First Hop Redundancy Protocols Configuration Guide, Cisco IOS XE 17
First Hop Redundancy Protocols Configuration Guide, Cisco IOS XE 17
First Hop Redundancy Protocols Configuration Guide, Cisco IOS XE 17
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1721R)
© 2020 Cisco Systems, Inc. All rights reserved.
CONTENTS
Glossary 198
Feature Information
Use Cisco Feature Navigator to find information about feature support, platform support, and Cisco software
image support. An account on Cisco.com is not required.
Related References
• Cisco IOS Command References, All Releases
Device B) is a member of the same GLBP group and is designated as the AVF for the virtual MAC address
0007.b400.0102. Client 1 has a default gateway IP address of 10.21.8.10 and a gateway MAC address of
0007.b400.0101. Client 2 shares the same default gateway IP address but receives the gateway MAC address
0007.b400.0102 because Router B is sharing the traffic load with Router A.
Figure 1: GLBP Topology
If Router A becomes unavailable, Client 1 will not lose access to the WAN because Router B will assume
responsibility for forwarding packets sent to the virtual MAC address of Router A, and for responding to
packets sent to its own virtual MAC address. Router B will also assume the role of the AVG for the entire
GLBP group. Communication for the GLBP members continues despite the failure of a device in the GLBP
group.
for 30 seconds. You can disable the GLBP forwarder preemptive scheme using the no glbp forwarder
preempt command or change the delay using the glbp forwarder preempt delay minimum command.
ISSU-GLBP
GLBP supports In Service Software Upgrade (ISSU). ISSU allows a high-availability (HA) system to run in
Stateful Switchover (SSO) mode even when different versions of Cisco IOS software are running on the active
and standby Route Processors (RPs) or line cards.
ISSU provides the ability to upgrade or downgrade from one supported Cisco IOS release to another while
continuing to forward packets and maintain sessions, thereby reducing planned outage time. The ability to
upgrade or downgrade is achieved by running different software versions on the active RP and standby RP
for a short period of time to maintain state information between RPs. This feature allows the system to switch
over to a secondary RP running upgraded (or downgraded) software and continue forwarding packets without
session loss and with minimal or no packet loss. This feature is enabled by default.
For detailed information about ISSU, see the Cisco IOS In Service Software Upgrade Process in the Cisco
IOS High Availability Configuration Guide
For detailed information about ISSU on the 7600 series devices, see the ISSU and eFSU on Cisco 7600 Series
Routers document.
GLBP SSO
With the introduction of the GLBP SSO functionality, GLBP is stateful switchover (SSO) aware. GLBP can
detect when a device is failing over to the secondary router processor (RP) and continue in its current group
state.
SSO functions in networking devices (usually edge devices) that support dual RPs. SSO provides RP redundancy
by establishing one of the RPs as the active processor and the other RP as the standby processor. SSO also
synchronizes critical state information between the RPs so that network state information is dynamically
maintained between RPs.
Without SSO-awareness, if GLBP is deployed on a device with redundant RPs, a switchover of roles between
the active RP and the standby RP results in the device relinquishing its activity as a GLBP group member and
then rejoining the group as if it had been reloaded. The GLBP SSO feature enables GLBP to continue its
activities as a group member during a switchover. GLBP state information between redundant RPs is maintained
so that the standby RP can continue the device’s activities within the GLBP during and after a switchover.
This feature is enabled by default. To disable this feature, use the no glbp sso command in global configuration
mode.
For more information, see the Stateful Swithover document in the Cisco IOS High Availability Configuration
Guide.
GLBP Benefits
Load Sharing
You can configure GLBP in such a way that traffic from LAN clients can be shared by multiple devices,
thereby sharing the traffic load more equitably among available devices.
Preemption
The redundancy scheme of GLBP enables you to preempt an active virtual gateway (AVG) with a higher
priority backup virtual gateway that has become available. Forwarder preemption works in a similar way,
except that forwarder preemption uses weighting instead of priority and is enabled by default.
Authentication
GLBP supports the industry-standard message digest 5 (MD5) algorithm for improved reliability, security,
and protection against GLBP-spoofing software. A device within a GLBP group with a different authentication
string than other devices will be ignored by other group members. You can alternatively use a simple text
password authentication scheme between GLBP group members to detect configuration errors.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask [secondary]
5. glbp group ip [ip-address [secondary]]
6. exit
7. show glbp [interface-type interface-number] [group] [state] [brief]
DETAILED STEPS
Device> enable
Step 3 interface type number Specifies an interface type and number, and enters interface
configuration mode.
Example:
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an interface.
Example:
Step 6 exit Exits interface configuration mode, and returns the device
to global configuration mode.
Example:
Device(config-if)# exit
Step 7 show glbp [interface-type interface-number] [group] [state] (Optional) Displays information about GLBP groups on a
[brief] device.
Example: • Use the optional brief keyword to display a single line
of information about each virtual gateway or virtual
Device(config)# show glbp 10 forwarder.
Example
In the following example, sample output is displayed about the status of the GLBP group, named
10, on the device:
GigabitEthernet0/0/0 - Group 10
State is Active
2 state changes, last state change 23:50:33
Virtual IP address is 10.21.8.10
Hello time 5 sec, hold time 18 sec
Next hello sent in 4.300 secs
Redirect time 600 sec, forwarder time-out 7200 sec
Authentication text "stringabc"
Preemption enabled, min delay 60 sec
Active is local
Standby is unknown
Priority 254 (configured)
Weighting 105 (configured 110), thresholds: lower 95, upper 105
Track object 2 state Down decrement 5
Load balancing: host-dependent
There is 1 forwarder (1 active)
Forwarder 1
State is Active
1 state change, last state change 23:50:15
MAC address is 0007.b400.0101 (default)
Owner ID is 0005.0050.6c08
Redirection enabled
Preemption enabled, min delay 60 sec
Active is local, weighting 105
Customizing GLBP
Customizing the behavior of GLBP is optional. Be aware that as soon as you enable a GLBP group, that group
is operating. It is possible that if you first enable a GLBP group before customizing GLBP, the device could
take over control of the group and become the AVG before you have finished customizing the feature.
Therefore, if you plan to customize GLBP, it is a good idea to do so before enabling GLBP.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask [secondary]
5. glbp group timers [msec] hellotime [msec] holdtime
6. glbp group timers redirect redirect timeout
7. glbp group load-balancing [host-dependent | round-robin | weighted]
8. glbp group priority level
9. glbp group preempt [delay minimum seconds]
10. glbp group client-cache maximum number [timeout minutes]
11. glbp group name redundancy-name
12. exit
13. no glbp sso
DETAILED STEPS
Device> enable
Step 3 interface type number Specifies an interface type and number, and enters interface
configuration mode.
Example:
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an
interface.
Example:
Step 6 glbp group timers redirect redirect timeout Configures the time interval during which the AVG
continues to redirect clients to an AVF. The default is 600
Example:
seconds (10 minutes).
Device(config-if)# glbp 10 timers redirect 1800 • The timeout argument specifies the interval in seconds
28800 before a secondary virtual forwarder becomes invalid.
The default is 14,400 seconds (4 hours).
Step 7 glbp group load-balancing [host-dependent | Specifies the method of load balancing used by the GLBP
round-robin | weighted] AVG.
Example:
Step 8 glbp group priority level Sets the priority level of the gateway within a GLBP group.
Example: • The default value is 100.
Step 9 glbp group preempt [delay minimum seconds] Configures the device to take over as AVG for a GLBP
group if it has a higher priority than the current AVG.
Example:
• This command is disabled by default.
Device(config-if)# glbp 10 preempt delay minimum
60 • Use the optional delay and minimum keywords and
the seconds argument to specify a minimum delay
Step 10 glbp group client-cache maximum number [timeout (Optional) Enables the GLBP client cache.
minutes]
• This command is disabled by default.
Example:
• Use the number argument to specify the maximum
Device(config-if)# glbp 10 client-cache maximum
number of clients the cache will hold for this GLBP
1200 timeout 245 group. The range is from 8 to 2000.
• Use the optional timeout minutes keyword and
argument pair to configure the maximum amount of
time a client entry can stay in the GLBP client cache
after the client information was last updated. The
range is from 1 to 1440 minutes (one day).
Step 11 glbp group name redundancy-name Enables IP redundancy by assigning a name to the GLBP
group.
Example:
• The GLBP redundancy client must be configured with
Device(config-if)# glbp 10 name abc123 the same GLBP group name so the redundancy client
and the GLBP group can be connected.
Step 12 exit Exits interface configuration mode, and returns the device
to global configuration mode.
Example:
Device(config-if)# exit
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an interface.
Example:
Step 5 glbp group-number authentication md5 key-string [ 0 | Configures an authentication key for GLBP MD5
7] key authentication.
Example: • The key string cannot exceed 100 characters in length.
Step 6 glbp group-number ip [ip-address [secondary]] Enables GLBP on an interface and identifies the primary
IP address of the virtual gateway.
Example:
Device(config-if)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. key chain name-of-chain
4. key key-id
5. key-string string
6. exit
7. exit
8. interface type number
9. ip address ip-address mask [secondary]
10. glbp group-number authentication md5 key-chain name-of-chain
11. glbp group-number ip [ip-address [secondary]]
12. Repeat Steps 1 through 10 on each device that will communicate.
13. end
14. show glbp
15. show key chain
DETAILED STEPS
Device> enable
Step 3 key chain name-of-chain Enables authentication for routing protocols and identifies
a group of authentication keys and enters key-chain
Example:
configuration mode.
Device(config)# key chain glbp2
Step 5 key-string string Specifies the authentication string for a key and enters
key-chain key configuration mode.
Example:
• The value for the string argument can be 1 to 80
Device(config-keychain-key)# key-string abc123 uppercase or lowercase alphanumeric characters; the
first character cannot be a numeral.
Device(config-keychain-key)# exit
Device(config-keychain)# exit
Step 8 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 9 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an
interface.
Example:
Step 10 glbp group-number authentication md5 key-chain Configures an authentication MD5 key chain for GLBP
name-of-chain MD5 authentication.
Example: • The key chain name must match the name specified
in Step 3.
Device(config-if)# glbp 1 authentication md5
key-chain glbp2
Device(config-if)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask [secondary]
5. glbp group-number authentication text string
6. glbp group-number ip [ip-address [secondary]]
7. Repeat Steps 1 through 6 on each device that will communicate.
8. end
9. show glbp
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an interface.
Example:
Step 5 glbp group-number authentication text string Authenticates GLBP packets received from other devices
in the group.
Example:
• If you configure authentication, all devices within the
Device(config-if)# glbp 10 authentication text GLBP group must use the same authentication string.
stringxyz
Step 6 glbp group-number ip [ip-address [secondary]] Enables GLBP on an interface and identifies the primary
IP address of the virtual gateway.
Example:
Device(config-if)# end
specified value, the group will no longer be an active virtual forwarder. When the weighting rises above a
specified value, the group can resume its role as an active virtual forwarder.
SUMMARY STEPS
1. enable
2. configure terminal
3. track object-number interface type number {line-protocol | ip routing}
4. exit
5. interface type number
6. glbp group weighting maximum [lower lower] [upper upper]
7. glbp group weighting track object-number [decrement value]
8. glbp group forwarder preempt [delay minimum seconds]
9. exit
10. show track [object-number | brief] [interface [brief] | ip route [ brief] | resolution | timers]
DETAILED STEPS
Device> enable
Step 3 track object-number interface type number {line-protocol Configures an interface to be tracked where changes in the
| ip routing} state of the interface affect the weighting of a GLBP
gateway, and enters tracking configuration mode.
Example:
• This command configures the interface and
Device(config)# track 2 interface POS 6/0/0 ip corresponding object number to be used with the glbp
routing weighting track command.
• The line-protocol keyword tracks whether the
interface is up. The ip routing keywords also check
that IP routing is enabled on the interface, and an IP
address is configured.
Device(config-track)# exit
Step 6 glbp group weighting maximum [lower lower] [upper Specifies the initial weighting value, and the upper and
upper] lower thresholds, for a GLBP gateway.
Example:
Step 7 glbp group weighting track object-number [decrement Specifies an object to be tracked that affects the weighting
value] of a GLBP gateway.
Example: • The value argument specifies a reduction in the
weighting of a GLBP gateway when a tracked object
Device(config-if)# glbp 10 weighting track 2 fails.
decrement 5
Step 8 glbp group forwarder preempt [delay minimum Configures the device to take over as AVF for a GLBP
seconds] group if the current AVF for a GLBP group falls below
its low weighting threshold.
Example:
• This command is enabled by default with a delay of
Device(config-if)# glbp 10 forwarder preempt delay 30 seconds.
minimum 60
• Use the optional delay and minimum keywords and
the seconds argument to specify a minimum delay
interval in seconds before preemption of the AVF
takes place.
Device(config-if)# exit
Step 10 show track [object-number | brief] [interface [brief] | ip Displays tracking information.
route [ brief] | resolution | timers]
Example:
Troubleshooting GLBP
GLBP introduces five privileged EXEC mode commands to enable display of diagnostic output concerning
various events relating to the operation of GLBP. The debug condition glbp,debug glbp errors, debug glbp
events, debug glbp packets, and debug glbp terse commands are intended only for troubleshooting purposes
because the volume of output generated by the software can result in severe performance degradation on the
device. Perform this task to minimize the impact of using the debug glbp commands.
