Users Guide

Congure the System to be a DHCP Server..............................................................................................................243
Conguring the Server for Automatic Address Allocation..................................................................................244
Specifying a Default Gateway................................................................................................................................ 245
Congure a Method of Hostname Resolution..................................................................................................... 245
Using DNS for Address Resolution........................................................................................................................245
Using NetBIOS WINS for Address Resolution..................................................................................................... 246
Creating Manual Binding Entries............................................................................................................................246
Debugging the DHCP Server................................................................................................................................. 246
Using DHCP Clear Commands...............................................................................................................................247
Congure the System to be a Relay Agent.................................................................................................................247
Congure the System to be a DHCP Client............................................................................................................... 249
Conguring the DHCP Client System................................................................................................................... 249
DHCP Client on a Management Interface............................................................................................................250
DHCP Client Operation with Other Features........................................................................................................251
Congure the System for User Port Stacking (Option 230)....................................................................................252
Congure Secure DHCP............................................................................................................................................... 252
Option 82..................................................................................................................................................................252
DHCP Snooping.......................................................................................................................................................253
Drop DHCP Packets on Snooped VLANs Only....................................................................................................256
Dynamic ARP Inspection.........................................................................................................................................257
Conguring Dynamic ARP Inspection................................................................................................................... 258
Source Address Validation............................................................................................................................................ 259
Enabling IP Source Address Validation..................................................................................................................259
DHCP MAC Source Address Validation................................................................................................................ 260
Enabling IP+MAC Source Address Validation.......................................................................................................260
Viewing the Number of SAV Dropped Packets.................................................................................................... 261
Clearing the Number of SAV Dropped Packets....................................................................................................261
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 262
ECMP for Flow-Based Anity.....................................................................................................................................262
Conguring the Hash Algorithm............................................................................................................................ 262
Enabling Deterministic ECMP Next Hop.............................................................................................................. 262
Conguring the Hash Algorithm Seed.................................................................................................................. 263
Link Bundle Monitoring................................................................................................................................................. 263
Managing ECMP Group Paths...............................................................................................................................264
Creating an ECMP Group Bundle..........................................................................................................................264
Modifying the ECMP Group Threshold.................................................................................................................264
14 FIPS Cryptography...................................................................................................................................266
Conguration Tasks....................................................................................................................................................... 266
Preparing the System....................................................................................................................................................266
Enabling FIPS Mode...................................................................................................................................................... 267
Generating Host-Keys................................................................................................................................................... 267
Monitoring FIPS Mode Status......................................................................................................................................267
Disabling FIPS Mode..................................................................................................................................................... 268
Contents
9