Users Guide

Dynamic Re-calculation of Link Bankwidth................................................................................................................ 369
Weighted ECMP for Static Routes..............................................................................................................................370
ECMP Support in L3 Host and LPM Tables............................................................................................................... 370
15 FCoE Transit............................................................................................................................................. 371
Fibre Channel over Ethernet......................................................................................................................................... 371
Ensure Robustness in a Converged Ethernet Network.............................................................................................371
FIP Snooping on Ethernet Bridges.............................................................................................................................. 373
FIP Snooping in a Switch Stack................................................................................................................................... 375
Using FIP Snooping....................................................................................................................................................... 375
FIP Snooping Prerequisites.....................................................................................................................................375
Important Points to Remember..............................................................................................................................375
Enabling the FCoE Transit Feature........................................................................................................................ 376
Enable FIP Snooping on VLANs............................................................................................................................. 376
Congure the FC-MAP Value.................................................................................................................................376
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 377
Congure a Port for a Bridge-to-FCF Link........................................................................................................... 377
Impact on Other Software Features......................................................................................................................377
FIP Snooping Restrictions.......................................................................................................................................377
Conguring FIP Snooping............................................................................................................................................. 378
Displaying FIP Snooping Information........................................................................................................................... 379
FCoE Transit Conguration Example...........................................................................................................................384
16 FIPS Cryptography...................................................................................................................................386
Conguration Tasks....................................................................................................................................................... 386
Preparing the System....................................................................................................................................................386
Enabling FIPS Mode...................................................................................................................................................... 387
Generating Host-Keys................................................................................................................................................... 387
Monitoring FIPS Mode Status......................................................................................................................................387
Disabling FIPS Mode..................................................................................................................................................... 388
17 Flex Hash and Optimized Boot-Up............................................................................................................389
Flex Hash Capability Overview.................................................................................................................................... 389
Conguring the Flex Hash Mechanism.......................................................................................................................389
LACP Fast Switchover..................................................................................................................................................390
Conguring LACP Fast Switchover............................................................................................................................ 390
LACP............................................................................................................................................................................... 390
LACP Fast Switchover............................................................................................................................................390
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 390
Sample Congurations.................................................................................................................................................. 392
................................................................................................................................................................................... 392
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces......................................................................................395
18 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 396
Protocol Overview.........................................................................................................................................................396
Ring Status............................................................................................................................................................... 397
12
Contents