facing an issue with one of the access switch is going offline again and again.
Fortigate as a controller running a on 6.4.9
Core Switch 1048E running v 6.4.11
Access Switch 124F running v6.4.11
Ntp is synced. only on switch 124F is having an issue.
core switch connected as MCLAG Peers other access swi has below configuration
config switch trunk
edit "E48T0000000213-0" ----->>>>> to another Core SW 1048E
set mode lacp-active
set auto-isl 1
set mclag-icl enable
set members "port45"
next
edit "G6H00000000" ------->>> TO Fortigate
set auto-isl 1
set fortilink 1
set mclag enable
set members "port48"
next
edit "4FF00000009417-0" -------------->>>> Access Sw 124F connected
set mode lacp-active
set auto-isl 1
set mclag enable
set members "port2"
next
**************************************
************* Troubled switch logs
connectivity
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
6.4 is pretty stable. If all your switches are on same 6.4.11 then keep it that way IMO.
Created on 09-10-2022 09:58 AM Edited on 09-10-2022 10:01 AM
F5-SW-X Trunk Config
F5-SW-Y Trunk Config
F5-SW-Z Trunk Config
Core-Y Trunk to F5
Created on 09-10-2022 10:12 AM Edited on 09-10-2022 10:25 AM
I cannot see 'set mclag enable ' or 'set mclag-icl' command on FortSwitch 124 . on any trunk interfaces
OK Right, 100-series do not support MCLAG.
Looking more detail at your design, it is strange because everywhere you are configuring LACP trunks with only one port as member. It *should* work but its not necessary. A trunk is intended to bundle multiple interfaces into a single logical interface to provide increased bandwidth and resiliency.
Your trunks are just single interfaces so configuring trunks like that is superfluous and you might as well just keep them as regular interfaces.
STP will take care of the loop and block the redundant links as you see happening on F5-SW-Z.
So yes it makes sense that your switches work it's just a strange configuration using LACP when it's not really needed (I.e. only one link).
So why is F7-SW-Y disconnecting? Definitely seems like there is some communication block happening as the ISL times out and STP process begins.
Can you confirm if the link is more stable with only one of the interfaces connected on F7-SW-Y?
Try connecting only port 28 on F7-SW-Y to port 28 on F7-SW-Z and see how it behaves...
Means somehow disti switch connectivity is ok.
Regarding trunk configuration, I didn’t configure these trunk interfaces, trunk is auto created on both ends as soon as Disti switches connected to core ( auto authorised enabled on fortilink).
will it be good if I extend direct connection from SW-Z to any of the core ( have core-x and core-y) and remove links between disti switches xyz.
sw-x and sw-y have direct connection to core x&y.
oh sorry i get it now yes that's all done automatically by fortilink.
so here's the thing you do have MC-LAG enabled core where you *can* create a trunk interface on a downstream switch that connects simultaneously to both core switches. that way you get more bandwidth and resiliency in case one of the core switches goes down.
you can try connecting sw-z to core. try putting one port to core-a and the other to core-b.
yes. Both Core Switches are on MCLAG Peer.
Port 45 connection between Core Switches.
Correct me you mean, each downstream switch be connected to both Core Switches? (so here's the thing you do have MC-LAG enabled core where you *can* create a trunk interface on a downstream switch that connects simultaneously to both core switches.)
Yes that is the benefit of MC-LAG. You can establish a trunk from access switches using two interfaces going to each core switch.
What about OS , upgrade is required or the 6.4.11 is best. Fortigate on 6.4.9.
6.4 is pretty stable. If all your switches are on same 6.4.11 then keep it that way IMO.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1705 | |
1093 | |
752 | |
446 | |
230 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.