White Papers

23 iSCSI Optimization...................................................................................................................................403
iSCSI Optimization Overview....................................................................................................................................... 403
Monitoring iSCSI Trac Flows...............................................................................................................................405
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 405
Information Monitored in iSCSI Trac Flows.......................................................................................................405
Detection and Auto-Conguration for Dell EqualLogic Arrays...........................................................................406
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................406
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................407
Enable and Disable iSCSI Optimization................................................................................................................. 407
Default iSCSI Optimization Values...............................................................................................................................408
iSCSI Optimization Prerequisites................................................................................................................................. 408
Conguring iSCSI Optimization................................................................................................................................... 408
Displaying iSCSI Optimization Information.................................................................................................................. 410
24 Intermediate System to Intermediate System........................................................................................... 412
IS-IS Protocol Overview................................................................................................................................................ 412
IS-IS Addressing..............................................................................................................................................................412
Multi-Topology IS-IS....................................................................................................................................................... 413
Transition Mode........................................................................................................................................................ 413
Interface Support..................................................................................................................................................... 414
Adjacencies................................................................................................................................................................414
Graceful Restart............................................................................................................................................................. 414
Timers........................................................................................................................................................................ 414
Implementation Information.......................................................................................................................................... 414
Conguration Information..............................................................................................................................................415
Conguration Tasks for IS-IS.................................................................................................................................. 416
Conguring the Distance of a Route.....................................................................................................................423
Changing the IS-Type.............................................................................................................................................. 424
Redistributing IPv4 Routes.....................................................................................................................................426
Redistributing IPv6 Routes..................................................................................................................................... 427
Conguring Authentication Passwords.................................................................................................................428
Setting the Overload Bit......................................................................................................................................... 428
Debugging IS-IS....................................................................................................................................................... 429
IS-IS Metric Styles.........................................................................................................................................................430
Congure Metric Values............................................................................................................................................... 430
Maximum Values in the Routing Table.................................................................................................................. 430
Change the IS-IS Metric Style in One Level Only................................................................................................430
Leaks from One Level to Another..........................................................................................................................432
Sample Congurations.................................................................................................................................................. 433
25 Link Aggregation Control Protocol (LACP).............................................................................................. 435
Introduction to Dynamic LAGs and LACP.................................................................................................................. 435
Important Points to Remember............................................................................................................................. 435
LACP Modes............................................................................................................................................................ 436
Conguring LACP Commands............................................................................................................................... 436
Contents
15