05-27-2020 08:25 PM
Can anyone offer me some guidance on the best approach to routing between C-VLAN’s on a vIST core switch cluster. I am replacing a small campus network with a new Fabric implementation with a pair of VSP 7254XSQ’s configured as an vIST cluster for the core.
In the old network routing was enabled between trusted VLAN’S on the core, and there was a default route to an interface on the firewall to reach the internet. The firewall has routes for each of the networks on the core and uses one VLAN interface IP as the next hop to send traffic back to the core.
I am looking to implement this functionality on the VSP’s, but now instead of a single core switch I have a vIST cluster, and the design goal of maintaining connectivity with one of the core switches down. I have setup all my UNI links to the firewall, IDF and top of rack switches using SMLT, and have enabled RSMLT on VLAN’s where I need redundancy. The part I am unsure about is the right approach to routing. I see inter-vsn routing, and L3VSN’s, and IP Shortcuts, and am not sure what is the best fit here.
Solved! Go to Solution.
05-29-2020 02:32 PM
I assume you have a routed VLAN between your existing core to your firewall?
so I would just treat your Firewall like an IDF.
VSP1-------VSP2 VSPs in viST cluster
<VLAN to Firewall> /30 or /29 enabled with MLT/RSMLT
.2 .3
| /
| /
| /
| /
| /
.1
[FW]
The only thing you might need to do is enabled an LACP enabled RSMLT.
You then need to replicate the default route(or static routes) on both VSPs.
0.0.0.0 0.0.0.0 next hop XX.XX.XX.1
05-29-2020 02:32 PM
I assume you have a routed VLAN between your existing core to your firewall?
so I would just treat your Firewall like an IDF.
VSP1-------VSP2 VSPs in viST cluster
<VLAN to Firewall> /30 or /29 enabled with MLT/RSMLT
.2 .3
| /
| /
| /
| /
| /
.1
[FW]
The only thing you might need to do is enabled an LACP enabled RSMLT.
You then need to replicate the default route(or static routes) on both VSPs.
0.0.0.0 0.0.0.0 next hop XX.XX.XX.1