Concept Guide
IPv6 DHCP Snooping MAC-Address Verication................................................................................................292
16 Equal Cost Multi-Path (ECMP)................................................................................................................ 293
ECMP for Flow-Based Anity..................................................................................................................................... 293
Enabling Deterministic ECMP Next Hop.............................................................................................................. 293
Link Bundle Monitoring................................................................................................................................................. 293
Managing ECMP Group Paths.....................................................................................................................................294
17 FC FPORT................................................................................................................................................295
FC FPORT...................................................................................................................................................................... 296
Conguring Switch Mode to FCF Port Mode............................................................................................................296
Name Server...................................................................................................................................................................297
FCoE Maps.....................................................................................................................................................................298
Creating an FCoE Map..................................................................................................................................................298
Zoning............................................................................................................................................................................. 299
Creating Zone and Adding Members.......................................................................................................................... 300
Creating Zone Alias and Adding Members................................................................................................................. 300
Creating Zonesets......................................................................................................................................................... 300
Activating a Zoneset...................................................................................................................................................... 301
Displaying the Fabric Parameters................................................................................................................................. 301
18 FCoE Transit.............................................................................................................................................304
Supported Modes..........................................................................................................................................................304
Fibre Channel over Ethernet........................................................................................................................................ 304
Ensure Robustness in a Converged Ethernet Network............................................................................................304
FIP Snooping on Ethernet Bridges..............................................................................................................................306
FIP Snooping in a Switch Stack................................................................................................................................... 307
Using FIP Snooping....................................................................................................................................................... 308
Important Points to Remember............................................................................................................................. 308
Enabling the FCoE Transit Feature........................................................................................................................308
Enable FIP Snooping on VLANs.............................................................................................................................308
Congure the FC-MAP Value................................................................................................................................ 309
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................309
Congure a Port for a Bridge-to-FCF Link...........................................................................................................309
Impact on Other Software Features..................................................................................................................... 309
FIP Snooping Prerequisites..................................................................................................................................... 310
FIP Snooping Restrictions.......................................................................................................................................310
Conguring FIP Snooping........................................................................................................................................310
Displaying FIP Snooping Information............................................................................................................................ 311
FCoE Transit Conguration Example........................................................................................................................... 316
19 FIPS Cryptography................................................................................................................................... 318
Preparing the System.................................................................................................................................................... 318
Enabling FIPS Mode.......................................................................................................................................................318
Generating Host-Keys....................................................................................................................................................319
Monitoring FIPS Mode Status...................................................................................................................................... 319
Contents
11