Administrator Guide

Modifying the ECMP Group Threshold................................................................................................................ 316
RTAG7.................................................................................................................................................................................317
Flow-based Hashing for ECMP.................................................................................................................................... 318
Chapter 15: FIP Snooping...........................................................................................................321
Fibre Channel over Ethernet.........................................................................................................................................321
Ensure Robustness in a Converged Ethernet Network..........................................................................................321
FIP Snooping on Ethernet Bridges..............................................................................................................................322
FIP Snooping in a Switch Stack...................................................................................................................................324
Using FIP Snooping.........................................................................................................................................................324
FIP Snooping Prerequisites.....................................................................................................................................324
Important Points to Remember............................................................................................................................. 324
Enabling the FCoE Transit Feature.......................................................................................................................325
Enable FIP Snooping on VLANs.............................................................................................................................325
Configure the FC-MAP Value................................................................................................................................ 326
Configure a Port for a Bridge-to-Bridge Link.....................................................................................................326
Configure a Port for a Bridge-to-FCF Link.........................................................................................................326
Impact on Other Software Features.................................................................................................................... 326
FIP Snooping Restrictions.......................................................................................................................................327
Configuring FIP Snooping........................................................................................................................................327
Displaying FIP Snooping Information..........................................................................................................................328
FCoE Transit Configuration Example......................................................................................................................... 333
Chapter 16: FIPS Cryptography................................................................................................. 335
Configuration Tasks........................................................................................................................................................335
Preparing the System.................................................................................................................................................... 335
Enabling FIPS Mode....................................................................................................................................................... 336
Generating Host-Keys................................................................................................................................................... 336
Monitoring FIPS Mode Status..................................................................................................................................... 336
Disabling FIPS Mode.......................................................................................................................................................337
Chapter 17: Force10 Resilient Ring Protocol (FRRP)..................................................................338
Protocol Overview.......................................................................................................................................................... 338
Ring Status................................................................................................................................................................. 339
Multiple FRRP Rings.................................................................................................................................................339
Important FRRP Points............................................................................................................................................340
Important FRRP Concepts...................................................................................................................................... 341
Implementing FRRP.........................................................................................................................................................341
FRRP Configuration........................................................................................................................................................342
Creating the FRRP Group....................................................................................................................................... 342
Configuring the Control VLAN...............................................................................................................................342
Configuring and Adding the Member VLANs..................................................................................................... 343
Setting the FRRP Timers........................................................................................................................................ 344
Clearing the FRRP Counters.................................................................................................................................. 344
Viewing the FRRP Configuration...........................................................................................................................344
Viewing the FRRP Information.............................................................................................................................. 345
Troubleshooting FRRP...................................................................................................................................................345
Sample Configuration and Topology.......................................................................................................................... 345
FRRP Support on VLT................................................................................................................................................... 346
10
Contents