White Papers

Table Of Contents
Creating an ECMP Group Bundle...........................................................................................................................316
Modifying the ECMP Group Threshold................................................................................................................. 316
RTAG7..............................................................................................................................................................................317
Flow-based Hashing for ECMP.................................................................................................................................... 318
15 FIP Snooping............................................................................................................................................ 321
Fibre Channel over Ethernet.........................................................................................................................................321
Ensure Robustness in a Converged Ethernet Network.............................................................................................321
FIP Snooping on Ethernet Bridges.............................................................................................................................. 323
FIP Snooping in a Switch Stack...................................................................................................................................325
Using FIP Snooping....................................................................................................................................................... 325
FIP Snooping Prerequisites.....................................................................................................................................325
Important Points to Remember............................................................................................................................. 325
Enabling the FCoE Transit Feature........................................................................................................................326
Enable FIP Snooping on VLANs............................................................................................................................. 327
Congure the FC-MAP Value.................................................................................................................................327
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 327
Congure a Port for a Bridge-to-FCF Link........................................................................................................... 327
Impact on Other Software Features......................................................................................................................327
FIP Snooping Restrictions...................................................................................................................................... 328
Conguring FIP Snooping.......................................................................................................................................328
Displaying FIP Snooping Information...........................................................................................................................329
FCoE Transit Conguration Example...........................................................................................................................334
16 Flex Hash and Optimized Boot-Up............................................................................................................336
Flex Hash Capability Overview.....................................................................................................................................336
Conguring the Flex Hash Mechanism.......................................................................................................................336
Conguring Fast Boot and LACP Fast Switchover................................................................................................... 337
Optimizing the Boot Time.............................................................................................................................................337
Booting Process When Optimized Boot Time Mechanism is Enabled.............................................................. 337
Guidelines for Conguring Optimized Booting Mechanism................................................................................338
Interoperation of Applications with Fast Boot and System States..........................................................................339
LACP and IPv4 Routing.......................................................................................................................................... 339
LACP and IPv6 Routing.......................................................................................................................................... 339
BGP Graceful Restart............................................................................................................................................. 340
Cold Boot Caused by Power Cycling the System................................................................................................340
Unexpected Reload of the System........................................................................................................................340
Software Upgrade................................................................................................................................................... 340
LACP Fast Switchover............................................................................................................................................340
Changes to BGP Multipath..................................................................................................................................... 341
Delayed Installation of ECMP Routes Into BGP....................................................................................................341
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................ 341
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 342
17 FIPS Cryptography...................................................................................................................................343
Conguration Tasks....................................................................................................................................................... 343
Contents
11