Hello all,
we are looking for best practice for below:
Connect 1 MX (FW) firewall to 2 MS (SW00 & SW01) switch with full resiliency:
We have 1 MX85 and 2 x MS130-48P we would like to achieve the below:
1- Connect the switches between each other with 2 ports in LACP trunk with all vlans:
We will connect the switches port 10 and 11 on sw00 and port 10 and port 11 on sw01 between each other in LACP in trunk mode, and we have RSTP emabled and STP bridge priority was set to be 4096 for SW00 and 8192 for SW01 , do we suppose to enable any STP guard on those ports?
SW00 Port 10 --> SW01 Port 10
SW01 Port 11 --> SW01 port 11
2- Connect the firewall to each switches in case sw00 went down the traffic will not be impacted (to prevent single point of failure):
FW Port 5 --> SW00 Port 1
FW Port 6 --> SW01 Port 1
FW port 7 --> SW00 Port 2 (access port for management)
FW Port 8 --> SW01 Port 2 (access port for management)
currently port 1 on each switches they are connected to the firewall on port 5 and 6 respectively in trunk mode, on SW00 we are enabling Loop Guard STP on port 1 and it is working as expected, however, when we enabled the Loop Guard on the other switch SW01 the switch goes down (lose access to the internet and will be shown as down on dashboard) and to make it work we have enabled Root Guard STP on port 1 on SW01 and we started to see the message (Root guard activated, STP discarding packets), as well as same situation for the access port for management (Port 2 on the switches).
the question for this part is what we suppose to use as STP guard on the ports between the switch and the firewall to make this work.
Diagram:
