VRRP Configuration Example
159
Network diagram
Figure 40
Network diagram for interface tracking configuration
Configuration procedure
1
Configure Switch A.
a
Configure VLAN 2.
<LSW-A> system-view
System View: return to User View with Ctrl+Z.
[LSW-A] vlan 2
[LSW-A-vlan2] port Ethernet 1/0/6
[LSW-A-vlan2] quit
[LSW-A] interface vlan-interface 2
[LSW-A-Vlan-interface2] ip address 202.38.160.1 255.255.255.0
[LSW-A-Vlan-interface2] quit
b
Configure that the virtual router can be pinged.
[LSW-A ] vrrp ping-enable
c
Create a backup group.
[LSW-A] interface vlan-interface 2
[LSW-A-Vlan-interface2] vrrp vrid 1 virtual-ip 202.38.160.111
d
Set the priority for the backup group.
[LSW-A-Vlan-interface2] vrrp vrid 1 priority 110
e
Set the authentication key for the backup group.
[LSW-A-Vlan-interface2] vrrp authentication-mode md5 switch
f
Configure that the master switch to send VRRP packets once in every 5 seconds.
[LSW-A-Vlan-interface2] vrrp vrid 1 timer advertise 5
g
Set the tracked VLAN interface.
[LSW-A-Vlan-interface2] vrrp vrid 1 track vlan-interface 3 reduced
30
Virtual IP address: 202.38.160.111
Switch_A
Host A
202.38.160.3
-
Vlan-interface2: 202.38.160.1
Internet
Switch_B
-
Vlan-interface2: 202.38.160.2
-
Vlan-interface3: 10.100.10.2
Host B
10.2.3.1
Virtual IP address: 202.38.160.111
Switch_A
Host A
202.38.160.3
-
Vlan-interface2: 202.38.160.1
Internet
Switch_B
-
Vlan-interface2: 202.38.160.2
-
Vlan-interface3: 10.100.10.2
Host B
10.2.3.1
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...