K7 Config Lab: Configuration Guidelines
K7 Config Lab: Configuration Guidelines
Configuration Guidelines:
(**below guidelines are not accurate and incomplete)
The equipment on the rack assigned to you is physically Cabled and should not be tampered with.
Router and Switch hostnames, basic ip addressing, "no exec-timeout" and passwords on the Con,
AUX and VTYs have been preconfigured. Do not change these configurations.
DO NOT change the Line console preconfiguration.
All preconfigured passwords are "cisco". Do not change these passwords.
Unicast and Multicast Static routes and default routes are not permitted. Floating static routes
are not permitted as well. This includes Routes to Null generated as a result of a dynamic routing
protocol.
If you need clarification on the meaning of a question, or, if you suspect hardware problems with
you equipment, contact the lab proctor as soon as possible.
The following symbols are used throughout the exam: YY is your 2-digit rack number, for example
YY value for Rack3 is 03 and for Rack11 is 11. X is your router number, for example X Value for
router 1 is 1. Z is any number SW1 and SW2 refer to the Catalyst
My approach:
1. Read the Configuration Rules thoroughly and make a quick list of DO's and DON'Ts!
2. Skim through tasks. Make a checklist of the tasks and take note of the dependencies. Dependent
tasks are better to be configured together to save time.
3. Do "sdm prefer" and "system mtu 1504" on necessary Switches (if needed). Then
RELOAD.
#show sdm prefer
#show system mtu
4. Quick Check initial configs:
#show run
#show run | inc interface|ip address
#show protocols
5. Issue convenience commands (But check first the Lab guidelines. Guidelines may say "Do not
change pre-configuration of line console", etc)
#show run | b line con
#show run | i logging|domain
! Remove later (depends)
!
conf t
no ip domain lookup
logging console
line con 0
logging sync
do wr
6. Begin.
Config Page 1
I. L2
My Approach:
- draw own L2 Ethernet Diagram and put only the active links/trunks! (L2 diagram of real lab sucks)
1.
2.
3.
4.
5.
6.
7.
VLAN NAME
VLAN 17
VLAN_17
R1 fa0/0
SW2 SVI
VLAN 29
VLAN_29
R2 fa0/0
SW4 SVI
VLAN 34
VLAN_34
R3 fa0/1
R4 fa0/1
VLAN 38
VLAN_38
R3 fa0/0
SW3 SVI
Config Page 2
SW3 SVI
VLAN 45
VLAN_45
R4 fa0/0
R5 fa0/1
VLAN 56
VLAN_56
R5 fa0/0
SW1 SVI
VLAN 67
VLAN_67
SW1 SVI
SW2 SVI
VLAN 89
VLAN_89
SW3 SVI
SW4 SVI
VLAN 100
VLAN_BBI
R1 fa0/1
BB1
VLAN 200
VLAN_BB2
R2 fa0/1
BB2
VLAN 300
VLAN_BB3
SW3 SVI
BB3
VLAN 333
VLAN_CUSTOMER
VLAN 500
VLAN_USER
VLAN 666
VLAN_CARRIER
VLAN 999
VLAN_NATIVE
vlan 999
name VLAN_NATIVE
exit
! SW1
!
int fa0/1
switchport access vlan 17
switchport mode access
int fa0/2
switchport access vlan 29
switchport mode access
int fa0/3
switchport access vlan 38
switchport mode access
int fa0/4
switchport access vlan 45
switchport mode access
int fa0/5
switchport access vlan 56
switchport mode access
int fa0/10
switchport access vlan 100
switchport mode access
! SW2
!
int fa0/1
switchport access vlan 100
switchport mode access
int fa0/2
switchport access vlan 200
switchport mode access
int fa0/3
switchport access vlan 34
switchport mode access
int fa0/4
switchport access vlan 34
switchport mode access
int fa0/5
switchport access vlan 45
switchport mode access
int fa0/10
switchport access vlan 200
switchport mode access
! SW3
!
int fa0/10
switchport access vlan 300
switchport mode access
Config Page 4
! SW4
!
int fa0/10
switchport mode access
! SW1
!
int Vlan56
ip address YY.YY.56.6 255.255.255.0
int Vlan67
ip address YY.YY.67.6 255.255.255.0
! SW2
!
int Vlan17
ip address YY.YY.17.7 255.255.255.0
int Vlan67
ip address YY.YY.67.7 255.255.255.0
! SW3
!
