Install Guide

Table Of Contents
Configuring the Hash Algorithm............................................................................................................................ 308
Enabling Deterministic ECMP Next Hop............................................................................................................. 308
Configuring the Hash Algorithm Seed................................................................................................................. 309
Link Bundle Monitoring..................................................................................................................................................309
Managing ECMP Group Paths................................................................................................................................310
Creating an ECMP Group Bundle.......................................................................................................................... 310
Modifying the ECMP Group Threshold................................................................................................................ 310
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table................................311
Support for ECMP in host table..............................................................................................................................311
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes .................................................................... 312
RTAG7................................................................................................................................................................................ 312
Flow-based Hashing for ECMP.................................................................................................................................... 313
Chapter 15: FIP Snooping...........................................................................................................316
Fibre Channel over Ethernet.........................................................................................................................................316
Ensure Robustness in a Converged Ethernet Network..........................................................................................316
FIP Snooping on Ethernet Bridges.............................................................................................................................. 317
FIP Snooping in a Switch Stack................................................................................................................................... 319
Using FIP Snooping......................................................................................................................................................... 319
FIP Snooping Prerequisites..................................................................................................................................... 319
Important Points to Remember..............................................................................................................................319
Enabling the FCoE Transit Feature.......................................................................................................................320
Enable FIP Snooping on VLANs.............................................................................................................................320
Configure the FC-MAP Value................................................................................................................................. 321
Configure a Port for a Bridge-to-Bridge Link..................................................................................................... 321
Configure a Port for a Bridge-to-FCF Link..........................................................................................................321
Impact on Other Software Features..................................................................................................................... 321
FIP Snooping Restrictions.......................................................................................................................................322
Configuring FIP Snooping....................................................................................................................................... 322
Displaying FIP Snooping Information..........................................................................................................................322
FCoE Transit Configuration Example......................................................................................................................... 327
Chapter 16: Flex Hash and Optimized Boot-Up...........................................................................329
Flex Hash Capability Overview.................................................................................................................................... 329
Configuring the Flex Hash Mechanism......................................................................................................................329
Configuring Fast Boot and LACP Fast Switchover................................................................................................ 330
Optimizing the Boot Time............................................................................................................................................. 330
Interoperation of Applications with Fast Boot and System States..................................................................... 331
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 334
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 334
Chapter 17: Force10 Resilient Ring Protocol (FRRP)..................................................................336
Protocol Overview..........................................................................................................................................................336
Ring Status................................................................................................................................................................. 337
Multiple FRRP Rings.................................................................................................................................................337
Important FRRP Points............................................................................................................................................338
Important FRRP Concepts......................................................................................................................................339
Implementing FRRP........................................................................................................................................................339
FRRP Configuration....................................................................................................................................................... 340
10
Contents