Concept Guide

13 Equal Cost Multi-Path (ECMP).................................................................................................................319
ECMP for Flow-Based Anity......................................................................................................................................319
Conguring the Hash Algorithm............................................................................................................................. 319
Enabling Deterministic ECMP Next Hop............................................................................................................... 319
Conguring the Hash Algorithm Seed.................................................................................................................. 320
Link Bundle Monitoring................................................................................................................................................. 320
Managing ECMP Group Paths................................................................................................................................321
Creating an ECMP Group Bundle...........................................................................................................................321
Modifying the ECMP Group Threshold................................................................................................................. 321
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................322
Support for ECMP in host table............................................................................................................................ 323
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 323
14 FIP Snooping............................................................................................................................................ 324
Fibre Channel over Ethernet........................................................................................................................................ 324
Ensure Robustness in a Converged Ethernet Network............................................................................................ 324
FIP Snooping on Ethernet Bridges.............................................................................................................................. 326
Using FIP Snooping....................................................................................................................................................... 328
FIP Snooping Prerequisites.....................................................................................................................................328
Important Points to Remember..............................................................................................................................328
Enabling the FCoE Transit Feature........................................................................................................................329
Enable FIP Snooping on VLANs.............................................................................................................................329
Congure the FC-MAP Value................................................................................................................................ 330
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................330
Congure a Port for a Bridge-to-FCF Link...........................................................................................................330
Impact on Other Software Features..................................................................................................................... 330
FIP Snooping Restrictions....................................................................................................................................... 331
Conguring FIP Snooping........................................................................................................................................331
Displaying FIP Snooping Information...........................................................................................................................332
FCoE Transit Conguration Example...........................................................................................................................337
15 Flex Hash and Optimized Boot-Up............................................................................................................339
Flex Hash Capability Overview.....................................................................................................................................339
Conguring the Flex Hash Mechanism.......................................................................................................................339
Conguring Fast Boot and LACP Fast Switchover...................................................................................................340
Optimizing the Boot Time.............................................................................................................................................340
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................340
Guidelines for Conguring Optimized Booting Mechanism.................................................................................341
Interoperation of Applications with Fast Boot and System States..........................................................................342
LACP and IPv4 Routing.......................................................................................................................................... 342
LACP and IPv6 Routing.......................................................................................................................................... 342
BGP Graceful Restart............................................................................................................................................. 343
Cold Boot Caused by Power Cycling the System................................................................................................343
Unexpected Reload of the System........................................................................................................................343
Software Upgrade................................................................................................................................................... 343
Contents
11