Cisco MDS 9000 NX-OS and SAN-OS Software

Cisco MDS 9000 Family NX-OS Master Index

  • Viewing Options

  • PDF (1.2 MB)
  • Feedback
Master Index

Table Of Contents

Symbols - Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Z

Master Index

The following MDS NX-OS configuration guide abbreviations are used in the Master Index.

DMM - Data Mobility Manager Configuration Guide

IOA- I/O Accelerator Configuration Guide

Fabric - Fabric Configuration Guide

IVR - Inter-VSAN Routing Configuration Guide

Intf - Interfaces Configuration Guide

Ipsvc- IP Services Configuration Guide

Sec- Security Configuration Guide

Sysmgnt - System Management Configuration Guide

Limits - Configuration Limits

SME - Storage Media Encryption Guide


* (asterisk)

autolearned entries sec:9-14

first operational port Intf:5-21

host time stamps Fabric:11-30

port security wildcard sec:9-10

port security wildcards sec:9-10

+153646 Fabric:11-38

+840266 Fabric:11-36


12-port 4-Gbps switching modules

configuration guidelines Intf:3-18

default settings Intf:3-40

See also switching modules

16-port switching modules

LEDs Intf:2-16

See also switching modules

24-port 4-Gbps switching modules

bandwidth fairness Intf:3-32

configuration guidelines Intf:3-17

default settings Intf:3-40

example configurations Intf:3-37, Intf:3-39

oversubscription Intf:3-26

shared resources Intf:3-9

See also switching modules

24-port 8-Gbps switching modules

default settings Intf:3-41

32-port switching modules

SPAN guidelines sysmgnt:11-6

See also switching modules

3DES encryption

IKE sec:7-7

IPsec sec:7-6

4/44-port 8-Gbps switching modules

default settings Intf:3-41

48-port 4-Gbps switching modules

bandwidth fairness Intf:3-32

configuration guidelines Intf:3-17

default settings Intf:3-40

example configurations Intf:3-38, Intf:3-39

oversubscription Intf:3-26

shared resources Intf:3-9

See also switching modules

48-port 8-Gbps switching modules

default settings Intf:3-41

example configurations Intf:3-36

See also switching modules

4-port 10-Gbps switching modules

configuration guidelines Intf:3-18

default settings Intf:3-40

See also switching modules



authentication process sec:4-7

authorization process sec:4-7

configuring accounting servicessec:4-53to sec:4-54

default settings sec:4-58

description sec:4-1

DHCHAP authentication sec:8-9

displaying error-enabled status sec:4-6

enabling server distribution sec:4-46

local services sec:4-52

remote services sec:4-4

setting authentication sec:4-52

starting a distribution session sec:4-46

AAA servers

groups sec:4-4

monitoring sec:4-6

remote authentication sec:4-4

about DMM DMM:1-1

Access Control Lists. See IPv4-ACLs; IPv6-ACLs


configuring servicessec:4-53to sec:4-54

ACL adjacency sharing

disabling for downgrading Intf:3-35

active-passive arrays DMM:3-15

active zone sets

considerations Fabric:5-4

enabling distribution Fabric:5-15

address allocation cache

description sysmgnt:9-22

administrative speeds

configuring Intf:2-14

administrative states

description Intf:2-8

setting Intf:2-12

administrator passwords

recovering (procedure sec:3-22


IVR configuration IVR:2-1

IVR zone zones and zone sets IVR:2-17

Advanced Encrypted Standard encryption. See AES encryption

advertisement packets

setting time intervals 5:4-13

AES encryption

description sysmgnt:7-4

IKE sec:7-7

IPsec sec:7-6

SNMP support sysmgnt:7-4


IPsec sec:7-7


configuring default IVR:2-6

configuring individual IVR:2-7

description IVR:1-4, IVR:2-5, IVR:2-9

guidelines IVR:2-6

verifying database configuration IVR:2-7

ALPA caches

allocation Intf:2-31

clearing Intf:2-32

description Intf:2-30

displaying contents Intf:2-32

inserting entries manually Intf:2-32

ARP caches

clearing 7:7-9

displaying 7:7-9

Array-Specific Library. See ASL



fabric security sec:8-1

guidelines sec:4-4

local sec:4-3

MD5 5:4-14

remote sec:4-3, sec:4-4

simple text 5:4-14

user IDs sec:4-3

See also MD5 authentication

See also simple text authentication

authentication, authorization, and accounting. See AAA


role-based sec:3-1

rule placement order sec:3-4

Auto mode

configuration IVR:1-12

auto mode

configuring Intf:2-13


configuring Gigabit Ethernet interfaces 7:7-3

autonomous fabric ID


autonomous fabric identifiers. See AFIDs


description sysmgnt:4-5

auto port mode

description Intf:2-7

interface configuration Intf:2-3

autosensing speed

Generation 2 switching modules Intf:2-15

auto topology mode

configuration guidelines IVR:1-9

enabling IVR:1-12


bandwidth fairness

disabling Intf:3-33

enabling Intf:3-32

Generation 2 switching modules Intf:3-32


IVR configuration IVR:1-1

basic configuration

task list IVR:1-6


FICON port swapping Fabric:11-37

reason codes Intf:2-9

beacon modes

configuring Intf:2-17

identifying LEDs Intf:2-16

best practices DMM:6-1

bit errors

reasons Intf:2-18

bit error thresholds

configuring Intf:2-17

description Intf:2-17

border switches

description IVR:1-4

IVR configuration guidelines IVR:2-9

B port mode

description Intf:2-7

interface modes Intf:2-7

B ports

configuring 2:2-21

interoperability mode 2:2-19

SAN extenders 2:2-20

bridge port mode. See B port mode

bridge ports. See B ports


routing Fabric:7-12


native interop mode Fabric:12-14

buffer sizes

configuring in FCIP profiles 2:2-16

buffer-to-buffer credits. See BB_credits

build fabric frames

description sysmgnt:9-3


Call Home

alert groupssysmgnt:4-10to sysmgnt:4-13

AutoNotify feature sysmgnt:4-5

CFS support sysmgnt:2-2

configuration distribution sysmgnt:4-21

configuringsysmgnt:4-6to sysmgnt:4-23

configuring e-mail options sysmgnt:4-16

configuring SMTP servers sysmgnt:4-17

contact information sysmgnt:4-7

database merge guidelines sysmgnt:4-23

default settings sysmgnt:4-44

description sysmgnt:4-1

destination profilessysmgnt:4-8to sysmgnt:4-10

duplicate message throttle sysmgnt:4-20

enabling sysmgnt:4-21

features sysmgnt:4-2

inventory notifications sysmgnt:4-19

message format options sysmgnt:4-3

RMON-based alerts sysmgnt:4-15

syslog-based alerts sysmgnt:4-14

testing communications sysmgnt:4-23

Call Home alert groups

configuring sysmgnt:4-10, sysmgnt:4-11

customizing messages sysmgnt:4-12

description sysmgnt:4-10

verifying customization configuration sysmgnt:4-13

Call Home contacts

assigning information sysmgnt:4-7

Call Home destination profiles

attributes sysmgnt:4-8

configuring sysmgnt:4-9

displaying sysmgnt:4-24

Call Home messages

configuring levels sysmgnt:4-14

format options sysmgnt:4-3

Call Home notifications

full-txt format for syslog sysmgnt:4-27

XML format for RMON sysmgnt:4-31

XML format for syslog sysmgnt:4-28


authenticating sec:6-8

certificate download example sec:6-19

configuringsec:6-6to sec:6-15

creating a trust point sec:6-8

default settings sec:6-39

deleting digital certificates sec:6-14

descriptionsec:6-1to sec:6-5

displaying configuration sec:6-16

enrollment using cut-and-paste sec:6-4

example configurationsec:6-16to sec:6-38

identity sec:6-2

maintaining sec:6-13

maximum limits sec:6-38

monitoring sec:6-13

multiple sec:6-4

multiple trust points sec:6-3

peer certificates sec:6-5

purpose sec:6-2



certificate authorities. See CAs

certificate revocation lists. See CRLs


application requirements sysmgnt:2-5

default settings sysmgnt:2-19

disabling on a switch sysmgnt:2-4

displaying status on a switch sysmgnt:2-5

distribution modes sysmgnt:2-3

distribution over IP sysmgnt:2-11

distribution scopes sysmgnt:2-3

enabling on a switch sysmgnt:2-4

feature description sysmgnt:2-2

logging configuration distribution sysmgnt:3-10

merge support sysmgnt:2-9

protocol description sysmgnt:2-3

SAN-OS features supported sysmgnt:2-2

saving configurations sysmgnt:2-8

verifying CFS merge status sysmgnt:2-9

CFS applications

clearing session locks sysmgnt:2-8

committing changes sysmgnt:2-7

discarding changes sysmgnt:2-8

enabling sysmgnt:2-5

fabric locking sysmgnt:2-6

verifying lock status sysmgnt:2-7

verifying registration status sysmgnt:2-6

CFS over IP

configuring IP multicast addresses sysmgnt:2-13

configuring static IP peers sysmgnt:2-14

default settings sysmgnt:2-19

description sysmgnt:2-11

enabling sysmgnt:2-12

verifying configuration sysmgnt:2-13

verifying multicast address sysmgnt:2-14, sysmgnt:2-15

CFS regions

assigning features sysmgnt:2-18

creating sysmgnt:2-18

description sysmgnt:2-16

displaying sysmgnt:2-19

moving a feature sysmgnt:2-18

removing a feature sysmgnt:2-19

using CLI sysmgnt:2-18


configuring Fabric:12-1

description Fabric:12-1

displaying information Fabric:12-3

CIM servers

displaying information Fabric:12-3, Fabric:12-5

Cisco Access Control Server. See Cisco ACS

Cisco ACS

configuring for RADIUSsec:4-55to sec:4-58

configuring for TACACS+sec:4-55to sec:4-58


specifying for SNMPv3 sec:4-29

Cisco Discovery Protocol. See CDP

Cisco SME

required engines IOA:B-5

Cisco vendor ID

