Users Guide
Clearing the Number of SAV Dropped Packets........................................................................................................ 300
15 Equal Cost Multi-Path (ECMP).................................................................................. 301
ECMP for Flow-Based Anity........................................................................................................................................ 301
Conguring the Hash Algorithm................................................................................................................................301
Enabling Deterministic ECMP Next Hop................................................................................................................... 301
Conguring the Hash Algorithm Seed.......................................................................................................................301
Link Bundle Monitoring...................................................................................................................................................302
Managing ECMP Group Paths................................................................................................................................. 302
Creating an ECMP Group Bundle............................................................................................................................. 303
Modifying the ECMP Group Threshold.................................................................................................................... 303
16 FCoE Transit..............................................................................................................305
Fibre Channel over Ethernet.......................................................................................................................................... 305
Ensure Robustness in a Converged Ethernet Network.................................................................................................. 305
FIP Snooping on Ethernet Bridges................................................................................................................................. 306
FIP Snooping in a Switch Stack......................................................................................................................................308
Using FIP Snooping........................................................................................................................................................308
FIP Snooping Prerequisites...................................................................................................................................... 308
Important Points to Remember................................................................................................................................309
Enabling the FCoE Transit Feature...........................................................................................................................309
Enable FIP Snooping on VLANs................................................................................................................................ 310
Congure the FC-MAP Value................................................................................................................................... 310
Congure a Port for a Bridge-to-Bridge Link.............................................................................................................310
Congure a Port for a Bridge-to-FCF Link................................................................................................................ 310
Impact on Other Software Features......................................................................................................................... 310
FIP Snooping Restrictions..........................................................................................................................................311
Conguring FIP Snooping.......................................................................................................................................... 311
Displaying FIP Snooping Information............................................................................................................................... 312
FCoE Transit Conguration Example............................................................................................................................... 317
17 FIPS Cryptography..................................................................................................... 319
Conguration Tasks.........................................................................................................................................................319
Preparing the System..................................................................................................................................................... 319
Enabling FIPS Mode........................................................................................................................................................319
Generating Host-Keys....................................................................................................................................................320
Monitoring FIPS Mode Status........................................................................................................................................320
Disabling FIPS Mode....................................................................................................................................................... 321
18 Force10 Resilient Ring Protocol (FRRP).....................................................................322
Protocol Overview..........................................................................................................................................................322
Ring Status.............................................................................................................................................................. 322
Multiple FRRP Rings................................................................................................................................................ 323
Important FRRP Points............................................................................................................................................ 323
Important FRRP Concepts....................................................................................................................................... 324
Implementing FRRP....................................................................................................................................................... 325
11










