SlideShare a Scribd company logo
HSRP (Hot Standby Router Protocol)
Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol for establishing a fault-
tolerant default gateway, and has been described in detail in RFC 2281.
The protocol establishes a framework between network routers in order to achieve default gateway
failover if the primary gateway becomes inaccessible, in close association with a rapid-converging
routing protocol like EIGRP or OSPF. By multicasting packets, HSRP sends its hello messages to the
multicast address 224.0.0.2 (all routers) for version 1, or 224.0.0.102 for version 2, using UDP port 1985,
to other HSRP-enabled routers, defining priority between the routers. The primary router with the
highest configured priority will act as a virtual router with a pre-defined gateway IP address and will
respond to the ARP request from machines connected to the LAN with the MAC address
0000.0C07.ACXX (or 0000.0C9F.FXXX for HSRPv2) where X will be hex representation of the (decimal)
group ID. If the primary router should fail, the router with the next-highest priority would take over the
gateway IP address and answer ARP requests with the same MAC address, thus achieving transparent
default gateway failover.
HSRP is not a routing protocol as it does not advertise IP routes or affect the routing table in any way.
Figure 1 HSRP Terminology
HSRP (Hot Standby Router Protocol)
HSRP for IPv4
HSRP routers communicate with each other by exchanging HSRP hello packets. These packets are sent
to the destination IP multicast address 224.0.0.2 (reserved multicast address used to communicate to all
routers) on UDP port 1985. The active router sources hello packets from its configured IP address and
the HSRP virtual MAC address while the standby router sources hellos from its configured IP address and
the interface MAC address, which might be the burned-in address (BIA). The BIA is the last six bytes of
the MAC address that is assigned by the manufacturer of the network interface card (NIC).
Because hosts are configured with their default router as the HSRP virtual IP address, hosts must
communicate with the MAC address associated with the HSRP virtual IP address. This MAC address is a
virtual MAC address, 0000.0C07.ACxy, where xy is the HSRP group number in hexadecimal based on the
respective interface. For example, HSRP group 1 uses the HSRP virtual MAC address of 0000.0C07.AC01.
Hosts on the adjoining LAN segment use the normal Address Resolution Protocol (ARP) process to
resolve the associated MAC addresses.
HSRP version 2 uses the new IP multicast address 224.0.0.102 to send hello packets instead of the
multicast address of 224.0.0.2, which is used by version 1. HSRP version 2 permits an expanded group
number range of 0 to 4095 and uses a new MAC address range of 0000.0C9F.F000 to 0000.0C9F.FFFF.
HSRP for IPv6
IPv6 hosts learn of available IPv6 routers through IPv6 neighbor discovery (ND) router advertisement
(RA) messages. These messages are multicast periodically, or might be solicited by hosts, but the time
delay for detecting when a default route is down might be 30 seconds or more. HSRP for IPv6 provides a
much faster switchover to an alternate default router than the IPv6 ND protocol provides, less than a
second if the milliseconds timers are used. HSRP for IPv6 provides a virtual first hop for IPv6 hosts.
When you configure an IPv6 interface for HSRP, the periodic RAs for the interface link-local address stop
after IPv6 ND sends a final RA with a router lifetime of zero. No restrictions occur for the interface IPv6
link-local address. Other protocols continue to receive and send packets to this address.
IPv6 ND sends periodic RAs for the HSRP virtual IPv6 link-local address when the HSRP group is active.
These RAs stop after a final RA is sent with a router lifetime of 0 when the HSRP group leaves the active
state. HSRP uses the virtual MAC address for active HSRP group messages only (hello, coup, and
redesign).
HSRP for IPv6 uses the following parameters:
 HSRP version 2
 UDP port 2029
 Virtual MAC address range from 0005.73A0.0000 through 0005.73A0.0FFF
HSRP (Hot Standby Router Protocol)
 Multicast link-local IP destination address of FF02::66
 Hop limit set to 255
This protocol is used for Gateway redundancy or high availability
1. Cisco Proprietary (1994)
2. Hello interval 3 sec
3. Hold interval 10 sec
4. It use UDP port number 1985
5. It sends multicast hellos via 224.0.0.2
6. Default Priority is 100
7. Default Preempt Disable
8. Default decrement in priority using track 10
9. It supports two types of authentication (MD-5 & Txt).
10. HSRP virtual Mac 0000.0c07.acxx (XX is group ID)
11. It has two versions (v1 & v2)
12. It has built in track command
(Note: Maximum Group we can create in HSRP is 0 to 255)
HSRP Authentication
HSRP message digest 5 (MD5) algorithm authentications protects against HSRP-spoofing software and
uses the industry-standard MD5 algorithm for improved reliability and security. HSRP includes the IPv4
or IPv6 address in the authentication TLVs.
HSRP Messages
Routers that are configured with HSRP exchange the following three types of multicast messages:
 Hello- The hello message conveys the HSRP priority and state information of the router to other
HSRP routers.
 Coup- When a standby router wants to assume the function of the active router, it sends a coup
message.
 Resign- A router that is the active router sends this message when it is about to shut down or
when a router that has a higher priority sends a hello or coup message.
HSRP Load Sharing
HSRP allows you to configure multiple groups on an interface. You can configure two overlapping IPv4
HSRP groups to load share traffic from the connected hosts while providing the default router
HSRP (Hot Standby Router Protocol)
redundancy expected from HSRP. Figure 19-2 shows an example of a load-sharing HSRP IPv4
configuration.
(Note: HSRP for IPv6 load-balances by default. If there are two HSRP IPv6 groups on the subnet, then
hosts learn of both groups from their router advertisements and choose to use one so that the load is
shared between the advertised routers.)
Figure 2 Two routers A and B and two HSRP groups. Router A is the active router for group A but is the
