White Papers

Table Of Contents
Showing the Running-Configuration for an Interface......................................................................................464
Clearing IPv6 Routes................................................................................................................................................464
Disabling ND Entry Timeout....................................................................................................................................464
Configuring IPv6 RA Guard.......................................................................................................................................... 465
Configuring IPv6 RA Guard on an Interface.......................................................................................................466
Monitoring IPv6 RA Guard...................................................................................................................................... 467
Chapter 26: iSCSI Optimization.................................................................................................468
iSCSI Optimization Overview....................................................................................................................................... 468
Monitoring iSCSI Traffic Flows..............................................................................................................................469
Application of Quality of Service to iSCSI Traffic Flows................................................................................. 470
Information Monitored in iSCSI Traffic Flows....................................................................................................470
Detection and Auto-Configuration for Dell EqualLogic Arrays........................................................................471
Configuring Detection and Ports for Dell Compellent Arrays..........................................................................471
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................................... 471
Enable and Disable iSCSI Optimization................................................................................................................ 472
Default iSCSI Optimization Values.............................................................................................................................. 472
iSCSI Optimization Prerequisites.................................................................................................................................473
Configuring iSCSI Optimization................................................................................................................................... 473
Displaying iSCSI Optimization Information................................................................................................................475
Chapter 27: Intermediate System to Intermediate System......................................................... 477
IS-IS Protocol Overview................................................................................................................................................ 477
IS-IS Addressing.............................................................................................................................................................. 477
Multi-Topology IS-IS.......................................................................................................................................................478
Transition Mode.........................................................................................................................................................478
Interface Support...................................................................................................................................................... 478
Adjacencies................................................................................................................................................................. 478
Graceful Restart..............................................................................................................................................................479
Timers.......................................................................................................................................................................... 479
Implementation Information..........................................................................................................................................479
Configuration Information.............................................................................................................................................480
Configuration Tasks for IS-IS.................................................................................................................................480
Configuring the Distance of a Route.................................................................................................................... 487
Changing the IS-Type.............................................................................................................................................. 487
Redistributing IPv4 Routes..................................................................................................................................... 489
Redistributing IPv6 Routes.....................................................................................................................................490
Configuring Authentication Passwords................................................................................................................ 491
Setting the Overload Bit.......................................................................................................................................... 491
Debugging IS-IS.........................................................................................................................................................492
IS-IS Metric Styles..........................................................................................................................................................492
Configure Metric Values................................................................................................................................................493
Maximum Values in the Routing Table.................................................................................................................493
Change the IS-IS Metric Style in One Level Only............................................................................................. 493
Leaks from One Level to Another.........................................................................................................................495
Sample Configurations...................................................................................................................................................495
Chapter 28: Link Aggregation Control Protocol (LACP)............................................................. 498
Introduction to Dynamic LAGs and LACP.................................................................................................................498
Contents
15