Transparent mode & L2TPv3 unavailable in cOS Core HA clusters

Last modified on 17 Feb, 2023. Revision 6
Details about why transparent mode / switchroutes and L2TPv3 cannot be used in a cOS Core HA cluster
Up to date for
cOS Core 14.00.06
Supported since
cOS Core 10.00.xx
Status OK
Author
Peter Nilsson









Question

Why is it not possible to configure L2TPv3 or Transparent mode in a cOS Core high availability cluster?

Answer

The reason for this is because there is no state synchronization for Transparent Mode and no loop avoidance.

Running transparent mode on an HA cluster would result in the same situation as when two switches are connected to each other over multiple links. One single packet entering the system could, in the worst case, cause a never-ending packet loop between the two cluster nodes. Besides keeping the HA cluster fully busy, this will also mean that multiple copies of the packet will be generated on all involved interfaces, meaning that the HA cluster would more or less become a packet generator (if it was allowed).

And since L2TPv3 relies on transparent routing to bridge the networks using layer 2, it will also not work in high availability clusters.

Is it a bug or per design?

It is not a bug, it is how the system was designed based on the use-cases that were most sought after at the time of implementation.

Will it be changed in the future?

At this time (2023) there are no plans to add support for transparent mode in HA clusters. There exists an RFE (request for enhancement) with ID COP-17647 but it would be a fairly large project that is not planned or included in any roadmaps at this time. Clavister is, however, always interested in getting feedback from customers about features they would like to see implemented. The more customers who are interested in a particular feature, the higher the chance that it will be implemented. If you are interested in this particular functionality you can contact Clavister support and indicate this with a reference to the development ID (COP-17647), including a description of use-case for the feature.



Related articles

cOS Core HA clusters in VMware with Promiscuous Mode
4 Apr, 2023 core vmware highavailability ha promiscuous
Device initiated InControl management of NetWall HA clusters with a single public IP
31 Mar, 2022 incontrol core netcon netwall ha cluster coscore
Differences between the NetWall E80A and E80B
31 May, 2021 hardware ha e80a e80b
Avoiding cOS Core HA interruptions during configuration deployment
20 Feb, 2023 ha core idp cli cluster antivirus configuration
Managing NetWall HA clusters over the Internet using one public IP
21 Jun, 2022 core ha hacluster netwall coscore slb
cOS Core High Availability Cluster troubleshooting
23 Feb, 2023 core troubleshoot cluster ha