Users Guide

Option 82........................................................................................................................................................... 274
DHCP Snooping................................................................................................................................................275
Drop DHCP Packets on Snooped VLANs Only.......................................................................................... 278
Dynamic ARP Inspection................................................................................................................................ 278
Configuring Dynamic ARP Inspection......................................................................................................... 279
Source Address Validation................................................................................................................................... 280
Enabling IP Source Address Validation........................................................................................................280
DHCP MAC Source Address Validation........................................................................................................281
Enabling IP+MAC Source Address Validation.............................................................................................281
Viewing the Number of SAV Dropped Packets..........................................................................................282
Clearing the Number of SAV Dropped Packets.........................................................................................282
13 Equal Cost Multi-Path (ECMP)........................................................................................................................283
ECMP for Flow-Based Affinity............................................................................................................................. 283
Configuring the Hash Algorithm...................................................................................................................283
Enabling Deterministic ECMP Next Hop..................................................................................................... 283
Configuring the Hash Algorithm Seed.........................................................................................................284
Link Bundle Monitoring........................................................................................................................................ 284
Managing ECMP Group Paths....................................................................................................................... 285
Creating an ECMP Group Bundle................................................................................................................. 285
Modifying the ECMP Group Threshold........................................................................................................285
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table...........................286
Support for ECMP in host table.....................................................................................................................287
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ............................................................... 287
14 FIP Snooping......................................................................................................................................................288
Fibre Channel over Ethernet................................................................................................................................288
Ensure Robustness in a Converged Ethernet Network................................................................................. 288
FIP Snooping on Ethernet Bridges..................................................................................................................... 290
Using FIP Snooping................................................................................................................................................292
FIP Snooping Prerequisites.............................................................................................................................292
Important Points to Remember.................................................................................................................... 292
Enabling the FCoE Transit Feature............................................................................................................... 293
Enable FIP Snooping on VLANs.....................................................................................................................293
Configure the FC-MAP Value........................................................................................................................ 294
Configure a Port for a Bridge-to-Bridge Link............................................................................................ 294
Configure a Port for a Bridge-to-FCF Link.................................................................................................294
Impact on Other Software Features.............................................................................................................294
FIP Snooping Restrictions...............................................................................................................................295
Configuring FIP Snooping.............................................................................................................................. 295
Displaying FIP Snooping Information................................................................................................................ 296
FCoE Transit Configuration Example.................................................................................................................301
15 Flex Hash and Optimized Boot-Up................................................................................................................303
Flex Hash Capability Overview............................................................................................................................303
Configuring the Flex Hash Mechanism............................................................................................................. 303
Configuring Fast Boot and LACP Fast Switchover..........................................................................................304
9.10(0.1)
10