Concept Guide
Modifying the ECMP Group Threshold.................................................................................................................345
RTAG7.............................................................................................................................................................................346
Flow-based Hashing for ECMP....................................................................................................................................347
15 FIP Snooping............................................................................................................................................350
Fibre Channel over Ethernet........................................................................................................................................350
Ensure Robustness in a Converged Ethernet Network............................................................................................350
FIP Snooping on Ethernet Bridges.............................................................................................................................. 352
FIP Snooping in a Switch Stack...................................................................................................................................354
Using FIP Snooping....................................................................................................................................................... 354
FIP Snooping Prerequisites.....................................................................................................................................354
Important Points to Remember............................................................................................................................. 354
Enabling the FCoE Transit Feature........................................................................................................................355
Enable FIP Snooping on VLANs.............................................................................................................................356
Congure the FC-MAP Value................................................................................................................................ 356
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................356
Congure a Port for a Bridge-to-FCF Link...........................................................................................................356
Impact on Other Software Features..................................................................................................................... 356
FIP Snooping Restrictions.......................................................................................................................................357
Conguring FIP Snooping.......................................................................................................................................357
Displaying FIP Snooping Information...........................................................................................................................358
FCoE Transit Conguration Example...........................................................................................................................363
16 Flex Hash and Optimized Boot-Up............................................................................................................365
Flex Hash Capability Overview.................................................................................................................................... 365
Conguring the Flex Hash Mechanism.......................................................................................................................365
Conguring Fast Boot and LACP Fast Switchover...................................................................................................366
Optimizing the Boot Time.............................................................................................................................................366
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................366
Guidelines for Conguring Optimized Booting Mechanism................................................................................ 367
Interoperation of Applications with Fast Boot and System States..........................................................................368
LACP and IPv4 Routing.......................................................................................................................................... 368
LACP and IPv6 Routing..........................................................................................................................................368
BGP Graceful Restart............................................................................................................................................. 369
Cold Boot Caused by Power Cycling the System............................................................................................... 369
Unexpected Reload of the System........................................................................................................................369
Software Upgrade................................................................................................................................................... 369
LACP Fast Switchover............................................................................................................................................369
Changes to BGP Multipath.....................................................................................................................................370
Delayed Installation of ECMP Routes Into BGP...................................................................................................370
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................370
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces....................................................................................... 371
17 FIPS Cryptography................................................................................................................................... 372
Conguration Tasks....................................................................................................................................................... 372
Preparing the System....................................................................................................................................................372
Contents
11