Table Of Contents
Symbols - Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Z
Index
Symbols
* (asterisk)
autolearned entries 39-14
first operational port 17-17
host time stamps 29-30
iSCSI node 43-87, 43-88
port security wildcard 39-9
port security wildcards 39-9
Numerics
12-port 4-Gbps switching modules
BB_credit buffers 15-12
configuration guidelines 15-22
default settings 15-38
See also switching modules
16-port switching modules
configuring BB_credits 13-33
LEDs 13-16
See also switching modules
24-port 4-Gbps switching modules
bandwidth fairness 15-31
configuration guidelines 15-21
default settings 15-38
example configurations 15-11, 15-36
oversubscription 15-26
shared resources 15-7
See also switching modules
32-port switching modules
configuring BB_credits 13-33
PortChannel configuration guidelines 17-2
SPAN guidelines 53-6
See also switching modules
3DES encryption
IKE 37-7
IPsec 37-6
48-port 4-Gbps switching modules
bandwidth fairness 15-31
configuration guidelines 15-21
default settings 15-38
example configurations 15-10, 15-37
oversubscription 15-26
shared resources 15-7
See also switching modules
4-port 10-Gbps switching modules
BB_credit buffers 15-13
configuration guidelines 15-22
default settings 15-38
See also switching modules
A
AAA
authentication process 34-6
authorization process 34-6
configuring accounting services34-35to 34-36
default settings 34-40
description 34-1
DHCHAP authentication 38-8
displaying error-enabled status 34-5
enabling server distribution 34-29
local services 34-34
remote services 34-4
setting authentication 34-34
starting a distribution session 34-30
AAA authentication
configuring 43-23
AAA servers
groups 34-4
monitoring 34-5
remote authentication 34-4
access control
enforcingiSCSI
enforcing access control 43-22
iSCSI 43-21
Access Control Lists. See IPv4-ACLs; IPv6-ACLs
access controlzoning based access controliSCSI
zoning based access control 43-22
accounting
configuring services34-35to 34-36
ACL adjacency sharing
disabling for downgrading 15-35
ACL based access control
configuring for iSCSI 43-21
ACLs
configuring for iSCSI 43-21
active zone sets
considerations 24-5
enabling distribution 24-14
address allocation cache
description 18-22
administrative speeds
configuring 13-14
administrative states
description 13-7
setting 13-12
administrator passwords
recovering (procedure 32-19
administrators
default passwords 5-6
password requirements (note) 5-7
Advanced Encrypted Standard encryption. See AES encryption
advertisement packets
setting time intervals 44-22
AES encryption
description 33-5
IKE 37-6
IPsec 37-6
SNMP support 33-5
AES-XCBC-MAC
IPsec 37-6
AFIDs
configuring 23-16, 23-17
configuring default 23-16
description 23-4, 23-7, 23-19
verifying database configuration 23-17
aliases. See command aliases; device aliases; fcaliases
ALPA caches
allocation 13-31
clearing 13-32
description 13-30
displaying contents 13-32
inserting entries manually 13-32
appliance generated entities
removing AVT LUNs 50-8
removing AVTs 50-8
removing ITLs 50-9
removing SANTap sessions 50-8
application virtual targets. See AVTs
ARP
clearing entries 44-12
displaying entries 44-12
ARP caches
clearing 46-9
displaying 46-9
authentication
CHAP option 43-67
fabric security 38-1
guidelines 34-4
iSCSI setup 43-66
local 34-3, 43-24
MD5 44-23
mechanism 43-24
mutual CHAPmutual CHAP authentication 43-25
remote 34-3, 34-4
restricting iSLB initiatorinitiator authentication
restrictingiSLB
restricting iSLB initiators 1
simple text 44-23
user IDs 34-3
See also MD5 authentication
See also simple text authentication
authentication, authorization, and accounting. See AAA
authorization
role-based 32-1
rule placement order 32-3
