Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 6.x
Index
Downloads: This chapterpdf (PDF - 491.0KB) The complete bookPDF (PDF - 4.29MB) | Feedback

Table Of Contents

B - C - D - E - F - G - H - L - M - N - O - P - R - S - T - V - X -

Index

B

bootup diagnostics 13-2

boundary clock 4-2

C

Call Home

e-mail notifications 1-4

CDP

clearing cache 5-7

clearing statistics 5-7

configuring timers, example 5-8

default settings 5-4

defined with LLDP 18-2

description 5-1

disabling the feature 5-5

enabling globally 5-4

enabling on an interface 5-5

guidelines 5-3

licensing requirements 5-3

limitations 5-3

MIBs (table) 5-8

optional parameters 5-7

prerequisites 5-3

TLV fields 5-2

verifying configuration 5-7

version 5-4

virtualization 5-3

VLAN ID 5-2

VTP 5-2

CFS

connectivity in a mixed fabric 2-3

coordinated distributions 2-3

default settings 2-6

description 2-1

disabling on a switch 2-31

distribution 2-2

distribution modes 2-3

enabling on a switch 2-31

features supported 2-2

guidelines 2-5

high availability 2-5

licensing requirements 2-5

limitations 2-5

locking the network 2-4

merge support 2-4

MIBs (table) 2-33

NTP 3-3, 3-22

prerequisites 2-5

releasing session lock 3-24

uncoordinated distributions 2-3

unrestricted uncoordinated distributions 2-3

verifying configuration 2-32

virtualization 2-5

CFS applications

clearing session locks 2-29

committing changes 2-27

discarding changes 2-30

enabling 2-7

enabling distribution for Call Home configurations 2-7

enabling distribution for device alias configurations 2-8

enabling distribution for DPVM configurations 2-9

enabling distribution for FC domain configurations 2-10

enabling distribution for FC port security configurations 2-11

enabling distribution for FC timer configurations 2-12

enabling distribution for IVR configurations 2-13

enabling distribution for NTP configurations 2-14

enabling distribution for RADIUS configurations 2-15

enabling distribution for RSCN configurations 2-16

enabling distribution for TACACS+ configurations 2-17

enabling distribution for user role configurations 2-18

fabric locking 2-27

CFS distribution mode, specifying 2-19

CFS over Ethernet (CFSoE), description 2-2

CFS over Fibre Channel (CFSoFC), description 2-2

CFS over IP (CFSoIP)

