Running High Availability redundancy application on Cisco IOS XRv 9000 router for AWS
This section describes having a High Availability (HA) redundancy application that runs on Cisco IOS XRv 9000 router, and you need to have a mechanism for the virtual router to switch over from the active router to the standby router in case of failure. So, if the routing goes down (for example, the router fails, it stops forwarding traffic) then you need to detect that failure, and then initiate a failover to the standby router so that the traffic that was coming into the active router can be diverted to the standby router.
The advantages are:
-
Redundancy: For any type of signaling traffic, you must need a redundant gateway solution. The advantage of a redundancy solution is, if one router goes down, the other router continues to send the traffic. So that the drop of traffic is minor.
-
Failover: With the failover, only the active router passes traffic while the other router waits in a standby state. If an active router fails, the standby router immediately becomes the active router with little or no delay.
Amazon Web Services (AWS) is a public cloud where you are running a virtual machine on top. Both the active and standby routers running on AWS are available in the same availability zone and they have the same subnet. As a result, both the routers can communicate with each other. You can then set up a system on AWS where this failover can be triggered.
For example, router A is active initially. So all the traffic flows through this active router and you activate or run the application on router A. Spin up the same application on standby router B. The application then uses the service layer API to interact with the BFD process and start the BFD session with the standby router.
Both the routers have the same primary IP address which is unique. Router A also has the secondary IP address initially.
![]() Note |
Typically, in AWS, the packets are handled by AWS directly. So, the routers do not detect that the same standby IP is configured. |
So, when the traffic comes to the router A interface, the traffic destination typically goes through the secondary private IP here. That means only the router that has the secondary private IP configured on the AWS underlay, expects the traffic to come in. That is the router that has the secondary IP configured on the AWS underlay. Both the routers communicate using BFD.
And when this router A goes down or the BFD session goes down, then the session down event is sent to the application running on the router which detects the failover event, use AWS API to connect to AWS for shifting the secondary IP from the active router A to the standby router B. So, when the secondary IP is shifted from active to standby, then the traffic is diverted from the active router A to the standby router because the secondary IP is in the standby router B. So, the standby router B becomes the active router now.
![]() Note |
If the secondary IP is associated with one router, that is active, and the other one is standby. |
To know more about the HA redundancy application and how it works, refer to the HA Solution document.

Feedback