description sec:4-28

CLI command reference DMM:A-1


quorum IOA:B-1

reviving IOA:B-8

code pages

FICON text string formatting Fabric:11-20



Delete DMM:5-49

GUI DMM:5-48

Modify DMM:5-49

Start DMM:5-49

Stop DMM:5-49

Verify DMM:5-48

command scheduler

configuring sysmgnt:5-2

default settings sysmgnt:5-11

defining jobs sysmgnt:5-4

deleting jobs sysmgnt:5-6

description sysmgnt:5-1

enabling sysmgnt:5-3

execution logs sysmgnt:5-9

specifying schedulessysmgnt:5-6to sysmgnt:5-9

verifying execution status sysmgnt:5-9

See also execution logs; jobs; schedules

Common Information Model. See CIM

common roles

configuring sec:3-9

common users

mapping CLI to SNMP sec:3-10

company IDs

FC ID allocations Fabric:12-11


saving automatically for FICON Fabric:11-22

configuration files

FICON Fabric:11-33

configuration limits IVR:1-4

description (table) limits:12-1

Configuring DMM:5-20, DMM:5-27

configuring IP connectivity DMM:2-4

configuring NPV Intf:6-9

congestion window monitoring. See CWM

console logging

configuring sysmgnt:3-4

console sessions

message logging severity levels sysmgnt:3-4

contact information

assigning for Call Home sysmgnt:4-7

Contiguous Domain ID Assignments

About sysmgnt:9-14

contract IDs

description sysmgnt:4-37

Control Unit Port. See CUP in-band management

core dumps

IPS modules 6:6-4

Creating DMM:5-12


configuring sec:6-14

configuring revocation checking methods sec:6-9

description sec:6-5

downloading example sec:6-34

generation example sec:6-33

crypto IPv4-ACLs

any keyword sec:7-20

configuration guidelines sec:7-17

creating sec:7-21

creating crypto map entries sec:7-24

mirror images sec:7-19

crypto map entries

configuring global lifetime values sec:7-29

global lifetime values sec:7-28

setting SA lifetimes sec:7-25

crypto maps

auto-peer option sec:7-26

configuration guidelines sec:7-24

configuring autopeer option sec:7-26

configuring perfect forward secrecy sec:7-27

creating entries sec:7-24

entries for IPv4-ACLs sec:7-23

perfect forward secrecy sec:7-27

SA lifetime negotiations sec:7-25

SAs between peers sec:7-23

crypto map sets

applying to interfaces sec:7-27

CUP in-band management

blocking restriction Fabric:11-25

description Fabric:11-42

displaying information Fabric:11-43

placing CUPs in zones Fabric:11-43

current VSANs

description IVR:1-3


configuring in FCIP profiles 2:2-15


Data Encryption Standard encryption. See DES encryption

data migration

lifecycle DMM:1-6

planning DMM:4-1

software requirements DMM:1-9

Data Migration Status display DMM:5-3

data migration wizards DMM:5-2

dead time intervals

configuring for FSPF Fabric:7-8

description Fabric:7-7

dedicated rate mode

description Intf:3-6

migrating from shared rate mode Intf:3-16, Intf:3-17

migrating to shared rate mode Intf:3-16, Intf:3-17

default gateways. See IPv4 default gateways

default networks. See IPv4 default networks

default settings

EEM sysmgnt:6-13

default VSANs

description Fabric:2-9

default zones

configuring access permissions Fabric:5-11

configuring QoS priorities Fabric:5-20

description Fabric:5-10

interoperability Fabric:12-14

policies Fabric:5-10

delayed server reconfiguration DMM:1-6

DES encryption

IKE sec:7-7

IPsec sec:7-6

destination IDs

exchange based Intf:5-5

flow based Intf:5-4

in-order delivery Fabric:7-13

path selection Fabric:2-11

destination profiles

configuring sysmgnt:4-8

device alias database

committing changes Fabric:6-6

disabling distribution Fabric:6-7

discarding changes Fabric:6-6

distribution to fabric Fabric:6-5

enabling distribution Fabric:6-7

merging Fabric:6-9

overriding fabric lock Fabric:6-7

device aliases

CFS support sysmgnt:2-2

clearing statistics Fabric:6-9

comparison with zones (table) Fabric:6-4

creating Fabric:6-5

default settings Fabric:6-12

description Fabric:6-1

displaying informationFabric:6-9to Fabric:6-11

features Fabric:6-3

modifying the database Fabric:6-4

requirements Fabric:6-3

device allegiance

FICON Fabric:11-22

device IDs

Call Home format sysmgnt:4-37


IKE sec:7-7


AAA authentication sec:8-9

authentication modes sec:8-4

compatibility with other SAN-OS features sec:8-3

configuringsec:8-2to sec:8-11

configuring AAA authentication sec:8-9

default settings sec:8-13

description sec:8-2

displaying security information sec:8-10

enabling sec:8-4

group settings sec:8-6

hash algorithms sec:8-5

licensing sec:8-2

passwords for local switches sec:8-7

passwords for remote devices sec:8-8

sample configurationsec:8-11to sec:8-12

timeout values sec:8-9

See also FC-SP

differentiated services code point. See DSCP

Diffie-Hellman Challenge Handshake Authentication Protocol. See DHCHAP

Diffie-Hellman protocol. See DH

digital certificates

configuringsec:6-6to sec:6-15

default settings sec:6-39

deleting from CAs sec:6-14

descriptionsec:6-1to sec:6-5

exporting sec:6-5, sec:6-13

generating requests for identity certificates sec:6-10

importing sec:6-5, sec:6-13

installing identity certificates sec:6-11

IPsecsec:7-7to sec:7-10

maintaining sec:6-13

maximum limits sec:6-38

monitoring sec:6-13

peers sec:6-5

purpose sec:6-2

requesting identity certificate example sec:6-24

revocation example sec:6-30

SSH support sec:3-20

digital signature algorithm. See DSA key pairs

direct memory access devices. See DMA-bridges


displaying statistics 6:6-10


best practices DMM:6-1

command reference DMM:A-1

configuring migration rate DMM:2-21

server-based migration DMM:1-4

topologies DMM:3-1


default settings 5:4-15

DNS servers

configuring 5:4-14

domain ID

CFS support sysmgnt:2-2

domain IDs

allowed lists sysmgnt:9-10

assignment failures Intf:2-10

configuring allowed lists sysmgnt:9-11

configuring CFS distributionsysmgnt:9-11to sysmgnt:9-14

configuring fcalias members Fabric:5-11

contiguous assignments sysmgnt:9-14

description sysmgnt:9-8

distributing sysmgnt:9-2

enabling contiguous assignments sysmgnt:9-14

interoperability Fabric:12-14

IVR configuration guidelines IVR:2-8

non-unique and IVR NAT IVR:1-10

preferred sysmgnt:9-9

static sysmgnt:9-9

unique IVR:2-8

domain manager

fast restart feature sysmgnt:9-4

isolation Intf:2-10


disabling ACL adjacency sharing Intf:3-35


CFS support sysmgnt:2-2

default settings Fabric:4-14

description Fabric:4-1

displaying configurations Fabric:4-10

enabling Fabric:4-2

requirements Fabric:4-2

sample configurationFabric:4-11to Fabric:4-14

DPVM databases

autolearned entries Fabric:4-4

clearing Fabric:4-5

comparing differences Fabric:4-9

copying Fabric:4-9

description Fabric:4-3

displaying Fabric:4-11

enabling autolearning Fabric:4-5

merging guidelines Fabric:4-8

drop latency time

configuring for FSPF in-order delivery Fabric:7-16

displaying information Fabric:7-17

DSA key-pairs

generating sec:3-16

dsa key pairs

generating sec:3-16


configuring 2:2-22

dynamic bandwidth management

description Intf:3-8

Dynamic Port VSAN Membership. See DPVM



FICON string format Fabric:11-20

edge switches

description IVR:1-4

edge VSANs

description IVR:1-3


actions sysmgnt:6-4

activating a script policy sysmgnt:6-10

configuring action statements sysmgnt:6-8

configuring event statements sysmgnt:6-7

default settings sysmgnt:6-13

defining an environment variable sysmgnt:6-12

defining a policy sysmgnt:6-6

defining script policies sysmgnt:6-10

environment variables sysmgnt:6-4

event logs sysmgnt:6-2

events sysmgnt:6-3

example configuration sysmgnt:6-13

guidelines sysmgnt:6-5

high availability sysmgnt:6-5

licensing requirements sysmgnt:6-5

limitations sysmgnt:6-5

override policy sysmgnt:6-2

override policy (note) sysmgnt:6-2

override policy actions (note) sysmgnt:6-4

overriding a system policy sysmgnt:6-11

parameter substitution sysmgnt:6-4

policies sysmgnt:6-2

prerequisites sysmgnt:6-5

registering a script policy sysmgnt:6-10

script policies sysmgnt:6-4

system policies sysmgnt:6-2

verifying configuration sysmgnt:6-12

EEM overriding a system policy (example) sysmgnt:6-13


fabric binding sec:10-1


PortChannel links Intf:5-2

e-mail addresses

assigning for Call Home sysmgnt:4-7

e-mail notifications

Call Home sysmgnt:4-1

embedded event manager. See EEM

enabling DMM DMM:2-8


configuring DMM:4-5

encrypted passwords

user accounts sec:3-13

enhanced ISLs. See EISLs

enhanced zones

advantages over basic zones Fabric:5-31

broadcast frames Fabric:5-37

changing from basic zones Fabric:5-32

configuring default full database distribution Fabric:5-38

configuring default switch-wide zone policies Fabric:5-38

creating attribute groups Fabric:5-34

default settings Fabric:5-43

description Fabric:5-31

displaying informationFabric:5-39to Fabric:5-41

enabling Fabric:5-33

merging databases Fabric:5-35

modifying database Fabric:5-34

E port mode

classes of service Intf:2-4

description Intf:2-4

E ports

32-port guidelines Intf:2-2

32-port switching module configuration guidelines Intf:5-8

