Table Of Contents
Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V - W - Z
Index
Numerics
16-port modules
BB_credits 18-8
32-port modules
BB_credits 18-8
configuration guidelines 18-5
A
AAA
description 27-1
distributing with CFS (procedure) 27-11
enabling distribution with CFS (procedure) 27-10
local authentication 27-11
RADIUS 27-5
TACACS+ 27-7
access control
iSCSI enforcement 20-17
iSCSI mechanisms 20-16
Access Control Lists. See ACLs
accounting 27-3
ACLs
associating with an interface (procedure) 28-6
configuration guidelines 28-1
creating complex ACLs (procedure) 28-5
creating with IP-ACL Wizard (procedure) 28-4
deleting (procedure) 28-7
removing from an interface (procedure) 28-6
administrator passwords, recovering 25-7
advanced mode in Fabric Manager client 3-2
AFIDs
configuring (procedure) 16-9
default (procedure) 16-9
description 16-4
aliases
creating zones with (procedure) 15-6
deleting (procedure) 15-13
description 15-6
switching between global device aliases and FC aliases 2-10
viewing (procedure) 15-7
authentication, authorization, and accounting. See AAA
autonomous fabric ID
See AFIDs
AutoNotify 34-1
auto port mode
description 18-4
interface configuration 18-1
auto-topology
configuration guidelines 16-5
IVR 16-4
modifying (procedure) 16-9
B
BB_credits
16-port modules 18-8
32-port modules 18-8
configuring 18-8
reason codes B-1
Berkeley Packet Filter. See BPF
bootflash
file system 10-1
space requirements 10-2
BPF
library 35-11
See also libpcap freeware
B ports
enabling (procedure) 19-17
functionality 18-4
interface modes 18-1, 18-4
interoperability mode 19-15
SAN extenders 19-16
bridge port. See B port
buffer-to-buffer credits. See BB_credits
C
Call Home
alerts 34-3
alerts (procedure) 34-3
configuring (procedure) 34-2
description 34-1
device ID format 34-5
event triggers 34-3
message contents 34-5
message severity levels 34-3
profiles 34-2
profiles (procudure) 34-3
CFS
committing changes (procedure) 12-5
description 12-1
disabling (isolating) or enabling distribution on a switch (procedure) 12-6
enabling (procedure) 12-3
example using Device Manager 12-9
example using Fabric Manager 12-7
MDS SAN-OS features 12-1
merge support (procedure) 12-8
merging 12-7
Cisco.com IDs 34-2
Cisco Fabric Services. See CFS
Cisco Traffic Analyzer
configuring with Performance Manager (procedure) 8-8
description 8-3
installing (procedure) 8-4
claim certificate 9-2
common roles
creating (procedure) 25-2
deleting (procedure) 25-3
description 25-2
editing rules (procedure) 25-3
communities.properties file, editing 26-4
CompactFlash
devices 10-8
disk 10-1
configuraiton files
saving (procedures) 11-1
configuration files
copying (procedure) 11-2
Control Unit Port. See CUP
counted licenses 9-2
cross-VSAN communication 16-13
crypto map
any keyword 29-12
applying to interface 29-16
AutoPeer option 29-14
configuration guidelines 29-9
entries 29-13
managing entries (procedure) 29-16
mirror image 29-10
CUP
description 22-1
management 22-20
custom reports 5-4
generating (procedure) 5-11
viewing (procedure) 5-11
D
databases
See zone databases
databases. See zone databases
default zones
description 15-14
interoperability 24-5
setting policy (procedure) 15-15
See also zones
destination IDs
fctrace 24-2
PortChannels 17-1
detachable tables 3-13
device alias 1-8, 2-8
device grouping (procedure) 3-15
device IDs
Call Home format 34-6
Device Manager
description 4-1
launching (procedure) 4-2
port status 4-6
preferences 4-8
tabs 4-5
using interface (figure) 4-3
viewing license information 9-10
DHCHAP
authentication modes 30-4
changing group list (procedure) 30-6
