Administrator Guide

Congure the System to be a DHCP Server..............................................................................................................247
Conguring the Server for Automatic Address Allocation..................................................................................248
Specifying a Default Gateway................................................................................................................................ 249
Congure a Method of Hostname Resolution......................................................................................................249
Using DNS for Address Resolution........................................................................................................................249
Using NetBIOS WINS for Address Resolution..................................................................................................... 250
Creating Manual Binding Entries............................................................................................................................250
Debugging the DHCP Server.................................................................................................................................250
Using DHCP Clear Commands............................................................................................................................... 251
Congure the System to be a Relay Agent................................................................................................................. 251
Congure the System to be a DHCP Client............................................................................................................... 253
Conguring the DHCP Client System...................................................................................................................253
DHCP Client on a Management Interface............................................................................................................254
DHCP Client Operation with Other Features.......................................................................................................255
Congure the System for User Port Stacking (Option 230)................................................................................... 256
Congure Secure DHCP...............................................................................................................................................256
Option 82..................................................................................................................................................................256
DHCP Snooping....................................................................................................................................................... 257
Drop DHCP Packets on Snooped VLANs Only....................................................................................................260
Dynamic ARP Inspection......................................................................................................................................... 261
Conguring Dynamic ARP Inspection................................................................................................................... 262
Source Address Validation............................................................................................................................................ 263
Enabling IP Source Address Validation.................................................................................................................. 263
DHCP MAC Source Address Validation................................................................................................................ 264
Enabling IP+MAC Source Address Validation.......................................................................................................264
Viewing the Number of SAV Dropped Packets................................................................................................... 265
Clearing the Number of SAV Dropped Packets...................................................................................................265
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 266
ECMP for Flow-Based Anity.....................................................................................................................................266
Conguring the Hash Algorithm............................................................................................................................ 266
Enabling Deterministic ECMP Next Hop.............................................................................................................. 266
Conguring the Hash Algorithm Seed...................................................................................................................267
Link Bundle Monitoring..................................................................................................................................................267
Managing ECMP Group Paths...............................................................................................................................268
Creating an ECMP Group Bundle..........................................................................................................................268
Modifying the ECMP Group Threshold.................................................................................................................268
14 FIPS Cryptography...................................................................................................................................270
Conguration Tasks....................................................................................................................................................... 270
Preparing the System....................................................................................................................................................270
Enabling FIPS Mode....................................................................................................................................................... 271
Generating Host-Keys....................................................................................................................................................271
Monitoring FIPS Mode Status.......................................................................................................................................271
Disabling FIPS Mode......................................................................................................................................................272
Contents
9