Cisco MDS 9000 Family Fabric Manager Configuration Guide, Release 2.x
Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V - W - Z

Index

Numerics

16-port modules

BB_credits     18-8

32-port modules

BB_credits     18-8

configuration guidelines     18-5

A

AAA

description     27-1

distributing with CFS (procedure)     27-11

enabling distribution with CFS (procedure)     27-10

local authentication     27-11

RADIUS     27-5

TACACS+     27-7

access control

iSCSI enforcement     20-17

iSCSI mechanisms     20-16

Access Control Lists. See ACLs

accounting     27-3

ACLs

associating with an interface (procedure)     28-6

configuration guidelines     28-1

creating complex ACLs (procedure)     28-5

creating with IP-ACL Wizard (procedure)     28-4

deleting (procedure)     28-7

removing from an interface (procedure)     28-6

administrator passwords, recovering     25-7

advanced mode in Fabric Manager client     3-2

AFIDs

configuring (procedure)     16-9

default (procedure)     16-9

description     16-4

aliases

creating zones with (procedure)     15-6

deleting (procedure)     15-13

description     15-6

switching between global device aliases and FC aliases     2-10

viewing (procedure)     15-7

authentication, authorization, and accounting. See AAA

autonomous fabric ID

See AFIDs

AutoNotify     34-1

auto port mode

description     18-4

interface configuration     18-1

auto-topology

configuration guidelines     16-5

IVR     16-4

modifying (procedure)     16-9

B

BB_credits

16-port modules     18-8

32-port modules     18-8

configuring     18-8

reason codes     B-1

Berkeley Packet Filter. See BPF

bootflash

file system     10-1

space requirements     10-2

BPF

library     35-11

See also libpcap freeware

B ports

enabling (procedure)     19-17

functionality     18-4

interface modes     18-1, 18-4

interoperability mode     19-15

SAN extenders     19-16

bridge port. See B port

buffer-to-buffer credits. See BB_credits

C

Call Home

alerts     34-3

alerts (procedure)     34-3

configuring (procedure)     34-2

description     34-1

device ID format     34-5

event triggers     34-3

message contents     34-5

message severity levels     34-3

profiles     34-2

profiles (procudure)     34-3

CFS

committing changes (procedure)     12-5

description     12-1

disabling (isolating) or enabling distribution on a switch (procedure)     12-6

enabling (procedure)     12-3

example using Device Manager     12-9

example using Fabric Manager     12-7

MDS SAN-OS features     12-1

merge support (procedure)     12-8

merging     12-7

Cisco.com IDs     34-2

Cisco Fabric Services. See CFS

Cisco Traffic Analyzer

configuring with Performance Manager (procedure)     8-8

description     8-3

installing (procedure)     8-4

claim certificate     9-2

common roles

creating (procedure)     25-2

deleting (procedure)     25-3

description     25-2

editing rules (procedure)     25-3

communities.properties file, editing     26-4

CompactFlash

devices     10-8

disk     10-1

configuraiton files

saving (procedures)     11-1

configuration files

copying (procedure)     11-2

Control Unit Port. See CUP

counted licenses     9-2

cross-VSAN communication     16-13

crypto map

any keyword     29-12

applying to interface     29-16

AutoPeer option     29-14

configuration guidelines     29-9

entries     29-13

managing entries (procedure)     29-16

mirror image     29-10

CUP

description     22-1

management     22-20

custom reports     5-4

generating (procedure)     5-11

viewing (procedure)     5-11

D

databases

See zone databases

databases. See zone databases

default zones

description     15-14

interoperability     24-5

setting policy (procedure)     15-15

See also zones

destination IDs

fctrace     24-2

PortChannels     17-1

detachable tables     3-13

device alias     1-8, 2-8

device grouping (procedure)     3-15

device IDs

Call Home format     34-6

Device Manager

description     4-1

launching (procedure)     4-2

port status     4-6

preferences     4-8

tabs     4-5

using interface (figure)     4-3

viewing license information     9-10

DHCHAP

authentication modes     30-4

