Administrator Guide

Table Of Contents
Configuring Authentication Passwords............................................................................................................... 499
Setting the Overload Bit......................................................................................................................................... 499
Debugging IS-IS.........................................................................................................................................................500
IS-IS Metric Styles.......................................................................................................................................................... 501
Configure Metric Values................................................................................................................................................ 501
Maximum Values in the Routing Table................................................................................................................. 501
Change the IS-IS Metric Style in One Level Only..............................................................................................501
Leaks from One Level to Another.........................................................................................................................503
Sample Configurations...................................................................................................................................................503
Chapter 27: iSCSI Optimization.................................................................................................506
iSCSI Optimization Overview.......................................................................................................................................506
Default iSCSI Optimization Values..............................................................................................................................508
iSCSI Optimization Prerequisites................................................................................................................................ 508
Configuring iSCSI Optimization...................................................................................................................................508
Displaying iSCSI Optimization Information................................................................................................................ 510
Enable and Disable iSCSI Optimization....................................................................................................................... 511
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................512
Monitoring iSCSI Traffic Flows.................................................................................................................................... 512
Information Monitored in iSCSI Traffic Flows.......................................................................................................... 512
Detection and Auto-Configuration for Dell EqualLogic Arrays............................................................................. 513
Configuring Detection and Ports for Dell Compellent Arrays............................................................................... 513
Application of Quality of Service to iSCSI Traffic Flows....................................................................................... 514
Chapter 28: Link Aggregation Control Protocol (LACP)............................................................. 515
Introduction to Dynamic LAGs and LACP..................................................................................................................515
Important Points to Remember..............................................................................................................................515
LACP Modes............................................................................................................................................................... 516
Configuring LACP Commands................................................................................................................................ 516
LACP Configuration Tasks............................................................................................................................................ 516
Creating a LAG........................................................................................................................................................... 517
Configuring the LAG Interfaces as Dynamic....................................................................................................... 517
Setting the LACP Long Timeout............................................................................................................................ 517
Monitoring and Debugging LACP...........................................................................................................................518
Shared LAG State Tracking.......................................................................................................................................... 518
Configuring Shared LAG State Tracking..............................................................................................................519
Important Points about Shared LAG State Tracking....................................................................................... 520
LACP Basic Configuration Example............................................................................................................................ 521
Configure a LAG on ALPHA.................................................................................................................................... 521
Chapter 29: Layer 2...................................................................................................................530
Manage the MAC Address Table................................................................................................................................ 530
Clearing the MAC Address Table.......................................................................................................................... 530
Setting the Aging Time for Dynamic Entries......................................................................................................530
Configuring a Static MAC Address........................................................................................................................531
Displaying the MAC Address Table........................................................................................................................531
MAC Learning Limit.........................................................................................................................................................531
Setting the MAC Learning Limit.............................................................................................................................531
mac learning-limit Dynamic.....................................................................................................................................532
16
Contents