int Vlan38
ip address YY.YY.38.8 255.255.255.0
int Vlan89
ip address YY.YY.89.8 255.255.255.0
int Vlan300
ip address 150.3.YY.1 255.255.255.0
! SW4
!
int Vlan29
ip address YY.YY.29.9 255.255.255.0
int Vlan89
ip address YY.YY.89.9 255.255.255.0
! SW3,SW4
!
int range fa0/1-9 , fa0/11-18 , gig0/1-2 select unused ports
switchport access vlan 999
switchport mode access
shutdown
Verification:
SW1#sh spann mst configuration
Name
[cisco]
Revision 1
Instances configured 4
Instance
--------0
1
2
3
Vlans mapped
-------------------------------------------------------------------
none
17,29,45,67,89,333,999
34,38,56,100,200,300,500,666
1-16,18-28,30-33,35-37,39-44,46-55,57-66,68-88,90-99,101-199
201-299,301-332,334-499,501-665,667-998,1000-4094
-----------------------------------------------------------------------------SW1#sh spann mst | i Root
Root
this switch for the CIST
Root
this switch for MST1
Config Page 6
Root
Root
Po12
Root
(0 sysid 2)
0
0
(0 sysid 0)
(0 sysid 0)
(0 sysid 1)
Solution Breakdown:
- The MST region selects the CIST regional root as the switch with lowest IST (instance 0) Bridge ID.
Since there is only one MST Region (named "cisco") in the switching network and there are no
non-MST switches in the network, the CIST Regional root is also the CIST root.
lacp port-priority 1
! SW1,SW2
!
int range fa0/20-22
switch trunk allowed vlan remove 333
int Po12
switch trunk allowed vlan remove 333
! SW3,SW4
! (CPE)
!
int fa0/19
switch trunk allowed vlan 333 only VLAN333 is allowed on this Trunk
int range fa0/20-24
switch trunk allowed vlan remove 333
no vlan 666 remove VLAN666.
! SW1,SW2
! (SP switches)
!
system mtu 1504 Reload needed, do this at the beginning of the Lab.
system mtu routing 1500
int fa0/19
switchport access vlan 666
switchport mode dot1q-tunnel
l2protocol-tunnel cdp
l2protocol-tunnel vtp
no l2protocol-tunnel stp do not allow STP packets through the tunnel.
no cdp enable
! SW3
! (CPE)
!
int vlan 333
ip add YY.YY.33.8 255.255.255.0
! SW4
! (CPE)
!
int vlan 333
ip add YY.YY.33.9 255.255.255.0
Verification:
SW3#sh int fa0/19 trunk
Config Page 9
Mode
on
Encapsulation
802.1q
Status
trunking
Native vlan
999
Port
Fa0/19
Port
Fa0/19
Port
Fa0/19
Local Intrfce
Fas 0/19
Holdtme
141
Capability
R S I
Platform Port ID
WS-C3560- Fas 0/19
SW3#ping 19.19.33.9
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 19.19.33.9, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/9 ms
SW3#sh spann mst 1 int fa0/19
FastEthernet0/19 of MST1 is designated forwarding
Edge port: no
(default)
port guard : none
Link type: point-to-point (auto)
bpdu filter: disable
Boundary : internal
bpdu guard : disable
Bpdus (MRecords) sent 6420, received 0
(default)
(default)
(default)
(default)
(default)
(default)
Solution Breakdown:
- The 802.1Q tunnel configuration is pretty straightforward. The only thing that complicates this
task is MST. Vlan333 is part of MST instance 1 which share a common spanning-tree view. SW1 is
the root for instance 1. SW3 and SW4 fa0/19 are blocking for instance 1.
- The solution is to KILL Spanning-tree on SW3 and SW4's trunk link fa0/19 by preventing tunneling
of STP packets through SW1 and SW2. It will make the link not part of MST algorithm since no
BPDUs are exchanged between this trunk. This trunk will be simply marked designated and
forwarding. No loop risks in here since this trunk will just run VLAN333.
