I could already configure what is described in the documentation, but – When there are two CSRs actively forwarding traffic for each different Availability Zone (AZ), and a failover (VPC Route Table modification made by CSR) happens, nothing happens after when affected CSR is back normal. But when the affected CSR is back, I'd like the VPC Route Table to get modified again, so that it's original entry will be restored. Is there any way to do that?
Also, how do both CSRs know, which one of them should do the take over? I mean, if they're both running normally but BFD gets's down, they should both try do a take over (VPC Route Table modification)? But only one CSR does actually try to take over – as shown below.
*Nov 20 14:39:18.057: %BFDFSM-6-BFD_SESS_DOWN: BFD-SYSLOG: BFD session ld:4097 handle:1,is going Down Reason: ECHO FAILURE
*Nov 20 14:39:18.058: %VXE_CLOUD_HA-6-BFDEVENT: VXE BFD peer 172.17.1.2 interface Tunnel1 transitioned to down
*Nov 20 14:39:18.058: %BFD-6-BFD_SESS_DESTROYED: BFD-SYSLOG: bfd_session_destroyed, ld:4097 neigh proc:EIGRP, handle:1 act
*Nov 20 14:39:18.119: %DUAL-5-NBRCHANGE: EIGRP-IPv4 1: Neighbor 172.17.1.2 (Tunnel1) is down: BFD peer down notified
*Nov 20 14:39:19.740: %VXE_CLOUD_HA-6-SUCCESS: VXE Cloud HA BFD state transitioned, HA node 1 event route update successful
*Nov 20 14:39:16.512: %DUAL-5-NBRCHANGE: EIGRP-IPv4 1: Neighbor 172.17.1.1 (Tunnel1) is down: interface down
*Nov 20 14:39:16.512: %BFD-6-BFD_SESS_DESTROYED: BFD-SYSLOG: bfd_session_destroyed, ld:4097 neigh proc:EIGRP, handle:1 act
*Nov 20 14:39:17.920: %BFDFSM-6-BFD_SESS_DOWN: BFD-SYSLOG: BFD session ld:4097 handle:1,is going Down Reason: ECHO FAILURE
*Nov 20 14:39:17.920: %VXE_CLOUD_HA-6-BFDEVENT: VXE BFD peer 172.17.1.1 interface Tunnel1 transitioned to down
*Nov 20 14:39:18.511: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel1, changed state to down
*Nov 20 14:39:18.512: %LINK-5-CHANGED: Interface Tunnel1, changed state to administratively down
Does anybody have an experience in such configuration? Any advice would be very much appreciated.
Cisco IOS-XE 17.3.1 – Catalyst Switching Updates
Table of Contents
Hardware Additions since IOS-XE 17.2.1
Key Summary Features
Platform and Infra Features
High Availability Features
Routing / MPLS / VPN Features
Hi Everyone,I have 2 queries1. After we configure the IPSec VPN in a Cisco Router, how do we identify and check that the traffic is flowing through the tunnel? Are there any commands and ways to find it out?2. What are some of t...
Cisco Champion Radio · S7|E29 Increase Visibility and Enhance Security with Cisco AI Endpoint Analytics
Cisco is on a journey to making networking smarter with artificial intelligence and machine learning. The latest stop in this journey, Cisco AI...
Community Live video- Introduction to Smart Licensing on Catalyst Switches
(Live event - formerly known as Webcast- Thursday 30 July, 2020 at 10 am Pacific/ 1 pm Eastern / 7 pm Paris)
This event had place on Thursday 30th, July 2020 at 10hrs PDT&nb...