Concept Guide

Debugging the DHCP Server................................................................................................................................. 270
Using DHCP Clear Commands...............................................................................................................................270
Congure the System to be a Relay Agent.................................................................................................................270
Congure the System to be a DHCP Client............................................................................................................... 272
Conguring the DHCP Client System................................................................................................................... 272
DHCP Client on a Management Interface............................................................................................................ 273
DHCP Client Operation with Other Features....................................................................................................... 274
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................ 275
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 275
Non-default VRF conguration for DHCPv6 helper address................................................................................... 276
Conguring DHCP relay source interface................................................................................................................... 277
Global DHCP relay source IPv4 or IPv6 conguration ........................................................................................277
Interface level DHCP relay source IPv4 or IPv6 conguration .......................................................................... 277
Congure the System for User Port Stacking (Option 230)....................................................................................279
Congure Secure DHCP............................................................................................................................................... 279
Option 82.................................................................................................................................................................. 279
DHCPv6 relay agent options..................................................................................................................................280
DHCP Snooping.......................................................................................................................................................280
Drop DHCP Packets on Snooped VLANs Only....................................................................................................285
Dynamic ARP Inspection........................................................................................................................................ 285
Conguring Dynamic ARP Inspection................................................................................................................... 286
Source Address Validation.............................................................................................................................................287
Enabling IP Source Address Validation.................................................................................................................. 287
DHCP MAC Source Address Validation................................................................................................................ 288
Enabling IP+MAC Source Address Validation.......................................................................................................288
Viewing the Number of SAV Dropped Packets....................................................................................................289
Clearing the Number of SAV Dropped Packets................................................................................................... 289
13 Equal Cost Multi-Path (ECMP)................................................................................................................290
ECMP for Flow-Based Anity.....................................................................................................................................290
Conguring the Hash Algorithm............................................................................................................................ 290
Enabling Deterministic ECMP Next Hop.............................................................................................................. 290
Conguring the Hash Algorithm Seed................................................................................................................... 291
Link Bundle Monitoring.................................................................................................................................................. 291
Managing ECMP Group Paths...............................................................................................................................292
Creating an ECMP Group Bundle..........................................................................................................................292
Modifying the ECMP Group Threshold.................................................................................................................292
14 FIPS Cryptography...................................................................................................................................294
Conguration Tasks....................................................................................................................................................... 294
Preparing the System....................................................................................................................................................294
Enabling FIPS Mode......................................................................................................................................................295
Generating Host-Keys...................................................................................................................................................295
Monitoring FIPS Mode Status..................................................................................................................................... 295
Disabling FIPS Mode..................................................................................................................................................... 296
Contents
9