autogenerated iSCSI targetiSCSI
autogenerated target 43-23
auto mode
configuring 13-13
auto-negotiation
configuring Gigabit Ethernet interfaces 46-3
autonomous fabric ID
See AFIDs
autonomous fabric identifiers. See AFIDs
AutoNotify
description 55-5
destination profile (note) 55-7
auto port mode
description 13-6
interface configuration 13-3
autosensing speed
Generation 2 switching modules 13-15
auto-topology
configuration guidelines 23-12
IVR 23-6
AVTs
description 50-2
removing 50-8
B
bandwidth fairness
disabling 15-32
enabling 15-32
Generation 2 switching modules 15-31
banner message
configuring 2-19
BB_credit buffers
12-port 4-Gbps switching module allocations 15-12
12-port 4-Gbps switching module considerations 15-13
24-port 4-Gbps switching module allocations 15-11
24-port 4-Gbps switching module considerations 15-11, 15-12
48-port 4-Gbps switching module considerations 15-9
4-port 10-Gbps switching module allocations 15-13
4-port 10-Gbps switching module considerations 15-14
allocation defaults (table) 15-9
BB_credits
configuring 13-33
description 13-32
FICON port swapping 29-37
reason codes 13-9
BB_SC
enabling 15-34
beacon modes
configuring 13-17
description 13-17
identifying LEDs 13-16
Berkeley Packet Filter. See BPF
BIOS images
upgrading 8-29
bit errors
reasons 13-18
bit error thresholds
configuring 13-18
description 13-18
bootflash:
copying files 8-26
description 2-25
file system 8-2
initializing 2-25
kickstart images 2-25
recovering from corruption 2-25
space requirements 8-4
system images 2-25
bootloader
nondisruptive upgrades 8-27
boot variables
configuring automatic copying to standby supervisor modules 10-4
synchronizing 10-4
border switches
description 23-4
IVR configuration guidelines 23-18
BPF
library 59-13
B port mode
description 13-6
interface modes 13-6
B ports
configuring 41-23
interoperability mode 41-22
SAN extenders 41-23
bridge port mode. See B port mode
bridge ports. See B ports
broadcast
in-band addresses default 12-31
routing 26-12
Brocade
native interop mode 30-13
buffer pools
Generation 2 switching modules 15-8
buffer sizes
configuring in FCIP profiles 41-17
buffer-to-buffer credits. See BB_credits
buffer-to-buffer start change. See BB_SC
build fabric frames
description 18-3
C
Call Home
alert groups55-9to 55-12
AutoNotify feature 55-5
CFS support 7-2
configuration distribution 55-16
configuring55-5to 55-18
configuring e-mail options 55-13
configuring SMTP servers 55-14
contact information 55-6
database merge guidelines 55-18
default settings 55-23
description 55-1
destination profiles55-7to 55-9
displaying information55-19to 55-20
duplicate message throttle 55-16
enabling 55-16
features 55-2
inventory notifications 55-15
message format options 55-2
RMON-based alerts 55-13
syslog-based alerts 55-12
testing communications 55-18
Call Home alert groups
configuring 55-9
customizing messages 55-11
description 55-9
verifying customization configuration 55-12
Call Home contacts
assigning information 55-6
Call Home destination profiles
attributes 55-7
configuring 55-7
description 55-7
displaying 55-19
Call Home messages
configuring levels 55-12
format options 55-2
Call Home notifications
full-txt format for syslog 55-21
XML format for RMON 55-23
XML format for syslog 55-22
capture filters
description 59-13
permitted 59-13
CAs
authenticating 36-8
certificate download example 36-19
configuring36-5to 36-15
creating a trust point 36-8
default settings 36-38
deleting digital certificates 36-14
description36-1to 36-5
displaying configuration 36-15
enrollment using cut-and-paste 36-4
example configuration36-15to 36-37
identity 36-2
maintaining 36-13
maximum limits 36-37
monitoring 36-13
multiple 36-4
multiple trust points 36-3
peer certificates 36-4
purpose 36-2
CDP
clearing counters 5-37
clearing tables 5-37
configuring5-36to 5-40
configuring hold times 5-37
configuring refresh time interval globally 5-37
configuring versions 5-37
disabling globally 5-36
disabling on Gigabit Ethernet interfaces 5-36
displaying information 5-37
packet transmission interval 5-36
certificate authorities. See CAs
certificate revocation lists. See CRLs
CFS
application requirements 7-5
configuring for NTP 5-23
default settings 7-17
description7-1to 7-4
disabling on a switch 7-4
displaying status on a switch 7-5
distribution modes 7-4
distribution over IP 7-11
distribution scopes 7-3
enabling on a switch 7-4
feature description 7-2
iSLB config distribution 43-55
logging configuration distribution 54-8
merge support 7-8
protocol description 7-3
SAN-OS features supported 7-2
saving configurations 7-8
verifying CFS merge status 7-9
CFS applications
clearing session locks 7-8
committing changes 7-7
discarding changes 7-8
enabling 7-5
fabric locking 7-6
verifying lock status 7-7
verifying registration status 7-6
CFS over IP
configuring IP multicast addresses 7-13
default settings 7-17
description 7-11
enabling 7-12
verifying configuration 7-13
verifying multicast address 7-14
CFS regions
assigning features 7-16
creating 7-16
description 7-15
dissolving 7-17
moving a feature 7-16
using CLI 7-16
CHAP authentication 43-23, 43-48
configuring for iSCSI 43-67
CHAP challenge 43-25
CHAP response 43-25
CHAP user name 43-25
CIM
configuring 30-1
configuring security on a server 30-2
description 30-1
displaying information 30-2
CIM servers
configuring security 30-2
displaying information 30-2, 30-4
Cisco Access Control Server. See Cisco ACS
Cisco ACS
configuring for RADIUS34-37to 34-40
configuring for TACACS+34-37to 34-40
cisco-av-pair
specifying for SNMPv3 34-15
Cisco Discovery Protocol. See CDP
Cisco Fabric Analyzer
clearing hosts 59-9
configuring 59-6
description 59-4
displaying captured frames 59-9
displaying filters 59-9
GUI-based client 59-6
local text-based capture 59-6
remote capture daemon 59-6
See also fcanalyzer
Cisco Fabric Service. See CFS
Cisco MDS 9000 Family
connecting a terminal 5-27
description 1-1
initial setup5-2to 5-14
starting switches 5-2
Cisco MDS 9100 Series
Cisco MDS 9120 switches 1-4
Cisco MDS 9124 switches 1-4
Cisco MDS 9140 switches 1-4
description 1-4
high availability 10-1
overview 1-4
Cisco MDS 9120 switches
description 1-4
Cisco MDS 9140 switches
description 1-4
Cisco MDS 9200 Series
Cisco MDS 9216A switches 1-3, 1-4
Cisco MDS 9216i switches 1-3
Cisco MDS 9216 switches 1-4
connecting a terminal 5-27
description 1-3
high availability 10-1
Cisco MDS 9216
supervisor modules 12-2
Cisco MDS 9216A switches
description 1-3, 1-4
Cisco MDS 9216i switches
configuring extended BB_credits 13-35
description 1-3
Cisco MDS 9216 switches
description 1-4
Cisco MDS 9500 Series
Cisco MDS 9506 Directors 1-2
Cisco MDS 9509 Directors 1-2
Cisco MDS 9513 Directors 1-2
description 1-2
high availability 10-1
Cisco MDS 9506 Directors
description 1-2
Cisco MDS 9509 Directors
description 1-2
supervisor modules 12-2
Cisco MDS 9513 Directors
description 1-2
supervisor modules 12-2
Cisco MDS SAN-OS
downgrading 8-31
software images 8-1
Cisco vendor ID
description 34-15
class maps
configuring for data traffic 57-7
creating 57-7
CLI
command hierarchy2-4to 2-9
command modes 2-3
command navigation 2-9
command prompt 2-2
command scripts 2-33
description 1-5
getting help 2-10
saving output to files 2-32
setting delay time 2-34
CLI variables
description 2-21
persistent variables 2-22
session-only variables 2-21
system-defined variables 2-23
using in command scripts 2-34
