Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 5.x
Index
Downloads: This chapterpdf (PDF - 308.0KB) The complete bookPDF (PDF - 9.3MB) | Feedback

Index

Table Of Contents

B - C - D - E - F - G - H - L - M - N - O - P - R - S - T - V -

Index

B

bootup diagnostics 13-2

boundary clock 4-2

C

Call Home

e-mail notifications 1-4

CDP

clearing cache 5-7

clearing statistics 5-7

configuring timers, example 5-8

default settings 5-4

defined with LLDP 18-2

description 5-1

disabling the feature 5-5

enabling globally 5-4

enabling on an interface 5-5

guidelines 5-3

licensing requirements 5-3

limitations 5-3

MIBs (table) 5-8

optional parameters 5-7

prerequisites 5-3

TLV fields 5-2

verifying configuration 5-7

version 5-4

virtualization 5-3

VLAN ID 5-2

VTP 5-2

CFS

connectivity in a mixed fabric 2-3

coordinated distributions 2-3

default settings 2-6

description 2-1

disabling on a switch 2-31

distribution 2-2

distribution modes 2-3

enabling on a switch 2-31

features supported 2-2

guidelines 2-5

high availability 2-5

licensing requirements 2-5

limitations 2-5

locking the network 2-4

merge support 2-4

MIBs (table) 2-33

NTP 3-2, 3-14

prerequisites 2-5

releasing session lock 3-16

uncoordinated distributions 2-3

unrestricted uncoordinated distributions 2-3

verifying configuration 2-32

virtualization 2-5

CFS applications

clearing session locks 2-29

committing changes 2-27

discarding changes 2-30

enabling 2-7

enabling distribution for Call Home configurations 2-7

enabling distribution for device alias configurations 2-8

enabling distribution for DPVM configurations 2-9

enabling distribution for FC domain configurations 2-10

enabling distribution for FC port security configurations 2-11

enabling distribution for FC timer configurations 2-12

enabling distribution for IVR configurations 2-13

enabling distribution for NTP configurations 2-14

enabling distribution for RADIUS configurations 2-15

enabling distribution for RSCN configurations 2-16

enabling distribution for TACACS+ configurations 2-17

enabling distribution for user role configurations 2-18

fabric locking 2-27

CFS distribution mode, specifying 2-19

CFS over Ethernet (CFSoE), description 2-2

CFS over Fibre Channel (CFSoFC), description 2-2

CFS over IP (CFSoIP)

