Displaying an IPv6 Interface Information
..............................................................................................................
430
Showing IPv6 Routes
...............................................................................................................................................
431
Showing the
Running-Configuration
for an Interface
.........................................................................................
432
Clearing IPv6 Routes
...............................................................................................................................................
432
Configuring
IPv6 RA Guard
..........................................................................................................................................
433
Configuring
IPv6 RA Guard on an Interface
.........................................................................................................
435
Monitoring IPv6 RA Guard
.....................................................................................................................................
435
25 iSCSI Optimization
..................................................................................................................................
436
iSCSI Optimization Overview
.......................................................................................................................................
436
Monitoring iSCSI
Traffic
Flows
...............................................................................................................................
437
Application of Quality of Service to iSCSI
Traffic
Flows
.....................................................................................
438
Information Monitored in iSCSI
Traffic
Flows
.......................................................................................................
438
Detection and
Auto-Configuration
for Dell EqualLogic Arrays
...........................................................................
439
Configuring
Detection and Ports for Dell Compellent Arrays
.............................................................................
439
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer
.................................................................
440
Enable and Disable iSCSI Optimization
.................................................................................................................
440
Default iSCSI Optimization Values
................................................................................................................................
441
iSCSI Optimization Prerequisites
..................................................................................................................................
441
Configuring
iSCSI Optimization
....................................................................................................................................
441
Displaying iSCSI Optimization Information
..................................................................................................................
443
26 Intermediate System to Intermediate System
..........................................................................................
445
IS-IS Protocol Overview
...............................................................................................................................................
445
IS-IS Addressing
.............................................................................................................................................................
445
Multi-Topology IS-IS
......................................................................................................................................................
446
Transition Mode
.......................................................................................................................................................
446
Interface Support
.....................................................................................................................................................
446
Adjacencies
...............................................................................................................................................................
447
Graceful Restart
.............................................................................................................................................................
447
Timers
........................................................................................................................................................................
447
Implementation Information
..........................................................................................................................................
447
Configuration
Information
.............................................................................................................................................
448
Configuration
Tasks for IS-IS
..................................................................................................................................
448
Configuring
the Distance of a Route
.....................................................................................................................
456
Changing the IS-Type
..............................................................................................................................................
456
Redistributing IPv4 Routes
.....................................................................................................................................
459
Redistributing IPv6 Routes
.....................................................................................................................................
459
Configuring
Authentication Passwords
.................................................................................................................
460
Setting the Overload Bit
..........................................................................................................................................
461
Debugging IS-IS
........................................................................................................................................................
461
IS-IS Metric Styles
.........................................................................................................................................................
462
Configure
Metric Values
...............................................................................................................................................
462
Maximum Values in the Routing Table
..................................................................................................................
463
Change the IS-IS Metric Style in One Level Only
................................................................................................
463
Leaks from One Level to Another
..........................................................................................................................
464
Sample
Configurations
..................................................................................................................................................
465
16
Contents