to sustaina site-level failure at our New York location without interruptingoperations in Germany, the UK, San Francisco, or Asia, for exam-ple. These recent experiences, plus the recommendation of ourauditors, afforded us the opportunity to reposition our global datacenter away from the city, off the grid and with its own redundantpower supply, HVAC, and fire suppression systems.”

To achieve network and applications resilience, Shearman andSterling designed two data center locations, which are physicallyremoved from headquarters, in New Jersey and the UK. A primarydesign objective was continuing to provide the highest level ofservice for the 1500 employees in the New York office, who wereaccustomed to LAN-speed performance. “As we planned to moveour data center and applications, we asked ourselves how wecould replicate LAN performance to our global data center,” saysDan McLoughlin, manager of networks, infrastructure, and voiceat Shearman and Sterling. “After analyzing various types of con-nectivity, we decided on an optical networking solution usingCisco optical equipment. From an operations and technologystandpoint, the Cisco ONS equipment provides carrier-class relia-bility and resilience, as well as the needed throughput. Thisensured maximized network uptime and LAN-like performance.”

Multiple Points of Entry for Network Resilience

The Shearman and Sterling IT team designed the optical networkwith multiple points of entry and exit for each building, creatinga resilient infrastructure with no single point of failure. “In Man-hattan there is always construction. If a backhoe digs throughthe building’s primary point of entry, that one is out of service foran unknown period of time. To ensure business continuity weneeded another that is diverse,” says James Thomas, senior net-work engineer.

Based on these considerations, Shearman and Sterling chose todeploy an optical networking infrastructure using the Cisco ONS15454 multiservice optical networking platform. This platformprovides a flexible solution that enables Shearman and Sterling tostart with a SONET infrastructure over a single dense wave-length-division multiplexer (DWDM) wavelength and addDWDM infrastructure as throughput demands require. “Thishighly flexible platform best meets our needs because we can scaleup to 32 wavelengths of 10-GB throughput as needed, over time,while immediately supporting Fibre Channel connectivity fortape backups over the metro area network,” says Thomas.

Four Cisco ONS 15454 SONET multiservice provisioning plat-forms form the network core. Two reside in the New York offices,one at the global data center in New Jersey, and one at a carriercollocation facility in New York City. “By placing one Cisco ONS15454 in the carrier collocation facility, we can connect to anyother major carrier,” says Thomas. “With this design decision,we’ve ensured resilience for our infrastructure by allowing formultiple points of entry through multiple separate paths.”

The network currently runs at OC-192 speeds (10 GB) and isused today to support Fibre Channel communications betweenthe New York office and data center. “We can physically locatesome servers and backup devices locally and others in the offsitedata center, and connect to them just as if they all resided locally,”explains Cordeiro.

In the event of disaster at any site, the optical network enables thelaw firm to restore data from the offsite data center remotely. Inthe highly unlikely event that connectivity to the remote data cen-ter is lost, Plan B is to send an employee to the remote data centerto retrieve the backup. “Having the site running and humming isone thing; connectivity is equally important,” says McLoughlin.“That’s why dual entries into facilities are so important.”

More Resilient, Less Costly

Shearman and Sterling turned up its New York metro area net-work in December 2004, and brought its enterprise systems’development environment live in January 2005. “The investmentwe’ve made in a resilient network will pay for itself within oneyear,” says Cordeiro. “We’ve effectively built out a carrier-classinfrastructure, providing the needed bandwidth and flexibilityfor growth.”

This flexibility is not just limited to throughput, because the newnetwork will support not only storage communications but allcommunication needs including IP, traditional voice communica-tions, IP telephony, and other latency-sensitive applications suchas video, increasing the efficiency and cost savings over time.

Communications Resilience for Long Island University

Long Island University (LIU) bolstered its communicationsresilience strategy after September 11, 2001, when it lost phoneservice. Within one hour the university regained its ability tomake outbound calls by transferring the direct outward dial(DOD) lines to a Cisco CallManager server from the Brooklyncampus to the C.W. Post campus. “Staff and students were veryappreciative that they could reach their families,” says GeorgeBaroudi, chief information officer. “When people realized howmuch resilience IP communications provided, we decided toextend it on a much larger scale.”

LIU is migrating from Primary Rate Interface (PRI) and ISDN toIP-based trunks, which will provide resilience for incoming as wellas outgoing calls. Each of two campuses has a Cisco CallManagerserver and Cisco Catalyst 6500 Series Switch and can take overservice from the other campus in less than five minutes—some-thing that would take days without IP communications, accordingto Baroudi. “Our telephone service provider supports IP teleph-ony, so if one campus location is out, we can simply provide a dif-ferent IP address for DOD or DID [direct inward dial] calls.”Baroudi notes that this concept—decoupling a phone numberfrom a physical location—has long been available for individualphone numbers, with follow-me services. “If it can be done for asingle user, why not for a slew of DIDs, like the entire telephoneexchange?” The university’s four smaller campuses and six satel-lite offices connect to the Cisco CallManager server across theWAN. “Should the WAN link become available, the campusrouter uses its built-in SRST [Survivable Remote Site Telephony]feature to automatically begin routing calls over not only thePSTN, but also the Public Internet Network using a second Call-Manager over a secure Internet connection.”

Baroudi concludes, “Our network is in use 24 hours a daybecause that’s the nature of the world. I don’t see any differencebetween voice, data, or video traffic: If it’s IP-based, we can makeit resilient.”

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 47

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 42: packetQ1-05

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 49

Broadband Explosion

Broadband services for consumers = broad revenue growth for providers.

In just one week last December, The Wall Street Journalpublished a swath of news about broadband technol-ogy and use: Verizon offering broadband wirelessaccess through a variant of CDMA2000 calledevolution-data optimized (EV-DO); Comcast, TimeWarner Cable, and Cox Communications using fiberto deliver video on demand (in addition to offeringtriple play services); companies in the US lobbyingWashington for more wireless spectrum for broad-band; British Telecom adding one million new broad-band customers in the previous four months. . . .

Broadband in the news isn’t surprising. But in theseinstances, consumer broadband is making the head-lines. “The battle for the home is no longer overvoice, but over broadband,” says ChristopherDobrec, director of business development in theLinksys Division at Cisco. “Broadband is the idealplatform on which to converge consumer applica-tions for voice, video, and data.”

These days, a typical home equipped with cable orDSL Internet access might see adults and childrenalike using the Internet to do research, get news, andbe entertained: one of them downloading slide pre-sentations; a group of teenagers on their Xboxesmatching wits over the Internet; yet another personlistening to streaming audio or watching streamingvideo from a station across the country or abroad.There’s tremendous demand for consumer broadbandaccess—and, as this example demonstrates, there is

no killer application. Consumers use broadband for avariety of applications, and the more bandwidth theyhave the more they use it.

Yet, the broadband penetration rates in the US andEurope are low: just above 20 percent and 15 per-cent, respectively. The rates are much higher in somecountries in Asia and Europe. In South Korea, forexample, about 75 percent of households have accessto high-speed connections—at speeds up to 40Mbit/s. Japan, too, has high broadband penetrationand high speeds available to consumers. The US andEurope are expected to mostly catch up. By 2010,more than 60 percent of US households should havebroadband access, with a similar penetration rate inEurope. Bit rates should also increase, to the 10-Mbit/srange and beyond.

Worldwide, broadband deployments grew from 33million at year-end 2002 to 97 million by year-end2003, and were expected to reach 140 million at theend of 2004, according to Ovum Access Forecasts.Ovum projects that revenues from broadband areexpected to increase at a compound annual growthrate (CAGR) of nearly 21 percent from 2003 to 2008.That’s a business opportunity—one many serviceproviders are already banking on. In January 2004,for instance, Verizon stated that it would commitsome US$3 billion of capital over the next two yearsto bring broadband to the mass market.

“Nevertheless, some providers see broadband more asa threat than an opportunity,” says Fernando Gil deBernabé, managing director of Cisco’s Internet BusinessSolutions Group for Service Providers in Europe, theMiddle East, and Africa (EMEA). Broadband cancarry voice over IP (VoIP), which, although still a smallpart of broadband usage, cuts into traditional tele-phone services revenues. Moreover, broadband allowsconsumers and small and midsized businesses (SMBs)to consolidate their voice and data lines into one con-nection, further cutting down on fixed-line revenues,says Gil de Bernabé. Factor in the threat that wirelessimposes on residential and SMB land lines, and theimpact becomes even greater. According to data analy-sis conducted by Cisco’s Internet Business SolutionsGroup, revenues from traditional fixed-line voiceservices continue on a downward trend, with CAGR in

By Janet Kreiling

SP

EC

IAL R

EP

OR

TSPECIAL REPORT

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 43: packetQ1-05

50 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

the negative single digits, depending on the market.And the total number of fixed lines is now declining inboth the business and consumer markets at a rate ofbetween -1 percent and -3 percent in Western Europe.

“There are already many service providers in the worldthat have more than one million broadband customerseach,” says Pankaj Gupta, senior manager for broad-band marketing in Cisco’s Product and TechnologyMarketing Group. Moreover, he says, “VoIP is going tocome. It will be the first service to become widespread.”

Points out Dobrec, “What’s happening now is the‘perfect storm.’ Service providers are prepared tomake the necessary capital expenditures in theiraccess networks to increase bandwidth out to the res-idence or SMB. Wall Street also understands thenecessity. And regulators in the US and elsewhere arepushing broadband agendas.”

What Do Consumers Want?

One connection for all. Triple play—voice, video, anddata, preferably with wireless, too. “The consumerwants simplicity and flexibility,” Gupta says. “A sin-gle pipe, one service provider, and the ability to orderup services and even change the width of the pipe asneeded—services on demand.”

There are four general areas of consumer needs wherebroadband applications will flourish: communica-tions services, information services, monitoring andmanagement services, and entertainment services (seeFigure 1). Dobrec outlines a scenario that traverses allfour of these service areas: A subscriber orders up avideo-on-demand (VOD) program, and shortly there-after his phone rings. Caller ID information runningacross the bottom of the TV screen indicates that thecall is from a parent or child, so he puts the video onhold to take the call. Afterward, the subscriberrestarts the video and asks the phone to hold all othercalls until it’s over. Oh, and before ordering the video,he requested higher bandwidth while it downloaded.

Beyond commingled services such as those described inFigure 1, it’s likely that customers will eventually use acombination of network- and customer premises equip-ment (CPE)-based services such as firewalls, whichcould reside in either place; storage, which would be anetwork service; and home-based gaming devices thatinclude an Ethernet port and a wireless router.

Japan and Korea, Dobrec says, “see broadband as aneconomic stimulus.” Around the world, he adds, “asvoice services move away from fixed to mobile networkdelivery, there’s a big drive to turn the copper servinghomes back into a valuable, revenue-generating

vehicle. And a couple of big questions are beingasked: How to scale broadband service and get it tomore homes and SMBs? And how can the serviceprovider derive more revenue?”

Making Money in Broadband

Here’s one indicator of the value customers place onbroadband: Last December, The Wall Street Journalreported that of the many US consumers shoppingover the Internet, those with broadband connectionsdid more holiday shopping online than their narrow-band counterparts—and spent 50 percent more. Thewillingness of broadband customers to spend moreonline might well be a measure of their willingness tospend more for broadband services overall.

Incumbent telecom and cable providers have twopotentially lucrative paths to choose from in increasingtheir revenues using broadband over the next three tofive years, Gil de Bernabé points out. One strategy is tooffer more communications services and features; theother is to become involved with content. Both pathsbegin from the same foundation, which is what mostproviders now have: basic broadband connectivity,flat-rate pricing, hands-off content, basic CPE, directsales, and mass marketing. Inefficiencies in marketingand provisioning have made it difficult for someproviders to break even, although the learning curvehas brought the costs of signing up and provisioning asubscriber much lower.

The Communications Services Route

After the foundation is built, the second phase of thecommunications services path is to improve the obvi-ous—to add or enhance services based on the existingnetwork. For example, Deutsche Telecom has opti-mized its DSL connections for multiplayer gaming byminimizing delay and jitter. Given that gaming is areal-time experience, subscribers may well want to

SPECIAL REPORT: Broadband

FIGURE 1 Opportu-nities for broadbandservices aboundwithin the residencein four key areas:communications,information serv-ices, entertainment,and monitoring andmanagement.

SERVICES IN THE BROADBAND HOME

COMMUNICATIONS SERVICES MONITORING AND MANAGEMENT SERVICES

VoIP Home surveillanceIEEE 802.11 phones “Nanny Cams”Presence SecurityIn-home key systems Fire, utilities, lighting

(remote management)

INFORMATION SERVICES ENTERTAINMENT SERVICES

VPN VideoHome Networking MusicParental Controls GamingStorage

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 44: packetQ1-05

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 51

pay more for better quality of service (QoS). Othersubscribers may want bandwidth for peer-to-peer(P2P) file sharing and pay for it. P2P usage nowaccounts for some 70 percent of all bandwidth usedby residences around the globe.

A provider might also offer services such as storagefor digital photos, movies, audio recordings, andother large files. Network management is anotheroffering: “Most early adopters have already set uptheir home networks, and the mass market is lesscomfortable with doing it themselves. Providers canset up and maintain a subscriber’s home network,bringing in a home gateway or router and linking upseveral PCs along with peripherals such as surveil-lance cameras or ‘nanny cams,’” Dobrec says. “Theycan also deliver firewall and other security provisionsfrom the network. Many mass-market customersdon’t have the confidence or know-how to managethese configurations themselves.”

Much can be done with marketing at this stage.Providers can bundle services such as local, long dis-tance, and Internet access to maintain customer loy-alty and reduce churn, and link up with videoproviders. “Customer churn is one of the biggest prob-lems facing service providers in competitive marketstoday. One of the best ways to reduce churn is to bun-dle services,” says Gil de Bernabé. As an example, henotes, in a 2003 analyst conference, management atBellSouth stated that when a local or long-distance cus-tomer adds just one additional service—DSL, wireless,or dialup—churn decreases by about 45 percent.“Bundling,” continues Gil de Bernabé, “also allowsservice providers to lower the monthly price of broad-band access without sacrificing subscriber profitability,because of higher ARPU [average revenues per user]and lower churn. The more services the provider offers,the longer customers tend to stay, and the more moneythey spend. When just one service is offered, the aver-age life of a subscriber is 32 months. But when threeservices are bundled together, the average life of a sub-scriber doubles.”

Providers can also offer tiered pricing with higherprices for higher QoS. Advanced market segmenta-tion can target specific customer groups with differentbundles of services. Bundling has been shown toincrease customer retention.

Value-Added Services

The third phase of a communications services pathincludes value-added services. Some service providersalready at this stage are reporting annual ARPU ofUS$75 to US$100 per month, and high earningsbefore interest, depreciation, taxes, and amortization

What’s Going Through Your Network?

“To boost the profitability of broadband networksand expand their service offerings, serviceproviders need more control of their network, espe-cially the ability to identify and classify applica-tions. Cisco’s Service Control Application Suiteenables both wireline and wireless broadbandproviders to guarantee performance and charge forhigh-usage services,” says Kevin Mitchell, direct-ing analyst, Service Provider Voice and Data atInfonetics Research.

The new Cisco SCE 1000 and 2000 Series ServiceControl Engines are purpose-built hardware andsoftware systems that give service providers theinformation and control to monitor and managenetwork activity precisely; to price according toQoS, SLAs, and even applications; and to optimizebandwidth at the applications level. The systemsreside at the network edge, behind the accessaggregation system, the CMTS, or the B-RAS. Onesystem can process up to 2 Gbit/s of traffic withcarrier-grade performance.

The Cisco 1000 and 2000 Series Service ControlEngines analyze the payload of individual packetsusing stateful deep packet inspection at Layers 3through 7. They can detect virtually any networkapplication, including Web browsing, multimediastreaming, and P2P file sharing. As a result, they canfully reconstruct individual traffic flows and theLayer 7 state of each one. Because they maintainstate information, the service control engines canidentify applications that employ dynamicallyassigned port numbers and track applications suchas VoIP or multimedia streaming that involve multipleinterrelated flows.

This level of traffic detail enables service providersto impose rules reflecting admissions policies ordata session characteristics. Providers can alsoshape bandwidth at a very granular level, redirecttraffic using specific protocols, and employ quotas.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 45: packetQ1-05

SPECIAL REPORT: Broadband

52 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

(EBIDTA) margins. Services offered might includethe triple play—voice, video, and data; advancedhome networking with features such as home man-agement and security; and healthcare monitoring.Providers might bundle wireline and wireless servicesto further increase customer loyalty.

In addition, many customers have demonstrated thatthey will pay more for guaranteed levels of servicequality; thus, service-level agreements (SLAs) willprobably enter the consumer arena. Phase three mayalso see the provider offering more sophisticated CPE:gateways and home controllers that make it easy toprovision new services such as firewalls, URL filtering,and virus checking, either from the CPE or from net-work-based systems. Intelligent networks will be ableto recognize what application a subscriber is using andadapt QoS to it, providing high-quality performance atlower operating costs.

The Content Route

Starting from the same foundation described earlier,phase two for a provider focusing on content wouldinclude digital rights management of the content, whichcable companies already do; billing systems capable ofhandling multiple types of content; and content deliverynetworks with distributed servers and storage to bringcontent close to the customer for better quality. Someproviders are already offering pay-per-view, personalTiVo-type video recording, and VOD. Providers candeliver a menu of such offerings, individually priced, ontop of flat-rate Internet access; they can also deliverdifferent QoS levels for different content. However, thisphase requires an intelligent network that can distin-guish between different types of content.

