Monitoring IPv6 RA Guard..........................................................................................................473
22 iSCSI Optimization.........................................................................................474
iSCSI Optimization Overview...........................................................................................................474
Monitoring iSCSI Traffic Flows...................................................................................................476
Application of Quality of Service to iSCSI Traffic Flows............................................................477
Information Monitored in iSCSI Traffic Flows............................................................................477
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................478
Configuring Detection and Ports for Dell Compellent Arrays..................................................478
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................479
Enable and Disable iSCSI Optimization......................................................................................479
Default iSCSI Optimization Values...................................................................................................480
iSCSI Optimization Prerequisites......................................................................................................481
Configuring iSCSI Optimization.......................................................................................................481
Displaying iSCSI Optimization Information.....................................................................................483
23 Intermediate System to Intermediate System..........................................485
IS-IS Protocol Overview...................................................................................................................485
IS-IS Addressing................................................................................................................................485
Multi-Topology IS-IS........................................................................................................................486
Transition Mode..........................................................................................................................487
Interface Support........................................................................................................................487
Adjacencies.................................................................................................................................487
Graceful Restart................................................................................................................................487
Timers..........................................................................................................................................488
Implementation Information............................................................................................................488
Configuration Information...............................................................................................................489
Configuration Tasks for IS-IS.....................................................................................................489
Configuring the Distance of a Route.........................................................................................498
Changing the IS-Type.................................................................................................................498
Redistributing IPv4 Routes..........................................................................................................501
Redistributing IPv6 Routes..........................................................................................................502
Configuring Authentication Passwords.....................................................................................503
Setting the Overload Bit.............................................................................................................504
Debugging IS-IS..........................................................................................................................504
IS-IS Metric Styles.............................................................................................................................506
Configure Metric Values...................................................................................................................506
Maximum Values in the Routing Table......................................................................................506
Change the IS-IS Metric Style in One Level Only......................................................................506
Leaks from One Level to Another..............................................................................................508
Sample Configurations.....................................................................................................................509
17