Module 2 - Switching Technologies1 by Shaik
Module 2 - Switching Technologies1 by Shaik
3
Switch
A network switch is a computer networking
device that connects devices on a computer network by
using packet switching to receive, process, and forward
data to the destination device.
4
Cisco Catalyst Switches
7
An Ethernet switch operates at the data link layer (layer 2) of the OSI model to
create a separate collision domain for each switch port.
Each device connected to a switch port can transfer data to any of the other
ports at any time and the transmissions will not interfere.
➢ The network switch plays an central role in most modern Ethernet local area
networks (LANs).
8
Cisco Switch Led Indicators
MEANING OF DIFFERENT LIGHTS IN SWITCH
SYSTEM(SYST)
Overall status of the switch.
10
DUPLEX
Duplex status of the switch ports.
SPEED
11
STAT
12
Cisco Memory
13
DRAM
➢ Dynamic Random Access Memory provides to two main device requirements.
➢ The first of these is known as Processor Memory which is reserved for exclusive
access by the CPU, which it uses when executing software running on the Cisco
IOS platform.
14
EPROM
➢ The first is a boot loader which takes over should the device fail to find a valid
bootable image in Flash Memory, and provides alternate boot options.
➢ The ROM Monitor has a user interface and includes options for troubleshooting
failures of the ROM chips.
15
NVRAM
➢ Non-Volatile Random Access Memory,
16
Flash Memory
➢ its primary use is to store a bootable Cisco IOS image from which a
device can start.
17
Switch Boot Sequence
18
Switch Boot Sequence
After a Cisco switch is powered on, it goes through the following boot sequence:
Step 1. First, the switch loads a power-on self-test (POST) program stored in ROM. POST
checks the CPU subsystem. It tests the CPU, DRAM, and the portion of the flash device that
makes up the flash file system.
Step 2. Next, the switch loads the boot loader software. The boot loader is a small program
stored in ROM and is run immediately after POST successfully completes.
Step 3. The boot loader performs low-level CPU initialization. It initializes the CPU registers
that control where physical memory is mapped, the quantity of memory, and memory
speed.
Step 4. The boot loader initializes the flash file system on the system board.
Step 5. Finally, the boot loader locates and loads a default IOS operating system software
image into memory and hands control of the switch over to the IOS.
19
Typical management features
• Enable and disable ports
• Link bandwidth and duplex settings
• Quality of service configuration and monitoring
• MAC filtering and other access control list features
• Configuration of Spanning Tree Protocol (STP) and Shortest Path
Bridging (SPB) features
• Simple Network Management Protocol (SNMP) monitoring of
device and link health
• Port mirroring for monitoring traffic and troubleshooting
• VLAN configuration
• Network Access Control features
20
Types of Switches
21
Types of Switches
Unmanaged switches
• They are typically the least expensive switches, and therefore often
used in a small office/home office environment.
22
Managed switches
23
Smart switches
• Smart switches are managed switches with a limited set of
management features.
• For a price much lower than a fully managed switch they provide a
web interface (and usually no CLI access) and allow configuration
of basic settings, such as VLANs, port-bandwidth and duplex.
24
Enterprise managed switches
• Enterprise managed switches have a full set of management features, including
CLI, SNMP agent, and web interface.
• Compared with smart switches, enterprise switches have more features that can
be customized or optimized, and are generally more expensive than smart
switches.
25
Broadcast Domain
26
Collision Domain
27
CSMA/CD
28
Power over Ethernet (PoE)
➢ Power over Ethernet is a capability that facilitates powering a device (such as an IP
phone, IP Surveillance Camera, or Wireless Access Point) over the same cable as the
data traffic.
➢ One of the advantages of PoE is the flexibility it provides in allowing you to easily place
endpoints anywhere in the business, even places where it might be difficult to run a
power outlet.
➢ Switches deliver power according to a few standards – IEEE 802.3af delivers power up
to 15.4 Watts on a switch port whereas IEEE 802.3at (also known as PoE+) delivers
power up to 30 Watts on a switch port.
➢ For most endpoints, 802.3af is sufficient but there are devices, such as Video phones
or Access Points with multiple radios, which have higher power needs.
➢ Select Cisco switches also support Universal Power over Ethernet (UPoE) or 60W PoE
that delivers up to 60 Watts on a switch port.
➢ A new PoE standard, 802.3bt, delivers even high levels of power for future
applications.