changing group list (procedure)     30-6

changing hash algorithm (procedure)     30-5

changing timeout value (procedure)     30-8

configuring     30-3

configuring authentication mode (procedure)     30-5

configuring password     30-6

configuring password (procedure)     30-7

configuring remote password (procedure)     30-7

description     30-2

enabling (procedure)     30-3

using with Cisco MDS SAN-OS     30-3

digital signature algorithm. See DSA key pairs

discoverying a fabric, best practices     7-3

disruptive upgrades     10-3

documentation

related     xxxv

domain IDs

failure     B-2

interoperability     24-5

non-unique and IVR NAT     16-3

unique     16-6

domain overlap     B-2

DPVM

autolearn entries     14-3

databases     14-2

description     14-1

modifying databases (procedure)     14-5

requirements     14-2

using DPVM Setup Wizard (procedure)     14-4

Dynamic Port VSAN Membership. See DPVM

E

EISL, PortChannel links     17-1

ELP failure     B-2

enclosures     32-2

enclosures (procedure)     3-15

Enterprise package     9-3

E ports

32-port guidelines     18-5

classes of service     18-2

configuring     19-18

interface modes     18-1

isolation     B-2

recovering from isolation     15-15

error disabled code, interface     B-1

ESC failure     B-2

ESI

non-resp threshold     20-26

Ethereal freeware

analyzer     35-8

information     35-7

Ethernet PortChannels     19-21

evaluation license     9-2

events

description     5-3

Device Manager     32-10

Fabric Manager     32-10

Fabric Manager Web Services     32-10

exchange IDs, load balancing     17-1, 24-2

exchange link parameter failure. See ELP failure

expiry alerts, licenses     9-12

exporting

Performance Manager reports as CSV     33-9

Performance Manager reports as XML     33-8

zone databases     15-15

F

fabric, removing from monitoring     2-8

Fabric Analyzer

capture filters     35-11

configuring     35-9

defining display filters     35-11

description     35-7

displaying captured frames     35-10

permitted filters     35-12

fabric binding

activating (procedure)     22-23

clearing statistics (procedure)     22-25

compare to port security     22-20

configuring (procedure)     22-22

copying to configuration file (procedure)     22-23

creating config database (procedure)     22-24

deactivating (procedure)     22-23

deleting from config database (procedure)     22-24

description     22-20

enabling (procedure)     22-22

enforcing     22-21

vewing active database (procedure)     22-24

viewing EFMD statistics (procedure)     22-25

viewing violations (procedure)     22-24

Fabric Manager

description     1-1

detachable tables     3-13

downgrade to release 1.3(x)     1-9

downgrade to release 2.x     1-9

installation     1-6

installation (procedure)     1-7

integrating with other tools     1-11

launching (procedure)     1-10

running behind a firewall     1-12

unistalling     1-13

upgrade     1-9

viewing license information     9-8

Fabric Manager Client

advanced mode     3-2

description     3-1

filtering     3-12

icons (table)     3-5

Information pane icons (table)     3-8, 3-9, 4-4

launching     3-2

setting preferences     3-13

troubleshooting tools     3-17

using interface (figure)     3-3

wizards     3-16

Fabric Manager graphics (table)     3-5

Fabric Manager Server

authentication     7-2

configuring Performance Manager (procedure)     2-4

continuously monitoring a fabric (procedure)     2-7

description     2-2

full fabric rediscovery     2-9

installation overview     2-2

installing Fabric Manager Web Services (procedure)     2-6

licensing     2-3, 9-12

password     2-9

polling period     2-9

properties file     2-8

removing a fabric from monitoring (procedure)     2-8

setting the seed switch (procedure)     2-4

Fabric Manager Web Services

Admin tab     5-4

creating report templates (procedure)     5-10

custom reports     5-4

description     5-1

events     5-3

filter tree     5-2

generating custom reports (procedure)     5-11

guest user     5-9

installation (procedures)     5-4

inventory     5-3

launching (procedure)     5-7

Performance tab     5-3

RADIUS authentication     7-4

recovering passwords     5-9

