Administrator Guide

Clearing the Number of SAV Dropped Packets................................................................................................... 370
14 Equal Cost Multi-Path (ECMP).................................................................................................................371
ECMP for Flow-Based Anity......................................................................................................................................371
Enabling Deterministic ECMP Next Hop............................................................................................................... 371
Conguring the Hash Algorithm Seed................................................................................................................... 371
Link Bundle Monitoring............................................................................................................................................372
Managing ECMP Group Paths..................................................................................................................................... 372
Creating an ECMP Group Bundle................................................................................................................................ 373
Modifying the ECMP Group Threshold.......................................................................................................................373
BGP Multipath Operation with Link Bankwidth......................................................................................................... 374
Dynamic Re-calculation of Link Bankwidth................................................................................................................ 375
Weighted ECMP for Static Routes..............................................................................................................................376
ECMP Support in L3 Host and LPM Tables............................................................................................................... 376
15 FCoE Transit.............................................................................................................................................377
Fibre Channel over Ethernet.........................................................................................................................................377
Ensure Robustness in a Converged Ethernet Network.............................................................................................377
FIP Snooping on Ethernet Bridges.............................................................................................................................. 379
FIP Snooping in a Switch Stack....................................................................................................................................381
Using FIP Snooping........................................................................................................................................................ 381
FIP Snooping Prerequisites......................................................................................................................................381
Important Points to Remember.............................................................................................................................. 381
Enabling the FCoE Transit Feature........................................................................................................................382
Enable FIP Snooping on VLANs.............................................................................................................................382
Congure the FC-MAP Value................................................................................................................................ 382
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 383
Congure a Port for a Bridge-to-FCF Link...........................................................................................................383
Impact on Other Software Features..................................................................................................................... 383
FIP Snooping Restrictions...................................................................................................................................... 383
Conguring FIP Snooping.............................................................................................................................................384
Displaying FIP Snooping Information...........................................................................................................................385
FCoE Transit Conguration Example.......................................................................................................................... 390
16 FIPS Cryptography...................................................................................................................................392
Conguration Tasks....................................................................................................................................................... 392
Preparing the System....................................................................................................................................................392
Enabling FIPS Mode...................................................................................................................................................... 393
Generating Host-Keys...................................................................................................................................................393
Monitoring FIPS Mode Status......................................................................................................................................393
Disabling FIPS Mode..................................................................................................................................................... 394
17 Flex Hash and Optimized Boot-Up............................................................................................................395
Flex Hash Capability Overview.................................................................................................................................... 395
Conguring the Flex Hash Mechanism.......................................................................................................................395
LACP Fast Switchover..................................................................................................................................................396
12
Contents