Focus: Technical overview of VRRP, configuration, and troubleshooting
|
|
- Lynne Fisher
- 6 years ago
- Views:
Transcription
1 Technical Reference Guide: Introduction to VRRP Focus: Technical overview of VRRP, configuration, and troubleshooting Table of Contents Using This Book...1 VRRP overiew...1 Monitored Circuit...3 Working with Switches Cisco...3 Nortel...3 Nokia OK applications...4 Checkpoint Firewall...4 NAT...4 Object Creation...4 Troublshooting Tools...4 ICLID...5 TCPDUMP...5 Cheat Sheet...5 Using This Book In this whitepaper, you will find both very high-level and low-level technical information spanning 1 RFC s, clustering, Firewalls, and common misconceptions. But we do leave out extreme detail since this white paper is targeted at the technical to the absolutely non-technical person. While you read this whitepaper, you will notice reader friendly 2 tags to help emphasize key terminology. VRRP Overview? What is VRRP and what does it have to do with High-availability? Redundant... Backup... Hot-standby... VRRP in simple terms is a protocol for high-availability of default routes. When machines on the network need to get out to the internet they require a path, there path in most cases is called a default router default route. The job of the default router is to send request to the next feasible host outside of its own network. VRRP makes it possible to have several routers act as a single virtual router for all hosts. The reason it is called a virtual router is that it uses a virtual IP that can move from router to router if a failure occurs. All the hosts on the network point to this virtual router. 1 RFC is a request for comment. 2 Friendly tag?
2 In a case where the primary 3 (master) router goes down, a peer router 4 (slave) will initiate an election to see who should become the new default router (master). This process would usually take only a moment so the end user usually would not even know something had gone wrong. Correctly implemented a VRRP group of routers can protect the network from critical downtime without having any end-user intervention. What is a cluster? The definition of a cluster can be taken differently in the technology field. When referring to clustering in this whitepaper, it implies a group of system with common configuration acting in concert as one unit. The rule of thumb is that all units have the same hardware capabilities in regards to CPU and memory, but in some cases this can be overlooked. When mixing system of different 5 capacity in a cluster the rule to always follow is that the least powerful member of a cluster can handle the traffic if the master fails. How does VRRP differ from Load-balancing technology?? The biggest difference between VRRP and load-balancing is the intelligence and complexity. As we discussed earlier VRRP is simply a mechanism for making default routes redundant without adding complexity to the network, but more so is the fact that VRRP is designed to only have one member active as a default route in one instance. Although as we will discuss in VRRP design later in the paper, vrrp can be configured to perform unintelligent load-sharing, this is not true load-balancing. 6 Load-balancing as was introduced in IPSO 3.6, is a method of intelligently sharing traffic amongst multiple members of a cluster. The intelligence is based on an algorithm that insures that traffic that starts on one firewall end back on that same firewall, thus avoiding 7 asymmetric routing issues. As we can see in diagram below clustering can be distinguished by the traffic going to two separate members of the three unit cluster. Although we can mimic traffic sharing to a certain degree with VRRP, we can not emulate the intelligence of loadbalancing. The closest VRRP can come to clustering is referred to as load-sharing. In essence load-sharing splits up either source or destination paths. This traffic separation is far from intelligent since traffic will stay on the same firewall based on a static or dynamic route. The only time traffic will move to another member is when a failure occurs. Although this sounds a bit complex we will cover this in the design section. 3 Master the VRRP enabled router with the highest priority 4 Slave any member of a VRRP group with a lower priority then the master 5 Capacity is the ability of a system to handle the same traffic load based on application and traffic requirements. The ability of a system to perform well in one application scenario does not imply that it would do the same for all application. 6 A little technical but a deeper explanation will be forthcoming 7 Asymmetric routing is a scenario where traffic comes through one path but leaves via a different path. This is a problem for some stateful firewalls that can not track the traffic flow. In most cases, stateful firewalls will drop the traffic assuming that something has broken in the communication.
