Administrator Guide

Table Of Contents
DHCP Packet Format and Options.............................................................................................................................205
Assign an IP Address using DHCP.............................................................................................................................. 206
Implementation Information..........................................................................................................................................207
Configure the System to be a DHCP Server........................................................................................................... 208
Configuring the Server for Automatic Address Allocation..............................................................................208
Specifying a Default Gateway................................................................................................................................209
Configure a Method of Hostname Resolution.................................................................................................... 210
Using DNS for Address Resolution........................................................................................................................210
Using NetBIOS WINS for Address Resolution.................................................................................................... 210
Creating Manual Binding Entries............................................................................................................................210
Debugging the DHCP Server................................................................................................................................... 211
Using DHCP Clear Commands.................................................................................................................................211
Configure the System to be a Relay Agent................................................................................................................211
Configure the System to be a DHCP Client..............................................................................................................213
DHCP Client on a Management Interface........................................................................................................... 213
DHCP Client Operation with Other Features......................................................................................................214
Configure the System for User Port Stacking (Option 230)................................................................................215
Configure Secure DHCP................................................................................................................................................ 215
Option 82..................................................................................................................................................................... 215
DHCP Snooping..........................................................................................................................................................216
Drop DHCP Packets on Snooped VLANs Only................................................................................................... 218
Dynamic ARP Inspection.......................................................................................................................................... 219
Configuring Dynamic ARP Inspection.................................................................................................................. 220
Source Address Validation............................................................................................................................................220
Enabling IP Source Address Validation................................................................................................................. 221
DHCP MAC Source Address Validation................................................................................................................221
Enabling IP+MAC Source Address Validation..................................................................................................... 221
Viewing the Number of SAV Dropped Packets................................................................................................. 222
Clearing the Number of SAV Dropped Packets.................................................................................................222
Chapter 13: Equal Cost Multi-Path (ECMP)............................................................................... 224
ECMP for Flow-Based Affinity.................................................................................................................................... 224
Configuring the Hash Algorithm............................................................................................................................ 224
Enabling Deterministic ECMP Next Hop............................................................................................................. 224
Configuring the Hash Algorithm Seed..................................................................................................................225
Link Bundle Monitoring..................................................................................................................................................225
Managing ECMP Group Paths...............................................................................................................................225
Creating an ECMP Group Bundle..........................................................................................................................226
Modifying the ECMP Group Threshold................................................................................................................226
Chapter 14: Enabling FIPS Cryptography................................................................................... 228
Configuration Tasks........................................................................................................................................................228
Preparing the System.................................................................................................................................................... 228
Enabling FIPS Mode....................................................................................................................................................... 228
Generating Host-Keys................................................................................................................................................... 229
Monitoring FIPS Mode Status..................................................................................................................................... 229
Disabling FIPS Mode...................................................................................................................................................... 230
Chapter 15: Force10 Resilient Ring Protocol (FRRP).................................................................. 231
8
Contents