The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
iSCSI node 4-156
configuring 4-90
enforcing access control 4-89
iSCSI 4-86, 4-88
access controlzoning based access controliSCSI
zoning based access control 4-89
configuring for iSCSI 4-88
configuring for iSCSI 4-88
setting time intervals 5-188
clearing entries 5-178
displaying entries 5-178
clearing 7-219
displaying 7-219
CHAP option 4-135
iSCSI setup 4-134
local 4-91
MD5 5-189
mechanism 4-91
mutual CHAPmutual CHAP authentication 4-92
restricting iSLB initiatorinitiator authentication
restricting iSLB initiators 4-116
simple text 5-189
See also simple text authentication
autogenerated iSCSI targetiSCSI
autogenerated target 4-90
configuring Gigabit Ethernet interfaces 7-213
configuring 2-35
interoperability mode 2-33
SAN extenders 2-34
configuring in FCIP profiles 2-28
iSLB config distribution 4-123
CHAP authentication 4-90, 4-115
configuring for iSCSI 4-135
CHAP challenge 4-92
CHAP response 4-92
CHAP user name 4-92
Cisco Discovery Protocol. See CDP
Cisco Transport Controller. See CTC
cloud discovery. See iSNS cloud discovery
congestion window monitoring. See CWM
IPS modules 6-200
description 2-22
launching 2-22
Cut-through routing mode 4-95
configuring in FCIP profiles 2-27
default gateways. See IPv4 default gateways
default networks. See IPv4 default networks
differentiated services code point. See DSCP
direct memory access devices. See DMA-bridges
displaying statistics 6-206
default settings 5-195
displaying information 5-194
configuring 5-193
defining 5-194
Domain Name System servers. See DNS servers
iSCSI 4-68
configuring 2-36
dynamic initiator mode parameter
distributed with CFS 4-123
converting 4-110
convert dynamic initiator to static 4-81
dynamic mapping 4-72, 4-110
static mappingstatic mapping 4-72
verifying using Device Manager (procedure) 2-22
entity status inquiry. See ESI
configuring 2-37
trunking configuration 2-22
non-resp threshold 4-154
displaying 6-206
adding Gigabit Ethernet interfaces 6-205
configuring 6-204
description 6-203
iSCSI 4-133
redundancy 2-10
explicit fabric logout 4-78
Extended Link Protocol. See ELP
CHAP 4-135
CHAP 4-135
FCIP 4-67
advanced features 2-42
checking trunk status (procedure) 2-22
compression 2-53
configuring 2-12 to 2-30, ?? to 2-30
configuring using FCIP Wizard ?? to 2-18
default parameters 2-55
discarding packets 2-33
enabling 2-12
Gigabit Ethernet ports 7-211
high availability 2-8 to ??
IPS modules 2-6
IP storage services support 6-197
link failures 2-9
MPS-14/2 module 2-6
tape acceleration 2-46 to 2-53
time stamps 2-33
VE ports 2-6
verifying ELP (procedure) 2-22
verifying interfaces (procedure) 2-22
virtual ISLs 2-6
VRRP 2-10
write acceleration 2-42
configuring 2-54
configuring (procedure) 2-15
description 2-53
displaying information 2-54
configuring advanced features 2-30 to 2-37, ?? to 2-37
configuring peers 2-30
configuring QoS 2-36
creating 2-30
displaying information 2-38
parameters 2-8
B port interoperability mode 2-33
configuring 2-18
configuring peers 2-30
configuring QoS 2-36
creating 2-21
description 2-7
endpoints 2-7
initiating IP connections 2-32
TCP connections 2-7
configuring 2-24
configuring IP addresses 2-31
configuring listener ports 2-24
configuring TCP parameters 2-24 to 2-29, ?? to 2-30
creating 2-19
description 2-8
displaying information 2-20
configuring 2-51
description 2-46 to 2-51
displaying information 2-52
configuring buffer size 2-28
configuring CWM 2-27
configuring keepalive timeouts 2-25
configuring maximum jitter 2-28
configuring maximum retransmissions 2-25
configuring minimum retransmit timeouts 2-24
configuring PMTUs 2-25
configuring SACKs 2-26
configuring window management 2-26
displaying 2-29, 2-30
configuring 2-45
configuring (procedure) 2-15
description 2-42
displaying information 2-45
routing requests 4-70
Fibre Channel 4-67
iSCSI targets 4-72 to ??
