Users Guide

7 FIP Snooping............................................................................................................................................... 75
Supported Modes............................................................................................................................................................ 75
Fibre Channel over Ethernet...........................................................................................................................................75
Ensuring Robustness in a Converged Ethernet Network........................................................................................... 75
FIP Snooping on Ethernet Bridges.................................................................................................................................77
How FIP Snooping is Implemented................................................................................................................................ 79
FIP Snooping on VLANs............................................................................................................................................79
FC-MAP Value............................................................................................................................................................79
Bridge-to-FCF Links.................................................................................................................................................. 79
Impact on other Software Features.........................................................................................................................79
FIP Snooping Prerequisites....................................................................................................................................... 79
FIP Snooping Restrictions........................................................................................................................................ 80
Conguring FIP Snooping...............................................................................................................................................80
Displaying FIP Snooping Information..............................................................................................................................81
FIP Snooping Example.................................................................................................................................................... 86
Debugging FIP Snooping.................................................................................................................................................87
8 Internet Group Management Protocol (IGMP).............................................................................................88
IGMP Overview................................................................................................................................................................88
IGMP Version 2................................................................................................................................................................ 88
Joining a Multicast Group......................................................................................................................................... 89
Leaving a Multicast Group........................................................................................................................................ 89
IGMP Version 3................................................................................................................................................................ 89
Joining and Filtering Groups and Sources.....................................................................................................................90
Leaving and Staying in Groups........................................................................................................................................91
IGMP Snooping.................................................................................................................................................................91
How IGMP Snooping is Implemented on an Aggregator............................................................................................ 92
Disabling Multicast Flooding........................................................................................................................................... 92
Displaying IGMP Information.......................................................................................................................................... 92
9 Interfaces.................................................................................................................................................... 95
Basic Interface Conguration.........................................................................................................................................95
Advanced Interface Conguration.................................................................................................................................95
Interface Auto-Conguration......................................................................................................................................... 96
Interface Types.................................................................................................................................................................96
Viewing Interface Information........................................................................................................................................ 96
Disabling and Re-enabling a Physical Interface............................................................................................................98
Layer 2 Mode....................................................................................................................................................................98
Management Interfaces..................................................................................................................................................99
Accessing an Aggregator.......................................................................................................................................... 99
Conguring a Management Interface..................................................................................................................... 99
Conguring a Static Route for a Management Interface....................................................................................100
VLAN Membership.........................................................................................................................................................100
Default VLAN ............................................................................................................................................................101
Port-Based VLANs....................................................................................................................................................101
VLANs and Port Tagging..........................................................................................................................................101
Contents
5