➢ To find the switch that is right for you, choose a switch according to your power needs.
When connecting to desktops or other types of devices which do not require PoE, the
non-PoE switches are a more cost-effective option.
29
Number of Ports
30
Network Switch Speeds
31
The small form-factor pluggable (SFP) is a compact, hot-pluggable
transceiver used for data communication applications.
These small metal devices plug into a special switch slot and support
communication over either fiber optic or copper networking cable.
How The Switches Learn
MAC Address of End Devices
33
If System has IP address
Gratuitous ARP
36
If System has no IP address
DHCP Request
37
Switch Configuration
Using the Command-Line Interface
38
Accessing the Cisco Catalyst Switch CLI
39
Cabling the Console Connection
40
Available command modes include:
41
Basic-Configuring Cisco IOS Software
Navigating between different switch command modes
User EXEC
Allow you to connect with remote devices, perform basic tests, temporary change
terminal setting and list system information.
Privileged EXEC
Allow you to set operating parameters. It also includes high level testing and list
commands like show, copy and debug.
Global Configuration
Contain commands those affect the entire system
42
Interface Configuration
Sub-Interface Configuration
43
Setup
ROMMON
If router automatically enter in this mode, then it indicates that it fails to locate
a valid IOS image.
44
Topology
45
Switch Basic Configuration
Enter privileged mode
Switch>enable Switch>user mode
Switch# Switch#priviled mode
Switch#show version
Examine the characteristics of the virtual interface VLAN1:
Switch#show interface vlan1
Examine the default properties of the Fast Ethernet interface used by PC1.
Switch#show interface fastethernet 0/18
Issue one of the following commands to examine the contents of the flash
directory.
Switch#show flash
Switch#dir flash:
To view the contents of the startup configuration file, issue the show startup-
config command in privileged EXEC mode.
Switch#show startup-config
Enter the configuration commands, one for each line. When you are
finished, return to global configuration mode by entering the exit command
or pressing Ctrl-Z.
S1(config)#line console 0
S1(config-line)#password cisco
S1(config-line)#login
S1(config-line)#line vty 0 15
S1(config-line)#password cisco
S1(config-line)#login
S1(config-line)#exit
❑ Not require #no shutdown command
❑ We can’t assign IP address to interfaces
❑ Default VLAN 1
❑ We can assign IP address for only VLANs
#interface vlan 1
#ip address 142.100.65.100 255.255.255.0
#no shutdown
Access port
#sh run
#do show run
#do show history
50
#vlan 10
#name data
#int fa0/1
#switchport mode access
#switchpoer mode access vlan 10
51
Interface Range
52
Switch port speed Duplex
#interface fa0/10
#description HR PC connected
53
To save the contents of the running configuration file to non-volatile
RAM (NVRAM), issue the the command copy running-config startup-
config.
Erase configuration
#write erase
#reload
55
56
57
58
59
60
61
62
63
Switching
64
Layer-specific functionality
65
Layer 1
✓ A layer 1 network device transfers data, but does not manage any
of the traffic coming through it, an example is Ethernet hub.
66
Layer 2
A layer 2 network device is a multiport device that uses hardware addresses,
MAC address, to process and forward data at the data link layer.
Bridges also buffer an incoming packet and adapt the transmission speed to
that of the outgoing port.
In LANs, a switch used for end user access typically concentrates lower
bandwidth and uplinks into a higher bandwidth.
67
Layer 3
A layer-3 switch can perform some or all of the functions normally performed
by a router.
68
Layer-3 switching
69
70
Layer 4
✓ While the exact meaning of the term layer-4 switch is vendor-dependent,
✓ it almost always starts with a capability for network address translation, and
may add some type of load distribution based on TCP sessions or advanced
QoS capabilities.
✓ A layer-7 switch may include a web cache and participate in a content delivery
network(CDN).
71
VLAN
LAN
➢ A LAN consist its all devices in a single Broadcast Domain
➢ A broad cast device sends a broadcast message, then all the devices get a
copy of a frame.
VLAN
➢ A VLAN is known as a virtual local area network, virtual LAN, or just VLAN.
➢ VLANs (Virtual LANs) are logical grouping of devices in the same broadcast
domain.
➢ VLANs are configured on switches by placing some interfaces into one
broadcast domain and some interfaces into another.
➢ VLANs can be spread across multiple switches.
