22 iSCSI Optimization........................................................................................ 460
iSCSI Optimization Overview...........................................................................................................460
Monitoring iSCSI Traffic Flows................................................................................................... 462
Application of Quality of Service to iSCSI Traffic Flows............................................................462
Information Monitored in iSCSI Traffic Flows............................................................................462
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................ 463
Configuring Detection and Ports for Dell Compellent Arrays..................................................464
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................464
Enable and Disable iSCSI Optimization..................................................................................... 464
Default iSCSI Optimization Values...................................................................................................465
iSCSI Optimization Prerequisites..................................................................................................... 466
Configuring iSCSI Optimization.......................................................................................................466
Displaying iSCSI Optimization Information.....................................................................................468
23 Intermediate System to Intermediate System..........................................470
IS-IS Protocol Overview................................................................................................................... 470
IS-IS Addressing................................................................................................................................470
Multi-Topology IS-IS.........................................................................................................................471
Transition Mode...........................................................................................................................471
Interface Support........................................................................................................................ 472
Adjacencies..................................................................................................................................472
Graceful Restart................................................................................................................................ 472
Timers.......................................................................................................................................... 472
Implementation Information............................................................................................................ 473
Configuration Information............................................................................................................... 474
Configuration Tasks for IS-IS......................................................................................................474
Configuring the Distance of a Route......................................................................................... 483
Changing the IS-Type.................................................................................................................483
Redistributing IPv4 Routes......................................................................................................... 486
Redistributing IPv6 Routes......................................................................................................... 486
Configuring Authentication Passwords..................................................................................... 487
Setting the Overload Bit............................................................................................................. 488
Debugging IS-IS..........................................................................................................................488
IS-IS Metric Styles.............................................................................................................................490
Configure Metric Values...................................................................................................................490
Maximum Values in the Routing Table...................................................................................... 490
Change the IS-IS Metric Style in One Level Only......................................................................490
Leaks from One Level to Another.............................................................................................. 492
Sample Configurations.....................................................................................................................493
24 Link Aggregation Control Protocol (LACP).............................................. 496
17