Users Guide

ECMP for Flow-Based Affinity............................................................................................. 330
Configuring the Hash Algorithm...................................................................................330
Enabling Deterministic ECMP Next Hop.....................................................................330
Configuring the Hash Algorithm Seed......................................................................... 331
Link Bundle Monitoring......................................................................................................... 331
Managing ECMP Group Paths....................................................................................... 332
Creating an ECMP Group Bundle................................................................................. 333
Modifying the ECMP Group Threshold........................................................................333
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM
Table....................................................................................................................................334
Support for ECMP in host table.....................................................................................334
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ............................... 335
14 FIP Snooping....................................................................................................................... 336
Fibre Channel over Ethernet................................................................................................336
Ensure Robustness in a Converged Ethernet Network..................................................336
FIP Snooping on Ethernet Bridges..................................................................................... 338
FIP Snooping in a Switch Stack........................................................................................... 341
Using FIP Snooping................................................................................................................341
FIP Snooping Prerequisites.............................................................................................341
Important Points to Remember.................................................................................... 342
Enabling the FCoE Transit Feature............................................................................... 343
Enable FIP Snooping on VLANs.....................................................................................343
Configure the FC-MAP Value........................................................................................ 343
Configure a Port for a Bridge-to-Bridge Link............................................................ 344
Configure a Port for a Bridge-to-FCF Link.................................................................344
Impact on Other Software Features.............................................................................344
FIP Snooping Restrictions...............................................................................................345
Configuring FIP Snooping.............................................................................................. 345
Displaying FIP Snooping Information................................................................................346
FCoE Transit Configuration Example.................................................................................352
15 Flex Hash and Optimized Boot-Up................................................................................. 354
Flex Hash Capability Overview............................................................................................354
Configuring the Flex Hash Mechanism............................................................................. 355
Configuring Fast Boot and LACP Fast Switchover.......................................................... 355
Optimizing the Boot Time....................................................................................................356
Booting Process When Optimized Boot Time Mechanism is Enabled.................356
Guidelines for Configuring Optimized Booting Mechanism.................................. 356
Interoperation of Applications with Fast Boot and System States...............................358
LACP and IPv4 Routing................................................................................................... 358
LACP and IPv6 Routing................................................................................................... 358
9.10(0.1)
11