Reference Guide

Table Of Contents
Configuring the Hash Algorithm Seed............................................................................................................296
Link Bundle Monitoring.........................................................................................................................................296
Managing ECMP Group Paths........................................................................................................................297
Creating an ECMP Group Bundle................................................................................................................... 297
Modifying the ECMP Group Threshold...........................................................................................................297
15 FCoE Transit........................................................................................................................... 299
Fibre Channel over Ethernet................................................................................................................................. 299
Ensure Robustness in a Converged Ethernet Network........................................................................................ 299
FIP Snooping on Ethernet Bridges........................................................................................................................301
FIP Snooping in a Switch Stack............................................................................................................................303
Using FIP Snooping...............................................................................................................................................303
FIP Snooping Prerequisites............................................................................................................................303
Important Points to Remember...................................................................................................................... 304
Enabling the FCoE Transit Feature................................................................................................................. 304
Enable FIP Snooping on VLANs......................................................................................................................304
Configure the FC-MAP Value......................................................................................................................... 304
Configure a Port for a Bridge-to-Bridge Link................................................................................................. 305
Configure a Port for a Bridge-to-FCF Link...................................................................................................... 305
Impact on Other Software Features...............................................................................................................305
FIP Snooping Restrictions.............................................................................................................................. 306
Configuring FIP Snooping...............................................................................................................................306
Displaying FIP Snooping Information................................................................................................................... 307
FCoE Transit Configuration Example.....................................................................................................................312
16 Enabling FIPS Cryptography................................................................................................315
Configuration Tasks..............................................................................................................................................315
Preparing the System........................................................................................................................................... 315
Enabling FIPS Mode..............................................................................................................................................315
Generating Host-Keys...........................................................................................................................................316
Monitoring FIPS Mode Status...............................................................................................................................316
Disabling FIPS Mode............................................................................................................................................ 317
17 Force10 Resilient Ring Protocol (FRRP).............................................................................319
Protocol Overview................................................................................................................................................ 319
Ring Status..................................................................................................................................................... 320
Multiple FRRP Rings....................................................................................................................................... 320
Important FRRP Points....................................................................................................................................321
Important FRRP Concepts.............................................................................................................................. 321
Implementing FRRP...............................................................................................................................................322
FRRP Configuration...............................................................................................................................................323
Creating the FRRP Group................................................................................................................................323