In the third phase, providers begin to own some of thecontent they distribute, although they are probablynot creating it. They can also offer Internet portals,content aggregation, subscriptions, and other features.ARPUs might not go up significantly, but loyalty will;as churn decreases, EBIDTA margins could increase.

Which Path Is Best?

As Gil de Bernabé says, “Build on your strengths.” Tele-com companies might be more comfortable followingthe communications services route, while cable compa-nies may find the straight content route the right model.Other types of providers—e.g., alternative or green-field—might follow a path between communicationsand content. “There’s no single model that fits all,”adds Gil de Bernabé, “but all service providers willtry to enhance their offerings in four areas: coverage,bandwidth, content, and services.”

What’s most important is to move quickly. The key

factor driving broadband growth is competition. InBelgium, for example, there is a strong incumbenttelecom provider and two strong cable operators thathave spurred one another to offer 3-Mbit/s broad-band service for about 39 Euros, or US$52. Alternativeproviders such as Yahoo!BB in Japan, FastWeb inItaly, and B2 in Sweden have built new networks thatenable them to provide high-quality broadband atvery competitive prices.

What Does the Network Require?

“Network infrastructure will undergo phenomenalchanges to support broadband value-added services,”says Gupta. “It will need bigger, fatter pipes. It willalso need intelligence, QoS, reliability, services ondemand, and security. And it will need to be service-driven, not infrastructure-driven.”

Intelligence, he emphasizes, will be crucial. Both cableand telecom operators have limited mechanisms toidentify the usage of individual users or applicationsand to regulate usage by bandwidth hogs. Generally,they now simply pile on bandwidth to solve shortages.This is a costly and not particularly effective solution,because P2P users, especially, use as much bandwidthas they can get. The ability to discern what applicationand protocol are being used will give providers the abil-ity to deploy, identify, and bill individual customers forservices such as VoIP, VOD, interactive gaming, video-conferencing, P2P applications, and IP Security (IPSec).

For example, when the next BitTorrent or eDonkeycomes into use, the provider needs to be aware of itspresence and identify its protocol so it can be detectedwhen subscribers use it. File sharing is a very goodexample, Gupta points out, because currently about15 percent of subscribers using it are hogging about 70percent of capacity on broadband networks.

Part of the Cisco Service Control Application Suite,the new Cisco Service Control Engine products havealready proven able to detect and map a signature forservice providers (see sidebar, page 51).

Broadband-Ready, from Edge to Core

Service providers will need to deliver residential gate-ways as a means to connect to their broadband servicesas well as provide all the appropriate LAN interfacesto connect to devices inside the home, says Dobrec.“The gateway to the network really needs to beagnostic regarding the protocol the subscriber uses,”he explains. “It should accept DSL, cable, Ethernet,Wi-Fi, or any other broadband signal.”

Cisco’s broadband-remote access server (B-RAS) isavailable on both the Cisco 10000 Series Router and

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 46: packetQ1-05

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 53

the Cisco 7000 Series Router. Fully compliant withthe newest DSL Forum standards (see “GuidingBroadband”), the Cisco 10000 Series Router signifi-cantly reduces the cost of delivering broadband serv-ices with a capacity of 60,000 simultaneous sessions

tightly coupled with QoS and other features. TheCisco 7600 Series Router, especially appropriate formetro Ethernet networks, handles up to 32,000 ses-sions per module while delivering Ethernet services,and the Cisco 7200 and 7300 Series support up to16,000 subscriber sessions per chassis. For cableproviders, Cisco offers the industry’s most completeline of DOCSIS-compliant cable modem terminationsystem (CMTS) solutions that can support differenti-ated services such as VoIP, gaming, video, and band-width-on-demand for large numbers of subscribers.

Cisco continues to work with telecom and cableproviders to create service solutions that enable theseproviders to offer the most appealing and most econom-ically delivered suites of services. Examples include itsBroadband Local Integrated Services Solution (BLISS),the Cisco Gigabit Ethernet Optimized VOD Solution,and its PacketCable Multimedia capability.

Providers can also offer home-based systems such asthe new Linksys Wireless-G ADSL Gateway andWireless-G Cable Gateway, together with peripheralssuch as the Linksys Analog Telephony Adapter,Wireless-G Gaming Adapter, and Wireless-B InternetVideo Camera.

In addition to offering a range of end-to-end prod-ucts, Gupta says, Cisco works with individualproviders to develop broadband offerings that suittheir own business plans and markets, to help themoffer broad, creative, and reliable services. “We’rewith the provider throughout the service cycle, fromplanning the infrastructure, designing the serviceoffering, implementing it, and optimizing it,” he says.“We can help improve service delivery, whichincreases customer satisfaction, which, in turn,increases revenues and profit growth.”

FURTHER READING

■ Cisco Broadband Aggregation Solutioncisco.com/go/broadband

■ Cisco Cable Solutions for Service Providerscisco.com/packet/171_16a1

■ “Driving Revenues in Consumer Broadband”cisco.com/packet/171_16a2

■ “Consumer Broadband: The Path to Growth andProfitability”cisco.com/packet/171_16a3

■ “Connected Homes: Essays from Innovators inConsumer Broadband”cisco.com/packet/171_16a4

■ Cisco 1000 and 2000 Series Service Control Enginescisco.com/packet/171_16a5cisco.com/packet/171_16a6

Guiding Broadband

Responsible for setting industry guidelines anddeveloping standards for DSL service is the DSLForum, of which Cisco is an active and principalmember. The DSL Forum numbers more than 200leading service providers, equipment manufactur-ers, and other interested parties around the world.Its reports, such as TR-059 released in 2003, in par-ticular, are guiding the future of DSL in all its fla-vors, which specify an IP-centric network architec-ture and general requirements for key componentssuch as B-RAS, and TR-092, which defines B-RASrequirements much more precisely.

TR-059 recommendations for network architecturespell out new infrastructure capabilities that will beneeded as well as interoperability requirements forthese networks. A key provision is that QoS bedelivered via IP, rather than ATM, which enablesproviders to deliver, for example, VoIP and gamingwithin certain latency and jitter parameters.

Focusing on the B-RAS, TR-092 specifies detailssuch as interfaces, protocols, traffic management,policy management, operations, and many others; inaddition to the commonly thought-of services suchas triple play, a compliant B-RAS system will alsosupport services such as multicasting and VPNs.

Cisco has actively contributed to both documents,as well as other works of the DSL Forum. “Cisco’sparticipation enables it to remain a leader in IPtechnology and offer expertise to its customers,”Gupta says. “Cisco has, in fact, more backgroundand expertise in IP QoS than any other vendor.” Andby participating in IETF, ITU, Metro Ethernet Forumworking groups as well as the DSL Forum, “Ciscohelps bridge between these groups, thus helping toensure compatibility of standards and visions.”

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 47: packetQ1-05

In an era of growing concern about law enforcement and secu-rity, policy makers and government administrators face constantpressure to improve their ability to respond quickly to criminalactivities and security threats. In some cases, new technology is acatalyst that enables them to improve operations.

Consider the exciting advancements taking place in mobile com-puting, as city governments and law enforcement agencies deployCisco Metropolitan Mobile Network (MMN) solutions to moreeffectively manage services in local communities. MMN technol-ogy from Cisco is extending the edge of the IP network andenabling new types of applications for the defense, public safety,and commercial transportation markets. These secure, stan-dards-based broadband mobility solutions integrate wired andwireless IP infrastructure across a city or regional area so author-ized users can access crime databases, fingerprint files, photoimages, and other pertinent information from any location.

“Real-time access to law enforcement information empowersorganizations to make faster, better, more informed decisions, ulti-mately increasing their productivity and effectiveness in the field,”says David Yuan, a mobility manager in Product and TechnologyMarketing at Cisco. “Rich applications such as IP video surveil-lance and government agency databases can now be accessed inreal time from virtually any location, allowing an entire network—not just a single client—to stay connected at all times.”

For example, in the state of Washington, the City of EverettPolice Department (everettpolice.org) has deployed Cisco MMNsolutions to supply network-roaming access to its patrol cars.The in-vehicle network supports rich applications and services tomake offenders’ photos, communications tools, scheduling tools,and management tools available to officers—without having toreturn to the station. “It’s great to have access to records and beable to network to other parts of the country to look for out-standing warrants or similar unsolved crimes,” says Sgt. BoydBryant, police sergeant and public information officer for theCity of Everett Police Department, and supervisor of the depart-ment’s technology projects.

Wireless Patrol

Cisco Metropolitan Mobile Networks enhance public safety and law enforcement.

ENTERPRISE SOLUTIONS

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 55

STAYING CONNECTED Law enforcement agencies and city governments can access rich applications such as video surveillance from virtually any location, allowing the entire network to stay connected at all times.

By David Baum

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 48: packetQ1-05

According to Bryant, the average police officer spendsabout four hours per 12-hour shift in a police sta-tion—partly because that’s the only way they canaccess police records and other computer-based infor-mation. “Officers are out of touch with the commu-nity during that process,” he adds. “Their eyes are nolonger engaged in what’s happening on the street.”

The City of Everett wanted to devise a mobile wire-less strategy and associated networking infrastruc-ture that could support rich applications and servicesso it could keep officers fully connected while in thefield. After evaluating technology and speaking withother police departments, Everett chose Cisco andpartner Northrop Grumman to configure and deploythe department’s new mobile network solution. Thesolution is built on Cisco 3200 Series Mobile AccessRouters, Panasonic laptops in the squad cars, andCisco Aironet bridges.

Broadband Wireless Solutions

Thanks to its compact size and rugged design, theCisco 3200 Series is easy to deploy in public safetyvehicles. It can withstand the harsh demands of amobile environment, and it uses the Mobile IP stan-dard to allow network nodes to roam across multiplewired or wireless networks while maintaining liveconnections. “The Cisco 3200 extends the edge of theIP network into the field, allowing users to maintainsecure data, voice, and video connections while theirvehicles are in motion,” explains Marc Bresniker,product manager for the Cisco 3200 Series.

Both the Cisco 3200 Series routers and the CiscoAironet bridges use IEEE 802.11b/g broadband wire-less technology to supply much higher bandwidththan the City of Everett’s legacy system coulddeliver—up to 54 Mbit/s. This enables Bryant and histeam to deploy rich applications and bandwidth-hun-gry voice and video communications. “The flexibilityof the Cisco Wireless and Mobile Access Router solu-tion is the key,” Bryant says. “Nothing else availableon the market allows you to incorporate a variety ofstandards-based, network-connected applicationswith field printers, cameras, presentation tools, andan almost endless variety of other devices into a net-work on wheels.”

With the ability to access photos of offenders andcrime scenes, instantly updated operational docu-ments, and outstanding warrants—all delivered to thecommunity through a networked multimedia theateron wheels, Everett police officers are not only betterequipped to apprehend criminals, they are more con-nected to the community than ever before. Addition-ally, the department’s mobile command vehicles canserve as core networks in a disaster zone—supportingemergency personnel on the scene, transmitting obser-vations back to a command center, and controllingmobile video cameras in areas where officers can’t go.

“Ultimately, the goal is to use 802.11 to provideoverlapping coverage areas across the majority of thecity,” says Bresniker. “Future use of the networkcould include other city agencies such as the firedepartment and department of public works.”

Flexible Deployment Options

As the City of Everett is demonstrating, Cisco Metro-politan Mobile Networks use the 802.11 standard toprovide overlapping coverage areas. These networksuse Cisco Aironet 802.11 access points and bridgesand the Cisco 3200 Series as an outdoor wirelessrouter to create the coverage areas. Cisco Aironet1400 Series wireless bridges are used mainly forpoint-to-point and point-to-multipoint backhaullinks. (Backhaul links are useful where fiber or wiredlines are not available.) Cisco Aironet 1300 Seriesaccess points and bridges can be used either asbridges or access points. The Cisco 3200 Series, usedin rugged outdoor enclosures, combines multiple802.11 radios with Layer 3 routing to provide addedflexibility in where and how coverage can bedeployed without the need for wired backhaul.

In addition to in-vehicle deployments, wireless accesspoints, bridges, and wireless routers can be placed oncity buildings, fire stations, communications towers,or—as will soon be the case in London’s Westminsterborough—on top of light poles along with closed-cir-cuit TV (CCTV) cameras.

The Westminster City Council (westminster.gov.uk) isusing Cisco MMN technology not only to fight crime,but also to provide real-time information to city work-ers so they can better manage street services such asparking, premises licensing, and environmental waste.

The Westminster City Council’s initial motivation wasto create a flexible platform for Wi-Fi-based monitor-ing to supplement existing CCTV systems. As part ofan extensive pilot project, the city is deploying theCisco 3200 Series with 802.11b/g wireless capabilityto enable these wireless connections. The equipment isbeing mounted on lampposts and buildings to extendthe metropolitan-area network. Flexibility is a chiefadvantage of this mobile infrastructure. Seventy Wi-Fiaccess points and 40 CCTV cameras will be deployedaround Westminster. Westminster expects that thedeployment will pay for itself within two years andthat the productivity of street-based services willimprove by around 20 percent.

Because of the planning, coordination, and regulationneeded to move traditional CCTV cameras—whichinvolves moving street poles, digging trenches, andrunning cables—it used to take from three to sixmonths to set up a new monitoring station. With theCisco mobile infrastructure, the Westminster City

56 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 49: packetQ1-05

Council can relocate its monitoring systems withinthree hours—simply by provisioning a cherry pickerand moving the box that contains the router andrelated wireless gear. For example, a camera wasquickly moved into position to record the activities ofdrug dealers, who were later apprehended. As aresult, the system helped eradicate drug dealing in thecoverage area.

The Cisco 3200 Series can use multiple 802.11 inter-face cards configured as bridges or access points, aswell as directly connect application hardware such ascameras and sound sensors. City Guardians andother Westminster personnel can use personal digitalassistants (PDAs) and laptop computers to wirelesslytap into any of the cameras, telemetry devices, andnoise monitoring devices that are integrated into thenetwork. IP is the fundamental enabling technologyin the project, combined with MPEG2 encoders, aPC-based management system, and sufficient storageto hold images and other data from all the camerasfor a five-day period.

The Westminster network can also be extended toinclude applications such as automated number platerecognition (ANPR) software, which works with thecamera footage to recognize license plates and comparethem with a central database. Mobile fingerprint recog-nition systems can be enabled so that law enforcementofficials can make instant arrests with positive ID.

Andrew Snellgrove, network manager at Westminster,says the city in effect extended its corporate data net-work from Council buildings (a LAN/WAN environ-ment) into the street (a wireless metropolitan network).“Running multiple applications over the same IP infra-structure provides the tools to take the Council to ourresidents. The wireless CCTV implementation providesmobile workers access to back-office systems at broad-band speeds and the ability to manage on-street assets.The radio coverage in the wireless domain hasexceeded the plan established by the RF survey and hasgiven us greater flexibility to deploy devices. Histori-cally, our CCTV cameras have been at fixed locationsdue to limitations with the technology. The Cisco 3200Series Mobile Access Router allows mobile cameras invehicles to be connected online, together with viewingof video streams from mobile devices from the street.”

“A particular strength of the Cisco 3200 is the capa-bility to support traditional and wireless technologies.Multiple radios and the use of telemetry are essentialfor our implementation, and this is also provided bythe Cisco 3200,” he adds.

Using Wi-Fi technology raises security issues. At West-minster City Council, following testing, Snellgrove isconfident that security is more than adequate to pro-tect the content the Council delivers. “We use stan-dards-based encryption and 802.11x, combined withfirewall and Cisco VPN technology. For an enterprise

Wi-Fi network, a robust security strategy must beadopted and this needs to have a multitiered approachwhile balancing the network design between securityand performance. Network security has to be fit to apurpose; unnecessary layers have a detrimental effecton network usability. Wi-Fi in itself is not secure, it ishow you deploy it and what you deploy.”

Broad Technology Horizons

Mobile routers enable a shift in the way organiza-tions communicate and share information. Solutionssuch as Cisco IP communications, Cisco MMN, andCisco integrated security provide the infrastructureon which regional and local governments can basenew ways of doing business. These technologies canbe used not only to bolster law enforcement agencies,but also to create intelligent information networksand connected communities. They can be applied tomany public sector agencies, such as transportationand public works, as well as to other industries alto-gether, from telemedicine to factory automation.

“MMN technology is a good fit anywhere in whichsecure, ruggedized wireless equipment is useful,”points out Yuan. “For example, ruggedized wirelessequipment might be required at a port or factory.Similarly, fleets of vehicles in a campus environmentcould be equipped with mobile infrastructure toextend the learning or work environment.”

In short, Cisco MMN solutions can be applied wher-ever users can benefit from a secure, scalable, broad-band network that integrates wired and wireless IPinfrastructures.

“In public safety and government service, you need tounderstand three things,” says Boyd Bryant. “First,you are becoming more technology-dependent foryour efficiency, so your systems must be backed by acorporation you know will be there several years fromnow. Second, you have to be certain you have thecapacity to transition to another service if you needto. Third, you need to be able to support redundantnetwork connections to help ensure that you’re notonly covered, you’re resilient. The Cisco solution isthe only one we’ve found that gives us all of that.”

