Cisco MDS 9000 Family CLI Configuration Guide, Release 3.3(3)
Index

Table Of Contents

    

Symbols - Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Z

Index    

Symbols

* (asterisk)

autolearned entries 39-14

first operational port 17-17

host time stamps 29-30

iSCSI node 43-87, 43-88

port security wildcard 39-9

port security wildcards 39-9

Numerics

12-port 4-Gbps switching modules

BB_credit buffers 15-12

configuration guidelines 15-22

default settings 15-38

See also switching modules

16-port switching modules

configuring BB_credits 13-33

LEDs 13-16

See also switching modules

24-port 4-Gbps switching modules

bandwidth fairness 15-31

configuration guidelines 15-21

default settings 15-38

example configurations 15-11, 15-36

oversubscription 15-26

shared resources 15-7

See also switching modules

32-port switching modules

configuring BB_credits 13-33

PortChannel configuration guidelines 17-2

SPAN guidelines 53-6

See also switching modules

3DES encryption

IKE 37-7

IPsec 37-6

48-port 4-Gbps switching modules

bandwidth fairness 15-31

configuration guidelines 15-21

default settings 15-38

example configurations 15-10, 15-37

oversubscription 15-26

shared resources 15-7

See also switching modules

4-port 10-Gbps switching modules

BB_credit buffers 15-13

configuration guidelines 15-22

default settings 15-38

See also switching modules

A

AAA

authentication process 34-6

authorization process 34-6

configuring accounting services34-35to 34-36

default settings 34-40

description 34-1

DHCHAP authentication 38-8

displaying error-enabled status 34-5

enabling server distribution 34-29

local services 34-34

remote services 34-4

setting authentication 34-34

starting a distribution session 34-30

AAA authentication

configuring 43-23

AAA servers

groups 34-4

monitoring 34-5

remote authentication 34-4

access control

enforcingiSCSI

enforcing access control 43-22

iSCSI 43-21

Access Control Lists. See IPv4-ACLs; IPv6-ACLs

access controlzoning based access controliSCSI

zoning based access control 43-22

accounting

configuring services34-35to 34-36

ACL adjacency sharing

disabling for downgrading 15-35

ACL based access control

configuring for iSCSI 43-21

ACLs

configuring for iSCSI 43-21

active zone sets

considerations 24-5

enabling distribution 24-14

address allocation cache

description 18-22

administrative speeds

configuring 13-14

administrative states

description 13-7

setting 13-12

administrator passwords

recovering (procedure 32-19

administrators

default passwords 5-6

password requirements (note) 5-7

Advanced Encrypted Standard encryption. See AES encryption

advertisement packets

setting time intervals 44-22

AES encryption

description 33-5

IKE 37-6

IPsec 37-6

SNMP support 33-5

AES-XCBC-MAC

IPsec 37-6

AFIDs

configuring 23-16, 23-17

configuring default 23-16

description 23-4, 23-7, 23-19

verifying database configuration 23-17

aliases. See command aliases; device aliases; fcaliases

ALPA caches

allocation 13-31

clearing 13-32

description 13-30

displaying contents 13-32

inserting entries manually 13-32

appliance generated entities

removing AVT LUNs 50-8

removing AVTs 50-8

removing ITLs 50-9

removing SANTap sessions 50-8

application virtual targets. See AVTs

ARP

clearing entries 44-12

displaying entries 44-12

ARP caches

clearing 46-9

displaying 46-9

authentication

CHAP option 43-67

fabric security 38-1

guidelines 34-4

iSCSI setup 43-66

local 34-3, 43-24

MD5 44-23

mechanism 43-24

mutual CHAPmutual CHAP authentication 43-25

remote 34-3, 34-4

restricting iSLB initiatorinitiator authentication

restrictingiSLB

restricting iSLB initiators     1

simple text 44-23

user IDs 34-3

See also MD5 authentication

See also simple text authentication

authentication, authorization, and accounting. See AAA

authorization

role-based 32-1

rule placement order 32-3

autogenerated iSCSI targetiSCSI

autogenerated target 43-23

auto mode

configuring 13-13

auto-negotiation

configuring Gigabit Ethernet interfaces 46-3

autonomous fabric ID

See AFIDs

autonomous fabric identifiers. See AFIDs

AutoNotify

description 55-5

destination profile (note) 55-7

auto port mode

description 13-6

interface configuration 13-3

autosensing speed

Generation 2 switching modules 13-15

auto-topology

configuration guidelines 23-12

IVR 23-6

AVTs

description 50-2

removing 50-8

B

bandwidth fairness

disabling 15-32

enabling 15-32

Generation 2 switching modules 15-31

banner message

configuring 2-19

BB_credit buffers

12-port 4-Gbps switching module allocations 15-12

12-port 4-Gbps switching module considerations 15-13

24-port 4-Gbps switching module allocations 15-11

24-port 4-Gbps switching module considerations 15-11, 15-12

48-port 4-Gbps switching module considerations 15-9

4-port 10-Gbps switching module allocations 15-13

4-port 10-Gbps switching module considerations 15-14

allocation defaults (table) 15-9

BB_credits

configuring 13-33

description 13-32

FICON port swapping 29-37

reason codes 13-9

BB_SC

enabling 15-34

beacon modes

configuring 13-17

description 13-17

identifying LEDs 13-16

Berkeley Packet Filter. See BPF

BIOS images

upgrading 8-29

bit errors

reasons 13-18

bit error thresholds

configuring 13-18

description 13-18

bootflash:

