l3 DCNM Book
l3 DCNM Book
April, 2015
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Preface 9
This document describes the configuration details for Cisco NX-OS unicast routing in Cisco Data Center
Network Manager (DCNM).
Audience
To use this guide, you must be familiar with IP and routing technology.
Organization
This document is organized into the following chapters:
Title Description
Chapter 1, “Overview” Presents an overview of unicast routing and brief
descriptions of each feature.
Chapter 2, “Configuring IPv4” Describes how to configure and manage IPv4, including
ARP and ICMP.
Chapter 3, “Configuring IPv6” Describes how to configure and manage IPv6.
Chapter 4, “Configuring GLBP” Describes how to configure GLBP.
Chapter 5, “Configuring HSRP” Describes how to configure the Hot Standby Routing
Protocol.
Chapter 6, “Configuring Object Tracking” Describes how to configure object tracking.
Appendix 7, “IETF RFCs supported by Lists IETF RFCs supported by Cisco NX-OS.
Cisco NX-OS Unicast Features, Release
7.0x”
Document Conventions
Command descriptions use these conventions:
Convention Description
boldface font Commands and keywords are in boldface.
italic font Arguments for which you supply values are in italics.
[ ] Elements in square brackets are optional.
[x|y|z] Optional alternative keywords are grouped in brackets and separated by vertical
bars.
string A nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Caution Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Related Documentation
This section contains information about the documentation available for Cisco DCNM and for the
platforms that Cisco DCNM manages.
This section includes the following topics:
• Cisco DCNM Documentation, page 11
• Cisco Nexus 1000V Series Switch Documentation, page 11
• Cisco Nexus 2000 Series Fabric Extender Documentation, page 12
• Cisco Nexus 3000 Series Switch Documentation, page 12
• Cisco Nexus 4000 Series Switch Documentation, page 12
• Cisco Nexus 5000 Series Switch Documentation, page 12
• Cisco Nexus 7000 Series Switch Documentation, page 12
Release Notes
http://www.cisco.com/en/US/products/ps9902/tsd_products_support_series_home.html
Related Documentation
Cisco NX-OS includes the following documents:
Release Notes
This chapter provides release-specific information for each new and changed feature in the Cisco DCNM
Installation Guide, Release 7.0.xUnicast Configuration Guide, Cisco DCNM for LAN, Release 7.0.x.
The latest version of this document is available at the following Cisco website:
http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/unicast/configuration/guide/l3_nx
os-book.html
http://www.cisco.com/en/US/docs/switches/datacenter/sw/6_x/dcnm/unicast/configuration/guide/l3_dc
nm-book.htmll
To check for additional information about Cisco NX-OS Release 5.x Cisco DCNM Release 6.x, see the
Cisco NX-OS Release NotesCisco DCNM Release Notes available at the following Cisco website:
http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/release/notes/42_nx-os_release_n
ote.html
http://www.cisco.com/en/US/docs/switches/datacenter/sw/6_x/dcnm/release/notes/dcnm_6_x_relnotes.
html
Table 1 summarizes the new and changed features for the Cisco DCNM Installation Guide, Release
7.0.xUnicast Configuration Guide, Cisco DCNM for LAN, Release 7.0.x, and tells you where they are
documented.
Changed
in
Feature Description Release Where Documented
BFD Added support for BFD. 5.0(2) See the Cisco Nexus 7000 Series
NX-OS Interfaces Configuration
Guide, Release 7.0.x for more
information.
There are no changes — — —
since Release 7.0(1)
Unicast Routing No change from Release 5.1. 5.2(1) —
Object Tracking Added support for configuring object tracking on 5.1(1) Chapter 6, “Configuring Object
an IPv6 interface. Tracking”
HSRP Added support for IPv6. 5.0(2) Chapter 5, “Configuring HSRP”
IPv6 Added support IPv6 Path MTU discovery 5.0(2) Chapter 3, “Configuring IPv6”
Object Tracking Added support for IPv6. 5.0(2) Chapter 6, “Configuring Object
Tracking”
The Cisco Data Center Network Manager (DCNM) supports IP addressing, object tracking, and Gateway
Load Balancing Protocol (GLBP).
This chapter includes the following sections:
• IPv4 and IPv6, page 1-28
• First-Hop Redundancy Protocols, page 1-30
• Object Tracking, page 1-31
This chapter introduces the underlying concepts for Layer 3 unicast routing protocols in Cisco NX-OS.
This chapter includes the following sections:
• Information About Layer 3 Unicast Routing, page 1-17
• Routing Algorithms, page 1-23
• Layer 3 Virtualization, page 1-25
• Cisco NX-OS Fowarding Architecture, page 1-26
• Summary of Layer 3 Unicast Routing Features, page 1-28
• Related Topics, page 1-31
Routing Fundamentals
Routing protocols use a router path that evaluate the best path to the destination. A metric is a standard
of measurement, such as a path bandwidth, that routing algorithms use to determine the optimal path to
a destination. To aid path determination, routing algorithms initialize and maintain routing tables, that
contain route information such as the IP destination address and the address of the next router.
Destination and next-hop associations tell a router that an IP destination can be reached optimally by
sending the packet to a particular router that represents the next hop on the way to the final destination.
When a router receives an incoming packet, it checks the destination address and attempts to associate
this address with the next hop. See the “Unicast RIB” section on page 1-26 for more information about
the route table.
Routing tables can contain other information, such as the data about the desirability of a path. Routers
compare metrics to determine optimal routes, and these metrics differ depending on the design of the
routing algorithm used. See the “Routing Metrics” section on page 1-19.
Routers communicate with one another and maintain their routing tables by transmitting a variety of
messages. The routing update message is one such message that consists of all or a portion of a routing
table. By analyzing routing updates from all other routers, a router can build a detailed picture of the
network topology. A link-state advertisement, another example of a message sent between routers,
informs other routers of the link state of the sending router. You can also use link information to enable
routers to determine optimal routes to network destinations. For more information, see the “Routing
Algorithms” section on page 1-23.
Packet Switching
In packet switching, a host determines that it must send a packet to another host. Having acquired a
router address by some means, the source host sends a packet addressed specifically to the router
physical (Media Access Control [MAC]-layer) address but with the IP (network layer) address of the
destination host.
The router examines the destination IP address and tries to find the IP address in the routing table. If the
router does not know how to forward the packet, it typically drops the packet. If the router knows how
to forward the packet, it changes the destination MAC address to the MAC address of the next hop router
and transmits the packet.
The next hop might be the ultimate destination host or another router that executes the same switching
decision process. As the packet moves through the internetwork, its physical address changes, but its
protocol address remains constant (see Figure 1-1).
Source host
PC Packet
Packet
Router 1
To: Destination host (Protocol address)
Router 2 (Physical address)
Router 2
Packet
Destination host
182978
PC
Routing Metrics
Routing algorithms use many different metrics to determine the best route. Sophisticated routing
algorithms can base route selection on multiple metrics.
This section includes the following metrics:
• Path Length, page 1-20
• Reliability, page 1-20
• Routing Delay, page 1-20
• Bandwidth, page 1-20
• Load, page 1-20
• Communication Cost, page 1-20
Path Length
The path length is the most common routing metric. Some routing protocols allow you to assign arbitrary
costs to each network link. In this case, the path length is the sum of the costs associated with each link
traversed. Other routing protocols define hop count, a metric that specifies the number of passes through
internetworking products, such as routers, that a packet must take from a source to a destination.
Reliability
This is the context of routing algorithms, is the dependability (in terms of the bit-error rate) of each
network link. Some network links might go down more often than others. After a network fails, certain
network links might be repaired more easily or more quickly than other links. The reliability factors that
you can take into account when assigning the reliability rating are arbitrary numeric values that you
usually assign to network links.
Routing Delay
The routing is the length of time required to move a packet from a source to a destination through the
internetwork. The delay depends on many factors, including the bandwidth of intermediate network
links, the port queues at each router along the way, the network congestion on all intermediate network
links, and the physical distance that the packet needs to travel. Because the routing delay is a
combination of several important variables, it is a common and useful metric.
Bandwidth
This is the available traffic capacity of a link. For example, a 10-Gigabit Ethernet link would be
preferable to a 1-Gigabit Ethernet link. Although the bandwidth is the maximum attainable throughput
on a link, routes through links with greater bandwidth do not necessarily provide better routes than
routes through slower links. For example, if a faster link is busier, the actual time required to send a
packet to the destination could be greater.
Load
This is the degree to which a network resource, such as a router, is busy. You can calculate the load in a
variety of ways, including CPU utilization and packets processed per second. Monitoring these
parameters on a continual basis can be resource intensive.
Communication Cost
This is a measure of the operating cost to route over a link. The communication cost is another important
metric, especially if you do not care about performance as much as operating expenditures. For example,
the line delay for a private line might be longer than a public line, but you can send packets over your
private line rather than through the public lines that cost money for usage time.
Router IDs
Each routing process has an associated process. You can configure the router ID to any interface in the
system. If you do not configure the router ID, Cisco NX-OS selects the router ID based on the following
criteria:
• Cisco NX-OS prefers loopback0 over any other interface. If loopback0 does not exist, then Cisco
NX-OS prefers the first loopback interface over any other interface type.
• If you have not configured no loopback interfaces, Cisco NX-OS uses the first interface in the
configuration file as the router ID. If you configure any loopback interface after Cisco NX-OS
selects the router ID, the loopback interface becomes the router ID. If the loopback interface is not
loopback0 and you configure loopback0 later with an IP address, the router ID changes to the IP
address of loopback0.
• If the interface that the router ID is based on changes, that new IP address becomes the router ID. If
any other interface changes its IP address, there is no router ID change.
Autonomous Systems
A (AS) is a network controlled by a single technical administration entity. Autonomous systems divide
global external networks into individual routing domains, where local routing policies are applied. This
organization simplifies routing domain administration and simplifies consistent policy configuration.
Each autonomous system can support multiple interior routing protocols that dynamically exchange
routing information through route. The Regional Internet Registries assign a unique number to each
public autonomous system that directly connects to the Internet. This autonomous system number (AS
number) identifies both the routing process and the autonomous system.
Cisco NX-OS supports 4-byte AS numbers. Table 1-1 lists the AS number ranges.
Private autonomous system numbers are used for internal routing domains but must be translated by the
router for traffic that is routed out to the Internet. You should not configure routing protocols to advertise
private autonomous system numbers to external networks. By default, Cisco NX-OS does not remove
private autonomous system numbers from routing updates.
Note The autonomous system number assignment for public and private networks is governed by the Internet
Assigned Number Authority (IANA). For information about autonomous system numbers, including the
reserved number assignment, or to apply to register an autonomous system number, see the following
URL:
http://www.iana.org/
Convergence
A key aspect to measure for any routing algorithm is how much time a router takes to react to network
topology changes. When a part of the network changes for any reason, such as a link failure, the routing
information in different routers might not match. Some routers will have updated information about the
changed topology, other routers will still have the old information. This is the amount of time before all
routers in the network have updated, matching routing information. The convergence time varies
depending on the routing algorithm. Fast convergence minimizes the chance of lost packets caused by
inaccurate routing information.
Route Redistribution
If you have multiple routing protocols configured in your network, you can configure these protocols to
share routing information by configuring route redistribution in each protocol. For example, you can
configure Open Shortest Path First (OSPF) to advertise routes learned from the Border Gateway Protocol
(BGP). You can also redistribute static routes into any dynamic routing protocol. The router that is
redistributing routes from another protocol sets a fixed route metric for those redistributed routes. This
avoids the problem of incompatible route metrics between the different routing protocols. For example,
routes redistributed from EIGRP into OSPF are assigned a fixed link cost metric that OSPF understands.
Route redistribution also uses an administrative distance (see the “Administrative Distance” section on
page 1-22) to distinguish between routes learned from two different routing protocols. The preferred
routing protocol is given a lower administrative distance so that its routes are picked over routes from
another protocol with a higher administrative distance assigned.
Administrative Distance
The rating of the trustworthiness of a routing information source. The higher the value, the lower the
trust rating. Typically, a route can be learned through more than one protocol. Administrative distance
is used to discriminate between routes learned from more than one protocol. The route with the lowest
administrative distance is installed in the IP routing table.
Stub Routing
You can use stub routing in a hub-and-spoke network topology, where one or more end (stub) networks
are connected to a remote router (the spoke) that is connected to one or more distribution routers (the
hub). The remote router is adjacent only to one or more distribution routers. The only route for IP traffic
to follow into the remote router is through a distribution router. This type of configuration is commonly
used in WAN topologies in which the distribution router is directly connected to a WAN. The distribution
router can be connected to many more remote routers. Often, the distribution router is connected to 100
or more remote routers. In a hub-and-spoke topology, the remote router must forward all nonlocal traffic
to a distribution router, so it becomes unnecessary for the remote router to hold a complete routing table.
Generally, the distribution router sends only a default route to the remote router.
Only specified routes are propagated from the remote (stub) router. The stub router responds to all
queries for summaries, connected routes, redistributed static routes, external routes, and internal routes
with the message “inaccessible.” A router that is configured as a stub sends a special peer information
packet to all neighboring routers to report its status as a stub router.
Any neighbor that receives a packet informing it of the stub status does not query the stub router for any
routes, and a router that has a stub peer does not query that peer. The stub router depends on the
distribution router to send the proper updates to all peers.
Stub routing does not prevent routes from being advertised to the remote router. Figure 1-1 shows that
the remote router can access the corporate network and the Internet through the distribution router only.
A full route table on the remote router, in this example, serves no functional purpose because the path to
the corporate network and the Internet would always be through the distribution router. A larger route
table would reduce only the amount of memory required by the remote router. The bandwidth and
memory used can be lessened by summarizing and filtering routes in the distribution router. In this
network topology, the remote router does not need to receive routes that have been learned from other
networks because the remote router must send all nonlocal traffic, regardless of its destination, to the
distribution router. To configure a true stub network, you should configure the distribution router to send
only a default route to the remote router.
OSPF supports stub areas and EIGRP supports stub routers.
Routing Algorithms
Routing algorithms determine how a router gathers and reports reachability information, how it deals
with topology changes, and how it determines the optimal route to a destination. Various types of routing
algorithms exist, and each algorithm has a different impact on network and router resources. Routing
algorithms use a variety of metrics that affect calculation of optimal routes. You can classify routing
algorithms by type, such as static or dynamic, and interior or exterior.
This section includes the following topics:
• Static Routes and Dynamic Routing Protocols, page 1-23
• Interior and Exterior Gateway Protocols, page 1-24
• Distance Vector Protocols, page 1-24
• Link-State Protocols, page 1-24
message indicates that a network change has occurred, the routing software recalculates routes and sends
out new routing update messages. These messages permeate the network, triggering routers to rerun their
algorithms and change their routing tables accordingly.
You can supplement dynamic routing algorithms with static routes where appropriate. For example, you
should configure each subnetwork with a static route to the IP or router of last resort (a router to which
all unrouteable packets are sent).
Link-State Protocols
The protocols, also known as shortest path first (SPF), share information with neighboring routers. Each
router builds a link-state advertisement (LSA), which contains information about each link and directly
connected neighbor router.
Each LSA has a sequence number. When a router receives and LSA and updates its link-state database,
the LSA is flooded to all adjacent neighbors. If a router receives two LSAs with the same sequence
number (from the same router), the router does not flood the last LSA received to its neighbors to prevent
an LSA update loop. Because the router floods the LSAs immediately after they receive them,
convergence time for link-state protocols is minimized.
Discovering neighbors and establishing adjacency is an important part of a link state protocol. Neighbors
are discovered using special Hello packets that also serve as keepalive notifications to each neighbor
router. Adjacency is the establishment of a common set of operating parameters for the link-state
protocol between neighbor routers.
The LSAs received by a router are added to its link-state database. Each entry consists of the following
parameters:
Layer 3 Virtualization
Cisco NX-OS introduces the virtual device context (VDC), which provides separate management
domains per VDC and software fault isolation. Each VDC supports multiple Virtual Routing and
Forwarding Instances (VRFs) and multiple routing information bases to support multiple address
domains. Each VRF is associated with a routing information base (RIB) and this information is collected
by the Forwarding Information Base (FIB). Figure 1-2 shows the relationship between VDC, VRF, and
the Cisco NX-OS system.
VDC 1 VDC n
Routing VRF n
Protocol VRF
Routing VRF 1
Protocol VRF
Routing Protocol
RIBs RIBs
A VRF represents a layer 3 addressing domain. Each layer 3 interface (logical or physical) belongs to
one VRF. A VRF belongs to one VDC. Each VDC can support multiple VRFs.
See to the Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide, Release 5.x, for
details on VDCs.
Unicast RIB
The Cisco NX-OS forwarding architecture consists of multiple components, as shown in Figure 1-3.
Supervisor components
URIB Adjacency Manager (AM)
The unicast RIB exists on the active supervisor. It maintains the routing table with directly connected
routes, static routes, and routes learned from dynamic unicast routing protocols. The unicast RIB also
collects adjacency information from sources such as the Address Resolution Protocol (ARP). The
unicast RIB determines the best next-hop for a given route and populates the unicast forwarding
information bases (FIB) on the supervisors and modules by using the services of unicast FIB distribution
module (FDM).
Each dynamic routing protocol must update the unicast RIB for any route that has timed out. The unicast
RIB then deletes that route and recalculates the best next-hop for that route (if an alternate path is
available).
Adjacency Manager
The adjacency manager exists on the active supervisor and maintains adjacency information for different
protocols including ARP, Neighbor Discovery Protocol (NDP), and static configuration. The most basic
adjacency information is the Layer 3 to Layer 2 address mapping discovered by these protocols.
Outgoing layer 2 packets use the adjacency information to complete the Layer 2 header.
The adjacency manager can trigger ARP requests to find a particular Layer 3 to Layer 2 mapping. The
new mapping becomes available when the corresponding ARP reply is received and processed. For IPv6,
the adjacency manager finds the Layer 3 to Layer 2 mapping information from NDP. See Chapter 3,
“Configuring IPv6.”
FIB
The unicast FIB exists on supervisors and switching modules and builds the information used for the
hardware forwarding engine. The unicast FIB receives route updates from the unicast forwarding
distribution module and sends the information along to be programmed in the hardware forwarding
engine. The unicast FIB controls the addition, deletion, and modification of routes, paths, and
adjacencies.
The unicast FIBs are maintained on a per-VRF and per-address-family basis, that is, one for IPv4 and
one for IPv6 for each configured VRF. Based on route update messages, the unicast FIB maintains a
per-VRF prefix and next-hop adjacency information database. The next-hop adjacency data structure
contains the next-hop IP address and the Layer 2 rewrite information. Multiple prefixes could share a
next-hop adjacency information structure.
Hardware Forwarding
Cisco NX-OS supports distributed packet forwarding. The ingress port takes relevant information from
the packet header and passes the information to the local switching engine. The local switching engine
does the Layer 3 lookup and uses this information to rewrite the packet header. The ingress module
forwards the packet to the egress port. If the egress port is on a different module, the packet is forwarded
using the switch fabric to the egress module. The egress module does not participate in the Layer 3
forwarding decision.
The forwarding tables are identical on the supervisor and all the modules.
You also use the show platform fib or show platform forwarding commands to display details on
hardware forwarding.
