Configuring the MNLB Forwarding Agent



Similar documents
Configuring a Cisco 2509-RJ Terminal Router

- Basic Router Security -

Lab Load Balancing Across Multiple Paths Instructor Version 2500

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

8 steps to protect your Cisco router

Configuring the Cisco Secure PIX Firewall with a Single Intern

Lab Creating a Network Map using CDP Instructor Version 2500

Cisco 2621 Gateway-PBX Interoperability: Lucent/Avaya Definity G3si V7 PBX with Cisco CallManager Using T1 PRI NI-2 for an H.

Leased Line PPP Connections Between IOS and HP Routers

Lab Introductory Lab 1 Getting Started and Building Start.txt

Reverse Proxy Caching

Configuring NetFlow Switching

LAN-Cell to Cisco Tunneling

NetFlow Auditor Manual Getting Started

Sampled NetFlow. Feature Overview. Benefits

Remote Access VPN Business Scenarios

Overview: Load Balancing with the MNLB Feature Set for LocalDirector

Lab Introductory Lab 1 - Getting Started and Building Start.txt

Juniper Networks WX Series Large. Integration on Cisco

NetFlow Subinterface Support

- Multiprotocol Label Switching -

How To Configure A Cisco Router With A Cio Router

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

OBJECTIVES This paper examines how NetFlow is implemented on logical interfaces. Logical interfaces can be divided into two groups:

Configuring Modem Transport Support for VoIP

Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access

Configuring a Router

Virtual Fragmentation Reassembly

Cisco CCNA Optional Semester 4 Labs Wide Area Networking LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes)

P and FTP Proxy caching Using a Cisco Cache Engine 550 an

ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

Configuring Basic Broadband Internet Access

Lab Load Balancing Across Multiple Paths

NetFlow v9 Export Format

Configuring a Leased Line

ICND1 Lab Guide Interconnecting Cisco Networking Devices Part 1 Version 2.0. Labs powered by

PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example

Enhanced Password Security - Phase I

Lab Configuring Syslog and NTP (Instructor Version)

Brest. Backup : copy flash:ppe_brest1 running-config

Configuring Basic Settings

Lab Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips

Firewall Stateful Inspection of ICMP

Lab 8: Confi guring QoS

Lab Developing ACLs to Implement Firewall Rule Sets

Testing Juniper Networks M40 Router MPLS Interoperability with Cisco Systems 7513 and Routers

Per-Packet Load Balancing

HOW TO CONFIGURE CISCO FIREWALL PART I

Enhanced Password Security - Phase I

Lab 3.5.1: Basic VLAN Configuration (Instructor Version)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Network Load Balancing

NetFlow Policy Routing

Lab Exercise Configure the PIX Firewall and a Cisco Router

Security Audit CHAPTER21. Perform Security Audit

Cisco Router Configuration Basics. Scalable Infrastructure Workshop

Skills Assessment Student Training Exam

Cisco Routers and Switches

Network Security Knowledge is Everything! Network Operations

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Lab Advanced Telnet Operations

Basic Software Configuration Using the Cisco IOS Command-Line Interface

Lab: Basic Router Configuration

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

Overview of Network Traffic Analysis

Constraining IP Multicast in a Switched Ethernet Network

Center for Internet Security Gold Standard Benchmark for Cisco IOS

How To Secure Network Threads, Network Security, And The Universal Security Model

Lab Configure Syslog on AP

How-To Configure NetFlow v5 & v9 on Cisco Routers

Lab Configure Local AAA on Cisco Router

Objectives Understand Cisco IOS system architecture components. Work with the Cisco IOS Command Line Interface (CLI) and common commands.

Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering

GLBP - Gateway Load Balancing Protocol

Chapter 2 Lab 2-2, EIGRP Load Balancing

CCT vs. CCENT Skill Set Comparison

Configuring Fax Pass-Through

3.1 Connecting to a Router and Basic Configuration

System Components PBX Model. Configuration Tasks

Network Diagram Scalability Testbed and Configuration Files

Configuring Clocking and Timing

Cisco IOS Switch Security Configuration Guide

Table of Contents. Cisco Configuring a Basic MPLS VPN

Configuring InterVLAN Routing and ISL/802.1Q Trunking on Catalyst 2900XL/3500XL/2940/2950/2970 Series Switches Using an External Router

Document ID: Introduction

Securing Networks with PIX and ASA

- Advanced IOS Functions -

LAB MANUAL for Computer Network

BRI to PRI Connection Using Data Over Voice

Configuring Dial Backup and Remote Management

Using a Sierra Wireless AirLink Raven X or Raven-E with a Cisco Router Application Note

PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example

Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top

Applicazioni Telematiche

CS3695/M6-109 Lab 8-NPS02 VOIP Sniffing Ver. 8 Rev. 0

Layer 3 Redundancy with HSRP By Sunset Learning Instructor Andrew Stibbards

Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export

Leased Line Support for Cisco 2600/3600 Series Analog Modems

Transcription:

CHAPTER 3 Configuring the MNLB Forwarding Agent This chapter describes how to configure a Cisco router as an MNLB Forwarding Agent to operate in conjunction with a Cisco LocalDirector serving as Services Manager. The components of the MNLD Feature Set for LocalDirector are described in Chapter 1, Overview: Load Balancing with the MNLB Feature Set for LocalDirector. Configuration Tasks The following sections describe forwarding agent configuration tasks. Enabling Cisco Express Forwarding Enabling NetFlow Switching Enabling Multicast Routing Configuring the Router as a Forwarding Agent Enabling Cisco Express Forwarding Cisco Express Forwarding (CEF) is advanced Layer 3 IP switching technology. CEF optimizes network performance and scalability for networks with large and dynamic traffic patterns, such as the Internet, on networks characterized by intensive Web-based applications, or interactive sessions. To enable CEF, use the following command in global configuration mode: Router(config) ip cef distributed Enables CEF. Note When you enable CEF globally, all interfaces that support CEF are enabled by default. If you want to turn off CEF on a particular interface, you can do so. Configuring the MNLB Forwarding Agent 3-11

Enabling NetFlow Switching Enabling NetFlow Switching We recommend that you enable NetFlow switching on all interfaces that will carry MNLB traffic, although it is not required. To enable NetFlow switching, use the following commands, beginning in global configuration mode: Step 1 For VIP interfaces on Cisco 7500 series routers: Router(config)# interface type slot/port-adapter/port Specifies the interface, and enters interface configuration mode. For all other routers: Router(config)# interface type slot/port 2 Router(config-if)# ip route-cache flow Enables flow switching on the interface. Normally the size of the NetFlow cache will meet your needs. However, you can increase or decrease the number of entries maintained in the cache by using the following command in global configuration mode Router(config)# ip flow-cache entries number Changes the number of entries maintained in the NetFlow cache. The number of entries can be 1024 to 524288. The default is 64536. 3-12 MultiNode Load Balancing Feature Set for LocalDirector

Enabling Multicast Routing Enabling Multicast Routing You must enable multicast routing on all interfaces to the services manager. To enable multicast routing on all interfaces, use the following command in global configuration mode: Router(config)# ip multicast-routing Enables multicast routing. To have the router join a multicast group and enable IGMP, use the following command in interface configuration mode: Router(config-if)# ip igmp join-group 1 group-address 2 1 This command must be configured on all interfaces that will listen for the services manager multicasts. 2 The group address must match that configured within the services manager configuration. Joins a multicast group. Configuring the Router as a Forwarding Agent To configure the router as a forwarding agent, use the following commands, beginning in global configuration mode: Step 1 Router(config)# ip casa control-address igmp-address Specify the control address and IGMP address of the forwarding agent. The control address is a unique ip address used by forwarding-agent to send and receive control message between the service manager and the forwarding-agent. The recommended IGMP address is 224.0.1.2. 2 Router(config) forwarding-agent pool [initial-affinity] [max-affinity] 3 Router(config) forwarding-agent num [passwd [timeout]] Specify the port number. Adjusts the memory allocated for the forwarding agent s affinity pools. The default pool size is 5000 and there is no maximum pool size. Note The forwarding agent IGMP address and port must match the IGMP address and port configured on the services manager and the ip igmp join-group command. If you are running CASA, you must configure ip pim dense. Some Forwarding Agents might be many hops away, so TTL=1 might not work in some cases. Monitoring the Forwarding Agent To monitor the status of the forwarding agent, use the following commands in EXEC mode: Router# show ip casa affinities Router# show ip casa oper Display the status of affinities. Display the operational status of the forwarding agent. Configuring the MNLB Forwarding Agent 3-13

