Making The Case For Proactive Support

The truth is that nothing remains in the same condition very long. A new car may be in an ideal condition when you drive it off the dealer lot, but it’s not going to remain that way. This is true for bodies, houses, horses, fences, children, marriages, rocks, mountains, our planet, solar system – anything at all. It is equally true for your business and the computers it uses. A business requires goals, strategies on how to achieve those goals, adequate planning, intelligent coordination and supervision to make it grow. It will, otherwise, contract. Computers get fragmented and this slows them down unless they are routinely defragmented. They are vulnerable to dust, power outages, power surges, what software your employees might put into them and to sinister little pieces of code floating around in cyberspace that were designed to penetrate your business sphere and do some damage. Those computers must be cared for in the same way that you would take care of anything that you want to last.

If you only brought your car into the shop when something breaks, the maintenance method would be purely reactive. On the other hand, if you brought your car to the shop for regularly scheduled oil and lube changes, tune-ups and the manufacturer’s recommended mileage check-ups, the maintenance method would be proactive. If you only engaged in reactive maintenance, two things are very likely: (1) your car will not last as long as it could have lasted, and (2) your car will become problematic, unpredictable and financially burdensome.

Conversely, if you engaged in proactive maintenance with respect to your car you would find that (1) only rarely does anything go wrong with it, and (2) it lasts its full life expectancy. Whereas it may seem like this proactive method would cost more than you would have otherwise had to pay, you need only look at what you didn’t have to spend to keep fixing it.

IT service providers offer reactive support and proactive support for IT infrastructures. Some businesses want only a quick fix when something breaks or starts malfunctioning in some way. This is a break-and-fix (reactive) operating basis and is not the most optimum solution to managing your network. I’m writing this article right now because I want you to know this as well.

A more complete solution – not the ultimate solution but an interim step – is proactive and reactive support (when reactive is required – except that it will be required LESS with this particular combination). Proactive support is done remotely. A technician plugs into each computer via the Internet and ensures that its software is kept patched and updated, its hard drive(s) defragmented, scanned and cleaned of new spyware or other malicious software that has happened to make its way into that system since the previous proactive session. Its system is kept optimized for maximum performance.

With this combination, you will discover soon enough that you need to call a technician to come out less and less and less. In this way, the proactive support begins paying for itself. The return on your small investment in proactive support comes in the form of less cash outlay for break-and-fix support.

The IT infrastructure of your business, even if only 5-10 workstations and a server, is vital to your business. That’s where the company’s memory lies. It only makes sense to ensure it is properly cared for.

GLBP Overview and Features

Gateway Load Balancing Protocol (GLBP) can be used to replace HSRP in environments where you would like to load balance between multiple nodes, instead of having an active/standby pair.

In order to enhance on the capabilities of Hot Standby Router Protocol (HSRP), Cisco developed GLBP. GLBP provides automatic, first-hop gateway load balancing, which allows for more efficient resource usage and reduced administrative costs. It is an extension of HSRP and specifies a protocol that dynamically assigns responsibility for a virtual IP address and distributes multiple virtual MAC addresses to members of a Gateway Load Balancing Protocol group.

In campus networks, Layer 3 VLAN interfaces act as the gateway for the hosts. These Layer 3 VLAN interfaces from different switches are load balanced using GLBP. Layer 3 interfaces from multiple switches form one GLBP group. Each group contains one unique virtual IP address.

Supervisor 720 can have a maximum of 1024 GLBP groups (group numbers 0 to 1023). Supervisor 2 supports only one GLBP group. A GLBP group can have a maximum of 4 members. It means that GLBP can load balance up to 4 gateways

Gateway Load Balancing Protocol provides redundancy for IP networks, ensuring that user traffic immediately and transparently recovers from first hop router failures, while allowing packet load sharing between a group of redundant routers.

GLBP provides load balancing over multiple routers (gateways) using a single virtual IP address and multiple virtual MAC addresses. Each host is configured with the same virtual IP address, and all routers in the virtual router group participate in forwarding packets. GLBP members communicate between each other through hello messages sent every 3 seconds to the multicast address, User Datagram Protocol (UDP) port 3222 (source and destination).

Gateway Load Balancing Protocol works by making use of a single virtual IP address, which is configured as the default gateway on the hosts. The different routers that assume the forwarding role use different virtual MAC addresses for the same virtual IP address to which packets are forwarded by the hosts.

There are two types of routers in a Gateway Load Balancing Protocol group which make redundancy and load balancing work.

Active Virtual Gateway (AVG): One virtual gateway within a GLBP group is elected as the active virtual gateway, and is responsible for the operation of the protocol. This router has the highest priority value, or the highest IP address in the group, if there is no highest priority. The AVG answers all ARP requests for the virtual router address. Which MAC address it returns depends on which load-balancing algorithm it is configured to use.

Active Virtual Forwarder (AVF): One virtual forwarder within a GLBP group is elected as active virtual forwarder for a specified virtual MAC address, and is responsible for forwarding packets sent to that MAC address. Multiple active virtual forwarders can exist for each GLBP group.

GLBP features :

A) Load Sharing: You can configure GLBP in such a way that traffic from LAN clients can be shared by multiple routers, thereby sharing the traffic load more equitably among available routers. The load sharing available are:

Host-dependent: Specifies a load balancing method based on the MAC address of a host where the same forwarder is always used for a particular host while the number of GLBP group members remains unchanged.

Round-robin: Specifies a load balancing method where each virtual forwarder in turn is included in address resolution replies for the virtual IP address. This method is the default.

Weighted: Specifies a load balancing method that is dependent.

To specify the load-balancing method used by the AVG of the Gateway Load Balancing Protocol, use the “glbp load-balancing[host-dependent | round-robin | weighted]” command in interface configuration mode.

Multiple Virtual Routers: GLBP supports up to 1024 virtual routers on each physical interface of a router, and up to 4 virtual forwarders per group.

Preemption: The redundancy scheme of GLBP enables you to preempt an active virtual gateway with a higher priority backup virtual gateway that has become available. Forwarder preemption works in a similar way, except that forwarder preemption uses weighting instead of priority and is enabled by default.

To configure the gateway to take over as AVG for a Gateway Load Balancing Protocol group if it has higher priority than the current AVG, use the “glbp preempt” command in interface configuration mode.

To configure a router to take over as AVF for a Gateway Load Balancing Protocol group if it has higher priority than the current AVF, use the “glbp forwarder preempt” command in interface configuration mode.

Authentication: You can use a simple text password authentication scheme between GLBP group members to detect configuration errors. A router within a GLBP group with a different authentication string than other routers will be ignored by other group members.

To configure an authentication string for the GLBP, use the “glbp group authentication text string” command in interface configuration mode.

Tracking: You can track different interfaces to decrement the GLBP weighting by varying amounts.

To configure an interface to be tracked where the GLBP weighting changes based on the state of the interface, use the “track object-number interface type number {line-protocol | ip routing}” command in global configuration mode.

By using the “glbp weighting track” and “track” commands to configure parameters for an interface to be tracked. If an interface on a router goes down, the weighting for the router can be reduced by a specified value.

Reference from