Setup Guide

DHCP MAC Source Address Validation................................................................................................................ 344
Enabling IP+MAC Source Address Validation.......................................................................................................344
Viewing the Number of SAV Dropped Packets................................................................................................... 345
Clearing the Number of SAV Dropped Packets...................................................................................................345
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 346
ECMP for Flow-Based Anity.....................................................................................................................................346
Conguring the Hash Algorithm Seed.................................................................................................................. 346
Link Bundle Monitoring................................................................................................................................................. 346
Managing ECMP Group Paths...............................................................................................................................347
Creating an ECMP Group Bundle.......................................................................................................................... 347
Modifying the ECMP Group Threshold.................................................................................................................348
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................348
Support for ECMP in host table............................................................................................................................ 349
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 349
RTAG7.......................................................................................................................................................................349
Flow-based Hashing for ECMP............................................................................................................................. 350
15 FIP Snooping............................................................................................................................................354
Fibre Channel over Ethernet........................................................................................................................................ 354
Ensure Robustness in a Converged Ethernet Network............................................................................................354
FIP Snooping on Ethernet Bridges..............................................................................................................................356
Using FIP Snooping....................................................................................................................................................... 358
FIP Snooping Prerequisites.....................................................................................................................................358
Important Points to Remember............................................................................................................................. 358
Enabling the FCoE Transit Feature........................................................................................................................359
Enable FIP Snooping on VLANs.............................................................................................................................360
Congure the FC-MAP Value................................................................................................................................ 360
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................360
Congure a Port for a Bridge-to-FCF Link...........................................................................................................360
Impact on Other Software Features...................................................................................................................... 361
FIP Snooping Restrictions.......................................................................................................................................361
Conguring FIP Snooping........................................................................................................................................361
Displaying FIP Snooping Information...........................................................................................................................362
FCoE Transit Conguration Example...........................................................................................................................367
16 Flex Hash and Optimized Boot-Up............................................................................................................369
Flex Hash Capability Overview.................................................................................................................................... 369
Conguring the Flex Hash Mechanism.......................................................................................................................369
Conguring Fast Boot and LACP Fast Switchover................................................................................................... 370
Optimizing the Boot Time.............................................................................................................................................370
Booting Process When Optimized Boot Time Mechanism is Enabled.............................................................. 370
Guidelines for Conguring Optimized Booting Mechanism.................................................................................371
Interoperation of Applications with Fast Boot and System States.......................................................................... 372
LACP and IPv4 Routing...........................................................................................................................................372
LACP and IPv6 Routing.......................................................................................................................................... 372
Contents
11