Cisco MDS 9000 Family Configuration Guide, Release 1.1(1a)
Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - Z

Index

Numerics

16-port modules

BB_credits9-10

LEDs9-12

preserving configurations6-6

See also switching modules

32-port modules

BB_credits9-10

configuration guidelines9-7

preserving configurations6-6

SPAN guidelines23-6

See also switching modules

A

AAA

authorization and authentication process14-4

setting authentication14-5

usage1-8

user accountability14-11

access control

iSCSI enforcement17-50

iSCSI mechanisms17-49

accounting14-11

active

modules6-2

states4-7

zones12-6

zone sets12-11

adding

IP addresses16-14

ports to a PortChannel11-6

SNMP communities14-24

switches3-4

address-allocation cache19-14

Address Resolution Protocol

See ARP

administrative speed

configuring9-9

administrative states

description9-5

administrator passwords

configuring3-9

configuring switch3-3

creating additional accounts3-5

default3-5

recovering14-13

requirements (note)3-6, 3-10

advertisement packets

setting time intervals16-15

aggregated flow statistics15-12

aliases

configuring12-4

ALPA9-22

ARP

clearing and viewing entries16-6

IP services1-5

ARP caches

clearing17-8

managing17-8

assigning

alias names12-4

contact information18-2

domain IDs19-4

FC IDs15-8

global keys14-15

host key14-14

users14-24

zone members12-4

authentication

CHAP option17-65

global overide17-51

iSCSI hosts17-51

iSCSI setup17-64

See MD5 authentication

See simple text authentication

authentication, authorization, and accounting

See AAA

automatic synchronization

conditions4-7

modules4-6

AutoNotify

destination profile (note)18-5

registration18-3

service contract18-2

auto port mode

configuring9-9

description9-5

interface configuration9-2

B

basic input/output system

See BIOS

BB_credits

configuring9-10

reason codes9-6

beacon mode

configuring9-11

identifying LEDs9-12

LEDs6-10

Berkeley Packet Filter

See BPF

BIOS

boot sequence5-25

recovering corrupted bootflash5-27

recovery sequence5-26

setup (figure)5-28

BIOS upgrades5-16

boot

sequence5-25

variable synchronization4-6

bootflash

copying to5-12, 5-21

description2-12

device5-12

file system5-1

initializing3-23

recovering corrupted5-25to 5-26

space requirements5-2

See also internal bootflash

bootloader

loading kickstart5-25

nondisruptive upgrades5-15

skipping phases5-30

bootup diagnostics6-3

boot variable

upgrading single supervisor switches5-21

boot variables

disruptive upgrades5-24

specifying5-18

BPF

library24-14

See also libpcap freeware

B ports

functionality9-4

broadcast

in-band addresses default6-10

routing15-9

buffer-to-buffer credits

See BB_credits

build fabric frames19-3

C

cache

See address-allocation cache

Call Home

configuring18-3to 18-7

Call Home

functionality1-6

message format options18-2

capture filters24-14

CDP

clearing3-34

configuring3-33

configuring globally3-34

displaying3-35

hold time3-34

packet transmission3-33

CHAP authentication17-65

chassis

types6-1

checks

See compatibility checks

See heartbeat checks

See watchdog checks

Cisco Discovery Protocol

See CDP

Cisco MDS 9000 System Debug Server26-9

Cisco MDS 9200 Series

configuring interoperability24-22

LEDs6-8

mgmt0 LEDs6-9

supervisor modules6-2

verifying interoperability24-26

Cisco MDS 9216 switches

high availability1-3, 4-2

modules1-7, 6-1

overview1-1

supervisor module6-4

Cisco MDS 9500 Series

configuring interoperability24-21

high availability1-3, 4-2

LEDs6-9

overview1-1

supervisor modules6-2

verifying interoperability24-23

Cisco MDS 9506 Directors

modules1-7, 6-1

overview1-1, 1-2

Cisco MDS 9509 Directors

modules1-7, 6-1

