Description | This article describes how to set up MCLAG with ISP router redundancy for Standalone FortiSwitches. |
Scope | FortiSwitch Standalone. |
Solution |
Example of MCLAG topology with ISP routers and crossed links for redundancy:
In this scenario, each FortiSwitch member of the MCLAG has one connection with each ISP Router.
FSW1:
config switch trunk edit ICL-Trunk set mode lacp-active set mclag-icl enable set members "port10" "port11" next end
FSW2:
config switch trunk edit ICL-Trunk set mode lacp-active set mclag-icl enable set members "port10" "port11" next end
FSW1:
config switch trunk edit "mclag-ISP" set mode lacp-active set mclag enable set members "port3" "port4" next end
FSW2:
config switch trunk edit "mclag-ISP" set mode lacp-active set mclag enable set members "port7" "port8" next end
FSW1:
config switch interface edit ICL-Trunk set allowed-vlans 1-4094 <----- This allows all VLANs to flow through the ICL Trunk. set dhcp-snooping trusted set edge-port disabled set igmp-snooping-flood-reports enable set mcast-snooping-flood-traffic enable next end
FSW2:
config switch interface edit ICL-Trunk set allowed-vlans 1-4094 <----- This allows all VLANs to flow through the ICL Trunk. set dhcp-snooping trusted set edge-port disabled set igmp-snooping-flood-reports enable set mcast-snooping-flood-traffic enable next end
FSW1:
config switch interface edit mclag-ISP set allowed-vlans 10,20,30,200 next end
FSW2:
config switch interface edit mclag-ISP set allowed-vlans 10,20,30,200 next end |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.