Users Guide
Configuring the Hash Algorithm Seed.................................................................................................................. 319
Link Bundle Monitoring...................................................................................................................................................319
Managing ECMP Group Paths............................................................................................................................... 320
Creating an ECMP Group Bundle..........................................................................................................................320
Modifying the ECMP Group Threshold................................................................................................................320
RTAG7................................................................................................................................................................................ 321
Flow-based Hashing for ECMP................................................................................................................................... 322
Chapter 15: FIP Snooping.......................................................................................................... 325
Fibre Channel over Ethernet........................................................................................................................................ 325
Ensure Robustness in a Converged Ethernet Network.........................................................................................325
FIP Snooping on Ethernet Bridges..............................................................................................................................326
FIP Snooping in a Switch Stack.................................................................................................................................. 328
Using FIP Snooping........................................................................................................................................................ 328
FIP Snooping Prerequisites.....................................................................................................................................328
Important Points to Remember............................................................................................................................. 328
Enabling the FCoE Transit Feature.......................................................................................................................329
Enable FIP Snooping on VLANs.............................................................................................................................329
Configure the FC-MAP Value................................................................................................................................ 330
Configure a Port for a Bridge-to-Bridge Link.....................................................................................................330
Configure a Port for a Bridge-to-FCF Link.........................................................................................................330
Impact on Other Software Features.................................................................................................................... 330
FIP Snooping Restrictions........................................................................................................................................331
Configuring FIP Snooping........................................................................................................................................ 331
Displaying FIP Snooping Information..........................................................................................................................332
FCoE Transit Configuration Example......................................................................................................................... 337
Chapter 16: Flex Hash and Optimized Boot-Up...........................................................................339
Flex Hash Capability Overview.................................................................................................................................... 339
Configuring the Flex Hash Mechanism......................................................................................................................339
Configuring Fast Boot and LACP Fast Switchover................................................................................................ 340
Optimizing the Boot Time............................................................................................................................................. 340
Interoperation of Applications with Fast Boot and System States..................................................................... 341
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 344
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 344
Chapter 17: FIPS Cryptography................................................................................................. 346
Configuration Tasks........................................................................................................................................................346
Preparing the System.................................................................................................................................................... 346
Enabling FIPS Mode........................................................................................................................................................347
Generating Host-Keys....................................................................................................................................................347
Monitoring FIPS Mode Status......................................................................................................................................347
Disabling FIPS Mode.......................................................................................................................................................348
Chapter 18: Force10 Resilient Ring Protocol (FRRP)..................................................................349
Protocol Overview..........................................................................................................................................................349
Ring Status................................................................................................................................................................. 350
Multiple FRRP Rings.................................................................................................................................................350
Important FRRP Points............................................................................................................................................ 351
10
Contents