Administrator Guide

RTAG7..............................................................................................................................................................................314
Flow-based Hashing for ECMP.................................................................................................................................... 315
15 FIP Snooping............................................................................................................................................ 318
Fibre Channel over Ethernet.........................................................................................................................................318
Ensure Robustness in a Converged Ethernet Network.............................................................................................318
FIP Snooping on Ethernet Bridges.............................................................................................................................. 320
FIP Snooping in a Switch Stack...................................................................................................................................322
Using FIP Snooping....................................................................................................................................................... 322
FIP Snooping Prerequisites.....................................................................................................................................322
Important Points to Remember..............................................................................................................................322
Enabling the FCoE Transit Feature........................................................................................................................323
Enable FIP Snooping on VLANs.............................................................................................................................324
Congure the FC-MAP Value.................................................................................................................................324
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 324
Congure a Port for a Bridge-to-FCF Link...........................................................................................................324
Impact on Other Software Features..................................................................................................................... 324
FIP Snooping Restrictions...................................................................................................................................... 325
Conguring FIP Snooping.......................................................................................................................................325
Displaying FIP Snooping Information...........................................................................................................................326
FCoE Transit Conguration Example........................................................................................................................... 331
16 Flex Hash and Optimized Boot-Up............................................................................................................333
Flex Hash Capability Overview.....................................................................................................................................333
Conguring the Flex Hash Mechanism.......................................................................................................................333
Conguring Fast Boot and LACP Fast Switchover...................................................................................................334
Optimizing the Boot Time.............................................................................................................................................334
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................334
Guidelines for Conguring Optimized Booting Mechanism................................................................................335
Interoperation of Applications with Fast Boot and System States..........................................................................336
LACP and IPv4 Routing.......................................................................................................................................... 336
LACP and IPv6 Routing.......................................................................................................................................... 336
BGP Graceful Restart..............................................................................................................................................337
Cold Boot Caused by Power Cycling the System................................................................................................337
Unexpected Reload of the System........................................................................................................................337
Software Upgrade....................................................................................................................................................337
LACP Fast Switchover............................................................................................................................................337
Changes to BGP Multipath.................................................................................................................................... 338
Delayed Installation of ECMP Routes Into BGP...................................................................................................338
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................338
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 339
17 FIPS Cryptography...................................................................................................................................340
Conguration Tasks....................................................................................................................................................... 340
Preparing the System....................................................................................................................................................340
Enabling FIPS Mode.......................................................................................................................................................341
Contents
11