Contents
Chapter 16
In This Chapter ..............................................................................................................16-1
VRRP Specifications .....................................................................................................16-2
VRRP Defaults ..............................................................................................................16-2
VRRP Overview ............................................................................................................16-4
Configuration Overview ................................................................................................16-8
Chapter 17
In This Chapter ..............................................................................................................17-1
Server Defaults ..............................................................................................................17-3
Server Overview ............................................................................................................17-5
OmniSwitch 6800 Series Network Configuration Guide
..................................................................................................... 16-1
Why Use VRRP? ....................................................................................................16-5
VRRP MAC Addresses ..........................................................................................16-6
ARP Requests ..................................................................................................16-6
ICMP Redirects ...............................................................................................16-6
VRRP Startup Delay ..............................................................................................16-6
VRRP Tracking ......................................................................................................16-7
Setting VRRP Traps .............................................................................................16-13
VRRP Tracking Example .....................................................................................16-18
Authenticated VLANs ............................................................................................17-6
...................................................................... 17-1
November 2004
xiii