<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Redundant connection from Service provider causes loops in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redundant-connection-from-service-provider-causes-loops/m-p/99911#M22443</link>
    <description>&lt;P&gt;They don't support LACP but static LAG, so that can be used to form the MLAG.&lt;/P&gt;</description>
    <pubDate>Wed, 03 Apr 2024 16:14:00 GMT</pubDate>
    <dc:creator>Stefan_K_</dc:creator>
    <dc:date>2024-04-03T16:14:00Z</dc:date>
    <item>
      <title>Redundant connection from Service provider causes loops</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redundant-connection-from-service-provider-causes-loops/m-p/99883#M22441</link>
      <description>&lt;P&gt;Our service provider dropped a 10 gig private ring into our rack at our colocation facility.&amp;nbsp; At our request, we asked for two ports so we can take one to each core switch (x690's).&amp;nbsp; Unfortunately the handoff device that the service provider racked, (ADVA FSP 150-XG304) doesn't support LACP.&amp;nbsp; They call this a mirrored uplink port.&lt;/P&gt;&lt;P&gt;If both ports are enabled, it obviously loops the network.&amp;nbsp; Any other switch on this service provider without DOS protection falls off the network.&amp;nbsp; Needless to say we have one port disabled for now, and remediated one location that didn't have enable dos protection set.&lt;/P&gt;&lt;P&gt;So we tried the ELRP and for some reason it blocks port 65, the ISC between both core switches instead of port 48 of one of the uplinks.&amp;nbsp; RSTP, MSTP same results.&amp;nbsp; Doesn't seem to fully protect the loop.&amp;nbsp; So the next thought is what if we take this transport VLAN OFF of the ISC link between both switches?&amp;nbsp; Then each core switch is an independant brain.&amp;nbsp; They both have their own IP Address and can just peer back through the providers fully transparent (to us) switch via their network to our other locations.&amp;nbsp; I know for servers that have MLAG connections, they won't be connected to this vlan directly anyway.&amp;nbsp; This is just a handoff vlan we have common on all our switch uplink ports to the service provider.&amp;nbsp; They all OSPF peer with BFD enabled between the the private fiber connection vs a higher cost IPSEC VPN tunnel over the internet with an adjacency established via a firewall running OSPF.&lt;/P&gt;&lt;P&gt;I've suggested to the service provider maybe going with a Ciena 3924, which specifically shows on their datasheet LACP supported on the customer side, and continued 10g fiber ring diversity on the service provider site.&amp;nbsp; Our project coordinator with the serivce provider thanked me and will take that up the chain, but for us, every site has this ADVA switch and I don't think they'll change it.&amp;nbsp; Maybe they will explore it for future customers but right now we can only take the equipment they will provide.&lt;BR /&gt;&lt;BR /&gt;Attaching is a diagram.&amp;nbsp; Parts in red are new.&amp;nbsp; Everything else is exsiting and has been working for quite some time.&lt;BR /&gt;&lt;BR /&gt;What makes this site different is trying to utilize two "dumb" transparent 10g links from the ISP's switch (Ring D in this picture) to two independant x690 switches.&amp;nbsp; The firewall, servers, storage, and anything that can be.... are connected via defined MLAGs to these two switches and in their apporopriate vlans.&amp;nbsp; Only vlan 102 needs to be on switches that participate in peering on this network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2024 13:58:05 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redundant-connection-from-service-provider-causes-loops/m-p/99883#M22441</guid>
      <dc:creator>Keith9</dc:creator>
      <dc:date>2024-04-02T13:58:05Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant connection from Service provider causes loops</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redundant-connection-from-service-provider-causes-loops/m-p/99884#M22442</link>
