<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 3750g etherchannel with two Fortigate Firewalls in HA in Cisco Catalyst Center</title>
    <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253215#M11642</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/182793"&gt;@Kasun Bandara&lt;/a&gt;&amp;nbsp;, fortigates are connected with two cables. First is from port&amp;nbsp;&lt;SPAN&gt;GigabitEthernet1/0/23&lt;/SPAN&gt;&amp;nbsp;to active firewall, second is from port &lt;SPAN&gt;GigabitEthernet1/0/&lt;/SPAN&gt;24 to passive firewall. Currently I have ip address 10.53.254.253 on port&amp;nbsp;&lt;SPAN&gt;GigabitEthernet1/0/23 and i can´t added same ip address to port&amp;nbsp;GigabitEthernet1/0/24. So I need to use etherchannel.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 27 Jan 2025 14:05:05 GMT</pubDate>
    <dc:creator>lukas-glonec</dc:creator>
    <dc:date>2025-01-27T14:05:05Z</dc:date>
    <item>
      <title>3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253207#M11639</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;have anybody experience with topology where is one cisco catalyst 3750g switch and two Fortigate firewalls in HA active - passive mode?&lt;BR /&gt;Here is the topology:&lt;BR /&gt;On cisco switch I have ports GigabitEthernet1/0/23 and 24 added in port-channel with ip address 10.53.254.253/30. Default ip route is set as 0.0.0.0 0.0.0.0 10.53.254.254.&lt;BR /&gt;My goal is, when active FW falls down, traffic automatically change the path through another port&amp;nbsp; (to passive FW which become active).&lt;BR /&gt;Unfortunatelly, my port-channel port became suspended.&lt;/P&gt;&lt;P&gt;Any ideas, what is wrong please?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 13:45:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253207#M11639</guid>
      <dc:creator>lukas-glonec</dc:creator>
      <dc:date>2025-01-27T13:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253208#M11640</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/494132"&gt;@lukas-glonec&lt;/a&gt;&amp;nbsp;not sure how you connected the switch port channel to firewalls. if you only connecting two ports to two firewalls (in same HA cluster) make sure those ports are not in port channel. because in active-passive scenarios, only active firewall handle traffic. secondary will come up if active is down.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can do port channel if you have 4 cables (2 per firewall). then make 1 port channel for active firewall and 2nd port channel for passive firewall.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 13:49:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253208#M11640</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2025-01-27T13:49:42Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253215#M11642</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/182793"&gt;@Kasun Bandara&lt;/a&gt;&amp;nbsp;, fortigates are connected with two cables. First is from port&amp;nbsp;&lt;SPAN&gt;GigabitEthernet1/0/23&lt;/SPAN&gt;&amp;nbsp;to active firewall, second is from port &lt;SPAN&gt;GigabitEthernet1/0/&lt;/SPAN&gt;24 to passive firewall. Currently I have ip address 10.53.254.253 on port&amp;nbsp;&lt;SPAN&gt;GigabitEthernet1/0/23 and i can´t added same ip address to port&amp;nbsp;GigabitEthernet1/0/24. So I need to use etherchannel.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 14:05:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253215#M11642</guid>
      <dc:creator>lukas-glonec</dc:creator>
      <dc:date>2025-01-27T14:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253221#M11643</link>
      <description>&lt;P&gt;If FW is active/standby you can't connect both FW to one SW via one PO.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 14:15:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253221#M11643</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-27T14:15:37Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253231#M11644</link>
      <description>&lt;P&gt;So how do you assign IP to PC, as L3 PC or PC as a L2 access port with IP assigned as a SVI?&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 14:37:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253231#M11644</guid>
      <dc:creator>Joseph W. Doherty</dc:creator>
      <dc:date>2025-01-27T14:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253290#M11645</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/494132"&gt;@lukas-glonec&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In an a/p HA mode with FortiGate firewalls, only the active firewall is handling the traffic at any given time. The passive firewall becomes active only if the active firewall fails. So, connecting the two ports of a port-channel to both firewalls in an HA setup can lead to issues because only one firewall (the active one) should be handling traffic on the port-channel at a time.&lt;/P&gt;
&lt;P&gt;So, if using 2 ports for a/p HA, &lt;STRONG&gt;do not&amp;nbsp;&lt;/STRONG&gt;configure the port-channel on the switch if you only have two port&amp;nbsp; connecting to the two firewalls (one per firewall). Instead, directly connect each switch port to a separate firewall interface. In this case, each firewall in the HA pair will have its own physical link from the switch, and only the active firewall will handle traffic through the connected port. The passive firewall will remain idle until a failover event occurs, at which point the previously idle link to the passive firewall becomes active.&lt;/P&gt;
&lt;P&gt;Else follow &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/182793"&gt;@Kasun Bandara&lt;/a&gt;&amp;nbsp;advices by using 4 cables (2 per Fw).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 16:13:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253290#M11645</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2025-01-27T16:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253320#M11647</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/237724"&gt;M02@rt37&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;thanks for reply. Unfortunately I can´t using more ports on firewalls because there are connected other devices (like VoIP switches etc.) So I can use only one port of each firewall. I understand how active-passive HA on fortigates works, I want to find the way how to set on 3750G catalyst switch to work primary and secondary way from our internal networks to the internet, if primary firewall fails. Port-channel was my first idea. Is there any other solution? Maybe using VLAN? Thank you very much.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 16:53:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253320#M11647</guid>
      <dc:creator>lukas-glonec</dc:creator>
      <dc:date>2025-01-27T16:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253324#M11648</link>
      <description>&lt;P&gt;I need only 1 port-channel, because both firewalls in this scenario have same IP adresses. If I create two port-channels, each one could have a different IP address. I need only one IP address because on primary FW is only on IP address and this is copied to passive firewall.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 16:56:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253324#M11648</guid>
      <dc:creator>lukas-glonec</dc:creator>
      <dc:date>2025-01-27T16:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253326#M11649</link>