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 57

FURTHER READING

■ Cisco 3200 Series Wireless and Mobile Routerscisco.com/packet/171_7a1

■ Cisco MMN Flash Democisco.com/packet/171_7a2

■ Cisco Aironet 1300 Seriescisco.com/packet/171_7a3

■ Cisco Aironet 1400 Seriescisco.com/packet/171_7a4

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 50: packetQ1-05

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 59

When organizations begin sending voice over theirdata networks, two previously separate responsibili-ties converge. “Traditionally, the IT department tookcare of the data network, and a separate telephonydepartment handled phone traffic and faxes,” saysAlex Hadden-Boyd, director of marketing for IPcommunications in the Product and Technology Mar-keting Organization at Cisco. “When companiesadopt IP communications, both types of expertiseremain needed and both staffs have the opportunityto learn something new.”

One Strategy: Infrastructure and Services Teams

A textbook example of a successful organizationaltransition to IP communications is Liz Claiborne(lizclaiborneinc.com), the New Jersey-based clothingretailer. Before deploying Cisco CallManager for IPtelephony and call center operations in 2003, thecompany’s datacom and telecom teams rarely inter-acted. However, the two teams already reported tothe same director, thanks to the foresight of VicePresident of Information Technology John Kovacand IT Director Anthony Iadisernia. “We knew therewould eventually be convergence, so we organizedunder one director from the outset, to avoid turfwars,” says Kovac.

Once the project was approved, Iadisernia shared hisplan with staff members: the two organizationswould merge to become a single IP communicationsteam comprising an infrastructure group and a serv-ices group. Each group would include nearly an evennumber of members from the datacom and telecomgroups. The infrastructure group would manageimplementation and project planning, while the serv-ices group would take charge of day-to-day monitor-ing, reporting, provisioning, vendor relations, andadds, moves, and changes.

Today the two groups work side by side. “We inten-tionally seated the teams together so that we couldinformally leverage each team’s experience and tech-nical knowledge,” says Kovac. All that remains of theoriginal division along datacom and telecom lines isone chief architect for data and another for voice,who also sit together and report directly to Iadisernia.

Before and during the transition, Liz Claibornecross-trained employees on voice and data. “If weupgraded the network, for example, we’d assign oneor two voice specialists to observe and participate,”says Iadisernia.

When IT Inherits IP Telephony

Adapting the IT organization to support IP commu-nications is somewhat simpler for companies thatpreviously outsourced PBX operations to vendorsand partners, as was the case for Tequila Herradura(herradura.com) of Mexico. Previously, Tequila Her-radura had managed its data network with inhouseresources and outsourced management of its telecom-munications network and devices. Therefore, whenthe company migrated to IP communications, thefirst task for IT Director Irvin Valencia was to traininhouse IT staff on IP telephony management, usingthe services of Hewlett-Packard. “The IT staff foundit easy to learn to use Cisco CallManager and theCisco IP Phones, and were excited to learn a newtechnology,” says Valencia. “Working with IP teleph-ony makes their jobs more interesting and improvestheir value in the workplace.”

Adding voice traffic to the network did not signifi-cantly increase the workload for the Tequila Her-radura IT group. “In fact, it’s easier to manage theconverged voice and data network than it was tomanage data alone because we’ve begun using Web-based tools like Cisco CallManager Administration,”says Valencia. “The voice aspect works by itselfalmost 100 percent of the time.” Troubleshooting, inparticular, is faster. “Before, identifying the source ofa failure took time because we had to schedule anappointment with the PBX supplier,” says Valencia.“It was a waste of time and bad for productivity.Now our own staff can identify and resolve problemsjust as they’ve always done for data.”

Managing Internal Change

Tequila Herradura introduced IP telephony to itsemployees gradually, starting in February 2002 withjust 50 employees. “We emphasized to the partici-pants that they were an important part of the organ-ization, and people were very eager to volunteer,”says Valencia. “Soon, seeing the benefits of IPtelephony, such as the directory, four-digit dialing,and unified messaging, more and more people in the

ENTERPRISE SOLUTIONS

Companies and employees that have successfully adopted converged networks share lessons learned.

When Organizations Converge

By Rhonda Raider

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 51: packetQ1-05

company approached us to participate, including thegeneral director of our company.” By March 2004,every employee in the organization had a Cisco IPPhone. “Productivity is difficult to measure,” saysValencia. “But the benefits of IP communicationswere very evident to our employees, leading toenthusiastic adoption.”

Like Tequila Herradura, Liz Claiborne took pains toensure its employees knew what to expect from CiscoIP communications. Members of the services groupmet with executive assistants before the transition tounderstand how to use their phones and which newIP telephony features would benefit them. “We pro-vided lots of hand-holding to ensure high adoption,”says Iadisernia.

Cisco’s Own Experience

Liz Claiborne and Tequila Herradura benefited fromlessons learned by Cisco during its own migration toIP communications in 1998–2001. At the time,Graham Hosie, now a Cisco IT director, was seniormanager for global voice services. When asked tohead up an effort to deploy Cisco CallManager inplace of legacy TDM switches, Hosie assembled a 60-member global team, whose members contributedexpertise in voice, data, and hosting.

“Until that time, Cisco’s voice and networkinggroups were located on the same floor but had noidea what the other did,” says Hosie. “To deploy amultiservice network, we needed both groups towork together for planning, process, and support.” Ifa call didn’t go through, for example, Cisco needed aprocess and organizational model to determine thecause and assign the appropriate people.

60 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

”If the PBX Is Going, What About Me?”

When companies decide to adopt IP communications, ITstaff—especially telephony specialists—can wonderabout the effect of the transition on their jobs. In fact,telephony specialists possess a collection of skills otherthan PBX administration that remain essential for compa-nies that adopt IP communications.

■ Deep understanding of end users’ business needs,which can be as simple as whether a manager’s andadministrative assistant’s phones ring simultaneouslyor one after the other, and as complex as casual con-tact centers—where employees interact directly withcustomers in addition to their other job responsibilities.“These real-world aspects of telephony don’t disap-pear just because you change the infrastructure anddevices,” says Cisco’s Hadden-Boyd.

■ Expertise in working with carriers, a skill that remainsindispensable.

■ Interpersonal communication skills. “Network engi-neers usually don’t need to concern themselves withthe effect of network change on users, because thechange is generally invisible,” says Hadden-Boyd. “Butthe moment you change a password or require users topress a different key sequence, communication with

users becomes very important, and telephony special-ists have honed this skill.”

“When we discussed the transition, we always empha-sized the continuing importance of the telecom staff’srole in the organization,” says Liz Claiborne’s Kovac. “Wealso explained that they would have the opportunity tolearn a new technology that would help them in theircareers.”

Cisco followed a similar approach with its own IP com-munications deployment. “Through training and informalbrown-bag lunch sessions, the staff on the voice sidestarted to understand that their careers were not over,”says Hosie at Cisco. “On the contrary, they’d get a boostby advancing to the leading edge of new IP telephonytechnology, and their knowledge was critical to the effort.They understood that their long-term career successhinged on their also learning a networking skill set.”

“Ultimately, IP communications is an opportunity for bothsides to learn something new,” says Doug McQueen, asolution implementation manager at Cisco. “Networkstaff want to learn about voice, and voice staff want toget their teeth into the network.”

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 52: packetQ1-05

Hosie enlisted the support of a senior engineer whowas known for his technical knowledge to break downthe barriers between the voice and networking organi-zations. Almost immediately he physically relocated thegroups so that they worked side by side. “Co-locatingthe groups fostered idea sharing and an understandingof the other group’s concerns and expertise,” saysHosie. “Networking and telephony people beganbuilding personal relationships, eating lunch together,getting to know each other, and realizing that the otherteam was not a threat, but rather provided complemen-tary skills to achieve common goals.”

Next, to better address the technology and businessneeds of IP communications, Cisco reorganized ITinto three groups: IP Telephony Operations, Emerg-ing Technologies, and Foundation Technologies,which includes both voice and data. “We’ve gottenaway from networking and voice silos,” says Hosie.“The exception is that we’ve retained a voice servicesgroup for client-facing activities.” Cisco deliberatelyused traditional terminology, “voice services,” so thatemployees know who to call when they have a ques-tion about their phones or unified messaging.

“The organization that is customer facing is the over-all owner,” Hosie continues. “If an employee has aquestion or problem with their IP telephone, theywant to talk to the telephony people. They don’t carethat it’s running on the data network.”

Blurring Turf Boundaries

At the outset, Cisco voice and data engineers hesi-tated to provide each other with access to their equip-ment. “In particular, the networking group had reser-vations about the voice people touching the routersthat provide access to the PSTN, and voice peopledidn’t think data people should have access to theCisco CallManager,” says Hosie. “People worriedabout someone from the other group inadvertentlybringing down the network.” Training alleviatedthese concerns. “We learned to understand, respect,and play well in each other’s sandbox,” says DennisSilva, an IT manager for IP telephony at Cisco.

Like management at Liz Claiborne, Cisco providedboth formal and informal training so that the net-working and voice groups could learn the other tech-nology. The informal training, which Hosie describesas “cross-pollination,” included brown-bag lunchsessions to talk about new technologies. “We tookpeople with extensive voice and limited networkingexperience, or vice versa, and trained them to supportconverged voice over IP,” says Hosie. Employeesappreciated the reassurance about the continuedimportance of their jobs, as well as the opportunityto learn new skills. “We didn’t lose anybody becauseof concerns about job loss or change,” Hosie notes.

A New Perspective on Change Management

Among the biggest cultural shifts to emerge from IPcommunications at Cisco was a different view ofchange management. Traditionally, networking peo-ple had the luxury to make changes to the networkduring the day because people rarely notice a briefinterruption. That’s not the case when voice travelsover the network because even a brief network out-age might interrupt live conversations.

“Voice is the most visible application we’d deployedon the network,” says Silva. “In the past, if we had tobring down the network to make a change, we coulddo it at 5:30 p.m. and almost nobody would notice.But if someone does a failover to a backup routerwhen voice runs on the network, you can potentiallykill thousands of phone calls. We had to come to anunderstanding about when we could do changes.”Voice-impacting network changes are done after9p.m. local time.

New Job Opportunities

Rather than eliminating jobs, converging the dataand voice networks often creates new job opportuni-ties (see sidebar, “If the PBX Is Going Then WhatAbout Me?”). “Our staff needs didn’t dwindlethrough convergence,” says Cisco’s Hosie, citing thatconvergence brings on new capabilities in call pro-cessing, Cisco Unity Unified Messaging, Cisco IPContact Center (IPCC), Web collaboration, andvideoconferencing. Similarly, Liz Claiborne retainedthe same size staff. Because it achieved some efficien-cies by converging its network, the company was ableto redeploy existing staff to projects that had lan-guished on the back burner for want of people, suchas training, implementation, project planning, main-tenance, and support.

Hosie’s team began speaking to key individualsabout these new job opportunities in the planningstages of the transition. “We coined the term ‘IPtelephony engineer’ to capture the blend of existingand new skills we would need,” he says. For exam-ple, someone who used to be a PBX technician andworked with a PBX connected to the PSTN couldbecome an IP telephony engineer who worked withCisco CallManager connected to the LAN and WANas well as to the PSTN. “Now there’s more sophisti-cation and more excitement about new opportunitiesfor learning,” says Hosie. IP telephony engineers notonly have to understand PBX functions on CiscoCallManager, but also how the network is used toroute voice packets to the appropriate end device.

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 61

Continued on page 64

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 53: packetQ1-05

While the voice and data specialists who come togetherto support IP communications increase their worth bylearning something about the other technology, theystill retain their main focus. “IP telephony is an appli-cation that uses the IP network as its transport,” saysSilva. “When an organization adopts IP communica-tions, telephony engineers continue to apply their sameskills, just at a different layer.”

The same applies to network engineers. “Networkengineers don’t necessarily want to become applica-tion specialists,” says Marc Holloman, global opera-tions manager for Cisco Intelligent Network Services.“Their specialty is the plumbing underneath. There isa need to learn about the voice application, and someof our engineers initially expressed a little of ‘Weweren’t hired for this sort of thing.’ But at the end ofthe day, network engineers viewed IP communica-tions as an opportunity to learn and become evenmore valuable employees.”

Valuable Diversity

Liz Claiborne’s Kovac views his company’s experi-ence with IP communications as underscoring thevalue of diversity. “The reason for diversity is to getdifferent perspectives, ultimately resulting in betterdecisions,” he says. “Having created a single IP com-munications team, we’re getting different technicalperspectives, which increases the strength of the ITorganization.” Valencia, of Tequila Herradura,agrees. “Our IT staff is thrilled that they have theopportunity to learn something new.”

64 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

FURTHER READING

■ Cisco IP CommunicationsCisco.com/packet/171_7a1

■ “Migrating to IP Telephony?” (Packet, Second Quarter 2004)cisco.com/packet/171_7a2

■ Cisco IT@Work: IP Communicationscisco.com/packet/171_7a3

Lessons Learned

Make Organizational Changes Early

Liz Claiborne’s Iadisernia suggests that converging thetelephony and networking groups should occur either atthe same time as the network convergence or immedi-ately afterwards. His organization had intended to mergethe groups about a year after implementation, but ulti-mately did it after 10 months.

Retain Subspecialties Within the IP Communications

Group

Even with its converged network, Cisco distinguishesamong issues that concern PCs, networking, hosting, andtelephony applications. “If a client uses Cisco IP Commu-nicator, a softphone application that enables voice com-munication from a laptop, the IP Telephony Operationsteam does not manage the laptop. Instead, they partnerwith the PC support team that manages the laptop,” saysHolloman.

Communicate Frequently and Openly with Networking

and Telephony Staff

Cisco, Liz Claiborne, and Tequila Herradura all credit thesuccess of their transition in large part to a policy of opencommunication. “Had we not been so open about our

strategy, we might have had a lot more concern about jobroles,” says Kovac. Adds Hosie, from Cisco, “Don’t under-estimate your audience or try to mask what you’re doing.Explain the business drivers for the transition to IP com-munications, and clearly communicate the career oppor-tunities. This is the opportunity of the future.” The impor-tance of communication applies to successful useradoption as well. “To just say, ‘Here’s a new phone,’ is notas successful a strategy as saying, ‘Now you’ll haveincoming caller ID, a directory, and four-digit dialing,’”says Hadden-Boyd.

Organize Under One Director

“Cross-training on voice and data technologies was verysuccessful, and this might have been a difficult road if bothdata and voice didn’t report to me,” Iadisernia adds. “I hadto ensure that voice traffic received priority, which waseasy to do when both groups reported to me. If we hadbeen organized with voice reporting into facilities whereasdata reported to IT, it might have been a difficult battle.”

IP Communications, Continued from page 61

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 54: packetQ1-05

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 65

The hospitality industry took a beating between2001 and 2003 as a plague of difficulties—the SARSepidemic, the September 11, 2001 terrorist attackson the US, and the economic downturn—daunted allbut the most intrepid travelers. 2004 proved to be abetter year, but even in fatter times, hoteliers arechallenged to stay competitive amidst a new genera-tion of business demands. Enter the IP network.

With IP technology, hotel operators are finding aquartet of compelling opportunities: creating newrevenue streams, improving the guest experience,improving operational efficiency and staff productiv-ity, and reducing the costs associated with real estate.

Hoteliers’ Hurdles

To understand what converged, multiservice net-works have in store for the hotel industry, take a lookat the challenges that impede hotel profitability.

Fostering brand loyalty and differentiation—Hotelstoday face increased competition among the majorbrands for a limited number of travelers. Buildingbrand loyalty is pivotal to profitability.

Increasing revenue, maintaining margins—Yester-day’s revenue sources—high-speed Internet access(HSIA), for example—are standard (and gratis) faretoday. Moreover, guests are abandoning hotel tele-phones services in favor of personal cell phones.

Increasing guest satisfaction—Guests generally expectthe same business or entertainment technology in theirhotel rooms as they employ in their homes and offices.

Reducing OpEx, improving efficiency, and boostingproductivity—Hotels, like all businesses, must con-tinuously seek new ways to lower overhead andimprove processes.

Improving guest safety—Recent, deadly attacks onhotels have made guest safety a new priority. Formore information on this growing concern, visitcisco.com/packet/171_7c1.

Problem-Solving with Technology

Many well-respected hotel chains worldwide, such asthe Sheraton, Holiday Inn, Mandarin Oriental, andCrowne Plaza, have already invested in converged IP networks, retiring their legacy PBX systems and

moving voice networks onto modern, streamlined IPtelephony infrastructures. Products and technologiesfor wireless networks, as well as Cisco’s IP communi-cations solution suite, enable hotels to offer highlypersonalized services for guests, plus Wi-Fi connec-tivity throughout hotel premises for guests and staff.

With guest-friendly, in-room phones such as theCisco IP Phone 7970G, which features a high-resolu-tion color touch screen, hotel IT staff can create apersonalized interface that enriches the guest’s expe-rience and builds loyalty, while opening limitless rev-enue opportunities. IP phones provide hotels withflexibility. The soft buttons, which allow the hotel toconstantly change the phone features and upgradeservices, are a major leap from the old analog hotelphones with hard-coded buttons and paper templates(and which generally support only dialup Internet).

Behind the scenes, new models of efficiency andautomation are at work. The same network infrastruc-ture that allows a guest to e-mail a voice message to acolleague over a Cisco IP Phone helps the hotel itself tomonitor building access, manage climate controls, andperform myriad tasks that previously have run overdisparate systems (and required separate staff mem-bers to manage them).

Hong Kong’s Langham Place Hotel

The Langham Place Hotel, a 665-room, five-star busi-ness and leisure property, opened in July 2004. Thehotel invested in an advanced IT system that includes aCisco voice and data network and provides high-speedwired and wireless Internet access throughout the hotel.

ENTERPRISE SOLUTIONS

Hotel operators deploy converged IP networks to vanquish fiercecompetition and indulge sophisticated guests.

