尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
VRRP (Virtual Router Redundancy Protocol)
VRRP (Virtual Router Redundancy Protocol) is a computer networking protocol that provides for
automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the
availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork.
The Virtual Router Redundancy Protocol (VRRP) eliminates the single point of failure inherent in the
static default routed environment. VRRP specifies an election protocol that dynamically assigns
responsibility for a virtual router (a VPN 3000 Series Concentrator cluster) to one of the VPN
Concentrators on a LAN. The VRRP VPN Concentrator that controls the IP address(es) associated with a
virtual router is called the Master, and forwards packets sent to those IP addresses. When the Master
becomes unavailable, a backup VPN Concentrator takes the place of the Master.
VRRP (Virtual Router Redundancy Protocol) Points to Remember:
1. Open Standard Protocol (1999)
2. Hello Timer 1 sec
3. Hold Timer 3 sec
4. It use IP Protocol no 112
5. It sends multicast hellos on 224.0.0.18
6. Default Preempt enable
7. Default Priority 100
8. No inbuilt Track command
9. Default decrement in priority using external track = 10
10. VRRP Mac 000.5e00.01xx (xx is group ID)
11. It supports two types of authentication MD-5, Plain Txt.
Figure 1 Basic VRRP Terminology
VRRP (Virtual Router Redundancy Protocol)
VRRP Roles
(i) Master
(ii) Backup
Master – A router which gives the reply of ARP request of clients for gateway.
Master Requirement –
(i) High Priority
(ii) Higher IP
Load balancing is Possible using multiple groups like HSRP
Group ID – 1 to 255
Restrictions for VRRP
VRRP is designed for use over multiaccess, multicast, or broadcast capable Ethernet LANs. VRRP is not
intended as a replacement for existing dynamic protocols.
VRRP is supported on Ethernet, Fast Ethernet, Bridge Group Virtual Interface (BVI), and Gigabit Ethernet
interfaces, and on Multiprotocol Label Switching (MPLS) Virtual Private Networks (VPNs), VRF-aware
MPLS VPNs, and VLANs.
Because of the forwarding delay that is associated with the initialization of a BVI interface, you must
configure the VRRP advertise timer to a value equal to or greater than the forwarding delay on the BVI
interface. This setting prevents a VRRP router on a recently initialized BVI interface from unconditionally
taking over the master role. Use the bridge forward-time command to set the forwarding delay on the
BVI interface. Use the vrrp timers advertise command to set the VRRP advertisement timer.
Enhanced Object Tracking (EOT) is not stateful switchover (SSO)-aware and cannot be used with VRRP in
SSO mode.
VRRP Operation
There are several ways a LAN client can determine which router should be the first hop to a particular
remote destination. The client can use a dynamic process or static configuration. Examples of dynamic
router discovery are as follows:
1. Proxy ARP— The client uses Address Resolution Protocol (ARP) to get the destination it wants to
reach, and a router will respond to the ARP request with its own MAC address.
2. Routing protocol— The client listens to dynamic routing protocol updates (for example, from
Routing Information Protocol [RIP]) and forms its own routing table.
VRRP (Virtual Router Redundancy Protocol)
3. ICMP Router Discovery Protocol (IRDP) client— The client runs an Internet Control Message
Protocol (ICMP) router discovery client.
The drawback to dynamic discovery protocols is that they incur some configuration and processing
overhead on the LAN client. Also, in the event of a router failure, the process of switching to another
router can be slow.
An alternative to dynamic discovery protocols is to statically configure a default router on the client.
This approach simplifies client configuration and processing, but creates a single point of failure. If the
default gateway fails, the LAN client is limited to communicating only on the local IP network segment
and is cut off from the rest of the network.
VRRP can solve the static configuration problem. VRRP enables a group of routers to form a single virtual
router. The LAN clients can then be configured with the virtual router as their default gateway. The
virtual router, representing a group of routers, is also known as a VRRP group.
VRRP is supported on Ethernet, Fast Ethernet, BVI, and Gigabit Ethernet interfaces, and on MPLS VPNs,
VRF-aware MPLS VPNs, and VLANs.
Figure 2 LAN topology in which VRRP is configured. In this example, Routers A, B, and C are VRRP routers
(routers running VRRP) that comprise a virtual router. The IP address of the virtual router is the same as that
configured for the Ethernet interface of Router A (10.0.0.1)
VRRP (Virtual Router Redundancy Protocol)
Multiple Virtual Router Support
You can configure up to 255 virtual routers on a router physical interface. The actual number of virtual
routers that a router interface can support depends on the following factors:
1. Router processing capability
2. Router memory capability
3. Router interface support of multiple MAC addresses
In a topology where multiple virtual routers are configured on a router interface, the interface can act as
a master for one virtual router and as a backup for one or more virtual routers.
VRRP Router Priority and Preemption
An important aspect of the VRRP redundancy scheme is VRRP router priority. Priority determines the
role that each VRRP router plays and what happens if the virtual router master fails.
If a VRRP router owns the IP address of the virtual router and the IP address of the physical interface,
this router will function as a virtual router master.
Priority also determines if a VRRP router functions as a virtual router backup and the order of
ascendancy to becoming a virtual router master if the virtual router master fails. You can configure the
priority of each virtual router backup with a value of 1 through 254 using the vrrp priority command.
For example, if Router A, the virtual router master in a LAN topology, fails, an election process takes
place to determine if virtual router backups B or C should take over. If Routers B and C are configured
with the priorities of 101 and 100, respectively, Router B is elected to become virtual router master
because it has the higher priority. If Routers B and C are both configured with the priority of 100, the
virtual router backup with the higher IP address is elected to become the virtual router master.
By default, a preemptive scheme is enabled whereby a higher priority virtual router backup that
becomes available takes over for the virtual router backup that was elected to become virtual router
master. You can disable this preemptive scheme using the no vrrp preempt command. If preemption is
disabled, the virtual router backup that is elected to become virtual router master remains the master
until the original virtual router master recovers and becomes master again.
VRRP Advertisements
The virtual router master sends VRRP advertisements to other VRRP routers in the same group. The
advertisements communicate the priority and state of the virtual router master. The VRRP
advertisements are encapsulated in IP packets and sent to the IP Version 4 multicast address assigned to
the VRRP group. The advertisements are sent every second by default; the interval is configurable.
