Users Guide

DHCP MAC Source Address Validation.................................................................................................................... 303
Enabling IP+MAC Source Address Validation............................................................................................................303
Viewing the Number of SAV Dropped Packets.........................................................................................................304
Clearing the Number of SAV Dropped Packets........................................................................................................ 304
15 Equal Cost Multi-Path (ECMP)................................................................................. 305
Conguring the Hash Algorithm.....................................................................................................................................305
Enabling Deterministic ECMP Next Hop........................................................................................................................ 305
Conguring the Hash Algorithm Seed............................................................................................................................305
Link Bundle Monitoring.................................................................................................................................................. 306
Managing ECMP Group Paths................................................................................................................................. 306
Creating an ECMP Group Bundle............................................................................................................................. 307
Modifying the ECMP Group Threshold.....................................................................................................................307
16 FCoE Transit..............................................................................................................309
Fibre Channel over Ethernet.......................................................................................................................................... 309
Ensure Robustness in a Converged Ethernet Network.................................................................................................. 309
FIP Snooping on Ethernet Bridges..................................................................................................................................310
FIP Snooping in a Switch Stack...................................................................................................................................... 312
Using FIP Snooping.........................................................................................................................................................312
FIP Snooping Prerequisites....................................................................................................................................... 312
Important Points to Remember.................................................................................................................................313
Enabling the FCoE Transit Feature............................................................................................................................313
Enable FIP Snooping on VLANs................................................................................................................................ 314
Congure the FC-MAP Value....................................................................................................................................314
Congure a Port for a Bridge-to-Bridge Link.............................................................................................................314
Congure a Port for a Bridge-to-FCF Link................................................................................................................ 314
Impact on Other Software Features..........................................................................................................................314
FIP Snooping Restrictions.........................................................................................................................................315
Conguring FIP Snooping......................................................................................................................................... 315
Displaying FIP Snooping Information............................................................................................................................... 316
FCoE Transit Conguration Example...............................................................................................................................321
17 FIPS Cryptography.................................................................................................... 323
Conguration Tasks........................................................................................................................................................323
Preparing the System.....................................................................................................................................................323
Enabling FIPS Mode.......................................................................................................................................................323
Generating Host-Keys.................................................................................................................................................... 324
Monitoring FIPS Mode Status........................................................................................................................................ 324
Disabling FIPS Mode...................................................................................................................................................... 325
18 Force10 Resilient Ring Protocol (FRRP).....................................................................326
Protocol Overview......................................................................................................................................................... 326
Ring Status.............................................................................................................................................................. 326
Multiple FRRP Rings.................................................................................................................................................327
Important FRRP Points.............................................................................................................................................327
11