Network Designer Interview Questions Answers Vol1.0
Network Designer Interview Questions Answers Vol1.0
Network Designer Interview Questions Answers Vol1.0
Answers
Ques 1. What is Hierarchical Network Architecture?
A Hierarchical network design involves dividing the network into discrete layers. Each layer (called
as tier) in the hierarchy provides specific functions that define its role within the overall network.
This helps the network designer and architect to optimize and select the right network hardware,
software, and features to perform specific roles for that network layer.
In large environments, 3 major layers are used –
Core Layer
Distribution Layer
Access Layer
Core Layer is the top of Hierarchical Network and Provides fast transport between distribution
switches within the enterprise campus. Core Layer offers high-speed switching, reliability, fault
tolerance, quality of service (QoS) classification and other related processes.
Distribution Layer sits between Core and Access Layer and provider policy-based connectivity and
controls the boundary between the access and core layers. Distribution layer offers Policy-based
security and filtering by ACLs (Access Control Lists), Routing services between LANs/VLANs,
Redundancy, load balancing and route summarization.
Access Layer is responsible for providing workgroup/user access to the network. Access Layer offers
Layer 2 switching, Port security, QoS marking and trust boundaries, Address Resolution Protocol
(ARP) inspection , Virtual access control lists (VACLs), Spanning tree, PoE and auxiliary VLANs for
VoIP.
In scenarios where the customer has comparatively a smaller business with lesser endpoints, a 2-tier
hierarchical (also called Collapsed Core) is provisioned where Distribution layer and core layer
functions are performed by a single device. This design architecture reduces network cost while
maintaining most of the benefits of the three-tier hierarchical model.
Ques 3. Name two technology by which you would connect two offices in remote locations.
2 commonly known technologies to connect 2 offices in remote locations are -
PTP leased Link
Site-To-Site VPN
Additionally MPLS is quite a popular WAN technology used to connect offices across remote
locations.
Ques 4. How would you provide user based authentication on a wireless network?
Radius will be leveraged to provide user based authentication in wireless network.
Note – Some may argue that 14 IPs can be used for endpoints. In that case, we may not be able to
communicate with outside world since a subnet needs to have a default Gateway (atleast 1 IP from
same subnet) to reach outside world.
Ques 7. What device would you use for sharing a cable modem Internet connection with LAN
users?
Preferred way of sharing Internet connection on Cable modem with LAN users is by provisioning a
Wireless Router (should have NAT enabled) –
Connect the Cable Modem to WAN port of Wireless Router
The Wireless Router generally has LAN ports also. Hence Wireless and Wired endpoints may
be connected to Wireless Router (Router shares the Internet connection) and access the
Internet simultaneously.
Ques 8. Name one scenario, where a NAT device would be preferred over forward proxy
server?
One scenario where NAT is preferred over forward proxy is when Web facing portals (in DMZ Zone)
need to be accessed from Internet. NAT is used to hide the private IPs of servers in DMZ zone.
Ques 9. A Wireless Solution with Wireless controller and Wireless Access points is being
setup in corporate office. The customer does not intend to invest on having a dedicated
Radius Server for Wireless Users access. What all alternative solution can be suggested to
save on additional infrastructure cost?
The Designer can propose on integrating Wireless Controller directly via AD on LDAP protocol for
user authentication service. This way need to Radius server will be removed and AD will perform the
additional functionality of Radius.
Ques 10. A Network Designer is setting up Campus Architecture in ring topology. What is
maximum number of Layer 2 Switches recommended to be used to form ring architecture?
Max of 7 switches in a Layer 2 ring.
Ques 11. A customer wants to load share traffic across 2 ISP Links (on 2 separate Routers) for
browsing. What all options can be leveraged to meet this requirement?
Some of possible solutions which may be recommended are –
Using Link Load Balancer
Using BGP based Load Sharing
Using MHSRP
Ques 12. There is need to setup proxy server for secured Internet browsing of Corporate LAN
users. Where the Proxy server should be deployed?
DMZ Zone.
Ques 13. What will be longest prefix we can use on WAN Interface for a point to point link?
A /31 prefix (255.255.255.254) may be used over WAN link between 2 Routers –
Ques 14. A new Branch office is being set up. Below are the key Network and Security
Infrastructure which have been procured .Kindly arrange them in order of placement in
branch setup –
The placement of various network and security assets is shown in the below diagram –
Ques 15. Roaming Corporate workers need to access Corporate LAN Services like File server
and Internal Portals. What solution should be proposed to meet this requirement?