This procedure will minimize the load on the device created by the debug condition glbpor debug glbp
command because the console port is no longer generating character-by-character processor interrupts. If you
cannot connect to a console directly, you can run this procedure via a terminal server. If you must break the
Telnet connection, however, you may not be able to reconnect because the device may be unable to respond
due to the processor load of generating the debugging output.
SUMMARY STEPS
1. enable
2. configure terminal
3. no logging console
4. Use Telnet to access a device port and repeat Steps 1 and 2.
5. end
6. terminal monitor
7. debug condition glbp interface-type interface-number group [forwarder]
8. terminal no monitor
DETAILED STEPS
Device> enable
Step 4 Use Telnet to access a device port and repeat Steps 1 and Enters global configuration mode in a recursive Telnet
2. session, which allows the output to be redirected away from
the console port.
Device(config)# end
Step 7 debug condition glbp interface-type interface-number Displays debugging messages about GLBP conditions.
group [forwarder]
• Try to enter only specific debug condition glbp or
Example: debug glbp commands to isolate the output to a certain
subcomponent and minimize the load on the processor.
Device# debug condition glbp GigabitEthernet0/0/0 Use appropriate arguments and keywords to generate
1 more detailed debug information on specified
subcomponents.
• Enter the specific no debug condition glbp or no
debug glbp command when you are finished.
GLBP commands: complete command syntax, Cisco IOS IP Application Services Command Reference
command mode, command history, defaults, usage
guidelines, and examples
In Service Software Upgrade (ISSU) configuration "In Service Software Upgrade" process module in the
Cisco IOS High Availability Configuration Guide
Key chains and key management commands: Cisco IOS IP Routing Protocol-Independent Command
complete command syntax, command mode, Reference
command history, defaults, usage guidelines, and
examples
GLBP Support for IPv6 “FHRP - GLBP Support for IPv6” module
Technical Assistance
Description Link
Gateway Load GLBP protects data traffic from a failed router or circuit, like HSRP and VRRP,
Balancing while allowing packet load sharing between a group of redundant routers.
Protocol
The following commands were introduced or modified by this feature: glbp
forwarder preempt, glbp ip , glbp load-balancing , glbp name, glbp preempt
, glbp priority , glbp sso , glbp timers , glbp timers redirect, glbp weighting
, glbp weighting track, show glbp.
GLBP MD5 MD5 authentication provides greater security than the alternative plain text
Authentication authentication scheme. MD5 authentication allows each GLBP group member
to use a secret key to generate a keyed MD5 hash that is part of the outgoing
packet. A keyed hash of an incoming packet is generated and, if the hash within
the incoming packet does not match the generated hash, the packet is ignored.
The following commands were modified by this feature: glbp authentication,
show glbp.
SSO—GLBP GLBP is now SSO aware. GLBP can detect when a router is failing over to the
secondary RP and continue in its current GLBP group state.
Prior to being SSO aware, GLBP was not able to detect that a second RP was
installed and configured to take over in the event that the primary RP failed. When
the primary failed, the GLBP device would stop participating in the GLBP group
and, depending on its role, could trigger another router in the group to take over
as the active router. With this enhancement, GLBP detects the failover to the
secondary RP and no change occurs to the GLBP group. If the secondary RP fails
and the primary is still not available, then the GLBP group detects this and
re-elects a new active GLBP router.
This feature is enabled by default.
The following commands were introduced or modified by this feature: debug
glbp events,glbp sso, show glbp.
Glossary
active RP—The Route Processor (RP) controls the system, provides network services, runs routing protocols
and presents the system management interface.
AVF—active virtual forwarder. One virtual forwarder within a GLBP group is elected as active virtual
forwarder for a specified virtual MAC address, and it is responsible for forwarding packets sent to that MAC
address. Multiple active virtual forwarders can exist for each GLBP group.
AVG—active virtual gateway. One virtual gateway within a GLBP group is elected as the active virtual
gateway, and is responsible for the operation of the protocol.
GLBP gateway—Gateway Load Balancing Protocol gateway. A router or gateway running GLBP. Each
GLBP gateway may participate in one or more GLBP groups.
GLBP group—Gateway Load Balancing Protocol group. One or more GLBP gateways configured with the
same GLBP group number on connected Ethernet interfaces.
ISSU—In Service Software Upgrade. A process that allows Cisco IOS XE software to be updated or otherwise
modified while packet forwarding continues. In most networks, planned software upgrades are a significant
cause of downtime. ISSU allows software to be modified while packet forwarding continues, which increases
network availability and reduces downtime caused by planned software upgrades.
NSF—nonstop forwarding. The ability of a router to continue to forward traffic to a router that may be
recovering from a failure. Also, the ability of a router recovering from a failure to continue to correctly forward
traffic sent to it by a peer.
RP—Route Processor. A generic term for the centralized control unit in a chassis. Platforms usually use a
platform-specific term, such as RSP on the Cisco 7500, the PRE on the Cisco 10000, or the SUP+MSFC on
the Cisco 7600.
RPR—Route Processor Redundancy. RPR provides an alternative to the High System Availability (HSA)
feature. HSA enables a system to reset and use a standby Route Processor (RP) if the active RP fails. Using
RPR, you can reduce unplanned downtime because RPR enables a quicker switchover between an active and
standby RP if the active RP experiences a fatal error.
RPR+—An enhancement to RPR in which the standby RP is fully initialized.
SSO—Stateful Switchover. Enables applications and features to maintain state information between an active
and standby unit.
standby RP—An RP that has been fully initialized and is ready to assume control from the active RP should
a manual or fault-induced switchover occur.
switchover—An event in which system control and routing protocol execution are transferred from the active
RP to the standby RP. Switchover may be a manual operation or may be induced by a hardware or software
fault. Switchover may include transfer of the packet forwarding function in systems that combine system
control and packet forwarding in an indivisible unit.
vIP—virtual IP address. An IPv4 address. There must be only one virtual IP address for each configured
GLBP group. The virtual IP address must be configured on at least one GLBP group member. Other GLBP
group members can learn the virtual IP address from hello messages.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. standby version {1 | 2}
DETAILED STEPS
Device> enable
Step 3 interface type number Specifies an interface type and number, and places the
device in interface configuration mode.
Example:
link. If the prefixes advertised in the RA messages are globally unique, then the IPv6 addresses configured
by the node are also guaranteed to be globally unique. Router solicitation messages, which have a value of
133 in the Type field of the ICMP packet header, are sent by hosts at system startup so that the host can
immediately autoconfigure without needing to wait for the next scheduled RA message.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 unicast-routing
4. interface type number
5. standby [group-number] ipv6 {link-local-address | autoconfig}
6. standby [group-number] preempt [delay minimum seconds | reload seconds | sync seconds]
7. standby [group-number] priority priority
8. exit
9. show standby [type number [group]] [all | brief]
10. show ipv6 interface [brief] [interface-type interface-number] [prefix]
DETAILED STEPS
Device> enable
Step 4 interface type number Specifies an interface type and number, and places the
device in interface configuration mode.
Example:
Device(config-if)# exit
Step 9 show standby [type number [group]] [all | brief] Displays HSRP information.
Example:
Step 10 show ipv6 interface [brief] [interface-type Displays the usability status of interfaces configured for
interface-number] [prefix] IPv6.
Example:
Device 2 configuration
interface FastEthernet0/0.100
description DATA VLAN for Computers
encapsulation dot1Q 100
ipv6 address 2001:DB8:CAFE:2100::BAD1:1020/64
standby version 2
standby 101 preempt
standby 101 authentication ese
standby 201 ipv6 autoconfig
standby 201 preempt
standby 201 authentication ese
Device2# show standby
FastEthernet0/0.100 - Group 101 (version 2)
State is Standby
7 state changes, last state change 5w5d
Active virtual MAC address is 0000.0c9f.f065
Local virtual MAC address is 0000.0c9f.f065 (v2 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 0.936 secs
Authentication text "ese"
Preemption enabled
MAC address is 0012.7fc6.8f0c
Standby router is local
Priority 100 (default 100)
IP redundancy name is "hsrp-Fa0/0.100-101" (default)
FastEthernet0/0.100 - Group 201 (version 2)
State is Standby
7 state changes, last state change 5w5d
Virtual IP address is FE80::5:73FF:FEA0:C9
Active virtual MAC address is 0005.73a0.00c9
Local virtual MAC address is 0005.73a0.00c9 (v2 IPv6 default)
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
In Service Software Upgrace (ISSU) "In Service Software Upgrade Process" in the High Availability
Configuration Guide
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not —
been modified by this feature.
MIBs
VRRP MIB To locate and download MIBs for selected platforms, Cisco software releases, and feature sets,
use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFC 2787 Definitions of Managed Objects for the Virtual Router Redundancy Protocol
Technical Assistance
Description Link
HSRP for IPv6 Cisco IOS XE Release 3.1S The HSRP is an FHRP designed to
allow for transparent failover of the
Cisco IOS XE Release 3.9S
first-hop IPv6 router.
The following commands were
introduced or modified: show
standby, standby ipv6, standby
preempt, standby priority.
ISSU - HSRPv6 on VRF Interfaces Cisco IOS XE Release 3.1S This feature is supported in Cisco
IOS XE Release 3.1S.
NSF/SSO - HSRPv6 on VRF Cisco IOS XE Release 3.1S This feature is supported in Cisco
Interfaces IOS XE Release 3.1S.
Glossary
• CPE --Customer premises equipment
• FHRP --First hop redundancy protocol
• GLBP --Gateway load balancing protocol
• HSRP --Hot standby routing protocol
• NA --Neighbor advertisement
• ND --Neighbor Discovery
• NS --Neighbor solicitation
• PE --Provider equipment
• RA --Router advertisement
• RS --Router solicitation
HSRP version 2 has a different packet format than HSRP version 1. The packet format uses a type-length-value
(TLV) format. HSRP version 2 packets received by an HSRP version 1 device will have the type field mapped
to the version field by HSRP version 1 and subsequently ignored.
The Gateway Load Balancing Protocol (GLBP) also addresses the same restrictions relative to HSRP version
1 that HSRP version 2 does. See the Configuring GLBP document for more information on GLBP.
Jitter timers
Jitter timers are used in HSRP. They are recommended for timers running on services that work realtime and
scale. Jitter timers are intended to significantly improve the reliability of HSRP, and other FHRP protocols,
by reducing the chance of bunching of HSRP groups operations, and thus help reduce CPU and network traffic
spikes. In the case of HSRP, a given device may have up to 4000 operational groups configured. In order to
distribute the load on the device and network, the HSRP timers use a jitter. A given timer instance may take
up to 20% more than the configured value. For example, for a hold time set to 15 seconds, the actual hold
time may take 18 seconds.
In HSRP, the Hello timer (which sends the Hello Packet) has a negative Jitter, while the Holddown timer
(which checks for failure of a peer) has a positive jitter.
interface Ethernet1/0
ip address 192.168.1.1 255.255.255.0
ip address 192.168.2.1 255.255.255.0 secondary
standby 1 ip 192.168.1.254
standby 1 priority 105
standby 1 preempt
standby 2 ip 192.168.2.254 !Same network ID as secondary interface
Prior to CSCsv12265, an HSRP group remained in INIT state unless the HSRP virtual IP address had the
same network ID as the primary interface address.
In addition, the following warning message is displayed if an HSRP group address is configured when no
interface addresses are configured:
HSRP Benefits
Redundancy
HSRP employs a redundancy scheme that is time proven and deployed extensively in large networks.
Fast Failover
HSRP provides transparent fast failover of the first-hop device.
Preemption
Preemption allows a standby device to delay becoming active for a configurable amount of time.
Authentication
HSRP message digest 5 (MD5) algorithm authentication protects against HSRP-spoofing software and uses
the industry-standard MD5 algorithm for improved reliability and security.
HSRP Preemption
When a newly reloaded device becomes HSRP active, and there is already an HSRP active device on the
network, HSRP preemption may appear to not function. HSRP preemption may appear not function correctly
because the new HSRP active device did not receive any hello packets from the current HSRP active device,
and the preemption configuration never factored into the new device's decision making.
HSRP may appear to not function on some larger hardware platforms where there can be a delay in an interface
receiving packets.
In general, we recommend that all HSRP devices have the following configuration:
standby delay minimum 30 reload 60
The standby delay minimum reload interface configuration command delays HSRP groups from initializing
for the specified time after the interface comes up.
This is a different command than the standby preempt delay interface configuration command, which enables
HSRP preemption delay.
If preemption is not enabled, then a router may appear to preempt the active router if it does not receive any
Hello messages from the active router.
HSRP Addressing
HSRP devices communicate between each other by exchanging HSRP hello packets. These packets are sent
to the destination IP multicast address 224.0.0.2 (reserved multicast address used to communicate to all
devices) on UDP port 1985. The active device sources hello packets from its configured IP address and the
HSRP virtual MAC address while the standby device sources hellos from its configured IP address and the
interface MAC address, which may or may not be the burned-in MAC address (BIA).
Because hosts are configured with their default gateway as the HSRP virtual IP address, hosts must communicate
with the MAC address associated with the HSRP virtual IP address. This MAC address will be a virtual MAC
address in the format of 0000.0C07.ACxy, where xy is the HSRP group number in hexadecimal based on the
respective interface. For example, HSRP group one will use the HSRP virtual MAC address of
0000.0C07.AC01. Hosts on the adjoining LAN segment use the normal Address Resolution Protocol (ARP)
process to resolve the associated MAC addresses.
HSRP version 2 uses the new IP multicast address 224.0.0.102 to send hello packets instead of the multicast
address of 224.0.0.2, which is used by version 1. This new multicast address allows Cisco Group Management
Protocol (CGMP) leave processing to be enabled at the same time as HSRP.