copying files 8-26

description 2-25

file system 8-2

initializing 2-25

kickstart images 2-25

recovering from corruption 2-25

space requirements 8-4

system images 2-25

bootloader

nondisruptive upgrades 8-27

boot variables

configuring automatic copying to standby supervisor modules 10-4

synchronizing 10-4

border switches

description 23-4

IVR configuration guidelines 23-18

BPF

library 59-13

B port mode

description 13-6

interface modes 13-6

B ports

configuring 41-23

interoperability mode 41-22

SAN extenders 41-23

bridge port mode. See B port mode

bridge ports. See B ports

broadcast

in-band addresses default 12-31

routing 26-12

Brocade

native interop mode 30-13

buffer pools

Generation 2 switching modules 15-8

buffer sizes

configuring in FCIP profiles 41-17

buffer-to-buffer credits. See BB_credits

buffer-to-buffer start change. See BB_SC

build fabric frames

description 18-3

C

Call Home

alert groups55-9to 55-12

AutoNotify feature 55-5

CFS support 7-2

configuration distribution 55-16

configuring55-5to 55-18

configuring e-mail options 55-13

configuring SMTP servers 55-14

contact information 55-6

database merge guidelines 55-18

default settings 55-23

description 55-1

destination profiles55-7to 55-9

displaying information55-19to 55-20

duplicate message throttle 55-16

enabling 55-16

features 55-2

inventory notifications 55-15

message format options 55-2

RMON-based alerts 55-13

syslog-based alerts 55-12

testing communications 55-18

Call Home alert groups

configuring 55-9

customizing messages 55-11

description 55-9

verifying customization configuration 55-12

Call Home contacts

assigning information 55-6

Call Home destination profiles

attributes 55-7

configuring 55-7

description 55-7

displaying 55-19

Call Home messages

configuring levels 55-12

format options 55-2

Call Home notifications

full-txt format for syslog 55-21

XML format for RMON 55-23

XML format for syslog 55-22

capture filters

description 59-13

permitted 59-13

CAs

authenticating 36-8

certificate download example 36-19

configuring36-5to 36-15

creating a trust point 36-8

default settings 36-38

deleting digital certificates 36-14

description36-1to 36-5

displaying configuration 36-15

enrollment using cut-and-paste 36-4

example configuration36-15to 36-37

identity 36-2

maintaining 36-13

maximum limits 36-37

monitoring 36-13

multiple 36-4

multiple trust points 36-3

peer certificates 36-4

purpose 36-2

CDP

clearing counters 5-37

clearing tables 5-37

configuring5-36to 5-40

configuring hold times 5-37

configuring refresh time interval globally 5-37

configuring versions 5-37

disabling globally 5-36

disabling on Gigabit Ethernet interfaces 5-36

displaying information 5-37

packet transmission interval 5-36

certificate authorities. See CAs

certificate revocation lists. See CRLs

CFS

application requirements 7-5

configuring for NTP 5-23

default settings 7-17

description7-1to 7-4

disabling on a switch 7-4

displaying status on a switch 7-5

distribution modes 7-4

distribution over IP 7-11

distribution scopes 7-3

enabling on a switch 7-4

feature description 7-2

iSLB config distribution 43-55

logging configuration distribution 54-8

merge support 7-8

protocol description 7-3

SAN-OS features supported 7-2

saving configurations 7-8

verifying CFS merge status 7-9

CFS applications

clearing session locks 7-8

committing changes 7-7

discarding changes 7-8

enabling 7-5

fabric locking 7-6

verifying lock status 7-7

verifying registration status 7-6

CFS over IP

configuring IP multicast addresses 7-13

default settings 7-17

description 7-11

enabling 7-12

verifying configuration 7-13

verifying multicast address 7-14

CFS regions

assigning features 7-16

creating 7-16

description 7-15

dissolving 7-17

moving a feature 7-16

using CLI 7-16

CHAP authentication 43-23, 43-48

configuring for iSCSI 43-67

CHAP challenge 43-25

CHAP response 43-25

CHAP user name 43-25

CIM

configuring 30-1

configuring security on a server 30-2

description 30-1

displaying information 30-2

CIM servers

configuring security 30-2

displaying information 30-2, 30-4

Cisco Access Control Server. See Cisco ACS

Cisco ACS

configuring for RADIUS34-37to 34-40

configuring for TACACS+34-37to 34-40

cisco-av-pair

specifying for SNMPv3 34-15

Cisco Discovery Protocol. See CDP

Cisco Fabric Analyzer

clearing hosts 59-9

configuring 59-6

description 59-4

displaying captured frames 59-9

displaying filters 59-9

GUI-based client 59-6

local text-based capture 59-6

remote capture daemon 59-6

See also fcanalyzer

Cisco Fabric Service. See CFS

Cisco MDS 9000 Family

connecting a terminal 5-27

description 1-1

initial setup5-2to 5-14

starting switches 5-2

Cisco MDS 9100 Series

Cisco MDS 9120 switches 1-4

Cisco MDS 9124 switches 1-4

Cisco MDS 9140 switches 1-4

description 1-4

high availability 10-1

overview 1-4

Cisco MDS 9120 switches

description 1-4

Cisco MDS 9140 switches

description 1-4

Cisco MDS 9200 Series

Cisco MDS 9216A switches 1-3, 1-4

Cisco MDS 9216i switches 1-3

Cisco MDS 9216 switches 1-4

connecting a terminal 5-27

description 1-3

high availability 10-1

Cisco MDS 9216

supervisor modules 12-2

Cisco MDS 9216A switches

description 1-3, 1-4

Cisco MDS 9216i switches

configuring extended BB_credits 13-35

description 1-3

Cisco MDS 9216 switches

description 1-4

Cisco MDS 9500 Series

Cisco MDS 9506 Directors 1-2

Cisco MDS 9509 Directors 1-2

Cisco MDS 9513 Directors 1-2

description 1-2

high availability 10-1

Cisco MDS 9506 Directors

description 1-2

Cisco MDS 9509 Directors

description 1-2

supervisor modules 12-2

Cisco MDS 9513 Directors

description 1-2

supervisor modules 12-2

Cisco MDS SAN-OS

downgrading 8-31

software images 8-1

Cisco vendor ID

description 34-15

class maps

configuring for data traffic 57-7

creating 57-7

CLI

command hierarchy2-4to 2-9

command modes 2-3

command navigation 2-9

command prompt 2-2

command scripts 2-33

description 1-5

getting help 2-10

saving output to files 2-32

setting delay time 2-34

CLI variables

description 2-21

persistent variables 2-22

session-only variables 2-21

system-defined variables 2-23

using in command scripts 2-34

clock modules

description 11-19

displaying status 11-19

cloud discovery. See iSNS cloud discovery

code pages

FICON text string formatting 29-19

COM1 ports

configuring settings 5-29

verifying settings 5-30

command aliases

defining 2-24

description 2-23

command-line interface. See CLI

command scheduler

configuring 19-2

default settings 19-11

defining jobs 19-4

deleting jobs 19-6

description 19-1

enabling 19-3

execution logs 19-10

specifying schedules19-6to 19-9

verifying execution status 19-9

See also execution logs; jobs; schedules

command scripts

executing 2-33

using CLI variables 2-34

Common Information Model. See CIM

common roles

configuring 32-8

common users

mapping CLI to SNMP 32-9

CompactFlash

slot0: 8-2

CompactFlash. See external CompactFlash

company IDs

FC ID allocations 30-10

configuration

clearing 2-14

displaying 2-11

overview1-6to 1-8

restoring redundancy mode 9-7

rolling back to previous 9-7

saving 2-14

saving automatically for FICON 29-22

software tools 1-5

configuration files

backing up 9-6

copying 9-5

deleting 9-8

displaying 9-1

downloading 9-2

FICON 29-33

saving 9-3

saving across the fabric 9-4

configuration limits

description (table) A-1

configuring NPV 14-8

congestion control methods. See FCC; edge quench congestion control

congestion window monitoring. See CWM

console logging

configuring 54-4

console ports

configuring settings 5-28

verifying settings 5-28

console sessions

message logging severity levels 54-4

contact information

assigning for Call Home 55-6

Contiguous Domain ID Assignments

About 18-14

contract IDs

description 55-28

control traffic

disabling QoS 57-4

enabling for QoS 57-4

Control Unit Port. See CUP in-band management

control virtual targets. See CVTs

core dumps

IPS modules 45-4

kernel 60-10

saving to CompactFlash 60-8

core files

clearing directory 60-8

copying manually 60-7

copying periodically 60-7

displaying information 60-6

saving to external devices 60-7

CRLs

configuring 36-14

configuring revocation checking methods 36-9

description 36-5

downloading example 36-33

generation example 36-32

importing example36-35to 36-37

crossbars

compatibility with Generation 1 modules 11-15

description 11-14

management 11-13

removal considerations 11-14

crypto IPv4-ACLs

any keyword 37-20

configuration guidelines 37-17

creating 37-21

creating crypto map entries 37-24

mirror images 37-19

crypto map entries

configuring global lifetime values 37-30

global lifetime values 37-29

setting SA lifetimes 37-25

crypto maps

auto-peer option 37-26

configuration guidelines 37-24

configuring autopeer option 37-27

configuring perfect forward secrecy 37-28

creating entries 37-24

entries for IPv4-ACLs 37-23

perfect forward secrecy 37-27

SA lifetime negotiations 37-25

SAs between peers 37-23

crypto map sets

applying to interfaces 37-28

CUP in-band management

blocking restriction 29-25

description 29-40

displaying information 29-41

placing CUPs in zones 29-41

current directory

displaying 2-28

setting 2-27

current VSANs

description 23-3

Cut-through routing mode 43-28

CVTs

description 50-2

CWM

configuring in FCIP profiles 41-15

D

Data Encryption Standard encryption. See DES encryption

data traffic

applying service policies 57-9

class maps 57-7

comparing VSANs and QoS 57-6

defining service policies 57-8

displaying information 57-10

DWRR queues 57-9

enabling QoS 57-7

enforcing service policies 57-9

example configuration 57-12

data virtual targets. See DVTs

dates

configuring 5-16

daylight saving time

adjusting for 5-17

dead time intervals

configuring for FSPF 26-8

description 26-7

dedicated rate mode

description 15-6

migrating from shared rate mode 15-21

migrating to shared rate mode 15-21

default gateways. See IPv4 default gateways

default networks. See IPv4 default networks

defaults

setting with no commands 2-10

default users

description 5-3

default VSANs

description 20-8

default zones

configuring access permissions 24-9

configuring QoS priorities 24-19

description 24-9

interoperability 30-13

policies 24-9

deficit weighted round robin schedulers. See DWRR schedulers

DES encryption

IKE 37-7

IPsec 37-6

destination IDs

exchange based 17-5

flow based 17-4

in-order delivery 26-13

path selection 20-10

device alias database

committing changes 25-4

disabling distribution 25-5

discarding changes 25-4

distribution to fabric 25-3

enabling distribution 25-5

merging 25-7

overriding fabric lock 25-5

device aliases

CFS support 7-2

clearing statistics 25-7

comparison with zones (table) 25-2

creating 25-3

default settings 25-11

description 25-1

displaying information25-7to 25-10

features 25-1

modifying the database 25-2

requirements 25-2

device allegiance

FICON 29-22

device IDs

Call Home format 55-29

Device Manager

description 1-6

DH

IKE 37-6

DHCHAP

AAA authentication 38-8

authentication modes 38-4

compatibility with other SAN-OS features 38-3

configuring38-2to 38-10

configuring AAA authentication 38-8

default settings 38-12

description 38-1

displaying security information 38-9

enabling 38-3

group settings 38-6

hash algorithms 38-5

licensing 38-2

passwords for local switches 38-6

passwords for remote devices 38-7

sample configuration38-10to 38-11

timeout values 38-8

See also FC-SP

differentiated services code point. See DSCP

Diffie-Hellman Challenge Handshake Authentication Protocol. See DHCHAP

Diffie-Hellman protocol. See DH

digital certificates

configuration example36-16to 36-19

configuring36-5to 36-15

default settings 36-38

deleting from CAs 36-14

description36-1to 36-5

exporting 36-5, 36-13

generating requests for identity certificates 36-10

importing 36-5, 36-13

installing identity certificates 36-11

IPsec37-7to 37-10

maintaining 36-13

maximum limits 36-37

monitoring 36-13

peers 36-4

purpose 36-2

requesting identity certificate example 36-23

revocation example 36-29

SSH support 32-19

digital signature algorithm. See DSA key pairs

direct memory access devices. See DMA-bridges

directories

creating 2-29

deleting 2-29

deleting files 2-31

display current 2-28

listing files 2-29

moving files 2-29, 2-30

display filters

defining 59-10

examples59-10to 59-13

selective viewing 59-9

DMA-bridges

displaying statistics 45-10

DNS

default settings 44-29

DNS hosts

displaying information 44-28

DNS servers

configuring 44-27

documentation

additional publications 1-lxviii

related documents 1-lxviii

domain ID

CFS support 7-2

domain IDs

allowed lists 18-10

assignment failures 13-10

configuring allowed lists 18-11

configuring CFS distribution18-11to 18-13

configuring fcalias members 24-10

contiguous assignments 18-14

description 18-7

distributing 18-2

enabling contiguous assignments 18-14

interoperability 30-13

IVR configuration guidelines 23-18

non-unique and IVR NAT 23-5

preferred 18-9

static 18-9

unique 23-18

domain manager

fast restart feature 18-4

isolation 13-10

domain names

defining 44-28

Domain Name System servers. See DNS servers

downgrading

Cisco MDS SAN-OS releases 8-31

disabling ACL adjacency sharing 15-35

DPVM

CFS support 7-2

default settings 22-13

description 22-1

displaying configurations 22-10

enabling 22-2

requirements 22-2

sample configuration22-11to 22-13

DPVM databases

autolearned entries 22-4

clearing 22-5

comparing differences 22-9

configuring CFS distribution22-5to 22-8

copying 22-9

description 22-3

displaying 22-10

enabling autolearning 22-5

merging guidelines 22-8

drivers

iSCSI 43-2

drop latency time

configuring for FSPF in-order delivery 26-17

displaying information 26-17

DSA key-pairs

generating 32-15

dsa key pairs

generating 32-15

DSCP

configuring 41-24

DVTs

configuring 50-5

description 50-2

DWRR queues

changing weights 57-10

DWRR schedulers

description 57-5

dynamic bandwidth management

description 15-6

dynamic iSCSI initiator

converting 43-43

convert to staticiSCSI

convert dynamic initiator to static 43-14

dynamic mapping 43-6, 43-43

dynamic mappingiSCSI

dynamic mappingiSCSI

static mappingstatic mapping 43-5

Dynamic Port VSAN Membership. See DPVM

E

EBCDIC

FICON string format 29-19

edge quench congestion control

description 57-2

edge switches

description 23-4

edge VSANs

description 23-3

EFMD

fabric binding 40-1

EISLs

PortChannel links 17-1

e-mail addresses

assigning for Call Home 55-6

e-mail notifications

Call Home 55-1

encrypted passwords

user accounts 32-12

enhanced ISLs. See EISLs

enhanced zones

advantages over basic zones 24-30

broadcast frames 24-36

changing from basic zones 24-31

configuring default full database distribution 24-37

configuring default policies 24-35

configuring default switch-wide zone policies 24-37

creating attribute groups 24-33

default settings 24-41

description 24-30

displaying information24-37to 24-40

enabling 24-32

merging databases 24-34

modifying database 24-33

enterprise package licenses

description 3-4

entity status inquiry. See ESI

EPLD images

downgrading 12-16

upgrading 12-13

E port mode

classes of service 13-4

description 13-4

E ports

32-port guidelines 13-2

32-port switching module configuration guidelines 17-3

configuring 13-13, 41-24

fabric binding checking 40-2

FCS support 56-1

FSPF topologies 26-2

isolation 13-10

recovering from link isolations 24-14

SPAN sources 53-3

trunking configuration 16-3

ESI

non-resp threshold 43-85

ESI retry count 43-85

Ethernet MAC statistics

displaying 45-10

Ethernet PortChannels

adding Gigabit Ethernet interfaces 45-9

configuring 45-8

description 45-7

iSCSI 43-65

redundancy 41-6

Exchange Fabric Membership Data. See EFMD 40-1

exchange IDs

in-order delivery 26-13

load balancing 59-1

path selection 20-10

exchange link parameter. See ELP

execution logs

clearing log files 19-10

configuring 19-10

description 19-10

displaying configuration 19-10

displaying log file contents 19-10

expansion port mode. See E port mode

expiry alerts

licenses 3-15

explicit fabric logout 43-11

extended BB_credits

configuring 13-36

description 13-34

displaying information 13-37

Generation 2 switching modules 15-15

licensing 15-15

Extended Binary-Coded Decimal Interchange Code. See EBCDIC 29-19

external CompactFlash

description 2-25

devices 8-27

formatting 2-26

recovering from corruption 2-26

slot0: 2-25

supported devices 2-26

external loopback tests

description 60-18

performing 60-18

external RADIUS server

CHAP 43-67

external RADIUS servers

CHAP 43-67

external servers

configuring for kernel cores 60-11

F

fabric binding

activation 40-4

checking for Ex ports 40-2

clearing statistics 40-6

compatibility with DHCHAP 38-3

configuration40-3to 40-6

default settings 40-9

deleting database 40-6

description40-1to 40-2

EFMD 40-1

enforcement 40-2

forceful activation 40-5

licensing requirements 40-1

port security comparison 40-1

saving configurations 40-5

verifying configuration40-6to 40-9

Fabric Configuration Server. See FCS

Fabric Configuration Servers. See FCSs

Fabric-Device Management Interface. See FDMI

fabric login. See FLOGI

fabric loop port mode. See FL port mode

Fabric Manager

description 1-6

Fabric Manager Server package license

description 3-6

fabric port mode. See F port mode

fabric pWWNs

zone membership 24-2

fabric reconfiguration

fcdomain phase 18-2

fabrics

See also build fabric frames

fabrics. See RCFs; build fabric frames

fabric security

authentication 38-1

default settings 38-12

Fabric Shortest Path First. See FSPF

fabric WWNs. See fWWNs

facility logging

configuring message severity levels 54-5

failure actions

configuring 60-14

fan module LEDs

failure status 11-17

fan modules

description 11-17

displaying status 11-17

failures 11-17

fault tolerant fabrics

example (figure) 26-2

fcaliases

cloning 24-17

configuring for zones 24-10

creating 24-10

renaming 24-17

fcanalyzer

displaying filters 59-9

See also Cisco Fabric Analyzer

FCC

assigning priority 57-3

benefits 57-1

default settings 57-14

description 57-1

displaying settings 57-3

enabling 57-2

frame handling 57-2

logging facility 54-2

process 57-2

fcdomains

autoreconfigured merged fabrics 18-6

configuring CFS distribution18-11to 18-13

default settings 18-22

description 18-2

disabling 18-5

displaying information18-19to 18-22

domain IDs 18-7

domain manager fast restart 18-4

enabling 18-5

enabling autoreconfiguration 18-7

incoming RCFs 18-6

initiation 18-5

overlap isolation 13-10

restarts 18-3

show tech-support fcdomain command 59-21

switch priorities 18-5

FC ID allocation

FICON implementation 29-14

FC IDs

allocating 18-2, 30-10

allocating default company ID lists 30-10

allocating for FICON 29-13

allocation for HBAs 30-10

configuring fcalias members 24-10

description 18-14

persistent18-15to ??

