White Papers

Table Of Contents
Displaying IPv6 Information.................................................................................................................................... 467
Displaying an IPv6 Interface Information.............................................................................................................. 468
Showing IPv6 Routes..............................................................................................................................................468
Showing the Running-Conguration for an Interface......................................................................................... 470
Clearing IPv6 Routes...............................................................................................................................................470
Disabling ND Entry Timeout................................................................................................................................... 470
Conguring IPv6 RA Guard........................................................................................................................................... 471
Conguring IPv6 RA Guard on an Interface......................................................................................................... 472
Monitoring IPv6 RA Guard......................................................................................................................................473
26 iSCSI Optimization...................................................................................................................................474
iSCSI Optimization Overview....................................................................................................................................... 474
Monitoring iSCSI Trac Flows............................................................................................................................... 476
Application of Quality of Service to iSCSI Trac Flows......................................................................................476
Information Monitored in iSCSI Trac Flows....................................................................................................... 476
Detection and Auto-Conguration for Dell EqualLogic Arrays............................................................................477
Conguring Detection and Ports for Dell Compellent Arrays............................................................................. 477
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer................................................................. 478
Enable and Disable iSCSI Optimization................................................................................................................. 478
Default iSCSI Optimization Values............................................................................................................................... 479
iSCSI Optimization Prerequisites..................................................................................................................................479
Conguring iSCSI Optimization....................................................................................................................................479
Displaying iSCSI Optimization Information.................................................................................................................. 481
27 Intermediate System to Intermediate System...........................................................................................483
IS-IS Protocol Overview................................................................................................................................................483
IS-IS Addressing.............................................................................................................................................................483
Multi-Topology IS-IS...................................................................................................................................................... 484
Transition Mode....................................................................................................................................................... 484
Interface Support.....................................................................................................................................................485
Adjacencies...............................................................................................................................................................485
Graceful Restart............................................................................................................................................................ 485
Timers....................................................................................................................................................................... 485
Implementation Information..........................................................................................................................................485
Conguration Information.............................................................................................................................................486
Conguration Tasks for IS-IS..................................................................................................................................487
Conguring the Distance of a Route.....................................................................................................................494
Changing the IS-Type.............................................................................................................................................. 495
Redistributing IPv4 Routes..................................................................................................................................... 497
Redistributing IPv6 Routes.....................................................................................................................................498
Conguring Authentication Passwords.................................................................................................................499
Setting the Overload Bit......................................................................................................................................... 499
Debugging IS-IS.......................................................................................................................................................500
IS-IS Metric Styles......................................................................................................................................................... 501
Congure Metric Values................................................................................................................................................ 501
Maximum Values in the Routing Table................................................................................................................... 501
Contents
17