Concept Guide
Debugging the DHCP Server................................................................................................................................. 275
Using DHCP Clear Commands...............................................................................................................................275
Congure the System to be a Relay Agent................................................................................................................ 275
Congure the System to be a DHCP Client................................................................................................................277
Conguring the DHCP Client System....................................................................................................................277
DHCP Client on a Management Interface............................................................................................................ 278
DHCP Client Operation with Other Features....................................................................................................... 279
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................ 280
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 280
Non-default VRF conguration for DHCPv6 helper address....................................................................................281
Conguring DHCP relay source interface................................................................................................................... 282
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 282
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................282
Congure the System for User Port Stacking (Option 230)....................................................................................284
Congure Secure DHCP............................................................................................................................................... 284
Option 82..................................................................................................................................................................284
DHCPv6 relay agent options..................................................................................................................................285
DHCP Snooping.......................................................................................................................................................285
Drop DHCP Packets on Snooped VLANs Only....................................................................................................290
Dynamic ARP Inspection........................................................................................................................................ 290
Conguring Dynamic ARP Inspection....................................................................................................................291
Source Address Validation............................................................................................................................................ 293
Enabling IP Source Address Validation.................................................................................................................. 293
DHCP MAC Source Address Validation................................................................................................................ 294
Enabling IP+MAC Source Address Validation.......................................................................................................294
Viewing the Number of SAV Dropped Packets................................................................................................... 295
Clearing the Number of SAV Dropped Packets...................................................................................................295
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 296
ECMP for Flow-Based Anity.....................................................................................................................................296
Conguring the Hash Algorithm............................................................................................................................ 296
Enabling Deterministic ECMP Next Hop.............................................................................................................. 296
Conguring the Hash Algorithm Seed...................................................................................................................297
Link Bundle Monitoring..................................................................................................................................................297
Managing ECMP Group Paths...............................................................................................................................298
Creating an ECMP Group Bundle..........................................................................................................................298
Modifying the ECMP Group Threshold.................................................................................................................298
14 FIPS Cryptography...................................................................................................................................300
Conguration Tasks....................................................................................................................................................... 300
Preparing the System................................................................................................................................................... 300
Enabling FIPS Mode.......................................................................................................................................................301
Generating Host-Keys....................................................................................................................................................301
Monitoring FIPS Mode Status...................................................................................................................................... 301
Disabling FIPS Mode..................................................................................................................................................... 302
Contents
9