Owners Manual

Table Of Contents
Configuring IPv6 RA Guard.............................................................................................................. 495
Configuring IPv6 RA Guard on an Interface.............................................................................. 497
Monitoring IPv6 RA Guard.......................................................................................................... 497
26 iSCSI Optimization........................................................................................ 498
iSCSI Optimization Overview........................................................................................................... 498
Monitoring iSCSI Traffic Flows................................................................................................... 500
Application of Quality of Service to iSCSI Traffic Flows............................................................500
Information Monitored in iSCSI Traffic Flows........................................................................... 500
Detection and Auto-Configuration for Dell EqualLogic Arrays.................................................501
Configuring Detection and Ports for Dell Compellent Arrays.................................................. 502
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................502
Enable and Disable iSCSI Optimization......................................................................................502
Default iSCSI Optimization Values...................................................................................................503
iSCSI Optimization Prerequisites..................................................................................................... 504
Configuring iSCSI Optimization.......................................................................................................504
Displaying iSCSI Optimization Information..................................................................................... 506
27 Intermediate System to Intermediate System.......................................... 508
IS-IS Protocol Overview...................................................................................................................508
IS-IS Addressing................................................................................................................................508
Multi-Topology IS-IS........................................................................................................................ 509
Transition Mode.......................................................................................................................... 510
Interface Support.........................................................................................................................510
Adjacencies..................................................................................................................................510
Graceful Restart.................................................................................................................................510
Timers...........................................................................................................................................511
Implementation Information.............................................................................................................511
Configuration Information................................................................................................................512
Configuration Tasks for IS-IS...................................................................................................... 512
Configuring the Distance of a Route..........................................................................................521
Changing the IS-Type................................................................................................................. 521
Redistributing IPv4 Routes..........................................................................................................524
Redistributing IPv6 Routes..........................................................................................................525
Configuring Authentication Passwords......................................................................................525
Setting the Overload Bit..............................................................................................................526
Debugging IS-IS.......................................................................................................................... 527
IS-IS Metric Styles............................................................................................................................. 528
Configure Metric Values...................................................................................................................528
Maximum Values in the Routing Table...................................................................................... 529
Change the IS-IS Metric Style in One Level Only...................................................................... 529
Leaks from One Level to Another.............................................................................................. 530