Software Forwarding
The software forwarding path in Cisco NX-OS is used mainly to handle features that are not supported
in hardware or to handle errors encountered during hardware processing. Typically, packets with IP
options or packets that need fragmentation are passed to the CPU on the active supervisor. All packets
that should be switched in software or terminated go to the supervisor. The supervisor uses the
information provided by the unicast RIB and the adjacency manager to make the forwarding decisions.
The module is not involved in the software forwarding path.
Software forwarding is controlled by control plane policies and rate limiters. (see the Cisco Nexus 7000
Series NX-OS Security Configuration Guide, Release 5.x).
IP Services
IP Services includes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS
Client) clients.
OSPF
The OSPF protocol is a link-state routing protocol used to exchange network reachability information
within an autonomous system. Each OSPF router advertises information about its active links to its
neighbor routers. Link information consists of the link type, the link metric, and the neighbor router
connected to the link. The advertisements that contain this link information are called link-state
advertisements.
EIGRP
The EIGRP protocol is a unicast routing protocol that has the characteristics of both distance vector and
link-state routing protocols. It is an improved version of IGRP, which is a Cisco proprietary routing
protocol. EIGRP relies on its neighbors to provide the routes, typical to a distance vector routing
protocol. It constructs the network topology from the routes advertised by its neighbors, similar to a
link-state protocol, and uses this information to select loop-free paths to destinations.
IS-IS
The Intermediate System-to-Intermediate System (IS-IS) protocol is an intradomain Open System
Interconnection (OSI) dynamic routing protocol specified in International Organization for
Standardization (ISO) 10589. The IS-IS routing protocol is a link-state protocol. Features of IS-IS are
as follows:
• Hierarchical routing
• Classless behavior
• Rapid flooding of new information
• Fast Convergence
• Very scalable
BGP
The Border Gateway Protocol (BGP) is an inter-autonomous system routing protocol. A BGP router
advertises network reachability information to other BGP routers using Transmission Control Protocol
(TCP) as its reliable transport mechanism. The network reachability information includes the destination
network prefix, a list of autonomous systems that needs to be traversed to reach the destination, and the
next-hop router. Reachability information contains additional path attributes such as preference to a
route, origin of the route, community and others.
RIP
The Routing Information Protocol (RIP) is a distance-vector protocol that uses a hop count as its metric.
RIP is widely used for routing traffic in the global Internet and is an Interior Gateway Protocol (IGP),
which means that it performs routing within a single autonomous system.
Static Routing
Static routing allows you to enter a fixed route to a destination. This feature is useful for small networks
where the topology is simple. Static routing is also used with other routing protocols to control default
routes and route distribution.
Layer 3 Virtualization
Virtualization allows you to share physical resources across separate management domains. Cisco
NX-OS supports Virtual Device Contexts (VDCs) which allow you to create separate virtual systems
within a Cisco NX-OS system. Each VDC is isolated from the others, which means that a problem in one
VDC does not affect any other VDCs. VDCs are also secure from the other. You can assign separate
network operators to each VDC and these network operators cannot control or view the configuration of
a different VDC.
Cisco NX-OS also supports Layer 3 virtualization with VPN Routing and Forwarding (VRF). A VRF
provides a separate address domain for configuring layer 3 routing protocols.
Policy-Based Routing
Policy-based routing uses the Route Policy Manager to create policy route filters. These policy route
filters can forward a packet to a specified next hop based on the source of the packet or other fields in
the packet header. Policy routes can be linked to extended IP access lists so that routing might be based
on such things as protocol types and port numbers.
Object Tracking
Object Tracking
Object tracking allows you to track specific objects on the network, such as the interface line protocol
state, IP routing, and route reachability, and take action when the tracked object’s state changes. This
feature allows you to increase the availability of the network and shorten recovery time if an object state
goes down. For more information, see Chapter 6, “Configuring Object Tracking”
Related Topics
The following Cisco documents are related to the Layer 3 features:
• Cisco Nexus 7000 Series NX-OS Multicast Routing Configuration Guide, Release 5.x
• Cisco Nexus 7000 Series NX-OS High Availability and Redundancy Guide, Release 5.x
• Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide, Release 5.x
• Exploring Autonomous System Numbers:
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_9-1/autonomous_system_numb
ers.html
This chapter describes how to configure Internet Protocol version 4 (IPv4), which includes addressing,
Address Resolution Protocol (ARP), and Internet Control Message Protocol (ICMP), on the Cisco Data
Center Network Manager (DCNM) Cisco NX-OS device.
This chapter includes the following sections:
• Information About IPv4, page 2-33
• Licensing Requirements for IPv4, page 2-38
• Prerequisites for IPv4, page 2-39
• Guidelines and Limitations, page 2-39
• Default Settings, page 2-39Platform Support, page 2-39
• Configuring IPv4, page 2-40
• Configuring IP Directed Broadcasts, page 2-49
• Configuration Examples for IPv4, page 2-55
• Field Descriptions for IP, page 2-55
• Additional References, page 2-55
• Feature History for IP, page 2-55
The IP feature in the Cisco NX-OS system is responsible for handling IPv4 packets that terminate in the
supervisor module, as well as forwarding of IPv4 packets, which includes IPv4 unicast/multicast route
lookup, reverse path forwarding (RPF) checks, and software access control list/policy based routing
(ACL/PBR) forwarding. The IP feature also manages the network interface IP address configuration,
duplicate address checks, static routes, and packet send/receive interface for IP clients.
This section includes the following topics:
• Multiple IPv4 Addresses, page 2-34
• Address Resolution Protocol, page 2-35
• ARP Caching, page 2-35
• Static and Dynamic Entries in the ARP Cache, page 2-36
• Devices That Do Not Use ARP, page 2-36
• Reverse ARP, page 2-36
• Reverse ARP, page 2-36
• Proxy ARP, page 2-37
• Local Proxy ARP, page 2-37
• Gratuitous ARP, page 2-37
• Glean Throttling, page 2-38
• Path MTU Discovery, page 2-38
• ICMP, page 2-38
• Virtualization Support, page 2-38
Note If any device on a network segment uses a secondary IPv4 address, all other devices on that same
network interface must also use a secondary address from the same network or subnet. The inconsistent
use of secondary addresses on a network segment can quickly cause routing loops.
When the destination device lies on a remote network which is beyond another device, the process is the
same except that the device that sends the data sends an ARP request for the MAC address of the default
gateway. After the address is resolved and the default gateway receives the packet, the default gateway
broadcasts the destination IP address over the networks connected to it. The device on the destination
device network uses ARP to obtain the MAC address of the destination device and delivers the packet.
ARP is enabled by default.
The default system-defined CoPP policy rate-limits ARP broadcast packets bound for the supervisor
module. The default system-defined CoPP policy prevents an ARP broadcast storm from affecting the
control plane traffic, but does not affect bridged packets.
ARP Caching
ARP caching minimizes broadcasts and limits wasteful use of network resources. The mapping of IP
addresses to MAC addresses occurs at each hop (device) on the network for every packet sent over an
internetwork, which may affect network performance.
ARP caching stores network addresses and the associated data-link addresses in memory for a period of
time, which minimizes the use of valuable network resources to broadcast for the same address each time
a packet is sent. You must maintain the cache entries since the cache entries are set to expire periodically
because the information might become outdated. Every device on a network updates its tables as
addresses are broadcast.
Reverse ARP
Reverse ARP (RARP) as defined by RFC 903 works the same way as ARP, except that the RARP request
packet requests an IP address instead of a MAC address. RARP often is used by diskless workstations
because this type of device has no way to store IP addresses to use when they boot. The only address that
is known is the MAC address because it is burned into the hardware.
Use of RARP requires an RARP server on the same network segment as the router interface. Figure 2-2
illustrates how RARP works.
There are several limitations of RARP. Because of these limitations, most businesses use DHCP to assign
IP addresses dynamically. DHCP is cost effective and requires less maintenance than RARP. The
following are the most important limitations:
• Since RARP uses hardware addresses, if the internetwork is large with many physical networks, a
RARP server must be on every segment with an additional server for redundancy. Maintaining two
servers for every segment is costly.
• Each server must be configured with a table of static mappings between the hardware addresses and
IP addresses. Maintenance of the IP addresses is difficult.
• RARP only provides IP addresses of the hosts and not subnet masks or default gateways.
Proxy ARP
Proxy ARP enables a device that is physically located on one network appear to be logically part of a
different physical network connected to the same device or firewall. Proxy ARP allows you to hide a
device with a public IP address on a private network behind a router, and still have the device appear to
be on the public network in front of the router. By hiding its identity, the router accepts responsibility
for routing packets to the real destination. Proxy ARP can help devices on a subnet reach remote subnets
without configuring routing or a default gateway.
When devices are not in the same data link layer network but in the same IP network, they try to transmit
data to each other as if they are on the local network. However, the router that separates the devices does
not send a broadcast message because routers do not pass hardware-layer broadcasts and the addresses
cannot be resolved.
When you enable Proxy ARP on the device and it receives an ARP request, it identifies the request as a
request for a system that is not on the local LAN. The device responds as if it is the remote destination
for which the broadcast is addressed, with an ARP response that associates the device’s MAC address
with the remote destination's IP address. The local device believes that it is directly connected to the
destination, while in reality its packets are being forwarded from the local subnetwork toward the
destination subnetwork by their local device. By default, Proxy ARP is disabled.
Gratuitous ARP
Gratuitous ARP sends a request with identical source IP address and destination IP address to detect
duplicate IP addresses. Cisco NX-OS Release 4.0(3) and later releases support enabling or disabling
gratuitous ARP requests or ARP cache updates.
Glean Throttling
When forwarding an incoming IP packet in a line card, if the Address Resolution Protocol (ARP) request
for the next hop is not resolved, the line card forwards the packets to the supervisor (glean throttling).
The supervisor resolves the MAC address for the next hop and programs the hardware.
The Cisco Nexus 7000 Series device hardware has glean rate limiters to protect the supervisor from the
glean traffic. If the maximum number of entries is exceeded, the packets for which the ARP request is
not resolved continues to be processed in the software instead of getting dropped in the hardware.
When an ARP request is sent, the software adds a /32 drop adjacency in the hardware to prevent the
packets to the same next-hop IP address to be forwarded to the supervisor. When the ARP is resolved,
the hardware entry is updated with the correct MAC address. If the ARP entry is not resolved before a
timeout period, the entry is removed from the hardware
ICMP
You can use ICMP to provide message packets that report errors and other information that is relevant
to IP processing. ICMP generates error messages, such as ICMP destination unreachable messages,
ICMP Echo Requests (which send a packet on a round trip between two hosts) and Echo Reply messages.
ICMP also provides many diagnostic functions and can send and redirect error packets to the host. By
default, ICMP is enabled.
Some of the ICMP message types are as follows:
• Network error messages
• Network congestion messages
• Troubleshooting information
• Timeout announcements
Note ICMP redirects are disabled on interfaces where the local proxy ARP feature is enabled.
Virtualization Support
IPv4 supports Virtual Routing and Forwarding instances (VRFs). VRFs exist within virtual device
contexts (VDCs). By default, Cisco NX-OS places you in the default VDC and default VRF unless you
specifically configure another VDC and VRF.
Default Settings
Table 2-1 lists the default settings for IP parameters.
Parameters Default
ARP timeout 1500 seconds
proxy ARP Disabled
Platform Support
The following platforms support this feature but may implement it differently. For platform-specific
information, including guidelines and limitations, system defaults, and configuration limits, see the
corresponding documentation.
Platform Documentation
Cisco Nexus 1000V Series Switches (mgmt0 Cisco Nexus 1000V Series Switches Documentation
port only)
Platform Documentation
Cisco Nexus 4000 Series Switches (mgmt0 Cisco Nexus 4000 Series Switches Documentation
port only)
Cisco Nexus 7000 Series Switches Cisco Nexus 7000 Series Switches Documentation
Configuring IPv4
You can access IP addressing for Layer 3 interfaces from the Interfaces feature selection.
For more information about the Data Center Network Manager features, see the Fundamentals
Configuration Guide, Cisco DCNM for LAN, Release 5.x .
This section includes the following topics:
• Configuring IPv4 Addressing, page 2-40
• Configuring Multiple IP Addresses, page 2-42
• Configuring a Static ARP Entry, page 2-44
• Configuring Proxy ARP, page 2-45
• Configuring Local Proxy ARP, page 2-46
• Configuring Path MTU Discovery, page 2-47
• Configuring Path MTU Discovery, page 2-47
• Configuring IP Directed Broadcasts, page 2-49
• Configuring IP Glean Throttling, page 2-50
• Configuring the Hardware IP Glean Throttle Maximum, page 2-51
• Configuring a Hardware IP Glean Throttle Timeout, page 2-52
• Configuring the Hardware IP Glean Throttle Syslog, page 2-53
Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature
might differ from the Cisco IOS commands that you would use.
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. interface ethernet number
3. ip address ip-address/length
4. show ip interface
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Interfaces > Physical > Ethernet.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, double-click the device to display a list of slots.
Step 3 Double-click the slot to display a list of interfaces.
Step 4 Click the interface that you want to configure as a routed interface.
The system highlights the interface in the Summary pane, and tabs appear in the Details pane.
Step 5 From the Details pane, click the Port Details tab.
The Port Details tab appears.
Step 6 From the Port Details tab, expand the Port Mode Settings section.
The port mode appears.
Step 7 From the Mode drop-down list, choose Routed.
The IP address information appears in the Details pane and Cisco NX-OS removes any Layer 2
configuration.
Step 8 (Optional) From the IPv4 Address Settings, set the Primary field to the IPv4 address for this routed
interface.
Step 9 (Optional) Set the Net mask field to the network mask for this IPv4 address in dotted decimal notation.
Step 10 From the menu bar, choose File > Deploy to apply your changes to the device.
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface ethernet number Enters interface configuration mode.
Example:
switch(config)# interface ethernet 2/3
switch(config-if)#
Command Purpose
Step 3 ip address ip-address/length Specifies a primary or secondary IPv4 address for an
[secondary] interface.
Example: • The network mask can be a four-part dotted
switch(config-if)# ip address 192.2.1.1 decimal address. For example, 255.0.0.0 indicates
255.0.0.0
that each bit equal to 1 means the corresponding
address bit belongs to the network address.
• The network mask can be indicated as a slash (/)
and a number - a prefix length. The prefix length
is a decimal value that indicates how many of the
high-order contiguous bits of the address
comprise the prefix (the network portion of the
address). A slash must precede the decimal value
and there is no space between the IP address and
the slash.
Step 4 show ip interface (Optional) Displays interfaces configured for IPv4.
Example:
switch(config-if)# show ip interface
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if)# copy running-config
startup-config
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. interface ethernet number
3. ip address ip-address/length
4. show ip interface
5. copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Interfaces > Physical > Ethernet.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, double-click the device to display a list of slots.
Step 3 Double-click the slot to display a list of interfaces.
Step 4 Click the interface that you want to configure as a routed interface.
The system highlights the interface in the Summary pane, and tabs appear in the Details pane.
Step 5 From the Details pane, click the Port Details tab.
The Port Details tab appears.
Step 6 From the Port Details tab, expand the Port Mode Settings section.
The port mode appears.
Step 7 (Optional) From the IPv4 Address settings section, in the Secondary area, right-click and choose
Add Secondary IP to add a secondary IP address.
Step 8 From the secondary area, in the IP address field, enter an IPv4 address.
Step 9 From the net mask field, enter the network mask for this IPv4 address in dotted decimal notation.
Step 10 (Optional) From the IPv4 Address settings section, in the Helper area, right-click and choose
Add Helper IP to add a helper IP address.
Step 11 From the Helper area, in the IP address field, enter an IPv4 address.
Step 12 From the menu bar, choose File > Deploy to apply your changes to the device.
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface ethernet number Enters interface configuration mode.
Example:
switch(config)# interface ethernet 2/3
switch(config-if)#
Step 3 ip address ip-address/length Specifies the configured address as a secondary IPv4
[secondary] address.
Example:
switch(config-if)# ip address 192.2.1.1
255.0.0.0 secondary
Command Purpose
Step 4 show ip interface (Optional) Displays interfaces configured for IPv4.
Example:
switch(config-if)# show ip interface
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if)# copy running-config
startup-config
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. interface ethernet number
3. ip arp ipaddr mac_addr
4. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface ethernet number Enters interface configuration mode.
Example:
switch(config)# interface ethernet 2/3
switch(config-if)#
Step 3 ip arp ipaddr mac_addr Associates an IP address with a MAC address as a
static entry.
Example:
switch(config-if)# ip arp 192.2.1.1
0019.076c.1a78
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if)# copy running-config
startup-config
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. interface ethernet number
3. ip proxy-arp
4. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface ethernet number Enters interface configuration mode.
Example:
switch(config)# interface ethernet 2/3
switch(config-if)#
Step 3 ip proxy-arp Enables Proxy ARP on the interface.
Example:
switch(config-if)# ip proxy-arp
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if)# copy running-config
startup-config
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. interface ethernet number
3. ip local-proxy-arp
4. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface ethernet number Enters interface configuration mode.
Example:
switch(config)# interface ethernet 2/3
switch(config-if)#
Step 3 ip local-proxy-arp Enables Local Proxy ARP on the interface.
Example:
switch(config-if)# ip local-proxy-arp
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if)# copy running-config
startup-config
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. interface ethernet number
3. ip arp gratuitous {request | update}
4. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface ethernet number Enters interface configuration mode.
Example:
switch(config)# interface ethernet 2/3
switch(config-if)#
Step 3 ip arp gratuitous {request | update} Enables gratuitous ARP on the interface. Default is
enabled.
Example:
switch(config-if)# ip arp gratuitous
request
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if)# copy running-config
startup-config
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. interface ethernet number
3. ip tcp path-mtu-discovery
4. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface ethernet number Enters interface configuration mode.
Example:
switch(config)# interface ethernet 2/3
switch(config-if)#
Step 3 ip tcp path-mtu-discovery Enables path MTU discovery.
Example:
switch(config-if)# ip tcp
path-mtu-discovery
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if)# copy running-config
startup-config
To enable IDS checks, use the following commands in global configuration mode:
Command Purpose
hardware ip verify address {destination Performs the following IDS checks on the IP address:
zero | identical | reserved | source
• destination zero—Drops IP packets if the
{broadcast | multicast}}
destination IP address is 0.0.0.0.
• identical—Drops IP packets if the source IP address
is identical to the destination IP address.
• reserved—Drops IP packets if the IP address is in
the 127.x.x.x range.
• source—Drops IP packets if the IP source address is
either 255.255.255.255 (broadcast) or in the
224.x.x.x range (multicast).
hardware ip verify checksum Drops IP packets if the packet checksum is invalid.
hardware ip verify fragment Drops IP packets if the packet fragment has a nonzero
offset and the DF bit is active.
hardware ip verify length {consistent | Performs the following IDS checks on the IP address:
maximum {max-frag | max-tcp | udp} |
• consistent—Drops IP packets where the Ethernet
minimum}
frame size is greater than or equal to the IP packet
length plus the Ethernet header.
• maximum max-frag—Drops IP packets if the
maximum fragment offset is greater than 65536.
• maximum max-tcp—Drops IP packets if the TCP
length is greater than the IP payload length.
• maximum udp—Drops IP packets if the IP payload
length is less than the UDP packet length.
