Administrator Guide

Modifying the ECMP Group Threshold....................................................................................................................300
RTAG7................................................................................................................................................................................. 301
Flow-based Hashing for ECMP.......................................................................................................................................302
15 FIP Snooping.......................................................................................................................... 305
Fibre Channel over Ethernet........................................................................................................................................... 305
Ensure Robustness in a Converged Ethernet Network............................................................................................... 305
FIP Snooping on Ethernet Bridges..................................................................................................................................306
FIP Snooping in a Switch Stack...................................................................................................................................... 308
Using FIP Snooping...........................................................................................................................................................308
FIP Snooping Prerequisites........................................................................................................................................ 308
Important Points to Remember.................................................................................................................................308
Enabling the FCoE Transit Feature...........................................................................................................................309
Enable FIP Snooping on VLANs................................................................................................................................ 309
Configure the FC-MAP Value.....................................................................................................................................310
Configure a Port for a Bridge-to-Bridge Link...........................................................................................................310
Configure a Port for a Bridge-to-FCF Link...............................................................................................................310
Impact on Other Software Features......................................................................................................................... 310
FIP Snooping Restrictions...........................................................................................................................................310
Configuring FIP Snooping............................................................................................................................................ 311
Displaying FIP Snooping Information................................................................................................................................311
FCoE Transit Configuration Example.............................................................................................................................. 316
16 FIPS Cryptography.................................................................................................................. 318
Configuration Tasks...........................................................................................................................................................318
Preparing the System........................................................................................................................................................318
Enabling FIPS Mode...........................................................................................................................................................318
Generating Host-Keys.......................................................................................................................................................319
Monitoring FIPS Mode Status..........................................................................................................................................319
Disabling FIPS Mode..........................................................................................................................................................319
17 Force10 Resilient Ring Protocol (FRRP).....................................................................................321
Protocol Overview............................................................................................................................................................. 321
Ring Status...................................................................................................................................................................322
Multiple FRRP Rings................................................................................................................................................... 322
Important FRRP Points...............................................................................................................................................323
Important FRRP Concepts.........................................................................................................................................324
Implementing FRRP.......................................................................................................................................................... 324
FRRP Configuration..........................................................................................................................................................325
Creating the FRRP Group.......................................................................................................................................... 325
Configuring the Control VLAN...................................................................................................................................325
Configuring and Adding the Member VLANs.......................................................................................................... 326
Setting the FRRP Timers............................................................................................................................................327
Clearing the FRRP Counters......................................................................................................................................327
Viewing the FRRP Configuration...............................................................................................................................327
Viewing the FRRP Information.................................................................................................................................. 327
Troubleshooting FRRP......................................................................................................................................................328
Sample Configuration and Topology...............................................................................................................................328
FRRP Support on VLT......................................................................................................................................................329
10
Contents