Service Manual

15 Equal Cost Multi-Path (ECMP)........................................................................................................................ 314
ECMP for Flow-Based Affinity..............................................................................................................................314
Configuring the Hash Algorithm................................................................................................................... 314
Enabling Deterministic ECMP Next Hop......................................................................................................314
Configuring the Hash Algorithm Seed......................................................................................................... 315
Link Bundle Monitoring......................................................................................................................................... 315
Managing ECMP Group Paths........................................................................................................................316
Creating an ECMP Group Bundle..................................................................................................................316
Modifying the ECMP Group Threshold........................................................................................................316
RTAG7........................................................................................................................................................................317
Flow-based Hashing for ECMP........................................................................................................................... 318
16 FIP Snooping...................................................................................................................................................... 321
Fibre Channel over Ethernet................................................................................................................................ 321
Ensure Robustness in a Converged Ethernet Network.................................................................................. 321
FIP Snooping on Ethernet Bridges......................................................................................................................323
FIP Snooping in a Switch Stack........................................................................................................................... 325
Using FIP Snooping................................................................................................................................................325
FIP Snooping Prerequisites.............................................................................................................................325
Important Points to Remember.................................................................................................................... 325
Enabling the FCoE Transit Feature............................................................................................................... 326
Enable FIP Snooping on VLANs.....................................................................................................................326
Configure the FC-MAP Value.........................................................................................................................327
Configure a Port for a Bridge-to-Bridge Link.............................................................................................327
Configure a Port for a Bridge-to-FCF Link................................................................................................. 327
Impact on Other Software Features............................................................................................................. 327
FIP Snooping Restrictions...............................................................................................................................328
Configuring FIP Snooping.............................................................................................................................. 328
Displaying FIP Snooping Information................................................................................................................ 329
FCoE Transit Configuration Example.................................................................................................................334
17 FIPS Cryptography............................................................................................................................................ 336
Configuration Tasks...............................................................................................................................................336
Preparing the System............................................................................................................................................ 336
Enabling FIPS Mode............................................................................................................................................... 337
Generating Host-Keys........................................................................................................................................... 337
Monitoring FIPS Mode Status...............................................................................................................................337
Disabling FIPS Mode..............................................................................................................................................338
18 Force10 Resilient Ring Protocol (FRRP)........................................................................................................339
Protocol Overview................................................................................................................................................. 339
Ring Status.........................................................................................................................................................340
Multiple FRRP Rings.........................................................................................................................................340
Important FRRP Points.....................................................................................................................................341
Important FRRP Concepts..............................................................................................................................342
Implementing FRRP...............................................................................................................................................343
Contents
11