➢ Each VLAN is treated like its own subnet or broadcast domain, which means
that frames broadcast onto the network are only switched between the ports
within the same VLAN.
How switches identify different VLANs
▪ Switch ports
▪ End-station MAC addresses
▪ Protocol
Advantages of VLAN
VLAN Switchport Membership Modes
➢ When you configure a VLAN, you must assign it with an ID number, and you
can optionally give it a name.
▪ Static VLAN
▪ Dynamic VLAN
▪ Voice VLAN
Static VLAN
➢ This is when Ports on a switch are manually
assigned to a VLAN.
Switch#config t
Switch(config)#interface fastEthernet0/15
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 10
Switch(config-if)#end
Dynamic VLAN
➢ A dynamic port VLAN membership is
configured using a special server called a
VLAN Membership Policy Server (VMPS).
➢ The VLAN ID is placed on the frame when it reaches a switch from an access
port, which is a member of a VLAN.
➢ That frame can then be forwarded out the trunk link port.
➢ Each switch can see what VLAN the frame belongs to and can forward the
frame to corresponding VLAN access ports or to another VLAN trunk port.
Switch Ports
➢ Switch ports are layer 2 interfaces which are used to carry layer 2 traffic.
➢ A single switch port can carry single VLAN traffic whether it is an access port or
trunk port.
➢ Frames are handled differently according to the type of link they are
traversing.
There are 2 different types of ports in a switched environment:
Access ports –
➢ This switch ports belongs to carry the traffic of only one vlan.
➢ By default, it will carry the traffic of native vlan (VLAN 1) .
➢ If the switch ports are assigned as access ports then it can be considered as the
switch ports belongs to a single broadcast domain.
➢ Any traffic arriving on these switch ports are considered as it belongs to the VLAN
assigned to the port.
Switch1(config)#interface fa0/0
Switch1(config-if)#switchport mode access
Trunk ports
➢ These switch ports belongs to and carry the traffic of more than one VLAN.
➢ then inter vlan routing is required, in which the link between router and
switch is configured as trunk as the link has to carry the traffic of more than
one VLAN
Configure a Trunk Port
SW1#config t
SW1(config)#interface fa0/1
SW1(config-if)#switchport mode trunk
SW1(config-if)#end
VLAN identification methods
➢ If the frame is forwarded out to a trunk link then a header or tag is added to
the frame header which specifies the VLAN to which the frame belongs.
➢ At the receiving end, the tag is removed and the frame is forwarded to the assigned
VLAN.
Switch(config)#interface Fa 0/1
Switch(config-if)#switchport trunk encapsulation 802.1q
Switch(config-if)#switchport mode trunk
Inter-Switch Link (ISL)
This is a VLAN identification method in which VLAN information is explicitly tagged
onto Ethernet frame.
Configuration (ISL):
Switch(config)#interface Fa0/1
Switch(config-if)#switchport trunk encapsulation isl
Switch(config-if)#switchport mode trunk
VLAN Configuration
Configuring VLANs
Switch1#config t
switch1(config)#vlan 10
switch1(config-vlan)#name orbit
switch1(config-vlan)#exit
switch1(config)#vlan 20
switch1(config-vlan)#name cisco
Switch11(config-vlan)#exit
Switch1(config)#vlan 30
Switch1(config-vlan)#name student
Switch1(config-vlan)#exit
Switch1(config)#exit
After creating your VLAN, you can assign a switch port to the VLAN.
Switch1#config t
Switch1(config)#interface fa0/2
Switch1(config-if)#switchport mode access
Switch1(config-if)#switchport access vlan 20
Switch1(config-if)#no shut
Switch1(config-if)#exit
Switch1(config)#exit
Switch1#
How to delete VLANs
Switch1(config)#no vlan 10
Switch1(config)#end
➢ After the switch is reloaded, the previously configured VLANs will no longer
be present.
➢ This effectively places the switch into is “factory default” concerning VLAN
configurations.
#interface vlan 1
#ip address 142.100.65.100 255.255.255.0
#no shutdown
➢ VLANs logically segment the switch into different subnets, when a router is
connected to the switch, an administrator can configure the router to forward the
traffic between the various VLANs configured on the switch.
➢ The user nodes in the VLANs forwards traffic to the router which then forwards the
traffic to the destination network regardless of the VLAN configured on the switch.