clock modules
description 11-19
displaying status 11-19
cloud discovery. See iSNS cloud discovery
code pages
FICON text string formatting 29-19
COM1 ports
configuring settings 5-29
verifying settings 5-30
command aliases
defining 2-24
description 2-23
command-line interface. See CLI
command scheduler
configuring 19-2
default settings 19-11
defining jobs 19-4
deleting jobs 19-6
description 19-1
enabling 19-3
execution logs 19-10
specifying schedules19-6to 19-9
verifying execution status 19-9
See also execution logs; jobs; schedules
command scripts
executing 2-33
using CLI variables 2-34
Common Information Model. See CIM
common roles
configuring 32-8
common users
mapping CLI to SNMP 32-9
CompactFlash
slot0: 8-2
CompactFlash. See external CompactFlash
company IDs
FC ID allocations 30-10
configuration
clearing 2-14
displaying 2-11
overview1-6to 1-8
restoring redundancy mode 9-7
rolling back to previous 9-7
saving 2-14
saving automatically for FICON 29-22
software tools 1-5
configuration files
backing up 9-6
copying 9-5
deleting 9-8
displaying 9-1
downloading 9-2
FICON 29-33
saving 9-3
saving across the fabric 9-4
configuration limits
description (table) A-1
configuring NPV 14-8
congestion control methods. See FCC; edge quench congestion control
congestion window monitoring. See CWM
console logging
configuring 54-4
console ports
configuring settings 5-28
verifying settings 5-28
console sessions
message logging severity levels 54-4
contact information
assigning for Call Home 55-6
Contiguous Domain ID Assignments
About 18-14
contract IDs
description 55-28
control traffic
disabling QoS 57-4
enabling for QoS 57-4
Control Unit Port. See CUP in-band management
control virtual targets. See CVTs
core dumps
IPS modules 45-4
kernel 60-10
saving to CompactFlash 60-8
core files
clearing directory 60-8
copying manually 60-7
copying periodically 60-7
displaying information 60-6
saving to external devices 60-7
CRLs
configuring 36-14
configuring revocation checking methods 36-9
description 36-5
downloading example 36-33
generation example 36-32
importing example36-35to 36-37
crossbars
compatibility with Generation 1 modules 11-15
description 11-14
management 11-13
removal considerations 11-14
crypto IPv4-ACLs
any keyword 37-20
configuration guidelines 37-17
creating 37-21
creating crypto map entries 37-24
mirror images 37-19
crypto map entries
configuring global lifetime values 37-30
global lifetime values 37-29
setting SA lifetimes 37-25
crypto maps
auto-peer option 37-26
configuration guidelines 37-24
configuring autopeer option 37-27
configuring perfect forward secrecy 37-28
creating entries 37-24
entries for IPv4-ACLs 37-23
perfect forward secrecy 37-27
SA lifetime negotiations 37-25
SAs between peers 37-23
crypto map sets
applying to interfaces 37-28
CUP in-band management
blocking restriction 29-25
description 29-40
displaying information 29-41
placing CUPs in zones 29-41
current directory
displaying 2-28
setting 2-27
current VSANs
description 23-3
Cut-through routing mode 43-28
CVTs
description 50-2
CWM
configuring in FCIP profiles 41-15
D
Data Encryption Standard encryption. See DES encryption
data traffic
applying service policies 57-9
class maps 57-7
comparing VSANs and QoS 57-6
defining service policies 57-8
displaying information 57-10
DWRR queues 57-9
enabling QoS 57-7
enforcing service policies 57-9
example configuration 57-12
data virtual targets. See DVTs
dates
configuring 5-16
daylight saving time
adjusting for 5-17
dead time intervals
configuring for FSPF 26-8
description 26-7
dedicated rate mode
description 15-6
migrating from shared rate mode 15-21
migrating to shared rate mode 15-21
default gateways. See IPv4 default gateways
