Users Guide
IPv6 Neighbor Discovery of MTU Packets..................................................................................531
Configuring the IPv6 Recursive DNS Server...............................................................................531
Secure Shell (SSH) Over an IPv6 Transport......................................................................................533
Configuration Tasks for IPv6............................................................................................................ 533
Adjusting Your CAM Profile........................................................................................................ 534
Assigning an IPv6 Address to an Interface.................................................................................534
Assigning a Static IPv6 Route......................................................................................................535
Configuring Telnet with IPv6......................................................................................................536
SNMP over IPv6...........................................................................................................................536
Displaying IPv6 Information....................................................................................................... 536
Displaying an IPv6 Configuration............................................................................................... 537
Displaying IPv6 Routes................................................................................................................538
Displaying the Running Configuration for an Interface............................................................ 539
Clearing IPv6 Routes...................................................................................................................539
Configuring IPv6 RA Guard.............................................................................................................. 540
26 Intermediate System to Intermediate System..........................................542
IS-IS Protocol Overview................................................................................................................... 542
IS-IS Addressing................................................................................................................................ 542
Multi-Topology IS-IS........................................................................................................................ 543
Transition Mode.......................................................................................................................... 543
Interface Support........................................................................................................................ 544
Adjacencies................................................................................................................................. 544
Graceful Restart................................................................................................................................ 544
Timers..........................................................................................................................................544
Implementation Information............................................................................................................545
Configuration Information............................................................................................................... 546
Configuration Tasks for IS-IS......................................................................................................546
Configuring the Distance of a Route..........................................................................................555
Changing the IS-Type.................................................................................................................555
Redistributing IPv4 Routes..........................................................................................................558
Redistributing IPv6 Routes..........................................................................................................559
Configuring Authentication Passwords......................................................................................559
Setting the Overload Bit............................................................................................................. 560
Debugging IS-IS...........................................................................................................................561
IS-IS Metric Styles............................................................................................................................. 562
Configure Metric Values................................................................................................................... 562
Maximum Values in the Routing Table...................................................................................... 563
Change the IS-IS Metric Style in One Level Only...................................................................... 563
Leaks from One Level to Another.............................................................................................. 564
Sample Configurations..................................................................................................................... 565
18