FCIP 43-1

advanced features 41-27

compatibility with DHCHAP 38-3

compression 41-36

configuring41-7to41-17, ??to 41-18

default parameters 41-39

discarding packets 41-21

enabling 41-8

FICON support 29-4

Gigabit Ethernet ports 46-1

high availability41-4to 41-7

IPS modules 41-2

IP storage services support 45-1

link failures 41-5

MPS-14/2 module 41-2

reserving ports for FICON 29-12

sample IPsec configuration37-35to 37-39

specifying number of TCP connections 41-20

tape acceleration41-30to 41-36

time stamps 41-21

VE ports 41-2

virtual ISLs 41-2

VRRP 41-6

write acceleration 41-27

FCIP compression

configuring 41-37

description 41-36

displaying information 41-38

FCIP interfaces

binding to FICON port numbers 29-24

configuring advanced features41-18to41-24, ??to 41-24

configuring peers 41-18

configuring QoS 41-24

configuring special frames 41-19

creating 41-18

displaying information 41-25

parameters 41-4

SPAN sources 53-3

FCIP links

B port interoperability mode 41-22

configuring 41-8

configuring peers 41-18

configuring QoS 41-24

creating 41-10

description 41-3

endpoints 41-3

initiating IP connections 41-20

TCP connections 41-3

FCIP listener ports

configuring 41-12

FCIP peers

configuring IP addresses 41-19

enabling special frames 41-20

FCIP profiles

configuring listener ports 41-12

configuring TCP parameters41-13to41-17, ??to 41-18

creating 41-9

description 41-4

displaying information 41-9

FCIP tape acceleration

configuring 41-34

description41-30to 41-34

displaying information 41-35

FCIP TCP parameters

configuring buffer size 41-17

configuring CWM 41-15

configuring keepalive timeouts 41-13

configuring maximum jitter 41-16

configuring maximum retransmissions 41-14

configuring minimum retransmit timeouts 41-13

configuring PMTUs 41-14

configuring SACKs 41-14

configuring window management 41-15

displaying 41-17, 41-18

FCIP write acceleration

configuring 41-29

description 41-27

displaying information 41-29

FCP

intermixing protocols 29-5

routing requests 43-3

fcping

default settings 59-30

invoking 59-3

verifying switch connectivity 59-4

FCS

description 56-1

logging facility 54-2

significance 56-2

FC-SP

authentication 38-1

enabling 38-3

See also DHCHAP

FCSs

configuring names 56-3

default settings 56-7

description 56-1

displaying information56-4to 56-7

fctimers

CFS support 7-2

displaying configured values 30-8

distribution 30-6

fctrace

default settings 59-30

invoking 59-1

FDMI

description 27-5

displaying database information 27-6

Federal Information Processing Standards. See FIPS

Fiber Channel interfaces

configuring system default port mode f 13-13

Fibre Channel 43-1

iSCSI targets43-5to 43-9

sWWNs for fabric binding 40-4

time out values30-4to 30-8

Fibre Channel Analyzers

configuring using SPAN 53-14

Fibre Channel analyzers

monitoring without SPAN 53-12

Fibre Channel Congestion Control. See FCC

Fibre Channel domains. See fcdomains

Fibre Channel interface

default settings 13-40

Fibre Channel interfaces

administrative states 13-7

BB_credits 13-32

characteristics13-1to 13-12

configuring 13-11

configuring auto port mode 13-13

configuring beacon modes 13-17

configuring bit error thresholds 13-18

configuring descriptions 13-15

configuring frame encapsulation 13-16

configuring port modes 13-13

configuring receive data field sizes 13-16

configuring speeds 13-14

deleting from PortChannels 17-13

disabling 13-12

displaying capabilities on Generation 2 switching modules 15-20

displaying information13-20to 13-27

displaying VSAN membership 20-8

enabling 13-12

extended BB_credits 13-34

graceful shutdown 13-12

modes13-3to 13-6

operational states 13-7

performance buffers 13-34

reason codes 13-8

states 13-7

taking out of service on Generation 2 switching modules 15-33

troubleshooting operational states 13-9

See also interfaces 13-7

Fibre Channel over IP. See FCIP

Fibre Channel Protocol. See FCP

Fibre Channel protocol analyzers. See Cisco Fabric Analyzer

Fibre Channel Security Protocol. See FC-SP

Fibre Channel targets

dynamic importing 43-7

dynamic mapping 43-7

Fibre Channel traffic

SPAN sources 53-3

Fibre Channel write acceleration

default settings 49-4

description 49-1

displaying configuration 49-2

enabling 49-2

estimating number of write buffers 49-1

licensing 49-1

modifying number of write buffers 49-2

Fibre Channel zoning-based access control 43-22

Fibre Connection. See FICON

FICON

advantages on MDS switches29-3to 29-6

automatic configuration save 29-22

basic configuration 29-15

cascading 29-7

clearing device allegiance 29-22

configuration files29-32to ??

configuring29-14to 29-23

configuring ports29-23to 29-32

CUP in-band management 29-40

default settings 29-49

description29-1to 29-7

displaying information29-42to 29-49

fabric binding requirements 40-3

FC4 protocols 29-2

FC ID allocations 29-13

FCIP support 29-4

host timestamp control 29-20

implemented ports 29-10

installed ports 29-11

manually enabling 29-18

MDS-supported features 29-5

PortChannel support 29-4

port numbering29-7to 29-14

port swapping29-36to 29-38

prohibited ports 29-46

RLIRs29-27to ??

saving configuration changes 29-22

sWWNs for fabric binding 40-4

tape acceleration29-38to ??

text string formatting codes 29-19

unimplemented port 29-10

VSAN offline state 29-40

FICON configuration files

applying to running configuration 29-33

copying 29-35

description 29-33

displaying 29-34

displaying information 29-44

editing 29-33

FICON port numbers

assigning to slots 29-11

default numbering scheme 29-8

displaying assignments 29-12

FCIP interfaces 29-12

implemented addresses 29-10

installed ports 29-11

logical interfaces 29-12

numbering guidelines 29-11

PortChannel interfaces 29-12

port swapping 29-10

reserved numbering scheme 29-10

unimplemented addresses 29-10

uninstalled ports 29-11

FICON ports

assigning address names 29-26

binding to FCIP interfaces 29-24

binding to PortChannels 29-24

blocking 29-24

configuring prohibiting default state 29-25

displaying address information 29-43

displaying administrative states 29-46

prohibiting 29-25

swapping configurations 29-37

FICON port swapping

guidelines 29-36

FICON tape acceleration

configuration considerations 29-39

configuring 29-39

description 29-38

files

compressing 2-32

copying 2-30

deleting 2-31

displaying checksums 2-28

displaying contents 2-31

displaying last lines 2-32

moving 2-29

uncompressing 2-32

file systems

accessing standby supervisor modules 9-8

creating directories 2-29

deleting directories 2-29

displaying current directory 2-28

formatting 2-25

listing files 2-29

redirection 2-32

setting current directory 2-27

specifying 2-27

volatile: 2-25

File Transfer Protocol. See FTP

FIPS

configuration guidelines 31-2

self-tests 31-2

Flash devices

bootflash: 2-25

description 2-24

external CompactFlash 2-25

formatting 2-25

FLOGI

description 27-1

displaying details 27-1

logging facility 54-2

flow statistics

clearing 26-19

counting 26-18

description 26-18

displaying 26-19

FL port mode

classes of service 13-4

description 13-4

FL ports

configuring 13-13

description 13-4

DPVM support 22-4

fctrace 59-1

nonparticipating code 13-10

persistent FC IDs 18-15

SPAN sources 53-3

See also Fx ports

F port mode

classes of service 13-4

description 13-4

F ports

configuring 13-13

description 13-4

DPVM support 22-4

SPAN sources 53-3

See also Fx ports

FPSF

load balancing (example) 41-5

frame encapsulation

configuring 13-16

frames

configuring MTU size 46-3

FSCN

displaying databases 28-3

FSPF

clearing counters 26-9

clearing VSAN counters 26-6

computing link cost 26-7

configuring globally26-4to 26-6

configuring Hello time intervals 26-7

configuring link cost 26-6

configuring on a VSAN 26-5

configuring on interfaces26-6to 26-9

dead time intervals 26-7

default settings 26-22

description 26-2

disabling 26-6

disabling on interfaces 26-9

disabling routing protocols 26-6

displaying database information 26-20

displaying global information 26-20

displaying information??to 26-22

enabling 26-6

fail-over with PortChannels 26-3

fault tolerant fabrics 26-2

flow statistics26-18to 26-20

in-order delivery26-13to 26-18

interoperability 30-14

link state record defaults 26-4

multicast root switches 26-12

reconvergence times 26-2

redundant links 26-3

resetting configuration 26-5

resetting to defaults 26-5

retransmitting intervals 26-8

routing services 26-1

topology examples26-2to 26-4

FSPF multicast roots

configuring switches 26-12

FSPF routes

configuring 26-10

description 26-10

FSPF routing

multicast 26-12

FTP

logging facility 54-2

full core dumps

IPS modules 45-4

full zone sets

considerations 24-5

enabling distribution 24-14

fWWNs

configuring fcalias members 24-10

Fx ports

32-port default 13-2

configuring 13-13

description 13-6

FCS 56-1

FCS support 56-1

interface modes 13-6

VSAN membership 20-4

See also F ports; FL ports 13-6

G

Generation 1 switching modules

combining with Generation 2 switching modules??to 15-20

extended BB_credits 13-35

port index allocations 15-16

QoS behavior 57-10

Generation 2 switching modules

buffer groups15-8to 15-14

combining with Generation 1 switching modules??to 15-20

configuring15-20to ??

configuring port speeds 15-23

configuring rate modes 15-24

default settings 15-38

description15-1to ??