TACACS+ authentication     7-4

using with SSL     5-6

viewing custom reports (procedure)     5-11

FabricWare

FibreChannel support     1

roles     2

security     2

support in Fabric Manager (table)     3

syslog and SNMP traps     2

zone support     1

FC aliases, configuring zones     15-3

FC IDs

allocating     24-4

allocating flat FC IDs     24-4

configuring persistent FC IDs (procedure)     18-9

configuring zones     15-2

FCIP

active mode     19-14

checking trunk status (procedure)     19-10

configuring peers     19-13

configuring with FCIP Wizard (procedure)     19-5

description     19-2

Gigabit Ethernet ports     19-1

high availability     19-18

initiating an IP connection     19-14

interfaces     19-3, 19-9

link end points     19-3

link failures     19-19

links     19-3, 19-13

modifying links and profiles (procedure)     19-9

profiles     19-3, 19-8

TCP connections     19-3

verifying interfaces and Extended Link Protocol (procedure)     19-10

FCIP compression

configuring (procedure)     19-7

description     19-5

modifying (procedure)     19-11

FCIP tape acceleration

description     19-11

enabling (procedure)     19-13

FCIP write acceleration

configuring (procedure)     19-7

description     19-4

modifying (procedure)     19-11

FCP, routing requests with iSCSI     20-4

fcping

description     24-2

starting (procedure)     24-3

FC-SP

description     30-1

enabling (procedure)     30-3

enabling on ISLs     30-8

fctrace

description     24-2

path discovery     24-2

starting (procedure)     24-2

Fibre Channel over IP. See FCIP

Fibre Channel PortChannels     19-21

Fibre Channel Security Protocol. See FC-SP

Fibre Channel time out values     24-1

Fibre Channel write acceleration

configuration (procedure)     23-5

description     23-4

FICON

allowing host control of switch (procedure)     22-13

allowing host to configure FICON (procedure)     22-13

calculating flow load balance (procedure)     22-26

code-page option     22-12

configuration files     22-16

configure port blocking or port prohibiting (procedure)     22-15

creating VSANs (procedure)     22-10

description     22-1

director history (procedure)     22-12

displaying port configuration (procedure)     22-15

displaying RLIR (procedure)     22-25

enabling (procedure     22-10

fabric binding     22-20

FC ID allocation     22-8

FC ID last byte requirement     22-12

managing configuration files (procedure)     22-18

port blockiing     22-14

port numbering (table)     22-7

port prohibiting     22-14

port swap     22-18

port swap (procedure)     22-19

uninstalled ports     22-8

viewing port attributes (procedure)     22-16

VSAN requirements     22-9

File Transfer Protocol. See FTP

FL ports

classes of service     18-3

fctrace     24-2

interface modes     18-1

nonparticipating code     B-2

F ports

classes of service     18-2

interface modes     18-1

FSPF interoperability     24-5

FSP not present     B-1

FTP

Fx ports

32-port default     18-6

interface modes     18-4

G

Gigabit Ethernet ports     19-1

global alias     1-8, 2-8

grace period     9-2

H

hard zoning

See also zones     15-14

hard zoning, description     15-14

HBA     20-3

high availability

Ethernet PortChannel     20-24

features     20-21

iSCSI statically imported targets     20-10

licensing     9-4

PortChannels     17-1

software upgrade     10-3

VRRP     19-20, 20-23

Host Bus Adaptor. See HBA

I

IDs

contract IDs     34-5

image version and IDs     10-1

serial IDs     34-6

server IDs     34-6

site IDs     34-5

IKE

description     29-4

supported transforms and algorithms     29-6

terms     29-4

vewing configuration     29-9

Windows and Linux support     29-7

system images

images.See kickstart images

inactive code, interface     B-1

in-band management     1-5

incremental licenses     9-2

Information pane     3-8, 3-9, 4-4

intelligent storage services

description     23-1

disabling (procedure)     23-3

disabling with force option     23-3

enabling (procedure)     23-2

interfaces

administrative states     18-5

BB_credits     18-8

configuring BB_credits or performance buffers (procedure)     18-8

