Owners Manual
Ensure Robustness in a Converged Ethernet Network................................................................... 337
FIP Snooping on Ethernet Bridges................................................................................................... 339
FIP Snooping in a Switch Stack.........................................................................................................341
Using FIP Snooping........................................................................................................................... 341
FIP Snooping Prerequisites......................................................................................................... 341
Important Points to Remember................................................................................................. 342
Enabling the FCoE Transit Feature.............................................................................................342
Enable FIP Snooping on VLANs..................................................................................................343
Configure the FC-MAP Value..................................................................................................... 343
Configure a Port for a Bridge-to-Bridge Link............................................................................343
Configure a Port for a Bridge-to-FCF Link................................................................................ 343
Impact on Other Software Features...........................................................................................343
FIP Snooping Restrictions...........................................................................................................344
Configuring FIP Snooping.......................................................................................................... 344
Displaying FIP Snooping Information.............................................................................................. 345
FCoE Transit Configuration Example............................................................................................... 351
17 Enabling FIPS Cryptography.........................................................................353
Configuration Tasks..........................................................................................................................353
Preparing the System........................................................................................................................353
Enabling FIPS Mode.......................................................................................................................... 354
Generating Host-Keys...................................................................................................................... 354
Monitoring FIPS Mode Status........................................................................................................... 355
Disabling FIPS Mode......................................................................................................................... 355
18 Force10 Resilient Ring Protocol (FRRP)..................................................... 357
Protocol Overview............................................................................................................................ 357
Ring Status...................................................................................................................................358
Multiple FRRP Rings.................................................................................................................... 359
Important FRRP Points................................................................................................................359
Important FRRP Concepts..........................................................................................................359
Implementing FRRP...........................................................................................................................361
FRRP Configuration...........................................................................................................................361
Creating the FRRP Group............................................................................................................361
Configuring the Control VLAN................................................................................................... 362
Configuring and Adding the Member VLANs.............................................................................363
Setting the FRRP Timers............................................................................................................. 364
Clearing the FRRP Counters.......................................................................................................365
Viewing the FRRP Configuration................................................................................................365
Viewing the FRRP Information................................................................................................... 365
Troubleshooting FRRP......................................................................................................................366
Configuration Checks.................................................................................................................366










