Users Guide
Configure the System to be a DHCP Client..................................................................................................... 242
Configuring the DHCP Client System..........................................................................................................242
DHCP Client on a Management Interface.................................................................................................. 243
DHCP Client Operation with Other Features.............................................................................................244
Configure the System for User Port Stacking (Option 230)..........................................................................245
Configure Secure DHCP.......................................................................................................................................245
Option 82...........................................................................................................................................................245
DHCP Snooping............................................................................................................................................... 246
Drop DHCP Packets on Snooped VLANs Only..........................................................................................249
Dynamic ARP Inspection................................................................................................................................ 250
Configuring Dynamic ARP Inspection..........................................................................................................251
Source Address Validation....................................................................................................................................252
Enabling IP Source Address Validation........................................................................................................ 252
DHCP MAC Source Address Validation....................................................................................................... 253
Enabling IP+MAC Source Address Validation.............................................................................................253
Viewing the Number of SAV Dropped Packets..........................................................................................253
Clearing the Number of SAV Dropped Packets.........................................................................................254
13 Equal Cost Multi-Path (ECMP)........................................................................................................................ 255
ECMP for Flow-Based Affinity............................................................................................................................. 255
Configuring the Hash Algorithm................................................................................................................... 255
Enabling Deterministic ECMP Next Hop..................................................................................................... 255
Configuring the Hash Algorithm Seed.........................................................................................................256
Link Bundle Monitoring.........................................................................................................................................256
Managing ECMP Group Paths........................................................................................................................257
Creating an ECMP Group Bundle..................................................................................................................257
Modifying the ECMP Group Threshold........................................................................................................257
14 FIPS Cryptography............................................................................................................................................259
Configuration Tasks...............................................................................................................................................259
Preparing the System............................................................................................................................................ 259
Enabling FIPS Mode...............................................................................................................................................260
Generating Host-Keys...........................................................................................................................................260
Monitoring FIPS Mode Status.............................................................................................................................. 260
Disabling FIPS Mode.............................................................................................................................................. 261
15 Force10 Resilient Ring Protocol (FRRP)........................................................................................................262
Protocol Overview................................................................................................................................................. 262
Ring Status......................................................................................................................................................... 263
Multiple FRRP Rings......................................................................................................................................... 263
Important FRRP Points....................................................................................................................................264
Important FRRP Concepts..............................................................................................................................265
Implementing FRRP...............................................................................................................................................266
FRRP Configuration............................................................................................................................................... 266
Creating the FRRP Group............................................................................................................................... 266
Configuring the Control VLAN...................................................................................................................... 267
Configuring and Adding the Member VLANs.............................................................................................268
Contents
9