Service Manual

DHCP Snooping........................................................................................................................................................271
Drop DHCP Packets on Snooped VLANs Only.................................................................................................... 274
Dynamic ARP Inspection.........................................................................................................................................275
Conguring Dynamic ARP Inspection....................................................................................................................276
Source Address Validation.............................................................................................................................................277
Enabling IP Source Address Validation.................................................................................................................. 277
DHCP MAC Source Address Validation.................................................................................................................278
Enabling IP+MAC Source Address Validation.......................................................................................................278
Viewing the Number of SAV Dropped Packets....................................................................................................278
Clearing the Number of SAV Dropped Packets................................................................................................... 279
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 280
ECMP for Flow-Based Anity.....................................................................................................................................280
Conguring the Hash Algorithm............................................................................................................................ 280
Enabling Deterministic ECMP Next Hop.............................................................................................................. 280
Conguring the Hash Algorithm Seed................................................................................................................... 281
Link Bundle Monitoring.................................................................................................................................................. 281
Managing ECMP Group Paths...............................................................................................................................282
Creating an ECMP Group Bundle.......................................................................................................................... 282
Modifying the ECMP Group Threshold.................................................................................................................282
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................283
Support for ECMP in host table............................................................................................................................ 283
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 284
14 FIP Snooping............................................................................................................................................285
Fibre Channel over Ethernet........................................................................................................................................ 285
Ensure Robustness in a Converged Ethernet Network............................................................................................ 285
FIP Snooping on Ethernet Bridges.............................................................................................................................. 287
Using FIP Snooping....................................................................................................................................................... 289
FIP Snooping Prerequisites.....................................................................................................................................289
Important Points to Remember............................................................................................................................. 289
Enabling the FCoE Transit Feature........................................................................................................................290
Enable FIP Snooping on VLANs.............................................................................................................................290
Congure the FC-MAP Value................................................................................................................................. 291
Congure a Port for a Bridge-to-Bridge Link........................................................................................................291
Congure a Port for a Bridge-to-FCF Link............................................................................................................291
Impact on Other Software Features......................................................................................................................291
FIP Snooping Restrictions...................................................................................................................................... 292
Conguring FIP Snooping.......................................................................................................................................292
Displaying FIP Snooping Information...........................................................................................................................293
FCoE Transit Conguration Example...........................................................................................................................298
15 Flex Hash and Optimized Boot-Up........................................................................................................... 300
Flex Hash Capability Overview.................................................................................................................................... 300
Conguring the Flex Hash Mechanism.......................................................................................................................300
Conguring Fast Boot and LACP Fast Switchover....................................................................................................301
Optimizing the Boot Time............................................................................................................................................. 301
10
Contents