Configurable trunk hash algorithm, Configurable trunk hash algorithm 69 – Blade ICE G8000 User Manual

Page 69

Advertising
background image

RackSwitch G8000 Application Guide

Chapter 4: Ports and Trunking

„

69

BMD00041, November 2008

Configurable Trunk Hash Algorithm

This feature allows you to configure parameters for the trunk hash algorithm, instead of using
the default values.

Use the IP Trunk Hash commands to configure new default behavior for Layer 2 traffic and
Layer 3 traffic. The trunk hash settings affect both static trunks and LACP trunks.

You can select a minimum of one or a maximum of two parameters to create one of the
following configurations:

„

Source MAC (SMAC):

„

Destination MAC (DMAC):

„

Source MAC (SMAC) + Destination MAC (DMAC):

„

Source IP (SIP):

„

Destination IP (DIP):

„

Source IP (SIP) + Destination IP (DIP):

RS G8000 (config)# portchannel hash source-mac-address

RS G8000 (config)# portchannel hash destination-mac-address

RS G8000 (config)# portchannel hash source-destination-mac

RS G8000 (config)# portchannel hash source-ip-address

RS G8000 (config)# portchannel hash destination-ip-address

RS G8000 (config)# portchannel hash source-destination-ip

Advertising