3 Figure 1 Diagram of a cluster When do I use VRRP? Now that we have mapped out the differences between VRRP and Clustering, it should be fairly straight forward to decide when to use each. As a rule of thumb, use VRRP in environment that do not support bandwidth in excess of the appliances capabilities but require 24/7 uptime. 8 RFC 2338 Monitored Circuit defined When configuring monitored circuit essentially each interface regardless of the media type is considered a circuit. With the use of monitored circuit the appliance can track all interfaces in the event of failure. Working with Switches Cisco Configuration consideration when using Cisco switches 8 Request for comment
4 Step 1: Disable spanning-tree (STP) on the switch ports where VRRP is used. Step 2: In the even that STP can not be disabled, enable port-fast. The Syntax is as follows: Set spantree portfast 1/1-2 enabled Step 3: to disable port list allow for quicker port convergence The syntax is as follows: Set port channel port list off Step 4: If the switch appears to be causing VRRP flapping, turn off Nortel Nortel code should be at v1.47, SW v3.1.1 or higher to function correctly with VRRP. Nokia OK VRRP supported applications Checkpoint Firewall NAT A rule of thumb 1. There are two ways of creating static NAT entries for checkpoint FW. a. Create Proxy arp entries using voyager or CLISH b. Or create a monitored circuit using the NAT address as the backup address Object creation 1. Create the firewall objects 2. Create a cluster object 3. add all firewall objects to cluster object 4. In some versions of FW-1 you will need to create a rule for VRRP communication. Note: In NG it is essential to add the virtual addresses to the Firewall cluster object topology. Troubleshooting Tools On the occasion VRRP experiences problems, there are several Nokia tools available in the administrator s arsenal. At the top level of these tools, we have Voyager configuration summary page, CLISH, and Nokia configuration summary tool. These top level tools are meant to give the user a top level view of configurations in case a simple configuration error was made. In the event that configurations look correct the next step are the low-level troubleshooting tools such as Tcpdump and iclid. TCPdump, a packet capturing device that can help confirm correct communication between cluster members, whereas iclid lets the administrator check statistics in real-time for VRRP.
5 9 CLISH 10 ICLID ICLID 1. Command list a. Show vrrp: Good for overall look at vrrp configurations. If there are 4 interfaces participating in VRRP then we should see 4 Master or slave depending on the current appliance role. If one or more interfaces are down, then we should see one less interface visible. b. Show vrrp interface: drilldown to interface statistics, including current costs and delta. c. Show vrrp stat 2. Troubleshooting chart: Prior to working on chart check that the firewall rules or spoofing configuration are correct. Cheat Sheet to Troubleshooting VRRP: Table 1: Assume 4 Interfaces enabled with monitored circuit Interface state Observed notes Possible issue 4 Interfaces in slave status 3 Interfaces in slave 0 in master 1 interfaces in master 3 interface in slave Both units in master state TCPDUMP Priority of unit is lower then secondary unit or equal Priority on interfaces has been reduced equal to the delta of one interface In the case of election between equal weighted units the... Possible hardware issue, insure interface is correctly connected Insure firewall is not dropping connections Switch is not blocking VRRP communications Check TCPdump; insure VRRP hello packets are reaching. TCPDUMP functions: What syntax should be used when troubleshooting tcpdump? General filters: 1. Tcpdump i X = X references an interface. The interface can be listed by using the command ifconfig a. When performing the ifconfig a choose the logical name to substitute for the X. 9 A command line configuration interface for Nokia security appliances was introduced in IPSO A command line interface for getting system stats n
