Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Devices Managed by FortiOS

Deploying MCLAG topologies

This section covers the following topics:

Dual-homed servers connected to a pair of FortiSwitch units using an MCLAG

To configure a multichassis LAG, you need to configure FortiSwitch 1 and FortiSwitch 2 as MCLAG peer switches before creating a two-port LAG. See Transitioning from a FortiLink split interface to a FortiLink MCLAG. Then you set up two MCLAGs towards the servers, each MCLAG using one port from each FortiSwitch unit.

This topology is supported when the FortiGate unit is in HA mode.

NOTE:

  • On the global switch level, mclag-stp-aware must be enabled, and STP must be enabled on all ICL trunks. They are both enabled by default.
  • Fortinet recommends using at least two links for ICL redundancy.

NOTE: If you are going to use IGMP snooping with an MCLAG topology:

  • On the global switch level, mclag-igmpsnooping-aware must be enabled. It is enabled by default.
  • The igmps-flood-traffic and igmps-flood-report settings must be disabled on the ISL and FortiLink trunks; but the igmps-flood-traffic and igmps-flood-report settings must be enabled on ICL trunks. These settings are enabled by default.
  • IGMP proxy must be enabled.

 

Step 1: Ensure the MCLAG ICL is already configured between FortiSwitch 1 and FortiSwitch 2.

diagnose switch mclag icl

Step 2: Configure a trunk in FortiSwitch 1 and then configure a trunk in FortiSwitch 2.

The trunk names must match.

Step 3: Set up the servers.
To set up Server 1:

config switch trunk

edit server_1

set members port10

set mclag enable

next

edit server_2

set members port15

set mclag enable

next

end

To set up Server 2:

config switch trunk

edit server_1

set members port10

set mclag enable

next

edit server_2

set members port15

set mclag enable

next

end

Note

If you disable the MCLAG ICL (with the set mclag-icl disable command), you need to enable the fortilink-split-interface.

Multi-tiered MCLAG with HA-mode FortiGate units

NOTE:

  • Before FortiOS 6.2.0, when using HA-mode FortiGate units to manage FortiSwitch units, the HA mode must be active-passive. Starting in FortiOS 6.2.0, the FortiGate HA mode can be either active-passive or active-active.
  • In this topology, you must use the auto-isl-port-group setting as described in the following configuration example. This setting instructs the switches to group ports from MCLAG peers together into one MCLAG when the inter-switch link (ISL) is formed.
  • The inter-chassis link (ICL) and auto-isl-port-group settings must be done directly on the FortiSwitch unit.
  • On the global switch level, mclag-stp-aware must be enabled, and STP must be enabled on all ICL trunks. They are both enabled by default.

  • CLI commands in red are manually configured.
  • Fortinet recommends using at least two links for ICL redundancy.

NOTE: If you are going to use IGMP snooping with an MCLAG topology:

  • On the global switch level, mclag-igmpsnooping-aware must be enabled. It is enabled by default.
  • The igmps-flood-traffic and igmps-flood-report settings must be disabled on the ISL and FortiLink trunks; but the igmps-flood-traffic and igmps-flood-report settings must be enabled on ICL trunks. These settings are enabled by default.
  • IGMP proxy must be enabled.
To configure a multi-tiered MCLAG with HA-mode FortiGate units:
  1. Configure FortiSwitch-1 and FortiSwitch-2 for the tier-1 MCLAG:

    For FortiSwitch-1, enable the ICL on the ISL formed with the MCLAG peer switch:

    config switch trunk

    edit "D243Z14000288-0" // trunk name derived from FortiSwitch-2 SN

    set mode lacp-active

    set auto-isl 1

    set mclag-icl enable

    set members "port21" "port22"

    end

    For FortiSwitch-2, enable the ICL on the ISL formed with the MCLAG peer switch:

    config switch trunk

    edit "D243Z14000289-0" // trunk name derived from FortiSwitch-1 SN

    set mode lacp-active

    set auto-isl 1

    set mclag-icl enable

    set members "port21" "port22"

    end

  2. Continue to configure FortiSwitch-1 for the tier-1 MCLAG:
    1. Configure the two auto-isl-port-groups based on the topology diagram. The group name must match the name that is configured on the peer switch.