configuring Fibre Channel (procedure)     18-6

configuring Gigabit Ethernet (procedure)     18-7, 19-2

configuring trunking mode (procedure)     18-4

description     18-1

enabling or disabling (procedure)     18-7

managing attributes for ports     18-7

modes     18-1

nonoperational reason codes     B-1

operational state     18-5

performance buffers     18-8

reason codes     18-5

SFT types     18-9

states     18-5

internal bootflash

description     10-8

Flash devices     10-8

See also bootflash

Internet storage name service. See iSNS

interoperability     24-4

interop mode, configuring (procedure)     24-6

inter-VSAN routing. See IVR

inventory

description     5-3

Fabric Manager Client     32-3

Fabric Manager Web Services     32-3

IP Access Control Lists. See ACLs

IPFC interface configuration     18-9

IP filters

description     28-2

using IP-ACL Wizard (procedure)     28-4

IPsec

compatibility     29-3

configuring with FCIP Wizard (procedure)     19-6

crypto map     29-9

description     29-3

enabling with FCIP Wizard (procedure)     29-7

global lifetime values for SAs     29-17

requirements     29-2

SA establishment     29-14

SA lifetime negotiation     29-15

supported transforms     29-5

terms     29-4

transform sets     29-12

viewing configuration (procedure)     29-9

Windows and Linux support     29-7

IQN formats     20-8

iSCSI

as member of a zone (procedure)     20-16

configuring trespass option (procedure)     20-11

description     20-1 to  20-5

discovery     20-17

drivers     20-4

enabling (procedure)     20-5

Fibre Channel targets     20-2

Gigabit Ethernet ports     19-1

modifying VSANS assigned (procedure)     20-13

overriding global interface authentication     20-18

physical targets     20-2

QoS (procedure)     20-20

revert to primary port (procedure)     20-10

routing requests     20-4

session creation     20-17

using iSCSI Wizard (procedure)     20-5 to  20-7

virtual Fibre Channel hosts     20-11

iSCSI authentication

configuring (procedure)     20-18

configuring RADIUS (procedure)     20-19

description     20-17

iSCSI hosts

configuring accessibility     20-17

multiple VSANs     20-13

iSCSI initiators

access list     20-17

dynamic mapping     20-12

identifying     20-12

statically mapped (procedure)     20-13

static mapping     20-12

static mapping, manual     20-13

static mapping, system assignment     20-13

iSCSI proxy initiators

configuring (procedure)     20-16

description     20-14

iSCSI targets

access control     20-16

advertising     20-9

dynamic importing     20-7

dynamic importing (procedure)     20-8

secondary access     20-10

static importing     20-7

static importing (procedure)     20-9

ISL

PortChannel links     17-1

statistics     33-2

iSMS servers

enabling     20-26

iSNS

creating profile (procedure)     20-25

description     20-24

ESI     20-26

tagging a profile for an interface (procedure)     20-25

IVR

auto-topology     16-4

border switch     16-3

border switch, guidelines     16-7

configuring (procedure)     16-10

configuring zones and zone sets (procedure)     16-14

default zone policy     16-13

description     16-1

domain ID guidelines     16-6

edge switch     16-3

edge VSAN     16-3

Fibre Channel header modifications     16-3

interoperability     16-17

modifying     16-8

path     16-2

recovering the full topology (procedure)     16-17

recovering the full zone database     16-16

sharing resources     16-2

terminology     16-2

transit VSAN, guidelines     16-7

using IVR Zone Wizard     16-7

virtual domains     16-12 to  16-13

VSAN topology     16-4

zones (definition)     16-2

zone set activation (procedure)     16-16

zone sets (definition)     16-2

IVR NAT

border switch, guidelines     16-5

confuration guidelines     16-5

description     16-3

modifying (procedure)     16-9

service groups, guidelines     16-6

transit VSANs, guidelines     16-5

using IVR Zone Wizard     16-7

IVR NAT auto-topology     16-4

IVR topology

activating (procedure)     16-12

clearing manual entries     16-12

creating manually     16-11

enabling auto-topology     16-7

K

kickstart images

description     10-1

