Users Guide

Displaying an IPv6 Interface Information.............................................................................................................. 430
Showing IPv6 Routes...............................................................................................................................................431
Showing the Running-Conguration for an Interface......................................................................................... 432
Clearing IPv6 Routes...............................................................................................................................................432
Conguring IPv6 RA Guard.......................................................................................................................................... 433
Conguring IPv6 RA Guard on an Interface.........................................................................................................435
Monitoring IPv6 RA Guard..................................................................................................................................... 435
25 iSCSI Optimization.................................................................................................................................. 436
iSCSI Optimization Overview....................................................................................................................................... 436
Monitoring iSCSI Trac Flows............................................................................................................................... 437
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 438
Information Monitored in iSCSI Trac Flows....................................................................................................... 438
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 439
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................439
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................440
Enable and Disable iSCSI Optimization................................................................................................................. 440
Default iSCSI Optimization Values................................................................................................................................441
iSCSI Optimization Prerequisites.................................................................................................................................. 441
Conguring iSCSI Optimization.................................................................................................................................... 441
Displaying iSCSI Optimization Information..................................................................................................................443
26 Intermediate System to Intermediate System.......................................................................................... 445
IS-IS Protocol Overview............................................................................................................................................... 445
IS-IS Addressing.............................................................................................................................................................445
Multi-Topology IS-IS...................................................................................................................................................... 446
Transition Mode....................................................................................................................................................... 446
Interface Support.....................................................................................................................................................446
Adjacencies...............................................................................................................................................................447
Graceful Restart.............................................................................................................................................................447
Timers........................................................................................................................................................................447
Implementation Information..........................................................................................................................................447
Conguration Information.............................................................................................................................................448
Conguration Tasks for IS-IS..................................................................................................................................448
Conguring the Distance of a Route.....................................................................................................................456
Changing the IS-Type..............................................................................................................................................456
Redistributing IPv4 Routes.....................................................................................................................................459
Redistributing IPv6 Routes.....................................................................................................................................459
Conguring Authentication Passwords.................................................................................................................460
Setting the Overload Bit..........................................................................................................................................461
Debugging IS-IS........................................................................................................................................................461
IS-IS Metric Styles.........................................................................................................................................................462
Congure Metric Values............................................................................................................................................... 462
Maximum Values in the Routing Table.................................................................................................................. 463
Change the IS-IS Metric Style in One Level Only................................................................................................463
Leaks from One Level to Another..........................................................................................................................464
Sample Congurations..................................................................................................................................................465
16
Contents