Administrator Guide
Conguring the Server for Automatic Address Allocation.................................................................................. 278
Specifying a Default Gateway................................................................................................................................ 279
Congure a Method of Hostname Resolution......................................................................................................279
Using DNS for Address Resolution........................................................................................................................ 279
Using NetBIOS WINS for Address Resolution..................................................................................................... 280
Creating Manual Binding Entries............................................................................................................................280
Debugging the DHCP Server.................................................................................................................................280
Using DHCP Clear Commands............................................................................................................................... 281
Congure the System to be a DHCP Client................................................................................................................281
Conguring the DHCP Client System....................................................................................................................281
DHCP Client on a Management Interface............................................................................................................ 283
DHCP Client Operation with Other Features.......................................................................................................283
Congure the System for User Port Stacking (Option 230)....................................................................................284
Congure Secure DHCP............................................................................................................................................... 284
Option 82..................................................................................................................................................................285
DHCP Snooping.......................................................................................................................................................285
Drop DHCP Packets on Snooped VLANs Only....................................................................................................288
Dynamic ARP Inspection.........................................................................................................................................289
Conguring Dynamic ARP Inspection................................................................................................................... 290
Source Address Validation............................................................................................................................................. 291
Enabling IP Source Address Validation...................................................................................................................291
DHCP MAC Source Address Validation................................................................................................................ 292
Enabling IP+MAC Source Address Validation.......................................................................................................292
Viewing the Number of SAV Dropped Packets....................................................................................................293
Clearing the Number of SAV Dropped Packets................................................................................................... 293
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 294
ECMP for Flow-Based Anity.....................................................................................................................................294
Conguring the Hash Algorithm............................................................................................................................ 294
Enabling Deterministic ECMP Next Hop.............................................................................................................. 294
Conguring the Hash Algorithm Seed.................................................................................................................. 295
Link Bundle Monitoring................................................................................................................................................. 295
Managing ECMP Group Paths...............................................................................................................................296
Creating an ECMP Group Bundle..........................................................................................................................296
Modifying the ECMP Group Threshold................................................................................................................ 296
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table...................................... 297
Support for ECMP in host table............................................................................................................................ 298
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 298
14 FIP Snooping............................................................................................................................................299
Fibre Channel over Ethernet........................................................................................................................................299
Ensure Robustness in a Converged Ethernet Network............................................................................................299
FIP Snooping on Ethernet Bridges...............................................................................................................................301
Using FIP Snooping....................................................................................................................................................... 303
FIP Snooping Prerequisites.....................................................................................................................................303
Important Points to Remember............................................................................................................................. 303
10
Contents










