Users Guide

22 iSCSI Optimization................................................................................................................................... 431
iSCSI Optimization Overview........................................................................................................................................431
Monitoring iSCSI Trac Flows...............................................................................................................................433
Application of Quality of Service to iSCSI Trac Flows......................................................................................433
Information Monitored in iSCSI Trac Flows....................................................................................................... 433
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 434
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................434
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................435
Enable and Disable iSCSI Optimization................................................................................................................. 435
Default iSCSI Optimization Values...............................................................................................................................436
iSCSI Optimization Prerequisites................................................................................................................................. 436
Conguring iSCSI Optimization....................................................................................................................................436
Displaying iSCSI Optimization Information..................................................................................................................438
23 Intermediate System to Intermediate System.......................................................................................... 440
IS-IS Protocol Overview............................................................................................................................................... 440
IS-IS Addressing.............................................................................................................................................................440
Multi-Topology IS-IS....................................................................................................................................................... 441
Transition Mode........................................................................................................................................................ 441
Interface Support.....................................................................................................................................................442
Adjacencies...............................................................................................................................................................442
Graceful Restart.............................................................................................................................................................442
Timers........................................................................................................................................................................442
Implementation Information..........................................................................................................................................442
Conguration Information.............................................................................................................................................443
Conguration Tasks for IS-IS..................................................................................................................................444
Conguring the Distance of a Route......................................................................................................................451
Changing the IS-Type.............................................................................................................................................. 452
Redistributing IPv4 Routes.....................................................................................................................................454
Redistributing IPv6 Routes.....................................................................................................................................455
Conguring Authentication Passwords.................................................................................................................456
Setting the Overload Bit......................................................................................................................................... 456
Debugging IS-IS....................................................................................................................................................... 457
IS-IS Metric Styles.........................................................................................................................................................458
Congure Metric Values............................................................................................................................................... 458
Maximum Values in the Routing Table.................................................................................................................. 459
Change the IS-IS Metric Style in One Level Only................................................................................................459
Leaks from One Level to Another..........................................................................................................................460
Sample Congurations...................................................................................................................................................461
24 Link Aggregation Control Protocol (LACP).............................................................................................. 464
Introduction to Dynamic LAGs and LACP.................................................................................................................. 464
Important Points to Remember............................................................................................................................. 464
LACP Modes............................................................................................................................................................ 465
Conguring LACP Commands...............................................................................................................................465
16
Contents