I could already configure what is described in the documentation, but – When there are two CSRs actively forwarding traffic for each different Availability Zone (AZ), and a failover (VPC Route Table modification made by CSR) happens, nothing happens after when affected CSR is back normal. But when the affected CSR is back, I'd like the VPC Route Table to get modified again, so that it's original entry will be restored. Is there any way to do that?
Also, how do both CSRs know, which one of them should do the take over? I mean, if they're both running normally but BFD gets's down, they should both try do a take over (VPC Route Table modification)? But only one CSR does actually try to take over – as shown below.
*Nov 20 14:39:18.057: %BFDFSM-6-BFD_SESS_DOWN: BFD-SYSLOG: BFD session ld:4097 handle:1,is going Down Reason: ECHO FAILURE
*Nov 20 14:39:18.058: %VXE_CLOUD_HA-6-BFDEVENT: VXE BFD peer 172.17.1.2 interface Tunnel1 transitioned to down
*Nov 20 14:39:18.058: %BFD-6-BFD_SESS_DESTROYED: BFD-SYSLOG: bfd_session_destroyed, ld:4097 neigh proc:EIGRP, handle:1 act
*Nov 20 14:39:18.119: %DUAL-5-NBRCHANGE: EIGRP-IPv4 1: Neighbor 172.17.1.2 (Tunnel1) is down: BFD peer down notified
*Nov 20 14:39:19.740: %VXE_CLOUD_HA-6-SUCCESS: VXE Cloud HA BFD state transitioned, HA node 1 event route update successful
*Nov 20 14:39:16.512: %DUAL-5-NBRCHANGE: EIGRP-IPv4 1: Neighbor 172.17.1.1 (Tunnel1) is down: interface down
*Nov 20 14:39:16.512: %BFD-6-BFD_SESS_DESTROYED: BFD-SYSLOG: bfd_session_destroyed, ld:4097 neigh proc:EIGRP, handle:1 act
*Nov 20 14:39:17.920: %BFDFSM-6-BFD_SESS_DOWN: BFD-SYSLOG: BFD session ld:4097 handle:1,is going Down Reason: ECHO FAILURE
*Nov 20 14:39:17.920: %VXE_CLOUD_HA-6-BFDEVENT: VXE BFD peer 172.17.1.1 interface Tunnel1 transitioned to down
*Nov 20 14:39:18.511: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel1, changed state to down
*Nov 20 14:39:18.512: %LINK-5-CHANGED: Interface Tunnel1, changed state to administratively down
Does anybody have an experience in such configuration? Any advice would be very much appreciated.
Inviting all network professionals in operations! We'd like to understand what would be valuable for you in a mobile application. Your response will help Cisco improve a product feature that could benefit you. Thanks!
Click here to take the sur...
Cisco’s software-defined wide area network (SD-WAN) solution allows user to quickly and seamlessly establish an overlay fabric to connect an enterprise’s data centers, branch and campus locations, as well as colocation facilities in order to imp...
1. Log into CLI of DNAC:
ssh maglev@< DNAC appliance IP> -p 2222
2. Run this curl command to get token to get member id:
curl -X POST -u admin:<admin user password> -H -V https://<CLUSTER-IP>/api/system/v1/identitymgmt/token
Enterprise Switching Business Unit is glad to announce Beta release 16.12.2 for all Catalyst 9200/9300/9400/9500/9600 and Catalyst 3650/3850 Platforms. This release is made available to allow users to test, evaluate and share fee...
Purpose of the document
This document describes the general recommendations or best practices when designing and deploying the Cisco SD-Access technology. The document assumes that the reader has a general overview of Cisco's SD-Access for Distributed C...