Administrator Guide

23 iSCSI Optimization...................................................................................................................................428
iSCSI Optimization Overview....................................................................................................................................... 428
Monitoring iSCSI Trac Flows...............................................................................................................................430
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 430
Information Monitored in iSCSI Trac Flows.......................................................................................................430
Detection and Auto-Conguration for Dell EqualLogic Arrays............................................................................431
Conguring Detection and Ports for Dell Compellent Arrays..............................................................................431
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................432
Enable and Disable iSCSI Optimization................................................................................................................. 432
Default iSCSI Optimization Values...............................................................................................................................433
iSCSI Optimization Prerequisites................................................................................................................................. 433
Conguring iSCSI Optimization....................................................................................................................................433
Displaying iSCSI Optimization Information................................................................................................................. 435
24 Intermediate System to Intermediate System...........................................................................................437
IS-IS Protocol Overview................................................................................................................................................437
IS-IS Addressing............................................................................................................................................................. 437
Multi-Topology IS-IS...................................................................................................................................................... 438
Transition Mode....................................................................................................................................................... 438
Interface Support.....................................................................................................................................................439
Adjacencies...............................................................................................................................................................439
Graceful Restart.............................................................................................................................................................439
Timers........................................................................................................................................................................439
Implementation Information..........................................................................................................................................439
Conguration Information.............................................................................................................................................440
Conguration Tasks for IS-IS.................................................................................................................................. 441
Conguring the Distance of a Route.....................................................................................................................448
Changing the IS-Type.............................................................................................................................................. 449
Redistributing IPv4 Routes......................................................................................................................................451
Redistributing IPv6 Routes.....................................................................................................................................452
Conguring Authentication Passwords.................................................................................................................453
Setting the Overload Bit......................................................................................................................................... 453
Debugging IS-IS....................................................................................................................................................... 454
IS-IS Metric Styles.........................................................................................................................................................455
Congure Metric Values............................................................................................................................................... 455
Maximum Values in the Routing Table.................................................................................................................. 455
Change the IS-IS Metric Style in One Level Only................................................................................................455
Leaks from One Level to Another.......................................................................................................................... 457
Sample Congurations..................................................................................................................................................458
25 Link Aggregation Control Protocol (LACP).............................................................................................. 460
Introduction to Dynamic LAGs and LACP.................................................................................................................. 460
Important Points to Remember............................................................................................................................. 460
LACP Modes.............................................................................................................................................................461
Conguring LACP Commands................................................................................................................................461
Contents
15