334
|
Equal Cost Multi-Path
www.dell.com | support.dell.com
Configurable ECMP Hash Algorithm (C- and S-Series)
Configurable ECMP Hash Algorithm (C- and S-Series)
is available on platforms:
c s
On C-Series and S-Series, the
hash-algorithm
command is specific to ECMP groups and has a different
default from the E-Series (see
Configurable Hash Algorithm (E-Series)
). The default ECMP hash
configuration is
crc-lower
, which takes the lower 32 bits of the hash key to compute the egress port. The
hash value calculated with the hash algorithm is unique to the entire chassis.
Other options for the ECMP hash-algorithm are:
•
crc-upper
— Uses the upper 32 bits of the hash key to compute the egress port.
•
dest-ip
— Uses destination IP address as part of the hash key.
•
lsb
— Always uses the least significant bit of the hash key to compute the egress port.
To change to a different hash scheme for ECMP, use the following command in the CONFIGURATION
mode:
The different hash algorithms for ECMP are based on the number of ECMP group members and packet
values. The default hash algorithm yields the most balanced results in various test scenarios, but if the
default algorithm does not provide satisfactory distribution of traffic, then use this command to designate
another algorithm.
When a member leaves or is added to the ECMP group, the hash algorithm is recalculated to balance traffic
across the members.
Command Syntax
Command Mode
Purpose
hash-algorithm
ecmp
{
crc-lower
|
crc-upper
|
dest-ip
|
lsb
}
Default:
crc-lower
CONFIGURATION
Change to another algorithm.
Summary of Contents for Force10 E300
Page 1: ...FTOS Configuration Guide FTOS 8 4 2 7 E Series TeraScale C Series S Series S50 S25 ...
Page 32: ...32 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 132: ...132 802 1X w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 310: ...310 Configuration Replace and Rollback w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 330: ...330 Dynamic Host Configuration Protocol w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 402: ...402 High Availability w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 462: ...462 Interfaces w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 482: ...482 IPv4 Addressing w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 506: ...506 IPv6 Addressing w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 582: ...582 Layer 2 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 642: ...642 Multicast Source Discovery Protocol w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 662: ...662 Multiple Spanning Tree Protocol w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 690: ...690 Object Tracking w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 754: ...754 PIM Dense Mode w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 784: ...784 PIM Source Specific Mode w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 800: ...800 Power over Ethernet w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 876: ...876 Quality of Service w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 892: ...892 Routing Information Protocol w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1006: ...1006 Simple Network Management Protocol w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1018: ...1018 SONET SDH w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1048: ...1048 Broadcast Storm Control w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1096: ...1096 Uplink Failure Detection UFD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1098: ...1098 Upgrade Procedures w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1196: ...1196 C Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1252: ...1252 Standards Compliance w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1262: ...1262 Index w w w d e l l c o m s u p p o r t d e l l c o m ...