• minimum—Drops IP packets if the Ethernet frame
length is less than the IP packet length plus four
octets (the CRC length).
hardware ip verify tcp tiny-frag Drops TCP packets if the IP fragment offset is 1, or if the
IP fragment offset is 0 and the IP payload length is less
than 16.
hardware ip verify version Drops IP packets if the ethertype is not set to 4 (IPv4).
Use the show hardware forwarding ip verify command to display the IP packet verification
configuration.
"exploded" as a broadcast on the destination subnet. The destination address in the IP header of the
packet is rewritten to the configured IP broadcast address for the subnet, and the packet is sent as a
link-layer broadcast.
If directed broadcast is enabled for an interface, incoming IP packets whose addresses identify them as
directed broadcasts intended for the subnet to which that interface is attached will be exploded as
broadcasts on that subnet.
To enable IP directed broadcasts, use the following command in interface configuration mode:
Command Purpose
ip directed-broadcast Enables the translation of a directed broadcast to physical
broadcasts
Note We recommend that you configure the IP glean throttle feature by using the hardware ip glean throttle
command to filter the unnecessary glean packets that are sent to the supervisor for ARP resolution for
the next hops that are not reachable or do not exist. IP glean throttling boosts software performance and
helps to manage traffic more efficiently.
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. hardware ip glean throttle
3. no hardware ip glean throttle
4. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 hardware ip glean throttle Enables ARP throttling.
Example:
switch(config)# hardware ip glean
throttle
Step 3 no hardware ip glean throttle Disables ARP throttling.
Example:
switch(config)# no hardware ip glean
throttle
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config)# copy running-config
startup-config
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. hardware ip glean throttle maximum count
3. no hardware ip glean throttle maximum count
4. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 hardware ip glean throttle maximum count Configures the number of drop adjacencies that will
be installed in the FIB.
Example:
switch(config)# hardware ip glean
throttle maximum 2134
Step 3 no hardware ip glean throttle maximum Applies the default limits.
count
The default value is 1000. The range is from 0 to
Example: 32767 entries.
switch(config)# no hardware ip glean
throttle maxumum 2134
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config)# copy running-config
startup-config
This example shows how to limit the maximum number of drop adjacencies that will be installed in the
FIB:
switch# config t
switch(config)# hardware ip glean throttle maximum 2134
switch(config-if)# copy running-config startup-config
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. hardware ip glean throttle timeout timeout-in-sec
3. no hardware ip glean throttle timeout timeout-in-sec
4. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 hardware ip glean throttle maximum Configures the timeout for the installed drop
timeout timeout-in-sec adjacencies to remain in the FIB.
Example:
switch(config)# hardware ip glean
throttle maximum timeout 300
Step 3 no hardware ip glean throttle maximum Applies the default limits.
timeout timeout-in-sec
The timeout value is in seconds. The range is from 300
Example: seconds (5 minutes) to 1800 seconds (30 minutes).
switch(config)# no hardware ip glean
throttle maxumum timeout 300 Note After the timeout period is exceeded, the drop
adjacencies are removed from the FIB.
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config)# copy running-config
startup-config
This example shows how to configure a timeout for the drop adjacencies that will be installed in the
switch# config t
switch(config)# hardware ip glean throttle maximum timeout 300
switch(config-if)# copy running-config startup-config
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. hardware ip glean throttle syslog pck-count
3. no hardware ip glean throttle syslog pck-count
4. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 hardware ip glean throttle syslog Generates a syslog if the number of packets that get
pck-count dropped for a specific flow exceed the configured
Example:
packet count.
switch(config)# hardware ip glean
throttle syslog 1030
Step 3 no hardware ip glean throttle syslog Applies the default limits.
pck-count
The default is 10000 packet hit. The range is from 0 to
Example: 65535 packets.
switch(config)# no hardware ip glean
throttle syslog 1030 Note After the timeout period is exceeded, the drop
adjacencies are removed from the FIB.
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config)# copy running-config
startup-config
This example shows how to generate a syslog if the number of packets that get dropped for a specific
flow exceeds the configured packet count:
switch# config t
switch(config)# hardware ip glean throttle syslog 1030
switch(config-if)# copy running-config startup-config
Command Purpose
show hardware forwarding ip verify Displays the IP packet verification configuration.
show ip adjacency Displays the adjacency table.
show ip adjacencysummary Displays the summary of number of throttle adjacencies.
show ip arp Displays the ARP table.
show ip arp summary Displays the summary of number of throttle adjacencies.
show ip adjacency throttle statistics Displays only the throttled adjacencies.
show ip interface Displays IP related interface information.
show ip arp statistics [vrf vrf-name] Displays the ARP statistics.
Additional References
For additional information related to implementing IP, see the following sections:
• Related Documents, page 2-55
• Standards, page 2-55
Related Documents
Related Topic Document Title
IP CLI commands Cisco Nexus 7000 Series NX-OS Unicast Routing Command
Reference
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
This chapter describes how to configure Internet Protocol version 6 (IPv6), which includes addressing,
Neighbor Discovery Protocol (ND), and Internet Control Message Protocol version 6 (ICMPv6), on the
Cisco Data Center Network Manager (DCNM). Cisco NX-OS device
This chapter includes the following sections:
• Information About IPv6, page 3-57
• Licensing Requirements for IPv6, page 3-74
• Prerequisites for IPv6, page 3-74
• Guidelines and Limitations for IPv6, page 3-74
• Guidelines and Limitations for IPv6, page 3-74
• Default Settings, page 3-74Configuring IPv6, page 3-75
• Verifying the IPv6 Configuration, page 3-82
• Configuration Examples for IPv6, page 3-82
• Additional References, page 3-82
• Feature History for IPv6, page 3-83
IPv6 addresses contain consecutive zeros within the address. You can use two colons (::) at the
beginning, middle, or end of an IPv6 address to replace the consecutive zeros. Table 3-1 shows a list of
compressed IPv6 address formats.
Note You can use two colons (::) only once in an IPv6 address to replace the longest string of consecutive
zeros within the address.
You can use a double colon as part of the IPv6 address when consecutive 16-bit values are denoted as
zero. You can configure multiple IPv6 addresses per interface but only one link-local address.
The hexadecimal letters in IPv6 addresses are not case sensitive.
A node may use the loopback address listed in Table 3-1 to send an IPv6 packet to itself. The loopback
address in IPv6 is the same as the loopback address in IPv4. For more information, see Chapter 1,
“Overview.”
Note You cannot assign the IPv6 loopback address to a physical interface. A packet that contains the IPv6
loopback address as its source or destination address must remain within the node that created the packet.
IPv6 routers do not forward packets that have the IPv6 loopback address as their source or destination
address.
Note You cannot assign an IPv6 unspecified address to an interface. You should not use the unspecified IPv6
addresses as destination addresses in IPv6 packets or the IPv6 routing header.
The IPv6-prefix is in the form documented in RFC 2373 where the IPv6 address is specified in
hexadecimal using 16-bit values between colons. The prefix length is a decimal value that indicates how
many of the high-order contiguous bits of the address comprise the prefix (the network portion of the
address). For example, 2001:0DB8:8086:6502::/32 is a valid IPv6 prefix.
Aggregator (TLA) and Next-Level Aggregator (NLA). The IETF decided to remove the TLS and NLA
fields from the RFCs because these fields are policy based. Some existing IPv6 networks deployed
before the change might still use networks that are on the older architecture.
A subnet ID, which is a 16-bit subnet field, can be used by individual organizations to create a local
addressing hierarchy and to identify subnets. A subnet ID is similar to a subnet in IPv4, except that an
organization with an IPv6 subnet ID can support up to 65,535 individual subnets.
An interface ID identifies interfaces on a link. The interface ID is unique to the link. In many cases, an
interface ID is the same as or based on the link-layer address of an interface. Interface IDs used in
aggregatable global unicast and other IPv6 address types are 64 bits long and are in the modified EUI-64
format.
Interface IDs are in the modified EUI-64 format in one of the following ways:
• For all IEEE 802 interface types (for example, Ethernet, and Fiber Distributed Data interfaces), the
first three octets (24 bits) are the Organizationally Unique Identifier (OUI) of the 48-bit link-layer
address (MAC address) of the interface, the fourth and fifth octets (16 bits) are a fixed hexadecimal
value of FFFE, and the last three octets (24 bits) are the last three octets of the MAC address. The
Universal/Local (U/L) bit, which is the seventh bit of the first octet, has a value of 0 or 1. Zero
indicates a locally administered identifier; 1 indicates a globally unique IPv6 interface identifier.
• For all other interface types (for example, serial, loopback, ATM, Frame Relay, and tunnel interface
types—except tunnel interfaces used with IPv6 overlay tunnels), the interface ID is similar to the
interface ID for IEEE 802 interface types; however, the first MAC address from the pool of MAC
addresses in the router is used as the identifier (because the interface does not have a MAC address).
• For tunnel interface types that are used with IPv6 overlay tunnels, the interface ID is the IPv4
address assigned to the tunnel interface with all zeros in the high-order 32 bits of the identifier.
Note For interfaces that use the Point-to-Point Protocol (PPP), where the interfaces at both ends of the
connection might have the same MAC address, the interface identifiers at both ends of the
connection are negotiated (picked randomly and, if necessary, reconstructed) until both
identifiers are unique. The first MAC address in the router is used as the identifier for interfaces
using PPP.
If no IEEE 802 interface types are in the router, link-local IPv6 addresses are generated on the interfaces
in the router in the following sequence:
1. The router is queried for MAC addresses (from the pool of MAC addresses in the router).
2. If no MAC addresses are available in the router, the serial number of the router is used to form the
link-local addresses.
3. If the serial number of the router cannot be used to form the link-local addresses, the router uses a
Message Digest 5 (MD5) hash to determine the MAC address of the router from the hostname of the
router.
Link-Local Addresses
A link-local address is an IPv6 unicast address that can be automatically configured on any interface
using the link-local prefix FE80::/10 (1111 1110 10) and the interface identifier in the modified EUI-64
format. Link-local addresses are used in the neighbor discovery protocol and the stateless
autoconfiguration process. Nodes on a local link can use link-local addresses to communicate; the nodes
do not need globally unique addresses to communicate. Figure 3-1 shows the structure of a link-local
address.
IPv6 routers cannot forward packets that have link-local source or destination addresses to other links.
128 bits
0 Interface ID
1111 1110 10
FE80::/10
52669
10 bits
96 bits 32 bits
0 IPv4 address
::192.168.30.1
52727
= ::C0A8:1E01
• If it is accidentally leaked outside of a site via routing or Domain Name Server (DNS), there is no
conflict with any other addresses.
Figure 3-3 shows the structure of a unique local address.
/7 /48 /64
Local IPv6
Subnet prefix
Link prefix
232389
• Subnet ID — 16-bit subnet ID is an identifier of a subnet within the site.
• Interface ID — 64-bit ID
Site-Local Address
Because RFC 3879 deprecates the use of site-local addresses, you should follow the recommendations
of unique local addressing (ULA) in RFC 4193 when you configure private IPv6 addresses.
Note Anycast addresses can be used only by a router, not a host. Anycast addresses cannot be used as the
source address of an IPv6 packet.
Figure 3-4 shows the format of the subnet router anycast address; the address has a prefix concatenated
by a series of zeros (the interface ID). The subnet router anycast address can be used to reach a router
on the link that is identified by the prefix in the subnet router anycast address.
128 bits
52670
Prefix 0000000000000...000
128 bits
0 Interface ID
4 bits 4 bits
1111 1111
0 if permanent
F F Lifetime Scope Lifetime =
1 if temporary
1 = node
8 bits 8 bits 2 = link
Scope = 5 = site
8 = organization
52671
E = global
IPv6 nodes (hosts and routers) are required to join (where received packets are destined for) the
following multicast groups:
• All-nodes multicast group FF02:0:0:0:0:0:0:1 (the scope is link-local)
• Solicited-node multicast group FF02:0:0:0:0:1:FF00:0000/104 for each of its assigned unicast and
anycast addresses
IPv6 routers must also join the all-routers multicast group FF02:0:0:0:0:0:0:2 (the scope is link-local).
The solicited-node multicast address is a multicast group that corresponds to an IPv6 unicast or anycast
address. IPv6 nodes must join the associated solicited-node multicast group for every unicast and
anycast address to which it is assigned. The IPv6 solicited-node multicast address has the prefix
FF02:0:0:0:0:1:FF00:0000/104 concatenated with the 24 low-order bits of a corresponding IPv6 unicast
or anycast address (see Figure 3-6). For example, the solicited-node multicast address that corresponds
to the IPv6 address 2037::01:800:200E:8C6C is FF02::1:FF0E:8C6C. Solicited-node addresses are used
in neighbor solicitation messages.
128 bits
52672
Note IPv6 has no broadcast addresses. IPv6 multicast addresses are used instead of broadcast addresses.
32 bits
Field Description
Version Similar to the Version field in the IPv4 packet header, except that the
field lists number 6 for IPv6 instead of number 4 for IPv4.
Traffic Class Similar to the Type of Service field in the IPv4 packet header. The
Traffic Class field tags packets with a traffic class that is used in
differentiated services.
Flow Label New field in the IPv6 packet header. The Flow Label field tags
packets with a specific flow that differentiates the packets at the
network layer.
Payload Length Similar to the Total Length field in the IPv4 packet header. The
Payload Length field indicates the total length of the data portion of
the packet.
Next Header Similar to the Protocol field in the IPv4 packet header. The value of
the Next Header field determines the type of information following
the basic IPv6 header. The type of information following the basic
IPv6 header can be a transport-layer packet, for example, a TCP or
UDP packet, or an Extension Header, as shown in Figure 3-8.
Hop Limit Similar to the Time to Live field in the IPv4 packet header. The value
of the Hop Limit field specifies the maximum number of routers that
an IPv6 packet can pass through before the packet is considered
invalid. Each router decrements the value by one. Because no
checksum is in the IPv6 header, the router can decrement the value
without needing to recalculate the checksum, which saves processing
resources.
Source Address Similar to the Source Address field in the IPv4 packet header, except
that the field contains a 128-bit source address for IPv6 instead of a
32-bit source address for IPv4.
Destination Address Similar to the Destination Address field in the IPv4 packet header,
except that the field contains a 128-bit destination address for IPv6
instead of a 32-bit destination address for IPv4.
Source Address
40
octets
Destination Address
51458
32 bits
Optional extension headers and the data portion of the packet are after the eight fields of the basic IPv6
packet header. If present, each extension header is aligned to 64 bits. There is no fixed number of
extension headers in an IPv6 packet. Each extension header is identified by the Next Header field of the
previous header. Typically, the final extension header has a Next Header field of a transport-layer
protocol, such as TCP or UDP. Figure 3-9 shows the IPv6 extension header format.
IPv6
packet
Any number of
extension headers
Table 3-3 lists the extension header types and their Next Header field values.
Next Header
Header Type Value Description
Hop-by-hop options header 0 Header that is processed by all hops in the path of a
packet. When present, the hop-by-hop options header
always follows immediately after the basic IPv6
packet header.
Destination options header 6 Header that can follow any hop-by-hop options
header. The header is processed at the final destination
and at each visited address specified by a routing
header. Alternatively, the destination options header
can follow any Encapsulating Security Payload (ESP)
header. The destination options header is processed
only at the final destination.
Routing header 43 Header that is used for source routing.
Fragment header 44 Header that is used when a source fragments a packet
that is larger than the Maximum Transmission Unit
(MTU) for the path between itself and a destination.
The Fragment header is used in each fragmented
packet.
Upper-layer headers 6 (TCP) Headers that are used inside a packet to transport the
data. The two main transport protocols are TCP and
17 (UDP)
UDP.
Note IPv6 also supports the reverse mapping of IPv6 addresses to DNS names.
Note In IPv6, the minimum link MTU is 1280 octets. We recommend that you use an MTU value of 1500
octets for IPv6 links.
Note The IPv6 header does not have a checksum. But a checksum is important on the transport layer to
determine misdelivery of packets. All checksum calculations that include the IP address in the
calculation must be modified for IPv6 to accommodate the new 128-bit address. A checksum is
generated using a pseudo header.
The ICMPv6 Data field contains error or diagnostic information that relates to IP packet processing.
Figure 3-10 shows the IPv6 ICMP packet header format.
IPv6
packet
Any number of
extension headers
52673
A and B can now exchange
packets on this link
After receiving the neighbor solicitation message, the destination node replies by sending a neighbor
advertisement message, which has a value of 136 in the Type field of the ICMP packet header, on the
local link. The source address is the IPv6 address of the node (the IPv6 address of the node interface that
sends the neighbor advertisement message). The destination address is the IPv6 address of the node that
sent the neighbor solicitation message. The data portion includes the link-layer address of the node that
sends the neighbor advertisement message.
After the source node receives the neighbor advertisement, the source node and destination node can
communicate.
Neighbor solicitation messages can verify the reachability of a neighbor after a node identifies the
link-layer address of a neighbor. When a node wants to verify the reachability of a neighbor, it uses the
destination address in a neighbor solicitation message as the unicast address of the neighbor.
Neighbor advertisement messages are also sent when there is a change in the link-layer address of a node
on a local link. When there is a change, the destination address for the neighbor advertisement is the
all-nodes multicast address.
Neighbor unreachability detection identifies the failure of a neighbor or the failure of the forward path
to the neighbor and is used for all paths between hosts and neighboring nodes (hosts or routers).
Neighbor unreachability detection is performed for neighbors to which only unicast packets are being
sent and is not performed for neighbors to which multicast packets are being sent.
A neighbor is considered reachable when a positive acknowledgment is returned from the neighbor
(indicating that packets previously sent to the neighbor have been received and processed). A positive
acknowledgment—from an upper-layer protocol (such as TCP)—indicates that a connection is making
forward progress (reaching its destination). If packets are reaching the peer, they are also reaching the
next-hop neighbor of the source. Forward progress is also a confirmation that the next-hop neighbor is
reachable.
For destinations that are not on the local link, forward progress implies that the first-hop router is
reachable. When acknowledgments from an upper-layer protocol are not available, a node probes the
neighbor using unicast neighbor solicitation messages to verify that the forward path is still working.
The return of a solicited neighbor advertisement message from the neighbor is a positive
acknowledgment that the forward path is still working (neighbor advertisement messages that have the
solicited flag set to a value of 1 are sent only in response to a neighbor solicitation message). Unsolicited
messages confirm only the one-way path from the source to the destination node; solicited neighbor
advertisement messages indicate that a path is working in both directions.
Note A neighbor advertisement message that has the solicited flag set to a value of 0 is not considered as a
positive acknowledgment that the forward path is still working.
Neighbor solicitation messages are also used in the stateless autoconfiguration process to verify the
uniqueness of unicast IPv6 addresses before the addresses are assigned to an interface. Duplicate address
detection is performed first on a new, link-local IPv6 address before the address is assigned to an
interface (the new address remains in a tentative state while duplicate address detection is performed).
A node sends a neighbor solicitation message with an unspecified source address and a tentative
link-local address in the body of the message. If another node is already using that address, the node
returns a neighbor advertisement message that contains the tentative link-local address. If another node
is simultaneously verifying the uniqueness of the same address, that node also returns a neighbor
solicitation message. If no neighbor advertisement messages are received in response to the neighbor
solicitation message and no neighbor solicitation messages are received from other nodes that are
attempting to verify the same tentative address, the node that sent the original neighbor solicitation
message considers the tentative link-local address to be unique and assigns the address to the interface.
