<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VOSS: Clustered Core VIST MLT to Firewall (HA) LACP in ExtremeSwitching (VSP/Fabric Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/voss-clustered-core-vist-mlt-to-firewall-ha-lacp/m-p/93660#M1963</link>
    <description>&lt;P&gt;How are the Firewalls configured? Are they in L2 mode bridging traffic between VLANs? If so, then the switches likely will get their own MACs back on the MLT/SMLT ports on a different VLAN than they have sent traffic out. If this is the setup, then you will need to issue this command:&amp;nbsp;&lt;/P&gt;&lt;P&gt;"no sys control virtual-ist mac-move-protection"&lt;/P&gt;&lt;P&gt;This will ensure that the switch MACs are not moved to the vIST automatically as a switch in normal cases does not want to see its own, or its peer MACs on SMLT ports.&lt;/P&gt;&lt;P&gt;If the FWs are in pure routing mode, then this command is not required.&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;</description>
    <pubDate>Mon, 07 Nov 2022 08:55:10 GMT</pubDate>
    <dc:creator>Roger_Lapuh</dc:creator>
    <dc:date>2022-11-07T08:55:10Z</dc:date>
    <item>
      <title>VOSS: Clustered Core VIST MLT to Firewall (HA) LACP</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/voss-clustered-core-vist-mlt-to-firewall-ha-lacp/m-p/93657#M1961</link>
      <description>&lt;P&gt;Hi All,&lt;BR /&gt;&lt;BR /&gt;We are planning to add a redundant CORE and FW to the current setup of our client using VIST for the CORE to be clustered and then for the CORE to FW connection we're going to use MLT and LACP for added&amp;nbsp;resilience if ever one port goes down and also before it switches back to CORE2.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WhatsApp Image 2022-11-06 at 18.09.30.jpg" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/6213i0E765672567A7406/image-size/large?v=v2&amp;amp;px=999" role="button" title="WhatsApp Image 2022-11-06 at 18.09.30.jpg" alt="WhatsApp Image 2022-11-06 at 18.09.30.jpg" /&gt;&lt;/span&gt;&lt;BR /&gt;May I know if this is feasible (loop-free)? And if there any best practices regarding VOSS implementation for this?&lt;BR /&gt;&lt;BR /&gt;Hoping to hear any suggestions on this. Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Nov 2022 10:26:09 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/voss-clustered-core-vist-mlt-to-firewall-ha-lacp/m-p/93657#M1961</guid>
      <dc:creator>gklyde17</dc:creator>
      <dc:date>2022-11-06T10:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: VOSS: Clustered Core VIST MLT to Firewall (HA) LACP</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/voss-clustered-core-vist-mlt-to-firewall-ha-lacp/m-p/93660#M1963</link>
      <description>&lt;P&gt;How are the Firewalls configured? Are they in L2 mode bridging traffic between VLANs? If so, then the switches likely will get their own MACs back on the MLT/SMLT ports on a different VLAN than they have sent traffic out. If this is the setup, then you will need to issue this command:&amp;nbsp;&lt;/P&gt;&lt;P&gt;"no sys control virtual-ist mac-move-protection"&lt;/P&gt;&lt;P&gt;This will ensure that the switch MACs are not moved to the vIST automatically as a switch in normal cases does not want to see its own, or its peer MACs on SMLT ports.&lt;/P&gt;&lt;P&gt;If the FWs are in pure routing mode, then this command is not required.&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2022 08:55:10 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/voss-clustered-core-vist-mlt-to-firewall-ha-lacp/m-p/93660#M1963</guid>
      <dc:creator>Roger_Lapuh</dc:creator>
      <dc:date>2022-11-07T08:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: VOSS: Clustered Core VIST MLT to Firewall (HA) LACP</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/voss-clustered-core-vist-mlt-to-firewall-ha-lacp/m-p/93665#M1964</link>
      <description>&lt;P&gt;Hello gklyde17,&lt;/P&gt;&lt;P&gt;I would prefer to do it as in drawing below&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Clustered Core VIST MLT to Firewall (HA) LACP.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/6215i52866A9316DD80A9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Clustered Core VIST MLT to Firewall (HA) LACP.png" alt="Clustered Core VIST MLT to Firewall (HA) LACP.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;When VSP's are in SMLT/vIST cluster configuration you can connect other devices, eg. a FireWall, servers, switches, ... with a LAG (active or static (LACP active&amp;nbsp; or LACP static or MLT, Etherchanel, ...)) to both VSP switches.&lt;BR /&gt;When one of the VSP's fails, both FW's still have one active link.&lt;/P&gt;&lt;P&gt;On the VSP switches you would have a configuration like this.&lt;BR /&gt;Only configuration for VSP port 22 / SMLT-22 is shown.&lt;BR /&gt;The same configuration must be applied to both SMLT cluster members for both ports/SMLT's.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;On both VSP SMLT cluster switches :&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;mlt 22 enable name "SMLTxyz"&lt;BR /&gt;&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;interface mlt 22&lt;BR /&gt;&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;smlt&lt;BR /&gt;&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;lacp enable key &lt;FONT color="#808000"&gt;&lt;STRONG&gt;22&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;exit&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;interface GigabitEthernet 22&lt;BR /&gt;&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;encapsulation dot1q&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;exit&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;interface GigabitEthernet 22&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;name "SMLT-PORTxyz"&lt;BR /&gt;&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;no shutdown&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;lacp key &lt;FONT color="#808000"&gt;&lt;STRONG&gt;22 &lt;/STRONG&gt;&lt;/FONT&gt;aggregation enable&lt;BR /&gt;&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;lacp enable&lt;BR /&gt;&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;no spanning-tree mstp force-port-state enable&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;exit&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Hope it helps&lt;BR /&gt;WillyHe&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2022 09:58:10 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-vsp-fabric/voss-clustered-core-vist-mlt-to-firewall-ha-lacp/m-p/93665#M1964</guid>
      <dc:creator>WillyHe</dc:creator>
      <dc:date>2022-11-07T09:58:10Z</dc:date>
    </item>
  </channel>
</rss>

