16 FCoE Transit....................................................................................................344
Fibre Channel over Ethernet............................................................................................................344
Ensure Robustness in a Converged Ethernet Network...................................................................344
FIP Snooping on Ethernet Bridges...................................................................................................346
Using FIP Snooping...........................................................................................................................348
FIP Snooping Prerequisites.........................................................................................................348
Important Points to Remember.................................................................................................349
Enabling the FCoE Transit Feature.............................................................................................350
Enable FIP Snooping on VLANs..................................................................................................350
Configure the FC-MAP Value.....................................................................................................350
Configure a Port for a Bridge-to-Bridge Link............................................................................350
Configure a Port for a Bridge-to-FCF Link.................................................................................351
Impact on Other Software Features...........................................................................................351
FIP Snooping Restrictions...........................................................................................................351
Configuring FIP Snooping...........................................................................................................351
FCoE Transit Configuration Example...............................................................................................353
Displaying FIP Snooping Information..............................................................................................354
17 Enabling FIPS Cryptography.........................................................................361
Configuration Tasks..........................................................................................................................361
Preparing the System........................................................................................................................361
Enabling FIPS Mode..........................................................................................................................362
Generating Host-Keys......................................................................................................................362
Monitoring FIPS Mode Status...........................................................................................................363
Disabling FIPS Mode.........................................................................................................................363
18 Flex Hash..........................................................................................................365
Flex Hash Capability Overview.........................................................................................................365
Configuring the Flex Hash Mechanism............................................................................................365
RDMA Over Converged Ethernet (RoCE) Overview........................................................................366
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.............................................................367
19 Force10 Resilient Ring Protocol (FRRP).....................................................368
Protocol Overview............................................................................................................................368
Ring Status...................................................................................................................................369
Multiple FRRP Rings....................................................................................................................370
Important FRRP Points................................................................................................................370
Important FRRP Concepts..........................................................................................................370
Implementing FRRP..........................................................................................................................372
FRRP Configuration...........................................................................................................................372
Creating the FRRP Group............................................................................................................372