Owners Manual
26 iSCSI Optimization.........................................................................................492
iSCSI Optimization Overview........................................................................................................... 492
Monitoring iSCSI Traffic Flows................................................................................................... 494
Application of Quality of Service to iSCSI Traffic Flows............................................................494
Information Monitored in iSCSI Traffic Flows............................................................................494
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................ 495
Configuring Detection and Ports for Dell Compellent Arrays..................................................496
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................496
Enable and Disable iSCSI Optimization..................................................................................... 496
Default iSCSI Optimization Values................................................................................................... 497
iSCSI Optimization Prerequisites..................................................................................................... 498
Configuring iSCSI Optimization.......................................................................................................498
Displaying iSCSI Optimization Information.....................................................................................500
27 Intermediate System to Intermediate System.......................................... 502
IS-IS Protocol Overview................................................................................................................... 502
IS-IS Addressing................................................................................................................................502
Multi-Topology IS-IS........................................................................................................................ 503
Transition Mode..........................................................................................................................504
Interface Support........................................................................................................................504
Adjacencies................................................................................................................................. 504
Graceful Restart................................................................................................................................504
Timers..........................................................................................................................................505
Implementation Information............................................................................................................505
Configuration Information............................................................................................................... 506
Configuration Tasks for IS-IS..................................................................................................... 506
Configuring the Distance of a Route..........................................................................................515
Changing the IS-Type................................................................................................................. 515
Redistributing IPv4 Routes..........................................................................................................518
Redistributing IPv6 Routes.......................................................................................................... 519
Configuring Authentication Passwords..................................................................................... 520
Setting the Overload Bit..............................................................................................................520
Debugging IS-IS...........................................................................................................................521
IS-IS Metric Styles............................................................................................................................. 522
Configure Metric Values................................................................................................................... 522
Maximum Values in the Routing Table.......................................................................................523
Change the IS-IS Metric Style in One Level Only...................................................................... 523
Leaks from One Level to Another...............................................................................................525
Sample Configurations..................................................................................................................... 525
28 Link Aggregation Control Protocol (LACP)...............................................528










