Cisco Nexus 4001I and 4005I Switch Module for IBM BladeCenter NX-OS Configuration Guide
Index
Downloads: This chapterpdf (PDF - 430.0KB) The complete bookPDF (PDF - 4.46MB) | Feedback

Index

Table Of Contents

A - B - C - D - E - F - H - I - J - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

A

AAA

accounting 17-2

authentication 17-2

authorization 17-2

benefits 17-2

configuration process 17-6

configuring17-6to 17-11

default settings 17-12

description 17-1

enabling MS-CHAP authentication 17-8

example configuration 17-12

field descriptions 17-1

guidelines 17-5

limitations 17-5

monitoring TACACS+ servers 19-3

prerequisites 17-5

TACACS+ server groups 18-14, 19-7, 19-13

user login process 17-4

verifying configurations 17-12

AAA accounting

adding rule methods 17-1

changing rule methods 17-1

configuring default methods 17-9

deleting rule methods 17-1

rearranging rule methods 17-1

AAA accounting logs

clearing 17-11

displaying 17-11

AAA authentication rules

adding methods 17-1

changing methods 17-1

deleting methods 17-1

rearranging methods 17-1

AAA login authentication

configuring console methods 17-6

configuring default methods 17-7

AAA logins

enabling authentication failure messages 17-8

AAA protocols

RADIUS 17-1

TACACS+ 17-1

AAA server groups

description 17-3

AAA servers

specifying SNMPv3 parameters 17-10, 17-11

specifying user roles 17-11

specifying user roles in VSAs 17-10

AAA services

configuration options 17-3

remote 17-2

security 17-1

access and trunk interfaces

configuring 12-4

understanding 12-1

access control list. See ACL.

access VLAN, understanding 12-3

accounting

description 17-2

ACL 21-1, 30-4

Adaptive Messaging Language. See AML.

Advanced Encryption Standard. See AES.

AES 27-4

aging time

accelerated

for MSTP 9-21

maximum

for MSTP 9-22

alert group 25-2

allowed VLANs 12-4

AML 25-2

authentication

description 17-2

local 17-2

methods 17-3

remote 17-2

user login 17-4

authentication, authorization, and accounting, see AAA.

authorization

description 17-2

user login 17-4

Automatic Service Request 25-5

B

bandwidth 30-4

batch mode 23-1

blocking state, STP 8-12

BPDU

filtering 10-3

frames 30-8

BPDU guard, see STP BPDU guard.

bridge ID, see STP bridge ID.

broadcast storms, see traffic-storm control.

C

Call Home 24-1

description 1-2, 25-1, 27-1

destination profiles

attributes 25-8

message format options 25-2

messages

configuring levels 25-4

format options 25-2

notifications

full-text format for syslog 25-17

XML format for syslog 25-19

Smart Call Home feature 25-4

CDP

configuring 5-7

CFS

configuring for NTP 2-16

Chassis Internal Network. See CIN.

CIN 31-1

adding, VLAN 31-4

deleting, VLAN 31-4

traffic counters 31-6

VLAN, associating 31-3

VLAN, disassociating 31-3

VLAN association 31-5

VLAN configuration 31-3

Cisco

vendor ID 17-11, 18-3

cisco-av-pair

specifying AAA user parameters 17-10, 17-11

CIST regional root, see MSTP.

CIST root, see MSTP.

class-map 30-2

CLI

accessing 3-1

command hierarchy 3-3

using 3-6

using command modes 3-2

using variables 3-8

command alias

defining 3-10

using 3-8, 3-10

commands, listing 3-3

command sequence

entering 3-7

community ports 7-3

community VLANs 7-2, 7-3

configuring LACP 11-10

congestion avoidance 30-2

congestion control WRED 30-3

consoles

configuring AAA login authentication methods 17-6

CoS value 30-3

D

daylight saving time

adjusting for 2-14

DCBX 30-2

DCBXP protocol 29-5

debounce timer 5-4

configuring 5-8

default settings

AAA 17-12

RBAC 22-9

rollback 23-4

default users

description 2-8

default values

revert 3-7

undo 3-7

delay time 3-12

deployment topology 1-5

destination profile 25-2

associating 25-9

creating 25-8

modifying 25-8

device configuration, methods 1-3

device health monitoring 25-5

device IDs

call home format 25-15

diagnostics. See online diagnostics

dynamic addresses

clearing 13-3

E

e-mail notifications

Call Home 25-1

error history, clear 24-4

Ethanalyzer 35-3

description 1-2

EtherChannel 11-1, 30-2

adding a port 11-8

configuring 11-7

creating 11-7

load balancing, using 11-9

STP 11-1

Ethernet bridge, lossless 29-3

Ethernet switching

description 1-4

examples

AAA configurations 17-12

executing a session 23-3

extended range VLANs. see VLANs.

Extensible Markup Language. See XML.

F

failure actions

configuring 24-2

falling alarm 28-2

FC-MAP 29-7

FCoE 29-1

FCoE connectivity

non-redundant 29-3

redundant 29-3

FCoE Initialization Protocol 1-4

feature groups 22-7

Fibre Channel over Ethernet. See FCoE.

field descriptions

AAA 17-1

TACACS+ 19-13

FIP Manager 29-7

FIP snooping 1-4

bridge 29-1

overview 29-1

forward-delay time

MSTP 9-21

H

hello time

MSTP 9-21

host ports

kinds of 7-3

I

IDs

Cisco vendor ID 17-11, 18-3

serial IDs 25-15

IEEE 802.1w, see RSTP.

IETF 28-1

IGMP 14-1

forwarding 14-3

snooping configuration 14-6

snooping parameters 14-4

snooping querier 14-3

IGMPv1 14-2

IGMPv2 14-2

IGMPv3 14-3

interface, verifying configuration 12-8

interfaces

CDP

configuring 5-7

debounce timer

configuring 5-8

1-Gigabit speed

configuring 5-6

options 5-1

UDLD

configuring 5-5

defined 5-2

interface speed 5-4

Internet Engineering Task Force. See IETF.

Internet Group Management Protocol. See IGMP.

IP

ACLs 21-1

multicast 1-4

IPv4 ACLs 21-4

isolated port 7-3

isolated VLANs 7-2, 7-3

J

jumbo MTU 30-19

L

LACP 11-1, 11-2, 11-10

enabling 11-10

system ID 11-5

understanding 11-4

license key files

description 4-2

installing key files 4-4

updating 4-3

licenses

backing up 4-5

claim certificates 4-1

displaying information 4-4

evaluation 4-2

grace period expiration 4-8

grace periods 4-2

host IDs 4-1

identifying features in use 4-5

incremental 4-2

installing key files 4-4

installing manually 4-3

missing 4-2

node-locked 4-1

obtaining factory-installed 4-2

obtaining key files 4-3

PAK 4-2

permanent 4-2

terminology 4-1

updating 4-7

Link Aggregation Control Protocol. See LACP.

link down notification 27-9

Link Failure

detecting unidirectional 8-14, 9-8

link-level flow control 30-5

link-state tracking 16-1

configuring 16-3

default 16-3

status 16-4

link up notification 27-9

log file

clear message 26-7

display message 26-7

logging

log file 26-1

syslog servers 26-1

terminal sessions 26-1

loopback tests

configuring frequency 24-2

lost password, recover 35-1

M

MAC ACLs 21-3

MAC address configuration 13-3

MAC addresses 13-1

configuring 13-1

MAC table 13-2

magic packet 33-1

manageability

description 1-3

management access

description 2-12

management interfaces

displaying information 2-19

using force option during shutdown 2-19

maximum aging time

MSTP 9-22

maximum hop count, MSTP 9-22

message

confidentiality 27-3

format 25-2

integrity 27-3

level 25-4

logged

facility 26-4

module 26-4

origin authentication 27-3

severity level 25-2

throttle, duplicate 25-12

mgmt0 interfaces

configuring 2-18

description 2-17

Microsoft Challenge Handshake Authentication Protocol. See MS-CHAP.

modules

testing health 24-3

MQC 30-2

MS-CHAP

enabling authentication 17-8

MST 9-1

BPDUs 9-3

CIST

regional root 9-5

configuration 9-3

overview 9-2

regions 9-2

setting to default values 9-14

MSTP

boundary ports

described 9-7

CIST

described 9-4

regional root 9-5

root 9-6

configuring

forward-delay time 9-21

hello time 9-21

maximum aging time 9-22

maximum hop count 9-22

MST region 9-13

port priority 9-18, 9-19

root switch 9-16

secondary root switch 9-17

switch priority 9-20

CST

defined 9-4

operations between regions 9-5

enabling the mode 9-13

IEEE 802.1s

terminology 9-6

IST

defined 9-4

master 9-5

operations within a region 9-4

mapping VLANs to MST instance 9-14

MST region

CIST 9-4

configuring 9-13

described 9-2

hop-count mechanism 9-7

IST 9-4

supported spanning-tree instances 9-2

MTU 30-3

multicast storms, see traffic-storm control.

Multiple Spanning Tree. See MST.

N

native VLAN ID, trunk ports 12-3

network-qos 30-2

network security

features 1-4

Network Time Protocol. See NTP

no-drop VL 30-8

notifications, Call Home 24-1

NTP

configuration guidelines 2-15

configuring 2-15

configuring CFS distribution 2-16

NVRAM 26-7

O

OBFL 24-7

configuring for the switch 24-8

description 24-7

displaying configuration status 24-8

displaying logs 24-9

OHMS

interpreting current status 24-4

test, current state 24-4

on-board failure logging. See OBFL.

