Users Guide
Congure the System to be a DHCP Client............................................................................................................... 236
Conguring the DHCP Client System................................................................................................................... 237
DHCP Client on a Management Interface............................................................................................................ 238
DHCP Client Operation with Other Features.......................................................................................................239
Congure the System for User Port Stacking (Option 230)....................................................................................240
Congure Secure DHCP............................................................................................................................................... 240
Option 82..................................................................................................................................................................240
DHCP Snooping........................................................................................................................................................241
Drop DHCP Packets on Snooped VLANs Only....................................................................................................244
Dynamic ARP Inspection.........................................................................................................................................244
Conguring Dynamic ARP Inspection................................................................................................................... 245
Source Address Validation............................................................................................................................................ 246
Enabling IP Source Address Validation..................................................................................................................246
DHCP MAC Source Address Validation.................................................................................................................247
Enabling IP+MAC Source Address Validation.......................................................................................................247
Viewing the Number of SAV Dropped Packets....................................................................................................248
Clearing the Number of SAV Dropped Packets................................................................................................... 248
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 249
ECMP for Flow-Based Anity..................................................................................................................................... 249
Conguring the Hash Algorithm............................................................................................................................ 249
Enabling Deterministic ECMP Next Hop.............................................................................................................. 249
Conguring the Hash Algorithm Seed.................................................................................................................. 250
Link Bundle Monitoring................................................................................................................................................. 250
Managing ECMP Group Paths................................................................................................................................251
Creating an ECMP Group Bundle...........................................................................................................................251
Modifying the ECMP Group Threshold................................................................................................................. 251
14 FIPS Cryptography...................................................................................................................................253
Conguration Tasks....................................................................................................................................................... 253
Preparing the System....................................................................................................................................................253
Enabling FIPS Mode...................................................................................................................................................... 254
Generating Host-Keys...................................................................................................................................................254
Monitoring FIPS Mode Status......................................................................................................................................254
Disabling FIPS Mode..................................................................................................................................................... 255
15 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 256
Protocol Overview.........................................................................................................................................................256
Ring Status............................................................................................................................................................... 257
Multiple FRRP Rings................................................................................................................................................257
Important FRRP Points...........................................................................................................................................258
Important FRRP Concepts..................................................................................................................................... 259
Implementing FRRP.......................................................................................................................................................260
FRRP Conguration...................................................................................................................................................... 260
Creating the FRRP Group...................................................................................................................................... 260
Conguring the Control VLAN...............................................................................................................................260
Conguring and Adding the Member VLANs....................................................................................................... 261
Contents
9