Administrator Guide

Configuring Authentication Passwords............................................................................................................... 500
Setting the Overload Bit.......................................................................................................................................... 501
Debugging IS-IS......................................................................................................................................................... 501
IS-IS Metric Styles..........................................................................................................................................................502
Configure Metric Values............................................................................................................................................... 502
Maximum Values in the Routing Table.................................................................................................................503
Change the IS-IS Metric Style in One Level Only............................................................................................. 503
Leaks from One Level to Another.........................................................................................................................504
Sample Configurations.................................................................................................................................................. 505
Chapter 27: iSCSI Optimization.................................................................................................508
iSCSI Optimization Overview.......................................................................................................................................508
Default iSCSI Optimization Values.............................................................................................................................. 510
iSCSI Optimization Prerequisites.................................................................................................................................510
Configuring iSCSI Optimization....................................................................................................................................510
Displaying iSCSI Optimization Information................................................................................................................ 512
Enable and Disable iSCSI Optimization.......................................................................................................................513
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................514
Monitoring iSCSI Traffic Flows.................................................................................................................................... 514
Information Monitored in iSCSI Traffic Flows.......................................................................................................... 514
Detection and Auto-Configuration for Dell EqualLogic Arrays............................................................................. 515
Configuring Detection and Ports for Dell Compellent Arrays............................................................................... 515
Application of Quality of Service to iSCSI Traffic Flows....................................................................................... 516
Chapter 28: Link Aggregation Control Protocol (LACP)..............................................................517
Introduction to Dynamic LAGs and LACP..................................................................................................................517
Important Points to Remember.............................................................................................................................. 517
LACP Modes............................................................................................................................................................... 518
Configuring LACP Commands................................................................................................................................ 518
LACP Configuration Tasks............................................................................................................................................ 518
Creating a LAG........................................................................................................................................................... 519
Configuring the LAG Interfaces as Dynamic....................................................................................................... 519
Setting the LACP Long Timeout............................................................................................................................ 519
Monitoring and Debugging LACP..........................................................................................................................520
Shared LAG State Tracking..........................................................................................................................................520
Configuring Shared LAG State Tracking..............................................................................................................521
Important Points about Shared LAG State Tracking........................................................................................522
LACP Basic Configuration Example............................................................................................................................523
Configure a LAG on ALPHA....................................................................................................................................523
Chapter 29: Layer 2................................................................................................................... 532
Manage the MAC Address Table................................................................................................................................ 532
Clearing the MAC Address Table.......................................................................................................................... 532
Setting the Aging Time for Dynamic Entries...................................................................................................... 532
Configuring a Static MAC Address.......................................................................................................................533
Displaying the MAC Address Table.......................................................................................................................533
MAC Learning Limit........................................................................................................................................................533
Setting the MAC Learning Limit............................................................................................................................ 533
mac learning-limit Dynamic.....................................................................................................................................534
16
Contents