HSRP version 2 permits an expanded group number range, 0 to 4095, and consequently uses a new MAC
address range 0000.0C9F.F000 to 0000.0C9F.FFFF.
HSRP Timers
For HSRP version 1, nonactive devices learn timer values from the active device, unless millisecond timer
values are being used. If millisecond timer values are being used, all devices must be configured with the
millisecond timer values. This rule applies if either the hello time or the hold time is specified in milliseconds.
This configuration is necessary because the HSRP hello packets advertise the timer values in seconds. HSRP
version 2 does not have this limitation; it advertises the timer values in milliseconds.
Jitter timers
Jitter timers are used in HSRP. They are recommended for timers running on services that work realtime and
scale. Jitter timers are intended to significantly improve the reliability of HSRP, and other FHRP protocols,
by reducing the chance of bunching of HSRP groups operations, and thus help reduce CPU and network traffic
spikes. In the case of HSRP, a given device may have up to 4000 operational groups configured. In order to
distribute the load on the device and network, the HSRP timers use a jitter. A given timer instance may take
up to 20% more than the configured value. For example, for a hold time set to 15 seconds, the actual hold
time may take 18 seconds.
In HSRP, the Hello timer (which sends the Hello Packet) has a negative Jitter, while the Holddown timer
(which checks for failure of a peer) has a positive jitter.
portion of the multicast HSRP protocol packet. This functionality provides added security and protects against
the threat from HSRP-spoofing software.
MD5 authentication provides greater security than the alternative plain text authentication scheme. MD5
authentication allows each HSRP group member to use a secret key to generate a keyed MD5 hash that is part
of the outgoing packet. A keyed hash of an incoming packet is generated and if the hash within the incoming
packet does not match the generated hash, the packet is ignored.
The key for the MD5 hash can be either given directly in the configuration using a key string or supplied
indirectly through a key chain.
HSRP has two authentication schemes:
• Plain text authentication
• MD5 authentication
HSRP authentication protects against false HSRP hello packets causing a denial-of-service attack. For example,
Device A has a priority of 120 and is the active device. If a host sends spoof HSRP hello packets with a priority
of 130, then Device A stops being the active device. If Device A has authentication configured such that the
spoof HSRP hello packets are ignored, Device A will remain the active device.
HSRP packets will be rejected in any of the following cases:
• The authentication schemes differ on the device and in the incoming packets.
• MD5 digests differ on the device and in the incoming packet.
• Text authentication strings differ on the device and in the incoming packet.
For more information see the "Configuring First Hop Redundancy Protocols in IPv6" chapter of the Cisco
IOS IPv6 Configuration Guide.
At any time, a device configured with HSRP is in one of the following states:
• Active—The device is performing packet-transfer functions.
• Init or Disabled—The device is not yet ready or able to participate in HSRP, possibly because the
associated interface is not up. HSRP groups configured on other devices on the network that are learned
via snooping are displayed as being in the Init state. Locally configured groups with an interface that is
down or groups without a specified interface IP address appear in the Init state.
• Learn—The device has not determined the virtual IP address and has not yet seen an authenticated hello
message from the active device. In this state, the device still waits to hear from the active device.
• Listen—The device is receiving hello messages.
• Speak—The device is sending and receiving hello messages.
• Standby—The device is prepared to assume packet-transfer functions if the active device fails.
HSRP uses logging Level 5 for syslog messages related to HSRP state changes to allow logging of an event
without filling up the syslog buffer on the device with low-priority Level 6 messaging.
objects that can be tracked are the line protocol state of an interface or the reachability of an IP route. If the
specified object goes down, the HSRP priority is reduced.
A client process such as HSRP, Virtual Router Redundancy Protocol (VRRP), or Gateway Load Balancing
Protocol (GLBP) can register its interest in tracking objects and then be notified when the tracked object
changes state.
For more information about object tracking, see the "Configuring Enhanced Object Tracking" document.
If the host wants to send a packet to another host on Net D, then it first sends it to its default gateway, the
virtual IP address of HSRP group 1.
The following is the packet received from the host:
Device R1 receives this packet and determines that device R4 can provide a better path to Net D, so it prepares
to send a redirect message that will redirect the host to the real IP address of device R4 (because only real IP
addresses are in its routing table).
The following is the initial ICMP redirect message sent by device R1:
Before this redirect occurs, the HSRP process of device R1 determines that device R4 is the active HSRP
device for group 3, so it changes the next hop in the redirect message from the real IP address of device R4
to the virtual IP address of group 3. Furthermore, it determines from the destination MAC address of the
packet that triggered the redirect message that the host used the virtual IP address of group 1 as its gateway,
so it changes the source IP address of the redirect message to the virtual IP address of group 1.
The modified ICMP redirect message showing the two modified fields (*) is as follows:
This second modification is necessary because hosts compare the source IP address of the ICMP redirect
message with their default gateway. If these addresses do not match, the ICMP redirect message is ignored.
The routing table of the host now consists of the default gateway, virtual IP address of group 1, and a route
to Net D through the virtual IP address of group 3.
You can adjust the advertisement interval and hold-down time using the standby redirect timers command.
default gateway of the host is the real IP address or one of the HSRP virtual IP addresses that are active on
the interface.
The IP source address of an ICMP packet must match the gateway address used by the host in the packet that
triggered the ICMP packet, otherwise the host will reject the ICMP redirect packet. An HSRP device uses the
destination MAC address to determine the gateway IP address of the host. If the HSRP device is using the
same MAC address for multiple IP addresses, uniquely determining the gateway IP address of the host is not
possible, and the redirect message is not sent.
The following is sample output from the debug standby events icmp EXEC command if HSRP could not
uniquely determine the gateway used by the host:
10:43:08: HSRP: ICMP redirect not sent to 10.0.0.4 for dest 10.0.1.2
10:43:08: HSRP: could not uniquely determine IP address for mac 00d0.bbd3.bc22
Each VPN is associated with one or more VPN routing and forwarding (VRF) instances. A VRF consists of
the following elements:
• IP routing table
• Cisco Express Forwarding table
• Set of interfaces that use the Cisco Express Forwarding forwarding table
• Set of rules and routing protocol parameters to control the information in the routing tables
VPN routing information is stored in the IP routing table and the Cisco Express Forwarding table for each
VRF. A separate set of routing and Cisco Express Forwarding tables is maintained for each VRF. These tables
prevent information from being forwarded outside a VPN and also prevent packets that are outside a VPN
from being forwarded to a device within the VPN.
HSRP adds ARP entries and IP hash table entries (aliases) using the default routing table instance. However,
a different routing table instance is used when VRF forwarding is configured on an interface, causing ARP
and ICMP echo requests for the HSRP virtual IP address to fail.
HSRP support for MPLS VPNs ensures that the HSRP virtual IP address is added to the correct IP routing
table and not to the default routing table.
and linked to the master group via the group name. These linked HSRP groups are known as client or slave
groups.
The HSRP group state of the client groups follows that of the master group. Client groups do not participate
in any sort of device election mechanism.
Client groups send periodic messages in order to refresh their virtual MAC addresses in switches and learning
bridges. The refresh message may be sent at a much lower frequency compared with the protocol election
messages sent by the master group.
HSRP—ISSU
The In Service Software Upgrade (ISSU) process allows Cisco software to be updated or otherwise modified
while packet forwarding continues. In most networks, planned software upgrades are a significant cause of
downtime. ISSU allows Cisco software to be modified while packet forwarding continues, which increases
network availability and reduces downtime caused by planned software upgrades.
For detailed information about ISSU, see the Cisco IOS In Service Software Upgrade Process document in
the High Availability Configuration Guide.
SSO HSRP
SSO HSRP alters the behavior of HSRP when a device with redundant Route Processors (RPs) is configured
for stateful switchover (SSO) redundancy mode. When an RP is active and the other RP is standby, SSO
enables the standby RP to take over if the active RP fails.
With this functionality, HSRP SSO information is synchronized to the standby RP, allowing traffic that is
sent using the HSRP virtual IP address to be continuously forwarded during a switchover without a loss of
data or a path change. Additionally, if both RPs fail on the active HSRP device, then the standby HSRP device
takes over as the active HSRP device.
The feature is enabled by default when the redundancy mode of operation is set to SSO.
SSO HSRP is required to preserve the forwarding path for traffic destined to the HSRP virtual IP address
through an RP switchover.
Configuring SSO on the edge device enables the traffic on the Ethernet links to continue during an RP failover
without the Ethernet traffic switching over to an HSRP standby device (and then back, if preemption is
enabled).
Note You may want to disable SSO HSRP by using the no standby sso command if you have LAN segments that
should switch HSRP traffic to a redundant device while SSO maintains traffic flow for other connections.
For more information about BFD, see the IP Routing: BFD Configuration Guide.
The cHsrpGrpEntry table consists of all the group information defined in RFC 2281, Cisco Hot Standby Router
Protocol; the other tables consist of the Cisco extensions to RFC 2281, which are defined in
CISCO-HSRP-EXT-MIB.my.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask
5. standby [group-number] ip [ip-address [secondary]]
6. end
7. show standby [all] [brief]
8. show standby type number [group-number | all] [brief]
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Device(config-if)# end
Step 8 show standby type number [group-number | all] [brief] (Optional) Displays HSRP information about specific
groups or interfaces.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask
5. standby delay minimum min-seconds reload reload-seconds
6. standby [group-number ] ip [ip-address [secondary]]
7. end
8. show standby delay [typenumber]
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 5 standby delay minimum min-seconds reload (Optional) Configures the delay period before the
reload-seconds initialization of HSRP groups.
Example: • The min-seconds value is the minimum time (in
seconds) to delay HSRP group initialization after an
Device(config-if)# standby delay minimum 30 reload interface comes up. This minimum delay period applies
60 to all subsequent interface events.
• The reload-seconds value is the time period to delay
after the device has reloaded. This delay period applies
only to the first interface-up event after the device has
reloaded.
Device(config-if)# end
Step 8 show standby delay [typenumber] (Optional) Displays HSRP information about delay periods.
Example:
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Device(config-if)# end
Step 10 show standby type number [group-number | all] [brief] (Optional) Displays HSRP information about specific
groups or interfaces.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. track object-number interface type number {line-protocol | ip routing}
4. exit
5. interface type number
6. standby [group-number] track object-number [decrement priority-decrement] [shutdown]
7. standby [group-number] ip [ip-address [secondary]]
8. end
9. show track [object-number | brief] [interface [brief] | ip route [brief] | resolution | timers]
DETAILED STEPS
Device> enable
Step 3 track object-number interface type number {line-protocol Configures an interface to be tracked and enters tracking
| ip routing} configuration mode.
Example:
Device(config-track)# exit
Step 5 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 6 standby [group-number] track object-number [decrement Configures HSRP to track an object and change the Hot
priority-decrement] [shutdown] Standby priority on the basis of the state of the object.
Example: • By default, the priority of the device is decreased by
10 if a tracked object goes down. Use the decrement
Device(config-if)# standby 1 track 100 decrement priority-decrement keyword and argument combination
20 to change the default behavior.
• When multiple tracked objects are down and
priority-decrement values have been configured, these
configured priority decrements are cumulative. If
tracked objects are down, but none of them were
configured with priority decrements, the default
decrement is 10 and it is cumulative.
• Use the shutdown keyword to disable the HRSP group
on the device when the tracked object goes down.
Device(config-if)# end
Step 9 show track [object-number | brief] [interface [brief] | ip Displays tracking information.
route [brief] | resolution | timers]
Example:
Note Text authentication cannot be combined with MD5 authentication for an HSRP group at any one time. When
MD5 authentication is configured, the text authentication field in HSRP hello messages is set to all zeroes on
transmit and ignored on receipt, provided the receiving device also has MD5 authentication enabled.
Note If you are changing a key string in a group of devices, change the active device last to prevent any HSRP state
change. The active device should have its key string changed no later than one hold-time period, specified by
the standy timers interface configuration command, after the nonactive devices. This procedure ensures that
the nonactive devices do not time out the active device.
SUMMARY STEPS
1. enable
2. configure terminal
3. terminal interface type number
4. ip address ip-address mask [secondary]
DETAILED STEPS
Device> enable
Step 3 terminal interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an
interface.
Example:
Step 7 standby [group-number] authentication md5 key-string Configures an authentication string for HSRP MD5
[0 | 7] key [timeout seconds] authentication.
Example: • The key argument can be up to 64 characters in length.
We recommended that at least 16 characters be used.
Device(config-if)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. key chain name-of-chain
4. key key-id
5. key-string string
6. exit
7. exit
8. interface type number
9. ip address ip-address mask [secondary]
DETAILED STEPS
Device> enable
Step 3 key chain name-of-chain Enables authentication for routing protocols, identifies a
group of authentication keys, and enters key-chain
Example:
configuration mode.
Device(config)# key chain hsrp1
Step 4 key key-id Identifies an authentication key on a key chain and enters
key-chain key configuration mode.
Example:
• The value for thekey-id argument must be a number.
Device(config-keychain)# key 100
Device(config-keychain-key)# exit
Device(config-keychain)# exit
Step 9 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an
interface.
Example:
Step 12 standby [group-number] authentication md5 key-chain Configures an authentication MD5 key chain for HSRP
key-chain-name MD5 authentication.
Example: • The key chain name must match the name specified
in Step 3.