6 IP120 [admin] # ifconfig -a eth-s1p1c0: lname eth-s1p1c0 flags=e7<up,phys_avail,link_avail,broadcast,multicast,autolink> inet mtu 1500 inet /24 broadcast inet /24 broadcast vrrpmac 0:0:5e:0:1:64 phys eth-s1p1 flags=4133<up,link,broadcast,multicast,present> ether 0:a0:8e:21:4:70 speed 100M full duplex Figure 2: The bold logical name is used to substitute for X IP120[admin]# tcpdump -i eth-s1p1c0 tcpdump: listening on eth-s1p1c0 22:40: O > : VRRPv2-adver 20: vrid 100 pri 90 [tos 0xc0] 22:40: I 0:d0:ba:ae:b:7 > 1:80:c2:0:0:0 sap 42 ui/c len= d0ba ae0b d0ba ae0b f 00 22:40: O > : VRRPv2-adver 20: vrid 100 pri 90 [tos 0xc0] Figure 3: simple tcpdump 2. Filtering on Protocol: tcpdump -i eth-s1p1c0 proto vrrp in this scenario we are filtering the protocol for VRRP; we do not see additional irrelevant traffic. See note 11 directional symbols. The format would be tcpdump i eth-s1p1c0 proto vrrp. 3. In the case of VRRP we do not have to modify the capture size that default to 68 bytes. If we need a larger capture we would use the s X 12 -vv, X being the capture size we want. 4. The last filter we need to use would be 13 w Multiple interfaces: tcpdump i eth-s1p1 host & output statement 700 (process id for tcpdump running in background) Start the second interface tcpdump i eth-s1p2 host In the example above, we created a filter to listen only for traffic of host Using multiple interfaces can be very helpful in the case of multiple VRRP 15 transition on different interfaces. TCPDUMP Flags: 1. a attempt to convert IP addresses to names 2. -n do not convert addresses, ports, etc. to names 3. -p do not go promiscuous 4. -v pints more verbose such as TTL 5. Src & dst these two expressions can be used in conjunction with many filters such as host, net, port, etc. 11 The O equals outbound, whereas I implies inbound traffic 12 -vv this flag enables verbose capture 13 -w means write to file. A path and file name should be used 14 The multicast address is specified as the VRRP multicast address 15 A transition implies a movement from one state master to slave or vise versa
7 Dissecting TCPDUMP: 23:20: O > : VRRPv2-adver 20: vrid 100 pri 90 [tos 0xc0] 23:20: O > : VRRPv2-adver 20: vrid 100 pri 90 [tos 0xc0] 23:20: O > : VRRPv2-adver 20: vrid 100 pri 90 [tos 0xc0] 23:20: O > : VRRPv2-adver 20: vrid 100 pri 90 [tos 0xc0] VRRP advertisement. Since this unit believes he is master for Router ID 100, we see the advertisement Outbound to the network. Indicates the interval for advertisement The router ID identifies a vrrp group. All members of a vrrp group should have the identical ID The priority of 90 would imply that the unit has at least one monitored interface down since this unit has a default priority of 100 and a delta of 10, we can verify this by checking iclid or Voyager
Configuring a Cluster in IPSO 5 with Both Members in Active Mode
Configuring a Cluster in IPSO 5 with Both Members in Active Mode In This Document Configuring a VSX Cluster Member page 1 Configuring the Link Aggregation Group (LAG) page 5 Active Active Mode VRRP Configuration
More informationM2M CDMA Router. VRRP Configuration Guide
M2M CDMA Router VRRP Configuration Guide Copyright Copyright 2013 NetComm Wireless Limited. All rights reserved. The information contained herein is proprietary to NetComm Wireless. No part of this document
More informationS Series Switch. Cisco HSRP Replacement. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.
Cisco HSRP Replacement Issue 01 Date 2013-08-05 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior
More informationConfiguring STP. Understanding Spanning-Tree Features CHAPTER
CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol
More informationVirtual Router Redundancy Protocol (VRRP) Technical Support Guide
Virtual Router Redundancy Protocol (VRRP) Technical Support Guide Copyright Copyright 2015 NetComm Wireless Limited. All rights reserved. The information contained herein is proprietary to NetComm Wireless.
