Users Guide

Congure the System to be a DHCP Client................................................................................................................315
Conguring the DHCP Client System....................................................................................................................315
DHCP Client on a Management Interface.............................................................................................................317
DHCP Client Operation with Other Features........................................................................................................317
DHCP Relay When DHCP Server and Client are in Dierent VRFs.........................................................................318
Conguring Route Leaking between VRFs on DHCP Relay Agent.................................................................... 318
Congure the System for User Port Stacking (Option 230)....................................................................................320
Congure Secure DHCP...............................................................................................................................................320
Option 82..................................................................................................................................................................320
DHCP Snooping........................................................................................................................................................321
Drop DHCP Packets on Snooped VLANs Only....................................................................................................326
Dynamic ARP Inspection.........................................................................................................................................326
Conguring Dynamic ARP Inspection....................................................................................................................327
Source Address Validation............................................................................................................................................ 328
Enabling IP Source Address Validation.................................................................................................................. 328
DHCP MAC Source Address Validation................................................................................................................ 329
Enabling IP+MAC Source Address Validation.......................................................................................................329
Viewing the Number of SAV Dropped Packets................................................................................................... 330
Clearing the Number of SAV Dropped Packets...................................................................................................330
14 Equal Cost Multi-Path (ECMP).................................................................................................................331
ECMP for Flow-Based Anity......................................................................................................................................331
Conguring the Hash Algorithm Seed................................................................................................................... 331
Link Bundle Monitoring.................................................................................................................................................. 331
Managing ECMP Group Paths...............................................................................................................................332
Creating an ECMP Group Bundle.......................................................................................................................... 332
Modifying the ECMP Group Threshold.................................................................................................................333
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................333
Support for ECMP in host table............................................................................................................................ 334
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 334
RTAG7....................................................................................................................................................................... 334
Flow-based Hashing for ECMP............................................................................................................................. 335
15 FIP Snooping............................................................................................................................................339
Fibre Channel over Ethernet........................................................................................................................................ 339
Ensure Robustness in a Converged Ethernet Network............................................................................................339
FIP Snooping on Ethernet Bridges...............................................................................................................................341
Using FIP Snooping....................................................................................................................................................... 343
FIP Snooping Prerequisites.....................................................................................................................................343
Important Points to Remember..............................................................................................................................343
Enabling the FCoE Transit Feature........................................................................................................................344
Enable FIP Snooping on VLANs.............................................................................................................................345
Congure the FC-MAP Value................................................................................................................................ 345
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................345
Congure a Port for a Bridge-to-FCF Link...........................................................................................................345
Impact on Other Software Features..................................................................................................................... 346
Contents
11