for all this totally blowing my mind due to never getting to this level of my career 😢 (actually im kinda glad i got as far as i did!) im actually starting to get it! even tho your not teaching the fact you are saying it as it is actually helps! 😊 as usual, a great vid 😊 keep them coming!!!
I'm so glad you're enjoying the videos. Like I said, I just talk. Happy to hear some people get something out of it because I'm not the best teacher. Good bless!
Good day! Grace and Peace from our Lord and Savior Jesus Christ and all the Saints here in central NC! I really enjoyed this video! I love seeing engineers in action and solving problems. I also love it when I understand and can relate to what’s going on and your videos are always awesome at showcasing that👍🏽🥳 Thanks for the rack tour as well! Who doesn’t enjoy an MDF rack tour🥳 Well thanks again and keep em’ coming sir! God Bless You🙏🏽
Stp was blocking ports to prevent broadcast storm or BPDU Guard or what sir , i hope one day i will be network Engineer like you 🥰 i love what you are doing
😂there I nothing like that sinking feeling when you at home under a blanket, you made a configuration change and everything dissapears. And you think to yourself, why now? Why me?
We do use LACP on the uplinks where we have four fiber interfaces bonded together. This way I only have to manage one port rather than four and we have redundancy. STP was set up on recommendation of Extreme as a "best practice". Though it's caused me some trouble a time or two with ports being blocked. God bless!
Our thought is that there are no users on either of these switches so no users would be plugging mini-hubs in or other switches. Plus Extreme Networks recommended that we disable STP on both switches. I figure they are smarter than me. God bless!
I don't really get what you are doing. Because disabling spanning tree to solve problems is a bad habit and will some day cause a bridging loop. But I get the vwire might interupt the bpdu-packets. And also if I understand it correctly you have one VLAN, on your switches, on each side of the vwire. Not cerners firewall one one side directly connected to the firewall? As you are talking about what to do in the future. If cerners firewalls are stand-alone and not in HA. And you think it's overkill to have cross redundancy. Is to just run a direct cable between the firewalls, and route between the firewalls. Not sure if that's possible when your firewalls are in HA though. Another option which gives cross redundancy between your 2 and cerners 2 is to put then on one vlan. And in that vlan you route between the firewalls. And from you firewalls into the core/segmentation firewalls. I'm also debating about if cerner should go on the edge firewall or the segmentation firewall. Because they probably have high standards on their side too. It's not county level or a dirty WAN.
I'm not sure disabling spanning tree on the top of rack switches is going to help. Extreme thinks so. The goal is going to be to move the L3 address from the Cerner transit network from the core, to the edge firewall and then ditch the vwire altogether. We'll just tag the transit network on the uplinks between the cores and the firewall and get the traffic to Cerner that way. This will actually simplify our routing a bit since we had to add multiple static routes to Cerner in all the VRFs. Now we can simply delete all those statics and traffic will head to the edge firewall which is where it needs to go.
for all this totally blowing my mind due to never getting to this level of my career 😢 (actually im kinda glad i got as far as i did!) im actually starting to get it! even tho your not teaching the fact you are saying it as it is actually helps! 😊
as usual, a great vid 😊 keep them coming!!!
I'm so glad you're enjoying the videos. Like I said, I just talk. Happy to hear some people get something out of it because I'm not the best teacher. Good bless!
Good day! Grace and Peace from our Lord and Savior Jesus Christ and all the Saints here in central NC! I really enjoyed this video! I love seeing engineers in action and solving problems. I also love it when I understand and can relate to what’s going on and your videos are always awesome at showcasing that👍🏽🥳 Thanks for the rack tour as well! Who doesn’t enjoy an MDF rack tour🥳 Well thanks again and keep em’ coming sir! God Bless You🙏🏽
Going to be testing that failover here very soon. Video on that coming up. God bless!
Stp was blocking ports to prevent broadcast storm or BPDU Guard or what sir , i hope one day i will be network Engineer like you 🥰 i love what you are doing
Keep studying and practicing. You can make it! God bless!
Another day another great video
Glad you enjoyed it. Hopefully I can keep producing good content rather than that mediocre stuff that... well... I sometimes produce. God bless!
😂there I nothing like that sinking feeling when you at home under a blanket, you made a configuration change and everything dissapears. And you think to yourself, why now? Why me?
Yep. I absolutely know that feeling. Especially when you don't know what you did! "That should have happened!" LoL! God bless and thanks for watching!
I like these videos !
Thank you! God bless!
Love your videos! I have a curiosity as to why you don't use lagp, ether channel groups instead of STP?
We do use LACP on the uplinks where we have four fiber interfaces bonded together. This way I only have to manage one port rather than four and we have redundancy. STP was set up on recommendation of Extreme as a "best practice". Though it's caused me some trouble a time or two with ports being blocked. God bless!
@@NetworkAdminLife thank you for the reply. God bless.
@user-rr3fo6hy9q awesome explanation. Thank you for taking the time out to explain.
Thank you
You're welcome. God bless.
Why not activate STP on the other.. instead of disable STP?
Our thought is that there are no users on either of these switches so no users would be plugging mini-hubs in or other switches. Plus Extreme Networks recommended that we disable STP on both switches. I figure they are smarter than me. God bless!
I don't really get what you are doing. Because disabling spanning tree to solve problems is a bad habit and will some day cause a bridging loop. But I get the vwire might interupt the bpdu-packets. And also if I understand it correctly you have one VLAN, on your switches, on each side of the vwire. Not cerners firewall one one side directly connected to the firewall?
As you are talking about what to do in the future. If cerners firewalls are stand-alone and not in HA. And you think it's overkill to have cross redundancy. Is to just run a direct cable between the firewalls, and route between the firewalls. Not sure if that's possible when your firewalls are in HA though. Another option which gives cross redundancy between your 2 and cerners 2 is to put then on one vlan. And in that vlan you route between the firewalls. And from you firewalls into the core/segmentation firewalls.
I'm also debating about if cerner should go on the edge firewall or the segmentation firewall. Because they probably have high standards on their side too. It's not county level or a dirty WAN.
I'm not sure disabling spanning tree on the top of rack switches is going to help. Extreme thinks so. The goal is going to be to move the L3 address from the Cerner transit network from the core, to the edge firewall and then ditch the vwire altogether. We'll just tag the transit network on the uplinks between the cores and the firewall and get the traffic to Cerner that way. This will actually simplify our routing a bit since we had to add multiple static routes to Cerner in all the VRFs. Now we can simply delete all those statics and traffic will head to the edge firewall which is where it needs to go.
@@NetworkAdminLife Agree with this