04-18-2023 07:41 AM
Hi,
I'm struggling understanding the inline SGT propagation commands when there is a device that does not support or does not have CTS enabled. Two scenarios here:
Thanks.
Solved! Go to Solution.
04-18-2023 07:54 AM
In the first scenario don't apply any cts manual / policy static commands. The switch will take care of this correctly and pass standard ethernet frames without tags across any link not configured for cts. You can create an sxp connection to span the unsupported device in the path.
On the second scenario, what you said is correct.
04-18-2023 07:54 AM
In the first scenario don't apply any cts manual / policy static commands. The switch will take care of this correctly and pass standard ethernet frames without tags across any link not configured for cts. You can create an sxp connection to span the unsupported device in the path.
On the second scenario, what you said is correct.
04-19-2023 12:52 AM - edited 04-19-2023 01:01 AM
Hi Damien,
For the first scenario, I was testing this and north-south traffic is getting dropped. That's why I assumed that the "no sgt propagation" command is needed. Are you sure it is not? Non-CTS enabled devices ignore the CMD and forward the traffic automatically?
Regarding the second, the "policy static sgt XXX trusted" is used to allow infrastructure traffic (routing protocols, etc) generated by the switch itself, correct?
Thanks.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: