26.10.2013 Views

8.3.17.0 - Force10 Networks

8.3.17.0 - Force10 Networks

8.3.17.0 - Force10 Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

FIP Snooping<br />

8<br />

FIP snooping is auto-configured on an Aggregator in standalone mode. You can display information on<br />

FIP snooping operation and statistics by entering show commands.<br />

This chapter describes FIP snooping concepts and configuration procedures:<br />

• Fibre Channel over Ethernet<br />

• Ensuring Robustness in a Converged Ethernet Network<br />

• FIP Snooping on Ethernet Bridges<br />

• FIP Snooping in a Switch Stack<br />

• How FIP Snooping is Implemented<br />

• Displaying FIP Snooping Information<br />

• FIP Snooping Example<br />

Fibre Channel over Ethernet<br />

Fibre Channel over Ethernet (FCoE) provides a converged Ethernet network that allows the combination<br />

of storage-area network (SAN) and LAN traffic on a Layer 2 link by encapsulating Fibre Channel data into<br />

Ethernet frames.<br />

FCoE works with the Ethernet enhancements provided in data center bridging (DCB) to support lossless<br />

(no-drop) SAN and LAN traffic. In addition, DCB provides flexible bandwidth sharing for different traffic<br />

types, such as LAN and SAN, according to 802.1p priority classes of service. For more information, refer<br />

to the Data Center Bridging (DCB) chapter.<br />

Ensuring Robustness in a Converged Ethernet Network<br />

Fibre Channel networks used for SAN traffic employ switches that operate as trusted devices. End devices<br />

log into the switch to which they are attached in order to communicate with other end devices attached to<br />

the Fibre Channel network. Because Fibre Channel links are point-to-point, a Fibre Channel switch<br />

controls all storage traffic that an end device sends and receives over the network. As a result, the switch<br />

can enforce zoning configurations, ensure that end devices use their assigned addresses, and secure the<br />

network from unauthorized access and denial-of-service attacks.<br />

FIP Snooping | 91

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!