Administrator Guide

Flow-based Hashing for ECMP....................................................................................................................................315
15 FIP Snooping............................................................................................................................................ 318
Fibre Channel over Ethernet.........................................................................................................................................318
Ensure Robustness in a Converged Ethernet Network............................................................................................ 318
FIP Snooping on Ethernet Bridges..............................................................................................................................320
FIP Snooping in a Switch Stack...................................................................................................................................322
Using FIP Snooping....................................................................................................................................................... 322
FIP Snooping Prerequisites.................................................................................................................................... 322
Important Points to Remember............................................................................................................................. 322
Enabling the FCoE Transit Feature....................................................................................................................... 323
Enable FIP Snooping on VLANs.............................................................................................................................324
Configure the FC-MAP Value................................................................................................................................ 324
Configure a Port for a Bridge-to-Bridge Link.......................................................................................................324
Configure a Port for a Bridge-to-FCF Link.......................................................................................................... 324
Impact on Other Software Features.....................................................................................................................324
FIP Snooping Restrictions...................................................................................................................................... 325
Configuring FIP Snooping.......................................................................................................................................325
Displaying FIP Snooping Information...........................................................................................................................326
FCoE Transit Configuration Example...........................................................................................................................331
16 Flex Hash and Optimized Boot-Up........................................................................................................... 333
Flex Hash Capability Overview.................................................................................................................................... 333
Configuring the Flex Hash Mechanism.......................................................................................................................333
Configuring Fast Boot and LACP Fast Switchover...................................................................................................334
Optimizing the Boot Time.............................................................................................................................................334
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................334
Guidelines for Configuring Optimized Booting Mechanism............................................................................... 335
Interoperation of Applications with Fast Boot and System States.........................................................................336
LACP and IPv4 Routing.......................................................................................................................................... 336
LACP and IPv6 Routing..........................................................................................................................................336
BGP Graceful Restart............................................................................................................................................. 337
Cold Boot Caused by Power Cycling the System............................................................................................... 337
Unexpected Reload of the System........................................................................................................................337
Software Upgrade................................................................................................................................................... 337
LACP Fast Switchover............................................................................................................................................337
Changes to BGP Multipath.................................................................................................................................... 338
Delayed Installation of ECMP Routes Into BGP.................................................................................................. 338
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 338
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.....................................................................................339
17 FIPS Cryptography...................................................................................................................................340
Configuration Tasks...................................................................................................................................................... 340
Preparing the System................................................................................................................................................... 340
Enabling FIPS Mode.......................................................................................................................................................341
Generating Host-Keys................................................................................................................................................... 341
Contents
11