Setup Guide

DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................ 283
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 284
Non-default VRF conguration for DHCPv6 helper address...................................................................................285
Conguring DHCP relay source interface...................................................................................................................285
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 285
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................286
Congure the System for User Port Stacking (Option 230)....................................................................................287
Congure Secure DHCP............................................................................................................................................... 287
Option 82 (DHCPv4 relay options)........................................................................................................................287
DHCPv6 relay agent options..................................................................................................................................288
DHCP Snooping.......................................................................................................................................................289
Drop DHCP Packets on Snooped VLANs Only....................................................................................................293
Dynamic ARP Inspection.........................................................................................................................................293
Conguring Dynamic ARP Inspection................................................................................................................... 293
Source Address Validation............................................................................................................................................ 295
Enabling IP Source Address Validation..................................................................................................................295
DHCP MAC Source Address Validation................................................................................................................ 296
Enabling IP+MAC Source Address Validation.......................................................................................................296
Viewing the Number of SAV Dropped Packets....................................................................................................297
Clearing the Number of SAV Dropped Packets................................................................................................... 297
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 298
ECMP for Flow-Based Anity.....................................................................................................................................298
Conguring the Hash Algorithm............................................................................................................................ 298
Enabling Deterministic ECMP Next Hop.............................................................................................................. 298
Conguring the Hash Algorithm Seed.................................................................................................................. 299
Link Bundle Monitoring................................................................................................................................................. 299
Managing ECMP Group Paths...............................................................................................................................299
Creating an ECMP Group Bundle..........................................................................................................................300
Modifying the ECMP Group Threshold................................................................................................................ 300
....................................................................................................................................................................................301
Support for ECMP in host table.............................................................................................................................301
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes .........................................................................301
14 FIP Snooping............................................................................................................................................302
Fibre Channel over Ethernet........................................................................................................................................ 302
Ensure Robustness in a Converged Ethernet Network............................................................................................302
FIP Snooping on Ethernet Bridges..............................................................................................................................304
FIP Snooping in a Switch Stack...................................................................................................................................306
Using FIP Snooping....................................................................................................................................................... 306
FIP Snooping Prerequisites.....................................................................................................................................306
Important Points to Remember............................................................................................................................. 306
Enabling the FCoE Transit Feature........................................................................................................................ 307
Enable FIP Snooping on VLANs.............................................................................................................................307
Congure the FC-MAP Value................................................................................................................................ 308
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................308
10
Contents