Configuring A Port For A Bridge-To-Bridge Link; Configuring A Port For A Bridge-To-Fcf Link; Impact On Other Software Features; Fip Snooping Prerequisites - Dell Force10 S4810P Configuration Manual

High-density, 1ru 48-port 10gbe switch
Hide thumbs Also See for Force10 S4810P:
Table of Contents

Advertisement

Configuring a Port for a Bridge-to-Bridge Link

If a switch port is connected to another FIP snooping bridge, configure the FCoE-Trusted Port mode for
bridge-bridge links. Initially, all FCoE traffic is blocked. Only FIP frames with the ALL_FCF_MAC and
ALL_ENODE_MAC values in their headers are allowed to pass. After the switch learns the MAC address
of a connected FCF, it allows FIP frames destined to or received from the FCF MAC address.
FCoE traffic is allowed on the port only after the switch learns the FC-MAP value associated with the
specified FCF MAC address and verifies that it matches the configured FC-MAP value for the FCoE
VLAN.

Configuring a Port for a Bridge-to-FCF Link

If a port is directly connected to an FCF, configure the port mode as FCF. Initially, all FCoE traffic is
blocked; only FIP frames are allowed to pass.
FCoE traffic is allowed on the port only after a successful FLOGI request/response and confirmed use of
the configured FC-MAP value for the VLAN.

Impact on Other Software Features

When you enable FIP snooping on a switch, other software features are impacted as follows:
MAC address learning: MAC address learning is not performed on FIP and FCoE frames, which are
denied by ACLs dynamically created by FIP snooping on server-facing ports in ENode mode.
MTU auto-configuration: MTU size is set to mini-jumbo (2500 bytes) when a port is in Switchport
mode, the FIP snooping feature is enabled on the switch, and FIP snooping is enabled on all or
individual VLANs.
Link aggregation group (LAG): FIP snooping is supported on port channels on ports on which PFC
mode is on (PFC is operationally up).
STP: If you enable an STP protocol (STP, RSTP, PVSTP, or MSTP) on the switch and ports enter a
blocking state, when the state change occurs, the corresponding port-based ACLs are deleted. If a port
is enabled for FIP snooping in ENode or FCF mode, the ENode/FCF MAC-based ACLs are deleted.

FIP Snooping Prerequisites

Before you configure FIP snooping on a switch, ensure that the following conditions are met:
A FIP snooping bridge requires DCBX and PFC to be enabled on the switch for lossless Ethernet
connections (refer to the
Dell Force10 recommends that you also enable ETS; ETS is recommended but not required.
If you enable DCBX and PFC mode is on (PFC is operationally up) in a port configuration, FIP
snooping is operational on the port. If the PFC parameters in a DCBX exchange with a peer are not
synchronized, FIP and FCoE frames are dropped on the port after you enable the FIP snooping feature.
Data Center Bridging (DCB)
chapter in the S4810
FTOS Configuration Guide
).
FIP Snooping | 411

Advertisement

Table of Contents
loading

Table of Contents