Reference Guide

Configuring Telnet with IPv6................................................................................................................................. 394
SNMP over IPv6........................................................................................................................................................394
Displaying IPv6 Information.................................................................................................................................... 395
Displaying an IPv6 Configuration.......................................................................................................................... 395
Displaying IPv6 Routes............................................................................................................................................ 396
Displaying the Running Configuration for an Interface.................................................................................... 397
Clearing IPv6 Routes................................................................................................................................................397
Chapter 26: iSCSI Optimization.................................................................................................398
iSCSI Optimization Overview....................................................................................................................................... 398
Default iSCSI Optimization Values..............................................................................................................................399
iSCSI Optimization Prerequisites................................................................................................................................ 400
Configuring iSCSI Optimization...................................................................................................................................400
Displaying iSCSI Optimization Information............................................................................................................... 402
Enable and Disable iSCSI Optimization......................................................................................................................403
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer................................................................ 403
Monitoring iSCSI Traffic Flows....................................................................................................................................404
Information Monitored in iSCSI Traffic Flows..........................................................................................................404
Detection and Auto-Configuration for Dell EqualLogic Arrays............................................................................ 404
Configuring Detection and Ports for Dell Compellent Arrays.............................................................................. 405
Application of Quality of Service to iSCSI Traffic Flows.......................................................................................405
Chapter 27: Intermediate System to Intermediate System.........................................................407
IS-IS Protocol Overview................................................................................................................................................407
IS-IS Addressing.............................................................................................................................................................. 407
Multi-Topology IS-IS...................................................................................................................................................... 408
Transition Mode.........................................................................................................................................................408
Interface Support......................................................................................................................................................409
Adjacencies.................................................................................................................................................................409
Graceful Restart..............................................................................................................................................................409
Timers.......................................................................................................................................................................... 409
Implementation Information......................................................................................................................................... 409
Configuration Information..............................................................................................................................................410
Configuration Tasks for IS-IS..................................................................................................................................410
Configuring the Distance of a Route.....................................................................................................................417
Changing the IS-Type............................................................................................................................................... 418
Redistributing IPv4 Routes..................................................................................................................................... 420
Redistributing IPv6 Routes......................................................................................................................................421
Configuring Authentication Passwords................................................................................................................ 421
Setting the Overload Bit..........................................................................................................................................422
Debugging IS-IS.........................................................................................................................................................422
IS-IS Metric Styles..........................................................................................................................................................423
Configure Metric Values................................................................................................................................................423
Maximum Values in the Routing Table.................................................................................................................424
Change the IS-IS Metric Style in One Level Only............................................................................................. 424
Leaks from One Level to Another......................................................................................................................... 425
Sample Configurations...................................................................................................................................................426
Chapter 28: Link Aggregation Control Protocol (LACP)............................................................. 429
14
Contents