Inter VLAN Routing - Configuration
SW1#config t
SW1(config)#vlan 10
SW1(config-vlan)#vlan 20
SW1(config-vlan)#exit
SW1(config)#interface fa0/8
SW1(config-if)#switchport access vlan 10
SW1(config-if)#interface fa0/4
SW1(config-if)#switchport access vlan 10
SW1(config-if)#interface fa0/11
SW1(config-if)#switchport access vlan 20
SW1(config-if)#interface fa0/3
SW1(config-if)#switchport access vlan 20
SW1(config-if)#end
➢ In the above example, interfaces F0/4 and F0/8 has been configured on VLAN 10
using the switchport access vlan 10 command.
➢ The same process is used to assign VLAN 20 to interface F0/3 and F0/11 on switch
SW1.
R1#config t
R1(config)#interface fa0/0
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R1(config-if)#no shut
R1(config-if)#interface fa0/1
RI(config-if)#ip address 192.168.2.1 255.255.255.0
RI(config-if)#no shut
RI(config-if)#end
VTP
VLAN Trunking Protocol
VTP Introduction
➢ VTP (VLAN Trunking Protocol) is a Cisco proprietary messaging protocol used
by Cisco switches to exchange VLAN information.
➢ A VTP domain is simply a set of trunked switches with the matching VTP
settings (domain name, password and VTP version).
➢ All switches inside the same VTP domain share their VLAN information with
each other.
How does VTP works?
The switches do this by sending different messages to each other.
These messages allow them to update, maintain and synchronize their VLAN
databases.
Types of Message
1.Summery Advertisement
These messages are sent to let all the switches know the current revision
number of the VLAN database –
▪ Domain name
▪ Password
▪ Revision number
2.Subset Advertisement
These messages contain VLAN information so the other switches can add them to their
own database.
▪ Domain name
▪ Revision number
▪ VLAN info
Sync-Requirements
There are some requirements that need to be met before the switches will sync their
VLAN databases.
▪ The switches will 'prune' VLANs from trunks in order to reduce any
unnecessary bandwidth and resource usage.
➢ With STP in place, you can have redundant links between switches to
provide redundancy.
➢ SW2 sends a broadcast frame to SW1 and SW3.
➢ Both switches receive the frame and forward the frame out every port, except the port
the frame was received on.
➢ SW1 sends the frame to SW3.
➢ SW3 receives the frame, and sends the frame back to SW2.
➢ SW2 then again forwards the frame to SW1!
➢ The same thing also happens in the opposite direction.
➢ Without STP in place, these frames would loop forever.
➢ STP prevents loops by placing one of the switch ports into blocking state.
➢ In the topology above, STP has placed one port on SW3 into the blocking
state.
➢ That way, if SW3 receives a broadcast frame from SW1, it will not forward it
out the port connected to SW2.
STP Port States
Disable
It means that a port is administratively Shutdown.
Blocking
It means that neither a port is sending data nor receiving data,
But still it is receiving BPDU.
Listening
A port is preparing for forwarding state without learning MAC.
Learning
A port is preparing for forwarding state with learning MAC.
Forwarding
A port is forwarding and receiving the data.
How STP WORKS
32768
➢ The other end of a Designated Port is called as Non Designated Port (marked as NDP),
➢ Non Designated Port will be always in Blocking State, to avoid Layer 2 Switching
loops.
#spanning-tree vlan 1-4094 priority 0
3. on the shared Ethernet segments, the switch with the lowest cost
to reach the root bridge is placed into forwarding state.
4. all other interfaces are placed in blocking state and will not
forward frames.
STP Topology Changes
In Non-Root Switch:
- Uplink fast is a feature which enable in non-root switches to put alternate root port
directly in forwarding state if root port goes down.
STP Backbone fast
#interface fa 0/1
#shut down
#no shutdown
Observe the out put of listening, learning state times
#interface fa0/1
#spanning-tree portfast ? Or #exit
#spanning-tree portfast default (for all ports) & (do it in all switches)
#sh history
To verify this #shutdown the port and no shutdown
Up link fast
TEST
#sh span
- Check the status of the ports
STP Loop Guard
➢ The STP loop guard feature provides additional protection against
Layer 2 forwarding loops (STP loops).
- Loop guard is feature, when non-dp will not receive the BPDU,
then it places the ports in to Loop-In consistence state
• When DP sends BPDU,
• if blocking port not being receive the BPDU.