Technology Wakeup Call

By Joanna Holmes

FIVE STAR NETWORK In Poland, the Sheraton Krakow’s IP networkincludes 600 Cisco IP Phones and wireless connectivity.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 55: packetQ1-05

“IP technology gives us a competitive advantagethat lets us grow our market share and stay aheadof the curve,” says Brett Butcher, managing directorfor the Langham. “And as Asia’s most technologi-cally advanced hotel, we believe we’ll continue towin the hearts of business travelers who are techno-logically savvy. Our guests appreciate the speed andconvenience this hotel provides.”

Acknowledging the hospitality industry’s need toprovide highly personalized service, Butcher says,“We are able to achieve even more than usual withthe hotel’s IP technology.”

Langham guests can use their mobile Cisco IP Phonesanywhere in the hotel. “Guests are impressed with our‘Wi-Fi’ bubble, which offers wireless broadband con-nectivity in every part of the hotel. We receive excellentfeedback on our IP telephony; guests find the featuresof the phone—including SMS [Short Message Service]and Web connectivity—very helpful,” says Butcher.

The first year’s results are not in yet. However, says,Butcher, “Based on the pure exposure we’ve gained inthe market place as an industry leader, we’ve alreadymade a handsome return on investment.”

Mandarin Oriental, New York

Nick Price, CIO and CTO for the Mandarin OrientalHotel Group, also chairs the forward-looking HotelTechnology Next Generation In-Room Technologyworkgroup (htng.org). Perhaps that’s why the chain’srecently opened New York property is a 38-floor show-case for today’s most leading-edge hotel applications.

Opened in late 2004 in Manhattan, the MandarinOriental is New York’s first hotel to offer plug-and-play live broadcast capabilities, providing guests withservices for live television feeds, videoconferencing,and Web streaming. The hotel’s in-room offerings setnew industry standards by featuring systems as tech-nologically advanced as they are user friendly. (See“Mandarin Oriental’s IP-Enabled Entertainment Sys-tem,” at cisco.com/packet/171_7c2.)

66 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

Revenue Revisited: Ousting the PBX

According to many in the hotel business, the role of thecell phone has been to make the hotel PBX obsolete.“The revenue opportunities that have existed in hotelshave historically been very significant,” says Price.“Hotels routinely made half-million dollar investments inPBX technology in full expectation that they wouldrecoup that money handsomely.” But those returns arerapidly disappearing as guests bypass the hotel phone infavor of personal cell phones.

“If people aren’t making external calls through the PBXbecause they have cell phones,” Price observes. “Youhave to question the very presence of a PBX in the hotel,”he continues.

Thus hotels face two fundamental choices, he says:Either reduce PBX costs (and much PBX functionality), orwork within the same cost structures to introduce fea-tures and functionality that compete with the guests’ cellphones. “And that is the role of IP telephony,” says Price.

“We’re charting uncharted waters,” he continues, askingrhetorically, “How do we bring guests back from a cellphone experience?” The Mandarin’s decision on thispoint was to optimize its in-room handsets for conferencecalls. “Conference calling is widely done in hotel bed-rooms today—but all that hotels typically see of it is

either a free 800-number call or a 50-cent charge for the800 call number.” Price describes how the Mandarin Ori-ental’s IP telephony system replaces the bridge normallyused for conference calls, creating a genuine revenueopportunity for the hotel with each conference call.

Also critical to weaning guests away from cell phones,says Price, is the hotel handset itself. “We have a verysuperior, off-hook hands-free experience with the Ciscohandset, and that contributes significantly to the guests’desire to use it,” Price observes, noting that the phones’usability experience compares favorably with cellphones, but offers far more features. “The Cisco IPPhone is clearly the handset of choice, particularly ifyou’re doing conference calls or long calls,” Price says.“We anticipate that the feature function and services wecan add onto it will enable us to reverse revenuelosses—and do so in a legitimate, meaningful way thatadds value for guests.”

Whether PBXs have had their day is a point on whichPrice feels strongly. “IP telephony is probably the onlyopportunity we have to stop our revenues going to zero,”he says. “I don’t see any other traditional telephonyprovider or technology [in hotels] that currently presentsany service beyond a dial tone. And if that’s all you’ve got,users are not interested.”

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 56: packetQ1-05

Mandarin Oriental, New York, invested significantresearch in the installation of live broadcast capabili-ties. The Time Warner Center, where the hotel is situ-ated, features advanced broadcast cable installationsthat allow guests and hotel IT staff to bypass satellitetrucks or the lengthy process of contracting a cameraand sound crew. Guests can book the services tobroadcast content such as live newscasts or keynotespeakers for live Web streaming.

Cisco IP Phones provide enhanced in-room capabili-ties, including color touch screens with languageoptions (based on stored user profiles) in some of thetop suites. Conference call capabilities include hostingcalls for as many as six parties at once. One of themost effective ways the Mandarin Group gains differ-entiation for its New York property is by offeringguests a much-needed business service: “We’reenabling self-provisioned conference calling, which isextremely difficult on typical hotel phone systems,”says Mandarin Oriental’s Nick Price.

With its Cisco platform, the Mandarin Oriental’s con-verged guest services network allows the hotel to addservices as needs arise, making expansion capabilitieslimitless. The interlinking of the various hotel systemsallows operations to run more efficiently, and that low-ers operating expenses and makes for happier guests.

Sheraton Krakow

June 2004 saw the opening of the Starwood Group’sSheraton Krakow, the first international five-star hotelin this Polish city. The Sheraton Krakow features anintegrated Cisco IP communications system that lever-ages voice over IP (VoIP) and prominently featuresCisco color IP Phones in every guest room. The net-work comprises Internet, data, and voice access for allguests and hotel staff, and includes more than 600 IPtelephone handsets and wireless connectivity.

“More and more often, guests require Internet access,and companies themselves now expect their employ-ees to stay in touch with their colleagues left in theoffices,” says Warwick Gunning, general manager ofthe Sheraton Krakow.

Addressing these needs, the Starwood Groupdeployed a converged IP network leveraging Ciscoproducts and technologies. The resulting infrastruc-ture is an integrated Fast Ethernet network that cancarry data, voice, and video, while enabling futureservices such as TV over IP.

Wireless LAN access is available throughout all hotelcommon areas. The Sheraton Krakow operates its ownprivate wireless network for staff voice communicationthrough wireless IP phones. The hotel also uses thewireless network for public access, creating a separatevirtual LAN for high-speed wireless networks forgroups of guests.

All 232 of the Sheraton Krakow’s rooms areequipped with the Cisco IP Phone 7970G with colortouch screen. As well as providing Internet access,these phones allow guests to send e-mail, check hotelbills, book meeting rooms, and access a raft of usefulinformation services.

While making a positive impression on guests, theSheraton Krakow’s Cisco infrastructure alsoimproves the hotel management tasks. “The IP net-work allows our staff to work more efficiently,resulting in cost savings and further helping ourprofitability,” says Gunning.

The IP infrastructure is based on Cisco CallManagercall-processing servers and uses software and the V/IPSuite Server from Cisco partner Nevotek. The keyfunction of the whole solution is its integration withthe hotel’s property management system throughNevotek’s V/IP Suite. This software enables hotelstaff to use a phone as a simple terminal on whichthey can communicate room status or mini-barrestocking needs.

The Nevotek V/IP Suite on the large, colorful LCDdisplays of Cisco’s IP phones gives guests touch-screenaccess to a wealth of services. The screen works as anInternet browser, using popular industry standardssuch as XML and HTML, so the whole system is easyto enhance in the future, with virtually no limits.

Making the Move to Converged IP Networks

To make a case for implementing IP telephony, saysthe Langham’s Brett Butcher, “First, you have to wantto provide your customers with cutting-edge technol-ogy and understand the inherent value of this proposi-tion in attracting and maintaining your clients. Andsecond, you have to get close to what the technologycan now offer and envisage what the future couldhold.” By migrating hotel services and legacy voicesystems into a converged Cisco IP infrastructure, thatfuture can hold unlimited possibilities.

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 67

GUEST FRIENDLY Cisco IP Phones with color touch screens arehelping hotels stay competitive.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 57: packetQ1-05

Ethernet is slowly but surely making a major dent in metro net-works. Between 2003 and 2007, Ethernet will greatly impactmetro telecom equipment spending, accounting for an estimatedUS$24.9 billion over the five-year period, according to InfoneticsResearch. Each year during this period, metro Ethernet willaccount for a larger portion of metro capital expenditures(CapEx), driving a projected compound annual growth rate(CAGR) of 27 percent. Technologies such as Resilient Packet Ring(RPR), Multiprotocol Label Switching (MPLS), and very-high-data-rate DSL (VDSL) are paving the way for Ethernet to take itsplace as a respected, telecom-grade option for metro networks.

“One of the most important drivers of the metro Ethernet evolutionis that both enterprises and residential customers are increasinglyseeking customizable services from their providers. They not onlyexpect higher bandwidth connectivity services, but also want thebandwidth delivered at greater levels of granularity,” says WeiWang, product marketing manager for metro Ethernet in Cisco’sProduct and Technology Marketing Group. Ethernet as a technol-ogy offers many benefits. Chief among them, notes Wang, is thatservice providers can deliver bandwidth up to 10 Gbit/s to their cus-tomers, support demanding applications, and tailor the bandwidth

to deliver performance that meets the needs of specific businessapplications. Metro Ethernet also enables providers to seamlesslyoffer new services, such as videoconferencing, managed storage,and online interactive gaming, to enterprise and residential cus-tomers in one network. Additionally, notes Wang, “New andimproved intelligent Ethernet equipment delivers advanced net-work security, and rich quality of service [QoS] functionalities allowservice providers to differentiate their offerings from competitors,improve their profit margins, and generate more revenue over thelong run.” For the past few years, service providers around theworld have been jumping into metro Ethernet with both feet. Asiacontinues a massive buildout of backbone, core, and edge infra-structures. In November 2004, Videsh Sanchar Nigam Limited(VSNL), India’s leading telecommunications and Internet serviceprovider, announced the deployment of India’s largest broadbandmetro Ethernet solution for Tata Indicom Broadband Services.Based on Cisco gear, the solution will provide VSNL’s enterpriseand residential customers with high-quality broadband services of10/100-Mbit/s connectivity.

Europe is another growth spot for metro Ethernet. In the pastthree years, a slew of service providers, municipalities, as well asgovernments across continental Europe and the UK, have been

Metro Ethernet Coming Your Way

Metro Ethernet gives providers the flexibility and QoS to deliver realbroadband services—and customers are buying.

By Janet Kreiling

SERVICE PROVIDER SOLUTIONS

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 69

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 58: packetQ1-05

building extensive fiber infrastructures and rollingout metro Ethernet services. Just some of the serviceproviders are FastWeb in Italy, Lyse in Norway, andInTechnology in the UK.

This article looks at three service providers—UNET inThe Netherlands, Hong Kong Broadband NetworkLtd. in Asia, and Time Warner Cable in the US—whoare benefiting from metro Ethernet deployments.

Almere: Fastest-Growing City in Europe Lays Fiber

In 2002, business and municipal leaders in Almere, acity of 175,000 in The Netherlands built on landreclaimed from the sea, decided that attracting newbusiness required a foundation of widely available“real broadband”—with speeds of 100 Mbit/s and upto every home and business. Dutch service providerUNET was chosen to help design, build, and monitorthis new metropolitan network.

“Real broadband is a way of attracting companieswho want to do business, work, and live in a moderncity,” says Mayor Annemarie Jorritsma. Working withCisco’s Internet Business Solutions Group, Almere hasthus far installed fiber to 1700 homes and 500 busi-nesses as a pilot. About 15,000 homes and businessesshould be fibered by the end of 2005. The networkuses Cisco Catalyst 4500 Series switches in the core,Catalyst 4500 and 3500 Series switches in the accessnetwork, and Cisco gateways on customers’ premises.

The city owns the network, which operates as a virtualLAN (VLAN); broadband services and network man-agement are handled, respectively, by UNET and itssubsidiary, First Mile Ventures. Development of serv-ices is also open to other providers. The first housescame on-stream in March 2004; by mid-year residentsreceived triple play service—symmetric 10-Mbit/sInternet access, digital radio with 20 channels and tel-evision with 75 channels, and IP telephony throughCisco CallManagers. Businesses receive a symmetric100-Mbit/s or 1-Gbit/s link.

“We had a 10 percent signup rate before we wereeven ready to deliver service,” says Ger Bakker, chieftechnology officer at UNET. “We’re now at about 20percent, and our business plan calls for 40 percentthree years from the start.” Prices are very competi-tive, especially for serious Internet users, he adds: 80Euros per month (about US$104) for the lowest tripleplay service levels.

Besides basic high-bandwidth services, UNET is begin-ning to roll out additional services—video on demand(VOD) is one of the first, as is remote backup for bothhomes and businesses. “The service automaticallybacks up the user’s computer daily, so the customerdoesn’t need to worry about hard disk or CD back-ups,” Bakker says. Others to come are storage ondemand and security; security companies can locate IPcameras on their customers’ premises for monitoring

after an alarm or around the clock, and the alarm itselfwould go instantly over IP, rather than a dialup con-nection. Healthcare monitoring is also a possibility.“Cameras in the home—turned on only on demand, ofcourse—would enable healthcare workers to check onthe elderly and the elderly to remain longer in theirhomes,” Bakker points out. Schools could also providehome access to classes or distance learning.

UNET is now selecting a network operator for all realbroadband service in Amsterdam, which should beginlater this year, and is planning to offer service in thenext four largest Dutch cities. “By 2010,” Bakkersays, “we expect that 90 percent of homes and busi-nesses in these cities will be served by fiber.” He alsoexpects many homes to be using not just 100-Mbit/sservice but rather 1 Gbit/s. “Five digital TV sets in ahome, and you already need more than 100 Mbit/s,and don’t forget the upcoming HDTV over IP.”

Hong Kong Homes Will Enjoy 1 Gbit/s

Hong Kong Broadband Network Ltd. (HKBN)announced last November it would offer customerson its all-residential network symmetric 100-Mbit/sthen and 1000-Mbit/s (1-Gbit/s) service by the sec-ond calendar quarter of this year—it believes thelatter a worldwide first. The company already passes1.2 million homes—60 percent of all those in thecity—and has an aggregate base for voice, broad-band, and pay TV of more than 500,000 subscribers.

Competition in Hong Kong is tougher than in mostcities, because the building density means that mosthomes are within three kilometers of their local tele-phone exchange so ADSL can easily deliver 6 to 8Mbit/s. But, says HKBN’s chairman Ricky Wong,“We knew that pay TV would be vital for our suc-cess, and the sooner we got to market the better. Wewere faced with a difficult decision: We had to eithermake do with leased circuits or upgrade our networkand buy an optical core.” Further impetus, accordingto Wong, came from the desire to offer additionalbroadband services in the future.

Over the past four years, HKBN, a unit of City Tele-com (HK) Ltd., has lowered its initial reliance onwireless local multipoint distribution service connec-tions by acquiring or installing 100,000 core km offiber, covering most of Hong Kong. It expects its ownfiber network will pass 90 percent of homes by theend of June.

HKBN’s backbone consists of 2x200 optical corefibers that can support up to 64,000-Gbit/s transmis-sions. Developed with Cisco’s help, it uses the CiscoONS 15454 Multiservice Transport Platform, whichemploys dense wavelength-division multiplexing(DWDM), Cisco Catalyst 6500 Series switches, CiscoRPR architecture in the core, and Cisco Catalyst4507R and 3550 Series switches to distribute serviceto apartment buildings—more than 2500 so far.

70 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 59: packetQ1-05

The network includes more than 10,000 Ciscoswitches and more than 800 Cisco routers. HKBNowns the building gateways and Cisco Catalyst 2950Series switches. This system enables upgrades from10 to 100 Mbit/s to be provisioned remotely. Then,Category 5e copper wiring already in the buildingstakes signals to the individual units.

“Cisco’s ONS DWDM platform is the only one in themarket that can offer HKBN all the optical legacyservices that will support our future growth, includ-ing Layer 2 and Layer 3 services,” says Sam Leung,technical director at HKBN. In addition, the CiscoCatalyst switches offer wire speed, multilayer switch-ing with granular QoS, advanced security, and pre-dictable performance.

The cost, HKBN reports, was around US$130 perhome pass, a fraction of the cost for networks ofcomparable bandwidth elsewhere. It charges US$35per month for unlimited local 100-Mbit/s serviceand 20-Mbit/s international access. And comeHKBN’s BB1000 service, 1 Gbit/s will be carriedover Category 5e copper. HKBN dedicates fourpairs to each customer, two for IP access and twofor video. With the separate ports, explains LimWong, consulting services engineer in the AsiaPacific Consulting Group at Cisco, the company haseven better control over QoS and to whom the TVsignal is delivered.

Cable Company Delivers Real Broadband

Time Warner Cable, through its offering called RoadRunner Business Class, provides services within 31regional divisions located in major urban and subur-ban areas in the US. In the last few years, TimeWarner Cable has invested heavily in fiber networksto connect these locations—and now has a well-groomed infrastructure for providing metro Ethernet.It simply extends fiber from its existing network to anenterprise’s single or multiple locations, linking themtogether via metro Ethernet in urban areas and viathe rings across regions. The service delivers from 5Mbit/s up to 1 Gbit/s.

“Customers are asking for an alternative to incum-bent carriers via a completely separate network,which we have, as well as reliability, SLAs, flexibilityin provisioning, and competitive pricing,” says KurtFennell, vice president of technology, operations, andfield integration in Time Warner Cable’s CommercialServices Organization. “Our fiber network is veryrobust, and we can compete with any local or com-petitive carrier on reliability.”