VRRP (Virtual Router Redundancy Protocol)
Although the VRRP protocol as per RFC 3768 does not support millisecond timers, Cisco routers allow
you to configure millisecond timers. You need to manually configure the millisecond timer values on
both the primary and the backup routers. The master advertisement value displayed in the show vrrp
command output on the backup routers is always 1 second because the packets on the backup routers
do not accept millisecond values.
You must use millisecond timers where absolutely necessary and with careful consideration and testing.
Millisecond values work only under favorable circumstances, and you must be aware that the use of the
millisecond timer values restricts VRRP operation to Cisco devices only.
VRRP Object Tracking
Object tracking is an independent process that manages creating, monitoring, and removing tracked
objects such as the state of the line protocol of an interface. Clients such as the Hot Standby Router
Protocol (HSRP), Gateway Load Balancing Protocol (GLBP), and VRRP register their interest with specific
tracked objects and act when the state of an object changes.
Each tracked object is identified by a unique number that is specified on the tracking CLI. Client
processes such as VRRP use this number to track a specific object.
The tracking process periodically polls the tracked objects and notes any change of value. The changes in
the tracked object are communicated to interested client processes, either immediately or after a
specified delay. The object values are reported as either up or down.
VRRP object tracking gives VRRP access to all the objects available through the tracking process. The
tracking process allows you to track individual objects such as a the state of an interface line protocol,
state of an IP route, or the reachability of a route.
VRRP provides an interface to the tracking process. Each VRRP group can track multiple objects that may
affect the priority of the VRRP device. You specify the object number to be tracked and VRRP is notified
of any change to the object. VRRP increments (or decrements) the priority of the virtual device based on
the state of the object being tracked.
VRRP Authentication
VRRP ignores unauthenticated VRRP protocol messages. The default authentication type is text
authentication.
You can configure VRRP text authentication, authentication using a simple MD5 key string, or MD5 key
chains for authentication.
MD5 authentication provides greater security than the alternative plain text authentication scheme.
MD5 authentication allows each VRRP group member to use a secret key to generate a keyed MD5 hash
VRRP (Virtual Router Redundancy Protocol)
of the packet that is part of the outgoing packet. A keyed hash of an incoming packet is generated and if
the generated hash does not match the hash within the incoming packet, the packet is ignored.
The key for the MD5 hash can either be given directly in the configuration using a key string or supplied
indirectly through a key chain.
A router will ignore incoming VRRP packets from routers that do not have the same authentication
configuration for a VRRP group. VRRP has three authentication schemes:
1. No authentication
2. Plain text authentication
3. MD5 authentication
VRRP packets will be rejected in any of the following cases:
1. The authentication schemes differ on the router and in the incoming packet.
2. MD5 digests differ on the router and in the incoming packet.
3. Text authentication strings differ on the router and in the incoming packet.
Customizing VRRP
Customizing the behavior of VRRP is optional. Be aware that as soon as you enable a VRRP group, that
group is operating. It is possible that if you first enable a VRRP group before customizing VRRP, the
router could take over control of the group and become the virtual router master before you have
finished customizing the feature. Therefore, if you plan to customize VRRP, it is a good idea to do so
before enabling VRRP.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask
5. vrrp group description text
6. vrrp group priority level
7. vrrp group preempt [delay minimum seconds]
8. vrrp group timers advertise [msec] interval
9. vrrp group timers learn
10. exit
11. no vrrp sso
VRRP (Virtual Router Redundancy Protocol)
Enabling VRRP
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask
5. vrrp group ip ip-address [secondary]
6. end
7. show vrrp [brief] | group]
8. show vrrp interface type number [brief]
Disabling a VRRP Group on an Interface
Disabling a VRRP group on an interface allows the protocol to be disabled, but the configuration to be
retained. This ability was added with the introduction of the VRRP MIB, RFC 2787, Definitions of
Managed Objects for the Virtual Router Redundancy Protocol .
You can use a Simple Network Management Protocol (SNMP) management tool to enable or disable
VRRP on an interface. Because of the SNMP management capability, the vrrp shutdown command was
introduced to represent a method via the command line interface (CLI) for VRRP to show the state that
had been configured using SNMP.
When the show running-config command is entered, you can see immediately if the VRRP group has
been configured and set to enabled or disabled. This is the same functionality that is enabled within the
MIB.
The no form of the command enables the same operation that is performed within the MIB. If the vrrp
shutdown command is specified using the SNMP interface, then entering the no vrrp shutdown
command reenables the VRRP group.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask
5. vrrp group shutdown
VRRP (Virtual Router Redundancy Protocol)
Configuring VRRP Object Tracking
(Note: If a VRRP group is the IP address owner, its priority is fixed at 255 and cannot be reduced through
object tracking.)
SUMMARY STEPS
1. enable
2. configure terminal
3. track object-number interface type number {line-protocol | ip routing}
4. interface type number
5. vrrp group ip ip-address
6. vrrp group priority level
7. vrrp group track object-number [decrement priority]
8. end
9. show track [object-number]
Configuring VRRP MD5 Authentication Using a Key String
(Note: Interoperability with vendors that may have implemented the RFC 2338 method is not enabled.
Text authentication cannot be combined with MD5 authentication for a VRRP group at any one time.
When MD5 authentication is configured, the text authentication field in VRRP hello messages is set to all
zeroes on transmit and ignored on receipt, provided the receiving router also has MD5 authentication
enabled.)
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask [secondary]
5. vrrp group priority priority
6. vrrp group authentication md5 key-string [0 | 7] key-string [timeout seconds]
7. vrrp group ip [ip-address[secondary]]
8. Repeat Steps 1 through 7 on each router that will communicate.
9. end
Configuring VRRP MD5 Authentication Using a Key Chain
Perform this task to configure VRRP MD5 authentication using a key chain. Key chains allow a different
key string to be used at different times according to the key chain configuration. VRRP will query the
appropriate key chain to obtain the current live key and key ID for the specified key chain.
VRRP (Virtual Router Redundancy Protocol)
SUMMARY STEPS
1. enable
2. configure terminal
3. key chain name-of-chain
4. key key-id
5. key-string string
6. exit
7. interface type number
8. ip address ip-address mask [secondary]
9. vrrp group priority priority
10. vrrp group authentication md5 key-chain key-chain
11. vrrp group ip [ip-address[secondary]]
12. Repeat Steps 1 through 11 on each router that will communicate.
13. end
Verifying the VRRP MD5 Authentication Configuration
SUMMARY STEPS
1. show vrrp
2. debug vrrp authentication
Configuring VRRP Text Authentication
Before You Begin
Interoperability with vendors that may have implemented the RFC 2338 method is not enabled. Text
authentication cannot be combined with MD5 authentication for a VRRP group at any one time. When
MD5 authentication is configured, the text authentication field in VRRP hello messages is set to all zeros
on transmit and ignored on receipt, provided the receiving router also has MD5 authentication enabled.
SUMMARY STEPS
1. enable
2. configure terminal
3. terminal interface type number
4. ip address ip-address mask [secondary]
5. vrrp group authentication text text-string
6. vrrp group ip ip-address
7. Repeat Steps 1 through 6 on each router that will communicate.
8. end
VRRP (Virtual Router Redundancy Protocol)
Enabling the Router to Send SNMP VRRP Notifications
The VRRP MIB supports SNMP Get operations, which allow network devices to get reports about VRRP
groups in a network from the network management station.
Enabling VRRP MIB trap support is performed through the CLI, and the MIB is used for getting the
reports. A trap notifies the network management station when a router becomes a Master or backup
router. When an entry is configured from the CLI, the RowStatus for that group in the MIB immediately
goes to the active state.
SUMMARY STEPS
1. enable
2. configure terminal
3. snmp-server enable traps vrrp
4. snmp-server host host community-string vrrp
VRRP Benefits
 Redundancy
VRRP enables you to configure multiple routers as the default gateway router, which reduces the
possibility of a single point of failure in a network.
 Load Sharing
You can configure VRRP in such a way that traffic to and from LAN clients can be shared by multiple
routers, thereby sharing the traffic load more equitably among available routers.
 Multiple Virtual Routers
VRRP supports up to 255 virtual routers (VRRP groups) on a router physical interface, subject to the
platform supporting multiple MAC addresses. Multiple virtual router support enables you to implement
redundancy and load sharing in your LAN topology.
 Multiple IP Addresses
The virtual router can manage multiple IP addresses, including secondary IP addresses. Therefore, if you
have multiple subnets configured on an Ethernet interface, you can configure VRRP on each subnet.
 Preemption
The redundancy scheme of VRRP enables you to preempt a virtual router backup that has taken over for
a failing virtual router master with a higher priority virtual router backup that has become available.
VRRP (Virtual Router Redundancy Protocol)
 Authentication
VRRP message digest 5 (MD5) algorithm authentication protects against VRRP-spoofing software and
uses the industry-standard MD5 algorithm for improved reliability and security.
Advertisement Protocol
VRRP uses a dedicated Internet Assigned Numbers Authority (IANA) standard multicast address
(224.0.0.18) for VRRP advertisements. This addressing scheme minimizes the number of routers that
must service the multicasts and allows test equipment to accurately identify VRRP packets on a
segment. The IANA assigned VRRP the IP protocol number 112.
VRRP Object Tracking
VRRP object tracking provides a way to ensure the best VRRP router is the virtual router master for the
group by altering VRRP priorities to the status of tracked objects such as the interface or IP route states.
Example for VRRP
Figure 3 VRRP Topology
VRRP (Virtual Router Redundancy Protocol)
R1 (config) #int fa0/0
R1 (config-if) #ip add 192.168.101.2 255.255.255.0
R1 (config-if) #no shut
R1 (config-if) #int s0/0
R1 (config-if) #ip add 192.168.1.1 255.255.255.0
R1 (config-if) #no shut
R1 (config) #router ei 100
R1 (config-router) #no auto
R1 (config-router) #network 0.0.0.0
Ho (config) #int fa0/0
Ho (config-if) #ip add 192.168.102.1 255.255.255.0
Ho (config-if) #no shut
Ho (config-if) #int s0/0
Ho (config-if) #ip add 192.168.1.2 255.255.255.0
Ho (config-if) #no shut
Ho (config-if) #int s0/1
Ho (config-if) #ip add 192.168.2.1 255.255.255.0
Ho (config-if) #no shut
Ho (config-if) #router ei 100
Ho (config-router) #no auto
Ho (config-router) #network 0.0.0.0
R2 (config) #int fa0/0
R2 (config-if) #ip add 192.168.101.3 255.255.255.0
R2 (config-if) #no shut
R2 (config-if) #int s0/0
R2 (config-if) #ip add 192.168.2.2 255.255.255.0
R2 (config-if) #no shut
R2 (config-if) #router ei 100
R2 (config-router) #no auto
R2 (config-router) #network 0.0.0.0
Ho #sh ip route
R1#sh ip int br
R2#sh ip int br
Now we will provide the IP add to the PC, which is 192.168.101.10. And computer Gateway would
192.168.101.1.
R1 (config) #int fa0/0
R1 (config-if) #vrrp 1 ip 192.168.101.1
VRRP (Virtual Router Redundancy Protocol)
R2 (config) #int fa0/0
R2 (config-if) #vrrp 1 ip 192.168.101.1
Now we can see the R2 will become Master and R1 will go into Backup, because R2s IP address is higher
and by default preemption is enabled in VRRP.
Comp# tracert –d 192.168.102.1
Here we can see all the data is going via R2. Because R2 is Master
R2 (config) #int fa0/0
R2 (config-if) #shut
Now R1 will become Master
Comp# tracert –d 192.168.102.1
All the traffic going via R1
R2 (config) #int fa0/0
R2 (config-if) #no shut
Once R2s Fa0/0 comes up, it will become once again Master
R1#sh vrrp
Default Hello timer 1 sec
Hold – 3 sec
Preempt – enabled by default
Default Priority 100
Virtual Mac 0000.5e00.0101
Now if the WAN link goes down
R2 (config) #int s0/0
R2 (config-if) #shut
Comp# tracert –d 192.168.102.1
First data will reach R2 and then R1
R1 will not become master here in case of serial link failure. For that we need to enable Track
command.
VRRP (Virtual Router Redundancy Protocol)
R2 (config) #int s0/0
R2 (config-if) #no shut
R2 (config-if) #int fa0/0
R2 (config-if) #vrrp 1 track?
R2 (config-if) #exit
R2 (config) #track ?
1 to 500
R2 (config) #track 1 ?
R2 (config) #track 1 int s0/0 ?
R2 (config) #track 1 int s0/0 line protocol
R2 (config) #int fa0/0
R2 (config-if) #vrrp 1 track 1
R2#sh vrrp
Track obj 1 state up decrement 10
Comp# tracert –d 192.168.102.1
Data is going via R2
R2 (config) #int s0/0
R2 (config-if) #shut
R2#sh vrrp
Priority 90
All data will go via R1
Load Balancing
For load balancing we will create one more group
Till now for Group 1, Master is R2
R1 (config) #int fa0/0
R1 (config-if) #vrrp 2 ip 192.168.101.4
R1 (config-if) #vrrp 2 priority 101
R1 (config) # track 1 int s0/0 line protocol
R1 (config) #int fa0/0
R1 (config-if) #vrrp 2 track 1
R2 (config) #int fa0/0
R2 (config-if) #vrrp 2 ip 192.168.101.4
R2#sh vrrp
VRRP (Virtual Router Redundancy Protocol)
Group 1 Master, Group 2 Backup
R1#sh vrrp
Group 1 Backup, Group 2 Master
R1 (config) #int s0/0
R1 (config-if) #shut
R2 #sh vrrp
R1 (config) #int s0/0
R1 (config-if) #no shut
R1#sh vrrp
For load balancing if we provide clients default gateway is 192.168.101.1 then the data will go via R2, if
we provide clients gateway 192.168.101.4 then data will go via R1.

