Administrator Guide

Table Of Contents
13 Dynamic Host Conguration Protocol (DHCP)......................................................................................... 283
DHCP Packet Format and Options............................................................................................................................. 283
Assign an IP Address using DHCP...............................................................................................................................285
Implementation Information..........................................................................................................................................286
Congure the System to be a DHCP Server..............................................................................................................286
Conguring the Server for Automatic Address Allocation.................................................................................. 287
Specifying a Default Gateway................................................................................................................................ 288
Congure a Method of Hostname Resolution..................................................................................................... 288
Using DNS for Address Resolution........................................................................................................................288
Using NetBIOS WINS for Address Resolution..................................................................................................... 289
Creating Manual Binding Entries............................................................................................................................289
Debugging the DHCP Server.................................................................................................................................289
Using DHCP Clear Commands.............................................................................................................................. 290
Congure the System to be a Relay Agent................................................................................................................ 290
Congure the System to be a DHCP Client............................................................................................................... 292
DHCP Client Operation with Other Features.......................................................................................................292
DHCP Client on a Management Interface............................................................................................................293
Congure the System for User Port Stacking (Option 230)....................................................................................294
Congure Secure DHCP...............................................................................................................................................294
Option 82..................................................................................................................................................................294
DHCP Snooping.......................................................................................................................................................295
Conguring the DHCP secondary-subnet............................................................................................................298
Drop DHCP Packets on Snooped VLANs Only....................................................................................................298
Dynamic ARP Inspection........................................................................................................................................ 299
Conguring Dynamic ARP Inspection...................................................................................................................300
Source Address Validation............................................................................................................................................. 301
Enabling IP Source Address Validation...................................................................................................................301
DHCP MAC Source Address Validation................................................................................................................ 302
Enabling IP+MAC Source Address Validation.......................................................................................................302
Viewing the Number of SAV Dropped Packets....................................................................................................303
Clearing the Number of SAV Dropped Packets................................................................................................... 303
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 304
ECMP for Flow-Based Anity.....................................................................................................................................304
Conguring the Hash Algorithm............................................................................................................................ 304
Enabling Deterministic ECMP Next Hop.............................................................................................................. 304
Conguring the Hash Algorithm Seed.................................................................................................................. 305
Link Bundle Monitoring................................................................................................................................................. 305
Managing ECMP Group Paths...............................................................................................................................306
Creating an ECMP Group Bundle..........................................................................................................................306
Modifying the ECMP Group Threshold................................................................................................................ 306
RTAG7............................................................................................................................................................................. 307
Flow-based Hashing for ECMP................................................................................................................................... 308
15 FIP Snooping............................................................................................................................................. 311
10
Contents