Deployment Guide

Table Of Contents
Debugging the DHCP Server..................................................................................................................................279
Using DHCP Clear Commands............................................................................................................................... 279
Configure the System to be a DHCP Client............................................................................................................. 279
Configuring the DHCP Client System.................................................................................................................. 279
DHCP Client on a Management Interface........................................................................................................... 281
DHCP Client Operation with Other Features......................................................................................................281
DHCP Relay When DHCP Server and Client are in Different VRFs................................................................... 282
Configuring Route Leaking between VRFs on DHCP Relay Agent............................................................... 282
Non-default VRF configuration for DHCPv6 helper address............................................................................... 283
Configuring DHCP relay source interface.................................................................................................................283
Global DHCP relay source IPv4 or IPv6 configuration ....................................................................................284
Interface level DHCP relay source IPv4 or IPv6 configuration .....................................................................284
Configure the System for User Port Stacking (Option 230)............................................................................... 285
Configure Secure DHCP............................................................................................................................................... 285
Option 82 (DHCPv4 relay options).......................................................................................................................286
DHCPv6 relay agent options..................................................................................................................................286
DHCP Snooping......................................................................................................................................................... 287
Drop DHCP Packets on Snooped VLANs Only...................................................................................................291
Dynamic ARP Inspection.......................................................................................................................................... 291
Configuring Dynamic ARP Inspection...................................................................................................................292
Source Address Validation............................................................................................................................................ 293
Enabling IP Source Address Validation................................................................................................................ 293
DHCP MAC Source Address Validation............................................................................................................... 294
Enabling IP+MAC Source Address Validation.................................................................................................... 294
Viewing the Number of SAV Dropped Packets................................................................................................. 295
Clearing the Number of SAV Dropped Packets.................................................................................................295
Chapter 13: Equal Cost Multi-Path (ECMP)............................................................................... 296
ECMP for Flow-Based Affinity.................................................................................................................................... 296
Configuring the Hash Algorithm............................................................................................................................ 296
Enabling Deterministic ECMP Next Hop............................................................................................................. 296
Configuring the Hash Algorithm Seed..................................................................................................................297
Link Bundle Monitoring.................................................................................................................................................. 297
Managing ECMP Group Paths...............................................................................................................................298
Creating an ECMP Group Bundle..........................................................................................................................298
Modifying the ECMP Group Threshold................................................................................................................298
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table..............................299
Support for ECMP in host table............................................................................................................................299
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ....................................................................299
Chapter 14: FIP Snooping.......................................................................................................... 300
Fibre Channel over Ethernet........................................................................................................................................300
Ensure Robustness in a Converged Ethernet Network.........................................................................................300
FIP Snooping on Ethernet Bridges.............................................................................................................................. 301
FIP Snooping in a Switch Stack.................................................................................................................................. 303
Using FIP Snooping........................................................................................................................................................ 303
FIP Snooping Prerequisites.....................................................................................................................................303
Important Points to Remember............................................................................................................................. 303
Enabling the FCoE Transit Feature.......................................................................................................................304
Contents
9