A Remote Access VPN solution will meet this requirement. VPN allows corporate users who are
roaming and on unsecured Internet to access secured Services of Corporate LAN by Using Remote
Access VPN Service.
Ques 16. As network designer, you are given responsibility to resolve WAN Link choking so
that Business critical and rich media traffic may not face disruptions due to WAN congestion.
What will be the most viable and economical solution?
Provisioning QOS (preferably end to end- LAN and WAN) will address the issue of some non-critical
traffic hogging the bandwidth. The QOS should be configured based on traffic requirements. For e.g.
application like SAP and O-365 etc. are bandwidth hungry and need to be allocated a substantial
portion of the overall bandwidth. On the other hand Rich media traffic like Voice and Video may not
be requiring such high bandwidth however are very delay sensitive and hence require priority to
their packets across WAN links.
Ques 18. What is difference between Functional and Non-functional Business requirements of
an IT setup?
Table below enlists difference between Functional and Non-Functional Requirements -
Ques 19. What are major Security Zones in Corporate network?
Below are the key Security Zones in a Corporate Network –
Internet/Outside Zone
DMZ Zone
Extranet Zone
Production Zone
LAN Zone
WAN Zone
Management Zone
T&D Zone
Ques 20. What are the key considerations while selecting a Router for a WAN Link?
Following parameters should be considered while selecting a WAN Router -
WAN bandwidth Supported
No. of LAN and Interfaces
Media type of LAN and WAN Interfaces
Service or Network Module support (to support additional services like VM
Ques 21. What are the key considerations while selecting a Switch in a solution?
Below are the considerations while selecting a Switch –
Stack Support or equivalent technology
Bandwidth (Throughput)
Number of ports
Layer2/3 Functionality
Port Media type support
Ques 22. In below diagram, the LAN traffic from Behind Firewall needs to reach out towards
Internet. The Links should be configured as Active Standby. What would be recommended
configuration on Cisco Routers to support Active Standby outgoing traffic flow via the 2
links?
Feature of HSRP should be used to support Active-Backup flow for outgoing traffic. The Routers R1
and R2 LAN side Interface pointing towards Firewall will be configured to use HSRP with VIP being
192.168.12.3. In this scenario -
R1 will be the HSRP master (priority 105) and
R2 will be HSRP backup (priority 100)
R1 Configuration -
interface GigabitEthernet0/0
ip address 192.168.12.1 255.255.255.0
standby 1 ip 192.168.12.3
standby 1 priority 105
standby 1 preempt
standby 1 track Gi0/1
end
R2 Configuration -
interface GigabitEthernet0/0
ip address 192.168.12.2 255.255.255.0
standby 1 ip 192.168.12.3
standby 1 preempt
standby 1 track Gi0/1
end
Ques 23. After the solution for above is implemented, there is a new requirement where a
new DMZ VLAN has been also been provisioned and now customer wants to have Active-
Active traffic flow over both the links with minimal configuration changes. How will this be
achieved?
The method to achieve active – active traffic flow will be achieved by utilizing feature of MHSRP. In
this setup , we will make use of PBR (Policy Based Routing) along with Default Routing - VIP1 (R1 is
Master for MHSRP VIP1) will be default route for any traffic while for DMZ based traffic , PBR will be
implemented on Firewall to route DMZ sourced traffic to point towards VIP2 (R2 is Master for
MHSRP VIP2).
Ques 24. As a network Designer, I have been asked to Install Riverbed steelhead inpath across
a Branch location. Which of the below recommended approach to on RB placement with
Router and WAN Link?
Ques 25. In a Corporate Head Office Network Setup, User LAN traffic is supposed to traverse
through Firewall before talking to Application Servers. However, on verifying the traffic Flow
(User LAN to App Server) flow via Firewall, no traffic is seen. What could be the reason for
no traffic log in Firewall? What change needs to be performed to achieve the required traffic
flow?
The Default Gateway for User LAN Subnet and APP Server Subnet is Layer 3 Switch. Hence, when the
User generated traffic wants to communicate with any application in APP Server VLAN, the L3 Switch
directly Routes traffic across VLANs (Inter VLAN Routing) instead of Routing traffic towards Firewall.
This is the reason why Firewall doesn’t see any traffic of USER-APPLICATION communication.
To achieve desired result where User LAN Traffic needs to traverse via Firewall to communicate with
Servers in APP VLAN, the default Gateway for all Users (in User VLAN) and APP Servers (in APP VLAN)
should be changed from Layer 3 Switch to Firewall. This change will achieve the desired result.
