Concept Guide
DHCP MAC Source Address Validation................................................................................................................ 333
Enabling IP+MAC Source Address Validation.......................................................................................................333
Viewing the Number of SAV Dropped Packets....................................................................................................334
Clearing the Number of SAV Dropped Packets................................................................................................... 334
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 335
ECMP for Flow-Based Anity.....................................................................................................................................335
Conguring the Hash Algorithm............................................................................................................................ 335
Enabling Deterministic ECMP Next Hop.............................................................................................................. 335
Conguring the Hash Algorithm Seed.................................................................................................................. 336
Link Bundle Monitoring................................................................................................................................................. 336
Managing ECMP Group Paths...............................................................................................................................337
Creating an ECMP Group Bundle.......................................................................................................................... 337
Modifying the ECMP Group Threshold.................................................................................................................337
RTAG7.............................................................................................................................................................................338
Flow-based Hashing for ECMP................................................................................................................................... 339
15 FIP Snooping............................................................................................................................................342
Fibre Channel over Ethernet........................................................................................................................................ 342
Ensure Robustness in a Converged Ethernet Network............................................................................................ 342
FIP Snooping on Ethernet Bridges.............................................................................................................................. 344
FIP Snooping in a Switch Stack...................................................................................................................................346
Using FIP Snooping....................................................................................................................................................... 346
FIP Snooping Prerequisites.....................................................................................................................................346
Important Points to Remember............................................................................................................................. 346
Enabling the FCoE Transit Feature........................................................................................................................ 347
Enable FIP Snooping on VLANs.............................................................................................................................348
Congure the FC-MAP Value................................................................................................................................ 348
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................348
Congure a Port for a Bridge-to-FCF Link...........................................................................................................348
Impact on Other Software Features..................................................................................................................... 348
FIP Snooping Restrictions...................................................................................................................................... 349
Conguring FIP Snooping.......................................................................................................................................349
Displaying FIP Snooping Information...........................................................................................................................350
FCoE Transit Conguration Example.......................................................................................................................... 355
16 FIPS Cryptography...................................................................................................................................357
Conguration Tasks....................................................................................................................................................... 357
Preparing the System....................................................................................................................................................357
Enabling FIPS Mode......................................................................................................................................................358
Generating Host-Keys...................................................................................................................................................358
Monitoring FIPS Mode Status..................................................................................................................................... 358
Disabling FIPS Mode..................................................................................................................................................... 359
17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 360
Protocol Overview.........................................................................................................................................................360
Contents
11