More informationMigrating from Cisco HSRP to industry standard VRRP
Migrating from Cisco HSRP to industry standard VRRP Technical white paper Table of contents Router Redundancy Protocol overview... 2 Introduction to Cisco Hot Standby Router Protocol (HSRP)... 2 Introduction
More informationAppDirector Redundancy Mechanism
AppDirector Redundancy Mechanism Technical Application Note North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg St. Tel
More informationConfiguring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns
The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility for one or more virtual routers to the VRRP routers on a LAN, allowing several routers on a
More informationChapter 32 VSRP Commands
Chapter 32 VSRP Commands activate Activates a VSRP VRID. NOTE: This command is equivalent to the enable command. ProCurveRS(config)# vlan 200 ProCurveRS(config-vlan-200)# tag ethernet 1/1 to 1/8 ProCurveRS(config-vlan-200)#
More informationTop-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined
More informationSpanning Tree Protocol(STP)
Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create
More informationH3C S5830V2 & S5820V2 Switch Series
H3C S5830V2 & S5820V2 Switch Series High Availability Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release2108 Document version: 6W101-20120531 Copyright
More informationHSRP (Hot Stand by Routing Protocol) Reliability Issues Over the Internet Service Provider s Network
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal www.computerscijournal.org ISSN: 0974-6471 December 2011, Vol. 4, No. (2): Pgs. 399-404
More informationConfiguring Port Channels
CHAPTER 5 This chapter describes how to configure port channels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of port channels in Cisco DCNM. For more information
More informationCCNA 3 (v v6.0) Chapter 3 Exam Answers % Full
CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-3-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers
More informationAssignment Six: Configure Hot Standby Router Protocol. Brian Dwyer. Morrisville State College
Running head: ASSIGNMENT SIX: CONFIGURE HSRP Assignment Six: Configure Hot Standby Router Protocol Brian Dwyer Morrisville State College ASSIGNMENT SIX 1 Brian Dwyer CITA370 2/5/2010 Assignment Six: Configure
More informationOperation Manual VRRP. Table of Contents
Table of Contents Table of Contents... 1-1 1.1 Introduction to VRRP... 1-1 1.2 Configuring VRRP... 1-2 1.2.1 Configuring the Function of Pinging the Virtual IP Address... 1-3 1.2.2 Configuring the TTL
More informationSection 6.2, IP Routing. Section 6.4, IP/VPN Policy. Section 6.5, IP Quality of Service. Section 6.6, The BANDIT as Firewall
Chapter 6 IP Routing and IPX Routing This chapter discusses IP routing, IP/VPN Policy, and related features in the BANDIT products. It also discusses IPX routing. See the following sections: Section 6.2,
More informationConfiguring Spanning Tree Protocol
Restrictions for STP Restrictions for STP, on page 1 Information About Spanning Tree Protocol, on page 1 How to Configure Spanning-Tree Features, on page 13 Monitoring Spanning-Tree Status, on page 25
More informationConfiguring Spanning Tree Protocol
Finding Feature Information, page 1 Restrictions for STP, page 1 Information About Spanning Tree Protocol, page 2 How to Configure Spanning-Tree Features, page 14 Monitoring Spanning-Tree Status, page
More informationConfiguring Interfaces and Circuits
CHAPTER 5 This chapter describes how to configure the CSS interfaces and circuits and how to bridge interfaces to Virtual LANs (VLANs). Information in this chapter applies to all CSS models, except where
More informationConfiguring IEEE 802.3ad LACP EtherChannels on the Cisco MWR 2941
29 CHAPTER Configuring IEEE 802.3ad LACP EtherChannels on the Cisco MWR 2941 Cisco MWR 2941 Release 3.5.1 and later supports IEEE 802.3ad Link Aggregation Control Protocol (LACP) EtherChannels. Note The
More informationSEP Technology White Paper
Issue 01 Date 2013-05-25 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationLoad Balancing White Paper
www.cybonet.com Load Balancing White Paper About PineApp Mail Secure's Load When building PineApp Mail Secure solutions, one of the ways to increase availability and performance is to provide redundancy
More informationHP VPN Firewall Appliances
HP VPN Firewall Appliances High Availability Configuration Guide Part number: 5998-4169 Software version: F1000-A-EI/F1000-S-EI (Feature 3726) F1000-E (Release 3177) F5000 (Feature 3211) F5000-S/F5000-C
More informationCIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer
CIS 83 Midterm Spring 2004 Answer Sheet Name: Score: Grade: Question Answer Question Answer 1 A B C D E F 51 A B C D E F 2 A B C D E F 52 A B C D E F 3 A B C D E F 53 A B C D E F 4 A B C D E F 54 A B C
More informationSecondary Address Support
Secondary Address Support Peter Jones July 21, 2003 7/21/2003 3:19 PM pj_sec_addr_02.ppt 1 Secondary Addresses Allows for more efficient support of protocols like RFC 2338 Virtual Router Redundancy Protocol.