      config switch auto-isl-port-group

      edit "distribute-1"

      set members "port1" "port2"

      next

      edit "distribute-2"

      set members "port3" "port4"

      end

    2. After you complete the CLI commands in Steps 1 and 2a, the trunks are automatically formed:

      config switch trunk

      edit "D243Z14000288-0"

      set mode lacp-active

      set auto-isl 1

      set mclag-icl enable

      set members "port21" "port22"

      next

      edit "FG100D3G15817028" // trunk name derived from FortiGate-1

      set mclag enable

      set members "port24" "port23"

      next

      edit "distribute-1"

      set mode lacp-active

      set auto-isl 1

      set mclag enable

      set members "port1" "port2"

      next

      edit "distribute-2"

      set mode lacp-active

      set auto-isl 1

      set mclag enable

      set members "port3" "port4"

      next

      end

  3. Continue to configure FortiSwitch-2 for the tier-1 MCLAG:
    1. Configure the two auto-isl-port-groups based on the topology diagram. The group name must match the name that is configured on the peer switch.

      config switch auto-isl-port-group

      edit "distribute-1"

      set members "port1" "port2"

      next

      edit "distribute-2"

      set members "port3" "port4"

      end

    2. After you complete the CLI commands in Steps 1 and 3a, the trunks are automatically formed:

      config switch trunk

      edit "D243Z14000288-0"

      set mode lacp-active

      set auto-isl 1

      set mclag-icl enable

      set members "port21" "port22"

      next

      edit "FG100D3G15817032" // trunk name derived from FortiGate-2

      set mclag enable

      set members "port24" "port23"

      next

      edit "distribute-1"

      set mode lacp-active

      set auto-isl 1

      set mclag enable

      set members "port1" "port2"

      next

      edit "distribute-2"

      set mode lacp-active

      set auto-isl 1

      set mclag enable

      set members "port3" "port4"

      next

      end

  4. Tier-2 MCLAGs. Enable the ICL between the MCLAG peer switches. For example, configure FortiSwitch-6 as follows.
    1. Change the tier-2 MCLAG peer switches to FortiLink mode and connect them to each other. Enable the ICL on the ISL formed with the MCLAG peer switches.

      config switch trunk

      edit "8DN3X15000026-0" // trunk name derived from FortiSwitch-7 SN

      set mode lacp-active

      set auto-isl 1

      set mclag-icl enable

      set members "port43" "port44"

      end

    2. The trunks are automatically formed as below:

      config switch trunk

      edit "8DN3X15000026-0"

      set mode lacp-active

      set auto-isl 1

      set mclag-icl enable

      set members "port43" "port44"

      next

      edit "_FlInK1_MLAG0_"

      set mode lacp-active

      set auto-isl 1

      set mclag enable

      set members "port48" "port47"

      next

      end

  5. Access FortiSwitch units. The access switch trunks are formed automatically as below.

    On FortiSwitch-6:

    config switch trunk

    edit "_FlInK1_MLAG0_"

    set mode lacp-active

    set auto-isl 1

    set mclag enable

    set members "port48" "port47"

    next

    end

     

    On FortiSwitch-7:

    config switch trunk

    edit "_FlInK1_MLAG0_"

    set mode lacp-active

    set auto-isl 1

    set mclag enable

    set members "port47" "port48"

    next

    end

    Note

    If you disable the MCLAG ICL (with the set mclag-icl disable command), you need to enable the fortilink-split-interface.

Three-tier FortiLink MCLAG configuration

To create a three-tier FortiLink MCLAG topology, use FortiOS 6.2.3 GA or later and FortiSwitchOS 6.2.3 GA or later.

NOTE: Fortinet recommends using at least two links for ICL redundancy.

To configure the two FortiGate units:
  1. Set up an active-passive or active-active HA configuration.
  2. (Optional) Disable override in the HA CLI configuration.
  3. Use the GUI or CLI to create the FortiLink interface.
  4. Configure the FortiLink interface:

    config system interface

    edit <FortiLink_interface>

    set lacp-mode active

    set fortilink-neighbor-detect lldp

    set fortilink-split-interface disable

    set lldp-reception enable

    set lldp-transmission enable

    next

    end

To configure the FortiSwitch units in the core:
  1. Find the trunk between the two MCLAG switches. Enable mclag-icl on the MCLAG-ICL trunk. The default name of the MCLAG-ICL trunk is the last 13 characters of the peer switch name plus “-0”.

