Users Guide
Congure a Method of Hostname Resolution......................................................................................................277
Using DNS for Address Resolution........................................................................................................................ 277
Using NetBIOS WINS for Address Resolution......................................................................................................278
Creating Manual Binding Entries............................................................................................................................278
Debugging the DHCP Server................................................................................................................................. 278
Using DHCP Clear Commands...............................................................................................................................279
Congure the System to be a DHCP Client............................................................................................................... 279
Conguring the DHCP Client System................................................................................................................... 279
DHCP Client on a Management Interface.............................................................................................................281
DHCP Client Operation with Other Features........................................................................................................281
Congure the System for User Port Stacking (Option 230)....................................................................................282
Congure Secure DHCP............................................................................................................................................... 282
Option 82..................................................................................................................................................................283
DHCP Snooping.......................................................................................................................................................283
Drop DHCP Packets on Snooped VLANs Only....................................................................................................286
Dynamic ARP Inspection.........................................................................................................................................287
Conguring Dynamic ARP Inspection................................................................................................................... 288
Source Address Validation............................................................................................................................................ 289
Enabling IP Source Address Validation..................................................................................................................289
DHCP MAC Source Address Validation................................................................................................................ 290
Enabling IP+MAC Source Address Validation.......................................................................................................290
Viewing the Number of SAV Dropped Packets.................................................................................................... 291
Clearing the Number of SAV Dropped Packets....................................................................................................291
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 292
ECMP for Flow-Based Anity.....................................................................................................................................292
Conguring the Hash Algorithm Seed.................................................................................................................. 292
Link Bundle Monitoring................................................................................................................................................. 292
Managing ECMP Group Paths...............................................................................................................................293
Creating an ECMP Group Bundle.......................................................................................................................... 293
Modifying the ECMP Group Threshold.................................................................................................................294
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................294
Support for ECMP in host table............................................................................................................................ 295
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................295
RTAG7.......................................................................................................................................................................295
Flow-based Hashing for ECMP............................................................................................................................. 296
14 FIP Snooping............................................................................................................................................300
Fibre Channel over Ethernet........................................................................................................................................300
Ensure Robustness in a Converged Ethernet Network............................................................................................300
FIP Snooping on Ethernet Bridges.............................................................................................................................. 302
Using FIP Snooping....................................................................................................................................................... 304
FIP Snooping Prerequisites.....................................................................................................................................304
Important Points to Remember............................................................................................................................. 304
Enabling the FCoE Transit Feature........................................................................................................................305
Enable FIP Snooping on VLANs.............................................................................................................................306
10
Contents










