Users Guide

Using DHCP Clear Commands...............................................................................................................................277
Congure the System to be a DHCP Client................................................................................................................277
Conguring the DHCP Client System....................................................................................................................277
DHCP Client on a Management Interface............................................................................................................ 279
DHCP Client Operation with Other Features....................................................................................................... 279
Congure the System for User Port Stacking (Option 230)....................................................................................280
Congure Secure DHCP............................................................................................................................................... 280
Option 82..................................................................................................................................................................280
DHCP Snooping........................................................................................................................................................281
Conguring the DHCP secondary-subnet............................................................................................................284
Drop DHCP Packets on Snooped VLANs Only....................................................................................................285
Dynamic ARP Inspection........................................................................................................................................ 285
Conguring Dynamic ARP Inspection................................................................................................................... 286
Source Address Validation.............................................................................................................................................287
Enabling IP Source Address Validation.................................................................................................................. 287
DHCP MAC Source Address Validation................................................................................................................ 288
Enabling IP+MAC Source Address Validation.......................................................................................................288
Viewing the Number of SAV Dropped Packets....................................................................................................289
Clearing the Number of SAV Dropped Packets...................................................................................................289
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 290
ECMP for Flow-Based Anity.....................................................................................................................................290
Conguring the Hash Algorithm............................................................................................................................ 290
Enabling Deterministic ECMP Next Hop.............................................................................................................. 290
Conguring the Hash Algorithm Seed................................................................................................................... 291
Link Bundle Monitoring.................................................................................................................................................. 291
Managing ECMP Group Paths...............................................................................................................................292
Creating an ECMP Group Bundle.......................................................................................................................... 292
Modifying the ECMP Group Threshold.................................................................................................................292
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................293
Support for ECMP in host table............................................................................................................................ 293
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 294
RTAG7.............................................................................................................................................................................294
Flow-based Hashing for ECMP................................................................................................................................... 295
15 FIP Snooping............................................................................................................................................298
Fibre Channel over Ethernet........................................................................................................................................ 298
Ensure Robustness in a Converged Ethernet Network............................................................................................ 298
FIP Snooping on Ethernet Bridges..............................................................................................................................300
FIP Snooping in a Switch Stack....................................................................................................................................301
Using FIP Snooping....................................................................................................................................................... 302
FIP Snooping Prerequisites.....................................................................................................................................302
Important Points to Remember............................................................................................................................. 302
Enabling the FCoE Transit Feature........................................................................................................................303
Enable FIP Snooping on VLANs.............................................................................................................................303
Congure the FC-MAP Value................................................................................................................................ 304
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................304
10
Contents