changing hash algorithm (procedure) 30-5
changing timeout value (procedure) 30-8
configuring 30-3
configuring authentication mode (procedure) 30-5
configuring password 30-6
configuring password (procedure) 30-7
configuring remote password (procedure) 30-7
description 30-2
enabling (procedure) 30-3
using with Cisco MDS SAN-OS 30-3
digital signature algorithm. See DSA key pairs
discoverying a fabric, best practices 7-3
disruptive upgrades 10-3
documentation
related xxxv
domain IDs
failure B-2
interoperability 24-5
non-unique and IVR NAT 16-3
unique 16-6
domain overlap B-2
DPVM
autolearn entries 14-3
databases 14-2
description 14-1
modifying databases (procedure) 14-5
requirements 14-2
using DPVM Setup Wizard (procedure) 14-4
Dynamic Port VSAN Membership. See DPVM
E
EISL, PortChannel links 17-1
ELP failure B-2
enclosures 32-2
enclosures (procedure) 3-15
Enterprise package 9-3
E ports
32-port guidelines 18-5
classes of service 18-2
configuring 19-18
interface modes 18-1
isolation B-2
recovering from isolation 15-15
error disabled code, interface B-1
ESC failure B-2
ESI
non-resp threshold 20-26
Ethereal freeware
analyzer 35-8
information 35-7
Ethernet PortChannels 19-21
evaluation license 9-2
events
description 5-3
Device Manager 32-10
Fabric Manager 32-10
Fabric Manager Web Services 32-10
exchange IDs, load balancing 17-1, 24-2
exchange link parameter failure. See ELP failure
expiry alerts, licenses 9-12
exporting
Performance Manager reports as CSV 33-9
Performance Manager reports as XML 33-8
zone databases 15-15
F
fabric, removing from monitoring 2-8
Fabric Analyzer
capture filters 35-11
configuring 35-9
defining display filters 35-11
description 35-7
displaying captured frames 35-10
permitted filters 35-12
fabric binding
activating (procedure) 22-23
clearing statistics (procedure) 22-25
compare to port security 22-20
configuring (procedure) 22-22
copying to configuration file (procedure) 22-23
creating config database (procedure) 22-24
deactivating (procedure) 22-23
deleting from config database (procedure) 22-24
description 22-20
enabling (procedure) 22-22
enforcing 22-21
vewing active database (procedure) 22-24
viewing EFMD statistics (procedure) 22-25
viewing violations (procedure) 22-24
Fabric Manager
description 1-1
detachable tables 3-13
downgrade to release 1.3(x) 1-9
downgrade to release 2.x 1-9
installation 1-6
installation (procedure) 1-7
integrating with other tools 1-11
launching (procedure) 1-10
running behind a firewall 1-12
unistalling 1-13
upgrade 1-9
viewing license information 9-8
Fabric Manager Client
advanced mode 3-2
description 3-1
filtering 3-12
icons (table) 3-5
Information pane icons (table) 3-8, 3-9, 4-4
launching 3-2
setting preferences 3-13
troubleshooting tools 3-17
using interface (figure) 3-3
wizards 3-16
Fabric Manager graphics (table) 3-5
Fabric Manager Server
authentication 7-2
configuring Performance Manager (procedure) 2-4
continuously monitoring a fabric (procedure) 2-7
description 2-2
full fabric rediscovery 2-9
installation overview 2-2
installing Fabric Manager Web Services (procedure) 2-6
licensing 2-3, 9-12
password 2-9
polling period 2-9
properties file 2-8
removing a fabric from monitoring (procedure) 2-8
setting the seed switch (procedure) 2-4
Fabric Manager Web Services
Admin tab 5-4
creating report templates (procedure) 5-10
custom reports 5-4
description 5-1
events 5-3
filter tree 5-2
generating custom reports (procedure) 5-11
guest user 5-9
installation (procedures) 5-4
inventory 5-3
launching (procedure) 5-7
Performance tab 5-3
RADIUS authentication 7-4
