Setup Guide

Assign an IP Address using DHCP............................................................................................................................... 247
Implementation Information..........................................................................................................................................248
Congure the System to be a DHCP Server..............................................................................................................248
Conguring the Server for Automatic Address Allocation..................................................................................249
Specifying a Default Gateway................................................................................................................................250
Congure a Method of Hostname Resolution..................................................................................................... 250
Using DNS for Address Resolution........................................................................................................................250
Using NetBIOS WINS for Address Resolution...................................................................................................... 251
Creating Manual Binding Entries.............................................................................................................................251
Debugging the DHCP Server..................................................................................................................................251
Using DHCP Clear Commands...............................................................................................................................252
Congure the System to be a Relay Agent................................................................................................................ 252
Congure the System to be a DHCP Client............................................................................................................... 254
Conguring the DHCP Client System...................................................................................................................254
DHCP Client on a Management Interface............................................................................................................255
DHCP Client Operation with Other Features.......................................................................................................256
Congure the System for User Port Stacking (Option 230)....................................................................................257
Congure Secure DHCP............................................................................................................................................... 257
Option 82.................................................................................................................................................................. 257
DHCP Snooping.......................................................................................................................................................258
Drop DHCP Packets on Snooped VLANs Only....................................................................................................263
Dynamic ARP Inspection.........................................................................................................................................263
Conguring Dynamic ARP Inspection................................................................................................................... 264
Source Address Validation............................................................................................................................................ 265
Enabling IP Source Address Validation..................................................................................................................265
DHCP MAC Source Address Validation................................................................................................................ 266
Enabling IP+MAC Source Address Validation.......................................................................................................266
Viewing the Number of SAV Dropped Packets....................................................................................................267
Clearing the Number of SAV Dropped Packets................................................................................................... 267
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 268
ECMP for Flow-Based Anity.....................................................................................................................................268
Conguring the Hash Algorithm............................................................................................................................ 268
Enabling Deterministic ECMP Next Hop.............................................................................................................. 268
Conguring the Hash Algorithm Seed.................................................................................................................. 269
Link Bundle Monitoring................................................................................................................................................. 269
Managing ECMP Group Paths...............................................................................................................................270
Creating an ECMP Group Bundle.......................................................................................................................... 270
Modifying the ECMP Group Threshold.................................................................................................................270
14 FIPS Cryptography................................................................................................................................... 272
Conguration Tasks....................................................................................................................................................... 272
Preparing the System....................................................................................................................................................272
Enabling FIPS Mode...................................................................................................................................................... 273
Generating Host-Keys................................................................................................................................................... 273
Monitoring FIPS Mode Status......................................................................................................................................273
Contents
9