standby router for group B. Similarly, router B is the active router for group B and the standby router
for group A. If both routers remain active, HSRP load balances the traffic from the hosts across both
routers. If either router fails, the remaining router continues to process traffic for both hosts.
HSRP (Hot Standby Router Protocol)
Object Tracking and HSRP
You can use object tracking to modify the priority of an HSRP interface based on the operational state of
another interface. Object tracking allows you to route to a standby router if the interface to the main
network fails.
Two objects that you can track are the line protocol state of an interface or the reachability of an IP
route. If the specified object goes down, Cisco NX-OS reduces the HSRP priority by the configured
amount.
Configuring HSRP Object Tracking
You can configure an HSRP group to adjust its priority based on the availability of other interfaces or
routes. The priority of a device can change dynamically if it has been configured for object tracking and
the object that is being tracked goes down.
The tracking process periodically polls the tracked objects and notes any value change. The value change
triggers HSRP to recalculate the priority. The HSRP interface with the higher priority becomes the active
router if you configure the HSRP interface for preemption.
SUMMARY STEPS
1. configure terminal
2. track object-id interface interface-type number {{ip | ipv6} routing | line-protocol}
3. track object-id {ip | ipv6} route ip-prefix/length reachability
4. interface interface-type slot/port
5. hsrp group-number [ipv4 | ipv6]
6. priority [value]
7. track object-number [decrement value]
8. preempt [delay [minimum seconds] [reload seconds] [sync seconds]]
9. (Optional) show hsrp interface interface-type number
10. (Optional) copy running-config startup-config
This example shows how to configure HSRP object tracking on Ethernet 1/2:
switch# configure terminal
switch(config)# track 1 interface ethernet 2/2 line-protocol
switch(config)# interface ethernet 1/2
switch(config-if)# hsrp 2
switch(config-if-hsrp)# track 1 decrement 20
switch(config-if-hsrp)# copy running-config startup-config
HSRP (Hot Standby Router Protocol)
HSRP Roles
1. Active
2. Stand by
HSRP States
(i) Disabled
(ii) Init
(iii) Listening
(iv) Speaking
(v) Stand by
 Active- A router which gives the reply of ARP request of clients for gateway.
Active Requirements–
(i) Higher Priority
(ii) Higher IP
 Stand by- Backup to active. The router which has the higher priority would be active.
Preempt by default is disabled; we need to enable it, once it will enable it force higher priority
router to become active.
Figure 3 HSRP Role Selection
HSRP (Hot Standby Router Protocol)
Prerequisites for HSRP
(i) You must enable the HSRP feature in a device before you can configure and enable any HSRP
groups.
(ii) If you configure VDCs, install the Advanced Services license and enter the desired VDC (see
the Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide, Release 5.x).
Guidelines and Limitations for HSRP
HSRP has the following configuration guidelines and limitations:
 You must configure an IP address for the interface that you configure HSRP on and enable that
interface before HSRP becomes active.
 You must configure HSRP version 2 when you configure an IPv6 interface for HSRP.
 For IPv4, the virtual IP address must be in the same subnet as the interface IP address.
 We recommend that you do not configure more than one first-hop redundancy protocol on the
same interface.
 HSRP version 2 does not interoperate with HSRP version 1. An interface cannot operate both
version 1 and version 2 because both versions are mutually exclusive. However, the different
versions can be run on different physical interfaces of the same router.
 You cannot change from version 2 to version 1 if you have configured groups above the group
number range allowed for version 1 (0 to 255).
 HSRP for IPv4 is supported with BFD. HSRP for IPv6 is not supported with BFD.
 Cisco NX-OS removes all Layer 3 configurations on an interface when you change the interface
VRF membership, port channel membership, or when you change the port mode to Layer 2.
 If you configure virtual MAC addresses with vPC, you must configure the same virtual MAC
address on both vPC peers.
 For mixed-chassis configurations where the vPC peer link is configured on an F-series module,
configure the vPC peer gateway exclude option to exclude the Layer 3 backup route that
traverses the vPC peer link.
 You cannot use the HSRP MAC address burned-in option on a VLAN interface that is a vPC
member.
 If you have not configured authentication, the show hsrp command displays the following string:
Authentication text "cisco"
This is the default behavior of HSRP as defined in RFC 2281:
If no authentication data is configured, the RECOMMENDED default value is 0x63 0x69 0x73
0x63 0x6F 0x00 0x00 0x00.
HSRP (Hot Standby Router Protocol)
Default Settings
Parameters Default
HSRP Disabled
Authentication Enabled as text for version 1, with cisco as the password
HSRP version Version 1
Preemption Disabled
Priority 100
Virtual MAC address Derived from HSRP group number
Enabling HSRP
You must globally enable HSRP before you can configure and enable any HSRP groups.
To enable the HSRP feature in a VDC, use the following command in global configuration mode:
Command Purpose
feature hsrp
Example:
switch(config)# feature hsrp
Enables HSRP.
To disable the HSRP feature in a VDC and remove all associated configurations, use the following
command in global configuration mode:
Command Purpose
no feature hsrp
Example:
switch(config)# no feature hsrp
Disables HSRP for all groups in a VDC.
Configuring the HSRP Version
You can configure the HSRP version. If you change the version for existing groups, Cisco NX-OS
reinitializes HSRP for those groups because the virtual MAC address changes. The HSRP version applies
to all groups on the interface.
HSRP (Hot Standby Router Protocol)
(Note: IPv6 HSRP groups must be configured as HSRP version 2.)
To configure the HSRP version, use the following command in interface configuration mode:
Command Purpose
hsrp version {1 | 2}
Example:
switch(config-if)# hsrp version 2
