Concept Guide

Setting the Overload Bit......................................................................................................................................... 496
Debugging IS-IS....................................................................................................................................................... 497
IS-IS Metric Styles.........................................................................................................................................................498
Congure Metric Values............................................................................................................................................... 498
Maximum Values in the Routing Table.................................................................................................................. 498
Change the IS-IS Metric Style in One Level Only................................................................................................498
Leaks from One Level to Another..........................................................................................................................500
Sample Congurations...................................................................................................................................................501
24 Link Aggregation Control Protocol (LACP).............................................................................................. 503
Introduction to Dynamic LAGs and LACP.................................................................................................................. 503
Important Points to Remember............................................................................................................................. 503
LACP Modes............................................................................................................................................................504
Conguring LACP Commands...............................................................................................................................504
LACP Conguration Tasks............................................................................................................................................505
Creating a LAG........................................................................................................................................................ 505
Conguring the LAG Interfaces as Dynamic........................................................................................................505
Setting the LACP Long Timeout........................................................................................................................... 506
Monitoring and Debugging LACP..........................................................................................................................506
Shared LAG State Tracking.......................................................................................................................................... 507
Conguring Shared LAG State Tracking............................................................................................................... 507
Important Points about Shared LAG State Tracking...........................................................................................509
LACP Basic Conguration Example............................................................................................................................ 509
Congure a LAG on ALPHA...................................................................................................................................509
25 Layer 2..................................................................................................................................................... 518
Manage the MAC Address Table.................................................................................................................................. 518
Clearing the MAC Address Table............................................................................................................................518
Setting the Aging Time for Dynamic Entries.........................................................................................................518
Conguring a Static MAC Address.........................................................................................................................519
Displaying the MAC Address Table.........................................................................................................................519
MAC Learning Limit........................................................................................................................................................519
Setting the MAC Learning Limit............................................................................................................................ 520
mac learning-limit Dynamic.................................................................................................................................... 520
mac learning-limit mac-address-sticky................................................................................................................. 520
mac learning-limit station-move............................................................................................................................. 521
mac learning-limit no-station-move....................................................................................................................... 521
Learning Limit Violation Actions..............................................................................................................................521
Setting Station Move Violation Actions................................................................................................................ 522
Recovering from Learning Limit and Station Move Violations........................................................................... 522
Disabling MAC Address Learning on the System.................................................................................................523
Enabling port security............................................................................................................................................. 523
NIC Teaming................................................................................................................................................................... 523
Congure Redundant Pairs...........................................................................................................................................524
Important Points about Conguring Redundant Pairs........................................................................................ 526
Far-End Failure Detection............................................................................................................................................. 527
Contents
17