Concept Guide

Displaying IPv6 Information.....................................................................................................................................477
Displaying an IPv6 Interface Information...............................................................................................................477
Showing IPv6 Routes.............................................................................................................................................. 478
Showing the Running-Conguration for an Interface......................................................................................... 479
Clearing IPv6 Routes...............................................................................................................................................480
Disabling ND Entry Timeout................................................................................................................................... 480
Conguring IPv6 RA Guard...........................................................................................................................................481
Conguring IPv6 RA Guard on an Interface.........................................................................................................482
Monitoring IPv6 RA Guard......................................................................................................................................483
23 iSCSI Optimization...................................................................................................................................484
iSCSI Optimization Overview....................................................................................................................................... 484
Monitoring iSCSI Trac Flows...............................................................................................................................486
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 486
Information Monitored in iSCSI Trac Flows.......................................................................................................486
Detection and Auto-Conguration for Dell EqualLogic Arrays............................................................................487
Conguring Detection and Ports for Dell Compellent Arrays............................................................................. 487
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................488
Enable and Disable iSCSI Optimization................................................................................................................. 488
Default iSCSI Optimization Values...............................................................................................................................489
iSCSI Optimization Prerequisites................................................................................................................................. 489
Conguring iSCSI Optimization................................................................................................................................... 489
Displaying iSCSI Optimization Information.................................................................................................................. 491
24 Intermediate System to Intermediate System.......................................................................................... 493
IS-IS Protocol Overview................................................................................................................................................493
IS-IS Addressing.............................................................................................................................................................493
Multi-Topology IS-IS...................................................................................................................................................... 494
Transition Mode....................................................................................................................................................... 494
Interface Support.................................................................................................................................................... 495
Adjacencies...............................................................................................................................................................495
Graceful Restart............................................................................................................................................................ 495
Timers....................................................................................................................................................................... 495
Implementation Information......................................................................................................................................... 495
Conguration Information.............................................................................................................................................496
Conguration Tasks for IS-IS..................................................................................................................................497
Conguring the Distance of a Route.....................................................................................................................504
Changing the IS-Type..............................................................................................................................................505
Redistributing IPv4 Routes.....................................................................................................................................507
Redistributing IPv6 Routes.....................................................................................................................................508
Conguring Authentication Passwords.................................................................................................................509
Setting the Overload Bit.........................................................................................................................................509
Debugging IS-IS........................................................................................................................................................510
IS-IS Metric Styles.......................................................................................................................................................... 511
Congure Metric Values................................................................................................................................................. 511
Maximum Values in the Routing Table................................................................................................................... 512
Contents
17