Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Ptipoussin588
New Contributor

Fortigate Cluster (Active-Passive) to Layer 3 switch (VPC/MLAG)

Hi everybody,

 

Traditionally, we use layer 2 connection between our fortigate cluster and our CORE switch cluster (VSS, VPC or Stack) but I'd like to know if it's possible to have full layer 3 connection (/30) between fortigate cluster (Active-Passive mode) and switch cluster like Nexus VPC or Arista MLAG.

 

I put a small design in attachment to describe the situation. On the left design, that's what we're doing now and on the right that's what we would like to test.

 

Do you think it's possible?

How fortigates will react in case of failover?

Do we need to run some routing protocol like OSPF to achieve that?

 

Thank you for your help.

 

Best regards,

 

Greg.

5 REPLIES 5
Toshi_Esumi
Esteemed Contributor III

If those /30 interfaces are the ones to pass user traffic through, no you can't. FGT's HA is design to have config on both a and p identical, except dedicated-to-management interfaces, which are isolated from the rest for management only.

Ptipoussin588

Hi Toshi,

 

Yes the user traffic pass through thoses interfaces. About your response, that's also what I thought! But this afternoon, I contacted the Fortinet Support to ask them and they told me that L3 configuration is valid too. But I'm not agree with that.

 

As you said, both firewall must share the same configuration. Moreover from a management point of view, when the Fortigate-Cluster is UP, we only have 1 management point so I don't understand how it's possible to configure 2 different network (/30) on the same physical port.

 

Thank you for your help

 

Best Regards,

 

 

SEI
New Contributor II

Hello Greg

 

we are using 2x FGT1200D in A-A, using 2x 10GbE ports of each FGT to create a trunk (LACP) to connect one leg of the trunk to each of a Dell S5248F switch - cluster running VLT. The trunk's (1 per FGT) passing user traffic through (12 VLAN's configured on that virtual interface) without any problems for many years now. (Used/using FGT100E&F, FGT300C&D, FGT500E, FGT1000D with MLAG currently and in the past always in A-A … working great).

 

Works great as you can do maintenance, reboot, firmware upgrade, … , of each switch separat or on the FGT without Network interruption.

 

Not quite your design, but hope that helps ...

 

Best Regards

Sini

 

Ptipoussin588

Hi Sini,

 

Actually, we used exactly the same kind of design that yours for many years without any problems either. (2x1200D with Etherchannel (Trunk) linked to Cisco VSS). We don't want to change our design at all but I just want to know if this kind of design is valid or not.

 

Thank you very much.

 

Best regards,

 

Greg.

Izraelgard
New Contributor

Actually You can do L3 with two different subnets on one interface (secondary IP), but then You'll find out, that ie. OSPF is active only on one device, so there are scenarios, when the failover means long times with traffic blackholing. And I didn't find any ultimate solution to all the scenarios mentioned.

Labels
Top Kudoed Authors