Configuring iSCSI Optimization
461
On N4000 switches, when the iSCSI CoS mode is disabled, the DCBX iSCSI
Application Priority TLV is not generated by the switch. In either case, if
DCBX is enabled and ports are configured as auto-up or auto-down, the
Application Priority TLVs received from the configuration source are proxied
to the other ports and, on the N4000 series switches, the CoS policy for iSCSI
received via DCBX is applied to iSCSI packets.
When iSCSI CoS mode is enabled, iSCSI login sessions up to the switch
limits are tracked, and data packets for those sessions are given the configured
CoS treatment. iSCSI sessions in excess of the switch limits are not given the
configured CoS treament; therefore, it is not advisable to exceed the iSCSI
session limit. Multiple connections within a session are counted against the
session limit, even though they show in the session table as a single session.
In the switch, iSCSI connections are aged out using the session aging timer. If
the connection has no detected data packets during the timeout period, the
connection is deleted from the switch internal session table. When all
connections associated with a session age out or disconnect, the session is
deleted.
You can configure whether the iSCSI optimization feature uses the VLAN
priority or IP DSCP mapping to determine the traffic class queue. By default,
iSCSI flows are assigned to the highest VLAN priority tag or DSCP value
mapped to the highest queue not used for stack management or voice VLAN.
Use the
classofservice dot1p-mapping
command or the
Quality of Service
→
Class of Service
→
Mapping Table Configuration
page to configure the
relevant Class of Service parameters for the queue in order to complete the
setting.
You can configure whether iSCSI frames are remarked to contain the
configured VLAN priority tag or IP DSCP when forwarded through the
switch.
How Does iSCSI Optimization Use ACLs?
iSCSI Optimization borrows ACL lists from the global system pool. ACL lists
allocated by iSCSI Optimization reduce the total number of ACLs available
for use by the network operator. Enabling iSCSI Optimization uses one ACL
list to monitor for iSCSI sessions. Each monitored iSCSI session utilizes two
rules from additional ACL lists up to a maximum of two ACL lists. This
means that the maximum number of ACL lists allocated by iSCSI is three.
Summary of Contents for N2000 Series
Page 50: ...50 Contents ...
Page 54: ...54 Introduction ...
Page 134: ...134 Using Dell OpenManage Switch Administrator ...
Page 168: ...168 Setting Basic Network Information ...
Page 206: ...206 Managing a Switch Stack ...
Page 242: ...242 Configuring Authentication Authorization and Accounting ...
Page 318: ...318 Managing General System Settings Figure 12 24 Verify MOTD ...
Page 322: ...322 Managing General System Settings ...
Page 358: ...358 Configuring SNMP ...
Page 388: ...388 Managing Images and Files ...
Page 415: ...Monitoring Switch Traffic 415 Figure 16 2 sFlow Agent Summary ...
Page 451: ...Monitoring Switch Traffic 451 5 On the Capture Options dialog click Manage Interfaces ...
Page 458: ...458 Monitoring Switch Traffic ...
Page 488: ...488 Configuring Port Characteristics Figure 18 3 Copy Port Settings 8 Click Apply ...
Page 502: ...502 Configuring Port Characteristics ...
Page 567: ...Configuring Port and System Security 567 Figure 19 38 Captive Portal Client Status ...
Page 674: ...674 Configuring VLANs Figure 21 17 GVRP Port Parameters Table ...
Page 680: ...680 Configuring VLANs Figure 21 24 Double VLAN Port Parameter Table ...
Page 714: ...714 Configuring VLANs ...
Page 737: ...Configuring the Spanning Tree Protocol 737 Figure 22 9 Spanning Tree Global Settings ...
Page 760: ...760 Configuring the Spanning Tree Protocol ...
Page 786: ...786 Discovering Network Devices ...
Page 793: ...Configuring Port Based Traffic Control 793 Figure 24 3 Storm Control 5 Click Apply ...
Page 878: ...878 Configuring Connectivity Fault Management ...
Page 899: ...Snooping and Inspecting Traffic 899 Figure 27 17 DAI Interface Configuration Summary ...
Page 903: ...Snooping and Inspecting Traffic 903 Figure 27 24 Dynamic ARP Inspection Statistics ...
Page 924: ...924 Configuring Link Aggregation Figure 28 7 LAG Hash Summary ...
Page 982: ...982 Configuring Link Aggregation ...
Page 1062: ...1062 Configuring DHCP Server and Relay Settings ...
Page 1096: ...1096 Configuring L2 and L3 Relay Features Figure 34 3 DHCP Relay Interface Summary ...
Page 1200: ...1200 Configuring OSPF and OSPFv3 ...
Page 1216: ...1216 Configuring RIP ...
Page 1240: ...1240 Configuring VRRP ...
Page 1291: ...Configuring Differentiated Services 1291 Figure 40 5 DiffServ Class Criteria ...
Page 1336: ...1336 Configuring Auto VoIP ...
Page 1367: ...Managing IPv4 and IPv6 Multicast 1367 Figure 43 20 IGMP Cache Information ...
Page 1422: ...1422 Managing IPv4 and IPv6 Multicast ...
Page 1440: ...1440 System Process Definitions ...
Page 1460: ...Index 1460 ...