More informationVodafone MachineLink. VRRP Configuration Guide
Vodafone MachineLink VRRP Configuration Guide Document History This guide covers the following products: Vodafone MachineLink 3G (NWL-10) Vodafone MachineLink 3G Plus (NWL-12) Vodafone MachineLink 4G (NWL-22)
More informationHP Load Balancing Module
HP Load Balancing Module High Availability Configuration Guide Part number: 5998-2687 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company,
More informationChapter 5. Spanning Tree Protocol (STP) Part I
Chapter 5 Spanning Tree Protocol (STP) Part I CCNA3-1 Chapter 5-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
More informationAggregate Interfaces and LACP
The following topics explain aggregate interface configuration and how LACP functions on managed devices: About Aggregate Interfaces, on page 1 LAG Configuration, on page 2 Link Aggregation Control Protocol
More informationSD-WAN Deployment Guide (CVD)
SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces
More informationHot Standby Router Protocol (HSRP): Frequently Asked Questions
Hot Standby Router Protocol (HSRP): Frequently Asked Questions Document ID: 9281 Contents Introduction Will the standby router take over if the active router LAN interface state is "interface up line protocol
More informationHistory Page. Barracuda NextGen Firewall F
The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic
More informationConfiguring Spanning Tree
CHAPTER 8 Configuring Spanning Tree This chapter describes how to configure spanning tree on the Catalyst enterprise LAN switches. Note For information on configuring the PortFast, UplinkFast, and BackboneFast
More informationIndex. Numerics. Index 1
Index Numerics 802.1p priority (QoS) definition 8-6 802.1q VLAN in mesh 7-23 802.1Q VLAN standard 6-6 802.1w as a region 6-54 802.1x, mesh, not supported 7-5 A ABC enabled on edge switch 7-26 in mesh domain
More informationNetwork Design First Hop
Network Design First Hop First Hop Redundancy, Server Redundancy Agenda First Hop Redundancy Proxy ARP, IDRP, DHCP HSRP VRRP GLBP Design Access WAN Server Load Balancing SLB DNS First Hop Redundancy, v1.6
More informationH3C Firewall Devices. High Availability Configuration Guide (Comware V7) Hangzhou H3C Technologies Co., Ltd.
H3C Firewall Devices High Availability Configuration Guide (Comware V7) Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: F5020/F5040 firewalls M9006/M9010/M9014 security gateways
More informationImportant Information
Important Information Documentation Resources and Considerations for Check Point IP1220 and IP1260 ADP Services Modules Because this document provides important information that you need to know before
More informationVRRP (Virtual Router Redundancy Protocol) Function Added
VRRP (Virtual Router Redundancy Protocol) Function Added Category S/W Release Version Date General 7.01 22 Dec. 2003 Function Description This protocol ties a number of routers as a group and assigns one
More informationK2289: Using advanced tcpdump filters
K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering
More informationRobust Firewalls with OpenBSD and PF
Robust Firewalls with OpenBSD and PF Overview Design Philosophy (and what PF doesn t do) The Basics Normalisation Filtering Translation Advanced Toolkits Denial of Service Mitigation Firewall Redundancy
More informationConfiguring Port Channels
This chapter contains the following sections: Information About Port Channels, on page 1, on page 8 Verifying Port Channel Configuration, on page 16 Verifying the Load-Balancing Outgoing Port ID, on page
More informationitexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공
itexamdump 최고이자최신인 IT 인증시험덤프 http://www.itexamdump.com 일년무료업데이트서비스제공 Exam : EW0-300 Title : Extreme Networks Specialist... Vendors : Extreme Networks Version : DEMO Get Latest & Valid EW0-300 Exam's Question
More informationImplementing High Availability. in a Campus Environment. Implementing High Availability. Single Forwarding Path vs. Single Forwarding Path.