configuring IP multicast addresses 2-20

description 2-2

CFS regions

configuring 2-22

creating 2-22

deleting 2-26

description 2-4

moving an application to/from 2-23

removing an application 2-25

checkpoints

system 8-2

Cisco discovery protocol

See CDP

Cisco Fabric Service. See CFS

clock manager

PTP 4-3

command scheduler

execution logs 10-2

configuration methods 1-2

D

default settings

CDP 5-4

EEE 20-3

EEM 14-7

NetFlow 19-8

NTP 3-5, 5-4, 16-11, 17-9

OBFL 15-3

online diagnostics 13-6

PTP 4-5

RMON 12-3

rollback 8-4

Scheduler 10-3

Smart Call Home 7-9

SNMP 11-9

system messages 6-3

device discovery protocol 18-2

diagnostics

bootup 13-2

on demand 13-5

runtime 13-3

documentation

additional publications i-xxvii

conventions i-xxvii

E

EEE

configuration examples 20-6

configuring the LPI sleep threshold 20-4

default settings 20-3

description 20-1

enabling or disabling 20-3

feature history 20-7

guidelines 20-2

latency 20-2

licensing requirements 20-2

limitations 20-2

LPI sleep threshold 20-2

prerequisites 20-2

verifying configuration 20-5

virtualization 20-2

EEM

actions 14-4

activating a script policy 14-15

allow CLI commands to execute 14-14

configuration examples B-4

configuring action statements 14-13

configuring event statements 14-10

default settings 14-7

defining an environment variable 14-7

defining a policy 14-8

defining script policies 14-14

description14-1to 14-5

environment variables 14-5

event correlation 14-5

event correlation (example) 14-21

event logs 14-2

events 14-3, B-3

example configuration 14-21

guidelines 14-6

high availability 14-5

licensing requirements 14-6

limitations 14-6

override policy 14-2

override policy (note) 14-3

override policy actions (note) 14-4

overriding a system policy 14-15

parameter substitution 14-5

policies 14-2

prerequisites 14-6

registering a script policy 14-15

SNMP support 11-7

system policies 14-2, B-1

using to monitor syslog messages 14-19

verifying configuration 14-20

virtualization support 14-5

VSH script policies 14-4

EEM overriding a system policy (example) 14-21

embedded event manager. See EEM

encapsulated remote switched port analyzer. See ERSPAN

ERSPAN

ACL configuration example 17-37

activating a session 17-18

configuring a destination session 17-15

configuring a source rate limit for each session 17-21

configuring a source session 17-10

configuring a Type III source session (example) 17-36

configuring exception session 17-33

configuring MTU truncation for each session 17-20

configuring multicast best effort mode for a session 17-25

configuring rule-based session 17-26

configuring sampling for each session 17-24

description 17-1

destinations 17-3

Exception 17-5

Exception configuration example 17-38

Extended Sessions 17-3

feature history 17-39

granularity 17-12

guidelines 17-6

high availability 17-5

licensing requirements 17-6

limitations 17-6

MTU truncation and sampling (example) 17-37

multicast best effort mode (example) 17-37

prerequisites 17-6

Rule-based configuration example 17-38

Rule-Based ERSPAN 17-4

sessions 17-3

session sources 17-10

shutting down a session 17-18

sources 17-2

Type II 17-2

Type III 17-2

types 17-2

verifying configuration 17-35

virtualization support 17-5

executing a session 9-5

exporter map 19-3

F

feature history

ERSPAN 17-39

features, new and changed (table) i-xix

G

GOLD. See online diagnostics

H

health monitoring diagnostics 13-3

high availability

CDP 5-3

CFS 2-5

EEM 14-5

ERSPAN 17-5

LLDP 18-3

NetFlow 19-5

NTP 3-3, 5-3

online diagnostics 13-5

PTP 4-3

RMON 12-3

rollback 8-2

SNMP 11-8

SPAN 16-6

L

licensing requirements

CDP 5-3

CFS 2-5

EEE 20-2

EEM 14-6

ERSPAN 17-6

LLDP 18-3

NetFlow 19-6

NTP 3-4

OBFL 15-2

online diagnostics 13-5

PTP 4-4

RMON 12-3

rollback 8-3

Scheduler 10-3

session manager 9-2

Smart Call Home 7-8

SNMP 11-8

SPAN 16-7

system messages 6-3

LLDP

configuring optional parameters 18-7

configuring timers 18-7

default settings 18-4

defined 18-2

description 18-1

enabling or disabling globally 18-5

enabling or disabling on an interface 18-6

example configuration 18-9

guidelines 18-4, 21-2

high availability 18-3

licensing requirements 18-3

limitations 18-4, 21-2

verifying configuration 18-9

virtualization support 18-3

M

MIBs

CDP 5-8

CFS 2-33

description 11-2

location to download 11-32

NTP 3-27, 5-8

PTP 4-11

RMON 12-8

Smart Call Home 7-40

SNMP 11-32

monitor map 19-5

MTU truncation, configuring for ERSPAN sessions 17-20

MTU truncation, configuring for SPAN sessions 16-20

MTU truncation and sampling

ERSPAN configuration example 17-37

SPAN configuration example 16-36

multibest best effort mode

configuring for a SPAN session 16-24

multicast best effort mode

configuring for an ERSPAN session 17-25

multicast best mode

ERSPAN configuration example 17-37

N

NetFlow

applying a monitor map to an interface 19-17

applying a monitor map to a VLAN 19-18

