Users Guide

Specifying a Default Gateway................................................................................................................................ 243
Congure a Method of Hostname Resolution......................................................................................................243
Using DNS for Address Resolution........................................................................................................................ 243
Using NetBIOS WINS for Address Resolution......................................................................................................244
Creating Manual Binding Entries............................................................................................................................244
Debugging the DHCP Server................................................................................................................................. 244
Using DHCP Clear Commands...............................................................................................................................245
Congure the System to be a Relay Agent................................................................................................................ 245
Congure the System to be a DHCP Client............................................................................................................... 247
Conguring the DHCP Client System................................................................................................................... 247
DHCP Client on a Management Interface............................................................................................................ 248
DHCP Client Operation with Other Features.......................................................................................................249
Congure the System for User Port Stacking (Option 230)................................................................................... 250
Congure Secure DHCP...............................................................................................................................................250
Option 82..................................................................................................................................................................250
DHCP Snooping........................................................................................................................................................251
Drop DHCP Packets on Snooped VLANs Only....................................................................................................254
Dynamic ARP Inspection........................................................................................................................................ 255
Conguring Dynamic ARP Inspection................................................................................................................... 256
Source Address Validation.............................................................................................................................................257
Enabling IP Source Address Validation.................................................................................................................. 257
DHCP MAC Source Address Validation................................................................................................................ 258
Enabling IP+MAC Source Address Validation.......................................................................................................258
Viewing the Number of SAV Dropped Packets................................................................................................... 259
Clearing the Number of SAV Dropped Packets...................................................................................................259
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 260
ECMP for Flow-Based Anity.....................................................................................................................................260
Conguring the Hash Algorithm............................................................................................................................ 260
Enabling Deterministic ECMP Next Hop.............................................................................................................. 260
Conguring the Hash Algorithm Seed................................................................................................................... 261
Link Bundle Monitoring.................................................................................................................................................. 261
Managing ECMP Group Paths...............................................................................................................................262
Creating an ECMP Group Bundle.......................................................................................................................... 262
Modifying the ECMP Group Threshold.................................................................................................................262
14 FIPS Cryptography...................................................................................................................................264
Conguration Tasks....................................................................................................................................................... 264
Preparing the System....................................................................................................................................................264
Enabling FIPS Mode......................................................................................................................................................265
Generating Host-Keys...................................................................................................................................................265
Monitoring FIPS Mode Status..................................................................................................................................... 265
Disabling FIPS Mode..................................................................................................................................................... 266
15 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 267
Protocol Overview......................................................................................................................................................... 267
Contents
9