Concept Guide

15 FIP Snooping............................................................................................................................................342
Fibre Channel over Ethernet........................................................................................................................................ 342
Ensure Robustness in a Converged Ethernet Network............................................................................................ 342
FIP Snooping on Ethernet Bridges.............................................................................................................................. 344
FIP Snooping in a Switch Stack...................................................................................................................................346
Using FIP Snooping....................................................................................................................................................... 346
FIP Snooping Prerequisites.....................................................................................................................................346
Important Points to Remember............................................................................................................................. 346
Enabling the FCoE Transit Feature........................................................................................................................ 347
Enable FIP Snooping on VLANs.............................................................................................................................348
Congure the FC-MAP Value................................................................................................................................ 348
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................348
Congure a Port for a Bridge-to-FCF Link...........................................................................................................348
Impact on Other Software Features..................................................................................................................... 348
FIP Snooping Restrictions...................................................................................................................................... 349
Conguring FIP Snooping.......................................................................................................................................349
Displaying FIP Snooping Information...........................................................................................................................350
FCoE Transit Conguration Example.......................................................................................................................... 355
16 FIPS Cryptography...................................................................................................................................357
Conguration Tasks....................................................................................................................................................... 357
Preparing the System....................................................................................................................................................357
Enabling FIPS Mode......................................................................................................................................................358
Generating Host-Keys...................................................................................................................................................358
Monitoring FIPS Mode Status..................................................................................................................................... 358
Disabling FIPS Mode..................................................................................................................................................... 359
17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 360
Protocol Overview.........................................................................................................................................................360
Ring Status................................................................................................................................................................361
Multiple FRRP Rings................................................................................................................................................ 361
Important FRRP Points...........................................................................................................................................362
Important FRRP Concepts..................................................................................................................................... 363
Implementing FRRP.......................................................................................................................................................364
FRRP Conguration...................................................................................................................................................... 364
Creating the FRRP Group.......................................................................................................................................364
Conguring the Control VLAN...............................................................................................................................365
Conguring and Adding the Member VLANs...................................................................................................... 366
Setting the FRRP Timers........................................................................................................................................367
Clearing the FRRP Counters.................................................................................................................................. 367
Viewing the FRRP Conguration........................................................................................................................... 367
Viewing the FRRP Information...............................................................................................................................367
Troubleshooting FRRP.................................................................................................................................................. 368
Conguration Checks..............................................................................................................................................368
Sample Conguration and Topology............................................................................................................................368
Contents
11