Users Guide

Table Of Contents
Conguring the Hash Algorithm Seed................................................................................................................... 317
Link Bundle Monitoring.................................................................................................................................................. 317
Managing ECMP Group Paths................................................................................................................................318
Creating an ECMP Group Bundle...........................................................................................................................318
Modifying the ECMP Group Threshold................................................................................................................. 318
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table.......................................319
Support for ECMP in host table............................................................................................................................ 320
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 320
14 FIP Snooping............................................................................................................................................ 321
Fibre Channel over Ethernet.........................................................................................................................................321
Ensure Robustness in a Converged Ethernet Network.............................................................................................321
FIP Snooping on Ethernet Bridges.............................................................................................................................. 323
Using FIP Snooping....................................................................................................................................................... 325
FIP Snooping Prerequisites.....................................................................................................................................325
Important Points to Remember............................................................................................................................. 325
Enabling the FCoE Transit Feature........................................................................................................................326
Enable FIP Snooping on VLANs.............................................................................................................................326
Congure the FC-MAP Value.................................................................................................................................327
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 327
Congure a Port for a Bridge-to-FCF Link........................................................................................................... 327
Impact on Other Software Features......................................................................................................................327
FIP Snooping Restrictions...................................................................................................................................... 328
Conguring FIP Snooping.......................................................................................................................................328
Displaying FIP Snooping Information...........................................................................................................................329
FCoE Transit Conguration Example...........................................................................................................................334
15 Flex Hash and Optimized Boot-Up............................................................................................................336
Flex Hash Capability Overview.....................................................................................................................................336
Conguring the Flex Hash Mechanism.......................................................................................................................336
Conguring Fast Boot and LACP Fast Switchover................................................................................................... 337
Optimizing the Boot Time.............................................................................................................................................337
Booting Process When Optimized Boot Time Mechanism is Enabled.............................................................. 337
Guidelines for Conguring Optimized Booting Mechanism................................................................................338
Interoperation of Applications with Fast Boot and System States..........................................................................339
LACP and IPv4 Routing.......................................................................................................................................... 339
LACP and IPv6 Routing.......................................................................................................................................... 339
BGP Graceful Restart............................................................................................................................................. 340
Cold Boot Caused by Power Cycling the System................................................................................................340
Unexpected Reload of the System........................................................................................................................340
Software Upgrade................................................................................................................................................... 340
LACP Fast Switchover............................................................................................................................................340
Changes to BGP Multipath..................................................................................................................................... 341
Delayed Installation of ECMP Routes Into BGP....................................................................................................341
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................ 341
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 342
Contents
11