More Related Content

What's hot

Hot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) usingHot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) using
ShubhiGupta94
 
Bgp
BgpBgp
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
KwonSun Bae
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
anilinvns
 
First hop redundancy
First hop redundancyFirst hop redundancy
First hop redundancy
Swapnil Kapate
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
Er. Anmol Bhagat
 
BGP Update Source
BGP Update Source BGP Update Source
BGP Update Source
NetProtocol Xpert
 
EIGRP Overview
EIGRP OverviewEIGRP Overview
EIGRP Overview
NetProtocol Xpert
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
Shawn Zandi
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
Netwax Lab
 
An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)
Jasim Alam
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
Dsunte Wilson
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Brkmpl 2333
Brkmpl 2333Brkmpl 2333
Brkmpl 2333
ronsito
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
Sourabh Goyal
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
sarasanandam
 
Router and routing
Router  and routingRouter  and routing
Router and routing
Iran-Gul Mukhlis
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
Peter R. Egli
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
Netwax Lab
 
Eigrp new
Eigrp newEigrp new

What's hot (20)

Hot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) usingHot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) using
 
Bgp
BgpBgp
Bgp
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
First hop redundancy
First hop redundancyFirst hop redundancy
First hop redundancy
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
BGP Update Source
BGP Update Source BGP Update Source
BGP Update Source
 
EIGRP Overview
EIGRP OverviewEIGRP Overview
EIGRP Overview
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
 
BGP (border gateway routing protocol)
BGP (border gateway routing protocol)BGP (border gateway routing protocol)
BGP (border gateway routing protocol)
 
An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)An Overview of Border Gateway Protocol (BGP)
An Overview of Border Gateway Protocol (BGP)
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 
Brkmpl 2333
Brkmpl 2333Brkmpl 2333
Brkmpl 2333
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Router and routing
Router  and routingRouter  and routing
Router and routing
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
 
Eigrp new
Eigrp newEigrp new
Eigrp new
 

Viewers also liked

Vrrp
VrrpVrrp
Difference b/w STP RSTP PVST & MSTP
Difference b/w STP RSTP PVST & MSTPDifference b/w STP RSTP PVST & MSTP
Difference b/w STP RSTP PVST & MSTP
Netwax Lab
 
CISCO HSRP VRRP GLBP
CISCO HSRP VRRP GLBPCISCO HSRP VRRP GLBP
CISCO HSRP VRRP GLBP
YACINE MESSAOUI
 
Layer 3 redundancy hsrp
Layer 3 redundancy   hsrpLayer 3 redundancy   hsrp
Layer 3 redundancy hsrp
Edgardo Scrimaglia
 
Storage area network (san)
Storage area network (san) Storage area network (san)
Storage area network (san)
Satwik Kumar Shiri
 
CCNA Routing & Switching. Novedades en Tecnologías LAN
CCNA Routing & Switching. Novedades en Tecnologías LANCCNA Routing & Switching. Novedades en Tecnologías LAN
CCNA Routing & Switching. Novedades en Tecnologías LAN
Francisco Javier Novoa de Manuel
 
Multilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesMultilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design Principles
Cisco Canada
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)
Krishna Kahar
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
Netwax Lab
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab
 
119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut
nicolelemmimg
 
VRF Configuration
VRF ConfigurationVRF Configuration
VRF Configuration
Netwax Lab
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
Netwax Lab
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iii
Netwax Lab
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
Netwax Lab
 
TCP Intercept
TCP InterceptTCP Intercept
TCP Intercept
Netwax Lab
 
OSPF (open shortest path first) part ii
OSPF (open shortest path first) part  iiOSPF (open shortest path first) part  ii
OSPF (open shortest path first) part ii
Netwax Lab
 
IP Address
IP AddressIP Address
IP Address
Netwax Lab
 
Nxll24 i pv6
Nxll24 i pv6Nxll24 i pv6
Nxll24 i pv6
Netwax Lab
 
STP Protection
STP ProtectionSTP Protection
STP Protection
Netwax Lab
 

Viewers also liked (20)

Vrrp
VrrpVrrp
Vrrp
 
Difference b/w STP RSTP PVST & MSTP
Difference b/w STP RSTP PVST & MSTPDifference b/w STP RSTP PVST & MSTP
Difference b/w STP RSTP PVST & MSTP
 
CISCO HSRP VRRP GLBP
CISCO HSRP VRRP GLBPCISCO HSRP VRRP GLBP
CISCO HSRP VRRP GLBP
 
Layer 3 redundancy hsrp
Layer 3 redundancy   hsrpLayer 3 redundancy   hsrp
Layer 3 redundancy hsrp
 
Storage area network (san)
Storage area network (san) Storage area network (san)
Storage area network (san)
 
CCNA Routing & Switching. Novedades en Tecnologías LAN
CCNA Routing & Switching. Novedades en Tecnologías LANCCNA Routing & Switching. Novedades en Tecnologías LAN
CCNA Routing & Switching. Novedades en Tecnologías LAN
 
Multilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesMultilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design Principles
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut
 
VRF Configuration
VRF ConfigurationVRF Configuration
VRF Configuration
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iii
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
 
TCP Intercept
TCP InterceptTCP Intercept
TCP Intercept
 
OSPF (open shortest path first) part ii
OSPF (open shortest path first) part  iiOSPF (open shortest path first) part  ii
OSPF (open shortest path first) part ii
 
IP Address
IP AddressIP Address
IP Address
 
Nxll24 i pv6
Nxll24 i pv6Nxll24 i pv6
Nxll24 i pv6
 
STP Protection
STP ProtectionSTP Protection
STP Protection
 

Similar to VRRP (virtual router redundancy protocol)

Vrrp Alp
Vrrp AlpVrrp Alp
Vrrp Alp
Alp isik
 
Vrrp technology white paper
Vrrp technology white paperVrrp technology white paper
Vrrp technology white paper
Puran Pangeni
 
Ip services
Ip servicesIp services
Ip services
Student
 
SRWE_Module_9 for huwawei hcia datacom course
SRWE_Module_9 for huwawei hcia datacom courseSRWE_Module_9 for huwawei hcia datacom course
SRWE_Module_9 for huwawei hcia datacom course
muhammednurhusien1
 
