Service Manual

Table Of Contents
Source Address Validation............................................................................................................................................308
Enabling IP Source Address Validation................................................................................................................ 309
DHCP MAC Source Address Validation...............................................................................................................309
Enabling IP+MAC Source Address Validation.................................................................................................... 309
Viewing the Number of SAV Dropped Packets.................................................................................................. 310
Clearing the Number of SAV Dropped Packets................................................................................................. 310
Chapter 14: Equal Cost Multi-Path (ECMP)................................................................................ 311
ECMP for Flow-Based Affinity......................................................................................................................................311
Configuring the Hash Algorithm Seed................................................................................................................... 311
Link Bundle Monitoring................................................................................................................................................... 311
Managing ECMP Group Paths................................................................................................................................312
Creating an ECMP Group Bundle.......................................................................................................................... 312
Modifying the ECMP Group Threshold................................................................................................................ 313
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table...............................313
Support for ECMP in host table.............................................................................................................................313
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes .................................................................... 314
RTAG7.......................................................................................................................................................................... 314
Flow-based Hashing for ECMP.............................................................................................................................. 315
Chapter 15: FIP Snooping...........................................................................................................318
Fibre Channel over Ethernet.........................................................................................................................................318
Ensure Robustness in a Converged Ethernet Network..........................................................................................318
FIP Snooping on Ethernet Bridges.............................................................................................................................. 319
Using FIP Snooping......................................................................................................................................................... 321
FIP Snooping Prerequisites......................................................................................................................................321
Important Points to Remember..............................................................................................................................321
Enabling the FCoE Transit Feature.......................................................................................................................322
Enable FIP Snooping on VLANs.............................................................................................................................322
Configure the FC-MAP Value................................................................................................................................ 323
Configure a Port for a Bridge-to-Bridge Link.....................................................................................................323
Configure a Port for a Bridge-to-FCF Link.........................................................................................................323
Impact on Other Software Features.................................................................................................................... 323
FIP Snooping Restrictions.......................................................................................................................................324
Configuring FIP Snooping....................................................................................................................................... 324
Displaying FIP Snooping Information..........................................................................................................................324
FCoE Transit Configuration Example......................................................................................................................... 329
Chapter 16: Flex Hash and Optimized Boot-Up........................................................................... 331
Flex Hash Capability Overview..................................................................................................................................... 331
Configuring the Flex Hash Mechanism.......................................................................................................................331
Configuring Fast Boot and LACP Fast Switchover................................................................................................ 332
Optimizing the Boot Time............................................................................................................................................. 332
Interoperation of Applications with Fast Boot and System States.....................................................................333
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 336
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 336
Chapter 17: Force10 Resilient Ring Protocol (FRRP)..................................................................338
Protocol Overview.......................................................................................................................................................... 338
10
Contents