      <description>&lt;P&gt;Oh and here is logs from one of the switches IF we would enable both links from Ring D to DC-SW1 and DC-SW2.&lt;BR /&gt;Ring B (192.168.102.30) didn't have DOS protection so it fell of the grid for a minute while we tested, but we enabled it now!&lt;BR /&gt;&lt;BR /&gt;03/27/2024 14:48:31.14 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.2 ipa 192.168.102.1 to state = FULL due to Loading done.&lt;BR /&gt;03/27/2024 14:48:31.14 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.2 ipa 192.168.102.1 to state = LOADING due to exchange done event.&lt;BR /&gt;03/27/2024 14:48:31.13 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.2 ipa 192.168.102.1 to state = EXCHANGE due to negotiation done event.&lt;BR /&gt;03/27/2024 14:48:31.13 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.2 ipa 192.168.102.1 to state = EX_START due to AdjOK event.&lt;BR /&gt;03/27/2024 14:48:30.13 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.2 ipa 192.168.102.1 to state = 2WAY due to two way event.&lt;BR /&gt;03/27/2024 14:48:26.13 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.100 ipa 192.168.102.100 to state = 2WAY due to adjacency getting destroyed.&lt;BR /&gt;03/27/2024 14:48:25.13 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.100 ipa 192.168.102.100 to state = EX_START due to AdjOK event.&lt;BR /&gt;03/27/2024 14:48:25.12 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.2 ipa 192.168.102.1 to state = INIT due to one way event.&lt;BR /&gt;03/27/2024 14:48:24.88 &amp;lt;Info:DOSProt.DelACLOK&amp;gt; Removed ACL from port 1:57, srcIP 0.0.0.0 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 14:48:24.66 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.30 ipa 192.168.102.30 to state = FULL due to Loading done.&lt;BR /&gt;03/27/2024 14:48:24.66 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.30 ipa 192.168.102.30 to state = LOADING due to exchange done event.&lt;BR /&gt;03/27/2024 14:48:24.64 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.30 ipa 192.168.102.30 to state = EXCHANGE due to negotiation done event.&lt;BR /&gt;03/27/2024 14:48:24.63 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.30 ipa 192.168.102.30 to state = EX_START due to bad LS request.&lt;BR /&gt;03/27/2024 14:48:24.63 &amp;lt;Warn:ospf.neighbor.ProcDDFail&amp;gt; Processing DD from neighbor 192.168.255.30 fails on NBR seqmismatch event,case else.&lt;BR /&gt;03/27/2024 14:48:21.48 &amp;lt;Info:DOSProt.PktCntExcd&amp;gt; Notify-threshold for L3 Protect packet count of 3500 reached&lt;BR /&gt;03/27/2024 14:48:18.78 &amp;lt;Info:DOSProt.AddACLOK&amp;gt; Added an ACL to port 1:57, srcIP 0.0.0.0 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 14:48:18.71 &amp;lt;Info:DOSProt.PktCntExcd&amp;gt; Notify-threshold for L3 Protect packet count of 3500 reached&lt;BR /&gt;03/27/2024 14:45:08.81 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.11 ipa 192.168.102.11 to state = 2WAY due to two way event.&lt;BR /&gt;03/27/2024 14:45:08.81 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.11 ipa 192.168.102.11 to state = INIT due to hello received.&lt;BR /&gt;03/27/2024 14:45:08.81 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.11 ipa 0.0.0.0 to state = DOWN due to new neighbor.&lt;BR /&gt;03/27/2024 14:44:52.41 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.11 ipa 192.168.102.11 to state = DOWN due to inactivity timer expiry.&lt;BR /&gt;03/27/2024 14:44:11.41 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.11 ipa 192.168.102.11 to state = 2WAY due to two way event.&lt;BR /&gt;03/27/2024 14:44:09.35 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.11 ipa 192.168.102.11 to state = INIT due to one way event.&lt;BR /&gt;03/27/2024 14:42:43.20 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.11 ipa 192.168.102.11 to state = 2WAY due to two way event.&lt;BR /&gt;03/27/2024 14:42:43.20 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.11 ipa 192.168.102.11 to state = INIT due to hello received.&lt;BR /&gt;03/27/2024 14:42:43.20 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.11 ipa 0.0.0.0 to state = DOWN due to new neighbor.&lt;BR /&gt;03/27/2024 14:42:16.41 &amp;lt;Noti:ospf.neighbor.ChgState&amp;gt; Changing the state of neighbor rtid 192.168.255.11 ipa 192.168.102.11 to state = DOWN due to inactivity timer expiry.&lt;BR /&gt;03/27/2024 14:15:42.18 &amp;lt;Info:DOSProt.DelACLOK&amp;gt; Removed ACL from port 1:57, srcIP 0.0.0.0 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 14:15:35.87 &amp;lt;Info:DOSProt.AddACLOK&amp;gt; Added an ACL to port 1:57, srcIP 0.0.0.0 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 14:15:35.81 &amp;lt;Info:DOSProt.PktCntExcd&amp;gt; Notify-threshold for L3 Protect packet count of 3500 reached&lt;BR /&gt;03/27/2024 14:13:32.13 &amp;lt;Info:DOSProt.DelACLOK&amp;gt; Removed ACL from port 1:57, srcIP 0.0.0.0 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 14:13:25.58 &amp;lt;Info:DOSProt.AddACLOK&amp;gt; Added an ACL to port 1:57, srcIP 0.0.0.0 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 14:13:25.53 &amp;lt;Info:DOSProt.PktCntExcd&amp;gt; Notify-threshold for L3 Protect packet count of 3500 reached&lt;BR /&gt;03/27/2024 14:03:32.16 &amp;lt;Info:DOSProt.DelACLOK&amp;gt; Removed ACL from port 1:57, srcIP 0.0.0.0 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 14:03:31.16 &amp;lt;Info:DOSProt.DelACLOK&amp;gt; Removed ACL from port 1:57, srcIP 192.168.102.100 