?
Solved

Cisco Router/Switch monitoring link

Posted on 2014-01-22
2
Medium Priority
?
352 Views
Last Modified: 2014-01-24
How can a uplink L3 connection be monitored to ensure that the link is alive.   If a media Converter or hub/switch was inline between one L3 device and another, there would be no physical way to determine if the link was down

I have been told that Cisco IP SLA could be configured to track the link by sending IP PING packets to the upstream device.
0
Comment
Question by:sectel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 26

Expert Comment

by:Soulja
ID: 39801036
Yes, you could use IP SLA since the device isn't directly connected to the downstream device.
0
 
LVL 7

Accepted Solution

by:
unfragmented earned 2000 total points
ID: 39801413
If its L3, and you're using a routing protocol, the protocol would normally detect a failed link by loss of hello packets.

If not L3 or using static routing, IPSLA or possible UDLD are your options.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
Want to learn how to record your desktop screen without having to use an outside camera. Click on this video and learn how to use the cool google extension called "Screencastify"! Step 1: Open a new google tab Step 2: Go to the left hand upper corn…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question