Device(config-if)# standby 1 authentication md5
key-chain hsrp1
Device(config-if)# end
SUMMARY STEPS
1. enable
2. debug standby errors
DETAILED STEPS
Device> enable
Examples
In the following example, Device A has MD5 text string authentication configured, but Device B
has the default text authentication:
A:Jun 16 12:14:50.337:HSRP:Et0/1 Grp 0 Auth failed for Hello pkt from 10.21.0.5, MD5 confgd
but no tlv
B:Jun 16 12:16:34.287:HSRP:Et0/1 Grp 0 Auth failed for Hello pkt from 10.21.0.4, Text auth
failed
In the following example, both Device A and Device B have different MD5 authentication strings:
A:Jun 16 12:19:26.335:HSRP:Et0/1 Grp 0 Auth failed for Hello pkt from 10.21.0.5, MD5 auth
failed
B:Jun 16 12:18:46.280:HSRP:Et0/1 Grp 0 Auth failed for Hello pkt from 10.21.0.4, MD5 auth
failed
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an
interface.
Example:
Step 7 standby [group-number] authentication text string Configures an authentication string for HSRP text
authentication.
Example:
• The default string is cisco.
Device(config-if)# end
Note We recommend configuring a minimum hello-time value of 250 milliseconds and a minimum hold-time value
of 800 milliseconds.
You can use the standby delay command to allow the interface to come up completely before HSRP initializes.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask [secondary]]
5. standby [group-number] timers [msec] hellotime [msec] holdtime
6. standby [group-number] ip [ip-address [secondary]]
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 4 ip address ip-address mask [secondary]] Specifies a primary or secondary IP address for an interface.
Example:
Step 5 standby [group-number] timers [msec] hellotime [msec] Configures the time between hello packets and the time
holdtime before other devices declare the active Hot Standby or
standby device to be down.
Example:
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an interface.
Example:
Step 5 standby mac-refresh seconds Changes the interval at which packets are sent to refresh
the MAC cache when HSRP is running over FDDI.
Example:
• This command applies to HSRP running over FDDI
Device(config-if)# standby mac-refresh 100 only.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an
interface.
Example:
Device(config-if)# exit
Step 10 Repeat Steps 3 through 9 on another device. Configures multiple HSRP and enables load balancing on
another device.
Note • Client or slave groups must be on the same physical interface as the master group.
• A client group takes its state from the group it is following. Therefore, the client group does not use its
timer, priority, or preemption settings. A warning is displayed if these settings are configured on a client
group:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an interface.
Example:
Step 5 standby mac-refresh seconds Configures the HSRP client group refresh interval.
Example:
Step 6 standby group-number follow group-name Configures an HSRP group as a client group.
Example:
Device(config-if)# exit
Step 8 Repeat Steps 3 through 6 to configure additional HSRP Configures multiple HSRP client groups.
client groups.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. standby redirect [timers advertisement holddown] [unknown]
5. end
6. show standby redirect [ip-address] [interface-type interface-number] [active] [passive] [timers]
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 4 standby redirect [timers advertisement holddown] Enables HSRP filtering of ICMP redirect messages.
[unknown]
• You can also use this command in global configuration
Example: mode, which enables HSRP filtering of ICMP redirect
messages on all interfaces configured for HSRP.
Device(config-if)# standby redirect
Device(config-if)# end
Step 6 show standby redirect [ip-address] [interface-type (Optional) Displays ICMP redirect information on interfaces
interface-number] [active] [passive] [timers] configured with HSRP.
Example:
Note You cannot use the standby use-bia and standby mac-address commands in the same configuration; they
are mutually exclusive.
The standby use-bia command has the following disadvantages:
• When a device becomes active the virtual IP address is moved to a different MAC address. The newly
active device sends a gratuitous ARP response, but not all host implementations handle the gratuitous
ARP correctly.
• Proxy ARP does not function when the standby use-bia command is configured. A standby device
cannot cover for the lost proxy ARP database of the failed device.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask [secondary]
5. Enter one of the following commands:
• standby [group-number] mac-address mac-address
• or
• standby use-bia [scope interface]
• or
6. standby [group-number] ip [ip-address [secondary]]
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 5 Enter one of the following commands: Specifies a virtual MAC address for HSRP.
• standby [group-number] mac-address mac-address • This command cannot be used on a Token Ring
• or interface.
• standby use-bia [scope interface]
or
• or
Configures HSRP to use the burned-in address of the
Example: interface as its virtual MAC address.
Device(config-if)# standby 1 mac-address • The scope interface keywords specify that the
5000.1000.1060 command is configured just for the subinterface on
which it was entered, instead of the major interface.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask
5. standby [group-number] name [redundancy-name]
6. standby [group-number] ip [ip-address [secondary]]
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 5 standby [group-number] name [redundancy-name] Configures the name of the standby group.
Example: • HSRP groups have a default name of
hsrp-interface-group so specifying a group name is
Device(config-if)# standby 1 name HSRP-1 optional.
Note • HSRP version 2 is not available for ATM interfaces running LAN emulation.
• HSRP version 2 will not interoperate with HSRP version 1. An interface cannot operate both version 1
and version 2 because both versions are mutually exclusive. However, the different versions can be run
on different physical interfaces of the same device. You cannot change from version 2 to version 1 if
you have configured groups above the group number range allowed for version 1 (0 to 255).
SUMMARY STEPS
1. enable
2. configure terminal
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Device(config-if)# end
Note You may want to disable SSO HSRP by using the no standby sso command if you have LAN segments that
should switch HSRP traffic to a redundant device while SSO maintains traffic flow for other connections.
SUMMARY STEPS
1. enable
2. configure terminal
3. redundancy
4. mode sso
5. exit
6. no standby sso
7. standby sso
8. end
DETAILED STEPS
Device> enable
Device(config)# redundancy
Device(config-red)# exit
Step 6 no standby sso Disables HSRP SSO mode for all HSRP groups.
Example:
Step 7 standby sso Enables the SSO HSRP feature if you have disabled the
functionality.
Example:
Device(config)# end
SUMMARY STEPS
1. show standby
2. debug standby events ha
DETAILED STEPS
GigabitEthernet0/0/0 - Group 1
State is Active (standby RP)
Virtual IP address is 10.1.0.7
Active virtual MAC address is unknown
Local virtual MAC address is 000a.f3fd.5001 (bia)
Hello time 1 sec, hold time 3 sec
Authentication text “authword”
Preemption enabled
!Active RP
*Apr 27 04:13:47.755: HSRP: Gi0/0/1 Grp 101 RF Encode state Listen into sync buffer
*Apr 27 04:13:47.855: HSRP: CF Sync send ok
*Apr 27 04:13:57.755: HSRP: Gi0/0/1 Grp 101 RF Encode state Speak into sync buffer
*Apr 27 04:13:57.855: HSRP: CF Sync send ok
*Apr 27 04:14:07.755: HSRP: Gi0/0/1 Grp 101 RF Encode state Standby into sync buffer
*Apr 27 04:14:07.755: HSRP: Gi0/0/1 Grp 101 RF Encode state Active into sync buffer
*Apr 27 04:14:07.863: HSRP: CF Sync send ok
*Apr 27 04:14:07.867: HSRP: CF Sync send ok
!Standby RP
*Apr 27 04:11:21.011: HSRP: RF CF client 32, entity 0 got msg len 24
*Apr 27 04:11:21.011: HSRP: Gi0/0/1 Grp 101 RF sync state Init -> Listen
*Apr 27 04:11:31.011: HSRP: RF CF client 32, entity 0 got msg len 24
*Apr 27 04:11:31.011: HSRP: Gi0/0/1 Grp 101 RF sync state Listen -> Speak
*Apr 27 04:11:41.071: HSRP: RF CF client 32, entity 0 got msg len 24
*Apr 27 04:11:41.071: HSRP: RF CF client 32, entity 0 got msg len 24
*Apr 27 04:11:41.071: HSRP: Gi0/0/1 Grp 101 RF sync state Speak -> Standby
*Apr 27 04:11:41.071: HSRP: Gi0/0/1 Grp 101 RF sync state Standby -> Active
DETAILED STEPS
Device> enable
Step 3 snmp-server enable traps hsrp Enables the device to send SNMP traps and informs, and
HSRP notifications.
Example:
Step 4 snmp-server host host community-string hsrp Specifies the recipient of an SNMP notification operation,
and that HSRP notifications be sent to the host.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. bfd interval milliseconds min_rx milliseconds multiplier interval-multiplier
5. end
DETAILED STEPS
Device> enable
Device(config-if)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. ip cef [distributed]
4. interface type number
5. ip address ip-address mask
6. standby [group-number] ip [ip-address [secondary]]
7. standby bfd
8. exit
9. standby bfd all-interfaces
10. exit
11. show standby [neighbors]
DETAILED STEPS
Device> enable
Device(config)# ip cef
Step 7 standby bfd (Optional) Enables HSRP support for BFD on the interface.
Example:
Device(config-if)# exit
Step 9 standby bfd all-interfaces (Optional) Enables HSRP support for BFD on all
interfaces.
Example:
Device(config)# exit
Step 11 show standby [neighbors] (Optional) Displays information about HSRP support for
BFD.
Example:
SUMMARY STEPS
1. show standby
2. show standby brief
3. show standby neighbors [type number]
4. show bfd neighbors
5. show bfd neighbors details
DETAILED STEPS
FastEthernet2/0 - Group 1
State is Active
2 state changes, last state change 00:08:06
Virtual IP address is 10.0.0.11
Active virtual MAC address is 0000.0c07.ac01
Local virtual MAC address is 0000.0c07.ac01 (v1 default)
Hello time 3 sec, hold time 10 sec
Next hello sent in 2.772 secs
Preemption enabled
Active router is local
Standby router is 10.0.0.2, priority 90 (expires in 8.268 sec)
BFD enabled !
Priority 110 (configured 110)
Group name is "hsrp-Fa2/0-1" (default)
Example:
IPv6 Sessions
Device A Configuration
Device B Configuration
reduced and Device B will take over as the active device, thus maintaining a default virtual gateway service
to hosts on the 10.1.0.0 subnet.
Device A Configuration
Device B Configuration
Device A Configuration
Device B Configuration
If an object is already being tracked by an HSRP group, you cannot change the configuration to use the HSRP
Group Shutdown feature. You must first remove the tracking configuration using the no standby track
command and then reconfigure it using the standby track command with the shutdown keyword.
The following example shows how to change the configuration of a tracked object to include the HSRP Group
Shutdown feature:
Example: Configuring HSRP MD5 Authentication Using Key Strings and Key
Chains
The key ID for key-string authentication is always zero. If a key chain is configured with a key ID of zero,
then the following configuration will work:
Device 1
Device 2
The following example shows Router A configured as the active router for group 1 with a priority of 110 and
Router B configured as the active router for group 2 with a priority of 110. The default priority level is 100.
Group 1 uses a virtual IP address of 10.0.0.3 and Group 2 uses a virtual IP address of 10.0.0.4.
Router A Configuration
Router B Configuration
Example: Improving CPU and Network Performance with HSRP Multiple Group
Optimization
The following example shows how to configure an HSRP client and master group:
Example: Configuring HSRP Virtual MAC Addresses and BIA MAC Address
In an Advanced Peer-to-Peer Networking (APPN) network, an end node is typically configured with the MAC
address of the adjacent network node. In the following example, if the end nodes are configured to use
4000.1000.1060, HSRP group 1 is configured to use the same MAC address:
In the following example, the burned-in address of Token Ring interface 3/0 will be the virtual MAC address
mapped to the virtual IP address:
Note You cannot use the standby use-bia command and the standby mac-address command in the same
configuration.
Device(config)# redundancy
Device(config-red)# mode sso
If SSO HSRP is disabled using the no standby sso command, you can reenable it as shown in the following
example:
Device A
Device B
Device A
DeviceA(config)# ip cef
DeviceA(config)# interface FastEthernet2/0
DeviceA(config-if)# no shutdown
DeviceA(config-if)# ip address 10.0.0.2 255.0.0.0
DeviceA(config-if)# ip router-cache cef
DeviceA(config-if)# bfd interval 200 min_rx 200 multiplier 3
DeviceA(config-if)# standby 1 ip 10.0.0.11
DeviceA(config-if)# standby 1 preempt
DeviceA(config-if)# standby 1 priority 110
DeviceA(config-if)# standby 2 ip 10.0.0.12
DeviceA(config-if)# standby 2 preempt
DeviceA(config-if)# standby 2 priority 110
Device B
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
HSRP commands: complete command syntax, Cisco IOS First Hop redundancy Protocols Command
command mode, command history, defaults, usage Reference
guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not --
been modified by this feature.
MIBs
CISCO-HSRP-MIB To locate and download MIBs for selected platforms, Cisco software
CISCO-HSRP-EXT-MIB releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
Technical Assistance
Description Link
FHRP—HSRP Support for IPv6 15.2(1)S Support for IPv6 was added.
For more information see the
"Configuring First Hop
Redundancy Protocols in IPv6"
module of the Cisco IOS IPv6
Configuration Guide.
HSRP Support for ICMP Redirects 15.2(1)S The HSRP support for ICMP
Redirects feature enables ICMP
redirection on interfaces configured
with HSRP.
The following commands were
introduced or modified by this
feature:
debug standby event , debug
standby events icmp,show
standby,standby redirects
HSRP Support for MPLS VPNs 15.2(1)S HSRP support for a Multiprotocol
Label Switching (MPLS) Virtual
Private Network (VPN) interface
is useful when an Ethernet LAN is
connected between two provider
edge (PE) routers with either of the
following conditions:
There are no new or modified
commands for this feature.
Glossary
ARP—Address Resolution Protocol (ARP). ARP performs a required function in IP routing. ARP finds the
hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address.
