Concept Guide
Source Address Validation............................................................................................................................................ 325
Enabling IP Source Address Validation..................................................................................................................325
DHCP MAC Source Address Validation................................................................................................................ 326
Enabling IP+MAC Source Address Validation.......................................................................................................326
Viewing the Number of SAV Dropped Packets....................................................................................................327
Clearing the Number of SAV Dropped Packets................................................................................................... 327
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 328
ECMP for Flow-Based Anity.....................................................................................................................................328
Conguring the Hash Algorithm............................................................................................................................ 328
Enabling Deterministic ECMP Next Hop.............................................................................................................. 328
Conguring the Hash Algorithm Seed.................................................................................................................. 329
Link Bundle Monitoring................................................................................................................................................. 329
Managing ECMP Group Paths...............................................................................................................................330
Creating an ECMP Group Bundle..........................................................................................................................330
Modifying the ECMP Group Threshold.................................................................................................................330
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table.......................................331
Support for ECMP in host table............................................................................................................................ 332
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 332
RTAG7............................................................................................................................................................................. 332
Flow-based Hashing for ECMP....................................................................................................................................333
15 FIP Snooping............................................................................................................................................336
Fibre Channel over Ethernet........................................................................................................................................ 336
Ensure Robustness in a Converged Ethernet Network............................................................................................336
FIP Snooping on Ethernet Bridges.............................................................................................................................. 338
FIP Snooping in a Switch Stack...................................................................................................................................340
Using FIP Snooping....................................................................................................................................................... 340
FIP Snooping Prerequisites.....................................................................................................................................340
Important Points to Remember............................................................................................................................. 340
Enabling the FCoE Transit Feature.........................................................................................................................341
Enable FIP Snooping on VLANs.............................................................................................................................342
Congure the FC-MAP Value................................................................................................................................ 342
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................342
Congure a Port for a Bridge-to-FCF Link...........................................................................................................342
Impact on Other Software Features..................................................................................................................... 342
FIP Snooping Restrictions...................................................................................................................................... 343
Conguring FIP Snooping.......................................................................................................................................343
Displaying FIP Snooping Information...........................................................................................................................344
FCoE Transit Conguration Example...........................................................................................................................349
16 Flex Hash and Optimized Boot-Up............................................................................................................ 351
Flex Hash Capability Overview..................................................................................................................................... 351
Conguring the Flex Hash Mechanism........................................................................................................................351
Conguring Fast Boot and LACP Fast Switchover...................................................................................................352
Optimizing the Boot Time.............................................................................................................................................352
Contents
11










