Users Guide

Showing IPv6 Routes..............................................................................................................................................425
Showing the Running-Configuration for an Interface.........................................................................................426
Clearing IPv6 Routes...............................................................................................................................................427
Configuring IPv6 RA Guard.......................................................................................................................................... 427
Configuring IPv6 RA Guard on an Interface.........................................................................................................429
Monitoring IPv6 RA Guard..................................................................................................................................... 429
22 iSCSI Optimization.................................................................................................................................. 430
iSCSI Optimization Overview.......................................................................................................................................430
Monitoring iSCSI Traffic Flows..............................................................................................................................432
Application of Quality of Service to iSCSI Traffic Flows.................................................................................... 432
Information Monitored in iSCSI Traffic Flows......................................................................................................432
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................... 433
Configuring Detection and Ports for Dell Compellent Arrays............................................................................ 433
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer...............................................................434
Enable and Disable iSCSI Optimization................................................................................................................. 434
Default iSCSI Optimization Values.............................................................................................................................. 435
iSCSI Optimization Prerequisites.................................................................................................................................435
Configuring iSCSI Optimization................................................................................................................................... 435
Displaying iSCSI Optimization Information................................................................................................................. 437
23 Intermediate System to Intermediate System..........................................................................................439
IS-IS Protocol Overview............................................................................................................................................... 439
IS-IS Addressing.............................................................................................................................................................439
Multi-Topology IS-IS..................................................................................................................................................... 440
Transition Mode.......................................................................................................................................................440
Interface Support..................................................................................................................................................... 441
Adjacencies................................................................................................................................................................441
Graceful Restart............................................................................................................................................................. 441
Timers........................................................................................................................................................................ 441
Implementation Information.......................................................................................................................................... 441
Configuration Information.............................................................................................................................................442
Configuration Tasks for IS-IS.................................................................................................................................443
Configuring the Distance of a Route.................................................................................................................... 450
Changing the IS-Type..............................................................................................................................................451
Redistributing IPv4 Routes.....................................................................................................................................453
Redistributing IPv6 Routes.....................................................................................................................................454
Configuring Authentication Passwords................................................................................................................ 455
Setting the Overload Bit.........................................................................................................................................455
Debugging IS-IS.......................................................................................................................................................456
IS-IS Metric Styles.........................................................................................................................................................457
Configure Metric Values............................................................................................................................................... 457
Maximum Values in the Routing Table..................................................................................................................458
Change the IS-IS Metric Style in One Level Only............................................................................................... 458
Leaks from One Level to Another......................................................................................................................... 459
Sample Configurations..................................................................................................................................................460
16
Contents