Configures the HSRP version. Version 1 is the default.
Configuring an HSRP Group for IPv4
You can configure an HSRP group on an IPv4 interface and configure the virtual IP address and virtual
MAC address for the HSRP group.
SUMMARY STEPS
1. configure terminal
2. interface type number
3. ip ip-address/length
4. hsrp group-number [ipv4]
5. ip [ip-address [secondary]]
6. exit
7. no shutdown
8. (Optional) show hsrp [group group-number] [ipv4]
9. (Optional) copy running-config startup-config
The following example shows how to configure an HSRP group on Ethernet 1/2:
switch# configure terminal
switch(config)# interface ethernet 1/2
switch(config-if)# ip 192.0.2.2/8
switch(config-if)# hsrp 2
switch(config-if-hsrp)# ip 192.0.2.1
switch(config-if-hsrp)# exit
switch(config-if)# no shutdown
switch(config-if)# copy running-config startup-config
Configuring an HSRP Group for IPv6
You can configure an HSRP group on an IPv6 interface and configure the virtual MAC address for the
HSRP group.
HSRP (Hot Standby Router Protocol)
When you configure an HSRP group for IPv6, HSRP generates a link-local address from the link-local
prefix. HSRP also generates a modified EUI-64 format interface identifier in which the EUI-64 interface
identifier is created from the relevant HSRP virtual MAC address.
There are no HSRP IPv6 secondary addresses.
SUMMARY STEPS
1. configure terminal
2. interface type number
3. ipv6 address ipv6-address/length
4. hsrp version 2
5. hsrp group-number ipv6
6. ip [ipv6-address [secondary]]
7. ip autoconfig
8. no shutdown
9. (Optional) show hsrp [group group-number] [ipv6]
10. (Optional) copy running-config startup-config
This example shows how to configure an IPv6 HSRP group on Ethernet 3/2:
switch# configure terminal
switch(config)# interface ethernet 3/2
switch(config-if)# ipv6 address 2001:0DB8:0001:0001:/64
switch(config-if)# hsrp 2 ipv6
switch(config-if-hsrp)# exit
switch(config-if)# no shutdown
switch(config-if)# copy running-config startup-config
Example of HSRP
R1 (config) #int fa0/0
R1 (config-if) #ip add 192.168.101.2 255.255.255.0
R1 (config-if) #no shut
R1 (config-if) #int s0/0
R1 (config-if) #ip add 192.168.1.1 255.255.255.0
R1 (config-if) #no shut
R1 (config) #router ei 100
R1 (config-router) #no auto
R1 (config-router) #network 0.0.0.0
HSRP (Hot Standby Router Protocol)
Ho (config) #int fa0/0
Ho (config-if) #ip add 192.168.102.1 255.255.255.0
Ho (config-if) #no shut
Ho (config-if) #int s0/0
Ho (config-if) #ip add 192.168.1.2 255.255.255.0
Ho (config-if) #no shut
Ho (config-if) #int s0/1
Ho (config-if) #ip add 192.168.2.1 255.255.255.0
Ho (config-if) #no shut
Ho (config-if) #router ei 100
Ho (config-router) #no auto
Ho (config-router) #network 0.0.0.0
R2 (config) #int fa0/0
R2 (config-if) #ip add 192.168.101.3 255.255.255.0
R2 (config-if) #no shut
HSRP (Hot Standby Router Protocol)
R2 (config-if) #int s0/0
R2 (config-if) #ip add 192.168.2.2 255.255.255.0
R2 (config-if) #no shut
R2 (config-if) #router ei 100
R2 (config-router) #no auto
R2 (config-router) #network 0.0.0.0
Ho #sh ip route
R1#sh ip int br
R2#sh ip int br
Now we will provide the IP add to the PC, which is 192.168.101.10. And computer Gateway would
192.168.101.1.
Right now 192.168.101.1 (computers default gateway) doesn’t exist anywhere.
Computer #ping 192.168.102.1
Unsuccessful
Now we will provide this virtual ip
R1 (config) #int fa0/0
R1 (config-if) #standby 1 ip 192.168.101.1
R2 (config) #int fa0/0
R2 (config-if) #standby 1 ip 192.168.101.1
(Here 1 means Group 1)
R1#sh standby
State is active, Group 1, Hello 3 sec, Hold 10 sec
Virtual Mac – 0.0.0.0:0c07:ac01
Preempt disabled, Default Priority 100
R2#sh standby
Computer #tracert 192.168.102.1
Now here we will shut down the interface f0/0 of R1
R1 (config) #int fa0/0
R1 (config-if) #shut
HSRP (Hot Standby Router Protocol)
R2 will immediately become active
Computer # ping 192.168.102.1
Now we will up the R1s f0/0
R1 (config) #int fa0/0
R1 (config-if) #no shut
R1#sh standby
Now we can see R1 is in standby mode. Now we will shut the fa0/0 of R2
R2 (config) #int fa0/0
R2 (config-if) #shut
R1#sh standby
Here we can see state is active
R2 (config) #int fa0/0
R2 (config-if) #no shut
Now here we can see R1 is active, but we want to make R2 as active. For that we will change the
Priority
R2 (config) #int fa0/0
R2 (config-if) #standby 1 priority 101
R2 (config-if) #standby 1 preempt
Here we increased the priority which was by default 100, and then enabled preempt which will force the
high priority router to become active.
R2#sh standby
Active
Now if we want to make the R1 active then we increased the R1s priority and enable the Preempt.
R1 (config) #int fa0/0
R1 (config-if) #standby 1 priority 102
R1 (config-if) #standby 1 preempt
R1#sh standby
Active
HSRP (Hot Standby Router Protocol)
Now here what we can see if the R1s f0/0 would down then R2s f0/0 would become active but if the R1s
S0/0 would down then what will happen? Data will move first on R1 and then it will reach on switch,
after that it will go on R2.
R1 (config) #int s0/0
R1 (config-if) #shut
Computer# tracert 192.168.102.1
Now here we want, if the R1s s0/0 is down then data should immediately forward via R2.
R1 (config) #int s0/0
R1 (config-if) #no shut
R1 (config-if) #int fa0/0
R1 (config-if) #standby 1 track s0/0
All the command will run on LAN Link.
Here if the serial link will down then track will decrement 10 in priority.
R1 (config) #int s0/0
R1 (config-if) #shut
R1#sh standby
Priority 92 (10 decreased)
Computer# tracert 192.168.102.1
Now data will go directly via R2
R1 (config) #int s0/0
R1 (config-if) #no shut
R1#sh standby
Priority 102
R1#sh run config int fa0/0
Now here if we want load balancing
R2 (config) #int fa0/0
R2 (config-if) #standby 2 ip 192.168.101.4
R2 (config-if) #standby 2 priority 101
R2 (config-if) #standby 2 preempt
R2 (config-if) #standby 2 track s0/0
R2#sh run int fa0/0
R1 (config) #int fa0/0
HSRP (Hot Standby Router Protocol)
R1 (config-if) #standby 2 ip 192.168.101.4
R1 (config-if) #standby 2 preempt
R1#sh run int fa0/0
R1 (config) #int s0/0
R1 (config-if) #shut
R2#sh standby
R1 (config) #int s0/0
R1 (config-if) #no shut
R1#sh standby
R2 (config) #int s0/0
R2 (config-if) #shut
R1#sh standby
R2 (config) #int s0/0
R2 (config-if) #no shut
Computer# tracert 192.168.102.1

