Users Guide
Configuring IPv6 RA Guard on an Interface...............................................................499
Monitoring IPv6 RA Guard............................................................................................. 499
22 iSCSI Optimization............................................................................................................ 500
iSCSI Optimization Overview.............................................................................................. 500
Monitoring iSCSI Traffic Flows...................................................................................... 502
Application of Quality of Service to iSCSI Traffic Flows...........................................503
Information Monitored in iSCSI Traffic Flows............................................................ 503
Detection and Auto-Configuration for Dell EqualLogic Arrays............................. 504
Configuring Detection and Ports for Dell Compellent Arrays................................505
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................... 505
Enable and Disable iSCSI Optimization.......................................................................506
Default iSCSI Optimization Values......................................................................................507
iSCSI Optimization Prerequisites........................................................................................ 507
Configuring iSCSI Optimization..........................................................................................507
Displaying iSCSI Optimization Information...................................................................... 510
23 Intermediate System to Intermediate System.............................................................. 512
IS-IS Protocol Overview........................................................................................................512
IS-IS Addressing...................................................................................................................... 513
Multi-Topology IS-IS..............................................................................................................513
Transition Mode................................................................................................................ 514
Interface Support..............................................................................................................514
Adjacencies........................................................................................................................ 514
Graceful Restart...................................................................................................................... 514
Timers..................................................................................................................................515
Implementation Information................................................................................................515
Configuration Information................................................................................................... 516
Configuration Tasks for IS-IS..........................................................................................517
Configuring the Distance of a Route........................................................................... 525
Changing the IS-Type..................................................................................................... 526
Redistributing IPv4 Routes............................................................................................. 528
Redistributing IPv6 Routes............................................................................................. 529
Configuring Authentication Passwords.......................................................................530
Setting the Overload Bit.................................................................................................. 531
Debugging IS-IS................................................................................................................ 531
IS-IS Metric Styles...................................................................................................................533
Configure Metric Values....................................................................................................... 533
Maximum Values in the Routing Table........................................................................ 533
Change the IS-IS Metric Style in One Level Only......................................................533
Leaks from One Level to Another.................................................................................535
Sample Configurations......................................................................................................... 536
9.10(0.1)
17










