White Papers

Table Of Contents
Assigning an IPv6 Address to an Interface......................................................................................................... 425
Assigning a Static IPv6 Route................................................................................................................................425
Configuring Telnet with IPv6................................................................................................................................. 426
SNMP over IPv6........................................................................................................................................................426
Displaying IPv6 Information.................................................................................................................................... 426
Displaying an IPv6 Interface Information.............................................................................................................427
Showing IPv6 Routes............................................................................................................................................... 428
Showing the Running-Configuration for an Interface......................................................................................429
Clearing IPv6 Routes................................................................................................................................................429
Configuring IPv6 RA Guard.......................................................................................................................................... 429
Chapter 23: iSCSI Optimization................................................................................................. 432
iSCSI Optimization Overview....................................................................................................................................... 432
Monitoring iSCSI Traffic Flows.............................................................................................................................. 433
Application of Quality of Service to iSCSI Traffic Flows................................................................................. 434
Information Monitored in iSCSI Traffic Flows....................................................................................................434
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................435
Configuring Detection and Ports for Dell Compellent Arrays.........................................................................435
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.......................................................... 435
Enable and Disable iSCSI Optimization................................................................................................................ 436
Default iSCSI Optimization Values..............................................................................................................................436
iSCSI Optimization Prerequisites.................................................................................................................................437
Configuring iSCSI Optimization................................................................................................................................... 437
Displaying iSCSI Optimization Information............................................................................................................... 439
Chapter 24: Intermediate System to Intermediate System......................................................... 441
IS-IS Protocol Overview.................................................................................................................................................441
IS-IS Addressing...............................................................................................................................................................441
Multi-Topology IS-IS...................................................................................................................................................... 442
Transition Mode.........................................................................................................................................................442
Interface Support......................................................................................................................................................442
Adjacencies................................................................................................................................................................. 442
Graceful Restart..............................................................................................................................................................443
Timers.......................................................................................................................................................................... 443
Implementation Information..........................................................................................................................................443
Configuration Information.............................................................................................................................................444
Configuration Tasks for IS-IS.................................................................................................................................444
Configuring the Distance of a Route.................................................................................................................... 451
Changing the IS-Type............................................................................................................................................... 451
Redistributing IPv4 Routes..................................................................................................................................... 454
Redistributing IPv6 Routes..................................................................................................................................... 454
Configuring Authentication Passwords............................................................................................................... 455
Setting the Overload Bit......................................................................................................................................... 455
Debugging IS-IS.........................................................................................................................................................456
IS-IS Metric Styles..........................................................................................................................................................457
Configure Metric Values................................................................................................................................................457
Maximum Values in the Routing Table................................................................................................................. 457
Change the IS-IS Metric Style in One Level Only............................................................................................. 457
Leaks from One Level to Another.........................................................................................................................459
14
Contents