Users Guide
Support for ECMP in host table............................................................................................................................306
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ....................................................................... 306
RTAG7.............................................................................................................................................................................306
Flow-based Hashing for ECMP................................................................................................................................... 307
15 FIP Snooping............................................................................................................................................ 310
Fibre Channel over Ethernet.........................................................................................................................................310
Ensure Robustness in a Converged Ethernet Network............................................................................................ 310
FIP Snooping on Ethernet Bridges...............................................................................................................................312
FIP Snooping in a Switch Stack....................................................................................................................................314
Using FIP Snooping........................................................................................................................................................314
FIP Snooping Prerequisites..................................................................................................................................... 314
Important Points to Remember..............................................................................................................................314
Enabling the FCoE Transit Feature........................................................................................................................315
Enable FIP Snooping on VLANs..............................................................................................................................316
Configure the FC-MAP Value.................................................................................................................................316
Configure a Port for a Bridge-to-Bridge Link....................................................................................................... 316
Configure a Port for a Bridge-to-FCF Link...........................................................................................................316
Impact on Other Software Features......................................................................................................................316
FIP Snooping Restrictions....................................................................................................................................... 317
Configuring FIP Snooping........................................................................................................................................317
Displaying FIP Snooping Information........................................................................................................................... 318
FCoE Transit Configuration Example..........................................................................................................................323
16 Flex Hash and Optimized Boot-Up........................................................................................................... 325
Flex Hash Capability Overview.................................................................................................................................... 325
Configuring the Flex Hash Mechanism.......................................................................................................................325
Configuring Fast Boot and LACP Fast Switchover...................................................................................................326
Optimizing the Boot Time.............................................................................................................................................326
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................326
Guidelines for Configuring Optimized Booting Mechanism................................................................................327
Interoperation of Applications with Fast Boot and System States.........................................................................328
LACP and IPv4 Routing.......................................................................................................................................... 328
LACP and IPv6 Routing.......................................................................................................................................... 328
BGP Graceful Restart............................................................................................................................................. 329
Cold Boot Caused by Power Cycling the System............................................................................................... 329
Unexpected Reload of the System....................................................................................................................... 329
Software Upgrade...................................................................................................................................................329
LACP Fast Switchover........................................................................................................................................... 329
Changes to BGP Multipath.................................................................................................................................... 330
Delayed Installation of ECMP Routes Into BGP.................................................................................................. 330
RDMA Over Converged Ethernet (RoCE) Overview...............................................................................................330
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces..................................................................................... 331
17 Force10 Resilient Ring Protocol (FRRP)...................................................................................................332
Protocol Overview.........................................................................................................................................................332
Contents
11