default networks. See IPv4 default networks
defaults
setting with no commands 2-10
default users
description 5-3
default VSANs
description 20-8
default zones
configuring access permissions 24-9
configuring QoS priorities 24-19
description 24-9
interoperability 30-13
policies 24-9
deficit weighted round robin schedulers. See DWRR schedulers
DES encryption
IKE 37-7
IPsec 37-6
destination IDs
exchange based 17-5
flow based 17-4
in-order delivery 26-13
path selection 20-10
device alias database
committing changes 25-4
disabling distribution 25-5
discarding changes 25-4
distribution to fabric 25-3
enabling distribution 25-5
merging 25-7
overriding fabric lock 25-5
device aliases
CFS support 7-2
clearing statistics 25-7
comparison with zones (table) 25-2
creating 25-3
default settings 25-11
description 25-1
displaying information25-7to 25-10
features 25-1
modifying the database 25-2
requirements 25-2
device allegiance
FICON 29-22
device IDs
Call Home format 55-29
Device Manager
description 1-6
DH
IKE 37-6
DHCHAP
AAA authentication 38-8
authentication modes 38-4
compatibility with other SAN-OS features 38-3
configuring38-2to 38-10
configuring AAA authentication 38-8
default settings 38-12
description 38-1
displaying security information 38-9
enabling 38-3
group settings 38-6
hash algorithms 38-5
licensing 38-2
passwords for local switches 38-6
passwords for remote devices 38-7
sample configuration38-10to 38-11
timeout values 38-8
See also FC-SP
differentiated services code point. See DSCP
Diffie-Hellman Challenge Handshake Authentication Protocol. See DHCHAP
Diffie-Hellman protocol. See DH
digital certificates
configuration example36-16to 36-19
configuring36-5to 36-15
default settings 36-38
deleting from CAs 36-14
description36-1to 36-5
exporting 36-5, 36-13
generating requests for identity certificates 36-10
importing 36-5, 36-13
installing identity certificates 36-11
IPsec37-7to 37-10
maintaining 36-13
maximum limits 36-37
monitoring 36-13
peers 36-4
purpose 36-2
requesting identity certificate example 36-23
revocation example 36-29
SSH support 32-19
digital signature algorithm. See DSA key pairs
direct memory access devices. See DMA-bridges
directories
creating 2-29
deleting 2-29
deleting files 2-31
display current 2-28
listing files 2-29
moving files 2-29, 2-30
display filters
defining 59-10
examples59-10to 59-13
selective viewing 59-9
DMA-bridges
displaying statistics 45-10
DNS
default settings 44-29
DNS hosts
displaying information 44-28
DNS servers
configuring 44-27
documentation
additional publications 1-lxviii
related documents 1-lxviii
domain ID
CFS support 7-2
domain IDs
allowed lists 18-10
assignment failures 13-10
configuring allowed lists 18-11
configuring CFS distribution18-11to 18-13
configuring fcalias members 24-10
contiguous assignments 18-14
description 18-7
distributing 18-2
enabling contiguous assignments 18-14
interoperability 30-13
IVR configuration guidelines 23-18
non-unique and IVR NAT 23-5
preferred 18-9
static 18-9
unique 23-18
domain manager
fast restart feature 18-4
isolation 13-10
domain names
defining 44-28
Domain Name System servers. See DNS servers
downgrading
Cisco MDS SAN-OS releases 8-31
disabling ACL adjacency sharing 15-35
DPVM
CFS support 7-2
default settings 22-13
description 22-1
displaying configurations 22-10
enabling 22-2
requirements 22-2
sample configuration22-11to 22-13
DPVM databases
autolearned entries 22-4
clearing 22-5
comparing differences 22-9
configuring CFS distribution22-5to 22-8
copying 22-9
description 22-3
displaying 22-10
enabling autolearning 22-5
merging guidelines 22-8
drivers
iSCSI 43-2
drop latency time
configuring for FSPF in-order delivery 26-17
