Users Guide

Showing IPv6 Routes..............................................................................................................................................475
Showing the Running-Conguration for an Interface......................................................................................... 476
Clearing IPv6 Routes............................................................................................................................................... 477
Disabling ND Entry Timeout....................................................................................................................................477
Conguring IPv6 RA Guard.......................................................................................................................................... 478
Conguring IPv6 RA Guard on an Interface.........................................................................................................479
Monitoring IPv6 RA Guard..................................................................................................................................... 480
23 iSCSI Optimization................................................................................................................................... 481
iSCSI Optimization Overview........................................................................................................................................481
Monitoring iSCSI Trac Flows...............................................................................................................................483
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 483
Information Monitored in iSCSI Trac Flows.......................................................................................................483
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 484
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................484
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................485
Enable and Disable iSCSI Optimization.................................................................................................................485
Default iSCSI Optimization Values...............................................................................................................................486
iSCSI Optimization Prerequisites................................................................................................................................. 486
Conguring iSCSI Optimization................................................................................................................................... 486
Displaying iSCSI Optimization Information..................................................................................................................488
24 Intermediate System to Intermediate System.......................................................................................... 490
IS-IS Protocol Overview............................................................................................................................................... 490
IS-IS Addressing.............................................................................................................................................................490
Multi-Topology IS-IS....................................................................................................................................................... 491
Transition Mode........................................................................................................................................................ 491
Interface Support.....................................................................................................................................................492
Adjacencies...............................................................................................................................................................492
Graceful Restart.............................................................................................................................................................492
Timers........................................................................................................................................................................492
Implementation Information..........................................................................................................................................492
Conguration Information.............................................................................................................................................493
Conguration Tasks for IS-IS..................................................................................................................................494
Conguring the Distance of a Route..................................................................................................................... 501
Changing the IS-Type.............................................................................................................................................. 502
Redistributing IPv4 Routes.....................................................................................................................................504
Redistributing IPv6 Routes.....................................................................................................................................505
Conguring Authentication Passwords.................................................................................................................506
Setting the Overload Bit.........................................................................................................................................506
Debugging IS-IS....................................................................................................................................................... 507
IS-IS Metric Styles.........................................................................................................................................................508
Congure Metric Values............................................................................................................................................... 508
Maximum Values in the Routing Table.................................................................................................................. 509
Change the IS-IS Metric Style in One Level Only................................................................................................509
Leaks from One Level to Another...........................................................................................................................510
Contents
17