154
C
HAPTER
12: VRRP C
ONFIGURATION
Configuring switch priority
The status of each switch in a backup group is determined by its priority. The master
switch in a backup group is the one currently with the highest priority.
Switch priority ranges from 0 to 255 (a larger number indicates a higher switch
priority) and defaults to 100. Note that only 1 through 254 are available to users.
Switch priority of 255 is reserved for IP address owners.
The switch priority of an IP address owner is fixed to 255.
Configuring preemptive mode for a switch in a backup group
As long as a switch in the backup group becomes the master switch, other switches,
even if they are configured with a higher priority later, do not preempt the master
switch unless they operate in preemptive mode. The switch operating in preemptive
mode will become the master switch when it finds its priority is higher than that of
the current master switch, and the former master switch becomes a backup switch
accordingly.
You can configure an SWITCH 5500 series switch to operate in preemptive mode. You
can also set the delay period. A backup switch waits for a period of time (the delay
period) before becoming a master switch. Setting a delay period aims at:
■
In an unstable network, backup switches in a backup group possibly cannot
receive packets from the master in time due to network congestions even if the
master operates properly. This causes the master of the backup group being
determined frequently.
■
With the configuration of delay period, the backup switch will wait for a while if it
does not receive packets from the master switch in time. The master is
redetermined only after the backup switches do not receive packets from the
master switch after the specified delay time.
Configuring authentication type and authentication key for a switch in a
backup group
VRRP provides following authentication types:
■
simple
: Simple character authentication
■
md5
: MD5 authentication
In a network under possible security threat, the authentication type can be set to
simple
. Then the switch adds the authentication key into the VRRP packets before
transmitting them. The receiver will compare the authentication key of the packet
with the locally configured one. If they are the same, the packet will be taken as a
true and legal one. Otherwise it will be regarded as an illegal packet and be
discarded. In this case, a simple authentication key should not exceed eight
characters.
In a vulnerable network, the authentication type can be set to
md5
. The switch will
use the authentication type and MD5 algorithm provided by the Authentication
Header to authenticate the VRRP packets. In this case, you need to set an
authentication key comprising up to eight characters or a 24-character encrypted
string.
A switch discards the packets that fail to pass the authentication and then sends trap
packets to the network management system.
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...