KICKSTART variable     10-1

L

launching management software     1-10

libpcap freeware     35-7

license

enforcing     9-1

Fabric Manager Server package     9-4

factory-installed     9-5

feature based     9-2

high availability     9-4

host ID     9-2

installation options     9-5

installing with License Wizard     9-7

Mainframe package     9-4

obtaining a license key file     9-6

SAN extension package     9-3

terminology     9-1

licenses

expiry alerts     9-12

moving between switches     9-12

uninstalling     9-10

updating     9-11

viewing with Fabric Manager Web Services (procedure)     9-9

link failures     B-1

load balancing

description     17-1

FSPF     19-19

PortChannel     19-19

local capture     35-9

log files, configuring     32-8

logging

severity levels     32-7

system messages     32-4

Logical Domains pane     3-10

logical units. See LUs

logs

Device Manager     32-9

Fabric Manager Web Services     32-9

RMON     34-16

SNMP events     34-13

loop monitoring     24-4

loop port     24-4

LUN zoning

configuring     15-20

description     15-19

LUs

exporting     20-11

importing targets     20-7

M

main menu     3-7

management protocols supported (table)     1-3

mapping

iSCSI hosts     20-11

PortChannels     19-21

module-based licensing     9-2

MPS-14/2 module

functions     29-1

IPsec support     29-2

multiple fabrics     32-3

Multiprotocol Services module. See MPS-14/2 module

mutual CHAP authentication

configuring for iSCSI     20-19

N

name server interoperability     24-6

NASB

configuring (procedure)     23-13

description     23-11

permiting default zoning (procedure)     23-12

native VSAN     16-2

network administrator     27-2

Network-Assisted Serverless Backup. See NASB

network operator     27-2

new and changed information (table)     xxvii

NL ports

fctrace     24-2

interface modes     18-4

zone enforcement     15-13

node-locked license     9-2

nondisruptive upgrades     10-3

N ports

fctrace     24-2

zone enforcement     15-13

Nx ports, hard zoning     15-14

O

offline code, interface     B-1

out-of-band management     1-5

P

PAA-2     8-3

passive mode, IP connection     19-14

passwords

creating strong passwords     25-5

recovering     25-7

peers

configuring     19-13

configuring (procedure)     19-14

performance

historical monitoring     33-2

ISL statistics (procedure)     33-2

monitoring in Device Manager (procedure)     33-1

per-port monitoring (procedure)     33-2

real-time monitoring     33-1

Performance Manager

architecture     6-1

authentication     7-3

collections     33-3

configuring flows and collections (procedure)     33-5

configuring with Traffic Analyzer     8-8, 33-10

creating a flow     33-3

creating a flow (procedure)     33-3

creating collections (procedure)     33-5

data collection     6-2

data interpolation     6-2

description     1-3

events     33-7

exporting as CSV     33-9

exporting as XML     33-8

reports     33-6

starting collections     33-6

thresholds     33-4

top 10 reports     33-7

top 10 reports (procedure)     33-8

using thresholds     6-2

verifying collections     2-6

performance reports, description     5-3

permanent license     9-2

Physical Attributes pane     3-11

Port Analyzer Adapter 2. See PAA-2

PortChannels

description     17-1

down state     B-2

interfaces using iSCSI     20-9

interoperability     24-5

IQN formats     20-8

load balancing     19-19

modifying (procedure)     17-5

trunking comparison     17-1

using the PortChannel Wizard (procedure)     17-2

port group     18-5

port modes

auto     18-4

IPS     19-1

port security

*(wildcard)     31-6

activating with auto-learn (procedure)     31-3

activating without auto-learning (procedure)     31-10

auto-learn     31-1

configuring (procedure)     31-3

configuring manually     31-6

configuring manually (procedure)     31-7

copying active to config database (procedure)     31-11

databases     31-8

deleting entries from database (procedure)     31-7

description     31-1

displaying settings (procedure)     31-4

displaying statistics (procedure)     31-4

displaying violations (procedure)     31-4

enable or disable auto-learning (procedure)     31-5

