Administrator Guide

Using DHCP Clear Commands...............................................................................................................................272
Congure the System to be a Relay Agent.................................................................................................................272
Congure the System to be a DHCP Client................................................................................................................274
Conguring the DHCP Client System....................................................................................................................274
DHCP Client on a Management Interface............................................................................................................ 275
DHCP Client Operation with Other Features....................................................................................................... 276
DHCP Relay When DHCP Server and Client are in Dierent VRFs.........................................................................277
Conguring Route Leaking between VRFs on DHCP Relay Agent....................................................................277
Non-default VRF conguration for DHCPv6 helper address................................................................................... 278
Conguring DHCP relay source interface................................................................................................................... 279
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 279
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................279
Congure the System for User Port Stacking (Option 230).................................................................................... 281
Congure Secure DHCP................................................................................................................................................281
Option 82...................................................................................................................................................................281
DHCPv6 relay agent options.................................................................................................................................. 282
DHCP Snooping....................................................................................................................................................... 282
Drop DHCP Packets on Snooped VLANs Only.................................................................................................... 287
Dynamic ARP Inspection.........................................................................................................................................287
Conguring Dynamic ARP Inspection................................................................................................................... 288
Source Address Validation............................................................................................................................................ 289
Enabling IP Source Address Validation..................................................................................................................289
DHCP MAC Source Address Validation................................................................................................................ 290
Enabling IP+MAC Source Address Validation.......................................................................................................290
Viewing the Number of SAV Dropped Packets.................................................................................................... 291
Clearing the Number of SAV Dropped Packets....................................................................................................291
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 292
ECMP for Flow-Based Anity.....................................................................................................................................292
Conguring the Hash Algorithm............................................................................................................................ 292
Enabling Deterministic ECMP Next Hop.............................................................................................................. 292
Conguring the Hash Algorithm Seed.................................................................................................................. 293
Link Bundle Monitoring................................................................................................................................................. 293
Managing ECMP Group Paths...............................................................................................................................294
Creating an ECMP Group Bundle..........................................................................................................................294
Modifying the ECMP Group Threshold.................................................................................................................294
14 FIPS Cryptography...................................................................................................................................296
Conguration Tasks....................................................................................................................................................... 296
Preparing the System....................................................................................................................................................296
Enabling FIPS Mode...................................................................................................................................................... 297
Generating Host-Keys................................................................................................................................................... 297
Monitoring FIPS Mode Status......................................................................................................................................297
Disabling FIPS Mode..................................................................................................................................................... 298
15 Force10 Resilient Ring Protocol (FRRP)...................................................................................................299
Contents
9