Concept Guide

14 Equal Cost Multi-Path (ECMP)................................................................................................................ 320
ECMP for Flow-Based Anity.....................................................................................................................................320
Conguring the Hash Algorithm............................................................................................................................ 320
Enabling Deterministic ECMP Next Hop.............................................................................................................. 320
Conguring the Hash Algorithm Seed................................................................................................................... 321
Link Bundle Monitoring.................................................................................................................................................. 321
Managing ECMP Group Paths...............................................................................................................................322
Creating an ECMP Group Bundle.......................................................................................................................... 322
Modifying the ECMP Group Threshold.................................................................................................................322
RTAG7............................................................................................................................................................................. 323
Flow-based Hashing for ECMP....................................................................................................................................324
15 FIP Snooping............................................................................................................................................ 327
Fibre Channel over Ethernet.........................................................................................................................................327
Ensure Robustness in a Converged Ethernet Network............................................................................................ 327
FIP Snooping on Ethernet Bridges.............................................................................................................................. 329
FIP Snooping in a Switch Stack....................................................................................................................................331
Using FIP Snooping........................................................................................................................................................ 331
FIP Snooping Prerequisites......................................................................................................................................331
Important Points to Remember.............................................................................................................................. 331
Enabling the FCoE Transit Feature........................................................................................................................332
Enable FIP Snooping on VLANs.............................................................................................................................333
Congure the FC-MAP Value................................................................................................................................ 333
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................333
Congure a Port for a Bridge-to-FCF Link...........................................................................................................333
Impact on Other Software Features..................................................................................................................... 333
FIP Snooping Restrictions...................................................................................................................................... 334
Conguring FIP Snooping.......................................................................................................................................334
Displaying FIP Snooping Information...........................................................................................................................335
FCoE Transit Conguration Example...........................................................................................................................340
16 FIPS Cryptography...................................................................................................................................342
Conguration Tasks....................................................................................................................................................... 342
Preparing the System....................................................................................................................................................342
Enabling FIPS Mode...................................................................................................................................................... 343
Generating Host-Keys...................................................................................................................................................343
Monitoring FIPS Mode Status......................................................................................................................................343
Disabling FIPS Mode..................................................................................................................................................... 344
17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 345
Protocol Overview.........................................................................................................................................................345
Ring Status............................................................................................................................................................... 346
Multiple FRRP Rings............................................................................................................................................... 346
Important FRRP Points........................................................................................................................................... 347
Important FRRP Concepts..................................................................................................................................... 348
Contents
11