! R3 (PPPoE Server)
!
bba-group pppoe BBA_34
virtual-template 1
interface Virtual-Template1
ip unnumbered fa0/1 Do this if fa0/1 is preconfigured with IP address. Otherwise put the IP here.
mtu 1492
peer default ip address pool POOL_R4_IP
ppp authentication chap
ip local pool POOL_R4_IP YY.YY.34.4
username RackYYR4 password 0 CISCO
int fa0/1
pppoe enable group BBA_34
! R4 (PPPoE Client)
!
interface Dialer1
ip address negotiated
mtu 1492 to avoid fragmentation, MTU setting must consider the additional PPPoE header of 8bytes.
encapsulation ppp
dialer pool 34
dialer persistent force a dialer interface to be connected at all times, even in the absence of
interesting traffic.
dialer idle-timeout 0
ppp chap password 0 CISCO
int fa0/1
pppoe enable
pppoe-client dial-pool-number 34
Config Page 11
II. L3
Before beginning L3 section:
! All Routers
!
ip subnet-zero
ip classless
ip routing
ip cef
! All Switches that will do routing
!
ip subnet-zero
ip classless
ip routing
ip cef distributed
Section 2 Intro:
After finishing each of the following questions, make sure that all configured interfaces and
subnets are consistently visible on all pertinent routers and switches.
The backbone interfaces must be reachable only if they are part of the solutions to a question.
Unless explicitly stated, you need to ping a BGP route only if it is stated in a question. Otherwise,
the route should be only in the BGP table.
Do not redistribute between any interior gateway protocol(IGP) and Border gateway protocol
(BGP) if NOT explicitly required.
The loopback interfaces must be seen as a host route /32 in the routing tables unless stated
otherwise in a question.
At the end of this section, all Loopback0 subnets must be reachable from R3 using PING.
SW1, SW2, R1, R5 Loopback 0 in Area 0. R2, R3 Loopback0 in Area 1, R4 loopback0 in area 2.
! R1
!
router ospf 4
router-id YY.YY.1.1
network YY.YY.1.1 0.0.0.0 area 0
network YY.YY.15.1 0.0.0.0 area 0
network YY.YY.17.1 0.0.0.0 area 0
Config Page 12
neighbor YY.YY.12.1
! R3
!
router ospf 4
router-id YY.YY.3.3
network YY.YY.23.3 0.0.0.0 area 1
network YY.YY.35.3 0.0.0.0 area 1
network YY.YY.34.3 0.0.0.0 area 2
area 1 virtual-link YY.YY.1.1
area 1 virtual-link YY.YY.5.5
! R4
!
router ospf 4
router-id YY.YY.4.4
network YY.YY.4.4 0.0.0.0 area 2
network YY.YY.34.4 0.0.0.0 area 2
passive-interface fa0/0 OSPF task says "Only advertise Updates out to interfaces specified in
diagram".
! R5
!
router ospf 4
router-id YY.YY.5.5
network YY.YY.5.5 0.0.0.0 area 0
network YY.YY.15.5 0.0.0.0 area 0
network YY.YY.56.5 0.0.0.0 area 0
network YY.YY.35.5 0.0.0.0 area 1
area 1 virtual-link YY.YY.3.3
! SW1
!
router ospf 4
router-id YY.YY.6.6
network YY.YY.6.6 0.0.0.0 area 0
network YY.YY.56.6 0.0.0.0 area 0
Config Page 13
! R2
!
router eigrp YY
no auto-summary
network YY.YY.29.2 0.0.0.0
! R3
!
router eigrp YY
no auto-summary
network YY.YY.38.3 0.0.0.0
! SW4
!
router eigrp YY
no auto-summary
network YY.YY.89.9 0.0.0.0
network YY.YY.9.9 0.0.0.0
network YY.YY.29.9 0.0.0.0
! SW3
!
router eigrp 100
no auto-summary
network 150.3.YY.1 0.0.0.0
router eigrp YY
no auto-summary
network YY.YY.89.8 0.0.0.0
network YY.YY.38.8 0.0.0.0
network YY.YY.8.8 0.0.0.0
redistribute eigrp 100
NOTE
! R4
!
router rip
version 2
no auto-summary
passive-interface default
no passive-interface fa0/0
network YY.0.0.0
distance 109 YY.YY.45.5 0.0.0.0 SACL_SW1_LOOP0
ip access sta SACL_SW1_LOOP0
permit YY.YY.6.6
! R5
!
router rip
version 2
no auto-summary
passive-interface default
no passive-interface fa0/1
network YY.0.0.0
redistribute ospf 4 metric 5
Additional Configuration:
- If Lab Guidelines say "Host routes should not be seen on devices routing table other than
Loopback0 prefixes" then do these additional configuration. Otherwise, it won't harm to do this.
