Solved

OSPF Redundancy

Posted on 2009-04-14
3
694 Views
Last Modified: 2012-05-07
I currently have a network ring comprised of 9 Catalyst 3560's.  they currently do spanning tree, and I place a "dead" link across my slowest link so that traffic all flows one direction until the ring is broke.  I want to migrate away from spanning tree, and use OSPF.  I already have OSPF in place, but traffic flows in all directions around the ring.  I realize that is the nature of OSPF, but is there some way I can make the link i don't want any traffic on look less attractive to OSPF so that it doesnt send any traffic down it at all unless another link is broke just like spanning tree?  I have tried messing with priorities and path costs with no avail.  is there someway i can make OSPF think there is more than 1 hop on a particular link?
0
Comment
Question by:HunTelWebProgrammer
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 43

Expert Comment

by:JFrederick29
ID: 24138990
Using port cost on both ends of the slow link should take care of it.

ip ospf cost 1000000
0
 
LVL 1

Author Comment

by:HunTelWebProgrammer
ID: 24139316
ok i set the max cost on the links and it appears to have helped.  in addition to this, when i replace these 3560's with 4948's and my uplinks change to 10Gig, is there something i need to do for OSPF to recognize the uplinks bandwidth of 10Gig as apposed to 1Gig? I thought i read somewhere that ospf can only determine bandwidth up to 1 gig unless additional configuration is done.
0
 
LVL 43

Accepted Solution

by:
JFrederick29 earned 500 total points
ID: 24139355
Yup, you need to set the "auto cost" command on all OSPF routers.

router ospf 1
auto-cost reference-bandwidth 10000
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question