Reference Guide

Using NetBIOS WINS for Address Resolution............................................................................ 327
Creating Manual Binding Entries................................................................................................ 328
Debugging the DHCP Server......................................................................................................328
Using DHCP Clear Commands.................................................................................................. 328
Configure the System to be a Relay Agent......................................................................................329
Configure the System to be a DHCP Client.....................................................................................331
DHCP Client Operation with Other Features.............................................................................331
DHCP Client on a Management Interface................................................................................. 332
Configure the System for User Port Stacking (Option 230)............................................................333
Configure Secure DHCP...................................................................................................................333
Option 82.................................................................................................................................... 333
DHCP Snooping..........................................................................................................................334
Drop DHCP Packets on Snooped VLANs Only..........................................................................336
Dynamic ARP Inspection............................................................................................................ 336
Configuring Dynamic ARP Inspection........................................................................................338
Source Address Validation................................................................................................................339
Enabling IP Source Address Validation.......................................................................................339
DHCP MAC Source Address Validation......................................................................................339
Enabling IP+MAC Source Address Validation............................................................................340
15 Equal Cost Multi-Path (ECMP).........................................................................341
ECMP for Flow-Based Affinity...........................................................................................................341
Configuring the Hash Algorithm.................................................................................................341
Enabling Deterministic ECMP Next Hop.................................................................................... 341
Configuring the Hash Algorithm Seed....................................................................................... 342
Link Bundle Monitoring.................................................................................................................... 342
Managing ECMP Group Paths.................................................................................................... 343
Creating an ECMP Group Bundle...............................................................................................344
Modifying the ECMP Group Threshold......................................................................................344
16 FCoE Transit.........................................................................................................347
Fibre Channel over Ethernet.............................................................................................................347
Ensure Robustness in a Converged Ethernet Network................................................................... 347
FIP Snooping on Ethernet Bridges................................................................................................... 349
FIP Snooping in a Switch Stack.........................................................................................................351
Using FIP Snooping........................................................................................................................... 351
FIP Snooping Prerequisites..........................................................................................................351
Important Points to Remember..................................................................................................352
Enabling the FCoE Transit Feature............................................................................................. 352
Enable FIP Snooping on VLANs.................................................................................................. 353
Configure the FC-MAP Value..................................................................................................... 353
Configure a Port for a Bridge-to-Bridge Link............................................................................ 353