cancel
Showing results for 
Search instead for 
Did you mean: 

Routing to a common vlan in a fabric deployment

Routing to a common vlan in a fabric deployment

David_Nelson
New Contributor III

Can anyone offer me some guidance on the best approach to routing between C-VLAN’s on a vIST core switch cluster. I am replacing a small campus network with a new Fabric implementation with a pair of VSP 7254XSQ’s configured as an vIST cluster for the core.

 

In the old network routing was enabled between trusted VLAN’S on the core, and there was a default route to an interface on the firewall to reach the internet. The firewall has routes for each of the networks on the core and uses one VLAN interface IP as the next hop to send traffic back to the core.

 

I am looking to implement this functionality on the VSP’s, but now instead of a single core switch I have a vIST cluster, and the design goal of maintaining connectivity with one of the core switches down. I have setup all my UNI links to the firewall, IDF and top of rack switches using SMLT, and have enabled RSMLT on VLAN’s where I need redundancy. The part I am unsure about is the right approach to routing. I see inter-vsn routing, and L3VSN’s, and IP Shortcuts, and am not sure what is the best fit here.

 


 

1 ACCEPTED SOLUTION

EXTR_Paul
Extreme Employee

I assume you have a routed VLAN between your existing core to your firewall?  

 

so I would just treat your Firewall like an IDF.  

VSP1-------VSP2   VSPs in viST cluster  

<VLAN to Firewall> /30 or /29  enabled with MLT/RSMLT

.2                .3

|                  /

|              /

|          /

|     /

| /

.1

[FW]

 

The only thing you might need to do is enabled an LACP enabled RSMLT.  

You then need to replicate the default route(or static routes) on both VSPs. 

0.0.0.0 0.0.0.0  next hop XX.XX.XX.1

View solution in original post

1 REPLY 1

EXTR_Paul
Extreme Employee

I assume you have a routed VLAN between your existing core to your firewall?  

 

so I would just treat your Firewall like an IDF.  

VSP1-------VSP2   VSPs in viST cluster  

<VLAN to Firewall> /30 or /29  enabled with MLT/RSMLT

.2                .3

|                  /

|              /

|          /

|     /

| /

.1

[FW]

 

The only thing you might need to do is enabled an LACP enabled RSMLT.  

You then need to replicate the default route(or static routes) on both VSPs. 

0.0.0.0 0.0.0.0  next hop XX.XX.XX.1

GTM-P2G8KFN