Users Guide

Configure Secure DHCP...................................................................................................................378
Option 82.................................................................................................................................... 379
DHCP Snooping.......................................................................................................................... 379
Drop DHCP Packets on Snooped VLANs Only.......................................................................... 381
Dynamic ARP Inspection............................................................................................................ 382
Configuring Dynamic ARP Inspection........................................................................................383
Source Address Validation................................................................................................................384
Enabling IP Source Address Validation...................................................................................... 384
DHCP MAC Source Address Validation......................................................................................385
Enabling IP+MAC Source Address Validation............................................................................385
Viewing the Number of SAV Dropped Packets..........................................................................386
Clearing the Number of SAV Dropped Packets.........................................................................386
14 Equal Cost Multi-Path (ECMP)..................................................................... 387
ECMP for Flow-Based Affinity.......................................................................................................... 387
Enabling Deterministic ECMP Next Hop....................................................................................387
Configuring the Hash Algorithm Seed....................................................................................... 387
Link Bundle Monitoring.............................................................................................................. 388
Managing ECMP Group Paths..........................................................................................................388
Creating an ECMP Group Bundle.................................................................................................... 389
Modifying the ECMP Group Threshold............................................................................................389
BGP Multipath Operation with Link Bankwidth...............................................................................390
Dynamic Re-calculation of Link Bankwidth.................................................................................... 392
Weighted ECMP for Static Routes....................................................................................................392
ECMP Support in L3 Host and LPM Tables...................................................................................... 393
15 FCoE Transit.................................................................................................... 394
Fibre Channel over Ethernet............................................................................................................ 394
Ensure Robustness in a Converged Ethernet Network...................................................................394
FIP Snooping on Ethernet Bridges................................................................................................... 396
FIP Snooping in a Switch Stack........................................................................................................ 398
Using FIP Snooping...........................................................................................................................398
FIP Snooping Prerequisites.........................................................................................................398
Important Points to Remember................................................................................................. 399
Enabling the FCoE Transit Feature.............................................................................................399
Enable FIP Snooping on VLANs................................................................................................. 400
Configure the FC-MAP Value.....................................................................................................400
Configure a Port for a Bridge-to-Bridge Link........................................................................... 400
Configure a Port for a Bridge-to-FCF Link................................................................................400
Impact on Other Software Features.......................................................................................... 400
FIP Snooping Restrictions...........................................................................................................401
Configuring FIP Snooping................................................................................................................ 401
12