configuring IP multicast addresses 2-20

description 2-2

CFS regions

configuring 2-22

creating 2-22

deleting 2-26

description 2-4

moving an application to/from 2-23

removing an application 2-25

checkpoints

system 8-2

Cisco discovery protocol

See CDP

Cisco Fabric Service. See CFS

clock manager

PTP 4-3

command scheduler

execution logs 10-2

configuration limits

description (table) C-1

configuration methods 1-2

D

default settings

CDP 5-4

EEM 14-7

NetFlow 19-5

NTP 3-4, 5-4, 16-7, 17-5

OBFL 15-3

online diagnostics 13-6

PTP 4-5

RMON 12-3

rollback 8-4

Scheduler 10-3

Smart Call Home 7-9

SNMP 11-7

system messages 6-3

device discovery protocol 18-2

diagnostics

bootup 13-2

on demand 13-5

runtime 13-3

documentation

additional publications i-xxv

conventions i-xxv

obtaining i-xxvii

E

EEM

actions 14-4

activating a script policy 14-15

allow CLI commands to execute 14-14

configuration examples B-4

configuring action statements 14-13

configuring event statements 14-10

default settings 14-7

defining an environment variable 14-7

defining a policy 14-8

defining script policies 14-14

description14-1to 14-5

environment variables 14-5

event correlation 14-5

event correlation (example) 14-21

event logs 14-2

events 14-3, B-3

example configuration 14-21

guidelines 14-6

high availability 14-5

licensing requirements 14-6

limitations 14-6

override policy 14-2

override policy (note) 14-3

override policy actions (note) 14-4

overriding a system policy 14-15

parameter substitution 14-5

policies 14-2

prerequisites 14-6

registering a script policy 14-15

SNMP support 11-5

system policies 14-2, B-1

using to monitor syslog messages 14-19

verifying configuration 14-20

virtualization support 14-5

VSH script policies 14-4

EEM overriding a system policy (example) 14-21

embedded event manager. See EEM

encapsulated remote switched port analyzer. See ERSPAN

ERSPAN

ACL configuration example 17-16

activating a session 17-12

configuring a destination session 17-9

configuring a session (example) 17-16

configuring a source session 17-6

configuring multicast best effort mode for a session 17-14

description 17-1

destinations 17-2

feature history 17-18

guidelines 17-4

high availability 17-3

licensing requirements 17-4

limitations 17-4

multicast best effort mode (example) 17-17

multiple sessions 17-3

prerequisites 17-4

session limits 17-4

sessions 17-2

session sources 17-6

shutting down a session 17-12

sources 17-2

verifying configuration 17-15

virtualization support 17-3

executing a session 9-5

exporter map 19-2

F

feature history

ERSPAN 17-18

features, new and changed (table) i-xix

G

GOLD. See online diagnostics

H

health monitoring diagnostics 13-3

high availability

CDP 5-3

CFS 2-5

EEM 14-5

ERSPAN 17-3

LLDP 18-3

NetFlow 19-3

NTP 3-3, 5-3

online diagnostics 13-5

PTP 4-3

RMON 12-2

rollback 8-2

SNMP 11-6

SPAN 16-4

L

licensing requirements

CDP 5-3

CFS 2-5

EEM 14-6

ERSPAN 17-4

LLDP 18-3

NetFlow 19-4

NTP 3-3

OBFL 15-2

online diagnostics 13-5

PTP 4-4

RMON 12-3

rollback 8-3

Scheduler 10-3

session manager 9-2

Smart Call Home 7-8

SNMP 11-6

SPAN 16-5

system messages 6-3

limits

description (table) C-1

LLDP

configuring optional parameters 18-7

configuring timers 18-7

default settings 18-4

defined 18-2

description 18-1

enabling or disabling globally 18-5

enabling or disabling on an interface 18-6

example configuration 18-9

guidelines 18-4

high availability 18-3

licensing requirements 18-3

limitations 18-4

verifying configuration 18-9

virtualization support 18-3

M

MIBs

CDP 5-8

CFS 2-33

description 11-2

location to download 11-29

NTP 3-19, 5-8

PTP 4-11

RMON 12-8

Smart Call Home 7-39

SNMP 11-29

monitor map 19-3

MTU truncation, configuring for SPAN sessions 16-16

multibest best effort mode

configuring for a SPAN session 16-19

multicast best effort mode

configuring for an ERSPAN session 17-14

multicast best mode

ERSPAN configuration example 17-17

N

NetFlow

applying a monitor map to an interface 19-13

applying a monitor map to a VLAN 19-14

applying a sampler map to an interface 19-13

configuring Bridged NetFlow 19-14

configuring NetFlow 19-5

configuring timeouts 19-17

creating a monitor map 19-11

creating an export map 19-9

creating a record map 19-6

creating a sampler map 19-12

default settings 19-5