displaying information 26-17
DSA key-pairs
generating 32-15
dsa key pairs
generating 32-15
DSCP
configuring 41-24
DVTs
configuring 50-5
description 50-2
DWRR queues
changing weights 57-10
DWRR schedulers
description 57-5
dynamic bandwidth management
description 15-6
dynamic iSCSI initiator
converting 43-43
convert to staticiSCSI
convert dynamic initiator to static 43-14
dynamic mapping 43-6, 43-43
dynamic mappingiSCSI
dynamic mappingiSCSI
static mappingstatic mapping 43-5
Dynamic Port VSAN Membership. See DPVM
E
EBCDIC
FICON string format 29-19
edge quench congestion control
description 57-2
edge switches
description 23-4
edge VSANs
description 23-3
EFMD
fabric binding 40-1
EISLs
PortChannel links 17-1
e-mail addresses
assigning for Call Home 55-6
e-mail notifications
Call Home 55-1
encrypted passwords
user accounts 32-12
enhanced ISLs. See EISLs
enhanced zones
advantages over basic zones 24-30
broadcast frames 24-36
changing from basic zones 24-31
configuring default full database distribution 24-37
configuring default policies 24-35
configuring default switch-wide zone policies 24-37
creating attribute groups 24-33
default settings 24-41
description 24-30
displaying information24-37to 24-40
enabling 24-32
merging databases 24-34
modifying database 24-33
enterprise package licenses
description 3-4
entity status inquiry. See ESI
EPLD images
downgrading 12-16
upgrading 12-13
E port mode
classes of service 13-4
description 13-4
E ports
32-port guidelines 13-2
32-port switching module configuration guidelines 17-3
configuring 13-13, 41-24
fabric binding checking 40-2
FCS support 56-1
FSPF topologies 26-2
isolation 13-10
recovering from link isolations 24-14
SPAN sources 53-3
trunking configuration 16-3
ESI
non-resp threshold 43-85
ESI retry count 43-85
Ethernet MAC statistics
displaying 45-10
Ethernet PortChannels
adding Gigabit Ethernet interfaces 45-9
configuring 45-8
description 45-7
iSCSI 43-65
redundancy 41-6
Exchange Fabric Membership Data. See EFMD 40-1
exchange IDs
in-order delivery 26-13
load balancing 59-1
path selection 20-10
exchange link parameter. See ELP
execution logs
clearing log files 19-10
configuring 19-10
description 19-10
displaying configuration 19-10
displaying log file contents 19-10
expansion port mode. See E port mode
expiry alerts
licenses 3-15
explicit fabric logout 43-11
extended BB_credits
configuring 13-36
description 13-34
displaying information 13-37
Generation 2 switching modules 15-15
licensing 15-15
Extended Binary-Coded Decimal Interchange Code. See EBCDIC 29-19
external CompactFlash
description 2-25
devices 8-27
formatting 2-26
recovering from corruption 2-26
slot0: 2-25
supported devices 2-26
external loopback tests
description 60-18
performing 60-18
external RADIUS server
CHAP 43-67
external RADIUS servers
CHAP 43-67
external servers
configuring for kernel cores 60-11
F
fabric binding
activation 40-4
checking for Ex ports 40-2
clearing statistics 40-6
compatibility with DHCHAP 38-3
configuration40-3to 40-6
default settings 40-9
deleting database 40-6
description40-1to 40-2
EFMD 40-1
enforcement 40-2
forceful activation 40-5
licensing requirements 40-1
port security comparison 40-1
saving configurations 40-5
verifying configuration40-6to 40-9
Fabric Configuration Server. See FCS
Fabric Configuration Servers. See FCSs
Fabric-Device Management Interface. See FDMI
fabric login. See FLOGI
fabric loop port mode. See FL port mode
Fabric Manager
description 1-6
Fabric Manager Server package license
description 3-6
fabric port mode. See F port mode
fabric pWWNs
zone membership 24-2
fabric reconfiguration
fcdomain phase 18-2
fabrics
See also build fabric frames
fabrics. See RCFs; build fabric frames