recovering passwords 5-9
TACACS+ authentication 7-4
using with SSL 5-6
viewing custom reports (procedure) 5-11
FabricWare
FibreChannel support 1
roles 2
security 2
support in Fabric Manager (table) 3
syslog and SNMP traps 2
zone support 1
FC aliases, configuring zones 15-3
FC IDs
allocating 24-4
allocating flat FC IDs 24-4
configuring persistent FC IDs (procedure) 18-9
configuring zones 15-2
FCIP
active mode 19-14
checking trunk status (procedure) 19-10
configuring peers 19-13
configuring with FCIP Wizard (procedure) 19-5
description 19-2
Gigabit Ethernet ports 19-1
high availability 19-18
initiating an IP connection 19-14
interfaces 19-3, 19-9
link end points 19-3
link failures 19-19
links 19-3, 19-13
modifying links and profiles (procedure) 19-9
profiles 19-3, 19-8
TCP connections 19-3
verifying interfaces and Extended Link Protocol (procedure) 19-10
FCIP compression
configuring (procedure) 19-7
description 19-5
modifying (procedure) 19-11
FCIP tape acceleration
description 19-11
enabling (procedure) 19-13
FCIP write acceleration
configuring (procedure) 19-7
description 19-4
modifying (procedure) 19-11
FCP, routing requests with iSCSI 20-4
fcping
description 24-2
starting (procedure) 24-3
FC-SP
description 30-1
enabling (procedure) 30-3
enabling on ISLs 30-8
fctrace
description 24-2
path discovery 24-2
starting (procedure) 24-2
Fibre Channel over IP. See FCIP
Fibre Channel PortChannels 19-21
Fibre Channel Security Protocol. See FC-SP
Fibre Channel time out values 24-1
Fibre Channel write acceleration
configuration (procedure) 23-5
description 23-4
FICON
allowing host control of switch (procedure) 22-13
allowing host to configure FICON (procedure) 22-13
calculating flow load balance (procedure) 22-26
code-page option 22-12
configuration files 22-16
configure port blocking or port prohibiting (procedure) 22-15
creating VSANs (procedure) 22-10
description 22-1
director history (procedure) 22-12
displaying port configuration (procedure) 22-15
displaying RLIR (procedure) 22-25
enabling (procedure 22-10
fabric binding 22-20
FC ID allocation 22-8
FC ID last byte requirement 22-12
managing configuration files (procedure) 22-18
port blockiing 22-14
port numbering (table) 22-7
port prohibiting 22-14
port swap 22-18
port swap (procedure) 22-19
uninstalled ports 22-8
viewing port attributes (procedure) 22-16
VSAN requirements 22-9
File Transfer Protocol. See FTP
FL ports
classes of service 18-3
fctrace 24-2
interface modes 18-1
nonparticipating code B-2
F ports
classes of service 18-2
interface modes 18-1
FSPF interoperability 24-5
FSP not present B-1
FTP
Fx ports
32-port default 18-6
interface modes 18-4
G
Gigabit Ethernet ports 19-1
global alias 1-8, 2-8
grace period 9-2
H
hard zoning
See also zones 15-14
hard zoning, description 15-14
HBA 20-3
high availability
Ethernet PortChannel 20-24
features 20-21
iSCSI statically imported targets 20-10
licensing 9-4
PortChannels 17-1
software upgrade 10-3
VRRP 19-20, 20-23
Host Bus Adaptor. See HBA
I
IDs
contract IDs 34-5
image version and IDs 10-1
serial IDs 34-6
server IDs 34-6
site IDs 34-5
IKE
description 29-4
supported transforms and algorithms 29-6
terms 29-4
vewing configuration 29-9
Windows and Linux support 29-7
system images
images.See kickstart images
inactive code, interface B-1
in-band management 1-5
incremental licenses 9-2
Information pane 3-8, 3-9, 4-4
intelligent storage services
description 23-1
disabling (procedure) 23-3
disabling with force option 23-3
enabling (procedure) 23-2
interfaces
administrative states 18-5
BB_credits 18-8
configuring BB_credits or performance buffers (procedure) 18-8
