HSRP with 2920 Procurve Switch stack and Sonicwall NSA 4600

We have a setup where we are getting two drops at the datacenter using HSRP. We have those drops connected to a stack of procurve switches, and then connected to two Sonicwall NSA 4600.

We want to confirm we setup a VLAN on the two ports in the switch as untagged (as the switches are stacked) and then setup the VLAN in the Sonicwall, and we should be able to have traffic pass with no issue.

HP cannot figure this out, and we know it had to be able to work, as it is simply passing hello packets, via multicasting. Not rocket (or networking) science.

We just want to make sure we are going down the correct route for this configuration./
Michael FraserCEOAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Craig BeckCommented:
The packet coming from the SonicWall to the switch would automatically get its 802.1q info removed, so that's ok, but traffic coming into the SonicWall from the switch would probably get dropped as the traffic is expected to be tagged.

If you set the port on the SonicWall to use the desired VLAN as the native VLAN ID it will work though.

Why not just tag the ports at the HP switch though?
TimotiStDatacenter TechnicianCommented:
Just ot confirm, your setup is something like:
[provider Cisco HSRP cluster]=====[procurve stack]=====[Sonicwall cluster]

Where the procurve stack is pure layer2, and the Sonicwall uses the HSRP virtual IP as the default GW?
That should work fine.

Just check the Sonicwall cluster manual, see who passes hellos where.
Draw a diagram and check all failure scenarios (cable, router, sonicwall, switch) with failover and failback will work as expected. For a similar setup with Fortigates I had to run a few extra links to make sure the failback happens.


Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Michael FraserCEOAuthor Commented:
Thanks for the input gents! Death by checkbox on the Sonicwall. Muti casting on the FW now selected. SMH!
Michael FraserCEOAuthor Commented:
I've requested that this question be closed as follows:

Accepted answer: 0 points for vdispace's comment #a40258758

for the following reason:

Specific to this issue.
Michael FraserCEOAuthor Commented:
Deductive reasoning.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.