Investigating HSRP

Hot Standby Router Protocol (HSRP) is a Cisco propitiatory router protocol that provides first-hop redundancy for IP hosts on a LAN. It enables a set of router interfaces once configured to present a single virtual default gateway for IP hosts on the LAN.

HSRP has two modes:
  1. ACTIVE – Physical router acts as the main router, by default the highest IP Address is elected the active router
  2. STANDBY – The second physical router that participates in HSRP and becomes the active router when the elected active router fails
  3. HSRP priorities can be used to determine the active router. The default priority is 100
HSRP versions:
  1. The default version used for Cisco IOS 15 is Version 1
  2. Version 2 expands the number of supported groups from 0-255 in version 1 to 0-4095
  3. Version 2 also supports IPv6
  4. HSRPv1 uses Multicast address 224.0.0.2
  5. HSRPv2 uses Multicat address 224.0.0.102 for IPv4 and FF02::66 for IPv6
  6. HSRPv2 adds support for MD5 authentication
HSRP virtual MAC addresses:
Along with virtual IP addresses, HSRP also uses virtual mac addresses.
  1. HSRPv1 virtual mac address range – 0000.0c07.ac00 to 0000.0c07.acff – The highlighted hex digits represent the HSRP group number
  2. HSRPv2 virtual mac addresses follow the same method as version 1, the only difference is that v2 uses 3 hex digits to represent the HSRP group as shown the this example: 0000.0c9f.f000 – 0000.0c9f.ffff (IPv4 range)
  3. The IPv6 virtual mac address range for HSRPv2 groups is the following: 0005.73A0.0000 – 0005.73A0.0fff
HSRP timers:
  1. Active and Standby routers exchange HELLO packets (multicast) between one another every 3 seconds
  2. If the Standby router doesn’t receive an HELLO message from the Active router for 10 seconds, the Standby router will take over the Active role
Please watch the video below to see most of what we just talked about in action.
 

 

Popular Posts

Capturing EAPOL and RADIUS Using Wireshark

Configuring Cisco Smart License Software

Cisco :: FXOS Authentication Using TACACS

Configuring Remote Access VPN on Firepower

Kali Linux :: CAM Table Overflow Attack Demonstration