Connectivity Guide

Table Of Contents
Configuring the Hash Algorithm............................................................................................................................ 304
Enabling Deterministic ECMP Next Hop............................................................................................................. 304
Configuring the Hash Algorithm Seed................................................................................................................. 305
Link Bundle Monitoring..................................................................................................................................................305
Managing ECMP Group Paths...............................................................................................................................306
Creating an ECMP Group Bundle..........................................................................................................................306
Modifying the ECMP Group Threshold................................................................................................................306
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table.............................. 307
Support for ECMP in host table............................................................................................................................ 307
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ....................................................................308
RTAG7............................................................................................................................................................................... 308
Flow-based Hashing for ECMP................................................................................................................................... 309
Chapter 15: FIP Snooping...........................................................................................................312
Fibre Channel over Ethernet.........................................................................................................................................312
Ensure Robustness in a Converged Ethernet Network..........................................................................................312
FIP Snooping on Ethernet Bridges.............................................................................................................................. 313
FIP Snooping in a Switch Stack................................................................................................................................... 315
Using FIP Snooping......................................................................................................................................................... 315
FIP Snooping Prerequisites..................................................................................................................................... 315
Important Points to Remember..............................................................................................................................315
Enabling the FCoE Transit Feature....................................................................................................................... 316
Enable FIP Snooping on VLANs..............................................................................................................................316
Configure the FC-MAP Value................................................................................................................................. 317
Configure a Port for a Bridge-to-Bridge Link......................................................................................................317
Configure a Port for a Bridge-to-FCF Link..........................................................................................................317
Impact on Other Software Features..................................................................................................................... 317
FIP Snooping Restrictions........................................................................................................................................318
Configuring FIP Snooping........................................................................................................................................ 318
Displaying FIP Snooping Information.......................................................................................................................... 318
FCoE Transit Configuration Example......................................................................................................................... 323
Chapter 16: Flex Hash and Optimized Boot-Up...........................................................................325
Flex Hash Capability Overview.................................................................................................................................... 325
Configuring the Flex Hash Mechanism......................................................................................................................325
Configuring Fast Boot and LACP Fast Switchover................................................................................................ 326
Optimizing the Boot Time............................................................................................................................................. 326
Interoperation of Applications with Fast Boot and System States.....................................................................327
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 330
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 330
Chapter 17: Force10 Resilient Ring Protocol (FRRP)..................................................................332
Protocol Overview.......................................................................................................................................................... 332
Ring Status................................................................................................................................................................. 333
Multiple FRRP Rings.................................................................................................................................................333
Important FRRP Points............................................................................................................................................334
Important FRRP Concepts......................................................................................................................................335
Implementing FRRP........................................................................................................................................................335
FRRP Configuration....................................................................................................................................................... 336
10
Contents