Users Guide
Implementation Information......................................................................................................................................... 340
Configure the System to be a DHCP Server.............................................................................................................340
Configuring the Server for Automatic Address Allocation..................................................................................341
Specifying a Default Gateway................................................................................................................................342
Configure a Method of Hostname Resolution..................................................................................................... 342
Using DNS for Address Resolution........................................................................................................................342
Using NetBIOS WINS for Address Resolution..................................................................................................... 343
Creating Manual Binding Entries............................................................................................................................343
Debugging the DHCP Server................................................................................................................................. 343
Using DHCP Clear Commands...............................................................................................................................344
Configure the System to be a Relay Agent................................................................................................................344
Configure the System to be a DHCP Client...............................................................................................................346
DHCP Client on a Management Interface............................................................................................................346
DHCP Client Operation with Other Features...................................................................................................... 346
Configure Secure DHCP...............................................................................................................................................347
Option 82.................................................................................................................................................................. 347
DHCP Snooping.......................................................................................................................................................348
Drop DHCP Packets on Snooped VLANs Only................................................................................................... 350
Dynamic ARP Inspection......................................................................................................................................... 351
Configuring Dynamic ARP Inspection................................................................................................................... 352
Source Address Validation............................................................................................................................................353
Enabling IP Source Address Validation................................................................................................................. 353
DHCP MAC Source Address Validation................................................................................................................354
Enabling IP+MAC Source Address Validation......................................................................................................354
Viewing the Number of SAV Dropped Packets...................................................................................................354
Clearing the Number of SAV Dropped Packets.................................................................................................. 355
14 Equal Cost Multi-Path (ECMP)................................................................................................................356
ECMP for Flow-Based Affinity.................................................................................................................................... 356
Enabling Deterministic ECMP Next Hop..............................................................................................................356
Configuring the Hash Algorithm Seed.................................................................................................................. 356
Link Bundle Monitoring........................................................................................................................................... 357
Managing ECMP Group Paths.....................................................................................................................................357
Creating an ECMP Group Bundle................................................................................................................................358
Modifying the ECMP Group Threshold...................................................................................................................... 358
BGP Multipath Operation with Link Bankwidth.........................................................................................................359
Dynamic Re-calculation of Link Bankwidth................................................................................................................360
Weighted ECMP for Static Routes..............................................................................................................................361
ECMP Support in L3 Host and LPM Tables............................................................................................................... 361
15 FCoE Transit............................................................................................................................................ 362
Fibre Channel over Ethernet........................................................................................................................................362
Ensure Robustness in a Converged Ethernet Network............................................................................................362
FIP Snooping on Ethernet Bridges..............................................................................................................................364
FIP Snooping in a Switch Stack...................................................................................................................................366
Using FIP Snooping....................................................................................................................................................... 366
Contents
11