Fibre Channel over IP. See FCIP
dynamic importing 4-73
dynamic mapping 4-73
Fibre Channel zoning-based access control 4-89
load balancing (example) 2-9
configuring MTU size 7-213
IPS modules 6-200
Gigabit Ethernet interface example 4-131
configuring ?? to 6-205
configuring auto-negotiation 7-213
configuring high availability 6-201 to 6-205
configuring IPv4 7-212
configuring IPv6 addresses 8-232
configuring MTU frame sizes 7-213
configuring promiscuous mode 7-214
configuring static IPv4 routing 7-217
configuring VRRP 6-202
default parameters 7-220
displaying statistics 6-205 to 6-209
IPv4-ACL guidelines 7-217
subinterfaces 7-216
subnet requirements 7-216
verifying connectivity 7-214
Gigabit Ethernet subinterfaces
configuring VLANs 7-216
paramter distributed 4-123
HA solution example 4-129
HBA port 4-77, 4-82
Ethernet PortChannel 4-133
Ethernet PortChannels 2-10
Fibre Channel PortChannels 2-11
VRRP 2-10, 4-132
VRRPVRRP-based high availability 4-132
displaying statistics 6-208
IPv6 8-226
IPv6 header format, figure 8-226
IPFC 5-172
statically mapped iSCSI 4-107
Internet Control Message Protocol. See ICMP
Internet Storage Name Service. See iSNS
active mode 2-32
initiating 2-32
passive mode 2-32
configuration guidelines 5-172
configuring VSAN interfaces 5-172
description 5-172
enabling IPv4 routing 5-173
example configuration 5-173 to 5-176
IPS core dumps. See core dumps
CDP support 6-205
core dumps 6-200
FCIP 2-6
partial core dumps 6-200
port modes 7-211
software upgrades 6-199
supported features 6-197
IPS ports 4-72
modes 7-211
multiple connections 4-131
default parameters 6-209
IP Storage services modules. See IPS modules
configuring Gigabit Ethernet interfaces 7-212
configuring management interfaces 5-169
configuring virtual routers 5-185
default settings 7-220
description 7-211
displaying statistics 7-219
transitioning to IPv6 8-239
guidelines for Gigabit Ethernet interfaces 7-217
adding for VRRP 5-186
configuring in VSANs 5-172
configuring IPv6 and IPV6 protocol stacks 8-233
IPv6 protocol stacks 8-230
configuring 5-170, 5-171
description 5-170
IP static routing 5-170
static routes (tip) 5-171
verifying configuration 5-170
description 5-170
configuring Gigabit Ethernet interfaces 7-217
disabling 5-173
displaying route tables 7-217
enabling 5-173
verifying configuration 5-173
configuring 5-177
description 5-177
verifying configuration 5-177
address types 8-223
configuring addressing 8-231
configuring IPv4 and IPv6 addresses 8-233
configuring management interfaces 5-169
configuring neighbor discovery parameters 8-235
configuring virtual routers 5-185
default settings 8-240
description 8-221 to 8-231
displaying information 8-239
dual IPv4 and IPv6 protocol stack applications, figure 8-231
dual IPv4 and IPv6 protocol stacks 8-230
dual IPv4 and IPv6 protocol stack technique, figure 8-230
enabling routing 8-231
enhancements over IPv4 8-221
ICMP 8-226
IPv6-ACL guidelines 8-238
neighbor discovery 8-227
path MTU discovery 8-227
router advertisement messages 8-229
router discovery 8-229
stateless autoconfiguration 8-229
static routes 8-237
transitioning from IPv4 8-239
verifying basic connectivity 8-233
verifying configuration 8-233
guidelines for IPv6 8-238
adding for VRRP 5-186
configuring 8-231
configuring IPv4 and IPV6 protocol stacks 8-233
formats 8-222
link-local type 8-224
multicast type 8-225
prefix format 8-223
unicast type 8-223
advertisement messages 8-227
description 8-227
neighbor solicitation message, figure 8-228
solicitation messages 8-227
enabling 8-231
configuring 8-237
displaying the route table 8-237
formats 4-72
formats 4-72
enforcing access control 4-89
access control 4-86 to 4-90
add initiator to zone database 4-88
advanced VSAN membershipadvanced VSAN membership 4-86
checking for WWN conflicts 4-82
configuring 4-67, 4-67 to ??, 4-70, ?? to 4-134
configuring AAA authentication 4-90, 4-91
configuring ACLs 4-88
configuring VRRP 4-132
default parameters 4-165
discovery phase 4-89
displaying global information 4-101
displaying statistics 4-98
drivers 4-68
enabling 4-68, 4-71
error 4-77
Fibre Channel targets 4-72 to ??