configuring Intf:2-13, 2:2-22

fabric binding checking sec:10-2

FCS support sysmgnt:10-1

FSPF topologies Fabric:7-2

isolation Intf:2-10

recovering from link isolations Fabric:5-15

SPAN sources sysmgnt:11-3

error reason codes DMM:6-12

Ethernet MAC statistics

displaying 6:6-10

Ethernet PortChannels

adding Gigabit Ethernet interfaces 6:6-9

configuring 6:6-8

description 6:6-7

redundancy 2:2-6

Exchange Fabric Membership Data. See EFMD sec:10-1

exchange IDs

in-order delivery Fabric:7-13

path selection Fabric:2-11

exchange link parameter. See ELP

execution logs

clearing log files sysmgnt:5-10

configuring sysmgnt:5-10

description sysmgnt:5-9

displaying configuration sysmgnt:5-10

displaying log file contents sysmgnt:5-10

existing storage

about DMM:1-2

configuring DMM:4-2

expansion port mode. See E port mode

Extended Binary-Coded Decimal Interchange Code. See EBCDIC Fabric:11-20


fabric binding

activation sec:10-4

checking for Ex ports sec:10-2

clearing statistics sec:10-6

compatibility with DHCHAP sec:8-3

configurationsec:10-3to sec:10-6

default settings sec:10-9

deleting database sec:10-6

descriptionsec:10-1to sec:10-2

EFMD sec:10-1

enforcement sec:10-2

forceful activation sec:10-5

licensing requirements sec:10-1

port security comparison sec:10-1

saving configurations sec:10-5

verifying configurationsec:10-6to sec:10-9

Fabric Configuration Server. See FCS

Fabric Configuration Servers. See FCSs

Fabric-Device Management Interface. See FDMI

fabric login. See FLOGI

fabric loop port mode. See FL port mode

Fabric Manager IVR:1-7

fabric port mode. See F port mode

fabric pWWNs

zone membership Fabric:5-2

fabric reconfiguration

fcdomain phase sysmgnt:9-2


See also build fabric frames

fabrics. See RCFs; build fabric frames

fabric security

authentication sec:8-1

default settings sec:8-13

Fabric Shortest Path First. See FSPF

fabric WWNs. See fWWNs

facility logging

configuring message severity levels sysmgnt:3-6

fault tolerant fabrics

example (figure) Fabric:7-2


cloning Fabric:5-18

configuring for zones Fabric:5-11

creating Fabric:5-11

renaming Fabric:5-18


logging facility sysmgnt:3-2


autoreconfigured merged fabrics sysmgnt:9-7

configuring CFS distributionsysmgnt:9-11to sysmgnt:9-14

default settings sysmgnt:9-22

description sysmgnt:9-2

disabling sysmgnt:9-6

displaying informationsysmgnt:9-19to sysmgnt:9-22

domain IDs sysmgnt:9-8

domain manager fast restart sysmgnt:9-4

enabling sysmgnt:9-6

enabling autoreconfiguration sysmgnt:9-7

incoming RCFs sysmgnt:9-6

initiation sysmgnt:9-5

overlap isolation Intf:2-10

restarts sysmgnt:9-3

switch priorities sysmgnt:9-5


configuring IVR:2-16

features and benefits IVR:2-14

guidelines IVR:2-15

FC ID allocation

FICON implementation Fabric:11-14


allocating Fabric:12-11, sysmgnt:9-2

allocating default company ID lists Fabric:12-11

allocating for FICON Fabric:11-14

allocation for HBAs Fabric:12-11

configuring fcalias members Fabric:5-11

description sysmgnt:9-14


advanced features 2:2-24

compatibility with DHCHAP sec:8-3

compression 2:2-34

default parameters 2:2-36

discarding packets 2:2-19

enabling 2:2-8

FICON support Fabric:11-4

Gigabit Ethernet ports 7:7-1

IPS modules 2:2-2

IP storage services support 6:6-1

link failures 2:2-5

MPS-14/2 module 2:2-2

reserving ports for FICON Fabric:11-13

sample IPsec configurationsec:7-34to sec:7-38

tape acceleration2:2-28to 2:2-34

time stamps 2:2-19

VE ports 2:2-2

virtual ISLs 2:2-2

VRRP 2:2-6

write acceleration 2:2-25

FCIP compression

configuring 2:2-35

description 2:2-34

displaying information 2:2-35

FCIP interfaces

binding to FICON port numbers Fabric:11-24

configuring peers 2:2-17

configuring QoS 2:2-22

creating 2:2-17

displaying information 2:2-22

parameters 2:2-4

SPAN sources sysmgnt:11-3

FCIP links

B port interoperability mode 2:2-19

configuring 2:2-8

configuring peers 2:2-17

configuring QoS 2:2-22

creating 2:2-10

description 2:2-3

endpoints 2:2-3

initiating IP connections 2:2-18

TCP connections 2:2-3

FCIP listener ports

configuring 2:2-11

FCIP peers

configuring IP addresses 2:2-18

FCIP profiles

configuring listener ports 2:2-11

creating 2:2-9

description 2:2-4

displaying information 2:2-9

FCIP tape acceleration

configuring 2:2-32

description2:2-28to 2:2-32

displaying information 2:2-33

FCIP TCP parameters

configuring buffer size 2:2-16

configuring CWM 2:2-15

configuring keepalive timeouts 2:2-12

configuring maximum jitter 2:2-15

configuring maximum retransmissions 2:2-13

configuring minimum retransmit timeouts 2:2-12

configuring PMTUs 2:2-13

configuring SACKs 2:2-13

configuring window management 2:2-14

displaying 2:2-16, 2:2-17

FCIP write acceleration

configuring 2:2-27

description 2:2-25

displaying information 2:2-27


intermixing protocols Fabric:11-5

FC Redirect DMM:3-1


description sysmgnt:10-1

logging facility sysmgnt:3-2

significance sysmgnt:10-2


authentication sec:8-1

enabling sec:8-4

See also DHCHAP


configuring names sysmgnt:10-3

default settings sysmgnt:10-7

description sysmgnt:10-1


CFS support sysmgnt:2-2

displaying configured values Fabric:12-9

distribution Fabric:12-7


description Fabric:9-6

displaying database information Fabric:9-6

Federal Information Processing Standards. See FIPS

Fiber Channel interfaces

configuring system default port mode f Intf:2-13

Fibre Channel

sWWNs for fabric binding sec:10-4

time out valuesFabric:12-5to Fabric:12-9

Fibre Channel Analyzers

configuring using SPAN sysmgnt:11-13

Fibre Channel analyzers

monitoring without SPAN sysmgnt:11-11

Fibre Channel domains. See fcdomains

Fibre Channel header modifications IVR:1-5

Fibre Channel interface

default settings Intf:2-45

Fibre Channel interfaces

administrative states Intf:2-8

characteristicsIntf:2-2to Intf:2-12

configuring Intf:2-11

configuring auto port mode Intf:2-13

configuring beacon modes Intf:2-17

configuring bit error thresholds Intf:2-17

configuring descriptions Intf:2-15

configuring frame encapsulation Intf:2-16

configuring port modes Intf:2-13

configuring speeds Intf:2-14

deleting from PortChannels Intf:5-15

disabling Intf:2-12

displaying capabilities on Generation 2 switching modules Intf:3-15

displaying informationIntf:2-20to Intf:2-27

displaying VSAN membership Fabric:2-8

enabling Intf:2-12

graceful shutdown Intf:2-12

modesIntf:2-3to Intf:2-7

operational states Intf:2-8

reason codes Intf:2-8

states Intf:2-7

taking out of service on Generation 2 switching modules Intf:3-33

troubleshooting operational states Intf:2-9

See also interfaces Intf:2-7

Fibre Channel over IP. See FCIP

Fibre Channel Protocol. See FCP

Fibre Channel Security Protocol. See FC-SP

Fibre Channel traffic

SPAN sources sysmgnt:11-3

Fibre Connection. See FICON


advantages on MDS switchesFabric:11-3to Fabric:11-7

automatic configuration save Fabric:11-23

basic configuration Fabric:11-16

cascading Fabric:11-7

clearing device allegiance Fabric:11-22

configuration files Fabric:11-32

configuring<$11-22 Fabric:11-15

configuring portsFabric:11-24to Fabric:11-32

CUP in-band management Fabric:11-42

default settings Fabric:11-51

descriptionFabric:11-1to Fabric:11-7

displaying informationFabric:11-44to Fabric:11-51

fabric binding requirements sec:10-3

FC4 protocols Fabric:11-2

FC ID allocations Fabric:11-14

FCIP support Fabric:11-4

host timestamp control Fabric:11-21

implemented ports Fabric:11-11

installed ports Fabric:11-11

manually enabling Fabric:11-19

MDS-supported features Fabric:11-5

PortChannel support Fabric:11-4

port numberingFabric:11-7to Fabric:11-14

port swappingFabric:11-36to Fabric:11-38

prohibited ports Fabric:11-48

RLIRs Fabric:11-27

saving configuration changes Fabric:11-22

sWWNs for fabric binding sec:10-4

text string formatting codes Fabric:11-20

unimplemented port Fabric:11-11

VSAN offline state Fabric:11-42

FICON configuration files

applying to running configuration Fabric:11-33

copying Fabric:11-35

description Fabric:11-33

displaying Fabric:11-34

displaying information Fabric:11-46

editing Fabric:11-33

FICON port numbers

assigning to slots Fabric:11-12

default numbering scheme Fabric:11-8

displaying assignments Fabric:11-12

FCIP interfaces Fabric:11-13

implemented addresses Fabric:11-11

installed ports Fabric:11-11

logical interfaces Fabric:11-13

numbering guidelines Fabric:11-12

PortChannel interfaces Fabric:11-13

port swapping Fabric:11-10

reserved numbering scheme Fabric:11-11

unimplemented addresses Fabric:11-11

uninstalled ports Fabric:11-11

FICON ports

assigning address names Fabric:11-27

binding to FCIP interfaces Fabric:11-24

binding to PortChannels Fabric:11-24

blocking Fabric:11-25

configuring prohibiting default state Fabric:11-26

displaying address information Fabric:11-45

displaying administrative states Fabric:11-48

prohibiting Fabric:11-25

swapping configurations Fabric:11-37

FICON port swapping

guidelines Fabric:11-37

