Having 2 router with 2 sub interface configured with HSRP
The server seding the data have the route default gw xxx.xxx.xx.252 HSRP adress.
but on of the routers did got HW problem so we did shut it down, R2 with IP xxxx.xxxx.xxxx.251, problem so the traffic didnt go thure correct when was using the HSRP adress some packaged went thure but not all of them no blocks in the logs.
But then we did change the servern direct to to the working router R1 xxxx.xxxx.253 everything did start working fine again.
was working fine.
Logs i got in the router was
max tcp half-open connections
Iam wondering if i can get some ideas or help if something can be wrong in the configuration below and wondering why the traffic didnt
got thure correct when using the HSRP adress. Its working fine when using R1 IP adress.
tried to understand your situation but guess need some help.
so you have 2 routers, they are connected to a switch via trunk connections. on the switch there are 2 vlans and you have created 2 subinterfaces on the routers in order to be able to route between the vlans.
on the .192 subinterface you have enabled HSRP and made R2 the active router.
then you had to shut down R2, but R1 didnt take over as the active router?
all the hosts(server) had as GW address the virtual HSRP address configured, but now you had to change it and entered the real ip of R1 as GW. is that correct so far?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...