Gigabit Ethernet ports 7-211
gateway device 4-78
HA with host without multi-path software 4-128
initiator idle timeoutinitiator idle timeout
configuring with Fabric Manager 4-78
initiator name 4-92
IPS module support 6-198
IQNs 4-76
login redirect 4-108, 4-109
LUN mapping for targets 4-141 to 4-147
MPS-14/2 module support 6-198
multiple IPS ports 4-131
PortChannel-based high availability 4-133
PortChannel-based high availabilityEthernet PortChannel-based high availability 4-133
protocol 4-67, 4-68
requests and responses 4-70
restrict an initiator to a specific user name for CHAP authentication 4-92
routing 4-67, 4-68
routing modes chartrouting modes chart for iSCSI 4-96
session creation 4-90
statically mapped initiators 4-107
transparent initiator mode 4-77
transparent mode initiator 4-136 to 4-141
users with local authentication 4-91
VSAN membership 4-84
VSAN membership example 4-85
VSAN membership for iSCSI interfaces 4-84
CHAP option 4-135
configuring 4-90, 4-115
configuring mechanisms 4-91
external RADIUS servers 4-135
global override 4-91
local authentication 4-91
mechanisms 4-91
restricting on initiators 4-92
scenarios 4-134
setup guidelines 4-134
iSCSI-based access control 4-86, 4-88
example membership in VSANs 4-85
iscsi-gw 4-83
configuring 4-127 to 4-134
initiator identification 4-76
assigning WWNs 4-80
configuring dynamic IP address mapping 4-79
configuring static IP address mapping 4-80
displaying information 4-103 to 4-106
displaying proxy information 4-100
dynamic mapping 4-79
making dynamic WWN mapping static 4-81
proxy mode 4-82
static mapping 4-80
transparent mode 4-77
verifying configuration 4-112
WWN assignments 4-79
configuring 4-76, 4-76 to 4-97
configuring listener ports 4-94
configuring listener portsiSCSI
listener port 4-94
configuring QoS 4-95
configuring routing mode 4-95 to 4-97
configuring routing modesrouting modes 4-95
configuring TCP tuning parameters 4-94
creating 4-71
creating interfaces 4-71
displaying information 4-97
iSCSI LUs 4-72
iSCSI protocol 4-67
iSCSI server load balancing 4-106
iSCSI Server Load Balancing. See iSLB
authentication 4-90 to 4-93
displaying information 4-101
advertising 4-74
dynamic importing 4-72
dynamic mapping 4-72
secondary access 4-129
static importing 4-73
static importingstatic mappingiSCSI targets
static mapping 4-73
transparent failover 4-127 to 4-131
displaying information 4-106
displaying information 4-106
activating zones 4-113
auto-zoning 4-123
committing configuration changescommitting configuration changes
iSLB 4-124
configuration distribution 4-123 to ??, 4-123
configuration prerequisites 4-108
configuring 4-106
configuring initiators and targets 4-113
configuring VRRP 4-122
configuring zones 4-113
default settings 4-166
distributing configuration using CF 4-123
dynamic initiator mapping 4-110
enabling configuration distribution 4-124
initiator WWN assignment 4-106
load balancing algorithm 4-119 to 4-121
maximum initiators 4-108
static initiator configurationinitiator configuration
static iSLB 4-107
VSAN membership 4-111
zone set activation failed 4-114
default settings 4-166
iSLB initiators 4-108
assigning WWNs 4-110
configuring 4-109 to 4-117
configuring IP addresses 4-109
configuring names 4-109
configuring static name mapping 4-109
description 4-108
dynamic initiator mapping 4-110
VSAN membership 4-111
configuring 4-113
description 4-113
maximum sessions per IPS port 4-108
displaying information 4-122
enabling 4-122
verifying configuration 4-122
enabling 4-153
client registration 4-154
cloud discovery 4-161, 4-165
configuring 4-155
configuring servers 4-152 to 4-155
description 4-147
ESI 4-154
description 4-147
creating profiles 4-148
verifying configuration 4-149
CFS distribution 4-164
description 4-162
displaying statistics 4-165
verifying configuration 4-163
verifying membership 4-164
verifying status 4-164
creating 4-148
verifying configuration 4-149
configuration distribution 4-153
description 4-151
displaying configurations 4-155 to 4-161
enabling 4-153
example scenario 4-151
configuring estimated maximum in FCIP profiles 2-28
configuring in FCIP profiles 2-25
forwarding 4-95
description 8-224
format, figure 8-224
Ethernet PortChannel aggregation 6-203
load balancing 4-107, 4-108, 4-109
