38-72
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
Chapter38 Configuring IP Unicast Routing
Configuring Multi-VRF CE
User Interface for uRPF
uRPF can be configured on an interface assigned to a VRF, and source lookup is done in the VRF table.
Beginning in privileged EXEC mode, follow these steps to configure VRF-aware services for uRPF. For
complete syntax and usage information for the commands, refer to the switch command reference for
this release and the Cisco IOS Switching Services Command Reference, Release 12.2.
User Interface for Syslog
Beginning in privileged EXEC mode, follow these steps to configure VRF-aware services for Syslog.
For complete syntax and usage information for the commands, refer to the switch command reference
for this release and the Cisco IOS Switching Services Command Reference, Release 12.2.
Step6 standby 1 ip ip-address Enable HSRP and configure the virtual IP address.
Step7 end Return to privileged EXEC mode.
Command Purpose
Command Purpose
Step1 configure terminal Enter global configuration mode.
Step2 interface interface-id Enter interface configuration mode, and specify the Layer 3 interfa ce to
configure.
Step3 no switchport Remove the interface from Layer 2 configuration mode if it is a physical
interface.
Step4 ip vrf forwarding vrf-name Configure VRF on the interface.
Step5 ip address ip-address Enter the IP address for the interface.
Step6 ip verify unicast reverse-path Enable uRPF on the interface.
Step7 end Return to privileged EXEC mode.
Command Purpose
Step1 configure terminal Enter global configuration mode.
Step2 logging on Enable or temporarily disable logging of storage router event message.
Step3 logging host ip-address vrf vrf-name Specify the host address of the syslog server where logging messages
are to be sent.
Step4 logging buffered logging buffered size
debugging Log messages to an internal buffer.
Step5 logging trap debugging Limit the logging messages sent to the syslog server.
Step6 logging facility facility Send system logging messages to a logging facility.
Step7 end Return to privileged EXEC mode.