Cisco MDS 9000 Family Configuration Guide, Release 1.2(2a)
Initial Configuration

Table Of Contents

Initial Configuration

Starting a Switch in the Cisco MDS 9000 Family

Initial Setup Routine

Preparing to Configure the Switch

Default Login

Setup Options

Assigning Setup Information

Configuring Out-of-Band Management

In-Band Management Configuration

Using the setup Command

Assigning a Switch Name

Assigning SNMP Switch Contact Information

Accessing the Switch

Where Do You Go Next?

Verifying the Module Status

Configuring Date and Time

Configuring the Time Zone

Setting the Daylight Saving Time Adjustment

NTP Configuration

NTP Configuration Guidelines

Configuring the Management Port

Configuring Default Gateways

Disabling a Telnet Server

Working with Configuration Files

Guidelines for Creating and Using Configuration Files

Viewing Configuration Files

Downloading Configuration Files to the Switch

From a Remote Server

From an External Flash (slot0:)

To a Remote Server

To an External CompactFlash Disk

Saving the Configuration

Copying Files

Backing up the Current Configuration

Rolling Back to a Previous Configuration

Restoring the Configured Redundancy Mode

Downgrading from a Higher Release

Deleting Files

Configuring Console Settings

Verifying the Console Configuration

Configuring COM1 Settings

Verifying the COM1 Configuration

Configuring Modem Connections

Guidelines to Configure Modems

Enabling Modem Connections

Configuring the Initialization String

Configuring the Default Initialization String

Configuring a User-Specified Initialization String

Initializing a Modem in a Powered on Switch

Configuring CDP

Clearing CDP Configurations

Displaying CDP Protocol Settings


Initial Configuration


This chapter describes how to initially configure switches so they can be accessed by other devices. This chapter includes the following sections:

Starting a Switch in the Cisco MDS 9000 Family

Initial Setup Routine

Assigning a Switch Name

Accessing the Switch

Where Do You Go Next?

Verifying the Module Status

Configuring Date and Time

Configuring the Management Port

Disabling a Telnet Server

Working with Configuration Files

Copying Files

Deleting Files

Configuring Console Settings

Configuring COM1 Settings

Configuring Modem Connections

Configuring CDP

Starting a Switch in the Cisco MDS 9000 Family

The following procedure is a review of the tasks you should have completed during hardware installation, including starting up the switch. These tasks must be completed before you can configure the switch.


Step 1 Check that the switch is set for the correct AC (or DC) power voltages.

Refer to either the Cisco MDS 9000 Family Hardware Installation Guide (for the required product) for correct power voltages.

Step 2 Connect the power cord(s) to the switch.

Step 3 Connect the console port to the switch.


Note The console port is an asynchronous (async) serial port; any device connected to this port must be capable of asynchronous transmission.


Before connecting the console port, check the terminal documentation to determine the baud rate. The baud rate of the terminal must match the default baud rate (9600 baud) of the console port. Set up the terminal as follows (see the "Configuring Console Settings" section):

9600 baud

8 data bits

1 stop bit

No parity

Step 4 Power on the switch. The switch boots automatically.


Initial Setup Routine

The first time that you access a switch in the Cisco MDS 9000 Family, it runs a setup program that prompts you for the IP address and other configuration information necessary for the switch to communicate over the supervisor module Ethernet interface. This information is also required if you plan to configure and manage the switch.


Note The IP address must first be set up in CLI when the switch is powered up for the first time so the Cisco MDS 9000 Fabric Manager can reach the switch.


Preparing to Configure the Switch

Before you configure a switch in the Cisco MDS 9000 Family for the first time, you need the following information:

Administrator password—you have the following options:

Change the default password (admin) for the administrator.

Create an additional login account and password.

SNMPv3 user name and authentication password.

SNMP community string.

Switch name—this is your switch prompt.

IP address for the switch's management interface—The management interface can be an out-of-band Ethernet interface or an in-band Fibre Channel interface.

Subnet mask for the switch's management interface.

The following IP addresses:

Destination prefix, destination prefix subnet mask, and next hop IP address, if you want to enable IP routing. Also, provide the IP address of the default network.

Otherwise, provide an IP address of the default gateway.

DNS IP address (optional).

Default domain name (optional).

SSH service on the switch—if you wish to enable this service, then select the type of SSH key (dsa/rsa/rsa1) and number of key bits (768 to 2048).

NTP server IP address (optional).


Note Be sure to configure the IP routing, the IP default network address, and the IP default gateway address to enable SNMP access. If IP routing is enabled, the switch uses the IP route and the default network IP address. If IP routing is disabled, the switch uses the default gateway IP address.


Default Login

All Cisco MDS 9000 family switches have the network administrator as a default user (admin) and a default password (admin). You can change the default password, if required, during the initial setup process. You cannot change the default user at any time.

During the initial setup process, you have the option to configure one additional user in the network administrator role. See the "Role-Based Authorization" section for information of default roles and permissions.

If you change the administrator password during the initial setup process and subsequently forget this new password, you have the option to recover this password (see the "Recovering Administrator Password" section).

Setup Options

The setup scenario differs based on the subnet to which you are adding the new switch. You must configure a switch in the Cisco MDS 9000 Family with an IP address to enable management connections from outside of the switch.


Note Some concepts like out-of-band management and in-band management are briefly explained here. These concepts are explained in more detail in subsequent chapters.


Out-of-band management—This feature provides a connection to the network through a supervisor module front panel Ethernet port (see Figure 3-1).

In-band management—This feature provides IP over Fibre Channel (IPFC) to manage the switches. The in-band management feature is transparent to the network management system (NMS). Instead of conventional Ethernet physical media, switches in the Cisco MDS 9000 Family use IPFC as the transport mechanism (see Figure 3-1 and "Configuring IP Services").

Figure 3-1 Management Access to Switches

Assigning Setup Information

This section describes how to initially configure the switch for both out-of-band and in-band management.


Note Press Ctrl-C at any prompt to skip the remaining configuration options and proceed with what is configured until that point.



Tip If you do not wish to answer a previously-configured question, or if you wish to skip answers to any questions, press Enter. If a default answer is not available (for example switch name), the switch uses what is previously configured and skips to the next question.


Configuring Out-of-Band Management


Note If you wish to configure both in-band and out-of-band configuration together, enter Yes in both Step 11 and Step 12 in the following procedure.


To configure the switch for first time out-of-band access, follow these steps:


Step 1 Power on the switch. Switches in the Cisco MDS 9000 Family boot automatically.

Step 2 Enter yes to enter the setup mode.

This setup utility will guide you through the basic configuration of
the system. Setup configures only enough connectivity for management
of the system.

Press Enter incase you want to skip any dialog. Use ctrl-c at anytime
to skip away remaining dialogs.

Would you like to enter the basic configuration dialog (yes/no): yes

The setup utility guides you through the basic configuration process. Press Ctrl-C at any prompt, to end the configuration process.

Step 3 Enter the new password for the administrator (admin is the default):

Enter the password for admin: admin 

Step 4 Enter yes (no is the default), to create additional accounts.

Create another login account (yes/no) [n]: yes

While configuring your initial setup, you can create an additional user account (in the network-admin role) besides the administrator's account. See the "Role-Based Authorization" section for information of default roles and permissions.

a. Enter the user login ID.

Enter the user login ID: user_name

b. Enter the user password.

Enter the password for user_name: user-password

Step 5 Enter yes (yes is the default), if you wish to create an SNMPv3 account.

Configure SNMPv3 Management parameters (yes/no) [y]: yes

a. Enter the user name (admin is the default).

SNMPv3 user name [admin]: admin

b. Enter the SNMPv3 password (minimum of eight characters).

SNMPv3 user authentication password : admin_pass


Note If this password contains less than eight characters, you must enter a new password. The same password is also used for the SNMPv3 privacy.
By default, if the admin password is at least eight characters, then the SNMP authentication password will be same as admin password (at least eight characters). If the admin password is less than eight characters, then you need to provide a new password for SNMP.
The admin password can have a minimum of one character, but the SNMP authentication password must have a minimum of eight characters.


Step 6 Enter yes (no is the default) to configure read-only or read-write SNMP community string.