applying a sampler map to an interface 19-17

configuring bridged NetFlow 19-18

configuring Layer 2 keys 19-19

configuring NetFlow 19-8

configuring timeouts 19-21

creating a monitor map 19-14

creating an export map 19-13

creating a record map 19-9

creating a sampler map 19-16

default settings 19-8

description19-1to 19-6

disabling 19-9

enabling 19-9

example configuration 19-24

exporter map 19-3

export formats 19-4

flows 19-2

full mode 19-2

guidelines and limitations 19-6

high availability 19-5

keys 19-2

licensing requirements 19-6

monitoring 19-23

monitor map 19-5

network analysis module 19-5

prerequisites 19-6

record map 19-2

sampled mode 19-2

samplers 19-5

specifying collect parameters 19-12

specifying match parameters 19-11

verifying configuration 19-22

virtualization support 19-6

Network Analysis Module (NAM) 17-5

Network Time Protocol. See NTP

NTP

access groups 3-14

as a time server 3-3

associations 3-2

authentication keys 3-13

CFS 3-3, 3-22

clearing a session 3-25

clearing statistics 3-25

clock manager 3-3

committing configuration changes 3-23

configuration examples 3-25

configuring a broadcast server 3-17

configuring access restrictions 3-14

configuring a multicast client 3-19

configuring a multicast server 3-18

configuring authentication 3-12

configuring peer 3-9

configuring server 3-9

configuring the device as an authoritative server 3-8

default settings 3-5, 5-4, 16-11, 17-9

description 3-2

disabling 3-6

discarding configuration changes 3-23

enabling 3-6

enabling on an interface 3-7

feature history 3-27

guidelines 3-4

high availability 3-3, 5-3

licensing requirements 3-4

limitations 3-4

logging 3-21

MIBs (table) 3-27, 5-8

prerequisites 3-4

releasing CFS session lock 3-24

source interface 3-16

source IP address 3-16

stratum 3-2

trusted keys 3-13

verifying configuration 3-24

virtualization 3-4, 5-3

O

OBFL

clearing statistics 15-6

default settings 15-3

description 15-1

enabling 15-3

example configuration 15-6

guidelines 15-3

licensing requirements 15-2

limitations 15-3

prerequisites 15-2

verifying configuration 15-5

virtualization support 15-2

on-board failure logging. See OBFL

on demand diagnostics 13-5

online diagnostics

activating a diagnostics test 13-7

bootup 13-2

clearing the test results 13-10

configuring the bootup diagnostic level 13-6

default settings 13-6

description13-1to 13-5

example configuration 13-12

feature history (table) 13-13

guidelines 13-6

health monitoring 13-3

high availability 13-5

licensing requirements 13-5

limitations 13-6

on demand 13-5

prerequisites 13-5

runtime 13-3

setting a diagnostic test as inactive 13-9

simulating a test result 13-11

starting an on-demand test 13-9

stopping an on-demand test 13-9

verifying configuration 13-11

virtualization support 13-5

VRFs 13-5

ordinary clock 4-2

P

Pong, description 4-3

Precision Time Protocol. See PTP

PTP

configuration examples 4-9

configuring globally 4-5

configuring on an interface 4-7

default settings 4-5

description 4-2

device types 4-2

feature history 4-11

guidelines 4-4

high availability 4-3

licensing requirements 4-4

limitations 4-4

MIBs (table) 4-11

prerequisites 4-4

process 4-3

verifying configuration 4-9

virtualization 4-4

R

record map 19-2

related documents i-xxvii

RMON

alarms 12-2

configuring alarms 12-4

configuring events 12-6

default settings 12-3

description 12-1

events 12-2

example configuration 12-7

guidelines 12-3

high availability 12-3

licensing requirements 12-3

limitations 12-3

MIBs 12-8

prerequisites 12-3

verifying configuration 12-7

virtualization support 12-3

VRFs 12-3

rollback

checkpoint copy 8-2

creating a checkpoint copy 8-4

default settings 8-4

description 8-1

example configuration 8-7

guidelines 8-3

high availability 8-2

implementing a rollback 8-5

licensing requirements 8-3

limitations 8-3

prerequisites 8-3

reverting to checkpoint file 8-5

verifying configuration 8-6

virtualization support 8-3

runtime diagnostics 13-3

S

sampling, configuring for ERSPAN sessions 17-24

sampling, configuring for SPAN sessions 16-23

Scheduler

authentication 10-2

clearing the logfile 10-11

configuring 10-4

configuring authentication 10-5

configuring logfile 10-5

default settings 10-3

defining a timetable 10-9

defining jobs 10-7

deleting a job 10-8

description 10-1

disabling the feature 10-12

enabling the feature 10-4

guidelines 10-3

high availability 10-2

licensing requirements 10-3

limitations 10-3

prerequisites 10-3

verifying configuration 10-13

virtualization support 10-2

scheduler

execution logs 10-2

session manager 9-5

committing a session 9-5

configuring ACLs 9-4

configuring an ACL session (example) 9-6

creating a session 9-3

description 9-1

discarding a session 9-6

guidelines 9-2

high availability 9-2

licensing requirements 9-2

limitations 9-2

prerequisites 9-2

saving a session 9-6

verifying configuration 9-6

verifying the session 9-5

virtualization support 9-2

Simple Network Management Protocol. See SNMP

Smart Call Home

alert groups 7-3

benefits 7-2

configuring an HTTP proxy server 7-23

configuring contact information 7-10

configuring e-mail 7-19

configuring inventory notification 7-19, 7-24

configuring VRFs to send messages using HTTP 7-21

database merge guidelines 7-7

default settings 7-9

description 7-1

destination profiles

associating an alert group 7-16

attributes 7-14

creating 7-12

description 7-2

modifying 7-14

predefined 7-2

disabling duplicate message throttle 7-26

enabling 7-26

event triggers (table) 7-28

example configuration 7-28

guidelines 7-8

high availability 7-7

licensing requirements 7-8

limitations 7-8

mapping message levels to syslog levels (table) 7-5

message formats

full text (table) 7-30, 7-31

full-text format, example 7-33

inventory events (table) 7-32

options 7-2

proactive events (table) 7-32

reactive events (table) 7-32

short text (table) 7-30

XML (table) 7-30, 7-31

XML format, example 7-36

message levels 7-5

MIBs 7-40

modifying an alert group 7-18

prerequisites 7-8

registration requirements 7-6

sending a test message 7-27

SMARTnet registration 7-6

verifying configuration 7-27

virtualization support 7-7

SNMP

agent 11-2

assigning contact 11-26

assigning location 11-26

assigning multiple user roles 11-11

authenticating SNMPv3 users 11-13

authentication 11-5

configuring a user 11-10

configuring context to network entity mapping 11-27

context mapping 11-7

contexts 11-7

creating communities 11-12

default settings 11-9

description11-1to 11-8

disabling protocol 11-29

display ifIndex values 11-26

EEM support 11-7

enabling one-time authentication 11-26

enforcing encryption 11-11

engine ID format 11-10

example configuration 11-30

feature history (table) 11-32

filtering SNMP requests 11-12

group-based access 11-7

guidelines 11-9

high availability 11-8

licensing requirements 11-8

limitations 11-9

manager 11-2

MIBs 11-2

MIBs supported 11-32

multiple instance support 11-7

notifications

configuring LinkUp/LinkDown notifications 11-25

configuring notification receivers 11-13

configuring notification receivers with VRFs 11-16

configuring source interface for 11-14

configuring the notification target user 11-15

description 11-2

enabling individual notifications 11-19

informs 11-2

trap 11-2

notification source interface 11-15

prerequisites 11-8

RFCs 11-2

RMON 12-1

user synchronization with CLI 11-5

versions

AAA exclusive behavior in SNMPv3 11-6

security models and levels 11-4

SNMPv3 11-3

USM 11-5

virtualization support 11-8

VRFs 11-8

SNMP requests

filtering 11-12

source rate limit, configuring for ERSPAN sessions 17-21

source rate limit, configuring for SPAN sessions 16-22

SPAN

configuring an RSPAN VLAN 16-18

configuring a PVLAN source in a session (example) 16-35

configuring a session 16-12

configuring a session (example) 16-33

configuring a source rate limit for each session 16-22

configuring a virtual SPAN session 16-15

configuring a virtual SPAN session (example) 16-34

configuring exception session 16-30

configuring MTU truncation for each session 16-20

configuring rule-based session 16-26

configuring sampling for each session 16-23

configuring the multicast best effort mode for a session 16-24

description 16-1

enabling a session 16-19

Exception SPAN 16-5

Extended SPAN sessions 16-4

guidelines 16-7

high availability 16-6

licensing requirements 16-7

limitations 16-7

MTU truncation and sampling (example) 16-36

prerequisites 16-7

Rule-Based SPAN 16-4

session destinations 16-12

sessions 16-3

session sources 16-12

shutting down a session 16-19

subinterface restriction 16-12

verifying configuration 16-32

virtualization support 16-6

virtual SPAN sessions 16-5

switched port analyzer. See SPAN

syslog

as EEM publisher 14-19

See system messages

system checkpoints 8-2

system messages

clearing a log file 6-11

configuring (example) 6-12

configuring a syslog server 6-8

configuring a syslog server on a Linux system 6-10

configuring a syslog server on a UNIX system 6-10

configuring severity level to log 6-7

configuring timestamp 6-7

default settings 6-3

description 6-1

displaying a log file 6-10

guidelines 6-3

licensing requirements 6-3

list of messages 6-12

logging to a file 6-5

logging to a terminal session 6-4

logging to the console port 6-4

RFC 6-1

severity levels (table) 6-2

syslog server 6-2

verifying configuration 6-11

virtualization support 6-2

T

TLVs

defined 18-2

supported by LLDP 18-8

transparent clock 4-2

trap. See SNMP

troubleshooting 1-7

V

virtualization

CFS 2-5

EEE 20-2

NTP 3-4

PTP 4-4

virtualization support

LLDP 18-3

online diagnostics 13-5

VTP

CDP 5-2

X

XMLIN

converting show command output 21-3

guidelines and limitations 21-2

information about 21-1

installing 21-2

licensing requirements 21-2