Users Guide

Enabling IP Source Address Validation...................................................................................................................331
DHCP MAC Source Address Validation................................................................................................................ 332
Enabling IP+MAC Source Address Validation.......................................................................................................332
Viewing the Number of SAV Dropped Packets....................................................................................................333
Clearing the Number of SAV Dropped Packets................................................................................................... 333
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 334
ECMP for Flow-Based Anity.....................................................................................................................................334
Conguring the Hash Algorithm............................................................................................................................ 334
Enabling Deterministic ECMP Next Hop.............................................................................................................. 334
Conguring the Hash Algorithm Seed.................................................................................................................. 335
Link Bundle Monitoring................................................................................................................................................. 335
Managing ECMP Group Paths...............................................................................................................................336
Creating an ECMP Group Bundle..........................................................................................................................336
Modifying the ECMP Group Threshold.................................................................................................................336
RTAG7............................................................................................................................................................................. 337
Flow-based Hashing for ECMP................................................................................................................................... 338
15 FIP Snooping............................................................................................................................................ 341
Fibre Channel over Ethernet.........................................................................................................................................341
Ensure Robustness in a Converged Ethernet Network.............................................................................................341
FIP Snooping on Ethernet Bridges.............................................................................................................................. 343
FIP Snooping in a Switch Stack...................................................................................................................................345
Using FIP Snooping....................................................................................................................................................... 345
FIP Snooping Prerequisites.....................................................................................................................................345
Important Points to Remember............................................................................................................................. 345
Enabling the FCoE Transit Feature........................................................................................................................346
Enable FIP Snooping on VLANs.............................................................................................................................347
Congure the FC-MAP Value.................................................................................................................................347
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 347
Congure a Port for a Bridge-to-FCF Link...........................................................................................................347
Impact on Other Software Features......................................................................................................................347
FIP Snooping Restrictions...................................................................................................................................... 348
Conguring FIP Snooping.......................................................................................................................................348
Displaying FIP Snooping Information...........................................................................................................................349
FCoE Transit Conguration Example...........................................................................................................................354
16 Flex Hash and Optimized Boot-Up............................................................................................................356
Flex Hash Capability Overview.................................................................................................................................... 356
Conguring the Flex Hash Mechanism.......................................................................................................................356
Conguring Fast Boot and LACP Fast Switchover................................................................................................... 357
Optimizing the Boot Time.............................................................................................................................................357
Booting Process When Optimized Boot Time Mechanism is Enabled.............................................................. 357
Guidelines for Conguring Optimized Booting Mechanism................................................................................358
Interoperation of Applications with Fast Boot and System States..........................................................................359
LACP and IPv4 Routing.......................................................................................................................................... 359
Contents
11