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 14:03:25.90 &amp;lt;Info:DOSProt.AddACLOK&amp;gt; Added an ACL to port 1:57, srcIP 0.0.0.0 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 14:03:25.83 &amp;lt;Info:DOSProt.PktCntExcd&amp;gt; Notify-threshold for L3 Protect packet count of 3500 reached&lt;BR /&gt;03/27/2024 14:03:25.05 &amp;lt;Info:DOSProt.AddACLOK&amp;gt; Added an ACL to port 1:57, srcIP 192.168.102.100 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 14:03:24.95 &amp;lt;Info:DOSProt.PktCntExcd&amp;gt; Notify-threshold for L3 Protect packet count of 3500 reached&lt;BR /&gt;03/27/2024 13:51:02.16 &amp;lt;Info:DOSProt.DelACLOK&amp;gt; Removed ACL from port 1:57, srcIP 0.0.0.0 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 13:51:01.16 &amp;lt;Info:DOSProt.DelACLOK&amp;gt; Removed ACL from port 1:57, srcIP 192.168.102.100 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 13:50:56.55 &amp;lt;Info:DOSProt.PtrnNotFnd&amp;gt; No traffic pattern found&lt;BR /&gt;03/27/2024 13:50:56.44 &amp;lt;Info:DOSProt.PktCntExcd&amp;gt; Notify-threshold for L3 Protect packet count of 3500 reached&lt;BR /&gt;03/27/2024 13:50:55.38 &amp;lt;Info:DOSProt.AddACLOK&amp;gt; Added an ACL to port 1:57, srcIP 0.0.0.0 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 13:50:55.30 &amp;lt;Info:DOSProt.PktCntExcd&amp;gt; Notify-threshold for L3 Protect packet count of 3500 reached&lt;BR /&gt;03/27/2024 13:50:54.48 &amp;lt;Info:DOSProt.AddACLOK&amp;gt; Added an ACL to port 1:57, srcIP 192.168.102.100 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 13:50:54.38 &amp;lt;Info:DOSProt.PktCntExcd&amp;gt; Notify-threshold for L3 Protect packet count of 3500 reached&lt;BR /&gt;03/27/2024 13:31:28.45 &amp;lt;Info:DOSProt.DelACLOK&amp;gt; Removed ACL from port 1:57, srcIP 0.0.0.0 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 13:31:25.45 &amp;lt;Info:DOSProt.DelACLOK&amp;gt; Removed ACL from port 1:57, srcIP 192.168.102.1 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 13:31:21.89 &amp;lt;Info:DOSProt.AddACLOK&amp;gt; Added an ACL to port 1:57, srcIP 0.0.0.0 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 13:31:21.83 &amp;lt;Info:DOSProt.PktCntExcd&amp;gt; Notify-threshold for L3 Protect packet count of 3500 reached&lt;BR /&gt;03/27/2024 13:31:18.95 &amp;lt;Info:DOSProt.AddACLOK&amp;gt; Added an ACL to port 1:57, srcIP 192.168.102.1 to destIP 224.0.0.5, protocol any&lt;BR /&gt;03/27/2024 13:31:18.83 &amp;lt;Info:DOSProt.PktCntExcd&amp;gt; Notify-threshold for L3 Protect packet count of 3500 reached&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2024 14:07:59 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redundant-connection-from-service-provider-causes-loops/m-p/99884#M22442</guid>
      <dc:creator>Keith9</dc:creator>
      <dc:date>2024-04-02T14:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant connection from Service provider causes loops</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redundant-connection-from-service-provider-causes-loops/m-p/99911#M22443</link>
      <description>&lt;P&gt;They don't support LACP but static LAG, so that can be used to form the MLAG.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2024 16:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redundant-connection-from-service-provider-causes-loops/m-p/99911#M22443</guid>
      <dc:creator>Stefan_K_</dc:creator>
      <dc:date>2024-04-03T16:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant connection from Service provider causes loops</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redundant-connection-from-service-provider-causes-loops/m-p/99957#M22447</link>
      <description>&lt;P&gt;This is what we ended up doing.&lt;/P&gt;&lt;P&gt;We took the transport vlan (102) OFF the switch to switch port.&lt;BR /&gt;So from our metro-e ring vlan 102 and all single switch uplinks to the service provider... DC Switch 1 and DC Switch 2 both join it individually, and since its not tagged on the switch to switch port 65, it doesn't loop.&amp;nbsp; They peer in OSPF independantly (192.168.102.11 and 192.168.102.12).&amp;nbsp; Locally VRRP is the gateways out between vlans that exist acrros the two switches, but OSPF costing determines which 10g switch path it will take out.&lt;BR /&gt;&lt;BR /&gt;We did some testing and when pulling a link to one switch, theres little to no fanfare.&amp;nbsp; Maybe 1 ping lost, but BFD keeps things active very quick.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 15:38:28 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/redundant-connection-from-service-provider-causes-loops/m-p/99957#M22447</guid>
      <dc:creator>Keith9</dc:creator>
      <dc:date>2024-04-09T15:38:28Z</dc:date>
    </item>
  </channel>
</rss>