Over its fiber to the enterprise, Road Runner BusinessClass provides basic high-bandwidth Internet access,and private line and point-to-point or multipointservices. “We offer three basic SLAs, with activemonitoring and reporting on intelligent CPE and core

network. And we can provide just about any band-width the customer wants.”

Road Runner Business Class’ dedication to customerservice is evident in its corporate structure. Forexample, each Time Warner Cable division is staffedwith sales consultants, engineers, and technical sup-port agents as well as administrative personnel toserve customers in the market. The “distributedarchitecture” makes the company very nimble inresponding to customer needs. “Our sales consult-ants will work with the enterprise organization todevelop the right solution to fit into their complexenvironment,” says Fennell.

The Road Runner Business Class commercial net-work is built with Cisco ONS optical products,Cisco Catalyst 3550 Series switches as CPE and coreaccess devices, and Catalyst 6500 Series switches or Cisco 10720 routers to manage the urban trans-port networks.

“Larger pipes enable our customers to better deliverservices in a more efficient and customer-effectivemanner. Metro Ethernet opens paths for the deliveryof just about any service,” Fennell says. “Bigger pipesenable customers to do their business better, and ourcosts are lower. We have a tremendous advantage inbeing positioned to serve customers over a convergednetwork. I can only see customer demand for theseservices growing.”

Metro Ethernet—a Future-Proof Technology

Metro Ethernet’s advantages have been often enumer-ated: high speed, ease of delivering any amount ofbandwidth, QoS, customer desire, and many others.Bakker of UNET, an experienced provider, cites a cru-cial advantage: “If you’re going to go to that level ofservice and broad spectrum, you want to make yournetwork as simple as possible. A basic engineeringprinciple is that complex is bad. . . . IP Ethernet is fast,simple, and future-proof.”

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 71

FURTHER READING

■ Cisco Metro Ethernet Solutioncisco.com/go/metroe

■ Metro Ethernet for Service Providerscisco.com/packet/171_8a1

■ “The Service-Driven Network”cisco.com/packet/171_8a2

■ Cisco Metro Ethernet Productscisco.com/packet/171_8a3

■ Metro Ethernet Network Blueprintcisco.com/packet/171_8a4

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 60: packetQ1-05

72 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

SERVICE PROVIDER SOLUTIONS

Gone are the days when providing connectivity was thename of the game. Today, service providers of allstripes must look toward offering new, value-addedservices for revenue growth, greater competitive differ-entiation, and increased customer loyalty. Carriershave adopted a strict laser focus on achieving efficien-cies in operating expenses (OpEx) and capital expen-ditures (CapEx) to boost profitability. And in thisintensely competitive environment, it’s increasinglyimportant for providers to gain control of their net-works and the services that run on them and, in theprocess, to regain greater control over their businessfrom the ever-changing market.

Service providers also need flexible solutions thathelp them cost effectively address the unique require-ments and tap the opportunities of their various cus-tomer segments—consumers, small and midsizedbusinesses, large enterprises, and wholesale cus-tomers. For example, in the consumer space, gaming,network-based personal video recorders, video ondemand (VoD), Wi-Fi networks, and mobility aregrowth areas. Small and midsized businesses arelikely to increase their interest in and use of a rangeof managed services such as hosting and security.Meanwhile, enterprises will experience increaseddemand for Layer 2 and Layer 3 virtual private net-works (VPNs), remote access, storage, security, andEthernet. For their part, carriers will seek revenuefrom wholesaling access, local and long-distancevoice and services including collocation, peering,transport, and content delivery.

To address these diverse markets, service providersneed a single infrastructure capable of evolving toprovide a wide range of new services that willincrease revenues and customer loyalty, as well asyield efficiencies in OpEx and CapEx. The industrygenerally calls this forward-looking infrastructure anext-generation network (NGN) and has near-unanimous consensus that IP will be the foundationtechnology to make it a reality.

“Many in the industry have narrowly defined the termNGN to address only a small piece of the very signifi-cant transition required by service providers,” saysJeff Spagnola, Cisco’s vice president of service providermarketing. “Cisco takes a more comprehensive view

of an IP-based NGN that addresses a wide range ofissues that service providers must resolve. We believethat IP NGNs bring about a broad network transfor-mation that encompasses not just the serviceprovider’s network but its entire business.”

Nor does this network transformation end at a singlepoint. Like providers’ business and service plans, theIP NGN is a continuum. It will constantly evolve toadapt to customer demand and new technologyopportunities. “IP NGNs refer to the idea of one net-work that can not only cost effectively deliver andmanage all the voice, video, and data communicationsoptions available today, but one that can also adaptand grow to handle any new communications optionsthat will inevitably evolve,” says Mike Volpi, seniorvice president of Cisco’s Routing Technology Group.

Many service providers are already moving toward IPNGNs. Though they might use different terms forNGN, broadly speaking, they share many of the samebasic concepts in their visions for tomorrow’s carrierinfrastructure. AT&T, for example, is pursuing anNGN through its “Concept of One, Concept of Zero”initiative, and British Telecom characterizes NGN asthe “21st Century Network.” Individual serviceproviders will migrate to an IP NGN at their own pacebased on their business and regulatory requirements.

The phased development of the IP NGN, emphasizesVolpi, involves creating an intelligent infrastructurefrom which application-aware services are deliveredby service-aware networks. This type of intelligent IPNGN will open new opportunities for service providersto offer end customers advanced, value-added, andpersonalized all-media services securely and seam-lessly over wireline and wireless connections.

Convergence Is at the Heart of IP NGN

Central to an IP NGN are three fundamental areasof convergence already being enabled by serviceproviders today:■ Application convergence—integrating new, innova-

tive IP data, voice, and video services over a singlebroadband infrastructure.

■ Service convergence—Providers are migratingtoward delivering “triple play on the move,” whichcombines voice, video, data, and mobility services.Service convergence includes network access andcontrol that is technology-agnostic and seamlessly

The IP NGN Journey

Cisco innovation and technology advancements are helping serviceproviders on the journey toward IP-based next-generation networks.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 61: packetQ1-05

compatible with any networking medium: mobile,wireless, cable, DSL, or Ethernet.

■ Network convergence—Providers are migrating fromdeploying, managing, and maintaining multipleservice-specific networks to delivering all services ona single network, most often an IP MultiprotocolLabel Switching (IP MPLS)-based network.

Of course, service providers prioritize these areas ofconvergence in different ways, depending on theirbusiness. Many mobile operators, for example, mightfocus most of their efforts on service convergence,whereas cable operators target their efforts at appli-cation convergence.

The Cisco IP NGN vision and architecture addressthese three primary areas of convergence (see figure).

“Providers worldwide are building networks to cre-ate revenues, not just to move bits,” says Tom Nolle,president of CIMI Corporation, an industry analysisand consulting firm. “Cisco’s IP NGN architectureand vision offer them a compelling model for gener-ating revenue from new services that focus on deliver-ing a network experience based not just on transportand connection but on linking applications and net-works in a seamless way to achieve carrier goals.”

Recent advancements by Cisco, largely in the areasof service control and the secure network layer,underscore its commitment to building, acquiring,

and partnering to develop technology and solutionsthat help service providers transform their networksto profitable IP NGNs.

Cisco IP NGN: Service Control Layer

To achieve true service convergence, companies mustbe able to operate, bill, and manage services over arange of access media. To this end, Cisco and its tech-nology partners have developed and are continuingto advance an open Service Exchange Framework,which allows providers to facilitate and control cus-tomer access and use wireline and mobile IP serv-ices with no limits on the types of applications thatcan be deployed.

While this framework contains a range of differentproducts and solutions from Cisco and its partners,one of the most recent additions comes from Cisco’sacquisition of P-Cube, a developer of IP service con-trol platforms. The Cisco Service Control solutionoverlays intelligence and application-level control onexisting IP transport networks, allowing serviceproviders to analyze, control, and meter and chargefor multiple application- and content-based serv-ices—all on a common network infrastructure. Thehardware components of the solution, the Cisco SCE1000 and 2000 Series Service Control Engines, areprogrammable network elements that reside behindan aggregation device such as a Cisco 10000 SeriesRouter, broadband remote access server (B-RAS), orcable modem termination system (CMTS). The CiscoSCE interoperates with subscriber authentication andmanagement components, as well as billing, data

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 73

CISCO IP NEXT-GENERATION NETWORK ARCHITECTURE

VoD/HDTV Gaming Storage Communications

Web Services

MobileApplications

IP ContactCenter

ApplicationLayer

Service

ControlLayer

Service Exchange

Self-Service

Policy Identity BillingOpen Frameworkfor Enabling“Triple Play

On the Move”(Data, Voice,

Video, Mobility)

Op

era

tion

al L

ayer

SecureNetworkLayer Customer

ElementAccess/

AggregationIntelligent

EdgeMultiservice

Core

Transport

Intelligent Networking

FOUNDATION FOR SUCCESS The goal of the Cisco IP NGN architecture is to provide rich, personalized, value-add multimedia services. To do this, carriers need a service control framework that supports the key business transition from a basic “highway” to value-added “tollway” service structure.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 62: packetQ1-05

collection, and policy provisioning systems, to delivertransparent, application-differentiated broadbandservices to subscribers.

Running on the service control engines, the Cisco Ser-vice Control Application Suite is composed of threesoftware applications: Service Control Applicationfor subscriber service monitoring, Cisco CollectionManager for capturing and reporting service data,and Cisco Subscriber Manager for individualizedtraffic accounting and control.

The Service Exchange Framework is further enhancedby Cisco’s recent acquisition of dynamicsoft, a makerof carrier voice-over-IP (VoIP) software based onSession Initiation Protocol (SIP). The integration ofdynamicsoft’s technology with Cisco’s carrier VoIPproducts, such as the Cisco BTS 10200 Softswitch,will help service providers offer SIP-based integratedcommunications services (telephone, mobile phone,e-mail, and instant messaging) that enable users to becontacted via a single device.

These new Service Exchange Framework componentscomplement the Cisco Mobile Exchange (CMX)portfolio, which addresses the interface between theevolving radio access network and an array of Internetservices offered by IP networks. CMX gives mobileoperators, application providers, and system integratorsflexible solutions that enable them to offer value-added data services to mobile subscribers.

Cisco IP NGN: Secure Network Layer

At the foundation of an IP NGN is the secure net-work layer, composed of a customer element,access/aggregation, intelligent IP MPLS edge, andmultiservice core components with transport andinterconnect elements layered below and above.The secure network layer is undergoing fundamen-tal change compared to just a few years ago. Forexample, IP MPLS is being integrated throughouteach section of the network, and edge and coreareas are converging, with each adopting capabili-ties of the other and providing greater efficienciesto service providers.

Cisco has played a major role in developing IP MPLScommunications infrastructures, the foundation forlarge-scale, converged, next-generation IP networks.“For several years, IP MPLS has been recognized asa foundation enabler of network convergence,”says Spagnola. “Cisco has more than 250 serviceprovider customers worldwide who deploy IPMPLS. By virtue of the fact that these customershave chosen Cisco and its intelligent IP MPLS solu-tions, they are already joining us on our mutual IPNGN journey.”

Cisco is leading the industry in delivering innovativetechnology to drive network convergence and helpservice providers lower infrastructure costs. This is

most evident with the Cisco CRS-1 Carrier RoutingSystem and the recently launched CRS-1 8-Slot Single-Shelf System. The world’s most advanced routingsystem, the CRS-1 has a system capacity of up to 92Terabits per second (Tbit/s) and is designed to providecontinuous system operation, service flexibility, andextended system longevity to telecommunicationsproviders and research organizations. Designed to fitinto half of a standard 19-inch rack and with 640Gbit/s of total switching capacity, the Cisco CRS-18-Slot System extends the reach of CRS-1, providing afoundation for network and service convergence.

Global carriers and research organizations world-wide are adopting the Cisco CRS-1 for building outtheir IP network infrastructures and to deliveradvanced multimedia services. A few examples are:■ Broadband content and services provider SOFTBANK

BB Corp. in Japan (provider of Yahoo!BB) has chosenthe Cisco CRS-1 for its IP NGN super backbone corerouter. SOFTBANK focuses on services such asbroadband Internet access, video-on-demand, andonline gaming.

■ SuperSINET, the largest national academic researchnetwork in Japan, will deploy the Cisco CRS-1 as thecore routing system to enable research of grid, super-computing, and other scientific applications.

■ The Pittsburgh Supercomputing Center, a leadingscientific research organization, has been measuringIP NGN performance using the Cisco CRS-1, togauge performance levels required for advancingnext-generation scientific research.

■Telecom Italia is in trials with the CRS-1, which servesas the network foundation for delivering advancedmultimedia applications to its customers. So far, theCRS-1 is meeting the carrier’s top requirements foravailability and service flexibility and is slated to bea key component of Telecom Italia’s IP NGN.

◆ ◆ ◆

Cisco’s strategy in the service provider arena is toinnovate and to provide the technology, solutions,and expertise carriers need as they transform their net-works and move along the IP NGN journey.Deploying solutions that deliver greater networkintelligence, integration, and overall flexibility willnot only provide carriers with short-term reliefbut, in the end, enable them to combat competitivepressures, address new market opportunities, andincrease profitability.

74 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

FURTHER READING

■ Routing Solutions for Service Providerscisco.com/packet/171_8b2

■ Cisco Service Controlcisco.com/packet/171_8b3

■ Cisco CRS-1 Carrier Routing Systemcisco.com/packet/171_8b4

Read the full whitepaper, Cisco and theService Provider IPNext-GenerationNetwork Journey, atcisco.com/packet/171_8b1.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 63: packetQ1-05

SERVICE PROVIDER SOLUTIONS

The intelligent functionality in Cisco IOS Software haslong led technology innovation throughout the networking industry. Service providers already takeadvantage of many IOS capabilities to build and man-age their network backbones more efficiently. Cisco hastargeted an integral set of IOS features that serviceproviders can use to add revenue-generating security,management reporting, and route-management serviceofferings to their portfolios. With this functionality,called IOS Technologies for Managed Services, Cisco ishelping service providers identify specific IOS technolo-gies that they can productize and market to businesscustomers as profitable, add-on complements to theirmanaged IP VPN services.

The following IOS technologies can each be turned intoa commercial service: Cisco IOS Firewall; Cisco Intru-sion Prevention System (IPS); Cisco IOS IP Service-LevelAgreements (IP SLAs); and Cisco Enhanced InteriorGateway Routing Protocol (EIGRP), when supportedon the provider edge (PE) router.

Selling Edge Security Services

Service providers can easily sell managed securityservices at the perimeter of their enterprise customers’WANs as part of a managed service using the firewalland intrusion prevention features in Cisco IOS Software.“Managed WAN routers are the business customer’sfirst line of defense,” observes Lily Lu, marketingmanager in Cisco’s Products and Technology Market-ing Organization. “The service provider that offersmanaged VPN services would do well to become theenterprise’s first-tier security partner with firewall andintrusion prevention services at the WAN edge.”

To do so, the provider can simply activate the CiscoIOS Firewall security-specific option in the customeredge (CE) routers that they install and manage onbehalf of business customers. The high-performanceCisco IOS Firewall is embedded in Cisco IOS Soft-ware on a broad range of router platforms, from thevery low to very high end. It statefully filters TCP,UDP, and Internet Control Message Protocol (ICMP)traffic in accordance with the business customer’s pol-icy—blocking some traffic while permitting access toother traffic—based on source IP address (includingIPv6), protocol type, MAC address, user ID, pass-word authentication, and other criteria.

For business customers running voice over IP (VoIP)across their IP VPN services, the Cisco IOS firewallsoftware supports voice traversal using deep-packetinspection. The firewall recognizes the application

protocol and can follow the call on a per-flow basisas it “hops” among ports and new channels areopened. The firewall currently recognizes and sup-ports H.323v2, Session Initiation Protocol (SIP),and Cisco’s own Skinny Call Control Protocol VoIPsignaling protocols.

When selling managed router services based onCisco’s new line of 1800, 2800, and 3800 Series Inte-grated Services Routers for branch offices, serviceproviders can layer on dynamic intrusion prevention.The routers can dynamically load the 740 signaturessupported by the Cisco IDS Sensor appliance plat-forms in real time. Providers who have control of thecustomer’s WAN access router can use the Cisco IOSIntrusion Prevention System (IOS IPS) feature tomodify an existing signature or create a new signatureto address newly discovered threats.

Differentiated Services and Management Reports

Service providers, of course, require ways to measuretheir customer network service levels just to make suretheir offerings are competitive and of high quality. Inaddition, sophisticated and granular performancemonitoring and measurement tools can be put to workto offer money-making differentiated service classesfor supporting application traffic with differing per-formance requirements and to offer the SLA perform-ance information and reports that business customersare beginning to demand. These metrics can more orless be difficult for the service provider to measure on acustomer-by-customer basis. For example, one customercontract might require that a set of metrics be met on amonthly basis across all sites on its network (fairly easilyenforced), while another might delineate specific metricson a per-site, per-day basis (much more difficult). Themore granular and specific the metrics are, the moremeaningful they are to an individual enterprisesite/user’s experience, but the more difficult they are forthe service provider to deliver.

“IP and SLAs are converging and IP performancemonitoring needs to be application-aware,” says TomZingale, Cisco IOS product manager for IP SLAs andNetFlow. This transformation is critical for new IPnetwork applications such as VoIP, audio and video,enterprise resource planning (ERP), customer relation-ship management (CRM), and material requirementsplanning (MRP). SLA measurement needs to be end toend for today’s VPN services, adds Zingale.

Service providers can charge more as agreed-uponSLAs become more stringent. With Cisco IOS IP

Spinning IOS into Gold

How to Turn IOS Technologies into Profitable Services

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 75

For more on CiscoIOS Technologiesfor Managed Services, visit cisco.com/packet_171_8c1

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 64: packetQ1-05

76 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

SLAs, providers can deliver performance manage-ment reports and self-monitoring capabilities—required add-ons to managed services for whichproviders can charge. Cisco IOS IP SLAs use uniqueservice-level assurance metrics and methodology toprovide highly accurate, precise service-level assur-ance measurements and are embedded in the networkfor flexibility and cost-effectiveness.

Cisco IOS IP SLAs enable the service provider tomeasure delay, jitter, packet loss and VoIP quality inreal time on a hop-by-hop basis between any tworouters under its control, including CE to CE, CE toPE, PE to PE, as well as from point of presence (POP)to POP. When providing a managed IP VPN service,for example, the provider can measure these metricsbetween any two customer routers and generate bill-able reports for that customer on the various metrics.

“Service providers are competitively driven to offerSLAs, and the enterprise needs to verify that the SLAis indeed being provided,” says Zingale. “The IPSLAs functionality is embedded in the network andprovides information for end-to-end SLA reportingand verification. If both the service provider and itscustomer have the technology, they can monitor theirQoS [quality of service] so the service provider is sureit is providing ‘gold’ service to the customer, and thecustomer can validate it.”

The most recent additions to the IP SLAs feature haverelated to VoIP metrics. With embedded simulatedcodec capabilities, IP SLAs allows service providers toeasily create test calls, for which they can continuallymeasure performance and also provide a mean opin-ion score (MOS) for measuring user perceptions ofvoice quality. In February 2005, the IP SLAs function-ality was enhanced to measure post-dial delay—theamount of time a call rings, rings busy, or takes toconnect using SIP or H.323 protocols; and gatekeeperdelay, the time it takes for a device to register a num-ber in the IP address-to-phone number database

Global service provider Equant has implemented IPSLAs with its MPLS-based IP VPN customer DuPontin South America, though the scientific-productsmaker expects to go global with the implementation,which includes VoIP, in 2005. Equant suppliesDuPont with end-to-end reporting for multiple classesof service on delay, packet loss, and jitter. “When wecontemplated Layer 3 VPN service from Equant, werealized we needed a way to measure SLAs,” saysMike Dowler, global services integration manager atDuPont Telecommunications. “The ability to createand verify different classes of services with differentpriorities [including VoIP] would be compromisedwithout a reliable means of measurement.”

Easing the Enterprise’s Routing Burden

Providers of MPLS-based IP VPN services can lever-age Cisco routing software to offer a special route

distribution and management service that eliminatesthe enterprise customer’s requirement to learn andimplement the Border Gateway Protocol (BGP) in itsnetwork between the PE and CE. In effect, theprovider manages the customer’s internal EIGRProutes across the VPN WAN in addition to (or in lieuof) managing the customer’s CE router. To do so, theservice provider supports EIGRP on the PE to whichthe customer CE attaches. More than 60 percent ofenterprises currently run EIGRP as their interior gate-way protocol of choice because of its fast conver-gence, ease of configuration, and network efficiencybenefits. PE support of EIGRP prevents enterprisesfrom having to convert their EIGRP networks to BGPto utilize BGP-based MPLS VPN services, says JimCrockett, a systems engineering manager at Ciscowhose SE team helped Verizon Communications rollout EIGRP-based MPLS VPN services in April 2004.

Native EIGRP instead becomes the routing protocolrunning between the CE and PE. Without EIGRP PE-CE support, normal redistribution of EIGRP intoBGP at the PE would result in inter-site EIGRP routesappearing as external routes in the target customernetwork, Crockett explains. “If there is a ‘back-door’EIGRP route between sites that doesn’t use the MPLSVPN—and there often is, such as an ISDN backuplink or a connection from a merger or acquisition—traffic will always take the EIGRP route instead ofusing the MPLS VPN unless the enterprise convertsits entire network to BGP.”

By supporting EIGRP on the PE, service providers pre-serve the enterprise customer’s EIGRP metrics acrossthe MPLS VPN backbone using Multiprotocol-BGP(MP-BGP) extended community attributes. The enter-prise’s internal EIGRP routes are redistributed into BGPwith extended community information that is appendedto the provider’s BGP route. BGP then carries this routeover the provider’s MPLS VPN backbone, with theEIGRP route information appearing as any other MPLSlabel-encapsulated data. Once the peering site receivesthe route, BGP redistributes the route into EIGRP,which extracts the BGP extended community informa-tion and reconstructs the original route.

Another technology to run from the managed CEacross WAN and ISP links is Cisco IOS OptimizedEdge Routing, when there are two or more physical orlogical paths across the WAN. The best path is selectedbased on latency, packet loss, reachability, throughput,link balancing, and/or monetary cost reduction.

The ability to offer these route distribution and man-agement outsourcing services leverages the fact thatCisco IOS technologies run from low- to high-endplatforms, enabling service providers to take overmanagement of the primary routing protocol in use inthe majority of enterprise environments today as theytraverse the WAN backbone.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 65: packetQ1-05

SMALL AND MIDSIZED BUSINESSES

Passing the Test

We all know people who can be considered “early adopters.”They’re those individuals who have a burning desire to use newtechnologies before most other people do, and who are eager toshare their knowledge and enthusiasm with others. (Many Packetmagazine readers can probably get a good look at an early adopterby looking in the mirror.)

The man who coined the phrase early adopter in 1962—a sociol-ogist named Everett Rogers—also had a term for the 2.5 percentof the population that uses technologies even before the earlyadopters do. He called them innovators, and described them as“venturesome,” that is to say, risk-takers.

When Cisco Systems develops a new product, it wants to thor-oughly test it in real-world situations before officially releasing it.In a sense, the company looks for that small segment of venture-some innovators who are willing to take risks with brand-newtechnology in order to stay ahead of the pack. To do this, Cisco

has developed Early Field Trials (EFT), a program through whichit selects customers and partners to test equipment before itbecomes commercially available.

An EFT is the very first test of new hardware or software productsin a customer setting. EFTs follow alpha testing, which occursinternally at Cisco, and precede beta testing, which occurs in alarger number of customer sites than EFTs. (Not all Cisco busi-ness units run both EFTs and beta testing.)

EFTs are a vital part of a product’s path to technical and com-mercial success. “Cisco has a reputation that, when a productcomes to market, it has been well-developed,” says David Hope,director of sales and marketing for DSi, an EFT participant andnetwork infrastructure service provider. “And I think the testingis an important step in that.”

Early Field Trials participants discuss the challenges and benefits of workingwith Cisco to evaluate pre-release products.

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 77

STAFF THE BATTLESTATIONS Gordon C. Hawkins, network and systems engineer for Vancouver Film Studios, tests Cisco products in a unique environment.

No

el H

edri

ckso

n

By Fred Sandsmark

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 66: packetQ1-05

SOPHISITICATED, BUT NOT NECESSARILY LARGE

DSi performed three months of EFT testing for theCisco Catalyst 4500 Series Supervisor Engine II-Plus-TS in what Senior Network Engineer Mike Cotronedescribes as a “semi-production” environment inDSi’s laboratory.

“We didn’t switch over anything to it in terms of fullproduction, but I had traffic flowing through it andstress-tested it with packet generation,” he explains.“I used it for a lot of IP telephony demonstrationsand studies for the months I had it installed.”

This made sense for DSi, because the company is notonly a customer, but is a Cisco partner serving smalland medium-sized businesses (SMBs). Forty of its 60employees are in technical positions, and 22 of itsengineers carry Cisco Career Certifications.

“I just saw [the new product] fitting into a lot of ouraccounts, in terms of small and medium businesses,”says Hope. “We wanted to test it, get our hands on it,and make sure we understood its capabilities.”

The EFT program isn’t limited to companies like DSithat have deep engineering benches, but participationdoes require a high level of technical expertise. Ciscoengineers interview prospective testers and reviewtheir technological skills and network environments.The company also requires EFT testers to sign anondisclosure agreement (NDA), agree to invest timeand energy in the test process, carefully document theirtests and results, and communicate regularly with theproduct’s development team. And, yes, Cisco expectsto get the equipment back at the end of the test period.

In spite of these rigorous requirements, the EFT pro-gram attracts a wide variety of companies. Take, forexample, Watt Commercial Properties, a 150-personreal estate firm with ten offices and an IT staff of five.

“Our network environment is not a Coca-Cola or aGeneral Motors,” says Dan Campbell, the company’schief information officer. “Ours is a fairly sophisticatedenvironment, but not a very large one.”

Campbell and his staff performed EFT testing on theCisco Catalyst 4500 Series Supervisor Engine II-Plus-TS and Cisco Network Assistant software. The newproducts proved a good fit for his company.

“It’s a small and very new IT organization here, so wewere looking to derive some efficiency,” he says. “Weran the products for a little while in a parallel environ-ment.” Campbell and his team used Cisco NetworkAssistant to replicate standard router configurationsand do remote setup—an important real-world test,

because the growing company opened three branchoffices during the test period.

APPLYING EMERGING TECHNOLOGIES

Watt agreed to participate in the EFT programbecause it was in the market for the very product itwas asked to test.

“We had already identified a need to have a productlike that, and the test seemed like a good opportunityto give our comments on what we wanted to see,”Campbell says.

And, for Watt, participation had a big payoff: “Therewere a couple of pieces of equipment that we usedthat weren’t supported [in the EFT release] that Ciscomoved up the [priority] list because of our input,”Campbell says.

Participating in the EFT program also allowed Wattto directly communicate with Cisco—something thatmight not otherwise happen in a company of its size.

“For want of a better term, we got a little bit of freeconsulting as a part of the implementation,” Camp-bell says. “We could ask Cisco questions at a levelthat we probably wouldn’t be able to access by justbuying a product from a third party.”

Seeing a new product in exchange for an investmentof time is an incentive for some EFT participants.

“Being part of the program gave us a glimpse of whatthese products could do without actually having topurchase them,” says Gordon C. Hawkins, networkand systems engineer of Vancouver Film Studios(VFS) in Vancouver, British Columbia, Canada. “Def-initely that was an advantage to us, because wewanted to test-drive the stuff and have an extendedtrial. Being a small company it’s sometimes difficultto get more IT dollars.”

Hawkins participated in EFT on the new Supervisor II-Plus-TS for the Catalyst 4503 in an IP communicationsenvironment. VFS has 17 buildings and 30 employees(including an IT staff of three), and is part of the largerparent company, The McLean Group, a real-estatedevelopment company in British Columbia.

78 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

“Being part of the program gave us

a glimpse of what these products

could do without actually having to

purchase them.”

—Gordon C. Hawkins, Vancouver Film Studios

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 67: packetQ1-05

But those numbers don’t tell the whole story: At anytime, hundreds of film and television professionalsmight be working on VFS’s site, often for months at atime. These people need telephone and data services,so the company’s network environment is constantlychanging to accommodate their needs.

“The test period was a month and a half, maybe twomonths,” Hawkins says. “We tested a bunch of IPcommunications gear and Cisco 7900 Series IP Phones,and we connected it to our network. We played

around with the configuration, looked at the docu-mentation, and got a feel for some of the capabilitiesof the supervisor blade. After that we moved to asatellite building and configured some of the virtualLANs and the Quality of Service features. We createda routed interface where all the IP phones in this par-ticular building would connect into that router forthe IP and routing functions. However, when theyneeded to access an external network, like for IPtelephony, it went across a routed boundary andhanded it over to the Cisco Catalyst 6500 in our corenetwork . . . and it worked fantastic.”

In his high-pressure environment, Hawkins says thatparticipation in EFT testing provides an important ele-ment of professional growth for himself and his staff.

“Work is so hectic and fast-paced these days,” he says.“You really need to spend some time in the lab, andvalue that time, to get your IOS knowledge up to parand make sure you’re aware of emerging technologies.It’s all about taking those emerging technologies andapplying them to our business to make it better.

You’ll never get your head around that unless youhave time in the lab.”

COSTS AND BENEFITS

Indeed, for some IT shops, the opportunity to taketime out from everyday tasks to experiment with pre-release equipment is considered a perk. “It gave mystaff the ability to push the envelope and do some-thing different from their day-to-day operations,”Campbell says of the EFT testing. “They enjoyed it.

That’s not to say that participating in the EFT pro-gram is easy. It requires a time commitment—andthere are costs, albeit soft costs.

“I had to come up with a structured test plan andprocedure,” explains Cotrone. “I had to pull myselfout of the field, away from my work and [my role as]a team lead. And there was a very large documenta-tion [requirement] that took quite a bit of time on theback end. It’s just a large time investment, whichequals a certain revenue loss.”

Still, many EFT participants say the benefits out-weigh any costs. They also like the fact that the EFTprogram opens up communication channels to peo-ple within Cisco.

“We’re talking to account managers, project leads,and development engineers,” Hawkins says. “Now,they’re experienced in with working with us, so thenext time that we call them or open a support case,they’ll know who we are. It has an impact not just onthe Catalyst platform for which we did the EFT test-ing, but any kind of Cisco technology.”

Campbell, Hawkins, and Hope are all enthusiasticabout their EFT experiences, and all three would par-ticipate in the program again.

“I think Cisco is developing an attractive productset for the SMB market, and we believe that’simportant for us,” Hope says. “We hope to con-tinue to play a role where Cisco is developing prod-ucts in this space.”

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 79

FURTHER READING

■ New York University EFT Experience cisco.com/packet_171_9a2

■ Cisco IT’s EFT of Wireless LAN Services Module cisco.com/packet_171_9a3

■ Bang Networks EFT Experience cisco.com/packet_171_9a4

Cisco businessunits recruit partici-pants in Early FieldTrials in differentways, dependingupon the type ofproduct that needstesting.

Customers inter-ested in learningmore about the EFTprogram shouldcontact theiraccount managersor channel part-ners to get moreinformation. Go to cisco.com/packet_171_9a1

“We had already identified a need

to have a product like this, and the

test seemed like a good opportunity

to give our comments on what we

wanted to see. There were a couple

of pieces of equipment that we

used that weren’t supported that

Cisco moved up the list because

of our input.”

—Dan Campbell, CIO, Watt Commercial Properties

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 68: packetQ1-05

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 81

Knowing what’s on the network and its relative prior-ity within the scope of the business is just one elementof keeping your operations up and getting the optimalvalue from your technology investments. Setting up asupport contract is a simple but important way tooffload that worry to a third-party provider. You wantto worry about deliveries, not downtime.

“SMBs have come to rely on their IT infrastructuresnot only to reach business goals but also to differenti-ate themselves in the marketplace,” says MLKrakauer, a vice president in HP’s services divisionfocusing on SMBs. “When there’s a problem, theyface the same issues as enterprises in terms of poten-tial loss of revenue, lower customer satisfaction, andnegative publicity, but they often don’t have the samelevel of IT support resources.”

As a result, it’s vital to make sure your company has theright support package. You need to understand whatlevel of support you require, what program providesthat support, who will deliver the support, how youwill deal with multiple providers, and the parametersof your contract. It’s important to manage everyone’sexpectations, including those of your provider.

Vendors understand the increasing importance of theSMB market. “We see it as one of the fastest-growingcustomer segments,” she says. “Up until now SMBshaven’t had solutions that are designed to addresstheir needs.” Cisco is launching a program targetingSMBs called Cisco SMB Support Assistant. You canalso look to your vendors’ channel partners, value-added resellers, or even third-party independent sup-port firms. The costs vary depending on the level ofservice and the complexity of your system, but con-tracts may run for as little as US$40 per year to morethan US$1,000.

Negotiating the Contract

No matter who will handle your support, the con-tract helps define your relationship with yourprovider. If you only start looking at a support con-tract when you need it, you’re already too late. Strivefor a contract that both gives you protection and theability to amend it if your needs change.

“The costs have to be predictable, and the contracthas to have flexibility and clarity,” warns MichaelLauricella, vice president of telecommunications

research at AMI-Partners market-research firm.

That’s why it’s important to know exactly how impor-tant something is to your business. You may want24x7 protection with a two-hour response time foryour e-commerce server, because if it’s down, you don’tmake sales. The priority is the same for your mail serv-er if you rely on e-mail communications. On the otherhand, a Web server that contains only productbrochures might not require the same urgent response.

But you also need flexibility in the contract, becauseyou may be paying a single fee for a high level of pro-tection and then decide you can safely cut back. “Youmay want to move to a ‘pay as you go’ system in thesecond year of a contract,” suggests Lauricella, “witha cap on the amount you pay.”

SMBs have an advantage in negotiating the terms ofservice contracts: There’s a lot of competition for thishuge customer base, so vendors will want to offerflexibility.

“No two channel partners offer the same service con-tract,” notes Helen Chan, manager for SMB strategiesat AMI-Partners. “Every one involves customization.”Think about how your business may evolve over thelife of the contract.

“SMBs are entrepreneurs—they can smell a bad deal amile away,” says Lauricella. “But they also have torealize that there are limitations as to how far a supportprovider can go in terms of what it offers. They have tounderstand when they have unrealistic expectations.”

SMALL AND MIDSIZED BUSINESSES

Who’s at Your Service?

Setting up support contracts for your technology requires flexibility on both sides of the negotiating table.

By Howard Baldwin

The First Quarter issue of iQ fea-tures articles about the winnersof the annual Cisco Growingwith Technology Awards.

