Configuration procedure, Displaying and maintaining ipv6 vrrp, Ipv4 vrrp configuration examples – H3C Technologies H3C SecBlade LB Cards User Manual
Page 39: Network requirements
31
Configuration procedure
To configure VRRP packet attributes:
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter the specified interface
view.
interface interface-type
interface-number
N/A
3.
Configure the authentication
mode and authentication key
when the VRRP groups send
or receive VRRP packets.
vrrp ipv6 vrid virtual-router-id
authentication-mode simple
[ cipher ] key
Optional.
Authentication is not performed by
default.
4.
Configure the time interval for
the master in the VRRP group
to send VRRP advertisement.
vrrp ipv6 vrid virtual-router-id timer
advertise adver-interval
Optional.
100 centiseconds by default.
Displaying and maintaining IPv6 VRRP
Task Command
Remarks
Display VRRP group
status.
display vrrp ipv6 [ verbose ] [ interface interface-type
interface-number [ vrid virtual-router-id ] ] [ | { begin | exclude
| include } regular-expression ]
Available in any view.
Display VRRP group
statistics.
display vrrp ipv6 statistics [ interface interface-type
interface-number [ vrid virtual-router-id ] ] [ | { begin | exclude
| include } regular-expression ]
Available in any view.
Clear VRRP group
statistics.
reset vrrp ipv6 statistics [ interface interface-type
interface-number [ vrid virtual-router-id ] ]
Available in user
view.
IPv4 VRRP configuration examples
Single VRRP group configuration example in the Web interface
In this example, Device A is the LB product.
Network requirements
As shown in
, Host A wants to access Host B on the Internet, using 202.38.160.111/24 as its
default gateway. Device A and Device B belong to VRRP group 1 with the virtual IP address
202.38.160.111/24.
If Device A operates properly, the packets that Host A sends to Host B are forwarded by Device A. If
GigabitEthernet 0/2 connecting Device A to the Internet becomes unavailable, packets sent from Host A
to Host B are forwarded by Device B.
To prevent spoof attacks to the VRRP group from unauthorized users, configure the authentication mode
as plain text to authenticate the VRRP packets in VRRP group 1. Specify the authentication key as hello.