ARP maintains a cache (table) in which MAC addresses are mapped to IP addresses. ARP is part of all Cisco
IOS systems running IP.
active device—The primary device in an HSRP group that is currently forwarding packets for the virtual
device.
active RP—The active RP that controls the system, provides network services, runs the routing protocols,
and presents the system management interface.
client group—An HSRP group that is created on a subinterface and linked to the master group via the group
name.
HSRP—Hot Standby Router Protocol. Protocol that provides high network availability and transparent
network-topology changes. HSRP creates a router group with a lead device that services all packets sent to
the HSRP address. The lead device is monitored by other devices in the group, and if it fails, one of these
standby HSRP devices inherits the lead position and the HSRP group address.
ISSU—In Service Software Upgrade. A process that allows Cisco IOS software to be updated or otherwise
modified while packet forwarding continues. In most networks, planned software upgrades are a significant
cause of downtime. ISSU allows Cisco IOS software to be modified while packet forwarding continues, which
increases network availability and reduces downtime caused by planned software upgrades.
master group—An HSRP group that is required on a physical interface for the purposes of electing active
and standby devices.
RF—Redundancy Facility. A structured, functional interface used to notify its clients of active and standby
state progressions and events.
RP—Route Processor. A generic term for the centralized control unit in a chassis.
RPR—Route Processor Redundancy. RPR provides an alternative to the High System Availability (HSA)
feature. HSA enables a system to reset and use a standby Route Processor (RP) if the active RP fails. Using
RPR, you can reduce unplanned downtime because RPR enables a quicker switchover between an active and
standby RP if the active RP experiences a fatal error.
RPR+—An enhancement to RPR in which the standby RP is fully initialized.
standby group—The set of devices participating in HSRP that jointly emulate a virtual device.
standby device—The backup device in an HSRP group.
standby RP—The backup RP.
switchover—An event in which system control and routing protocol execution are transferred from the active
RP to the standby RP. Switchover may be a manual operation or may be induced by a hardware or software
fault. Switchover may include transfer of the packet forwarding function in systems that combine system
control and packet forwarding in an indivisible unit.
virtual IP address—The default gateway IP address configured for an HSRP group.
virtual MAC address—For Ethernet and FDDI, the automatically generated MAC address when HSRP is
configured. The standard virtual MAC address used is: 0000.0C07.ACxy, where xy is the group number in
hexadecimal. The functional address is used for Token Ring. The virtual MAC address is different for HSRP
version 2.
• The multicast address 224.0.0.2 is used to send HSRP hello messages. This address can conflict with
Cisco Group Management Protocol (CGMP) leave processing.
Jitter timers
Jitter timers are used in HSRP. They are recommended for timers running on services that work realtime and
scale. Jitter timers are intended to significantly improve the reliability of HSRP, and other FHRP protocols,
by reducing the chance of bunching of HSRP groups operations, and thus help reduce CPU and network traffic
spikes. In the case of HSRP, a given device may have up to 4000 operational groups configured. In order to
distribute the load on the device and network, the HSRP timers use a jitter. A given timer instance may take
up to 20% more than the configured value. For example, for a hold time set to 15 seconds, the actual hold
time may take 18 seconds.
In HSRP, the Hello timer (which sends the Hello Packet) has a negative Jitter, while the Holddown timer
(which checks for failure of a peer) has a positive jitter.
Note • HSRP version 2 is not available for ATM interfaces running LAN emulation.
• HSRP version 2 will not interoperate with HSRP version 1. An interface cannot operate both version 1
and version 2 because both versions are mutually exclusive. However, the different versions can be run
on different physical interfaces of the same device. You cannot change from version 2 to version 1 if
you have configured groups above the group number range allowed for version 1 (0 to 255).
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask
5. standby version {1 | 2}
6. standby [group-number] ip [ip-address [secondary]]
7. end
8. show standby
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Device(config-if)# end
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
HSRP commands: complete command syntax, Cisco IOS First Hop redundancy Protocols Command
command mode, command history, defaults, usage Reference
guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not --
been modified by this feature.
MIBs
CISCO-HSRP-MIB To locate and download MIBs for selected platforms, Cisco software
CISCO-HSRP-EXT-MIB releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
Technical Assistance
Description Link
HSRP authentication protects against false HSRP hello packets causing a denial-of-service attack. For example,
Device A has a priority of 120 and is the active device. If a host sends spoof HSRP hello packets with a priority
of 130, then Device A stops being the active device. If Device A has authentication configured such that the
spoof HSRP hello packets are ignored, Device A will remain the active device.
HSRP packets will be rejected in any of the following cases:
• The authentication schemes differ on the device and in the incoming packets.
• MD5 digests differ on the device and in the incoming packet.
• Text authentication strings differ on the device and in the incoming packet.
SUMMARY STEPS
1. enable
2. configure terminal
3. key chain name-of-chain
4. key key-id
5. key-string string
6. exit
7. exit
DETAILED STEPS
Device> enable
Step 3 key chain name-of-chain Enables authentication for routing protocols, identifies a
group of authentication keys, and enters key-chain
Example:
configuration mode.
Device(config)# key chain hsrp1
Step 4 key key-id Identifies an authentication key on a key chain and enters
key-chain key configuration mode.
Example:
• The value for thekey-id argument must be a number.
Device(config-keychain)# key 100
Device(config-keychain-key)# exit
Device(config-keychain)# exit
Step 9 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an
interface.
Example:
Step 12 standby [group-number] authentication md5 key-chain Configures an authentication MD5 key chain for HSRP
key-chain-name MD5 authentication.
Example: • The key chain name must match the name specified
in Step 3.
Device(config-if)# standby 1 authentication md5
key-chain hsrp1
Device(config-if)# end
SUMMARY STEPS
1. enable
2. debug standby errors
DETAILED STEPS
Device> enable
Examples
In the following example, Device A has MD5 text string authentication configured, but Device B
has the default text authentication:
A:Jun 16 12:14:50.337:HSRP:Et0/1 Grp 0 Auth failed for Hello pkt from 10.21.0.5, MD5 confgd
but no tlv
B:Jun 16 12:16:34.287:HSRP:Et0/1 Grp 0 Auth failed for Hello pkt from 10.21.0.4, Text auth
failed
In the following example, both Device A and Device B have different MD5 authentication strings:
A:Jun 16 12:19:26.335:HSRP:Et0/1 Grp 0 Auth failed for Hello pkt from 10.21.0.5, MD5 auth
failed
B:Jun 16 12:18:46.280:HSRP:Et0/1 Grp 0 Auth failed for Hello pkt from 10.21.0.4, MD5 auth
failed
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an
interface.
Example:
Step 7 standby [group-number] authentication text string Configures an authentication string for HSRP text
authentication.
Example:
• The default string is cisco.
Device(config-if)# end
Example: Configuring HSRP MD5 Authentication Using Key Strings and Key
Chains
The key ID for key-string authentication is always zero. If a key chain is configured with a key ID of zero,
then the following configuration will work:
Device 1
Device 2
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
HSRP commands: complete command syntax, Cisco IOS First Hop redundancy Protocols Command
command mode, command history, defaults, usage Reference
guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not --
been modified by this feature.
MIBs
CISCO-HSRP-MIB To locate and download MIBs for selected platforms, Cisco software
CISCO-HSRP-EXT-MIB releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
Technical Assistance
Description Link
If the host wants to send a packet to another host on Net D, then it first sends it to its default gateway, the
virtual IP address of HSRP group 1.
The following is the packet received from the host:
Device R1 receives this packet and determines that device R4 can provide a better path to Net D, so it prepares
to send a redirect message that will redirect the host to the real IP address of device R4 (because only real IP
addresses are in its routing table).
The following is the initial ICMP redirect message sent by device R1:
source IP = router R1 IP
gateway to use = router R4 IP
Before this redirect occurs, the HSRP process of device R1 determines that device R4 is the active HSRP
device for group 3, so it changes the next hop in the redirect message from the real IP address of device R4
to the virtual IP address of group 3. Furthermore, it determines from the destination MAC address of the
packet that triggered the redirect message that the host used the virtual IP address of group 1 as its gateway,
so it changes the source IP address of the redirect message to the virtual IP address of group 1.
The modified ICMP redirect message showing the two modified fields (*) is as follows:
This second modification is necessary because hosts compare the source IP address of the ICMP redirect
message with their default gateway. If these addresses do not match, the ICMP redirect message is ignored.
The routing table of the host now consists of the default gateway, virtual IP address of group 1, and a route
to Net D through the virtual IP address of group 3.
• Dormant—Interface has no HSRP groups. A single advertisement is sent once when the last group is
removed.
• Passive—Interface has at least one nonactive group and no active groups. Advertisements are sent out
periodically.
You can adjust the advertisement interval and hold-down time using the standby redirect timers command.
10:43:08: HSRP: ICMP redirect not sent to 10.0.0.4 for dest 10.0.1.2
10:43:08: HSRP: could not uniquely determine IP address for mac 00d0.bbd3.bc22
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. standby redirect [timers advertisement holddown] [unknown]
5. end
6. show standby redirect [ip-address] [interface-type interface-number] [active] [passive] [timers]
DETAILED STEPS
Device> enable
Step 3 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 4 standby redirect [timers advertisement holddown] Enables HSRP filtering of ICMP redirect messages.
[unknown]
• You can also use this command in global configuration
Example: mode, which enables HSRP filtering of ICMP redirect
messages on all interfaces configured for HSRP.
Device(config-if)# standby redirect
Device(config-if)# end
Step 6 show standby redirect [ip-address] [interface-type (Optional) Displays ICMP redirect information on interfaces
interface-number] [active] [passive] [timers] configured with HSRP.
Example:
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
HSRP commands: complete command syntax, Cisco IOS First Hop redundancy Protocols Command
command mode, command history, defaults, usage Reference
guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not --
been modified by this feature.
MIBs
CISCO-HSRP-MIB To locate and download MIBs for selected platforms, Cisco software
CISCO-HSRP-EXT-MIB releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
Technical Assistance
Description Link
HSRP Support for ICMP Redirects 12.1(3)T The HSRP support for ICMP
Redirects feature enables ICMP
12.2(50)SY
redirection on interfaces configured
15.0(1)S with HSRP.
15.0(1)SY The following commands were
introduced or modified by this
Cisco IOS XE Release 2.1
feature:
Cisco IOS XE Release 3.9S
debug standby event , debug
standby events icmp,show
standby,standby redirects
Client groups send periodic messages in order to refresh their virtual MAC addresses in switches and learning
bridges. The refresh message may be sent at a much lower frequency compared with the protocol election
messages sent by the master group.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask [secondary]
5. standby [group-number] priority priority
6. standby [group-number] preempt [delay {minimum | reload | sync} delay]
7. standby [group-number] ip [ip-address] secondary]
8. On the same device, repeat Steps 5 through 7 to configure the device attributes for different standby
groups.
9. exit
10. Repeat Steps 3 through 9 on another device.
DETAILED STEPS
Device> enable
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an
interface.
Example:
Step 8 On the same device, repeat Steps 5 through 7 to configure For example, Device A can be configured as an active
the device attributes for different standby groups. device for group 1 and be configured as an active or
standby device for another HSRP group with different
priority and preemption values.
Device(config-if)# exit
Step 10 Repeat Steps 3 through 9 on another device. Configures multiple HSRP and enables load balancing on
another device.
HSRP client groups follow the master HSRP with a slight, random delay so that all client groups do not change
at the same time.
Use the standby mac-refresh seconds command to directly change the HSRP client group refresh interval.
The default interval is 10 seconds and can be configured to as much as 255 seconds.
Note • Client or slave groups must be on the same physical interface as the master group.
• A client group takes its state from the group it is following. Therefore, the client group does not use its
timer, priority, or preemption settings. A warning is displayed if these settings are configured on a client
group:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask [secondary]
5. standby mac-refresh seconds
6. standby group-number follow group-name
7. exit
8. Repeat Steps 3 through 6 to configure additional HSRP client groups.
DETAILED STEPS
Device> enable
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an interface.
Example:
Step 5 standby mac-refresh seconds Configures the HSRP client group refresh interval.
Example:
Step 6 standby group-number follow group-name Configures an HSRP group as a client group.
Example:
Device(config-if)# exit
Step 8 Repeat Steps 3 through 6 to configure additional HSRP Configures multiple HSRP client groups.
client groups.
The following example shows Router A configured as the active router for group 1 with a priority of 110 and
Router B configured as the active router for group 2 with a priority of 110. The default priority level is 100.
Group 1 uses a virtual IP address of 10.0.0.3 and Group 2 uses a virtual IP address of 10.0.0.4.
Router A Configuration
Router B Configuration
Example: Improving CPU and Network Performance with HSRP Multiple Group
Optimization
The following example shows how to configure an HSRP client and master group:
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
HSRP commands: complete command syntax, Cisco IOS First Hop redundancy Protocols Command
command mode, command history, defaults, usage Reference
guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not --
been modified by this feature.
MIBs
CISCO-HSRP-MIB To locate and download MIBs for selected platforms, Cisco software
CISCO-HSRP-EXT-MIB releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
Technical Assistance
Description Link
when it has been configured for object tracking and the object that is being tracked goes down. Examples of
objects that can be tracked are the line protocol state of an interface or the reachability of an IP route. If the
specified object goes down, the HSRP priority is reduced.
A client process such as HSRP, Virtual Router Redundancy Protocol (VRRP), or Gateway Load Balancing
Protocol (GLBP) can register its interest in tracking objects and then be notified when the tracked object
changes state.
