Users Guide

Specifying a Default Gateway................................................................................................................................275
Configure a Method of Hostname Resolution..................................................................................................... 275
Using DNS for Address Resolution........................................................................................................................275
Using NetBIOS WINS for Address Resolution..................................................................................................... 276
Creating Manual Binding Entries............................................................................................................................276
Debugging the DHCP Server................................................................................................................................. 276
Using DHCP Clear Commands...............................................................................................................................277
Configure the System to be a DHCP Client...............................................................................................................277
Configuring the DHCP Client System................................................................................................................... 277
DHCP Client on a Management Interface............................................................................................................279
DHCP Client Operation with Other Features.......................................................................................................279
Configure the System for User Port Stacking (Option 230)...................................................................................280
Configure Secure DHCP...............................................................................................................................................280
Option 82...................................................................................................................................................................281
DHCP Snooping........................................................................................................................................................281
Drop DHCP Packets on Snooped VLANs Only....................................................................................................284
Dynamic ARP Inspection........................................................................................................................................ 285
Configuring Dynamic ARP Inspection................................................................................................................... 286
Source Address Validation............................................................................................................................................287
Enabling IP Source Address Validation..................................................................................................................287
DHCP MAC Source Address Validation................................................................................................................288
Enabling IP+MAC Source Address Validation......................................................................................................288
Viewing the Number of SAV Dropped Packets...................................................................................................289
Clearing the Number of SAV Dropped Packets.................................................................................................. 289
13 Equal Cost Multi-Path (ECMP)................................................................................................................290
ECMP for Flow-Based Affinity.................................................................................................................................... 290
Configuring the Hash Algorithm............................................................................................................................ 290
Enabling Deterministic ECMP Next Hop..............................................................................................................290
Configuring the Hash Algorithm Seed................................................................................................................... 291
Link Bundle Monitoring..................................................................................................................................................291
Managing ECMP Group Paths...............................................................................................................................292
Creating an ECMP Group Bundle..........................................................................................................................292
Modifying the ECMP Group Threshold................................................................................................................ 292
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table.................................... 293
Support for ECMP in host table............................................................................................................................ 294
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ........................................................................294
14 FIP Snooping............................................................................................................................................295
Fibre Channel over Ethernet........................................................................................................................................295
Ensure Robustness in a Converged Ethernet Network........................................................................................... 295
FIP Snooping on Ethernet Bridges.............................................................................................................................. 297
Using FIP Snooping....................................................................................................................................................... 299
FIP Snooping Prerequisites.................................................................................................................................... 299
Important Points to Remember.............................................................................................................................299
Enabling the FCoE Transit Feature.......................................................................................................................300
10
Contents