     

    config switch trunk

    edit <MCLAG-ICL_trunk_name>

    set mclag-icl enable

    next

    end

     

  2. Create downlink trunks on the MCLAG-ICL switches.

    Note: Only the trunks from the higher tier MCLAG-ICL switches to the next tier MCLAG-ICL switches need this configuration.

To configure the three-tier MCLAG topology shown in the following figure:

  1. Configure the tier-1 MCLAG switches.
    1. Connect switch 1 and switch 2 to the FortiGate units and interconnect switch 1 and switch 2.
    2. Wait for both switches to change to FortiLink mode and for both FortiLinks to be up.
    3. Configure the ICL trunks on the inter-switch trunks to form MCLAG switches in FortiLink mode.
    4. Use the diagnose switch mclag peer-consistency-check CLI command to verify that the MCLAG-ICL trunk formed successfully.
    5. Add an auto-isl-port-group for the tier-2 MCLAG switches on both switch 1 and switch 2:

       

      config switch auto-isl-port-group

      edit tier2-closet-1

      set members port1

      next

      edit tier2-closet-2

      set members port2

      next

      end

       

  2. Wire all switches in closet 1 by following the figure. Do not make the dotted-line connections for now. Wait for all switches to be up in FortiLink mode.
  3. Add two auto-isl-port-groups for the tier-3 MCLAG switches on both switch 3 and switch 4:

     

    config switch auto-isl-port-group

    edit tier-2-closet-<1>-downlink-trunk-A

    set member <port_name>

    next

    edit tier-2-closet-<1>-downlink-trunk-B

    set member <port_name>

    next

    end

     

  4. Enable the tier-2 MCLAG-ICL trunk on switch 4 using the FortiOS CLI of the switch console port.
  5. Enable the tier-3 MCLAG-ICL trunks on switch 6 and switch 8.
    NOTE: The trunk must be configured from the end of the daisy-chain switch.
  6. Enable the tier-3 MCLAG-ICL trunks on switch 5 and switch 7.
  7. Enable the tier-2 MCLAG-ICL trunk on switch 3.
  8. Verify that all the FortiLinks are up and double-check that the MCLAG-ICL configuration on each MCLAG switch.
  9. Connect switch 4 to switch 2.
  10. Verify that the FortiLinks are up.
  11. Connect switch 6 and switch 8 to switch 4.
  12. Verify that the FortiLinks are up.
  13. Use the diagnose switch mclag peer CLI command to verify that the tier-1, tier-2, and tier-3 MCLAG-switches are formed correctly.
  14. Check the traffic on switch 1 and switch 2 during the configuration.
  15. Repeat steps 2 to 14 for closet 2.
  16. All FortiLinks should be up.

HA-mode FortiGate units in different sites

There are two sites in this topology, each with a FortiGate unit. The two sites share the FortiGate units in active-passive HA mode. The FortiGate units use the FortiSwitch units in FortiLink mode as the heartbeat connections because of limited physical connections between the two sites.

FortiOS 6.4.2 or higher and FortiSwitchOS 6.4.2 or higher are required.

Refer to the other network topologies in Deploying MCLAG topologies.

NOTE: Fortinet recommends using at least two links for ICL redundancy.

The following steps are an example of how to configure this topology:

  1. Disconnect the physical connections between the two sites.
  2. On Site 1:
    1. Use the FortiGate unit to establish the FortiLinks on Site 1. See Configuring FortiLink.
    2. Enable the MCLAG-ICL on the core switches of Site 1. See Transitioning from a FortiLink split interface to a FortiLink MCLAG.
    3. Enable the HA mode and set the heartbeat ports on FortiGate-1. FortiGate port1 and port2 are used as HA heartbeat ports in this example. For example, set hbdev "port1" 242 "port2" 25.
    4. Create a switch VLAN or VLANs dedicated to the FortiGate HA heartbeats between the two FortiGate units. For example:

       

      config system interface

      edit "hb1"

      set vdom "vdom name"

      set vlanid 998

      next

      edit "hb2"

      set vdom "vdom name"

      set vlanid 999

      next

      end

       

    5. Under the config switch-controller managed-switch command, set the native VLAN of the switch ports connected to the heartbeat ports using the VLAN created in step 2d.

