532
C
HAPTER
25: A
UTO
D
ETECT
C
ONFIGURATION
Network diagram
Figure 155
Network diagram for auto detect configuration
Configuration procedure
1
Enter system view.
<S5500> system-view
2
Create detecting group 10.
[S5500] detect-group 10
3
Specify to detect the IP address of 10.1.1.4, taking the IP address of 192.168.1.2 as
the next hop and setting the detecting number to 1.
[S5500-detect-group-10] detect-list 1 ip address 10.1.1.4 nexthop
192.168.1.2
4
Specify to detect the IP address of 192.168.2.2, setting the detecting number to 2.
[S5500-detect-group-10] detect-list 2 ip address 192.168.2.2
5
Specify to return
reachable
as the detecting result if one of the two IP addresses is
reachable.
[S5500-detect-group-10] option or
6
Set the detecting interval to 60 seconds.
[S5500-detect-group-10] timer loop 60
7
Set the maximum number of retries during a detecting operation to 3.
[S5500-detect-group-10] retry 3
8
Set the detecting timeout time to 3 seconds.
[S5500-detect-group-10] timer wait 3
[S5500-detect-group-10] quit
Auto Detect
Implementation
The results of auto detect operations (reachable or unreachable) can be used to
determine whether or not to enable some functions. The auto detect function can be
utilized in:
■
Static routing
■
Virtual router redundancy protocol (VRRP)
■
Interface backup
192.168.1.1
192.168.2.1
192.168.1.2
192.168.2.2
20.1.1.2
10.1.1.3
Ethernet 1/0/1
10.1.1.4
Ethernet 2/0/1
Sw
itch A
Sw
itch B
Sw
itch C
Sw
itch D
192.168.1.1/24
192.168.2.1/24
192.168.1.2/24
192.168.2.2/24
20.1.1.2/24
10.1.1.3/24
Ethernet 1/0/1
10.1.1.4/24
Ethernet 2/0/1
Sw
itch A
Sw
itch B
Sw
itch C
Sw
itch D
VLAN
1
VLAN
2
192.168.1.1
192.168.2.1
192.168.1.2
192.168.2.2
20.1.1.2
10.1.1.3
Ethernet 1/0/1
10.1.1.4
Ethernet 2/0/1
Sw
itch A
Sw
itch B
Sw
itch C
Sw
itch D
192.168.1.1/24
192.168.2.1/24
192.168.1.2/24
192.168.2.2/24
20.1.1.2/24
10.1.1.3/24
Ethernet 1/0/1
10.1.1.4/24
Ethernet 2/0/1
Sw
itch A
Sw
itch B
Sw
itch C
Sw
itch D
VLAN
1
VLAN
2
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...