Concept Guide

Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes .........................................................................337
RTAG7............................................................................................................................................................................. 337
Flow-based Hashing for ECMP................................................................................................................................... 338
15 FIP Snooping............................................................................................................................................ 341
Fibre Channel over Ethernet.........................................................................................................................................341
Ensure Robustness in a Converged Ethernet Network.............................................................................................341
FIP Snooping on Ethernet Bridges.............................................................................................................................. 343
FIP Snooping in a Switch Stack...................................................................................................................................345
Using FIP Snooping....................................................................................................................................................... 345
FIP Snooping Prerequisites.....................................................................................................................................345
Important Points to Remember............................................................................................................................. 345
Enabling the FCoE Transit Feature........................................................................................................................346
Enable FIP Snooping on VLANs.............................................................................................................................347
Congure the FC-MAP Value.................................................................................................................................347
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 347
Congure a Port for a Bridge-to-FCF Link...........................................................................................................347
Impact on Other Software Features......................................................................................................................347
FIP Snooping Restrictions...................................................................................................................................... 348
Conguring FIP Snooping.......................................................................................................................................348
Displaying FIP Snooping Information...........................................................................................................................349
FCoE Transit Conguration Example...........................................................................................................................354
16 Flex Hash and Optimized Boot-Up............................................................................................................356
Flex Hash Capability Overview.................................................................................................................................... 356
Conguring the Flex Hash Mechanism.......................................................................................................................356
Conguring Fast Boot and LACP Fast Switchover................................................................................................... 357
Optimizing the Boot Time.............................................................................................................................................357
Booting Process When Optimized Boot Time Mechanism is Enabled.............................................................. 357
Guidelines for Conguring Optimized Booting Mechanism................................................................................358
Interoperation of Applications with Fast Boot and System States..........................................................................359
LACP and IPv4 Routing.......................................................................................................................................... 359
LACP and IPv6 Routing..........................................................................................................................................359
BGP Graceful Restart............................................................................................................................................. 360
Cold Boot Caused by Power Cycling the System............................................................................................... 360
Unexpected Reload of the System........................................................................................................................360
Software Upgrade................................................................................................................................................... 360
LACP Fast Switchover............................................................................................................................................360
Changes to BGP Multipath..................................................................................................................................... 361
Delayed Installation of ECMP Routes Into BGP................................................................................................... 361
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................ 361
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 362
17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 363
Protocol Overview.........................................................................................................................................................363
Ring Status............................................................................................................................................................... 364
Contents
11