FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
JaskiratM
Staff & Editor
Staff & Editor
Article Id 244500
Description

 

This article describes how to change the VLAN protocol inside an Aggregate interface when connecting to 3rd party switches in MC-LAG.

 

Scope

 

Fortigate attached to downstream 3rd party switches in MC-LAG.

The interface IP of the FortiGate is 10.244.0.1 and is directly connected to the downstream switches through 10.244.0.5

JaskiratM_0-1675212773119.png

 

The Interface name of the aggregate on the FortiGate is Aggregate-Intf (which includes port6 and port8). There is a sub-interface with VLAN ID – 1800 inside the Aggregate Interface.

When a new VLAN interface is created, there is an option to use either 802.1ad or 802.1q protocol.

 

JaskiratM_1-1675212806538.png

 

If 802.1AD is choosen, although the downstream switch sends Tagged traffic on VLAN ID-1800, it is not matched to the sub-Interface VLAN-1800.

 

Solution

 

1) Take a packet capture on the parent interface as well as the VLAN-Interface:

 

JaskiratM_2-1675212847136.png

 

2) Open the PCAP of the parent interface.

 

JaskiratM_3-1675212897512.png

 

The FortiGate will send the ARP for 10.224.0.5 as VLAN-ID tagged using 802.1 AD.

 

JaskiratM_4-1675212927514.png

 

The reply traffic is seen on 802.1q TAGGED VLAN-ID 1800. Although the ARP reply is on the same VLAN-ID, the protocol used for sending the traffic is 802.1AD and the reply is seen on 802.1Q. Therefore, FortiGate drops the traffic.

 

3) To fix this issue, delete the VLAN-ID 1800 sub-interface and re-add the same VLAN-ID interface under the Aggregate-Intf making sure the protocol used is 802.1 Q.

 

# config system interface

    edit Vlan-ID-1800

        set vlan-protocol 8021q

    end

Contributors