Administrator Guide
Configuring Telnet with IPv6.........................................................................................483
SNMP over IPv6................................................................................................................ 483
Showing IPv6 Information............................................................................................. 484
Showing an IPv6 Interface............................................................................................. 484
Showing IPv6 Routes.......................................................................................................485
Showing the Running-Configuration for an Interface.............................................486
Clearing IPv6 Routes.......................................................................................................486
Secure Shell (SSH) Over an IPv6 Transport...................................................................... 487
28 iSCSI Optimization............................................................................................................ 488
Supported Modes.................................................................................................................. 488
iSCSI Optimization Overview.............................................................................................. 488
Monitoring iSCSI Traffic Flows............................................................................................490
Information Monitored in iSCSI Traffic Flows.................................................................. 491
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.......................... 491
iSCSI Optimization: Operation............................................................................................ 491
Configuring iSCSI Optimization..........................................................................................492
Displaying iSCSI Optimization Information......................................................................494
29 Intermediate System to Intermediate System..............................................................496
IS-IS Protocol Overview....................................................................................................... 496
IS-IS Addressing......................................................................................................................497
Multi-Topology IS-IS.............................................................................................................497
Transition Mode............................................................................................................... 498
Interface Support............................................................................................................. 498
Adjacencies....................................................................................................................... 498
Graceful Restart......................................................................................................................499
Timers.................................................................................................................................499
Implementation Information...............................................................................................499
Configuration Information...................................................................................................500
Configuration Tasks for IS-IS......................................................................................... 501
IS-IS Metric Styles................................................................................................................... 517
Configure Metric Values........................................................................................................517
Maximum Values in the Routing Table........................................................................ 518
Change the IS-IS Metric Style in One Level Only...................................................... 518
Leaks from One Level to Another.................................................................................520
Sample Configurations......................................................................................................... 520
30 Isolated Networks for Aggregators................................................................................ 525
Configuring and Verifying Isolated Network Settings.................................................... 525
31 Link Aggregation................................................................................................................ 526
Configuration Guide
17