Connectivity Guide

Table Of Contents
Clearing IPv6 Routes................................................................................................................................................459
Disabling ND Entry Timeout................................................................................................................................... 459
Configuring IPv6 RA Guard.......................................................................................................................................... 460
Configuring IPv6 RA Guard on an Interface........................................................................................................461
Monitoring IPv6 RA Guard......................................................................................................................................462
Chapter 26: iSCSI Optimization.................................................................................................463
iSCSI Optimization Overview....................................................................................................................................... 463
Monitoring iSCSI Traffic Flows..............................................................................................................................464
Application of Quality of Service to iSCSI Traffic Flows.................................................................................465
Information Monitored in iSCSI Traffic Flows....................................................................................................465
Detection and Auto-Configuration for Dell EqualLogic Arrays...................................................................... 466
Configuring Detection and Ports for Dell Compellent Arrays.........................................................................466
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.......................................................... 466
Enable and Disable iSCSI Optimization................................................................................................................ 467
Default iSCSI Optimization Values..............................................................................................................................467
iSCSI Optimization Prerequisites................................................................................................................................ 468
Configuring iSCSI Optimization................................................................................................................................... 468
Displaying iSCSI Optimization Information................................................................................................................470
Chapter 27: Intermediate System to Intermediate System......................................................... 472
IS-IS Protocol Overview................................................................................................................................................472
IS-IS Addressing.............................................................................................................................................................. 472
Multi-Topology IS-IS.......................................................................................................................................................473
Transition Mode.........................................................................................................................................................473
Interface Support...................................................................................................................................................... 473
Adjacencies................................................................................................................................................................. 473
Graceful Restart.............................................................................................................................................................. 474
Timers...........................................................................................................................................................................474
Implementation Information..........................................................................................................................................474
Configuration Information.............................................................................................................................................475
Configuration Tasks for IS-IS.................................................................................................................................475
Configuring the Distance of a Route....................................................................................................................482
Changing the IS-Type.............................................................................................................................................. 482
Redistributing IPv4 Routes..................................................................................................................................... 484
Redistributing IPv6 Routes.....................................................................................................................................485
Configuring Authentication Passwords............................................................................................................... 486
Setting the Overload Bit..........................................................................................................................................486
Debugging IS-IS......................................................................................................................................................... 487
IS-IS Metric Styles..........................................................................................................................................................487
Configure Metric Values................................................................................................................................................488
Maximum Values in the Routing Table.................................................................................................................488
Change the IS-IS Metric Style in One Level Only............................................................................................. 488
Leaks from One Level to Another.........................................................................................................................490
Sample Configurations...................................................................................................................................................490
Chapter 28: Link Aggregation Control Protocol (LACP)............................................................. 493
Introduction to Dynamic LAGs and LACP.................................................................................................................493
Important Points to Remember............................................................................................................................. 493
Contents
15