FICON tape acceleration

configuration considerations Fabric:11-40

configuring Fabric:11-40

description Fabric:11-38, Fabric:11-40, Fabric:11-42

FICON tape read acceleration

configuring Fabric:11-41

File Transfer Protocol. See FTP


configuration guidelines sec:2-1

self-tests sec:2-2


description Fabric:9-1

displaying details Fabric:9-1

logging facility sysmgnt:3-2

flow statistics

clearing Fabric:7-18

counting Fabric:7-18

description Fabric:7-17

displaying Fabric:7-18

FL port mode

classes of service Intf:2-5

description Intf:2-5

FL ports

configuring Intf:2-13

description Intf:2-5

DPVM support Fabric:4-4

nonparticipating code Intf:2-10

persistent FC IDs sysmgnt:9-15

SPAN sources sysmgnt:11-3

See also Fx ports

F port mode

classes of service Intf:2-5

description Intf:2-5

F ports

configuring Intf:2-13

description Intf:2-5

DPVM support Fabric:4-4

SPAN sources sysmgnt:11-3

See also Fx ports


load balancing (example) 2:2-5

frame encapsulation

configuring Intf:2-16


configuring MTU size 7:7-3


displaying databases Fabric:10-3


clearing counters Fabric:7-9

clearing VSAN counters Fabric:7-6

computing link cost Fabric:7-7

configuring globallyFabric:7-4to Fabric:7-6

configuring Hello time intervals Fabric:7-7

configuring link cost Fabric:7-6

configuring on a VSAN Fabric:7-5

configuring on interfacesFabric:7-6to Fabric:7-9

dead time intervals Fabric:7-7

default settings Fabric:7-21

description Fabric:7-2

disabling Fabric:7-6

disabling on interfaces Fabric:7-9

disabling routing protocols Fabric:7-6

displaying database information Fabric:7-20

displaying global information Fabric:7-19

enabling Fabric:7-6

fail-over with PortChannels Fabric:7-3

fault tolerant fabrics Fabric:7-2

flow statisticsFabric:7-17to Fabric:7-19

in-order deliveryFabric:7-13to Fabric:7-17

interoperability Fabric:12-15

link state record defaults Fabric:7-4

multicast root switches Fabric:7-12

reconvergence times Fabric:7-2

redundant links Fabric:7-3

resetting configuration Fabric:7-5

resetting to defaults Fabric:7-5

retransmitting intervals Fabric:7-8

routing services Fabric:7-1

topology examplesFabric:7-2to Fabric:7-4

FSPF multicast roots

configuring switches Fabric:7-12

FSPF routes

configuring Fabric:7-10

description Fabric:7-10

FSPF routing

multicast Fabric:7-12


logging facility sysmgnt:3-2

full core dumps

IPS modules 6:6-4

full zone sets

considerations Fabric:5-4

enabling distribution Fabric:5-15


configuring fcalias members Fabric:5-11

Fx ports

32-port default Intf:2-3

configuring Intf:2-13

description Intf:2-7

FCS sysmgnt:10-1

FCS support sysmgnt:10-1

interface modes Intf:2-7

VSAN membership Fabric:2-4

See also F ports; FL ports Intf:2-7


Generation 1 switching modules

port index allocations Intf:3-10

Generation 2 switching modules

configuring port speeds Intf:3-19

configuring rate modes Intf:3-21

default settings Intf:3-40

descriptionIntf:3-1to Intf:3-3

disabling ACL adjacency sharing Intf:3-35

displaying port resources Intf:3-34

dynamic bandwidth management Intf:3-8

example configurationsIntf:3-36to Intf:3-40

interface capabilities Intf:3-15

out-of-service interfaces Intf:3-8

port groups Intf:3-3

port index allocations Intf:3-10

port rate modes Intf:3-4

recovering from powered-down state Intf:3-12

releasing shared resources Intf:3-34

taking interfaces out of service Intf:3-33

Generation 3 switching modules

default settings Intf:3-41

Gigabit Ethernet interfaces

configuring auto-negotiation 7:7-3

configuring high availability6:6-5to 6:6-9

configuring IPv4 7:7-2

configuring IPv6 addresses 8:8-19

configuring MTU frame sizes 7:7-3

configuring promiscuous mode 7:7-4

configuring static IPv4 routing 7:7-7

configuring VRRP 6:6-6

default parameters 7:7-10

displaying statistics6:6-9to 6:6-13

IPv4-ACL guidelines 7:7-7

subinterfaces 7:7-6

subnet requirements 7:7-6

verifying connectivity 7:7-4

Gigabit Ethernet subinterfaces

configuring VLANs 7:7-6

global keys

assigning for RADIUS sec:4-24

guidelines for deploying DMM DMM:2-3


hard zoning

description Fabric:5-14

HBA ports

configuring area FCIDs sysmgnt:9-17


device aliases Fabric:6-1

FC ID allocations Fabric:12-11

Hello time intervals

configuring for FSPF Fabric:7-7

description Fabric:7-7

heterogeneous SANs DMM:3-1

high availability

compatibility with DHCHAP sec:8-3

EEM sysmgnt:6-5

Ethernet PortChannels 2:2-6

Fibre Channel PortChannels 2:2-7

VRRP 2:2-6

homogeneous SANs DMM:3-1

host control

FICON Fabric:11-20

host keys

assigning sec:4-22

host names

configuring for digital certificates sec:6-6



FICON support Fabric:11-4


displaying statistics 6:6-12

IPv6 8:8-13

ICMP packets

IPv6 header format, figure 8:8-13

type value sec:5-4


Cisco vendor ID sec:4-28

contract IDs sysmgnt:4-37

serial IDs sysmgnt:4-37, sysmgnt:4-42

site IDs sysmgnt:4-36


algorithms for authentication sec:7-7

default settings sec:6-39, sec:7-40

description sec:7-3

displaying configurations sec:7-29

enabling sec:7-11

initializing sec:7-10

refreshing SAs sec:7-16

terminology sec:7-5

transforms for encryption sec:7-7

IKE domains

clearing sec:7-16

configuring sec:7-11

description sec:7-11

IKE initiators

configuring version sec:7-16

displaying configuration sec:7-30

IKE peers

configuring keepalive times sec:7-15

displaying keepalive configuration sec:7-29

IKE policies

configuring lifetime associations sec:7-15

configuring negotiation parameters sec:7-13

displaying current policies sec:7-30

negotiation sec:7-11

IKE tunnels

clearing sec:7-16

description sec:7-11

in-band management

CUP Fabric:11-42

IPFC 5:4-7

in-order delivery

configuring drop latency time Fabric:7-16

displaying status Fabric:7-15

enabling for VSANs Fabric:7-15

enabling globally Fabric:7-15

guidelines Fabric:7-14

reordering network frames Fabric:7-13

reordering PortChannel frames Fabric:7-14

installing DMM DMM:2-1


adding to PortChannels Intf:5-13, Intf:5-14

assigning to VSANs Fabric:2-7

configuring descriptions Intf:2-15

configuring fcalias members Fabric:5-11

default settings Intf:2-45

deleting from PortChannels Intf:5-15

displaying informationIntf:2-20to Intf:2-27

displaying SFP information Intf:2-26

forced addition to PortChannels Intf:5-14

isolated states Intf:5-13

suspended states Intf:5-13

VSAN membership Fabric:2-7

Internet Control Message Protocol. See ICMP

Internet Key Exchange. See IKE


configuring interop mode 1 Fabric:12-16

description Fabric:12-13

VSANs Fabric:2-11

interop modes

configuring mode 1 Fabric:12-16

default settings Fabric:12-20

description Fabric:12-13

Inter-VSAN Routing zones. See IVR zones

Inter-VSAN Routing zone sets. See IVR zone sets


configuring notifications sysmgnt:4-20

IOD. See in-order delivery

IP addresses

SMTP server sysmgnt:4-17

IP configuration DMM:2-4

IP connections

active mode 2:2-18

initiating 2:2-18

passive mode 2:2-18

IP domain names

configuring for digital certificates sec:6-6


configuration guidelines 5:4-7

description 5:4-7

logging facility sysmgnt:3-2

IP filters

contents sec:5-2

restricting IP traffic sec:5-1, sec:5-2

IPS core dumps. See core dumps


algorithms for authentication sec:7-6

crypto IPv4-ACLssec:7-16to sec:7-21

default settings sec:7-40

description sec:7-2

digital certificate supportsec:7-7to sec:7-10

displaying configurationssec:7-30to sec:7-34

fabric setup requirements sec:7-5

global lifetime values sec:7-28

hardware compatibility sec:7-4

licensing requirements sec:7-4

maintenance sec:7-28

prerequisites sec:7-4

RFC implementations sec:7-1, sec:7-2

sample FCIP configurationsec:7-34to sec:7-38

sample iSCSI configurationsec:7-38to sec:7-40

terminology sec:7-5

transform sets sec:7-21

transforms for encryption sec:7-6

unsupported features sec:7-5

IP security. See IPsec

IPS modules

CDP support 6:6-9

core dumps 6:6-4

FCIP 2:2-2

partial core dumps 6:6-4

port modes 7:7-1

software upgrades 6:6-3

supported features 6:6-1

IPS ports

modes 7:7-1

SPAN sources sysmgnt:11-3

IP storage services

default parameters 6:6-13

IP Storage services modules. See IPS modules


configuring Gigabit Ethernet interfaces 7:7-2

default settings 7:7-10

description 7:7-1

displaying statistics 7:7-9

transitioning to IPv6 8:8-26


adding entries sec:5-7

applying to interfaces sec:5-10, sec:5-12

clearing counters sec:5-13

configuration guidelines sec:5-2

cryptosec:7-16to sec:7-21

crypto map entries sec:7-23

defining filters sec:5-6

displaying configuration sec:5-8

guidelines for Gigabit Ethernet interfaces 7:7-7

operands sec:5-7

reading dump logs sec:5-9

removing entries sec:5-8

verifying interface configuration sec:5-12

IPv4 addresses

configuring fcalias members Fabric:5-11

configuring IPv6 and IPV6 protocol stacks 8:8-20

IPv6 protocol stacks 8:8-17

IPv4 default gateways

configuring 5:4-3

configuring mgmt0 interfaces Intf:2-43

description 5:4-3

static routes (tip) 5:4-6

IPv4 default networks