Class notes fhrp,hsrp
Class notes  fhrp,hsrpClass notes  fhrp,hsrp
Class notes fhrp,hsrp
SagarR24
 
Class notes fhrp,hsrp,vrrp
Class notes fhrp,hsrp,vrrpClass notes fhrp,hsrp,vrrp
Class notes fhrp,hsrp,vrrp
SagarR24
 
Examen final ccna2
Examen final ccna2Examen final ccna2
Examen final ccna2
Juli Yaret
 
VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)
Netwax Lab
 
Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014
Đồng Quốc Vương
 
ether channel_hsrp
ether channel_hsrpether channel_hsrp
ether channel_hsrp
newbie2019
 
Mpls vpn.rip
Mpls vpn.ripMpls vpn.rip
Mpls vpn.rip
farhanica
 
Service Chaining - Cloud Network Services at Scale
Service Chaining - Cloud Network Services at ScaleService Chaining - Cloud Network Services at Scale
Service Chaining - Cloud Network Services at Scale
MarketingArrowECS_CZ
 
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbp
2 fhrp,hsrp,vrrp,gblp,ntp,nat   glbp2 fhrp,hsrp,vrrp,gblp,ntp,nat   glbp
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbp
SagarR24
 
Practice exam #2
Practice exam #2Practice exam #2
Practice exam #2
Kris Mofu
 
Intrdouction to VRF Implementation.pdf
Intrdouction to VRF Implementation.pdfIntrdouction to VRF Implementation.pdf
Intrdouction to VRF Implementation.pdf
Nesibusami
 
Mikrotik link redundancy solution
Mikrotik link redundancy solution Mikrotik link redundancy solution
Mikrotik link redundancy solution
S M Tipu
 
Overview of Distributed Virtual Router (DVR) in Openstack/Neutron
Overview of Distributed Virtual Router (DVR) in Openstack/NeutronOverview of Distributed Virtual Router (DVR) in Openstack/Neutron
Overview of Distributed Virtual Router (DVR) in Openstack/Neutron
vivekkonnect
 
ODA000017 MPLS VPN(L3).ppt
ODA000017 MPLS VPN(L3).pptODA000017 MPLS VPN(L3).ppt
ODA000017 MPLS VPN(L3).ppt
marwan76
 
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Đồng Quốc Vương
 
Ccna switch wan and ppp protocol contact
Ccna switch wan and ppp protocol contactCcna switch wan and ppp protocol contact
Ccna switch wan and ppp protocol contact
aptinstallpython3
 

Similar to VRRP (virtual router redundancy protocol) (20)

Vrrp Alp
Vrrp AlpVrrp Alp
Vrrp Alp
 
Vrrp technology white paper
Vrrp technology white paperVrrp technology white paper
Vrrp technology white paper
 
Ip services
Ip servicesIp services
Ip services
 
SRWE_Module_9 for huwawei hcia datacom course
SRWE_Module_9 for huwawei hcia datacom courseSRWE_Module_9 for huwawei hcia datacom course
SRWE_Module_9 for huwawei hcia datacom course
 
Class notes fhrp,hsrp
Class notes  fhrp,hsrpClass notes  fhrp,hsrp
Class notes fhrp,hsrp
 
Class notes fhrp,hsrp,vrrp
Class notes fhrp,hsrp,vrrpClass notes fhrp,hsrp,vrrp
Class notes fhrp,hsrp,vrrp
 
Examen final ccna2
Examen final ccna2Examen final ccna2
Examen final ccna2
 
VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)
 
Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014
 
ether channel_hsrp
ether channel_hsrpether channel_hsrp
ether channel_hsrp
 
Mpls vpn.rip
Mpls vpn.ripMpls vpn.rip
Mpls vpn.rip
 
Service Chaining - Cloud Network Services at Scale
Service Chaining - Cloud Network Services at ScaleService Chaining - Cloud Network Services at Scale
Service Chaining - Cloud Network Services at Scale
 
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbp
2 fhrp,hsrp,vrrp,gblp,ntp,nat   glbp2 fhrp,hsrp,vrrp,gblp,ntp,nat   glbp
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbp
 
Practice exam #2
Practice exam #2Practice exam #2
Practice exam #2
 
Intrdouction to VRF Implementation.pdf
Intrdouction to VRF Implementation.pdfIntrdouction to VRF Implementation.pdf
Intrdouction to VRF Implementation.pdf
 
Mikrotik link redundancy solution
Mikrotik link redundancy solution Mikrotik link redundancy solution
Mikrotik link redundancy solution
 
Overview of Distributed Virtual Router (DVR) in Openstack/Neutron
Overview of Distributed Virtual Router (DVR) in Openstack/NeutronOverview of Distributed Virtual Router (DVR) in Openstack/Neutron
Overview of Distributed Virtual Router (DVR) in Openstack/Neutron
 
ODA000017 MPLS VPN(L3).ppt
ODA000017 MPLS VPN(L3).pptODA000017 MPLS VPN(L3).ppt
ODA000017 MPLS VPN(L3).ppt
 
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
 
Ccna switch wan and ppp protocol contact
Ccna switch wan and ppp protocol contactCcna switch wan and ppp protocol contact
Ccna switch wan and ppp protocol contact
 

More from Netwax Lab

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
Netwax Lab
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Netwax Lab
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
Netwax Lab
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
Netwax Lab
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
Netwax Lab
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
Netwax Lab
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
Netwax Lab
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
Netwax Lab
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
Netwax Lab
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
Netwax Lab
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
Netwax Lab
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
Netwax Lab
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
Netwax Lab
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
Netwax Lab
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
Netwax Lab
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
Netwax Lab
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
Netwax Lab
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
Netwax Lab
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
Netwax Lab
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking ii
Netwax Lab
 

More from Netwax Lab (20)

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking ii
 

Recently uploaded

intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
NTTDATA INTRAMART
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
ThousandEyes
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
ScyllaDB
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
UiPathCommunity
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
ScyllaDB
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
ScyllaDB
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
ScyllaDB
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
Neeraj Kumar Singh
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 

Recently uploaded (20)

intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 

VRRP (virtual router redundancy protocol)

