Users Guide

Source Address Validation..............................................................................................................................................299
Enabling IP Source Address Validation......................................................................................................................299
DHCP MAC Source Address Validation....................................................................................................................300
Enabling IP+MAC Source Address Validation........................................................................................................... 300
Viewing the Number of SAV Dropped Packets......................................................................................................... 301
Clearing the Number of SAV Dropped Packets.........................................................................................................301
15 Equal Cost Multi-Path (ECMP)................................................................................. 302
Conguring the Hash Algorithm.....................................................................................................................................302
Enabling Deterministic ECMP Next Hop........................................................................................................................ 302
Conguring the Hash Algorithm Seed............................................................................................................................ 302
Link Bundle Monitoring...................................................................................................................................................303
Managing ECMP Group Paths................................................................................................................................. 303
Creating an ECMP Group Bundle.............................................................................................................................304
Modifying the ECMP Group Threshold.................................................................................................................... 304
16 FCoE Transit..............................................................................................................306
Fibre Channel over Ethernet.......................................................................................................................................... 306
Ensure Robustness in a Converged Ethernet Network.................................................................................................. 306
FIP Snooping on Ethernet Bridges................................................................................................................................. 307
FIP Snooping in a Switch Stack..................................................................................................................................... 309
Using FIP Snooping........................................................................................................................................................309
FIP Snooping Prerequisites...................................................................................................................................... 309
Important Points to Remember.................................................................................................................................310
Enabling the FCoE Transit Feature............................................................................................................................310
Enable FIP Snooping on VLANs................................................................................................................................. 311
Congure the FC-MAP Value.................................................................................................................................... 311
Congure a Port for a Bridge-to-Bridge Link............................................................................................................. 311
Congure a Port for a Bridge-to-FCF Link.................................................................................................................311
Impact on Other Software Features.......................................................................................................................... 311
FIP Snooping Restrictions.........................................................................................................................................312
Conguring FIP Snooping......................................................................................................................................... 312
Displaying FIP Snooping Information............................................................................................................................... 313
FCoE Transit Conguration Example...............................................................................................................................318
17 FIPS Cryptography.................................................................................................... 320
Conguration Tasks........................................................................................................................................................320
Preparing the System.....................................................................................................................................................320
Enabling FIPS Mode.......................................................................................................................................................320
Generating Host-Keys.....................................................................................................................................................321
Monitoring FIPS Mode Status.........................................................................................................................................321
Disabling FIPS Mode...................................................................................................................................................... 322
18 Force10 Resilient Ring Protocol (FRRP).....................................................................323
Protocol Overview..........................................................................................................................................................323
Ring Status.............................................................................................................................................................. 323
11