More Related Content

What's hot

CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
Nishant Goel
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
Chaing Ravuth
 
BGP tuning: Peer with loopback
BGP tuning: Peer with loopbackBGP tuning: Peer with loopback
BGP tuning: Peer with loopback
GLC Networks
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
Swapnil Kapate
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
NetProtocol Xpert
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control ProtocolKashif Latif
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
Reetesh Gupta
 
GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)
NetProtocol Xpert
 
Mobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLSMobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLS
Cisco Canada
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
APNIC
 
GRE (generic routing encapsulation)
GRE (generic routing encapsulation)GRE (generic routing encapsulation)
GRE (generic routing encapsulation)
Netwax Lab
 
Juniper mpls best practice part 2
Juniper mpls best practice   part 2Juniper mpls best practice   part 2
Juniper mpls best practice part 2
Febrian ‎
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
sarasanandam
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 
Nokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration GuideNokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration Guide
Abel Saduwa
 

What's hot (20)

CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
Asa packet-flow-00
Asa packet-flow-00Asa packet-flow-00
Asa packet-flow-00
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
VTP
VTPVTP
VTP
 
BGP tuning: Peer with loopback
BGP tuning: Peer with loopbackBGP tuning: Peer with loopback
BGP tuning: Peer with loopback
 
Ccnp workbook network bulls
Ccnp workbook network bullsCcnp workbook network bulls
Ccnp workbook network bulls
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control Protocol
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Cisco MPLS
Cisco MPLSCisco MPLS
Cisco MPLS
 
GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)
 
Mobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLSMobile Transport Evolution with Unified MPLS
Mobile Transport Evolution with Unified MPLS
 
Layer 3 redundancy hsrp
Layer 3 redundancy   hsrpLayer 3 redundancy   hsrp
Layer 3 redundancy hsrp
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
GRE (generic routing encapsulation)
GRE (generic routing encapsulation)GRE (generic routing encapsulation)
GRE (generic routing encapsulation)
 
Juniper mpls best practice part 2
Juniper mpls best practice   part 2Juniper mpls best practice   part 2
Juniper mpls best practice part 2
 
Cisco ospf
Cisco ospf Cisco ospf
Cisco ospf
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Nokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration GuideNokia L3 VPN Configuration Guide
Nokia L3 VPN Configuration Guide
 

Viewers also liked

Cisco hsrp configuration
Cisco hsrp configurationCisco hsrp configuration
Cisco hsrp configuration
Wahyu Nasution
 
First Hop Redundancy Protocols in IPv6 HSRP + GLBP
First Hop Redundancy Protocols in IPv6 HSRP + GLBPFirst Hop Redundancy Protocols in IPv6 HSRP + GLBP
First Hop Redundancy Protocols in IPv6 HSRP + GLBP
IT Tech
 
Fhrp notes
Fhrp notesFhrp notes
Fhrp notes
Krunal Shah
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
Ahmed Habib
 
Cisco CCNA IP SLA with tracking configuration
Cisco CCNA IP SLA  with tracking  configurationCisco CCNA IP SLA  with tracking  configuration
Cisco CCNA IP SLA with tracking configuration
Hamed Moghaddam
 
Cisco CCNA GRE Tunnel Configuration
Cisco CCNA GRE Tunnel ConfigurationCisco CCNA GRE Tunnel Configuration
Cisco CCNA GRE Tunnel Configuration
Hamed Moghaddam
 
Eigrp
EigrpEigrp
Eigrpfirey
 
IP Address
IP AddressIP Address
IP Address
Netwax Lab
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
Netwax Lab
 
TCP Intercept
TCP InterceptTCP Intercept
TCP Intercept
Netwax Lab
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of Networking
Netwax Lab
 
Nxll24 i pv6
Nxll24 i pv6Nxll24 i pv6
Nxll24 i pv6
Netwax Lab
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab
 
OSPF (open shortest path first) part iii
OSPF (open shortest path first) part  iiiOSPF (open shortest path first) part  iii
OSPF (open shortest path first) part iii
Netwax Lab
 
119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut
nicolelemmimg
 
OSPF (open shortest path first) part ii
OSPF (open shortest path first) part  iiOSPF (open shortest path first) part  ii
OSPF (open shortest path first) part ii
Netwax Lab
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
Netwax Lab
 
OSPF Route Filtering
OSPF Route FilteringOSPF Route Filtering
OSPF Route Filtering
Netwax Lab
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
Netwax Lab
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
Netwax Lab
 

Viewers also liked (20)

Cisco hsrp configuration
Cisco hsrp configurationCisco hsrp configuration
Cisco hsrp configuration
 
First Hop Redundancy Protocols in IPv6 HSRP + GLBP
First Hop Redundancy Protocols in IPv6 HSRP + GLBPFirst Hop Redundancy Protocols in IPv6 HSRP + GLBP
First Hop Redundancy Protocols in IPv6 HSRP + GLBP
 
Fhrp notes
Fhrp notesFhrp notes
Fhrp notes
 
CCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systemsCCNA Security 012- cryptographic systems
CCNA Security 012- cryptographic systems
 
Cisco CCNA IP SLA with tracking configuration
Cisco CCNA IP SLA  with tracking  configurationCisco CCNA IP SLA  with tracking  configuration
Cisco CCNA IP SLA with tracking configuration
 
Cisco CCNA GRE Tunnel Configuration
Cisco CCNA GRE Tunnel ConfigurationCisco CCNA GRE Tunnel Configuration
Cisco CCNA GRE Tunnel Configuration
 
