Connectivity Guide

Table Of Contents
Configuring the Hash Algorithm Seed.................................................................................................................. 313
Link Bundle Monitoring...................................................................................................................................................313
Managing ECMP Group Paths................................................................................................................................314
Creating an ECMP Group Bundle.......................................................................................................................... 314
Modifying the ECMP Group Threshold................................................................................................................ 314
RTAG7................................................................................................................................................................................ 315
Flow-based Hashing for ECMP.................................................................................................................................... 316
Chapter 15: FIP Snooping...........................................................................................................319
Fibre Channel over Ethernet.........................................................................................................................................319
Ensure Robustness in a Converged Ethernet Network..........................................................................................319
FIP Snooping on Ethernet Bridges............................................................................................................................. 320
FIP Snooping in a Switch Stack.................................................................................................................................. 322
Using FIP Snooping........................................................................................................................................................ 322
FIP Snooping Prerequisites.....................................................................................................................................322
Important Points to Remember............................................................................................................................. 322
Enabling the FCoE Transit Feature.......................................................................................................................323
Enable FIP Snooping on VLANs.............................................................................................................................323
Configure the FC-MAP Value................................................................................................................................ 324
Configure a Port for a Bridge-to-Bridge Link.....................................................................................................324
Configure a Port for a Bridge-to-FCF Link.........................................................................................................324
Impact on Other Software Features.................................................................................................................... 324
FIP Snooping Restrictions.......................................................................................................................................325
Configuring FIP Snooping....................................................................................................................................... 325
Displaying FIP Snooping Information..........................................................................................................................326
FCoE Transit Configuration Example..........................................................................................................................331
Chapter 16: Flex Hash and Optimized Boot-Up...........................................................................333
Flex Hash Capability Overview.................................................................................................................................... 333
Configuring the Flex Hash Mechanism...................................................................................................................... 333
Configuring Fast Boot and LACP Fast Switchover................................................................................................ 334
Optimizing the Boot Time............................................................................................................................................. 334
Interoperation of Applications with Fast Boot and System States.................................................................... 335
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 338
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 338
Chapter 17: FIPS Cryptography................................................................................................. 340
Configuration Tasks....................................................................................................................................................... 340
Preparing the System.................................................................................................................................................... 340
Enabling FIPS Mode....................................................................................................................................................... 340
Generating Host-Keys.................................................................................................................................................... 341
Monitoring FIPS Mode Status...................................................................................................................................... 341
Disabling FIPS Mode....................................................................................................................................................... 341
Chapter 18: Force10 Resilient Ring Protocol (FRRP)..................................................................343
Protocol Overview.......................................................................................................................................................... 343
Ring Status................................................................................................................................................................. 344
Multiple FRRP Rings.................................................................................................................................................344
Important FRRP Points............................................................................................................................................345
10
Contents