[c-nsp] Design Recommendation for Dual WAN Connectivity with Multiple MPLS Service Providers
Brian Knight
ml at knight-networks.com
Thu Jan 22 12:46:01 EST 2026
On 2026-01-21 22:40, Muhammad Atif Jauhar wrote:
> Greetings of the day,
>
> Thank you for the detailed discussion and recommendations. We confirm
> that this design is intended for an enterprise environment.
>
> We have one additional query regarding traffic utilization across the
> two MPLS WAN links. While we understand that a primary/secondary design
> using BGP Local Preference is the safest and most deterministic
> approach, we would like to explore whether there are recommended
> methods to load balance traffic across both WAN links without
> introducing routing loops, asymmetric paths, or latency-related issues.
I have implemented this for customers with Viptela and Versa SD-WAN
products in the past.
The SD-WAN tool set tends to do load sharing more effectively and is
much more supportable than trying to load share using destination-based
routing alone. This is especially true for your application-aware
requirement.
> One option under consideration is to manually prefer specific prefixes
> or destination routes on WAN Link-1 and others on WAN Link-2. While
> this is feasible, we would like to understand if there are alternative
> or more scalable approaches that are commonly adopted in enterprise
> MPLS environments, such as:
>
> *
>
> Controlled BGP-based load sharing using selective Local Preference per
> prefix
> *
>
> Use of BGP communities to influence provider-side routing for inbound
> traffic distribution
> *
>
> Application-aware or policy-based traffic steering (where appropriate)
> *
>
> Any recommended techniques that allow link utilization optimization
> while maintaining per-flow symmetry and stability
>
> We would appreciate your guidance on whether active/active utilization
> is advisable in this scenario, and if so, what design guardrails should
> be applied to ensure predictable behavior and operational simplicity.
>
> Your insights and best-practice recommendations would be valuable for
> finalizing the design.
>
> Regards,
> Muhammad Atif Jauhar
>
> On Wed, 21 Jan 2026 at 23:16, Brian Knight <ml at knight-networks.com>
> wrote:
>
>> On 2026-01-21 07:49, Muhammad Atif Jauhar via cisco-nsp wrote:
>>> Greetings,
>>>
>>> We are planning to deploy two WAN links from different Service
>>> Providers,
>>> both offering MPLS connectivity with BGP peering. As part of the
>>> design
>>> review, we would like to align on the best-practice approach to
>>> ensure
>>> a
>>> stable, loop-free, and predictable routing architecture.
>>> Given the use of multiple MPLS providers with potentially different
>>> latency
>>> characteristics, our key objectives are to avoid routing loops,
>>> prevent
>>> asymmetric traffic issues, and ensure controlled traffic engineering
>>> and
>>> failover behavior.
>>> Any recommendations or considerations based on your experience,
>>> particularly with respect to MPLS interconnects and BGP traffic
>>> engineering.
>>
>> Sounds like you have an enterprise network connecting to NSPs. Your
>> network is probably not an NSP network itself.
>>
>> It's not strictly on topic for this mailing list, but I'll provide
>> what's worked well for me.
>>
>> Use a different RFC6996 private ASN for each site.
>>
>> If you're doing a green-field deployment, use 10/8 RFC1918 space.
>> Assign
>> a /16 to each site, so your second octet becomes your site prefix, and
>> your VLANs become your third octet.
>>
>> Choose one NSP as primary, the other as backup. At each site, on your
>> incoming route policy from the primary NSP, set all routes to high
>> localpref, say, 1000. Set all routes from secondary provider to a
>> lower
>> localpref, say 900.
>>
>> Use BFD with BGP for fastest failure detection. Ask your carriers to
>> enable it on your BGP sessions if they support it. There are two
>> settings with BFD, minimum interval and multiplier. Review those
>> settings to see what fits your needs best. Detail here:
>> https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/fs_bfd.html
>>
>> Within each site, install two CE routers. Connect Router A to your
>> primary NSP, router B to the secondary. Connect the two routers
>> together
>> back-to-back and configure iBGP across that link. Be sure to set
>> next-hop-self on the neighbor.
>>
>> Pick two hub sites; one a primary site, the other a secondary site.
>> Set
>> up the hub sites to announce all routes including those from the spoke
>> sites. Have the spokes announce only locally originated routes.
>>
>> Connect those routers to the LAN in each location. Think about how
>> you'll integrate routing with your LAN gear.
>>
>> * If you use an IGP internally at any site, avoid routing loops by
>> taking care not to redistribute locally originated routes from BGP
>> back
>> into your IGP.
>>
>> * If you use static routing, make sure a FHRP is set up on the CEs to
>> provide failover.
>>
>> Consider setting up VPN backup through GREoIPSec or VTI tunnels to
>> your
>> two hub sites. Run BGP across those tunnels, same BGP process as you
>> use
>> for connecting to your NSPs.
>>
>> Use front-door VRF and ACLs to secure the Internet-facing interfaces
>> on
>> the routers.
>>
>> For routes received via VPN to the primary hub, set those to even
>> lower
>> localpref, say 800.
>>
>> For VPN to the secondary hub, set those to lowest localpref, say 700.
>>
>> If you have any back-door links between sites, like Metro Ethernet,
>> switched Ethernet, or optical waves, integrate those by using BGP as
>> well. Announce locally originated routes with a higher local
>> preference
>> than the MPLS networks, say, 1100.
>>
>> But be careful sharing WAN routes learned via MPLS across a backdoor
>> link. Don't set those to a higher local preference than the MPLS
>> network
>> itself. Avoid if possible.
>>
>> Also, don't forget about the key management aspects for routers:
>> syslog,
>> AAA / TACACS, availability and performance monitoring (SNMP), NTP,
>> Netflow, and FTP repository for router code. Use a loopback IP on each
>> router for your management traffic. Avoid SFTP or SCP to your code
>> repo
>> due to known performance issues with OpenSSH and file transfers.
>>
>> Consider setting up out-of-band access. Best is to build a small
>> parallel WAN/LAN over VPN with a firewall, LAN switch, and serial
>> console server. Get a separate Internet connection for the firewall
>> (business broadband works), and use it only for out-of-band access.
>>
>> If you decide to configure QOS over the WAN, try to use standard
>> packet
>> markings like EF for voice media and AF31 for signaling. Check with
>> your
>> providers on what markings they support. The less re-marking of
>> traffic
>> you have to do, the better.
>>
>>> Regards,
>>>
>>> Atif.
>>
>> Hope all this made sense. I'm happy to clarify anything.
>>
>> This config served me well in my enterprise days and later on as an
>> NSP
>> integrator. 25 years of experience in those spaces.
>>
>> Hope this helps,
>>
>> -Brian
More information about the cisco-nsp
mailing list