description 5:4-6

IPv4 routing

configuring Gigabit Ethernet interfaces 7:7-7

displaying route tables 7:7-7


address types 8:8-10

configuring addressing 8:8-18

configuring IPv4 and IPv6 addresses 8:8-20

configuring management interfaces 5:4-3

configuring neighbor discovery parameters 8:8-22

default settings 8:8-27

description8:8-8to 8:8-18

displaying information 8:8-26

dual IPv4 and IPv6 protocol stack applications, figure 8:8-18

dual IPv4 and IPv6 protocol stacks 8:8-17

dual IPv4 and IPv6 protocol stack technique, figure 8:8-17

enabling routing 8:8-18

enhancements over IPv4 8:8-8

ICMP 8:8-13

IPv6-ACL guidelines 8:8-25

neighbor discovery 8:8-14

path MTU discovery 8:8-14

router advertisement messages 8:8-16

router discovery 8:8-16

stateless autoconfiguration 8:8-16

static routes 8:8-24

transitioning from IPv4 8:8-26

verifying basic connectivity 8:8-20

verifying configuration 8:8-20


defining sec:5-7

guidelines for IPv6 8:8-25

operands sec:5-7

IPv6 addresses

configuring 8:8-18

configuring fcalias members Fabric:5-2, Fabric:5-11

configuring IPv4 and IPV6 protocol stacks 8:8-20

formats 8:8-9

link-local type 8:8-11

multicast type 8:8-12

prefix format 8:8-10

unicast type 8:8-10

IPv6 neighbor discovery

advertisement messages 8:8-14

description 8:8-14

neighbor solicitation message, figure 8:8-15

solicitation messages 8:8-14

IPv6 routing

enabling 8:8-18

IPv6 static routes

configuring 8:8-24

displaying the route table 8:8-24


Gigabit Ethernet ports 7:7-1

IPS module support 6:6-2

MPS-14/2 module support 6:6-2

sample IPsec configurationsec:7-38to sec:7-40

iSCSI interfaces

SPAN sources sysmgnt:11-3


CFS support sysmgnt:2-2


PortChannel links Intf:5-2


CFS support sysmgnt:2-2

isolated VSANs

description Fabric:2-9

displaying membership Fabric:2-9


activating topologies IVR:2-11

AF IDs IVR:2-9

basic configuration IVR:1-1

basic configuration task list IVR:1-6

border switch IVR:1-4

border switch, guidelines IVR:2-9

border switch configuration guidelines IVR:2-9

border switches IVR:1-4

configuration limits IVR:1-4

configuration task lists IVR:1-6, IVR:2-1


advanced IVR:2-2

basic IVR:1-6

configuring logging levels IVR:1-22

configuring without auto topology IVR:2-7

configuring without IVR NAT IVR:2-7

guidelines IVR:2-8

current VSANs IVR:1-3

database merge guidelines IVR:1-22

databases IVR:1-8

default settings IVR:1-28

default zone policy IVR:1-15

domain ID configuration guidelines IVR:2-8

domain ID guidelines IVR:2-8

edge switch IVR:1-4

edge switches IVR:1-4

edge VSANs IVR:1-3

enabling IVR:1-7

enabling distribution with CFS IVR:1-7

features IVR:1-2

Fibre Channel header modifications IVR:1-5

interoperability IVR:1-6

logging IVR:1-22

native VSANs IVR:1-3

paths IVR:1-3

persistent FC IDs IVR:2-14

read-only zoning IVR:2-20

SDV limitations Fabric:3-12

service groupsIVR:2-2to IVR:2-5

terminology IVR:1-3

transit VSAN configuration guidelines IVR:2-8

transit VSANs IVR:1-4

virtual domains IVR:1-13

VSAN topologies IVR:1-5

zone communication IVR:1-15

zone configuration guidelines IVR:2-18

zonesIVR:1-3, IVR:1-15to IVR:1-16

zone sets IVR:1-3

Zone Wizard IVR:1-7

IVR databases

active IVR:1-8

configured IVR:1-8

merge guidelines IVR:1-22

pending IVR:1-8

IVR logging

configuring levels IVR:1-22

IVR logging levels

verifying configuration IVR:1-22

IVR manual configuration

guidelines IVR:2-9


border switch, guidelines IVR:1-11

configuration guidelines IVR:1-9

description IVR:1-10

enabling auto-discovery IVR:1-12

load balancing IVR:1-10

requirements IVR:1-10

transit VSANs, guidelines IVR:1-11

IVR persistent FC IDs

configuring IVR:2-16

persistent IVR:2-14

verifying configuration IVR:2-16

IVR service groups

activation IVR:2-3

characteristics IVR:2-2

clearing IVR:2-5

configuring IVR:2-4

copying active IVR:2-5

default IVR:2-3

description IVR:1-4

IVR configuration guidelines IVR:2-2

verifying configuration IVR:2-5

IVR topologies

activating a manually configured topology IVR:2-11

adding IVR-enabled switches IVR:2-12

CFS support sysmgnt:2-2

clearing manual entries IVR:2-13

configuring manually IVR:2-10

copying active topologies IVR:2-13

enabling automatic discovery IVR:1-12

migrating from IVR auto topology mode to IVR manual topology mode IVR:2-14

verifying configuration IVR:2-13

IVR virtual domains

clearing IVR:1-14

configuring IVR:1-13

description IVR:1-13

verifying configuration IVR:1-14

IVR zones

activating with force option IVR:1-18


description IVR:2-17

automatic creation IVR:1-15

clearing database IVR:1-21, IVR:2-20

configuring LUNs IVR:2-18

configuring with IVR Zone Wizard IVR:1-7

description IVR:1-3, IVR:1-14, IVR:1-15

differences with zones (table) IVR:1-15

maximum number of members IVR:1-4

maximum number of zones IVR:1-4

renaming IVR:2-19

verifying configuration IVR:1-19

verifying QoS configuration IVR:2-19

IVR zone sets

activating IVR:1-19

advanced configuration

description IVR:2-17

deactivating IVR:1-19

description IVR:1-3, IVR:1-14

maximum number IVR:1-4

renaming IVR:2-19

verifying configuration IVR:1-19

IVR Zone Wizard IVR:1-7



configuring estimated maximum in FCIP profiles 2:2-15

job creation errors DMM:5-7, DMM:5-14, DMM:5-34


assigning to a schedule sysmgnt:5-6, sysmgnt:5-7

command scheduler sysmgnt:5-1

defining sysmgnt:5-4

deleting sysmgnt:5-6

removing from a schedule sysmgnt:5-8

verifying definition sysmgnt:5-5

job status values DMM:5-46

jumbo frames. See MTUs


keepalive timeouts

configuring in FCIP profiles 2:2-12



beacon mode states Intf:2-16

speed Intf:2-17


for fixed slot - MDS 9222i Switch DMM:2-2

for MSM-18/4 module-MDS 9200 Series with SSM DMM:2-2

licensing requirements

EEM sysmgnt:6-5


description (table) limits:12-1

link costs

configuring for FSPF Fabric:7-7

description Fabric:7-6

Link Incident Records. See LIRs

link-local addresses

description 8:8-11

format, figure 8:8-11

link redundancy

Ethernet PortChannel aggregation 6:6-7


description Fabric:11-27

load balancing

attributes Fabric:2-11

attributes for VSANs Fabric:2-5

configuring Fabric:2-11

description Fabric:2-11, Intf:5-4

FSPF (example) 2:2-5

guarantees Fabric:2-11

PortChannels Intf:5-2

PortChannels (example) 2:2-5


default settings sysmgnt:3-16

disabling sysmgnt:3-4

enabling sysmgnt:3-4

message severity levels sysmgnt:3-3

Logical Unit Number


logical unit numbers. See LUNs


SSH sec:4-5

Telnet sec:4-5



displaying automatically discovered SCSI targets Fabric:10-4

displaying customized discovered SCSI targets Fabric:10-4

displaying discovered SCSI targets Fabric:10-3

LUN zoning

configuring Fabric:5-23

description Fabric:5-22


MAC addresses

configuring secondary Fabric:12-11


FICON parameters Fabric:11-21

VSAN clock Fabric:11-21

management interfaces

configuring Intf:2-43, 5:4-3

configuring for IPv6 5:4-3

default settings Intf:2-45

displaying information Intf:2-44

features Intf:2-43

master switch election IOA:B-1

four-switch cluster scenarios IOA:B-4

three-switch cluster scenarios IOA:B-3

maximum retransmissions

configuring in FCIP profiles 2:2-13


native interop mode Fabric:12-14

MD5 authentication

IKE sec:7-7

IPsec sec:7-6

VRRP 5:4-14

merged fabrics

autoreconfigured sysmgnt:9-7

Message Authentication Code using AES. See AES-XCBC-MAC

Message Digest 5. See MD5 authentication

mgmt0 interfaces

configuring Intf:2-43

default settings Intf:2-45

features Intf:2-43

local IPv4 routing 5:4-7

Microsoft Challenge Handshake Authentication Protocol. See MSCHAP

migration jobs

Method 1

creating DMM:5-6, DMM:5-24

deleting DMM:5-51, DMM:7-20

overview DMM:1-5

Method 2

creating DMM:5-6, DMM:5-24

deleting DMM:5-50

finishing DMM:5-50, DMM:5-51, DMM:7-20

finishing, cli command DMM:7-17

finishing, command DMM:5-48

overview DMM:1-5

Method 3

server-based DMM:5-11

storage-based DMM:5-22

minimum retransmit timeouts

configuring in FCIP profiles 2:2-12


configuring message logging sysmgnt:3-6

monitor sessions

message logging severity levels sysmgnt:3-6

MPS-14/2 modules

CDP support 6:6-9

FCIP 2:2-2

port modes 7:7-1

software upgrades 6:6-3


description sec:4-50


configuring DMM:4-2


configuring frame sizes 7:7-3

configuring size

path discovery for IPv6 8:8-14

multicast addresses

IPv6 alternative to broadcast addresses 8:8-13

IPv6 format, figure 8:8-12

IPv6 solicited-node format, figure 8:8-13

multicast root switches

configuring Fabric:7-12

description Fabric:7-12

multiple VSANs

configuring 5:4-9

Multiprotocol Services modules. See MPS-14/2 modules


name servers

displaying database entries Fabric:9-4

interoperability Fabric:12-15

LUN information Fabric:10-1

proxy feature Fabric:9-3

registering proxies Fabric:9-3

rejecting duplicate pWWNs Fabric:9-4


native VSANs

description IVR:1-3

neighbor discovery

configuring parameters 8:8-22

verifying configuration 8:8-23

network administrators

additional roles sec:4-3