Ques 26. In previous scenario, Changing of Default Gateway on User LAN and APP Server LAN
is not possible. What could be the workaround (configuration is only possible at Network
devices and not end points) with minimal changes in devices?
In scenario where changing Default Gateway of end points is not possible, another way is to create
VRF on the Layer 3 Switch (may incur cost for buying license which supports VRF routing). 2 VRF will
be created in L3 Switch Only namely -
USER
APP
Ques 27. In below Setup, Router is connected through single link to Layer 3 Switch (switch
ports on Layer2 - Switchport) with subnet 192.168.1.0/30. In order to provide link
redundancy , another link is connected between switch and router , However 2 challenges
are there –
Another IP subnet for new link is not available
Router ports don’t support layer 2 configuration (Switchport command not
supported)
What needs to be done to meet link redundancy requirement?
In such a scenario, we may leverage use of BVI (Bridged Virtual Interface) on the router. Bridged
Virtual Interface on Router will allow us to configure its Layer 3 interfaces to be in same broadcast
domain.
Router configuration -
bridge irb
bridge 1 protocol ieee
bridge 1 route ip
!
interface GigabitEthernet0/0/1
bridge-group 1
!
interface GigabitEthernet0/0/2
bridge-group 1
!
interface BVI 1
ip address 192.168.1.1 255.255.255.252
Note – Another option which may be used by further subnetting the network 192.168.1.0/30 into
192.168.1.0/31 and 192.168.1.2/31 and each of Subnet used for both individual links between
Router and Switch.
Ques 28. A new Business partnership has been agreed between 2 organization A and B
respectively. Business Partner A needs to access some services/ applications of Organization
B via a point to point Link. Where should the links to be terminated considering secured flow
of traffic across both?
The WAN Links will be terminated in the Extranet Zone of each Company Firewall. Below is the
diagram depicting the termination Zone of PTP link between both the companies –
Ques 29. While sizing a switch for LAN user termination, what should be oversubscription
ratio?
20:1
Ques 30. While sizing a switch for Server termination, what should be oversubscription ratio?
In a GigabitEthernet environment, oversubscription ratio (Server ports on Access Switch: Uplink to
Aggregation Layer) is preferred to be 2.5:1 which may go upto 8:1
Ques 31. What components would be required to setup IPSEC VPN connection between two
offices?
Requirements for considering an IPSEC VPN between 2 sites –
Recommended to have atleast 512Kbps of internet bandwidth at each site.
A VPN appliance at both sites forming IPSEC Tunnel.
Atleast one Public Static IP address at Main site. This IP address should be exposed directly
to the internet for forming IPSEC Tunnel.
Ques 32. A new branch office with 50 Mbps MPLS Bandwidth is being setup. What should be
the Router model we should choose?
Considering the fact that Router will have at minimum 1 WAN Port and 1 LAN port (both Ethernet)
and no additional service requirement, we may consider Cisco Router 4321 or 4331. The product
sizing is also based on understanding that Link bandwidth will not increase beyond 50 Mbps in next
10 years.
Ques 33. A new branch office has terminated a new Internet Link but there is no firewall in
the setup to protect the network. What should the best possible solution to provide network
Security?
A Zone based firewall is an IOS Firewall for Cisco Routers and can be leveraged where we have small
setup and with no physical Firewall available.
Ques 34. Customer office has an Internet Connection and wants to use web Hosting traffic
and Cloud proxy. How will the same be implemented?
Default route pointing towards Internet Router will be implemented for Web hosting to work. For
Cloud based proxy, a GRE/IPSEC tunnel from Firewall towards Cloud proxy will be implemented. This
setup will allow both Web Hosting and Web Browsing traffic to work.
Ques 35. A Customer has 2 Internet Links from different providers and using Public IP of 1st
Provider to Host the website. On a day, the 1st Provider Link goes down and customer is not
able to access the Web server from Internet. What could be the reason?
The Customer needs to procure PI (Provider Independent) Public IP Address Block which will be
routable across both the service providers and Web hosting will still work during event of any of the
2 ISP links down. Presently customer has brought PA (Provider Assigned or Provider Aggregable)
Address Block which is not Routable over 2nd ISP Link, hence PA address block solution does not
work.
Note – There are other options also if customer does not still want to buy PI address block.
Ques 36. Service provider Mux is 150 meters away from WAN Router. What should be best
physical media connectivity to meet this requirement of 100 Mbps link?
