Administrator Guide
Configure a Port for a Bridge-to-Bridge Link
If a switch port is connected to another FIP snooping bridge, configure the FCoE-Trusted Port mode for bridge-bridge links.
Initially, all FCoE traffic is blocked. Only FIP frames with the ALL_FCF_MAC and ALL_ENODE_MAC values in their headers are allowed to
pass. After the switch learns the MAC address of a connected FCF, it allows FIP frames destined to or received from the FCF MAC
address.
FCoE traffic is allowed on the port only after the switch learns the FC-MAP value associated with the specified FCF MAC address and
verifies that it matches the configured FC-MAP value for the FCoE VLAN.
Configure a Port for a Bridge-to-FCF Link
If a port is directly connected to an FCF, configure the port mode as FCF. Initially, all FCoE traffic is blocked; only FIP frames are allowed
to pass.
FCoE traffic is allowed on the port only after a successful fabric login (FLOGI) request/response and confirmed use of the configured FC-
MAP value for the VLAN.
FLOGI and fabric discovery (FDISC) request/response packets are trapped to the CPU. They are forwarded after the necessary ACLs are
installed.
Impact on Other Software Features
When you enable FIP snooping on a switch, other software features are impacted. The following table lists the impact of FIP snooping.
Table 31. Impact of Enabling FIP Snooping
Impact Description
MAC address learning MAC address learning is not performed on FIP and FCoE frames,
which are denied by ACLs dynamically created by FIP snooping on
server-facing ports in ENode mode.
MTU auto-configuration MTU size is set to mini-jumbo (2500 bytes) when a port is in
Switchport mode, the FIP snooping feature is enabled on the
switch, and FIP snooping is enabled on all or individual VLANs.
Link aggregation group (LAG) FIP snooping is supported on port channels on ports on which PFC
mode is on (PFC is operationally up).
STP If you enable an STP protocol (STP, RSTP, PVSTP, or MSTP) on
the switch and ports enter a blocking state, when the state change
occurs, the corresponding port-based ACLs are deleted. If a port is
enabled for FIP snooping in ENode or FCF mode, the ENode/FCF
MAC-based ACLs are deleted.
FIP Snooping Restrictions
The following restrictions apply when you configure FIP snooping.
• The maximum number of FCoE VLANs supported on the switch is eight.
• The maximum number of FIP snooping sessions supported per ENode server is 32. To increase the maximum number of sessions to
64, use the fip-snooping max-sessions-per-enodemac command.
• The maximum number of FCFs supported per FIP snooping-enabled VLAN is twelve.
• When FCoE is configured on fanned-out ports or unusable 100G ports, traffic outage occurs for about 45 seconds.
Configuring FIP Snooping
You can enable FIP snooping globally on all FCoE VLANs on a switch or on an individual FCoE VLAN.
By default, FIP snooping is disabled.
To enable FCoE transit on the switch and configure the FCoE transit parameters on ports, follow these steps.
294
FIP Snooping










