White Papers

Congure the System to be a DHCP Server..............................................................................................................249
Conguring the Server for Automatic Address Allocation..................................................................................250
Specifying a Default Gateway.................................................................................................................................251
Congure a Method of Hostname Resolution...................................................................................................... 251
Using DNS for Address Resolution.........................................................................................................................251
Using NetBIOS WINS for Address Resolution..................................................................................................... 252
Creating Manual Binding Entries............................................................................................................................252
Debugging the DHCP Server................................................................................................................................. 252
Using DHCP Clear Commands.............................................................................................................................. 253
Congure the System to be a Relay Agent................................................................................................................ 253
Congure the System to be a DHCP Client...............................................................................................................255
Conguring the DHCP Client System...................................................................................................................255
DHCP Client on a Management Interface............................................................................................................256
DHCP Client Operation with Other Features....................................................................................................... 257
Congure the System for User Port Stacking (Option 230)....................................................................................258
Congure Secure DHCP...............................................................................................................................................258
Option 82..................................................................................................................................................................258
DHCP Snooping.......................................................................................................................................................259
Drop DHCP Packets on Snooped VLANs Only....................................................................................................264
Dynamic ARP Inspection.........................................................................................................................................264
Conguring Dynamic ARP Inspection................................................................................................................... 265
Source Address Validation............................................................................................................................................ 266
Enabling IP Source Address Validation..................................................................................................................266
DHCP MAC Source Address Validation.................................................................................................................267
Enabling IP+MAC Source Address Validation.......................................................................................................267
Viewing the Number of SAV Dropped Packets....................................................................................................268
Clearing the Number of SAV Dropped Packets................................................................................................... 268
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 269
ECMP for Flow-Based Anity.....................................................................................................................................269
Conguring the Hash Algorithm............................................................................................................................ 269
Enabling Deterministic ECMP Next Hop.............................................................................................................. 269
Conguring the Hash Algorithm Seed...................................................................................................................270
Link Bundle Monitoring..................................................................................................................................................270
Managing ECMP Group Paths................................................................................................................................271
Creating an ECMP Group Bundle...........................................................................................................................271
Modifying the ECMP Group Threshold..................................................................................................................271
14 FIPS Cryptography................................................................................................................................... 273
Conguration Tasks....................................................................................................................................................... 273
Preparing the System....................................................................................................................................................273
Enabling FIPS Mode.......................................................................................................................................................274
Generating Host-Keys................................................................................................................................................... 274
Monitoring FIPS Mode Status......................................................................................................................................274
Disabling FIPS Mode......................................................................................................................................................275
Contents
9