FSPF (example) 2-9
PortChannels (example) 2-9
weighted 4-112
load metric 4-112
lock the fabric 4-124
LUN 4-72
LUN mapping 4-129
iSCSI 4-141 to 4-147
explicit access control 4-82
mapping and assignment 4-82
LUs 4-72
configuring for IPv4 5-169
configuring for IPv6 5-169
configuring in FCIP profiles 2-25
VRRP 5-189
merge status conflicts 4-126
configuring IPv4 addresses 5-169
configuring IPv6 addresses 5-169
local IPv4 routing 5-171
configuring in FCIP profiles 2-24
MPS-14/2 modules 4-67, 4-68, 4-69, 4-71, 4-83, 4-89
CDP support 6-205
FCIP 2-6
port modes 7-211
software upgrades 6-199
configuring frame sizes 7-213
path discovery for IPv6 8-227
IPv6 alternative to broadcast addresses 8-226
IPv6 format, figure 8-225
IPv6 solicited-node format, figure 8-226
multi-path software example 4-128
configuring 5-180
Multiprotocol Services modules. See MPS-14/2 modules
configuring for iSCSI 4-92
configuring for iSLB 4-116
configuring for iSLBI 4-116
configuring parameters 8-235
verifying configuration 8-236
None authentication 4-90
time-stamp option 2-33
configuring 5-178
description 5-178
discarding in FCIP 2-33
pass-thru routing mode 4-95
PDU 4-95
configuring in FCIP profiles 2-25
interfaces 4-74
subinterfaces 4-74
configuring for FCIP high availability 2-9
IQN formats 4-72
load balancing (example) 2-9
member combinations 6-203
redundancy 2-11
IPS 7-211
virtual E 2-6
configuring Gigabit Ethernet interfaces 7-214
protocol 4-67
VRRP 4-72
configuring proxy initiator 4-83
proxy initiator mode 4-76, 4-87
configuring 4-83
zoning 4-84
proxy initiator mode 4-82
DSCP value 2-36
configuring 4-95
AAA authentication 4-90, 4-116
Ethernet PortChannels 2-10, 2-11
Fibre Channel PortChannels 2-11
VRRP 2-10
IPv6 8-229
RSCNs 4-78
configuring in FCIP profiles 2-26
assigning SCSI read/write commands 3-61, 3-63
configuring 3-58
configuring data patterns 3-64
configuring nWWNs 3-60
configuring virtual N ports 3-61
data patterns 3-59
default settings 3-66
description 3-57
initialization 3-60
license requirements 3-59
tuning guidelines 3-58
verifying configuration 3-65
routing requests 4-68
security parameter index. See SPI
selective acknowledgments. See SACKs
configuring virtual routers 5-189
statically imported iSCSI targets 4-129
converting 4-110
static mapped iSCSI targetiSCSI
static mapped target 4-90
static mapping 4-110
static WWN mapping 4-87
store-and-forward routing mode 4-95
configuring IPv4 routes 5-177
requirements 7-216
in-band 5-172
VRRP 2-10
AAA authentication 4-116
target discovery 4-155
FCIP profiles 2-8
configuring in FCIP profiles 2-24 to 2-29, ?? to 2-30
displaying 6-207
TCP tuning parameters 4-94
transient failure 4-78
transparent initiator mode 4-76
transparent initiator modeiSCSI
transparent initiator mode 4-82
CTC 2-22
link state 2-22
FCIP interface 2-8
description 2-6
FCIP 2-6
virtual Fibre Channel host 4-69
description 2-6
virtual router IDs. See VR IDs
Virtual Router Redundancy Protocol. See VRRP
Virtual Router Redundancy Protocolprotocols
Virtual Router Redundancy 4-107
adding 5-185
adding primary IP addresses 5-186
authentication 5-189
configuring for IPv4 5-185
configuring for IPv6 5-185
default settings 5-195
deleting 5-185
initiating 5-185
setting priorities 5-187
configuring on Gigabit Ethernet subinterfaces 7-216
description 7-215
configuring for IPv4 5-185
configuring for IPv6 5-185
description 5-183
mapping 5-183
VRRP 4-107
algorithm for selecting Gigabit Ethernet interfaces 4-119 to 4-121
backup switches 5-183
clearing statistics 5-193
configuring advertisement time intervals 5-188
configuring for Gigabit Ethernet interfaces 6-202
configuring for iSLB 4-122
configuring virtual routers 5-185
configuring VR IDs for IPv4 5-185
configuring VR IDs for IPv6 5-185
default settings 5-195
description 5-183, 6-201
displaying information 5-191 to 5-193
displaying statistics 5-193
group members 6-201
initiating virtual routers 5-185
IQN formats 4-72
iSCSI parameter change impact 4-119
iSLB 4-117 to 4-123
master switches 5-183
MD5 authentication 5-189
primary IP address 5-186
priority preemption 5-188
security authentication 5-189
setting priorities 5-187
setting priority 5-187
simple text authentication 5-189
VRRP group 4-85
VRRP–I f iSCSI login redirect 4-108, 4-109
configuring IPv4 addresses 5-172
