Configure a Port for a Bridge-to-Bridge Link
If a switch port is connected to another FIP snooping bridge, configure the FCoE-Trusted Port mode for
bridge-bridge links.
Initially, all FCoE traffic is blocked. Only FIP frames with the ALL_FCF_MAC and ALL_ENODE_MAC values in
their headers are allowed to pass. After the switch learns the MAC address of a connected FCF, it allows FIP
frames destined to or received from the FCF MAC address.
FCoE traffic is allowed on the port only after the switch learns the FC-MAP value associated with the specified
FCF MAC address and verifies that it matches the configured FC-MAP value for the FCoE VLAN.
Configure a Port for a Bridge-to-FCF Link
If a port is directly connected to an FCF, configure the port mode as FCF. Initially, all FCoE traffic is blocked;
only FIP frames are allowed to pass.
FCoE traffic is allowed on the port only after a successful fabric login (FLOGI) request/response and
confirmed use of the configured FC-MAP value for the VLAN.
FLOGI and fabric discovery (FDISC) request/response packets are trapped to the CPU. They are forwarded
after the necessary ACLs are installed.
Impact on Other Software Features
When you enable FIP snooping on a switch, other software features are impacted. The following table lists the
impact of FIP snooping.
Table 28. Impact of Enabling FIP Snooping
Impact
Description
MAC address learning
MAC address learning is not performed on FIP and
FCoE frames, which are denied by ACLs dynamically
created by FIP snooping on server-facing ports in
ENode mode.
MTU auto-configuration
MTU size is set to mini-jumbo (2500 bytes) when a
port is in Switchport mode, the FIP snooping feature
is enabled on the switch, and FIP snooping is enabled
on all or individual VLANs.
Link aggregation group (LAG)
FIP snooping is supported on port channels on ports
on which PFC mode is on (PFC is operationally up).
STP
If you enable an STP protocol (STP, RSTP, PVSTP, or
MSTP) on the switch and ports enter a blocking state,
when the state change occurs, the corresponding
port-based ACLs are deleted. If a port is enabled for
FIP Snooping
385
Содержание S4048T
Страница 1: ...Dell Configuration Guide for the S4048T ON System 9 10 0 1 ...
Страница 98: ... saveenv 7 Reload the system uBoot mode reset Management 98 ...
Страница 113: ...Total CFM Pkts 10303 CCM Pkts 0 LBM Pkts 0 LTM Pkts 3 LBR Pkts 0 LTR Pkts 0 802 1ag 113 ...
Страница 411: ...mode transit no disable Force10 Resilient Ring Protocol FRRP 411 ...
Страница 590: ...Figure 67 Inspecting the LAG Configuration Link Aggregation Control Protocol LACP 590 ...
Страница 591: ...Figure 68 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 591 ...
Страница 594: ...Figure 70 Inspecting a LAG Port on BRAVO Using the show interface Command Link Aggregation Control Protocol LACP 594 ...
Страница 595: ...Figure 71 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 595 ...
Страница 646: ...Figure 87 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 646 ...
Страница 647: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 647 ...
Страница 648: ...Figure 89 Configuring PIM in Multiple Routing Domains Multicast Source Discovery Protocol MSDP 648 ...
Страница 653: ...Figure 91 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 653 ...
Страница 654: ...Figure 92 MSDP Default Peer Scenario 3 Multicast Source Discovery Protocol MSDP 654 ...
Страница 955: ...Figure 119 Single and Double Tag First byte TPID Match Service Provider Bridging 955 ...
Страница 1179: ...Figure 147 Create Hypervisor Figure 148 Edit Hypervisor Figure 149 Create Transport Connector Virtual Extensible LAN VXLAN 1179 ...