[c-nsp] Design Recommendation for Dual WAN Connectivity with Multiple MPLS Service Providers

Brian Knight ml at knight-networks.com
Wed Jan 21 15:15:59 EST 2026


On 2026-01-21 07:49, Muhammad Atif Jauhar via cisco-nsp wrote:
> Greetings,
> 
> We are planning to deploy two WAN links from different Service 
> Providers,
> both offering MPLS connectivity with BGP peering. As part of the design
> review, we would like to align on the best-practice approach to ensure 
> a
> stable, loop-free, and predictable routing architecture.
> Given the use of multiple MPLS providers with potentially different 
> latency
> characteristics, our key objectives are to avoid routing loops, prevent
> asymmetric traffic issues, and ensure controlled traffic engineering 
> and
> failover behavior.
> Any recommendations or considerations based on your experience,
> particularly with respect to MPLS interconnects and BGP traffic 
> engineering.

Sounds like you have an enterprise network connecting to NSPs. Your 
network is probably not an NSP network itself.

It's not strictly on topic for this mailing list, but I'll provide 
what's worked well for me.

Use a different RFC6996 private ASN for each site.

If you're doing a green-field deployment, use 10/8 RFC1918 space. Assign 
a /16 to each site, so your second octet becomes your site prefix, and 
your VLANs become your third octet.

Choose one NSP as primary, the other as backup. At each site, on your 
incoming route policy from the primary NSP, set all routes to high 
localpref, say, 1000. Set all routes from secondary provider to a lower 
localpref, say 900.

Use BFD with BGP for fastest failure detection. Ask your carriers to 
enable it on your BGP sessions if they support it. There are two 
settings with BFD, minimum interval and multiplier. Review those 
settings to see what fits your needs best. Detail here: 
https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fs_bfd.html

Within each site, install two CE routers. Connect Router A to your 
primary NSP, router B to the secondary. Connect the two routers together 
back-to-back and configure iBGP across that link. Be sure to set 
next-hop-self on the neighbor.

Pick two hub sites; one a primary site, the other a secondary site. Set 
up the hub sites to announce all routes including those from the spoke 
sites. Have the spokes announce only locally originated routes.

Connect those routers to the LAN in each location. Think about how 
you'll integrate routing with your LAN gear.

* If you use an IGP internally at any site, avoid routing loops by 
taking care not to redistribute locally originated routes from BGP back 
into your IGP.

* If you use static routing, make sure a FHRP is set up on the CEs to 
provide failover.

Consider setting up VPN backup through GREoIPSec or VTI tunnels to your 
two hub sites. Run BGP across those tunnels, same BGP process as you use 
for connecting to your NSPs.

Use front-door VRF and ACLs to secure the Internet-facing interfaces on 
the routers.

For routes received via VPN to the primary hub, set those to even lower 
localpref, say 800.

For VPN to the secondary hub, set those to lowest localpref, say 700.

If you have any back-door links between sites, like Metro Ethernet, 
switched Ethernet, or optical waves, integrate those by using BGP as 
well. Announce locally originated routes with a higher local preference 
than the MPLS networks, say, 1100.

But be careful sharing WAN routes learned via MPLS across a backdoor 
link. Don't set those to a higher local preference than the MPLS network 
itself. Avoid if possible.

Also, don't forget about the key management aspects for routers: syslog, 
AAA / TACACS, availability and performance monitoring (SNMP), NTP, 
Netflow, and FTP repository for router code. Use a loopback IP on each 
router for your management traffic. Avoid SFTP or SCP to your code repo 
due to known performance issues with OpenSSH and file transfers.

Consider setting up out-of-band access. Best is to build a small 
parallel WAN/LAN over VPN with a firewall, LAN switch, and serial 
console server. Get a separate Internet connection for the firewall 
(business broadband works), and use it only for out-of-band access.

If you decide to configure QOS over the WAN, try to use standard packet 
markings like EF for voice media and AF31 for signaling. Check with your 
providers on what markings they support. The less re-marking of traffic 
you have to do, the better.

> Regards,
> 
> Atif.

Hope all this made sense. I'm happy to clarify anything.

This config served me well in my enterprise days and later on as an NSP 
integrator. 25 years of experience in those spaces.

Hope this helps,

-Brian


More information about the cisco-nsp mailing list