Users Guide
Conguring the Server for Automatic Address Allocation.................................................................................. 277
Specifying a Default Gateway................................................................................................................................ 278
Congure a Method of Hostname Resolution......................................................................................................278
Using DNS for Address Resolution........................................................................................................................ 278
Using NetBIOS WINS for Address Resolution......................................................................................................279
Creating Manual Binding Entries............................................................................................................................279
Debugging the DHCP Server................................................................................................................................. 279
Using DHCP Clear Commands.............................................................................................................................. 280
Congure the System to be a DHCP Client............................................................................................................... 280
Conguring the DHCP Client System...................................................................................................................280
DHCP Client on a Management Interface............................................................................................................ 282
DHCP Client Operation with Other Features.......................................................................................................282
Congure the System for User Port Stacking (Option 230)....................................................................................283
Congure Secure DHCP............................................................................................................................................... 283
Option 82..................................................................................................................................................................284
DHCP Snooping.......................................................................................................................................................284
Drop DHCP Packets on Snooped VLANs Only.................................................................................................... 287
Dynamic ARP Inspection.........................................................................................................................................288
Conguring Dynamic ARP Inspection................................................................................................................... 289
Source Address Validation............................................................................................................................................ 290
Enabling IP Source Address Validation..................................................................................................................290
DHCP MAC Source Address Validation.................................................................................................................291
Enabling IP+MAC Source Address Validation....................................................................................................... 291
Viewing the Number of SAV Dropped Packets....................................................................................................292
Clearing the Number of SAV Dropped Packets................................................................................................... 292
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 293
ECMP for Flow-Based Anity.....................................................................................................................................293
Conguring the Hash Algorithm............................................................................................................................ 293
Enabling Deterministic ECMP Next Hop.............................................................................................................. 293
Conguring the Hash Algorithm Seed.................................................................................................................. 294
Link Bundle Monitoring................................................................................................................................................. 294
Managing ECMP Group Paths...............................................................................................................................295
Creating an ECMP Group Bundle..........................................................................................................................295
Modifying the ECMP Group Threshold................................................................................................................ 295
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................296
Support for ECMP in host table.............................................................................................................................297
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 297
14 FIP Snooping............................................................................................................................................298
Fibre Channel over Ethernet........................................................................................................................................ 298
Ensure Robustness in a Converged Ethernet Network............................................................................................298
FIP Snooping on Ethernet Bridges..............................................................................................................................300
Using FIP Snooping....................................................................................................................................................... 302
FIP Snooping Prerequisites.....................................................................................................................................302
Important Points to Remember............................................................................................................................. 302
10
Contents