disabling ACL adjacency sharing 15-35

displaying port resources 15-33

dynamic bandwidth management 15-6

example configurations15-36to 15-37

extended BB_credits 13-36, 15-15

installing in Generation 1 chassis 8-40

interface capabilities 15-20

out-of-service interfaces 15-7

port groups 15-2

port index allocations 15-16

port rate modes 15-4

QoS behavior 57-10

recovering from powered-down state 15-18

releasing shared resources 15-34

taking interfaces out of service 15-33

Gigabit Ethernet interface example 43-63

Gigabit Ethernet interfaces

configuring??to 45-9

configuring auto-negotiation 46-3

configuring CDP 5-36

configuring high availability45-5to 45-9

configuring IPv4 46-2

configuring IPv6 addresses 47-12

configuring MTU frame sizes 46-3

configuring promiscuous mode 46-4

configuring static IPv4 routing 46-7

configuring VRRP 45-6

default parameters 46-10

displaying statistics45-9to 45-13

IPv4-ACL guidelines 46-7

subinterfaces 46-6

subnet requirements 46-6

verifying connectivity 46-4

Gigabit Ethernet subinterfaces

configuring VLANs 46-6

global keys

assigning for RADIUS 34-10

H

hardware

default settings 11-21

displaying inventory 11-1

displaying temperatures 11-16

overview 1-1

hard zoning

description 24-13

HA solution example 43-61

HBA port 43-11, 43-16

HBA ports

configuring area FCIDs 18-17

HBAs

device aliases 25-1

FC ID allocations 30-10

Hello time intervals

configuring for FSPF 26-7

description 26-7

help

from the CLI 2-10

high availability

automatic synchronization 10-5

compatibility with DHCHAP 38-3

description 10-1

displaying status 10-5

Ethernet PortChannel 43-65

Ethernet PortChannels 41-6

Fibre Channel PortChannels 41-7

licensing 3-8

process restartability 10-4

protection against link failures 10-1

software upgrades 8-5

supervisor module switchover mechanism 10-2

switchover characteristics 10-2

synchronizing supervisor modules 10-4

VRRP 41-6, 43-64

VRRPVRRP-based high availability 43-64

host control

FICON 29-19

host keys

assigning 34-8

host names

configuring for digital certificates 36-6

I

IBM PPRC

FICON support 29-4

ICMP

displaying statistics 45-12

IPv6 47-6

ICMP packets

IPv6 header format, figure 47-6

type value 35-4

IDs

Cisco vendor ID 34-15

contract IDs 55-28

serial IDs 55-29, 55-33

site IDs 55-28

IKE

algorithms for authentication 37-6

default settings 36-38, 37-41

description 37-3

displaying configurations 37-30

enabling 37-11

initializing 37-10

refreshing SAs 37-16

terminology 37-5

transforms for encryption 37-6

IKE domains

clearing 37-16

configuring 37-11

description 37-11

IKE initiators

configuring version 37-16

displaying configuration 37-30

IKE peers

configuring keepalive times 37-15

displaying keepalive configuration 37-30

IKE policies

configuring lifetime associations 37-15

configuring negotiation parameters 37-13

displaying current policies 37-30

negotiation 37-11

IKE tunnels

clearing 37-16

description 37-11

images

See kickstart images; software images; system images

images. See kickstart images; software images; system images

in-band management

CUP 29-40

IPFC 44-6

indirect link failures

recovering 58-1

initiators

statically mapped iSCSI 43-40

initiator-target-LUNs. See ITLs

in-order delivery

configuring drop latency time 26-17

displaying status 26-16

enabling for VSANs 26-16

enabling globally 26-16

guidelines 26-15

reordering network frames 26-13

reordering PortChannel frames 26-15

install all command

benefits 8-7

examples 8-12

failure cases 8-8

remote location path (caution) 8-17

requirements 8-5

usage 8-8

Intelligent Storage Services

Fibre Channel write acceleration49-1to 49-4

installing SSI boot images12-18to 12-27

SCSI flow services48-1to 48-10

SCSI flow statistics48-1to 48-10

traffic disruption 12-20

upgrading SSI boot images 12-19

interfaces

adding to PortChannels 17-11

assigning to VSANs 20-7

configuring descriptions 13-15

configuring fcalias members 24-10

default settings 13-40

deleting from PortChannels 17-13

displaying information13-20to 13-27

displaying SFP information 13-26

forced addition to PortChannels 17-12

isolated states 17-11

suspended states 17-11

VSAN membership 20-7

internal bootflash:. See bootflash:

internal loopback tests

description 60-17

performing 60-17

Internet Control Message Protocol. See ICMP

Internet Key Exchange. See IKE

Internet Storage Name Service. See iSNS

interoperability

configuring interop mode 1 30-15

description 30-12

verifying status 30-16

VSANs 20-11

interop modes

configuring mode 1 30-15

default settings 30-19

description 30-12

Inter-VSAN Routing. See IVR

Inter-VSAN Routing zones. See IVR zones

Inter-VSAN Routing zone sets. See IVR zone sets

inventories

configuring notifications 55-15

IOD. See in-order delivery

IP addresses

configuring Cisco Fabric Analyzer 59-8

SMTP server 55-14

IP connections

active mode 41-20

initiating 41-20

passive mode 41-20

IP domain names

configuring for digital certificates 36-6

IPFC

configuration guidelines 44-6

configuring VSAN interfaces 44-7

description 44-6

enabling IPv4 routing 44-7

example configuration44-8to 44-10

logging facility 54-2

IP filters

contents 35-2

restricting IP traffic 35-1

IP Network Simulator tool 59-22

IPS core dumps. See core dumps

IPsec

algorithms for authentication 37-6

crypto IPv4-ACLs37-16to 37-21

default settings 37-41

description 37-2

digital certificate support37-7to 37-10

displaying configurations37-31to 37-35

fabric setup requirements 37-4

global lifetime values 37-29

hardware compatibility 37-4

licensing requirements 37-3

maintenance 37-28

prerequisites 37-3

RFC implementations 37-1

sample FCIP configuration37-35to 37-39

sample iSCSI configuration37-39to 37-41

terminology 37-5

transform sets 37-21

transforms for encryption 37-6

unsupported features 37-4

IP security. See IPsec

IPS modules

CDP support 45-9

core dumps 45-4

FCIP 41-2

partial core dumps 45-4

port modes 46-1

software upgrades 45-3

supported features 45-1

IPS ports 43-6

modes 46-1

multiple connections 43-63

SPAN sources 53-3

IP storage services

default parameters 45-13

IP Storage services modules. See IPS modules

IPv4

configuring Gigabit Ethernet interfaces 46-2

configuring management interfaces 44-3

configuring virtual routers 44-19

default settings 46-10

description 46-1

displaying statistics 46-9

transitioning to IPv6 47-19

IPv4-ACLs

adding entries 35-7

applying to interfaces 35-9

clearing counters 35-12

configuration guidelines 35-2

creating 35-5

crypto37-16to 37-21

crypto map entries 37-23

defining filters 35-6

displaying configuration 35-8

guidelines for Gigabit Ethernet interfaces 46-7

operands 35-6

reading dump logs 35-9

removing entries 35-7

verifying interface configuration 35-11

IPv4 addresses

adding for VRRP 44-20

configuring fcalias members 24-10

configuring in VSANs 44-7

configuring IPv6 and IPV6 protocol stacks 47-13

IPv6 protocol stacks 47-10

IPv4 default gateways

configuring 5-26, 44-4, 44-5

configuring mgmt0 interfaces 13-37

description 44-3

IP static routing 44-4

static routes (tip) 44-5

verifying configuration 44-4

IPv4 default networks

description 44-4

IPv4 routing

configuring Gigabit Ethernet interfaces 46-7

disabling 44-7

displaying route tables 46-7

enabling 44-7

verifying configuration 44-7

IPv4 static routing

configuring 44-11

description 44-11

verifying configuration 44-11

IPv6

address types 47-3

configuring addressing 47-11

configuring IPv4 and IPv6 addresses 47-13

configuring management interfaces 44-3

configuring neighbor discovery parameters 47-15

configuring virtual routers 44-19

default settings 47-20

description47-1to 47-11

displaying information 47-19

dual IPv4 and IPv6 protocol stack applications, figure 47-11

dual IPv4 and IPv6 protocol stacks 47-10

dual IPv4 and IPv6 protocol stack technique, figure 47-10

enabling routing 47-11

enhancements over IPv4 47-1

ICMP 47-6

IPv6-ACL guidelines 47-18

neighbor discovery 47-7

path MTU discovery 47-7

router advertisement messages 47-9

router discovery 47-9

stateless autoconfiguration 47-9

static routes 47-17

transitioning from IPv4 47-19

verifying basic connectivity 47-13

verifying configuration 47-13

IPv6-ACLs

defining 35-6

guidelines for IPv6 47-18

operands 35-7

IPv6 addresses

adding for VRRP 44-20

configuring 47-11

configuring fcalias members 24-2, 24-10

configuring IPv4 and IPV6 protocol stacks 47-13

formats 47-2

link-local type 47-4

multicast type 47-5

prefix format 47-3

unicast type 47-3

IPv6 neighbor discovery

advertisement messages 47-7

description 47-7

neighbor solicitation message, figure 47-8

solicitation messages 47-7

IPv6 routing

enabling 47-11

IPv6 static routes

configuring 47-17

displaying the route table 47-17

IQN

formats 43-6

IQNs

formats 43-6

ISCSI

enforcing access control 43-22

iSCSI

access control43-19to 43-23

add initiator to zone database 43-21

advanced VSAN membershipadvanced VSAN membership 43-19

checking for WWN conflicts 43-15

compatible drivers 43-2

configuring43-1, 43-1to??, 43-4, ??to 43-66

configuring AAA authentication 43-23, 43-24

configuring ACLs 43-21

configuring VRRP 43-64

default parameters 43-96

discovery phase 43-22

displaying global information 43-34

displaying statistics 43-31

drivers 43-2

enabling 43-4

error 43-10

Fibre Channel targets43-5to 43-9

Gigabit Ethernet ports 46-1

GW flagiSCSI

gateway device 43-11

HA with host without multi-path software 43-60

initiator idle timeoutinitiator idle timeout

iSCSIinitiator idle timeout

configuring with Fabric Manager     1

initiator name 43-25

IPS module support 45-2

IQNs 43-9

login redirect 43-41

LUN mapping for targets43-73to 43-79

MPS-14/2 module support 45-2

multiple IPS ports 43-63

PortChannel-based high availability 43-65

PortChannel-based high availabilityEthernet PortChannel-based high availability 43-65