Eigrp
EigrpEigrp
Eigrp
 
IP Address
IP AddressIP Address
IP Address
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
TCP Intercept
TCP InterceptTCP Intercept
TCP Intercept
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of Networking
 
Nxll24 i pv6
Nxll24 i pv6Nxll24 i pv6
Nxll24 i pv6
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
OSPF (open shortest path first) part iii
OSPF (open shortest path first) part  iiiOSPF (open shortest path first) part  iii
OSPF (open shortest path first) part iii
 
119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut
 
OSPF (open shortest path first) part ii
OSPF (open shortest path first) part  iiOSPF (open shortest path first) part  ii
OSPF (open shortest path first) part ii
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
OSPF Route Filtering
OSPF Route FilteringOSPF Route Filtering
OSPF Route Filtering
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
 

Similar to HSRP (hot standby router protocol)

SRWE_Module_9 for huwawei hcia datacom course
SRWE_Module_9 for huwawei hcia datacom courseSRWE_Module_9 for huwawei hcia datacom course
SRWE_Module_9 for huwawei hcia datacom course
muhammednurhusien1
 
CCNP Switching Chapter 6
CCNP Switching Chapter 6CCNP Switching Chapter 6
CCNP Switching Chapter 6
Chaing Ravuth
 
Class notes fhrp,hsrp
Class notes  fhrp,hsrpClass notes  fhrp,hsrp
Class notes fhrp,hsrp
SagarR24
 
Class notes fhrp,hsrp,vrrp
Class notes fhrp,hsrp,vrrpClass notes fhrp,hsrp,vrrp
Class notes fhrp,hsrp,vrrp
SagarR24
 
Ip services
Ip servicesIp services
Ip services
Student
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccnarobertoxe
 
Vrrp Alp
Vrrp AlpVrrp Alp
Vrrp Alp
Alp isik
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheet
Swarup Hait
 
ipv6_cheat_sheet.pdf
ipv6_cheat_sheet.pdfipv6_cheat_sheet.pdf
ipv6_cheat_sheet.pdf
pradeeppotter
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocolasimnawaz54
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPFarpit
 
Address resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocolAddress resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocolasimnawaz54
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
OSPFv2 on IOS XR
OSPFv2 on IOS XROSPFv2 on IOS XR
OSPFv2 on IOS XR
CoderGenie Technologies
 
Evolving Enterprise Network Architecture
Evolving Enterprise Network ArchitectureEvolving Enterprise Network Architecture
Evolving Enterprise Network Architecture
Aruba, a Hewlett Packard Enterprise company
 
NAT 64 FPGA Implementation
NAT 64 FPGA ImplementationNAT 64 FPGA Implementation
NAT 64 FPGA ImplementationJanith Rukman
 
Ospf
OspfOspf

Similar to HSRP (hot standby router protocol) (20)

SRWE_Module_9 for huwawei hcia datacom course
SRWE_Module_9 for huwawei hcia datacom courseSRWE_Module_9 for huwawei hcia datacom course
SRWE_Module_9 for huwawei hcia datacom course
 
CCNP Switching Chapter 6
CCNP Switching Chapter 6CCNP Switching Chapter 6
CCNP Switching Chapter 6
 
Class notes fhrp,hsrp
Class notes  fhrp,hsrpClass notes  fhrp,hsrp
Class notes fhrp,hsrp
 
Class notes fhrp,hsrp,vrrp
Class notes fhrp,hsrp,vrrpClass notes fhrp,hsrp,vrrp
Class notes fhrp,hsrp,vrrp
 
Ip services
Ip servicesIp services
Ip services
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 
Vrrp Alp
Vrrp AlpVrrp Alp
Vrrp Alp
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheet
 
ipv6_cheat_sheet.pdf
ipv6_cheat_sheet.pdfipv6_cheat_sheet.pdf
ipv6_cheat_sheet.pdf
 
Ipv6 cheat sheet
Ipv6 cheat sheetIpv6 cheat sheet
Ipv6 cheat sheet
 
Address resolution protocol
Address resolution protocolAddress resolution protocol
Address resolution protocol
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
Address resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocolAddress resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocol
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
OSPFv2 on IOS XR
OSPFv2 on IOS XROSPFv2 on IOS XR
OSPFv2 on IOS XR
 
Evolving Enterprise Network Architecture
Evolving Enterprise Network ArchitectureEvolving Enterprise Network Architecture
Evolving Enterprise Network Architecture
 
NAT 64 FPGA Implementation
NAT 64 FPGA ImplementationNAT 64 FPGA Implementation
NAT 64 FPGA Implementation
 
Ospf
OspfOspf
Ospf
 

More from Netwax Lab

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
Netwax Lab
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Netwax Lab
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
Netwax Lab
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
Netwax Lab
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
Netwax Lab
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
Netwax Lab
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
Netwax Lab
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
Netwax Lab
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
Netwax Lab
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
Netwax Lab
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
Netwax Lab
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
Netwax Lab
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
Netwax Lab
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
Netwax Lab
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
Netwax Lab
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
Netwax Lab
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
Netwax Lab
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
Netwax Lab
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
Netwax Lab
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iii
Netwax Lab
 

More from Netwax Lab (20)

Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
 
Eincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route RedistributionEincop Netwax Lab: Route Redistribution
Eincop Netwax Lab: Route Redistribution
 
Nxll12 zone based firewall
Nxll12 zone based firewallNxll12 zone based firewall
Nxll12 zone based firewall
 
Nxll11 bgp
Nxll11 bgpNxll11 bgp
Nxll11 bgp
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
 
Nxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarizationNxll21 ospf filtering & summarization
Nxll21 ospf filtering & summarization
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
 
Nxll16 basic asa v8.2
Nxll16 basic asa v8.2Nxll16 basic asa v8.2
Nxll16 basic asa v8.2
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iii
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

HSRP (hot standby router protocol)

