Users Guide

Configure a Method of Hostname Resolution..................................................................................................... 245
Using DNS for Address Resolution........................................................................................................................245
Using NetBIOS WINS for Address Resolution.....................................................................................................246
Creating Manual Binding Entries........................................................................................................................... 246
Debugging the DHCP Server.................................................................................................................................246
Using DHCP Clear Commands...............................................................................................................................247
Configure the System to be a Relay Agent................................................................................................................247
Configure the System to be a DHCP Client...............................................................................................................249
Configuring the DHCP Client System...................................................................................................................249
DHCP Client on a Management Interface............................................................................................................250
DHCP Client Operation with Other Features....................................................................................................... 251
Configure the System for User Port Stacking (Option 230)...................................................................................252
Configure Secure DHCP...............................................................................................................................................252
Option 82..................................................................................................................................................................252
DHCP Snooping.......................................................................................................................................................253
Drop DHCP Packets on Snooped VLANs Only................................................................................................... 256
Dynamic ARP Inspection.........................................................................................................................................257
Configuring Dynamic ARP Inspection................................................................................................................... 258
Source Address Validation............................................................................................................................................259
Enabling IP Source Address Validation................................................................................................................. 259
DHCP MAC Source Address Validation................................................................................................................260
Enabling IP+MAC Source Address Validation......................................................................................................260
Viewing the Number of SAV Dropped Packets....................................................................................................261
Clearing the Number of SAV Dropped Packets................................................................................................... 261
13 Equal Cost Multi-Path (ECMP)................................................................................................................262
ECMP for Flow-Based Affinity.................................................................................................................................... 262
Configuring the Hash Algorithm............................................................................................................................ 262
Enabling Deterministic ECMP Next Hop.............................................................................................................. 262
Configuring the Hash Algorithm Seed.................................................................................................................. 263
Link Bundle Monitoring................................................................................................................................................. 263
Managing ECMP Group Paths...............................................................................................................................264
Creating an ECMP Group Bundle..........................................................................................................................264
Modifying the ECMP Group Threshold................................................................................................................ 264
14 FIPS Cryptography.................................................................................................................................. 266
Configuration Tasks...................................................................................................................................................... 266
Preparing the System................................................................................................................................................... 266
Enabling FIPS Mode...................................................................................................................................................... 267
Generating Host-Keys...................................................................................................................................................267
Monitoring FIPS Mode Status......................................................................................................................................267
Disabling FIPS Mode..................................................................................................................................................... 268
15 Force10 Resilient Ring Protocol (FRRP).................................................................................................. 269
Protocol Overview.........................................................................................................................................................269
Ring Status............................................................................................................................................................... 270
Contents
9