Service Manual

Source Address Validation..............................................................................................................................................311
Enabling IP Source Address Validation..................................................................................................................311
DHCP MAC Source Address Validation.................................................................................................................311
Enabling IP+MAC Source Address Validation..................................................................................................... 312
Viewing the Number of SAV Dropped Packets.................................................................................................. 312
Clearing the Number of SAV Dropped Packets..................................................................................................313
Chapter 14: Equal Cost Multi-Path (ECMP)................................................................................314
ECMP for Flow-Based Affinity..................................................................................................................................... 314
Configuring the Hash Algorithm Seed.................................................................................................................. 314
Link Bundle Monitoring...................................................................................................................................................314
Managing ECMP Group Paths................................................................................................................................315
Creating an ECMP Group Bundle.......................................................................................................................... 315
Modifying the ECMP Group Threshold................................................................................................................ 316
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table...............................316
Support for ECMP in host table.............................................................................................................................316
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes .....................................................................317
RTAG7...........................................................................................................................................................................317
Flow-based Hashing for ECMP.............................................................................................................................. 318
Chapter 15: FIP Snooping...........................................................................................................321
Fibre Channel over Ethernet.........................................................................................................................................321
Ensure Robustness in a Converged Ethernet Network..........................................................................................321
FIP Snooping on Ethernet Bridges..............................................................................................................................322
Using FIP Snooping.........................................................................................................................................................324
FIP Snooping Prerequisites.....................................................................................................................................324
Important Points to Remember............................................................................................................................. 324
Enabling the FCoE Transit Feature.......................................................................................................................325
Enable FIP Snooping on VLANs.............................................................................................................................326
Configure the FC-MAP Value................................................................................................................................ 326
Configure a Port for a Bridge-to-Bridge Link.....................................................................................................326
Configure a Port for a Bridge-to-FCF Link.........................................................................................................326
Impact on Other Software Features.................................................................................................................... 326
FIP Snooping Restrictions.......................................................................................................................................327
Configuring FIP Snooping........................................................................................................................................327
Displaying FIP Snooping Information..........................................................................................................................327
FCoE Transit Configuration Example......................................................................................................................... 332
Chapter 16: Flex Hash and Optimized Boot-Up...........................................................................334
Flex Hash Capability Overview.................................................................................................................................... 334
Configuring the Flex Hash Mechanism...................................................................................................................... 334
Configuring Fast Boot and LACP Fast Switchover................................................................................................ 335
Optimizing the Boot Time............................................................................................................................................. 335
Interoperation of Applications with Fast Boot and System States.....................................................................336
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 339
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 339
Chapter 17: Force10 Resilient Ring Protocol (FRRP).................................................................. 341
Protocol Overview...........................................................................................................................................................341
10
Contents