Users Guide

Applying DCB Policies in a Switch Stack........................................................................................................................ 256
Congure a DCBx Operation..........................................................................................................................................256
DCBx Operation.......................................................................................................................................................256
DCBx Port Roles...................................................................................................................................................... 257
DCB Conguration Exchange...................................................................................................................................258
Conguration Source Election..................................................................................................................................258
Propagation of DCB Information.............................................................................................................................. 259
Auto-Detection and Manual Conguration of the DCBx Version.............................................................................. 259
DCBx Example......................................................................................................................................................... 259
DCBx Prerequisites and Restrictions........................................................................................................................260
Conguring DCBx.................................................................................................................................................... 260
Verifying the DCB Conguration.................................................................................................................................... 264
Sample DCB Conguration.............................................................................................................................................273
PFC and ETS Conguration Command Examples.................................................................................................... 275
QoS dot1p Trac Classication and Queue Assignment.................................................................................................275
Conguring the Dynamic Buer Method........................................................................................................................276
14 Dynamic Host Conguration Protocol (DHCP)...........................................................278
DHCP Packet Format and Options.................................................................................................................................278
Assign an IP Address using DHCP..................................................................................................................................280
Implementation Information............................................................................................................................................280
Congure the System to be a DHCP Server................................................................................................................... 281
Conguring the Server for Automatic Address Allocation..........................................................................................281
Specifying a Default Gateway...................................................................................................................................283
Congure a Method of Hostname Resolution...........................................................................................................283
Using DNS for Address Resolution........................................................................................................................... 283
Using NetBIOS WINS for Address Resolution.......................................................................................................... 283
Creating Manual Binding Entries...............................................................................................................................283
Debugging the DHCP Server................................................................................................................................... 284
Using DHCP Clear Commands................................................................................................................................. 284
Congure the System to be a Relay Agent.....................................................................................................................284
Congure the System to be a DHCP Client....................................................................................................................286
DHCP Client Operation with Other Features............................................................................................................286
DHCP Client on a Management Interface.................................................................................................................287
Congure the System for User Port Stacking (Option 230)........................................................................................... 287
Congure Secure DHCP.................................................................................................................................................288
Option 82.................................................................................................................................................................288
DHCP Snooping....................................................................................................................................................... 288
Conguring the DHCP secondary-subnet.................................................................................................................291
Drop DHCP Packets on Snooped VLANs Only.........................................................................................................292
Dynamic ARP Inspection.......................................................................................................................................... 292
Conguring Dynamic ARP Inspection.......................................................................................................................293
Source Address Validation..............................................................................................................................................294
Enabling IP Source Address Validation......................................................................................................................294
DHCP MAC Source Address Validation....................................................................................................................295
Enabling IP+MAC Source Address Validation........................................................................................................... 295
10