Yeah SW3 port 1 is connected to the firewall. Thanks for that, starting to get a much clearer picture here . The thing is I don't really want the switch-to-firewall links blocked by STP, ideally I want them AND the inter-switch links forwarding so that traffic destined for the Internet or other VLANs can go via the firewall but traffic between servers on different switches but in the same VLAN can just go across the switch-switch link. From a loop point of view I think this should be doable? I just need to figure out if we can stop the firewall acting as a switch and passing traffic from one link to the other right?
... View more
Thanks for the reply Aninda, Here's an excerpt from the Fortigate admin guide that might help - "The FortiGate unit does not participate in the Spanning Tree Protocol (STP). STP is an IEEE 802.1 protocol that ensures there are no layer-2 loops on the network. Loops are created when there is more than one route for traffic to take and that traffic is broadcast back to the original switch. This loop floods the network with traffic, reducing available bandwidth to nothing. If you use your FortiGate unit in a network topology that relies on STP for network loop protection, you need to make changes to your FortiGate configuration. Otherwise, STP recognizes your FortiGate unit as a blocked link and forwards the data to another path. By default, your FortiGate unit blocks STP as well as other non-IP protocol traffic." I've also attached a screenshot which I "think" is telling us that Switch3 is acting as the route bridge? I looked at the four switches and all (except Switch3) are showing their Root Ports to be the physical interface that is connected to the Fortigate, but I suspect that is because the Fortigate switch is blindly forwarding on STP traffic so for instance Switch1 thinks it is talking to Switch3 through interface 2 but in reality it's going through the Fortigate on te way! Again maybe I'm wrong to be worried about this, but it seems like if the firewall wasn't to allow communication between the four links then at least three of the inter-switch links could be enabled to create paths between them to avoid the firewall... It's a great way to learn about STP if nothing else .
... View more
Hi guys, I'm new to a lot of these concepts so maybe I'm missing something obvious, but some input would be really appreciated! Basically I'm setting up a Fortigate firewall HA pair (active/passive) and four 2960S switches in our datacentre. There will be one Fortigate firewall and two switches per cabinet, with the cabinets linked by a ethernet connections. The idea being that in say cabinet A a host could have two NICs with one connected to each switch, so if a switch fails in a cabinet it's no problem, and if a firewall fails in either cabinet it's no problem. I have it all in-place and it's working fine but I have a bit of a concern with how spanning-tree has set the links. I had envisaged lots of connections between all the switches and traffic could take the shortest route, but of course this routing not switching which became obvious when I started looking into STP . I've attached a diagram of how STP has enabled/disabled links. The Fortigate is configured with a four port software switch that the links from the four 2960s connect to. The problem in the attached diagram is that if servers on different switches want to talk to each other the traffic will be sent down the link to the Fortigate then back down another link to the relevant switch. It seems like a waste to take this route when there are (currently blocked) links between the switches themselves. The main thing I'm concerned about is the load it's going to put on the Fortgate if it has to software-switch all possible traffic in the network. Now of course the good thing here is if a switch fails STP should bring up another link to the Fortigate, and in reality most of the traffic on the network will be from servers to the Fortigate (not too much inter-server traffic) but that could change. Is there a way to fix this or should I not be concerned in the first place? It seems like if I could stop the Fortigate acting as a switch then STP woudl be enable all the inter-switch uplinks without creating loops and hence have more efficient paths between switches. Thanks for any help!
... View more
Fair enough thanks, LAN Base it is! Can I ask one more question - am I mad to be considering the 2960 (10/100 only) rather than the 2960S (10/100/1000 on all ports)? The speed out of the datacentre is only 100MB/s and there isn't a huge amount of inter-datacentre communication but there would be some, but the datacentre Internet link will be going to gigabit in time. My impression seems to be that lots of people still use Cisco 10/100 switches as you often don't need Gigabit, but maybe I'm mistaken here. If I need to look at Gigabit then it looks like the WS-C2960S-24TS-L is the cheapest 24 port 2960S to go with that also has LAN Base? Thanks again all your help is truly appreciated!
