Users Guide
Viewing the Number of SAV Dropped Packets................................................................................................. 309
Clearing the Number of SAV Dropped Packets.................................................................................................309
Chapter 14: Equal Cost Multi-Path (ECMP)................................................................................310
ECMP for Flow-Based Affinity.....................................................................................................................................310
Configuring the Hash Algorithm.............................................................................................................................310
Enabling Deterministic ECMP Next Hop.............................................................................................................. 310
Configuring the Hash Algorithm Seed................................................................................................................... 311
Link Bundle Monitoring....................................................................................................................................................311
Managing ECMP Group Paths................................................................................................................................312
Creating an ECMP Group Bundle...........................................................................................................................312
Modifying the ECMP Group Threshold.................................................................................................................312
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table...............................313
Support for ECMP in host table.............................................................................................................................313
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes .....................................................................313
Chapter 15: FIP Snooping...........................................................................................................314
Fibre Channel over Ethernet.........................................................................................................................................314
Ensure Robustness in a Converged Ethernet Network..........................................................................................314
FIP Snooping on Ethernet Bridges.............................................................................................................................. 315
Using FIP Snooping......................................................................................................................................................... 317
FIP Snooping Prerequisites......................................................................................................................................317
Important Points to Remember.............................................................................................................................. 317
Enabling the FCoE Transit Feature........................................................................................................................318
Enable FIP Snooping on VLANs..............................................................................................................................318
Configure the FC-MAP Value................................................................................................................................. 319
Configure a Port for a Bridge-to-Bridge Link..................................................................................................... 319
Configure a Port for a Bridge-to-FCF Link..........................................................................................................319
Impact on Other Software Features..................................................................................................................... 319
FIP Snooping Restrictions.......................................................................................................................................320
Configuring FIP Snooping....................................................................................................................................... 320
Displaying FIP Snooping Information..........................................................................................................................320
FCoE Transit Configuration Example......................................................................................................................... 325
Chapter 16: Flex Hash and Optimized Boot-Up...........................................................................327
Flex Hash Capability Overview.................................................................................................................................... 327
Configuring the Flex Hash Mechanism...................................................................................................................... 327
Configuring Fast Boot and LACP Fast Switchover................................................................................................ 328
Optimizing the Boot Time............................................................................................................................................. 328
Interoperation of Applications with Fast Boot and System States.....................................................................329
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 332
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 332
Chapter 17: Force10 Resilient Ring Protocol (FRRP)..................................................................334
Protocol Overview.......................................................................................................................................................... 334
Ring Status................................................................................................................................................................. 335
Multiple FRRP Rings.................................................................................................................................................335
Important FRRP Points............................................................................................................................................336
Important FRRP Concepts......................................................................................................................................337
10
Contents