protocol 43-2

requests and responses 43-3

restrict an initiator to a specific user name for CHAP authentication 43-25

routing 43-2

routing modes chartrouting modes chart for iSCSI 43-29

sample IPsec configuration37-39to 37-41

session creation 43-23

statically mapped initiators 43-40

transparent initiator mode 43-11

transparent mode initiator43-68to 43-73

users with local authentication 43-24

VSAN membership 43-17

VSAN membership example 43-18

VSAN membership for iSCSI interfaces 43-17

iSCSI authentication

CHAP option 43-67

configuring 43-23, 43-48

configuring mechanisms 43-24

external RADIUS servers 43-67

global override 43-24

local authentication 43-24

mechanisms 43-24

restricting on initiators 43-25

scenarios 43-66

setup guidelines 43-66

iSCSI-based access control 43-21

iSCSI devices

example membership in VSANs 43-18

iscsi-gw 43-16

iSCSI high availability

configuring43-59to 43-66

ISCSI hosts

VSAN membership 43-17

iSCSI hosts

initiator identification 43-9

initiator presentation modes 43-10

initiator presentation modesinitiator presentation modes 43-10

iSCSI initiators

assigning WWNs 43-14

configuring dynamic IP address mapping 43-13

configuring static IP address mapping 43-13, 43-14

displaying information43-36to 43-39

displaying proxy information 43-33

dynamic mapping 43-12

idle timeout 43-12

making dynamic WWN mapping static 43-14

proxy mode 43-16

static mapping 43-13

transparent mode 43-11

verifying configuration 43-45

WWN assignments 43-12

iSCSI interfaces

configuring43-9, 43-9to 43-30

configuring listener ports 43-27

configuring listener portsiSCSI

listener port 43-27

configuring QoS 43-28

configuring routing mode43-28to 43-30

configuring routing modesiSCS

configuring routing modesrouting modes 43-28

configuring TCP tuning parameters 43-27

creating 43-5

creatingiSCSI

creating interfaces 43-5

displaying information 43-30

SPAN sources 53-3

VSAN membership 43-18

iSCSI LUs 43-6

iSCSI protocol 43-1

iSCSI server load balancing 43-39

iSCSI Server Load Balancing. See iSLB

iSCSI sessions

authentication43-23to 43-26

displaying information 43-34

iSCSI targets

advertising 43-7

dynamic importing 43-6

dynamic mapping 43-6

examples 43-8

secondary access 43-61

static importing 43-7

static importingstatic mappingiSCSI targets

static mapping 43-7

transparent failover43-59to 43-63

iSCSI users

displaying information 43-39

iSCSI virtual targets

displaying information 43-39

iSLB

activating zones 43-45, 43-46

auto-zoning 43-55

CFS support 7-2

committing configuration changescommitting configuration changes

iSLB 43-56

configuration distribution43-55to ??, 43-55

configuration prerequisites 43-41

configuring 43-39

configuring initiators and targets 43-45

configuring VRRP 43-54

configuring zones 43-45, 43-46

default settings 43-97

distributing configuration using CF 43-55

dynamic initiator mapping 43-43

enabling configuration distribution 43-56

initiator WWN assignment 43-39

load balancing algorithm43-51to 43-53

static initiator configurationinitiator configuration

static iSLB 43-40

VSAN membership 43-44

zone set activation failed 43-47

iSlb

default settings 43-97

iSLB initiators 43-41

activating zones 43-46

assigning WWNs 43-43

configuring43-41to 43-49

configuring IP addresses 43-42

configuring load balancing metrics 43-45

configuring names 43-42

configuring static name mapping 43-42

configuring zones 43-46

description 43-41

dynamic initiator mapping 43-43

VSAN membership 43-44

iSLB initiator targets

activating zones 43-46

configuring 43-46

configuring zones 43-46

description 43-45

iSLB sessions

authentication 43-48

authenticationiSLB

sessions authentication 43-48

iSLB VRRP

displaying information 43-54

enabling 43-54

verifying configuration 43-54

ISLs

PortChannel links 17-1

iSMS servers

enabling 43-85

iSNS

CFS support 7-2

client registration 43-86

cloud discovery 43-93, 43-96

configuring 43-87

configuring servers43-84to 43-87

description 43-79

ESI 43-85

iSNS client

description 43-79

iSNS clients

creating profiles 43-80

verifying configuration 43-81

iSNS cloud discovery

automatic 43-95

CFS distribution 43-95

description 43-93

displaying statistics 43-96

enabling 43-94

initiating on-demand 43-95

verifying configuration 43-95

verifying membership 43-96

verifying status 43-96

iSNS profiles

creating 43-80

verifying configuration 43-81

iSNS servers

configuration distribution 43-85

configuring ESI retry count 43-85

description 43-83

displaying configurations43-87to 43-93

enabling 43-85

example scenario 43-83

isolated VSANs

description 20-8

displaying membership 20-9

ITLs

description 50-9

removing 50-9

IVR

activating topologies 23-20

AF IDs 23-19

auto-topology 23-6

border switch 23-4

border switch, guidelines 23-18

border switch configuration guidelines 23-18

border switches 23-4

configuration distribution with CFS 23-10

configuration task lists 23-8

configuring23-8to 23-27

configuring logging levels 23-27

configuring without auto topology 23-17

configuring without IVR NAT 23-17

current VSANs 23-3

database merge guidelines 23-36

databases 23-10

default settings 23-44

default zone policy 23-28

description 23-2

domain ID configuration guidelines 23-18

domain ID guidelines 23-18

edge switch 23-4

edge switches 23-4

edge VSANs 23-3

enabling 23-9

example configuration23-39to 23-44

features 23-3

Fibre Channel header modifications 23-4

interoperability 23-8

logging 23-27

native VSANs 23-3

paths 23-3

persistent FC IDs 23-25

read-only zoning 23-36

SDV limitations 21-10

service groups23-14to 23-16

sharing resources 23-2

terminology 23-3

transit VSAN configuration guidelines 23-18

transit VSANs 23-3

virtual domains 23-23

VSAN topologies 23-6

zone communication 23-28

zones23-3, 23-28to 23-30

zone sets 23-3

IVR databases

active 23-10

configured 23-10

merge guidelines 23-36

pending 23-10

IVR logging

configuring levels 23-27

IVR logging levels

verifying configuration 23-27

IVR NAT

auto-topology 23-6

border switch, guidelines 23-12

configuration guidelines 23-12

description 23-5

enabling 23-14

load balancing 23-5

transit VSANs, guidelines 23-12

IVR persistent FC IDs

configuring 23-26

persistent 23-25

verifying configuration 23-26

IVR service groups

activation 23-8

characteristics 23-7

clearing 23-15

configuring 23-14

copying active 23-15

default 23-7

description 23-4, 23-14

IVR configuration guidelines 23-13

verifying configuration 23-15

IVR topologies

adding IVR-enabled switches 23-21

CFS support 7-2

clearing manual entries 23-22

configuring automatic discovery 23-13

configuring manually23-19to 23-23

copying active topologies 23-22

manually activating 23-20

migrating from automatic mode to user-configured mode 23-23

verifying configuration 23-22

IVR virtual domains

clearing 23-24

configuring 23-24

description 23-23

verifying configuration 23-24

IVR zones

activating with force option 23-31

automatic creation 23-29

clearing database 23-36

configuring23-30to ??

configuring LUNs 23-34

configuring QoS attributes 23-35

description 23-3, 23-28

differences with zones (table) 23-28

downgrading considerations 23-36

LUN zoning 23-34

maximum number of members 23-4

maximum number of zones 23-4

renaming 23-36

verifying configuration 23-32

verifying QoS configuration 23-35

IVR zone sets

activating 23-32

configuring23-30to 23-32

deactivating 23-32

description 23-3, 23-28

downgrading considerations 23-36

maximum number 23-4

renaming 23-36

verifying configuration 23-32

J

jitter

configuring estimated maximum in FCIP profiles 41-16

jobs

assigning to a schedule 19-6, 19-8

command scheduler 19-1

defining 19-4

deleting 19-6

removing from a schedule 19-9

verifying definition 19-5

jumbo frames. See MTUs

K

keepalive timeouts

configuring in FCIP profiles 41-13

kernel core dumps

configuring external servers 60-11

configuring for modules 60-11

description 60-10

displaying information 60-11

kickstart images

description 8-2

KICKSTART variable 8-1

selecting for supervisor modules 8-2

L

latency

forwarding 43-28

LEDs

beacon mode states 13-16

speed 13-17

license key files

backing up 3-12

description 3-2

installing 3-10

installing to remote locations 3-12

obtaining 3-10

updating 3-10

licenses

claim certificate 3-2

description 3-1

displaying host IDs 3-10

displaying information 3-11, 3-16

enterprise package 3-4

expiry alerts 3-15

extended BB_credits 13-35, 15-15

Fabric Manager Server package 3-6

factory-installed 3-9

feature-based 3-3

features supported (table) 3-4

grace period alerts 3-15

grace period expiration 3-15

high availability 3-8

identifying features in use 3-12

installation options 3-8

installing manually 3-9

key files3-10to 3-12

mainframe package 3-6

module-based 3-3

obtaining 3-9

on-demand port activation 4-1

PAK 3-2

SAN extension package 3-5

Storage Services Enabler package 3-7

terminology 3-1

transferring between switches 3-16

uninstalling 3-13

updating 3-14

limits

description (table) A-1

line cards. See switching modules; services modules

link costs

configuring for FSPF 26-7

description 26-6

link failures

protection against 10-1

recovering 58-1

Link Incident Records. See LIRs

link-local addresses

description 47-4

format, figure 47-4

link redundancy

Ethernet PortChannel aggregation 45-7

LIRs

description 29-27

load balancing 43-40, 43-41

attributes 20-10

attributes for VSANs 20-5

configuring 20-11

description 17-4, 20-10

FSPF (example) 41-5

guarantees 20-11

PortChannels 17-1

PortChannels (example) 41-5

weighted 43-45

load metric 43-45

lock the fabric 43-56

log files

configuring 54-6

copying manually 60-7

copying periodically 60-7

default names 54-6

description 60-5

displaying information 60-6

sizes 54-6

logging

default settings 54-15

disabling 54-4

enabling 54-4

message severity levels 54-3

logical unit numbers. See LUNs

logins

SSH 34-4

Telnet 34-4

loopback tests

configuring frame lengths 60-14

configuring frequency 60-13

external 60-17, 60-18

SERDES 60-19

loop monitoring 59-14

default settings 59-31

description 59-14

enabling 59-15

verifying configuration 59-15

LUN 43-6

LUN mapping 43-61

iSCSI43-73to 43-79

LUNs

displaying automatically discovered SCSI targets 28-4

displaying customized discovered SCSI targets 28-4

displaying discovered SCSI targets 28-3

explicit access control 43-16

IVR zoning 23-34

mapping and assignment 43-16

LUN zoning

configuring 24-22

description 24-21

LUs 43-5, 43-6

M

MAC addresses

configuring secondary 30-10

mainframe package licenses

description 3-6

mainframes

FICON parameters 29-20

VSAN clock 29-20

management access

description 5-14

in-band5-4, 5-10to 5-14

obtaining remote access 5-25

out-of-band5-4, 5-6to 5-10

using force option during shutdown 5-26

management interfaces

configuring 13-37, 13-38

configuring for IPv4 44-3

configuring for IPv6 44-3

default settings 13-40

displaying information 13-39

features 13-38

See also mgmt0 interfaces

maximum retransmissions

configuring in FCIP profiles 41-14

McData

native interop mode 30-13

MD5 authentication

IKE 37-7

IPsec 37-6

VRRP 44-23

merged fabrics

autoreconfigured 18-6

Message Authentication Code using AES. See AES-XCBC-MAC

Message Digest 5. See MD5 authentication

mgmt0 interfaces

configuring 5-25, 13-37, 13-38

configuring IPv4 addresses 44-3

configuring IPv6 addresses 44-3

default settings 13-40

features 13-38

local IPv4 routing 44-5

Microsoft Challenge Handshake Authentication Protocol. See MSCHAP

minimum retransmit timeouts

configuring in FCIP profiles 41-13

modems

configuration guidelines 5-31

configuring5-30to 5-35

configuring default initialization strings 5-33

configuring user-specified initialization strings 5-34

connecting on COM1 ports 5-30

connecting on console ports 5-30

enabling connections 5-32

initialization strings 5-32

initializing connection on a powered-on switch 5-34

verifying connection configuration 5-35

module configuration

purging 12-8

module configurations

saving to NVRAM 12-7

modules

configuring kernel core dumps 60-11

configuring message logging 54-5

displaying temperatures 11-16

preserving the configuration 12-7

purging configurations 12-8

replacing 8-41

resetting 12-6

state descriptions 12-4

temperature monitoring 11-15

testing health 60-15

verifying status 5-15, 12-4

monitoring traffic

RSPAN 53-20

SPAN 53-6

monitor sessions

message logging severity levels 54-4

MPS-14/2 modules 43-1, 43-2, 43-3, 43-5, 43-16, 43-22

CDP support 45-9

configuring extended BB_credits 13-35

FCIP 41-2

port modes 46-1

software upgrades 45-3

supported features 45-1

upgrading software 8-11

MSCHAP

description 34-33

MTUs

configuring frame sizes 46-3

configuring size

path discovery for IPv6 47-7

multicast addresses

IPv6 alternative to broadcast addresses 47-6

IPv6 format, figure 47-5

IPv6 solicited-node format, figure 47-6

multicast root switches

configuring 26-12

description 26-12

multi-path software example 43-60

multiple VSANs

configuring 44-14

Multiprotocol Services modules. See MPS-14/2 modules

mutual CHAP authentication

configuring for iSCSI 43-25

configuring for iSLB 43-48

configuring for iSLBI 43-48

N

name servers

displaying database entries 27-4

interoperability 30-14

LUN information 28-1

proxy feature 27-3

registering proxies 27-3

rejecting duplicate pWWNs 27-4

NASB

default settings 51-6

displaying information 51-4

enabling 51-3

target rediscovery 51-4

NAT. See IVR NAT

native VSANs

description 23-3

neighbor discovery

configuring parameters 47-15

verifying configuration 47-16

Network-Accelerated Serverless Backup. See NASB.