verifying configuration 5-173
configuring multiple IPv4 subnets 5-180
example membership for iSCSI devices 4-85
gateway switches 5-171
IPv4 static routing 5-177
iSLB 4-111
iSLB initiators 4-111
overlaid routes 5-178
traffic routing between 5-167
VRRP 5-183
configuring in FCIP profiles 2-26
static binding 4-82
configuring and activating for iSLB 4-113
iSLB 4-113
configuring for iSCSI 4-87
configuring zoning based access control 4-87
Index
iSCSI node 4-156
configuring 4-90
enforcing access control 4-89
iSCSI 4-86, 4-88
access controlzoning based access controliSCSI
zoning based access control 4-89
configuring for iSCSI 4-88
configuring for iSCSI 4-88
setting time intervals 5-188
clearing entries 5-178
displaying entries 5-178
clearing 7-219
displaying 7-219
CHAP option 4-135
iSCSI setup 4-134
local 4-91
MD5 5-189
mechanism 4-91
mutual CHAPmutual CHAP authentication 4-92
restricting iSLB initiatorinitiator authentication
restricting iSLB initiators 4-116
simple text 5-189
See also simple text authentication
autogenerated iSCSI targetiSCSI
autogenerated target 4-90
configuring Gigabit Ethernet interfaces 7-213
configuring 2-35
interoperability mode 2-33
SAN extenders 2-34
configuring in FCIP profiles 2-28
iSLB config distribution 4-123
CHAP authentication 4-90, 4-115
configuring for iSCSI 4-135
CHAP challenge 4-92
CHAP response 4-92
CHAP user name 4-92
Cisco Discovery Protocol. See CDP
Cisco Transport Controller. See CTC
cloud discovery. See iSNS cloud discovery
congestion window monitoring. See CWM
IPS modules 6-200
description 2-22
launching 2-22
Cut-through routing mode 4-95
configuring in FCIP profiles 2-27
default gateways. See IPv4 default gateways
default networks. See IPv4 default networks
differentiated services code point. See DSCP
direct memory access devices. See DMA-bridges
displaying statistics 6-206
default settings 5-195
displaying information 5-194
configuring 5-193
defining 5-194
Domain Name System servers. See DNS servers
iSCSI 4-68
configuring 2-36
dynamic initiator mode parameter
distributed with CFS 4-123
converting 4-110
convert dynamic initiator to static 4-81
dynamic mapping 4-72, 4-110
static mappingstatic mapping 4-72
verifying using Device Manager (procedure) 2-22
entity status inquiry. See ESI
configuring 2-37
trunking configuration 2-22
non-resp threshold 4-154
displaying 6-206
adding Gigabit Ethernet interfaces 6-205
configuring 6-204
description 6-203
iSCSI 4-133
redundancy 2-10
explicit fabric logout 4-78
Extended Link Protocol. See ELP
CHAP 4-135
CHAP 4-135
FCIP 4-67
advanced features 2-42
checking trunk status (procedure) 2-22
compression 2-53
configuring 2-12 to 2-30, ?? to 2-30
configuring using FCIP Wizard ?? to 2-18
default parameters 2-55
discarding packets 2-33
enabling 2-12
Gigabit Ethernet ports 7-211
high availability 2-8 to ??
IPS modules 2-6
IP storage services support 6-197
link failures 2-9
MPS-14/2 module 2-6
tape acceleration 2-46 to 2-53
time stamps 2-33
VE ports 2-6
verifying ELP (procedure) 2-22
verifying interfaces (procedure) 2-22
virtual ISLs 2-6
VRRP 2-10
write acceleration 2-42
configuring 2-54
configuring (procedure) 2-15
description 2-53
displaying information 2-54
configuring advanced features 2-30 to 2-37, ?? to 2-37
configuring peers 2-30
configuring QoS 2-36
creating 2-30
displaying information 2-38
parameters 2-8
B port interoperability mode 2-33
configuring 2-18
configuring peers 2-30
configuring QoS 2-36
creating 2-21
description 2-7
endpoints 2-7
initiating IP connections 2-32
TCP connections 2-7
configuring 2-24
configuring IP addresses 2-31
configuring listener ports 2-24
configuring TCP parameters 2-24 to 2-29, ?? to 2-30
creating 2-19
description 2-8
displaying information 2-20
configuring 2-51
description 2-46 to 2-51
displaying information 2-52
configuring buffer size 2-28
configuring CWM 2-27
configuring keepalive timeouts 2-25
configuring maximum jitter 2-28
configuring maximum retransmissions 2-25
configuring minimum retransmit timeouts 2-24
configuring PMTUs 2-25
configuring SACKs 2-26
configuring window management 2-26
displaying 2-29, 2-30
configuring 2-45
configuring (procedure) 2-15
description 2-42
displaying information 2-45
routing requests 4-70
Fibre Channel 4-67
iSCSI targets 4-72 to ??