For more information about object tracking, see the "Configuring Enhanced Object Tracking" document.
SUMMARY STEPS
1. enable
2. configure terminal
3. track object-number interface type number {line-protocol | ip routing}
4. exit
5. interface type number
6. standby [group-number] track object-number [decrement priority-decrement] [shutdown]
7. standby [group-number] ip [ip-address [secondary]]
8. end
9. show track [object-number | brief] [interface [brief] | ip route [brief] | resolution | timers]
DETAILED STEPS
Device> enable
Step 3 track object-number interface type number {line-protocol Configures an interface to be tracked and enters tracking
| ip routing} configuration mode.
Example:
Device(config-track)# exit
Step 5 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 6 standby [group-number] track object-number [decrement Configures HSRP to track an object and change the Hot
priority-decrement] [shutdown] Standby priority on the basis of the state of the object.
Example: • By default, the priority of the device is decreased by
10 if a tracked object goes down. Use the decrement
Device(config-if)# standby 1 track 100 decrement priority-decrement keyword and argument combination
20 to change the default behavior.
• When multiple tracked objects are down and
priority-decrement values have been configured, these
configured priority decrements are cumulative. If
tracked objects are down, but none of them were
configured with priority decrements, the default
decrement is 10 and it is cumulative.
• Use the shutdown keyword to disable the HRSP group
on the device when the tracked object goes down.
Device(config-if)# end
Step 9 show track [object-number | brief] [interface [brief] | ip Displays tracking information.
route [brief] | resolution | timers]
Example:
Note Text authentication cannot be combined with MD5 authentication for an HSRP group at any one time. When
MD5 authentication is configured, the text authentication field in HSRP hello messages is set to all zeroes on
transmit and ignored on receipt, provided the receiving device also has MD5 authentication enabled.
Note If you are changing a key string in a group of devices, change the active device last to prevent any HSRP state
change. The active device should have its key string changed no later than one hold-time period, specified by
the standy timers interface configuration command, after the nonactive devices. This procedure ensures that
the nonactive devices do not time out the active device.
SUMMARY STEPS
1. enable
2. configure terminal
3. terminal interface type number
4. ip address ip-address mask [secondary]
5. standby [group-number] priority priority
6. standby [group-number] preempt [delay {minimum | reload | sync} seconds]
7. standby [group-number] authentication md5 key-string [0 | 7] key [timeout seconds]
8. standby [group-number] ip [ip-address] [secondary]]
9. Repeat Steps 1 through 8 on each device that will communicate.
10. end
11. show standby
DETAILED STEPS
Device> enable
Step 3 terminal interface type number Configures an interface type and enters interface
configuration mode.
Example:
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an
interface.
Example:
Step 7 standby [group-number] authentication md5 key-string Configures an authentication string for HSRP MD5
[0 | 7] key [timeout seconds] authentication.
Example: • The key argument can be up to 64 characters in length.
We recommended that at least 16 characters be used.
Device(config-if)# standby 1 authentication md5
key-string d00b4r987654321a timeout 30 • No prefix to the key argument or specifying 0 means
the key will be unencrypted.
• Specifying 7 means the key will be encrypted. The
key-string authentication key will automatically be
encrypted if the service password-encryption global
configuration command is enabled.
Device(config-if)# end
Device A Configuration
Device B Configuration
Device A Configuration
Device B Configuration
If an object is already being tracked by an HSRP group, you cannot change the configuration to use the HSRP
Group Shutdown feature. You must first remove the tracking configuration using the no standby track
command and then reconfigure it using the standby track command with the shutdown keyword.
The following example shows how to change the configuration of a tracked object to include the HSRP Group
Shutdown feature:
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
HSRP commands: complete command syntax, Cisco IOS First Hop redundancy Protocols Command
command mode, command history, defaults, usage Reference
guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not --
been modified by this feature.
MIBs
CISCO-HSRP-MIB To locate and download MIBs for selected platforms, Cisco software
CISCO-HSRP-EXT-MIB releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
Technical Assistance
Description Link
With this functionality, HSRP SSO information is synchronized to the standby RP, allowing traffic that is
sent using the HSRP virtual IP address to be continuously forwarded during a switchover without a loss of
data or a path change. Additionally, if both RPs fail on the active HSRP device, then the standby HSRP device
takes over as the active HSRP device.
The feature is enabled by default when the redundancy mode of operation is set to SSO.
Note You may want to disable SSO HSRP by using the no standby sso command if you have LAN segments that
should switch HSRP traffic to a redundant device while SSO maintains traffic flow for other connections.
Note You may want to disable SSO HSRP by using the no standby sso command if you have LAN segments that
should switch HSRP traffic to a redundant device while SSO maintains traffic flow for other connections.
SUMMARY STEPS
1. enable
2. configure terminal
3. redundancy
4. mode sso
5. exit
6. no standby sso
7. standby sso
8. end
DETAILED STEPS
Device> enable
Device(config)# redundancy
Device(config-red)# exit
Step 6 no standby sso Disables HSRP SSO mode for all HSRP groups.
Example:
Step 7 standby sso Enables the SSO HSRP feature if you have disabled the
functionality.
Example:
Device(config)# end
SUMMARY STEPS
1. show standby
2. debug standby events ha
DETAILED STEPS
GigabitEthernet0/0/0 - Group 1
State is Active (standby RP)
Virtual IP address is 10.1.0.7
Active virtual MAC address is unknown
Local virtual MAC address is 000a.f3fd.5001 (bia)
Hello time 1 sec, hold time 3 sec
Authentication text “authword”
Preemption enabled
Active router is unknown
Standby router is unknown
Priority 110 (configured 120)
Track object 1 state Down decrement 10
Group name is “name1” (cfgd)
!Active RP
*Apr 27 04:13:47.755: HSRP: Gi0/0/1 Grp 101 RF Encode state Listen into sync buffer
*Apr 27 04:13:47.855: HSRP: CF Sync send ok
*Apr 27 04:13:57.755: HSRP: Gi0/0/1 Grp 101 RF Encode state Speak into sync buffer
*Apr 27 04:13:57.855: HSRP: CF Sync send ok
*Apr 27 04:14:07.755: HSRP: Gi0/0/1 Grp 101 RF Encode state Standby into sync buffer
*Apr 27 04:14:07.755: HSRP: Gi0/0/1 Grp 101 RF Encode state Active into sync buffer
*Apr 27 04:14:07.863: HSRP: CF Sync send ok
*Apr 27 04:14:07.867: HSRP: CF Sync send ok
!Standby RP
*Apr 27 04:11:21.011: HSRP: RF CF client 32, entity 0 got msg len 24
*Apr 27 04:11:21.011: HSRP: Gi0/0/1 Grp 101 RF sync state Init -> Listen
*Apr 27 04:11:31.011: HSRP: RF CF client 32, entity 0 got msg len 24
*Apr 27 04:11:31.011: HSRP: Gi0/0/1 Grp 101 RF sync state Listen -> Speak
*Apr 27 04:11:41.071: HSRP: RF CF client 32, entity 0 got msg len 24
*Apr 27 04:11:41.071: HSRP: RF CF client 32, entity 0 got msg len 24
*Apr 27 04:11:41.071: HSRP: Gi0/0/1 Grp 101 RF sync state Speak -> Standby
*Apr 27 04:11:41.071: HSRP: Gi0/0/1 Grp 101 RF sync state Standby -> Active
Device(config)# redundancy
Device(config-red)# mode sso
If SSO HSRP is disabled using the no standby sso command, you can reenable it as shown in the following
example:
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
HSRP commands: complete command syntax, Cisco IOS First Hop redundancy Protocols Command
command mode, command history, defaults, usage Reference
guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not --
been modified by this feature.
MIBs
CISCO-HSRP-MIB To locate and download MIBs for selected platforms, Cisco software
CISCO-HSRP-EXT-MIB releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
Technical Assistance
Description Link
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
HSRP commands: complete command syntax, Cisco IOS First Hop redundancy Protocols Command
command mode, command history, defaults, usage Reference
guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not --
been modified by this feature.
MIBs
CISCO-HSRP-MIB To locate and download MIBs for selected platforms, Cisco software
CISCO-HSRP-EXT-MIB releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
Technical Assistance
Description Link
The cHsrpGrpEntry table consists of all the group information defined in RFC 2281, Cisco Hot Standby Router
Protocol; the other tables consist of the Cisco extensions to RFC 2281, which are defined in
CISCO-HSRP-EXT-MIB.my.
DETAILED STEPS
Device> enable
Step 3 snmp-server enable traps hsrp Enables the device to send SNMP traps and informs, and
HSRP notifications.
Example:
Step 4 snmp-server host host community-string hsrp Specifies the recipient of an SNMP notification operation,
and that HSRP notifications be sent to the host.
Example:
Device A
Device B
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
HSRP commands: complete command syntax, Cisco IOS First Hop redundancy Protocols Command
command mode, command history, defaults, usage Reference
guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not --
been modified by this feature.
MIBs
CISCO-HSRP-MIB To locate and download MIBs for selected platforms, Cisco software
CISCO-HSRP-EXT-MIB releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
Technical Assistance
Description Link
Each VPN is associated with one or more VPN routing and forwarding (VRF) instances. A VRF consists of
the following elements:
• IP routing table
• Cisco Express Forwarding table
• Set of interfaces that use the Cisco Express Forwarding forwarding table
• Set of rules and routing protocol parameters to control the information in the routing tables
VPN routing information is stored in the IP routing table and the Cisco Express Forwarding table for each
VRF. A separate set of routing and Cisco Express Forwarding tables is maintained for each VRF. These tables
prevent information from being forwarded outside a VPN and also prevent packets that are outside a VPN
from being forwarded to a device within the VPN.
HSRP adds ARP entries and IP hash table entries (aliases) using the default routing table instance. However,
a different routing table instance is used when VRF forwarding is configured on an interface, causing ARP
and ICMP echo requests for the HSRP virtual IP address to fail.
HSRP support for MPLS VPNs ensures that the HSRP virtual IP address is added to the correct IP routing
table and not to the default routing table.
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
HSRP commands: complete command syntax, Cisco IOS First Hop redundancy Protocols Command
command mode, command history, defaults, usage Reference
guidelines, and examples
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not --
been modified by this feature.
MIBs
CISCO-HSRP-MIB To locate and download MIBs for selected platforms, Cisco software
CISCO-HSRP-EXT-MIB releases, and feature sets, use Cisco MIB Locator found at the
following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFCs Title
Technical Assistance
Description Link
Table 12: Feature Information for HSRP Support for MPLS VPNs
HSRP Support for MPLS VPNs 12.0(23)S HSRP support for a Multiprotocol
Label Switching (MPLS) Virtual
12.0(17)ST
Private Network (VPN) interface
12.2(28)SB is useful when an Ethernet LAN is
connected between two provider
12.2(17b)SXA
edge (PE) devices under certain
12.2(8)T conditions.
12.2(50)SY There are no new or modified
commands for this feature.
15.0(1)S
15.0(1)SY
Cisco IOS XE Release 2.1
• Because of the forwarding delay that is associated with the initialization of a BVI interface, you must
configure the VRRP advertise timer to a value equal to or greater than the forwarding delay on the BVI
interface. This setting prevents a VRRP router on a recently initialized BVI interface from unconditionally
taking over the master role. Use the bridge forward-time command to set the forwarding delay on the
BVI interface. Use the vrrp timers advertise command to set the VRRP advertisement timer.
The drawback to dynamic discovery protocols is that they incur some configuration and processing overhead
on the LAN client. Also, in the event of a router failure, the process of switching to another router can be
slow.
An alternative to dynamic discovery protocols is to statically configure a default router on the client. This
approach simplifies client configuration and processing, but creates a single point of failure. If the default
gateway fails, the LAN client is limited to communicating only on the local IP network segment and is cut
off from the rest of the network.
VRRP can solve the static configuration problem. VRRP enables a group of routers to form a single virtual
router. The LAN clients can then be configured with the virtual router as their default gateway. The virtual
router, representing a group of routers, is also known as a VRRP group.
VRRP is supported on Ethernet, Fast Ethernet, BVI, and Gigabit Ethernet interfaces, and on MPLS VPNs,
VRF-aware MPLS VPNs, and VLANs.
The figure below shows a LAN topology in which VRRP is configured. In this example, Routers A, B, and
C are VRRP routers (routers running VRRP) that comprise a virtual router. The IP address of the virtual router
is the same as that configured for the Ethernet interface of Router A (10.0.0.1).
Because the virtual router uses the IP address of the physical Ethernet interface of Router A, Router A assumes
the role of the virtual router master and is also known as the IP address owner. As the virtual router master,
Router A controls the IP address of the virtual router and is responsible for forwarding packets sent to this IP
address. Clients 1 through 3 are configured with the default gateway IP address of 10.0.0.1.
Routers B and C function as virtual router backups. If the virtual router master fails, the router configured
with the higher priority will become the virtual router master and provide uninterrupted service for the LAN
hosts. When Router A recovers, it becomes the virtual router master again. For more detail on the roles that
VRRP routers play and what happens if the virtual router master fails, see the VRRP Router Priority and
Preemption section.
The figure below shows a LAN topology in which VRRP is configured so that Routers A and B share the
traffic to and from clients 1 through 4 and that Routers A and B act as virtual router backups to each other if
either router fails.
In this topology, two virtual routers are configured. (For more information, see the Multiple Virtual Router
Support section.) For virtual router 1, Router A is the owner of IP address 10.0.0.1 and virtual router master,
and Router B is the virtual router backup to Router A. Clients 1 and 2 are configured with the default gateway
IP address of 10.0.0.1.
