Hi Guys and Gals,
I have been tasked with repatching our network rack. It's an absolute mess and there are several issues with the way cabling has evolved over the years e.g. daisy chained switches, that are causing some strange issues on the network, IP clashes and DHCP issues.
Network design is relatively new to me so please bare with me and let me know if I miss out any vital info.
We have two network racks connected with a fibre link approx 100m apart.
Network rack A contains -
[ol]
Network rack B contains -
[ol]
Is the following configuration acceptable?
Internet------Fortigate------Aruba Switch1-----Aruba Switch2----SFP-------Fibre link-------SFP------HP 1920------HP 1920
Basically all 4 switches connected to one another then connected to the Primary fortigate, secondary fortigate will also be connected to Aruba Switch 1 so it can take over if the primary unit fails.
I had initially planned to have each switch connected directly to each fortigate as this seemed the right way rather than daisychaining them but I just had a 15 minute call with a network tech and they said that connecting each switch to the next (uplink as they put it) was an acceptable network setup.
We have had issues here since I started working with Avaya phones losing static IP's, stating they are in use, and constant "invalid address" entries on our DHCP list. I thought this was due to the daisychaining, e.g. the switch on the end not updating is MAC table fast enough to keep up with the rest.
Any advice welcome.
Hello,
I think that your scenario is acceptable, but in my opinion i think that this is not the best practice as you don't have ha at the Aruba switches. For example, if Aruba Switch 1 fails, then everything fails. I would suggest a configuration like the screenshot below.
In my scenario, if a FGT fails, everything continue to work fine. If an Aruba fails, you lose only the connected servers and machines at that switch. Same for 1920's.
Orestis Nikolaidis
Network Engineer/IT Administrator
Hi Orani,
Thank you very much for your reply.
would you have any idea how HA can be setup on the Aruba switches? I'm asuming this isn't just a matter of cross connecting the switches as this would be a loopback.
You have to enable the spanning tree feature at your aruba and 1920's. You can find it under "Traffic" tab at your web gui.
Orestis Nikolaidis
Network Engineer/IT Administrator
Configure each switch using spanning tree, make all the wiring and then do some test by powering off one machine at a time. At each test you have to check the connectivity.
Orestis Nikolaidis
Network Engineer/IT Administrator
Oh that makes sense, so spanning tree will block the ports that are cross connected untill something fails at which time the ports will become active and take over?
That's right.
You set the root path. When this fails, switches uses the next path available. The paths you configure are weighted.
Orestis Nikolaidis
Network Engineer/IT Administrator
orani wrote:Hello,
I think that your scenario is acceptable, but in my opinion i think that this is not the best practice as you don't have ha at the Aruba switches. For example, if Aruba Switch 1 fails, then everything fails. I would suggest a configuration like the screenshot below.
[attachImg]https://forum.fortinet.com/download.axd?file=0;176878&where=message&f=Screenshot_2.png[/attachImg]
In my scenario, if a FGT fails, everything continue to work fine. If an Aruba fails, you lose only the connected servers and machines at that switch. Same for 1920's.
Hi,
Be carefull because with spanning tree this drawing is false : redondant link will be disabled by spanning tree.
Switch at top is root switch of STP topology, Black links are active links, red links are blocked by STP.
Be sure to :
- Manually confiure switch priority to select your root switch. By default, all switch have same priority, so it's the lowest MAC address that win (ie oldest switch)
- activate RSTP, not only STP for a better failover time.
If you want to create a real full HA stack with all links active, you need a feature like IRF (with HPE 5130 for example).
2 FGT 100D + FTK200
3 FGT 60E FAZ VM some FAP 210B/221C/223C/321C/421E
I agree with Baptiste. The best for your scenario is IRF but your switches does not support that (if i remember correctly).
Baptisteorani Hello, I think that your scenario is acceptable, but in my opinion i think that this is not the best practice as you don't have ha at the Aruba switches. For example, if Aruba Switch 1 fails, then everything fails. I would suggest a configuration like the screenshot below.Hi, Be carefull because with spanning tree this drawing is false : redondant link will be disabled by spanning tree. Switch at top is root switch of STP topology, Black links are active links, red links are blocked by STP.In my scenario, if a FGT fails, everything continue to work fine. If an Aruba fails, you lose only the connected servers and machines at that switch. Same for 1920's.
Orestis Nikolaidis
Network Engineer/IT Administrator
User | Count |
---|---|
2403 | |
1294 | |
778 | |
536 | |
454 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.