      In this example, you need to assign port1 of core-switch1 to vlan998 and connect port1 of the active FortiGate unit to port1 of core-switch1. Then you need to assign port1 of core-switch2 to vlan999 and connect port2 of the active FortiGate unit to port1 of core-switch2.

       

      config switch-controller managed-switch

      edit <site1-core-switch1>

      edit "port1"

      set vlan "hb1"

      next

      end

      edit <site1-core-switch2>

      edit "port1"

      set vlan "hb2"

      next

      end

       

    6. Make sure all FortiLinks are up.
  3. On Site 2:
    1. Configure Site 2 using the same configuration as step 2, except for the HA priority.
    2. Make sure all FortiLinks are up.
  4. Disconnect the physical connections for the FortiGate HA and FortiLink interface on Site 2.
  5. Connect the cables between the two pairs of core switches in Site 1 and Site 2.
  6. On both sites:
    1. On the MCLAG Peer Group switches at Site 1, use the config switch auto-isl-port-group command in the FortiSwitch CLI to group the ports to Site 2. See Deploying MCLAG topologies.
    2. On the MCLAG Peer Group switches at Site 2 , use the config switch auto-isl-port-group command in the FortiSwitch CLI to group the ports to Site 1. See Deploying MCLAG topologies.
    3. Make sure all the FortiLinks are up.
  7. Connect the FortiGate HA and FortiLink interface connections on Site 2.
  8. Check the configuration:
    1. On both sites, enter the get system ha status command on the FortiGate unit to check the HA status.
    2. On the active (master) FortiGate unit, enter the execute switch-controller get-conn-status command to check the FortiLink state.
  9. In the GUI, the example configuration looks like the following:

Deploying MCLAG topologies

This section covers the following topics:

Dual-homed servers connected to a pair of FortiSwitch units using an MCLAG

To configure a multichassis LAG, you need to configure FortiSwitch 1 and FortiSwitch 2 as MCLAG peer switches before creating a two-port LAG. See Transitioning from a FortiLink split interface to a FortiLink MCLAG. Then you set up two MCLAGs towards the servers, each MCLAG using one port from each FortiSwitch unit.

This topology is supported when the FortiGate unit is in HA mode.

NOTE:

  • On the global switch level, mclag-stp-aware must be enabled, and STP must be enabled on all ICL trunks. They are both enabled by default.
  • Fortinet recommends using at least two links for ICL redundancy.

NOTE: If you are going to use IGMP snooping with an MCLAG topology:

  • On the global switch level, mclag-igmpsnooping-aware must be enabled. It is enabled by default.
  • The igmps-flood-traffic and igmps-flood-report settings must be disabled on the ISL and FortiLink trunks; but the igmps-flood-traffic and igmps-flood-report settings must be enabled on ICL trunks. These settings are enabled by default.
  • IGMP proxy must be enabled.

 

Step 1: Ensure the MCLAG ICL is already configured between FortiSwitch 1 and FortiSwitch 2.

diagnose switch mclag icl

Step 2: Configure a trunk in FortiSwitch 1 and then configure a trunk in FortiSwitch 2.

The trunk names must match.

Step 3: Set up the servers.
To set up Server 1:

config switch trunk

edit server_1

set members port10

set mclag enable

next

edit server_2

set members port15

set mclag enable

next

end

To set up Server 2:

config switch trunk

edit server_1

set members port10

set mclag enable

next

edit server_2

set members port15

set mclag enable

next

end

Note

If you disable the MCLAG ICL (with the set mclag-icl disable command), you need to enable the fortilink-split-interface.

