We have two servers connected to the same 4500 Multilayer switch, the two servers are working in active/stanby mode using virtual IP address between the two servers. On the 4500 switch, the MAC address of the servers virtual IP is the MAC address of the active servers. When the active server fails, the arp table on the 4500 does not update the VIP address with the backup server, so no one is able to access the server, till we clear arp. I thought of changing the ARP time out from 4 hours (default) to something like 10 sec, but my concern is that could lead to many broadcast requests. Any idea?
i think it down to the nodes to advertise their active NIC mac address to the switch. say you are using windows clustering for example, the servers only uses the same virtual IP not MAC address. so when the standby node takes over, the node should announce it mac address to the switch as the active node instead of you flusing the arp manaully.
I would imagine is more to do with the fact that the backup server isnt advertising that it now has the address to the switch until it sees a request initiated to it, which it wont get whilst the old ARP entry still exists. Flushing the ARP will clear the location of the server and thus flood the ports with a request that the backup will see and reply to hence adding the new location in the CAM table.
The CAM default age time should be 300 seconds, not 4 hours. As far as I am aware, so this might have been changed.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...