Fibre Channel over IP. See FCIP
dynamic importing 4-73
dynamic mapping 4-73
Fibre Channel zoning-based access control 4-89
load balancing (example) 2-9
configuring MTU size 7-213
IPS modules 6-200
Gigabit Ethernet interface example 4-131
configuring ?? to 6-205
configuring auto-negotiation 7-213
configuring high availability 6-201 to 6-205
configuring IPv4 7-212
configuring IPv6 addresses 8-232
configuring MTU frame sizes 7-213
configuring promiscuous mode 7-214
configuring static IPv4 routing 7-217
configuring VRRP 6-202
default parameters 7-220
displaying statistics 6-205 to 6-209
IPv4-ACL guidelines 7-217
subinterfaces 7-216
subnet requirements 7-216
verifying connectivity 7-214
Gigabit Ethernet subinterfaces
configuring VLANs 7-216
paramter distributed 4-123
HA solution example 4-129
HBA port 4-77, 4-82
Ethernet PortChannel 4-133
Ethernet PortChannels 2-10
Fibre Channel PortChannels 2-11
VRRP 2-10, 4-132
VRRPVRRP-based high availability 4-132
displaying statistics 6-208
IPv6 8-226
IPv6 header format, figure 8-226
IPFC 5-172
statically mapped iSCSI 4-107
Internet Control Message Protocol. See ICMP
Internet Storage Name Service. See iSNS
active mode 2-32
initiating 2-32
passive mode 2-32
configuration guidelines 5-172
configuring VSAN interfaces 5-172
description 5-172
enabling IPv4 routing 5-173
example configuration 5-173 to 5-176
IPS core dumps. See core dumps
CDP support 6-205
core dumps 6-200
FCIP 2-6
partial core dumps 6-200
port modes 7-211
software upgrades 6-199
supported features 6-197
IPS ports 4-72
modes 7-211
multiple connections 4-131
default parameters 6-209
IP Storage services modules. See IPS modules
configuring Gigabit Ethernet interfaces 7-212
configuring management interfaces 5-169
configuring virtual routers 5-185
default settings 7-220
description 7-211
displaying statistics 7-219
transitioning to IPv6 8-239
guidelines for Gigabit Ethernet interfaces 7-217
adding for VRRP 5-186
configuring in VSANs 5-172
configuring IPv6 and IPV6 protocol stacks 8-233
IPv6 protocol stacks 8-230
configuring 5-170, 5-171
description 5-170
IP static routing 5-170
static routes (tip) 5-171
verifying configuration 5-170
description 5-170
configuring Gigabit Ethernet interfaces 7-217
disabling 5-173
displaying route tables 7-217
enabling 5-173
verifying configuration 5-173
configuring 5-177
description 5-177
verifying configuration 5-177
address types 8-223
configuring addressing 8-231
configuring IPv4 and IPv6 addresses 8-233
configuring management interfaces 5-169
configuring neighbor discovery parameters 8-235
configuring virtual routers 5-185
default settings 8-240
description 8-221 to 8-231
displaying information 8-239
dual IPv4 and IPv6 protocol stack applications, figure 8-231
dual IPv4 and IPv6 protocol stacks 8-230
dual IPv4 and IPv6 protocol stack technique, figure 8-230
enabling routing 8-231
enhancements over IPv4 8-221
ICMP 8-226
IPv6-ACL guidelines 8-238
neighbor discovery 8-227
path MTU discovery 8-227
router advertisement messages 8-229
router discovery 8-229
stateless autoconfiguration 8-229
static routes 8-237
transitioning from IPv4 8-239
verifying basic connectivity 8-233
verifying configuration 8-233
guidelines for IPv6 8-238
adding for VRRP 5-186
configuring 8-231
configuring IPv4 and IPV6 protocol stacks 8-233
formats 8-222
link-local type 8-224
multicast type 8-225
prefix format 8-223
unicast type 8-223
advertisement messages 8-227
description 8-227
neighbor solicitation message, figure 8-228
solicitation messages 8-227
enabling 8-231
configuring 8-237
displaying the route table 8-237
formats 4-72
formats 4-72
enforcing access control 4-89
access control 4-86 to 4-90
add initiator to zone database 4-88
advanced VSAN membershipadvanced VSAN membership 4-86
checking for WWN conflicts 4-82
configuring 4-67, 4-67 to ??, 4-70, ?? to 4-134
configuring AAA authentication 4-90, 4-91
configuring ACLs 4-88
configuring VRRP 4-132
default parameters 4-165
discovery phase 4-89
displaying global information 4-101
displaying statistics 4-98
drivers 4-68
enabling 4-68, 4-71
error 4-77
Fibre Channel targets 4-72 to ??
Gigabit Ethernet ports 7-211
gateway device 4-78
HA with host without multi-path software 4-128
initiator idle timeoutinitiator idle timeout
configuring with Fabric Manager 4-78
initiator name 4-92
IPS module support 6-198
IQNs 4-76
login redirect 4-108, 4-109
LUN mapping for targets 4-141 to 4-147
MPS-14/2 module support 6-198
multiple IPS ports 4-131
PortChannel-based high availability 4-133
PortChannel-based high availabilityEthernet PortChannel-based high availability 4-133
protocol 4-67, 4-68
requests and responses 4-70
restrict an initiator to a specific user name for CHAP authentication 4-92
routing 4-67, 4-68
routing modes chartrouting modes chart for iSCSI 4-96
session creation 4-90
statically mapped initiators 4-107
transparent initiator mode 4-77
transparent mode initiator 4-136 to 4-141
users with local authentication 4-91
VSAN membership 4-84
VSAN membership example 4-85
VSAN membership for iSCSI interfaces 4-84
CHAP option 4-135
configuring 4-90, 4-115
configuring mechanisms 4-91
external RADIUS servers 4-135
global override 4-91
local authentication 4-91
mechanisms 4-91
restricting on initiators 4-92
scenarios 4-134
setup guidelines 4-134
iSCSI-based access control 4-86, 4-88
example membership in VSANs 4-85
iscsi-gw 4-83
configuring 4-127 to 4-134
initiator identification 4-76
assigning WWNs 4-80
configuring dynamic IP address mapping 4-79
configuring static IP address mapping 4-80
displaying information 4-103 to 4-106
displaying proxy information 4-100
dynamic mapping 4-79
making dynamic WWN mapping static 4-81
proxy mode 4-82
static mapping 4-80
transparent mode 4-77
verifying configuration 4-112
WWN assignments 4-79
configuring 4-76, 4-76 to 4-97
configuring listener ports 4-94
configuring listener portsiSCSI
listener port 4-94
configuring QoS 4-95
configuring routing mode 4-95 to 4-97
configuring routing modesrouting modes 4-95
configuring TCP tuning parameters 4-94
creating 4-71
creating interfaces 4-71
displaying information 4-97
iSCSI LUs 4-72
iSCSI protocol 4-67
iSCSI server load balancing 4-106
iSCSI Server Load Balancing. See iSLB
authentication 4-90 to 4-93
displaying information 4-101
advertising 4-74
dynamic importing 4-72
dynamic mapping 4-72
secondary access 4-129
static importing 4-73
static importingstatic mappingiSCSI targets
static mapping 4-73
transparent failover 4-127 to 4-131
displaying information 4-106
displaying information 4-106
activating zones 4-113
auto-zoning 4-123
committing configuration changescommitting configuration changes
iSLB 4-124
configuration distribution 4-123 to ??, 4-123
configuration prerequisites 4-108
configuring 4-106
configuring initiators and targets 4-113
configuring VRRP 4-122
configuring zones 4-113
default settings 4-166
distributing configuration using CF 4-123
dynamic initiator mapping 4-110
enabling configuration distribution 4-124
initiator WWN assignment 4-106
load balancing algorithm 4-119 to 4-121
maximum initiators 4-108
static initiator configurationinitiator configuration
static iSLB 4-107
VSAN membership 4-111
zone set activation failed 4-114
default settings 4-166
iSLB initiators 4-108
assigning WWNs 4-110
configuring 4-109 to 4-117
configuring IP addresses 4-109
configuring names 4-109
configuring static name mapping 4-109
description 4-108
dynamic initiator mapping 4-110
VSAN membership 4-111
configuring 4-113
description 4-113
maximum sessions per IPS port 4-108
displaying information 4-122
enabling 4-122
verifying configuration 4-122
enabling 4-153
client registration 4-154
cloud discovery 4-161, 4-165
configuring 4-155
configuring servers 4-152 to 4-155
description 4-147
ESI 4-154
description 4-147
creating profiles 4-148
verifying configuration 4-149
CFS distribution 4-164
description 4-162
displaying statistics 4-165
verifying configuration 4-163
verifying membership 4-164
verifying status 4-164
creating 4-148
verifying configuration 4-149
configuration distribution 4-153
description 4-151
displaying configurations 4-155 to 4-161
enabling 4-153
example scenario 4-151
configuring estimated maximum in FCIP profiles 2-28
configuring in FCIP profiles 2-25
forwarding 4-95
description 8-224
format, figure 8-224
Ethernet PortChannel aggregation 6-203
load balancing 4-107, 4-108, 4-109
FSPF (example) 2-9
PortChannels (example) 2-9
weighted 4-112
load metric 4-112
lock the fabric 4-124
LUN 4-72
LUN mapping 4-129
iSCSI 4-141 to 4-147
explicit access control 4-82
mapping and assignment 4-82
LUs 4-72
configuring for IPv4 5-169
configuring for IPv6 5-169
configuring in FCIP profiles 2-25
VRRP 5-189
merge status conflicts 4-126
configuring IPv4 addresses 5-169
configuring IPv6 addresses 5-169
local IPv4 routing 5-171
configuring in FCIP profiles 2-24
MPS-14/2 modules 4-67, 4-68, 4-69, 4-71, 4-83, 4-89
CDP support 6-205
FCIP 2-6
port modes 7-211
software upgrades 6-199
configuring frame sizes 7-213
path discovery for IPv6 8-227
IPv6 alternative to broadcast addresses 8-226
IPv6 format, figure 8-225
IPv6 solicited-node format, figure 8-226
multi-path software example 4-128
configuring 5-180
Multiprotocol Services modules. See MPS-14/2 modules
configuring for iSCSI 4-92
configuring for iSLB 4-116
configuring for iSLBI 4-116
configuring parameters 8-235
verifying configuration 8-236
None authentication 4-90
time-stamp option 2-33
configuring 5-178
description 5-178
discarding in FCIP 2-33
pass-thru routing mode 4-95
PDU 4-95
configuring in FCIP profiles 2-25
interfaces 4-74
subinterfaces 4-74
configuring for FCIP high availability 2-9
IQN formats 4-72
load balancing (example) 2-9
member combinations 6-203
redundancy 2-11
IPS 7-211
virtual E 2-6
configuring Gigabit Ethernet interfaces 7-214
protocol 4-67
VRRP 4-72
configuring proxy initiator 4-83
proxy initiator mode 4-76, 4-87
configuring 4-83
zoning 4-84
proxy initiator mode 4-82
DSCP value 2-36
configuring 4-95
AAA authentication 4-90, 4-116
Ethernet PortChannels 2-10, 2-11
Fibre Channel PortChannels 2-11
VRRP 2-10
IPv6 8-229
RSCNs 4-78
configuring in FCIP profiles 2-26
assigning SCSI read/write commands 3-61, 3-63
configuring 3-58
configuring data patterns 3-64
configuring nWWNs 3-60
configuring virtual N ports 3-61
data patterns 3-59
default settings 3-66
description 3-57
initialization 3-60
license requirements 3-59
tuning guidelines 3-58
verifying configuration 3-65
routing requests 4-68
security parameter index. See SPI
selective acknowledgments. See SACKs
configuring virtual routers 5-189
statically imported iSCSI targets 4-129
converting 4-110
static mapped iSCSI targetiSCSI
static mapped target 4-90
static mapping 4-110
static WWN mapping 4-87
store-and-forward routing mode 4-95
configuring IPv4 routes 5-177
requirements 7-216
in-band 5-172
VRRP 2-10
AAA authentication 4-116
target discovery 4-155
FCIP profiles 2-8
configuring in FCIP profiles 2-24 to 2-29, ?? to 2-30
displaying 6-207
TCP tuning parameters 4-94
transient failure 4-78
transparent initiator mode 4-76
transparent initiator modeiSCSI
transparent initiator mode 4-82
CTC 2-22
link state 2-22
FCIP interface 2-8
description 2-6
FCIP 2-6
virtual Fibre Channel host 4-69
description 2-6
virtual router IDs. See VR IDs
Virtual Router Redundancy Protocol. See VRRP
Virtual Router Redundancy Protocolprotocols
Virtual Router Redundancy 4-107
adding 5-185
adding primary IP addresses 5-186
authentication 5-189
configuring for IPv4 5-185
configuring for IPv6 5-185
default settings 5-195
deleting 5-185
initiating 5-185
setting priorities 5-187
configuring on Gigabit Ethernet subinterfaces 7-216
description 7-215
configuring for IPv4 5-185
configuring for IPv6 5-185
description 5-183
mapping 5-183
VRRP 4-107
algorithm for selecting Gigabit Ethernet interfaces 4-119 to 4-121
backup switches 5-183
clearing statistics 5-193
configuring advertisement time intervals 5-188
configuring for Gigabit Ethernet interfaces 6-202
configuring for iSLB 4-122
configuring virtual routers 5-185
configuring VR IDs for IPv4 5-185
configuring VR IDs for IPv6 5-185
default settings 5-195
description 5-183, 6-201
displaying information 5-191 to 5-193
displaying statistics 5-193
group members 6-201
initiating virtual routers 5-185
IQN formats 4-72
iSCSI parameter change impact 4-119
iSLB 4-117 to 4-123
master switches 5-183
MD5 authentication 5-189
primary IP address 5-186
priority preemption 5-188
security authentication 5-189
setting priorities 5-187
setting priority 5-187
simple text authentication 5-189
VRRP group 4-85
VRRP–I f iSCSI login redirect 4-108, 4-109
configuring IPv4 addresses 5-172
verifying configuration 5-173
configuring multiple IPv4 subnets 5-180
example membership for iSCSI devices 4-85
gateway switches 5-171
IPv4 static routing 5-177
iSLB 4-111
iSLB initiators 4-111
overlaid routes 5-178
traffic routing between 5-167
VRRP 5-183
configuring in FCIP profiles 2-26
static binding 4-82
configuring and activating for iSLB 4-113
iSLB 4-113
configuring for iSCSI 4-87
configuring zoning based access control 4-87