Go Premium for a chance to win a PS4. Enter to Win

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 734
  • Last Modified:

HSRP NEXUS

I was curious if a separate HSRP Group should be employed for each SVI on a Core Nexus Switch.  See below.

Should each Vlan have a separate HSRP instance or would one or two instances for HSRP be adequate for 10 or 20 Vlans??

interface Vlan3
  no shutdown
  ip address 131.133.134.131/27
  ip ospf authentication message-digest
  ip ospf message-digest-key 1 md5 3 9125d59c18a9b015
  ip router ospf 10 area 0.0.0.0
  hsrp version 2
  HSRP 3
    preempt
    priority 120
    ip 131.133.134.129

interface Vlan6
  ip address 131.133.134.163/27
  ip ospf authentication message-digest
  ip ospf message-digest-key 1 md5 3 9125d59c18a9b015
  ip router ospf 10 area 0.0.0.0
  hsrp version 2
  HSRP 6
    preempt
    priority 120
    ip 131.133.134.161

interface Vlan7
  ip address 131.133.134.195/27
  ip ospf authentication message-digest
  ip ospf message-digest-key 1 md5 3 9125d59c18a9b015
  ip router ospf 10 area 0.0.0.0
  hsrp version 2
  HSRP 7
    preempt
    priority 120
    ip 131.133.134.193
0
sectel
Asked:
sectel
  • 3
  • 3
2 Solutions
 
Craig BeckCommented:
Each VLAN needs its own HSRP instance - you have to configure the instance in the SVI config.  Further to this you can only set one standby IP per HSRP instance so you can't use the same instance for more than one subnet.

You can have multiple HSRP instances on one VLAN though using MHSRP.
0
 
Jordan MedlenCommented:
If you're looking to route between VLANs, then you'll need an IP address configured on each SVI for said VLAN. If you want first hop redundancy for each SVI acting as a gateway, then you'll want to configure a separate HSRP instance for each also.

Aside from that, I would suggest using GLBP instead of HSRP in order to load-balance traffic going through each switch. GLBP is similar in configuration to HSRP. You can read more here...

http://www.cisco.com/en/US/docs/ios-xml/ios/ipapp_fhrp/configuration/12-4/fhp-glbp.html
0
 
sectelAuthor Commented:
Apparently most platforms will not support more than 256 HSRP instances ...what do you do if you have more than 256 Vlan's
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
Jordan MedlenCommented:
You may want to consider migrating to a traditional hierarchy of core --> distribution --> access where you have layer 3 between your core and distribution layers and deploy your gateways on your distribution devices. This is an assumption of your architecture being a collapsed core design where all layer 3/gateway traffic and subnets reside in the core devices of your infrastructure.
0
 
Craig BeckCommented:
You wouldn't generally provide L2 redundancy at the same device for that many VLANs.  As Jordan Medlen said, this is usually separated at the distribution layer.  This allows the scalability you may require.
0
 
Jordan MedlenCommented:
To answer the OP's question...

Should each Vlan have a separate HSRP instance or would one or two instances for HSRP be adequate for 10 or 20 Vlans??

...craigbecks reply does answer that question. Is it the only solution, no, but as far as direct replies, it answers the question. I always look to provide better alternative solutions where they exist, rather than only providing the answer to the question given.
0
 
Craig BeckCommented:
I didn't say Jordan's comment shouldn't be included in a split.  In the objection I said:

The correct answer is ID: 39752167

The selected answer was just a supplement to the initial comment I made, so the OP has just selected any comment by me as the answer in order to acknowledge that I was correct and award points.

The points awarded were significantly less than the assist too
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

  • 3
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now