979
Configuring Enhanced Object Tracking
Configuring Enhanced Object Tracking Features
Switch(config-track)#
threshold weight up 30 down 10
Switch(config-track)#
exit
This configuration can be useful if object 1 and object 2 represent two small bandwidth connections and object 3
represents one large bandwidth connection. The configured
down 10
value means that once the tracked object is up, it
will not go down until the threshold value is equal to or lower than 10, which in this example means that all connections
are down.
Configuring a Tracked List with a Percentage Threshold
To track by percentage threshold, configure a tracked list of objects, specify that a percentage will be used as the
threshold, and specify a percentage for all objects in the list. The state of the list is determined by comparing the assigned
percentage of each object to the list.
You cannot use the Boolean “NOT” operator in a percentage threshold list.
Beginning in privileged EXEC mode, follow these steps to configure a tracked list of objects by using a percentage
threshold:
Use the
no
track
track-number
global configuration command to delete the tracked list.
This example configures tracked list 4 with three objects and a specified percentages to measure the state of the list:
Switch(config)#
track 4 list threshold percentage
Switch(config-track)#
object 1
Switch(config-track)#
object 2
Switch(config-track)#
object 3
Switch(config-track)#
threshold percentage up 51 down 10
Switch(config-track)#
exit
Command
Purpose
1.
configure terminal
Enter global configuration mode.
2.
track
track-number
list threshold
percentage
Configure a tracked list object and enter tracking configuration mode. The
track-number
can be from 1 to 500.
threshold
—Specify the state of the tracked list based on a threshold.
percentage
—Specify that the threshold is based on percentage.
3.
object
object-number
Specify the object to be tracked. The range is from 1 to 500.
Note:
An object must exist before you can add it to a tracked list.
4.
threshold percentage
{
up
number |
[
down
number
]}
Specify the threshold percentage.
up
number
—The valid range is from 1 to 100.
down
number
]—(Optional) The range depends on the number selected
for the
up
number
. If you configure the
up
number
as 25, the range
shown for the down number is 0 to 24.
5.
delay
{
up
seconds
[
down
seconds
] |
[
up
seconds
]
down
seconds
}
(Optional) Specify a period of time in seconds to delay communicating state
changes of a tracked object. The range is from 1 to 180 seconds.
6.
end
Return to privileged EXEC mode.
7.
show track
object-number
Verify that the specified objects are being tracked.
8.
copy running-config
startup-config
(Optional) Save your entries in the configuration file.
Содержание IE 4000
Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Страница 108: ...104 Configuring Switch Clusters Additional References ...
Страница 128: ...124 Performing Switch Administration Additional References ...
Страница 130: ...126 Configuring PTP ...
Страница 140: ...136 Configuring CIP Additional References ...
Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Страница 192: ...188 Configuring Switch Based Authentication Additional References ...
Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...
Страница 298: ...294 Configuring VLANs Additional References ...
Страница 336: ...332 Configuring STP Additional References ...
Страница 408: ...404 Configuring DHCP Additional References ...
Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...
Страница 502: ...498 Configuring Layer 2 NAT ...
Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...
Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...
Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...
Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Страница 978: ...974 Dying Gasp ...
Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Страница 996: ...992 Ethernet CFM ...
Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...
Страница 1066: ...1062 Using an SD Card SD Card Alarms ...