Implementing High Availability Implementing High Availability in a Campus Environment To achieve high network availability, the following network components are required: Reliable, fault-tolerant network
More informationCampus Networking Workshop CIS 399. Core Network Design
Campus Networking Workshop CIS 399 Core Network Design Routing Architectures Where do we route? At the point where we want to limit our layer-2 broadcast domain At your IP subnet boundary We can create
More informationSyntax instance instance [interface interface-name [vrid virtual-router-id] instance interface interface-name vrid virtual-router-id ipv6
VRRP Show Commands instance Syntax instance instance [interface interface-name [vrid virtual-router-id] instance interface interface-name vrid virtual-router-id ipv6 Context show>vrrp Description This
More informationTroubleshooting Transparent Bridging Environments
Troubleshooting Transparent Bridging Environments Document ID: 10543 This information from the Internetwork Troubleshooting Guide was first posted on CCO here. As a service to our customers, selected chapters
More informationThe multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.
CHAPTER 18 This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the IE 3010 switch. Note The multiple spanning-tree (MST) implementation is based on
More informationSecBlade Firewall Cards Stateful Failover Configuration Examples
SecBlade Firewall Cards Stateful Failover Configuration Examples Keywords: Stateful failover, active/standby mode, active/active mode, data synchronization, traffic switchover Abstract: A network that
More informationConfiguring VRRP. Finding Feature Information. Contents
Configuring VRRP First Published: May 2, 2005 Last Updated: July 30, 2010 The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility for one or more virtual
More informationIndex. Numerics. Index p priority (QoS) definition Q VLAN standard w as a region 5-54
Index Numerics 802.1p priority (QoS) 802.1Q VLAN standard 5-7 802.1w as a region 5-54 A active path 5-5 address IP 7-8 advertisement 3-3 applicable products 1-ii ARP age setting 7-10 cache 7-4 cache table
More informationConfiguring Port Channels
CHAPTER 5 This chapter describes how to configure port channels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of port channels using Cisco Data Center Network
More informationLayer 3 Switch Processing. CEF-Based Multilayer Switches. Layer 3 Switch Processing (Cont.)
Layer 3 Switch Processing In Layer 3 switches, the control path and data path are relatively independent. The control path code, such as routing protocols, runs on the route processor. Data packets are
More informationPacket Capturing with TCPDUMP command in Linux
Packet Capturing with TCPDUMP command in Linux In this tutorial we will be looking into a very well known tool in Linux system administrators tool box. Some times during troubleshooting this tool proves
More informationVRRP Aware PIM with PIM NonDR Join Feature Configuration Example
VRRP Aware PIM with PIM NonDR Join Feature Configuration Example Document ID: 118859 Contributed by Mohammed Muddasir Khan, Cisco TAC Engineer. Mar 26, 2015 Contents Introduction Prerequisites Requirements
More informationQuestion: 1 Which three parameters must match to establish OSPF neighbor adjacency? (Choose three.)
Volume: 217 Questions Question: 1 Which three parameters must match to establish OSPF neighbor adjacency? (Choose three.) A. the process ID B. the hello interval C. the subnet mask D. authentication E.
More informationConfiguring EtherChannels and Link-State Tracking
CHAPTER 37 Configuring EtherChannels and Link-State Tracking This chapter describes how to configure EtherChannels on Layer 2 and Layer 3 ports on the switch. EtherChannel provides fault-tolerant high-speed
More informationObjectives. 1. Introduction:
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Advance Networks Laboratory 0907529 Exp.5 Spanning-Tree Protocol (STP) Objectives 1. Explain the role of redundancy
More informationSpatially aware sublayer support of VRRP. Marc Holness, Nortel Networks IEEE WG b SG San Antonio, Texas November, 2004
Spatially aware sublayer support of VRRP Marc Holness, Nortel Networks IEEE 802.17 WG 802.17b SG San Antonio, Texas November, 2004 Marc Holness - 1 Agenda Objectives Problem overview Solution overview
More informationConfiguring STP and RSTP
7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains
More informationBox to Box Redundancy on the CSS 11xxx Configuration Example
Box to Box Redundancy on the CSS 11xxx Configuration Example Document ID: 50405 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Background Information Configure
