Reference Guide
Configuring Detection and Ports for Dell Compellent Arrays.................................................. 447
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................447
Enable and Disable iSCSI Optimization......................................................................................447
Default iSCSI Optimization Values...................................................................................................448
iSCSI Optimization Prerequisites..................................................................................................... 449
Configuring iSCSI Optimization.......................................................................................................449
Displaying iSCSI Optimization Information......................................................................................451
22 Intermediate System to Intermediate System............................................453
IS-IS Protocol Overview................................................................................................................... 453
IS-IS Addressing................................................................................................................................ 453
Multi-Topology IS-IS........................................................................................................................ 454
Transition Mode.......................................................................................................................... 455
Interface Support........................................................................................................................ 455
Adjacencies................................................................................................................................. 455
Graceful Restart................................................................................................................................ 455
Timers..........................................................................................................................................456
Implementation Information............................................................................................................456
Configuration Information................................................................................................................457
Configuration Tasks for IS-IS......................................................................................................457
Configuring the Distance of a Route......................................................................................... 466
Changing the IS-Type.................................................................................................................466
Redistributing IPv4 Routes......................................................................................................... 469
Redistributing IPv6 Routes..........................................................................................................470
Configuring Authentication Passwords......................................................................................471
Setting the Overload Bit..............................................................................................................472
Debugging IS-IS.......................................................................................................................... 472
IS-IS Metric Styles............................................................................................................................. 473
Configure Metric Values................................................................................................................... 474
Maximum Values in the Routing Table...................................................................................... 474
Change the IS-IS Metric Style in One Level Only...................................................................... 474
Leaks from One Level to Another.............................................................................................. 476
Sample Configurations..................................................................................................................... 477
23 Link Aggregation Control Protocol (LACP)................................................. 481
Introduction to Dynamic LAGs and LACP........................................................................................481
Important Points to Remember..................................................................................................481
LACP Modes................................................................................................................................482
Configuring LACP Commands...................................................................................................482
LACP Configuration Tasks................................................................................................................483
Creating a LAG............................................................................................................................483
Configuring the LAG Interfaces as Dynamic............................................................................. 484