For virtual router 2, Router B is the owner of IP address 10.0.0.2 and virtual router master, and Router A is
the virtual router backup to Router B. Clients 3 and 4 are configured with the default gateway IP address of
10.0.0.2.
VRRP Benefits
Redundancy
VRRP enables you to configure multiple routers as the default gateway router, which reduces the possibility
of a single point of failure in a network.
Load Sharing
You can configure VRRP in such a way that traffic to and from LAN clients can be shared by multiple routers,
thereby sharing the traffic load more equitably among available routers.
Multiple IP Addresses
The virtual router can manage multiple IP addresses, including secondary IP addresses. Therefore, if you have
multiple subnets configured on an Ethernet interface, you can configure VRRP on each subnet.
Preemption
The redundancy scheme of VRRP enables you to preempt a virtual router backup that has taken over for a
failing virtual router master with a higher priority virtual router backup that has become available.
Authentication
VRRP message digest 5 (MD5) algorithm authentication protects against VRRP-spoofing software and uses
the industry-standard MD5 algorithm for improved reliability and security.
Advertisement Protocol
VRRP uses a dedicated Internet Assigned Numbers Authority (IANA) standard multicast address (224.0.0.18)
for VRRP advertisements. This addressing scheme minimizes the number of routers that must service the
multicasts and allows test equipment to accurately identify VRRP packets on a segment. The IANA assigned
VRRP the IP protocol number 112.
In a topology where multiple virtual routers are configured on a router interface, the interface can act as a
master for one virtual router and as a backup for one or more virtual routers.
VRRP Advertisements
The virtual router master sends VRRP advertisements to other VRRP routers in the same group. The
advertisements communicate the priority and state of the virtual router master. The VRRP advertisements are
encapsulated in IP packets and sent to the IP Version 4 multicast address assigned to the VRRP group. The
advertisements are sent every second by default; the interval is configurable.
Although the VRRP protocol as per RFC 3768 does not support millisecond timers, Cisco routers allow you
to configure millisecond timers. You need to manually configure the millisecond timer values on both the
primary and the backup routers. The master advertisement value displayed in the show vrrp command output
on the backup routers is always 1 second because the packets on the backup routers do not accept millisecond
values.
You must use millisecond timers where absolutely necessary and with careful consideration and testing.
Millisecond values work only under favorable circumstances, and you must be aware that the use of the
millisecond timer values restricts VRRP operation to Cisco devices only.
SUMMARY STEPS
1. enable
2. configure terminal
DETAILED STEPS
Router> enable
Router(config)#GigabitEthernet 0/0/0
Step 5 vrrp group description text Assigns a text description to the VRRP group.
Example:
Step 6 vrrp group priority level Sets the priority level of the router within a VRRP group.
Example: • The default priority is 100.
Step 8 vrrp group timers learn Configures the router, when it is acting as virtual router
backup for a VRRP group, to learn the advertisement
Example:
interval used by the virtual router master.
Router(config-if)# vrrp 10 timers learn
Router(config-if)# exit
EnablingVerifying VRRP
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip address ip-address mask
5. vrrp group ip ip-address [secondary]
6. show vrrp [brief all] | interface]
7. show vrrp interface type number [brief]
8. end
DETAILED STEPS
Router> enable
Step 6 show vrrp [brief all] | interface] (Optional) Displays a brief or detailed status of one or all
VRRP groups on the router.
Example:
Router(config-if)#show vrrp brief
Interface Grp Pri Time Own Pre State Master addr
Group addr
BD10 1 100 9609 Y Backup 10.1.0.2 10.1.0.10
BD10 5 200 90218 Y Master 10.1.0.1 10.1.0.50
BD10 100 100 3609 Backup 10.1.0.2 10.1.0.100
Step 7 show vrrp interface type number [brief] (Optional) Displays the VRRP groups and their status on a
specified interface.
Example:
Router(config-if)# end
Note If a VRRP group is the IP address owner, its priority is fixed at 255 and cannot be reduced through object
tracking.
SUMMARY STEPS
1. enable
2. configure terminal
3. track object-number interface type number {line-protocol | ip routing}
4. interface type number
5. vrrp group ip ip-address
6. vrrp group priority level
7. vrrp group track object-number [decrement priority]
8. end
9. show track [object-number]
DETAILED STEPS
Router> enable
Step 3 track object-number interface type number {line-protocol Configures an interface to be tracked where changes in the
| ip routing} state of the interface affect the priority of a VRRP group.
Step 5 vrrp group ip ip-address Enables VRRP on an interface and identifies the IP address
of the virtual router.
Example:
Step 6 vrrp group priority level Sets the priority level of the router within a VRRP group.
Example:
Step 7 vrrp group track object-number [decrement priority] Configures VRRP to track an object.
Example:
Router(config-if)# end
Text authentication cannot be combined with MD5 authentication for a VRRP group at any one time. When
MD5 authentication is configured, the text authentication field in VRRP hello messages is set to all zeros on
transmit and ignored on receipt, provided the receiving router also has MD5 authentication enabled.
SUMMARY STEPS
1. enable
2. configure terminal
3. terminal interface type number
4. ip address ip-address mask [secondary]
5. vrrp group authentication text text-string
6. vrrp group ip ip-address
7. Repeat Steps 1 through 6 on each router that will communicate.
8. end
DETAILED STEPS
Step 3 terminal interface type number Configures an interface type and enters interface
configuration mode.
Example:
Router(config)# interfaceGigabitEthernet 0/0/0
Ethernet 0/1
Step 4 ip address ip-address mask [secondary] Specifies a primary or secondary IP address for an interface.
Example:
Step 5 vrrp group authentication text text-string Authenticates VRRP packets received from other routers
in the group.
Example:
• If you configure authentication, all routers within the
Router(config-if)# vrrp 1 authentication text VRRP group must use the same authentication string.
textstring1
• The default string is cisco.
Step 6 vrrp group ip ip-address Enables VRRP on an interface and identifies the IP address
of the virtual router.
Example:
Router(config-if)# end
Router A
Router(config)#
Router(config)# interfaceGigabitEthernet 0/0/0interface GigabitEthernet 1/0/0
Router(config-if)# ip address 10.1.0.2 255.0.0.0
Router(config-if)# vrrp 1 priority 120
Router(config-if)# vrrp 1 authentication text cisco
Router(config-if)# vrrp 1 timers advertise 3
Router(config-if)# vrrp 1 timers learn
Router(config-if)# vrrp 1 ip 10.1.0.10
Router(config-if)# vrrp 5 priority 100
Router(config-if)# vrrp 5 timers advertise 30
Router(config-if)# vrrp 5 timers learn
Router(config-if)# vrrp 5 ip 10.1.0.50
Router(config-if)# vrrp 100 timers learn
Router(config-if)# no vrrp 100 preempt
Router(config-if)# vrrp 100 ip 10.1.0.100
Router(config-if)# no shutdown
Router B
Ethernet1/0 - Group 1
State is Master
Virtual IP address is 10.0.0.3
Virtual MAC address is 0000.5e00.0101
Advertisement interval is 1.000 sec
Preemption is enabled
min delay is 0.000 sec
Priority is 105
Track object 1 state Down decrement 15
Master Router is 10.0.0.2 (local), priority is 105
Master Advertisement interval is 1.000 sec
Master Down interval is 3.531 sec
Router# show track
Track 1
Interface Serial0/1 line-protocol
Line protocol is Down (hw down)
1 change, last change 00:06:53
Tracked by:
VRRP Ethernet1/0 1
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
In Service Software Upgrace (ISSU) "In Service Software Upgrade Process" in the High Availability
Configuration Guide
Standards
Standards Title
No new or modified standards are supported by this feature, and support for existing standards has not —
been modified by this feature.
MIBs
VRRP MIB To locate and download MIBs for selected platforms, Cisco software releases, and feature sets,
use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs
RFCs
RFCs Title
RFC 2787 Definitions of Managed Objects for the Virtual Router Redundancy Protocol
Technical Assistance
Description Link
ISSU—VRRP 15.2(1)S VRRP supports In Service Software Upgrade (ISSU). ISSU allows a
high-availability (HA) system to run in Stateful Switchover (SSO) mode even
15.3(1)S
when different versions of Cisco IOS software are running on the active and
standby Route Processors (RPs) or line cards.
This feature provides customers with the same level of HA functionality for
planned outages due to software upgrades as is available with SSO for
unplanned outages. That is, the system can switch over to a secondary RP
and continue forwarding packets without session loss and with minimal or
no packet loss.
This feature is enabled by default.
There are no new or modified commands for this feature.
SSO—VRRP 15.2(1)S VRRP is now SSO aware. VRRP can detect when a router is failing over to
the secondary RP and continue in its current VRRP group state.
15.3(1)S
This feature is enabled by default.
The following commands were introduced or modified by this feature: debug
vrrp ha,vrrp sso, show vrrp.
Virtual Router 15.2(1)S VRRP enables a group of routers to form a single virtual router to provide
Redundancy redundancy. The LAN clients can then be configured with the virtual router
15.3(1)S
Protocol as their default gateway. The virtual router, representing a group of routers,
is also known as a VRRP group.
The following commands were introduced by this feature: debug vrrp all,
debug vrrp error, debug vrrp events, debug vrrp packets, debug vrrp
state, show vrrp, show vrrp interface, vrrp authentication, vrrp
description, vrrp ip, vrrp preempt, vrrp priority, vrrp timers advertise,
vrrp timers learn.
VRRP Object 15.2(1)S The VRRP Object Tracking feature extends the capabilities of the VRRP to
Tracking allow tracking of specific objects within the router that can alter the priority
15.3(1)S
level of a virtual router for a VRRP group.
The following command was introduced by this feature: vrrp track.
The following command was modified by this feature: show track.
VRRP MIB—RFC The VRRP MIB--RFC 2787 feature enables an enhancement to the MIB for
2787 use with SNMP-based network management. The feature adds support for
configuring, monitoring, and controlling routers that use VRRP.
The following command was introduced by this feature: vrrp shutdown.
The following commands were modified by this feature: snmp-server enable
trapsandsnmp-server host.
FHRP—VRF The FHRP—VRF Aware VRRP feature enables VRRP support on MPLS
Aware VRRP VPN.
There are no new or modified commands for this feature.
Glossary
virtual IP address owner —The VRRP router that owns the IP address of the virtual router. The owner is
the router that has the virtual router address as its physical interface address.
virtual router —One or more VRRP routers that form a group. The virtual router acts as the default gateway
router for LAN clients. Also known as a VRRP group.
virtual router backup —One or more VRRP routers that are available to assume the role of forwarding
packets if the virtual router master fails.
virtual router master —The VRRP router that is currently responsible for forwarding packets sent to the IP
addresses of the virtual router. Usually the virtual router master also functions as the IP address owner.
VRRP router --A router that is running VRRP.
Note When VRRPv3 is in use, VRRPv2 is unavailable. For VRRPv3 to be configurable, the fhrp version vrrp v3
command must be used in global configuration mode
Redundancy
VRRP enables you to configure multiple devices as the default gateway device, which reduces the possibility
of a single point of failure in a network.
Load Sharing
You can configure VRRP in such a way that traffic to and from LAN clients can be shared by multiple devices,
thereby sharing the traffic load more equitably between available devices.
Multiple IP Addresses
The virtual device can manage multiple IP addresses, including secondary IP addresses. Therefore, if you
have multiple subnets configured on an Ethernet interface, you can configure VRRP on each subnet.
Note To utilize secondary IP addresses in a VRRP group, a primary address must be configured on the same group.
Preemption
The redundancy scheme of VRRP enables you to preempt a virtual device backup that has taken over for a
failing virtual device master with a higher priority virtual device backup that has become available.
Note Preemption of a lower priority master device is enabled with an optional delay.
Advertisement Protocol
VRRP uses a dedicated Internet Assigned Numbers Authority (IANA) standard multicast address for VRRP
advertisements. For IPv4, the multicast address is 224.0.0.18. For IPv6, the multicast address is
FF02:0:0:0:0:0:0:12. This addressing scheme minimizes the number of devices that must service the multicasts
and allows test equipment to accurately identify VRRP packets on a segment. The IANA has assigned VRRP
the IP protocol number 112.
priorities of 101 and 100, respectively, device B is elected to become virtual device master because it has the
higher priority. If devices B and C are both configured with the priority of 100, the virtual device backup with
the higher IP address is elected to become the virtual device master.
By default, a preemptive scheme is enabled whereby a higher priority virtual device backup that becomes
available takes over from the virtual device backup that was elected to become virtual device master. You
can disable this preemptive scheme using the no preempt command (use the vrrp address-family command
to enter the VRRP configuration mode, and enter the no preempt command). If preemption is disabled, the
virtual device backup that is elected to become virtual device master remains the master until the original
virtual device master recovers and becomes master again.
Note Preemption of a lower priority master device is enabled with an optional delay.
VRRP Advertisements
The virtual router master sends VRRP advertisements to other VRRP routers in the same group. The
advertisements communicate the priority and state of the virtual router master. The VRRP advertisements are
encapsulated into either IPv4 or IPv6 packets (based on the VRRP group configuration) and sent to the
appropriate multicast address assigned to the VRRP group. For IPv4, the multicast address is 224.0.0.18. For
IPv6, the multicast address is FF02:0:0:0:0:0:0:12. The advertisements are sent every second by default and
the interval is configurable.