You’ll also find articles to helpyou with wireless networking,technology adoption in Europe,network security and selectingtechnology vendors.

Find the articles online at cisco.com/go/iq. Sub-scribe today to get iQ Magazine, a free quarterlypublication from Cisco for small and midsizedbusinesses. cisco.com/go/iqmagazine/subscribe/packet.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 69: packetQ1-05

Group Dynamics

Frequently, there are multiple relationships to man-age. It may be unlikely that you’ll find a companythat is equally expert at supporting networks, com-puters, phones, Web-based e-commerce, and applica-tion software. Roll in the issues of branch offices andhome-based workers in different regions and thecomplexity increases.

You may want to work with a partner that has creat-ed its own network of partners, so that you have asingle chief support partner who is the “master” of agroup of subcontractors.

Unfortunately, she notes, some providers don’t wantto take on that liability. “You won’t find a partner tohelp you in everything.”

Thus, you need to account for these “group dynamics”as well when devising contracts. Chan recommendsincluding a clause that requires your vendor to helpyou configure each new employee’s computer and net-work-access needs.

More important, recommends Krakauer, is the ideaof looking at your business from a different perspec-tive than you normally do when you’re thinkingabout support. What’s your most crucial system? Is itthe one that handles sales? The one that handlesaccounting? Is it e-mail?

“Rather than starting with the technology and look-ing out at customers, start from the outside and lookin,” she says. Then you’ll understand the customerexperience you are trying to provide, and what youneed to proactively protect to make it happen.

82 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

FURTHER READING

■ Cisco SMB Support Assistantcisco.com/packet_171_9b1

■ iQ Article: Service Providers Are Helping Outcisco.com/packet_171_9b2

Cisco SMB Support Assistant

Customer Advocacy has been a key organization andphilosophy at Cisco ever since the 1980s. Today, withSMBs facing increased complexity in their networks andcomputer installations, Cisco is focusing on improving theway it delivers support offerings.

“We’re investing more than US$2 billion in new productsand services specifically designed for SMB customers,so we need to pay attention to their needs when it comesto service and support,” says Wim Elfrink, senior vicepresident of Customer Advocacy.

Cisco offers a variety of services designed to giveSMBs options, flexibility, simplicity, and predictability.A new program, Cisco SMB Support Assistant, isdesigned to simplify network operation, while alsokeeping the cost predictable and creating a more flexi-ble portfolio of services to meet the unique needs ofSMB customers.

“Service options need to be granular enough so that thecustomer gets the right service at the right price,” saysElfrink. “But you have to balance this with simplicity andmanageability.”

Cisco provides a range of annual support offerings thatenable SMBs to continue focusing on resources to run

their businesses, while still being able to afford industry-leading support.

For example, if a customer or a partner needs around-the-clock support and requires deep technical expertise,the SMARTnet service features a range of predictableservice levels and prices. SMB Support Assistant is moreappropriate for customers that need business-hours sup-port and want to improve their productivity, and needsimple, easy-to-use support.

For an SMB with limited IT bandwidth, minor events cancreate major disruptions. Having the appropriate levelof support to address its unique needs provides cost-effective assurance upon which a company can buildits network strategy.

SMBs need to think carefully about vendors that gainfinancially when a customer has a problem and calls forsupport. Sometimes “pay as you go” service agreementscan become extremely expensive.

Cisco SMB Support Assistant can address network con-figuration and connectivity issues, hardware failures orsoftware bugs. The offering combines basic diagnosticand troubleshooting assistance with software bug fixesand product replacement.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 70: packetQ1-05

TECHNICALLY SPEAKING

Rate-Based Satellite Control Protocol (RBSCP), a new feature inCisco IOS Software Release 12.3(7)T, is designed for wireless orlong-distance delay links with high error rates, such as satellitelinks. Using tunnels, RBSCP can improve the performance of cer-tain IP protocols, such as TCP and IP Security (IPSec), over satel-lite links without breaking the end-to-end model. Organizationsare increasingly deploying satellite technology to reach the “lastmile” in remote locations that require high-speed, broadbandInternet access (see figure). This technology is typically providedby a geostationary two-way satellite. The result is a satellite round-trip time, or s-RTT, of 500–600 milliseconds (ms) and error ratesthat are much higher than typical wired technologies such as DSLor cable. (s-RTT is the round-trip time between routers closest tothe satellite link, not the typical RTT time measured between endhosts. For a satellite link, the end-host RTT would be the s-RTTplus any additional Internet and intranet transit times.)

Although poor performance is common with these connectiontypes, mitigation techniques are available for some of the problems.

The two predominant Internet transport protocols, TCP andStream Control Transmission Protocol (SCTP) use very similarcongestion control techniques to prevent congestion collapse.(For details on congestion collapse, refer to RFC 896 at cisco.com/packet/171_11a1.) First, any lost packet is assumed tobe a sign of congestion, which causes an exponential backoff inthe sending rate. Second, both protocols use slow start and con-gestion avoidance to slowly ramp up the sending rates, whichhelps prevent a sender from flooding the network with packets.The traditional term for these techniques is Additive IncreaseMultiplicative Decrease (AIMD). AIMD works well in the nor-mal wired Internet and has been quite successful at preventingcongestion collapse while ensuring users a “fair share” of theavailable bandwidth. However, when these techniques areapplied to a satellite link, the results can be less than optimal.

Satellites tend to have long s-RTT times, so it takes longer for aconnection to ramp up its sending rate. In addition, packets areoften dropped due to errors on the link; each packet drop is inter-preted by the AIMD algorithm as an indication of congestion,which results in collapsing the sending window (cwnd) to onemaximum transfer unit (MTU) (If the drop is detected using a fastretransmit, AIMD will only halve the cwnd.) The end result ofhigh error rates combined with long delays is that the sender often

stays collapsed in slow start, sending only one packet per RTT.These AIMD techniques can quickly make a satellite flow of 1.5Mbit/s appear as slow, or slower, than a 56-kbit/s dialup line.

Another factor, even when there are no errors, is the receiver win-dow (rwnd). In both TCP and SCTP an rwnd provides end-to-end flow control. Each acknowledgment that a receiver sendscontains an rwnd that specifies how much available data bufferspace the receiver has that the sender can use. Therefore, for eachRTT a sender can have no more than rwnd bytes outstandingtoward the receiver. In a typical wired network this is not a prob-lem, but with the long s-RTT a connection with a small rwndbecomes quite slow.

For example, consider a traditional cross-town Internet connec-tion with a 20-ms round-trip time and a 32-kilobyte (KB) win-dow. On this connection the maximum transfer rate possiblewould be 50 windows of 32 KB of data every second, or about13 Mbit/s. While this is more than adequate for today’s DSL orcable technology, which provide about 3 Mbit/s or less, if youtake the same connection and route it using a 550-ms s-RTT theresult is a 570-ms RTT. This gives you 1.75 windows of 32 KB ofdata per second, or about 450 kbit/s per second. The satellite linkcan be rated to send 1.5 Mbit/s, but in reality less than one-thirdof the rated speed is utilized.

The new tunneling technology provided by RBSCP helps withthis problem without breaking the end-to-end model. For moredetails on RBSCP, the solutions available for handling poor satel-lite connection performance, and the various tradeoffs, visitPacket Online at cisco.com/packet/171_11a2.

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 83

Rate-Based Satellite Control Protocol

By Peter Lei and Randall Stewart

TYPICAL SATELLITE LINK

One-Way Delay–275 ms

To Internet

SIGNAL DELAY Performance in satellite links is limited by the delay inherent in geosyn-chronous systems and the probability of bit errors in any wireless system.

PETER LEI is a technical lead in the IP Technologies Engineering Group at Cisco. He can be reached at [email protected].

RANDALL STEWART is a senior software engineer in the IP Technologies EngineeringGroup at Cisco specializing in IP transport technologies, and the primary author ofSCTP. He can be reached at [email protected].

Enhancing IP Performance over Satellite Connections

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 71: packetQ1-05

NEW PRODUCT DISPATCHES

84 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

Cisco ONS Family: New and Enhanced Solutions for Edge, Network,

and Core Optical Networks

SPOTLIGHT ON:

The Cisco ONS familyoffers several plat-forms for transportingtraffic and deliveringhigh-speed, high-capacity services over optical fiber networks. Severalnew and enhanced Cisco ONS platforms are now available.

With the new Cisco ONS 15310-CL SONET Multiservice Platform, serviceproviders can deploy private-line and switched Ethernet services that sup-port link capacity adjustment scheme (LCAS), virtual concatenation(VCAT), and generic framing procedure (GFP) without redesign or disrup-tion of the entire network. This compact, one-rack-unit edge platform isinteroperable with infrastructure using the Cisco ONS 15454 SONET Multi-service Provisioning Platform (MSPP). The enhanced Cisco ONS 15302 andCisco ONS 15305 SDH MSPP models also support similar services.

For metro networks, the Cisco ONS 15454 MSPP now offers a Carrier Ethernet(CE)-Series line card and high-density DS3 line cards. The CE-Series linecard supports LCAS, VCAT, and GFP and helps carriers migrate to opti-mized data services from one platform. The high-density DS3 line cardshelp service providers deliver time-division multiplexing (TDM) servicesmore cost effectively, save termination costs, and free shelf slots for newservice offerings.

For core networks, Cisco offers a new any-service, any-port (ASAP) linecard that enables software-selectable bandwidth and protocol options aswell as faster broadband switching functionality for the Cisco ONS 15600SONET/SDH Multiservice Switching Platform (MSSP). Through small form-factor pluggable (SFP) optics, this line card provides Gigabit Ethernetbandwidth connectivity based on OC-3, OC-12, and GFP. The new CiscoONS 15600 MSSP single-slot cross-connect (SSXC) card enables the net-work to transparently pass SONET/SDH overhead traffic and supportsmore than 32 two-fiber, bidirectional line-switched rings.

Two new line cards are available for aggregation applications using the CiscoONS 15530 DWDM Multiservice Aggregation Platform. The four-port 1-Gbit/sor 2-Gbit/s Fibre Channel/FICON Aggregation Card aggregates up to four 2-Gbit/s Fibre Channel or FICON services on a single 10-Gbit/s wavelength tosupport high-density storage area network (SAN) extension applications. Aneight-port Multiservice Muxponder supports consolidation of numerous stor-age, data, voice, and video services over dense wavelength-division multi-plexing (DWDM) using optical and copper client interfaces. cisco.com/go/optical

Edge Routing, Access,and AggregationCisco Service Control Engine

Products

Cisco Service Control Engine (SCE) prod-ucts help service providers maximize theuse of network resources, control servicedelivery, and accurately bill for value-added broadband services. These devicesprocess broadband subscriber traffic in apoint of presence (POP), cable headend,or distribution hub. Cisco SCE 2000Series engines provide line-speed process-ing of 4-Gbit/s traffic over 2-Gigabitlinks, managing up to 2 million concur-rent unidirectional application flows.Cisco SCE 1000 Series engines process1-Gbit/s traffic over 2-Gigabit links,supporting 1 million flows. Used withSCE devices, the Cisco Service ControlApplication Suite for Broadband encom-passes three software applications: theService Control Application for sub-scriber service monitoring, the Cisco Col-lection Manager for capturing andreporting service data, and the Cisco Sub-scriber Manager for individualized trafficaccounting and control. cisco.com/packet/171_npd1

Core RoutingCisco CRS-1 8-Slot Single-Shelf

System

Designed for service providers buildingIP next-generation networks, the CiscoCRS-1 8-Slot Single-Shelf System is thenewest member of the Cisco CRS-1Carrier Routing System family. TheCRS-1 8-slot system is deployed in aservice provider’s point of presence(POP) and supports a total switchingcapacity of 640 Gbit/s in half of a stan-dard 19-inch rack. The CRS-1 8-slot

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 72: packetQ1-05

system is half the size and capacity ofthe previously released 16-slot system.In a multishelf configuration, the CiscoCRS-1 can reach a maximum capacityof 92 Tbit/s. The CRS-1 8-slot system’smidplane design provides slots for eightmodular services cards and four fabriccards in the rear of the chassis, as wellas eight interface modules and tworoute processors in the chassis front.cisco.com/go/crs

SwitchingCisco Catalyst 6500 Series

Switches: New Supervisor Engine

and Modules

New hardware for Cisco Catalyst 6500Series switches offer capabilities for a variety of deployments. The Cisco Catalyst 6500 Supervisor Engine 32, withPolicy Feature Card 3B, extends hard-ware-based security features to the net-work edge and provides two 10 GigabitEthernet XENPAK-based uplinks or eightGigabit Ethernet small form factor plug-gable (SFP)-based uplinks. New CiscoCatalyst 6500 LAN Access Interfacemodules include a 48-port 10/100/1000module, and a 48-port 10/100 modulewith enhanced quality of service (QoS)and cable fault-detection capabilities. A96-port 10/100 (RJ21) module provideshigh port densities in a compact form fac-tor. All of these modules support stan-dards-based Power over Ethernet (PoE)with field-upgradeable daughter cards.Additional new hardware options includea 48-port 100BASE-X module to supporthighly secure 100-Mbit/s fiber deploy-ments and a 6000-Watt power supply forhigh-density PoE deployments.cisco.com/go/catalyst6500

Cisco Catalyst 4500 Series

Switches: New Supervisor Engine

and Power Supply

New hardware choices for the Cisco Catalyst 4500 Series offer greater flexibil-ity for switch deployment. The SupervisorEngine V-10GE includes dual, wire-speed10 Gigabit Ethernet ports (x2 optics) andfour alternatively wired Gigabit Ethernetports (SFP optics) on the faceplate. Thetriple-input 1400-Watt DC power supplyis optimized for central-office deploy-ments by service providers. Multipleinputs enable technicians to connect thesupply to smaller fuses and breakers andcustomize the output power to meet site-specific application needs. cisco.com/go/catalyst4500

Cisco Catalyst 3750 and Cisco

Catalyst 3560 Series Switches:

New 10/100/1000 Ethernet and

PoE Models

Four new models each for Cisco Catalyst3750 and Cisco Catalyst 3560 Seriesswitches give enterprises a broader range of10/100/1000 Ethernet and PoE deploymentoptions with integrated security, availability,and quality of service. The Cisco Catalyst3750 and 3560 Series switches provide 24or 48 ports of 10/100/1000 Ethernet, fourSFP-based Gigabit Ethernet ports, andoptional support for PoE, all in a single-rack-unit chassis. cisco.com/go/catalyst3750cisco.com/go/catalyst3560

Security and VPNsCisco IPS 4240 and Cisco IDS

4255 Sensors

New products for intrusion detection andprevention provide inline, real-time traf-fic analysis to protect against maliciousor unauthorized network activity. TheCisco IPS 4240 Sensor provides intrusionprotection with 250-Mbit/s performancein switched environments, on multipleT3 subnets, and, by using 10/100/1000interfaces, on partially utilized Gigabit

Ethernet links. The Cisco IDS 4255 Sen-sor supports 600-Mbit/s performance toprotect gigabit subnets and traffic thattraverses aggregation switches connectedto numerous subnets. Both platforms ini-tially support four on-board 10/100/1000monitoring interfaces for copper links.cisco.com/go/ids

Content NetworkingCisco Content Switching Module

with SSL

The Cisco Content Switching Modulewith SSL (CSM-S) for the Cisco Catalyst6500 Series combines high-performanceLayer 4 to Layer 7 content switching withintegrated Secure Sockets Layer (SSL)acceleration. This combination providesscalable performance, connection persist-ence, and ensured uptime for business-critical applications and offloads theCPU-intensive task of processing SSLtransactions in backend servers. The inte-gration of content switching and SSL alsoenables Layer 7 load balancing whileensuring that data remain encryptedwhile on the network. cisco.com/go/csm-s

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 85

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 73: packetQ1-05

86 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

WirelessCisco Aironet 1130AG Series and

Cisco Aironet 1230AG Series

Access Points

The Cisco Aironet 1130AG Series802.11a/b/g Access Point simplifiesdeployment of a wireless LAN in officesand similar RF environments. This modelfeatures integrated antennas and dualIEEE 802.11a and 802.11g radios for pre-dictable coverage and a combined trafficcapacity of 108 Mbit/s. The Cisco Aironet1230AG Series Access Point supportsdual-band 802.11a/b/g radios with dualantenna connectors for wireless LANs inrugged environments or installations thatrequire specialized antennas. The CiscoAironet 1230AG Series combines antennaversatility with high transmit power,receive sensitivity, and delay spread forreliable performance and throughput inhigh multipath and indoor environments.cisco.com/go/aironet/abg

Storage NetworkingCisco File Engine Series Appliances

The new Cisco File Engine Series appli-ances simplify management and increaseprotection of file-based data located atenterprise branch offices. Based on CiscoWide Area File Services (WAFS) technol-ogy, the Cisco Edge File Engine is deployedat each branch office and replaces local fileand print servers. The Cisco Core FileEngine is deployed at the data center andconnects directly to one or more fileservers or network-attached storage (NAS)gateways for processing WAN-optimizedfile requests on behalf of each Edge File

Engine. The Cisco WAFS Central Man-ager software provides management andmonitoring functions for all file enginedevices. The Cisco File Engine Series iscovered in greater detail in the articlebeginning on page 35.cisco.com/packet/171_npd2

Voice and VideoCisco IP Phone 7971G-GE

First in the industry, the new Cisco IPPhone 7971G-GE brings the benefits ofa Gigabit Ethernet network to the desk-top. The two-port Ethernet switchallows for direct connection to a10/100/1000BASE-T Ethernet networkthrough an RJ-45 interface with a singleLAN connection for both the phone anda collocated PC. Like the Cisco IPPhone 7970G, the Cisco IP Phone7971G-GE offers a high-resolution,color touch screen for display and con-trol of user features. The IP phone pro-vides access to eight telephone lines andcan be powered through Power overEthernet (PoE) or a local power supply. cisco.com/packet/171_npd3

Cisco EGW 2200 Enterprise

Gateway

The new Cisco EGW 2200 EnterpriseGateway facilitates a phased migrationfrom traditional private branch exchange(PBX) networks to converged Cisco IPcommunications systems, while offeringimportant network call routing and num-ber analysis capabilities. A software appli-cation that runs on select Cisco MediaConvergence Servers, the Cisco EGW 2200supports interworking of voice signalingprotocols, such as Digital Private NetworkSignaling System (DPNSS) and Q.SIG,with Cisco CallManager and Cisco Unityvoice mail and unified messaging solutions.Commonly used DPNSS and legacy voice-mail features are supported by the CiscoEGW 2200 Enterprise Gateway. cisco.com/packet/171_npd4

Networked HomeLinksys Wireless A/G Media

Center Extender

The Linksys Wireless A/G Media CenterExtender enables users to wirelesslystream digital entertainment content suchas music, videos, or photos that are storedon a Microsoft Windows Media CenterPC to connected televisions or stereo sys-tems around the home. Users can alsowatch and pause live television shows ormake digital recordings for later viewing.The Media Center Extender connects to ahome stereo or television using standardconsumer electronic cables and communi-cates with the Media Center PC via ahome network that uses Wireless-A,Wireless-G, or 10/100 Ethernet cabling. cisco.com/packet/171_npd5

ABOUT NEW PRODUCT DISPATCHES

Keeping up with Cisco’s myriad newproducts can be a challenge. To helpreaders stay informed, Packet maga-zine’s “New Product Dispatches” pro-vide snapshots of the latest productsreleased by Cisco between October2004 and January 2005. For real-timeannouncements of the most recentlyreleased products, see “News ReleaseArchive, News Releases by Date” atnewsroom.cisco.com/dlls/.

