White Papers

Sample DCB Conguration...........................................................................................................................................289
PFC and ETS Conguration Command Examples.............................................................................................. 290
13 Dynamic Host Conguration Protocol (DHCP)..........................................................................................291
DHCP Packet Format and Options.............................................................................................................................. 291
Assign an IP Address using DHCP...............................................................................................................................293
Implementation Information..........................................................................................................................................294
Congure the System to be a DHCP Server..............................................................................................................294
Conguring the Server for Automatic Address Allocation..................................................................................295
Specifying a Default Gateway................................................................................................................................296
Congure a Method of Hostname Resolution..................................................................................................... 296
Using DNS for Address Resolution........................................................................................................................296
Using NetBIOS WINS for Address Resolution......................................................................................................297
Creating Manual Binding Entries............................................................................................................................297
Debugging the DHCP Server................................................................................................................................. 297
Using DHCP Clear Commands.............................................................................................................................. 298
Congure the System to be a Relay Agent................................................................................................................ 298
Congure the System to be a DHCP Client...............................................................................................................300
Conguring the DHCP Client System...................................................................................................................300
DHCP Client on a Management Interface............................................................................................................302
DHCP Client Operation with Other Features.......................................................................................................302
Congure the System for User Port Stacking (Option 230)....................................................................................303
Congure Secure DHCP...............................................................................................................................................303
Option 82..................................................................................................................................................................304
DHCP Snooping.......................................................................................................................................................304
Drop DHCP Packets on Snooped VLANs Only....................................................................................................309
Dynamic ARP Inspection........................................................................................................................................ 309
Conguring Dynamic ARP Inspection....................................................................................................................310
Source Address Validation..............................................................................................................................................311
Enabling IP Source Address Validation....................................................................................................................311
DHCP MAC Source Address Validation................................................................................................................. 312
Enabling IP+MAC Source Address Validation........................................................................................................312
Viewing the Number of SAV Dropped Packets.................................................................................................... 313
Clearing the Number of SAV Dropped Packets....................................................................................................313
14 Equal Cost Multi-Path (ECMP).................................................................................................................314
ECMP for Flow-Based Anity......................................................................................................................................314
Conguring the Hash Algorithm............................................................................................................................. 314
Enabling Deterministic ECMP Next Hop............................................................................................................... 314
Conguring the Hash Algorithm Seed................................................................................................................... 315
Link Bundle Monitoring.................................................................................................................................................. 315
Managing ECMP Group Paths................................................................................................................................316
Creating an ECMP Group Bundle...........................................................................................................................316
Modifying the ECMP Group Threshold................................................................................................................. 316
RTAG7.............................................................................................................................................................................. 317
Flow-based Hashing for ECMP.................................................................................................................................... 318
10
Contents