Configuring the Hash Algorithm.................................................................................................319
Enabling Deterministic ECMP Next Hop....................................................................................319
Configuring the Hash Algorithm Seed.......................................................................................320
Link Bundle Monitoring....................................................................................................................320
Managing ECMP Group Paths.....................................................................................................321
Creating an ECMP Group Bundle...............................................................................................322
Modifying the ECMP Group Threshold......................................................................................322
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table.................323
Support for ECMP in host table..................................................................................................323
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ..................................................324
14 FCoE Transit.................................................................................................... 325Fibre Channel over Ethernet.............................................................................................................325
Ensure Robustness in a Converged Ethernet Network...................................................................325
FIP Snooping on Ethernet Bridges...................................................................................................327
FIP Snooping in a Switch Stack........................................................................................................329
Using FIP Snooping...........................................................................................................................329
FIP Snooping Prerequisites.........................................................................................................329
Important Points to Remember.................................................................................................330
Enabling the FCoE Transit Feature..............................................................................................331
Enable FIP Snooping on VLANs..................................................................................................331
Configure the FC-MAP Value......................................................................................................331
Configure a Port for a Bridge-to-Bridge Link............................................................................332
Configure a Port for a Bridge-to-FCF Link................................................................................332
Impact on Other Software Features...........................................................................................332
FIP Snooping Restrictions...........................................................................................................333
Configuring FIP Snooping...........................................................................................................333
Displaying FIP Snooping Information..............................................................................................334
FCoE Transit Configuration Example...............................................................................................340
15 Flex Hash and Optimized Boot-Up.............................................................342Flex Hash Capability Overview.........................................................................................................342
Configuring the Flex Hash Mechanism............................................................................................342
Configuring Fast Boot and LACP Fast Switchover..........................................................................343
Optimizing the Boot Time................................................................................................................343
Booting Process When Optimized Boot Time Mechanism is Enabled.....................................344
Guidelines for Configuring Optimized Booting Mechanism....................................................344
Interoperation of Applications with Fast Boot and System States..................................................345
LACP and IPv4 Routing...............................................................................................................345
LACP and IPv6 Routing...............................................................................................................346
BGP Graceful Restart..................................................................................................................346
Cold Boot Caused by Power Cycling the System.....................................................................346
11