Users Guide

Ensure Robustness in a Converged Ethernet Network............................................................................................363
FIP Snooping on Ethernet Bridges..............................................................................................................................365
FIP Snooping in a Switch Stack................................................................................................................................... 367
Using FIP Snooping....................................................................................................................................................... 367
FIP Snooping Prerequisites.....................................................................................................................................367
Important Points to Remember..............................................................................................................................367
Enabling the FCoE Transit Feature........................................................................................................................368
Enable FIP Snooping on VLANs.............................................................................................................................368
Congure the FC-MAP Value................................................................................................................................ 368
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................369
Congure a Port for a Bridge-to-FCF Link...........................................................................................................369
Impact on Other Software Features..................................................................................................................... 369
FIP Snooping Restrictions...................................................................................................................................... 369
Conguring FIP Snooping............................................................................................................................................. 370
Displaying FIP Snooping Information............................................................................................................................371
FCoE Transit Conguration Example...........................................................................................................................376
16 FIPS Cryptography................................................................................................................................... 378
Conguration Tasks....................................................................................................................................................... 378
Preparing the System....................................................................................................................................................378
Enabling FIPS Mode...................................................................................................................................................... 379
Generating Host-Keys................................................................................................................................................... 379
Monitoring FIPS Mode Status......................................................................................................................................379
Disabling FIPS Mode..................................................................................................................................................... 380
17 Flex Hash and Optimized Boot-Up.............................................................................................................381
Flex Hash Capability Overview..................................................................................................................................... 381
Conguring the Flex Hash Mechanism........................................................................................................................381
LACP Fast Switchover..................................................................................................................................................382
Conguring LACP Fast Switchover.............................................................................................................................382
LACP............................................................................................................................................................................... 382
LACP Fast Switchover............................................................................................................................................382
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................382
Sample Congurations.................................................................................................................................................. 384
................................................................................................................................................................................... 384
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 387
18 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 388
Protocol Overview......................................................................................................................................................... 388
Ring Status............................................................................................................................................................... 389
Multiple FRRP Rings............................................................................................................................................... 389
Important FRRP Points...........................................................................................................................................390
Implementing FRRP................................................................................................................................................ 390
Important FRRP Concepts......................................................................................................................................391
FRRP Conguration.......................................................................................................................................................392
Creating the FRRP Group.......................................................................................................................................392
12
Contents