  • 1. VRRP (Virtual Router Redundancy Protocol) VRRP (Virtual Router Redundancy Protocol) is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork. The Virtual Router Redundancy Protocol (VRRP) eliminates the single point of failure inherent in the static default routed environment. VRRP specifies an election protocol that dynamically assigns responsibility for a virtual router (a VPN 3000 Series Concentrator cluster) to one of the VPN Concentrators on a LAN. The VRRP VPN Concentrator that controls the IP address(es) associated with a virtual router is called the Master, and forwards packets sent to those IP addresses. When the Master becomes unavailable, a backup VPN Concentrator takes the place of the Master. VRRP (Virtual Router Redundancy Protocol) Points to Remember: 1. Open Standard Protocol (1999) 2. Hello Timer 1 sec 3. Hold Timer 3 sec 4. It use IP Protocol no 112 5. It sends multicast hellos on 224.0.0.18 6. Default Preempt enable 7. Default Priority 100 8. No inbuilt Track command 9. Default decrement in priority using external track = 10 10. VRRP Mac 000.5e00.01xx (xx is group ID) 11. It supports two types of authentication MD-5, Plain Txt. Figure 1 Basic VRRP Terminology
  • 2. VRRP (Virtual Router Redundancy Protocol) VRRP Roles (i) Master (ii) Backup Master – A router which gives the reply of ARP request of clients for gateway. Master Requirement – (i) High Priority (ii) Higher IP Load balancing is Possible using multiple groups like HSRP Group ID – 1 to 255 Restrictions for VRRP VRRP is designed for use over multiaccess, multicast, or broadcast capable Ethernet LANs. VRRP is not intended as a replacement for existing dynamic protocols. VRRP is supported on Ethernet, Fast Ethernet, Bridge Group Virtual Interface (BVI), and Gigabit Ethernet interfaces, and on Multiprotocol Label Switching (MPLS) Virtual Private Networks (VPNs), VRF-aware MPLS VPNs, and VLANs. Because of the forwarding delay that is associated with the initialization of a BVI interface, you must configure the VRRP advertise timer to a value equal to or greater than the forwarding delay on the BVI interface. This setting prevents a VRRP router on a recently initialized BVI interface from unconditionally taking over the master role. Use the bridge forward-time command to set the forwarding delay on the BVI interface. Use the vrrp timers advertise command to set the VRRP advertisement timer. Enhanced Object Tracking (EOT) is not stateful switchover (SSO)-aware and cannot be used with VRRP in SSO mode. VRRP Operation There are several ways a LAN client can determine which router should be the first hop to a particular remote destination. The client can use a dynamic process or static configuration. Examples of dynamic router discovery are as follows: 1. Proxy ARP— The client uses Address Resolution Protocol (ARP) to get the destination it wants to reach, and a router will respond to the ARP request with its own MAC address. 2. Routing protocol— The client listens to dynamic routing protocol updates (for example, from Routing Information Protocol [RIP]) and forms its own routing table.
  • 3. VRRP (Virtual Router Redundancy Protocol) 3. ICMP Router Discovery Protocol (IRDP) client— The client runs an Internet Control Message Protocol (ICMP) router discovery client. The drawback to dynamic discovery protocols is that they incur some configuration and processing overhead on the LAN client. Also, in the event of a router failure, the process of switching to another router can be slow. An alternative to dynamic discovery protocols is to statically configure a default router on the client. This approach simplifies client configuration and processing, but creates a single point of failure. If the default gateway fails, the LAN client is limited to communicating only on the local IP network segment and is cut off from the rest of the network. VRRP can solve the static configuration problem. VRRP enables a group of routers to form a single virtual router. The LAN clients can then be configured with the virtual router as their default gateway. The virtual router, representing a group of routers, is also known as a VRRP group. VRRP is supported on Ethernet, Fast Ethernet, BVI, and Gigabit Ethernet interfaces, and on MPLS VPNs, VRF-aware MPLS VPNs, and VLANs. Figure 2 LAN topology in which VRRP is configured. In this example, Routers A, B, and C are VRRP routers (routers running VRRP) that comprise a virtual router. The IP address of the virtual router is the same as that configured for the Ethernet interface of Router A (10.0.0.1)
  • 4. VRRP (Virtual Router Redundancy Protocol) Multiple Virtual Router Support You can configure up to 255 virtual routers on a router physical interface. The actual number of virtual routers that a router interface can support depends on the following factors: 1. Router processing capability 2. Router memory capability 3. Router interface support of multiple MAC addresses In a topology where multiple virtual routers are configured on a router interface, the interface can act as a master for one virtual router and as a backup for one or more virtual routers. VRRP Router Priority and Preemption An important aspect of the VRRP redundancy scheme is VRRP router priority. Priority determines the role that each VRRP router plays and what happens if the virtual router master fails. If a VRRP router owns the IP address of the virtual router and the IP address of the physical interface, this router will function as a virtual router master. Priority also determines if a VRRP router functions as a virtual router backup and the order of ascendancy to becoming a virtual router master if the virtual router master fails. You can configure the priority of each virtual router backup with a value of 1 through 254 using the vrrp priority command. For example, if Router A, the virtual router master in a LAN topology, fails, an election process takes place to determine if virtual router backups B or C should take over. If Routers B and C are configured with the priorities of 101 and 100, respectively, Router B is elected to become virtual router master because it has the higher priority. If Routers B and C are both configured with the priority of 100, the virtual router backup with the higher IP address is elected to become the virtual router master. By default, a preemptive scheme is enabled whereby a higher priority virtual router backup that becomes available takes over for the virtual router backup that was elected to become virtual router master. You can disable this preemptive scheme using the no vrrp preempt command. If preemption is disabled, the virtual router backup that is elected to become virtual router master remains the master until the original virtual router master recovers and becomes master again. VRRP Advertisements The virtual router master sends VRRP advertisements to other VRRP routers in the same group. The advertisements communicate the priority and state of the virtual router master. The VRRP advertisements are encapsulated in IP packets and sent to the IP Version 4 multicast address assigned to the VRRP group. The advertisements are sent every second by default; the interval is configurable.