Router Router
advertisement advertisement
RAs are also sent in response to router solicitation messages. Router solicitation messages, which have
a value of 133 in the Type field of the ICMP packet header, are sent by hosts at system startup so that
the host can immediately autoconfigure without needing to wait for the next scheduled RA message. The
source address is usually the unspecified IPv6 address (0:0:0:0:0:0:0:0). If the host has a configured
unicast address, the unicast address of the interface that sends the router solicitation message is used as
the source address in the message. The destination address is the all-routers multicast address with a
scope of the link. When an RA is sent in response to a router solicitation, the destination address in the
RA message is the unicast address of the source of the router solicitation message.
You can configure the following RA message parameters:
• The time interval between periodic RA messages
• The router life-time value, which indicates the usefulness of a router as the default router (for use
by all nodes on a given link)
• The network prefixes in use on a given link
• The time interval between neighbor solicitation message retransmissions (on a given link)
• The amount of time that a node considers a neighbor reachable (for use by all nodes on a given link)
The configured parameters are specific to an interface. The sending of RA messages (with default
values) is automatically enabled on Ethernet interfaces. For other interface types, you must enter the no
ipv6 nd suppress-ra command to send RA messages. You can disable the RA message feature on
individual interfaces by entering the ipv6 nd suppress-ra command.
Host H
Device B Device A
IPv6 packet
60981
Subsequent IPv6 packets
Note A router must be able to determine the link-local address for each of its neighboring routers in order to
ensure that the target address (the final destination) in a redirect message identifies the neighbor router
by its link-local address. For static routing, you should specify the address of the next-hop router using
the link-local address of the router. For dynamic routing, you must configure all IPv6 routing protocols
to exchange the link-local addresses of neighboring routers.
After forwarding a packet, a router sends a redirect message to the source of the packet under the
following circumstances:
• The destination address of the packet is not a multicast address.
• The packet was not addressed to the router.
• The packet is about to be sent out the interface on which it was received.
• The router determines that a better first-hop node for the packet resides on the same link as the
source of the packet.
• The source address of the packet is a global IPv6 address of a neighbor on the same link or a
link-local address.
Virtualization Support
IPv6 supports Virtual Routing and Forwarding instances (VRFs). VRFs exist within virtual device
contexts (VDCs). By default, Cisco NX-OS places you in the default VDC and default VRF unless you
specifically configure another VDC and VRF.
Default Settings
Table 3-5 lists the default settings for IPv6 parameters.
Parameters Default
ND reachable time 0 milliseconds
neighbor solicitation retransmit interval 1000 milliseconds
Platform Support
The following platforms support this feature but may implement it differently. For platform-specific
information, including guidelines and limitations, system defaults, and configuration limits, see the
corresponding documentation.
Platform Documentation
Cisco Nexus 1000V Series Switches (mgmt0 Cisco Nexus 1000V Series Switches Documentation
port only)
Cisco Nexus 4000 Series Switches (mgmt0 Cisco Nexus 4000 Series Switches Documentation
port only)
Cisco Nexus 7000 Series Switches Cisco Nexus 7000 Series Switches Documentation
Configuring IPv6
You can configure IPv6 addresses for Layer 3 interfaces from the Interfaces feature selection.
For more information about the Data Center Network Manager features, see the Fundamentals
Configuration Guide, Cisco DCNM for LAN, Release 5.x .
This section includes the following topics:
• Configuring IPv6 Addressing, page 3-75
• Configuring an IPv6 Secondary Address, page 3-78
• Configuring IPv6 Neighbor Discovery, page 3-78
• Configuring IPv6 Packet Verification, page 3-81
Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature
might differ from the Cisco IOS commands that you would use.
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. interface ethernet number
3. ipv6 address {addr [eui64] [route-preference preference] [secondary] tag tag-id]]
or
ipv6 address ipv6-address use-link-local-only
4. show ipv6 interface
5. copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Interfaces > Physical > Ethernet.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, double-click the device to display a list of slots.
Step 3 Double-click the slot to display a list of interfaces.
Step 4 Click the interface that you want to configure as a routed interface.
The system highlights the interface in the Summary pane, and tabs appear in the Details pane.
Step 5 From the Details pane, click the Port Details tab.
The Port Details tab appears.
Step 6 From the Port Details tab, expand the Port Mode Settings section.
The port mode appears.
Step 7 From the Mode drop-down list, choose Routed.
The IP address information appears in the Details pane and Cisco NX-OS removes any Layer 2
configuration.
Step 8 From the IPv6 Address Settings area, set the Primary/prefix-length field to the IPv6 address and prefix
length for this routed interface.
The length range is from 1 to 128.
Step 9 (Optional) To set EUI64, check EUI64.
Step 10 (Optional) From the Link local field, enter the link local IPv6 address.
Step 11 (Optional) To set this routed interface for link-local routing only, check Use local only.
Step 12 From the menu bar, choose File > Deploy to apply your changes to the device.
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface ethernet number Enters interface configuration mode.
Example:
switch(config)# interface ethernet 2/3
switch(config-if)#
Command Purpose
Step 3 ipv6 address {addr [eui64] Specifies an IPv6 address assigned to the interface and
[route-preference preference] enables IPv6 processing on the interface.
[secondary] tag tag-id]
or Specifying the ipv6 address command configures
ipv6 address ipv6-address global IPv6 addresses with an interface identifier (ID)
use-link-local-only
in the low-order 64 bits of the IPv6 address. Only the
Example: 64-bit network prefix for the address needs to be
switch(config-if)# ipv6 address specified; the last 64 bits are automatically computed
2001:0DB8::1/10 from the interface ID.
or
switch(config-if)# ipv6 address Specifying the ipv6 address use-link-local-only
use-link-local-only command configures a link-local address on the
interface that is used instead of the link-local address
that is automatically configured when IPv6 is enabled
on the interface.
Enables IPv6 processing on an interface without
configuring an IPv6 address.
Step 4 show ipv6 interface (Optional) Displays interfaces configured for IPv6.
Example:
switch(config-if)# show ipv6 interface
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if)# copy running-config
startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Interfaces > Physical > Ethernet.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, double-click the device to display a list of slots.
Step 3 Double-click the slot to display a list of interfaces.
Step 4 Click the interface that you want to configure as a routed interface.
The system highlights the interface in the Summary pane, and tabs appear in the Details pane.
Step 5 From the Details pane, click the Port Details tab.
The Port Details tab appears.
Step 6 From the Port Details tab, expand the Port Mode Settings section.
The port mode appears.
Step 7 From the IPv6 Address settings section, in the Secondary area, right-click and choose
Add IPv6 Address to add a secondary IPv6 address.
Step 8 From the IP Address/Prefix-length field, enter the IPv6 address and prefix length for this secondary IPv6
address.
Step 9 (Optional) To set EUI64 format, check EUI64.
Step 10 From the menu bar, choose File > Deploy to apply your changes to the device.
Ensure that you are in the correct VDC (or use the switchto vdc command). You must first enable IPv6
on the interface.
SUMMARY STEPS
1. config t
2. interface ethernet number
3. ipv6 nd
4. show ipv6 nd interface
5. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface ethernet number Enters interface configuration mode.
Example:
switch(config)# interface ethernet 2/31
switch(config-if)#
Step 3 ipv6 nd Enables IPv6 neighbor discovery on the interface.
Example:
switch(config-if)# ipv6 nd
Step 4 show ipv6 nd interface (Optional) Displays interfaces configured for IPv6
neighbor discovery.
Example:
switch(config-if)# show ipv6 nd
interface
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if)# copy running-config
startup-config
This example shows how to configure IPv6 neighbor discovery reachable time:
switch# config t
switch(config)# interface ethernet 3/1
switch(config-if)# ipv6 nd reachable-time 10
Command Purpose
ipv6 nd hop-limit Configures the maximum number of hops used in router
advertisements and all IPv6 packets that are originated by
the router.
ipv6 nd managed-config-flag Sets the managed address configuration flag in IPv6 router
advertisements.
ipv6 nd mtu Sets the maximum transmission unit (MTU) size of IPv6
packets sent on an interface.
ipv6 nd ns-interval Configures the interval between IPv6 neighbor solicitation
retransmissions on an interface.
ipv6 nd other-config-flag Configures the other stateful configuration flag in IPv6
router advertisements.
ipv6 nd ra-interval Configures the interval between IPv6 router advertisement
(RA) transmissions on an interface.
ipv6 nd ra-lifetime Configures the router lifetime value in IPv6 router
advertisements on an interface.
ipv6 nd reachable-time Configures the amount of time that a remote IPv6 node is
considered reachable after some reachability confirmation
event has occurred.
ipv6 nd redirects Enables ICMPv6 redirect messages to be sent.
ipv6 nd retrans-timer Configures the advertised time between neighbor
solicitation messages in router advertisements.
ipv6 nd suppress-ra Suppresses IPv6 router advertisement transmissions on a
LAN interface.
Command Purpose
hardware ip verify address {destination Performs the following IDS checks on the IPv6 address:
zero | identical | reserved | source
• destination zero—Drops IPv6 packets if the
multicast}
destination IP address is ::.
• identical—Drops IPv6 packets if the source IPv6
address is identical to the destination IPv6 address.
• reserved—Drops IPv6 packets if the IPv6 address is
in the ::1 range.
• source multicast—Drops IPv6 packets if the IPv6
source address is in the FF00::/8 range (multicast).
hardware ip verify checksum Drops IPv6 packets if the packet checksum is invalid.
hardware ip verify fragment Drops IPv6 packets if the packet fragment has a nonzero
offset and the DF bit is active.
hardware ipv6 verify length {consistent | Performs the following IDS checks on the IPv6 address:
maximum {max-frag | max-tcp | udp}}
• consistent—Drops IPv6 packets where the Ethernet
frame size is greater than or equal to the IPv6 packet
length plus the Ethernet header.
• maximum max-frag—Drops IPv6 packets if the
formula (IPv6 Payload Length – IPv6 Extension
Header Bytes) + (Fragment Offset * 8) is greater than
65536.
• maximum max-tcp—Drops IPv6 packets if the TCP
length is greater than the IP payload length.
• maximum udp—Drops IPv6 packets if the IPv6
payload length is less than the UDP packet length.
hardware ipv6 verify tcp tiny-frag Drops TCP packets if the IPv6 fragment offset is 1, or if
the IPv6 fragment offset is 0 and the IP payload length is
less than 16.
hardware ipv6 verify version Drops IPv6 packets if the ethertype is not set to 6 (IPv6).
Use the show hardware forwarding ip verify command to display the IPv6 packet verification
configuration.
Command Purpose
show hardware forwarding ip verify Displays the IPv4 and IPv6 packet verification
configuration.
show ipv6 interface Displays IPv6 related interface information.
show ipv6 adjacency Displays the adjacency table.
show ipv6 icmp Displays ICMPv6 information.
show ipv6 nd Displays IPv6 neighbor discovery interface information.
show ipv6 neighbor Displays IPv6 neighbor entry.
Additional References
For additional information related to implementing IPv6, see the following sections:
• Related Documents, page 3-83
• Standards, page 3-83
Related Documents
Related Topic Document Title
IPv6 CLI commands Cisco Nexus 7000 Series NX-OS Unicast Routing Command
Reference
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
This chapter describes how to configure the Gateway Load Balancing Protocol (GLBP) on the Cisco
Data Center Network Manager (DCNM)NX-OS device.
This chapter includes the following sections:
• Information About GLBP, page 4-85
• Licensing Requirements for GLBP, page 4-90
• Prerequisites for GLBP, page 4-91
• Guidelines and Limitations, page 4-91
• Default Settings, page 4-91
• Platform Support, page 4-92
• Configuring GLBP, page 4-92
• Verifying the GLBP Configuration, page 4-105
• Configuration Examples for GLBP, page 4-105
• Field Descriptions for GLBP, page 4-105
• Additional References, page 4-109
• Feature History for GLBP, page 4-109
GLBP Overview
GLBP provides automatic gateway backup for IP hosts configured with a single default gateway on an
IEEE 802.3 LAN. Multiple routers on the LAN combine to offer a single virtual first-hop IP gateway
while sharing the IP packet forwarding load. Other routers on the LAN may act as redundant GLBP
gateways that become active if any of the existing forwarding gateways fail.
GLBP performs a similar function to the Hot Standby Redundancy Protocol (HSRP) and the Virtual
Router Redundancy Protocol (VRRP). HSRP and VRRP allow multiple routers to participate in a virtual
group configured with a virtual IP address. These protocols elect one member as the active router to
forward packets to the virtual IP address for the group. The other routers in the group are redundant until
the active router fails.
GLBP performs an additional load balancing function that the other protocols do not provide. GLBP load
balances over multiple routers (gateways) using a single virtual IP address and multiple virtual MAC
addresses. GLBP shares the forwarding load among all routers in a GLBP group instead of allowing a
single router to handle the whole load while the other routers remain idle. You configure each host with
the same virtual IP address, and all routers in the virtual group participate in forwarding packets. GLBP
members communicate between each other using periodic hello messages.
Note Packets received on a routed port destined for the GLBP virtual IP address will terminate on the local
router, regardless of whether that router is the active GLBP router or a redundant GLBP router. This
includes ping and Telnet traffic. Packets received on a Layer 2 (VLAN) interface destined for the GLBP
virtual IP address will terminate on the active router.
Router A Router B
AVG 1 AVF 1.2
AVF 1.1
Virtual IP address 192.0.2.1 Virtual MAC 0007.b400.0102
Virtual MAC 0007.b400.0101
Client 1 Client 2
185062
Default gateway: Virtual IP address 192.0.2.1 Virtual IP address 192.0.2.1
Gateway MAC: Virtual MAC 0007.b400.0101 Virtual MAC 0007.b400.0102
If router A becomes unavailable, client 1 does not lose access to the WAN because router B assumes
responsibility for forwarding packets sent to the virtual MAC address of router A and for responding to
packets sent to its own virtual MAC address. Router B also assumes the role of the AVG for the entire
GLBP group. Communication for the GLBP members continues despite the failure of a router in the
GLBP group.
GLBP Authentication
GLBP has three authentication types:
• MD5 authentication
• Plain text authentication
• No authentication
MD5 authentication provides greater security than plain text authentication. MD5 authentication allows
each GLBP group member to use a secret key to generate a keyed MD5 hash that is part of the outgoing
packet. At the receiving end, a keyed hash of an incoming packet is generated. If the hash within the
incoming packet does not match the generated hash, the packet is ignored. The key for the MD5 hash
can either be given directly in the configuration using a key string or supplied indirectly through a key
chain.
You can also choose to use a simple password in plain text to authenticate GLBP packets or choose no
authentication for GLBP.
GLBP rejects packets in any of the following cases:
• The authentication schemes differ on the router and in the incoming packet.
• MD5 digests differ on the router and in the incoming packet.
• Text authentication strings differ on the router and in the incoming packet.
IP Network
Ethernet 3/1
AVG
Router 1 Router 3
Router 2
GLBP group 1 GLBP group 1
GLBP group 1
Ethernet 1/2: Ethernet 2/2:
AVF for vMAC2
Tracks: e 3/1, decrement 30 Preempt
load balance: weighted
weight: 120, lower 85, upper 110 weight: 100 (default)
AVF for vMAC1 secondary VF for vMAC1
load balance: weighted load balance: weighted
vMAC1 vMAC2
185060
Host 1 Host 2
In Figure 4-2, the Ethernet 1/2 interface on router 1 is the gateway for host 1 (the AVF for virtual MAC
address, vMAC1), while Ethernet 2/2 on router 2 acts as a secondary virtual forwarder for Host 1.
Ethernet 1/2 tracks Ethernet 3/1, which is the network connection for router 1. If Ethernet 3/1 goes down,
the weighting for Ethernet 1/2 drops to 90. Ethernet 2/2 on router 2 preempts Ethernet 1/2 and takes over
as AVF because it has the default weighting of 100 and is configured to preempt the AVF.
See the “Configuring GLBP Weighting and Tracking” section on page 4-97 for details about configuring
weighting and tracking.
Virtualization Support
GLBP supports Virtual Routing and Forwarding instances (VRFs). VRFs exist within virtual device
contexts (VDCs). By default, Cisco NX-OS places you in the default VDC and default VRF unless you
specifically configure another VDC and VRF.
If you change the VRF membership of an interface, Cisco NX-OS removes all Layer 3 configuration,
including GLBP.
Default Settings
Table 4-1 lists the default settings for GLBP parameters.
Parameters Default
Authentication No authentication
Forwarder preemption delay 30 seconds
Forwarder timeout 14400 seconds
Parameters Default
Hello timer 3 seconds
Hold timer 10 seconds
GLBP feature Disabled
Load balancing Round robin
Preemption Disabled
Priority 100
Redirect timer 600 seconds
Weighting 100
Platform Support
The following platform supports this feature. For platform-specific information, including guidelines
and limitations, system defaults, and configuration limits, see the corresponding documentation.
Platform Documentation
Cisco Nexus 7000 Series switches Cisco Nexus 7000 Series Switches Documentation
Configuring GLBP
You can access GLBP from the Routing feature selection.
For more information about the Data Center Network Manager features, see the Fundamentals
Configuration Guide, Cisco DCNM for LAN, Release 5.x .
This section includes the following topics:
• Enabling the GLBP Feature, page 4-93
• Creating a GLBP Group, page 4-93
• Configuring GLBP Authentication, page 4-94
• Configuring GLBP Load Balancing, page 4-96
• Configuring GLBP Weighting and Tracking, page 4-97
• Configuring Extended Hold Timers for GLBP, page 4-102
• Configuring Gateway Preemption, page 4-100
• Customizing GLBP, page 4-101
• Enabling a GLBP Group, page 4-103
Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature
might differ from the Cisco IOS commands that you would use.
System-message logging levels for the GLBP feature must meet or exceed Cisco DCNM requirements.
During device discovery, Cisco DCNM detects inadequate logging levels and raises them to the
minimum requirements. Cisco Nexus 7000 Series switches that run Cisco NX-OS Release 4.0 are an
exception. For Cisco NX-OS Release 4.0, prior to device discovery, use the command-line interface to
configure logging levels to meet or exceed Cisco DCNM requirements. For more information, see the
Fundamentals Configuration Guide, Cisco DCNM for LAN, Release 5.x .
Ensure that you are in the correct VDC (or use the switchto vdc command).
DETAILED STEPS
To enable the GLBP feature, use the following command in global configuration mode:
Command Purpose
feature glbp Enables GLBP.
Example:
switch(config)# feature glbp
To disable the GLBP feature in a VDC and remove all associated configuration, use the following
command in global configuration mode:
Command Purpose
no feature glbp Disables the GLBP feature in a VDC.
Example:
switch(config)# no feature glbp
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > GLBP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure GLBP on.
Step 3 From the menu bar, choose Actions > New GroupSetting.
The system highlights the new GLBP row in the Summary pane, and tabs update in the Details pane.
Step 4 From the highlighted Interface field, select the interface that you want to configure a GLBP group on
from the drop-down list.
Step 5 From the Group ID field, enter the group number for this group.
The range is from 0 to 1023.
The system creates the new group on the device and highlights the new GLBP group in the Summary
pane, and tabs update in the Details pane.