! R4
!
router rip
distribute-list prefix PL_R3 out fa0/0
ip prefix-list PL_R3 seq 5 deny 19.19.34.3/32
ip prefix-list PL_R3 seq 10 deny 19.19.34.4/32
ip prefix-list PL_R3 seq 15 permit 0.0.0.0/0 le 32
! R3
!
router ospf 4
area 2 filter-list prefix PL_R4 out
ip prefix-list PL_R4 seq 5 deny 19.19.34.4/32
ip prefix-list PL_R4 seq 10 permit 0.0.0.0/0 le 32
router eigrp YY
distribute-list route-map RM_EIGRP_DL_IN in
redistribute ospf 4 metric 1 1 1 1 1
router ospf 4
distribute-list route-map RM_OSPF_DL_IN in do not allow the EIGRP 100 routes to
be learned from OSPF peers. These
have AD=110 and will cause controlplane loop.
Config Page 16
! R3
!
router bgp YY
bgp router-id YY.YY.3.3
neighbor
neighbor
neighbor
neighbor
YY.YY.1.1
YY.YY.1.1
YY.YY.1.1
YY.YY.1.1
remote-as YY
update lo0
route-reflector-client
send-community
neighbor
neighbor
neighbor
neighbor
YY.YY.2.2
YY.YY.2.2
YY.YY.2.2
YY.YY.2.2
remote-as YY
update lo0
route-reflector-client
send-community
neighbor
neighbor
neighbor
neighbor
YY.YY.4.4
YY.YY.4.4
YY.YY.4.4
YY.YY.4.4
remote-as YY
update lo0
route-reflector-client
send-community
neighbor
neighbor
neighbor
neighbor
YY.YY.5.5
YY.YY.5.5
YY.YY.5.5
YY.YY.5.5
remote-as YY
update lo0
route-reflector-client
send-community
! R1
!
router bgp YY
neighbor 150.1.YY.254 remote-as 254
neighbor 150.1.YY.254 send-community
neighbor 150.1.YY.254 maximum-prefix 5 100 warning-only
! R2
!
router bgp YY
neighbor 150.2.YY.254 remote-as 254
neighbor 150.2.YY.254 send-community
neighbor 150.2.YY.254 maximum-prefix 5 100 warning-only
! R1,R2
!
router bgp YY
bgp graceful-restart
#clear ip bgp *
Config Page 17
Do not forget
that threshold
must be "100" !
#clear ip bgp *
Solution Breakdown:
Do not overthink this task, the phrase "This configuration should not affect any other routers in AS
YY" only implies that the BGP attributes of other BGP AS YY speakers shouldn't be affected.
Definitely we use "weight" command. The phrase doesn't mean that the "best path of other
routers in AS YY shouldn't be affected". That is simply impossible. R3 is a route-reflector so
whatever best path it chooses, R4's and R5's best path will definitely be affected.
Another thing is that in the BGP diagram of the lab, R3 is labeled as the only RR. Do not be thinking
of multiple-RR solution and the like.
Secure the serial link between R1 and R5 using a single command. Use the authentication type
with MD5 key string "1234567890abcdef1234567890abcdef".
Make sure the routers use cisco proprietary forwarding mechanism
! SW1,SW2
!
sdm prefer dual-ipv4-and-ipv6 default do at beginning of lab then reload.
ipv6 unicast-routing
ipv6 cef dist
! R1,R5
!
ipv6 unicast-routing
ipv6 cef
! R1
!
ipv6 router ospf 2001
router-id YY.YY.1.1
int Lo0
ipv6 address 2001:YY:1::1/128
ipv6 ospf 2001 area 0
int fa0/0
ipv6 address 2001:YY:17::1/64
ipv6 ospf 2001 area 0
ipv6 nd ra suppress
int se0/0/1
ipv6 address 2001:YY:15::1/64
ipv6 ospf 2001 area 0
ipv6 nd ra suppress
ipv6 ospf authentication ipsec spi 512 md5
1234567890abcdef1234567890abcdef
! R5
!
ipv6 router ospf 2001
router-id YY.YY.5.5
int Lo0
ipv6 address 2001:YY:5::5/128
ipv6 ospf 2001 area 0
int fa0/0
ipv6 address 2001:YY:56::5/64
ipv6 ospf 2001 area 0
ipv6 nd ra suppress
int se0/0/0
ipv6 address 2001:YY:15::5/64
ipv6 ospf 2001 area 0
ipv6 nd ra suppress
ipv6 ospf authentication ipsec spi 512 md5
1234567890abcdef1234567890abcdef
! SW1
Config Page 20
! SW1
!