enabling (procedure)     31-3

enforcing     31-2

example     31-5

reactivating the database (procedure)     31-11

preferences

Device Manager     4-8

Fabric Manager Client     3-13

preshared key     27-6

product authorization key     9-2

proof of purchase     9-2

protocol analysis     35-7

R

R_A_TOV time     B-1

RADIUS

AAA solutions     27-1

adding a server (procedure)     27-5

description     27-5

secret key     27-1

setting global preshared key (procedure)     27-6

setting preshared key     27-6

specifying SNMPv3 on AAA servers     27-7

vendor-specific attributes protocol options     27-6

reason codes     B-1

reconfigure fabric     B-1

recovering databases. See zone databases     15-18

recovering passwords     25-7

redundancy

Ethernet PortChannels     19-21

Fibre Channel PortChannels     19-21

remote capture     35-9

Remote Capture Protocol. See RPCAP

report templates     5-10

reserved words in user accounts     25-5

RMON

defining an event (procedure)     34-15

description     34-13

enabling alarms (procedure)     34-14

setting alarms (procedure)     34-13

viewing alarms (procedure)     34-15

viewing log (procedure)     34-16

roles

additional     27-2

common     25-2

deleting (procedure)     25-3

network administrator     27-2

network operator     27-2

RPCAP

Ethereal communication     35-8

S

SAN discovery     32-1

SAN extension tuner

data patterns     21-2

license requirements     21-2

SAN operating system. See SAN-OS

SAN-OS     10-1

SANTap

configuring (procedure)     23-10

description     23-7 to  23-10

proxy mode-1     23-9

proxy mode-2     23-10

transparent mode     23-8

SCSI, routing requests using iSCSI     20-4

SCSI flow services

configuring (procedure)     23-4

description     23-3

Fibre Channel write acceleration     23-4

SCSI flow statistics

clearing (procedure)     23-6

description     23-5

enabling (procedure)     23-6

SCSI routing     20-1

SD ports     18-3

security control

local     27-1

remote     27-1

service groups

configuring (procedure)     16-9

IVR     16-4

SFPs, showing types     18-9

shutdown state     18-5

SMARTnet     34-2

SNMP

access control     26-2

access groups     26-6

adding community strings (procedure)     26-3

community strings     26-2

configuring event destinations     34-12

configuring event security (procedure)     34-12

configuring notifications (traps or informs) (procedure)     26-7

deleting community strings (procedure)     26-4

description     26-1

event destinations     34-12

events     34-11

filtering events (procedure)     34-11

notifications     26-6

server contact     34-1

synchronized to CLI     26-2

trap receivers     34-12

users with multiple roles (procedure)     26-6

versions     26-1

viewing event log     34-13

SNMPv3 security features     26-2

software images

description     10-1

upgrade prerequisites     10-2

upgrade requirements     10-2

upgrading     10-1

variables     10-1

Software Installation Wizard (procedure)     10-4

software upgrades     10-3

soft zoning     15-14

source IDs

Call Home event format     34-6

frame loop back     24-2

load balancing     17-1

SPAN, monitoring traffic     8-2

SSH

enabling (procedure)     25-7

generating server key pair (procedure)     25-7

host key pair     25-6

overwriting key pair     25-7

using with FabricWare     2

SSM     23-1

disabling intelligent storage services (procedure)     23-3

enabling intelligent storage services (procedure)     23-2

provisioning     23-1

provisioning (procedure)     23-2

status bar     3-11

Storage management solutions architecture     1-4

Storage Services Module. See SSM

ST ports     18-1, 18-4

supervisor and switching modules in Device Manager     4-7

syslog. See system messages

syslog server

configuring     32-8

verifying     32-9

system images

description     10-1

SYSTEM variable     10-1

system messages

configuring a syslog server     32-8

configuring logging     32-7

description     32-4

enabling for a feature (procedure)     32-8

facilities and severity levels     32-4

severity levels for console session     32-7

viewing from Device Manager     32-9

