For packets without a Layer 3 header, Dell Networking OS automatically uses
load-balance mac
source-dest-mac
.
Do not configure IP hashing or MAC hashing at the same time. If you configure an IP and MAC hashing
scheme at the same time, the MAC hashing scheme takes precedence over the IP hashing scheme.
To change the IP traffic load-balancing default, use the following command.
• Replace the default IP 4-tuple method of balancing traffic over a port channel.
CONFIGURATION mode
[no] load-balance {ip-selection [dest-ip | source-ip]} | {mac [dest-mac |
source-dest-mac | source-mac]} | {tcp-udp enable} {ipv6-selection} {tunnel}|
{ingress-port}
You can select one, two, or all three of the following basic hash methods:
–
ip-selection [dest-ip | source-ip]
— Distribute IP traffic based on the IP destination or
source address.
–
mac [dest-mac | source-dest-mac | source-mac]
— Distribute IPV4 traffic based on the
destination or source MAC address, or both, along with the VLAN, Ethertype, source module ID
and source port ID.
–
tcp-udp enable
— Distribute traffic based on the TCP/UDP source and destination ports.
–
ingress
-port — Option to Source Port Id for ECMP/ LAG hashing.
–
ipv6-selection
— Set the IPV6 key fields to use in hash computation.
–
tunnel
— Set the tunnel key fields to use in hash computation.
Changing the Hash Algorithm
The
load-balance
command selects the hash criteria applied to port channels.
If you do not obtain even distribution with the
load-balance
command, you can use the
hash-
algorithm
command to select the hash scheme for LAG, ECMP and NH-ECMP. You can rotate or shift
the 12–bit Lag Hash until the desired hash is achieved.
The
nh-ecmp
option allows you to change the hash value for recursive ECMP routes independently of
non-recursive ECMP routes. This option provides for better traffic distribution over available equal cost
links that involve a recursive next hop lookup.
To change to another algorithm, use the second command.
• Change the default (0) to another algorithm and apply it to ECMP, LAG hashing, or a particular line
card.
CONFIGURATION mode
hash-algorithm | [ecmp{crc16|crc16cc|crc32LSB|crc32MSB|crc-upper|dest-ip |lsb
|xor1| xor2| xor4| xor8| xor16}|lag{crc16|crc16cc|crc32LSB|crc32MSB|xor1|
xor2|xor4|xor8|xor16}| seed ]
For more information about algorithm choices, refer to the command details in the
IP Routing
chapter of the
Dell Networking OS Command Reference Guide
.
• Change the Hash algorithm seed value to get better hash value
334
Interfaces
Summary of Contents for Z9000
Page 1: ...Dell Configuration Guide for the Z9000 System 9 7 0 0 ...
Page 80: ...grub reboot 80 Management ...
Page 128: ... 0 Te 1 1 Te 1 2 rx Flow N A N A 128 Access Control Lists ACLs ...
Page 491: ...Figure 70 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 491 ...
Page 496: ...Figure 73 MSDP Default Peer Scenario 1 496 Multicast Source Discovery Protocol MSDP ...
Page 497: ...Figure 74 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 497 ...
Page 498: ...Figure 75 MSDP Default Peer Scenario 3 498 Multicast Source Discovery Protocol MSDP ...
Page 760: ...Figure 100 Single and Double Tag TPID Match 760 Service Provider Bridging ...
Page 761: ...Figure 101 Single and Double Tag First byte TPID Match Service Provider Bridging 761 ...