permissions sec:4-3

network operators

permissions sec:4-3

new storage

about DMM:1-2

configuring DMM:4-2

NL ports

hard zoning Fabric:5-14

interface modes Intf:2-7

zone enforcement Fabric:5-14

node world wide names. See nWWNs

nonparticipating codes

description Intf:2-10


description Intf:6-1

enabling Intf:6-2

NP links Intf:6-5

N port identifier virtualization. See NPIV

N ports

hard zoning Fabric:5-14

zone enforcement Fabric:5-14

zone membership Fabric:5-2

See also Nx ports

NL ports

See also Nx ports

NP-ports Intf:6-5

NPV, configuring Intf:6-9

NPV mode Intf:6-4


CFS support sysmgnt:2-2

logging facility sysmgnt:3-2

time-stamp option 2:2-19


DPVM Fabric:4-1

Nx ports

FCS support sysmgnt:10-1

See also N ports; NL ports


Online Certificate Status Protocol. See OCSP

operational states

configuring on Fibre Channel interfaces Intf:2-13

description Intf:2-8


support sec:6-5

out-of-service interfaces

description Intf:3-8

overlay VSANs

configuring 5:4-8

description 5:4-8


disabling restrictions Intf:3-28

enabling restrictions Intf:3-31

Generation 2 switching modules Intf:3-26

ratios Intf:3-26



discarding in FCIP 2:2-19


DHCHAP sec:8-7, sec:8-8

encrypted sec:3-13

recovering (procedure) sec:3-22

strong characteristics sec:3-12

path MTUs. See PMTUs


manually selecting DMM:5-8

persistent domain ID

FICON VSANs sec:10-3

persistent FC IDs

configuring IVR:2-16, sysmgnt:9-16

description IVR:2-14, sysmgnt:9-15

displaying sysmgnt:9-20

enabling sysmgnt:9-16

purging sysmgnt:9-19


enrollment support sec:6-4


name server Fabric:9-4


configuring in FCIP profiles 2:2-13

port addresses

FICON Fabric:11-10

PortChannel modes

description Intf:5-6

PortChannel Protocol

autocreation Intf:5-18

configuring autocreation Intf:5-18

converting autocreated groups to manually configured Intf:5-19

creating channel group Intf:5-16

description Intf:5-15

enabling autocreation Intf:5-18


adding interfaces Intf:5-13, Intf:5-14

administratively down Intf:2-10

binding to FICON port numbers Fabric:11-24

comparison with trunking Intf:5-3

compatibility checks Intf:5-13

compatibility with DHCHAP sec:8-3

configuration guidelines Intf:5-10

configuring Fibre Channel routes Fabric:7-11

configuring for FCIP high availability 2:2-5

creating Intf:5-11

default settings Intf:5-25

deleting Intf:5-12

deleting interfaces Intf:5-15

description Intf:5-1

examples Intf:5-2

FICON support Fabric:11-4

forcing interface additions Intf:5-14

Generation 2 switching module interfaces Intf:3-12

in-order guarantee Fabric:7-14

interface states Intf:5-13

interoperability Fabric:12-15

link changes Fabric:7-14

link failures Fabric:7-3

load balancing Intf:5-4

load balancing (example) 2:2-5

logging facility sysmgnt:3-2

member combinations 6:6-7

misconfiguration error detection Intf:5-11

redundancy 2:2-7

reserving ports for FICON Fabric:11-13

SPAN sources sysmgnt:11-3

verifying configurationsIntf:5-21to Intf:5-24

port groups

description Intf:3-3

Generation 2 Fibre Channel switching modules Intf:3-3

Generation 3 Fibre Channel switching modules Intf:3-7

port indexes

description Intf:3-10

port modes

auto Intf:2-7

descriptionIntf:2-3to Intf:2-7

IPS 7:7-1

port numbers. See FICON port numbers

port rate modes

configuring Intf:3-21

dedicated Intf:3-6

description Intf:3-4

oversubscribed Intf:3-7

shared Intf:3-7

See also rate modes


virtual E 2:2-2

VSAN membership Fabric:2-7

port security

activating sec:9-6

activation sec:9-3

activation rejection sec:9-6

adding authorized pairs sec:9-11

auto-learning sec:9-2

CFS support sysmgnt:2-2

cleaning up databases sec:9-17

compatibility with DHCHAP sec:8-3

configuration guidelines sec:9-3

configuring CFS distributionsec:9-12to sec:9-14

copying databases sec:9-16

database interactions sec:9-15

database merge guidelines sec:9-14

data scenarios sec:9-15

deactivating sec:9-6

default settings sec:9-20

deleting databases sec:9-17

disabling sec:9-5

displaying configurationsec:9-18, sec:9-18to sec:9-20

enabling sec:9-5

enforcement mechanisms sec:9-2

fabric binding comparison sec:10-1

forcing activation sec:9-6

license requirement sec:9-2

manual configuration guidelines sec:9-5

preventing unauthorized accesses sec:9-2

unauthorized accesses prevented sec:9-2

WWN identification sec:9-10

port security auto-learning

description sec:9-2

device authorization sec:9-8

disabling sec:9-8

distributing configuration sec:9-13

enabling sec:9-7

guidelines for configuring with CFS sec:9-4

guidelines for configuring without CFS sec:9-4

port security databases

cleaning up sec:9-17

copying sec:9-16

deleting sec:9-17

displaying configurationsec:9-18to sec:9-19

displaying violations sec:9-20

interactions sec:9-15

manual configuration guidelines sec:9-5

merge guidelines sec:9-14

reactivating sec:9-7

scenarios sec:9-15

port speeds

configuring Intf:2-14

configuring on Generation 2 switching module interfaces Intf:3-19

displaying configuration Intf:3-20

port swapping. See FICON port swapping

port world wide names. See pWWNs

post-migration DMM:5-51

preshared keys

RADIUS sec:4-24

TACACS+ sec:4-32

principal switches

assigning domain ID sysmgnt:9-9

configuring sysmgnt:9-10

private devices

TL ports Intf:2-31


configuring sec:3-2

modifying sec:3-3

prohibited ports

FICON Fabric:11-48

promiscuous mode

configuring Gigabit Ethernet interfaces 7:7-4


registering for name servers Fabric:9-3

Public Key Infrastructure. See PKI


configuring fcalias members Fabric:5-11

DPVM Fabric:4-1

rejecting duplicates Fabric:9-4

zone membership Fabric:5-2



DSCP value 2:2-22

logging facilities sysmgnt:3-2



AAA protocols sec:4-1

assigning host keys sec:4-22

CFS merge guidelines sec:4-49

CFS support sysmgnt:2-2

clearing configuration distribution sessions sec:4-48

configuring Cisco ACSsec:4-55to sec:4-58

configuring server groups sec:4-43

configuring server monitoring parameters sec:4-25

configuring test idle timer sec:4-27

configuring test user name sec:4-27

default settings sec:4-59

description sec:4-21

discarding configuration distribution changes sec:4-48

displaying configured parameters sec:4-29

enabling configuration distribution sec:4-46

sending test messages for monitoring sec:4-27

setting preshared keys sec:4-24

specifying serverssec:4-22to sec:4-23

specifying server timeout sec:4-24

starting a distribution session sec:4-46

rate modes

configuring on Generation 2 switching module interfaces Intf:3-21

verifying configuration Intf:3-21

See also port rate modes


description sysmgnt:9-3

incoming sysmgnt:9-6

rejecting incoming sysmgnt:9-6

read-only zones

configuration guidelines Fabric:5-24

configuring Fabric:5-24

default settings Fabric:5-43

description Fabric:5-24

reason codes

description Intf:2-8

reconfigure fabric frames. See RCFs


from powered-down state Intf:3-12


Ethernet PortChannels 2:2-6, 2:2-7

Fibre Channel PortChannels 2:2-7

VRRP 2:2-6

VSANs Fabric:2-4

redundant physical links

example (figure) Fabric:7-3

Registered Link Incident Reports. See RLIRs

Registered State Change Notifications. See RSCNs

Remote SPAN. See RSPAN

retransmitting intervals

configuring for FSPF Fabric:7-8

description Fabric:7-8


clearing information Fabric:11-32

conditional receive Fabric:11-30

description Fabric:11-27

displaying informationFabric:11-28to Fabric:11-32

specifying preferred host Fabric:11-27


alarms sysmgnt:8-1

default settings sysmgnt:8-4

displaying information sysmgnt:8-4

enabling alarms sysmgnt:8-2

enabling events sysmgnt:8-3

events sysmgnt:8-1

role databases

clearing distribution sessions sec:3-7

committing changes to fabric sec:3-6

disabling distribution sec:3-7

discarding database changes sec:3-6

enabling distribution sec:3-7


authentication sec:3-1

CFS support sysmgnt:2-2

configuring sec:3-2

configuring rules sec:3-2

default permissions sec:4-3

default setting sec:3-24

displaying information sec:3-7

distributing configurationssec:3-5to sec:3-9

modifying profiles sec:3-3

user profiles sec:4-3

See also command roles

roles database

displaying information sec:3-7

roles databases

description sec:3-6

locking in the fabric sec:3-6

merge guidelines sec:3-7

route costs

computing Fabric:7-6

router discovery

IPv6 8:8-16


multicast Fabric:7-12

See also broadcast routing

See also IP routing

routing protocols

disabling Fabric:7-6

RSA key-pairs

deleting sec:6-15

description sec:6-3

displaying configuration sec:6-16

exporting sec:6-5, sec:6-13

generating sec:6-6

importing sec:6-5, sec:6-13

multiple sec:6-4

rsa key pairs

generating sec:3-16


clearing statistics Fabric:9-10

default settings Fabric:9-15

description Fabric:9-8

displaying information Fabric:9-8

logging facility sysmgnt:3-2

multiple port IDs Fabric:9-9

suppressing domain format SW-RSCNs Fabric:9-10

RSCN timers

CFS support sysmgnt:2-2

configuration distribution using CFSFabric:9-12to Fabric:9-15