ipv6 router ospf 2001
router-id YY.YY.6.6
int Lo0
ipv6 address 2001:YY:6::6/128
ipv6 ospf 2001 area 0
int Vlan56
ipv6 address 2001:YY:56::6/64
ipv6 ospf 2001 area 0
ipv6 nd ra suppress
int Vlan67
ipv6 address 2001:YY:67::6/64
ipv6 ospf 2001 area 0
ipv6 nd ra suppress
! SW2
!
ipv6 router ospf 2001
router-id YY.YY.7.7
int Lo0
ipv6 address 2001:YY:7::7/128
ipv6 ospf 2001 area 0
int Vlan17
ipv6 address 2001:YY:17::7/64
ipv6 ospf 2001 area 0
ipv6 nd ra suppress
int Vlan67
ipv6 address 2001:YY:67::7/64
ipv6 ospf 2001 area 0
ipv6 nd ra suppress
Config Page 21
III. Multicast
Before beginning:
- check what is pre-configured !
#show run | inc pim|multicast|igmp|mroute
#show ip pim int
deny
igmp any host 225.1.1.1 Deny all other Sources for SSM group 225.1.1.1 in IGMPv3
reports.
no ip igmp ssm-map query dns disable DNS-based SSM-mapping and rely solely on static SSMmapping.
Solution Breakdown:
- SSM mapping is needed only in the router connecting to the receivers. No support is needed in
any other routers in the network. SSM mapping can be configured only globally and cannot be
configured per interface.
- IGMP access-group on R5 fa0/0 is needed. This is to prevent multicast clients connected to fa0/0
from sending IGMPv3 reports for group 225.1.1.1 with source other than YY.YY.3.3.
Config Page 23
! SW1,SW2
!
time-range TR_OFFICE_WEEKDAYS
periodic weekdays 9:00 to 16:59
time-range TR_NIGHT
periodic daily 22:00 to 23:59
time-range TR_OFFICE_DAILY
periodic daily 9:00 to 16:59
ip access-list extended EACL_VLAN500_IN
permit udp YY.YY.100.0 0.0.0.255 eq 1985 host 224.0.0.2 eq 1985
deny
tcp YY.YY.100.0 0.0.0.255 any eq www time-range
TR_OFFICE_WEEKDAYS
permit tcp YY.YY.100.0 0.0.0.255 any eq www
permit tcp YY.YY.100.0 0.0.0.255 any eq ftp time-range TR_NIGHT
permit tcp YY.YY.100.0 0.0.0.255 any eq ftp-data established timerange TR_NIGHT
permit tcp YY.YY.100.0 0.0.0.255 any gt 1023 time-range TR_NIGHT
deny
udp YY.YY.100.0 0.0.0.255 any time-range TR_OFFICE_DAILY
permit udp YY.YY.100.0 0.0.0.255 any
int vlan 500
ip access-group EACL_VLAN500_IN in
Solution Breakdown:
- Dont forget NTP! At the end of the lab, check if SW1 and SW2 are synchronized with R1 and with
each other.
- be careful in lab exam. Time ranges and Task wordings may differ slightly.
- Since task doesnt explicitly mention FTP type, we should consider both active and passive FTP.
- Remember that HSRP uses UDP port 1985 both for source and destination.
- If HSRP task uses version 2 then use this ACL entry:
permit udp YY.YY.100.0 0.0.0.255 eq 1985 host 224.0.0.102 eq 1985
Use the exact class and policy naming as seen above (case-sensitive).
! R1
!
class-map type inspect match-all A_B
match protocol icmp
policy-map type inspect pmap_A_B
class type inspect A_B
pass
class class-default
pass
zone security A
zone security B
zone-pair security A_B source A destination B
service-policy type inspect pmap_A_B
zone-pair security B_A source B destination A
service-policy type inspect pmap_A_B
Config Page 25
Control
precedence value 6, 7
Voice
precedence value 5
Critical
precedence value 4
Video
precedence value 3
Business
precedence value 2
Internet
precedence 0
Only in case of congestion the Business traffic may not exceed 30% of the available bandwidth
Enable the congestion avoidance mechanism for the Business traffic using a weight factor of 10 for
the average queue size calculation
The Internet traffic should use the remaining bandwidth with no other guarantee
! R5
!
