Users Guide

DHCP Client on a Management Interface............................................................................................................ 270
DHCP Client Operation with Other Features....................................................................................................... 270
Congure the System for User Port Stacking (Option 230).....................................................................................271
Congure Secure DHCP................................................................................................................................................ 271
Option 82...................................................................................................................................................................271
DHCP Snooping....................................................................................................................................................... 272
Drop DHCP Packets on Snooped VLANs Only....................................................................................................275
Dynamic ARP Inspection.........................................................................................................................................276
Conguring Dynamic ARP Inspection....................................................................................................................277
Source Address Validation.............................................................................................................................................278
Enabling IP Source Address Validation.................................................................................................................. 278
DHCP MAC Source Address Validation.................................................................................................................279
Enabling IP+MAC Source Address Validation.......................................................................................................279
Viewing the Number of SAV Dropped Packets....................................................................................................279
Clearing the Number of SAV Dropped Packets...................................................................................................280
13 Equal Cost Multi-Path (ECMP).................................................................................................................281
ECMP for Flow-Based Anity......................................................................................................................................281
Conguring the Hash Algorithm Seed................................................................................................................... 281
Link Bundle Monitoring.................................................................................................................................................. 281
Managing ECMP Group Paths...............................................................................................................................282
Creating an ECMP Group Bundle.......................................................................................................................... 282
Modifying the ECMP Group Threshold.................................................................................................................283
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................283
Support for ECMP in host table............................................................................................................................ 284
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 284
RTAG7....................................................................................................................................................................... 284
Flow-based Hashing for ECMP............................................................................................................................. 285
14 FIP Snooping............................................................................................................................................288
Fibre Channel over Ethernet........................................................................................................................................ 288
Ensure Robustness in a Converged Ethernet Network............................................................................................ 288
FIP Snooping on Ethernet Bridges..............................................................................................................................290
Using FIP Snooping....................................................................................................................................................... 292
FIP Snooping Prerequisites.....................................................................................................................................292
Important Points to Remember............................................................................................................................. 292
Enabling the FCoE Transit Feature........................................................................................................................293
Enable FIP Snooping on VLANs.............................................................................................................................294
Congure the FC-MAP Value................................................................................................................................ 294
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................294
Congure a Port for a Bridge-to-FCF Link...........................................................................................................294
Impact on Other Software Features..................................................................................................................... 295
FIP Snooping Restrictions...................................................................................................................................... 295
Conguring FIP Snooping.......................................................................................................................................295
Displaying FIP Snooping Information...........................................................................................................................296
FCoE Transit Conguration Example........................................................................................................................... 301
10
Contents