Configuration Examples Router# show ip casa stats Router# show ip casa wildcard Display statistical information about the forwarding agent. Display information about wildcard blocks. Configuration Examples This section provides the following configuration examples: Forwarding Agent Configuration for FA2 Services Manager Configuration for SM The network configured is shown in Figure 2. Figure 2 MultiNode Load Balancing Network Configuration Virtual: 12.12.12.1 172.26.56.33 172.26.56.34 FA1 FA2 SM 172.26.56.17 172.26.56.20 172.26.56.18 172.26.56.19 22098 Forwarding Agent Configuration for FA2 In the following example all disabled interfaces have been omitted to simplify the display. FA2#wr t Building configuration... Current configuration: version 12.0 service timestamps debug uptime service timestamps log uptime no service password-encryption service udp-small-servers service tcp-small-servers hostname FA2 3-14 MultiNode Load Balancing Feature Set for LocalDirector

Configuring the Router as a Forwarding Agent microcode CIP flash slot0:cip26-5 microcode reload ip subnet-zero no ip domain-lookup ip cef distributed ip casa 206.10.20.34 224.0.1.2 forwarding-agent 1637 interface Ethernet0/0 ip address 172.26.56.18 255.255.255.224 no ip directed-broadcast ip route-cache flow ip igmp join-group 224.0.1.2 no ip mroute-cache interface Ethernet0/1 ip address 172.26.56.37 255.255.255.224 no ip directed-broadcast router eigrp 777 network 172.26.0.0 no ip classless line con 0 exec-timeout 0 0 transport input none line aux 0 line vty 0 4 exec-timeout 0 0 login end Services Manager Configuration for SM SM# wr t Building configuration... : Saved : LocalDirector 420 Version 3.0.0.127 syslog output 20.3 no syslog console enable password 000000000000000000000000000000 encrypted hostname SM no shutdown ethernet 0 no shutdown ethernet 1 no shutdown ethernet 2 no shutdown ethernet 3 interface ethernet 0 auto interface ethernet 1 auto interface ethernet 2 auto interface ethernet 3 auto mtu 0 1500 mtu 1 1500 mtu 2 1500 mtu 3 1500 multiring all no secure 0 no secure 1 no secure 2 Configuring the MNLB Forwarding Agent 3-15

Configuration Examples no secure 3 ping-allow 0 ping-allow 1 ping-allow 2 ping-allow 3 ip address 172.26.56.19 255.255.255.248 route 172.26.10.249 255.255.255.255 172.26.56.20 1 route 206.10.20.33 255.255.255.255 172.26.56.17 1 route 206.10.20.34 255.255.255.255 172.26.56.18 1 no rip passive failover ip address 0.0.0.0 failover password cisco telnet 161.0.0.0 255.0.0.0 no snmp-server contact no snmp-server location casa service-manager port 1638 casa service-manager multicast-ttl 60 tftp-server 172.26.10.249 /tftpboot/ld virtual 172.26.56.13:0:0:tcp is virtual 172.26.56.2:0:0:tcp is redirection 172.26.56.13:0:0:tcp dispatched casa wildcard-ttl 60 fixed-ttl 60 igmp 224.0.1.2 port 1637 redirection 172.26.56.2:0:0:tcp dispatched casa wildcard-ttl 60 fixed-ttl 60 igmp 224.0.1.2 port 1637 real 172.26.56.34:0:0:tcp is real 172.26.56.33:0:0:tcp is real 172.26.56.6:0:0:tcp is real 172.26.56.10:0:0:tcp is bind 172.26.56.13:0:0:tcp 172.26.56.33:0:0:tcp bind 172.26.56.13:0:0:tcp 172.26.56.34:0:0:tcp bind 172.26.56.2:0:0:tcp 172.26.56.10:0:0:tcp bind 172.26.56.2:0:0:tcp 172.26.56.6:0:0:tcp : end 3-16 MultiNode Load Balancing Feature Set for LocalDirector