Administrator Guide

Showing the Running-Conguration for an Interface......................................................................................... 467
Clearing IPv6 Routes............................................................................................................................................... 467
Disabling ND Entry Timeout................................................................................................................................... 467
Conguring IPv6 RA Guard.......................................................................................................................................... 468
Conguring IPv6 RA Guard on an Interface.........................................................................................................469
Monitoring IPv6 RA Guard......................................................................................................................................470
26 iSCSI Optimization................................................................................................................................... 471
iSCSI Optimization Overview........................................................................................................................................471
Monitoring iSCSI Trac Flows............................................................................................................................... 473
Application of Quality of Service to iSCSI Trac Flows......................................................................................473
Information Monitored in iSCSI Trac Flows....................................................................................................... 473
Detection and Auto-Conguration for Dell EqualLogic Arrays............................................................................474
Conguring Detection and Ports for Dell Compellent Arrays............................................................................. 474
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................475
Enable and Disable iSCSI Optimization................................................................................................................. 475
Default iSCSI Optimization Values............................................................................................................................... 476
iSCSI Optimization Prerequisites..................................................................................................................................476
Conguring iSCSI Optimization....................................................................................................................................476
Displaying iSCSI Optimization Information..................................................................................................................478
27 Intermediate System to Intermediate System...........................................................................................480
IS-IS Protocol Overview............................................................................................................................................... 480
IS-IS Addressing.............................................................................................................................................................480
Multi-Topology IS-IS....................................................................................................................................................... 481
Transition Mode........................................................................................................................................................ 481
Interface Support.....................................................................................................................................................482
Adjacencies...............................................................................................................................................................482
Graceful Restart.............................................................................................................................................................482
Timers........................................................................................................................................................................482
Implementation Information..........................................................................................................................................482
Conguration Information.............................................................................................................................................483
Conguration Tasks for IS-IS..................................................................................................................................484
Conguring the Distance of a Route......................................................................................................................491
Changing the IS-Type.............................................................................................................................................. 492
Redistributing IPv4 Routes.....................................................................................................................................494
Redistributing IPv6 Routes.....................................................................................................................................495
Conguring Authentication Passwords.................................................................................................................496
Setting the Overload Bit......................................................................................................................................... 496
Debugging IS-IS....................................................................................................................................................... 497
IS-IS Metric Styles.........................................................................................................................................................498
Congure Metric Values............................................................................................................................................... 498
Maximum Values in the Routing Table.................................................................................................................. 498
Change the IS-IS Metric Style in One Level Only................................................................................................498
Leaks from One Level to Another..........................................................................................................................500
Sample Congurations...................................................................................................................................................501
Contents
17