configuring Fibre Channel (procedure) 18-6
configuring Gigabit Ethernet (procedure) 18-7, 19-2
configuring trunking mode (procedure) 18-4
description 18-1
enabling or disabling (procedure) 18-7
managing attributes for ports 18-7
modes 18-1
nonoperational reason codes B-1
operational state 18-5
performance buffers 18-8
reason codes 18-5
SFT types 18-9
states 18-5
internal bootflash
description 10-8
Flash devices 10-8
See also bootflash
Internet storage name service. See iSNS
interoperability 24-4
interop mode, configuring (procedure) 24-6
inter-VSAN routing. See IVR
inventory
description 5-3
Fabric Manager Client 32-3
Fabric Manager Web Services 32-3
IP Access Control Lists. See ACLs
IPFC interface configuration 18-9
IP filters
description 28-2
using IP-ACL Wizard (procedure) 28-4
IPsec
compatibility 29-3
configuring with FCIP Wizard (procedure) 19-6
crypto map 29-9
description 29-3
enabling with FCIP Wizard (procedure) 29-7
global lifetime values for SAs 29-17
requirements 29-2
SA establishment 29-14
SA lifetime negotiation 29-15
supported transforms 29-5
terms 29-4
transform sets 29-12
viewing configuration (procedure) 29-9
Windows and Linux support 29-7
IQN formats 20-8
iSCSI
as member of a zone (procedure) 20-16
configuring trespass option (procedure) 20-11
description 20-1 to 20-5
discovery 20-17
drivers 20-4
enabling (procedure) 20-5
Fibre Channel targets 20-2
Gigabit Ethernet ports 19-1
modifying VSANS assigned (procedure) 20-13
overriding global interface authentication 20-18
physical targets 20-2
QoS (procedure) 20-20
revert to primary port (procedure) 20-10
routing requests 20-4
session creation 20-17
using iSCSI Wizard (procedure) 20-5 to 20-7
virtual Fibre Channel hosts 20-11
iSCSI authentication
configuring (procedure) 20-18
configuring RADIUS (procedure) 20-19
description 20-17
iSCSI hosts
configuring accessibility 20-17
multiple VSANs 20-13
iSCSI initiators
access list 20-17
dynamic mapping 20-12
identifying 20-12
statically mapped (procedure) 20-13
static mapping 20-12
static mapping, manual 20-13
static mapping, system assignment 20-13
iSCSI proxy initiators
configuring (procedure) 20-16
description 20-14
iSCSI targets
access control 20-16
advertising 20-9
dynamic importing 20-7
dynamic importing (procedure) 20-8
secondary access 20-10
static importing 20-7
static importing (procedure) 20-9
ISL
PortChannel links 17-1
statistics 33-2
iSMS servers
enabling 20-26
iSNS
creating profile (procedure) 20-25
description 20-24
ESI 20-26
tagging a profile for an interface (procedure) 20-25
IVR
auto-topology 16-4
border switch 16-3
border switch, guidelines 16-7
configuring (procedure) 16-10
configuring zones and zone sets (procedure) 16-14
default zone policy 16-13
description 16-1
domain ID guidelines 16-6
edge switch 16-3
edge VSAN 16-3
Fibre Channel header modifications 16-3
interoperability 16-17
modifying 16-8
path 16-2
recovering the full topology (procedure) 16-17
recovering the full zone database 16-16
sharing resources 16-2
terminology 16-2
transit VSAN, guidelines 16-7
using IVR Zone Wizard 16-7
virtual domains 16-12 to 16-13
VSAN topology 16-4
zones (definition) 16-2
zone set activation (procedure) 16-16
zone sets (definition) 16-2
IVR NAT
border switch, guidelines 16-5
confuration guidelines 16-5
description 16-3
modifying (procedure) 16-9
service groups, guidelines 16-6
transit VSANs, guidelines 16-5
using IVR Zone Wizard 16-7
IVR NAT auto-topology 16-4
IVR topology
activating (procedure) 16-12
clearing manual entries 16-12
creating manually 16-11
enabling auto-topology 16-7
K
