Course Hero Logo

L the igmps flood traffic and igmps flood report

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 60 - 63 out of 209 pages.

lTheigmps-flood-trafficandigmps-flood-reportsettings must bedisabledon the ISL and FortiLinktrunks; but theigmps-flood-trafficandigmps-flood-reportsettings must beenabledon ICL trunks.These settings are enabled by default.lIGMP proxy must be enabled.Step 1: Ensure the MCLAG ICL is already configured between FortiSwitch 1 and FortiSwitch 2.diagnose switch-controller switch-info mclag iclStep 2: For each server, configure a trunk with MCLAG enabled. For server 1, select port10 onFortiSwitch 1 and FortiSwitch 2. For server 2, select port15 on FortiSwitch 1 and FortiSwitch 2.For details, refer toMCLAG trunks on page 74.Step 4: Verify the MCLAG configuration.diagnose switch-controller switch-info mclag listFortiSwitch 7.0.2 FortiSwitch Devices Managed by FortiOS 7.060Fortinet, Inc.
MCLAG peer groupsMulti-tiered MCLAG with HA-mode FortiGate unitsUse the following procedure to deploy tier-2 and tier-3 MCLAG peer groups from the FortiGate switch controller withoutthe need for direct console access to the FortiSwitch units.NOTE:lFortinet recommends using at least two links for ICL redundancy.lBefore FortiOS 6.2.0, when using HA-mode FortiGate units to manage FortiSwitch units, the HA mode must beactive-passive. Starting in FortiOS 6.2.0, the FortiGate HA mode can be either active-passive or active-active.lIn this topology, you must use theauto-isl-port-groupsetting as described in the following configurationexample. This setting instructs the switches to group ports from MCLAG peers together into one MCLAG when theinter-switch link (ISL) is formed.lTheauto-isl-port-groupsetting must be done directly on the FortiSwitch unit.lOn the global switch level,mclag-stp-awaremust be enabled, and STP must be enabled on all ICL trunks. Theyare both enabled by default.NOTE:If you are going to use IGMP snooping with an MCLAG topology:lOn the global switch level,mclag-igmpsnooping-awaremust be enabled. It is enabled by default.lTheigmps-flood-trafficandigmps-flood-reportsettings must bedisabledon the ISL and FortiLinktrunks; but theigmps-flood-trafficandigmps-flood-reportsettings must beenabledon ICL trunks.These settings are enabled by default.lIGMP proxy must be enabled.To create a three-tier FortiLink MCLAG topology, use FortiOS 6.2.3 GA or later and FortiSwitchOS 6.2.3 GA or later.Tier-1 MCLAGWire the two core FortiSwitch units to the FortiGate devices. To configure the FortiSwitch units in the core, seeTransitioning from a FortiLink split interface to a FortiLink MCLAG on page 57.FortiSwitch 7.0.2 FortiSwitch Devices Managed by FortiOS 7.061Fortinet, Inc.
MCLAG peer groupsTier-2 and Tier-3 MCLAGs1.Connectonlythe tier-2 MCLAG FortiSwitch units 3 and 4 to the core units 1 and 2 (leaving the other switches inCloset 1 disconnected). Wait until they are discovered and authorized (authorization must be done manually if auto-authorization is disabled).

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 209 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags
Network switch, FortiSwitch

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture