Concept Guide
Creating Manual Binding Entries............................................................................................................................ 310
Debugging the DHCP Server...................................................................................................................................311
Using DHCP Clear Commands................................................................................................................................ 311
Congure the System to be a DHCP Client.................................................................................................................311
Conguring the DHCP Client System....................................................................................................................312
DHCP Client on a Management Interface.............................................................................................................313
DHCP Client Operation with Other Features........................................................................................................314
DHCP Relay When DHCP Server and Client are in Dierent VRFs.........................................................................315
Conguring Route Leaking between VRFs on DHCP Relay Agent....................................................................315
Non-default VRF conguration for DHCPv6 helper address....................................................................................316
Conguring DHCP relay source interface....................................................................................................................316
Global DHCP relay source IPv4 or IPv6 conguration ........................................................................................316
Interface level DHCP relay source IPv4 or IPv6 conguration ...........................................................................317
Congure the System for User Port Stacking (Option 230).................................................................................... 318
Congure Secure DHCP................................................................................................................................................318
Option 82...................................................................................................................................................................319
DHCPv6 relay agent options..................................................................................................................................320
DHCP Snooping.......................................................................................................................................................320
Drop DHCP Packets on Snooped VLANs Only....................................................................................................324
Dynamic ARP Inspection.........................................................................................................................................325
Conguring Dynamic ARP Inspection................................................................................................................... 325
Source Address Validation.............................................................................................................................................327
Enabling IP Source Address Validation.................................................................................................................. 327
DHCP MAC Source Address Validation................................................................................................................ 328
Enabling IP+MAC Source Address Validation.......................................................................................................328
Viewing the Number of SAV Dropped Packets....................................................................................................329
Clearing the Number of SAV Dropped Packets................................................................................................... 329
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 330
ECMP for Flow-Based Anity.....................................................................................................................................330
Conguring the Hash Algorithm............................................................................................................................ 330
Enabling Deterministic ECMP Next Hop.............................................................................................................. 330
Conguring the Hash Algorithm Seed................................................................................................................... 331
Link Bundle Monitoring.................................................................................................................................................. 331
Managing ECMP Group Paths...............................................................................................................................332
Creating an ECMP Group Bundle.......................................................................................................................... 332
Modifying the ECMP Group Threshold.................................................................................................................332
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................333
Support for ECMP in host table............................................................................................................................ 334
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 334
14 FIP Snooping............................................................................................................................................335
Fibre Channel over Ethernet........................................................................................................................................ 335
Ensure Robustness in a Converged Ethernet Network............................................................................................335
FIP Snooping on Ethernet Bridges.............................................................................................................................. 337
Using FIP Snooping....................................................................................................................................................... 339
10
Contents