Network Address Translation. See IVR NAT

network administrators

additional roles 34-3

permissions 2-3, 34-3

network operators

permissions 2-3, 34-3

Network Time Protocol. See NTP

NL ports

fctrace 59-1

hard zoning 24-13

interface modes 13-6

zone enforcement 24-13

node world wide names. See nWWNs

nondisruptive upgrades

methods 8-5

None authentication 43-23

nonparticipating codes

description 13-10

NPIV

description 13-7

enabling 13-15

NP links 14-4

N port identifier virtualization. See NPIV

N ports

fctrace 59-1

hard zoning 24-13

zone enforcement 24-13

zone membership 24-2

See also Nx ports

NL ports

See also Nx ports

NP-ports 14-4

NPV, configuring 14-8

NPV mode 14-3

NTP

CFS support 7-2

configuration guidelines 5-19

configuring5-19to 5-24

configuring CFS distribution 5-23

logging facility 54-2

time-stamp option 41-21

nWWNs

DPVM 22-1

Nx ports

FCS support 56-1

See also N ports; NL ports

O

OBFL

configuring for modules 60-24

configuring for the switch 60-23

description 60-22

displaying configuration status 60-24, 60-25

displaying logs 60-26

OHMS

description 60-12

initiation 60-13

interpreting current status 60-19

on-board failure logging. See OBFL

On-Demand Port activation license

acquiring for ports 4-11

configuring4-10to 4-12

default configuration 4-4

description 4-1

example configuration 4-13

making ports eligible 4-11

port licensing 4-2

port naming conventions 4-2

Online Certificate Status Protocol. See OCSP

Online Health Management System. See OHMS

operational states

configuring on Fibre Channel interfaces 13-13

description 13-7

OSCP

support 36-5

out-of-service interfaces

description 15-7

overlay VSANs

configuring 44-13

description 44-12

oversubscription

disabling restrictions 15-28

enabling restrictions 15-31

Generation 2 switching modules 15-26

ratios 15-26

P

packets

discarding in FCIP 41-21

pass-thru routing mode 43-28

passwords

administrator 5-3

default for administrators 5-6

DHCHAP 38-6, 38-7

encrypted 32-12

recovering (procedure) 32-19

requirements for administrators 5-7

setting administrator default 5-6, 5-10

strong characteristics 32-11

path MTUs. See PMTUs

PDU 43-28

performance buffers

configuring 13-34

description 13-34

persistent domain ID

FICON VSANs 40-3

persistent FC IDs

configuring 18-16

description 18-15, 23-25

displaying 18-20

enabling 18-15

purging 18-19

ping commands

verifying connectivity 2-15

PKI

enrollment support 36-4

PLOGI

name server 27-4

PMTUs

configuring in FCIP profiles 41-14

port addresses

FICON 29-10

PortChannel

interfaces 43-7

subinterfaces 43-7

PortChannel modes

description 17-8

PortChannel Protocol

autocreation 17-15

configuring autocreation 17-16

converting autocreated groups to manually configured 17-17

creating channel group 17-14

description 17-13

enabling autocreation 17-16

PortChannels

32-port switching module configuration guidelines 17-2

adding interfaces 17-11

administratively down 13-10

binding to FICON port numbers 29-24

comparison with trunking 17-3

compatibility checks 17-11

compatibility with DHCHAP 38-3

configuration guidelines 17-8

configuring17-6to ??

configuring Fibre Channel routes 26-11

configuring for FCIP high availability 41-5

creating 17-8

default settings 17-20

deleting 17-10

deleting interfaces 17-13

description 17-1

examples 17-2

FICON support 29-4

forcing interface additions 17-12

Generation 2 switching module interfaces 15-18

high availability 10-1

in-order guarantee 26-15

interface states 17-11

interoperability 30-14

IQN formats 43-6

link changes 26-15

link failures 26-3

load balancing 17-4

load balancing (example) 41-5

logging facility 54-2

member combinations 45-7

misconfiguration error detection 17-8

redundancy 41-7

reserving ports for FICON 29-12

show tech-support port-channel command 59-19

SPAN sources 53-3

verifying configurations17-17to 17-20

port groups

assigning extended BB_credits 13-35

description 15-2

Generation 2 Fibre Channel switching modules 15-2

port indexes

description 15-16

port modes

auto 13-6

description13-3to 13-6

IPS 46-1

port numbers. See FICON port numbers

port rate limiting

configuring 57-14

default 57-14

description 57-14

hardware restrictions 57-14

port rate modes

configuring 15-24

dedicated 15-6

description 15-4

oversubscribed 15-6

shared 15-6

See also rate modes

ports

aggregation 10-1

on-demand port activation licensing 4-1

virtual E 41-2

VSAN membership 20-7

port security

activating 39-5

activation 39-3

activation rejection 39-6

adding authorized pairs 39-11

auto-learning 39-2

CFS support 7-2

cleaning up databases 39-17

compatibility with DHCHAP 38-3

configuration guidelines 39-3

configuring CFS distribution39-11to 39-14

copying databases 39-16

database interactions 39-14

database merge guidelines 39-14

data scenarios 39-15

deactivating 39-5

default settings 39-20

deleting databases 39-17

disabling 39-5

displaying configuration39-18, 39-18to 39-20

enabling 39-5

enforcement mechanisms 39-2

fabric binding comparison 40-1

forcing activation 39-6

license requirement 39-2

preventing unauthorized accesses 39-1

unauthorized accesses prevented 39-1

WWN identification 39-10

port security auto-learning

description 39-2

device authorization 39-8

disabling 39-8

distributing configuration 39-13

enabling 39-7

guidelines for configuring with CFS 39-3

guidelines for configuring without CFS 39-4

port security databases

cleaning up 39-17

copying 39-16

deleting 39-17

displaying configuration39-18to 39-19

displaying violations 39-20

interactions 39-14

manual configuration guidelines 39-4

merge guidelines 39-14

reactivating 39-7

scenarios 39-15

port speeds

configuring 13-14

configuring on Generation 2 switching module interfaces 15-23

displaying configuration 15-23

port swapping. See FICON port swapping

port tracking

default settings 58-8

description 58-1

displaying information 58-6

enabling 58-3

guidelines 58-2

monitoring ports in a VSAN 58-5

multiple ports 58-4

shutting down ports forcefully 58-5

port world wide names. See pWWNs

power cycling

modules 12-7

powering off

switching modules 12-9

power supplies

configuration guidelines11-11to 11-13

configuring modes 11-10

default state 11-21

displaying configuration 11-11

modes 9-7

power usage

displaying 11-10

preshared keys

RADIUS 34-10

TACACS+ 34-18

principal switches

assigning domain ID 18-9

configuring 18-10

private devices

TL ports 13-31

processes

displaying logs 60-3

nondisruptive restarts 10-1

restartability 10-4

profiles

configuring 32-2

modifying 32-3

prohibited ports

FICON 29-46

promiscuous mode

configuring Gigabit Ethernet interfaces 46-4

protocol 43-1

protocols

VRRP 43-6

proxies

registering for name servers 27-3

proxy initiator

configuringiSCSI

configuring proxy initiator 43-17

proxy initiator mode 43-10, 43-20

configuring 43-16

zoning 43-17

proxy initiator modeiSCSI

proxy initiator mode 43-16

Public Key Infrastructure. See PKI

pWWNs

configuring fcalias members 24-10

DPVM 22-1

rejecting duplicates 27-4

zone membership 24-2

Q

QoS

class maps 57-7

comparison with VSANs 57-6

control traffic support 57-4

creating class maps 57-7

data traffic support57-5to ??

