Reference Guide

Ensure Robustness in a Converged Ethernet Network.........................................................................................286
FIP Snooping on Ethernet Bridges..............................................................................................................................287
Using FIP Snooping........................................................................................................................................................ 289
FIP Snooping Prerequisites.....................................................................................................................................289
Important Points to Remember............................................................................................................................. 289
Enabling the FCoE Transit Feature.......................................................................................................................290
Enable FIP Snooping on VLANs.............................................................................................................................290
Configure the FC-MAP Value................................................................................................................................. 291
Configure a Port for a Bridge-to-Bridge Link..................................................................................................... 291
Configure a Port for a Bridge-to-FCF Link..........................................................................................................291
Impact on Other Software Features..................................................................................................................... 291
FIP Snooping Restrictions........................................................................................................................................291
Configuring FIP Snooping....................................................................................................................................... 292
FCoE Transit Configuration Example......................................................................................................................... 293
Displaying FIP Snooping Information..........................................................................................................................294
Chapter 17: Enabling FIPS Cryptography................................................................................... 300
Configuration Tasks....................................................................................................................................................... 300
Preparing the System.................................................................................................................................................... 300
Enabling FIPS Mode........................................................................................................................................................ 301
Generating Host-Keys.................................................................................................................................................... 301
Monitoring FIPS Mode Status...................................................................................................................................... 301
Disabling FIPS Mode...................................................................................................................................................... 302
Chapter 18: Flex Hash................................................................................................................303
Flex Hash Capability Overview.................................................................................................................................... 303
Configuring the Flex Hash Mechanism......................................................................................................................303
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 304
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 304
Chapter 19: Force10 Resilient Ring Protocol (FRRP)................................................................. 306
Protocol Overview..........................................................................................................................................................306
Ring Status................................................................................................................................................................. 307
Multiple FRRP Rings.................................................................................................................................................307
Important FRRP Points............................................................................................................................................308
Important FRRP Concepts......................................................................................................................................308
Implementing FRRP........................................................................................................................................................309
FRRP Configuration....................................................................................................................................................... 309
Creating the FRRP Group.......................................................................................................................................309
Configuring the Control VLAN................................................................................................................................310
Configuring and Adding the Member VLANs.......................................................................................................311
Setting the FRRP Timers..........................................................................................................................................311
Clearing the FRRP Counters...................................................................................................................................312
Viewing the FRRP Configuration........................................................................................................................... 312
Viewing the FRRP Information............................................................................................................................... 312
Troubleshooting FRRP....................................................................................................................................................312
Sample Configuration and Topology........................................................................................................................... 313
Chapter 20: GARP VLAN Registration Protocol (GVRP)............................................................. 315
10
Contents