Step 6 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 7 From the Group Details tab, expand the Group Details section.
The basic group information appears in the Details pane.
Step 8 (Optional) From the Priority field, enter the priority for this GLBP group member.
Step 9 (Optional) From the Group Name field, enter a name for this GLBP group member.
Step 10 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Ensure that you are in the correct VDC (or use the switchto vdc command).
Enable the GLBP feature (see the “Enabling the GLBP Feature” section on page 4-93).
Note You must configure the same authentication and keys on all members of the GLBP group.
SUMMARY STEPS
1. config t
2. interface interface-type slot/port
3. ip ip-address/length
4. glbp group-number
5. authentication text string
or
authentication md5 {key-chain key-chain | key-string {text | encrypted text}
6. ip [ip-address [secondary]]
7. show glbp [group group-number]
8. copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > GLBP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure GLBP on.
Step 3 Click the group that you want to configure authentication on.
Step 4 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 5 From the Group Details tab, expand the Authentication, Gateway Preemption section.
The authentication information appears in the Details pane.
Step 6 From the Authentication area, from the Method drop-down list, choose the authentication method.
Step 7 (Optional) For text authentication, in the password field, enter the password string.
Step 8 (Optional) For MD5 authentication, check either Key or Key Chain.
Step 9 (Optional) For the Key option, in the key field, enter the key string and check encrypted for an encrypted
key string.
Step 10 (Optional) For the Key Chain option, from the key chain drop-down list, choose the key chain that you
want to use.
Step 11 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface interface-type slot/port Enters interface configuration mode.
Example:
switch(config)# interface ethernet 1/2
switch(config-if)#
Step 3 ip ip-address/length Configures the IPv4 address for the interface.
Example:
switch(config-if)# ip 192.0.2.1/8
Step 4 glbp group-number Creates a GLBP group and enters GLBP configuration
mode. The range is from 0 to 1024.
Example:
switch(config-if)# glbp 1
switch(config-if-glbp)#
Command Purpose
Step 5 authentication text string Configures cleartext authentication for GLBP on this
interface.
Example:
switch(config-if-glbp)# authentication
text mypassword
authentication md5 {key-chain key-chain Configures MD5 authentication for GLBP on this
| key-string {text | encrypted text} interface.
Example:
switch(config-if-glbp)# authentication
md5 key-chain glbp-keys
Step 6 ip [ip-address [secondary]] Enables GLBP on an interface and identifies the
primary IP address of the virtual gateway.
Example:
switch(config-if-glbp)# ip 192.0.2.10 After you identify a primary IP address, you can use
the glbp group ip command again with the secondary
keyword to indicate additional IP addresses supported
by this group. If you only use the ip keyword, GLBP
learns the virtual IP address from the neighbors.
Step 7 show glbp [group group-number] (Optional) Displays GLBP information.
Example:
switch(config-if-glbp)# show glbp 1
Step 8 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if-glbp)# copy
running-config startup-config
The following example shows how to configure MD5 authentication for GLBP on Ethernet 1/2 after
creating the key chain:
switch# config t
switch(config)# key chain glbp-keys
switch(config-keychain)# key 0
switch(config-keychain-key)# key-string 7 zqdest
switch(config-keychain-key) accept-lifetime 00:00:00 Jun 01 2008 23:59:59 Sep 12 2008
switch(config-keychain-key) send-lifetime 00:00:00 Jun 01 2008 23:59:59 Aug 12 2008
switch(config-keychain-key) key 1
switch(config-keychain-key) key-string 7 uaeqdyito
switch(config-keychain-key) accept-lifetime 00:00:00 Aug 12 2008 23:59:59 Dec 12 2008
switch(config-keychain-key) send-lifetime 00:00:00 Sep 12 2008 23:59:59 Nov 12 2008
switch(config)# interface ethernet 1/2
switch(config-if)# glbp 1
switch(config-if-glbp)# authenticate md5 key-chain glbp-keys
switch(config-if-glbp)# copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > GLBP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure GLBP on.
Step 3 Click the group that you want to configure load balancing on.
Step 4 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 5 From the Group Details tab, expand the Group Details section.
The basic group information appears in the Details pane.
Step 6 From the Method drop-down list, choose the load-balancing method.
Step 7 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Command Purpose
load-balancing [host-dependent | Sets the GLBP load-balancing method. The default
round-robin | weighted] is round-robin.
Example:
switch(config-if-glbp)# load-balancing
weighted
Ensure that you have configured the object tracking entry that you want to use to modify GLBP
weighting (see the “Configuring Object Tracking” section on page 6-146).
Ensure that you are in the correct VDC (or use the switchto vdc command).
Enable the GLBP feature (see the “Enabling the GLBP Feature” section on page 4-93).
SUMMARY STEPS
1. config t
2. track object-id interface interface-type number {ip routing | line-protocol}
3. track object-id ip route ip-prefix/length reachability
4. interface interface-type slot/port
5. ip ip-address/length
6. glbp group-number
7. weighting maximum [lower lower] [upper upper]
8. weighting track object-number [decrement value]
9. forwarder preempt [delay minimum seconds]
10. ip [ip-address [secondary]]
11. show glbp interface-type number
12. copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > GLBP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure GLBP on.
Step 3 Click the group that you want to configure weighting and tracking on.
Step 4 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 5 From the Group Details tab, expand the Weighting and Object Tracking section.
The weighting and object tracking information appears in the Details pane.
Step 6 From the Weight area, enter the maximum, lower threshold, and upper threshold weighting values.
Step 7 From the GLBP Tracking area, right-click and choose Add TrackObject from the pop-up menu.
Step 8 From the object ID drop-down list, choose the object ID that you want to use to modify the GLBP
weighting value with.
Step 9 In the Weight Decrement field, enter the value that you want to decrement the GLBP weighting with if
the tracked object state goes down.
Step 10 (Optional) From the Group Details tab, expand the Virtual Forwarder Setting section.
The virtual forwarders information appears in the Details pane.
Step 11 (Optional) Check Virtual Forwarder Preemption.
Step 12 (Optional) In the Preemption Delay field, enter the delay value in seconds.
Step 13 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
The following example shows how to configure GLBP weighting and tracking on Ethernet 1/2:
switch# config t
switch(config)# track 2 interface ethernet 2/2 ip routing
switch(config)# interface ethernet 1/2
switch(config-if)# glbp 1
switch(config-if-glbp)# weighting 110 lower 95 upper 105
switch(config-if-glbp)# weighting track 2 decrement 20
switch(config-if-glbp)# copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > GLBP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure GLBP on.
Step 3 Click the group that you want to configure authentication on.
Step 4 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 5 From the Group Details tab, expand the Authentication, Gateway Preemption section.
RELATED TOPICS
Customizing GLBP
Customizing the behavior of GLBP is optional. Be aware that as soon as you enable a GLBP group by
configuring a virtual IP address, that group is operational. If you enable a GLBP group before you
customize GLBP, the router could take over control of the group and become the AVG before you finish
customizing the feature. If you plan to customize GLBP, you should do so before enabling GLBP.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > GLBP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure GLBP on.
Step 3 Click the group that you want to configure timers on.
Step 4 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 5 From the Group Details tab, expand the Timers section.
The timers information appears in the Details pane.
Step 6 From the Configured Timers area, in the Hello Time (msec) field, enter the hello time.
Step 7 From the Configured Timers area, in the Hold Time (msec) field, enter the hold time.
Step 8 From the Configured Timers area, in the Redirect Time (sec) field, enter the redirect time.
Step 9 From the Configured Timers area, in the Forwarder Time-out (sec) field, enter the hold time.
Step 10 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Note You must configure extended hold timers on all GLBP gateways if you configure extended hold timers.
You can configure different extended holdtimer values on each GLBP gateway, based on the expected
system switchover delays.
Note If you configure a non-default hold timer, you should configure the same value on all GLBP gateways
when you configure GLBP extended hold timers.
To configure GLBP extended hold timers , use the following command in global configuration mode:
Command Purpose
glbp timers extended-hold [timer] Sets the GLBP extended hold timer, in seconds.
The timer range is from 10 to 255. The default is
Example:
switch(config)# glbp timers extended-hold
10.
Use the show glbp command or the show running-config glbp command to display the extended hold
time.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > GLBP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure GLBP on.
Step 3 Click the group that you want to configure timers on.
Step 4 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 5 From the Group Details tab, expand the Group Details section.
The general information appears in the Details pane.
Step 6 (Optional) To manually set the virtual IP address, enter an IP address in the Virtual IP address field.
Step 7 (Optional) To learn the virtual IP address, check Learn Virtual IP from Members Of Group.
Step 8 (Optional) From the Virtual Secondary IP Address field, enter a secondary IP address.
Step 9 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Command Purpose
show glbp [group group-number] Displays the GLBP status for all or one group.
show glbp [group group-number] capability Displays the GLBP capability for all or one group.
show glbp [interface interface-type slot/port] Displays the GLBP status for an interface.
show glbp [group group-number] [interface Displays the GLBP status for a group or interface
interface-type slot/port] [active] [disabled] [init] for virtual forwarders in the selected state.
[listen] [standby]
show glbp [group group-number] [interface Displays a brief summary of the GLBP status for
interface-type slot/port] [active] [disabled] [init] a group or interface for virtual forwarders in the
[listen] [standby] brief selected state.
Field Description
Gateway
Group ID Display only. Group number for the GLBP group.
Priority Priority for the group member, used for AVG selection.
Group Name Name for the GLBP group.
Method Load balancing method for this GLBP group.
Gateway State Display only. Administrative state for the group member.
State Change Count Display only. Number of times the GLBP gateway state changed.
Last State Change Display only. Time of the last GLBP gateway state change.
Active Gateway
IP Address Address of active gateway.
Priority Priority of active gateway.
Standby Gateway
IP Address Address of standby gateway.
Priority Priority of standby gateway.
IP Address Settings
Learn Virtual IP from Learned IP address for the group.
Members of Group
Virtual IP Address Virtual IP address for the group.
Secondary IP Address Secondary IP address for the group.
Field Description
Authentication
Method Authentication method.
Password Password for text authentication.
Key Key string for MD5 authentication.
Encrypted Key string is encrypted for MD5 authentication.
Key Chain Key chain name for MD5 authentication.
Field Description
Gateway Preemption
Gateway Preemption Gateway preemption.
Minimum Delay Minimum delay to wait before preemption occurs.
Field Description
Weight
Maximum Maximum weighted value.
Lower Threshold Lower threshold of weighted value.
Upper Threshold Upper threshold of weighted value.
GLBP Tracking
Object ID ID of object to track.
Tracked Object Detail of tracked object.
Weight Decrement Value to decrement the GLBP weight if the tracked object goes down.
Field Description
Forwarder ID ID of virtual forwarder.
Virtual MAC Address Virtual MAC address for the GLBP group.
Virtual Forwarder Device that takes over as the AVF for a GLBP group if the current AVF for
Preemption a GLBP group falls below its low weighting threshold.
Preemption Delay Delay before virtual forwarder preemption occurs.
Field Description
Active Timer Values
Hello Time Display only. GLBP group hello time.
Field Description
Hold Time Display only. GLBP group hold time.
Virtual Forwarder Display only. The time interval in seconds during which the active virtual
Redirect Time gateway continues to redirect clients to an active virtual forwarder.
Secondary Forwarder Display only. The interval in seconds before a secondary virtual forwarder
Hold Time becomes invalid.
Configured Timers
Hello Time GLBP group hello time.
Hold Time GLBP group hold time.
Virtual Forwarder Time interval in seconds during which the active virtual gateway continues
Redirect Time to redirect clients to an active virtual forwarder.
Secondary Forwarder Interval in seconds before a secondary virtual forwarder becomes invalid.
Hold Time
Field Description
Forwarder ID Display only. ID of virtual forwarder.
MAC Address Display only. MAC address for the GLBP group.
Virtual MAC Address Display only. Virtual MAC address for the GLBP group.
Redirection Display only. Redirection state.
Weighting Display only. Weighting value for this forwarder.
Gateway State Display only. Administrative state for the group member.
State Change Count Display only. Number of times the GLBP gateway state changed.
Last State Change Display only. Time of the last GLBP gateway state change.
GLBP: Virtual Gateways and Forwarders Tab: GLBP Group Member Details
Section
Table 4-8 GLBP:Virtual Gateways and Forwarders:GLBP Group Member Details
Field Description
IP Address IP address of the group member.
MAC Address MAC address of the group member.
Additional References
For additional information related to implementing GLBP, see the following sections:
• Related Documents, page 4-109
• Standards, page 4-109
Related Documents
Related Topic Document Title
Configuring the Hot Standby Redundancy protocol Chapter 5, “Configuring HSRP”
GLBP CLI commands Cisco Nexus 7000 Series NX-OS Unicast Routing Command
Reference
Configuring high availability Cisco Nexus 7000 Series NX-OS High Availability and Redundancy
Guide, Release 5.x
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
This chapter describes how to configure the Hot Standby Router Protocol (HSRP) on the Cisco Data
Center Network Manager (DCNM)NX-OS device.
This chapter includes the following sections:
• Information About HSRP, page 5-111
• Licensing Requirements for HSRP, page 5-118
• Prerequisites for HSRP, page 5-118
• Guidelines and Limitations, page 5-119
• Default Settings, page 5-119
• Platform Support, page 5-120
• Configuring HSRP, page 5-120
• Verifying the HSRP Configuration, page 5-138
• Configuration Examples for HSRP, page 5-139
• Field Descriptions for HSRP, page 5-139
• Additional References, page 5-141
• Feature History for HSRP, page 5-142
HSRP Overview
When you use HSRP, you configure the HSRP virtual IP address as the host’s default router (instead of
the IP address of the actual router). The virtual IP address is an IPv4 or IPv6 address that is shared among
a group of routers that run HSRP.
When you configure HSRP on a network segment, you provide a virtual MAC address and a virtual IP
address for the HSRP group. You configure the same virtual address on each HSRP-enabled interface in
the group. You also configure a unique IP address and MAC address on each interface that acts as the
real address. HSRP selects one of these interfaces to be the active router. The active router receives and
routes packets destined for the virtual MAC address of the group.
HSRP detects when the designated active router fails. At that point, a selected standby router assumes
control of the virtual MAC and IP addresses of the HSRP group. HSRP also selects a new standby router
at that time.
HSRP uses a priority mechanism to determine which HSRP-configured interface becomes the default
active router. To configure an interface as the active router, you assign it with a priority that is higher
than the priority of all the other HSRP-configured interfaces in the group. The default priority is 100, so
if you configure just one interface with a higher priority, that interface becomes the default active router.
Interfaces that run HSRP send and receive multicast User Datagram Protocol (UDP)-based hello
messages to detect a failure and to designate active and standby routers. When the active router fails to
send a hello message within a configurable period of time, the standby router with the highest priority
becomes the active router. The transition of packet forwarding functions between the active and standby
router is completely transparent to all hosts on the network.
You can configure multiple HSRP groups on an interface.
Figure 5-1 shows a network configured for HSRP. By sharing a virtual MAC address and a virtual IP
address, two or more interfaces can act as a single virtual router.
Internet or
ISP backbone
LAN
185061
Host A Host B Host C Host D
The virtual router does not physically exist but represents the common default router for interfaces that
are configured to provide backup to each other. You do not need to configure the hosts on the LAN with
the IP address of the active router. Instead, you configure them with the IP address (virtual IP address)
of the virtual router as their default router. If the active router fails to send a hello message within the
configurable period of time, the standby router takes over, responds to the virtual addresses, and becomes
the active router, assuming the active router duties. From the host perspective, the virtual router remains
the same.
Note Packets received on a routed port destined for the HSRP virtual IP address will terminate on the local
router, regardless of whether that router is the active HSRP router or the standby HSRP router. This
includes ping and Telnet traffic. Packets received on a Layer 2 (VLAN) interface destined for the HSRP
virtual IP address will terminate on the active router.
HSRP version 2 uses the new IP multicast address 224.0.0.102 to send hello packets instead of the
multicast address of 224.0.0.2, which is used by version 1. HSRP version 2 permits an expanded group
number range of 0 to 4095 and uses a new MAC address range of 0000.0C9F.F000 to 0000.0C9F.FFFF.
IPv6
Destination
Packet MAC Source Address IPv6 Source Address Address Link-layer Address Option
Neighbor solicitation (NS) Interface MAC address Interface IPv6 address — Interface MAC address
Router solicitation (RS) Interface MAC address Interface IPv6 address — Interface MAC address
Neighbor advertisement Interface MAC address Interface IPv6 address Virtual IPv6 HSRP virtual MAC address
(NA) address
Route advertisement (RA) Interface MAC address Virtual IPv6 address — HSRP virtual MAC address
IPv6
Destination
Packet MAC Source Address IPv6 Source Address Address Link-layer Address Option
HSRP (inactive) Interface MAC address Interface IPv6 address — —
HSRP (active) Virtual MAC address Interface IPv6 address — —
HSRP does not add IPv6 link-local addresses to the Unicast Routing Information Base (URIB). There
are also no secondary virtual IP addresses for link-local addresses.
For global unicast addresses, HSRP will add the virtual IPv6 address to the URIB and IPv6 but will not
register the virtual IPv6 addresses to ICMPv6. ICMPv6 redirects are not supported for HSRP IPv6
groups.
HSRP Versions
Cisco NX-OS supports HSRP version 1 by default. You can configure an interface to use HSRP version
2.
HSRP version 2 has the following enhancements to HSRP version 1:
• Expands the group number range. HSRP version 1 supports group numbers from 0 to 255. HSRP
version 2 supports group numbers from 0 to 4095.
• For IPv4, uses the IPv4 multicast address 224.0.0.102 or the IPv6 multicast address FF02::66 to send
hello packets instead of the multicast address of 224.0.0.2, which is used by HSRP version 1.
• Uses the MAC address range from 0000.0C9F.F000 to 0000.0C9F.FFFF for IPv4 and
0005.73A0.0000 through 0005.73A0.0FFF for IPv6 addresses. HSRP version 1 uses the MAC
address range 0000.0C07.AC00 to 0000.0C07.ACFF.
• Adds support for MD5 authentication.
When you change the HSRP version, Cisco NX-OS reinitializes the group because it now has a new
virtual MAC address.
HSRP version 2 has a different packet format than HSRP version 1. The packet format uses a
type-length-value (TLV) format. HSRP version 2 packets received by an HSRP version 1 router are
ignored.
HSRP Authentication
HSRP message digest 5 (MD5) algorithm authentication protects against HSRP-spoofing software and
uses the industry-standard MD5 algorithm for improved reliability and security. HSRP includes the IPv4
or IPv6 address in the authentication TLVs.
router responds). If you enable multiple HSRP groups on the interface, and the router acts as the active
HSRP router for more than one group, then one of the HSRP group's MAC addresses provides the proxy
ARP response.
HSRP Messages
Routers that are configured with HSRP exchange the following three types of multicast messages:
• Hello—The hello message conveys the HSRP priority and state information of the router to other
HSRP routers.
• Coup—When a standby router wants to assume the function of the active router, it sends a coup
message.
• Resign—A router that is the active router sends this message when it is about to shut down or when
a router that has a higher priority sends a hello or coup message.
