White Papers

Clearing the Number of SAV Dropped Packets....................................................................................................316
14 Equal Cost Multi-Path (ECMP).................................................................................................................317
ECMP for Flow-Based Anity......................................................................................................................................317
Conguring the Hash Algorithm Seed................................................................................................................... 317
Link Bundle Monitoring.................................................................................................................................................. 317
Managing ECMP Group Paths................................................................................................................................318
Creating an ECMP Group Bundle...........................................................................................................................318
Modifying the ECMP Group Threshold................................................................................................................. 319
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table.......................................319
Support for ECMP in host table............................................................................................................................ 320
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 320
RTAG7.......................................................................................................................................................................320
Flow-based Hashing for ECMP.............................................................................................................................. 321
15 FIP Snooping............................................................................................................................................325
Fibre Channel over Ethernet........................................................................................................................................ 325
Ensure Robustness in a Converged Ethernet Network............................................................................................325
FIP Snooping on Ethernet Bridges.............................................................................................................................. 327
Using FIP Snooping....................................................................................................................................................... 329
FIP Snooping Prerequisites.....................................................................................................................................329
Important Points to Remember............................................................................................................................. 329
Enabling the FCoE Transit Feature........................................................................................................................330
Enable FIP Snooping on VLANs..............................................................................................................................331
Congure the FC-MAP Value................................................................................................................................. 331
Congure a Port for a Bridge-to-Bridge Link........................................................................................................331
Congure a Port for a Bridge-to-FCF Link............................................................................................................331
Impact on Other Software Features..................................................................................................................... 332
FIP Snooping Restrictions...................................................................................................................................... 332
Conguring FIP Snooping.......................................................................................................................................332
Displaying FIP Snooping Information...........................................................................................................................333
FCoE Transit Conguration Example...........................................................................................................................338
16 Flex Hash and Optimized Boot-Up............................................................................................................340
Flex Hash Capability Overview.................................................................................................................................... 340
Conguring the Flex Hash Mechanism.......................................................................................................................340
Conguring Fast Boot and LACP Fast Switchover....................................................................................................341
Optimizing the Boot Time..............................................................................................................................................341
Booting Process When Optimized Boot Time Mechanism is Enabled...............................................................341
Guidelines for Conguring Optimized Booting Mechanism................................................................................342
Interoperation of Applications with Fast Boot and System States..........................................................................343
LACP and IPv4 Routing.......................................................................................................................................... 343
LACP and IPv6 Routing.......................................................................................................................................... 343
BGP Graceful Restart............................................................................................................................................. 344
Cold Boot Caused by Power Cycling the System................................................................................................344
Unexpected Reload of the System........................................................................................................................344
Contents
11