Users Guide
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................431
Configuration Tasks for IPv6........................................................................................................................................ 431
Adjusting Your CAM-Profile.................................................................................................................................... 431
Assigning an IPv6 Address to an Interface......................................................................................................... 432
Assigning a Static IPv6 Route................................................................................................................................432
Configuring Telnet with IPv6..................................................................................................................................433
SNMP over IPv6........................................................................................................................................................433
Displaying IPv6 Information.................................................................................................................................... 434
Displaying an IPv6 Interface Information.............................................................................................................434
Showing IPv6 Routes...............................................................................................................................................435
Showing the Running-Configuration for an Interface......................................................................................436
Clearing IPv6 Routes................................................................................................................................................436
Configuring IPv6 RA Guard...........................................................................................................................................437
Chapter 23: iSCSI Optimization.................................................................................................439
iSCSI Optimization Overview....................................................................................................................................... 439
Monitoring iSCSI Traffic Flows..............................................................................................................................440
Application of Quality of Service to iSCSI Traffic Flows..................................................................................441
Information Monitored in iSCSI Traffic Flows.....................................................................................................441
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................442
Configuring Detection and Ports for Dell Compellent Arrays.........................................................................442
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer...........................................................442
Enable and Disable iSCSI Optimization................................................................................................................ 443
Default iSCSI Optimization Values..............................................................................................................................443
iSCSI Optimization Prerequisites................................................................................................................................ 444
Configuring iSCSI Optimization................................................................................................................................... 444
Displaying iSCSI Optimization Information................................................................................................................446
Chapter 24: Intermediate System to Intermediate System.........................................................448
IS-IS Protocol Overview................................................................................................................................................448
IS-IS Addressing.............................................................................................................................................................. 448
Multi-Topology IS-IS...................................................................................................................................................... 449
Transition Mode.........................................................................................................................................................449
Interface Support......................................................................................................................................................449
Adjacencies.................................................................................................................................................................449
Graceful Restart..............................................................................................................................................................450
Timers.......................................................................................................................................................................... 450
Implementation Information......................................................................................................................................... 450
Configuration Information..............................................................................................................................................451
Configuration Tasks for IS-IS..................................................................................................................................451
Configuring the Distance of a Route....................................................................................................................458
Changing the IS-Type.............................................................................................................................................. 458
Redistributing IPv4 Routes......................................................................................................................................461
Redistributing IPv6 Routes......................................................................................................................................461
Configuring Authentication Passwords............................................................................................................... 462
Setting the Overload Bit..........................................................................................................................................463
Debugging IS-IS.........................................................................................................................................................463
IS-IS Metric Styles..........................................................................................................................................................464
Configure Metric Values................................................................................................................................................464
14
Contents