Users Guide
Configure a Method of Hostname Resolution..................................................................................................... 244
Using DNS for Address Resolution........................................................................................................................244
Using NetBIOS WINS for Address Resolution.....................................................................................................245
Creating Manual Binding Entries........................................................................................................................... 245
Debugging the DHCP Server.................................................................................................................................245
Using DHCP Clear Commands.............................................................................................................................. 246
Configure the System to be a Relay Agent................................................................................................................246
Configure the System to be a DHCP Client...............................................................................................................248
Configuring the DHCP Client System...................................................................................................................248
DHCP Client on a Management Interface............................................................................................................249
DHCP Client Operation with Other Features...................................................................................................... 250
Configure the System for User Port Stacking (Option 230)................................................................................... 251
Configure Secure DHCP............................................................................................................................................... 251
Option 82...................................................................................................................................................................251
DHCP Snooping.......................................................................................................................................................252
Drop DHCP Packets on Snooped VLANs Only................................................................................................... 255
Dynamic ARP Inspection........................................................................................................................................ 256
Configuring Dynamic ARP Inspection................................................................................................................... 257
Source Address Validation............................................................................................................................................258
Enabling IP Source Address Validation................................................................................................................. 258
DHCP MAC Source Address Validation................................................................................................................259
Enabling IP+MAC Source Address Validation......................................................................................................259
Viewing the Number of SAV Dropped Packets...................................................................................................260
Clearing the Number of SAV Dropped Packets.................................................................................................. 260
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 261
ECMP for Flow-Based Affinity.....................................................................................................................................261
Configuring the Hash Algorithm.............................................................................................................................261
Enabling Deterministic ECMP Next Hop...............................................................................................................261
Configuring the Hash Algorithm Seed.................................................................................................................. 262
Link Bundle Monitoring................................................................................................................................................. 262
Managing ECMP Group Paths...............................................................................................................................263
Creating an ECMP Group Bundle..........................................................................................................................263
Modifying the ECMP Group Threshold................................................................................................................ 263
14 FIPS Cryptography.................................................................................................................................. 265
Configuration Tasks...................................................................................................................................................... 265
Preparing the System................................................................................................................................................... 265
Enabling FIPS Mode......................................................................................................................................................266
Generating Host-Keys.................................................................................................................................................. 266
Monitoring FIPS Mode Status..................................................................................................................................... 266
Disabling FIPS Mode......................................................................................................................................................267
15 Force10 Resilient Ring Protocol (FRRP).................................................................................................. 268
Protocol Overview.........................................................................................................................................................268
Ring Status...............................................................................................................................................................269
Contents
9