Concept Guide

Table Of Contents
DHCP MAC Source Address Validation................................................................................................................ 325
Enabling IP+MAC Source Address Validation.......................................................................................................325
Viewing the Number of SAV Dropped Packets....................................................................................................326
Clearing the Number of SAV Dropped Packets...................................................................................................326
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 327
Conguring the Hash Algorithm...................................................................................................................................327
Enabling Deterministic ECMP Next Hop.....................................................................................................................327
Conguring the Hash Algorithm Seed.........................................................................................................................327
Link Bundle Monitoring................................................................................................................................................. 328
Managing ECMP Group Paths...............................................................................................................................328
Creating an ECMP Group Bundle.......................................................................................................................... 329
Modifying the ECMP Group Threshold.................................................................................................................329
15 FIP Snooping............................................................................................................................................ 331
Fibre Channel over Ethernet.........................................................................................................................................331
Ensure Robustness in a Converged Ethernet Network.............................................................................................331
FIP Snooping on Ethernet Bridges.............................................................................................................................. 333
FIP Snooping in a Switch Stack...................................................................................................................................335
Using FIP Snooping....................................................................................................................................................... 335
FIP Snooping Prerequisites.....................................................................................................................................335
Important Points to Remember............................................................................................................................. 335
Enabling the FCoE Transit Feature........................................................................................................................336
Enable FIP Snooping on VLANs............................................................................................................................. 337
Congure the FC-MAP Value.................................................................................................................................337
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 337
Congure a Port for a Bridge-to-FCF Link........................................................................................................... 337
Impact on Other Software Features......................................................................................................................337
FIP Snooping Restrictions...................................................................................................................................... 338
Conguring FIP Snooping.......................................................................................................................................338
Displaying FIP Snooping Information...........................................................................................................................339
FCoE Transit Conguration Example...........................................................................................................................344
16 FIPS Cryptography...................................................................................................................................346
Conguration Tasks....................................................................................................................................................... 346
Preparing the System....................................................................................................................................................346
Enabling FIPS Mode...................................................................................................................................................... 347
Generating Host-Keys................................................................................................................................................... 347
Monitoring FIPS Mode Status......................................................................................................................................347
Disabling FIPS Mode..................................................................................................................................................... 348
17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 349
Protocol Overview.........................................................................................................................................................349
Ring Status...............................................................................................................................................................350
Multiple FRRP Rings............................................................................................................................................... 350
Important FRRP Points............................................................................................................................................351
Contents
11