  • 5. VRRP (Virtual Router Redundancy Protocol) Although the VRRP protocol as per RFC 3768 does not support millisecond timers, Cisco routers allow you to configure millisecond timers. You need to manually configure the millisecond timer values on both the primary and the backup routers. The master advertisement value displayed in the show vrrp command output on the backup routers is always 1 second because the packets on the backup routers do not accept millisecond values. You must use millisecond timers where absolutely necessary and with careful consideration and testing. Millisecond values work only under favorable circumstances, and you must be aware that the use of the millisecond timer values restricts VRRP operation to Cisco devices only. VRRP Object Tracking Object tracking is an independent process that manages creating, monitoring, and removing tracked objects such as the state of the line protocol of an interface. Clients such as the Hot Standby Router Protocol (HSRP), Gateway Load Balancing Protocol (GLBP), and VRRP register their interest with specific tracked objects and act when the state of an object changes. Each tracked object is identified by a unique number that is specified on the tracking CLI. Client processes such as VRRP use this number to track a specific object. The tracking process periodically polls the tracked objects and notes any change of value. The changes in the tracked object are communicated to interested client processes, either immediately or after a specified delay. The object values are reported as either up or down. VRRP object tracking gives VRRP access to all the objects available through the tracking process. The tracking process allows you to track individual objects such as a the state of an interface line protocol, state of an IP route, or the reachability of a route. VRRP provides an interface to the tracking process. Each VRRP group can track multiple objects that may affect the priority of the VRRP device. You specify the object number to be tracked and VRRP is notified of any change to the object. VRRP increments (or decrements) the priority of the virtual device based on the state of the object being tracked. VRRP Authentication VRRP ignores unauthenticated VRRP protocol messages. The default authentication type is text authentication. You can configure VRRP text authentication, authentication using a simple MD5 key string, or MD5 key chains for authentication. MD5 authentication provides greater security than the alternative plain text authentication scheme. MD5 authentication allows each VRRP group member to use a secret key to generate a keyed MD5 hash
  • 6. VRRP (Virtual Router Redundancy Protocol) of the packet that is part of the outgoing packet. A keyed hash of an incoming packet is generated and if the generated hash does not match the hash within the incoming packet, the packet is ignored. The key for the MD5 hash can either be given directly in the configuration using a key string or supplied indirectly through a key chain. A router will ignore incoming VRRP packets from routers that do not have the same authentication configuration for a VRRP group. VRRP has three authentication schemes: 1. No authentication 2. Plain text authentication 3. MD5 authentication VRRP packets will be rejected in any of the following cases: 1. The authentication schemes differ on the router and in the incoming packet. 2. MD5 digests differ on the router and in the incoming packet. 3. Text authentication strings differ on the router and in the incoming packet. Customizing VRRP Customizing the behavior of VRRP is optional. Be aware that as soon as you enable a VRRP group, that group is operating. It is possible that if you first enable a VRRP group before customizing VRRP, the router could take over control of the group and become the virtual router master before you have finished customizing the feature. Therefore, if you plan to customize VRRP, it is a good idea to do so before enabling VRRP. SUMMARY STEPS 1. enable 2. configure terminal 3. interface type number 4. ip address ip-address mask 5. vrrp group description text 6. vrrp group priority level 7. vrrp group preempt [delay minimum seconds] 8. vrrp group timers advertise [msec] interval 9. vrrp group timers learn 10. exit 11. no vrrp sso
  • 7. VRRP (Virtual Router Redundancy Protocol) Enabling VRRP SUMMARY STEPS 1. enable 2. configure terminal 3. interface type number 4. ip address ip-address mask 5. vrrp group ip ip-address [secondary] 6. end 7. show vrrp [brief] | group] 8. show vrrp interface type number [brief] Disabling a VRRP Group on an Interface Disabling a VRRP group on an interface allows the protocol to be disabled, but the configuration to be retained. This ability was added with the introduction of the VRRP MIB, RFC 2787, Definitions of Managed Objects for the Virtual Router Redundancy Protocol . You can use a Simple Network Management Protocol (SNMP) management tool to enable or disable VRRP on an interface. Because of the SNMP management capability, the vrrp shutdown command was introduced to represent a method via the command line interface (CLI) for VRRP to show the state that had been configured using SNMP. When the show running-config command is entered, you can see immediately if the VRRP group has been configured and set to enabled or disabled. This is the same functionality that is enabled within the MIB. The no form of the command enables the same operation that is performed within the MIB. If the vrrp shutdown command is specified using the SNMP interface, then entering the no vrrp shutdown command reenables the VRRP group. SUMMARY STEPS 1. enable 2. configure terminal 3. interface type number 4. ip address ip-address mask 5. vrrp group shutdown
  • 8. VRRP (Virtual Router Redundancy Protocol) Configuring VRRP Object Tracking (Note: If a VRRP group is the IP address owner, its priority is fixed at 255 and cannot be reduced through object tracking.) SUMMARY STEPS 1. enable 2. configure terminal 3. track object-number interface type number {line-protocol | ip routing} 4. interface type number 5. vrrp group ip ip-address 6. vrrp group priority level 7. vrrp group track object-number [decrement priority] 8. end 9. show track [object-number] Configuring VRRP MD5 Authentication Using a Key String (Note: Interoperability with vendors that may have implemented the RFC 2338 method is not enabled. Text authentication cannot be combined with MD5 authentication for a VRRP group at any one time. When MD5 authentication is configured, the text authentication field in VRRP hello messages is set to all zeroes on transmit and ignored on receipt, provided the receiving router also has MD5 authentication enabled.) SUMMARY STEPS 1. enable 2. configure terminal 3. interface type number 4. ip address ip-address mask [secondary] 5. vrrp group priority priority 6. vrrp group authentication md5 key-string [0 | 7] key-string [timeout seconds] 7. vrrp group ip [ip-address[secondary]] 8. Repeat Steps 1 through 7 on each router that will communicate. 9. end Configuring VRRP MD5 Authentication Using a Key Chain Perform this task to configure VRRP MD5 authentication using a key chain. Key chains allow a different key string to be used at different times according to the key chain configuration. VRRP will query the appropriate key chain to obtain the current live key and key ID for the specified key chain.