description19-1to 19-4

disabling 19-6

enabling 19-6

example configuration 19-19

exporter map 19-2

export formats 19-3

flows 19-1

full mode 19-2

high availability 19-3

keys 19-1

licensing requirements 19-4

monitor map 19-3

record map 19-2

sampled mode 19-2

sampler map 19-3

specifying collect parameters 19-8

specifying match parameters 19-8

verifying configuration 19-18

virtualization support 19-4

Netflow

configuring Layer 2 keys 19-15

Network Time Protocol. See NTP

NTP

access groups 3-11

as a time server 3-2

authentication keys 3-10

CFS 3-2, 3-14

clearing a session 3-17

clearing statistics 3-17

clock manager 3-2

committing configuration changes 3-15

configuration examples 3-17

configuring access restrictions 3-11

configuring authentication 3-10

configuring peer 3-7

configuring server 3-7

configuring the device as an authoritative server 3-6

default settings 3-4, 5-4, 16-7, 17-5

description 3-1

disabling 3-5

discarding configuration changes 3-16

enabling 3-5

feature history 3-19

guidelines 3-3

high availability 3-3, 5-3

licensing requirements 3-3

limitations 3-3

logging 3-13

MIBs (table) 3-19, 5-8

prerequisites 3-3

releasing CFS session lock 3-16

source interface 3-13

source IP address 3-13

stratum 3-2

trusted keys 3-11

verifying configuration 3-16

virtualization 3-3, 5-3

O

OBFL

clearing statistics 15-7

default settings 15-3

description 15-1

enabling 15-3

example configuration 15-7

guidelines 15-3

licensing requirements 15-2

limitations 15-3

prerequisites 15-2

verifying configuration 15-6

virtualization support 15-2

on-board failure logging. See OBFL

on demand diagnostics 13-5

online diagnostics

activating a diagnostics test 13-7

bootup 13-2

clearing the test results 13-10

configuring the bootup diagnostic level 13-7

default settings 13-6

description13-1to 13-5

example configuration 13-12

feature history (table) 13-13

guidelines 13-6

health monitoring 13-3

high availability 13-5

licensing requirements 13-5

limitations 13-6

on demand 13-5

prerequisites 13-6

runtime 13-3

setting a diagnostic test as inactive 13-9

simulating a test result 13-11

starting an on-demand test 13-9

stopping an on-demand test 13-9

verifying configuration 13-11

virtualization support 13-5

VRFs 13-5

ordinary clock 4-2

P

Pong, description 4-3

Precision Time Protocol. See PTP

PTP

configuration examples 4-9

configuring globally 4-5

configuring on an interface 4-7

default settings 4-5

description 4-2

device types 4-2

feature history 4-11

guidelines 4-4

high availability 4-3

licensing requirements 4-4

limitations 4-4

MIBs (table) 4-11

prerequisites 4-4

process 4-3

verifying configuration 4-9

virtualization 4-4

R

record map 19-2

related documents i-xxv

RMON

alarms 12-2

configuring alarms 12-4

configuring events 12-6

default settings 12-3

description 12-1

events 12-2

example configuration 12-7

guidelines 12-3

high availability 12-2

licensing requirements 12-3

limitations 12-3

MIBs 12-8

prerequisites 12-3

verifying configuration 12-7

virtualization support 12-3

VRFs 12-3

rollback

checkpoint copy 8-2

creating a checkpoint copy 8-4

default settings 8-4

description 8-1

example configuration 8-7

guidelines 8-3

high availability 8-2

implementing a rollback 8-5

licensing requirements 8-3

limitations 8-3

prerequisites 8-3

reverting to checkpoint file 8-5

verifying configuration 8-6

virtualization support 8-3

runtime diagnostics 13-3

S

sampler map 19-3

Scheduler

authentication 10-2

clearing the logfile 10-11

configuring 10-4

configuring authentication 10-6

configuring logfile 10-5

default settings 10-3

defining a timetable 10-9

defining jobs 10-7

deleting a job 10-8

description 10-1

disabling the feature 10-12

enabling the feature 10-4

guidelines 10-3

high availability 10-2

licensing requirements 10-3

limitations 10-3

prerequisites 10-3

verifying configuration 10-13

virtualization support 10-2

scheduler

execution logs 10-2

session manager 9-5

committing a session 9-5

configuring ACLs 9-4

configuring an ACL session (example) 9-6

creating a session 9-3

description 9-1

discarding a session 9-6

guidelines 9-2

high availability 9-2

licensing requirements 9-2

limitations 9-2

prerequisites 9-2

saving a session 9-6

verifying configuration 9-6

verifying the session 9-5

virtualization support 9-2

