<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fabric attach: SMLT Vlan, SMLT-LACP loop protection in Network Architecture &amp; Design</title>
    <link>https://community.extremenetworks.com/t5/network-architecture-design/fabric-attach-smlt-vlan-smlt-lacp-loop-protection/m-p/69003#M2550</link>
    <description>&lt;P&gt;Hello Klaus,&lt;/P&gt;&lt;P&gt;in my opinion the mentioned vlan 33 is a&amp;nbsp;arbitrary vlan here in the example.&lt;/P&gt;&lt;P&gt;Even if you connect servers, there is no need to have a special VLAN if the edge switch is an XOS.&lt;/P&gt;&lt;P&gt;If the edge switch is VOSS or BOSS, the configuration is different. But to my knowledge there is no special VLAN 33, so I do not know any scenario with VLAN 33.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Nov 2020 13:43:34 GMT</pubDate>
    <dc:creator>StephanH</dc:creator>
    <dc:date>2020-11-09T13:43:34Z</dc:date>
    <item>
      <title>Fabric attach: SMLT Vlan, SMLT-LACP loop protection</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/fabric-attach-smlt-vlan-smlt-lacp-loop-protection/m-p/69000#M2547</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am trying to get my head around how to connect a fabric attach stack switch to a VSP cluster.&lt;/P&gt;&lt;P&gt;I was using this as a reference:&lt;/P&gt;&lt;P&gt;&lt;A href="http://documentation.extremenetworks.com/VOSS/SW/82x/ConfigLinkAggVOSS_8.2_CG.pdf" target="_blank" rel="nofollow noreferrer noopener"&gt;http://documentation.extremenetworks.com/VOSS/SW/82x/ConfigLinkAggVOSS_8.2_CG.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Page 73 could be our scenario with:&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="8a0d0c636aad4ecbaa8e3e9ebd762b3e_cb32a10f-6b5b-4437-8019-c6baafc54678.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/6068i047148FCEFB23266/image-size/large?v=v2&amp;amp;px=999" role="button" title="8a0d0c636aad4ecbaa8e3e9ebd762b3e_cb32a10f-6b5b-4437-8019-c6baafc54678.png" alt="8a0d0c636aad4ecbaa8e3e9ebd762b3e_cb32a10f-6b5b-4437-8019-c6baafc54678.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&lt;BR /&gt;2 x VSPs in a cluster with SMLT&lt;BR /&gt;1 x X460-G2 stack - fabric attach client, link aggregation with LACP&lt;/P&gt;&lt;P&gt;Questions:&lt;/P&gt;&lt;P&gt;SMLT VLAN&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Why would I need VLAN 33 for the SMLT, if the SMLT client is a switch?&lt;/LI&gt;	&lt;LI&gt;If a vlan is needed on the VSPs do I have to configure it on the x460 client switch and add the vlan to the uplinks as tagged?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Loop protection:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;SLPP doesn’t seem to work with LACP&lt;/LI&gt;	&lt;LI&gt;the X460 disables spanning tree on port groups&lt;/LI&gt;	&lt;LI&gt;Should I use LACP on the X460-G2 stack?&lt;/LI&gt;	&lt;LI&gt;should I keep spanning-tree enabled on the SMLT/ MLT ports on the VSPs?&lt;/LI&gt;	&lt;LI&gt;What would you recommended as loop protection?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;BR /&gt;Thanks, Klaus&lt;/P&gt;</description>
      <pubDate>Sun, 08 Nov 2020 09:53:06 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/fabric-attach-smlt-vlan-smlt-lacp-loop-protection/m-p/69000#M2547</guid>
      <dc:creator>tfsnetman</dc:creator>
      <dc:date>2020-11-08T09:53:06Z</dc:date>
    </item>
    <item>
      <title>Re: Fabric attach: SMLT Vlan, SMLT-LACP loop protection</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/fabric-attach-smlt-vlan-smlt-lacp-loop-protection/m-p/69001#M2548</link>
      <description>&lt;P&gt;Hello Klaus,&lt;/P&gt;&lt;P&gt;regarding SMLT VLAN:&lt;/P&gt;&lt;P&gt;if your edge switch is a xos (like your X460) and you want add this switch with fabric attached &amp;nbsp;(FA), than you do not need the vlan 33 from the example you mentioned. No vlan ins needed on the uplink between edge switch an vsp, because fabric attache informations are transported via LLDP.&lt;/P&gt;&lt;P&gt;Here is a example for FA configuration with XOS:&lt;/P&gt;&lt;P&gt;&lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/000040556" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/000040556&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding Loop protection:&lt;/P&gt;&lt;P&gt;Enable sharing (with LACP) on XOS and include both port (to peer A and B in the example)&lt;BR /&gt;Use SMLT for the connections from XOS to VSP&lt;/P&gt;&lt;P&gt;SLPP on LACP ports is not supported (as you mentioned)!&lt;/P&gt;&lt;P&gt;Disable Spanning Tree and consider to work without a loop protection mechanism on interswitch links.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 06:21:19 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/fabric-attach-smlt-vlan-smlt-lacp-loop-protection/m-p/69001#M2548</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2020-11-09T06:21:19Z</dc:date>
