Service Manual
Enabling IP Source Address Validation......................................................................................................................263
DHCP MAC Source Address Validation.................................................................................................................... 264
Enabling IP+MAC Source Address Validation............................................................................................................264
Viewing the Number of SAV Dropped Packets.........................................................................................................264
Clearing the Number of SAV Dropped Packets........................................................................................................ 265
13 Equal Cost Multi-Path (ECMP)................................................................................. 266
ECMP for Flow-Based Anity....................................................................................................................................... 266
Conguring the Hash Algorithm...............................................................................................................................266
Enabling Deterministic ECMP Next Hop.................................................................................................................. 266
Conguring the Hash Algorithm Seed...................................................................................................................... 266
Link Bundle Monitoring...................................................................................................................................................267
Managing ECMP Group Paths..................................................................................................................................267
Creating an ECMP Group Bundle............................................................................................................................. 268
Modifying the ECMP Group Threshold.................................................................................................................... 268
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table................................................. 269
Support for ECMP in host table...............................................................................................................................269
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ................................................................................ 270
14 FCoE Transit...............................................................................................................271
Fibre Channel over Ethernet........................................................................................................................................... 271
Ensure Robustness in a Converged Ethernet Network....................................................................................................271
FIP Snooping on Ethernet Bridges..................................................................................................................................272
FIP Snooping in a Switch Stack...................................................................................................................................... 274
Using FIP Snooping........................................................................................................................................................ 274
FIP Snooping Prerequisites.......................................................................................................................................274
Important Points to Remember................................................................................................................................ 275
Enabling the FCoE Transit Feature........................................................................................................................... 275
Enable FIP Snooping on VLANs................................................................................................................................276
Congure the FC-MAP Value...................................................................................................................................276
Congure a Port for a Bridge-to-Bridge Link............................................................................................................ 276
Congure a Port for a Bridge-to-FCF Link................................................................................................................276
Impact on Other Software Features......................................................................................................................... 276
FIP Snooping Restrictions.........................................................................................................................................277
Conguring FIP Snooping.........................................................................................................................................277
Displaying FIP Snooping Information...............................................................................................................................278
FCoE Transit Conguration Example.............................................................................................................................. 283
15 Flex Hash and Optimized Boot-Up............................................................................. 285
Flex Hash Capability Overview.......................................................................................................................................285
Conguring the Flex Hash Mechanism...........................................................................................................................285
Conguring Fast Boot and LACP Fast Switchover.........................................................................................................286
Optimizing the Boot Time.............................................................................................................................................. 286
Booting Process When Optimized Boot Time Mechanism is Enabled.......................................................................286
Guidelines for Conguring Optimized Booting Mechanism.......................................................................................286
Interoperation of Applications with Fast Boot and System States...................................................................................287
10










