January 18, 2025

HSRP Tuning Example

HSRP Tuning Example Today I will discuss about HSRP Tuning. As you see in the article “HSRP (Hot Standby Router Protocol)”, it is quite simple configure Hot Standby Router Protocol. [boxads] Some cases require a custom configuration, using priority, track, preempt etc…and these are: The standby preempt interface configuration command allows the router to become the active router when its priority is higher than all other HSRP-configured routers in this Hot Standby group. The configurations of both routers include this command so that each router can be the standby router for the other router. If you do not use the …

HSRP Tuning Example Read More

HSRP (Hot Standby Router Protocol)

HSRP (Hot Standby Router Protocol) The HSRP (Hot Standby Router Protocol) is a Cisco proprietary first-hop redundancy protocol (FHRP) designed to allow for transparent fail-over of the first-hop IP router, and has been described in detail in RFC 2281. [boxads] HSRP provides high network availability by providing first-hop routing redundancy for IP hosts on Ethernet, Fiber Distributed Data Interface (FDDI), Bridge-Group Virtual Interface (BVI), LAN Emulation (LANE), or Token Ring networks configured with a default gateway IP address. HSRP is used in a group of routers for selecting an active router and a standby router. In a group of router …

HSRP (Hot Standby Router Protocol) Read More

Configure Port Channel CISCO Switch

Configure Port Channel CISCO Switch: EtherChannel bundles individual Ethernet links into a single logical link that provides bandwidth up to 1600 Mbps (Fast EtherChannel, full duplex) or 16 Gbps (Gigabit EtherChannel) between two Cisco Catalyst switches. All interfaces in each EtherChannel must be the same speed and duplex, and both ends of the channel must be configured as either a Layer 2 or Layer 3 interface. [boxads] If one link within the EtherChannel bundle fails, traffic previously carried over the failed link is carried over the remaining links within the EtherChannel. Link Aggregation protocols are: IEEE standard Link Aggregation Protocol …

Configure Port Channel CISCO Switch Read More

VRRP Tutorial (Virtual Router Redundancy Protocol)

VRRP Tutorial (Virtual Router Redundancy Protocol) Today i will discuss about VRRP Tutorial, VRRP stands for Virtual Router Redundancy Protocol. It is a FHRP: First Hop Redundancy Protocol, which means they allow you to configure more than one physical router but it can still be seen as a single router. First Hop means that any packet traveling out the network has its gateway as its first hop. It is protocol used for Gateway redundancy. [boxads] –         It is similar to the HSRP protocol by Cisco –         It is an open standard redundancy protocol i.e. can be used between different vendors …

VRRP Tutorial (Virtual Router Redundancy Protocol) Read More

OSPF Network Types Example

OSPF Network Types: [boxads] There are several kind of OSPF Network Types are use in service provider environment. OSPF message addresses are determined by the type of network to which the OSPF interface is connected. One of the following OSPF network types must be selected when configuring an interface on an OSPF router. Point-to-Point:  A network that can connect only two routers. Leased-line WAN links such as Dataphone Digital Service (DDS) and T-Carrier are point-to-point networks. OSPF messages sent on point-to-point networks use IP multicast addresses. No DR/BDR concept. Has a Master and Slave concept instead, with highest interface chosing …

OSPF Network Types Example Read More

Spanning Tree Protocol Security

Spanning Tree Protocol Security Today I will discuss about Spanning Tree Protocol Security issue. Spanning Tree Protocol (STP), also known as 802.1d, is a Layer 2 protocol designed to prevent loops within switched networks. Typically, STP goes through a number of states (e.g., block, listen, learn, and forward) before a port is able to pass user traffic. [boxads] A vulnerability associated with STP is that a system within the network can actively modify the STP topology. There is no authentication that would prevent such an action. The bridge ID, a combination of a two-byte priority and a six-byte MAC address, …

Spanning Tree Protocol Security Read More
error: Content is protected !!