Monitoring iSCSI Traffic Flows................................................................................................... 464
Application of Quality of Service to iSCSI Traffic Flows............................................................464
Information Monitored in iSCSI Traffic Flows............................................................................464
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................ 465
Configuring Detection and Ports for Dell Compellent Arrays..................................................466
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................466
Enable and Disable iSCSI Optimization..................................................................................... 466
Default iSCSI Optimization Values................................................................................................... 467
iSCSI Optimization Prerequisites..................................................................................................... 468
Configuring iSCSI Optimization.......................................................................................................468
Displaying iSCSI Optimization Information..................................................................................... 470
23 Intermediate System to Intermediate System.......................................... 472
IS-IS Protocol Overview................................................................................................................... 472
IS-IS Addressing................................................................................................................................ 472
Multi-Topology IS-IS.........................................................................................................................473
Transition Mode.......................................................................................................................... 474
Interface Support........................................................................................................................ 474
Adjacencies................................................................................................................................. 474
Graceful Restart................................................................................................................................ 474
Timers.......................................................................................................................................... 475
Implementation Information............................................................................................................ 475
Configuration Information............................................................................................................... 476
Configuration Tasks for IS-IS......................................................................................................476
Configuring the Distance of a Route......................................................................................... 485
Changing the IS-Type.................................................................................................................485
Redistributing IPv4 Routes......................................................................................................... 488
Redistributing IPv6 Routes......................................................................................................... 489
Configuring Authentication Passwords..................................................................................... 490
Setting the Overload Bit............................................................................................................. 490
Debugging IS-IS.......................................................................................................................... 491
IS-IS Metric Styles............................................................................................................................. 492
Configure Metric Values...................................................................................................................492
Maximum Values in the Routing Table...................................................................................... 493
Change the IS-IS Metric Style in One Level Only......................................................................493
Leaks from One Level to Another.............................................................................................. 495
Sample Configurations.....................................................................................................................495
24 Link Aggregation Control Protocol (LACP).............................................. 498
Introduction to Dynamic LAGs and LACP....................................................................................... 498
Important Points to Remember................................................................................................. 498
LACP Modes................................................................................................................................499
Komentáře k této Příručce