Service Manual

Table Of Contents
Creating an ECMP Group Bundle...............................................................................................346
Modifying the ECMP Group Threshold...................................................................................... 347
RTAG7................................................................................................................................................347
Flow-based Hashing for ECMP........................................................................................................ 349
16 FCoE Transit.................................................................................................... 353
Fibre Channel over Ethernet.............................................................................................................353
Ensure Robustness in a Converged Ethernet Network................................................................... 353
FIP Snooping on Ethernet Bridges................................................................................................... 355
FIP Snooping in a Switch Stack.........................................................................................................357
Using FIP Snooping...........................................................................................................................357
FIP Snooping Prerequisites......................................................................................................... 357
Important Points to Remember................................................................................................. 358
Enabling the FCoE Transit Feature............................................................................................. 359
Enable FIP Snooping on VLANs..................................................................................................359
Configure the FC-MAP Value..................................................................................................... 359
Configure a Port for a Bridge-to-Bridge Link............................................................................359
Configure a Port for a Bridge-to-FCF Link................................................................................360
Impact on Other Software Features.......................................................................................... 360
FIP Snooping Restrictions...........................................................................................................360
Configuring FIP Snooping...........................................................................................................361
Displaying FIP Snooping Information...............................................................................................361
FCoE Transit Configuration Example...............................................................................................367
17 FIPS Cryptography......................................................................................... 369
Configuration Tasks..........................................................................................................................369
Preparing the System........................................................................................................................369
Enabling FIPS Mode.......................................................................................................................... 370
Generating Host-Keys...................................................................................................................... 370
Monitoring FIPS Mode Status............................................................................................................371
Disabling FIPS Mode......................................................................................................................... 374
18 Force10 Resilient Ring Protocol (FRRP)..................................................... 375
Protocol Overview............................................................................................................................ 375
Ring Status...................................................................................................................................376
Multiple FRRP Rings.....................................................................................................................377
Important FRRP Points................................................................................................................378
Important FRRP Concepts.......................................................................................................... 379
Implementing FRRP..........................................................................................................................380
FRRP Configuration.......................................................................................................................... 380
Creating the FRRP Group............................................................................................................381
Configuring the Control VLAN....................................................................................................381
12