overview1-1, 1-2

clearing

FIB statistics15-13

FSPF counters15-8

zone sets12-11

CLI

accessing submodes2-3

alternative1-9

command modes2-3

syslog provisioning1-8

updating SNMPv3 passwords14-24

clock modules

monitoring status7-10

CMOS

configuration5-28

saving changes5-29

COM 1

configuring3-32

command-line interface

See CLI

commands

saving output to files2-18

CompactFlash

devices3-22, 3-23, 5-12

disk5-1

slot 05-12

compatibility checks11-7

computing routes15-1

configuring

FCIP links17-20

congestion control methods

See edge quench congestion control

See FCC

connecting a modem

COM 13-32

consistent switch states11-6

console port

logging in5-20

console session

severity levels21-5

control frames17-18

control traffic

disabling20-4

core dumps

full17-16

IPS17-16

kernel17-16, 26-9

partial17-16

cores26-6

customized

targets22-4

D

databases

See zone databases

data field

configuring size9-11

data frames17-18

dead time interval15-6

default gateway

BIOS setup configuration5-28

configuring mgmt0 Ethernet interfaces9-14

recovering loader> prompt5-30

recovering switch(boot)# prompt5-31

default groups14-23

default zones

description12-9

interoperability24-20

deleting

FSPF configurations15-4

PortChannels11-6

destination IDs

exchange based11-5

flow based11-4

frame identification20-2

frame loop back24-3

in-order delivery15-9, 20-2

load balancing1-5, 11-1

path selection8-7

destination profiles

configuring18-5

device IDs

Call Home format18-12, 18-13

copying files14-23

report capacity22-1

Device View

description1-9

digital signature algorithm

See DSA key pairs

Dijkstra's algorithm15-2

direct memory access

See DMA-bridge

disabling routing protocols15-4

discovered

LUNs22-3

targets22-2

display filters

selective viewing24-10

disruptive

switchover4-4

upgrades5-4

distribution tree15-9

DMA-bridge17-9

documentation

related documentsxxiv

domain IDs

configuring19-4

distributing19-2

failure9-7

interoperability24-20

preferred19-5

range2-20

static19-5

domain manager

isolation9-7

domain names

defining16-19

Domain Name System servers

See DNS servers

domain overlap

isolation9-7

drop latency time

configuring15-11

dsa key pairs

generating14-19

E

edge quench congestion control

description20-2

egress port23-12

EISL

functionality1-4

PortChannel links11-1

ELP failure9-7

e-mail notification

Call Home18-1

environmental monitors6-8, 6-9

E ports

32-port guidelines9-7

classes of service9-3

configuring9-9

FSPF topology15-2

interface modes9-2

isolation9-7

recovering from isolation12-10

SPAN23-3

trunking1-4

trunking configuration10-3

error disabled code9-6

error messages

description21-2

error state5-32

ESC failure9-7

Ethereal freeware

analyzer24-6

information24-5

Ethernet PortChannels

configuring17-14

exchange IDs

in-order delivery15-9

load balancing1-5, 11-1, 24-3

path selection8-7

exchange link parameter

See ELP failure

exporting

zone databases12-10

extended ISL

See EISL

external RADIUS server

CHAP17-65

external server

configuring26-10

F

fabric

See build fabric frames

See reconfigure fabric frames

Fabric Analyzer

capture range2-20

configuring24-7

description24-5

frame range2-20

Fabric Configuration Server

See FCS

fabric login

See FLOGI

Fabric Manager

description1-8

Device View1-9

Fabric View1-9

fabric names

setting19-8

fabric pWWNs

configuring zones12-4

zone membership12-2

fabric reconfiguration

fcdomain phase19-2

fabric shortest path first

See FSPF

Fabric View

description1-9

fail over protection17-13

fan modules

monitoring status7-10

fan trays

overview1-2

fault tolerant fabric

example (figure)15-2

FC aliases

configuring zones12-4

fcanalyzer

clearing hosts24-9

displaying filters24-10

FCC

benefits20-2

default settings20-4

enabling20-3

frame handling20-2

logging facility21-2

fcdomain

configuring19-1

default settings19-14

FC IDs

address format2-20

allocating19-2, 24-18

allocating areas24-18

configuring zones12-4

FCIP

configuring17-17

Gigabit Ethernet ports17-4

interfaces17-18, 17-19

IPS module17-2, 17-17

IP storage17-1

links17-18

profiles17-18, 17-19

TCP connections17-18

FCIP parameters

default17-76

Fcot not present9-6

fcping

invoking24-4

FCS

configuring25-3

description25-2

logging facility21-2

significance25-3

fctrace

invoking24-3

Fibre Channel analyzers23-10

Fibre Channel Congestion Control

See FCC

Fibre Channel domain

See fcdomain

Fibre Channel over IP

See FCIP

Fibre Channel traffic

SPAN sources23-3

file system

formatting3-23

redirection2-18

volatile2-12

File Transfer Protocol

See FTP

filters

capture24-14

defining display24-11

FLOGI

displaying details13-1

logging facility21-2

flow statistics15-12

FL ports

classes of service9-3

configuring9-9

fctrace24-3

interface modes9-2

nonparticipating code9-7

persistent FC IDs19-10

SPAN23-3

F ports

classes of service9-3

configuring9-9

interface modes9-2

SPAN23-3

frames

control17-18

data17-18

encapsulation23-8

flow1-7

MTU17-5

reordering15-9

FSPF

alternative paths15-1

clearing counters15-8

computing link cost15-5

configuring globally15-3

configuring on interfaces15-5

default settings15-18

disabling on interfaces15-6

disabling routing protocols15-4

hold time range2-20, 15-1

interoperability24-21

link state protocol15-2

reconvergence time15-2

routing services15-1

topologies example15-2

FTP

logging facility21-2, 21-8

full zone set

considerations12-6

distribution12-11

Fx ports

32-port default9-8

configuring9-9

FCS25-2

interface modes9-4

G

Gigabit Ethernet

configuring17-5

IP routing17-7

major interfaces17-6

ports17-4

subinterfaces17-6

Gigabit Ethernet parameters

default17-76

global iSCSI information

displaying17-55

H

HA policy26-8

hardware

displaying inventory7-2

status description6-3

hard zoning12-5

HA-standby4-5, 6-2

HA switchover4-3, 4-6

heartbeat checks26-8

hello time interval15-5

hidden routes15-14

high availability

default setting4-8

Ethernet PortChannel17-64

features17-62

functionality1-3, 4-2

process restartability4-5

software upgrade5-4

status4-6

VRRP17-63

VRRP features17-13

See also HA policy

See also HA standby

See also HA switchover

I

ICMP statistics

displaying17-11

identical passwords

CLI and SNMP14-24

IDs

CCO IDs18-3

contract IDs18-4, 18-12

customer IDs18-4

image version and IDs5-1

login IDs3-5

process IDs3-28, 26-2, 26-6

profile IDs18-5

region ID15-4

serial IDs18-13

server IDs18-13

site IDs18-4, 18-12

See destination IDs

See device IDs

See domain IDs

See exchange IDs

See FC IDs

See port IDs

See source IDs

See user IDs

See VR IDs

See VSAN IDs

images

See kickstart images

See software images

See system images

software upgrades

See also one-step upgrade

See also step-by-step upgrades

importing database12-10

inactive code9-6

inconsistent switch states11-6

ingress port23-10

initiator access list17-49

in-order delivery15-9

enabling15-11

in-order guarantee15-10

install all

command benefits5-5

command examples5-8

command failure cases5-6

command function5-5

command requirements5-3

command usage5-7

remote location path (caution)5-9

TFTP get operation5-10

insufficient power6-3

interface

adding to PortChannels11-7

configuring FSPF15-5

suspended states11-7

interfaces

characteristics9-2

configuring9-8

data field size9-11

default settings9-13

description9-10

modes9-2, 9-9

reason codes9-5

states9-5

internal bootflash

description2-12

flash devices2-12, 3-22

See also bootflash

internal switch states

description4-8

interoperability

configuring24-20

verifying status24-23to 24-28

inter-switch links

See ISL

invoking fcping24-4

IP address

address format2-20

SMTP server18-7

IP addresses

configuring in VSANs16-5

IPFC

logging facility21-3

IP features

default settings16-20

IP forwarding

disabling16-5

IP over Fibre Channel

See IPFC

IP routing

Gigabit Ethernet interface17-7

static1-5

IPS core dumps

See core dumps

IP services

default settings16-19

IPS module

CDP3-33

CDP support17-16

functions17-2

port mode17-4

IPS Ports

multiple connections17-62

IPS ports17-2

IPS services module

See IPS module

IPS statistics

displaying17-60

IP statistics

displaying17-10

IP storage

VRRP17-13

iSCSI

Gigabit Ethernet ports17-4

IPS module17-2

node name17-46

iSCSI authentication17-51

iSCSI discovery17-50

iSCSI host

multiple VSANs17-48

iSCSI hosts

configuring accessibility17-49

iSCSI initiators

assigning WWNs17-48

displaying17-56

dynamic mapping17-46

identifying17-46

iSCSI interfaces

displaying17-53

iSCSI parameters

default17-77

iSCSI session creation17-50

iSCSI sessions

displaying17-55

iSCSI targets

access control17-49

secondary access17-43

iSCSI user information

displaying17-61

iSCSI virtual targets

displaying17-59

ISL

PortChannel links11-1

isolation

reason codes9-7

J

jumbo frames

see MTU frame size

K

kernel core dumps26-9

configuring26-10

kickstart images

downloading3-23

KICKSTART variable5-2

loading system images5-25

overview5-1

recovering corrupted5-30

recovery5-31

recovery interruption5-26

specifying5-18

verifying integrity5-14

L

LEDs

identifying beacon9-12

libpcap freeware24-5

link cost15-2

link end points17-18

link failure9-6

high availability4-2

link redundancy

Ethernet PortChannels17-14

load balancing11-1

attributes8-7

guarantee8-8

mechanisms11-4

local capture24-7

log files26-6

configuring21-6

logging

default settings21-13

severity levels21-4

system messages21-2

logical unit numbers

See LUNs

loop monitoring24-18

loop port24-18

LSR15-16

LUNs

address format2-20

displaying discovered, example22-3

M

MAC address

format2-20

major threshold6-8

Management Information Base

See MIB

management module6-8

management redundancy

high availability4-2

manual assignment17-47

mapping

iSCSI hosts17-46

MD5 authentication16-16

memory test5-26, 5-27

mgmt0 interfaces

autosensing port9-14

configuring9-14

configuring ethernet ports16-3

overview9-1

recovery from switch(boot)# prompt5-31

minor threshold6-8

modify existing users14-23

module

configuring logging21-6

module configuration

sample scenarios6-6

module status9-1

module temperature7-9

monitoring traffic23-6

MTU frame size17-5

multicast routing15-9

multi-pid option13-7

N

name server

interoperability24-21

name server proxy13-3

network administrator2-19

network operator2-19

Network Time Protocol

See NTP

network traffic

monitoring23-6

next hop domain ID15-8

NL ports

fctrace24-3

interface modes9-5

zone enforcement12-5

node WWNs

See nWWNs

nondisruptive

restart4-2

switchover4-4

upgrades5-4

nonparticipating code9-7

non-trunking ISL10-2

nonvolatile storage6-6

N ports

fctrace24-3

zone enforcement12-5

zone membership12-2

NTP

logging facility21-3

nWWNs

address format2-20

Nx ports

hard zoning12-5

O

offline code9-6

one-step upgrade

install all command5-4

reload command5-4

operational interfaces

viewing PortChannels11-9

operational state9-9

operational state setting

description9-5

originator exchange IDs

See exchange IDs

out-of-order delivery15-9

P

password recovery14-13

path discovery24-3

permitted filters24-15

persistent FC ID19-9

persistent FC IDs

displaying19-12

physical interfaces17-10

port aggregation4-2

PortChannel

configuring FC routes15-8

functionality1-5

high availability4-2

in-order guarantee15-10

link changes15-10

link failure15-3

load balancing1-5

logging facility21-3

membership11-8

range2-20

reason codes9-7

PortChannels

adding Gigabit Ethernet interfaces17-16

adding interfaces11-6

configuring11-5

default settings11-11

deleting11-6

examples11-2

forcing additions11-7

guidelines11-8

interoperability24-20

member combinations17-15

SPAN23-3

trunking comparison11-3

port group9-7

port IDs

configuring zones12-4

port mode

IPS17-2, 17-4

port modes

auto9-5

ports

virtual E17-18

Port world wide name

See pWWN

port WWNs

See pWWNs

power supplies1-2, 6-8, 6-9

configuring7-6

displaying configuration7-6

guidelines7-6

modes3-30, 7-6

power usage

displaying details7-5

preempt option16-16

preferred domain IDs19-5

preshared key14-15

principle switch19-4, 19-5

selecting19-1

private device9-22

process ID26-6

Process Logs26-4

process restartability4-5

protocol analysis24-5

pWWNs

address format2-20

configuring zones12-4

zone membership12-2

Q

QoS

default settings20-4

displaying information20-4

enabling control traffic20-4

logging facilities21-3

priority queuing1-7

quality of service

See QoS

R

R_A_TOV time9-6

RADIUS

AAA solutions1-8

authorization process14-17

configured parameters14-18

secret key1-8

setting preshared key14-15

specifying servers14-14

specifying time-out14-15

rebooting switch6-5

rebooting system5-19

reconfigure fabric9-6

reconfigure fabric frames19-3

reconvergence time

FSPF15-2

recovering passwords14-13

recovery sequence5-26

redundancy states4-7

redundant physical links15-3

Registered State Change Notification

See RSCN

remote capture24-7, 24-9

remote capture daemon24-6

Remote Capture Protocol

See RPCAP

Remote Monitoring

See RMON

retransmit intervals15-7

route cost

computing15-5

route table17-7

routing

See broadcast routing

See IP routing

RPCAP

Ethereal communication24-6

rsa1 key pairs

generating14-19

rsa key pairs

generating14-19

RSCN

logging facility21-3

run time checks15-7

S

SAN operating system

See SAN-OS

SAN-OS5-2

SCSI LUNs

discovering targets22-1

SD ports

bidirectional traffic23-12

configuring9-9, 23-6

interface modes9-2, 9-4

secondary MAC address24-16

Secure Shell

See SSH

security features

default settings14-26

security parameter index

See SPI

See MAC address

See also WWNs

selective purging

persistent FC IDs19-11

severity levels

logging21-6

shutdown state9-7

Simple Network Management Protocol

See SNMP

simple text authentication16-16

simulating

Call Home18-8

slot0

formatting3-23

small computer system interface

See SCSI

SMARTnet18-3

SMTP

server address18-6

SNMP

access control14-21

access groups14-21

CLI configuration14-21

community strings14-21

configuring from CLI14-23

counter Information14-25

displaying information14-25

groups14-22

read-write access14-24

server contact18-2

versions14-20

SNMP manager

FCS25-3

SNMPv3

security features14-21

software image

default setting5-34

error state5-25

recognizing errors5-33

startup configuration5-19

software images

bootflash corruption5-25

compatibility issues5-15

corruption5-25

recovery procedure5-26

saving5-19

space requirement5-2

specifying5-18

synchronizing4-6

upgrade requirements5-2

upgrading5-1

variables5-2

software upgrades

disruptive5-7

high availability4-2

manual, dual supervisor5-12

mechanisms5-4

quick5-24

soft zoning12-5

source IDs

Call Home event format18-12

exchange based11-5

flow based11-4

frame identification20-2

frame loop back24-3

in-order delivery15-9

load balancing1-5, 11-1

path selection8-7

SPAN

configuring sessions23-5

default settings23-14

egress source23-3

encapsulating frames23-8

FC analyzers23-10

ingress source23-2

monitoring traffic23-2

source configuration23-4

sources23-3

speed

LEDs6-10

SPI

configuring virtual router16-16

SSH

default service14-18

force option14-19

host key pair14-19

protocol status14-20

session5-12, 5-20

SSH session

message logging21-5

standby module6-2

monitoring4-2

standby supervisor4-6

stateful

HA-switchover4-3

stateless

warm switchover4-3

static domain IDs19-5

static mapping

iSCSI initiators17-47

pWWN assignment17-47

static routes8-9

run time checks15-7

status

LEDs6-10

step-by-step upgrade5-4

storage

permanent and temporary2-12

storage devices

access control12-1

subnet mask

BIOS setup configuration5-28

configuring IP routes16-6

configuring mgmt03-20

configuring mgmt0 interfaces9-14, 16-2

configuring switch3-3

default setting6-10

initial configuration3-6, 3-10

loader> prompt recovery5-30

switch(boot)# prompt recovery5-31

subnetwork requirements17-6

subordinate switch19-7

supervisor module

CDP support17-16

default settings6-10

supervisor modules

active1-7, 4-2

active state4-7, 4-8, 6-3

automatic synchronization4-5

default settings6-10

dual modules6-2

high availability4-2

major threshold6-9

recovering password5-33

resetting6-5

standby module1-7

standby state4-7, 4-8, 6-3

standby status4-5, 6-3

states4-7

switch options1-7

switchover4-3

synchronizing images4-5

upgrading5-20

viewing information6-4

suspended state11-7

switch

dual supervisor5-33

reliability service1-3

reloading6-5

role-based access1-8

secure access1-8

security management1-8

single supervisor5-31

SNMPv3 access1-8

verifying modules6-2

switchability

high availability4-2

switched port analyzer

See SPAN

switching module

16-port6-6

32-port6-6

image6-2

LEDs6-8

power cycle6-5

powering off6-7

reloading6-5

status6-2

viewing states6-3

switching modules

connecting to5-17, 6-4

LEDs6-8

LEDs (table)6-10

managing6-1

powering off6-7

preserving configuration6-6

progression states6-3

reloading6-5

reset4-3

resetting6-5

states6-1

thresholds7-9

switchover mechanism

HA4-5, 4-7, 4-8, 6-3

warm4-5, 4-7, 4-8, 6-3

switch priority

configuring19-6

range2-20

switch redundancy states4-7

switch states11-6

synchronization

See automatic synchronization

syslogs

viewing1-8

syslog server21-2

configuring21-7

system assignment17-47

system image3-23

reading configuration5-25

recovery interruption5-26

specifying5-18

switching module6-2

system images5-1

specifying5-18

SYSTEM variable5-2

system messages

configuring21-5

default settings21-13

displaying configuration21-8

format21-4

logging21-2

system processes

displaying26-2

status26-5

system statistics

CPU and memory26-5

system statistics reset feature26-8

system switchover

configuring4-4

guidelines4-4

mechanisms4-3

system switchovers

performing5-20

SYSTEM variable5-18

clearing5-18

T

target disks22-3

TCP connections

FCIP profiles17-19

TCP statistics

displaying17-10

Telnet

default service14-18

session5-12, 5-20

Telnet session

message logging21-5

temporary storage2-12

TE port

trunking1-4

TE ports

classes of service9-4

fctrace24-3

FSPF topology15-2

interface modes9-2

interoperability24-20

recovering from isolation12-10

SPAN23-3

trunking restrictions10-1

TFTP

boot5-28

copying images5-12

server5-28

TFTP server26-6

threshold

major and minor7-9

time interval

configuring15-5

time out value

See TOV

Timers

range2-20

TL Ports

logging facility21-3

TL ports

classes of service9-3

configuring9-9

displaying9-22

FCS25-2, 25-3

interface modes9-2

SPAN23-3

TOV

interoperability24-20

ranges24-2

troubleshooting

error messages21-2

trunk-allowed list

configuring10-4

Trunking

PortChannels comparison11-3

trunking

configuration guidelines10-6

functionality1-4

interoperability24-20

link state10-3

restrictions10-1

trunking ports8-6

trunking protocol10-2, 10-6

default10-2

default settings10-8

trunk mode

administrative default9-13

configuring10-3

default settings10-8

status10-3

trunk ports

displaying information10-7

U

upgrade-reset feature26-9

upgrades

See disruptive upgrades

See nondisruptive upgrades

upgrading

software5-12to 5-24

upgrading BIOS

See BIOS upgrades

user ID

authentication14-2

authorization process14-4

user IDs

security management1-8

user roles1-8

users

creating14-23

V

VE ports17-18

version compatibility

switch images4-3

virtual devices9-23

virtual E ports

See VE ports17-18

virtual Fibre Channel hosts

mapping17-46

virtual ISL17-18

Virtual LANs

See VLANs

virtual N port

dynamic mapping17-46

Virtual Router Redundancy Protocol

See VRRP

virtual SANs

See VSANs

VLANs

configuring17-5

VLAN tags17-6

VR IDs

configuring16-14

mapping16-12

VRRP

characteristics16-12

clearing statistics16-18

configuring17-14

configuring Gigabit Ethernet17-13

group members17-13

logging facility21-3

master and backup16-13

primary IP16-14

priority tracking16-17

security authentication16-16

setting priority16-15

tracking priority16-16

VSA

communicating attributes14-16

protocol options14-17

VSAN

address format2-20

configuring1-4

domain IDs19-6

functionality1-4

gateway switch16-3

overlaid routes16-4

reason codes9-6

redundancy1-4

scalability1-4

traffic isolation1-4

VSAN IDs

allowed list10-8

attributes8-7

FCS registration2-8

membership8-4

multiplexing traffic9-4

name8-11

range8-6

trunking11-3

VSANs

allowed-active10-1, 10-4

allowed list23-3

allowed-list10-8

attributes8-7, 8-9

availability8-1

broadcast address15-9

cache contents19-14

configuring8-1, 8-7

configuring domains19-1

configuring FSPF15-3

configuring overlay16-10

database submode2-8

default setting8-11

default VSAN8-6

deleting8-9

FCC protocol20-2

FCIDs8-2

FCS25-2

features8-2

flow statistics15-12

FSPF connectivity15-2

functionality1-4

interface9-13, 9-15

interop mode24-20

IP addresses16-5

IPFC interface24-3

isolated VSAN8-6

logical interface3-9

loop devices9-22

management interfaces16-2

managing traffic20-1

membership8-6, 8-10

merging traffic10-6

mismatch9-7, 10-2

multiple zones8-4, 12-6

name8-7

name server13-3

overlaid routes16-8

port granularity8-3

port isolation10-6

Rules and features14-7

sate8-7

scalability8-1

SPAN source23-2, 23-3

static routing16-6

TOVs24-2

traffic isolation8-1, 8-3

traffic routing16-1

trunk allowed9-13

trunk-allowed10-1, 10-2

trunk-allowed list10-4

trunking port9-4

trunking ports8-6

usage8-10

VRRP16-12

VRRP submode2-8

VSAN trunking

See trunking

W

warm switchovers

defining4-4

description4-3

guidelines4-4

watchdog checks26-8

world wide names

See WWNs

WWN

address pool17-46

WWNs

configuring24-16

displaying configurations24-17

suspended connection9-7

See also nWWNs

See also pWWNs

Z

zone database12-10

zones

access control12-6

accesses between devices1-4

configuring12-4

configuring guidelines12-6

default policy12-2, 12-9

default settings12-15

enforcing12-5

examples12-3

functionality1-4

logging facility21-3

See also default zones

See also hard zoning

See also soft zoning