Reference Guide

Debugging the DHCP Server..........................................................................................................................227
Using DHCP Clear Commands........................................................................................................................228
Configure the System to be a Relay Agent........................................................................................................... 228
Configure the System to be a DHCP Client........................................................................................................... 230
DHCP Client on a Management Interface......................................................................................................230
DHCP Client Operation with Other Features.................................................................................................. 230
Configure the System for User Port Stacking (Option 230)...................................................................................231
Configure Secure DHCP........................................................................................................................................232
Option 82.........................................................................................................................................................232
DHCP Snooping.............................................................................................................................................. 232
Drop DHCP Packets on Snooped VLANs Only............................................................................................... 234
Dynamic ARP Inspection................................................................................................................................235
Configuring Dynamic ARP Inspection............................................................................................................ 236
Source Address Validation...................................................................................................................................237
Enabling IP Source Address Validation......................................................................................................... 237
DHCP MAC Source Address Validation......................................................................................................... 237
Enabling IP+MAC Source Address Validation............................................................................................... 238
12 Equal Cost Multi-Path (ECMP)............................................................................................ 239
ECMP for Flow-Based Affinity.............................................................................................................................. 239
Configuring the Hash Algorithm..................................................................................................................... 239
Enabling Deterministic ECMP Next Hop........................................................................................................ 239
Configuring the Hash Algorithm Seed............................................................................................................240
Link Bundle Monitoring.........................................................................................................................................240
Managing ECMP Group Paths........................................................................................................................241
Creating an ECMP Group Bundle................................................................................................................... 241
Modifying the ECMP Group Threshold...........................................................................................................241
13 Enabling FIPS Cryptography................................................................................................243
Configuration Tasks..............................................................................................................................................243
Preparing the System........................................................................................................................................... 243
Enabling FIPS Mode..............................................................................................................................................243
Generating Host-Keys...........................................................................................................................................244
Monitoring FIPS Mode Status...............................................................................................................................244
Disabling FIPS Mode............................................................................................................................................ 245
14 Force10 Resilient Ring Protocol (FRRP).............................................................................247
Protocol Overview................................................................................................................................................ 247
Ring Status..................................................................................................................................................... 248
Multiple FRRP Rings....................................................................................................................................... 248
Important FRRP Points....................................................................................................................................249
Important FRRP Concepts.............................................................................................................................. 249