Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
pj255
New Contributor

FG 1000c and Trunking to Cisco Switch

Hi, Has anyone experience getting a FG to trunk with a Cisco switch? I can bring up the trunk but im not learning a MAC address on either side of the trunk link and the interface counters are at 0 for input on both sides. Patrick
16 REPLIES 16
pj255
New Contributor

Think I just stumbled across the solution... i found an execute command and wham the mac appeared on the switch for that VLAN UK-RL-N0-FG01 (test) # UK-RL-N0-FG01 (test) # diagnose switch-controller kick vdom 8 75 11 d4a0.2af1.af01 can not kick client of vdom vdom from test Then on the switch: Switch# Switch#show mac add int Fa0/1 Mac Address Table ------------------------------------------- Vlan Mac Address Type Ports ---- ----------- -------- ----- 75 0009.0f09.0006 DYNAMIC Fa0/1 seq_no:0 Total Mac Addresses for this criterion: 1 Switch# Switch# Il try the other VLAN now also
pj255
New Contributor

Maybe not ...just a co-incidence.....
emnoc
Esteemed Contributor III

I tried the ping but no luck - the pings time out? Could the pings be unsuccessful due to a routing issue? Either way I would still expect an ARP message of sort would populate the other devices CAM table with the other sides MAC address. Is there a command to check the FG interface for a MAC learned ?
Will you mean learned, so this would ip arp diag ip arp list No back to your problem(s), on the interface do you see any packets inbound on fas0/1 show interface fas 0/1 | inc input if you have " zero" packets input, than you have a link or hardware issues on the fortigate. If you suspect the fortigate this is what I' ve done in my own 1000A when we had problems Build a new vdom ( test2 ) select a unused port , crafted new subinterfaces for that vdom test2, but select a new unused ip_address ( you have to select a new name for the sub-intf btw ) 1st; Using port13 on your FGT would look like this; edit " port13" set vdom " test2" set mode static set ip 192.168.100.253 255.255.255.252 set allowaccess ping next edit " TEST2-VL55-SVI" set ip 192.168.55.253 255.255.255.0 set allowaccess ping set vdom test2 set interface " port13" set vlanid 55 next edit " TEST2-VL75-SVI" set ip 192.168.75.253 255.255.255.0 set allowaccess ping set vdom test2 set interface " port13" set vlanid 75 next 2nd; Cable & wire the port 11< to > 13 back-2-back. 3rd; execute ping from 192.168.55.253 to 254 and so on for the vlan tag and the then the parent 192.168.100.253/254, 4th; you can even diag sniffer the parent ports 11/13 or sub-interfaces to see if traffic is actually moving Give that a try if you can and let us know. Also it would not hurt to change ports on the cisco switch if you later think it' s the switch.

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
pj255
New Contributor

i can see some input packets on the switchport so im pretty sure the Fortinet and switchport are okay. To be sure I have a second test switch setup which im going to use to test. So far though no joy getting the mac address for VLAN 55 on the first test switch. Also even though I can see the mac for VLAN 75 - I cannot ping the SVI. Is there anything that needs to be configured? I was hoping to test it all on one switch and then use VRRP for HA between the Active and Standby FG Il try setting up port 13 and looping it back on port 11 as a test as suggested Switch#show int fa0/1 | in input input flow-control is off, output flow-control is unsupported Last input never, output 00:00:01, output hang never 5 minute input rate 0 bits/sec, 0 packets/sec 7 packets input, 152576 bytes, 0 no buffer 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 1 multicast, 0 pause input 0 input packets with dribble condition detected Switch# Switch#show mac add int fa0/1 Mac Address Table ------------------------------------------- Vlan Mac Address Type Ports ---- ----------- -------- ----- 75 0009.0f09.0006 DYNAMIC Fa0/1 seq_no:0 Total Mac Addresses for this criterion: 1
emnoc
Esteemed Contributor III

Okay so if you have input packets and mac_addr for one vlan, I would double check the vlan cfg on the vlanid55. You say you can' t ping the SVI interface ? I' m assuming vlan75? 1: is the SVI admin up ( most cisco switch places this in a admin-down on creation ) 2: is the mask and ip_address correct 3: is ping allowed on the FGT set allow ping Any one of the above 3 might be the problem for icmp pings 2nd, why do you want to run VRRP on a FGT. I personally would NOT do that and just run the HA as A-P unless you have a real validate reason for VRRP. I' ve only used VRRP once and that was with a non-Fortigate device for HA redundancy.

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
pj255
New Contributor

2nd point - you' re right...no need for VRRP. I have inherited these FW' s and they' re deployed with FGCP already. So no need for VRRP. In terms of the SVI. I want the switch to remain as L2 only for VLAN 55 and 75 with the FG terminating the SVI. So the FG will act as the L2/L3 boundary. Is there additional config needed on the FG to create the VLAN SVI on the FG?
pj255
New Contributor

Ken thanks for your help - it seems a requirement is to have an SVI on both the FG subinterface AND on the Cisco switch. So two SVI' s really - it now works. For note i also had to create the addresses and add a policy. Thanks for your help Patrick
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors