Reference Guide

Table Of Contents
Configuring the Hash Algorithm Seed.................................................................................................................. 318
Link Bundle Monitoring...................................................................................................................................................318
Managing ECMP Group Paths................................................................................................................................319
Creating an ECMP Group Bundle.......................................................................................................................... 319
Modifying the ECMP Group Threshold................................................................................................................ 319
RTAG7............................................................................................................................................................................... 320
Flow-based Hashing for ECMP.................................................................................................................................... 321
Chapter 15: FIP Snooping.......................................................................................................... 324
Fibre Channel over Ethernet........................................................................................................................................ 324
Ensure Robustness in a Converged Ethernet Network.........................................................................................324
FIP Snooping on Ethernet Bridges............................................................................................................................. 325
FIP Snooping in a Switch Stack...................................................................................................................................327
Using FIP Snooping.........................................................................................................................................................327
FIP Snooping Prerequisites.....................................................................................................................................327
Important Points to Remember............................................................................................................................. 327
Enabling the FCoE Transit Feature.......................................................................................................................328
Enable FIP Snooping on VLANs.............................................................................................................................328
Configure the FC-MAP Value................................................................................................................................ 329
Configure a Port for a Bridge-to-Bridge Link.....................................................................................................329
Configure a Port for a Bridge-to-FCF Link.........................................................................................................329
Impact on Other Software Features.................................................................................................................... 329
FIP Snooping Restrictions.......................................................................................................................................330
Configuring FIP Snooping....................................................................................................................................... 330
Displaying FIP Snooping Information.......................................................................................................................... 331
FCoE Transit Configuration Example......................................................................................................................... 336
Chapter 16: Flex Hash and Optimized Boot-Up...........................................................................338
Flex Hash Capability Overview.................................................................................................................................... 338
Configuring the Flex Hash Mechanism...................................................................................................................... 338
Configuring Fast Boot and LACP Fast Switchover................................................................................................ 339
Optimizing the Boot Time............................................................................................................................................. 339
Interoperation of Applications with Fast Boot and System States.................................................................... 340
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 343
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 343
Chapter 17: FIPS Cryptography................................................................................................. 345
Configuration Tasks....................................................................................................................................................... 345
Preparing the System.................................................................................................................................................... 345
Enabling FIPS Mode....................................................................................................................................................... 345
Generating Host-Keys................................................................................................................................................... 346
Monitoring FIPS Mode Status..................................................................................................................................... 346
Disabling FIPS Mode...................................................................................................................................................... 346
Chapter 18: Force10 Resilient Ring Protocol (FRRP)..................................................................348
Protocol Overview.......................................................................................................................................................... 348
Ring Status................................................................................................................................................................. 349
Multiple FRRP Rings.................................................................................................................................................349
Important FRRP Points............................................................................................................................................350
10
Contents