Users Guide

Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................308
Support for ECMP in host table............................................................................................................................ 309
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 309
RTAG7.......................................................................................................................................................................309
Flow-based Hashing for ECMP.............................................................................................................................. 310
14 FIP Snooping.............................................................................................................................................314
Fibre Channel over Ethernet.........................................................................................................................................314
Ensure Robustness in a Converged Ethernet Network.............................................................................................314
FIP Snooping on Ethernet Bridges...............................................................................................................................316
Using FIP Snooping........................................................................................................................................................ 318
FIP Snooping Prerequisites......................................................................................................................................318
Important Points to Remember.............................................................................................................................. 318
Enabling the FCoE Transit Feature.........................................................................................................................319
Enable FIP Snooping on VLANs.............................................................................................................................320
Congure the FC-MAP Value................................................................................................................................ 320
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................320
Congure a Port for a Bridge-to-FCF Link...........................................................................................................320
Impact on Other Software Features...................................................................................................................... 321
FIP Snooping Restrictions....................................................................................................................................... 321
Conguring FIP Snooping........................................................................................................................................321
Displaying FIP Snooping Information...........................................................................................................................322
FCoE Transit Conguration Example...........................................................................................................................327
15 Flex Hash and Optimized Boot-Up............................................................................................................329
Flex Hash Capability Overview.....................................................................................................................................329
Conguring the Flex Hash Mechanism.......................................................................................................................329
Conguring Fast Boot and LACP Fast Switchover...................................................................................................330
Optimizing the Boot Time.............................................................................................................................................330
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................330
Guidelines for Conguring Optimized Booting Mechanism.................................................................................331
Interoperation of Applications with Fast Boot and System States..........................................................................332
LACP and IPv4 Routing.......................................................................................................................................... 332
LACP and IPv6 Routing.......................................................................................................................................... 332
BGP Graceful Restart............................................................................................................................................. 333
Cold Boot Caused by Power Cycling the System................................................................................................333
Unexpected Reload of the System........................................................................................................................333
Software Upgrade................................................................................................................................................... 333
LACP Fast Switchover............................................................................................................................................333
Changes to BGP Multipath.....................................................................................................................................334
Delayed Installation of ECMP Routes Into BGP...................................................................................................334
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................334
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces......................................................................................335
16 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 336
Protocol Overview.........................................................................................................................................................336
Contents
11