Connectivity Guide

Table Of Contents
Modifying the ECMP Group Threshold................................................................................................................ 310
RTAG7................................................................................................................................................................................. 311
Flow-based Hashing for ECMP.................................................................................................................................... 312
Chapter 15: FIP Snooping...........................................................................................................315
Fibre Channel over Ethernet.........................................................................................................................................315
Ensure Robustness in a Converged Ethernet Network..........................................................................................315
FIP Snooping on Ethernet Bridges.............................................................................................................................. 316
FIP Snooping in a Switch Stack................................................................................................................................... 318
Using FIP Snooping......................................................................................................................................................... 318
FIP Snooping Prerequisites..................................................................................................................................... 318
Important Points to Remember..............................................................................................................................318
Enabling the FCoE Transit Feature....................................................................................................................... 319
Enable FIP Snooping on VLANs..............................................................................................................................319
Configure the FC-MAP Value................................................................................................................................ 320
Configure a Port for a Bridge-to-Bridge Link.................................................................................................... 320
Configure a Port for a Bridge-to-FCF Link.........................................................................................................320
Impact on Other Software Features.................................................................................................................... 320
FIP Snooping Restrictions........................................................................................................................................321
Configuring FIP Snooping........................................................................................................................................ 321
Displaying FIP Snooping Information..........................................................................................................................322
FCoE Transit Configuration Example......................................................................................................................... 327
Chapter 16: FIPS Cryptography................................................................................................. 329
Configuration Tasks........................................................................................................................................................329
Preparing the System.................................................................................................................................................... 329
Enabling FIPS Mode....................................................................................................................................................... 329
Generating Host-Keys................................................................................................................................................... 330
Monitoring FIPS Mode Status..................................................................................................................................... 330
Disabling FIPS Mode...................................................................................................................................................... 330
Chapter 17: Force10 Resilient Ring Protocol (FRRP)..................................................................332
Protocol Overview.......................................................................................................................................................... 332
Ring Status................................................................................................................................................................. 333
Multiple FRRP Rings.................................................................................................................................................333
Important FRRP Points............................................................................................................................................334
Important FRRP Concepts......................................................................................................................................335
Implementing FRRP........................................................................................................................................................335
FRRP Configuration....................................................................................................................................................... 336
Creating the FRRP Group....................................................................................................................................... 336
Configuring the Control VLAN...............................................................................................................................336
Configuring and Adding the Member VLANs......................................................................................................337
Setting the FRRP Timers........................................................................................................................................ 338
Clearing the FRRP Counters.................................................................................................................................. 338
Viewing the FRRP Configuration...........................................................................................................................338
Viewing the FRRP Information.............................................................................................................................. 338
Troubleshooting FRRP...................................................................................................................................................339
Sample Configuration and Topology.......................................................................................................................... 339
FRRP Support on VLT................................................................................................................................................... 340
10
Contents