#interface(non-dp ports)
#spaning-tree guard loop
TEST
#sh spanning-tree
-check the status
STP BPDU Guard
BPDU Guard feature is used to protect the Layer 2 Spanning
Tree Protocol (STP) Topology from BPDU related attacks.
- #conf t
- #spaning-tree port bpduguard
#sh cdp-neighbor
#interface fa 0/1 – 4
#spaning-tree bpdu filter default
- #sh spanning-tree
Root Port
- Receiving lowest cost BPDU
Point-Point Port
- Switch to Switch Connectivity
RSTP Convergence Process Steps Introduction
Proposal:
- All switches sends BPDU to each other.
Synchronization:
- Puts all trunk ports in discording states.
- Then they will listen best BPDU and elect Root Bridge.
- DP and Root ports elects
Agreement:
- Non DP Ports and Alternate ports.
STP Protocols Types
STP Protocols Types
STP Protocols Types
1 VLAN – 1 Instant
10 VLANs – 10 Instants
CST PVST
PVST+
Per VLAN Spanning Tree + (PVST+) –
➢ It is a spanning tree standard developed by Cisco for its devices which finds
the root bridge per VLAN.
➢ It is a Cisco default version of STP.
➢ It finds separate 802.1d spanning tree instance for each VLAN.
➢ It also provides backward comparability with 802.1d or CST.
➢ This is more optimized to the IEEE because it provides optimal path selection
as separate instance of STP per VLAN is find.
➢ This is as slow as CST.
➢ The bridge resources needed in RSTP is higher than CST but less
than PVST+ .
➢ It requires much more CPU and memory than other STP standards.
802.1s (Multiple Spanning Tree) :-
➢ This standard is developed by IEEE in which grouping of VLANs is done and for
each single group, RSTP is run.
➢ This is basically a Spanning Tree Protocol running over another Spanning Tree
Protocol.
Advantages:
1. High redundancy
2. load balancing can be achieved.
3. lower CPU and memory usage is required
Disadvantages:
Switch 1 Switch 2
#conf t #conf t
#Interface range fa0/23 – 24 #Interface range fa0/20 – 21
#channel-protocol Pagp #channel-protocol Pagp
#Channel-group 1 mode desirable #Channel-group 1 mode auto
In fact, the router that is first powered on will become the active router, even
if it has the lowest priority!
Basic Configuration of HSRP
R1
interface Ethernet0/1
description LAN Interface of Active Router
ip address 192.168.1.1 255.255.255.0
standby 1 ip 192.168.1.254 <—- Create HSRP Group 1 and assign Virtual IP
standby 1 priority 101 <—- Assign priority above 100 to make this the primary
router
standby 1 preempt <—- Makes router active if it has higher priority
R2
interface Ethernet0/1
description LAN Interface of Standby Router
ip address 192.168.1.2 255.255.255.0
standby 1 ip 192.168.1.254 <—- Create HSRP Group 1 and assign Virtual IP
standby 1 preempt <—- Makes router active if it has higher priority
#show standby
#int s0/0/0
#standby 10 track serial 0/0/0 #standby timers 5 15
VRRP
Virtual Router Redundancy Protocol
▪ Unlike HSRP which is Cisco proprietary, VRRP is a Redundancy
Protocol which operates in a network with multi-vendor
devices.
▪ You use the vrrp priority command to enable the a VRRP router to functions
as a virtual router as well as a backup should the virtual router master fails.
You can configure the priority of each virtual router backup with a value of 1
through 254 using the vrrp priority command.
▪ For example, if Router A, the virtual router master in a vrrp group fails, an
election process takes place to determine if virtual router backups B or C
should take over. If Routers B and C are configured with the priorities of 90
and 100, respectively, Router B is elected to become virtual router master
because it has the higher priority.
• If Routers B and C are both configured with the priority of 100,
the virtual router backup with the higher IP address is elected to
become the virtual router master.
