Concept Guide
Creating Manual Binding Entries............................................................................................................................304
Debugging the DHCP Server.................................................................................................................................305
Using DHCP Clear Commands.............................................................................................................................. 305
Congure the System to be a DHCP Client...............................................................................................................305
Conguring the DHCP Client System...................................................................................................................306
DHCP Client on a Management Interface............................................................................................................ 307
DHCP Client Operation with Other Features.......................................................................................................308
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................309
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 309
Non-default VRF conguration for DHCPv6 helper address....................................................................................310
Conguring DHCP relay source interface....................................................................................................................310
Global DHCP relay source IPv4 or IPv6 conguration ........................................................................................310
Interface level DHCP relay source IPv4 or IPv6 conguration ........................................................................... 311
Congure the System for User Port Stacking (Option 230).................................................................................... 312
Congure Secure DHCP................................................................................................................................................312
Option 82...................................................................................................................................................................313
DHCPv6 relay agent options...................................................................................................................................313
DHCP Snooping........................................................................................................................................................314
Drop DHCP Packets on Snooped VLANs Only.....................................................................................................318
Dynamic ARP Inspection......................................................................................................................................... 319
Conguring Dynamic ARP Inspection....................................................................................................................319
Source Address Validation............................................................................................................................................. 321
Enabling IP Source Address Validation...................................................................................................................321
DHCP MAC Source Address Validation................................................................................................................ 322
Enabling IP+MAC Source Address Validation.......................................................................................................322
Viewing the Number of SAV Dropped Packets....................................................................................................323
Clearing the Number of SAV Dropped Packets................................................................................................... 323
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 324
ECMP for Flow-Based Anity..................................................................................................................................... 324
Conguring the Hash Algorithm............................................................................................................................ 324
Enabling Deterministic ECMP Next Hop...............................................................................................................324
Conguring the Hash Algorithm Seed.................................................................................................................. 325
Link Bundle Monitoring................................................................................................................................................. 325
Managing ECMP Group Paths...............................................................................................................................326
Creating an ECMP Group Bundle..........................................................................................................................326
Modifying the ECMP Group Threshold.................................................................................................................326
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table...................................... 327
Support for ECMP in host table............................................................................................................................ 328
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 328
14 FIP Snooping............................................................................................................................................329
Fibre Channel over Ethernet........................................................................................................................................ 329
Ensure Robustness in a Converged Ethernet Network............................................................................................329
FIP Snooping on Ethernet Bridges...............................................................................................................................331
Using FIP Snooping....................................................................................................................................................... 333
10
Contents










