Users Guide

Configure the System to be a DHCP Client......................................................................................................337
DHCP Client on a Management Interface...................................................................................................337
DHCP Client Operation with Other Features............................................................................................. 337
Configure Secure DHCP.......................................................................................................................................338
Option 82...........................................................................................................................................................338
DHCP Snooping................................................................................................................................................339
Drop DHCP Packets on Snooped VLANs Only.......................................................................................... 341
Dynamic ARP Inspection................................................................................................................................ 342
Configuring Dynamic ARP Inspection......................................................................................................... 343
Source Address Validation................................................................................................................................... 344
Enabling IP Source Address Validation........................................................................................................344
DHCP MAC Source Address Validation....................................................................................................... 345
Enabling IP+MAC Source Address Validation.............................................................................................345
Viewing the Number of SAV Dropped Packets..........................................................................................345
Clearing the Number of SAV Dropped Packets.........................................................................................346
14 Equal Cost Multi-Path (ECMP)........................................................................................................................347
ECMP for Flow-Based Affinity............................................................................................................................. 347
Enabling Deterministic ECMP Next Hop..................................................................................................... 347
Configuring the Hash Algorithm Seed.........................................................................................................347
Link Bundle Monitoring...................................................................................................................................348
Managing ECMP Group Paths.............................................................................................................................348
Creating an ECMP Group Bundle.......................................................................................................................349
Modifying the ECMP Group Threshold............................................................................................................. 349
BGP Multipath Operation with Link Bankwidth............................................................................................... 350
Dynamic Re-calculation of Link Bankwidth......................................................................................................351
Weighted ECMP for Static Routes...................................................................................................................... 352
ECMP Support in L3 Host and LPM Tables....................................................................................................... 352
15 FCoE Transit....................................................................................................................................................... 353
Fibre Channel over Ethernet................................................................................................................................353
Ensure Robustness in a Converged Ethernet Network..................................................................................353
FIP Snooping on Ethernet Bridges......................................................................................................................355
FIP Snooping in a Switch Stack........................................................................................................................... 357
Using FIP Snooping................................................................................................................................................357
FIP Snooping Prerequisites.............................................................................................................................357
Important Points to Remember.....................................................................................................................357
Enabling the FCoE Transit Feature............................................................................................................... 358
Enable FIP Snooping on VLANs.....................................................................................................................358
Configure the FC-MAP Value........................................................................................................................ 358
Configure a Port for a Bridge-to-Bridge Link............................................................................................ 359
Configure a Port for a Bridge-to-FCF Link................................................................................................. 359
Impact on Other Software Features.............................................................................................................359
FIP Snooping Restrictions...............................................................................................................................359
Configuring FIP Snooping....................................................................................................................................360
Displaying FIP Snooping Information.................................................................................................................361
FCoE Transit Configuration Example.................................................................................................................366
Contents
11