Reference Guide
DHCP MAC Source Address Validation......................................................................................304
Enabling IP+MAC Source Address Validation............................................................................304
Viewing the Number of SAV Dropped Packets..........................................................................305
Clearing the Number of SAV Dropped Packets.........................................................................305
14 Equal Cost Multi-Path (ECMP).....................................................................306
ECMP for Flow-Based Affinity..........................................................................................................306
Configuring the Hash Algorithm................................................................................................306
Enabling Deterministic ECMP Next Hop....................................................................................306
Configuring the Hash Algorithm Seed....................................................................................... 307
Link Bundle Monitoring.................................................................................................................... 307
Managing ECMP Group Paths....................................................................................................308
Creating an ECMP Group Bundle.............................................................................................. 308
Modifying the ECMP Group Threshold......................................................................................309
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table.................309
Support for ECMP in host table.................................................................................................. 310
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ..................................................310
15 FCoE Transit.....................................................................................................311
Fibre Channel over Ethernet............................................................................................................. 311
Ensure Robustness in a Converged Ethernet Network....................................................................311
FIP Snooping on Ethernet Bridges....................................................................................................313
FIP Snooping in a Switch Stack.........................................................................................................315
Using FIP Snooping........................................................................................................................... 315
FIP Snooping Prerequisites..........................................................................................................315
Important Points to Remember..................................................................................................316
Enabling the FCoE Transit Feature............................................................................................. 316
Enable FIP Snooping on VLANs...................................................................................................317
Configure the FC-MAP Value......................................................................................................317
Configure a Port for a Bridge-to-Bridge Link.............................................................................317
Configure a Port for a Bridge-to-FCF Link.................................................................................317
Impact on Other Software Features........................................................................................... 318
FIP Snooping Restrictions........................................................................................................... 318
Configuring FIP Snooping...........................................................................................................318
Displaying FIP Snooping Information...............................................................................................319
FCoE Transit Configuration Example...............................................................................................325
16 Flex Hash and Optimized Boot-Up............................................................. 327
Flex Hash Capability Overview......................................................................................................... 327
Configuring the Flex Hash Mechanism............................................................................................ 327
Configuring Fast Boot and LACP Fast Switchover.......................................................................... 328
Optimizing the Boot Time................................................................................................................328
11










