Install Guide

Table Of Contents
Showing the Running-Configuration for an Interface......................................................................................380
Clearing IPv6 Routes................................................................................................................................................380
Disabling ND Entry Timeout.................................................................................................................................... 381
Configuring IPv6 RA Guard........................................................................................................................................... 381
Configuring IPv6 RA Guard on an Interface....................................................................................................... 382
Monitoring IPv6 RA Guard...................................................................................................................................... 383
Chapter 22: iSCSI Optimization................................................................................................. 384
iSCSI Optimization Overview....................................................................................................................................... 384
Monitoring iSCSI Traffic Flows..............................................................................................................................385
Application of Quality of Service to iSCSI Traffic Flows.................................................................................386
Information Monitored in iSCSI Traffic Flows....................................................................................................386
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................387
Configuring Detection and Ports for Dell Compellent Arrays.........................................................................387
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer...........................................................387
Enable and Disable iSCSI Optimization................................................................................................................ 388
Default iSCSI Optimization Values..............................................................................................................................388
iSCSI Optimization Prerequisites................................................................................................................................ 389
Configuring iSCSI Optimization................................................................................................................................... 389
Displaying iSCSI Optimization Information................................................................................................................ 391
Chapter 23: Intermediate System to Intermediate System.........................................................393
IS-IS Protocol Overview................................................................................................................................................393
IS-IS Addressing.............................................................................................................................................................. 393
Multi-Topology IS-IS...................................................................................................................................................... 394
Transition Mode.........................................................................................................................................................394
Interface Support......................................................................................................................................................394
Adjacencies.................................................................................................................................................................394
Graceful Restart..............................................................................................................................................................395
Timers.......................................................................................................................................................................... 395
Implementation Information......................................................................................................................................... 395
Configuration Information.............................................................................................................................................396
Configuration Tasks for IS-IS.................................................................................................................................396
Configuring the Distance of a Route....................................................................................................................402
Changing the IS-Type.............................................................................................................................................. 402
Redistributing IPv4 Routes..................................................................................................................................... 404
Redistributing IPv6 Routes.....................................................................................................................................405
Configuring Authentication Passwords............................................................................................................... 405
Setting the Overload Bit......................................................................................................................................... 406
Debugging IS-IS.........................................................................................................................................................406
IS-IS Metric Styles..........................................................................................................................................................407
Configure Metric Values................................................................................................................................................407
Maximum Values in the Routing Table.................................................................................................................408
Change the IS-IS Metric Style in One Level Only............................................................................................. 408
Leaks from One Level to Another.........................................................................................................................409
Sample Configurations................................................................................................................................................... 410
Chapter 24: Link Aggregation Control Protocol (LACP)..............................................................412
Introduction to Dynamic LAGs and LACP..................................................................................................................412
14
Contents