  • 1. HSRP (Hot Standby Router Protocol) Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol for establishing a fault- tolerant default gateway, and has been described in detail in RFC 2281. The protocol establishes a framework between network routers in order to achieve default gateway failover if the primary gateway becomes inaccessible, in close association with a rapid-converging routing protocol like EIGRP or OSPF. By multicasting packets, HSRP sends its hello messages to the multicast address 224.0.0.2 (all routers) for version 1, or 224.0.0.102 for version 2, using UDP port 1985, to other HSRP-enabled routers, defining priority between the routers. The primary router with the highest configured priority will act as a virtual router with a pre-defined gateway IP address and will respond to the ARP request from machines connected to the LAN with the MAC address 0000.0C07.ACXX (or 0000.0C9F.FXXX for HSRPv2) where X will be hex representation of the (decimal) group ID. If the primary router should fail, the router with the next-highest priority would take over the gateway IP address and answer ARP requests with the same MAC address, thus achieving transparent default gateway failover. HSRP is not a routing protocol as it does not advertise IP routes or affect the routing table in any way. Figure 1 HSRP Terminology
  • 2. HSRP (Hot Standby Router Protocol) HSRP for IPv4 HSRP routers communicate with each other by exchanging HSRP hello packets. These packets are sent to the destination IP multicast address 224.0.0.2 (reserved multicast address used to communicate to all routers) on UDP port 1985. The active router sources hello packets from its configured IP address and the HSRP virtual MAC address while the standby router sources hellos from its configured IP address and the interface MAC address, which might be the burned-in address (BIA). The BIA is the last six bytes of the MAC address that is assigned by the manufacturer of the network interface card (NIC). Because hosts are configured with their default router as the HSRP virtual IP address, hosts must communicate with the MAC address associated with the HSRP virtual IP address. This MAC address is a virtual MAC address, 0000.0C07.ACxy, where xy is the HSRP group number in hexadecimal based on the respective interface. For example, HSRP group 1 uses the HSRP virtual MAC address of 0000.0C07.AC01. Hosts on the adjoining LAN segment use the normal Address Resolution Protocol (ARP) process to resolve the associated MAC addresses. HSRP version 2 uses the new IP multicast address 224.0.0.102 to send hello packets instead of the multicast address of 224.0.0.2, which is used by version 1. HSRP version 2 permits an expanded group number range of 0 to 4095 and uses a new MAC address range of 0000.0C9F.F000 to 0000.0C9F.FFFF. HSRP for IPv6 IPv6 hosts learn of available IPv6 routers through IPv6 neighbor discovery (ND) router advertisement (RA) messages. These messages are multicast periodically, or might be solicited by hosts, but the time delay for detecting when a default route is down might be 30 seconds or more. HSRP for IPv6 provides a much faster switchover to an alternate default router than the IPv6 ND protocol provides, less than a second if the milliseconds timers are used. HSRP for IPv6 provides a virtual first hop for IPv6 hosts. When you configure an IPv6 interface for HSRP, the periodic RAs for the interface link-local address stop after IPv6 ND sends a final RA with a router lifetime of zero. No restrictions occur for the interface IPv6 link-local address. Other protocols continue to receive and send packets to this address. IPv6 ND sends periodic RAs for the HSRP virtual IPv6 link-local address when the HSRP group is active. These RAs stop after a final RA is sent with a router lifetime of 0 when the HSRP group leaves the active state. HSRP uses the virtual MAC address for active HSRP group messages only (hello, coup, and redesign). HSRP for IPv6 uses the following parameters:  HSRP version 2  UDP port 2029  Virtual MAC address range from 0005.73A0.0000 through 0005.73A0.0FFF
  • 3. HSRP (Hot Standby Router Protocol)  Multicast link-local IP destination address of FF02::66  Hop limit set to 255 This protocol is used for Gateway redundancy or high availability 1. Cisco Proprietary (1994) 2. Hello interval 3 sec 3. Hold interval 10 sec 4. It use UDP port number 1985 5. It sends multicast hellos via 224.0.0.2 6. Default Priority is 100 7. Default Preempt Disable 8. Default decrement in priority using track 10 9. It supports two types of authentication (MD-5 & Txt). 10. HSRP virtual Mac 0000.0c07.acxx (XX is group ID) 11. It has two versions (v1 & v2) 12. It has built in track command (Note: Maximum Group we can create in HSRP is 0 to 255) HSRP Authentication HSRP message digest 5 (MD5) algorithm authentications protects against HSRP-spoofing software and uses the industry-standard MD5 algorithm for improved reliability and security. HSRP includes the IPv4 or IPv6 address in the authentication TLVs. HSRP Messages Routers that are configured with HSRP exchange the following three types of multicast messages:  Hello- The hello message conveys the HSRP priority and state information of the router to other HSRP routers.  Coup- When a standby router wants to assume the function of the active router, it sends a coup message.  Resign- A router that is the active router sends this message when it is about to shut down or when a router that has a higher priority sends a hello or coup message. HSRP Load Sharing HSRP allows you to configure multiple groups on an interface. You can configure two overlapping IPv4 HSRP groups to load share traffic from the connected hosts while providing the default router
  • 4. HSRP (Hot Standby Router Protocol) redundancy expected from HSRP. Figure 19-2 shows an example of a load-sharing HSRP IPv4 configuration. (Note: HSRP for IPv6 load-balances by default. If there are two HSRP IPv6 groups on the subnet, then hosts learn of both groups from their router advertisements and choose to use one so that the load is shared between the advertised routers.) Figure 2 Two routers A and B and two HSRP groups. Router A is the active router for group A but is the standby router for group B. Similarly, router B is the active router for group B and the standby router for group A. If both routers remain active, HSRP load balances the traffic from the hosts across both routers. If either router fails, the remaining router continues to process traffic for both hosts.