  • 9. VRRP (Virtual Router Redundancy Protocol) SUMMARY STEPS 1. enable 2. configure terminal 3. key chain name-of-chain 4. key key-id 5. key-string string 6. exit 7. interface type number 8. ip address ip-address mask [secondary] 9. vrrp group priority priority 10. vrrp group authentication md5 key-chain key-chain 11. vrrp group ip [ip-address[secondary]] 12. Repeat Steps 1 through 11 on each router that will communicate. 13. end Verifying the VRRP MD5 Authentication Configuration SUMMARY STEPS 1. show vrrp 2. debug vrrp authentication Configuring VRRP Text Authentication Before You Begin Interoperability with vendors that may have implemented the RFC 2338 method is not enabled. Text authentication cannot be combined with MD5 authentication for a VRRP group at any one time. When MD5 authentication is configured, the text authentication field in VRRP hello messages is set to all zeros on transmit and ignored on receipt, provided the receiving router also has MD5 authentication enabled. SUMMARY STEPS 1. enable 2. configure terminal 3. terminal interface type number 4. ip address ip-address mask [secondary] 5. vrrp group authentication text text-string 6. vrrp group ip ip-address 7. Repeat Steps 1 through 6 on each router that will communicate. 8. end
  • 10. VRRP (Virtual Router Redundancy Protocol) Enabling the Router to Send SNMP VRRP Notifications The VRRP MIB supports SNMP Get operations, which allow network devices to get reports about VRRP groups in a network from the network management station. Enabling VRRP MIB trap support is performed through the CLI, and the MIB is used for getting the reports. A trap notifies the network management station when a router becomes a Master or backup router. When an entry is configured from the CLI, the RowStatus for that group in the MIB immediately goes to the active state. SUMMARY STEPS 1. enable 2. configure terminal 3. snmp-server enable traps vrrp 4. snmp-server host host community-string vrrp VRRP Benefits  Redundancy VRRP enables you to configure multiple routers as the default gateway router, which reduces the possibility of a single point of failure in a network.  Load Sharing You can configure VRRP in such a way that traffic to and from LAN clients can be shared by multiple routers, thereby sharing the traffic load more equitably among available routers.  Multiple Virtual Routers VRRP supports up to 255 virtual routers (VRRP groups) on a router physical interface, subject to the platform supporting multiple MAC addresses. Multiple virtual router support enables you to implement redundancy and load sharing in your LAN topology.  Multiple IP Addresses The virtual router can manage multiple IP addresses, including secondary IP addresses. Therefore, if you have multiple subnets configured on an Ethernet interface, you can configure VRRP on each subnet.  Preemption The redundancy scheme of VRRP enables you to preempt a virtual router backup that has taken over for a failing virtual router master with a higher priority virtual router backup that has become available.
  • 11. VRRP (Virtual Router Redundancy Protocol)  Authentication VRRP message digest 5 (MD5) algorithm authentication protects against VRRP-spoofing software and uses the industry-standard MD5 algorithm for improved reliability and security. Advertisement Protocol VRRP uses a dedicated Internet Assigned Numbers Authority (IANA) standard multicast address (224.0.0.18) for VRRP advertisements. This addressing scheme minimizes the number of routers that must service the multicasts and allows test equipment to accurately identify VRRP packets on a segment. The IANA assigned VRRP the IP protocol number 112. VRRP Object Tracking VRRP object tracking provides a way to ensure the best VRRP router is the virtual router master for the group by altering VRRP priorities to the status of tracked objects such as the interface or IP route states. Example for VRRP Figure 3 VRRP Topology
  • 12. VRRP (Virtual Router Redundancy Protocol) R1 (config) #int fa0/0 R1 (config-if) #ip add 192.168.101.2 255.255.255.0 R1 (config-if) #no shut R1 (config-if) #int s0/0 R1 (config-if) #ip add 192.168.1.1 255.255.255.0 R1 (config-if) #no shut R1 (config) #router ei 100 R1 (config-router) #no auto R1 (config-router) #network 0.0.0.0 Ho (config) #int fa0/0 Ho (config-if) #ip add 192.168.102.1 255.255.255.0 Ho (config-if) #no shut Ho (config-if) #int s0/0 Ho (config-if) #ip add 192.168.1.2 255.255.255.0 Ho (config-if) #no shut Ho (config-if) #int s0/1 Ho (config-if) #ip add 192.168.2.1 255.255.255.0 Ho (config-if) #no shut Ho (config-if) #router ei 100 Ho (config-router) #no auto Ho (config-router) #network 0.0.0.0 R2 (config) #int fa0/0 R2 (config-if) #ip add 192.168.101.3 255.255.255.0 R2 (config-if) #no shut R2 (config-if) #int s0/0 R2 (config-if) #ip add 192.168.2.2 255.255.255.0 R2 (config-if) #no shut R2 (config-if) #router ei 100 R2 (config-router) #no auto R2 (config-router) #network 0.0.0.0 Ho #sh ip route R1#sh ip int br R2#sh ip int br Now we will provide the IP add to the PC, which is 192.168.101.10. And computer Gateway would 192.168.101.1. R1 (config) #int fa0/0 R1 (config-if) #vrrp 1 ip 192.168.101.1
  • 13. VRRP (Virtual Router Redundancy Protocol) R2 (config) #int fa0/0 R2 (config-if) #vrrp 1 ip 192.168.101.1 Now we can see the R2 will become Master and R1 will go into Backup, because R2s IP address is higher and by default preemption is enabled in VRRP. Comp# tracert –d 192.168.102.1 Here we can see all the data is going via R2. Because R2 is Master R2 (config) #int fa0/0 R2 (config-if) #shut Now R1 will become Master Comp# tracert –d 192.168.102.1 All the traffic going via R1 R2 (config) #int fa0/0 R2 (config-if) #no shut Once R2s Fa0/0 comes up, it will become once again Master R1#sh vrrp Default Hello timer 1 sec Hold – 3 sec Preempt – enabled by default Default Priority 100 Virtual Mac 0000.5e00.0101 Now if the WAN link goes down R2 (config) #int s0/0 R2 (config-if) #shut Comp# tracert –d 192.168.102.1 First data will reach R2 and then R1 R1 will not become master here in case of serial link failure. For that we need to enable Track command.
  • 14. VRRP (Virtual Router Redundancy Protocol) R2 (config) #int s0/0 R2 (config-if) #no shut R2 (config-if) #int fa0/0 R2 (config-if) #vrrp 1 track? R2 (config-if) #exit R2 (config) #track ? 1 to 500 R2 (config) #track 1 ? R2 (config) #track 1 int s0/0 ? R2 (config) #track 1 int s0/0 line protocol R2 (config) #int fa0/0 R2 (config-if) #vrrp 1 track 1 R2#sh vrrp Track obj 1 state up decrement 10 Comp# tracert –d 192.168.102.1 Data is going via R2 R2 (config) #int s0/0 R2 (config-if) #shut R2#sh vrrp Priority 90 All data will go via R1 Load Balancing For load balancing we will create one more group Till now for Group 1, Master is R2 R1 (config) #int fa0/0 R1 (config-if) #vrrp 2 ip 192.168.101.4 R1 (config-if) #vrrp 2 priority 101 R1 (config) # track 1 int s0/0 line protocol R1 (config) #int fa0/0 R1 (config-if) #vrrp 2 track 1 R2 (config) #int fa0/0 R2 (config-if) #vrrp 2 ip 192.168.101.4 R2#sh vrrp
  • 15. VRRP (Virtual Router Redundancy Protocol) Group 1 Master, Group 2 Backup R1#sh vrrp Group 1 Backup, Group 2 Master R1 (config) #int s0/0 R1 (config-if) #shut R2 #sh vrrp R1 (config) #int s0/0 R1 (config-if) #no shut R1#sh vrrp For load balancing if we provide clients default gateway is 192.168.101.1 then the data will go via R2, if we provide clients gateway 192.168.101.4 then data will go via R1.
  翻译: