Deployment Guide

Table Of Contents
Showing IPv6 Routes............................................................................................................................................... 428
Showing the Running-Configuration for an Interface......................................................................................429
Clearing IPv6 Routes................................................................................................................................................430
Disabling ND Entry Timeout................................................................................................................................... 430
Configuring IPv6 RA Guard.......................................................................................................................................... 430
Configuring IPv6 RA Guard on an Interface....................................................................................................... 432
Monitoring IPv6 RA Guard......................................................................................................................................432
Chapter 22: iSCSI Optimization................................................................................................. 433
iSCSI Optimization Overview....................................................................................................................................... 433
Monitoring iSCSI Traffic Flows.............................................................................................................................. 434
Application of Quality of Service to iSCSI Traffic Flows.................................................................................435
Information Monitored in iSCSI Traffic Flows....................................................................................................435
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................436
Configuring Detection and Ports for Dell Compellent Arrays.........................................................................436
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.......................................................... 436
Enable and Disable iSCSI Optimization................................................................................................................ 437
Default iSCSI Optimization Values.............................................................................................................................. 437
iSCSI Optimization Prerequisites................................................................................................................................ 438
Configuring iSCSI Optimization................................................................................................................................... 438
Displaying iSCSI Optimization Information............................................................................................................... 440
Chapter 23: Intermediate System to Intermediate System.........................................................442
IS-IS Protocol Overview................................................................................................................................................442
IS-IS Addressing.............................................................................................................................................................. 442
Multi-Topology IS-IS...................................................................................................................................................... 443
Transition Mode.........................................................................................................................................................443
Interface Support......................................................................................................................................................443
Adjacencies................................................................................................................................................................. 443
Graceful Restart..............................................................................................................................................................444
Timers.......................................................................................................................................................................... 444
Implementation Information..........................................................................................................................................444
Configuration Information.............................................................................................................................................445
Configuration Tasks for IS-IS.................................................................................................................................445
Configuring the Distance of a Route....................................................................................................................452
Changing the IS-Type.............................................................................................................................................. 452
Redistributing IPv4 Routes..................................................................................................................................... 454
Redistributing IPv6 Routes.....................................................................................................................................455
Configuring Authentication Passwords............................................................................................................... 456
Setting the Overload Bit......................................................................................................................................... 456
Debugging IS-IS......................................................................................................................................................... 457
IS-IS Metric Styles..........................................................................................................................................................457
Configure Metric Values................................................................................................................................................458
Maximum Values in the Routing Table.................................................................................................................458
Change the IS-IS Metric Style in One Level Only............................................................................................. 458
Leaks from One Level to Another.........................................................................................................................459
Sample Configurations...................................................................................................................................................460
Chapter 24: Link Aggregation Control Protocol (LACP)............................................................. 463
14
Contents