Service Manual
Using NetBIOS WINS for Address Resolution............................................................................................ 286
Creating Manual Binding Entries...................................................................................................................286
Debugging the DHCP Server......................................................................................................................... 287
Using DHCP Clear Commands..................................................................................................................... 287
Configure the System to be a Relay Agent.......................................................................................................287
Configure the System to be a DHCP Client..................................................................................................... 289
Configuring the DHCP Client System..........................................................................................................289
DHCP Client on a Management Interface..................................................................................................290
DHCP Client Operation with Other Features............................................................................................. 291
Configure the System for User Port Stacking (Option 230)..........................................................................292
Configure Secure DHCP.......................................................................................................................................292
Option 82...........................................................................................................................................................292
DHCP Snooping................................................................................................................................................293
Drop DHCP Packets on Snooped VLANs Only..........................................................................................296
Dynamic ARP Inspection................................................................................................................................ 297
Configuring Dynamic ARP Inspection......................................................................................................... 298
Source Address Validation................................................................................................................................... 299
Enabling IP Source Address Validation........................................................................................................299
DHCP MAC Source Address Validation.......................................................................................................300
Enabling IP+MAC Source Address Validation............................................................................................ 300
Viewing the Number of SAV Dropped Packets......................................................................................... 300
Clearing the Number of SAV Dropped Packets......................................................................................... 301
14 Equal Cost Multi-Path (ECMP)........................................................................................................................302
ECMP for Flow-Based Affinity............................................................................................................................. 302
Configuring the Hash Algorithm...................................................................................................................302
Enabling Deterministic ECMP Next Hop..................................................................................................... 302
Configuring the Hash Algorithm Seed.........................................................................................................303
Link Bundle Monitoring.........................................................................................................................................303
Managing ECMP Group Paths....................................................................................................................... 304
Creating an ECMP Group Bundle.................................................................................................................304
Modifying the ECMP Group Threshold....................................................................................................... 304
RTAG7.......................................................................................................................................................................305
Flow-based Hashing for ECMP...........................................................................................................................306
15 FIP Snooping......................................................................................................................................................309
Fibre Channel over Ethernet................................................................................................................................309
Ensure Robustness in a Converged Ethernet Network................................................................................. 309
FIP Snooping on Ethernet Bridges...................................................................................................................... 311
FIP Snooping in a Switch Stack............................................................................................................................313
Using FIP Snooping................................................................................................................................................ 313
FIP Snooping Prerequisites............................................................................................................................. 313
Important Points to Remember.....................................................................................................................313
Enabling the FCoE Transit Feature................................................................................................................314
Enable FIP Snooping on VLANs..................................................................................................................... 314
Configure the FC-MAP Value.........................................................................................................................315
Configure a Port for a Bridge-to-Bridge Link.............................................................................................315
9.10(0.1)
10