Users Guide
Using DNS for Address Resolution........................................................................................................................ 274
Using NetBIOS WINS for Address Resolution......................................................................................................275
Creating Manual Binding Entries............................................................................................................................275
Debugging the DHCP Server................................................................................................................................. 275
Using DHCP Clear Commands...............................................................................................................................276
Congure the System to be a Relay Agent.................................................................................................................276
Congure the System to be a DHCP Client................................................................................................................277
DHCP Client Operation with Other Features....................................................................................................... 278
DHCP Client on a Management Interface............................................................................................................ 279
Congure the System for User Port Stacking (Option 230)....................................................................................279
Congure Secure DHCP............................................................................................................................................... 280
Option 82..................................................................................................................................................................280
DHCP Snooping........................................................................................................................................................281
Conguring the DHCP secondary-subnet............................................................................................................284
Drop DHCP Packets on Snooped VLANs Only....................................................................................................284
Dynamic ARP Inspection........................................................................................................................................ 285
Conguring Dynamic ARP Inspection................................................................................................................... 286
Source Address Validation.............................................................................................................................................287
Enabling IP Source Address Validation.................................................................................................................. 287
DHCP MAC Source Address Validation................................................................................................................ 288
Enabling IP+MAC Source Address Validation.......................................................................................................288
Viewing the Number of SAV Dropped Packets....................................................................................................289
Clearing the Number of SAV Dropped Packets...................................................................................................289
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 290
ECMP for Flow-Based Anity.....................................................................................................................................290
Conguring the Hash Algorithm............................................................................................................................ 290
Enabling Deterministic ECMP Next Hop.............................................................................................................. 290
Conguring the Hash Algorithm Seed................................................................................................................... 291
Link Bundle Monitoring.................................................................................................................................................. 291
Managing ECMP Group Paths...............................................................................................................................292
Creating an ECMP Group Bundle.......................................................................................................................... 292
Modifying the ECMP Group Threshold.................................................................................................................292
RTAG7.............................................................................................................................................................................293
Flow-based Hashing for ECMP................................................................................................................................... 294
15 FIP Snooping............................................................................................................................................ 297
Fibre Channel over Ethernet........................................................................................................................................ 297
Ensure Robustness in a Converged Ethernet Network............................................................................................ 297
FIP Snooping on Ethernet Bridges..............................................................................................................................299
FIP Snooping in a Switch Stack...................................................................................................................................300
Using FIP Snooping........................................................................................................................................................301
FIP Snooping Prerequisites..................................................................................................................................... 301
Important Points to Remember.............................................................................................................................. 301
Enabling the FCoE Transit Feature........................................................................................................................302
Enable FIP Snooping on VLANs.............................................................................................................................302
Congure the FC-MAP Value................................................................................................................................ 303
10
Contents