  • 5. HSRP (Hot Standby Router Protocol) Object Tracking and HSRP You can use object tracking to modify the priority of an HSRP interface based on the operational state of another interface. Object tracking allows you to route to a standby router if the interface to the main network fails. Two objects that you can track are the line protocol state of an interface or the reachability of an IP route. If the specified object goes down, Cisco NX-OS reduces the HSRP priority by the configured amount. Configuring HSRP Object Tracking You can configure an HSRP group to adjust its priority based on the availability of other interfaces or routes. The priority of a device can change dynamically if it has been configured for object tracking and the object that is being tracked goes down. The tracking process periodically polls the tracked objects and notes any value change. The value change triggers HSRP to recalculate the priority. The HSRP interface with the higher priority becomes the active router if you configure the HSRP interface for preemption. SUMMARY STEPS 1. configure terminal 2. track object-id interface interface-type number {{ip | ipv6} routing | line-protocol} 3. track object-id {ip | ipv6} route ip-prefix/length reachability 4. interface interface-type slot/port 5. hsrp group-number [ipv4 | ipv6] 6. priority [value] 7. track object-number [decrement value] 8. preempt [delay [minimum seconds] [reload seconds] [sync seconds]] 9. (Optional) show hsrp interface interface-type number 10. (Optional) copy running-config startup-config This example shows how to configure HSRP object tracking on Ethernet 1/2: switch# configure terminal switch(config)# track 1 interface ethernet 2/2 line-protocol switch(config)# interface ethernet 1/2 switch(config-if)# hsrp 2 switch(config-if-hsrp)# track 1 decrement 20 switch(config-if-hsrp)# copy running-config startup-config
  • 6. HSRP (Hot Standby Router Protocol) HSRP Roles 1. Active 2. Stand by HSRP States (i) Disabled (ii) Init (iii) Listening (iv) Speaking (v) Stand by  Active- A router which gives the reply of ARP request of clients for gateway. Active Requirements– (i) Higher Priority (ii) Higher IP  Stand by- Backup to active. The router which has the higher priority would be active. Preempt by default is disabled; we need to enable it, once it will enable it force higher priority router to become active. Figure 3 HSRP Role Selection
  • 7. HSRP (Hot Standby Router Protocol) Prerequisites for HSRP (i) You must enable the HSRP feature in a device before you can configure and enable any HSRP groups. (ii) If you configure VDCs, install the Advanced Services license and enter the desired VDC (see the Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide, Release 5.x). Guidelines and Limitations for HSRP HSRP has the following configuration guidelines and limitations:  You must configure an IP address for the interface that you configure HSRP on and enable that interface before HSRP becomes active.  You must configure HSRP version 2 when you configure an IPv6 interface for HSRP.  For IPv4, the virtual IP address must be in the same subnet as the interface IP address.  We recommend that you do not configure more than one first-hop redundancy protocol on the same interface.  HSRP version 2 does not interoperate with HSRP version 1. An interface cannot operate both version 1 and version 2 because both versions are mutually exclusive. However, the different versions can be run on different physical interfaces of the same router.  You cannot change from version 2 to version 1 if you have configured groups above the group number range allowed for version 1 (0 to 255).  HSRP for IPv4 is supported with BFD. HSRP for IPv6 is not supported with BFD.  Cisco NX-OS removes all Layer 3 configurations on an interface when you change the interface VRF membership, port channel membership, or when you change the port mode to Layer 2.  If you configure virtual MAC addresses with vPC, you must configure the same virtual MAC address on both vPC peers.  For mixed-chassis configurations where the vPC peer link is configured on an F-series module, configure the vPC peer gateway exclude option to exclude the Layer 3 backup route that traverses the vPC peer link.  You cannot use the HSRP MAC address burned-in option on a VLAN interface that is a vPC member.  If you have not configured authentication, the show hsrp command displays the following string: Authentication text "cisco" This is the default behavior of HSRP as defined in RFC 2281: If no authentication data is configured, the RECOMMENDED default value is 0x63 0x69 0x73 0x63 0x6F 0x00 0x00 0x00.
  • 8. HSRP (Hot Standby Router Protocol) Default Settings Parameters Default HSRP Disabled Authentication Enabled as text for version 1, with cisco as the password HSRP version Version 1 Preemption Disabled Priority 100 Virtual MAC address Derived from HSRP group number Enabling HSRP You must globally enable HSRP before you can configure and enable any HSRP groups. To enable the HSRP feature in a VDC, use the following command in global configuration mode: Command Purpose feature hsrp Example: switch(config)# feature hsrp Enables HSRP. To disable the HSRP feature in a VDC and remove all associated configurations, use the following command in global configuration mode: Command Purpose no feature hsrp Example: switch(config)# no feature hsrp Disables HSRP for all groups in a VDC. Configuring the HSRP Version You can configure the HSRP version. If you change the version for existing groups, Cisco NX-OS reinitializes HSRP for those groups because the virtual MAC address changes. The HSRP version applies to all groups on the interface.
