Administrator Guide

Configuring Authentication Passwords.....................................................................................................................477
Setting the Overload Bit............................................................................................................................................. 477
Debugging IS-IS........................................................................................................................................................... 478
IS-IS Metric Styles.............................................................................................................................................................479
Configure Metric Values...................................................................................................................................................479
Maximum Values in the Routing Table......................................................................................................................479
Change the IS-IS Metric Style in One Level Only....................................................................................................479
Leaks from One Level to Another..............................................................................................................................481
Sample Configurations...................................................................................................................................................... 481
27 iSCSI Optimization..................................................................................................................484
iSCSI Optimization Overview...........................................................................................................................................484
Default iSCSI Optimization Values.................................................................................................................................. 485
iSCSI Optimization Prerequisites.....................................................................................................................................486
Configuring iSCSI Optimization.......................................................................................................................................486
Displaying iSCSI Optimization Information..................................................................................................................... 487
Enable and Disable iSCSI Optimization...........................................................................................................................489
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................................................ 489
Monitoring iSCSI Traffic Flows........................................................................................................................................490
Information Monitored in iSCSI Traffic Flows............................................................................................................... 490
Detection and Auto-Configuration for Dell EqualLogic Arrays....................................................................................490
Configuring Detection and Ports for Dell Compellent Arrays.......................................................................................491
Application of Quality of Service to iSCSI Traffic Flows...............................................................................................491
28 Link Aggregation Control Protocol (LACP)................................................................................492
Introduction to Dynamic LAGs and LACP......................................................................................................................492
Important Points to Remember.................................................................................................................................492
LACP Modes................................................................................................................................................................492
Configuring LACP Commands...................................................................................................................................493
LACP Configuration Tasks...............................................................................................................................................493
Creating a LAG............................................................................................................................................................ 493
Configuring the LAG Interfaces as Dynamic............................................................................................................494
Setting the LACP Long Timeout............................................................................................................................... 494
Monitoring and Debugging LACP..............................................................................................................................495
Shared LAG State Tracking.............................................................................................................................................495
Configuring Shared LAG State Tracking..................................................................................................................496
Important Points about Shared LAG State Tracking.............................................................................................. 497
LACP Basic Configuration Example................................................................................................................................ 497
Configure a LAG on ALPHA....................................................................................................................................... 497
29 Layer 2.................................................................................................................................. 506
Manage the MAC Address Table....................................................................................................................................506
Clearing the MAC Address Table..............................................................................................................................506
Setting the Aging Time for Dynamic Entries........................................................................................................... 506
Configuring a Static MAC Address...........................................................................................................................506
Displaying the MAC Address Table........................................................................................................................... 507
MAC Learning Limit.......................................................................................................................................................... 507
Setting the MAC Learning Limit................................................................................................................................507
mac learning-limit Dynamic........................................................................................................................................ 508
16
Contents