Concept Guide

Table Of Contents
Showing IPv6 Routes...............................................................................................................................................464
Showing the Running-Configuration for an Interface......................................................................................465
Clearing IPv6 Routes................................................................................................................................................465
Disabling ND Entry Timeout................................................................................................................................... 465
Configuring IPv6 RA Guard.......................................................................................................................................... 466
Configuring IPv6 RA Guard on an Interface....................................................................................................... 467
Monitoring IPv6 RA Guard......................................................................................................................................468
Chapter 26: iSCSI Optimization.................................................................................................469
iSCSI Optimization Overview.......................................................................................................................................469
Monitoring iSCSI Traffic Flows..............................................................................................................................470
Application of Quality of Service to iSCSI Traffic Flows..................................................................................471
Information Monitored in iSCSI Traffic Flows.....................................................................................................471
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................472
Configuring Detection and Ports for Dell Compellent Arrays.........................................................................472
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer...........................................................472
Enable and Disable iSCSI Optimization................................................................................................................ 473
Default iSCSI Optimization Values.............................................................................................................................. 473
iSCSI Optimization Prerequisites.................................................................................................................................474
Configuring iSCSI Optimization................................................................................................................................... 474
Displaying iSCSI Optimization Information................................................................................................................476
Chapter 27: Intermediate System to Intermediate System.........................................................478
IS-IS Protocol Overview................................................................................................................................................478
IS-IS Addressing.............................................................................................................................................................. 478
Multi-Topology IS-IS...................................................................................................................................................... 479
Transition Mode.........................................................................................................................................................479
Interface Support...................................................................................................................................................... 479
Adjacencies................................................................................................................................................................. 479
Graceful Restart..............................................................................................................................................................480
Timers.......................................................................................................................................................................... 480
Implementation Information......................................................................................................................................... 480
Configuration Information..............................................................................................................................................481
Configuration Tasks for IS-IS..................................................................................................................................481
Configuring the Distance of a Route....................................................................................................................488
Changing the IS-Type.............................................................................................................................................. 488
Redistributing IPv4 Routes..................................................................................................................................... 490
Redistributing IPv6 Routes......................................................................................................................................491
Configuring Authentication Passwords............................................................................................................... 492
Setting the Overload Bit..........................................................................................................................................492
Debugging IS-IS.........................................................................................................................................................493
IS-IS Metric Styles..........................................................................................................................................................493
Configure Metric Values................................................................................................................................................494
Maximum Values in the Routing Table.................................................................................................................494
Change the IS-IS Metric Style in One Level Only............................................................................................. 494
Leaks from One Level to Another.........................................................................................................................496
Sample Configurations...................................................................................................................................................496
Chapter 28: Link Aggregation Control Protocol (LACP)............................................................. 499
Contents
15