04-18-2023 07:41 AM
Hi,
I'm struggling understanding the inline SGT propagation commands when there is a device that does not support or does not have CTS enabled. Two scenarios here:
Thanks.
Solved! Go to Solution.
04-18-2023 07:54 AM
In the first scenario don't apply any cts manual / policy static commands. The switch will take care of this correctly and pass standard ethernet frames without tags across any link not configured for cts. You can create an sxp connection to span the unsupported device in the path.
On the second scenario, what you said is correct.
04-18-2023 07:54 AM
In the first scenario don't apply any cts manual / policy static commands. The switch will take care of this correctly and pass standard ethernet frames without tags across any link not configured for cts. You can create an sxp connection to span the unsupported device in the path.
On the second scenario, what you said is correct.
04-19-2023 12:52 AM - edited 04-19-2023 01:01 AM
Hi Damien,
For the first scenario, I was testing this and north-south traffic is getting dropped. That's why I assumed that the "no sgt propagation" command is needed. Are you sure it is not? Non-CTS enabled devices ignore the CMD and forward the traffic automatically?
Regarding the second, the "policy static sgt XXX trusted" is used to allow infrastructure traffic (routing protocols, etc) generated by the switch itself, correct?
Thanks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide