Setup Guide

Using DHCP Clear Commands...............................................................................................................................276
Congure the System to be a Relay Agent.................................................................................................................276
Congure the System to be a DHCP Client............................................................................................................... 278
Conguring the DHCP Client System................................................................................................................... 278
DHCP Client on a Management Interface............................................................................................................ 279
DHCP Client Operation with Other Features.......................................................................................................280
DHCP Relay When DHCP Server and Client are in Dierent VRFs.........................................................................281
Conguring Route Leaking between VRFs on DHCP Relay Agent.................................................................... 281
Non-default VRF conguration for DHCPv6 helper address................................................................................... 282
Conguring DHCP relay source interface...................................................................................................................283
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 283
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................283
Congure the System for User Port Stacking (Option 230)....................................................................................285
Congure Secure DHCP...............................................................................................................................................285
Option 82 (DHCPv4 relay options)........................................................................................................................285
DHCPv6 relay agent options..................................................................................................................................286
DHCP Snooping.......................................................................................................................................................286
Drop DHCP Packets on Snooped VLANs Only.................................................................................................... 291
Dynamic ARP Inspection......................................................................................................................................... 291
Conguring Dynamic ARP Inspection................................................................................................................... 292
Source Address Validation............................................................................................................................................ 294
Enabling IP Source Address Validation..................................................................................................................294
DHCP MAC Source Address Validation................................................................................................................ 295
Enabling IP+MAC Source Address Validation.......................................................................................................295
Viewing the Number of SAV Dropped Packets................................................................................................... 296
Clearing the Number of SAV Dropped Packets...................................................................................................296
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 297
ECMP for Flow-Based Anity..................................................................................................................................... 297
Conguring the Hash Algorithm.............................................................................................................................297
Enabling Deterministic ECMP Next Hop...............................................................................................................297
Conguring the Hash Algorithm Seed.................................................................................................................. 298
Link Bundle Monitoring................................................................................................................................................. 298
Managing ECMP Group Paths...............................................................................................................................299
Creating an ECMP Group Bundle..........................................................................................................................299
Modifying the ECMP Group Threshold................................................................................................................ 299
14 FIPS Cryptography................................................................................................................................... 301
Conguration Tasks........................................................................................................................................................301
Preparing the System.................................................................................................................................................... 301
Enabling FIPS Mode...................................................................................................................................................... 302
Generating Host-Keys...................................................................................................................................................302
Monitoring FIPS Mode Status......................................................................................................................................302
Disabling FIPS Mode..................................................................................................................................................... 303
15 Force10 Resilient Ring Protocol (FRRP)...................................................................................................304
Contents
9