Multi-tiered MCLAG with HA-mode FortiGate units

NOTE:

  • Before FortiOS 6.2.0, when using HA-mode FortiGate units to manage FortiSwitch units, the HA mode must be active-passive. Starting in FortiOS 6.2.0, the FortiGate HA mode can be either active-passive or active-active.
  • In this topology, you must use the auto-isl-port-group setting as described in the following configuration example. This setting instructs the switches to group ports from MCLAG peers together into one MCLAG when the inter-switch link (ISL) is formed.
  • The inter-chassis link (ICL) and auto-isl-port-group settings must be done directly on the FortiSwitch unit.
  • On the global switch level, mclag-stp-aware must be enabled, and STP must be enabled on all ICL trunks. They are both enabled by default.

  • CLI commands in red are manually configured.
  • Fortinet recommends using at least two links for ICL redundancy.

NOTE: If you are going to use IGMP snooping with an MCLAG topology:

  • On the global switch level, mclag-igmpsnooping-aware must be enabled. It is enabled by default.
  • The igmps-flood-traffic and igmps-flood-report settings must be disabled on the ISL and FortiLink trunks; but the igmps-flood-traffic and igmps-flood-report settings must be enabled on ICL trunks. These settings are enabled by default.
  • IGMP proxy must be enabled.
To configure a multi-tiered MCLAG with HA-mode FortiGate units:
  1. Configure FortiSwitch-1 and FortiSwitch-2 for the tier-1 MCLAG:

    For FortiSwitch-1, enable the ICL on the ISL formed with the MCLAG peer switch:

    config switch trunk

    edit "D243Z14000288-0" // trunk name derived from FortiSwitch-2 SN

    set mode lacp-active

    set auto-isl 1

    set mclag-icl enable

    set members "port21" "port22"

    end

    For FortiSwitch-2, enable the ICL on the ISL formed with the MCLAG peer switch:

    config switch trunk

    edit "D243Z14000289-0" // trunk name derived from FortiSwitch-1 SN

    set mode lacp-active

    set auto-isl 1

    set mclag-icl enable

    set members "port21" "port22"

    end

  2. Continue to configure FortiSwitch-1 for the tier-1 MCLAG:
    1. Configure the two auto-isl-port-groups based on the topology diagram. The group name must match the name that is configured on the peer switch.

      config switch auto-isl-port-group

      edit "distribute-1"

      set members "port1" "port2"

      next

      edit "distribute-2"

      set members "port3" "port4"

      end

    2. After you complete the CLI commands in Steps 1 and 2a, the trunks are automatically formed:

      config switch trunk

      edit "D243Z14000288-0"

      set mode lacp-active

      set auto-isl 1

      set mclag-icl enable

      set members "port21" "port22"

      next

      edit "FG100D3G15817028" // trunk name derived from FortiGate-1

      set mclag enable

      set members "port24" "port23"

      next

      edit "distribute-1"

      set mode lacp-active

      set auto-isl 1

      set mclag enable

      set members "port1" "port2"

      next

      edit "distribute-2"

      set mode lacp-active

      set auto-isl 1

      set mclag enable

      set members "port3" "port4"

      next

      end

  3. Continue to configure FortiSwitch-2 for the tier-1 MCLAG:
    1. Configure the two auto-isl-port-groups based on the topology diagram. The group name must match the name that is configured on the peer switch.

      config switch auto-isl-port-group

      edit "distribute-1"

      set members "port1" "port2"

      next

      edit "distribute-2"

      set members "port3" "port4"

      end

    2. After you complete the CLI commands in Steps 1 and 3a, the trunks are automatically formed:

      config switch trunk

      edit "D243Z14000288-0"

      set mode lacp-active

      set auto-isl 1

      set mclag-icl enable

      set members "port21" "port22"

      next

      edit "FG100D3G15817032" // trunk name derived from FortiGate-2

      set mclag enable

      set members "port24" "port23"

      next

      edit "distribute-1"

      set mode lacp-active

      set auto-isl 1

      set mclag enable

      set members "port1" "port2"

      next

      edit "distribute-2"

      set mode lacp-active

      set auto-isl 1

      set mclag enable

      set members "port3" "port4"

      next

      end

  4. Tier-2 MCLAGs. Enable the ICL between the MCLAG peer switches. For example, configure FortiSwitch-6 as follows.
    1. Change the tier-2 MCLAG peer switches to FortiLink mode and connect them to each other. Enable the ICL on the ISL formed with the MCLAG peer switches.