1-Gigabit speed

configuring 5-6

online diagnostics 24-1

description 1-3

Online Health Management System. See OHMS.

P

PAgP 11-2

passwords

administrator 2-8

strong characteristics 22-2

pause no-drop 30-3

PDU 27-2

PEM

format 20-5

periodic inventory 25-11

persistent logging. See PLOG.

PFC 30-5

PLOG 24-7

policy

egress queuing 30-6

ingress classification 30-6

policy map 30-2, 30-12

Port Aggregation Protocol. See PAgP.

port channel 11-2, 34-2

verifying configuration 11-12

port priority

MSTP 9-18, 9-19

preshared keys

TACACS+ 19-3

primary VLANs 7-2

priority 30-4

priority flow control. See PFC.

private VLAN 7-1

about 7-1

associating 7-7

configuring 7-5

enabling 7-6

host port 7-8

promiscuous port 7-9

understanding 7-3

understanding broadcast traffic 7-5

verifying configuration 7-10

private VLANs

community VLANs 7-2, 7-3

end station access to 7-5

isolated VLANs 7-2, 7-3

ports

community 7-3

isolated 7-3

promiscuous 7-3

primary VLANs 7-2

secondary VLANs 7-2

promiscuous ports 7-3

protected mode 32-1

protocol data unit. See PDU.

Public Key Certificate 20-5

Q

QoS 30-1, 30-2

description 1-4

quality of service. See QoS.

queuing 30-2

R

RADIUS

configuring global preshared keys 18-6

configuring servers18-4to 18-12

configuring timeout intervals 18-8

configuring transmission retry counts 18-8

default settings 18-14

description 18-1

example configurations 18-14

network environments 18-1

operation 18-2

prerequisites 18-4

specifying server at login 18-8

verifying configuration 18-13

VSAs 18-3

RADIUS server groups

configuring 18-7

RADIUS servers

configuring accounting attributes 18-10

configuring authentication attributes 18-10

configuring dead-time intervals 18-12

configuring hosts 18-5

configuring periodic monitoring 18-11

configuring preshared keys 18-6

configuring timeout interval 18-9

configuring transmission retry count 18-9

deleting hosts 18-12

displaying statistics 18-13

example configurations 18-14

manually monitoring 18-12

monitoring 18-2

verifying configuration 18-13

Rapid PVST+ 8-1

configuring 8-17

enabling 8-17

information 8-1

understanding 8-6

verifying configuration 8-25

Rapid Spanning Tree Protocol, see RSTP.

RBAC 22-1

default settings 22-9

description 1-3

guidelines 22-3

limitations 22-3

real-time diagnostic alert 25-5

reduced MAC address 8-3

reserved-range VLANs, see VLANs.

reserved words

user accounts 22-1

rising alarm 28-2

RMON 28-1

alarm 28-1

event 28-2

role-based access control. See RBAC.

roles

authentication 22-1

rollback

checkpoint copy 23-1

creating a checkpoint copy 23-1

default settings 23-4

deleting a checkpoint file 23-1

description 23-1

example configuration 23-1

guidelines 23-1

high availability 23-1

implementing a rollback 23-1

limitations 23-1

reverting to checkpoint file 23-1

verifying configuration 23-4

root guard, see STP root guard.

root switch

MSTP 9-16

RSA key 20-3

RSTP

active topology 8-10

BPDU

processing 8-14

designated port, defined 8-10

designated switch, defined 8-10

proposal-agreement handshake process 8-7

rapid convergence 8-7

point-to-point links 8-7

root ports 8-7

root port, defined 8-10

See also MSTP.

S

secondary VLANs 7-2

SECSH

format 20-4

security

level 27-3

model 27-3

serial IDs

description 25-15

Serial over LAN. See SoL.

server groups. See AAA server groups.

server IDs

description 25-15

serviceability

description 1-2

session

committing 23-3

configuring ACLs 23-2

creating 23-2

discarding 23-3

saving 23-3

verifying 23-3

session manager 23-3

abort 23-1

commit 23-1

committing a session 23-3

configuration session 23-1

configuring ACLs 23-2

configuring an ACL session (example) 23-3

creating a session 23-2

description 23-1

discarding a session 23-3

guidelines 23-1

limitations 23-1

saving a session 23-3

validation 23-1

verification 23-1

verifying configuration 23-4

verifying the session 23-3

shaping 30-4

Simple Network Management Protocol. See SNMP.

