Users Guide

Table Of Contents
Secure Shell (SSH) Over an IPv6 Transport............................................................................................................428
Configuration Tasks for IPv6....................................................................................................................................... 428
Adjusting Your CAM-Profile....................................................................................................................................428
Assigning an IPv6 Address to an Interface......................................................................................................... 429
Assigning a Static IPv6 Route................................................................................................................................429
Configuring Telnet with IPv6................................................................................................................................. 430
SNMP over IPv6........................................................................................................................................................430
Displaying IPv6 Information.................................................................................................................................... 430
Displaying an IPv6 Interface Information............................................................................................................. 431
Showing IPv6 Routes............................................................................................................................................... 432
Showing the Running-Configuration for an Interface...................................................................................... 433
Clearing IPv6 Routes................................................................................................................................................433
Configuring IPv6 RA Guard.......................................................................................................................................... 433
Chapter 23: iSCSI Optimization.................................................................................................436
iSCSI Optimization Overview....................................................................................................................................... 436
Monitoring iSCSI Traffic Flows.............................................................................................................................. 437
Application of Quality of Service to iSCSI Traffic Flows................................................................................. 438
Information Monitored in iSCSI Traffic Flows....................................................................................................438
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................439
Configuring Detection and Ports for Dell Compellent Arrays.........................................................................439
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.......................................................... 439
Enable and Disable iSCSI Optimization................................................................................................................ 440
Default iSCSI Optimization Values..............................................................................................................................440
iSCSI Optimization Prerequisites................................................................................................................................. 441
Configuring iSCSI Optimization....................................................................................................................................441
Displaying iSCSI Optimization Information................................................................................................................443
Chapter 24: Intermediate System to Intermediate System.........................................................445
IS-IS Protocol Overview................................................................................................................................................445
IS-IS Addressing..............................................................................................................................................................445
Multi-Topology IS-IS...................................................................................................................................................... 446
Transition Mode.........................................................................................................................................................446
Interface Support......................................................................................................................................................446
Adjacencies.................................................................................................................................................................446
Graceful Restart.............................................................................................................................................................. 447
Timers...........................................................................................................................................................................447
Implementation Information..........................................................................................................................................447
Configuration Information.............................................................................................................................................448
Configuration Tasks for IS-IS................................................................................................................................. 448
Configuring the Distance of a Route....................................................................................................................455
Changing the IS-Type.............................................................................................................................................. 455
Redistributing IPv4 Routes..................................................................................................................................... 458
Redistributing IPv6 Routes.....................................................................................................................................458
Configuring Authentication Passwords............................................................................................................... 459
Setting the Overload Bit......................................................................................................................................... 459
Debugging IS-IS.........................................................................................................................................................460
IS-IS Metric Styles.......................................................................................................................................................... 461
Configure Metric Values................................................................................................................................................ 461
14
Contents