Dell S6000-ON Switch User Manual


  Open as PDF
of 1100
 
Configuring the Hash Algorithm.................................................................................................319
Enabling Deterministic ECMP Next Hop.................................................................................... 319
Configuring the Hash Algorithm Seed.......................................................................................320
Link Bundle Monitoring.................................................................................................................... 320
Managing ECMP Group Paths.....................................................................................................321
Creating an ECMP Group Bundle...............................................................................................322
Modifying the ECMP Group Threshold...................................................................................... 322
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table.................323
Support for ECMP in host table..................................................................................................323
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ..................................................324
14 FCoE Transit.................................................................................................... 325
Fibre Channel over Ethernet.............................................................................................................325
Ensure Robustness in a Converged Ethernet Network................................................................... 325
FIP Snooping on Ethernet Bridges................................................................................................... 327
FIP Snooping in a Switch Stack........................................................................................................ 329
Using FIP Snooping...........................................................................................................................329
FIP Snooping Prerequisites.........................................................................................................329
Important Points to Remember................................................................................................. 330
Enabling the FCoE Transit Feature..............................................................................................331
Enable FIP Snooping on VLANs.................................................................................................. 331
Configure the FC-MAP Value......................................................................................................331
Configure a Port for a Bridge-to-Bridge Link............................................................................ 332
Configure a Port for a Bridge-to-FCF Link................................................................................ 332
Impact on Other Software Features...........................................................................................332
FIP Snooping Restrictions...........................................................................................................333
Configuring FIP Snooping...........................................................................................................333
Displaying FIP Snooping Information.............................................................................................. 334
FCoE Transit Configuration Example...............................................................................................340
15 Flex Hash and Optimized Boot-Up............................................................. 342
Flex Hash Capability Overview......................................................................................................... 342
Configuring the Flex Hash Mechanism............................................................................................342
Configuring Fast Boot and LACP Fast Switchover.......................................................................... 343
Optimizing the Boot Time................................................................................................................343
Booting Process When Optimized Boot Time Mechanism is Enabled.....................................344
Guidelines for Configuring Optimized Booting Mechanism.................................................... 344
Interoperation of Applications with Fast Boot and System States..................................................345
LACP and IPv4 Routing...............................................................................................................345
LACP and IPv6 Routing...............................................................................................................346
BGP Graceful Restart.................................................................................................................. 346
Cold Boot Caused by Power Cycling the System..................................................................... 346
11