03-14-2022 09:13 AM
Hello,
We would like to create a "lan to lan peering" between our infrastrucre (Site A) and our partner's infrastructure (Site B).
The link between us will be an optical fiber connection between both switches (SW-A and SW-B) and will carry a vlan ( ID 99) to the firewalls, where an Layer3 interface will be created to handle the traffic between the two sites.
We want to prevent any spanning tree issue when connection both LAN to each other (spanning tree topology recalculation, root bridge changing...).
What would be the recommandations for this kind of architecture please ?
Disabling spanning tree on the Gi1/1 ports with bpdu filter ?
Using BPDU Guard/Root Guard ? (but with this feature I suppose each interface will be in an error-disabled state as the bpdu frames will be detected on both sides )
Thank you.
Regards,
Dazni
Solved! Go to Solution.
03-15-2022 06:17 AM
It could be a solution yes but I don't have many interfaces on the firewall. For now we'll be only connected to this partner, I could connect his infrastructure directly to the firewall, but in a near futur we'll need to add another peering with another partner so that's why I'm thinking about this diagram with a switch before the firewall.
A switch will be used as a dedicated switch for this kind of peering. With this config, I'll only need one physical interface on the firewall (or two if I want to create an LACP) and I'll just have to create subinterfaces on the firewall for each partner's VLAN :
03-15-2022 06:28 AM
Again forgive my little info. about the InterConnect DC but I try to help you in best design.
are all Site within same geographic location? if Yes
then FW will separate the L2 traffic and inspect it for security then resend it to other Site.
for example NAS1 and NAS2 send L2 frame to each other,
SW have port of VLAN X "use by NAS" point to ASA, ASA will inspect the traffic re-write the VLAN to VLAN 99"this interConnect the DC site" then the traffic go to ASA of other DC site,
ASA inspect the traffic and re-wrtie the VLAN to be VLAN X.
here both NAS see as that both connect to same subnet.
https://www.cisco.com/c/en/us/td/docs/security/asa/asa97/configuration/general/asa-97-general-config/intro-fw.html
please read this doc. it mention which frame can pass through ASA "allow by default".
03-15-2022 08:45 AM
The trafic between the two NAS has to go directly from NAS A to NAS B, without going to the firewall because it is not sized to handle as much trafic. That's why we are adding this interconnect between the sites.
Site A and Site B are in the same datacenter but not the same datahall.
Please find below the diagram updated with the 2 NAS (vlan 98). The trafic will go from NAS A to NAS B from switch A to switch B :
03-15-2022 06:32 AM
03-14-2022 01:28 PM
Hello
The link does not have to be a trunk if its only carrying a single vlan, however if you want to carry multiple vlans eventually then it has to be a trunk, But just allow specific vlans to traverse it, you could in fact just make up a couple of new vlan ids for that connection as such stp wont loop as they won’t be carried anywhere else within the stp environments
If you have vtp active I would recommend manually prune the new vlans off any other trunks not required.
As for STP are the switchs running the same stp mode?
03-15-2022 06:20 AM - edited 03-15-2022 06:20 AM
Hello,
yes, both switches are running rstp mode. VTP isn't enbled.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide