Concept Guide

Modifying the ECMP Group Threshold................................................................................................................ 350
RTAG7..............................................................................................................................................................................351
Flow-based Hashing for ECMP................................................................................................................................... 352
15 FIP Snooping............................................................................................................................................355
Fibre Channel over Ethernet........................................................................................................................................355
Ensure Robustness in a Converged Ethernet Network............................................................................................355
FIP Snooping on Ethernet Bridges.............................................................................................................................. 357
FIP Snooping in a Switch Stack...................................................................................................................................359
Using FIP Snooping....................................................................................................................................................... 359
FIP Snooping Prerequisites.....................................................................................................................................359
Important Points to Remember............................................................................................................................. 359
Enabling the FCoE Transit Feature........................................................................................................................360
Enable FIP Snooping on VLANs............................................................................................................................. 361
Congure the FC-MAP Value................................................................................................................................. 361
Congure a Port for a Bridge-to-Bridge Link........................................................................................................361
Congure a Port for a Bridge-to-FCF Link............................................................................................................361
Impact on Other Software Features...................................................................................................................... 361
FIP Snooping Restrictions...................................................................................................................................... 362
Conguring FIP Snooping.......................................................................................................................................362
Displaying FIP Snooping Information...........................................................................................................................363
FCoE Transit Conguration Example...........................................................................................................................368
16 Flex Hash and Optimized Boot-Up............................................................................................................370
Flex Hash Capability Overview.....................................................................................................................................370
Conguring the Flex Hash Mechanism....................................................................................................................... 370
Conguring Fast Boot and LACP Fast Switchover....................................................................................................371
Optimizing the Boot Time..............................................................................................................................................371
Booting Process When Optimized Boot Time Mechanism is Enabled...............................................................371
Guidelines for Conguring Optimized Booting Mechanism................................................................................ 372
Interoperation of Applications with Fast Boot and System States.......................................................................... 373
LACP and IPv4 Routing...........................................................................................................................................373
LACP and IPv6 Routing.......................................................................................................................................... 373
BGP Graceful Restart..............................................................................................................................................374
Cold Boot Caused by Power Cycling the System................................................................................................ 374
Unexpected Reload of the System........................................................................................................................ 374
Software Upgrade....................................................................................................................................................374
LACP Fast Switchover............................................................................................................................................ 374
Changes to BGP Multipath.....................................................................................................................................375
Delayed Installation of ECMP Routes Into BGP...................................................................................................375
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................375
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 376
17 FIPS Cryptography................................................................................................................................... 377
Conguration Tasks........................................................................................................................................................377
Preparing the System....................................................................................................................................................377
Contents
11