fabric security
authentication 38-1
default settings 38-12
Fabric Shortest Path First. See FSPF
fabric WWNs. See fWWNs
facility logging
configuring message severity levels 54-5
failure actions
configuring 60-14
fan module LEDs
failure status 11-17
fan modules
description 11-17
displaying status 11-17
failures 11-17
fault tolerant fabrics
example (figure) 26-2
fcaliases
cloning 24-17
configuring for zones 24-10
creating 24-10
renaming 24-17
fcanalyzer
displaying filters 59-9
See also Cisco Fabric Analyzer
FCC
assigning priority 57-3
benefits 57-1
default settings 57-14
description 57-1
displaying settings 57-3
enabling 57-2
frame handling 57-2
logging facility 54-2
process 57-2
fcdomains
autoreconfigured merged fabrics 18-6
configuring CFS distribution18-11to 18-13
default settings 18-22
description 18-2
disabling 18-5
displaying information18-19to 18-22
domain IDs 18-7
domain manager fast restart 18-4
enabling 18-5
enabling autoreconfiguration 18-7
incoming RCFs 18-6
initiation 18-5
overlap isolation 13-10
restarts 18-3
show tech-support fcdomain command 59-21
switch priorities 18-5
FC ID allocation
FICON implementation 29-14
FC IDs
allocating 18-2, 30-10
allocating default company ID lists 30-10
allocating for FICON 29-13
allocation for HBAs 30-10
configuring fcalias members 24-10
description 18-14
persistent18-15to ??
FCIP 43-1
advanced features 41-27
compatibility with DHCHAP 38-3
compression 41-36
configuring41-7to41-17, ??to 41-18
default parameters 41-39
discarding packets 41-21
enabling 41-8
FICON support 29-4
Gigabit Ethernet ports 46-1
high availability41-4to 41-7
IPS modules 41-2
IP storage services support 45-1
link failures 41-5
MPS-14/2 module 41-2
reserving ports for FICON 29-12
sample IPsec configuration37-35to 37-39
specifying number of TCP connections 41-20
tape acceleration41-30to 41-36
time stamps 41-21
VE ports 41-2
virtual ISLs 41-2
VRRP 41-6
write acceleration 41-27
FCIP compression
configuring 41-37
description 41-36
displaying information 41-38
FCIP interfaces
binding to FICON port numbers 29-24
configuring advanced features41-18to41-24, ??to 41-24
configuring peers 41-18
configuring QoS 41-24
configuring special frames 41-19
creating 41-18
displaying information 41-25
parameters 41-4
SPAN sources 53-3
FCIP links
B port interoperability mode 41-22
configuring 41-8
configuring peers 41-18
configuring QoS 41-24
creating 41-10
description 41-3
endpoints 41-3
initiating IP connections 41-20
TCP connections 41-3
FCIP listener ports
configuring 41-12
FCIP peers
configuring IP addresses 41-19
enabling special frames 41-20
FCIP profiles
configuring listener ports 41-12
configuring TCP parameters41-13to41-17, ??to 41-18
creating 41-9
description 41-4
displaying information 41-9
FCIP tape acceleration
configuring 41-34
description41-30to 41-34
displaying information 41-35
FCIP TCP parameters
configuring buffer size 41-17
configuring CWM 41-15
configuring keepalive timeouts 41-13
configuring maximum jitter 41-16
configuring maximum retransmissions 41-14
configuring minimum retransmit timeouts 41-13
configuring PMTUs 41-14
configuring SACKs 41-14
configuring window management 41-15
displaying 41-17, 41-18
FCIP write acceleration
configuring 41-29
description 41-27
displaying information 41-29
FCP
intermixing protocols 29-5
routing requests 43-3
fcping
default settings 59-30
invoking 59-3
verifying switch connectivity 59-4
FCS
description 56-1
logging facility 54-2
significance 56-2
FC-SP
authentication 38-1
enabling 38-3
See also DHCHAP
FCSs
configuring names 56-3
default settings 56-7
description 56-1
displaying information56-4to 56-7
fctimers
CFS support 7-2
displaying configured values 30-8