Smart Call Home 25-4

description 25-4

registration requirements 25-5

Transport Gateway (TG) aggregation point 25-5

SMARTnet 25-5

Smart Call Home registration 25-5

SNMP 27-1

access groups 27-4

assigning contact 27-10

assigning location 27-10

configuring LinkUp/LinkDown notifications 27-9, 27-10

description 1-3

group-based access 27-4

notifications 27-2

server contact name 25-5

user synchronization with CLI 27-4

Version 3 security features 27-2

SNMP (Simple Network Management Protocol)

versions

security models and levels 27-2

SNMPv3

assigning multiple roles 27-6

security features 27-2

specifying AAA parameters 17-10

specifying parameters for AAA servers 17-11

snooping 14-1

SoL 31-1

management VLAN 31-1

traffic counters 31-6

source port 34-2

SPAN

activating session 34-5

description 1-2

destination port 34-3

destinations 34-2

egress sources 34-1

session 34-2

sources for monitoring 34-1

suspending session 34-5

spanning tree 9-1, 34-2

Spanning Tree Protocol. See STP.

SPAN sources

egress 34-1

ingress 34-1

SSH 3-1, 20-1

client 20-2

format 20-4

generating server key-pairs 20-1

hosts 20-6

protocol 20-2

public key 20-3

server 20-6

server key 20-2, 20-3

sessions 20-7

standards supported 1-5

static MAC address 13-2

statistics

TACACS+ 19-13

STP

edge ports 8-7, 10-2

EtherChannel 11-1

network ports 10-2

normal ports 10-2

PortFast 8-7, 10-2

port types 10-2

understanding

Blocking State 8-12

disabled state 8-13

forwarding state 8-12

learning state 8-12

root bridge election 8-5

STP bridge ID 8-3

STP root guard 10-5

strong password, characteristic 22-2

summer time

adjusting for 2-14

Switched Port Analyzer. See SPAN.

switchport mode trunk 31-3

switch priority

MSTP 9-20

syslog server 26-2

system health

clearing error reports 24-4

configuring failure actions 24-2

default settings 24-9

displaying 24-5

displaying status 24-5

initiation 24-2

interpreting current status 24-4

testing modules 24-3

test run requirements 24-3

system health, display 24-5

system message logging 26-1

system service policy 30-17

T

TACACS+

advantages over RADIUS 19-2

configuring 19-4, 19-13

configuring global preshared keys 19-6

configuring global timeout interval 19-9

description 19-1

disabling 19-12

displaying statistics 19-13

enabling 19-5

example configurations 19-13

field descriptions 19-13

global preshared keys 19-3

limitations 19-4

prerequisites 19-3

preshared key 19-3

specifying TACACS+ servers at login 19-8

user login operation 19-2

verifying configuration 19-13

TACACS+ server

configuring dead-time interval 19-11

TACACS+ servers

configuration process 19-4

configuring hosts 19-5, 19-13

configuring periodic monitoring 19-10

configuring preshared keys 19-7

configuring server groups 18-14, 19-7, 19-13

configuring TCP ports 19-10

configuring timeout interval 19-9

displaying statistics 19-13

field descriptions 19-13

manually monitoring 19-12

monitoring 19-3

verifying configuration 19-13

TCP ports

TACACS+ servers 19-10

Telnet 3-1, 20-1

remote devices 20-7

server 20-2

traffic

forwarding 1-4

management 1-4

routing 1-4

traffic class 30-2

traffic storm control 15-1

configuring 15-3

default 15-4

traffic suppression 15-1

Transport Gateway 25-5

trap notifications 27-2

troubleshooting

collecting output for technical support 35-5

trunkmode 31-3

trust boundary 30-6

type network QoS policy 30-14

type queuing 30-3

type queuing policy 30-15

U

UDLD

aggressive mode 5-3

configuring 5-5

defined 5-2

nonaggressive mode 5-3

unicast storms, see traffic-storm control.

Unidirectional Link Detection. See UDLD.

user accounts

password characteristics 22-2

User-Based Security Model. See USM.

user login

authentication process 17-4

authorization process 17-4

user logins

configuring AAA login authentication methods 17-7

user role 22-2

creating 22-5

interface policies 22-7

policies 22-3

rules 22-5

VLAN policies 22-8

user roles

specifying on AAA servers 17-10, 17-11

users

description 22-1

USM 27-3

V

VACL 21-2

vendor-specific attributes. See VSAs.

virtual LANs. See VLANs.

VLAN

adding ports 6-6

configuring 6-4

creating 6-3

creating and deleting 6-4

deleting 6-3

modifying 6-3

submode 6-5

understanding ranges 6-2

verifying configuration 6-6

VLAN ACL. See VACL.

VLANs

extended range 6-2

reserved range 6-2

understanding 6-1

VTP domain 6-3

VSAs

format 17-11

protocol options 17-11, 18-3

support description 17-10

VTP

domains

VLANs 6-3

W

Wake on LAN. See WOL.

WOL 33-1

X

XML 25-2

XML schema definition. See XSD.

XSD 25-2