Cisco routers allow you to configure millisecond timers, which is a change from VRRPv2. You need to
manually configure the millisecond timer values on both the primary and the backup routers. The master
advertisement value displayed in the show vrrp command output on the backup routers is always 1 second
because the packets on the backup routers do not accept millisecond values.
You must use millisecond timers where absolutely necessary and with careful consideration and testing.
Millisecond values work only under favorable circumstances. The use of the millisecond timer values is
compatible with third party vendors, as long as they also support VRRPv3. You can specify a timer value
between 100 milliseconds and 40000 milliseconds.
SUMMARY STEPS
1. enable
2. configure terminal
3. fhrp version vrrp v3
4. end
DETAILED STEPS
Device> enable
Step 3 fhrp version vrrp v3 Enables the ability to configure VRRPv3 and VRRS.
Example: Note When VRRPv3 is in use, VRRPv2 is unavailable.
Device(config)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. fhrp version vrrp v3
4. interface type number
5. vrrp group-id address-family {ipv4 | ipv6}
6. address ip-address [primary | secondary]
7. description group-description
8. match-address
9. preempt delay minimum seconds
10. priority priority-level
11. timers advertise interval
12. vrrpv2
13. vrrs leader vrrs-leader-name
14. shutdown
15. end
DETAILED STEPS
Device> enable
Step 3 fhrp version vrrp v3 Enables the ability to configure VRRPv3 and VRRS.
Example: Note When VRRPv3 is in use, VRRPv2 is
unavailable.
Device(config)# fhrp version vrrp v3
Step 5 vrrp group-id address-family {ipv4 | ipv6} Creates a VRRP group and enters VRRP configuration
mode.
Example:
Step 6 address ip-address [primary | secondary] Specifies a primary or secondary address for the VRRP
group.
Example:
Note VRRPv3 for IPv6 requires that a primary virtual
Device(config-if-vrrp)# address 100.0.1.10 primary link-local IPv6 address is configured to allow
the group to operate. After the primary
link-local IPv6 address is established on the
group, you can add the secondary global
addresses.
Step 7 description group-description (Optional) Specifies a description for the VRRP group.
Example:
Device(config-if-vrrp)# match-address
Step 9 preempt delay minimum seconds (Optional) Enables preemption of lower priority master
device with an optional delay.
Example:
• Preemption is enabled by default.
Device(config-if-vrrp)# preempt delay minimum 30
Step 10 priority priority-level (Optional) Specifies the priority value of the VRRP group.
Example: • The priority of a VRRP group is 100 by default.
Device(config-if-vrrp)# priority 3
Step 11 timers advertise interval (Optional) Sets the advertisement timer in milliseconds.
Example: • The advertisement timer is set to 1000 milliseconds
by default.
Device(config-if-vrrp)# timers advertise 1000
Step 13 vrrs leader vrrs-leader-name (Optional) Specifies a leader's name to be registered with
VRRS and to be used by followers.
Example:
• A registered VRRS name is unavailable by default.
Device(config-if-vrrp)# vrrs leader leader-1
Device(config)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. fhrp version vrrp v3
4. interface type number
5. fhrp delay {[minimum] [reload] seconds}
6. end
DETAILED STEPS
Device> enable
Step 3 fhrp version vrrp v3 Enables the ability to configure VRRPv3 and VRRS.
Example: Note When VRRPv3 is in use, VRRPv2 is unavailable.
Step 5 fhrp delay {[minimum] [reload] seconds} Specifies the delay period for the initialization of FHRP
clients after an interface comes up.
Example:
• The range is 0-3600 seconds.
Device(config-if)# fhrp delay minimum 5
Device(config)# end
Device> enable
Device# configure terminal
Device(config)# fhrp version vrrp v3
Device(config-if-vrrp)# end
Note In the above example, the fhrp version vrrp v3 command is used in the global configuration mode.
Note In the above example, a five-second delay period is specified for the initialization of FHRP clients
after the interface comes up. You can specify a delay period between 0 and 3600 seconds.
State is MASTER
State duration 3.707 secs
Virtual IP address is 1.0.0.10
Virtual MAC address is 0000.5E00.0101
Advertisement interval is 1000 msec
Preemption enabled
Priority is 100
Master Router is 1.0.0.1 (local), priority is 100
Master Advertisement interval is 1000 msec (expires in 686 msec)
Master Down interval is unknown
State is MASTER
State duration 3.707 secs
VRRPv3 Advertisements: sent 5 (errors 0) - rcvd 0
VRRPv2 Advertisements: sent 0 (errors 0) - rcvd 0
Group Discarded Packets: 0
VRRPv2 incompatibility: 0
IP Address Owner conflicts: 0
Invalid address count: 0
IP address configuration mismatch : 0
Invalid Advert Interval: 0
Adverts received in Init state: 0
Invalid group other reason: 0
Group State transition:
Init to master: 0
Init to backup: 1 (Last change Mon Jul 30 16:42:01.856)
Backup to master: 1 (Last change Mon Jul 30 16:42:05.469)
Master to backup: 0
Master to init: 0
Backup to init: 0
Device# exit
Standard/RFC Title
RFC 6527 Definitions of Managed Objects for the Virtual Router Redundancy Protocol Version 3
(VRRPv3)
MIBs
Technical Assistance
Description Link
VRRPv3 Protocol Support Cisco IOS XE Release 3.8S VRRP enables a group of routers
to form a single virtual router to
provide redundancy. The LAN
clients can then be configured with
the virtual router as their default
gateway. The virtual router,
representing a group of routers, is
also known as a VRRP group. The
VRRPv3 Protocol Support feature
provides the capability to support
IPv4 and IPv6 addresses.
The following commands were
introduced or modified: fhrp delay,
show vrrp, vrrp address-family.
Glossary
Virtual IP address owner—The VRRP router that owns the IP address of the virtual router. The owner is
the router that has the virtual router address as its physical interface address.
Virtual router—One or more VRRP routers that form a group. The virtual router acts as the default gateway
router for LAN clients. The virtual router is also known as a VRRP group.
Virtual router backup—One or more VRRP routers that are available to assume the role of forwarding
packets if the virtual router master fails.
Virtual router master—The VRRP router that is currently responsible for forwarding packets sent to the IP
addresses of the virtual router. Usually, the virtual router master also functions as the IP address owner.
VRRP router—A router that is running VRRP.
Each tracked object is identified by a unique number that is specified on the tracking CLI. Client processes
such as VRRP use this number to track a specific object.
The tracking process periodically polls the tracked objects and notes any change of value. The changes in the
tracked object are communicated to interested client processes, either immediately or after a specified delay.
The object values are reported as either up or down.
VRRP object tracking gives VRRP access to all the objects available through the tracking process. The tracking
process allows you to track individual objects such as a the state of an interface line protocol, state of an IP
route, or the reachability of a route.
VRRP provides an interface to the tracking process. Each VRRP group can track multiple objects that may
affect the priority of the VRRP device. You specify the object number to be tracked and VRRP is notified of
any change to the object. VRRP increments (or decrements) the priority of the virtual device based on the
state of the object being tracked.
DETAILED STEPS
Step 3 vrrp group-id address-family ipv6 Creates a VRRP group for IPv6 and enters VRRP
configuration mode.
Example:
Step 4 track object-number decrement number Configures the tracking process to track the state of the IPv6
object using the VRRPv3 group. VRRP on Ethernet
Example:
interface 0/0 then registers with the tracking process to be
informed of any changes to the IPv6 object on the VRRPv3
Device(config-if-vrrp)# track 1 decrement 20
group. If the IPv6 object state on serial interface VRRPv3
goes down, then the priority of the VRRP group is reduced
by 20.
Device(config-if-vrrp)# end
ConfigurationExamplesforVRRPv3:ObjectTrackingIntegration
Example: Tracking an IPv6 Object using VRRPv3
In the following example, the tracking process is configured to track the state of the IPv6 object using
the VRRPv3 group. VRRP on GigabitEthernet interface 0/0/0 then registers with the tracking process
to be informed of any changes to the IPv6 object on the VRRPv3 group. If the IPv6 object state on
serial interface VRRPv3 goes down, then the priority of the VRRP group is reduced by 20:
Cisco IOS commands Cisco IOS Master Command List, All Releases
HSRP commands: complete command syntax, Cisco IOS First Hop Redundancy Protocols Command
command mode, command history, defaults, usage Reference
guidelines, and examples
RFCs
RFCs Title
Technical Assistance
Description Link
A Pathway will provide some of the above features using its association with either the VRRS Pathway L2
Controller or the VRRS Pathway L3 Controller.
SUMMARY STEPS
1. enable
2. configure terminal
3. fhrp version vrrp v3
4. interface type number
5. ip address ip-address mask
6. vrrp group-id address-family {ipv4 | ipv6}
7. address ip-address [primary | secondary]
8. vrrs leader vrrs-leader-name
9. end
DETAILED STEPS
Device> enable
Step 3 fhrp version vrrp v3 Enables the ability to configure VRRPv3 and VRRS.
Example: Note When VRRPv3 is in use, VRRPv2 is unavailable.
Step 6 vrrp group-id address-family {ipv4 | ipv6} Creates a VRRP group and enters VRRP configuration
mode.
Example:
Step 7 address ip-address [primary | secondary] Specifies a primary or secondary address for the VRRP
group.
Example:
Step 8 vrrs leader vrrs-leader-name Specifies a leader’s name to be registered with VRRS and
enables a VRRP group to control a VRRS pathway.
Example:
• It is possible for a single VRRP instance to control
Device(config-if-vrrp)# vrrs leader group1 more than one VRRS group. A registered VRRS name
is unavailable by default.
Device(config-if-vrrp)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. fhrp version vrrp v3
4. interface type number
5. ip address ip-address mask
6. vrrs pathway vrrs-leader-name
7. mac address mac-address
8. address ip-address
9. end
DETAILED STEPS
Device> enable
Step 3 fhrp version vrrp v3 Enables the ability to configure VRRPv3 and VRRS.
Example: Note When VRRPv3 is in use, VRRPv2 is unavailable.
Step 6 vrrs pathway vrrs-leader-name Defines the VRRS pathway for a VRRS group and enters
VRRS pathway configuration mode.
Example:
Verifying VRRS
Perform this task to verify VRRS functions.
Note The show commands are not in any specific order. The show vrrs pathway command for different pathway
states (active, inactive, and “not ready”) is displayed below.
SUMMARY STEPS
1. enable
2. show vrrs pathway
3. show vrrs pathway
4. show vrrs pathway
5. show vrrs server
DETAILED STEPS
Step 1 enable
Enables privileged EXEC mode.
Example:
Device> enable
Pathway ["group1"@Vlan42]
State is ACTIVE [VRRS push "ACTIVE"]
Virtual MAC is fe24.fe24.fe24 [Active] (0)
Address-family is v4
Options: Default Pathway=0, Owner Mode=0, Accept-Mode=1, Configured vMAC=1
Evaluation: No Shut=1, Connected=1, OIR=1, L2 Ready=1, L3 Ready=1, vMAC Ready=1,
vIP Ready=1
Virtual Address List: 209.165.201.10
Pathway ["group1"@Et0/1]
State is INACTIVE [VRRS push "BACKUP"]
Virtual MAC is 0101.0101.0101 [Reserved] (0)
Address-family is v4
Options: Default Pathway=0, Owner Mode=0, Accept-Mode=1, Configured vMAC=1
Evaluation: No Shut=1, Connected=1, OIR=1, L2 Ready=1, L3 Ready=1, vMAC Ready=1,
vIP Ready=1
Virtual Address List: 209.165.201.10
Pathway ["group1"@Et0/1]
State is NOT READY [VRRS push "INIT"]
Virtual MAC is 0101.0101.0101 [Reserved] (0)
Address-family is v4
Options: Default Pathway=0, Owner Mode=0, Accept-Mode=1, Configured vMAC=1
Evaluation: No Shut=1, Connected=1, OIR=1, L2 Ready=1, L3 Ready=1, vMAC Ready=1,
vIP Ready=1
Virtual Address List: 209.165.201.10
Pathway ["group1"@Et0/1]
State is INACTIVE [VRRS push "BACKUP"]
Virtual MAC is 0101.0101.0101 [Reserved] (0)
Address-family is v4
Options: Default Pathway=0, Owner Mode=0, Accept-Mode=1, Configured vMAC=1
Evaluation: No Shut=1, Connected=1, OIR=1, L2 Ready=1, L3 Ready=1, vMAC Ready=1,
vIP Ready=1
Virtual Address List: 209.165.201.10
Field Description
Field Description
Default Pathway Indicates that the pathway has been implicitly created from
a VRRP group, if the value is 1. If the value is 0, it indicates
that the pathway has been explicitly created using the vrrs
pathway command.
vMAC Ready Indicates that the virtual MAC address has been assigned
to an interface if the value is 1.
vIP Ready Indicates that the virtual IP address has been assigned to an
interface if the value is 1.
Virtual Address List Address list of the virtual IPv4 or IPv6 addresses.
Note In the above example, the fhrp version vrrp v3 command is used in global configuration mode.
Note In the above example, the fhrp version vrrp v3 command is used in global configuration mode.
Additional References
Related Documents
Standard/RFC Title
Technical Assistance
Description Link
Virtual Router Redundancy Service Cisco IOS XE Release 3.8S The VRRS feature provides a
multiclient information abstraction
and management service between
VRRP, VRRS pathways, and
optional VRRS clients
The following commands were
introduced or modified: debug vrrs
all, debug vrrs database, debug
vrrs log, debug vrrs pathway, and
show vrrs.
S
show standby command 29