Configure read-only SNMP community string (yes/no) [n]: yes

a. Enter the SNMP community string.

SNMP community string: snmp_community

Step 7 Enter a name for the switch.


Note The switch name is limited to 32 alphanumeric characters.


Enter the switch name: switch_name

Step 8 Enter yes (yes is the default) to configure out-of-band management.

Continue with Out-of-band (mgmt0) management configuration? [yes/no]: yes

a. Enter the mgmt0 IP address.

Mgmt0 IP address: ip_address

b. Enter the mgmt0 subnet mask.

Mgmt0 IP netmask: subnet_mask

Step 9 Enter no (no is the default) at the in-band management configuration prompt.

Continue with in-band (VSAN1) management configuration? (yes/no) [no]: no

Step 10 Enter yes (yes is the default) to enable IP routing capabilities.

Enable the ip routing capabilities? (yes/no) [y]: yes 

Step 11 Enter yes (yes is the default) to configure a static route (recommended).

Configure static route: (yes/no) [y]: yes 

a. Enter the destination prefix.

Destination prefix: dest_prefix 

b. Type the destination prefix mask.

Destination prefix mask: dest_mask 

c. Type the next hop ip address.

Next hop ip address: next_hop_address 


Note Be sure to configure the IP routing, the IP default network address, and the IP default gateway address to enable SNMP access. If IP routing is enabled, the switch uses the IP route and the default network IP address. If IP routing is disabled, the switch uses the default gateway IP address.


Step 12 Enter yes (yes is the default) to configure the default-network (recommended).

Configure the default-network: (yes/no) [y]: yes 

a. Enter the default-network IP address.


Note The default network address is the destination prefix provided in Step 10 a above.


Default network IP address: dest_prefix 

Step 13 Enter yes (yes is the default) to configure the default-gateway (recommended).

Configure the default-gateway: (yes/no) [y]: yes 

a. Enter the default-gateway IP address.

IP address of the default-gateway: default_gateway

Step 14 Enter yes (yes is the default) to configure the DNS IP address.

Configure the DNS IP address? (yes/no) [y]: yes

a. Enter the DNS IP address.

DNS IP address: name_server

Step 15 Enter yes (default is no) to configure the default domain name.

Configure the default domain name? (yes/no) [n]: yes

a. Enter the default domain name.

Default domain name: domain_name

Step 16 Enter yes (yes is the default), to enable Telnet service.

Enable the telnet service? (yes/no) [y]: yes

Step 17 Enter yes (no is the default) to enable the SSH service.

Enabled SSH service? (yes/no) [n]: yes

Step 18 Enter the SSH key type (see Generating an SSH Host Key Pair) you would like to generate.

Type the SSH key you would like to generate (dsa/rsa/rsa1)? dsa

Step 19 Enter the number of key bits within the specified range.

Enter the number of key bits? (512 to 2048): 768

Step 20 Enter yes (no is the default) to configure the NTP server.

Configure NTP server? (yes/no) [n]: yes

a. Enter the NTP server IP address.

NTP server IP address: ntp_server_IP_address

Step 21 Enter shut (shut is the default) to configure the default switchport interface to the shut state.

Configure default switchport interface state (shut/noshut) [shut]: shut

Step 22 Enter on (on is the default) to configure the switchport trunk mode.

Configure default switchport trunk mode (on/off/auto) [on]: on

Step 23 Enter permit (deny is the default) to permit a default zone policy.

Configure default zone policy (permit/deny) [deny]: permit

Permits traffic to flow to all members of the default zone.

Step 24 Review and edit the configuration that you have just entered.

Step 25 Enter no (no is the default) if you are satisfied with the configuration.

The following configuration will be applied:
  username admin password admin_pass role network-admin
  username user_name password user_pass role network-admin
  snmp-server user admin network-admin auth md5 admin_pass priv admin_pass 
  snmp-server community snmp_community ro
  switchname switch
  interface mgmt0
    ip address ip_address subnet_mask
    no shutdown
  ip routing
  ip route dest_prefix dest_mask dest_address
  ip default-network dest_prefix
  ip default-gateway default_gateway
  ip name-server name_server
  ip domain-name domain_name
  telnet server enable
  ssh key dsa 768 force
  ssh server enable
  ntp server ntp_server
  system default switchport shutdown
  system default switchport trunk mode on
  no zone default-zone permit vsan 1-4093

Would you like to edit the configuration? (yes/no): no

Step 26 Enter yes (yes is default) to use and save this configuration:

Use this configuration and save it? (yes/no):yes


Caution If you do not save the configuration at this point, none of your changes will be updated the next time the switch is rebooted. Ensure to type yes in order to save the new configuration. This will ensure that the kickstart and system boot images are also automatically configured (see "Software Images").


In-Band Management Configuration

The in-band management logical interface is VSAN 1. This management interface uses the Fibre Channel infrastructure to transport IP traffic. An interface for VSAN 1 is created on every switch in the fabric. Each switch should have it's VSAN 1 interface configured with an IP address in the same subnetwork. A default route, pointing to the switch that provides access to the IP network should be configured on every switch in the Fibre Channel fabric (see "Configuring and Managing VSANs").


Note If you wish to configure both in-band and out-of-band configuration together, enter Yes in both Step 11 and Step 12 in the following procedure.


To configure a switch for first time in-band access, follow these steps:


Step 1 Power on the switch. Switches in the Cisco MDS 9000 Family boot automatically.

Step 2 Enter yes to enter the setup mode.

---- Basic System Configuration Dialog ----
This setup utility will guide you through the basic configuration of
the system. Setup configures only enough connectivity for management
of the system.

Press Enter incase you want to skip any dialog. Use ctrl-c at anytime
to skip away remaining dialogs.

Would you like to enter the basic configuration dialog (yes/no): yes

The setup utility guides you through the basic configuration process. Press Ctrl-C from any prompt, to abort the configuration process.

Step 3 Enter the new password for the administrator.

Enter the password for admin: admin 

Step 4 Enter no (no is the default), if you do not wish to create other additional accounts.

Create another login account (yes/no) [no]: no

Step 5 Enter yes (yes is the default), if you wish to create a SNMPv3 account.

Configure SNMPv3 Management parameters (yes/no) [y]: yes

a. Enter the user name.

SNMPv3 user name [admin]: user_name

By default, the SNMP user name is admin.

b. Enter the SNMPv3 password (minimum of 8 characters).

SNMPv3 user authentication password [admin_pass]: admin_pass


Note If this password contains less than eight characters, you must enter a new password. The same password is also used for the SNMPv3 privacy.
By default, if the admin password is at least eight characters, then the SNMP authentication password will be same as admin password (at least eight characters). If the admin password is less than eight characters, then you need to provide a new password for SNMP.
The admin password can have a minimum of one character, but the SNMP authentication password must have a minimum of eight characters.


Step 6 Configure read-only or read-write SNMP community string.

a. Enter no (no is the default) to avoid configuring read-only SNMP community string.

Configure read-only SNMP community string (yes/no) [n]: no

b. Enter no (no is the default) to configure read-only SNMP community string.

Configure read-only SNMP community string (yes/no) [n]: yes

c. Enter the SNMP community string.

SNMP community string: snmp_community

Step 7 Enter a name for the switch.


Note The switch name is limited to 32 alphanumeric characters.


Enter the switch name: switch_name

Step 8 Enter no (yes is the default) at the configuration prompt to configure out-of-band management.

Continue with Out-of-band (mgmt0) management configuration? [yes/no]: no

Step 9 Enter yes (no is the default) at the in-band management configuration prompt.

Continue with in-band (VSAN1) management configuration? (yes/no) [no]: yes

a. Enter the VSAN 1 IP address.

VSAN1 IP address: ip_address

b. Enter the subnet mask.

VSAN1 IP net mask: subnet_mask

Step 10 Enter yes (yes is the default) to enable IP routing capabilities.

Enable ip routing capabilities? (yes/no) [y]: yes

Step 11 Enter no (yes is the default) to configure a static route.

Configure static route: (yes/no) [y]: no 

Step 12 Enter yes (yes is the default) to configure the default network.