Simple Network Management Protocol. See SNMP

Smart Call Home

alert groups 7-3

benefits 7-2

configuring an HTTP proxy server 7-22

configuring contact information 7-10

configuring e-mail 7-19

configuring inventory notification 7-19, 7-24

configuring VRFs to send messages using HTTP 7-21

database merge guidelines 7-7

default settings 7-9

description 7-1

destination profiles

associating an alert group 7-16

attributes 7-14

creating 7-12

description 7-2

modifying 7-14

predefined 7-2

disabling 7-25

disabling duplicate message throttle 7-25

enabling 7-25

event triggers (table) 7-27

example configuration 7-27

guidelines 7-8

high availability 7-7

licensing requirements 7-8

limitations 7-8

mapping message levels to syslog levels (table) 7-5

message formats

full text (table) 7-29, 7-30

full-text format, example 7-32

inventory events (table) 7-31

options 7-2

proactive events (table) 7-31

reactive events (table) 7-31

short text (table) 7-29

XML (table) 7-29, 7-30

XML format, example 7-35

message levels 7-5

MIBs 7-39

modifying an alert group 7-17

prerequisites 7-8

registration requirements 7-6

sending a test message 7-26

SMARTnet registration 7-6

verifying configuration 7-26

virtualization support 7-7

SNMP

agent 11-2

assigning contact 11-23

assigning location 11-23

assigning multiple user roles 11-9

authentication 11-4

configuring a user 11-8

configuring context to network entity mapping 11-24

context mapping 11-6

contexts 11-5

creating communities 11-10

default settings 11-7

description11-1to 11-6

disabling protocol 11-26

display ifIndex values 11-23

EEM support 11-5

enabling one-time authentication 11-23

enforcing encryption 11-9

engine ID format 11-8

example configuration 11-27

feature history (table) 11-29

filtering SNMP requests 11-10

group-based access 11-5

guidelines 11-7

high availability 11-6

licensing requirements 11-6

limitations 11-7

manager 11-2

MIBs 11-2

MIBs supported 11-29

multiple instance support 11-5

notifications

configuring LinkUp/LinkDown notifications 11-22

configuring notification receivers 11-11

configuring notification receivers with VRFs 11-13

configuring source interface for 11-12

configuring the notification target user 11-12

description 11-2

enabling individual notifications 11-16

informs 11-2

trap 11-2

notification source interface 11-12

prerequisites 11-6

RFCs 11-2

RMON 12-1

user synchronization with CLI 11-4

versions

security models and levels 11-3

SNMPv3 11-2

USM 11-4

virtualization support 11-6

VRFs 11-6

SNMP requests

filtering 11-10

source rate limit, configuring for SPAN sessions 16-17

SPAN

configuring an RSPAN VLAN 16-14

configuring a PVLAN source in a session (example) 16-22

configuring a session 16-8

configuring a session (example) 16-21

configuring a source rate limit for each session 16-17

configuring a virtual SPAN session 16-11

configuring a virtual SPAN session (example) 16-21

configuring MTU truncation for each session 16-16

configuring the multicast best effort mode for a session 16-19

description 16-1

enabling a session 16-15

guidelines 16-5

high availability 16-4

licensing requirements 16-5

limitations 16-5

multiple sessions 16-4

prerequisites 16-5

session destinations 16-8

session limits 16-5

sessions 16-3

session sources 16-8

shutting down a session 16-15

subinterface restriction 16-8

verifying configuration 16-20

virtualization support 16-4

virtual SPAN sessions 16-3

switched port analyzer. See SPAN

syslog

as EEM publisher 14-19

See system messages

system checkpoints 8-2

system messages

clearing a log file 6-11

configuring (example) 6-12

configuring a syslog server 6-8

configuring a syslog server on a Linux system 6-10

configuring a syslog server on a UNIX system 6-10

configuring severity level to log 6-7

configuring timestamp 6-7

default settings 6-3

description 6-1

displaying a log file 6-10

guidelines 6-3

licensing requirements 6-3

list of messages 6-12

logging to a file 6-5

logging to a terminal session 6-4

logging to the console port 6-4

RFC 6-1

severity levels (table) 6-2

syslog server 6-2

verifying configuration 6-11

virtualization support 6-2

T

TLVs

defined 18-2

supported by LLDP 18-8

transparent clock 4-2

trap. See SNMP

troubleshooting 1-7

V

virtualization

CFS 2-5

NTP 3-3

PTP 4-4

virtualization support

LLDP 18-3

VTP

CDP 5-2