VRRP Preemption
R1
interface Ethernet0/1
description LAN Interface of Active Router
ip address 192.168.1.1 255.255.255.0
vrrp 1 ip 192.168.1.254 <—- Create VRRP Group 1 and assign Virtual IP
vrrp 1 priority 101 <—- Assign priority above 100 to make this the primary
router
vrrp 1 preempt <—- Makes router active if it has higher priority
R2
interface Ethernet0/1
description LAN Interface of Standby Router
ip address 192.168.1.2 255.255.255.0
vrrp 1 ip 192.168.1.254 <—- Create VRRP Group 1 and assign Virtual IP
vrrp 1 preempt <—- Makes router active if it has higher priority
GLBP
Gateway Load Balancing Protocol
Gateway Load Balancing Protocol (GLBP)
➢ To overcome the shortcomings in HSRP and VRRP, Cisco developed the proprietary
Gateway Load Balancing Protocol (GLBP).
➢ Routers are added to a GLBP group, numbered 0 to 1023.
➢ Unlike HSRP and VRRP, multiple GLBP routers can be active, achieving both
redundancy and load balancing.
➢ A priority is assigned to each GLBP interface - 100 by default.
➢ The interface with the highest priority becomes the Active Virtual Gateway (AVG).
➢ If priorities are equal, the interface with the highest IP will become the AVG.
➢ Routers in the GLBP group are assigned a single virtual IP address.
➢ The AVG will respond to ARP requests for the virtual IP with the virtual MAC address
of an Active Virtual Forwarder (AVF).
➢ The AVG assigns a virtual MAC address to each AVF, and to itself, for a maximum
total of 4 virtual MAC addresses.
➢ Only the AVG and AVFs can forward traffic for hosts.
➢ Any router not elected as an AVF or AVG will become a Secondary Virtual Forwarder
(SVF), and will wait in standby until an AVF fails.
GLBP configuration is nearly identical to HSRP:
Remember that the interface with the highest priority is elected as the AVG.
Statically
Dynamically, by tracking an interface
If the weight falls below the lower threshold, the router must stop functioning as an
AVF.
The router will become an AVF again once its weight reaches the upper threshold, as
long as preempt is configured.
The AVG assigns a virtual MAC address to itself and up to three AVFs.
The AVG will respond to ARP requests for the virtual IP address with one of these virtual
MAC addresses.
Round Robin
Weighted
Host-dependent
The default load balancing method is per-host round robin.
Traffic from hosts is distributed equally across all routers in the GLBP group.
The AVG will respond to the first host ARP request with the first virtual MAC address.
The second ARP request will receive the second virtual MAC address, etc.
The weighted load balancing method will distribute traffic proportionally, based on a router’s
weight.
Routers with a higher weight will receive a proportionally higher percentage of traffic.
The load balancing method should be configured on the AVG:
R1
interface Ethernet0/1
description LAN Interface of Primary Router
ip address 192.168.1.1 255.255.255.0
glbp 1 ip 192.168.1.254 <—- Create GLBP Group 1 and assign Virtual IP
glbp 1 priority 101 <—- Assign priority above 100 to make this the primary router
glbp 1 preempt <—- Makes router active if it has higher priority
glbp 1 load-balancing round-robin <—- Configure round-robin balancing of traffic
R2
interface Ethernet0/1
description LAN Interface of Secondary Router
ip address 192.168.1.2 255.255.255.0
glbp 1 ip 192.168.1.254 <—- Create GLBP Group 1 and assign Virtual IP
glbp 1 preempt <—- Makes router active if it has higher priority
glbp 1 load-balancing round-robin <—- Configure round-robin balancing of traffic
Comparison between HSRP Vs VRRP Vs GLBP
•HSRP and VRRP are very similar. Both have one active and one standby router at
any given time.
•GLBP is the only one which provides load balancing of traffic among the devices in
the group.
•HSRP and GLBP are Cisco proprietary.
•VRRP is an IETF standard (RFC 3768) so it is supported by all router vendors.
•If you have a mixed vendor environment (e.g Cisco, Juniper etc) than its better to
use VRRP.
•All protocols support more than 2 routers in a group.
•All protocols support tracking. This means that you can track an interface of the
router (or other network conditions) and if something goes wrong (e.g interface goes
down or a destination tracked host does not respond) then a failover action is
triggered.
•HSRP and GLBP support IPv6. The original VRRP does not support IPv6 but you
need a special version of VRRPv3 for this.
LAB
HSRP/VRRP/GLBP
1. Assign the ip address to all the interfaces
2. Config Default routing in Gateways
3. Config the static routing in ISP routing
4. Create loopback interface in ISP router
HSRP
GW1#int fa0/0
#standby 1 ip 192.168.1.150 (VIP)
#standby 1 priority 120
#sh standby/bri