Configure the default-network: (yes/no) [y]: no 

Step 13 Enter yes (yes is the default) to configure the default gateway.

Configure the default-gateway: (yes/no) [y]: yes 

a. Enter the default-gateway IP address.

IP address of the default-gateway: default_gateway

Step 14 Enter no (yes is the default) to configure the DNS IP address.

Configure the DNS IP address? (yes/no) [y]: no

Step 15 Enter no (no is the default) to skip the default domain name configuration.

Configure the default domain name? (yes/no) [n]: no

Step 16 Enter no (yes is the default), to disable Telnet service.

Enable the telnet service? (yes/no) [y]: no

Step 17 Enter yes (no is the default) to enable the SSH service.

Enabled SSH service? (yes/no) [n]: yes

Step 18 Enter the SSH key type (see Generating an SSH Host Key Pair) you would like to generate.

Type the SSH key you would like to generate (dsa/rsa/rsa1)? rsa

Step 19 Enter the number of key bits within the specified range.

Enter the number of key bits? (512 to 1024): 1024

Step 20 Enter no (no is the default) to configure the NTP server.

Configure NTP server? (yes/no) [n]: no

Step 21 Enter noshut (shut is the default) to configure the default switchport interface to the up state.

Configure default switchport interface state (shut/noshut) [shut]: noshut

Step 22 Enter auto (on is the default) to configure the switchport trunk mode automatically.

Configure default switchport trunk mode (on/off/auto) [on]: auto

Step 23 Enter deny (deny is the default) to deny a default zone policy.

Configure default zone policy (permit/deny) [deny]: deny

Step 24 Review and edit the configuration that you have just entered.

Step 25 Enter no (no is the default) if you are satisfied with the configuration.

The following configuration will be applied:
  username admin password admin_pass role network-admin
  snmp-server user snmp_user network-admin auth md5 snmp_pass priv snmp_pass
  snmp-server community snmp_community rw
  switchname switch
  interface vsan1
    ip address ip_address subnet_mask
    no shutdown
  ip default-gateway default_gateway
  no telnet server enable
  ssh key rsa 1024 force
  ssh server enable
  no system default switchport shutdown
  system default switchport trunk mode auto
  no zone default-zone deny vsan 1-4093
Would you like to edit the configuration? (yes/no): no

Step 26 Enter yes (yes is default) to use and save this configuration.

Use this configuration and save it? (yes/no):yes

Caution If you do not save the configuration at this point, none of your changes will be updated the next time the switch is rebooted. Ensure to type yes in order to save the new configuration. This will ensure that the kickstart and system boot images are also automatically configured (see "Software Images").


Using the setup Command

If you wish to make changes to the initial configuration at a later time, you can issue the setup command in EXEC mode.

switch# setup
---- Basic System Configuration Dialog ----

This setup utility will guide you through the basic configuration of
the system. Setup configures only enough connectivity for management
of the system.

*Note: setup always assumes a predefined defaults irrespective
of the current system configuration when invoked from CLI.

Press Enter incase you want to skip any dialog. Use ctrl-c at anytime
to skip away remaining dialogs.

Would you like to enter the basic configuration dialog (yes/no): yes

The setup utility guides you through the basic configuration process.

Assigning a Switch Name

Each switch in the fabric requires a unique name. You can assign names to easily identify the switch by its physical location, its SAN association, or the organization to which it is deployed. The assigned name is displayed in the command-line prompt.


Note The switch name is limited to 32 alphanumeric characters.


This guide refers to a switch in the Cisco MDS 9000 Family as switch, and uses the switch# prompt.

To change the name of the switch, follow these steps:

 
Command
Purpose

Step 1 

switch# config t

Enters configuration mode.

Step 2 

switch(config)# switchname myswitch1
myswitch1(config)# 

Changes the switch name prompt as specified.

Step 3 

myswitch1(config)# no switchname
switch(config)# 

Reverts the switch name prompt to its factory default (switch#).

Assigning SNMP Switch Contact Information

Use the snmp-server command to set the contact information, switch location, and switch name. They are each limited to 32 characters (without spaces). Use the no form of the command to remove the system contact information. For more information on other snmp-server commands see the "SNMP Security" section.

To configure contact information, follow these steps:

 
Command
Purpose

Step 1 

switch# config t

Enters configuration mode.

Step 2 

switch(config)# snmp-server contact NewUser 
switch(config)# 

Assigns the contact name for the switch.

switch(config)# no snmp-server contact NewUser 
switch(config)# 

Deletes the contact name for the switch.

Step 3 

switch(config)# snmp-server location SanJose
switch(config)# 

Assigns the switch location.

switch(config)# no snmp-server location SanJose
switch(config)# 

Deletes the switch location.

Accessing the Switch

After initial configuration, you can access the switch in one of three ways (see Figure 3-2):

In-band IP (IPFC) access—You can use Telnet or SSH to access a switch in the Cisco MDS 9000 Family or use SNMP to connect to a Cisco MDS 9000 Fabric Manager GUI.

Out-of-band (10/100BASE-T Ethernet) access—You can use Telnet or SSH to access a switch in the Cisco MDS 9000 Family or use SNMP to connect to a Cisco MDS 9000 Fabric Manager GUI.


Note To use the Cisco Fabric Manager, refer to the Cisco MDS 9000 Family Fabric Manager User Guide.


Serial console access—You can use a serial port connection to access the CLI.

Figure 3-2 Switch Access Options

Where Do You Go Next?

After reviewing the default configuration, you can change it or perform other configuration or management tasks. The initial setup can only be performed at the CLI. However, you can continue to configure other software features, or access the switch after initial configuration by using either the CLI or the Element Manager and Fabric Manager GUIs.

To use the Cisco MDS 9000 Fabric Manager, refer to the Cisco MDS 9000 Family Fabric Manager User Guide.

Verifying the Module Status

Before you begin configuring the switch, you need to ensure that the modules in the chassis are functioning as designed. To verify the status of a module at any time, issue the show module command in EXEC mode. A sample output of the show module command follows:

switch# show module
Mod  Ports  Module-Type                     Model              Status
---  -----  ------------------------------- ------------------ ------------
2    32     Advanced Services Module        DS-X9032-SMV       powered-dn
4    32     Advanced Services Module        DS-X9032-SMV       powered-dn
5    0      Supervisor/Fabric-1             DS-X9530-SF1-K9    active *
6    0      Supervisor/Fabric-1             DS-X9530-SF1-K9    ha-standby
8    32     1/2 Gbps FC Module              DS-X9032           ok

Mod  Sw           Hw      World-Wide-Name(s) (WWN)
---  -----------  ------  --------------------------------------------------
5    1.2(2a)       0.610   --                                                 
6    1.2(2a)       0.610   --                                                 
8    1.2(2a)       0.3     21:c1:00:0b:46:79:f1:40 to 21:e0:00:0b:46:79:f1:40 


Mod  MAC-Address(es)                         Serial-Num
---  --------------------------------------  ----------
5    00-d0-97-38-b4-01 to 00-d0-97-38-b4-05  JAB06350B0H
6    00-d0-97-38-b3-f9 to 00-d0-97-38-b3-fd  JAB06350B1R
8    00-05-30-00-2b-e2 to 00-05-30-00-2b-e6  jab062407x4

* this terminal session 

If the status is OK or active, you can continue with your configuration (see "Managing Modules").

Configuring Date and Time

Switches in the Cisco MDS 9000 Family use Coordinated Universal Time (UTC), which is the same as Greenwich Mean Time (GMT). To change the default time on the switch, issue the clock command from EXEC mode.

switch# clock set <HH:MM:SS> <DD> <Month in words> <YYYY>

For example:

switch# clock set 12:07:50 23 September 2002 
Mon Sep 23 12:07:50 UTC 2002

HH represents hours in military format (15 for 3 p.m.), MM is minutes (58), SS is seconds (09), DD is the date (02), Month is the month in words (August), and YYYY is the year (2002).


Note The clock command changes are saved across system resets.


Configuring the Time Zone

You can specify a time zone for the switch.

To specify the local time without the daylight savings feature, follow these steps:

 
Command
Purpose

Step 1 

switch# config t

Enters configuration mode.

Step 2 

switch(config)# clock timezone <timezone 
name> <-23 to 23 hours offset from UTC time> 
<0 to 50 minutes offset from UTC>

Example:

switch(config)# clock timezone PST -8 0

Sets the time zone with a specified name, specified hours, and specified minutes.

This example sets the time zone to Pacific Standard Time (PST) and offsets the UTC time by negative eight hours and 0 minutes.

Step 3 

switch(config)# exit
switch# 

Returns to EXEC mode.

Step 4 

switch# show clock

Verifies the time zone configuration.

Step 5 

switch# show run

Displays changes made to the time zone configuration along with other configuration information.

Setting the Daylight Saving Time Adjustment

Following U.S. standards, you can have the switch advance the clock one hour at 2:00 a.m. on the first Sunday in April and move back the clock one hour at 2:00 a.m. on the last Sunday in October. You can also explicitly specify the start and end dates and times and whether or not the time adjustment recurs every year.

To enable the daylight saving time clock adjustment according to the U.S. rules, follow these steps:

 
Command
Purpose

Step 1 

switch# config t

Enters configuration mode.

Step 2 

switch(config)# clock timezone 
timezone_name hour_offset_from_UTC 
minute_offset_from_UTC

Example:

switch(config)# clock timezone PST -8 0

Offsets the time zone as specified.


This example set the Pacific standard offset time as negative 8 hours and 0 minutes.

switch(config)# no clock timezone 

Disables the timezone adjustment feature.

Step 3 

switch(config)# clock summer-time 
daylight_timezone_name start_week 
start_day start_month start_time end_week 
end_day end_month end_time 
daylight_offset_inminutes 

Example:

switch(config)# clock summer-time PDT 1 
Sun Apr 02:00 5 Sun Oct 02:00 60
switch(config)#

Sets the daylight savings time for a specified time zone.

The start and end values are as follows:

week ranging from 1 through 5

day ranging from Sunday through Saturday

month ranging from January through December

The daylight offset ranges from 1 through 1440 minutes which are added to the start time and deleted time from the end time.

This example adjusts the daylight savings time for the Pacific daylight time by 60 minutes starting the first Sunday in April at 2 a.m. and ending the last Sunday in October at 2 a.m.

switch(config)# no clock summer-time 

Disables the daylight saving time adjustment feature.

Step 4 

switch(config)# exit
switch# 

Returns to EXEC mode.

Step 5 

switch# show clock

Verifies the time zone configuration.

NTP Configuration

A Network Time Protocol (NTP) server provides a precise time source (radio clock or atomic clock) to synchronize the system clocks of network devices. NTP is transported over User Datagram Protocol UDP/IP. All NTP communications use UTC. An NTP server receives its time from a reference time source, such as a radio clock or atomic clock, attached to the time. NTP distributes this time across the network.

In a large enterprise network, having one time standard for all network devices is critical for management reporting and event logging functions when trying to correlate interacting events logged across multiple devices. Many enterprise customers with extremely mission-critical networks maintain their own stratum-1 NTP source.

Time synchronization happens when several frames are exchanged between clients and servers. The switches in client mode know the address of one or more NTP servers. The servers act as the time source and receive client synchronization requests.

By configuring an IP address as a peer, the switch will obtain and provide time as required. The peer is capable of providing time on its own and is capable of having a server configured. If both these instances point to different time servers, your NTP service will be more reliable. Thus, even if the active server link is lost, you can still maintain the right time due to the presence of the peer.


Tip If an active server fails, a configured peer helps in providing the NTP time. Provide a direct NTP server association and configure a peer to ensure backup support if the active server fails.


If you only configure a peer, the most accurate peer takes on the role of the NTP server and the other peer(s) act as a peer(s). Both machines end at the right time if they have the right time source or if they point to the right NTP source.

To configure NTP in a server association, follow these steps:

 
Command
Purpose

Step 1 

switch# config t

Enters configuration mode.

Step 2 

switch(config)# ntp server 10.10.10.10
switch(config)#

Forms a server association with a server.

Step 3 

switch(config)# ntp peer 10.20.10.0
switch(config)#

Forms a peer association with a peer. You can specify multiple associations.

Step 4 

switch(config)# exit
switch# 

Returns to EXEC mode.

Step 5 

switch# copy running-config startup-config

Saves your configuration changes to NVRAM.

Tip This is one instance where you can save the configuration as a result of an NTP configuration change. You can issue this command at any time.

Step 6 

switch# show ntp peers 
--------------------------------------------
  Peer IP Address               Serv/Peer          
--------------------------------------------
  10.20.10.2                    Server 
  10.20.10.0                    Peer 

Displays the configured server and peer associations.

Note A domain name will be resolved only when you have a DNS server configured.

NTP Configuration Guidelines

The following guidelines apply to all NTP configurations:

You should have a peer association with another switch only when you are sure that your clock is reliable (which means that you are a client of a reliable NTP server).

Though a peer configured alone, will be the most accurate peer taking on the role of a server, the configured peer should be used more as a back-up support. If more than one server is present, you can have several switches point to one server, and the remaining to the another server, and then configure peer association between these two sets. This forces the clock more reliable.

If you only have one server, it's better for all the switches have a client association with that server.

If the network is configured robustly, even a server down time will not affect well-configured switches in the network. Figure 3-3 displays a network with two NTP stratum 2 servers and two switches.

Figure 3-3 NTP Peer and Server Association  

In this configuration, the switches were configured as explained below:

Stratum 2 Server 1

IP address -10.10.10.10

Stratum-2 Server-2

IP address -10.10.10.9

Switch 1

Switch ip address -10.10.10.1

NTP Configuration

NTP server 10.10.10.10

NTP peer 10.10.10.2

Switch 2

Switch ip address -10.10.10.2

NTP Configuration

NTP server 10.10.10.9

NTP peer 10.10.10.1

Configuring the Management Port

The management port on the switch allows multiple simultaneous Telnet or SNMP sessions. You can remotely configure the switch through the management port, but first you must configure some IP parameters (IP address, subnet mask) so that the switch is reachable. You can manually configure the management port interface from the CLI.


Note Before you begin to configure the management port interface manually, obtain the switch's IP address and IP subnet mask. Also make sure the console cable is connected to the console port.


To obtain remote management access using Telnet (CLI) or SNMP (GUI), follow these steps:

 
Command
Command

Step 1 

switch# config terminal
switch(config)#

Enters configuration mode. You can also abbreviate the command to config t.

The switch(config)# prompt indicates that you are in configuration mode.

Step 2 

switch(config)# interface type interface_ 
string

Examples:

switch(config)# interface mgmt 0

Enters the interface configuration mode on the specified interface.

You can use the management Ethernet interface on the switch to configure the management interface.

Step 3 

switch(config)# ip address 1.1.1.0 
255.255.255.0

Enters the IP address and IP subnet mask for the interface specified in Step 2.

Step 4 

switch(config-if)# no shutdown

Enables the interface.

Step 5 

switch(config-if)# exit

Returns to configuration mode.

Step 6 

switch(config)# ip default-gateway 1.1.1.1

Configures the default gateway address.

In some cases, a switch interface might be administratively shut down. You can check the status of an interface at any time by using the show interface command.

The management port (mgmt0) is autosensing and operates as full duplex mode and 100 Mbps speed. The speed and mode cannot be configured.

When you try to shutdown a management interface(mgmt0), a follow-up message confirms your action before performing the operation. You can use the force option to bypass this confirmation. The following example shuts down the interface without using the force option:

switch# config t
switch(config-if)# shutdown
Shutting down this interface will drop all telnet sessions.
Do you wish to continue (y/n)? y

The following example shuts down the interface using the force option:

switch# config t
switch(config-if)# shutdown force

Note You need to explicitly configure a default gateway to connect to the switch and send IP packets or add a route for each subnet.


Configuring Default Gateways

The supervisor module sends IP packets with unresolved destination IP addresses to the default gateway (see Figure 3-4).

Figure 3-4 Default Gateway

To configure the IP address of the default gateway, follow these steps:

 
Command
Purpose

Step 1 

switch# config t

Enters configuration mode.

Step 2 

switch(config)# ip default-gateway 172.16.1.1
switch(config)# 

Configures the 172.16.1.1 IP address.

Disabling a Telnet Server

The Telnet server is enabled by default on all switches in the Cisco MDS 9000 Family. If you require a secure SSH connection, you need to disable the default Telnet connection and then enable the SSH connection (see the "Enabling SSH Service" section).


Note For information on connecting a terminal to the supervisor module console port, refer to the Cisco MDS 9200 Series Hardware Installation Guide or the Cisco MDS 9500 Series Hardware Installation Guide.


Make sure the terminal is connected to the switch and that the switch and terminal are both powered on. To allow Telnet connections to the switch, follow these steps:

 
Command
Purpose

Step 1 

switch# config t

Enters configuration mode.

Step 2 

switch(config)# no telnet server enable 
updated

Disables the Telnet server.

switch(config)# telnet server enable 
updated

Enables the Telnet server if you wish to return a Telnet connection from a secure SSH connection.

Working with Configuration Files

This section describes how to work with configuration files and has the following topics:

Guidelines for Creating and Using Configuration Files

Viewing Configuration Files

Downloading Configuration Files to the Switch

Saving the Configuration

Copying Files

Guidelines for Creating and Using Configuration Files

Configuration files can contain some or all of the commands needed to configure one or more switches. For example, you might want to download the same configuration file to several switches that have the same hardware configuration so that they have identical module and port configurations.

Certain commands must be followed by a blank line in the configuration file. Without these blank lines, the commands might disconnect your Telnet session. Before disconnecting a session, the switch prompts you for confirmation. The blank line acts as a carriage return, which indicates a negative response to the prompt retaining the Telnet session.

Include a blank line after the following command in a configuration file:

interface mgmt0 disable 

Viewing Configuration Files

To view the running configuration file, use the show running-config command:

switch# show running-config
Building Configuration ...
 interface port-channel 98
interface fc1/1
 interface fc1/2
interface mgmt0
ip address 172.22.95.112 255.255.255.0
no shutdown
vsan database
vsan 2 
clock summer-time Pacific 1 Sun Apr 02:00 5 Sun Oct 02:00 60
switchname switch112

To view the startup configuration file, use the show startup-config command:

switch# show startup-config
 interface port-channel 98
 interface fc1/1
channel-group 98 force
no shutdown
 interface mgmt0
ip address 172.22.95.112 255.255.255.0
boot system system-237; ep-41
boot kickstart boot-237 ep-41
ip domain-name cisco.com

Downloading Configuration Files to the Switch

You can configure a switch in the Cisco MDS 9000 Family by using configuration files you create or download from another switch. In addition, you can store configuration files on a bootflash device on the supervisor module and you can configure the switch using a configuration stored on an external CompactFlash disk.

Before you begin downloading a configuration file using a remote server, do the following:

Ensure the switch has a route to the remote server. The switch and the remote server must be in the same subnetwork if you do not have a router or default gateway to route traffic between subnets. Check connectivity to the remote server using the ping command.

Ensure the configuration file to be downloaded is in the correct directory on the remote server.

Ensure that the permissions on the file are set correctly. Permissions on the file should be set to world-read.


Note See the "Copying Files" section.


From a Remote Server

To configure a switch in the Cisco MDS 9000 Family using a configuration file downloaded from a remote server using TFTP, FTP, SCP, or SFTP, follow these steps:


Step 1 Log into the switch through the console port or through a Telnet session.

Step 2 Configure the switch using the configuration file downloaded from the remote server using the
copy <scheme> :// <server address> system: running-config command.

The scheme is TFTP, FTP, SCP, or SFTP.

Step 3 Specify the IP address or host name of the remote server and the name of the file to download.

The configuration file downloads and the commands are executed as the file is parsed line by line.


Use the following command to download a configuration file from a remote server to the running configuration.

switch# copy <scheme>://<url> system:running-config 

Use the following command to download a configuration file from a remote server to the startup configuration.

switch# copy <scheme>://<url> nvram:startup-config

From an External Flash (slot0:)


Note The physical media must be inserted into slot0: after you log into the switch.


To configure a switch in the Cisco MDS 9000 Family using a configuration file stored on an external CompactFlash disk, follow these steps:


Step 1 Log into the switch through the console port or through a Telnet session.

Step 2 Locate the configuration file using the cd and dir commands. (See the "Copying Files" section.)

Step 3 Configure the switch using the configuration file stored on the external CompactFlash disk using the copy <source file> system:running-config command.

The commands are executed as the file is parsed line by line.


Use the following command to download a configuration file from an external CompactFlash to the running configuration:

switch copy slot0:dns-config.cfg system:running-config 

Use the following command to download a configuration file from an external CompactFlash to the startup configuration:

switch copy slot0:dns-config.cfg nvram:startup-config 

To a Remote Server

To save a configuration file to a remote server like TFTP, FTP, SCP, or SFTP, follow these steps:


Step 1 Log into the switch through the console port or through a Telnet session.

Step 2 Save the configuration using the copy system: running-config <scheme> :// <url> command.

Scheme can be TFTP, FTP, SCP, or SFTP.

Step 3 Specify the IP address or host name of the remote server and the name of the file to download.

The configuration file is saved to the remote server.


Use the following command to save a running configuration file to a remote server:

switch# copy system:running-config <scheme>://<url>

Use the following command to save a startup configuration file to a remote server:

switch# copy nvram:startup-config <scheme>://<url>

To an External CompactFlash Disk

To save a configuration file on an external CompactFlash disk, follow these steps:


Step 1 Log into the switch through the console port or through a Telnet session.

Step 2 Locate the configuration file using the cd and dir commands. (See the "Copying Files" section.)

Step 3 Save the configuration file using the copy system:running-config <source file> command.

The configuration file is saved to the CompactFlash disk.


Use the following command to save a running configuration file to an external CompactFlash disk:

switch# copy system:running-config slot0:dns-config.cfg

Use the following command to save a startup configuration file to an external CompactFlash disk:

switch# copy system:startup-config slot0:dns-config.cfg

Saving the Configuration

After you have created a configuration, you save the configuration using the following copy command:

switch# copy system:running-config nvram:startup-config 

The copy running-config startup-config command is an alias to the previous command and is used frequently throughout this guide.

Copying Files

The syntax for the copy command follows and is explained in Table 3-1.

switch# copy <scheme>://<username@><server>/<file name> 
<scheme>://<username@><server>/<file name>

Table 3-1 copy Command Syntax 

Scheme
Server
File Name

bootflash

active-sup
standby-sup
sup-1 or module 5
sup-2 or module 6
sup-local
sup-remote

User-specified

slot0

User-specified

volatile

User-specified

nvram

startup-config or snapshot-config

system

running-config

tftp1

IP address or DNS name

User-specified

ftp

scp (secure copy)

sftp

core

Process identifier number

1 When downloading and uploading files, a TFTP limitation restricts a TFTP client to a 32 MB file size and some TFTP servers to a 16 MB file size.


This example shows how to copy a file from the active supervisor module's (sup-1 in slot 5) bootflash to the standby supervisor module's (sup-2 in slot 6) bootflash.

switch# copy bootflash:system_imgage bootflash://sup-2/system_image

Note Do not copy a file from an external source directly to the standby supervisor. Copy the external source to the active supervisor, and then copy the saved file to the standby supervisor.


This example shows how to overwrite the contents of an existing configuration in NVRAM.

switch# copy nvram:snapshot-config nvram:startup-config 
Warning: this command is going to overwrite your current startup-config. 
Do you wish to continue? {y/n} [y] y

This example shows how to create a running configuration copy in bootflash.

switch# copy system:running-config bootflash:my-config 

This example shows how to copy a system image file from the TFTP server to bootflash.

switch# copy tftp://172.16.10.100/system-237.img bootflash:system-237.img 

This example shows how to copy a script file from the SFTP server to volatile.

switch# copy sftp://172.16.10.100/myscript.txt volatile:myscript.txt

Note Use the show version image command to verify if the downloaded images are valid.


Backing up the Current Configuration

Before installing or migrating to any software configuration, back up the startup configuration.

This example shows how to create a snapshot of the startup configuration in a predefined location on the switch (binary file).

switch# copy nvram:startup-config nvram:snapshot-config

This example shows how to backup the startup configuration copy in the bootflash: file system (ASCII file).

switch# copy nvram:startup-config bootflash:my-config

This example shows how to backup the startup configuration to the TFTP server (ASCII file).

switch# copy nvram:startup-config copy tftp://172.16.10.100/my-config

This example shows how to backup the running configuration to the bootflash: file system (ASCII file).

switch# copy system:running-config bootflash:my-config

Rolling Back to a Previous Configuration

All switch configurations reside in the internal bootflash: file system. If your internal bootflash: file system is corrupted, you could potentially lose your configuration. Save and back up your configuration file periodically.

This example shows how to roll back to a snapshot copy of a previously saved running configuration (binary file).

switch# copy nvram:snapshot-config nvram:startup-config


Note You can issue a rollback command only when a snapshot is already created. Otherwise, you will receive the No snapshot-config found error message.


This example shows how to roll back to a configuration copy that was previously saved in the bootflash: file system (ASCII file).

switch# copy bootflash:my-config nvram:startup-config 

This example shows how to roll back to a configuration copy that was previously saved in a TFTP server (ASCII file).

switch# copy tftp://172.16.10.100/my-config nvram:startup-config 


Note Each time a copy running-config startup-config command is issued a binary file is created and the ASCII file is updated. A valid binary configuration file reduces the overall boot time significantly. A binary file cannot be uploaded, but its contents can be used to overwrite the existing startup configuration. The write erase command clears the binary file to match the new system image.


Restoring the Configured Redundancy Mode


Tip If you have configured the combined mode as the redundancy mode for power supplies on a Cisco MDS 9509 switch, exert care when using the sequence of the write erase and reload commands before rolling back to a saved configuration.


As a result of issuing the write erase command and the reload command, you restore the switch settings to their factory defaults. This sequence also restores the redundancy mode setting for the power supplies back to the redundant mode (default).

Depending on the types of power supplies, the input voltage, and the number of modules (line cards) in the chassis, the redundancy mode may prevent the line cards from being powered on after a system reboot (see the "Configuring Power Supplies" section).

If you use this sequence, the commands that apply to the powered down line cards will not be enforced on the switch (and will not be part of its running configuration).

When using the sequence of the write erase and reload commands before rolling back to a saved configuration, follow these steps:


Step 1 Manually change the redundant mode configuration to combined mode, if originally configured as such.

Step 2 Wait until all modules are back online—the module status displays ok in response to the show module command.

Step 3 Rollback to the saved configuration (see the "Rolling Back to a Previous Configuration" section).


Downgrading from a Higher Release

When downgrading any switch in the Cisco MDS 9000 Family, avoid using the reload command:


Tip Use the install all command to gracefully reload the switch and handle configuration conversions.


For example, to revert to Release 1.0(4) or 1.0(3a) from Release 1.x, follow these steps:


Step 1 Save the configuration using the copy running-config startup-config command to save the new configuration into nonvolatile storage.

Step 2 Issue the install all command to reload the switch.

Refer to the Cisco MDS 9000 Family Configuration Guide for further information on the install all command.


Deleting Files

To delete files on a Flash device, follow these steps:

 
Command
Purpose

Step 1 

switch# delete [device:]filename

Deletes files from a directory

Step 2 

switch# dir [device:][filename]

Verifies the files are deleted.

This example shows how to delete a file from the bootflash: directory (assuming you are already in the bootflash: directory):

switch# delete dns_config.cfg 
switch#  

This example shows how to delete a file from an external CompactFlash (slot0):

switch# delete slot0:dns_config.cfg 
switch# 

This example deletes the file named test from the Flash card inserted in slot 0.

switch# delete slot0:test 
Delete slot0:test? [confirm]

This example deletes the entire my-dir directory and all its contents:

switch# delete bootflash:my-dir 

Configuring Console Settings

A console port is an asynchronous serial port that enables switches in the Cisco MDS 9000 Family to be set up for initial configuration through a standard RS-232 port with an RJ-45 connector. Any device connected to this port must be capable of asynchronous transmission. Connection to a terminal requires a terminal emulator to be configured as 9600 baud, 8 data bits, 1 stop bit, no parity.


Caution The console baud rate automatically reverts to the default rate (9600) after any BIOS upgrade.

To configure the console port parameters, follow these steps:

 
Command
Command

Step 1 

switch# config terminal
switch(config)#

Enters configuration mode.

Step 2 

switch(config)# line console
switch(config-console)# 

Enters the line console configuration mode.

Step 3 

switch(config-console)# speed 
9600

Configures the port speed for the serial console. The default console baud rate is 9600 baud. The valid range is between 110 and 115,200 bps (110, 150, 300, 600, 1200, 2400, 4800, 9600, 19200, 28800, 38400, 57600, 115200). Be sure to specify one of these exact values.

Step 4 

switch(config-console)# 
databits 8

Configures the data bits for the console connection. The default is 8 data bits and the valid range is between 5 and 8 data bits.

Step 5 

switch(config-console)# 
stopbits 1

Configures the stop bits for the console connection. The default is 1 stop bit and the valid values are 1 or 2 stop bits.

Step 6 

switch(config-console)# parity 
none

Configures the parity for the console connection. The default is no parity and the valid values are even or odd parity.

Verifying the Console Configuration

Use the show line console command to verify the configured console settings. This command also displays problems that may have occurred along with the other registration statistics.

switch# show line console
line Console:
    Speed:        9600 bauds
    Databits:     8 bits per byte
    Stopbits:     1 bit(s)
    Parity:       none
    Modem In: Enable
    Modem Init-String -
        default : ATE0Q1&D2&C1S0=1\015
    Statistics:  tx:12842     rx:366     Register Bits:RTS|CTS|DTR|DSR|CD|RI

Configuring COM1 Settings

A COM1 port is a RS-232 port with a DB-9 interface that enables you to connect to an external serial communication device such as a modem. Connection to a terminal requires terminal emulator to be configured as 9600 baud, 8 data bits, 1 stop bit, no parity.

To configure the COM1 port parameters, follow these steps:

 
Command
Command

Step 1 

switch# config terminal
switch(config)#

Enters configuration mode.

Step 2 

switch(config)# line com1
switch(config-com1)# 

Enters the COM1 port configuration mode.

Step 3 

switch(config-com1)# speed 9600

Configures the port speed for the COM1 connection. The default console baud rate is 9600 baud. The valid range is between 110 and 115,200 bps (110, 150, 300, 600, 1200, 2400, 4800, 9600, 19200, 28800, 38400, 57600, 115200). Be sure to specify one of these exact values.

Note This configuration depends on the incoming speed of the modem connected to COM1.

Step 4 

switch(config-com1)# databits 8

Configures the data bits for the COM1 connection. The default is 8 data bits and the valid range is between 5 and 8 data bits.

Step 5 

switch(config-com1)# stopbits 1

Configures the stop bits for the COM1 connection. The default is 1 stop bits and the valid values are 1 or 2 stop bits.

Step 6 

switch(config-com1)# parity 
none

Configures the parity for the COM1 connection. The default is no parity and the valid values are even or odd parity.

Step 7 

switch(config-com1)# no 
flowcontrol hardware

Disables hardware flowcontrol. By default, hardware flowcontrol is enabled on all switches in the Cisco 9000 Family. When enabled, this option is useful in protecting data loss at higher baud rates.

Note This option is only available through the COM1 port.

Verifying the COM1 Configuration

Use the show line com1 command to verify the configured COM1 settings. This command also displays problems that may have occurred along with the other registration statistics.

switch# show line com1
line Aux:
    Speed:        9600 bauds
    Databits:     8 bits per byte
    Stopbits:     1 bit(s)
    Parity:       none
    Modem In: Enable
    Modem Init-String -
        default : ATE0Q1&D2&C1S0=1\015
    Statistics:  tx:17     rx:0     Register Bits:RTS|DTR

Configuring Modem Connections

Modems can only be configured if you are connected to the console or COM1 ports. A modem connection to a switch in the Cisco MDS 9000 Family does not affect switch functionality.


Note If you plan on connecting a modem to the console port or the COM1 port of a switch in the Cisco MDS 9000 Family, refer to the Cisco MDS 9216 Switch Hardware Installation Guide or the Cisco MDS 9500 Series Hardware Installation Guide. COM1 ports are not available on switches in the Cisco MDS 9100 Series, refer to the Cisco MDS 9100 Series Hardware Installation Guide.


Guidelines to Configure Modems

The following guidelines apply to modem configurations:

Connect the modem before attempting to configure the modem.

Do not connect a modem to the console port while the system is booting. Follow the procedure specified in the "Initializing a Modem in a Powered on Switch" section.

The following Cisco modems have been verified to work in the SAN-OS environment:

MultiTech MT2834BA (http://www.multitech.com/PRODUCTS/Families/MultiModemII/)

Hayes Accura V.92 (http://www.hayesmicro.com/Products/accura-prod-v92.htm)

We recommend you use the COM1 port to connect the modem from a Cisco MDS 9216 switch or from any director in the Cisco MDS 9500 Family.

Enabling Modem Connections

To configure a modem connection through the COM1 port, follow these steps:

 
Command
Command

Step 1 

switch# config t 
switch(config)#

Enters configuration mode.

Step 2 

switch(config)# line com1
switch(config-com1)# 

Enters the COM1 port configuration mode.

Step 3 

switch(config-com1)# no modem in

Disables the current modem from executing its functions.

Note If you issue this command, then the show line com1 command will not show the Modem Init-String portion.

switch(config-com1)# modem in

Enables (default) the COM1 port to only connect to a modem.

To configure a modem connection through the console port, follow these steps:

 
Command
Command

Step 1 

switch# config t 
switch(config)#

Enters configuration mode.

Step 2 

switch(config)# line console
switch(config-console)# 

Enters the console port configuration mode.

Step 3 

switch(config-console)# modem in

Enables the console port to only connect to a modem.

switch(config-console)# no modem 
in

Disables (default) the current modem from executing its functions.

Note If you issue this command, then the show line com1 command will not show the Modem Init-String portion.

If you issued the no modem in command, then the show line console and the show line com1 commands will not show the Modem Init-String portion, since it is not applied.

Configuring the Initialization String

Switches in the Cisco MDS 9500 Family and the Cisco MDS 9216 switch have a default initialization string (ATE0Q1&D2&C1S0=1\015) to detect connected modems. The default string detects connected modems only the modem is supported by Cisco systems. The default string contents are as follows:

AT—Attention

E0 (required)—No echo

Q1—Result code on

&D2—Normal data terminal ready (DTR) option

&C1—Enable tracking the state of the data carrier.

S0=1—Pick up after one ring

\015 (required)—carriage return in octal

You may retain the default string or change it to another string (80 character limit) using the user-input option. This option is provided if you prefer to use a modem that is not supported or tested by Cisco systems. If you change the string, the changes you make are permanent and remain in effect unless you change them again. Rebooting the system or restarting the CLI does not change the modem initialization string. The switch is not affected even if the modem is not functioning.


Tip We recommend you use the default initialization string. If the required options are not provided in the user-input string, the initialization string is not processed.


The modem initialization string usage depends on the modem state when the switch boots:

If the modem is already attached to the switch during boot-up, the default initialization string is written to the modem (see the "Configuring the Default Initialization String" section).

If the modem is not attached to the switch during boot-up, then attach the modem as outlined in the Cisco MDS 9000 Family Hardware Installation Guide (depending on the product), and follow the procedure provided in this section (see the "Configuring a User-Specified Initialization String" section).


Note You can perform the configuration specified in this section only if you are connected to the console port or the COM1 port.


Configuring the Default Initialization String

To configure the default initialization string through the COM1 port, follow these steps:

 
Command
Command

Step 1 

switch# config t
switch(config)#

Enters configuration mode.

Step 2 

switch(config)# line com1
switch(config-com1)# 

Enters the COM1 port configuration mode.

Step 3 

switch(config-com1)# modem init-string 
default

Writes the default initialization string to the modem.

To configure the default initialization string through the console port, follow these steps:

 
Command
Command

Step 1 

switch# config t
switch(config)#

Enters configuration mode.

Step 2 

switch(config)# line com1
switch(config-console)# 

Enters the console port configuration mode.

Step 3 

switch(config-console)# modem 
init-string default

Writes the default initialization string to the modem.

Configuring a User-Specified Initialization String

To configure a user-specified initialization string through the COM1 port, follow these steps:

 
Command
Command

Step 1 

switch# config terminal
switch(config)#

Enters configuration mode.

Step 2 

switch(config)# line com1
switch(config-com1)# 

Enters the COM1 port configuration mode.

Step 3 

switch(config-com1)# modem set-string 
user-input ATE0Q1&D2&C1S0=3\015

Assigns the user-specified initialization string to its corresponding profile.

Note You must first set the user-input string, before initializing the string.

switch(config-com1)# no modem set-string 
user-input ATE0Q1&D2&C1S0=3\015

Deletes the configured initialization string.

Step 4 

switch(config-com1)# modem init-string 
user-input

Writes the user-specified initialization string to the modem.

To configure a user-specified initialization string through the console port, follow these steps:

 
Command
Command

Step 1 

switch# config terminal
switch(config)#

Enters configuration mode.

Step 2 

switch(config)# line com1
switch(config-console)# 

Enters the console port configuration mode.

Step 3 

switch(config-console)# modem set-string 
user-input ATE0Q1&D2&C1S0=3\015

Assigns the user-specified initialization string to its corresponding profile.

Note You must first set the user-input string, before initializing the string.

switch(config-console)# no modem 
set-string user-input 
ATE0Q1&D2&C1S0=3\015

Deletes the configured initialization string.

Step 4 

switch(config-console)# modem 
init-string user-input

Writes the user-specified initialization string to the modem.

Initializing a Modem in a Powered on Switch

When a switch is already powered on and the modem is later connected to either the console port or the COM1 port, you can initialize the modem using the modem connect line command in EXEC mode. You can specifiythe com1 option if the modem is connected to the COM1 port, or the console option if the modem is connected to the console.

To connect a modem to a switch that is already powered on, follow these steps.


Step 1 Wait till the system has completed the boot sequence and the system image is running.

Step 2 Connect the modem to the switch as specified in the Cisco MDS 9216 Switch Hardware Guide or the Cisco MDS 9500 Series Hardware Installation Guide.

Step 3 Initialize the modem using the modem connect line command in EXEC mode.


Configuring CDP

The Cisco Discovery Protocol (CDP) is an advertisement protocol used by Cicso devices to advertise itself to other Cisco devices in the same network. CDP runs on the data link layer and is independent of layer 3 protocols. Cisco devices that receive the CDP packets cache the information to make it is accessible over CLI and SNMP.

CDP is supported on the management Ethernet interface on the supervisor module and the Gigabit Ethernet interface on the IPS module. The CDP daemon is restartable and switchable. The running and startup configurations are available across restarts and switchovers.

CDP version 1 (v1) and version 2 (v2) are supported in Cisco MDS 9000 Family switches. CDP packets with any other version number are silently discarded when received.

When the interface link is established, CDP is enabled by default and three CDP packets are sent at one-second intervals. Following this, the CDP frames are sent at the globally-configured refresh interval.

To globally disable the CDP protocol, follow these steps:

 
Command
Command

Step 1 

switch# config terminal
switch(config)#

Enters configuration mode.

Step 2 

switch(config)# no cdp enable
Operation in progress. Please check global 
parameters
switch(config-console)# 

Disables the CDP protocol on the switch. When CDP is disabled on an interface, one packet is sent to clear out the switch state with each of the receiving devices.

switch(config)# cdp enable
Operation in progress. Please check global 
parameters
switch(config)# 

Enables (default) the CDP protocol on the switch. When CDP is enabled on an interface, one packet is sent immediately. Subsequent packets are sent at the configured refresh time.

To disable the CDP protocol on a specific interface, follow these steps:

 
Command
Command

Step 1 

switch# config terminal
switch(config)#

Enters configuration mode.

Step 2 

switch(config)# interface gigbitethernet 
8/8
switch(config-if)# 

Configures the Gigabit Ethernet interface for the module in slot 8 port 8.

Step 3 

switch(config-if)# no cdp enable
Operation in progress. Please check 
interface parameters
switch(config-console)# 

Disables the CDP protocol on the selected interface. When CDP is disabled on an interface, one packet is sent to clear out the switch state with each of the receiving devices.

switch(config-if)# cdp enable
Operation in progress. Please check 
interface parameters
switch(config)# 

Enables (default) the CDP protocol on the selected interface. When CDP is enabled on an interface, one packet is sent immediately. Subsequent packets are sent at the configured refresh time.

To globally configure the refresh time interval for the CDP protocol, follow these steps:

 
Command
Command

Step 1 

switch# config terminal
switch(config)#

Enters configuration mode.

Step 2 

switch(config)# cdp timer 100
switch(config)# 

Sets the refresh time interval in seconds. The default is 60 seconds and the valid range is from 5 to 255 seconds.

switch(config)# no cdp timer 100
switch(config)# 

Reverts the refresh time interval to the factory default of 60 seconds.

To globally configure the hold time advertised in CDP packets, follow these steps:

 
Command
Command

Step 1 

switch# config terminal
switch(config)#

Enters configuration mode.

Step 2 

switch(config)# cdp holdtime 200
switch(config)# 

Sets the hold time advertised in CDP packets in seconds. The default is 180 seconds and the valid range is from 10 to 255 seconds.

switch(config)# no cdp holdtime 200
switch(config)# 

Reverts the hold time to the factory default of 180 seconds.

To globally configure the CDP version, follow these steps:

 
Command
Command

Step 1 

switch# config terminal
switch(config)#

Enters configuration mode.

Step 2 

switch(config)# cdp advertise v1
switch(config)# 

Sets the CDP version to be used. The default is version 2 (v2). The valid options are v1 and v2.

switch(config)# no advertise v1
switch(config)# 

Reverts the version to the factory default of v2.

Clearing CDP Configurations

To clear CDP traffic counters for all interfaces use the clear cdp counters command. You can issue this command for a specified interface or for all interfaces (management and Gigabit Ethernet interfaces):

switch# clear cdp counters
switch#

To clear neighboring CDP entries for all interfaces, use the clear cdp table command. You can issue this command for a specified interface or for all interfaces (management and Gigabit Ethernet interfaces):

switch# clear cdp table interface gigabitethernet 4/1
switch#

Displaying CDP Protocol Settings

Use the show cdp command to display CDP entries. See Examples 3-1 to 3-11.

Example 3-1 Displays All CDP Capable Interfaces and Parameters

switch# show cdp all
GigabitEthernet4/1 is up
    CDP enabled on interface
    Sending CDP packets every 60 seconds
    Holdtime is 180 seconds
GigabitEthernet4/8 is down
    CDP enabled on interface
    Sending CDP packets every 60 seconds
    Holdtime is 180 seconds
mgmt0 is up
    CDP enabled on interface
    Sending CDP packets every 100 seconds
    Holdtime is 200 seconds

Example 3-2 Displays All CDP Neighbor Entries

switch# show cdp entry all
----------------------------------------
Device ID:069038747(Kiowa3)
Entry address(es):
    IP Address: 172.22.92.5
Platform: WS-C5500, Capabilities: Trans-Bridge Switch
Interface: mgmt0, Port ID (outgoing port): 5/22
Holdtime: 136 sec

Version:
WS-C5500 Software, Version McpSW: 2.4(3) NmpSW: 2.4(3)
Copyright (c) 1995-1997 by Cisco Systems

Advertisement Version: 1

Example 3-3 Displays the Specified CDP Neighbor

switch# show cdp entry name 0
----------------------------------------
Device ID:0
Entry address(es):
    IP Address: 0.0.0.0
Platform: DS-X9530-SF1-K9, Capabilities: Host
Interface: GigabitEthernet4/1, Port ID (outgoing port): GigabitEthernet4/1
Holdtime: 144 sec

Version:
1.1(0.144)

Advertisement Version: 2
Duplex: full

Example 3-4 Displays Global CDP Parameters

switch# show cdp global
Global CDP information:
    CDP enabled globally
    Sending CDP packets every 60 seconds
    Sending a holdtime value of 180 seconds
    Sending CDPv2 advertisements is enabled

Example 3-5 Displays CDP Parameters for the Management Interface

switch# show cdp interface mgmt 0
mgmt0 is up
    CDP enabled on interface
    Sending CDP packets every 60 seconds
    Holdtime is 180 seconds

Example 3-6 Displays CDP Parameters for the Gigabit Ethernet Interface

switch# show cdp interface gigabitethernet 4/1
GigabitEthernet4/1 is up
    CDP enabled on interface
    Sending CDP packets every 80 seconds
    Holdtime is 200 seconds

Example 3-7 Displays CDP Neighbors (brief)

switch# show cdp neighbors
Capability Codes: R - Router, T - Trans-Bridge, B - Source-Route-Bridge
                  S - Switch, H - Host, I - IGMP, r - Repeater

Device ID        Local Intrfce   Hldtme  Capability  Platform      Port ID
0                Gig4/1          135     H           DS-X9530-SF1- Gig4/1
069038732(Kiowa2 mgmt0           132     T S         WS-C5500      8/11
069038747(Kiowa3 mgmt0           156     T S         WS-C5500      6/20
069038747(Kiowa3 mgmt0           158     T S         WS-C5500      5/22

Example 3-8 Displays CDP Neighbors (detail)

switch# show CDP neighbor detail
----------------------------------------
Device ID:0
Entry address(es):
    IP Address: 0.0.0.0
Platform: DS-X9530-SF1-K9, Capabilities: Host
Interface: GigabitEthernet4/1, Port ID (outgoing port): GigabitEthernet4/1
Holdtime: 162 sec

Version:
1.1(0.144)

Advertisement Version: 2
Duplex: full
----------------------------------------
Device ID:069038732(Kiowa2)
Entry address(es):
    IP Address: 172.22.91.5
Platform: WS-C5500, Capabilities: Trans-Bridge Switch
Interface: mgmt0, Port ID (outgoing port): 8/11
Holdtime: 132 sec

Version:
WS-C5500 Software, Version McpSW: 2.4(3) NmpSW: 2.4(3)
Copyright (c) 1995-1997 by Cisco Systems
Advertisement Version: 1

Example 3-9 Displays the Specified CDP Neighbor (detail)

switch# show CDP neighbors interface gigabitethernet 4/1 detail
----------------------------------------
Device ID:0
Entry address(es):
    IP Address: 0.0.0.0
Platform: DS-X9530-SF1-K9, Capabilities: Host
Interface: GigabitEthernet4/1, Port ID (outgoing port): GigabitEthernet4/1
Holdtime: 144 sec

Version:
1.1(0.144)

Advertisement Version: 2
Duplex: full

Example 3-10 Displays CDP Traffic Statistics for the Management Interface

switch# show cdp traffic interface mgmt 0
----------------------------------------
Traffic statistics for mgmt0
Input Statistics:
    Total Packets: 1148
    Valid CDP Packets: 1148
        CDP v1 Packets: 1148
        CDP v2 Packets: 0
    Invalid CDP Packets: 0
        Unsupported Version: 0
        Checksum Errors: 0
        Malformed Packets: 0
Output Statistics:
    Total Packets: 2329
        CDP v1 Packets: 1164
        CDP v2 Packets: 1165
    Send Errors: 0

Example 3-11 Displays CDP Traffic Statistics for the Gigabit Ethernet Interface

switch# show cdp traffic interface gigabitethernet 4/1
----------------------------------------
Traffic statistics for GigabitEthernet4/1
Input Statistics:
    Total Packets: 674
    Valid CDP Packets: 674
        CDP v1 Packets: 0
        CDP v2 Packets: 674
    Invalid CDP Packets: 0
        Unsupported Version: 0
        Checksum Errors: 0
        Malformed Packets: 0

Output Statistics:
    Total Packets: 674
        CDP v1 Packets: 0
        CDP v2 Packets: 674
    Send Errors: 0