Beruflich Dokumente
Kultur Dokumente
In this arƟcle networking consultant Sean Wilkins By Raymond Lacoste, Kevin Wallace
takes the concepts covered in “IntroducƟon to CCNA RouƟng and Switching 200-120 Network $55.99
Simulator
VRRP” and discusses how those concepts can be
applied onto real devices. CCNP RouƟng and Switching ROUTE 300-101 Official Cert
Learn More Buy
Guide
Note: The valid values for the priority are from 1 through 254.
Configure the IP addresses 10.10.20.1/30 (R1) and 10.10.20.2/30(R2) on their Fa0/1 interfaces.
Configure the IP addresses 172.16.1.1/24 (R1) and 172.16.2.1 (R2) on their Fa0/0 interfaces.
Configure VRRP between R1 and R2 using the IP addresses 10.10.10.1/24 (R1) and 10.10.10.2/24(R2) and a virtual IP address of 10.10.10.5
on their Fa1/0 interfaces.
Configure R1 with a VRRP priority of 140.
2 Create and enter into key chain configuraƟon mode. router(config)#key chain chain-name
3 Create and enter into key chain – key configuraƟon mode. router(config-keychain)#key key-number
4 Enter the key string that will be used to authenƟcate with router(config-keychain-key)#key-string keystring
neighboring devices.
{line-protocol | ip routing}
Notes:
From the author of
The object-numbercan be any number between 1 and 1000.
CCNA RouƟng and Switching 200-120 Network
The line-protocolparameter will track the protocol state of the Simulator
configured interface. The ip routingparameter will track the IP
Learn More Buy
rouƟng capability of an interface (is it configured with an IP
address and operaƟonal?).
3 Create a tracked object that will monitor the line protocol status R1(config)#track 1 interface fa0/0 line-protocol
of the fa0/0 interface using an object number of 1.
5 Configure VRRP to use the tracked object to influence its R1(config-if)#vrrp 1 track 1 decrement 50
priority..
6 Configure the use of an MD5 keystring of abc123. R1(config-if)#vrrp 1 authentication md5 key-string
abc123
3 Create a tracked object that will monitor the line protocol status R2(config)#track 1 interface fa0/0 line-protocol
of the fa0/0 interface using an object number of 1.
5 Configure VRRP to use the tracked object to influence its R2(config-if)#vrrp 1 track 1 decrement 50
priority.
6 Configure the use of an MD5 key string of abc123. R2(config-if)#vrrp 1 authentication md5 key-string
abc123
Summary
One thing that has been rather consistent over the last 20 years is that most LAN segments all include a single gateway that is used by everyone
on that segment. While in past, this may not have been that big of a deal, but in modern networks, almost everyone is acƟvely using the
network to do normal tasks and oŌen this involves access to parts of the network that are not local to a host’s machine. Because of this, the
implementaƟon of FHRPs has become more common in these types of network environments.
Knowledge of these opƟons is an important part of the educaƟon of any LAN administrator or engineer, and should be known as part of all Cisco
rouƟng and switching cerƟficaƟon tracks. I hope that this arƟcle enables you to have a beƩer understanding of how the different configuraƟon
commands can be put together to obtain an expected, well thought-out soluƟon to this common design issue.
Django •
Fair Warning: ISACA CRISC Updates Phase 1 IKE Policy | Configuring the
Coming in 2015 Cisco ASA IPSec VPN
• •
— For such a "respected" — Thank you :)
certification I found it to have very poor
availability of study materials