Administrator Guide
Configuring the Hash Algorithm................................................................................................................................ 293
Enabling Deterministic ECMP Next Hop..................................................................................................................293
Configuring the Hash Algorithm Seed...................................................................................................................... 293
Link Bundle Monitoring.....................................................................................................................................................294
Managing ECMP Group Paths.................................................................................................................................. 294
Creating an ECMP Group Bundle............................................................................................................................. 295
Modifying the ECMP Group Threshold....................................................................................................................295
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table........................................296
Support for ECMP in host table................................................................................................................................296
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ........................................................................... 296
RTAG7................................................................................................................................................................................ 296
Flow-based Hashing for ECMP.......................................................................................................................................298
15 FIP Snooping...........................................................................................................................301
Fibre Channel over Ethernet............................................................................................................................................ 301
Ensure Robustness in a Converged Ethernet Network................................................................................................301
FIP Snooping on Ethernet Bridges..................................................................................................................................302
FIP Snooping in a Switch Stack...................................................................................................................................... 304
Using FIP Snooping...........................................................................................................................................................304
FIP Snooping Prerequisites........................................................................................................................................ 304
Important Points to Remember.................................................................................................................................304
Enabling the FCoE Transit Feature...........................................................................................................................305
Enable FIP Snooping on VLANs................................................................................................................................ 305
Configure the FC-MAP Value....................................................................................................................................306
Configure a Port for a Bridge-to-Bridge Link.......................................................................................................... 306
Configure a Port for a Bridge-to-FCF Link..............................................................................................................306
Impact on Other Software Features.........................................................................................................................306
FIP Snooping Restrictions..........................................................................................................................................306
Configuring FIP Snooping...........................................................................................................................................307
Displaying FIP Snooping Information.............................................................................................................................. 307
FCoE Transit Configuration Example.............................................................................................................................. 312
16 Flex Hash and Optimized Boot-Up............................................................................................. 314
Flex Hash Capability Overview.........................................................................................................................................314
Configuring the Flex Hash Mechanism........................................................................................................................... 314
Configuring Fast Boot and LACP Fast Switchover.......................................................................................................315
Optimizing the Boot Time.................................................................................................................................................315
Interoperation of Applications with Fast Boot and System States............................................................................. 316
RDMA Over Converged Ethernet (RoCE) Overview....................................................................................................318
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.........................................................................................319
17 Force10 Resilient Ring Protocol (FRRP).................................................................................... 320
Protocol Overview............................................................................................................................................................ 320
Ring Status....................................................................................................................................................................321
Multiple FRRP Rings.................................................................................................................................................... 321
Important FRRP Points...............................................................................................................................................322
Important FRRP Concepts.........................................................................................................................................323
Implementing FRRP.......................................................................................................................................................... 323
FRRP Configuration.......................................................................................................................................................... 324
10
Contents










