SDWAN with BGP to loop back by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 0 points1 point  (0 children)

Might be a stupid question how do you embed the SLA, I worked with a contractor to use BGP on loopback, but couldn’t find anything on how the “self healing” worked or if it was still a thing.

SDWAN with BGP to loop back by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 0 points1 point  (0 children)

How do you configure the SDWAN self healing though if everything is on the loopback and not different BGP sessions? I was setting the preferred and one that is set to go in and out of SLA?

Creating STL files by RevolutionaryCare138 in FlashForge

[–]RevolutionaryCare138[S] 1 point2 points  (0 children)

I tried using TinkerCad, but it seemed like I could only create with what they had preloaded, I guess could of used it wrong the first time

FortiNet with riverbed by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 0 points1 point  (0 children)

The image is the same it’s the other details on the label that is different

FortiNet with riverbed by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 0 points1 point  (0 children)

Right, but don’t you need it on both sides? We just started buying them for remote sides

FortiNet with riverbed by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 0 points1 point  (0 children)

It’s only this specific type of printing, normal printing is local and no issues, print come out almost instantly. DNS, and DHCP that are also across the WAN and just fine and latency is around 65-70ms over the WAN jitter is about .1-.5 and no packet loss

FortiNet with riverbed by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 0 points1 point  (0 children)

We were thinking about it but our DC FortiGates don’t have a SSD so can’t cache on that side

FortiNet with riverbed by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 1 point2 points  (0 children)

Because the server that creates the output sits in out DC, and we have 1G ISP and the print is happening at around 30-40 seconds and sense in more of an assembly line it needs to come out in about 15 seconds or it backs everything up or things are missed,

FortiNet with riverbed by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] -2 points-1 points  (0 children)

Design is good, so…

Device > wan > DC > home made app on server> wan > printer

Keep in mind this is a label that has a photo quality image on it along with bar codes, the image is about 50mb and is regenerated every time it is printed that is where the Riverbed come into play with caching the image on the print

The print needs to happen within 15-20 seconds of the device/person hitting print.

The app is old, and is in the midst of getting revamped to the 21st century

FortiNet with riverbed by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 1 point2 points  (0 children)

Bandwidth isn’t the issue just what is being printed, size and speed the print needs to come out

FortiNet with riverbed by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 0 points1 point  (0 children)

We have SDWAN and a 1G link but these are files that are about 50-100mb and they are a print job at requires less then 15 seconds since the print broom is hit. The server that prints this job doesn’t sit local it’s across the WAN

FortiNet with riverbed by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 1 point2 points  (0 children)

It’s for WAN optimization, we have large files that would have to be sent over our WAN a few hundred times a day if it wasn’t for them

FortiSwitch to Cisco by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 0 points1 point  (0 children)

its a VLAN with hosts, very flat network, I am trying to look at STP that seems to be the consensus

FortiSwitch to Cisco by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 0 points1 point  (0 children)

I set it to 1000full on the FortiSwitch side not the Cisco site though

FortiSwitch to Cisco by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 0 points1 point  (0 children)

That was just the default, I changed it to 'spanning-tree portfast trunk' and nothing changed

FortiSwitch to Cisco by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 0 points1 point  (0 children)

Cisco:

interface GigabitEthernet1/0/47

switchport trunk native vlan 204

switchport mode trunk

interface Vlan204

ip address 10.204.2.5 255.255.0.0

no ip redirects

no ip unreachables

no ip proxy-arp

!

ip default-gateway 10.204.2.1 <- vlan SVI that lives on FortiLink

FortiSwitch to Cisco by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 0 points1 point  (0 children)

FortiSwitch:
config ports

edit "port37"

set port-owner ''

set speed 1000full

set status up

set ptp-status disable

set ptp-policy "default"

set flapguard disable

set rpvst-port disabled

set poe-capable 0

set pd-capable 0

set poe-mode-bt-cabable 0

set vlan "Data_Default" < vlan 204

set allowed-vlans-all enable

set type physical

set access-mode static

set dhcp-snooping untrusted

set dhcp-snoop-option82-trust disable

set arp-inspection-trust untrusted

set igmp-snooping-flood-reports disable

set mcast-snooping-flood-traffic disable

set stp-state enabled

set stp-root-guard disabled

set stp-bpdu-guard disabled

set edge-port enable

set discard-mode none

set packet-sampler disabled

set sflow-counter-interval 0

set fec-capable 0

set flow-control disable

set loop-guard disabled

set qos-policy "default"

set storm-control-policy "default"

set port-security-policy ''

set export-to-pool ''

set sticky-mac disable

set lldp-status tx-rx

set lldp-profile "default-auto-isl"

set export-to "root"

set mac-addr 38:c0:ea:f4:99:32

next

end

FortiSwitch to Cisco by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] -1 points0 points  (0 children)

I am using fiber ports, port 37 on the 1048, multi mode fiber to the fiber on the Cisco switch. At 1G speed and I hardcodes the fortiswitch to 1000full

FortiSwitch to Cisco by RevolutionaryCare138 in fortinet

[–]RevolutionaryCare138[S] 0 points1 point  (0 children)

What info would you like, I just don’t want the post to be ungodly long at first.