Install Guide

Table Of Contents
Modifying the ECMP Group Threshold................................................................................................................ 315
RTAG7................................................................................................................................................................................ 316
Flow-based Hashing for ECMP.................................................................................................................................... 317
Chapter 15: FIP Snooping.......................................................................................................... 320
Fibre Channel over Ethernet........................................................................................................................................ 320
Ensure Robustness in a Converged Ethernet Network.........................................................................................320
FIP Snooping on Ethernet Bridges.............................................................................................................................. 321
FIP Snooping in a Switch Stack.................................................................................................................................. 323
Using FIP Snooping........................................................................................................................................................ 323
FIP Snooping Prerequisites.....................................................................................................................................323
Important Points to Remember............................................................................................................................. 323
Enabling the FCoE Transit Feature.......................................................................................................................324
Enable FIP Snooping on VLANs.............................................................................................................................324
Configure the FC-MAP Value................................................................................................................................ 325
Configure a Port for a Bridge-to-Bridge Link.................................................................................................... 325
Configure a Port for a Bridge-to-FCF Link.........................................................................................................325
Impact on Other Software Features.................................................................................................................... 325
FIP Snooping Restrictions.......................................................................................................................................326
Configuring FIP Snooping....................................................................................................................................... 326
Displaying FIP Snooping Information..........................................................................................................................327
FCoE Transit Configuration Example......................................................................................................................... 332
Chapter 16: FIPS Cryptography................................................................................................. 334
Configuration Tasks........................................................................................................................................................334
Preparing the System.................................................................................................................................................... 334
Enabling FIPS Mode....................................................................................................................................................... 334
Generating Host-Keys................................................................................................................................................... 335
Monitoring FIPS Mode Status..................................................................................................................................... 335
Disabling FIPS Mode...................................................................................................................................................... 335
Chapter 17: Force10 Resilient Ring Protocol (FRRP).................................................................. 337
Protocol Overview.......................................................................................................................................................... 337
Ring Status................................................................................................................................................................. 338
Multiple FRRP Rings.................................................................................................................................................338
Important FRRP Points............................................................................................................................................339
Important FRRP Concepts......................................................................................................................................340
Implementing FRRP........................................................................................................................................................340
FRRP Configuration........................................................................................................................................................ 341
Creating the FRRP Group........................................................................................................................................341
Configuring the Control VLAN................................................................................................................................341
Configuring and Adding the Member VLANs..................................................................................................... 342
Setting the FRRP Timers........................................................................................................................................ 343
Clearing the FRRP Counters.................................................................................................................................. 343
Viewing the FRRP Configuration...........................................................................................................................343
Viewing the FRRP Information.............................................................................................................................. 343
Troubleshooting FRRP...................................................................................................................................................344
Sample Configuration and Topology...........................................................................................................................344
FRRP Support on VLT................................................................................................................................................... 345
10
Contents