Concept Guide

Congure the System to be a DHCP Server.............................................................................................................. 321
Conguring the Server for Automatic Address Allocation..................................................................................322
Specifying a Default Gateway................................................................................................................................ 323
Congure a Method of Hostname Resolution......................................................................................................324
Using DNS for Address Resolution........................................................................................................................ 324
Using NetBIOS WINS for Address Resolution......................................................................................................324
Creating Manual Binding Entries............................................................................................................................324
Debugging the DHCP Server.................................................................................................................................325
Using DHCP Clear Commands.............................................................................................................................. 325
Congure the System to be a Relay Agent................................................................................................................ 325
Congure the System to be a DHCP Client............................................................................................................... 327
Conguring the DHCP Client System................................................................................................................... 327
DHCP Client on a Management Interface............................................................................................................329
DHCP Client Operation with Other Features.......................................................................................................329
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................ 330
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 330
Non-default VRF conguration for DHCPv6 helper address....................................................................................331
Conguring DHCP relay source interface...................................................................................................................332
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 332
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................332
Congure the System for User Port Stacking (Option 230)....................................................................................334
Congure Secure DHCP............................................................................................................................................... 334
Option 82..................................................................................................................................................................334
DHCPv6 relay agent options..................................................................................................................................335
DHCP Snooping.......................................................................................................................................................335
Drop DHCP Packets on Snooped VLANs Only....................................................................................................340
Dynamic ARP Inspection........................................................................................................................................ 340
Conguring Dynamic ARP Inspection....................................................................................................................341
Source Address Validation............................................................................................................................................ 343
Enabling IP Source Address Validation.................................................................................................................. 343
DHCP MAC Source Address Validation................................................................................................................ 344
Enabling IP+MAC Source Address Validation.......................................................................................................344
Viewing the Number of SAV Dropped Packets................................................................................................... 345
Clearing the Number of SAV Dropped Packets...................................................................................................345
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 346
ECMP for Flow-Based Anity.....................................................................................................................................346
Conguring the Hash Algorithm............................................................................................................................ 346
Enabling Deterministic ECMP Next Hop.............................................................................................................. 346
Conguring the Hash Algorithm Seed...................................................................................................................347
Link Bundle Monitoring..................................................................................................................................................347
Managing ECMP Group Paths...............................................................................................................................348
Creating an ECMP Group Bundle..........................................................................................................................348
Modifying the ECMP Group Threshold.................................................................................................................348
RTAG7.............................................................................................................................................................................349
Flow-based Hashing for ECMP................................................................................................................................... 350
10
Contents