... View more
That's a very good point in fairness, I have contacted Cisco to see about refurbed equipment. I wonder if you could cast your eye down the thread to my last response at the bottom as I give some ideas about what I need the switches for there and you might be able to tell me if Lite is to be avoided or not, it would be hugely appreciated! The firewalls that will be in the cluster are Fortigates.
... View more
Karsten, Reza those two links are exactly what I was looking for thanks! So this of course raises another question from me . Most of the LAN Base features we will not need, the ones I would be concerned about are Flex Link and Link State Tracking which are not available in LAN Lite. The main purpose of all this is that if a switch fails VMware can route traffic to the second switch, and if a firewall in the firewall cluster fails (in which case the passive firewall node takes over the MAC of the primary) the switches will realise that the MAC address has "moved" and route traffic there. Now I "assume" I can do this with regular STP so don't necessarily need Flex Link or Link State Tracking but maybe you could confirm this for me if you know the answer? My understanding is FlexLink would be faster than STP in failing-over but to be honest the speed of failover isn't a big deal, it just needs to happen within a few minutes. Any thoughts on this? Obviously if I cannot get this failover working there'd be no point going for multiple switches in each cabinet so I need to get this part right . Thanks VERY much for the help so far!
... View more
Hi Karsten, Those switches are interesting and they do seem VERY well spec'd for the price involved. To be honest though I think it would be better for us to go down the Catalyst route as it will give us better experience with IOS which will be valuable down the road as we scale up. Do you happen to know if the LAN Lite software will be OK for us in the Catalyst route by any chance? It's basic stuff we want to do really, some VLANing and then it just needs to be able to handle switches failing and probably using STP to figure out different routes to the firewalls. I'm literally ready to hit "order" here but can find very little that compares LAN Lite to LAN Base or figure out if we will get away with Lite for now!
... View more
Hi leo, I took a look at some but to be honest I don't mind spending the money to get the right switch and have full warranty etc etc., I just don't want to buy switches that are double or quadrulple the price I need to spend as that could be better spend on servers right now. Do you have any thoughts on the LAN Lite OS? I'm struggling big time to get to an answer here as I'm just not quite sure what I'm looking at.
... View more
Thanks for the reply Reza, your link doesn't seem to have come up though? The 2960's are pretty much all 10/100 anyway so I'm guessing this restriction of LAN Lite won't be an issue. I guess what I'm concerned about is that I'll get the LAN Lite version then start trying to setup some VLANs, VLAN trunking or the failover on the firewalls and find some key feature is missing and all the money on the switches is down the drain . Any thoughts appreciated!
... View more
Hi guys, I'll try to keep this as short as possible, any pointers and thoughts appreciated! I have two cabinets in a datacentre (with 12 CAT5 links available between them), at the moment I just have a single firewall and a very basic 3Com 2824 unmanaged gigabit switch in each cabinet that are connected together. This works perfectly as the traffic use is very light and is typically server->firewall->Internet rather than too much heavy inter-server traffic. I want to improve the redundancy and reliability however. So I plan to get two Fortigate firewalls, put them in a HA cluster and have one in each cabinet with connections to the WAN. The servers are all VMware so have mulitple NICs teamed. The last bit then is between the VMware host servers and the firewalls - the switches. I'd like to have each server connected to two switches to give multiple paths, so I'm looking at two switches per cabinet. From doing a fair bit of reading it looks like I'll have no problem with this, STP should be able to sort out the multiple routes to whichever firewall is the active member at the time. There will be some need for basic VLANing as I would like to separate management traffic and certain servers I wouldn't expect to exceed 5-10 VLANs. As I said the traffic is very light and from what I can tell I don't require any "fancy" features, and given the I need to buy four switches I'm trying choose a switch that is reliable but will do the job and not much more. If we experience growth down the road then we can buy more expensive switches then. So I've been looking at the WS-C2960-48TT-S and the WS-C2960-48TT-L, the first using the LAN Lite software while the second uses the LAN Base. The LAN Base version is virtually twice the price so I'm wondering if there are any features of LAN Base that are required in my scenario, does anybody have any thoughts? I've done quite a bit of reading but cannot really see a reason why LAN Lite should not work fine, but don't want to discover I missed something when it is too late . All input appreciated!
... View more