User Group A
Default Gateway = 192.0.2.1
Active
Router A
Standby
Standby
Router B
Active
User Group B
Default Gateway = 192.0.2.2
Group A = 192.0.2.1
185059
Group B = 192.0.2.2
Figure 5-2 shows two routers A and B and two HSRP groups. Router A is the active router for group A
but is the standby router for group B. Similarly, router B is the active router for group B and the standby
router for group A. If both routers remain active, HSRP load balances the traffic from the hosts across
both routers. If either router fails, the remaining router continues to process traffic for both hosts.
Note HSRP for IPv6 load balances by default. If there are two HSRP IPv6 groups on the subnet, then hosts
will learn of both from their router advertisements and choose to use one so that the load is shared
between the advertised routers.
Note You should configure HSRP on the primary vPC peer device as active and HSRP on the vPC secondary
device as standby.
BFD
This feature supports bidirectional forwarding detection (BFD). BFD is a detection protocol designed to
provide fast forwarding-path failure detection times. BFD provides subsecond failure detection between
two adjacent devices and can be less CPU-intensive than protocol hello messages because some of the
BFD load can be distributed onto the data plane on supported modules. See the Cisco Nexus 7000 Series
NX-OS Interfaces Configuration Guide, Release 5.x, for more information.
If HSRP hold timers are configured for short time periods, these timers may expire during a controlled
switchover or in-service software upgrade (ISSU). HSRP supports extended non-stop forwarding (NSF)
to temporarily extend these HSRP hold timers during a controlled switchover or in-service software
upgrade (ISSU).
With extended NSF configured, HSRP sends hello messages with the extended timers. HSRP peers
update their hold timers with these new values. The extended timers prevent unnecessary HSRP state
changes during the switchover or ISSU. After the switchover or ISSU event, HSRP restores the hold
timers to their original configured values. If the switchover fails, HSRP restores the hold timers after the
extended hold timer values expire.
See the “Configuring Extended Hold Timers for HSRP” section on page 5-138 for more information.
Virtualization Support
HSRP supports Virtual Routing and Forwarding instances (VRFs). VRFs exist within virtual device
contexts (VDCs). By default, Cisco NX-OS places you in the default VDC and default VRF unless you
specifically configure another VDC and VRF.
If you change the VRF membership of an interface, Cisco NX-OS removes all Layer 3 configuration,
including HSRP.
command-line interface to configure logging levels to meet or exceed Cisco DCNM requirements.
For more information, see the Fundamentals Configuration Guide, Cisco DCNM for LAN, Release
5.x .
• If you configure VDCs, install the Advanced Services license and enter the desired VDC (see the
Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide, Release 5.x).
Default Settings
Table 5-2 lists the default settings for HSRP parameters.
Parameters Default
HSRP Disabled
Authentication Enabled as text for version 1, with cisco as the
password
HSRP version Version 1
Preemption Disabled
Priority 100
virtual MAC address Derived from HSRP group number
Platform Support
The following platform supports this feature. For platform-specific information, including guidelines
and limitations, system defaults, and configuration limits, see the corresponding documentation.
Platform Documentation
Cisco Nexus 7000 Series switches Cisco Nexus 7000 Series Switches Documentation
Configuring HSRP
You can access HSRP from the Routing feature selection.
For more information about the Cisco Data Center Network Manager features, see the Fundamentals
Configuration Guide, Cisco DCNM for LAN, Release 5.x .
This section includes the following topics:
• Enabling the HSRP Feature, page 5-120
• Using the HSRP Template, page 5-125
• Configuring the HSRP Version, page 5-121
• Configuring an HSRP Group for IPv4, page 5-122
• Configuring an HSRP Group for IPv6, page 5-125
• Configuring the HSRP Virtual MAC Address, page 5-128
• Authenticating HSRP, page 5-129
• Configuring Preemption, page 5-132
• Configuring HSRP Object Tracking, page 5-132
• Configuring the HSRP Priority, page 5-134
• Customizing HSRP, page 5-136
• Configuring Extended Hold Timers for HSRP, page 5-138
Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature
might differ from the Cisco IOS commands that you would use.
System-message logging levels for the HSRP feature must meet or exceed Cisco DCNM requirements.
During device discovery, Cisco DCNM detects inadequate logging levels and raises them to the
minimum requirements. Cisco Nexus 7000 Series switches that run Cisco NX-OS Release 4.0 are an
exception. For Cisco NX-OS Release 4.0, prior to device discovery, use the command-line interface to
configure logging levels to meet or exceed Cisco DCNM requirements. For more information, see the
Fundamentals Configuration Guide, Cisco DCNM for LAN, Release 5.x .
Ensure that you are in the correct VDC (or use the switchto vdc command).
DETAILED STEPS
To enable the HSRP feature in a VDC, use the following command in global configuration mode:
Command Purpose
feature hsrp Enables HSRP.
Example:
switch(config)# feature hsrp
To disable the HSRP feature in a VDC and remove all associated configuration, use the following
command in global configuration mode:
Command Purpose
no feature hsrp Disables HSRP for all groups in a VDC.
Example:
switch(config)# no feature hsrp
Command Purpose
hsrp-template Enters HSRP template configuration mode
Example:
switch(config)# hsrp-template
switch(config-hsrp-template)#
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > HSRP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure HSRP on.
The system highlights the HSRP row in the Summary pane, and tabs update in the Details pane.
Step 3 From the highlighted Interface field, select the interface that you want to configure an HSRP group on
from the drop-down list.
Step 4 From the Details pane, click the Interface Settings tab.
The Interface Settings tab appears.
Step 5 From the Interface Settings tab, in the HSRP Version field, enter 1 for HSRP version 1 or enter 2 for
HSRP version 2.
Step 6 From the menu bar, choose File > Deploy to apply your changes to the device.
To configure the HSRP version, use the following command in interface configuration mode:
Command Purpose
hsrp version {1 | 2} Configures the HSRP version. Version 1 is the
default.
Example:
switch(config-if)# hsrp version 2
Ensure that you have enabled the HSRP feature (see the “Enabling the HSRP Feature” section on
page 5-120).
Cisco NX-OS enables an HSRP group once you configure the virtual IP address on any member interface
in the group. You should configure HSRP attributes such as authentication, timers, and priority before
you enable the HSRP group.
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. interface type number
3. ip ip-address/length
4. hsrp group-number [ipv4]
5. ip [ip-address [secondary]]
6. exit
7. no shutdown
8. show hsrp [group group-number] [ipv4]
9. copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > HSRP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure HSRP on.
Step 3 Right-click and choose New IPv4 GroupSetting.
Step 4 From the Interface drop-down list, select the interface or group of interfaces that you want to configure
an HSRP group on.
Step 5 From the Group ID field, enter the group number for this group.
The range is from 0 to 255.
Step 6 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 7 From the Group Details tab, expand the Group Details section.
The basic group information appears in the Details pane.
Step 8 (Optional) From the Group Name field, enter a name for this HSRP group member.
Step 9 (Optional) From the Virtual IP Address Settings Area, check Learn Virtual IP from Members of
Group to learn the virtual IP address from another HSRP group member.
Step 10 (Optional) From the Virtual IP Address Settings Area, in the Virtual IP Address field, enter an IPv4
address.
Step 11 (Optional) From the Virtual IP Address Settings Area, in the Secondary IP Address field, enter an IPv4
address for the secondary IP address.
Step 12 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface type number Enters interface configuration mode.
Example:
switch(config)# interface ethernet 1/2
switch(config-if)#
Step 3 ip ip-address/length Configures the IPv4 address of the interface.
Example:
switch(config-if)# ip 192.0.2.2/8
Step 4 hsrp group-number [ipv4] Creates an HSRP group and enters hsrp configuration
mode. The range for HSRP version 1 is from 0 to 255.
Example:
switch(config-if)# hsrp 2
The range is for HSRP version 2 is from 0 to 4095. The
switch(config-if-hsrp)# default value is 0.
Step 5 ip [ip-address [secondary]] Configures the virtual IP address for the HSRP group
and enables the group. This address should be in the
Example:
switch(config-if-hsrp)# ip 192.0.2.1
same subnet as the IPv4 address of the interface.
Step 6 exit Exits HSRP configuration mode.
Example:
switch(config-if-hsrp)# exit
Step 7 no shutdown Enables the interface.
Example:
switch(config-if)# no shutdown
Step 8 show hsrp [group group-number] [ipv4] (Optional) Displays HSRP information.
Example:
switch(config-if)# show hsrp group 2
Step 9 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if)# copy running-config
startup-config
Note You should use the no shutdown command to enable the interface after you finish the configuration.
The following example shows how to configure an HSRP group on Ethernet 1/2:
switch# config t
switch(config)# interface ethernet 1/2
switch(config-if)# ip 192.0.2.2/8
switch(config-if)# hsrp 2
switch(config-if-hsrp)# ip 192.0.2.1
switch(config-if-hsrp)# exit
switch(config-if)# no shutdown
switch(config-if)# copy running-config startup-config
Command Purpose
hsrp-template Enters HSRP template configuration mode
Example:
switch(config)# hsrp-template
switch(config-hsrp-template)#
Ensure that you have enabled the HSRP feature (see the “Enabling the HSRP Feature” section on
page 5-120).
Ensure that you have enabled HSRP version 2 on the interface that you want to configure an IPv6 HSRP
group on.
Ensure that you have configured HSRP attributes such as authentication, timers, and priority before you
enable the HSRP group.
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. interface type number
3. ipv6 address ipv6-address/length
4. hsrp version 2
5. hsrp group-number ipv6
6. ip ipv6-address
or
ip autoconfig
7. no shutdown
8. show hsrp [group group-number] [ipv6]
9. copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > HSRP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure HSRP on.
Step 3 Right-click and choose New IPv6 GroupSetting.
Step 4 From the Interface drop-down list, select the interface or group of interfaces that you want to configure
an HSRP group on.
Step 5 From the Group ID field, enter the group number for this group.
Step 6 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 7 From the Group Details tab, expand the Interfaces section.
The HSRP interface information appears in the Details pane.
Step 8 From the HSRP Version field, enter 2 for HSRP version 2.
Step 9 From the Group Details tab, expand the Group Details section.
The basic group information appears in the Details pane.
Step 10 (Optional) From the Group Name field, enter a name for this HSRP group member.
Step 11 (Optional) From the Virtual IP Address Settings Area, check Autoconfigure IP address to configure the
virtual IPv6 address from the link-local address and the HSRP virtual MAC address.
Step 12 (Optional) From the Virtual IP Address Settings Area, check Learn Virtual IP from Members of
Group to learn the virtual IP address from another HSRP group member.
Step 13 (Optional) From the Virtual IP Address Settings Area, in the Virtual IPv6 Address field, enter an IPv6
address.
Step 14 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface type number Enters interface configuration mode.
Example:
switch(config)# interface ethernet 3/2
switch(config-if)#
Step 3 ipv6 address ipv6-address/length Configures the IPv6 address of the interface.
Example:
switch(config-if)# ipv6 address
2001:0DB8:0001:0001:/64
Step 4 hsrp version 2 Configures this group for HSRP version 2.
Example:
switch(config-if-hsrp)# hsrp version 2
Step 5 hsrp group-number ipv6 Creates an IPv6 HSRP group and enters hsrp
configuration mode. The range for HSRP version 2 is
Example:
switch(config-if)# hsrp 10 ipv6
from 0 to 4095. The default value is 0.
switch(config-if-hsrp)#
Step 6 ip [ipv6-address [secondary]] Configures the virtual IPv6 address for the HSRP
group and enables the group.
Example:
switch(config-if-hsrp)# ip 2001:DB8::1
Step 7 ip autoconfig Autoconfigures the virtual IPv6 address for the HSRP
group from the calculated link-local virtual IPv6
Example:
switch(config-if-hsrp)# ip autoconfig
address and enables the group.
Step 8 no shutdown Enables the interface.
Example:
switch(config-if-hsrp)# no shutdown
Step 9 show hsrp [group group-number] [ipv6] (Optional) Displays HSRP information.
Example:
switch(config-if-hsrp)# show hsrp group
10
Step 10 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if-hsrp)# copy
running-config startup-config
Note You should use the no shutdown command to enable the interface after you finish the configuration.
The following example shows how to configure an IPv6 HSRP group on Ethernet 3/2:
switch# config t
switch(config)# interface ethernet 3/2
switch(config-if)# ipv6 address 2001:0DB8:0001:0001:/64
switch(config-if)# hsrp 2 ipv6
switch(config-if-hsrp)# exit
switch(config-if)# no shutdown
switch(config-if)# copy running-config startup-config
Note You must configure the same virtual MAC address on both vPC peers of a vPC link.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > HSRP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure HSRP on.
The system highlights the HSRP row in the Summary pane, and tabs update in the Details pane.
Step 3 From the highlighted Interface field, select the interface that you want to configure an HSRP group on
from the drop-down list.
Step 4 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 5 From the Group Details tab, expand the Group Details section.
The basic group information appears in the Details pane.
Step 6 From the Virtual MAC Address field, enter the virtual MAC address.
The string uses the standard MAC address format (xxxx.xxxx.xxxx).
Step 7 From the menu bar, choose File > Deploy to apply your changes to the device.
You can configure HSRP to use the burned-in MAC address as the virtual MAC address on an interface.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > HSRP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure HSRP on.
The system highlights the HSRP row in the Summary pane, and tabs update in the Details pane.
Step 3 From the highlighted Interface field, select the interface that you want to configure an HSRP group on
from the drop-down list.
Step 4 From the Details pane, click the Interface Settings tab.
The Interface Settings tab appears.
Step 5 From the Interface Settings tab, check Use Burned In Address (use-bia).
Step 6 (Optional) To use the burned-in address for all groups, check Apply Use Burned In Address (use-bia)
to all Groups.
Step 7 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Command Purpose
mac-address string Configures the virtual MAC address for an HSRP
group. The string uses the standard MAC address
Example:
switch(config-if-hsrp)# mac-address
format (xxxx.xxxx.xxxx).
5000.1000.1060
To configure HSRP to use the burned-in MAC address of the interface for the virtual MAC address, use
the following command in interface configuration mode:
Command Purpose
hsrp use-bia [scope interface] Configures HSRP to use the burned-in MAC
address of the interface for the HSRP virtual MAC
Example:
switch(config-if)# hsrp use-bia
address. You can optionally configure HSRP to use
the burned-in MAC address for all groups on this
interface by using the scope interface keywords.
Authenticating HSRP
You can configure HSRP to authenticate the protocol using cleartext or MD5 digest authentication. MD5
authentication uses a key chain (see the Cisco Nexus 7000 Series NX-OS Security Configuration Guide,
Release 5.x).
Ensure that you have enabled the HSRP feature (see the “Enabling the HSRP Feature” section on
page 5-120).
You must configure the same authentication and keys on all members of the HSRP group.
Ensure that you have created the key chain if you are using MD5 authentication.
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. interface interface-type slot/port
3. hsrp group-number [ipv4 | ipv6]
4. authentication text string
or
authentication md5 {key-chain key-chain | key-string {0 | 7} text [timeout seconds]}
5. show hsrp [group group-number]
6. copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > HSRP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure HSRP on.
The system highlights the HSRP row in the Summary pane, and tabs update in the Details pane.
Step 3 From the highlighted Interface field, select the interface that you want to configure an HSRP group on
from the drop-down list.
Step 4 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 5 From the Group Details tab, expand the Authentication, Router Preemption section.
The authentication information appears in the Details pane.
Step 6 From the Authentication area, from the Method drop-down list, choose the authentication method.
Step 7 (Optional) For text authentication, in the password field, enter the password string.
Step 8 (Optional) For MD5 authentication, choose either Key or Key Chain.
Step 9 (Optional) For the Key option, in the key field, enter the key string, time-out value, and check Encrypted
for an encrypted key string.
Step 10 (Optional) For the Key Chain option, from the key chain drop-down list, choose the key chain that you
want to use.
Step 11 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 interface interface-type slot/port Enters interface configuration mode.
Example:
switch(config)# interface ethernet 1/2
switch(config-if)#
Step 3 hsrp group-number [ipv4 | ipv6] Creates an HSRP group and enters HSRP
configuration mode.
Example:
switch(config-if)# hsrp 2
switch(config-if-hsrp)#
Step 4 authentication text string Configures cleartext authentication for HSRP on this
interface.
Example:
switch(config-if-hsrp)# authentication
text mypassword
authentication md5 {key-chain key-chain Configures MD5 authentication for HSRP on this
| key-string {0 | 7} text [timeout interface. You can use a key chain or key string. If you
seconds]}
use a key string, you can optionally set the timeout for
Example: when HSRP will only accept a new key. The range is
switch(config-if-hsrp)# authentication from 0 to 32767 seconds.
md5 key-chain hsrp-keys
Step 5 show hsrp [group group-number] (Optional) Displays HSRP information.
Example:
switch(config-if-hsrp)# show hsrp group
2
Step 6 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if-hsrp)# copy
running-config startup-config
The following example shows how to configure MD5 authentication for HSRP on Ethernet 1/2 after
creating the key chain:
switch# config t
switch(config)# key chain hsrp-keys
switch(config-keychain)# key 0
switch(config-keychain-key)# key-string 7 zqdest
switch(config-keychain-key) accept-lifetime 00:00:00 Jun 01 2008 23:59:59 Sep 12 2008
switch(config-keychain-key) send-lifetime 00:00:00 Jun 01 2008 23:59:59 Aug 12 2008
switch(config-keychain-key) key 1
switch(config-keychain-key) key-string 7 uaeqdyito
switch(config-keychain-key) accept-lifetime 00:00:00 Aug 12 2008 23:59:59 Dec 12 2008
switch(config-keychain-key) send-lifetime 00:00:00 Sep 12 2008 23:59:59 Nov 12 2008
switch(config-keychain-key)# interface ethernet 1/2
switch(config-if)# hsrp 2
switch(config-if-hsrp)# authenticate md5 key-chain hsrp-keys
switch(config-if-hsrp)# copy running-config startup-config
Configuring Preemption
You can configure HSRP to preempt another active router based on the configured priority.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > HSRP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure HSRP on.
The system highlights the HSRP row in the Summary pane, and tabs update in the Details pane.
Step 3 From the highlighted Interface field, select the interface that you want to configure an HSRP group on
from the drop-down list.
Step 4 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 5 From the Group Details tab, expand the Authentication, Router Preemption section.
The authentication information appears in the Details pane.
Step 6 Check Router Preemption.
Step 7 From the Minimum Delay(sec) field, enter the minimum delay time.
Step 8 From the Sync Delay(sec) field, enter the sync delay time.
Step 9 From the Reload Delay(sec) field, enter the reload delay time.
Step 10 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > HSRP.
RELATED TOPICS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 track object-id interface Configures the interface that this HSRP interface tracks.
interface-type number {{ip | ipv6} Changes in the state of the interface affect the priority of
routing | line-protocol}
this HSRP interface as follows:
Example: • You configure the interface and corresponding object
switch(config)# track 1 interface
number that you use with the track command in hsrp
ethernet 2/2 line-protocol
switch(config-track# configuration mode.
• The line-protocol keyword tracks whether the interface
is up. The ip keyword also checks that IP routing is
enabled on the interface and an IP address is
configured.
track object-id {ip | ipv6} route Creates a tracked object for a route and enters tracking
ip-prefix/length reachability configuration mode. The object-id range is from 1 to 500.
Example:
switch(config)# track 2 ip route
192.0.2.0/8 reachability
switch(config-track#
Command Purpose
Step 3 interface interface-type slot/port Enters interface configuration mode.
Example:
switch(config)# interface ethernet
1/2
switch(config-if)#
Step 4 hsrp group-number [ipv4 | ipv6] Creates an HSRP group and enters hsrp configuration mode.
Example:
switch(config-if)# hsrp 2
switch(config-if-hsrp)#
Step 5 priority [value] Sets the priority level used to select the active router in an
HSRP group. The range is from 0 to 255. The default is 100.
Example:
switch(config-if-hsrp)# priority 254
Step 6 track object-number [decrement Specifies an object to be tracked that affects the weighting
value] of an HSRP interface.
Example: The value argument specifies a reduction in the priority of
switch(config-if-hsrp)# track 1 an HSRP interface when a tracked object fails. The range is
decrement 20
from 1 to 255. The default is 10.
Step 7 preempt [delay [minimum seconds] Configures the router to take over as the active router for an
[reload seconds] [sync seconds]] HSRP group if it has a higher priority than the current active
Example:
router. This command is disabled by default. The range is
switch(config-if-hsrp)# preempt from 0 to 3600 seconds.
delay minimum 60
Step 8 show hsrp interface interface-type (Optional) Displays HSRP information for an interface.
number
Example:
switch(config-if-hsrp)# show hsrp
interface ethernet 1/2
Step 9 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-if-hsrp)# copy
running-config startup-config
The following example shows how to configure HSRP object tracking on Ethernet 1/2:
switch# config t
switch(config)# track 1 interface ethernet 2/2 line-protocol
switch(config)# interface ethernet 1/2
switch(config-if)# hsrp 2
switch(config-if-hsrp)# track 1 decrement 20
switch(config-if-hsrp)# copy running-config startup-config
If the standby router priority falls below the lower threshold, HSRP sends all standby router traffic across
the vPC trunk to forward through the active HSRP router. HSRP maintains this scenario until the standby
HSRP router priority increases above the upper threshold.
For IPv6 HSRP groups, if all group members have the same priority, HSRP selects the active router
based on the IPv6 link-local address.
DETAILED STEPS
To configure the HSRP priority, use the following command in interface configuration mode:
Command Purpose
priority level [forwarding-threshold lower Sets the priority level used to select the active
lower-value upper upper-value] router in an HSRP group. The level range is from
Example:
0 to 255. The default is 100. Optionally, sets the
switch(config-if-hsrp)# priority 60 upper and lower threshold values used by vPC to
forwarding-threshold lower 40 upper 50 determine when to fail over to the vPC trunk. The
lower-value range is from 1 to 255. The default is
1. The upper-value range is from 1 to 255. The
default is 255.
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > HSRP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure the HSRP priority on.
The system highlights the HSRP row in the Summary pane, and tabs update in the Details pane.
Step 3 From the highlighted Interface field, select the interface that you want to configure the HSRP priority
on from the drop-down list.
Step 4 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 5 From the Group Details tab, expand the Group Details section.
The basic group information appears in the Details pane.
Step 6 (Optional) From the Configured Priority field, enter the priority for this HSRP group member.
The range is from 1 to 255. The default is 100.
Step 7 (Optional) Check Forwarding Threshold and set the upper and lower threshold values used by vPC to
determine when to fail over to the vPC trunk.
The range is from 1 to 255. The lower threshold default is 1. The upper threshold default is 100.
Step 8 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Customizing HSRP
You can optionally customize the behavior of HSRP. Be aware that as soon as you enable an HSRP group
by configuring a virtual IP address, that group is now operational. If you first enable an HSRP group
before customizing HSRP, the router could take control over the group and become the active router
before you finish customizing the feature. If you plan to customize HSRP, you should do so before you
enable the HSRP group.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > HSRP.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure HSRP on.
The system highlights the HSRP row in the Summary pane, and tabs update in the Details pane.
Step 3 From the highlighted Interface field, select the interface that you want to configure an HSRP group on
from the drop-down list.
Step 4 From the Details pane, click the Group Details tab.
The Group Details tab appears.
Step 5 From the Group Details tab, expand the Timers section.
The HSRP timers information appears in the Details pane.
Step 6 From the Configured Timers area, in the Hello Time field, enter the hello time.
Step 7 Choose sec or msec from the drop-down list.
Step 8 From the Configured Timers area, in the Hold Time field, enter the hold time.
Step 9 Choose sec or msec from the drop-down list.
Step 10 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Command Purpose
name string Specifies the IP redundancy name for an HSRP group.
The string is from 1 to 255 characters. The default string
Example:
switch(config-if-hsrp)# name HSRP-1
has the following format:
hsrp-<interface-short-name>-<group-id>. For example,
hsrp-Eth2/1-1.
preempt [delay [minimum seconds] Configures the router to take over as an active router for
[reload seconds] [sync seconds]] an HSRP group if it has a higher priority than the current
Example:
active router. This command is disabled by default. The
switch(config-if-hsrp)# preempt delay range is from 0 to 3600 seconds.
minimum 60
timers [msec] hellotime [msec] Configures the hello and hold time for this HSRP member
holdtime as follows:
Example: • hellotime—The interval between successive hello
switch(config-if-hsrp)# timers 5 18 packets sent. The range is from 1 to 254 seconds.
• holdtime—The interval before the information in the
hello packet is considered invalid. The range is from
3 to 255.
The optional msec keyword specifies that the argument is
expressed in milliseconds, instead of the default seconds.
The timer ranges for milliseconds are as follows:
• hellotime—The interval between successive hello
packets sent. The range is from 255 to 999
milliseconds.
• holdtime—The interval before the information in the
hello packet is considered invalid. The range is from
750 to 3000 milliseconds.
Note You must configure extended hold timers on all HSRP routers if you configure extended hold timers. If
you configure a nondefault hold timer, you should configure the same value on all HSRP routers when
you configure HSRP extended hold timers.
Note HSRP extended hold timers are not applied if you configure millisecond HSRP hello and hold timers.
To configure HSRP extended hold timers, use the following command in global configuration mode:
Command Purpose
hsrp timers extended-hold [timer] Sets the HSRP extended hold timer, in seconds.
The timer range is from 10 to 255. The default is
Example:
switch(config)# hsrp timers extended-hold
10.
Use the show hsrp command or the show running-config hsrp command to display the extended hold
time.
Command Purpose
show hsrp [group group-number] Displays the HSRP status for all groups or one
group.
show hsrp delay [interface interface-type Displays the HSRP delay value for all interfaces
slot/port] or one interface.
show hsrp [interface interface-type slot/port] Displays the HSRP status for an interface.
show hsrp [group group-number] [interface Displays the HSRP status for a group or interface
interface-type slot/port] [active] [all] [init] for virtual forwarders in the active, init, learn,
[learn] [listen] [speak] [standby] listen, or standby state. Use the all keyword to see
all states, including disabled.
show hsrp [group group-number] [interface Displays a brief summary of the HSRP status for
interface-type slot/port] active] [all] [init] a group or interface for virtual forwarders in the
[learn] [listen] [speak] [standby] brief active, init, learn, listen, or standby state. Use the
all keyword to see all states, including disabled.
Field Description
Router
Group ID Display only. Group number for the HSRP group.
Group Name Name of the HSRP group.
Configured Priority Configured priority for the group.
Virtual MAC Address MAC address of the virtual router.
Active Priority Display only. Priority for the group.
Router State Display only. State of the group.
State Change Count Display only. Number of state changes for the group.
Field Description
Last State Change Display only. Time of the last state change for the group.
IP Address Settings
Autoconfigure IP Configures the virtual IPv6 address from the link-local address and the
address HSRP virtual MAC address.
Learn Virtual IP from Learns the virtual IPv4 or IPv6 address from other members of the HSRP
Members of Group group.
Virtual IP Address IPv4 address of the virtual router.
Secondary IP Address Secondary IPv4 address of the virtual router.
Forwarding Threshold
Forwarding Threshold Enables threshold values for vPC.
Lower Threshold Lower forwarding threshold value.
Upper Threshold Upper forwarding threshold value.
Active Router
IP Address Display only. IPv4 or IPv6 address of the active router.
Priority Display only. Priority of the active router.
Standby Router
IP Address Display only. IPv4 or IPv6 address of the standby router.
Priority Display only. Priority of the standby router.
Field Description
Authentication
Method Authentication method for this HSRP group.
Password Password if text authentication is selected.
Key Chain Key chain name if key-chain authentication is selected.
Key Password if key-chain authentication is not selected.
Encrypted Encrypts the password for this HSRP group.
Router Preemption
Router Preemption Enables router preemption.
Minimum Delay Minimum time that router preemption can be delayed.
Sync Delay Maximum time to allow IP redundancy clients to prevent router preemption.
Reload Delay Time after a router reload occurs before HSRP detects an interface up event.
Field Description
Active Timer Values
Hello Time Display only. Hello time for this HSRP group.
Hold Time Display only. Hold time for this HSRP group.
Configured Timer s
Hello Time Hello time for this HSRP group.
Hold Time Hold time for this HSRP group.
sec/msec Unit of time for the configured timer.
Field Description
Track ID Object tracking identifier.
Tracked Object Display only. Name of the tracked object.
Decrement Value to decrement the HSRP group priority if tracked object status is down.
Field Description
HSRP Version Version of HSRP for all groups on this interface.
Minimum Delay Minimum time to delay HSRP group initialization after this interface comes
up.
Reload Delay Time to delay after a router reload occurs before HSRP detects this interface
is up.
Use Burned In Address Use the burned-in MAC address of this interface instead of the HSRP virtual
MAC address.
Additional References
For additional information related to implementing HSRP, see the following sections:
• Related Documents, page 5-142
Related Documents
Related Topic Document Title
Configuring the Gateway Load Balancing protocol Chapter 4, “Configuring GLBP”
HSRP CLI commands Cisco Nexus 7000 Series NX-OS Unicast Routing Command
Reference
Configuring high availability Cisco Nexus 7000 Series NX-OS High Availability and Redundancy
Guide, Release 5.x
MIBs
MIBs MIBs Link
CISCO-HSRP-MIB To locate and download MIBs, go to the following URL:
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
This chapter describes how to configure object tracking on the Cisco DC-OS Cisco NX-OS device.
This chapter includes the following sections:
• Information About Object Tracking, page 6-143
• Licensing Requirements for Object Tracking, page 6-145
• Prerequisites for Object Tracking, page 6-145
• Guidelines and Limitations, page 6-146
• Default Settings, page 6-146
• Platform Support, page 6-146
• Configuring Object Tracking, page 6-146
• Verifying the Object Tracking Configuration, page 6-163
• Viewing Client Details, page 6-163
• Configuration Examples for Object Tracking, page 6-164
• Related Topics, page 6-164
• Field Descriptions for Object Tracking, page 6-164
• Field Descriptions for Object Tracking, page 6-164
• Feature History for Object Tracking, page 6-166
• Threshold weight—Assign a weight value to each object in the tracked list, and a weight threshold
for the track list. If the combined weights of all up objects exceeds the track list weight up threshold,
the track list is in an up state. If the combined weights of all the down objects exceeds the track list
weight down threshold, the track list is in the down state.
Other entities, such as virtual Port Channels (vPCs) can use an object track list to modify the state of a
vPC based on the state of the multiple peer links that create the vPC. See the Cisco Nexus 7000 Series
NX-OS Interfaces Configuration Guide, Release 5.x, for more information on vPCs.
See the “Configuring an Object Track List with a Boolean Expression” section on page 6-155 for more
information on track lists.
High Availability
Object tracking supports high availability through stateful restarts. A stateful restart occurs when the
object tracking process crashes. Object tracking also supports a stateful switchover on a dual supervisor
system. Cisco NX-OS applies the runtime configuration after the switchover.
You can also use object tracking to modify the behavior of a client to improve overall network
availability.
Virtualization Support
Object tracking supports Virtual Routing and Forwarding (VRF) instances. VRFs exist within virtual
device contexts (VDCs). By default, Cisco NX-OS places you in the default VDC and default VRF
unless you specifically configure another VDC and VRF. By default, Cisco NX-OS tracks the route
reachability state of objects in the default VRF. If you want to track objects in another VRF, you must
configure the object to be a member of that VRF (see the “Configuring Object Tracking for a Nondefault
VRF” section on page 6-162).
• System-message logging levels for the Object Tracking feature must meet or exceed Cisco DCNM
requirements. During device discovery, Cisco DCNM detects inadequate logging levels and raises
them to the minimum requirements. Cisco Nexus 7000 Series switches that run Cisco NX-OS
Release 4.0 are an exception. For Cisco NX-OS Release 4.0, prior to device discovery, use the
command-line interface to configure logging levels to meet or exceed Cisco DCNM requirement.
Note For a full list of feature-specific prerequisites, see the platform-specific documentation.
• If you configure VDCs, install the Advanced Services license and enter the desired VDC (see the
Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide, Release 5.x).
Default Settings
Table 6-1 lists the default settings for object tracking parameters.
Parameters Default
Tracked Object VRF Member of default VRF
Platform Support
The following platform supports this feature. For platform-specific information, including guidelines
and limitations, system defaults, and configuration limits, see the corresponding documentation.
Platform Documentation
Cisco Nexus 7000 Series switches Cisco Nexus 7000 Series Switches Documentation
Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature
might differ from the Cisco IOS commands that you would use.
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. track object-id interface interface-type number {{ip | ipv6} routing | line-protocol}
3. show track [object-id]
4. copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > Object Tracking.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure object tracking on.
Step 3 From the menu bar, choose Actions > New Track Object.
The system highlights the new tracked object row in the Summary pane, and tabs update in the Details
pane.
Step 4 From the highlighted Track Object ID field, enter the object ID.
Step 5 From the Details pane, click the Object Tracking Details tab.
RELATED TOPICS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 track object-id interface interface-type Creates a tracked object for an interface and enters
number {{ip | ipv6} routing | tracking configuration mode. The object-id range is
line-protocol}
from 1 to 500.
Example:
switch(config)# track 1 interface
ethernet 1/2 line-protocol
switch(config-track#
Step 3 show track [object-id] (Optional) Displays object tracking information.
Example:
switch(config-track)# show track 1
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-track)# copy
running-config startup-config
This example shows how to configure object tracking for the line protocol state on Ethernet 1/2:
switch# config t
switch(config)# track 1 interface ethernet 1/2 line-protocol
switch(config-track)# copy running-config startup-config
This example shows how to configure object tracking for the IPv4 routing state on Ethernet 1/2:
switch# config t
switch(config)# track 2 interface ethernet 1/2 ip routing
switch(config-track)# copy running-config startup-config
This example shows how to configure object tracking for the IPv6 routing state on Ethernet 1/2:
switch# config t
switch(config)# track 3 interface ethernet 1/2 ipv6 routing
switch(config-track)# copy running-config startup-config
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. track object-id interface interface-type number { ipv6 routing}
3. show track [object-id]
4. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 track object-id interface interface-type Creates a tracked object for an interface and enters
number {ipv6 routing} tracking configuration mode. The object-id range is
Example:
from 1 to 500.
switch(config)# track 1 interface
ethernet 1/2 line-protocol
switch(config-track#
Step 3 show track [object-id] (Optional) Displays object tracking information.
Example:
switch(config-track)# show track 1
Track 1
IPv6 Route 1::2/64 Reachability
Reachability is DOWN
0 changes, last change never
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-track)# copy
running-config startup-config
This example shows how to configure object tracking for the IPv6 routing state on Ethernet 1/2:
switch# config t
switch(config)# track 3 interface ethernet 1/2 ipv6 routing
switch(config-track)# copy running-config startup-config
You can configure Cisco NX-OS to track the line protocol or IPv6 routing state of an interface.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > Object Tracking.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure object tracking on.
Step 3 From the menu bar, choose Actions > New Track Object.
The system highlights the new tracked object row in the Summary pane, and tabs update in the Details
pane.
Step 4 From the highlighted Track Object ID field, enter the object ID.
Step 5 From the Details pane, click the Object Tracking Details tab.
The Object Tracking Details tab appears.
Step 6 From the Object Tracking Details tab, in the Tracking Object Type drop-down list, choose Interface.
Step 7 From the Instance drop-down list, choose the interface that you want to track.
Step 8 From the Parameter drop-down list, choose IPv6 Routing.
Step 9 From the menu bar, choose File > Deploy to apply your changes to the device.
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. no track object-id interface interface-type number { ipv6 routing}
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > Object Tracking.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure object tracking on.
Step 3 From the menu bar, choose Actions > New Track Object.
The system highlights the new tracked object row in the Summary pane, and tabs update in the Details
pane.
Step 4 From the highlighted Track Object ID field, enter the object ID.
Step 5 From the Details pane, click the Object Tracking Details tab.
The Object Tracking Details tab appears.
Step 6 From the Object Tracking Details tab, in the Tracking Object Type drop-down list, choose Interface.
Step 7 From the Instance drop-down list, choose the interface that you want to track.
Step 8 From the Parameter drop-down list, choose IPv6 Routing.
Step 9 Right-click on IPv6 Routing, choose Track Object.
A pop-up dialog box appears.
Step 10 Choose Yes or No to apply your changes to the device.
RELATED TOPICS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 no track object-id interface Deletes a tracked object for an interface. The object-id
interface-type number {ipv6 routing} range is from 1 to 500.
Example:
switch(config)# no track 1 interface
ethernet 1/2 line-protocol
switch(config-track#
This example shows how to delete object tracking for the IPv6 routing state on Ethernet 1/2:
switch# config t
switch(config)# no track 3 interface ethernet 1/2 ipv6 routing
switch(config-track)# copy running-config startup-config
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. track object-id ipv6 route routev6 prefix
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > Object Tracking.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure object tracking on.
Step 3 From the menu bar, choose Actions > New Track Object.
The system highlights the new tracked object row in the Summary pane, and tabs update in the Details
pane.
Step 4 From the highlighted Track Object ID field, enter the object ID.
Step 5 From the Details pane, click the Object Tracking Details tab.
The Object Tracking Details tab appears.
Step 6 From the Object Tracking Details tab, in the Tracking Object Type drop-down list, choose IP Route.
Step 7 In the Instance field, enter the prefix and network mask length that you want to track.
For IPv6, the format is A:B:C::D/length.
Step 8 (Optional) From the VRF name drop-down list, choose the VRF where this route exists.
The default is the default VRF.
Step 9 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 track object-id ipv6 route route prefix Creates a tracked object for IPv6 route and enters
tracking configuration mode. The object-id range is
Example:
switch# config t
from 1 to 500.
switch(config-track)# track 1 ipv6 route
1::2/64 reachability
Command Purpose
Step 3 track object-id vrf member vrf-name Creates a tracked object for nondefault VRF IP route
IPv6. The object-id range is from 1 to 500.
Example:
switch(config-track)# track 1 vrf member
abc
Step 4 show track [object-id] (Optional) Displays object tracking information.
Example:
switch(config-track)# show track 1
Track 1
IPv6 Route 1::2/64 Reachability
Reachability is DOWN
0 changes, last change never
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-track)# copy
running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > Object Tracking.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure object tracking on.
Step 3 From the menu bar, choose Actions > New Track Object.
The system highlights the new tracked object row in the Summary pane, and tabs update in the Details
pane.
Step 4 From the highlighted Track Object ID field, enter the object ID.
Step 5 From the Details pane, click the Object Tracking Details tab.
The Object Tracking Details tab appears.
Step 6 From the Object Tracking Details tab, in the Tracking Object Type drop-down list, choose Interface.
Step 7 From the Instance drop-down list, choose the interface that you want to track.
Step 8 From the Parameter drop-down list, choose IP Routing.
Step 9 Right-click and choose Track Object.
A pop-up dialog box appears.
Step 10 Choose Yes or No to apply your changes to the device.
RELATED TOPICS
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. track object-id {ip | ipv6} route prefix/length reachability
3. show track [object-id]
4. copy running-config startup-config
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > Object Tracking.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to configure object tracking on.
Step 3 From the menu bar, choose Actions > New Track Object.
The system highlights the new tracked object row in the Summary pane, and tabs update in the Details
pane.
Step 4 From the highlighted Track Object ID field, enter the object ID.
Step 5 From the Details pane, click the Object Tracking Details tab.
The Object Tracking Details tab appears.
Step 6 From the Object Tracking Details tab, in the Tracking Object Type drop-down list, choose IP Route.
Step 7 In the Instance field, enter the prefix and network mask length that you want to track.
For IPv4, the format is A.B.C.D/length. For IPv6, the format is A:B:C::D/length.
Step 8 (Optional) From the VRF name drop-down list, choose the VRF where this route exists.
The default is the default VRF.
Step 9 From the menu bar, choose File > Deploy to apply your changes to the device.
RELATED TOPICS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 track object-id {ip | ipv6} route Creates a tracked object for a route and enters tracking
prefix/length reachability configuration mode. The object-id range is from 1 to
Example:
500. The prefix format for IP is A.B.C.D/length, where
switch(config)# track 2 ip route the length range is from 1 to 32. The prefix format for
192.0.2.0/8 reachability IPv6 is A:B::C:D/length, where the length range is
switch(config-track)# from 1 to 128.
Step 3 show track [object-id] (Optional) Displays object tracking information.
Example:
switch(config-track)# show track 1
Step 4 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-track)# copy
running-config startup-config
This example shows how to configure object tracking for an IPv4 route in the default VRF.
switch# config t
switch(config)# track 4 ip route 192.0.2.0/8 reachability
switch(config-track)# copy running-config startup-config
This example shows how to configure object tracking for an IPv6 route in the default VRF.
switch# config t
switch(config)# track 5 ipv6 route 10::10/128 reachability
switch(config-track)# copy running-config startup-config
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 track track-number list boolean {and | Configures a tracked list object and enters tracking
or} configuration mode. Specifies that the state of the
Example:
tracked list is based on a Boolean calculation. The
switch(config)# track 1 list boolean and keywords are as follows:
switch(config-track#
• and—Specifies that the list is up if all objects are
up, or down if one or more objects are down. For
example when tracking two interfaces, up means
that both interfaces are up, and down means that
either interface is down.
• or—Specifies that the list is up if at least one
object is up. For example, when tracking two
interfaces, up means that either interface is up, and
down means that both interfaces are down.
The track-number range is from 1 to 500.
Step 3 object object-id [not] Adds a tracked object to the track list. The object-id
range is from 1 to 500. The not keyword optionally
Example:
switch(config-track)# object 10
negates the tracked object state.
Note The example means that when object 10 is up,
the tracked list detects object 10 as down.
Step 4 show track (Optional) Displays object tracking information.
Example:
switch(config-track)# show track
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-track)# copy
running-config startup-config
This example shows how to configure a track list with multiple objects as a Boolean “and”:
switch# config t
switch(config)# track 1 list boolean and
switch(config-track)# object 10
switch(config-track)# object 20 not
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. track track-number list threshold percentage
3. threshold percentage up up-value down down-value
4. object object-number
5. show track
6. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 track track-number list threshold Configures a tracked list object and enters tracking
percentage configuration mode. Specifies that the state of the
Example:
tracked list is based on a configured threshold percent.
switch(config)# track 1 list threshold The track-number range is from 1 to 500.
percentage
switch(config-track#
Step 3 threshold percentage up up-value down Configures the threshold percent for the tracked list.
down-value The range from 0 to 100 percent.
Example:
switch(config-track)# threshold
percentage up 70 down 30
Step 4 object object-id Adds a tracked object to the track list. The object-id
range is from 1 to 500.
Example:
switch(config-track)# object 10
Command Purpose
Step 5 show track (Optional) Displays object tracking information.
Example:
switch(config-track)# show track
Step 6 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-track)# copy
running-config startup-config
This example shows how to configure a track list with an up threshold of 70% and a down threshold of
30%:
switch# config t
switch(config)# track 1 list threshold percentage
switch(config-track)# threshold percentage up 70 down 30
switch(config-track)# object 10
switch(config-track)# object 20
switch(config-track)# object 30
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. track track-number list threshold weight
3. threshold weight up up-value down down-value
4. object object-number weight value
5. show track
6. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 track track-number list threshold weight Configures a tracked list object and enters tracking
configuration mode. Specifies that the state of the
Example:
switch(config)# track 1 list threshold
tracked list is based on a configured threshold weight.
weight The track-number range is from 1 to 500.
switch(config-track#
Step 3 threshold weight up up-value down Configures the threshold weight for the tracked list.
down-value The range from 1 to 255.
Example:
switch(config-track)# threshold weight
up 30 down 10
Step 4 object object-id weight value Adds a tracked object to the track list. The object-id
range is from 1 to 500. The value range is from 1 to
Example:
switch(config-track)# object 10 weight
255. The default weight value is 10.
15
Step 5 show track (Optional) Displays object tracking information.
Example:
switch(config-track)# show track
Step 6 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-track)# copy
running-config startup-config
This example shows how to configure a track list with an up weight threshold of 30 and a down threshold
of 10:
switch# config t
switch(config)# track 1 list threshold weight
switch(config-track)# threshold weight up 30 down 10
switch(config-track)# object 10 weight 15
switch(config-track)# object 20 weight 15
switch(config-track)# object 30
In this example, the track list is up if object 10 and object 20 are up, and the track list goes to the down
state if all three objects are down.
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. track object-id {parameters}
or
track track-number list {parameters}
3. delay {up up-time [down down-time] | down down-time [up up-time]}
4. show track
5. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 track object-id {parameters} Creates a tracked object for a route and enters tracking
configuration mode. The object-id range is from 1 to
Example:
switch(config)# track 2 ip route
500. The prefix format for IP is A.B.C.D/length, where
192.0.2.0/8 reachability the length range is from 1 to 32. The prefix format for
switch(config-track)# IPv6 is A:B::C:D/length, where the length range is
from 1 to 128.
Command Purpose
Step 3 track track-number list {parameters} Configures a tracked list object and enters tracking
configuration mode. Specifies that the state of the
Example:
switch(config)# track 1 list threshold
tracked list is based on a configured threshold weight.
weight The track-number range is from 1 to 500.
switch(config-track#
Step 4 delay {up up-time [down down-time] | Configures the object delay timers. The range is from
down down-time [up up-time]} 0 to 180 seconds.
Example:
switch(config-track)# delay up 20 down
30
Step 5 show track (Optional) Displays object tracking information.
Example:
switch(config-track)# show track 3
Step 6 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-track)# copy
running-config startup-config
This example shows how to configure object tracking for a route and use delay timers:
switch# config t
switch(config)# track 2 ip route 209.165.201.0/8 reachability
switch(config-track)# delay up 20 down 30
switch(config-track)# copy running-config startup-config
This example shows how to configure a track list with an up weight threshold of 30 and a down threshold
of 10 with delay timers:
switch# config t
switch(config)# track 1 list threshold weight
switch(config-track)# threshold weight up 30 down 10
switch(config-track)# object 10 weight 15
switch(config-track)# object 20 weight 15
switch(config-track)# object 30
switch(config-track)# delay up 20 down 30
This example shows the delay timer in the show track command output before and after an interface is
shut down:
switch(config-track)# show track
Track 1
Interface loopback1 Line Protocol
Line Protocol is UP
1 changes, last change 00:00:13
Delay down 10 secs
Ensure that you are in the correct VDC (or use the switchto vdc command).
SUMMARY STEPS
1. config t
2. track object-id {ip | ipv6} route prefix/length reachability
3. vrf member vrf-name
4. show track [object-id]
5. copy running-config startup-config
DETAILED STEPS
Command Purpose
Step 1 config t Enters configuration mode.
Example:
switch# config t
switch(config)#
Step 2 track object-id {ip | ipv6} route Creates a tracked object for a route and enters tracking
prefix/length reachability configuration mode. The object-id range is from 1 to
Example:
500. The prefix format for IP is A.B.C.D/length, where
switch(config)# track 2 ip route the length range is from 1 to 32. The prefix format for
192.0.2.0/8 reachability IPv6 is A:B::C:D/length, where the length range is
switch(config-track)# from 1 to 128.
Step 3 vrf member vrf-name Configures the VRF to use for tracking the configured
object.
Example:
switch(config-track)# vrf member Red
Step 4 show track [object-id] (Optional) Displays object tracking information.
Example:
switch(config-track)# show track 3
Step 5 copy running-config startup-config (Optional) Saves this configuration change.
Example:
switch(config-track)# copy
running-config startup-config
This example shows how to configure object tracking for a route and use VRF Red to look up
reachability information for this object:
switch# config t
switch(config)# track 2 ip route 209.165.201.0/8 reachability
switch(config-track)# vrf member Red
switch(config-track)# copy running-config startup-config
This example shows how to modify tracked object 2 to use VRF Blue instead of VRF RED to look up
reachability information for this object:
switch# config t
switch(config)# track 2
switch(config-track)# vrf member Blue
switch(config-track)# copy running-config startup-config
Command Purpose
show track [object-id] [brief] Displays the object tracking information for one
or more objects.
show track [object-id] interface [brief] Displays the interface-based object tracking
information.
show track [object-id] {ip | ipv6} route [brief] Displays the IPv4 or IPv6 route-based object
tracking information.
show trun track Displays the IP route IPv6 object tracking
configuration information.
DETAILED STEPS
Step 1 From the Feature Selector pane, choose Routing > Gateway Redundancy > Object Tracking.
The available devices appear in the Summary pane.
Step 2 From the Summary pane, click the device that you want to view tracked objects on.
Step 3 Click the tracked object that you want to view clients for.
The system highlights the tracked object row in the Summary pane, and tabs update in the Details pane.
Step 4 From the Details pane, click the Object Tracking Details tab.
The Object Tracking Details tab appears.
Step 5 From the Object Tracking Details tab, click the Client Details section.
RELATED TOPICS
Related Topics
See the following topics for information related to object tracking:
• Chapter 4, “Configuring GLBP”
• Chapter 5, “Configuring HSRP”
Field Description
Track Object ID Display only. Object number for the tracked object.
Tracking Object Type Type of object to track.
Instance IPv4 or IPv6 address or interface to track for this object.
VRF VRF that the tracked interface exists in.
Parameter Parameter type to track for this object.
Tracking Status Display only. Status of the tracked object parameter.
Field Description
Last status Change Display only. Time the parameter last changed status for this object.
Time
Field Description
Client Name Display only. Name of the feature that uses this tracked object.
Client Interface Interface that uses this tracked object for the named client feature.
Client Group-ID Display only. ID for the group that uses this tracked object for the named
client feature.
Additional References
For additional information related to implementing object tracking, see the following sections:
• Related Documents, page 6-166
• Standards, page 6-166
Related Documents
Related Topic Document Title
Object Tracking CLI commands Cisco Nexus 7000 Series NX-OS Unicast Routing Command
Reference
Configuring the Embedded Event Manager Cisco Nexus 7000 Series NX-OS System Management Configuration
Guide, Release 5.x
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not been
modified by this feature.
This appendix lists the IETF RFCs supported in Cisco NX-OS Release 7.0.x.
BGP RFCs
RFCs Title
RFC 1997 BGP Communities Attribute
RFC 2385 Protection of BGP Sessions via the TCP MD5 Signature Option
RFC 2439 BGP Route Flap Damping
RFC 2519 A Framework for Inter-Domain Route Aggregation
RFC 2545 Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain
Routing
RFC 2858 Multiprotocol Extensions for BGP-4
RFC 3065 Autonomous System Confederations for BGP
RFC 3392 Capabilities Advertisement with BGP-4
RFC 4271 A Border Gateway Protocol 4 (BGP-4)
RFC 4273 Definitions of Managed Objects for BGP-4
RFC 4456 BGP Route Reflection: An Alternative to Full Mesh Internal BGP
(IBGP)
RFC 4486 Subcodes for BGP Cease Notification Message
RFC 4724 Graceful Restart Mechanism for BGP
RFC 4893 BGP Support for Four-octet AS Number Space
RFC 5004 Avoid BGP Best Path Transitions from One External to Another
draft-ietf-idr-bgp4-mib-15.txt BGP4-MIB
draft-kato-bgp-ipv6-link-local-00.txt BGP4+ Peering Using IPv6 Link-local Address
IP Services RFCs
RFCs Title
RFC 786 UDP
RFC 791 IP
RFC 792 ICMP
RFC 793 TCP
RFC 826 ARP
RFC 1027 Proxy ARP
RFC 1591 DNS Client
RFC 1812 IPv4 routers
IPv6 RFCs
RFCs Title
RFC 1981 Path MTU Discovery for IP version 6
RFC 2373 IP Version 6 Addressing Architecture
RFC 2374 An Aggregatable Global Unicast Address Format
RFC 2460 Internet Protocol, Version 6 (IPv6) Specification
RFC 2461 Neighbor Discovery for IP Version 6 (IPv6)
RFC 2462 IPv6 Stateless Address Autoconfiguration
RFC 2463 Internet Control Message Protocol (ICMPv6) for the Internet
Protocol Version 6 (IPv6) Specification
RFC 2464 Transmission of IPv6 Packets over Ethernet Networks
RFC 3152 Delegation of IP6.ARPA
RFC 3162 RADIUS and IPv6
RFC 3513 Internet Protocol Version 6 (IPv6) Addressing Architecture
RFC 3596 DNS Extensions to Support IP version 6
RFC 4193 Unique Local IPv6 Unicast Addresses
IS-IS RFCs
RFCs Title
RFC 1142 OSI 10589 Intermediate system to intermediate system intra-domain
routing exchange protocol
RFC 1195 Use of OSI IS-IS for routing in TCP/IP and dual environment
RFC 2763 Dynamic Hostname Exchange Mechanism for IS-IS
RFC 2966 Domain-wide Prefix Distribution with Two-Level IS-IS
RFC 2972 IS-IS Mesh Groups
RFC 3273 Three-Way Handshake for IS-IS Point-to-Point Adjacencies
RFC 3277 IS-IS Transient Blackhole Avoidance
RFC 3567 IS-IS Cryptographic Authentication
RFC 3847 Restart Signaling for IS-IS
draft-ietf-isis-igp-p2p-over-lan-06.txt Internet Draft Point-to-point operation over LAN in link-state
routing protocols
OSPF RFCs
RFCs Title
RFC 2328 OSPF Version 2
RFC 2740 OSPF for IPv6
RFC 3623 Graceful OSPF Restart
RFC 3101 The OSPF Not-So-Stubby Area (NSSA) Option
RFC 2370 The OSPF Opaque LSA Option
RFC 3137 OSPF Stub Router Advertisement
draft-ietf-ospf-ospfv3-graceful-restart-04.txt OSPFv3 Graceful Restart
RIP RFCs
RFCs Title
RFC 2453 RIP Version 2
RFC 2082 RIP-2 MD5 Authentication
INDEX
comparing
A
link-state and distance vector routing algorithms 1-25
address formats
IPv4 2-34
IPv6 3-58
D
IPv6 (table) 3-58 default settings
address resolution protocol. See ARP GLBP 4-91
aggregatable global addresses. See IPv6 HSRP 5-119
unicast addresses IP 2-39
ARP IPv6 3-74
caching 2-35 object tracking 6-146
configuring gratuitous ARP 2-46 distance vector routing algorithms 1-25
configuring Local Proxy ARP 2-46 DNS 3-68
configuring Proxy ARP 2-45 documentation
configuring static ARP entries 2-44 additional publications 2-10, 2-12
description 2-35 updates 2-14
gratuitous ARP 2-37
Local Proxy ARP 2-37
process (figure) 2-35 E
Proxy ARP 2-37 ECMP. See equal cost multipath
Reverse ARP 2-36 equal cost multipath 1-22
AS numbers
4-byte support. 1-21
ranges (table) 1-21 F
FIB
B description 1-27
VRFs 1-27
BFD forwarding
HSRP 5-117 adjacency manager 1-27
architecture 1-26
FIB 1-27
C
unicast forwarding distribution module 1-27
CDP 3-68 forwarding information base. See FIB
Virtual Device Context Configuration Guide, Cisco DCNM for LAN, Release 7.0.x
IN-171
Index
Se n d d o c u m e n t c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m .
Virtual Device Context Configuration Guide, Cisco DCNM for LAN, Release 7.0.x
IN-172 OL-27532-01
Index
Se n d d o c u m e n t c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m .
Virtual Device Context Configuration Guide, Cisco DCNM for LAN, Release 7.0.x
IN-173
Index
Se n d d o c u m e n t c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m .
M P
ND
R
configuring 3-78
description 3-69 Really Simple Syndication. See RSS
neighbor discovery. See ND redistiribution
neighbor redirect message 3-72 description 1-22
new and changed features (table) 1-15 related documents 2-12
Reverse ARP
description 2-36
O
limitations 2-37
object tracking RFC 2-36
configuring a delay 6-160 RIB
configuring a track list with boolean expression 6-155 description 1-26
configuring a track list with percentage 6-157, 6-158 router advertisement message 3-71
configuring for a nonDefault VRF 6-162 route table
configuring for GLBP 4-97 description 1-18
configuring for route reachability 6-154 routing algorithms
configuring on an interface 6-147 distance vector 1-25
default settings 6-146 link-state 1-25
description 6-143 routing protocols
example configuration 6-164 comparing link-state algorithms to distance vector
algorithms 1-25
feature history (table) 6-166
description 1-17 to 1-23
guidelines 6-146
distance vector 1-25
high availability 6-145
link-state 1-25
licensing requirements 6-145
redistribution 1-22
limitations 6-146
virtualization 1-25
prerequisites 6-145
RSS
track list 6-144
documentation feed 2-14
verifying configuration 6-163
viewing client details 6-163
virtualization support 6-145 S
OSPF
MIBs 5-142
service
Virtual Device Context Configuration Guide, Cisco DCNM for LAN, Release 7.0.x
IN-174 OL-27532-01
Index
Se n d d o c u m e n t c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m .
requests 2-14
static routes
description 1-23
with ARP 2-36
stub routing
description 1-22
virtualization
description 1-25
layer 3 (figure) 1-25
Virtual Device Context Configuration Guide, Cisco DCNM for LAN, Release 7.0.x
IN-175
Index
Se n d d o c u m e n t c o m m e n t s t o d c n m - d o c f e e d b a ck @ c i s c o . c o m .
Virtual Device Context Configuration Guide, Cisco DCNM for LAN, Release 7.0.x
IN-176 OL-27532-01