      config switch trunk

      edit "8DN3X15000026-0" // trunk name derived from FortiSwitch-7 SN

      set mode lacp-active

      set auto-isl 1

      set mclag-icl enable

      set members "port43" "port44"

      end

    2. The trunks are automatically formed as below:

      config switch trunk

      edit "8DN3X15000026-0"

      set mode lacp-active

      set auto-isl 1

      set mclag-icl enable

      set members "port43" "port44"

      next

      edit "_FlInK1_MLAG0_"

      set mode lacp-active

      set auto-isl 1

      set mclag enable

      set members "port48" "port47"

      next

      end

  5. Access FortiSwitch units. The access switch trunks are formed automatically as below.

    On FortiSwitch-6:

    config switch trunk

    edit "_FlInK1_MLAG0_"

    set mode lacp-active

    set auto-isl 1

    set mclag enable

    set members "port48" "port47"

    next

    end

     

    On FortiSwitch-7:

    config switch trunk

    edit "_FlInK1_MLAG0_"

    set mode lacp-active

    set auto-isl 1

    set mclag enable

    set members "port47" "port48"

    next

    end

    Note

    If you disable the MCLAG ICL (with the set mclag-icl disable command), you need to enable the fortilink-split-interface.

Three-tier FortiLink MCLAG configuration

To create a three-tier FortiLink MCLAG topology, use FortiOS 6.2.3 GA or later and FortiSwitchOS 6.2.3 GA or later.

NOTE: Fortinet recommends using at least two links for ICL redundancy.

To configure the two FortiGate units:
  1. Set up an active-passive or active-active HA configuration.
  2. (Optional) Disable override in the HA CLI configuration.
  3. Use the GUI or CLI to create the FortiLink interface.
  4. Configure the FortiLink interface:

    config system interface

    edit <FortiLink_interface>

    set lacp-mode active

    set fortilink-neighbor-detect lldp

    set fortilink-split-interface disable

    set lldp-reception enable

    set lldp-transmission enable

    next

    end

To configure the FortiSwitch units in the core:
  1. Find the trunk between the two MCLAG switches. Enable mclag-icl on the MCLAG-ICL trunk. The default name of the MCLAG-ICL trunk is the last 13 characters of the peer switch name plus “-0”.

     

    config switch trunk

    edit <MCLAG-ICL_trunk_name>

    set mclag-icl enable

    next

    end

     

  2. Create downlink trunks on the MCLAG-ICL switches.

    Note: Only the trunks from the higher tier MCLAG-ICL switches to the next tier MCLAG-ICL switches need this configuration.

To configure the three-tier MCLAG topology shown in the following figure:

  1. Configure the tier-1 MCLAG switches.
    1. Connect switch 1 and switch 2 to the FortiGate units and interconnect switch 1 and switch 2.
    2. Wait for both switches to change to FortiLink mode and for both FortiLinks to be up.
    3. Configure the ICL trunks on the inter-switch trunks to form MCLAG switches in FortiLink mode.
    4. Use the diagnose switch mclag peer-consistency-check CLI command to verify that the MCLAG-ICL trunk formed successfully.
    5. Add an auto-isl-port-group for the tier-2 MCLAG switches on both switch 1 and switch 2:

       

      config switch auto-isl-port-group

      edit tier2-closet-1

      set members port1

      next

      edit tier2-closet-2

      set members port2

      next

      end

       

  2. Wire all switches in closet 1 by following the figure. Do not make the dotted-line connections for now. Wait for all switches to be up in FortiLink mode.
  3. Add two auto-isl-port-groups for the tier-3 MCLAG switches on both switch 3 and switch 4:

     

    config switch auto-isl-port-group

    edit tier-2-closet-<1>-downlink-trunk-A

    set member <port_name>

    next

    edit tier-2-closet-<1>-downlink-trunk-B

    set member <port_name>

    next

    end

     

