Configuring the Hash Algorithm................................................................................................308
Enabling Deterministic ECMP Next Hop....................................................................................308
Configuring the Hash Algorithm Seed.......................................................................................309
Link Bundle Monitoring.................................................................................................................... 309
Managing ECMP Group Paths.................................................................................................... 310
Creating an ECMP Group Bundle...............................................................................................310
Modifying the ECMP Group Threshold.......................................................................................311
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table..................311
Support for ECMP in host table.................................................................................................. 312
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes .................................................. 312
14 FCoE Transit.....................................................................................................313
Fibre Channel over Ethernet.............................................................................................................313
Ensure Robustness in a Converged Ethernet Network................................................................... 313
FIP Snooping on Ethernet Bridges....................................................................................................315
FIP Snooping in a Switch Stack.........................................................................................................317
Using FIP Snooping........................................................................................................................... 317
FIP Snooping Prerequisites..........................................................................................................317
Important Points to Remember..................................................................................................318
Enabling the FCoE Transit Feature............................................................................................. 319
Enable FIP Snooping on VLANs.................................................................................................. 319
Configure the FC-MAP Value......................................................................................................319
Configure a Port for a Bridge-to-Bridge Link............................................................................ 319
Configure a Port for a Bridge-to-FCF Link................................................................................ 320
Impact on Other Software Features...........................................................................................320
FIP Snooping Restrictions...........................................................................................................320
Configuring FIP Snooping.......................................................................................................... 320
Displaying FIP Snooping Information...............................................................................................321
FCoE Transit Configuration Example............................................................................................... 327
15 Flex Hash and Optimized Boot-Up............................................................. 329
Flex Hash Capability Overview......................................................................................................... 329
Configuring the Flex Hash Mechanism............................................................................................329
Configuring Fast Boot and LACP Fast Switchover.......................................................................... 330
Optimizing the Boot Time................................................................................................................330
Booting Process When Optimized Boot Time Mechanism is Enabled..................................... 331
Guidelines for Configuring Optimized Booting Mechanism..................................................... 331
Interoperation of Applications with Fast Boot and System States..................................................332
LACP and IPv4 Routing...............................................................................................................332
LACP and IPv6 Routing...............................................................................................................333
BGP Graceful Restart.................................................................................................................. 333
Cold Boot Caused by Power Cycling the System..................................................................... 333
11