Concept Guide

Conguring the DHCP Client System....................................................................................................................318
DHCP Client on a Management Interface.............................................................................................................319
DHCP Client Operation with Other Features.......................................................................................................320
DHCP Relay When DHCP Server and Client are in Dierent VRFs.........................................................................321
Conguring Route Leaking between VRFs on DHCP Relay Agent.................................................................... 321
Non-default VRF conguration for DHCPv6 helper address................................................................................... 322
Conguring DHCP relay source interface...................................................................................................................322
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 322
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................323
Congure the System for User Port Stacking (Option 230)....................................................................................324
Congure Secure DHCP............................................................................................................................................... 324
Option 82..................................................................................................................................................................325
DHCP Snooping.......................................................................................................................................................325
Drop DHCP Packets on Snooped VLANs Only....................................................................................................330
Dynamic ARP Inspection......................................................................................................................................... 331
Conguring Dynamic ARP Inspection.................................................................................................................... 331
Source Address Validation............................................................................................................................................ 333
Enabling IP Source Address Validation.................................................................................................................. 333
DHCP MAC Source Address Validation................................................................................................................ 334
Enabling IP+MAC Source Address Validation.......................................................................................................334
Viewing the Number of SAV Dropped Packets................................................................................................... 335
Clearing the Number of SAV Dropped Packets...................................................................................................335
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 336
ECMP for Flow-Based Anity.....................................................................................................................................336
Conguring the Hash Algorithm Seed.................................................................................................................. 336
Link Bundle Monitoring................................................................................................................................................. 336
Managing ECMP Group Paths...............................................................................................................................337
Creating an ECMP Group Bundle.......................................................................................................................... 337
Modifying the ECMP Group Threshold.................................................................................................................338
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................338
Support for ECMP in host table............................................................................................................................ 339
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 339
RTAG7.......................................................................................................................................................................339
Flow-based Hashing for ECMP............................................................................................................................. 340
15 FIP Snooping............................................................................................................................................344
Fibre Channel over Ethernet........................................................................................................................................ 344
Ensure Robustness in a Converged Ethernet Network............................................................................................ 344
FIP Snooping on Ethernet Bridges.............................................................................................................................. 346
Using FIP Snooping....................................................................................................................................................... 348
FIP Snooping Prerequisites.....................................................................................................................................348
Important Points to Remember............................................................................................................................. 348
Enabling the FCoE Transit Feature........................................................................................................................349
Enable FIP Snooping on VLANs.............................................................................................................................350
Congure the FC-MAP Value................................................................................................................................ 350
Contents
11