Dell 9.7(0.0) Plumbing Product User Manual


  Open as PDF
of 1039
 
16 FCoE Transit....................................................................................................344
Fibre Channel over Ethernet............................................................................................................ 344
Ensure Robustness in a Converged Ethernet Network...................................................................344
FIP Snooping on Ethernet Bridges...................................................................................................346
Using FIP Snooping...........................................................................................................................348
FIP Snooping Prerequisites.........................................................................................................348
Important Points to Remember................................................................................................. 349
Enabling the FCoE Transit Feature.............................................................................................350
Enable FIP Snooping on VLANs..................................................................................................350
Configure the FC-MAP Value.....................................................................................................350
Configure a Port for a Bridge-to-Bridge Link............................................................................350
Configure a Port for a Bridge-to-FCF Link.................................................................................351
Impact on Other Software Features........................................................................................... 351
FIP Snooping Restrictions........................................................................................................... 351
Configuring FIP Snooping...........................................................................................................351
FCoE Transit Configuration Example...............................................................................................353
Displaying FIP Snooping Information.............................................................................................. 354
17 Enabling FIPS Cryptography.........................................................................361
Configuration Tasks.......................................................................................................................... 361
Preparing the System........................................................................................................................361
Enabling FIPS Mode..........................................................................................................................362
Generating Host-Keys...................................................................................................................... 362
Monitoring FIPS Mode Status...........................................................................................................363
Disabling FIPS Mode......................................................................................................................... 363
18 Flex Hash..........................................................................................................365
Flex Hash Capability Overview.........................................................................................................365
Configuring the Flex Hash Mechanism............................................................................................365
RDMA Over Converged Ethernet (RoCE) Overview........................................................................366
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.............................................................367
19 Force10 Resilient Ring Protocol (FRRP).....................................................368
Protocol Overview............................................................................................................................368
Ring Status...................................................................................................................................369
Multiple FRRP Rings.................................................................................................................... 370
Important FRRP Points................................................................................................................370
Important FRRP Concepts..........................................................................................................370
Implementing FRRP.......................................................................................................................... 372
FRRP Configuration...........................................................................................................................372
Creating the FRRP Group............................................................................................................372