kickstart images
description 10-1
KICKSTART variable 10-1
L
launching management software 1-10
libpcap freeware 35-7
license
enforcing 9-1
Fabric Manager Server package 9-4
factory-installed 9-5
feature based 9-2
high availability 9-4
host ID 9-2
installation options 9-5
installing with License Wizard 9-7
Mainframe package 9-4
obtaining a license key file 9-6
SAN extension package 9-3
terminology 9-1
licenses
expiry alerts 9-12
moving between switches 9-12
uninstalling 9-10
updating 9-11
viewing with Fabric Manager Web Services (procedure) 9-9
link failures B-1
load balancing
description 17-1
FSPF 19-19
PortChannel 19-19
local capture 35-9
log files, configuring 32-8
logging
severity levels 32-7
system messages 32-4
Logical Domains pane 3-10
logical units. See LUs
logs
Device Manager 32-9
Fabric Manager Web Services 32-9
RMON 34-16
SNMP events 34-13
loop monitoring 24-4
loop port 24-4
LUN zoning
configuring 15-20
description 15-19
LUs
exporting 20-11
importing targets 20-7
M
main menu 3-7
management protocols supported (table) 1-3
mapping
iSCSI hosts 20-11
PortChannels 19-21
module-based licensing 9-2
MPS-14/2 module
functions 29-1
IPsec support 29-2
multiple fabrics 32-3
Multiprotocol Services module. See MPS-14/2 module
mutual CHAP authentication
configuring for iSCSI 20-19
N
name server interoperability 24-6
NASB
configuring (procedure) 23-13
description 23-11
permiting default zoning (procedure) 23-12
native VSAN 16-2
network administrator 27-2
Network-Assisted Serverless Backup. See NASB
network operator 27-2
new and changed information (table) xxvii
NL ports
fctrace 24-2
interface modes 18-4
zone enforcement 15-13
node-locked license 9-2
nondisruptive upgrades 10-3
N ports
fctrace 24-2
zone enforcement 15-13
Nx ports, hard zoning 15-14
O
offline code, interface B-1
out-of-band management 1-5
P
PAA-2 8-3
passive mode, IP connection 19-14
passwords
creating strong passwords 25-5
recovering 25-7
peers
configuring 19-13
configuring (procedure) 19-14
performance
historical monitoring 33-2
ISL statistics (procedure) 33-2
monitoring in Device Manager (procedure) 33-1
per-port monitoring (procedure) 33-2
real-time monitoring 33-1
Performance Manager
architecture 6-1
authentication 7-3
collections 33-3
configuring flows and collections (procedure) 33-5
configuring with Traffic Analyzer 8-8, 33-10
creating a flow 33-3
creating a flow (procedure) 33-3
creating collections (procedure) 33-5
data collection 6-2
data interpolation 6-2
description 1-3
events 33-7
exporting as CSV 33-9
exporting as XML 33-8
reports 33-6
starting collections 33-6
thresholds 33-4
top 10 reports 33-7
top 10 reports (procedure) 33-8
using thresholds 6-2
verifying collections 2-6
performance reports, description 5-3
permanent license 9-2
Physical Attributes pane 3-11
Port Analyzer Adapter 2. See PAA-2
PortChannels
description 17-1
down state B-2
interfaces using iSCSI 20-9
interoperability 24-5
IQN formats 20-8
load balancing 19-19
modifying (procedure) 17-5
trunking comparison 17-1
using the PortChannel Wizard (procedure) 17-2
port group 18-5
port modes
auto 18-4
IPS 19-1
port security
*(wildcard) 31-6
activating with auto-learn (procedure) 31-3
activating without auto-learning (procedure) 31-10
auto-learn 31-1
configuring (procedure) 31-3
configuring manually 31-6
configuring manually (procedure) 31-7
copying active to config database (procedure) 31-11
databases 31-8
deleting entries from database (procedure) 31-7
description 31-1
displaying settings (procedure) 31-4
displaying statistics (procedure) 31-4
displaying violations (procedure) 31-4
enable or disable auto-learning (procedure) 31-5
enabling (procedure) 31-3
enforcing 31-2
example 31-5
reactivating the database (procedure) 31-11
preferences
Device Manager 4-8
Fabric Manager Client 3-13
preshared key 27-6
product authorization key 9-2
proof of purchase 9-2
protocol analysis 35-7
R
R_A_TOV time B-1
RADIUS
AAA solutions 27-1
adding a server (procedure) 27-5
description 27-5
secret key 27-1
setting global preshared key (procedure) 27-6
setting preshared key 27-6
specifying SNMPv3 on AAA servers 27-7
vendor-specific attributes protocol options 27-6
reason codes B-1
reconfigure fabric B-1
recovering databases. See zone databases 15-18
recovering passwords 25-7
redundancy
Ethernet PortChannels 19-21
Fibre Channel PortChannels 19-21
remote capture 35-9
Remote Capture Protocol. See RPCAP
report templates 5-10
reserved words in user accounts 25-5
RMON
defining an event (procedure) 34-15
description 34-13
enabling alarms (procedure) 34-14
setting alarms (procedure) 34-13
viewing alarms (procedure) 34-15
viewing log (procedure) 34-16
roles
additional 27-2
common 25-2
deleting (procedure) 25-3
network administrator 27-2
network operator 27-2
RPCAP
Ethereal communication 35-8
S
SAN discovery 32-1
SAN extension tuner
data patterns 21-2
license requirements 21-2
SAN operating system. See SAN-OS
SAN-OS 10-1
SANTap
configuring (procedure) 23-10
description 23-7 to 23-10
proxy mode-1 23-9
proxy mode-2 23-10
transparent mode 23-8
SCSI, routing requests using iSCSI 20-4
SCSI flow services
configuring (procedure) 23-4
description 23-3
Fibre Channel write acceleration 23-4
SCSI flow statistics
clearing (procedure) 23-6
description 23-5
enabling (procedure) 23-6
SCSI routing 20-1
SD ports 18-3
security control
local 27-1
remote 27-1
service groups
configuring (procedure) 16-9
IVR 16-4
SFPs, showing types 18-9
shutdown state 18-5
SMARTnet 34-2
SNMP
access control 26-2
access groups 26-6
adding community strings (procedure) 26-3
community strings 26-2
configuring event destinations 34-12
configuring event security (procedure) 34-12
configuring notifications (traps or informs) (procedure) 26-7
deleting community strings (procedure) 26-4
description 26-1
event destinations 34-12
events 34-11
filtering events (procedure) 34-11
notifications 26-6
server contact 34-1
synchronized to CLI 26-2
trap receivers 34-12
users with multiple roles (procedure) 26-6
versions 26-1
viewing event log 34-13
SNMPv3 security features 26-2
software images
description 10-1
upgrade prerequisites 10-2
upgrade requirements 10-2
upgrading 10-1
variables 10-1
Software Installation Wizard (procedure) 10-4
software upgrades 10-3
soft zoning 15-14
source IDs
Call Home event format 34-6
frame loop back 24-2
load balancing 17-1
SPAN, monitoring traffic 8-2
SSH
enabling (procedure) 25-7
generating server key pair (procedure) 25-7
host key pair 25-6
overwriting key pair 25-7
using with FabricWare 2
SSM 23-1
disabling intelligent storage services (procedure) 23-3
enabling intelligent storage services (procedure) 23-2
provisioning 23-1
provisioning (procedure) 23-2
status bar 3-11
Storage management solutions architecture 1-4
Storage Services Module. See SSM
ST ports 18-1, 18-4
supervisor and switching modules in Device Manager 4-7
syslog. See system messages
syslog server
configuring 32-8
verifying 32-9
system images
description 10-1
SYSTEM variable 10-1
system messages
configuring a syslog server 32-8
configuring logging 32-7
description 32-4
enabling for a feature (procedure) 32-8
facilities and severity levels 32-4
severity levels for console session 32-7
viewing from Device Manager 32-9
viewing from Fabric Manager Web Services 32-9
T
TACACS+
adding a server (procedure) 27-8
description 27-7
supported servers 27-9
TCP connections
FCIP profiles 19-8
specifiying 19-14
TCP ports recognized in ACLs 28-3
Telnet 25-6
TE ports
classes of service 18-3
fctrace 24-2
interface modes 18-1
interoperability 24-5
recovering from isolation 15-15
Threshold Manager 34-13
TL ports
classes of service 18-3
interface modes 18-1
topology map
customizations 32-2
description 32-1
enclosures 32-2
mapping multiple fabrics 32-3
saving custom layout (procedure) 32-2
TOV
interoperability 24-5
ranges 24-1
Traffic Analyzer. See Cisco Traffic Analyzer
transit VSANs
configuration guidelines 16-5
description 16-3, 16-11
troubleshooting
analyzing switch health 35-3
analyzing zone merge 35-13
Cisco Fabric Analyzer 35-7
locating other switches 35-15
loopback tests 35-4
monitoring oversubscription 35-16
show tech support 35-14
system messages 32-4
testing end-to-end connectivity 35-6
tools 35-1
using Fabric Configuration tool (procedure) 35-5
using ping 35-12
using traceroute (procedure) 35-13
with protocol analyzer 35-3
with Traffic Analyzer 35-2
trunking interoperability 24-5
U
UDP ports in ACLs 28-3
uninstalling management software 1-13
uninstalling permanent licenses 9-10
updating licenses 9-11
upgrades. See disruptive upgrades
upgrades. See nondisruptive upgrades
upgrading management software 1-9
user ID for authentication 27-2
users
creating (procedure) 25-5
deleting (procedure) 25-6
reserved words 25-5
viewing (procedure) 25-6
V
VE ports 19-2
virtual E ports. See VE ports
virtual Fibre Channel hosts 20-11
virtual iSCSI targets 20-2
virtual ISL 19-3
virtual N port
dynamic mapping 20-12
volatile file system 10-9
VRRP
high availability 19-20
IQN formats 20-8
switchover 19-20
VSA. See RADIUS
VSAN IDs
configuring FICON 22-3
multiplexing traffic 18-3
range 13-1
VSANs
configuring (procedure) 13-2
default 13-2
deleting (procedure) 13-3
description 13-1
editing policy or scope (procedure) 25-4
FC IDs 13-1
features 13-1
interop mode 24-5
IPFC interface and fctrace 24-2
isolated 13-2
mismatch B-2
multiple zones 15-9
policy 25-3
trunking 17-1
trunking port 18-3
W
world wide names. See WWNs
WWNs
address pool 20-12
configuring 24-3
suspended connection B-2
Z
zone databases
copying (procedure) 15-18
importing 15-15
migrating a non-MDS database 15-18
zone members
adding to zone 15-5
default 15-14
displaying 15-6
zones
access control 15-8
active 15-9
adding to zone set (procdure) 15-11
adding zone members 15-5
analyzing merge 35-13
assigning members 15-2
assigning members for Cisco FabricWare 15-3
backing up and restoring (procedure) 15-22
cloning 15-12
configuring 15-2
configuring (procedure) 15-5
configuring a LUN-based zones (procedure) 15-20
configuring for Cisco FabricWare 15-3
creating read-only zones (procedure) 15-22
creating with aliases (procedure) 15-6
default policy 15-2
deleting (prodecure) 15-13
description 15-1
edit full zone database 15-4
enforcing 15-13
fabric pWWNs 15-2
FC aliases 15-3
features 15-1
LUN zoning 15-19
port IDs 15-2
pWWNs 15-2, 15-3
QoS or broadcast attributes (procedure) 15-19
read-only 15-21
traffic priority 15-18
See also default zones
See also hard zoning
See also soft zoning
zone sets
activating (procedure) 15-12
adding zones (procedure) 15-11
cloning 15-12
configuration guidelines 15-9
considerations 15-9
creating (procedure) 15-11
deactivating (procedure) 15-12
deleting (procedure) 15-13
description 15-8
distributing 15-17
exporting (procedure) 15-17
importing (procedure) 15-16
propagating 15-17