  • 9. HSRP (Hot Standby Router Protocol) (Note: IPv6 HSRP groups must be configured as HSRP version 2.) To configure the HSRP version, use the following command in interface configuration mode: Command Purpose hsrp version {1 | 2} Example: switch(config-if)# hsrp version 2 Configures the HSRP version. Version 1 is the default. Configuring an HSRP Group for IPv4 You can configure an HSRP group on an IPv4 interface and configure the virtual IP address and virtual MAC address for the HSRP group. SUMMARY STEPS 1. configure terminal 2. interface type number 3. ip ip-address/length 4. hsrp group-number [ipv4] 5. ip [ip-address [secondary]] 6. exit 7. no shutdown 8. (Optional) show hsrp [group group-number] [ipv4] 9. (Optional) copy running-config startup-config The following example shows how to configure an HSRP group on Ethernet 1/2: switch# configure terminal switch(config)# interface ethernet 1/2 switch(config-if)# ip 192.0.2.2/8 switch(config-if)# hsrp 2 switch(config-if-hsrp)# ip 192.0.2.1 switch(config-if-hsrp)# exit switch(config-if)# no shutdown switch(config-if)# copy running-config startup-config Configuring an HSRP Group for IPv6 You can configure an HSRP group on an IPv6 interface and configure the virtual MAC address for the HSRP group.
  • 10. HSRP (Hot Standby Router Protocol) When you configure an HSRP group for IPv6, HSRP generates a link-local address from the link-local prefix. HSRP also generates a modified EUI-64 format interface identifier in which the EUI-64 interface identifier is created from the relevant HSRP virtual MAC address. There are no HSRP IPv6 secondary addresses. SUMMARY STEPS 1. configure terminal 2. interface type number 3. ipv6 address ipv6-address/length 4. hsrp version 2 5. hsrp group-number ipv6 6. ip [ipv6-address [secondary]] 7. ip autoconfig 8. no shutdown 9. (Optional) show hsrp [group group-number] [ipv6] 10. (Optional) copy running-config startup-config This example shows how to configure an IPv6 HSRP group on Ethernet 3/2: switch# configure terminal switch(config)# interface ethernet 3/2 switch(config-if)# ipv6 address 2001:0DB8:0001:0001:/64 switch(config-if)# hsrp 2 ipv6 switch(config-if-hsrp)# exit switch(config-if)# no shutdown switch(config-if)# copy running-config startup-config Example of HSRP R1 (config) #int fa0/0 R1 (config-if) #ip add 192.168.101.2 255.255.255.0 R1 (config-if) #no shut R1 (config-if) #int s0/0 R1 (config-if) #ip add 192.168.1.1 255.255.255.0 R1 (config-if) #no shut R1 (config) #router ei 100 R1 (config-router) #no auto R1 (config-router) #network 0.0.0.0
  • 11. HSRP (Hot Standby Router Protocol) Ho (config) #int fa0/0 Ho (config-if) #ip add 192.168.102.1 255.255.255.0 Ho (config-if) #no shut Ho (config-if) #int s0/0 Ho (config-if) #ip add 192.168.1.2 255.255.255.0 Ho (config-if) #no shut Ho (config-if) #int s0/1 Ho (config-if) #ip add 192.168.2.1 255.255.255.0 Ho (config-if) #no shut Ho (config-if) #router ei 100 Ho (config-router) #no auto Ho (config-router) #network 0.0.0.0 R2 (config) #int fa0/0 R2 (config-if) #ip add 192.168.101.3 255.255.255.0 R2 (config-if) #no shut
  • 12. HSRP (Hot Standby Router Protocol) R2 (config-if) #int s0/0 R2 (config-if) #ip add 192.168.2.2 255.255.255.0 R2 (config-if) #no shut R2 (config-if) #router ei 100 R2 (config-router) #no auto R2 (config-router) #network 0.0.0.0 Ho #sh ip route R1#sh ip int br R2#sh ip int br Now we will provide the IP add to the PC, which is 192.168.101.10. And computer Gateway would 192.168.101.1. Right now 192.168.101.1 (computers default gateway) doesn’t exist anywhere. Computer #ping 192.168.102.1 Unsuccessful Now we will provide this virtual ip R1 (config) #int fa0/0 R1 (config-if) #standby 1 ip 192.168.101.1 R2 (config) #int fa0/0 R2 (config-if) #standby 1 ip 192.168.101.1 (Here 1 means Group 1) R1#sh standby State is active, Group 1, Hello 3 sec, Hold 10 sec Virtual Mac – 0.0.0.0:0c07:ac01 Preempt disabled, Default Priority 100 R2#sh standby Computer #tracert 192.168.102.1 Now here we will shut down the interface f0/0 of R1 R1 (config) #int fa0/0 R1 (config-if) #shut
  • 13. HSRP (Hot Standby Router Protocol) R2 will immediately become active Computer # ping 192.168.102.1 Now we will up the R1s f0/0 R1 (config) #int fa0/0 R1 (config-if) #no shut R1#sh standby Now we can see R1 is in standby mode. Now we will shut the fa0/0 of R2 R2 (config) #int fa0/0 R2 (config-if) #shut R1#sh standby Here we can see state is active R2 (config) #int fa0/0 R2 (config-if) #no shut Now here we can see R1 is active, but we want to make R2 as active. For that we will change the Priority R2 (config) #int fa0/0 R2 (config-if) #standby 1 priority 101 R2 (config-if) #standby 1 preempt Here we increased the priority which was by default 100, and then enabled preempt which will force the high priority router to become active. R2#sh standby Active Now if we want to make the R1 active then we increased the R1s priority and enable the Preempt. R1 (config) #int fa0/0 R1 (config-if) #standby 1 priority 102 R1 (config-if) #standby 1 preempt R1#sh standby Active
  • 14. HSRP (Hot Standby Router Protocol) Now here what we can see if the R1s f0/0 would down then R2s f0/0 would become active but if the R1s S0/0 would down then what will happen? Data will move first on R1 and then it will reach on switch, after that it will go on R2. R1 (config) #int s0/0 R1 (config-if) #shut Computer# tracert 192.168.102.1 Now here we want, if the R1s s0/0 is down then data should immediately forward via R2. R1 (config) #int s0/0 R1 (config-if) #no shut R1 (config-if) #int fa0/0 R1 (config-if) #standby 1 track s0/0 All the command will run on LAN Link. Here if the serial link will down then track will decrement 10 in priority. R1 (config) #int s0/0 R1 (config-if) #shut R1#sh standby Priority 92 (10 decreased) Computer# tracert 192.168.102.1 Now data will go directly via R2 R1 (config) #int s0/0 R1 (config-if) #no shut R1#sh standby Priority 102 R1#sh run config int fa0/0 Now here if we want load balancing R2 (config) #int fa0/0 R2 (config-if) #standby 2 ip 192.168.101.4 R2 (config-if) #standby 2 priority 101 R2 (config-if) #standby 2 preempt R2 (config-if) #standby 2 track s0/0 R2#sh run int fa0/0 R1 (config) #int fa0/0
  • 15. HSRP (Hot Standby Router Protocol) R1 (config-if) #standby 2 ip 192.168.101.4 R1 (config-if) #standby 2 preempt R1#sh run int fa0/0 R1 (config) #int s0/0 R1 (config-if) #shut R2#sh standby R1 (config) #int s0/0 R1 (config-if) #no shut R1#sh standby R2 (config) #int s0/0 R2 (config-if) #shut R1#sh standby R2 (config) #int s0/0 R2 (config-if) #no shut Computer# tracert 192.168.102.1