viewing from Fabric Manager Web Services     32-9

T

TACACS+

adding a server (procedure)     27-8

description     27-7

supported servers     27-9

TCP connections

FCIP profiles     19-8

specifiying     19-14

TCP ports recognized in ACLs     28-3

Telnet     25-6

TE ports

classes of service     18-3

fctrace     24-2

interface modes     18-1

interoperability     24-5

recovering from isolation     15-15

Threshold Manager     34-13

TL ports

classes of service     18-3

interface modes     18-1

topology map

customizations     32-2

description     32-1

enclosures     32-2

mapping multiple fabrics     32-3

saving custom layout (procedure)     32-2

TOV

interoperability     24-5

ranges     24-1

Traffic Analyzer. See Cisco Traffic Analyzer

transit VSANs

configuration guidelines     16-5

description     16-3, 16-11

troubleshooting

analyzing switch health     35-3

analyzing zone merge     35-13

Cisco Fabric Analyzer     35-7

locating other switches     35-15

loopback tests     35-4

monitoring oversubscription     35-16

show tech support     35-14

system messages     32-4

testing end-to-end connectivity     35-6

tools     35-1

using Fabric Configuration tool (procedure)     35-5

using ping     35-12

using traceroute (procedure)     35-13

with protocol analyzer     35-3

with Traffic Analyzer     35-2

trunking interoperability     24-5

U

UDP ports in ACLs     28-3

uninstalling management software     1-13

uninstalling permanent licenses     9-10

updating licenses     9-11

upgrades. See disruptive upgrades

upgrades. See nondisruptive upgrades

upgrading management software     1-9

user ID for authentication     27-2

users

creating (procedure)     25-5

deleting (procedure)     25-6

reserved words     25-5

viewing (procedure)     25-6

V

VE ports     19-2

virtual E ports. See VE ports

virtual Fibre Channel hosts     20-11

virtual iSCSI targets     20-2

virtual ISL     19-3

virtual N port

dynamic mapping     20-12

volatile file system     10-9

VRRP

high availability     19-20

IQN formats     20-8

switchover     19-20

VSA. See RADIUS

VSAN IDs

configuring FICON     22-3

multiplexing traffic     18-3

range     13-1

VSANs

configuring (procedure)     13-2

default     13-2

deleting (procedure)     13-3

description     13-1

editing policy or scope (procedure)     25-4

FC IDs     13-1

features     13-1

interop mode     24-5

IPFC interface and fctrace     24-2

isolated     13-2

mismatch     B-2

multiple zones     15-9

policy     25-3

trunking     17-1

trunking port     18-3

W

world wide names. See WWNs

WWNs

address pool     20-12

configuring     24-3

suspended connection     B-2

Z

zone databases

copying (procedure)     15-18

importing     15-15

migrating a non-MDS database     15-18

zone members

adding to zone     15-5

default     15-14

displaying     15-6

zones

access control     15-8

active     15-9

adding to zone set (procdure)     15-11

adding zone members     15-5

analyzing merge     35-13

assigning members     15-2

assigning members for Cisco FabricWare     15-3

backing up and restoring (procedure)     15-22

cloning     15-12

configuring     15-2

configuring (procedure)     15-5

configuring a LUN-based zones (procedure)     15-20

configuring for Cisco FabricWare     15-3

creating read-only zones (procedure)     15-22

creating with aliases (procedure)     15-6

default policy     15-2

deleting (prodecure)     15-13

description     15-1

edit full zone database     15-4

enforcing     15-13

fabric pWWNs     15-2

FC aliases     15-3

features     15-1

LUN zoning     15-19

port IDs     15-2

pWWNs     15-2, 15-3

QoS or broadcast attributes (procedure)     15-19

read-only     15-21

traffic priority     15-18

See also default zones

See also hard zoning

See also soft zoning

zone sets

activating (procedure)     15-12

adding zones (procedure)     15-11

cloning     15-12

configuration guidelines     15-9

considerations     15-9

creating (procedure)     15-11

deactivating (procedure)     15-12

deleting (procedure)     15-13

description     15-8

distributing     15-17

exporting (procedure)     15-17

importing (procedure)     15-16

propagating     15-17