    </item>
    <item>
      <title>Re: Fabric attach: SMLT Vlan, SMLT-LACP loop protection</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/fabric-attach-smlt-vlan-smlt-lacp-loop-protection/m-p/69002#M2549</link>
      <description>&lt;P&gt;Hi Stephan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;I know that fabric attached devices use LLDP to send&amp;nbsp;C-Vlan&amp;nbsp;/ i-SiD&amp;nbsp;request to the fabric server.&lt;/P&gt;&lt;P&gt;Please correct me if I am wrong:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;vlan 33 would be used in a scenario where an edge device like a server would be connected with redundant links to the VSP SMLT.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Would you know a scenario where&amp;nbsp;a client switch is involved requiring vlan 33?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Much appreciated,&lt;/P&gt;&lt;P&gt;Klaus&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 07:24:03 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/fabric-attach-smlt-vlan-smlt-lacp-loop-protection/m-p/69002#M2549</guid>
      <dc:creator>tfsnetman</dc:creator>
      <dc:date>2020-11-09T07:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: Fabric attach: SMLT Vlan, SMLT-LACP loop protection</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/fabric-attach-smlt-vlan-smlt-lacp-loop-protection/m-p/69003#M2550</link>
      <description>&lt;P&gt;Hello Klaus,&lt;/P&gt;&lt;P&gt;in my opinion the mentioned vlan 33 is a&amp;nbsp;arbitrary vlan here in the example.&lt;/P&gt;&lt;P&gt;Even if you connect servers, there is no need to have a special VLAN if the edge switch is an XOS.&lt;/P&gt;&lt;P&gt;If the edge switch is VOSS or BOSS, the configuration is different. But to my knowledge there is no special VLAN 33, so I do not know any scenario with VLAN 33.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 13:43:34 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/fabric-attach-smlt-vlan-smlt-lacp-loop-protection/m-p/69003#M2550</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2020-11-09T13:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: Fabric attach: SMLT Vlan, SMLT-LACP loop protection</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/fabric-attach-smlt-vlan-smlt-lacp-loop-protection/m-p/69004#M2551</link>
      <description>&lt;P&gt;They could be using VLAN 33 just to run SLPP on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would do and SMLT on the VSP and use a sharing group on EXOS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;enable sharing port grouping &lt;EM&gt;port_list&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Disable spanning-tree and use SLPP on the VSPs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Take a look at the Extreme Validated Design for Automated Campus. It is well written and a must read if you are using SPBM and EXOS edge.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.extremenetworks.com/resources/extreme-validated-design/extreme-automated-campus/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://www.extremenetworks.com/resources/extreme-validated-design/extreme-automated-campus/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 22:46:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/fabric-attach-smlt-vlan-smlt-lacp-loop-protection/m-p/69004#M2551</guid>
      <dc:creator>Jay2009</dc:creator>
      <dc:date>2020-11-09T22:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: Fabric attach: SMLT Vlan, SMLT-LACP loop protection</title>
      <link>https://community.extremenetworks.com/t5/network-architecture-design/fabric-attach-smlt-vlan-smlt-lacp-loop-protection/m-p/69005#M2552</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;I have been studying and applying the concepts mentioned in the EVD which doesn’t seem to mention the concept of a VLAN the way the VOSS 8.2 document does - hence my question.&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Klaus&lt;/P&gt;</description>
      <pubDate>Tue, 10 Nov 2020 07:40:55 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/network-architecture-design/fabric-attach-smlt-vlan-smlt-lacp-loop-protection/m-p/69005#M2552</guid>
      <dc:creator>tfsnetman</dc:creator>
      <dc:date>2020-11-10T07:40:55Z</dc:date>
    </item>
  </channel>
</rss>

