Deployment Guide

Table Of Contents
Configuring the Hash Algorithm............................................................................................................................ 307
Enabling Deterministic ECMP Next Hop............................................................................................................. 307
Configuring the Hash Algorithm Seed................................................................................................................. 308
Link Bundle Monitoring..................................................................................................................................................308
Managing ECMP Group Paths...............................................................................................................................309
Creating an ECMP Group Bundle..........................................................................................................................309
Modifying the ECMP Group Threshold................................................................................................................309
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table...............................310
Support for ECMP in host table.............................................................................................................................310
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ..................................................................... 311
RTAG7................................................................................................................................................................................. 311
Flow-based Hashing for ECMP.................................................................................................................................... 312
Chapter 15: FIP Snooping...........................................................................................................315
Fibre Channel over Ethernet.........................................................................................................................................315
Ensure Robustness in a Converged Ethernet Network..........................................................................................315
FIP Snooping on Ethernet Bridges.............................................................................................................................. 316
FIP Snooping in a Switch Stack................................................................................................................................... 318
Using FIP Snooping......................................................................................................................................................... 318
FIP Snooping Prerequisites..................................................................................................................................... 318
Important Points to Remember..............................................................................................................................318
Enabling the FCoE Transit Feature....................................................................................................................... 319
Enable FIP Snooping on VLANs..............................................................................................................................319
Configure the FC-MAP Value................................................................................................................................ 320
Configure a Port for a Bridge-to-Bridge Link.................................................................................................... 320
Configure a Port for a Bridge-to-FCF Link.........................................................................................................320
Impact on Other Software Features.................................................................................................................... 320
FIP Snooping Restrictions........................................................................................................................................321
Configuring FIP Snooping........................................................................................................................................ 321
Displaying FIP Snooping Information.......................................................................................................................... 321
FCoE Transit Configuration Example......................................................................................................................... 326
Chapter 16: Flex Hash and Optimized Boot-Up...........................................................................328
Flex Hash Capability Overview.................................................................................................................................... 328
Configuring the Flex Hash Mechanism...................................................................................................................... 328
Configuring Fast Boot and LACP Fast Switchover................................................................................................ 329
Optimizing the Boot Time............................................................................................................................................. 329
Interoperation of Applications with Fast Boot and System States.................................................................... 330
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 333
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 333
Chapter 17: Force10 Resilient Ring Protocol (FRRP)..................................................................335
Protocol Overview..........................................................................................................................................................335
Ring Status................................................................................................................................................................. 336
Multiple FRRP Rings.................................................................................................................................................336
Important FRRP Points............................................................................................................................................337
Important FRRP Concepts......................................................................................................................................338
Implementing FRRP........................................................................................................................................................338
FRRP Configuration....................................................................................................................................................... 339
10
Contents