ABOUT SOFTWARE: For the latestupdates, versions, and releases of allCisco software products—from IOSto management to wireless—regis-tered Cisco.com users can visit the Software Center at cisco.com/kobayashi/sw-center/.

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 74: packetQ1-05

Linksys Wireless A+G Products

New Linksys products allow home usersto share a wireless network using equip-ment compatible with Wireless-A orWireless-G standards. The Dual-BandWireless A+G Broadband Router pro-vides Internet connectivity and a four-port, full-duplex 10/100 Ethernet switchto connect up to four PCs in the home;the router can connect to additional hubsand switches for a larger network. TheDual-Band Wireless A+G BroadbandRouter also contains two wireless accesspoints, each supporting all three wirelessnetworking specifications. Three newadapters provide dual-mode wirelessaccess by client devices: the Linksys A+GPC Card for notebooks, Linksys A+G PCIadapter for desktop computers, and theLinksys A+G USB Adapter.cisco.com/packet/171_npd6

Linksys Wireless-G Internet

Video Camera

The Linksys Wireless-G Internet VideoCamera sends live video with soundthrough the Internet to a Web browser.The camera contains its own Web serverthat enables it to connect directly to anetwork, either over Wireless-G (IEEE802.11g) or 10/100 Ethernet cable. Theadvanced MPEG-4 video compression inthe camera produces a high-quality, highframe rate, audio/video stream at up to640x480 resolution. Security Modesends a message with a short videoattached to as many as three e-mailaddresses whenever the camera detectsmotion in its field of view.cisco.com/packet/171_npd7

Linksys Wireless-G CompactFlash

Card

The Wireless-G CompactFlash (CF) Cardenables wireless networking on a personaldigital assistant (PDA) with the PocketPC2002 or PocketPC 2003 operating sys-tems. The CF Card installs directly intothe PDA using a CompactFlash Type IIslot and communicates over wireless net-works at speeds up to 54 Mbit/s. TheIEEE 802.11g CF Card is also compatiblewith Wireless-B (802.11b) networks. Thecard allows the PDA to roam seamlesslyamong multiple 802.11g/b access pointsor routers, communicate without anaccess point to download data from awireless PC, and share data directly withother wireless PDAs. cisco.com/packet/171_npd8

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 87

itself. For example, an IPS device can catch an appli-cation-embedded attack that a firewall might miss.However, the IPS device might not have the appropri-ate enforcement action that the firewall offers fordealing with the attack. By converging firewall andIPS capabilities, network security administratorshave all the mitigation actions and resilience of a fire-wall with all the inspection intelligence of an IPS.

An additional limitation of IPS devices, however, isthat while they have a fine-grained view of networktraffic, they are signature-based; that is, they mustreceive updates that tell them what to look out for.Signature updates can take from 24 to 48 hours, mak-ing them ineffective against tomorrow’s flash threats.This is where network antivirus software comes in,with its dynamic outbreak prevention updates.Antivirus software can be updated very quickly andcan disseminate the information rapidly through aninfrastructure to all endpoints. If this infrastructure ismerged with IPS and firewalls, companies gain morethan just the power of each: they now have a securitythreat defense system, a way to rapidly update infor-mation and deeply analyze packets for identificationof worms and viruses, as well as the firewall capabilityto block those packets from entering the network anda solution that is highly resilient.

This type of systems approach transforms securityfrom operating as separate siloed technologies in areactive mode—with limited and static detection meth-ods—to functioning as a coordinated, proactive threatdefense system that adapts to the threat environment.

According to Pope, these systems will provide numer-ous benefits: improved detection, greater event classi-fication accuracy, lower operating costs, streamlinedadministration, and services extensibility that inte-grates the most advanced security technologies asthey are developed. Most importantly, these con-verged systems will not compromise the quality ofsecurity in any given category, but instead combinethe strength of each in complementary ways todeliver a tighter, coordinated defense.

FURTHER READING

■ Cisco Security and VPN Informationcisco.com/go/security

■ Cisco Self-Defending Networkscisco.com/go/sdn

■ Cisco Intrusion Prevention Alert Centercisco.com/go/ipsalert

■ SANS Institute Internet Storm Centerisc.sans.org

■ eSecurity Planet Onlineesecurityplanet.com

■ SecurityTrackersecuritytracker.com

■ “Are hackers using your PC to spew spam andsteal?” (USA Today, September 2004)usatoday.com/tech/news/computersecurity/2004-09-08-zombieuser_x.htm

■ “Code that steals for its creators” (NetworkWorld-Fusion.com, March 2004)nwfusion.com/weblogs/security/004453.html

Security Challenges, Continued from page 22

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 75: packetQ1-05

NETPRO EXPERT

88 PACKET FIRST QUARTER 2005 CISCO SYSTEMS

Load Balancing with Cisco CSM, CSS,

and Their SSL Modules

The Cisco Networking Professionals Connection is an onlinegathering place to share questions, suggestions, and informationabout networking solutions, products, and technologies with Cisco experts and networking colleagues. Following are excerptsfrom a recent Ask the Expert forum, “Advanced Load Balancingwith the Content Switching Module (CSM), Content ServicesSwitch (CSS), and Their Secure Sockets Layer (SSL) Modules,”moderated by Cisco’s Gilles Dufour. To view the full discussion,visit cisco.com/packet/171_10a1. To join in on other live onlinediscussions, visit cisco.com/discuss/networking.

Q: Is asymmetric traffic allowed through the CSM? For example,can a real server issue a request to a backend server (databaseserver) through the CSM (the real server is configured with adefault route pointing to the CSM) and receive a reply through arouter without having to go through the CSM?

A: There are scenarios where it is possible. For example, if youare in bridge mode, and the traffic initiated by the real serverdoes not hit a vserver, then you can have the return trafficbypassing the CSM. Another working scenario is when theconnection initiated by the real server hits a vserver (bridge orrouting mode does not matter). In this case, you can configurethe vserver with the command unidirectional to tell the CSM tokeep the flow alive as long as it sees traffic coming from oneside. Finally, in routing mode and if traffic does not hit avserver, I believe it may work as well as long as the traffic seenby the CSM comes from a real server. I recommend creating avserver to catch the traffic from the real server going to thebackend server, and using the unidirectional option.

Q: Can you schedule a TCL script to run on the CSM at a specific time?

A: You can’t schedule script on the CSM. The CSS can do thisbut not the CSM.

Q: Can you please tell me any command that helps in load bal-ancing EIGRP [Enhanced Interior Gateway Routing Protocol], asload balancing is not taking place between A end and B end? Weare using 64 kbit/s. I have tried using ip load-sharing per-packetcommand, but still load balancing is not taking place.

A: This type of load balancing requires you to have at least tworoutes to the same destination. These routes should be equal andappear in the routing table. If you have these two routes, ip load-sharing per-packet will only work if you have Cisco Express For-warding or no ip route-cache.

If you do not have two equal routes, you must work on gettingthem. This matter would be more appropriately addressed by theRouting/Switching Discussion Forum on the Networking Profes-sionals site.

Q: I need to do a dual keepalive (http and https) to provide a successful response. I assume a script could accommodate this.Are there any other methods available? For example, if http andhttps both succeed, then service is up.

A: Let me first say we don’t have https keepalive on either theCSS or CSM. All you can do for https is check whether you canopen a TCP connection with the server. If you are OK with justchecking the port, you will indeed need a script to combine thetwo keepalives into a single one.

Q: Besides http and https, can CSS or CSM support other proto-cols, such as FTP, SSH [Secure Shell], etc.? If we define the Webother than standard port (TCP 80 or 443), will CSS or CSM stilltreat the traffic as Web traffic?

A: CSM and CSS do understand other protocols such as FTP andReal-Time Streaming Protocol (RTSP), and this applies whicheverport is being used.

Q: I will have a server farm with identical Web applicationservers and will be running SSL for data protection. Can the Cisco CSS 11501 without SSL termination load balance SSL Webapplication servers traffic if the load balancing is not based onhigher-layer application data? In such a situation, what are thechoices for load balancing apart from simple round robin?

A: SSL is a TCP protocol, so you can do load balancing based onIP or TCP. I would recommend round robin or leastconn for thebalancing method. You should also use the advanced-balance sslcommand to enable stickiness based on SSL ID.

Do you have a question about load balancing with the CiscoCSM, CSS, and their SSL modules? Ask the NetPro Expert. Sendyour question to [email protected], with the subject line“Advanced Load Balancing.”

GILLES DUFOUR, CCIE No. 3878, is a customer supportengineer in the Cisco Technical Assistance Center,Europe, the Middle East, and Africa (EMEA). He has beena member of the content networking team since June2002. He can be reached at [email protected].

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 76: packetQ1-05

CISCO SYSTEMS FIRST QUARTER 2005 PACKET 89

An industry first, Cisco Survivable Remote Site Tele-phony (SRST) for branch office routers maintainsbasic phone service in case of interruption in WANservice to the headquarters CallManager cluster. Inthe case of a failure, the local Cisco IOS Software-enabled SRST router provides basic call processing,and also supports secure calls with authenticationand encryption for signaling and media transmissionfor Cisco IP phones using Cisco CallManager 4.1.

For enterprises with frequent WAN outages and fewerthan 240 employees per branch office, Cisco Call-Manager Express delivers a full set of commonly usedkey system and low-end private branch exchange(PBX) features. For added resilience, enterprises canrun Cisco CallManager Express on two routers anduse HSRP to provide immediate failover capabilitiesor, for added transparency, run CallManager Expresson one router and SRST on another. Cisco UnityExpress provides branch users with local integratedvoice mail and automated attendant features.

Resilient Workforce

An enterprise without a workforce resilience strategysquanders its most valuable asset—its people. Work-force resilience empowers employees with anytime,anywhere access to corporate resources, fortifiesapplications with identical services, and provides con-tingencies for dealing with disruptions. Anytime, any-where access gives employees the flexibility to do theirjobs and live their lives—increasing productivity andmorale. A workforce-resilient organization couldinclude the following:

■ Mobility features via Cisco Aironet wireless LANsolutions provide campus-wide network connectiv-ity through wireless access in conference rooms,cafeterias, and patios

■ IP Phone Extension Mobility allows users to loginto any Cisco IP Phone in any corporate or branchoffice and receive identical service as at their deskphones, especially voicemail access

■ Client VPN services and Cisco SoftPhone provideremote data and telephony services to mobile work-ers through broadband or wireless LAN services inhotel rooms, conference centers, airline lounges,and other hotspots

■ Router-based broadband VPN services and Cisco IPPhone or Cisco SoftPhone enable secure connectiv-ity from a home office

An enterprise business continuance plan must includeworkforce resilience solutions. If a primary data cen-ter is lost to fire or flood, for instance, IT systemsautomatically reroute active sessions to the secondarydata center, where employees continue to access busi-ness-critical services without a hiccup. Or during haz-ardous weather, employees can work from home usingthe same services they would have while in the office.

In extreme cases, Cisco customers have set up ad-hocwireless LANs in hotel rooms with a secure broad-band connection to the corporate network.

Workforce resilience technologies should deliverpowerful attributes that are easy to configure, requir-ing minimal management and user training. Forexample, the Cisco Business Ready Teleworker uses asingle broadband connection for PC and IP phoneaccess to the corporate network, with voice and dataencryption over an IPSec VPN for security. Theremotely manageable Cisco 800 Series Router con-tains preconfigured VPN, security, and QoS featuresthat are transparent to users. Teleworkers receive thesame services—such as video-and audioconferencing,business-critical applications access, and IP phoneextension services—they would have while sitting ina cubicle at their corporate headquarters.

◆ ◆ ◆

Careful consideration should be given to the factorsthat contribute to highly available IT systems—bothhardware and software—and the resources and solu-tions allocated to building resilience throughout thenetwork, applications, communications, and work-force. With this done, enterprises will have taken themost important steps in turning their businessresilience strategies from concept to delivery.

Recipe for Resilience, Continued from page 39

PACKET ADVERTISER INDEX

ADVERTISER URL PAGE

ADC - The Broadband Company www.adc.com/truenet D

AdTran www.adtran.com/info/wanemulation 2

Aladdin Knowledge Systems www.eAladdin.com/Cisco IFC

American Power Conversion (APC) http://promo.apc.com 13

BellSouth Business www.bellsouth.com/business/answers OBC

Boson Software www.boson.com A

Cisco Press www.ciscopress.com B

Cisco Systems www.cisco.com/poweredby F/18/33

eiQ Networks www.eiqnetworks.com 6

Global Knowledge www.globalknowledge.com/train4free 4

Interstar Technologies www.faxserver.com 80

NetScout www.netscout.com/ad/cii 54

Network General https://networkgeneral.mnl.com/c1 44

New Edge Networks www.newedgenetworks.com 48

NIKSUN www.niksun.com/packet 20

OPNET Technologies www.opnet.com 68

Panduit www.panduit.com/pp12 IBC

Pulver.com www.von.com 58

Solsoft www.solsoft.com/packet 8

SurfControl www.surfcontrol.com/go/cisco 26

Trend Micro www.trendmicro.com/cisco 62/63

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.

Page 77: packetQ1-05

CACHE FILESnippets of Wisdom from Out on the Net

Content-Based Online

Activity Leads in the US

Content ranked as the leading US onlineactivity at the end of 2004, according toa study by the Online Publisher’s Asso-ciation. Conducted in conjunction withNielsen//NetRatings, the study trackedthe online activities of 40,000 Internetusers, parsing their activity into four cat-egories: commerce, communications,content, and search. Content—definedas Websites and Internet applicationsdesigned primarily to deliver news,information, and/or entertainment—ledacross the study’s metrics. The reportattributes increased broadband penetra-tion as a main contributor to the rise incontent-based activity. More on this andother broadband trends can be found atclickz.com/stats/.

Where Is Your Blog?Blogs (short for weblogs) are proliferating on the Internet—doubling every fivemonths over the last year and a half, according to blog analysis firm Technorati(www.technorati.com). The current number of blogs is now more than 8 timesbigger than the 500,000 blogs the firm measured in June 2003. Technoratitracked 3 million blogs as of the first week of July 2003, and has added morethan 1 million blogs since then. Meanwhile, Pew Internet & American Life(www.pewinternet.org) reports that a new weblog on the Internet is createdevery 5.8 seconds. These personal journals, frequently updated and intendedfor general public consumption, typically represent the personality of theauthor or reflect the purpose of their hosting Website.

Banner Ads Grow on European Websites The volume of banner ads on European Websites grew 24 percent last year,from 76,375 in November 2003 to 94,939 in November 2004, according toresearch conducted by Nielsen//NetRatings (nielsennetratings.com). Sweden,France, and The Netherlands led European growth in banner ads—each regis-tering more than 30 percent increases. Lagging were Germany, Norway,Spain, and Belgium with growth of 10 percent or less.

Net LingoPacket monkey—Someone who intentionally inundates a Website or networkwith data packets, resulting in a denial-of-service situation for users of theattacked site or network. Packet monkeys typically use tools created andmade available on the Internet by hackers (whatis.com).

THE 5TH WAVE

©The 5th Wave, www.the5thwave.com

CYBER QUOTE

“The first rule of any

technology used in a

business is that

automation applied to

an efficient operation

will magnify the effi-

ciency. . . . automation

applied to an inefficient

operation will magnify

the inefficiency.”

—Bill Gates

Chairman, Microsoft Corporation

“He saw your laptop and wants to

know if he can check his Hotmail.”

Reprinted with permission from Packet® magazine (Volume 17, No. 1), copyright © 2005 by Cisco Systems, Inc. All rights reserved.