White Papers

Table Of Contents
Creating an ECMP Group Bundle..........................................................................................................................307
Modifying the ECMP Group Threshold................................................................................................................307
RTAG7............................................................................................................................................................................... 308
Flow-based Hashing for ECMP................................................................................................................................... 309
Chapter 15: FIP Snooping...........................................................................................................312
Fibre Channel over Ethernet.........................................................................................................................................312
Ensure Robustness in a Converged Ethernet Network..........................................................................................312
FIP Snooping on Ethernet Bridges.............................................................................................................................. 313
FIP Snooping in a Switch Stack................................................................................................................................... 315
Using FIP Snooping......................................................................................................................................................... 315
FIP Snooping Prerequisites..................................................................................................................................... 315
Important Points to Remember..............................................................................................................................315
Enabling the FCoE Transit Feature....................................................................................................................... 316
Enable FIP Snooping on VLANs..............................................................................................................................316
Configure the FC-MAP Value................................................................................................................................. 317
Configure a Port for a Bridge-to-Bridge Link......................................................................................................317
Configure a Port for a Bridge-to-FCF Link..........................................................................................................317
Impact on Other Software Features..................................................................................................................... 317
FIP Snooping Restrictions........................................................................................................................................318
Configuring FIP Snooping........................................................................................................................................ 318
Displaying FIP Snooping Information.......................................................................................................................... 319
FCoE Transit Configuration Example......................................................................................................................... 324
Chapter 16: FIPS Cryptography................................................................................................. 326
Configuration Tasks........................................................................................................................................................326
Preparing the System.................................................................................................................................................... 326
Enabling FIPS Mode....................................................................................................................................................... 326
Generating Host-Keys....................................................................................................................................................327
Monitoring FIPS Mode Status......................................................................................................................................327
Disabling FIPS Mode.......................................................................................................................................................327
Chapter 17: Force10 Resilient Ring Protocol (FRRP)..................................................................329
Protocol Overview..........................................................................................................................................................329
Ring Status................................................................................................................................................................. 330
Multiple FRRP Rings.................................................................................................................................................330
Important FRRP Points.............................................................................................................................................331
Important FRRP Concepts......................................................................................................................................332
Implementing FRRP........................................................................................................................................................332
FRRP Configuration........................................................................................................................................................333
Creating the FRRP Group....................................................................................................................................... 333
Configuring the Control VLAN...............................................................................................................................333
Configuring and Adding the Member VLANs..................................................................................................... 334
Setting the FRRP Timers........................................................................................................................................ 335
Clearing the FRRP Counters.................................................................................................................................. 335
Viewing the FRRP Configuration.......................................................................................................................... 335
Viewing the FRRP Information.............................................................................................................................. 335
Troubleshooting FRRP...................................................................................................................................................336
Sample Configuration and Topology.......................................................................................................................... 336
10
Contents