38-72
Cisco Catalyst Blade Switch 3120 for HP Software Configuration Guide
OL-12247-01
Chapter 38 Configuring IP Unicast Routing
Configuring Multi-VRF CE
User Interface for uRPF
uRPF can be configured on an interface assigned to a VRF, and source lookup is done in the VRF table.
Beginning in privileged EXEC mode, follow these steps to configure VRF-aware services for uRPF. For
complete syntax and usage information for the commands, refer to the switch command reference for
this release and the Cisco IOS Switching Services Command Reference, Release 12.2.
User Interface for Syslog
Beginning in privileged EXEC mode, follow these steps to configure VRF-aware services for Syslog.
For complete syntax and usage information for the commands, refer to the switch command reference
for this release and the Cisco IOS Switching Services Command Reference, Release 12.2.
Step 6
standby 1 ip ip-address
Enable HSRP and configure the virtual IP address.
Step 7
end
Return to privileged EXEC mode.
Command
Purpose
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
interface interface-id
Enter interface configuration mode, and specify the Layer 3 interface to
configure.
Step 3
no switchport
Remove the interface from Layer 2 configuration mode if it is a physical
interface.
Step 4
ip vrf forwarding vrf-name
Configure VRF on the interface.
Step 5
ip address ip-address
Enter the IP address for the interface.
Step 6
ip verify unicast reverse-path
Enable uRPF on the interface.
Step 7
end
Return to privileged EXEC mode.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
logging on
Enable or temporarily disable logging of storage router event message.
Step 3
logging host ip-address vrf vrf-name
Specify the host address of the syslog server where logging messages
are to be sent.
Step 4
logging buffered logging buffered size
debugging
Log messages to an internal buffer.
Step 5
logging trap debugging
Limit the logging messages sent to the syslog server.
Step 6
logging facility facility
Send system logging messages to a logging facility.
Step 7
end
Return to privileged EXEC mode.