Administrator Guide

Clearing IPv6 Routes...............................................................................................................................................465
Configuring IPv6 RA Guard..........................................................................................................................................465
Configuring IPv6 RA Guard on an Interface.........................................................................................................467
Monitoring IPv6 RA Guard..................................................................................................................................... 468
26 iSCSI Optimization.................................................................................................................................. 469
iSCSI Optimization Overview.......................................................................................................................................469
Monitoring iSCSI Traffic Flows...............................................................................................................................471
Application of Quality of Service to iSCSI Traffic Flows..................................................................................... 471
Information Monitored in iSCSI Traffic Flows.......................................................................................................471
Detection and Auto-Configuration for Dell EqualLogic Arrays...........................................................................472
Configuring Detection and Ports for Dell Compellent Arrays.............................................................................472
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer...............................................................473
Enable and Disable iSCSI Optimization................................................................................................................. 473
Default iSCSI Optimization Values...............................................................................................................................474
iSCSI Optimization Prerequisites................................................................................................................................. 474
Configuring iSCSI Optimization....................................................................................................................................474
Displaying iSCSI Optimization Information................................................................................................................. 476
27 Intermediate System to Intermediate System..........................................................................................478
IS-IS Protocol Overview............................................................................................................................................... 478
IS-IS Addressing.............................................................................................................................................................478
Multi-Topology IS-IS......................................................................................................................................................479
Transition Mode....................................................................................................................................................... 479
Interface Support.................................................................................................................................................... 480
Adjacencies...............................................................................................................................................................480
Graceful Restart............................................................................................................................................................ 480
Timers....................................................................................................................................................................... 480
Implementation Information......................................................................................................................................... 480
Configuration Information............................................................................................................................................. 481
Configuration Tasks for IS-IS.................................................................................................................................482
Configuring the Distance of a Route.....................................................................................................................489
Changing the IS-Type.............................................................................................................................................490
Redistributing IPv4 Routes.....................................................................................................................................492
Redistributing IPv6 Routes.....................................................................................................................................493
Configuring Authentication Passwords................................................................................................................ 494
Setting the Overload Bit.........................................................................................................................................494
Debugging IS-IS.......................................................................................................................................................495
IS-IS Metric Styles.........................................................................................................................................................496
Configure Metric Values...............................................................................................................................................496
Maximum Values in the Routing Table..................................................................................................................497
Change the IS-IS Metric Style in One Level Only................................................................................................497
Leaks from One Level to Another......................................................................................................................... 498
Sample Configurations..................................................................................................................................................499
28 Link Aggregation Control Protocol (LACP)..............................................................................................502
Contents
17