Users Guide

Using DHCP Clear Commands.............................................................................................................................. 266
Congure the System to be a DHCP Client...............................................................................................................266
Conguring the DHCP Client System...................................................................................................................266
DHCP Client on a Management Interface............................................................................................................268
DHCP Client Operation with Other Features.......................................................................................................268
Congure Secure DHCP...............................................................................................................................................269
Option 82..................................................................................................................................................................269
DHCP Snooping....................................................................................................................................................... 270
Drop DHCP Packets on Snooped VLANs Only.................................................................................................... 273
Dynamic ARP Inspection.........................................................................................................................................274
Conguring Dynamic ARP Inspection....................................................................................................................274
Source Address Validation............................................................................................................................................ 275
Enabling IP Source Address Validation.................................................................................................................. 276
DHCP MAC Source Address Validation.................................................................................................................276
Enabling IP+MAC Source Address Validation.......................................................................................................276
Viewing the Number of SAV Dropped Packets....................................................................................................277
Clearing the Number of SAV Dropped Packets....................................................................................................277
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 278
ECMP for Flow-Based Anity..................................................................................................................................... 278
Conguring the Hash Algorithm.............................................................................................................................278
Enabling Deterministic ECMP Next Hop...............................................................................................................278
Conguring the Hash Algorithm Seed...................................................................................................................279
Link Bundle Monitoring..................................................................................................................................................279
Managing ECMP Group Paths...............................................................................................................................280
Creating an ECMP Group Bundle..........................................................................................................................280
Modifying the ECMP Group Threshold.................................................................................................................280
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table.......................................281
Support for ECMP in host table............................................................................................................................. 281
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 282
15 FIP Snooping............................................................................................................................................283
Fibre Channel over Ethernet........................................................................................................................................ 283
Ensure Robustness in a Converged Ethernet Network............................................................................................ 283
FIP Snooping on Ethernet Bridges..............................................................................................................................285
Using FIP Snooping........................................................................................................................................................287
FIP Snooping Prerequisites..................................................................................................................................... 287
Important Points to Remember..............................................................................................................................287
Enabling the FCoE Transit Feature........................................................................................................................288
Enable FIP Snooping on VLANs.............................................................................................................................289
Congure the FC-MAP Value................................................................................................................................ 289
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 289
Congure a Port for a Bridge-to-FCF Link...........................................................................................................289
Impact on Other Software Features..................................................................................................................... 289
FIP Snooping Restrictions...................................................................................................................................... 290
Conguring FIP Snooping.......................................................................................................................................290
Displaying FIP Snooping Information............................................................................................................................291
10
Contents