Book now with code EOY2025
AlanJames wrote: » Each vlan interface will have its own standby group
DevilWAH wrote: » seems more obvious to be able to have one hsrp group across mutiple interfaces, this would reduce resoruce usage. AAron
DevilWAH wrote: » simple in what case would only vlan 1 fail, and vlan 15 stay up? (yes i know its possible but not really likley)
kryolla wrote: » HSRP operates independent from each other why would you want them as a group. It is made for redundant default gateway and each gateway is per subnet or you can load balance and have 2 default gateways and half the hosts pointing to one and the other half pointing to the other. So what if you have more traffic going across your layer 2 etherchannel due to the keepalives, isnt that what etherchannel are for to increase capacity and redundancy
DevilWAH wrote: » I disagree, it is good practice to reduce overheads as much as possible, and to insure data is routed and switched in the most efficent method possible. a good network design, cuts out any unnessery packets being sent across a link, and duplicated data. This should also be reflected in you configurations that should also not inclued unessery duplicated entries. The fact you have gigabytes of spare links hanging around does not mean you have to fill it with useless data.
DevilWAH wrote: » in what case would only vlan 1 fail, and vlan 15 stay up? (yes i know its possible but not really likley)
jason_lunde wrote: » Not to mention the nature of HSRP is to assign a mac-address of 0000.0c07.acxx where xx is group number in hex. In an env. that does not support per-vlan mac address tables this causes chaos. So unless the admin statics each mac...for each vlan, you have issues.
jason_lunde wrote: » Right. I was just saying that in some older networks, or with 3rd party equipment not supporting per-vlan mac-address tables, assigning the same group number per SVI would be a no-no.
Forsaken_GA wrote: » That's easy. The customer on that vlan is deprovisioned and I remove all ports from their vlan, causing the interface to go down. If it operated the way you wanted it, I'd take all redundancy down. Or, more likely, I just flat out remove that vlan. What then? The obvious answer is that I'd never be able to remove that vlan, if the implementation worked that way, I've just created a dependency that allows one stupid mistake to take down multiple network links. In other words, I've created a single point of failure. I'm sure I don't really have to explain why that's a catastrophic design flaw for a redundancy protocol
so you reduce overhead at the expense of additional cpu processing if it would work how you imagine it
The HSRP BFD peering feature introduces BFD in the HSRP group member health monitoring system. Previously, group member monitoring relied exclusively on HSRP multicast messages, which are relatively large and consume CPU memory to produce and check. In architectures where a single interface hosts a large number of groups, there is a need for a protocol with low CPU memory consumption and processing overhead. BFD addresses this issue and offers subsecond health monitoring (failure detection in milliseconds) with a relatively low CPU impact. This command is enabled by default.
DevilWAH wrote: » I on the other hand am in a position where it is a large switched internal network, and the core switches are running mutiply gateways, each one of which has an identical config (about 15 lines of code for the HSRP settings) for the stand by group.
actuly it would be easy to do, all you need would be a command that said some thing like.. #int van 2 #standby 2 ip 192.168.1.254 #standby 2 state track standby 2 VLAN 1
DevilWAH wrote: » see in this case the HRSP is first configured on interfaces that are the WAN links out of the site. if this interface fails, then there is no reason I ever want the router/switch to stay active for the other VLANS . there's no point the, WAN link has to be down if that interface has failed. if that single HSRP group fails it means there is no longer a route out of site.
DevilWAH wrote: » PS. if anyone is silly enough to, first of all set up something like this, where there is the potential of someone removing a VLAN with out fully understanding the implications. And secondly you have someone working on the network that makes changes with out first confirming what effect it will have on a network.. They should not be working on the network in the first place.
ConstantlyLearning wrote: » I'm not sure why this isn't a problem with per-vlan mac address tables and is without?
DevilWAH wrote: » Cool cheers guys, seems a pity as I have two routers that run hsrp for about 15 vlans. idealy it would be nice to link the hsrp in to one instance as at the moment each instance has its own hello packets, but at the end of the day they are all set to fail over with the same limits. seems more obvious to be able to have one hsrp group across mutiple interfaces, this would reduce resoruce usage. cheers for the info though. AAron
deth1k wrote: » Use a routing protocol instead of HSRP to provide redundancy.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!