Using DNS for Address Resolution
........................................................................................................................
274
Using NetBIOS WINS for Address Resolution
......................................................................................................
275
Creating Manual Binding Entries
............................................................................................................................
275
Debugging the DHCP Server
.................................................................................................................................
275
Using DHCP Clear Commands
...............................................................................................................................
276
Configure
the System to be a Relay Agent
.................................................................................................................
276
Configure
the System to be a DHCP Client
................................................................................................................
277
DHCP Client Operation with Other Features
.......................................................................................................
278
DHCP Client on a Management Interface
............................................................................................................
279
Configure
the System for User Port Stacking (Option 230)
....................................................................................
279
Configure
Secure DHCP
...............................................................................................................................................
280
Option 82
..................................................................................................................................................................
280
DHCP Snooping
........................................................................................................................................................
281
Configuring
the DHCP secondary-subnet
............................................................................................................
284
Drop DHCP Packets on Snooped VLANs Only
....................................................................................................
284
Dynamic ARP Inspection
........................................................................................................................................
285
Configuring
Dynamic ARP Inspection
...................................................................................................................
286
Source Address Validation
.............................................................................................................................................
287
Enabling IP Source Address Validation
..................................................................................................................
287
DHCP MAC Source Address Validation
................................................................................................................
288
Enabling IP+MAC Source Address Validation
.......................................................................................................
288
Viewing the Number of SAV Dropped Packets
....................................................................................................
289
Clearing the Number of SAV Dropped Packets
...................................................................................................
289
14 Equal Cost Multi-Path (ECMP)
................................................................................................................
290
ECMP for Flow-Based
Affinity
.....................................................................................................................................
290
Configuring
the Hash Algorithm
............................................................................................................................
290
Enabling Deterministic ECMP Next Hop
..............................................................................................................
290
Configuring
the Hash Algorithm Seed
...................................................................................................................
291
Link Bundle Monitoring
..................................................................................................................................................
291
Managing ECMP Group Paths
...............................................................................................................................
292
Creating an ECMP Group Bundle
..........................................................................................................................
292
Modifying the ECMP Group Threshold
.................................................................................................................
292
RTAG7
.............................................................................................................................................................................
293
Flow-based Hashing for ECMP
...................................................................................................................................
294
15 FIP Snooping
............................................................................................................................................
297
Fibre Channel over Ethernet
........................................................................................................................................
297
Ensure Robustness in a Converged Ethernet Network
............................................................................................
297
FIP Snooping on Ethernet Bridges
..............................................................................................................................
299
FIP Snooping in a Switch Stack
...................................................................................................................................
300
Using FIP Snooping
........................................................................................................................................................
301
FIP Snooping Prerequisites
.....................................................................................................................................
301
Important Points to Remember
..............................................................................................................................
301
Enabling the FCoE Transit Feature
........................................................................................................................
302
Enable FIP Snooping on VLANs
.............................................................................................................................
302
Configure
the FC-MAP Value
................................................................................................................................
303
10
Contents