Configure a Method of Hostname Resolution...................................................................................................... 277Using DNS for Address Resolution........................................................................................................................ 277Using NetBIOS WINS for Address Resolution......................................................................................................278Creating Manual Binding Entries............................................................................................................................ 278Debugging the DHCP Server................................................................................................................................. 278Using DHCP Clear Commands...............................................................................................................................279Configure the System to be a DHCP Client............................................................................................................... 279Configuring the DHCP Client System................................................................................................................... 279DHCP Client on a Management Interface.............................................................................................................281DHCP Client Operation with Other Features........................................................................................................281Configure the System for User Port Stacking (Option 230)....................................................................................282Configure Secure DHCP............................................................................................................................................... 282Option 82.................................................................................................................................................................. 283DHCP Snooping....................................................................................................................................................... 283Drop DHCP Packets on Snooped VLANs Only....................................................................................................286Dynamic ARP Inspection.........................................................................................................................................287Configuring Dynamic ARP Inspection................................................................................................................... 288Source Address Validation............................................................................................................................................ 289Enabling IP Source Address Validation..................................................................................................................289DHCP MAC Source Address Validation................................................................................................................ 290Enabling IP+MAC Source Address Validation.......................................................................................................290Viewing the Number of SAV Dropped Packets.................................................................................................... 291Clearing the Number of SAV Dropped Packets....................................................................................................29113 Equal Cost Multi-Path (ECMP)................................................................................................................ 292ECMP for Flow-Based Affinity..................................................................................................................................... 292Configuring the Hash Algorithm Seed.................................................................................................................. 292Link Bundle Monitoring................................................................................................................................................. 292Managing ECMP Group Paths...............................................................................................................................293Creating an ECMP Group Bundle.......................................................................................................................... 293Modifying the ECMP Group Threshold.................................................................................................................294Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table......................................294Support for ECMP in host table............................................................................................................................ 295Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ........................................................................ 295RTAG7.......................................................................................................................................................................295Flow-based Hashing for ECMP............................................................................................................................. 29614 FIP Snooping............................................................................................................................................300Fibre Channel over Ethernet........................................................................................................................................ 300Ensure Robustness in a Converged Ethernet Network............................................................................................300FIP Snooping on Ethernet Bridges.............................................................................................................................. 302Using FIP Snooping....................................................................................................................................................... 304FIP Snooping Prerequisites.....................................................................................................................................304Important Points to Remember............................................................................................................................. 304Enabling the FCoE Transit Feature........................................................................................................................305Enable FIP Snooping on VLANs.............................................................................................................................30610 Contents