Setup Guide

Clearing the Number of SAV Dropped Packets................................................................................................... 372
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 373
ECMP for Flow-Based Anity..................................................................................................................................... 373
Enabling Deterministic ECMP Next Hop...............................................................................................................373
Conguring the Hash Algorithm Seed...................................................................................................................373
Link Bundle Monitoring............................................................................................................................................374
Managing ECMP Group Paths..................................................................................................................................... 374
Creating an ECMP Group Bundle................................................................................................................................ 375
Modifying the ECMP Group Threshold.......................................................................................................................375
BGP Multipath Operation with Link Bankwidth......................................................................................................... 376
Dynamic Re-calculation of Link Bankwidth.................................................................................................................377
Weighted ECMP for Static Routes..............................................................................................................................378
ECMP Support in L3 Host and LPM Tables............................................................................................................... 378
15 FCoE Transit.............................................................................................................................................379
Fibre Channel over Ethernet........................................................................................................................................ 379
Ensure Robustness in a Converged Ethernet Network............................................................................................ 379
FIP Snooping on Ethernet Bridges...............................................................................................................................381
FIP Snooping in a Switch Stack...................................................................................................................................383
Using FIP Snooping....................................................................................................................................................... 383
FIP Snooping Prerequisites.....................................................................................................................................383
Important Points to Remember............................................................................................................................. 383
Enabling the FCoE Transit Feature........................................................................................................................384
Enable FIP Snooping on VLANs.............................................................................................................................384
Congure the FC-MAP Value................................................................................................................................ 384
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................385
Congure a Port for a Bridge-to-FCF Link...........................................................................................................385
Impact on Other Software Features..................................................................................................................... 385
FIP Snooping Restrictions...................................................................................................................................... 385
Conguring FIP Snooping.............................................................................................................................................386
Displaying FIP Snooping Information........................................................................................................................... 387
FCoE Transit Conguration Example...........................................................................................................................392
16 FIPS Cryptography...................................................................................................................................394
Conguration Tasks....................................................................................................................................................... 394
Preparing the System....................................................................................................................................................394
Enabling FIPS Mode......................................................................................................................................................395
Generating Host-Keys...................................................................................................................................................395
Monitoring FIPS Mode Status..................................................................................................................................... 395
Disabling FIPS Mode..................................................................................................................................................... 396
17 Flex Hash and Optimized Boot-Up............................................................................................................ 397
Flex Hash Capability Overview.....................................................................................................................................397
Conguring the Flex Hash Mechanism....................................................................................................................... 397
LACP Fast Switchover..................................................................................................................................................398
12
Contents