Administrator Guide

Showing the Running-Conguration for an Interface.........................................................................................464
Clearing IPv6 Routes...............................................................................................................................................464
Disabling ND Entry Timeout................................................................................................................................... 464
Conguring IPv6 RA Guard.......................................................................................................................................... 465
Conguring IPv6 RA Guard on an Interface.........................................................................................................466
Monitoring IPv6 RA Guard......................................................................................................................................467
26 iSCSI Optimization.................................................................................................................................. 468
iSCSI Optimization Overview.......................................................................................................................................468
Monitoring iSCSI Trac Flows...............................................................................................................................470
Application of Quality of Service to iSCSI Trac Flows......................................................................................470
Information Monitored in iSCSI Trac Flows....................................................................................................... 470
Detection and Auto-Conguration for Dell EqualLogic Arrays............................................................................471
Conguring Detection and Ports for Dell Compellent Arrays..............................................................................471
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer................................................................. 472
Enable and Disable iSCSI Optimization................................................................................................................. 472
Default iSCSI Optimization Values............................................................................................................................... 473
iSCSI Optimization Prerequisites..................................................................................................................................473
Conguring iSCSI Optimization....................................................................................................................................473
Displaying iSCSI Optimization Information..................................................................................................................475
27 Intermediate System to Intermediate System........................................................................................... 477
IS-IS Protocol Overview................................................................................................................................................477
IS-IS Addressing............................................................................................................................................................. 477
Multi-Topology IS-IS.......................................................................................................................................................478
Transition Mode........................................................................................................................................................478
Interface Support.....................................................................................................................................................479
Adjacencies...............................................................................................................................................................479
Graceful Restart.............................................................................................................................................................479
Timers........................................................................................................................................................................479
Implementation Information..........................................................................................................................................479
Conguration Information.............................................................................................................................................480
Conguration Tasks for IS-IS.................................................................................................................................. 481
Conguring the Distance of a Route.....................................................................................................................488
Changing the IS-Type.............................................................................................................................................. 489
Redistributing IPv4 Routes......................................................................................................................................491
Redistributing IPv6 Routes.....................................................................................................................................492
Conguring Authentication Passwords.................................................................................................................493
Setting the Overload Bit......................................................................................................................................... 493
Debugging IS-IS....................................................................................................................................................... 494
IS-IS Metric Styles.........................................................................................................................................................495
Congure Metric Values............................................................................................................................................... 495
Maximum Values in the Routing Table.................................................................................................................. 495
Change the IS-IS Metric Style in One Level Only................................................................................................495
Leaks from One Level to Another.......................................................................................................................... 497
Sample Congurations..................................................................................................................................................498
Contents
17