configuring Fabric:9-11

displaying configuration Fabric:9-12


advantages sysmgnt:11-17

configuring explicit paths sysmgnt:11-25

default settings sysmgnt:11-30

description sysmgnt:11-16

displaying information sysmgnt:11-28

example configurationsysmgnt:11-19to sysmgnt:11-24

explicit paths sysmgnt:11-24

monitoring traffic (example)sysmgnt:11-26to sysmgnt:11-28

referencing explicit paths sysmgnt:11-26

tunnels sysmgnt:11-17


configuring sec:3-2

runtime checks

static routes Fabric:7-10



configuring in FCIP profiles 2:2-13

SAN extension tuner

assigning SCSI read/write commands 3:3-5, 3:3-7

configuring 3:3-2

configuring data patterns 3:3-8

configuring nWWNs 3:3-4

configuring virtual N ports 3:3-5

data patterns 3:3-3

default settings 3:3-10

description 3:3-1

initialization 3:3-4

license requirements 3:3-3

tuning guidelines 3:3-2

verifying configuration 3:3-9


displaying for IKE sec:7-30

displaying global lifetime values sec:7-34

establishing between IPsec peers sec:7-23

global lifetime values sec:7-29

lifetime negotiations sec:7-25

refreshing sec:7-16

setting lifetime sec:7-25


VSANs Fabric:2-4


changing DMM:5-49

scheduler. See command scheduler


assigning jobs sysmgnt:5-6, sysmgnt:5-7

command scheduler sysmgnt:5-1

deleting sysmgnt:5-8

deleting schedule time sysmgnt:5-9

one-time sysmgnt:5-7

periodic sysmgnt:5-6

specifyingsysmgnt:5-6to sysmgnt:5-9

specifying execution time sysmgnt:5-6

verifying configuration sysmgnt:5-8

SCSI flow services

CFS support sysmgnt:2-2


customized discovery Fabric:10-2

discovering targets Fabric:10-1

displaying information Fabric:10-2

starting discoveries Fabric:10-2

SD port mode

description Intf:2-6

interface modes Intf:2-6

SD ports

bidirectional traffic sysmgnt:11-14

characteristics sysmgnt:11-5

configuring Intf:2-13

configuring for monitoring sysmgnt:11-6

configuring for RSPAN sysmgnt:11-24

configuring for SPAN monitoring sysmgnt:11-6

configuring SPAN sysmgnt:11-14

encapsulating frames sysmgnt:11-10

monitoring bidirectional traffic sysmgnt:11-14

RSPAN sysmgnt:11-16


IVR limitations Fabric:3-12

secondary MAC addresses

configuring Fabric:12-11

Secure Hash Algorithm. See SHA-1


accounting sec:4-4

managing on the switch sec:4-2

security associations. See SAs

security control

local sec:4-2, sec:4-52

remote sec:4-2, sec:4-31

remote AAA servers sec:4-21

security parameter index. See SPI

Selecting DMM:5-15, DMM:5-17, DMM:5-18

selective acknowledgments. See SACKs

serial IDs

description sysmgnt:4-37

server-based job

selecting ports DMM:5-4

server groups

configuring sec:4-42

server IDs

description sysmgnt:4-38

Server Lunmap Discovery Tool. See SLD

server MSM-18/4 module

selecting DMM:5-15


configuring DMM:5-9

session state values DMM:5-47


displaying transmitter types Intf:2-26

transmitter types Intf:2-19


IKE sec:7-7

IPsec sec:7-7

shared rate mode

description Intf:3-7

migrating from dedicated rate mode Intf:3-16, Intf:3-17

migrating to dedicated rate mode Intf:3-16, Intf:3-17

oversubscription Intf:3-26

Single-fabric Topology IOA:B-5

site IDs

description sysmgnt:4-36


small computer system interface. See SCSI


supported single-fabric topology IOA:B-5


access control sysmgnt:7-2

access groups sysmgnt:7-4

adding communities sysmgnt:7-7

assigning contact sysmgnt:7-2

assigning contact names sysmgnt:4-7

assigning location sysmgnt:7-2

configuring LinkUp/LinkDown notifications sysmgnt:7-13

configuring notification target users sysmgnt:7-13

configuring users from CLI sysmgnt:7-5

counter Information sysmgnt:7-18

creating roles sec:3-10

creating users sysmgnt:7-4

default settings sysmgnt:7-19

deleting communities sysmgnt:7-7

displaying information sysmgnt:8-4

displaying notification status sysmgnt:7-11

displaying security information sysmgnt:7-17

enabling SNMP notifications sysmgnt:7-10

encryption-based privacy sysmgnt:7-4

FICON control Fabric:11-22

group-based access sysmgnt:7-4

mapping CLI operations sec:3-10

modifying users sysmgnt:7-4

read-only access sysmgnt:7-7

read-write access sysmgnt:7-7

security features sec:4-2

server contact name sysmgnt:4-6

user synchronization with CLI sysmgnt:7-3

Version 3 security features sysmgnt:7-2

versions supported sysmgnt:7-1

See also SNMPv1; SNMPv2c; SNMPv3

SNMP manager

FCS sysmgnt:10-2


community strings sysmgnt:7-2

description sysmgnt:7-2

See also SNMP


community strings sysmgnt:7-2


configuring notifications sysmgnt:7-8

description sysmgnt:7-2

See also SNMP


assigning multiple roles sysmgnt:7-7

CLI user managementSNMPv3

AAA integration sysmgnt:7-3

configuring notifications sysmgnt:7-9

description sysmgnt:7-2

enforcing message encryption sysmgnt:7-6

restricting switch access sysmgnt:7-3

security features sysmgnt:7-2

specifying cisco-av-pair sec:4-29

See also SNMP sysmgnt:7-2

soft zoning

description Fabric:5-14

See also zoning

source IDs

Call Home event format sysmgnt:4-37

exchange based Intf:5-5

flow based Intf:5-4

in-order delivery Fabric:7-13

path selection Fabric:2-11


configuration guidelines sysmgnt:11-6

configuring Fibre Channel analyzers sysmgnt:11-12

configuring SD ports sysmgnt:11-6, sysmgnt:11-14

configuring sessions sysmgnt:11-5

conversion behavior sysmgnt:11-10

default settings sysmgnt:11-30

description sysmgnt:11-1

displaying information sysmgnt:11-14

egress sources sysmgnt:11-2

encapsulating frames sysmgnt:11-10

FC analyzers sysmgnt:11-11

filters sysmgnt:11-5

monitoring traffic sysmgnt:11-1

SD ports sysmgnt:11-5

sessions sysmgnt:11-5

sources sysmgnt:11-2, sysmgnt:11-4

sources for monitoring sysmgnt:11-2

VSAN sources sysmgnt:11-4

SPAN destination port mode. See SD port mode

SPAN filters

configuring sysmgnt:11-7, sysmgnt:11-8

description sysmgnt:11-5

guidelines sysmgnt:11-5

SPAN sessions

configuring sysmgnt:11-6

description sysmgnt:11-5

reactivating sysmgnt:11-9

suspending sysmgnt:11-9

VSAN filters sysmgnt:11-5

SPAN sources

configuring interfaces sysmgnt:11-13

egress sysmgnt:11-2

ingress sysmgnt:11-2

interface types sysmgnt:11-3

IPS ports sysmgnt:11-3

VSANs configuration guidelines sysmgnt:11-4

SPAN tunnel port mode. See ST port mode


computational hold times Fabric:7-4


configuring virtual routers 5:4-14


clearing hosts sec:3-18

default service sec:3-15

description sec:3-16

digital certificate authentication sec:3-20

displaying status sec:3-19

enabling sec:3-19

generating server key-pairs sec:3-16

logins sec:4-5

overwriting server key-pairs sec:3-17

protocol status sec:3-19

specifying keys sec:3-16

SSH key pairs

overwriting sec:3-17

SSH sessions

message logging sysmgnt:3-4

static routes

runtime checks Fabric:7-10

storage devices

access control Fabric:5-1

storage ports

including in a job DMM:3-12

ST port mode

description Intf:2-7

interface modes Intf:2-7

limitations Intf:2-7

ST ports

configuring for RSPAN sysmgnt:11-21

interface modes Intf:2-7

RSPAN sysmgnt:11-16

RSPAN characteristics sysmgnt:11-18

subnet masks

configuring mgmt0 interfaces Intf:2-43


requirements 7:7-6

supported topologies

single-fabric IOA:B-5

Switched Port Analyzer. See SPAN

switch management

in-band 5:4-7


VRRP 2:2-6

switch ports

configuring attribute default values Intf:2-18

switch priorities

configuring sysmgnt:9-5

default sysmgnt:9-5

description sysmgnt:9-5

switch security

default settings sec:3-24, sec:4-58


configuring for fabric binding sec:10-3


CFS support sysmgnt:2-2

configuration distribution sysmgnt:3-10

fabric merge guidelines sysmgnt:3-11

system messages

configuring logging sysmgnt:3-4

configuring logging servers sysmgnt:3-7

default settings sysmgnt:3-16

displaying informationsysmgnt:3-11to sysmgnt:3-16

logging server sysmgnt:3-1

severity levels sysmgnt:3-3



AAA protocols sec:4-1

CFS merge guidelines sec:4-49

CFS support sysmgnt:2-2

clearing configuration distribution sessions sec:4-48

configuring Cisco ACSsec:4-55to sec:4-58

configuring server groups sec:4-44

default settings sec:4-59

description sec:4-32

discarding configuration distribution changes sec:4-48

displaying information sec:4-41

enabling sec:4-32

enabling configuration distribution sec:4-46

global keys sec:4-32

sending test messages for monitoring sec:4-38

setting default server timeout sec:4-35

setting global secret keys sec:4-34

setting preshared key sec:4-32

setting server addresses sec:4-33

setting server monitoring parameters sec:4-36

setting timeout value sec:4-35

specifying server at login sec:4-39

starting a distribution session sec:4-46

validating sec:4-39

TCP connections

FCIP profiles 2:2-4

TCP ports

IPv4-ACLs sec:5-4

TCP statistics

displaying 6:6-11


enabling sec:3-19

logins sec:4-5

Telnet sessions

message logging sysmgnt:3-4

TE port mode

classes of service Intf:2-6

description Intf:2-6

TE ports

fabric binding checking sec:10-2

FCS support sysmgnt:10-1, sysmgnt:10-2

FSPF topologies Fabric:7-2

interoperability Fabric:12-15

