Administrator Guide

Specifying a Default Gateway................................................................................................................................ 246
Congure a Method of Hostname Resolution......................................................................................................246
Using DNS for Address Resolution........................................................................................................................246
Using NetBIOS WINS for Address Resolution......................................................................................................247
Creating Manual Binding Entries............................................................................................................................247
Debugging the DHCP Server................................................................................................................................. 247
Using DHCP Clear Commands...............................................................................................................................248
Congure the System to be a Relay Agent................................................................................................................ 248
Congure the System to be a DHCP Client...............................................................................................................250
Conguring the DHCP Client System...................................................................................................................250
DHCP Client on a Management Interface.............................................................................................................251
DHCP Client Operation with Other Features.......................................................................................................252
Congure the System for User Port Stacking (Option 230)....................................................................................253
Congure Secure DHCP...............................................................................................................................................253
Option 82..................................................................................................................................................................253
DHCP Snooping.......................................................................................................................................................254
Drop DHCP Packets on Snooped VLANs Only....................................................................................................257
Dynamic ARP Inspection........................................................................................................................................ 258
Conguring Dynamic ARP Inspection................................................................................................................... 259
Source Address Validation............................................................................................................................................ 260
Enabling IP Source Address Validation..................................................................................................................260
DHCP MAC Source Address Validation................................................................................................................. 261
Enabling IP+MAC Source Address Validation....................................................................................................... 261
Viewing the Number of SAV Dropped Packets....................................................................................................262
Clearing the Number of SAV Dropped Packets................................................................................................... 262
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 263
ECMP for Flow-Based Anity.....................................................................................................................................263
Conguring the Hash Algorithm............................................................................................................................ 263
Enabling Deterministic ECMP Next Hop.............................................................................................................. 263
Conguring the Hash Algorithm Seed.................................................................................................................. 264
Link Bundle Monitoring................................................................................................................................................. 264
Managing ECMP Group Paths...............................................................................................................................265
Creating an ECMP Group Bundle..........................................................................................................................265
Modifying the ECMP Group Threshold................................................................................................................ 265
14 FIPS Cryptography................................................................................................................................... 267
Conguration Tasks....................................................................................................................................................... 267
Preparing the System....................................................................................................................................................267
Enabling FIPS Mode...................................................................................................................................................... 268
Generating Host-Keys...................................................................................................................................................268
Monitoring FIPS Mode Status......................................................................................................................................268
Disabling FIPS Mode..................................................................................................................................................... 269
15 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 270
Protocol Overview......................................................................................................................................................... 270
Contents
9