Users Guide

Using DNS for Address Resolution................................................................................................................281
Using NetBIOS WINS for Address Resolution.............................................................................................281
Creating Manual Binding Entries................................................................................................................... 281
Debugging the DHCP Server......................................................................................................................... 282
Using DHCP Clear Commands..................................................................................................................... 282
Configure the System to be a Relay Agent.......................................................................................................282
Configure the System to be a DHCP Client.....................................................................................................284
DHCP Client Operation with Other Features.............................................................................................284
DHCP Client on a Management Interface.................................................................................................. 285
Configure the System for User Port Stacking (Option 230)......................................................................... 286
Configure Secure DHCP.......................................................................................................................................286
Option 82...........................................................................................................................................................286
DHCP Snooping................................................................................................................................................287
Configuring the DHCP secondary-subnet................................................................................................. 290
Drop DHCP Packets on Snooped VLANs Only..........................................................................................290
Dynamic ARP Inspection.................................................................................................................................291
Configuring Dynamic ARP Inspection......................................................................................................... 292
Source Address Validation....................................................................................................................................293
Enabling IP Source Address Validation........................................................................................................ 293
DHCP MAC Source Address Validation....................................................................................................... 294
Enabling IP+MAC Source Address Validation............................................................................................ 294
Viewing the Number of SAV Dropped Packets..........................................................................................295
Clearing the Number of SAV Dropped Packets......................................................................................... 295
14 Equal Cost Multi-Path (ECMP)........................................................................................................................296
ECMP for Flow-Based Affinity............................................................................................................................. 296
Configuring the Hash Algorithm...................................................................................................................296
Enabling Deterministic ECMP Next Hop.....................................................................................................296
Configuring the Hash Algorithm Seed.........................................................................................................297
Link Bundle Monitoring.........................................................................................................................................297
Managing ECMP Group Paths....................................................................................................................... 298
Creating an ECMP Group Bundle.................................................................................................................298
Modifying the ECMP Group Threshold....................................................................................................... 298
RTAG7.......................................................................................................................................................................299
Flow-based Hashing for ECMP...........................................................................................................................300
15 FIP Snooping......................................................................................................................................................303
Fibre Channel over Ethernet................................................................................................................................303
Ensure Robustness in a Converged Ethernet Network..................................................................................303
FIP Snooping on Ethernet Bridges..................................................................................................................... 305
FIP Snooping in a Switch Stack........................................................................................................................... 307
Using FIP Snooping................................................................................................................................................307
FIP Snooping Prerequisites.............................................................................................................................307
Important Points to Remember.................................................................................................................... 307
Enabling the FCoE Transit Feature............................................................................................................... 308
Enable FIP Snooping on VLANs.................................................................................................................... 308
Configure the FC-MAP Value........................................................................................................................ 309
9.10(0.0)
10