recovering from link isolations Fabric:5-15

SPAN sources sysmgnt:11-3

trunking restrictions Intf:4-3

TF port mode

classes of service Intf:2-6

description Intf:2-6

time out values. See TOVs


FICON host control Fabric:11-21

TL port mode

classes of service Intf:2-5

description Intf:2-5

TL ports

ALPA caches Intf:2-30

configuring Intf:2-13, Intf:2-30

description Intf:2-28

displaying information Intf:2-31

FCS sysmgnt:10-1, sysmgnt:10-2

FCS support sysmgnt:10-1, sysmgnt:10-2

logging facility sysmgnt:3-2

private devices Intf:2-31

SPAN sources sysmgnt:11-3

virtual devices Intf:2-31


about DMM:3-1

guidelines DMM:3-3

Method 3 DMM:3-5

one-fabric DMM:3-10

three-fabric DMM:3-6

two-fabric DMM:3-7


configuring across all VSANs Fabric:12-6

configuring for a VSAN Fabric:12-6

default settings Fabric:12-20

interoperability Fabric:12-14

ranges Fabric:12-5

traffic isolation

VSANs Fabric:2-4

transform sets

configuring for IPsec sec:7-22

creating crypto map entries sec:7-24

description sec:7-21

transit VSANs

configuration guidelines IVR:1-11

description IVR:1-4, IVR:2-11

IVR configuration guidelines IVR:2-8

translative loop port mode. See TL port mode

Triple DES. See 3DEC encryption


checklist DMM:6-2

deleting a cluster IOA:B-6, IOA:B-7

deleting an offline switch IOA:B-5

reviving a cluster IOA:B-8


comparison with PortChannels Intf:5-3

configuration guidelines Intf:4-4

configuring modes Intf:4-8

default settings Intf:4-14

description Intf:4-1

displaying information Intf:4-13

interoperability Fabric:12-14

link state Intf:4-8

merging traffic Intf:4-4

restrictions Intf:4-3

trunking E port mode. See TE port mode

trunking F port mode. See TF port mode

trunking mode

FCIP interface 2:2-4

trunking ports

associated with VSANs Fabric:2-7

trunking protocol

default settings Intf:4-14

default state Intf:4-7

description Intf:4-7

detecting port isolation Intf:4-4

disabling Intf:4-8

enabling Intf:4-8

trunk mode

administrative default Intf:2-19

configuring Intf:4-8, Intf:4-9

default settings Intf:4-14

status Intf:4-9

trunk ports

displaying information Intf:4-14

trust points

creating sec:6-8

description sec:6-2

multiple sec:6-3

saving configuration across reboots sec:6-12

TrustSec FC Link Encryption sec:11-2

Best Practices sec:11-9

enabling sec:11-2

ESP Modes sec:11-6

ESP Settings sec:11-4

Information sec:11-7

Security Association Parameters sec:11-3

Security Associations sec:11-3

Supported Modules sec:11-2

Terminology sec:11-1


UDP ports

IPv4-ACLs sec:5-4

unique area FC IDs

configuring sysmgnt:9-17

description sysmgnt:9-17

user accounts

configuringsec:3-11to sec:3-15

configuring profiles sec:3-2

configuring roles sec:3-2

displaying information sec:3-14

password characteristics sec:3-12

user IDs

authentication sec:4-3

user profiles

role information sec:4-3


CFS support sysmgnt:2-2

configuring sec:3-13

deleting sec:3-13

description sec:3-12

displaying account information sec:3-14

logging out other users sec:3-14

SNMP support sysmgnt:7-4


vendor-specific attributes. See VSAs

VE ports

description 2:2-2

FCIP 2:2-2

verifying new zone

server-based DMM:5-19

storage-based DMM:5-29

virtual devices

TL ports Intf:2-31

virtual E ports. See VE ports

virtual initiator

configuring DMM:7-3

virtual ISLs

description 2:2-2

Virtual LANs. See VLANs

virtual router IDs. See VR IDs

Virtual Router Redundancy Protocol. See VRRP

virtual routers

adding 5:4-12

adding primary IP addresses 5:4-13

authentication 5:4-14

default settings 5:4-15

deleting 5:4-12

initiating 5:4-13

setting priorities 5:4-13

virtual target

about DMM:1-3


configuring on Gigabit Ethernet subinterfaces 7:7-6

description 7:7-5


description 5:4-11

mapping 5:4-11


backup switches 5:4-11

configuring advertisement time intervals 5:4-13

configuring for Gigabit Ethernet interfaces 6:6-6

configuring virtual routers 5:4-12

default settings 5:4-15

description 5:4-11, 6:6-5

group members 6:6-5

initiating virtual routers 5:4-13

logging facility sysmgnt:3-3

master switches 5:4-11

MD5 authentication 5:4-14

primary IP address 5:4-13

priority preemption 5:4-13

security authentication 5:4-14

setting priorities 5:4-13

setting priority 5:4-13

simple text authentication 5:4-14


allowed list Intf:4-14

description Fabric:2-5

multiplexing traffic Intf:2-6

range Fabric:2-4

VSAN membership Fabric:2-4

VSAN interfaces

configuring Intf:2-44

creating Intf:2-45

description Intf:2-45

displaying information Intf:2-45

VSAN policies

default roles sec:3-24

licensing sec:3-4

modifying sec:3-5


advantages Fabric:2-3

allowed-active Intf:4-4

allowed list sysmgnt:11-4

broadcast addresses Fabric:7-12

cache contents sysmgnt:9-22

clocks Fabric:11-21

comparison with zones (table) Fabric:2-4

compatibility with DHCHAP sec:8-3

configuringFabric:2-6to Fabric:2-7

configuring allowed-active lists Intf:4-12

configuring FSPF Fabric:7-4

configuring multiple IPv4 subnets 5:4-9

configuring policies sec:3-4

default settings Fabric:2-12

default VSANs Fabric:2-9

deleting Fabric:2-9

descriptionFabric:2-1to Fabric:2-4

displaying configuration Fabric:2-11

displaying membership Fabric:2-8

displaying usage Fabric:2-12

domain ID automatic reconfiguration sysmgnt:9-7

fabric optimization for FICON Fabric:11-3

FC IDs Fabric:2-1

FCS sysmgnt:10-1

FCS support sysmgnt:10-1

features Fabric:2-1

FICON-enabled Fabric:2-11, Fabric:11-42

flow statistics Fabric:7-17

FSPF Fabric:7-5

FSPF connectivity Fabric:7-2

gateway switches 5:4-6

interop mode Fabric:12-14

IP routing sec:5-1, sec:5-2

IPv4 static routing 5:4-7

isolated Fabric:2-9

load balancing Fabric:2-11

load balancing attributes Fabric:2-5

loop devices Intf:2-31

mismatches Intf:2-10

multiple zones Fabric:5-4

names Fabric:2-5

name server Fabric:9-3

operational states Fabric:2-9

overlaid routes 5:4-8

policies sec:3-4

port membership Fabric:2-7

SPAN filters sysmgnt:11-5

SPAN source sysmgnt:11-4

SPAN sources sysmgnt:11-4

states Fabric:2-5

TE port mode Intf:2-6

TF port mode Intf:2-6

timer configuration Fabric:12-6

TOVs Fabric:12-6

traffic isolation Fabric:2-3

traffic routing between 5:4-1

transit IVR:2-11

trunk-allowed Intf:4-4

trunking ports Fabric:2-7

VRRP 5:4-11

VSAN trunking. See trunking


communicating attributes sec:4-28

protocol options sec:4-29

VT. See virtual target


window management

configuring in FCIP profiles 2:2-14

world wide names. See WWNs


configuring Fabric:12-9

displaying information Fabric:12-10

link initialization Fabric:12-10

port security sec:9-10

secondary MAC addresses Fabric:12-11

suspended connections Intf:2-10



FICON support Fabric:11-4


zone attribute groups

cloning Fabric:5-18

zone databases

release locks Fabric:5-34


access control Fabric:5-7

adding to zone sets Fabric:5-12

analyzing Fabric:5-42

assigning LUNs to storage subsystems Fabric:5-23

backing up (procedure) Fabric:5-17

changing from enhanced zones Fabric:5-33

cloning Fabric:5-18

compacting for downgrading Fabric:5-41

comparison with device aliases (table) Fabric:6-4

comparison with VSANs (table) Fabric:2-4

configuration guidelines IVR:2-18

configuringFabric:5-6to Fabric:5-7

configuring aliases Fabric:5-11

configuring broadcasting Fabric:5-21

configuring fcaliases Fabric:5-11

CUPs Fabric:11-43

default policies Fabric:5-2

default settings Fabric:5-43

differences with IVR zones IVR:1-15

displaying informationFabric:5-25to Fabric:5-31

enforcing restrictions Fabric:5-14

exporting databases Fabric:5-15

features Fabric:5-1, Fabric:5-3

importing databases Fabric:5-15

IVR communication IVR:1-15

logging facility sysmgnt:3-3

LUN-based Fabric:5-22

membership using pWWNs Fabric:2-4

merge failures Intf:2-10

read-only for IVR IVR:2-20

renaming Fabric:5-18

restoring (procedure) Fabric:5-17

See also default zones

See also enhanced zones

See also hard zoning; soft zoning

See also LUN zoning

See also read-only zones

See also zoning; zone sets

zone server databases

clearing Fabric:5-18

zone sets

activating Fabric:5-10

adding member zones Fabric:5-12

analyzing Fabric:5-42

cloning Fabric:5-18

configuringFabric:5-7to Fabric:5-10

considerations Fabric:5-4

copying Fabric:5-16

creating Fabric:5-8, Fabric:5-12

default settings Fabric:5-43

displaying informationFabric:5-25to Fabric:5-31

distributing configuration Fabric:5-14

enabling distribution Fabric:5-14

exporting Fabric:5-16

exporting databases Fabric:5-15

features Fabric:5-1

importing Fabric:5-16

importing databases Fabric:5-15

one-time distribution Fabric:5-15

recovering from link isolations Fabric:5-15

renaming Fabric:5-18

See also active zone sets

See also active zone sets; full zone sets

See also zones; zoning

zone traffic priorities

configuring Fabric:5-19

description Fabric:5-19


configuring broadcasting Fabric:5-21

description Fabric:5-1

example Fabric:5-2

implementation Fabric:5-3

See also LUN zoning

See also zones; zone sets