Hi All
We are planning to replace our Cisco Firepower Firewall with an MX series one, and the downstream is an all Meraki Layer 3 switches that is segregated into VLANs on an MS425 core stack..
Now currently the stack uplink ports are aggregated on the stack side and LACPed on the current Firepower and a transit VLAN is set between the Firepower and the core stack.. my 2 questions:
- I am looking to setup VLANs on the MX LAN interfaces so I can setup a similar IDed transit VLAn and also assign an IP to the interfaces/VLAN .. didn;t see any other option.. is it a proper approach? will setting up such a VLAN on the Switch stack and on the MX conflict somehow?
- As it is not possible to setup LACP on the MX, I will be connecting each core switch stack member uplink to a Lan port on the MX, and hope that STP guard will block the redundant links and keep one active at anytime.. any suggestions here?
Thank you all for the help