  4. Enable the tier-2 MCLAG-ICL trunk on switch 4 using the FortiOS CLI of the switch console port.
  5. Enable the tier-3 MCLAG-ICL trunks on switch 6 and switch 8.
    NOTE: The trunk must be configured from the end of the daisy-chain switch.
  6. Enable the tier-3 MCLAG-ICL trunks on switch 5 and switch 7.
  7. Enable the tier-2 MCLAG-ICL trunk on switch 3.
  8. Verify that all the FortiLinks are up and double-check that the MCLAG-ICL configuration on each MCLAG switch.
  9. Connect switch 4 to switch 2.
  10. Verify that the FortiLinks are up.
  11. Connect switch 6 and switch 8 to switch 4.
  12. Verify that the FortiLinks are up.
  13. Use the diagnose switch mclag peer CLI command to verify that the tier-1, tier-2, and tier-3 MCLAG-switches are formed correctly.
  14. Check the traffic on switch 1 and switch 2 during the configuration.
  15. Repeat steps 2 to 14 for closet 2.
  16. All FortiLinks should be up.

HA-mode FortiGate units in different sites

There are two sites in this topology, each with a FortiGate unit. The two sites share the FortiGate units in active-passive HA mode. The FortiGate units use the FortiSwitch units in FortiLink mode as the heartbeat connections because of limited physical connections between the two sites.

FortiOS 6.4.2 or higher and FortiSwitchOS 6.4.2 or higher are required.

Refer to the other network topologies in Deploying MCLAG topologies.

NOTE: Fortinet recommends using at least two links for ICL redundancy.

The following steps are an example of how to configure this topology:

  1. Disconnect the physical connections between the two sites.
  2. On Site 1:
    1. Use the FortiGate unit to establish the FortiLinks on Site 1. See Configuring FortiLink.
    2. Enable the MCLAG-ICL on the core switches of Site 1. See Transitioning from a FortiLink split interface to a FortiLink MCLAG.
    3. Enable the HA mode and set the heartbeat ports on FortiGate-1. FortiGate port1 and port2 are used as HA heartbeat ports in this example. For example, set hbdev "port1" 242 "port2" 25.
    4. Create a switch VLAN or VLANs dedicated to the FortiGate HA heartbeats between the two FortiGate units. For example:

       

      config system interface

      edit "hb1"

      set vdom "vdom name"

      set vlanid 998

      next

      edit "hb2"

      set vdom "vdom name"

      set vlanid 999

      next

      end

       

    5. Under the config switch-controller managed-switch command, set the native VLAN of the switch ports connected to the heartbeat ports using the VLAN created in step 2d.

      In this example, you need to assign port1 of core-switch1 to vlan998 and connect port1 of the active FortiGate unit to port1 of core-switch1. Then you need to assign port1 of core-switch2 to vlan999 and connect port2 of the active FortiGate unit to port1 of core-switch2.

       

      config switch-controller managed-switch

      edit <site1-core-switch1>

      edit "port1"

      set vlan "hb1"

      next

      end

      edit <site1-core-switch2>

      edit "port1"

      set vlan "hb2"

      next

      end

       

    6. Make sure all FortiLinks are up.
  3. On Site 2:
    1. Configure Site 2 using the same configuration as step 2, except for the HA priority.
    2. Make sure all FortiLinks are up.
  4. Disconnect the physical connections for the FortiGate HA and FortiLink interface on Site 2.
  5. Connect the cables between the two pairs of core switches in Site 1 and Site 2.
  6. On both sites:
    1. On the MCLAG Peer Group switches at Site 1, use the config switch auto-isl-port-group command in the FortiSwitch CLI to group the ports to Site 2. See Deploying MCLAG topologies.
    2. On the MCLAG Peer Group switches at Site 2 , use the config switch auto-isl-port-group command in the FortiSwitch CLI to group the ports to Site 1. See Deploying MCLAG topologies.
    3. Make sure all the FortiLinks are up.
  7. Connect the FortiGate HA and FortiLink interface connections on Site 2.
  8. Check the configuration:
    1. On both sites, enter the get system ha status command on the FortiGate unit to check the HA status.
    2. On the active (master) FortiGate unit, enter the execute switch-controller get-conn-status command to check the FortiLink state.
  9. In the GUI, the example configuration looks like the following: