Administrator Guide

Configuring the Hash Algorithm Seed.......................................................................................................................301
Link Bundle Monitoring.....................................................................................................................................................302
Managing ECMP Group Paths.................................................................................................................................. 302
Creating an ECMP Group Bundle............................................................................................................................. 303
Modifying the ECMP Group Threshold.................................................................................................................... 303
RTAG7................................................................................................................................................................................ 304
Flow-based Hashing for ECMP.......................................................................................................................................305
15 FIP Snooping.......................................................................................................................... 308
Fibre Channel over Ethernet............................................................................................................................................308
Ensure Robustness in a Converged Ethernet Network............................................................................................... 308
FIP Snooping on Ethernet Bridges..................................................................................................................................309
FIP Snooping in a Switch Stack........................................................................................................................................311
Using FIP Snooping............................................................................................................................................................ 311
FIP Snooping Prerequisites..........................................................................................................................................311
Important Points to Remember.................................................................................................................................. 311
Enabling the FCoE Transit Feature............................................................................................................................312
Enable FIP Snooping on VLANs................................................................................................................................. 312
Configure the FC-MAP Value.....................................................................................................................................313
Configure a Port for a Bridge-to-Bridge Link........................................................................................................... 313
Configure a Port for a Bridge-to-FCF Link...............................................................................................................313
Impact on Other Software Features..........................................................................................................................313
FIP Snooping Restrictions...........................................................................................................................................313
Configuring FIP Snooping........................................................................................................................................... 314
Displaying FIP Snooping Information............................................................................................................................... 314
FCoE Transit Configuration Example.............................................................................................................................. 319
16 Flex Hash and Optimized Boot-Up............................................................................................. 321
Flex Hash Capability Overview.........................................................................................................................................321
Configuring the Flex Hash Mechanism........................................................................................................................... 321
Configuring Fast Boot and LACP Fast Switchover...................................................................................................... 322
Optimizing the Boot Time................................................................................................................................................ 322
Interoperation of Applications with Fast Boot and System States.............................................................................323
RDMA Over Converged Ethernet (RoCE) Overview...................................................................................................325
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces........................................................................................ 326
17 FIPS Cryptography.................................................................................................................. 327
Configuration Tasks.......................................................................................................................................................... 327
Preparing the System....................................................................................................................................................... 327
Enabling FIPS Mode..........................................................................................................................................................327
Generating Host-Keys...................................................................................................................................................... 328
Monitoring FIPS Mode Status......................................................................................................................................... 328
Disabling FIPS Mode......................................................................................................................................................... 328
18 Force10 Resilient Ring Protocol (FRRP).................................................................................... 330
Protocol Overview............................................................................................................................................................ 330
Ring Status....................................................................................................................................................................331
Multiple FRRP Rings.................................................................................................................................................... 331
Important FRRP Points...............................................................................................................................................332
10
Contents