Professional Documents
Culture Documents
Switching p4
Switching p4
• Access layer
Local and Remote
User Access
• Distribution layer
Policy-based Connectivity
• Core
High Speed Switching
Hierarchical Network Design
Access Layer
• Layer 2 switching
• High availability
• Port security
• QoS classification and marking and
trust boundaries
• Spanning tree
• Power over Ethernet (PoE) and
auxiliary VLANs for VoIP
Hierarchical Network Design
Distribution Layer
• Aggregation of LAN or WAN links
• Policy-based security in the form of access control
lists (ACLs) and filtering
• Routing services between LANs and VLANs and
between routing domains (e.g., EIGRP to OSPF)
• A boundary for route aggregation and summarization
configured on interfaces toward the core layer
Hierarchical Network Design
Core Layer
• Provides high-speed switching (i.e., fast transport)
• Provides reliability and fault tolerance
• Scales by using faster, and not more, equipment
• Avoids CPU-intensive packet manipulation caused by
security, inspection, quality of service (QoS)
classification, or other processes
Hierarchical Network Design
Hierarchical Network Design
Hierarchical Network Design
Considerations in system design
• Speed
• Cost
• Security
• Availability
• Scalability
• Reliability
Hierarchical Network Design
Two-Tier Collapsed Core Design
• A two-tier hierarchical
“collapsed core” is when
the distribution layer and
core layer functions are
implemented by a single
device.
• Used by smaller
businesses to reduce
network cost while
maintaining most of the
benefits of the three-tier
hierarchical model.
Modular Network Design
Switch(config-if)#
• The group number is optional and indicates the HSRP group to which this interface belongs.
• Specifying a unique group number in the standby commands enables the creation of multiple HSRP
groups. The default group is 0.
• The IP address is that of the virtual router IP address for the HSRP group.
Configuring HSRP Priority and Preempt
• To set the HSRP priority value of a router, enter this command in interface configuration mode:
standby group-number priority priority-value
• The priority value can be from 0 to 255. The default value is 100.
• During the election process, the router with the highest priority in an HSRP group becomes the
active router. If a tie occurs, the router with the highest configured IP address becomes active.
• If the routers do not have preempt configured, a router that boots up significantly faster than
the others in the standby group becomes the active router, regardless of the configured priority.
The former active router can be configured to resume the forwarding router role by preempting a
router with a lower priority.
• To enable a router to resume the forwarding router role, enter this command in interface
configuration mode:
standby [group-number] preempt [delay {minimum seconds reload seconds sync seconds}]
HSRP Configuration Example
• Routers A and B are configured with priorities of 110 and 90, respectively. The
configuration of Router A is displayed.
• The preempt keyword ensures that Router A will be the HSRP active router as long its
interface is active.
• The show standby brief command displays a summary of the HSRP configurations.
• For each standby group, you can verify the local router neighbors.
HSRP is a Cisco proprietary protocol, VRRP is an IEEE standard (RFC 2338 in 1998; then RFC
created in 1994, and formalized with the 3768 in 2005) for router redundancy.
RFC 2281 in March 1998.
16 groups max. 255 groups max.
Virtual IP is different from Active and Virtual IP can be the same as one of the
Standby real IP addresses. group members real IP address.
Uses 224.0.0.2 for hello packets. Uses 224.0.0.18 for hello packets.
Default timers: hello 3 s, holdtime 10 s. The default timers are shorter in VRRP than HSRP. This often
gave VRRP the reputation of being faster than HSRP.
Can track interfaces or objects. Can track only objects.
Uses authentication within each group by Supports plaintext and HMAC/MD5 authentication methods
default. When authentication is not (RFC 2338). The new VRRP RFC (RFC 3768) removes
configured, a default authentication, using support for these methods. The consequence is that VRRP
“cisco” as the password. does not support authentication anymore. Nevertheless,
current Cisco IOS still supports the RFC 2338 authentications
mechanisms.
VRRP Scenario
• Routers A, B, and C are members of a VRRP group. The IP address of the virtual router
is the same as that of the LAN interface of Router A (10.0.0.1). Router A is responsible
for forwarding packets sent to this IP address.
• The clients have a gateway address of 10.0.0.1. Routers B and C are backup routers. If
the master router fails, the backup router with the highest priority becomes the master
router. When Router A recovers, it resumes the role of master router.
VRRP Scenario (1)
• Here is a LAN topology in which VRRP is configured so that Routers A and B share the load of being the default gateway for Clients
1 through 4. Routers A and B act as backup virtual routers to one another should either one fail.
