?
Solved

Cisco Router/Switch monitoring link

Posted on 2014-01-22
2
Medium Priority
?
351 Views
Last Modified: 2014-01-24
How can a uplink L3 connection be monitored to ensure that the link is alive.   If a media Converter or hub/switch was inline between one L3 device and another, there would be no physical way to determine if the link was down

I have been told that Cisco IP SLA could be configured to track the link by sending IP PING packets to the upstream device.
0
Comment
Question by:sectel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 26

Expert Comment

by:Soulja
ID: 39801036
Yes, you could use IP SLA since the device isn't directly connected to the downstream device.
0
 
LVL 7

Accepted Solution

by:
unfragmented earned 2000 total points
ID: 39801413
If its L3, and you're using a routing protocol, the protocol would normally detect a failed link by loss of hello packets.

If not L3 or using static routing, IPSLA or possible UDLD are your options.
0

Featured Post

Get free NFR key for Veeam Availability Suite 9.5

Veeam is happy to provide a free NFR license (1 year, 2 sockets) to all certified IT Pros. The license allows for the non-production use of Veeam Availability Suite v9.5 in your home lab, without any feature limitations. It works for both VMware and Hyper-V environments

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month14 days, 6 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question