default settings 57-14

description 57-1

displaying information 57-4, 57-10

DSCP value 41-24

DWRR queues 57-9

enabling control traffic 57-4

enabling for data traffic 57-7

example data traffic configuration 57-12

logging facilities 54-2

port rate limiting 57-14

service policies 57-8, 57-9

QoS values

configuring 43-28

R

RADIUS

AAA authentication 43-23, 43-48

AAA protocols 34-1

assigning host keys 34-8

CFS merge guidelines 34-32

CFS support 7-2

configuring Cisco ACS34-37to 34-40

configuring server groups 34-27

configuring server monitoring parameters 34-12

default settings 34-41

description 34-8

discarding configuration distribution changes 34-31

displaying configured parameters 34-16

enabling configuration distribution 34-29

sending test messages for monitoring 34-14

setting preshared keys 34-10

specifying server at user login 34-14

specifying servers34-8to 34-10

specifying server timeout 34-11

starting a distribution session 34-30

rate limiting

default settings 57-14

rate modes

configuring on Generation 2 switching module interfaces 15-24

verifying configuration 15-25

See also port rate modes

RCFs

description 18-3

incoming 18-6

rejecting incoming 18-6

read-only zones

configuration guidelines 24-23

configuring 24-23

default settings 24-41

description 24-23

reason codes

description 13-8

rebooting

switches 12-6

receive buffer groups. See buffer groups

receive data field sizes

configuring 13-16

reconfigure fabric frames. See RCFs

recovery

from powered-down state 15-18

redundancy

Ethernet PortChannels 41-6, 41-7

Fibre Channel PortChannels 41-7

VRRP 41-6

VSANs 20-4

redundancy mode

restoring 9-7

redundancy states

value descriptions 10-5

redundant physical links

example (figure) 26-3

Registered Link Incident Reports. See RLIRs

Registered State Change Notifications. See RSCNs

reloading

switches 12-6

Remote SPAN. See RSPAN

removing sessions 50-8

Resource Manager Essentials. See RME

retransmitting intervals

configuring for FSPF 26-8

description 26-8

RLIRs

clearing information 29-32

conditional receive 29-30

description 29-27

displaying information29-28to 29-31

specifying preferred host 29-27

RME

support 1-6

RMON

alarms 52-1

default settings 52-4

description 52-1

displaying information 52-4

enabling alarms 52-2

enabling events 52-2

events 52-1

role databases

clearing distribution sessions 32-6

committing changes to fabric 32-5

disabling distribution 32-6

discarding database changes 32-5

enabling distribution 32-6

roles

authentication 32-1

CFS support 7-2

configuring 32-2

configuring rules 32-2

default permissions 34-3

defaults 2-3

default setting 32-21

displaying information 32-6

distributing configurations32-4to 32-8

modifying profiles 32-3

user profiles 34-3

See also command roles

roles database

displaying information 32-6

roles databases

description 32-5

locking in the fabric 32-5

merge guidelines 32-6

route costs

computing 26-6

router discovery

IPv6 47-9

routing

multicast 26-12

See also broadcast routing

See also IP routing

routing protocols

disabling 26-6

RSA 1 key pairs

generating 32-15

rsa1 key pairs

generating 32-15

RSA key-pairs

deleting 36-15

description 36-2

displaying configuration 36-15

exporting 36-5, 36-13

generating 36-6

importing 36-5, 36-13

multiple 36-4

rsa key pairs

generating 32-15

RSCNs 43-12

clearing statistics 27-10

default settings 27-14

description 27-7

displaying information 27-8

logging facility 54-2

multiple port IDs 27-9

suppressing domain format SW-RSCNs 27-9

RSCN timers

CFS support 7-2

configuration distribution using CFS27-11to 27-14

configuring 27-10

displaying configuration 27-11

RSPAN

advantages 53-18

configuration guidelines 53-19

configuring 53-20

configuring explicit paths 53-27

default settings 53-32

description 53-17

displaying information 53-30

example configuration53-20to 53-26

explicit paths 53-26

monitoring traffic 53-20

monitoring traffic (example)53-28to 53-30

referencing explicit paths 53-28

tunnels 53-18

rules

configuring 32-2

runtime checks

static routes 26-10

S

SACKs

configuring in FCIP profiles 41-14

SAN extension package licenses

description 3-5

SAN extension tuner

assigning SCSI read/write commands 42-5, 42-7

configuring 42-2

configuring data patterns 42-8

configuring nWWNs 42-4

configuring virtual N ports 42-5

data patterns 42-3

default settings 42-10

description 42-1

initialization 42-4

license requirements 42-3

tuning guidelines 42-2

verifying configuration 42-9

SAN operating system. See Cisco MDS SAN-OS

SANTap 50-8

configuring DVTs 50-5

default settings 50-9

description50-1to 50-3

displaying information50-6to 50-8

enabling 50-4

removing appliance generated entities 50-8

SAs

clearing databases 37-29

displaying for IKE 37-31

displaying global lifetime values 37-35

establishing between IPsec peers 37-23

global lifetime values 37-30

lifetime negotiations 37-25

refreshing 37-16

setting lifetime 37-25

scalability

VSANs 20-4

scheduler. See command scheduler

schedules

assigning jobs 19-6, 19-8

command scheduler 19-1

deleting 19-8

deleting schedule time 19-9

one-time 19-7

periodic 19-6

specifying19-6to 19-9

specifying execution time 19-7

verifying configuration 19-8

SCP

copying images 8-26

scripts. See command scripts

SCSI

routing requests 43-2

SCSI flow configuration clients

description 48-3

SCSI flow data path support

description 48-3

SCSI flow managers

description 48-2

SCSI flow services

CFS support 7-2

configuring48-3to??, 48-3to 48-5

configuring identifiers 48-5

default settings 48-10

description 48-1

displaying 48-7

enabling 48-3

enabling configuration distribution 48-4

functional architecture (figure) 48-2

SCSI flow configuration clients 48-3

SCSI flow data path support 48-3

SCSI flow managers 48-2

SCSI flow statistics

clearing 48-6

default settings 48-10

description 48-5

displaying 48-7

enabling 48-6

SCSI LUNs

customized discovery 28-2

discovering targets 28-1

displaying information 28-2

starting discoveries 28-2

SD port mode

description 13-5

interface modes 13-5

SD ports

bidirectional traffic 53-15

characteristics 53-5

configuring 13-13

configuring for monitoring 53-6, 53-8

configuring for RSPAN 53-26

configuring for SPAN monitoring 53-6, 53-8

configuring SPAN 53-15

encapsulating frames 53-11

monitoring bidirectional traffic 53-15

RSPAN 53-17

SDV

IVR limitations 21-10

secondary MAC addresses

configuring 30-10

Secure Hash Algorithm. See SHA-1

Secure Shell Protocol

See SSH

Secure Shell Protocol. See SSH

security

accounting 34-3

managing on the switch 34-1

security associations. See SAs

security control

local 34-2, 34-34

remote 34-2, 34-17

remote AAA servers 34-8

security parameter index. See SPI

selective acknowledgments. See SACKs

sensors

temperature monitoring 11-15

SERDES loopback tests

performing 60-19

serial IDs

description 55-29

serial numbers

displaying 11-9

server IDs

description 55-29

service policies

applying 57-9

defining 57-8

enforcement 57-9

services modules

description 12-3

managing 12-1

power cycling 12-7

purging configurations 12-8

replacing 8-41

resetting 12-6

state descriptions 12-4

verifying status 12-4

setup

assigning information 5-5

configuring out-of-band access5-6to 5-10

initial procedure description5-2to 5-14

options 5-4

SFPs

displaying transmitter types 13-26

transmitter types 13-19

SHA-1

IKE 37-7

IPsec 37-6

shared rate mode

description 15-6

migrating from dedicated rate mode 15-21

migrating to dedicated rate mode 15-21

oversubscription 15-26

show commands

directing output to a file 2-20

site IDs

description 55-28

slot0:

description 2-25

formatting 2-26

small computer system interface. See SCSI

SMTP

server address 55-13

SNMP

access control 33-2

access groups 33-4

adding communities 33-7

assigning contact 33-2

assigning contact names 55-6

assigning location 33-2

configuring LinkUp/LinkDown notifications 33-12

configuring notification target users 33-12

configuring users from CLI 33-5

counter Information 33-15

creating roles 32-9

creating users 33-4

default settings 33-17

deleting communities 33-7

displaying information 52-4

displaying notification status 33-11

displaying security information 33-15

enabling SNMP notifications 33-10

encryption-based privacy 33-5

FICON control 29-21

group-based access 33-4

mapping CLI operations 32-9

modifying users 33-4

read-only access 33-7

read-write access 33-7

security features 34-2

server contact name 55-5

user synchronization with CLI 33-3

Version 3 security features 33-2

versions supported 33-1

See also SNMPv1; SNMPv2c; SNMPv3

SNMP manager

FCS 56-2

SNMPv1

community strings 33-2

description 33-2

See also SNMP

SNMPv2

community strings 33-2

SNMPv2c

configuring notifications 33-8

description 33-2

See also SNMP

SNMPv3

assigning multiple roles 33-7

CLI user managementSNMPv3

AAA integration 33-3

configuring notifications 33-9

description 33-2

enforcing message encryption 33-6

restricting switch access 33-4

security features 33-1, 33-2

specifying cisco-av-pair 34-15

See also SNMP 33-2

software configuration

overview1-6to 1-8

software images

compatibility considerations 8-28

default settings 8-42

selecting for supervisor modules 8-2

space requirements 8-5

synchronizing 10-4

upgrade prerequisites8-3to 8-5

upgrading SAN-OS images 8-1

variables 8-1

software upgrades

automated with install all command 8-7

BIOS images 8-29

disruptive 8-5

install all command 8-5

manual, dual supervisor modules8-26to 8-31

mechanisms 8-5

nondisruptive 10-1

quick 8-31

verifying status 8-20

soft zoning

description 24-13

See also zoning

source IDs

Call Home event format 55-29

exchange based 17-5

flow based 17-4

in-order delivery 26-13

path selection 20-10

SPAN

configuration guidelines 53-6

configuring53-6to 53-12

configuring Fibre Channel analyzers 53-13

configuring SD ports 53-6, 53-8, 53-15

conversion behavior 53-11

default settings 53-32

description 53-2

displaying information 53-15

egress sources 53-2

encapsulating frames 53-11

Fibre Channel analyzers 53-12

filters 53-5

monitoring traffic 53-2

SD ports 53-5

sessions 53-5

sources 53-4

sources for monitoring 53-2

VSAN sources 53-4

SPAN destination port mode. See SD port mode

SPAN filters

configuring 53-9

description 53-5

guidelines 53-5

SPAN sessions

configuring 53-7, 53-8

description 53-5

reactivating 53-11

suspending 53-11

VSAN filters 53-5

SPAN sources

configuring interfaces 53-14

egress 53-2

ingress 53-2

interface types 53-3

IPS ports 53-3

VSANs configuration guidelines 53-4

SPAN tunnel port mode. See ST port mode

special frames

enabling for FCIP 41-19

SPF

computational hold times 26-4

SPI

configuring virtual routers 44-23

SSH

clearing hosts 32-17

description 32-15

digital certificate authentication 32-19

displaying status 32-18

enabling 32-18

generating server key-pairs 32-15

logins 34-4

overwriting server key-pairs 32-16

protocol status 32-18

specifying keys 32-15

SSH key pairs

overwriting 32-16

SSH sessions

message logging 54-4

SSI boot images

configuring with install ssi command 12-25

configuring with SSI boot variable 12-23

verifying 12-20

SSI boot variables

verifying configuration 12-26

SSMs

Cisco SAN-OS release upgrade and downgrade considerations 12-29

default settings 12-31

features 12-18

Fibre Channel write acceleration49-1to 49-4

installing image for Intelligent Storage Services12-18to 12-27

managing 12-28

NASB51-1to 51-6

recovery after replacing CompactFlash 12-28

replacing considerations 12-28

SANTap50-1to ??

SCSI flow services48-1to 48-10

SCSI flow statistics48-1to 48-10

SSI boot image updating considerations 12-19

upgrading image for Intelligent Storage Services 12-19

standby supervisor modules

accessing file systems 9-8

boot alert 8-40

boot variable version 8-40

copying boot variables 10-4

managing bootflash: 8-40

monitoring 10-2

synchronizing 10-4

startup

description 5-2

startup configuration files

unlocking 9-5

statically imported iSCSI targets 43-61

static iSLB initiator

converting 43-43

static mapped iSCSI targetiSCSI

static mapped target 43-23

static mapping 43-43

static routes

runtime checks 26-10

static WWN mapping 43-20

storage devices

access control 24-1

permanent 2-25

temporary 2-25

Storage Services Enabler package licenses

description 3-7

store-and-forward routing mode 43-28

ST port mode

description 13-6

interface modes 13-6

limitations 13-6

ST ports

configuring for RSPAN 53-22

interface modes 13-6

RSPAN 53-17

RSPAN characteristics 53-19

subnet masks

configuring IPv4 routes 44-11

configuring mgmt0 interfaces 13-37

default setting 12-31

subnets

requirements 46-6

summer time

adjusting for 5-17

Supervisor-1 modules

migrating from Supervisor-2 modules (note) 8-33

modem initialization strings 5-32

selecting software images 8-2

Supervisor-2 modules

description 1-2

Generation 1 chassis 8-40

migrating from Supervisor-1 modules8-32to 8-40

modem initialization strings 5-32

select software images 8-2

USB ports 1-2

supervisor modules

active state 12-5

default settings 12-31

description 1-2, 12-1

displaying information 12-6

high availability 10-2

managing standby bootflash: 8-40

manual switchovers 10-2

migrating to Supervisor-2 modules8-32to 8-40

redundancy 10-1

replacing 8-32, 8-41

replacing considerations 12-28

resetting 12-6

standby boot alert 8-40

standby state 10-6, 12-5

standby supervisor boot variable version 8-40

state descriptions 10-6, 12-4

switchover mechanisms 10-2

switchovers after failures 10-1

synchronizing 10-4

verifying status 12-4

See also Supervisor 1 modules; Supervisor 2 modules

Switched Port Analyzer. See SPAN

switches

displaying power usage 11-10

displaying serial numbers 11-9

internal states 10-6

rebooting 12-6

reloading 12-6

switching modules

accessing 12-6

description 12-3

managing 12-1

power cycling 12-7

powering off 12-9

preserving configuration 12-8

purging configurations 12-8

reloading 12-7

replacing 8-41

resetting 12-6

state descriptions 12-4

verifying status 12-4

switch management

in-band 5-4, 44-6

out-of-band 5-4

switch names

assigning 5-15

switchover mechanism

warm state 12-5

switchovers

characteristics 10-2

guidelines 10-3

initiating manually 10-2

supervisor modules 10-1

VRRP 41-6

switch ports

configuring attribute default values 13-19

switch priorities

configuring 18-5

default 18-5

description 18-5

switch security

default settings 32-21, 34-40

sWWNs

configuring for fabric binding 40-3

syslog

CFS support 7-2

configuration distribution 54-8

fabric merge guidelines 54-10

system health

clearing error reports 60-16

configuring failure actions 60-14

default settings 60-26

displaying 60-20

displaying status 60-20

interpreting current status 60-19

testing modules 60-15

test run requirements 60-15

system images

description 8-2

selecting for supervisor modules 8-2

SYSTEM variable 8-1

system messages

configuring log files 54-6

configuring logging 54-3

configuring logging servers 54-6

default settings 54-15

displaying information54-10to 54-15

logging server 54-1

severity levels 54-3

system processes

displaying60-1to 60-4

displaying status60-4to 60-5

system statistics

CPU and memory 60-5

T

TACACS+

AAA authentication 43-48

AAA protocols 34-1

CFS merge guidelines 34-32

CFS support 7-2

configuring Cisco ACS34-37to 34-40

configuring server groups 34-28

default settings 34-41

description 34-17

discarding configuration distribution changes 34-31

displaying information 34-25

enabling 34-18

enabling configuration distribution 34-29

global keys 34-18

sending test messages for monitoring 34-23

setting global secret keys 34-20

setting preshared key 34-18

setting server addresses 34-18

setting server monitoring parameters 34-21

setting timeout value 34-20

specifying server at login 34-24

starting a distribution session 34-30

tape acceleration

FICON29-38to ??

