Concept Guide

Drop DHCP Packets on Snooped VLANs Only....................................................................................................332
Dynamic ARP Inspection.........................................................................................................................................333
Conguring Dynamic ARP Inspection................................................................................................................... 333
Source Address Validation............................................................................................................................................ 335
Enabling IP Source Address Validation..................................................................................................................335
DHCP MAC Source Address Validation................................................................................................................ 336
Enabling IP+MAC Source Address Validation.......................................................................................................336
Viewing the Number of SAV Dropped Packets....................................................................................................337
Clearing the Number of SAV Dropped Packets................................................................................................... 337
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 338
ECMP for Flow-Based Anity.....................................................................................................................................338
Conguring the Hash Algorithm............................................................................................................................ 338
Enabling Deterministic ECMP Next Hop.............................................................................................................. 338
Conguring the Hash Algorithm Seed.................................................................................................................. 339
Link Bundle Monitoring................................................................................................................................................. 339
Managing ECMP Group Paths...............................................................................................................................340
Creating an ECMP Group Bundle..........................................................................................................................340
Modifying the ECMP Group Threshold.................................................................................................................340
RTAG7..............................................................................................................................................................................341
Flow-based Hashing for ECMP....................................................................................................................................342
15 FIP Snooping............................................................................................................................................345
Fibre Channel over Ethernet........................................................................................................................................ 345
Ensure Robustness in a Converged Ethernet Network............................................................................................345
FIP Snooping on Ethernet Bridges.............................................................................................................................. 347
FIP Snooping in a Switch Stack...................................................................................................................................349
Using FIP Snooping....................................................................................................................................................... 349
FIP Snooping Prerequisites.....................................................................................................................................349
Important Points to Remember............................................................................................................................. 349
Enabling the FCoE Transit Feature........................................................................................................................350
Enable FIP Snooping on VLANs..............................................................................................................................351
Congure the FC-MAP Value................................................................................................................................. 351
Congure a Port for a Bridge-to-Bridge Link........................................................................................................351
Congure a Port for a Bridge-to-FCF Link............................................................................................................351
Impact on Other Software Features...................................................................................................................... 351
FIP Snooping Restrictions...................................................................................................................................... 352
Conguring FIP Snooping.......................................................................................................................................352
Displaying FIP Snooping Information...........................................................................................................................353
FCoE Transit Conguration Example.......................................................................................................................... 358
16 Flex Hash and Optimized Boot-Up............................................................................................................360
Flex Hash Capability Overview.................................................................................................................................... 360
Conguring the Flex Hash Mechanism.......................................................................................................................360
Conguring Fast Boot and LACP Fast Switchover....................................................................................................361
Optimizing the Boot Time............................................................................................................................................. 361
Contents
11