class-map match-all
match precedence 6
class-map match-all
match precedence 5
class-map match-all
match precedence 4
class-map match-all
match precedence 3
class-map match-all
match precedence 2
class-map match-all
match precedence 0
Control
7
Voice
Critical
Video
Business
Internet
policy-map PM_OUT_TO_R3
class Voice
priority percent 20
police cir percent 20
class Network
bandwidth percent 5
class Video
bandwidth percent 30
class Business
bandwidth percent 30
random-detect needs bandwidth command or fair-queue
random-detect exponential-weighting-constant 10
class Internet
int se0/0/1
bandwidth 2000
max-reserved-bandwidth 85
service-policy output PM_OUT_TO_R3
no service password-encryption
key chain RIP
key 1
key-string HiddenKey
interface fa0/1
ip rip authentication mode md5
ip rip authentication key-chain RIP
! SW1,SW2,SW3,SW4
!
vlan 335
private-vlan community
vlan 337
private-vlan community
vlan 339
private-vlan isolated
vlan 45
private-vlan primary
private-vlan association 335,337,339
spanning-tree mst configuration
instance 1 vlan 335, 337, 339
! SW1
!
default int range fa0/4 , fa0/6-8
interface fa0/4
switchport private-vlan host-association 45 335
switchport mode private-vlan host
interface fa0/6
switchport private-vlan host-association 45 337
switchport mode private-vlan host
interface fa0/7
switchport private-vlan host-association 45 339
switchport mode private-vlan host
interface fa0/8
switchport private-vlan mapping 45 337,339
switchport mode private-vlan promiscuous
Config Page 28
! SW2
!
default int range fa0/5-7
interface fa0/5
switchport private-vlan host-association 45 335
switchport mode private-vlan host
interface fa0/6
switchport private-vlan host-association 45 337
switchport mode private-vlan host
interface fa0/7
switchport private-vlan host-association 45 339
switchport mode private-vlan host
#show vlan private-vlan
#show int status
#show spanning-tree mst config
Config Page 30
Verify with proctor about the "nms" statement and where to send SNMP traps. Is it a
community? a group? or what? Most of the reports lately say that proctors confirmed that
"nms" is a community.
Also, the other thing that makes this task vague is that it doesn't mention the IP address of
the SNMP-server where traps will be sent.
But we don't have to complicate things, just configure what is told, period.
! R3
!
snmp-server location San Jose, USA
snmp-server contact [email protected]
snmp-server view ciscoview iso included
snmp-server view ciscowrite system included
snmp-server group admin v3 priv read ciscoview write ciscowrite access
SACL_56
snmp-server user ccie admin v3 auth md5 cisco
ip access-list sta SACL_56
permit YY.YY.56.0 0.0.0.255
snmp-server trap-source Loopback0
snmp-server enable traps
snmp-server community NMS rw SACL_67 give Read, Write access
no snmp-server group NMS v1
ip access-list sta SACL_67
permit YY.YY.67.0 0.0.0.255
#show snmp groups
#show snmp view
#show snmp user
requirements:
Enable Netflow on R1 to monitor the traffic entering and leaving Area 0 from BB1.
Export the flows to the server YY.YY.56.100 port 2222.
In case the export to server fails, the accounting information should be exported to backup server
YY.YY.56.101 with the same port number.
Generate netflow sample one out-of-every 1000 packets on both direction
Use R1 Loopback as source address for the exports
Use Netflow version 9 with reliable transfer
Do not use policy-map
! R1
!
ip cef
ip flow-export source Loopback0
ip flow-export version 9
ip flow-export destination YY.YY.56.100 2222 sctp
backup destination YY.YY.56.101 2222
flow-sampler-map FLOW_INGRESS
mode random one-out-of 1000
flow-sampler-map FLOW_EGRESS
mode random one-out-of 1000
int fa0/1
flow-sampler FLOW_INGRESS
flow-sampler FLOW_EGRESS egress
ip flow-export template options
sampler
R1#show flow-sampler
R1#sh ip cache flow
R1#sh ip flow export sctp
IPv4 main cache exporting to 19.19.56.100, port 2222, full
status: re-establishing
backup mode: redundant
0 flows exported in 0 sctp messages.
0 packets dropped due to lack of SCTP resources
backup: 19.19.56.101, port 2222
status: re-establishing
fail-overs: 0
0 flows exported in 0 sctp messages.
0 packets dropped due to lack of SCTP resources
12 packets dropped due to primary & backup failure.
Note:
- NetFlow SCTP export configuration uses full reliability. By default, it uses Redundant mode for
backup destination and uses 25ms fail-over time for backup destination.
Config Page 32