More informationTable of Contents 1 OSPF Configuration 1-1
Table of Contents 1 OSPF Configuration 1-1 Introduction to OSPF 1-1 Basic Concepts 1-2 OSPF Area Partition 1-4 Router Types 1-7 Classification of OSPF Networks 1-9 DR and BDR 1-9 OSPF Packet Formats 1-11
More informationConfiguring IGMP Snooping for IPv4 Multicast Traffic
CHAPTER 38 Configuring IGMP Snooping for IPv4 Multicast Traffic This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping in Cisco IOS Release 12.2SX. For complete syntax
More informationCustomizing IS-IS for Your Network Design
This module describes optional tasks that you can perform to customize Intermediate System-to-Intermediate System (IS-IS) for your network design. You can optimize network traffic flow by setting metrics,
More informationChapter 14 Configuring SRP
Chapter 14 Configuring SRP This chapter describes how to configure the HP ProCurve 9304M, 9308M, or 6308M-SX routing switch to use the Standby Router Protocol (SRP), a proprietary protocol that provides
More informationUser Guide TL-R470T+/TL-R480T REV9.0.2
User Guide TL-R470T+/TL-R480T+ 1910012468 REV9.0.2 September 2018 CONTENTS About This Guide Intended Readers... 1 Conventions... 1 More Information... 1 Accessing the Router Overview... 3 Web Interface
More informationstandby arp gratuitous through track vrrp
standby arp gratuitous, page 2 standby authentication, page 4 standby bfd, page 7 standby bfd all-interfaces, page 9 standby delay minimum reload, page 11 standby follow, page 13 standby ip, page 15 standby
More informationInformation About Topology
CHAPTER 3 Revised: December 24, 2010, Introduction This chapter describes the possible deployment topologies of the SCE 2000. The Cisco SCE solution offers a number of basic topology options that permit
More informationConfiguring Port Channels
This chapter contains the following sections: Information About Port Channels, page 1, page 11 Verifying Port Channel Configuration, page 19 Triggering the Port Channel Membership Consistency Checker,
More informationNetwork-Level High Availability
This chapter describes Cisco NX-OS network high availability and includes the following sections: Information About, page 1 Licensing Requirements, page 2 Spanning Tree Protocol, page 2 Virtual Port Channels,
More informationSpanning Tree Protocol
For conceptual information about, see the Using the with the EtherSwitch Network Module section of the EtherSwitch Network feature module. Finding Feature Information, page 1 Information About, page 1
More informationINTERNET LABORATORY PROJECT. EIGRP Routing Protocol. Abhay Tambe Aniruddha Deshmukh Sahil Jaya
INTERNET LABORATORY PROJECT on EIGRP Routing Protocol by Abhay Tambe Aniruddha Deshmukh Sahil Jaya INTRODUCTION TO EIGRP SETUP FOR LAB: This lab uses two different network topologies. The first network
More informationConfiguring Resilient Ethernet Protocol
This chapter describes Resilient Ethernet Protocol (REP), REP configuration guidelines, VLAN load balancing, REP timers, and REP over EVC. This chapter also describes procedures to configure REP. Understanding
More informationAccurate study guides, High passing rate! IT TEST BOOK QUESTION & ANSWER. Ittestbook provides update free of charge in one year!
IT TEST BOOK QUESTION & ANSWER Ittestbook provides update free of charge in one year! Accurate study guides, High passing rate! Exam : HC-224-ENU Title : Huawei Certified Datacom Professional - Fast Certification
More informationThe information in this document is based on the Cisco VPN 3000 Series Concentrator.
What Is VRRP? Document ID: 7210 Contents Introduction Prerequisites Requirements Components Used Conventions How Does the VPN 3000 Concentrator Implement VRRP? Configure VRRP Synchronize the Configurations
More informationConfiguring Rapid PVST+
This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco
More informationF. Configure a distribute-list on router RTA that allows it to advertise all routes to the spoke routers.
Refer to the exhibit. Router RTA is the hub router for routers RTB and RTC. The Frame Relay network is configured with EIGRP, and the entire network is in autonomous system 1. However, router RTB and RTC
More informationConfiguring IGRP. The Cisco IGRP Implementation
Configuring IGRP This chapter describes how to configure the Interior Gateway Routing Protocol (IGRP). For a complete description of the IGRP commands in this chapter, refer to the IGRP s chapter of the
More informationBridging Transmitting Non-IP Traffic or Merging Two Networks
10 Bridging Transmitting Non-IP Traffic or Merging Two Networks Contents Overview..................................................... 10-3 Transmitting Non-IP Traffic..................................
