Administrator Guide

RTAG7..............................................................................................................................................................................318
Flow-based Hashing for ECMP.................................................................................................................................... 319
15 FIP Snooping............................................................................................................................................322
Fibre Channel over Ethernet........................................................................................................................................ 322
Ensure Robustness in a Converged Ethernet Network............................................................................................ 322
FIP Snooping on Ethernet Bridges.............................................................................................................................. 324
FIP Snooping in a Switch Stack...................................................................................................................................326
Using FIP Snooping....................................................................................................................................................... 326
FIP Snooping Prerequisites.....................................................................................................................................326
Important Points to Remember............................................................................................................................. 326
Enabling the FCoE Transit Feature........................................................................................................................ 327
Enable FIP Snooping on VLANs.............................................................................................................................328
Congure the FC-MAP Value................................................................................................................................ 328
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................328
Congure a Port for a Bridge-to-FCF Link...........................................................................................................328
Impact on Other Software Features..................................................................................................................... 328
FIP Snooping Restrictions...................................................................................................................................... 329
Conguring FIP Snooping.......................................................................................................................................329
Displaying FIP Snooping Information...........................................................................................................................330
FCoE Transit Conguration Example...........................................................................................................................335
16 Flex Hash and Optimized Boot-Up............................................................................................................ 337
Flex Hash Capability Overview.....................................................................................................................................337
Conguring the Flex Hash Mechanism....................................................................................................................... 337
Conguring Fast Boot and LACP Fast Switchover...................................................................................................338
Optimizing the Boot Time.............................................................................................................................................338
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................338
Guidelines for Conguring Optimized Booting Mechanism................................................................................339
Interoperation of Applications with Fast Boot and System States..........................................................................340
LACP and IPv4 Routing.......................................................................................................................................... 340
LACP and IPv6 Routing..........................................................................................................................................340
BGP Graceful Restart.............................................................................................................................................. 341
Cold Boot Caused by Power Cycling the System................................................................................................ 341
Unexpected Reload of the System.........................................................................................................................341
Software Upgrade.................................................................................................................................................... 341
LACP Fast Switchover.............................................................................................................................................341
Changes to BGP Multipath.....................................................................................................................................342
Delayed Installation of ECMP Routes Into BGP...................................................................................................342
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................342
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 343
17 FIPS Cryptography...................................................................................................................................344
Conguration Tasks....................................................................................................................................................... 344
Preparing the System....................................................................................................................................................344
Enabling FIPS Mode...................................................................................................................................................... 345
Contents
11