Hi,
Setup
I have a large network which is described in the image below. The image is simplified. In my real network there are about 40 switches like "Switch C" -- switches that are connected to both "Switch A" and "Switch B". Also I have a Fortigate HA pair (Active/Passive) connected to "Switch A" and "Switch B". Running firmware 6.2.2
Problem
In my network, I can ping from "Host 1" to "Host 2". If I pull the power from "Switch D", my ping from "Host 1" to "Host 2" continues to work. This is expected. However, when I re-apply the power to "Switch D", and after "Switch D" boots, pings from "Host 1" to "Host 2" become sporadic. This "packet loss" lasts for about 30 seconds. Then the pings return to normal.
Question
Can anyone tell me (or guess) what the problem is or how I could go about debugging? I duplicated the network with a spare pair of Fortigates and 448/224 switches and I was unable to reproduce.
Thank you,
Chris
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi Chris,
Does the traffic from host A to host B traverse through the firewall? If so, I would start by checking if there are any route changes happening on the firewall when the switch comes online.
Also, perform a sniffer / flow debug to check if FGT is dropping the packets.
Regards,
You need to put those FGTs in HA in the diagram and VLAN(s)/IP subnet(s). Otherwise nobody can know the topology involving the FGTs. But my feeling is it's on the switch side involving "port-fast".
Toshi
With 40+ switches I am pretty sure you have a central log storage for all of them, I'd check what log level is needed to catch STP port/VLAN state changes (Forwarding/Blocking) and look for them in the logs. Problem that occurs every 30 seconds each time seems more like a timers issue, especially with Spanning Tree Convergence times.
HI ChrisStankevitz,
Since you mentioned the network is big, im afraid this issue due to the network deployment itself.
Please take a look on this KB:
Troubleshooting Tip: LACP issue
https://kb.fortinet.com/kb/microsites/microsite.do?cmd=displayKC&docType=kc&externalId=FD50620
High availability basic deployment design
https://kb.fortinet.com/kb/microsites/microsite.do?cmd=displayKC&docType=kc&externalId=FD47572
That KB should provide general idea on the deployment.
Hope that helps.
Thank you all for your replies. A couple of comments which I should have included in my original post:
My sales engineer suggested that a "loop" is forming between switches C and D, which doesn't make sense to me.
Complicating this: I'm working in an air gapped environment so getting support is difficult. I tried to replicate with spare fortigates and switches, but so far I'm unsuccessful.
Does anyone know how I can diagnose/trace the "logic" that the switches go through when "Switch D" joins the topology or when ISL connections come up and down?
Hi ChrisStankevitz,
That design is too general. i can create about 2-5 solution based on that design.
Example:
ISL-1 and ISL-2 is 1 LACP. OR ISL-1 to ISL-4 is 1 LACP.
LACP on Switch A is for which port?
Looking at this general design itself, i believe this is more to the switch configuration. I would suggest to contact switch support to help you on this.
Created on 06-15-2022 07:10 AM Edited on 06-15-2022 07:11 AM
Thank you -- can you think of ANY configuration of ISL that will cause packet loss between "Host 1" and "Host 2" when "Switch D" is connected to "Switch C"?
Please consider if I DESIRE packet loss between "Host 1" and "Host 2" when "Switch D" is connected to "Switch C". Can you think of ANY configuration of ANYTHING that would accomplish such packet loss?
Then you should post this at Cisco Community instead of Fortinet Community.
Toshi
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.