White Papers

Assigning a Static IPv6 Route................................................................................................................................434
Conguring Telnet with IPv6..................................................................................................................................434
SNMP over IPv6......................................................................................................................................................434
Displaying IPv6 Information....................................................................................................................................435
Displaying an IPv6 Interface Information.............................................................................................................. 435
Showing IPv6 Routes..............................................................................................................................................436
Showing the Running-Conguration for an Interface......................................................................................... 437
Clearing IPv6 Routes...............................................................................................................................................438
Disabling ND Entry Timeout................................................................................................................................... 438
Conguring IPv6 RA Guard.......................................................................................................................................... 438
Conguring IPv6 RA Guard on an Interface.........................................................................................................440
Monitoring IPv6 RA Guard...................................................................................................................................... 441
22 iSCSI Optimization...................................................................................................................................442
iSCSI Optimization Overview....................................................................................................................................... 442
Monitoring iSCSI Trac Flows...............................................................................................................................444
Application of Quality of Service to iSCSI Trac Flows......................................................................................444
Information Monitored in iSCSI Trac Flows.......................................................................................................444
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 445
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................445
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................446
Enable and Disable iSCSI Optimization................................................................................................................. 446
Default iSCSI Optimization Values............................................................................................................................... 447
iSCSI Optimization Prerequisites..................................................................................................................................447
Conguring iSCSI Optimization....................................................................................................................................447
Displaying iSCSI Optimization Information..................................................................................................................449
23 Intermediate System to Intermediate System........................................................................................... 451
IS-IS Protocol Overview................................................................................................................................................ 451
IS-IS Addressing..............................................................................................................................................................451
Multi-Topology IS-IS...................................................................................................................................................... 452
Transition Mode....................................................................................................................................................... 452
Interface Support.....................................................................................................................................................453
Adjacencies...............................................................................................................................................................453
Graceful Restart.............................................................................................................................................................453
Timers....................................................................................................................................................................... 453
Implementation Information..........................................................................................................................................453
Conguration Information.............................................................................................................................................454
Conguration Tasks for IS-IS................................................................................................................................. 455
Conguring the Distance of a Route.....................................................................................................................462
Changing the IS-Type.............................................................................................................................................. 463
Redistributing IPv4 Routes.....................................................................................................................................465
Redistributing IPv6 Routes.....................................................................................................................................466
Conguring Authentication Passwords................................................................................................................. 467
Setting the Overload Bit......................................................................................................................................... 467
Debugging IS-IS....................................................................................................................................................... 468
16
Contents