White Papers

Table Of Contents
Conguring DCBx.................................................................................................................................................... 273
Verifying the DCB Conguration..................................................................................................................................277
QoS dot1p Trac Classication and Queue Assignment..........................................................................................286
Conguring the Dynamic Buer Method....................................................................................................................287
Sample DCB Conguration...........................................................................................................................................288
PFC and ETS Conguration Command Examples.............................................................................................. 290
13 Dynamic Host Conguration Protocol (DHCP)..........................................................................................291
DHCP Packet Format and Options.............................................................................................................................. 291
Assign an IP Address using DHCP...............................................................................................................................293
Implementation Information..........................................................................................................................................294
Congure the System to be a DHCP Server..............................................................................................................294
Conguring the Server for Automatic Address Allocation..................................................................................295
Specifying a Default Gateway................................................................................................................................ 296
Congure a Method of Hostname Resolution..................................................................................................... 296
Using DNS for Address Resolution........................................................................................................................296
Using NetBIOS WINS for Address Resolution......................................................................................................297
Creating Manual Binding Entries............................................................................................................................297
Debugging the DHCP Server................................................................................................................................. 297
Using DHCP Clear Commands.............................................................................................................................. 298
Congure the System to be a Relay Agent................................................................................................................ 298
Congure the System to be a DHCP Client...............................................................................................................300
Conguring the DHCP Client System...................................................................................................................300
DHCP Client on a Management Interface............................................................................................................302
DHCP Client Operation with Other Features.......................................................................................................302
Congure the System for User Port Stacking (Option 230)....................................................................................303
Congure Secure DHCP...............................................................................................................................................303
Option 82..................................................................................................................................................................304
DHCP Snooping.......................................................................................................................................................304
Drop DHCP Packets on Snooped VLANs Only....................................................................................................308
Dynamic ARP Inspection........................................................................................................................................ 309
Conguring Dynamic ARP Inspection....................................................................................................................310
Source Address Validation..............................................................................................................................................311
Enabling IP Source Address Validation....................................................................................................................311
DHCP MAC Source Address Validation................................................................................................................. 312
Enabling IP+MAC Source Address Validation........................................................................................................312
Viewing the Number of SAV Dropped Packets.................................................................................................... 313
Clearing the Number of SAV Dropped Packets....................................................................................................313
14 Equal Cost Multi-Path (ECMP).................................................................................................................314
ECMP for Flow-Based Anity......................................................................................................................................314
Conguring the Hash Algorithm............................................................................................................................. 314
Enabling Deterministic ECMP Next Hop............................................................................................................... 314
Conguring the Hash Algorithm Seed................................................................................................................... 315
Link Bundle Monitoring.................................................................................................................................................. 315
Managing ECMP Group Paths................................................................................................................................316
10
Contents