• Two virtual router groups are configured. For virtual Router 1, Router A is the owner of IP address 10.0.0.1 and is therefore the
master virtual router for clients configured with that default gateway address. Router B is the backup virtual router to Router A.
• For virtual Router 2, Router B is the owner of IP address 10.0.0.2 and is the master virtual router for clients configured with the
default gateway IP address 10.0.0.2. Router A is the backup virtual router to Router B.
Configuring VRRP
Step Description
• GLBP active virtual gateway (AVG):Members of a GLBP group elect one gateway to be the AVG for that group. Other group
members provide backup for the AVG if the AVG becomes unavailable. The AVG assigns a virtual MAC address to each member of
the GLBP group.
• GLBP active virtual forwarder (AVF): Each gateway assumes responsibility for forwarding packets that are sent to the virtual
MAC address assigned to that gateway by the AVG. These gateways are known as AVFs for their virtual MAC address.
• GLBP communication: GLBP members communicate between each other through hello messages sent every 3 seconds to the
multicast address 224.0.0.102, User Datagram Protocol (UDP) port 3222.
GLBP Functions (2)
• Router A is acting as the AVG. Router A has assigned virtual MAC 0007.b400.0101 to itself.
• Router B is acting as AVF for the virtual MAC 0007.b400.0102 assigned to it by Router A.
HSRP or
VRRP
LACP SVL
or PAGP
STP or LACP or
MST PAGP MEC
Access switch Access switch Access switch Access switch Access switch Access switch
stack stack stack
StackWise® Virtual
SW- SW- • StackWise Virtual Link (SVL) and Dual Active Detection link
1 2 (DAD) can be configured only on supervisor ports
• SVL or DAD links should be on the same-speed ports (10G or
40G); cannot be mixed
SVL
• Up to eight ports in 10G or two ports in
40G are supported
2nd Sup not supported 40G/10G 2nd Sup not supported
• In SVL mode, second supervisor is not supported
DAD
in the chassis
• SVL is supported only between the same 9400 Series models
SVL is supported on all 9400 Series chassis with all supervisors Sup-1, Sup- with the same supervisors in the same slots
1-XL, Sup-1-XL-Y
• Cisco StackWise Virtual is a distribution layer technology, allowing stacking of only two switches using fixed front panel ports.
• Cisco StackWise Virtual supports flexible distances with support for all supported cables and optics.
• With Cisco IOS® XE Release16.11.1, SVL and DAD are supported on line cards with controlled availability.
StackWise Virtual architecture
Key concepts
Defines two Cisco Catalyst switches that
are participating together as a virtual
switching system (SVL)
Hot standby
Active control plane
control plane
Active data plane
Active data plane
Cisco® Catalyst® switch that Special 10G/40G port channel joins two Cisco Catalyst switch that
operates Cisco Catalyst switches, allowing them to operates as the hot standby
as the active control plane for operate as a single control plane for StackWise
the SVL logical device Virtual
StackWise Virtual configuration
SW- SVL SW-
1 2
C9404/9407 C9404/9407
DA – Fast Hello
SW-1 SW-2
Step 3: Dual-active detection
• Configure StackWise Virtual links 9407-1(config)# interface range TenG x/y/z 9407-2(config)# interface range TenG x/y/z
• 10G or 40G dual-active support 9407-1(config-if)# stackwise-virtual dual-active- 9407-2(config-if)# stackwise-virtual dual-active-
• Max 4 dual active Fast Hello links detection detection
SW-1 SW-2
Step 4: Save and reload to convert
• Copy configuration on startup and storage 9407-1# copy run start 9407-2# copy run start
• Reload both systems to enable StackWise Virtual in the network 9407-1# reload 9407-2# reload
StackWise Virtual configuration –
post- conversion changes on 9400 Series
• Interface numbers
• After converting to StackWise® Virtual mode, interface numbers change from 3-tuple to 4-tuple
SWV-1#show switch
Switch/Stack Mac Address : 7069.5a5c.cb24 - Local Mac Address
Mac persistency wait time: Indefinite
H/W Current
Switch# Role Mac Address Priority Version State
----------------------------------------------------------------------
---------------
SVL *1 Active 7069.5a5c.cb24 1 V02 Ready
roles 2 Standby 7069.5a5c.ce78 1 V02 Ready
Switch Module
number number
New hardware for StackWise Virtual
2-node StackWise® Virtual
StackWise Virtual
Physical Logical