04-20-2017 02:39 PM - edited 03-05-2019 08:23 AM
We have 2 WAN circuits that we configured as active and standby. At the edge we are using HSRP and it is tracking the active primary circuit so if the active circuit fails, HSRP decrements the priority and therefore secondary circuit takes over. But the issue is whenever we have the issue with the primary circuit, it's related to line and CRC errors and this doesn't affect the line protocol and because of this even though primary circuit seems to be up physically, but it doesn't pass any traffic as far as VPN traffic is concerned (BGP peering is not affected). All our users are remote and use VPN to connect to the network, if there are too many line/crc errors, users can't connect to the VPN using the affected circuit. I am looking for any suggestions to do a failover based on line/crc errors, because as of now we have to manually shut the circuit down so the secondary circuit can take over.
Any help would be appreciated.
Solved! Go to Solution.
04-20-2017 03:01 PM
Hi
If you have the error messages you could use EEM to create a script to execute a configuration automatically, it could disable the primary interface to avoid flappings.
This is an example:
event manager applet SCRIPT
event tag cua syslog pattern "is down"
event tag pri syslog pattern "100"
event tag qui syslog pattern "holding time expired"
event tag sec syslog pattern "Neighbor 1.1.1.1"
event tag ter syslog pattern " GigabitEthernet0/0"
trigger occurs 1 period 10
correlate event pri and event sec and event ter and event cua and event qui
action 1.0 cli command "enable"
action 2.0 cli command "conf t"
action 3.0 cli command " GigabitEthernet0/0"
action 4.0 cli command "shutdown"
action 5.0 cli command "exit"
action 6.0 cli command "end"
This example could be useful for BGP
event manager applet SCRIPT-02
event syslog pattern "%BGP_SESSION-5-ADJCHANGE: neighbor 1.1.1.1 IPv4 Unicast topology"
action 1 cli command "enable"
action 10 cli command "conf t"
action 11 cli command "router bgp 100"
action 12 cli command "neigh 1.1.1.1 shutdown"
action 13 cli command "end"
action 14 cli command "wr memory"
Basically you need to include the errors messages you have detected on the devices and add the configuration to execute once the script is triggered by the error message.
* The commands could be different by device model.
Also you could use IP SLA + EEM, to verify the reachability to a specific IP and if it fails a script will be executed.
track 10 ip sla 10 reachability
delay down 10
ip sla 10
icmp-echo 8.8.8.8 source-ip 1.1.1.2
frequency 5
ip sla schedule 10 life forever start-time now
ip sla enable reaction-alerts
:-)
04-20-2017 03:01 PM
Hi
If you have the error messages you could use EEM to create a script to execute a configuration automatically, it could disable the primary interface to avoid flappings.
This is an example:
event manager applet SCRIPT
event tag cua syslog pattern "is down"
event tag pri syslog pattern "100"
event tag qui syslog pattern "holding time expired"
event tag sec syslog pattern "Neighbor 1.1.1.1"
event tag ter syslog pattern " GigabitEthernet0/0"
trigger occurs 1 period 10
correlate event pri and event sec and event ter and event cua and event qui
action 1.0 cli command "enable"
action 2.0 cli command "conf t"
action 3.0 cli command " GigabitEthernet0/0"
action 4.0 cli command "shutdown"
action 5.0 cli command "exit"
action 6.0 cli command "end"
This example could be useful for BGP
event manager applet SCRIPT-02
event syslog pattern "%BGP_SESSION-5-ADJCHANGE: neighbor 1.1.1.1 IPv4 Unicast topology"
action 1 cli command "enable"
action 10 cli command "conf t"
action 11 cli command "router bgp 100"
action 12 cli command "neigh 1.1.1.1 shutdown"
action 13 cli command "end"
action 14 cli command "wr memory"
Basically you need to include the errors messages you have detected on the devices and add the configuration to execute once the script is triggered by the error message.
* The commands could be different by device model.
Also you could use IP SLA + EEM, to verify the reachability to a specific IP and if it fails a script will be executed.
track 10 ip sla 10 reachability
delay down 10
ip sla 10
icmp-echo 8.8.8.8 source-ip 1.1.1.2
frequency 5
ip sla schedule 10 life forever start-time now
ip sla enable reaction-alerts
:-)
04-20-2017 03:02 PM
Thanks for your reply. Can I associate EEM with hsrp?
04-20-2017 03:17 PM
Yes, basically you need to create a SLA pinging to a specific IP from the primary IP related to the HSRP. Because if the interface looks up the HSRP will never change so you need something to verify the communication through that link and it could be an IP SLA.
Your script could be:
Try to lab it
:-)
04-20-2017 03:28 PM
Correct me if I am wrong, based on my understanding with the EEM applet I can configure to monitor router interface for crc or input errors and if it reaches a certain threshold, based on the value configured it can take certain action like shutting down the interface and once that happens HSRP will kick in and failover to secondary circuit. But I guess I will have to go back and manually monitor the affected circuit to make sure that it's not receiving any more crc errors before we bring it up, because I believe creating an EEM applet to bring that circuit up when things are back to normal will complicate the over all configuration.
Please let me know your thoughts.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: