IP Services Configuration Guide, Cisco DCNM for SAN, Release 6.x
IP Services CG - Index
Downloads: This chapterpdf (PDF - 401.0KB) The complete bookPDF (PDF - 3.71MB) | Feedback

Index

Table Of Contents

A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - V - W - Z

Index

A

AAA authentication

configuring 4-43, 4-44

access control

enforcingiSCSI

enforcing access control 4-13

iSCSI 4-11, 4-12

access controlzoning based access controliSCSI

zoning based access control 4-13

ACL based access control

configuring for iSCSI 4-12

ACLs

configuring for iSCSI 4-12

advertised interfaces 4-38

authentication

CHAP option 4-54

configuring local with Device Manager 4-44

iSCSI setup 4-54

local 4-44

MD5 5-13

mechanism 4-44

mutual CHAPmutual CHAP authentication 4-45

restricting iSLB initiatorinitiator authentication

restrictingiSLB

restricting iSLB initiators     1

simple text 5-13

See also MD5 authentication

See also simple text authentication

autogenerated iSCSI targetiSCSI

autogenerated target 4-13

auto-negotiation

configuring Gigabit Ethernet interfaces 6-6, 7-5

B

B ports

configuring 2-28

interoperability mode 2-9

SAN extenders 2-10

bridge ports. See B ports

buffer sizes

configuring in FCIP profiles 2-26

C

CFS

iSLB config distribution 4-21

CHAP authentication 4-13, 4-19, 4-54

CHAP challenge 4-45

CHAP response 4-45

CHAP user name 4-45

Cisco Discovery Protocol 6-10

Cisco Transport Controller. See CTC

cloud discovery. See iSNS cloud discovery

congestion window monitoring. See CWM

core dumps

IPS modules 6-5

CTC

description 2-23

launching 2-23

Cut-through routing mode 4-15

cut-thru routing mode 4-16

CWM

configuring in FCIP profiles 2-25

D

default gateways. See IPv4 default gateways

default networks. See IPv4 default networks

differentiated services code point. See DSCP

DNS

default settings 5-8

DNS servers

configuring 5-7

drivers

iSCSI 4-2

DSCP

configuring 2-11

dynamic initiator mode parameter

distributed with CFS 4-21

dynamic iSCSI initiator

convert to staticiSCSI

convert dynamic initiator to static 4-40

dynamic mapping 4-5, 4-18

dynamic mappingiSCSI

dynamic mappingiSCSI

static mappingstatic mapping 4-4

E

ELP

verifying using Device Manager (procedure) 2-30

entity status inquiry. See ESI

E ports

configuring 2-12

trunking configuration 2-23

ESI

non-resp threshold 4-59

Ethernet PortChannels

configuring 6-12

description 6-9

iSCSI 4-28

redundancy 2-7

explicit fabric logout 4-8

Extended Link Protocol. See ELP

external RADIUS server

CHAP 4-55

external RADIUS servers

CHAP 4-55

F

fabric lock

releasing 4-53

FCIP 4-1

checking trunk status (procedure) 2-23

compression 2-18

configuring using FCIP Wizard??to 2-22

default parameters 2-19

discarding packets 2-28

enabling 2-21

Gigabit Ethernet ports 6-4, 7-2

high availability2-5to ??

IPS modules 2-2

IP storage services support 6-1, 6-2

link failures 2-6

MPS-14/2 module 2-2

tape acceleration2-14to ??

time stamps 2-28

VE ports 2-2

verifying ELP (procedure) 2-30

verifying interfaces (procedure) 2-30

virtual ISLs 2-2

VRRP 2-7

write acceleration 2-12

FCIP compression

configuring (procedure) 2-22

description 2-18

FCIP interfaces

configuring peers 2-9

configuring QoS 2-11

creating 2-9

parameters 2-5

FCIP links

B port interoperability mode 2-9

configuring 2-22

configuring peers 2-9

configuring QoS 2-11

description 2-3

endpoints 2-3

initiating IP connections 2-28

TCP connections 2-3

FCIP peers

configuring IP addresses 2-27

FCIP profiles

configuring TCP parameters2-24to ??

creating 2-22

description 2-4

FCIP tape acceleration

configuring 2-29

description2-14to 2-18

FCIP TCP parameters

configuring buffer size 2-26

configuring CWM 2-25

configuring keepalive timeouts 2-24

configuring maximum jitter 2-26

configuring maximum retransmissions 2-25

configuring minimum retransmit timeouts 2-24

configuring PMTUs 2-25

configuring SACKs 2-25

configuring window management 2-25

FCIP write acceleration

configuring 2-29

configuring (procedure) 2-22

description 2-12

FCP

routing requests 4-4

Fibre Channel 4-1

iSCSI targets4-4to 4-62

Fibre Channel interfaces

default settings 2-19, 3-4, 5-8, 6-11, 7-4, 8-13

Fibre Channel over IP. See FCIP

Fibre Channel targets

dynamic importing 4-36

dynamic mapping 4-36

Fibre Channel zoning-based access control 4-13

FPSF

load balancing (example) 2-6

frames

configuring MTU size 6-6, 7-6

full core dumps

IPS modules 6-5

G

Gigabit Ethernet

IPv4 example configuration 6-5

Gigabit Ethernet interface example 4-26

Gigabit Ethernet interfaces

configuring6-4to 6-10

configuring auto-negotiation 6-6, 7-5

configuring high availability6-8to ??

configuring IPv6 addresses 8-13

configuring MTU frame sizes 6-6, 7-6

configuring promiscuous mode 6-6, 7-6

default parameters 7-4

subinterfaces 6-7, 7-3

subnet requirements 6-7, 7-3

Gigabit Ethernet subinterfaces

configuring VLANs 7-7

global authentication

paramter distributed 4-21

H

HA solution example 4-25

HBA port 4-7, 4-10

hexadecimal fields 8-11

high availability

Ethernet PortChannel 4-28

Ethernet PortChannels 2-7

Fibre Channel PortChannels 2-8

VRRP 2-7, 4-27

VRRPVRRP-based high availability 4-27

I

ICMP

IPv6 8-6

ICMP packets

IPv6 header format, figure 8-7

in-band management

IPFC 5-4

initiators

statically mapped iSCSI 4-17

interfaces

default settings 2-19, 3-4, 5-8, 6-11, 7-4, 8-13

Internet Control Message Protocol. See ICMP

Internet Storage Name Service. See iSNS

IP connections

active mode 2-28

initiating 2-28

passive mode 2-28

IPFC

description 5-4

IPS core dumps. See core dumps

IPsec

configuring with FCIP Wizard (procedure) 2-21

IPS modules

configuring CDP 6-10

core dumps 6-5

FCIP 2-2

partial core dumps 6-5

port modes 6-4, 7-2

software upgrades 6-3

supported features 6-1, 6-2

IPS port mode

description 6-4

IPS ports 4-5

modes 7-2

multiple connections 4-26

IP storage services

default parameters 6-11

IP Storage services modules. See IPS modules

IPv4

default settings 7-4

transitioning to IPv6 8-12

IPv4 addresses

configuring IPv6 and IPV6 protocol stacks 8-14

IPv6 protocol stacks 8-10

IPv4 default gateways

configuring 5-9

description 5-3

static routes (tip) 5-3

IPv4 default networks

description 5-3

IPv4 static routing

description 5-5

IPv6

address types 8-3

configuring addressing 8-11, 8-13

configuring IPv4 and IPv6 addresses 8-14

configuring management interfaces 5-8

description??to 8-11

dual IPv4 and IPv6 protocol stack applications, figure 8-11

dual IPv4 and IPv6 protocol stacks 8-10

dual IPv4 and IPv6 protocol stack technique, figure 8-10

enabling routing 8-11, 8-13

enhancements over IPv4 8-1

ICMP 8-6

neighbor discovery 8-7

path MTU discovery 8-7

router advertisement messages 8-9

router discovery 8-9

stateless autoconfiguration 8-9

transitioning from IPv4 8-12

IPv6 addresses

configuring 8-11, 8-13

configuring IPv4 and IPV6 protocol stacks 8-14

formats 8-2

link-local type 8-4

multicast type 8-5

prefix format 8-3

unicast type 8-3

IPv6 enhancements over IPv4 8-1

IPv6 neighbor discovery

advertisement messages 8-7

description 8-7

neighbor solicitation message, figure 8-8

solicitation messages 8-7

IPv6 routing

enabling 8-11, 8-13

IQN

formats 4-5

IQNs

formats 4-5

ISCSI

enforcing access control 4-13

iSCSI

access control4-11to 4-13

add initiator to zone database 4-42

advanced VSAN membershipadvanced VSAN membership 4-11

checking for WWN conflicts 4-40

configuring??to 4-29

configuring AAA authentication 4-43, 4-44

configuring ACLs 4-12

configuring VRRP 4-27

creating virtual targets 4-37

default parameters 4-33

discovery phase 4-13

drivers 4-2

enabling 4-2, 4-35

error 4-7

Fibre Channel targets4-4to 4-62

Gigabit Ethernet ports 6-4, 7-2

GW flagiSCSI

gateway device 4-8

HA with host without multi-path software 4-25

initiator idle timeoutinitiator idle timeout

iSCSIinitiator idle timeout

configuring with Fabric Manager     1

initiator name 4-45

initiator targets 4-36

IPS module support 6-2

IQNs 4-6

login redirect 4-18

LUN mapping for targets4-68to ??

MPS-14/2 module support 6-2

multiple IPS ports 4-26

PortChannel-based high availability 4-28

PortChannel-based high availabilityEthernet PortChannel-based high availability 4-28

protocol 4-2

requests and responses 4-4

restrict an initiator to a specific user name for CHAP authentication 4-45

routing 4-2

routing modes chartrouting modes chart for iSCSI 4-16

session creation 4-13

session limits 4-7

statically mapped initiators 4-17

tables in Fabric Manager 4-40

targets in Device Manager 4-37

transparent initiator mode 4-7

transparent mode initiator4-64to ??

users with local authentication 4-44

using iSCSI Wizard (procedure) 4-36

VSAN membership 4-11

VSAN membership example 4-63

VSAN membership for iSCSI interfaces 4-11, 4-42

zone name 4-36

iSCSI authentication

configuring 4-13, 4-19

configuring RADIUS (procedure) 4-46

external RADIUS servers 4-55

global override 4-44

local authentication 4-44

mechanisms 4-44

restricting on initiators 4-45

scenarios 4-54

setup guidelines 4-54

iSCSI-based access control 4-11, 4-12

iSCSI devices

example membership in VSANs 4-63

iscsi-gw 4-10

iSCSI high availability

configuring4-23to 4-29

iSCSI hosts

initiator identification 4-6

iSCSI initiators

configuring static IP address mapping 4-39

dynamic mapping 4-9

making dynamic WWN mapping static 4-40

proxy mode 4-9

statically mapped (procedure) 4-39

static mapping 4-9

transparent mode 4-7

WWN assignments 4-8

iSCSI interfaces

configuring4-6, 4-6to ??

configuring listener ports 4-14

configuring listener portsiSCSI

listener port 4-14

configuring QoS 4-46

configuring routing mode4-15to ??

configuring routing modesiSCS

configuring routing modesrouting modes 4-15

configuring TCP tuning parameters 4-14

creating 4-36

creatingiSCSI

creating interfaces 4-36

iSCSI LUs 4-5

iSCSI protocol 4-1

iSCSI server load balancing 4-17

iSCSI Server Load Balancing. See iSLB

iSCSI sessions

authenticationiSCSI

session authenticationauthentication

iSCSI session     1

iSCSI targets

advertising 4-38

dynamic importing 4-5

dynamic mapping 4-5

secondary access 4-25

static importing 4-6

static importingstatic mappingiSCSI targets

static mapping 4-6

transparent failover4-23, ??to 4-54

iSLB

activating zones 4-18, 4-49

auto-zoning 4-22

committing configuration changescommitting configuration changes

iSLB 4-52

configuration distribution4-21to ??, 4-51

configuring 4-47

configuring initiators and targets 4-18, 4-49

configuring VRRP 4-51

configuring with Device Manager 4-47

configuring zones 4-18, 4-49

default settings 4-34

distributing configuration using CF 4-21

enabling configuration distribution 4-52

initiator WWN assignment 4-47

load balancing algorithm4-21to ??

maximum initiators 4-32

static initiator configurationinitiator configuration

static iSLB 4-17

VSAN membership 4-48

zone set activation failed 4-50

iSlb

default settings 4-34

iSLB auto-zone feature 4-33

iSLB initiators 4-18

assigning WWNs 4-18

configuring??to 4-19

VSAN membership 4-48

iSLB initiator targets

description 4-18, 4-49

iSLB sessions

maximum per IPS portiSLB

maximum sessions per IPS port 4-32

iSLB with CFS distribution 4-32

iSMS servers

enabling 4-58

iSNS

client registration 4-31

configuring 4-31

configuring servers??to4-31, 4-57to ??

description 4-29

ESI 4-59

iSNS client

description 4-30

iSNS clients

creating profiles 4-56

iSNS cloud discovery

CFS distribution 4-61

description 4-31

iSNS profiles

creating 4-56

iSNS servers

configuration distribution 4-58

description 4-30

enabling 4-58

J

jitter

configuring estimated maximum in FCIP profiles 2-26

jumbo frames. See MTUs

K

keepalive timeouts

configuring in FCIP profiles 2-24

L

latency

forwarding 4-15

link-local addresses

description 8-4

format, figure 8-5

link redundancy

Ethernet PortChannel aggregation 6-9

load balancing 4-17, 4-18

FSPF (example) 2-6

PortChannels (example) 2-5

weighted 4-49

load metric 4-49

lock the fabric 4-22

LUN 4-5

trespass for storage port failover 4-54

LUN mapping 4-25

iSCSI4-68to ??

LUNs

explicit access control 4-9

mapping and assignment 4-10

LUs 4-4, 4-5

M

management interfaces

configuring 5-8

configuring for IPv6 5-8

default settings 2-19, 3-4, 5-8, 6-11, 7-4, 8-13

maximum retransmissions

configuring in FCIP profiles 2-25

MD5 authentication

VRRP 5-13

merge status conflictsiSLB

merge status conflictsCFS

merge status conflicts 4-23

mgmt0 interfaces

default settings 2-19, 3-4, 5-8, 6-11, 7-4, 8-13

local IPv4 routing 5-4

minimum retransmit timeouts

configuring in FCIP profiles 2-24

MPS-14/2 modules 4-1, 4-2, 4-3, 4-10, 4-13, 4-36

FCIP 2-2

port modes 6-4, 7-2

software upgrades 6-4

supported features 6-1, 6-2

MTU frame sizes

configuring Gigabit Ethernet interfaces 6-6

MTUs

configuring frame sizes 7-6

configuring size

path discovery for IPv6 8-7

multicast addresses

IPv6 alternative to broadcast addresses 8-6

IPv6 format, figure 8-5

IPv6 solicited-node format, figure 8-6

multi-path software example 4-24

multiple VSANs

configuring 5-11

Multiprotocol Services modules. See MPS-14/2 modules

mutual CHAP authentication

configuring for iSCSI 4-45

configuring for iSLB 4-51

configuring for iSLBI 4-51

N

None authentication 4-13

NTP

time-stamp option 2-28

O

overlay VSANs

configuring 5-10

description 5-5

P

packets

discarding in FCIP 2-28

pass-thru routing mode 4-15, 4-16

path MTUs. See PMTUs

PDU 4-15

PMTUs

configuring in FCIP profiles 2-25

PortChannel

interfaces 4-38

subinterfaces 4-38

PortChannels

configuring for FCIP high availability 2-5

IQN formats 4-5

load balancing (example) 2-5

member combinations 6-9

redundancy 2-8

port modes

IPS 6-4, 7-2

ports

virtual E 2-2

promiscuous mode

configuring Gigabit Ethernet interfaces 6-6, 7-6

protocol 4-1

protocols

VRRP 4-5

proxy initiator

configuringiSCSI

configuring proxy initiator 4-41

proxy initiator mode 4-7, 4-12

configuring 4-10

zoning 4-41

proxy initiator modeiSCSI

proxy initiator mode 4-9

Pv6 address formats 8-11

pWWNs

converting dynamic to static 4-40

Q

QoS

DSCP value 2-11

QoS values

configuring 4-46

R

RADIUS 4-55

AAA authentication 4-13, 4-19

configuring an iSCSI RADIUS serveriSCSI

configuring a RADIUS server 4-46

redundancy

Ethernet PortChannels 2-7, 2-8

Fibre Channel PortChannels 2-8

VRRP 2-7

router discovery

IPv6 8-9

RSCNs 4-39

S

SACKs

configuring in FCIP profiles 2-25

SAN extension tuner

configuring 3-3

data patterns 3-3

tuning guidelines 3-2

SCSI

routing requests 4-2

security parameter index. See SPI

selective acknowledgments. See SACKs

SPI

configuring virtual routers 5-13

statically imported iSCSI targets 4-25

static mapped iSCSI targetiSCSI

static mapped target 4-13

static mapping 4-18

static WWN mapping 4-12

store-and-forward routing mode 4-15, 4-16

subnets

requirements 6-7, 7-3

switch management

in-band 5-4

switchovers

VRRP 2-7

T

TACACS+

AAA authentication 4-19

target discovery 4-31

TCP connections

FCIP profiles 2-4

TCP parameters

configuring in FCIP profiles2-24to ??

TCP tuning parameters 4-14

transient failure 4-39

transparent initiator mode 4-7

transparent initiator modeiSCSI

transparent initiator mode 4-9

troubleshooting

CTC 2-23

trunking

link state 2-23

trunking mode

FCIP interface 2-5

V

VE ports

description 2-2

FCIP 2-2

virtual E ports. See VE ports

virtual Fibre Channel host 4-3

virtual ISLs

description 2-2

Virtual LANs. See VLANs

virtual LANs. See VLANs

virtual router IDs. See VR IDs

Virtual Router Redundancy Protocol. See VRRP

Virtual Router Redundancy Protocolprotocols

Virtual Router Redundancy 4-17

virtual routers

adding primary IP addresses 5-13

authentication 5-13

default settings 5-8

VLANs

configuring on Gigabit Ethernet subinterfaces 7-7

description 6-6, 7-2

VR IDs

description 5-5

mapping 5-5

VRRP 4-17

algorithm for selecting Gigabit Ethernet interfaces4-21to ??

backup switches 5-6

configuring for iSLB 4-51

default settings 5-8

description 5-5, 6-8

group members 6-8

IQN formats 4-5

iSCSI parameter change impact 4-21

iSLB4-19to ??

master switches 5-6

MD5 authentication 5-13

primary IP address 5-13

security authentication 5-13

simple text authentication 5-13

VRRP group 4-42

VRRP-I f iSCSI login redirect 4-18

VSANs

configuring multiple IPv4 subnets 5-11

example membership for iSCSI devices 4-63

gateway switches 5-4

IPv4 static routing 5-5

iSLB 4-48

iSLB initiators 4-48

traffic routing between 5-1

VRRP 5-5

W

window management

configuring in FCIP profiles 2-25

WWNs

static binding 4-10

Z

zones

configuring and activating for iSLB 4-18, 4-49

iSLB 4-18, 4-49

zoning based access control

configuring for iSCSI 4-11

configuring for iSCSIiSCSI

configuring zoning based access control 4-11