Dell S6000-ON Switch User Manual


  Open as PDF
of 1100
 
Monitoring IPv6 RA Guard.......................................................................................................... 473
22 iSCSI Optimization.........................................................................................474
iSCSI Optimization Overview........................................................................................................... 474
Monitoring iSCSI Traffic Flows................................................................................................... 476
Application of Quality of Service to iSCSI Traffic Flows............................................................ 477
Information Monitored in iSCSI Traffic Flows............................................................................ 477
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................ 478
Configuring Detection and Ports for Dell Compellent Arrays.................................................. 478
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................479
Enable and Disable iSCSI Optimization......................................................................................479
Default iSCSI Optimization Values...................................................................................................480
iSCSI Optimization Prerequisites......................................................................................................481
Configuring iSCSI Optimization....................................................................................................... 481
Displaying iSCSI Optimization Information..................................................................................... 483
23 Intermediate System to Intermediate System..........................................485
IS-IS Protocol Overview................................................................................................................... 485
IS-IS Addressing................................................................................................................................485
Multi-Topology IS-IS........................................................................................................................ 486
Transition Mode.......................................................................................................................... 487
Interface Support........................................................................................................................ 487
Adjacencies................................................................................................................................. 487
Graceful Restart................................................................................................................................ 487
Timers..........................................................................................................................................488
Implementation Information............................................................................................................488
Configuration Information............................................................................................................... 489
Configuration Tasks for IS-IS..................................................................................................... 489
Configuring the Distance of a Route......................................................................................... 498
Changing the IS-Type.................................................................................................................498
Redistributing IPv4 Routes..........................................................................................................501
Redistributing IPv6 Routes..........................................................................................................502
Configuring Authentication Passwords..................................................................................... 503
Setting the Overload Bit............................................................................................................. 504
Debugging IS-IS..........................................................................................................................504
IS-IS Metric Styles............................................................................................................................. 506
Configure Metric Values...................................................................................................................506
Maximum Values in the Routing Table...................................................................................... 506
Change the IS-IS Metric Style in One Level Only......................................................................506
Leaks from One Level to Another.............................................................................................. 508
Sample Configurations.....................................................................................................................509
17