target discovery 43-86

TCP connections

FCIP profiles 41-4

specifying number 41-20

TCP parameters

configuring in FCIP profiles41-13to41-17, ??to 41-18

TCP ports

IPv4-ACLs 35-3

TCP statistics

displaying 45-11

TCP tuning parameters 43-27

Telnet

default service 32-14

enabling 32-18

logins 34-4

Telnet server connections

description 5-27

disabling 5-28

Telnet sessions

message logging 54-4

temperatures

displaying 11-16

major thresholds 11-16

minor thresholds 11-16

monitoring hardware 11-15

TE port mode

classes of service 13-5

description 13-5

TE ports

fabric binding checking 40-2

FCS support 56-1, 56-2

fctrace 59-1

FSPF topologies 26-2

interoperability 30-14

recovering from link isolations 24-14

SPAN sources 53-3

trunking restrictions 16-1

terminal parameters

configuring2-17to 2-19

displaying settings 2-19

screen length 2-19

screen width 2-19

session timeout 2-17

terminal timeout 2-18

type 2-19

time

configuring 5-16

setting delay in CLI 2-34

time out values. See TOVs

timestamps

FICON host control 29-20

time zones

configuring 5-16

TL port mode

classes of service 13-5

description 13-5

TL ports

ALPA caches 13-30

configuring 13-13

description 13-29

displaying information 13-30

FCS 56-1, 56-2

FCS support 56-1, 56-2

logging facility 54-2

private devices 13-31

SPAN sources 53-3

virtual devices 13-31

tools

software configuration 1-5

TOVs

configuring across all VSANs 30-5

configuring for a VSAN 30-5

default settings 30-19

interoperability 30-13

ranges 30-4

traceroute commands

verifying routes 2-16

tracked ports

binding operationally 58-3

traffic isolation

VSANs 20-4

transform sets

configuring for IPsec 37-22

creating crypto map entries 37-24

description 37-21

transient failure 43-12

transit VSANs

configuration guidelines 23-12

description 23-3, 23-20

IVR configuration guidelines 23-18

translative loop port mode. See TL port mode

transparent initiator mode 43-10

transparent initiator modeiSCSI

transparent initiator mode 43-16

Triple DES. See 3DEC encryption

troubleshooting

Cisco Fabric Analyzer 59-4

collecting output for technical support 59-15

fcping 59-3

fctrace 59-1

loop monitoring 59-14

show tech-support command59-15to 59-22

SSM recovery 12-28

verifying switch connectivity 59-4

trunk-allowed VSAN lists

description16-4to 16-6

trunking

comparison with PortChannels 17-3

configuration guidelines 16-2

configuring modes 16-3

default settings 16-7

description 16-1

displaying information 16-6

interoperability 30-13

link state 16-3

merging traffic 16-2

restrictions 16-1

trunking E port mode. See TE port mode

trunking mode

FCIP interface 41-4

trunking ports

associated with VSANs 20-7

trunking protocol

default settings 16-7, 16-8

default state 16-2

description 16-2

detecting port isolation 16-2

trunk mode

administrative default 13-19

configuring 16-3, 16-4

default settings 16-7

status 16-3

trunk ports

displaying information 16-7

trust points

creating 36-8

description 36-2

multiple 36-3

saving configuration across reboots 36-12

U

UDP ports

IPv4-ACLs 35-3

unique area FC IDs

configuring 18-17

description 18-17

upgrades. See disruptive upgrades; nondisruptive upgrades; software upgrades

user accounts

configuring32-10to 32-14

configuring profiles 32-2

configuring roles 32-2

displaying information 32-13

password characteristics 32-11

user IDs

authentication 34-3

user profiles

role information 34-3

user roles. See roles

users

CFS support 7-2

configuring 32-12

deleting 32-12

description 32-11

displaying 2-14

displaying account information 32-13

logging out other users 32-13

sending messages 2-14

SNMP support 33-4

V

variables. See CLI variables

vendor-specific attributes. See VSAs

VE ports

description 41-2

FCIP 41-2

virtual devices

TL ports 13-31

virtual E ports. See VE ports

virtual Fibre Channel host 43-3

virtual ISLs

description 41-2

Virtual LANs. See VLANs

virtual router IDs. See VR IDs

Virtual Router Redundancy Protocol. See VRRP

Virtual Router Redundancy Protocolprotocols

Virtual Router Redundancy 43-40

virtual routers

adding 44-19

adding primary IP addresses 44-20

authentication 44-23

configuring for IPv4 44-19

configuring for IPv6 44-19

default settings 44-29

deleting 44-19

initiating 44-19

setting priorities 44-21

virtual SANs. See VSANs

VLANs

configuring on Gigabit Ethernet subinterfaces 46-6

description 46-5

volatile:

description 2-25

switch reboots 2-28

VR IDs

configuring for IPv4 44-19

configuring for IPv6 44-19

description 44-17

mapping 44-17

VRRP 43-40

algorithm for selecting Gigabit Ethernet interfaces43-51to 43-53

backup switches 44-17

clearing statistics 44-27

configuring advertisement time intervals 44-22

configuring for Gigabit Ethernet interfaces 45-6

configuring for iSLB 43-54

configuring virtual routers 44-19

configuring VR IDs for IPv4 44-19

configuring VR IDs for IPv6 44-19

default settings 44-29

description 44-17, 45-5

displaying information44-25to 44-27

displaying statistics 44-27

group members 45-5

initiating virtual routers 44-19

IQN formats 43-6

iSCSI parameter change impact 43-51

iSLB43-49to 43-55

logging facility 54-2

master switches 44-17

MD5 authentication 44-23

primary IP address 44-20

priority preemption 44-22

security authentication 44-23

setting priorities 44-21

setting priority 44-21

simple text authentication 44-23

VRRP group 43-18

VRRP-I f iSCSI login redirect 43-41

VSAN IDs

allowed list 16-8

description 20-5

multiplexing traffic 13-5

range 20-4

VSAN membership 20-4

VSAN interfaces

configuring 13-39

configuring IPv4 addresses 44-7

creating 13-40

description 13-39

displaying information 13-40

verifying configuration 44-7

VSAN membership

iSCSI hosts 43-17

iSCSI hostsiSCSI

VSAN membership for hosts 43-17

iSCSI interfaces 43-18

VSAN policies

default roles 32-21

licensing 32-3

modifying 32-4

VSANs

advantages 20-3

allowed-active 16-1

allowed list 53-4

broadcast addresses 26-12

cache contents 18-22

clocks 29-20

comparison with QoS 57-6

comparison with zones (table) 20-4

compatibility with DHCHAP 38-3

configuring20-6to ??

configuring allowed-active lists 16-6

configuring FSPF 26-4

configuring multiple IPv4 subnets 44-14

configuring policies 32-3

configuring trunk-allowed lists16-4to ??

default settings 20-12

default VSANs 20-8

deleting 20-9

description20-1to 20-4

displaying configuration 20-11

displaying membership 20-7, 20-8

displaying usage 20-12

domain ID automatic reconfiguration 18-7

example membership for iSCSI devices 43-18

fabric optimization for FICON 29-3

FC IDs 20-1

FCS 56-1

FCS support 56-1

features 20-1

FICON-enabled 20-11, 29-40

flow statistics 26-18

FSPF 26-5

FSPF connectivity 26-2

gateway switches 44-5

interop mode 30-13

IPFC interfaces 59-1

IP routing 35-1

IPv4 static routing 44-11

iSLB 43-44

iSLB initiators 43-44

isolated 20-8

load balancing 20-10

load balancing attributes 20-5

loop devices 13-31

mismatches 13-10

multiple zones 24-5

names 20-5

name server 27-3

operational states 20-9

overlaid routes 44-12

policies 32-3

port membership 20-7

port tracking 58-5

show tech-support vsan command 59-20

SPAN filters 53-5

SPAN source 53-4

SPAN sources 53-4

states 20-5

TE port mode 13-5

timer configuration 30-5

TOVs 30-5

traffic isolation 20-3

traffic routing between 44-1

transit 23-20

trunk-allowed 16-1

trunking ports 20-7

VRRP 44-17

VSAN trunking. See trunking

VSAs

communicating attributes 34-14

protocol options 34-15

W

window management

configuring in FCIP profiles 41-15

world wide names. See WWNs

WWNs

configuring 30-8

displaying information 30-9

link initialization 30-9

port security 39-10

secondary MAC addresses 30-10

static binding 43-16

suspended connections 13-10

X

XRC

FICON support 29-4

Z

zone attribute groups

cloning 24-17

zone databases

release locks 24-33

zones

access control 24-8

adding to zone sets 24-11

analyzing 24-40

assigning LUNs to storage subsystems 24-22

changing from enhanced zones 24-32

cloning 24-17

compacting for downgrading 24-40

comparison with device aliases (table) 25-2

comparison with VSANs (table) 20-4

configuring24-6to 24-11

configuring aliases 24-10

configuring and activating for iSLB 43-45

configuring broadcasting 24-20

configuring fcaliases 24-10

CUPs 29-41

default policies 24-2

default settings 24-41

differences with IVR zones (table) 23-28

displaying information24-24to 24-30

enforcing restrictions 24-13

exporting databases 24-15

features 24-1, 24-3

importing databases 24-15

iSLB 43-45, 43-46

IVR communication 23-28

logging facility 54-3

LUN-based 24-21

membership using pWWNs 20-4

merge failures 13-10

read-only for IVR 23-36

renaming 24-17

show tech-support zone command 59-18

See also default zones

See also enhanced zones

See also hard zoning; soft zoning

See also LUN zoning

See also read-only zones

See also zoning; zone sets

zone server databases

clearing 24-17

zone sets

activating 24-9

adding member zones 24-11

analyzing 24-40

cloning 24-17

configuring24-7to 24-10

considerations 24-5

copying 24-16

creating 24-11

default settings 24-41

displaying information24-24to 24-30

distributing configuration 24-13

enabling distribution 24-14

exporting 24-15

exporting databases 24-15

features 24-1

importing 24-15

importing databases 24-15

one-time distribution 24-14

recovering from link isolations 24-14

renaming 24-17

See also active zone sets

See also active zone sets; full zone sets

See also zones; zoning

zone traffic priorities

configuring 24-18

description 24-18

zoning

configuring broadcasting 24-20

description 24-1

example 24-2

implementation 24-3

See also LUN zoning

See also zones; zone sets

zoning based access control

configuring for iSCSI 43-20

configuring for iSCSIiSCSI

configuring zoning based access control 43-20