More informationConfiguring Port Channels
This chapter contains the following sections: Information About Port Channels, page 1, page 9 Verifying Port Channel Configuration, page 16 Verifying the Load-Balancing Outgoing Port ID, page 17 Feature
More informationExam4Tests. Latest exam questions & answers help you to pass IT exam test easily
Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : 200-101 Title : Interconnecting Cisco Networking Devices Part 2 (ICND2) Vendor : Cisco Version
More informationSpanning-Tree Protocol
Spanning-Tree Protocol Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Redundancy in a converged network Spanning-Tree Protocol (STP) STP Operation
More informationChapter 7 Interface Commands
Chapter 7 Interface Commands appletalk address Assigns AppleTalk addresses to a seed router. To assign an AppleTalk address of 10.5 to interface 3, module 2, enter the following: HP9300(config)# int e
More informationConfiguring Rapid PVST+ Using NX-OS
Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:
More informationService Graph Design with Cisco Application Centric Infrastructure
White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...
More informationConfiguring Rapid PVST+
This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the
More informationVRRPv3 Protocol Support
Virtual Router Redundancy Protocol (VRRP) enables a group of routers to form a single virtual router to provide redundancy. The LAN clients can then be configured with the virtual router as their default
More informationFinancial Services Design for High Availability
Financial Services Design for High Availability Version History Version Number Date Notes 1 March 28, 2003 This document was created. This document describes the best practice for building a multicast
More informationCampus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs
Campus Networking Workshop Layer 2 engineering Spanning Tree and VLANs Switching Loop When there is more than one path between two switches What are the potential problems? Switching Loop If there is more
More informationRedundancy for Routers using Enhanced VRRP
Redundancy for Routers using Enhanced VRRP 1 G.K.Venkatesh, 2 P.V. Rao 1 Asst. Prof, Electronics Engg, Jain University Banglaore, India 2 Prof., Department of Electronics Engg., Rajarajeshwari College
More informationVendor: HP. Exam Code: HP0-Y37. Exam Name: Migrating &Troubleshooting Enterprise Networks. Version: Demo
Vendor: HP Exam Code: HP0-Y37 Exam Name: Migrating &Troubleshooting Enterprise Networks Version: Demo QUESTION 1 You want to add HP edge switches to a company's Cisco network. Distribution Cisco switches
More informationConfiguring EtherChannels
Configuring EtherChannels This chapter describes how to configure EtherChannels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of EtherChannels in Cisco
More informationVRRPd: overview, implementation and usage
VRRPd: overview, implementation and usage Jerome Etienne jme@off.net, http://www.off.net/ jme Abstract This paper is about high availability and more especially about vrrpd (http://w3.arobas.net/ jetienne/vrrpd),
More informationHigh Availability Options
, on page 1 Load Balancing, on page 2 Distributed VPN Clustering, Load balancing and Failover are high-availability features that function differently and have different requirements. In some circumstances
More informationOSPF Protocol Overview on page 187. OSPF Standards on page 188. OSPF Area Terminology on page 188. OSPF Routing Algorithm on page 190
Chapter 17 OSPF Protocol Overview The Open Shortest Path First (OSPF) protocol is an interior gateway protocol (IGP) that routes packets within a single autonomous system (AS). OSPF uses link-state information
More informationDeployment Guide for SRX Series Services Gateways in Chassis Cluster Configuration
Deployment Guide for SRX Series Services Gateways in Chassis Cluster Configuration Version 1.2 June 2013 Juniper Networks, 2013 Contents Introduction... 3 Chassis Cluster Concepts... 4 Scenarios for Chassis
More informationCCNA 3 (v v6.0) Chapter 4 Exam Answers % Full
CCNA 3 (v5.0.3 + v6.0) Chapter 4 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-4-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 4 Exam Answers
More informationWiNG 5.x How-To Guide
WiNG 5.x How-To Guide Tunneling Remote Traffic using L2TPv3 Part No. TME-08-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola
More informationConfiguring Virtual Port Channels
This chapter contains the following sections: Information About vpcs, page 1 Guidelines and Limitations for vpcs, page 10 Configuring vpcs, page 11 Verifying the vpc Configuration, page 25 vpc Default
More information