Concept Guide

DHCP MAC Source Address Validation................................................................................................................ 343
Enabling IP+MAC Source Address Validation.......................................................................................................343
Viewing the Number of SAV Dropped Packets....................................................................................................344
Clearing the Number of SAV Dropped Packets................................................................................................... 344
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 345
ECMP for Flow-Based Anity.....................................................................................................................................345
Conguring the Hash Algorithm Seed.................................................................................................................. 345
Link Bundle Monitoring................................................................................................................................................. 345
Managing ECMP Group Paths...............................................................................................................................346
Creating an ECMP Group Bundle..........................................................................................................................346
Modifying the ECMP Group Threshold.................................................................................................................347
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table...................................... 347
Support for ECMP in host table............................................................................................................................ 348
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 348
RTAG7.......................................................................................................................................................................348
Flow-based Hashing for ECMP............................................................................................................................. 349
15 FIP Snooping............................................................................................................................................353
Fibre Channel over Ethernet........................................................................................................................................ 353
Ensure Robustness in a Converged Ethernet Network............................................................................................353
FIP Snooping on Ethernet Bridges..............................................................................................................................355
Using FIP Snooping....................................................................................................................................................... 357
FIP Snooping Prerequisites.....................................................................................................................................357
Important Points to Remember..............................................................................................................................357
Enabling the FCoE Transit Feature........................................................................................................................358
Enable FIP Snooping on VLANs.............................................................................................................................359
Congure the FC-MAP Value................................................................................................................................ 359
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................359
Congure a Port for a Bridge-to-FCF Link...........................................................................................................359
Impact on Other Software Features..................................................................................................................... 360
FIP Snooping Restrictions...................................................................................................................................... 360
Conguring FIP Snooping.......................................................................................................................................360
Displaying FIP Snooping Information............................................................................................................................361
FCoE Transit Conguration Example.......................................................................................................................... 366
16 Flex Hash and Optimized Boot-Up............................................................................................................368
Flex Hash Capability Overview.................................................................................................................................... 368
Conguring the Flex Hash Mechanism.......................................................................................................................368
Conguring Fast Boot and LACP Fast Switchover...................................................................................................369
Optimizing the Boot Time.............................................................................................................................................369
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................369
Guidelines for Conguring Optimized Booting Mechanism................................................................................ 370
Interoperation of Applications with Fast Boot and System States...........................................................................371
LACP and IPv4 Routing........................................................................................................................................... 371
LACP and IPv6 Routing........................................................................................................................................... 371
Contents
11