Service Manual

Enabling Deterministic ECMP Next Hop....................................................................................347
Configuring the Hash Algorithm Seed.......................................................................................348
Link Bundle Monitoring.................................................................................................................... 348
Managing ECMP Group Paths.................................................................................................... 349
Creating an ECMP Group Bundle...............................................................................................349
Modifying the ECMP Group Threshold......................................................................................350
16 FCoE Transit.....................................................................................................351
Fibre Channel over Ethernet.............................................................................................................351
Ensure Robustness in a Converged Ethernet Network................................................................... 351
FIP Snooping on Ethernet Bridges................................................................................................... 353
FIP Snooping in a Switch Stack........................................................................................................ 355
Using FIP Snooping...........................................................................................................................355
FIP Snooping Prerequisites......................................................................................................... 355
Important Points to Remember................................................................................................. 356
Enabling the FCoE Transit Feature............................................................................................. 357
Enable FIP Snooping on VLANs.................................................................................................. 357
Configure the FC-MAP Value..................................................................................................... 357
Configure a Port for a Bridge-to-Bridge Link............................................................................ 357
Configure a Port for a Bridge-to-FCF Link................................................................................ 358
Impact on Other Software Features...........................................................................................358
FIP Snooping Restrictions...........................................................................................................358
Configuring FIP Snooping.......................................................................................................... 359
Displaying FIP Snooping Information.............................................................................................. 359
FCoE Transit Configuration Example...............................................................................................365
17 FIPS Cryptography..........................................................................................367
Configuration Tasks.......................................................................................................................... 367
Preparing the System........................................................................................................................367
Enabling FIPS Mode..........................................................................................................................368
Generating Host-Keys...................................................................................................................... 368
Monitoring FIPS Mode Status...........................................................................................................369
Disabling FIPS Mode......................................................................................................................... 369
18 Force10 Resilient Ring Protocol (FRRP)..................................................... 371
Protocol Overview.............................................................................................................................371
Ring Status...................................................................................................................................372
Multiple FRRP Rings.....................................................................................................................373
Important FRRP Points................................................................................................................ 373
Important FRRP Concepts.......................................................................................................... 373
Implementing FRRP.......................................................................................................................... 375
FRRP Configuration...........................................................................................................................375
12