      <description>&lt;P&gt;No need PO&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Connect SW to each FW as access or trunk port.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The active FW will send traffic, the standby will be hidden non seen from SW, it only seen when active is down.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 16:58:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253326#M11649</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-27T16:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253328#M11650</link>
      <description>&lt;P&gt;Both have same IP???? I DONT about Fotri but that not correct&lt;/P&gt;
&lt;P&gt;Both FW have IP in same subnet bot have same IP&lt;/P&gt;
&lt;P&gt;Check forti config guide&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 17:01:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253328#M11650</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-27T17:01:19Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253332#M11651</link>
      <description>&lt;P&gt;How SW finds which route to use, if I have a static route via 10.53.254.254 without IP address on interface, if i use access or trunk port.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 17:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253332#M11651</guid>
      <dc:creator>lukas-glonec</dc:creator>
      <dc:date>2025-01-27T17:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253334#M11652</link>
      <description>&lt;P&gt;Now we start understanding issue&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SW is GW for host or FW is GW?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 17:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253334#M11652</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-27T17:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253335#M11653</link>
      <description>&lt;P&gt;"Connect SW to each FW as access or trunk port."&lt;/P&gt;
&lt;P&gt;Possibly, the way it should be done.&lt;/P&gt;
&lt;P&gt;Using a portable channel assumes both ends can accept frames/packets on either link, which it sounds like Fortigate is like FHRP.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 17:16:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253335#M11653</guid>
      <dc:creator>Joseph W. Doherty</dc:creator>
      <dc:date>2025-01-27T17:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253336#M11654</link>
      <description>&lt;P&gt;SW is GW for all hosts and servers. FW is another step before we reach the internet and only forwards traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 17:16:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253336#M11654</guid>
      <dc:creator>lukas-glonec</dc:creator>
      <dc:date>2025-01-27T17:16:17Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253337#M11655</link>
      <description>&lt;P&gt;Yes I think you correct, Forti support Hsrp,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So each FW will have common one VIP&lt;/P&gt;
&lt;P&gt;And SW will have default route toward this VIP.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 17:22:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253337#M11655</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-27T17:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253480#M11661</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/494132"&gt;@lukas-glonec&lt;/a&gt;&amp;nbsp;, ok.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you do FortiGate active-passive, both firewall will have same IP for same port. setup need to be like as below.&lt;/P&gt;
&lt;P&gt;option 1 - without port channel. just connect 2 ports in switch to 2 firewalls. no need to have port channel as firewall side you are only connecting 1 cable.&lt;/P&gt;
&lt;P&gt;Fortigate 1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Fortigate 2&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; \&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;/&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Switch 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Option 2 - connect 2 cables each firewall. then create port channel at firewall for connected t ports and switch side create 2 port channels as 1 for 1st firewall cable pair and 2nd for second firewall cable pair.&lt;/P&gt;
&lt;P&gt;Fortigate 1&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Fortigate 2&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; \&amp;nbsp; &amp;nbsp; \&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;/&amp;nbsp; &amp;nbsp; /&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Switch 1&lt;/P&gt;
&lt;P&gt;IP address -&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IP address in switch will be bound to SVI (VLAN interface). allow that VLAN as access mode in the ports which are connected to firewalls (in option 1) or in Port channels (in option 1)&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 03:01:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253480#M11661</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2025-01-28T03:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253633#M11664</link>
      <description>&lt;P&gt;Yes, both have same IP, it´s correct. Standby FW copied all configuration from Active and when active failed, standby became active with same configuration. It´s configured according to Forti guide.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 10:54:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253633#M11664</guid>
      <dc:creator>lukas-glonec</dc:creator>
      <dc:date>2025-01-28T10:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253647#M11665</link>
      <description>&lt;P&gt;So it run something like hsrp'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I already suggest to you how you config static route in SW&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 11:38:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253647#M11665</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-28T11:38:27Z</dc:date>
    </item>
    <item>
      <title>Re: 3750g etherchannel with two Fortigate Firewalls in HA</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253770#M11666</link>
      <description>&lt;P&gt;I skimmed through this thread quickly so apologies if I'm missing anything. Are you trying to configure a layer 3 or a layer 2 port channel between the switch and the firewalls?&lt;/P&gt;
&lt;P&gt;As already mentioned, if you're trying to connect the two firewalls to the same port channel on the switch that won't work because you have one active and one passive device that won't be processing any traffic. However, as already suggested you can connect firewall 1 to a port channel on the switch, and firewall 2 to another port channel,&amp;nbsp; or you can discard the port channels all the way and just use single connections to the switch one from each firewall.&lt;/P&gt;
&lt;P&gt;Also, if the you are trying to configure a L3 switch port that is connected to the firewalls, then I think you would need to convert it to be a switch port and moving the IP to an SVI.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 14:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/3750g-etherchannel-with-two-fortigate-firewalls-in-ha/m-p/5253770#M11666</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-01-28T14:17:57Z</dc:date>
    </item>
  </channel>
</rss>

