11-29-2023 04:55 AM
Sales engineer question
Assumptions: Active/Active (or Active/Standby)
Assumptions: Multi-Instance-capable
Assumptions: Routed Mode
The question derives from a requirement where there is exists space constraints and consolidating the Firewalling and Switching/Bridging function (with very low density port requirements) into one 1U device is highly desired.
The historical Cisco precedent here would be a Router with a standalone/independently managed Cisco Catalyst switch-module, but I haven't seen any:
* Firepower/FTD with a Catalyst (or other family) switch module except for the FTD1010 ("L2 Switch")
* Catalyst (or other family) with a Firepower/FTD module
* There do, however, seem to be quite a few options for virtualizing the Firepower/FTD, especially onto a Cisco UCS-E module (Modules which I've seen as a ASR4K / ISR module, but not as a Catalyst module)
Solved! Go to Solution.
12-01-2023 06:17 AM
Neither FP1010 hardware switch, nor ASA/FTD transparent mode software run STP. In both cases STP BPDUs pass through the device by default.
In case of ASA A/S failover (aka FTD HA) one unit is active and the other one is standby and doesn't forward traffic. FP1010 hardware switch is an exception to this rule. The switchports on it belong to the switch and hence are not controlled by firewall software, which means that switchports on standby can forward traffic. This in turn means that STP loop will be formed if FP1010 switchports and failover are used together and external switch STP needs to take care of it. If you don't have external switch and just want to interconnect two FP1010 switchports with a dot1q trunk, to create a bigger/redundant switch, the STP loop is unavoidable.
Also, as a side note, in case of a software switch (transparent mode firewall) it's usually recommended to block BPDUs on the firewall with ethertype ACLs to prevent external switch ports from going through STP learning phase right after the firewall switchover, which delays network convergence.
Clustering is another technology. The cluster can run in transparent or routed firewall mode and appears to the outside world as a single device. FP1k doesn't support clustering, only higher models do. In case of a cluster, spanned port-channel is formed on a few firewall chassis. This spanned port-channel runs cLACP which is a cluster LACP. The other side thinks that it talks to a single device, so STP isn't needed here.
HTH
11-29-2023 05:19 AM - edited 02-15-2024 07:54 AM
I'm exploring the possibility of creating a chassis-spanning software-switch between active/active FTD/Firepower cluster chassis using a Dot1Q Trunk. Wondering about limitations—does FTD's bridge domain run STP, and is LACP supported?
12-01-2023 06:17 AM
Neither FP1010 hardware switch, nor ASA/FTD transparent mode software run STP. In both cases STP BPDUs pass through the device by default.
In case of ASA A/S failover (aka FTD HA) one unit is active and the other one is standby and doesn't forward traffic. FP1010 hardware switch is an exception to this rule. The switchports on it belong to the switch and hence are not controlled by firewall software, which means that switchports on standby can forward traffic. This in turn means that STP loop will be formed if FP1010 switchports and failover are used together and external switch STP needs to take care of it. If you don't have external switch and just want to interconnect two FP1010 switchports with a dot1q trunk, to create a bigger/redundant switch, the STP loop is unavoidable.
Also, as a side note, in case of a software switch (transparent mode firewall) it's usually recommended to block BPDUs on the firewall with ethertype ACLs to prevent external switch ports from going through STP learning phase right after the firewall switchover, which delays network convergence.
Clustering is another technology. The cluster can run in transparent or routed firewall mode and appears to the outside world as a single device. FP1k doesn't support clustering, only higher models do. In case of a cluster, spanned port-channel is formed on a few firewall chassis. This spanned port-channel runs cLACP which is a cluster LACP. The other side thinks that it talks to a single device, so STP isn't needed here.
HTH
12-02-2023 02:05 AM - edited 12-02-2023 02:09 AM
Okay; no advanced integrated bridging/switching function for now.
Until then, we can consider:
Thanks for clue'ing me into Clustering feature on FirePower 4000+ (I recently learned that Fortinet also supports "Virtual Clustering" as well for distributing the CPU load of asymmetric VDOM computational load, probably based on Cisco)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide