Administrator Guide

Ensure Robustness in a Converged Ethernet Network............................................................................................ 367
FIP Snooping on Ethernet Bridges..............................................................................................................................369
FIP Snooping in a Switch Stack....................................................................................................................................371
Using FIP Snooping........................................................................................................................................................ 371
FIP Snooping Prerequisites......................................................................................................................................371
Important Points to Remember.............................................................................................................................. 371
Enabling the FCoE Transit Feature........................................................................................................................ 372
Enable FIP Snooping on VLANs............................................................................................................................. 372
Congure the FC-MAP Value.................................................................................................................................372
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 373
Congure a Port for a Bridge-to-FCF Link........................................................................................................... 373
Impact on Other Software Features......................................................................................................................373
FIP Snooping Restrictions.......................................................................................................................................373
Conguring FIP Snooping............................................................................................................................................. 374
Displaying FIP Snooping Information...........................................................................................................................375
FCoE Transit Conguration Example.......................................................................................................................... 380
16 FIPS Cryptography...................................................................................................................................382
Conguration Tasks....................................................................................................................................................... 382
Preparing the System....................................................................................................................................................382
Enabling FIPS Mode...................................................................................................................................................... 383
Generating Host-Keys...................................................................................................................................................383
Monitoring FIPS Mode Status......................................................................................................................................383
Disabling FIPS Mode..................................................................................................................................................... 384
17 Flex Hash and Optimized Boot-Up............................................................................................................385
Flex Hash Capability Overview.................................................................................................................................... 385
Conguring the Flex Hash Mechanism.......................................................................................................................385
LACP Fast Switchover..................................................................................................................................................386
Conguring LACP Fast Switchover............................................................................................................................ 386
LACP............................................................................................................................................................................... 386
LACP Fast Switchover............................................................................................................................................386
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 386
Sample Congurations.................................................................................................................................................. 388
................................................................................................................................................................................... 388
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.......................................................................................391
18 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 392
Protocol Overview......................................................................................................................................................... 392
Ring Status............................................................................................................................................................... 393
Multiple FRRP Rings................................................................................................................................................393
Important FRRP Points...........................................................................................................................................394
Implementing FRRP.................................................................................................................................................394
Important FRRP Concepts.....................................................................................................................................395
FRRP Conguration...................................................................................................................................................... 396
Creating the FRRP Group...................................................................................................................................... 396
12
Contents