Concept Guide

Disabling ND Entry Timeout................................................................................................................................... 485
Conguring IPv6 RA Guard.......................................................................................................................................... 486
Conguring IPv6 RA Guard on an Interface......................................................................................................... 487
Monitoring IPv6 RA Guard......................................................................................................................................488
25 iSCSI Optimization.................................................................................................................................. 489
iSCSI Optimization Overview.......................................................................................................................................489
Monitoring iSCSI Trac Flows................................................................................................................................491
Application of Quality of Service to iSCSI Trac Flows...................................................................................... 491
Information Monitored in iSCSI Trac Flows........................................................................................................491
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 492
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................492
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................493
Enable and Disable iSCSI Optimization................................................................................................................. 493
Default iSCSI Optimization Values...............................................................................................................................494
iSCSI Optimization Prerequisites................................................................................................................................. 494
Conguring iSCSI Optimization....................................................................................................................................494
Displaying iSCSI Optimization Information................................................................................................................. 496
26 Intermediate System to Intermediate System.......................................................................................... 498
IS-IS Protocol Overview............................................................................................................................................... 498
IS-IS Addressing.............................................................................................................................................................498
Multi-Topology IS-IS...................................................................................................................................................... 499
Transition Mode....................................................................................................................................................... 499
Interface Support.................................................................................................................................................... 500
Adjacencies.............................................................................................................................................................. 500
Graceful Restart............................................................................................................................................................ 500
Timers....................................................................................................................................................................... 500
Implementation Information......................................................................................................................................... 500
Conguration Information............................................................................................................................................. 501
Conguration Tasks for IS-IS..................................................................................................................................502
Conguring the Distance of a Route.....................................................................................................................509
Changing the IS-Type...............................................................................................................................................510
Redistributing IPv4 Routes......................................................................................................................................512
Redistributing IPv6 Routes......................................................................................................................................513
Conguring Authentication Passwords..................................................................................................................514
Setting the Overload Bit..........................................................................................................................................514
Debugging IS-IS........................................................................................................................................................515
IS-IS Metric Styles..........................................................................................................................................................516
Congure Metric Values................................................................................................................................................ 516
Maximum Values in the Routing Table................................................................................................................... 516
Change the IS-IS Metric Style in One Level Only.................................................................................................516
Leaks from One Level to Another...........................................................................................................................518
Sample Congurations...................................................................................................................................................519
27 Link Aggregation Control Protocol (LACP)............................................................................................... 521
Contents
17