Since distance between MUX and Router is 150 meters, hence LAN cable (Copper) will not be
feasible since it cane only support upto 100 Meters. A Fibre (preferable Multimode Fibre) can be
used between MUX and Router port (SFP transceiver needs to be procured to terminate fibre on
Router).
Ques 37. Customer has procured a new 10 Mbps link which may increase upto 40 Mbps in
next 5 years? What are considerations with link sizing?
While procuring the link, it is preferable to procure Link with port speed (Actual speed) of 10 Mbps
at provider side with Access speed upto 50 mbps. This approach will allow provider to only perform
soft configuration on PE end device to increase bandwidth upto 50 Mbps in future. If same is not
followed, the customer might have to order new links when upgrade beyond 10 Mbps is required
which will incur additional cost and downtime to upgrade link.
Ques 38. Kindly share models of some of LAN switches which are generally positioned in
Branch Sites?
2960x, 3560 etc.
Ques 39. New Servers with Dual LAN ports are being setup in a Data Center. These are very
critical servers since bulk of revenue generating applications are stationed in these servers.
What should be considerations while selecting the Access layer switch to support such a
setup?
Below are the key considerations to be measured while selecting Access Layer switches for critical
servers –
Stackable or equivalent technology
Preferable Dual power supply (also field replaceable)
Wire Speed/Line rate throughput
Port bundling/Link Aggregation across multiple chassis members
Dedicated uplinks
High MTBF (Mean Time between failures)
Manageable
SDN Supported
Infact, a good approach may be to use
Nexus 2k switches at access layer
N9K Switches as Leaf Nodes (Spine Leaf Architecture)
Catalyst 3850/9300 Switches.
Ques 40. A customer has Web facing applications in Data Center and has recently setup new
DR as backup for these applications. Customer is looking for a solution which should support
automatic failover of Application traffic to DR during event of Data Center Down. What
should be the best fit solution in such a scenario?
GSLB (Global Server Load Balancing) also referred to GTM is the solution which supports automatic
failover of Web facing portal traffic towards DR Site during event of Data Centre down.
Ques 41. In Below existing setup, 3 VLANs are created on Layer3 Switch (no IP assigned to any
of 3 SVIs) and all are extended towards Firewall (via Trunk Link). As part of network fine
tuning, a proposal is floated to Network Designer to create 3 SVI for 3 VLANs on Layer 3
Switch. What should be the Network Designer response?
Designer’s answer should be “No” since creating SVI for 3 VLANs and giving them IP will allow traffic
from each VLAN to communicate directly via L3 Switch without going through Firewall. A good
network design always controls traffic across various assets especially when Users are trying to
communicate with Applications. Unless there is an exception, User to application traffic should
always traverse via Firewall and is a standard practice in designs.
Ques 43. With mushroom growth in application traffic, progression of virtualization and
increase in East-West Traffic which Network topologies and design solutions within Data
Centers should be provisioned?
SDN based solution like ACI – Spine and Leaf architecture.
Ques 44. What is reason for SDWAN based solutions being hot buy in today’s enterprises?
Below are key reasons for SDWAN being the preferred solution for enterprise customers -
Cost Reduction – Lower OPEX and CAPEX
Increased application performance across the WAN links
Improved security
Automatic provisioning (ZTP – Zero Touch Provisioning)
Centralized management
Ques 47. What are the protection mechanisms to secure server farms?
To properly secure server farms, a more thorough approach must be followed in addition to
deploying Network Firewalls. Some of products to protect server farms are -
Firewalls
LAN switch security features
Host-based and network-based intrusion detection and prevention systems
Load balancers
Ques 48. In Hub and Spoke topology setup, few old routers in small Branch offices are
showing high CPU utilization and memory usage due to loads EIGRP learned routes from
HUB sites. This has led to slow application response and poor end user experience. What
could be done to address this situation?
Route Summarization and EIGRP Stub configuration are 2 methods to address the above shared
condition.
Ques 49. What is Collapsed Core Architecture and where should it be proposed?
Many small enterprise networks do not grow significantly larger over time. Therefore, a 2-tier
hierarchical design where the core and distribution layers are collapsed into one layer is often
preferred approach. A “Collapsed Core” is when the distribution layer and core layer functions are
implemented by a single device. The primary motivation for the collapsed core design is reducing
network cost, while maintaining most of the benefits of the three-tier hierarchical model.
Ques 50. How to compute network availability for a network or security device?
The formula for computing availability of network device is -
Availability = MTBF/(MTBF+MTTR)
MTBF – Mean Time between failures
MTTR – Mean Time to Repair