Administrator Guide

Showing IPv6 Routes.................................................................................................................................................. 441
Showing the Running-Configuration for an Interface............................................................................................ 442
Clearing IPv6 Routes...................................................................................................................................................443
Disabling ND Entry Timeout....................................................................................................................................... 443
Configuring IPv6 RA Guard..............................................................................................................................................443
Configuring IPv6 RA Guard on an Interface............................................................................................................ 445
Monitoring IPv6 RA Guard......................................................................................................................................... 445
26 iSCSI Optimization................................................................................................................. 446
iSCSI Optimization Overview...........................................................................................................................................446
Monitoring iSCSI Traffic Flows.................................................................................................................................. 447
Application of Quality of Service to iSCSI Traffic Flows........................................................................................ 447
Information Monitored in iSCSI Traffic Flows..........................................................................................................448
Detection and Auto-Configuration for Dell EqualLogic Arrays.............................................................................. 448
Configuring Detection and Ports for Dell Compellent Arrays................................................................................ 449
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................. 449
Enable and Disable iSCSI Optimization.....................................................................................................................450
Default iSCSI Optimization Values..................................................................................................................................450
iSCSI Optimization Prerequisites.................................................................................................................................... 450
Configuring iSCSI Optimization........................................................................................................................................451
Displaying iSCSI Optimization Information.....................................................................................................................452
27 Intermediate System to Intermediate System............................................................................454
IS-IS Protocol Overview...................................................................................................................................................454
IS-IS Addressing................................................................................................................................................................ 454
Multi-Topology IS-IS.........................................................................................................................................................455
Transition Mode...........................................................................................................................................................455
Interface Support........................................................................................................................................................ 455
Adjacencies.................................................................................................................................................................. 455
Graceful Restart................................................................................................................................................................456
Timers........................................................................................................................................................................... 456
Implementation Information.............................................................................................................................................456
Configuration Information................................................................................................................................................ 457
Configuration Tasks for IS-IS.....................................................................................................................................457
Configuring the Distance of a Route........................................................................................................................ 464
Changing the IS-Type.................................................................................................................................................464
Redistributing IPv4 Routes........................................................................................................................................ 466
Redistributing IPv6 Routes........................................................................................................................................ 466
Configuring Authentication Passwords.................................................................................................................... 467
Setting the Overload Bit.............................................................................................................................................467
Debugging IS-IS...........................................................................................................................................................468
IS-IS Metric Styles............................................................................................................................................................ 469
Configure Metric Values...................................................................................................................................................469
Maximum Values in the Routing Table..................................................................................................................... 469
Change the IS-IS Metric Style in One Level Only................................................................................................... 469
Leaks from One Level to Another.............................................................................................................................. 471
Sample Configurations.......................................................................................................................................................471
28 Link Aggregation Control Protocol (LACP)................................................................................474
Contents
15