Administrator Guide

Source Address Validation................................................................................................................................................297
Enabling IP Source Address Validation..................................................................................................................... 298
DHCP MAC Source Address Validation................................................................................................................... 298
Enabling IP+MAC Source Address Validation..........................................................................................................298
Viewing the Number of SAV Dropped Packets.......................................................................................................299
Clearing the Number of SAV Dropped Packets...................................................................................................... 299
14 Equal Cost Multi-Path (ECMP)................................................................................................ 300
ECMP for Flow-Based Affinity........................................................................................................................................300
Configuring the Hash Algorithm Seed......................................................................................................................300
Link Bundle Monitoring.....................................................................................................................................................300
Managing ECMP Group Paths................................................................................................................................... 301
Creating an ECMP Group Bundle.............................................................................................................................. 301
Modifying the ECMP Group Threshold.....................................................................................................................301
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table........................................302
Support for ECMP in host table................................................................................................................................302
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ........................................................................... 303
RTAG7.......................................................................................................................................................................... 303
Flow-based Hashing for ECMP.................................................................................................................................304
15 FIP Snooping.......................................................................................................................... 307
Fibre Channel over Ethernet............................................................................................................................................307
Ensure Robustness in a Converged Ethernet Network............................................................................................... 307
FIP Snooping on Ethernet Bridges..................................................................................................................................308
Using FIP Snooping............................................................................................................................................................310
FIP Snooping Prerequisites.........................................................................................................................................310
Important Points to Remember..................................................................................................................................310
Enabling the FCoE Transit Feature.............................................................................................................................311
Enable FIP Snooping on VLANs.................................................................................................................................. 311
Configure the FC-MAP Value.....................................................................................................................................312
Configure a Port for a Bridge-to-Bridge Link........................................................................................................... 312
Configure a Port for a Bridge-to-FCF Link...............................................................................................................312
Impact on Other Software Features..........................................................................................................................312
FIP Snooping Restrictions...........................................................................................................................................313
Configuring FIP Snooping........................................................................................................................................... 313
Displaying FIP Snooping Information............................................................................................................................... 313
FCoE Transit Configuration Example.............................................................................................................................. 318
16 Flex Hash and Optimized Boot-Up............................................................................................ 320
Flex Hash Capability Overview........................................................................................................................................320
Configuring the Flex Hash Mechanism...........................................................................................................................320
Configuring Fast Boot and LACP Fast Switchover.......................................................................................................321
Optimizing the Boot Time................................................................................................................................................. 321
Interoperation of Applications with Fast Boot and System States.............................................................................322
RDMA Over Converged Ethernet (RoCE) Overview...................................................................................................324
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces........................................................................................ 325
17 Force10 Resilient Ring Protocol (FRRP).................................................................................... 326
Protocol Overview............................................................................................................................................................ 326
10
Contents