distribution 30-6
fctrace
default settings 59-30
invoking 59-1
FDMI
description 27-5
displaying database information 27-6
Federal Information Processing Standards. See FIPS
Fiber Channel interfaces
configuring system default port mode f 13-13
Fibre Channel 43-1
iSCSI targets43-5to 43-9
sWWNs for fabric binding 40-4
time out values30-4to 30-8
Fibre Channel Analyzers
configuring using SPAN 53-14
Fibre Channel analyzers
monitoring without SPAN 53-12
Fibre Channel Congestion Control. See FCC
Fibre Channel domains. See fcdomains
Fibre Channel interface
default settings 13-40
Fibre Channel interfaces
administrative states 13-7
BB_credits 13-32
characteristics13-1to 13-12
configuring 13-11
configuring auto port mode 13-13
configuring beacon modes 13-17
configuring bit error thresholds 13-18
configuring descriptions 13-15
configuring frame encapsulation 13-16
configuring port modes 13-13
configuring receive data field sizes 13-16
configuring speeds 13-14
deleting from PortChannels 17-13
disabling 13-12
displaying capabilities on Generation 2 switching modules 15-20
displaying information13-20to 13-27
displaying VSAN membership 20-8
enabling 13-12
extended BB_credits 13-34
graceful shutdown 13-12
modes13-3to 13-6
operational states 13-7
performance buffers 13-34
reason codes 13-8
states 13-7
taking out of service on Generation 2 switching modules 15-33
troubleshooting operational states 13-9
See also interfaces 13-7
Fibre Channel over IP. See FCIP
Fibre Channel Protocol. See FCP
Fibre Channel protocol analyzers. See Cisco Fabric Analyzer
Fibre Channel Security Protocol. See FC-SP
Fibre Channel targets
dynamic importing 43-7
dynamic mapping 43-7
Fibre Channel traffic
SPAN sources 53-3
Fibre Channel write acceleration
default settings 49-4
description 49-1
displaying configuration 49-2
enabling 49-2
estimating number of write buffers 49-1
licensing 49-1
modifying number of write buffers 49-2
Fibre Channel zoning-based access control 43-22
Fibre Connection. See FICON
FICON
advantages on MDS switches29-3to 29-6
automatic configuration save 29-22
basic configuration 29-15
cascading 29-7
clearing device allegiance 29-22
configuration files29-32to ??
configuring29-14to 29-23
configuring ports29-23to 29-32
CUP in-band management 29-40
default settings 29-49
description29-1to 29-7
displaying information29-42to 29-49
fabric binding requirements 40-3
FC4 protocols 29-2
FC ID allocations 29-13
FCIP support 29-4
host timestamp control 29-20
implemented ports 29-10
installed ports 29-11
manually enabling 29-18
MDS-supported features 29-5
PortChannel support 29-4
port numbering29-7to 29-14
port swapping29-36to 29-38
prohibited ports 29-46
RLIRs29-27to ??
saving configuration changes 29-22
sWWNs for fabric binding 40-4
tape acceleration29-38to ??
text string formatting codes 29-19
unimplemented port 29-10
VSAN offline state 29-40
FICON configuration files
applying to running configuration 29-33
copying 29-35
description 29-33
displaying 29-34
displaying information 29-44
editing 29-33
FICON port numbers
assigning to slots 29-11
default numbering scheme 29-8
displaying assignments 29-12
FCIP interfaces 29-12
implemented addresses 29-10
installed ports 29-11
logical interfaces 29-12
numbering guidelines 29-11
PortChannel interfaces 29-12
port swapping 29-10
reserved numbering scheme 29-10
unimplemented addresses 29-10
uninstalled ports 29-11
FICON ports
assigning address names 29-26
binding to FCIP interfaces 29-24
binding to PortChannels 29-24
blocking 29-24
configuring prohibiting default state 29-25
displaying address information 29-43
displaying administrative states 29-46
prohibiting 29-25
swapping configurations 29-37
FICON port swapping
guidelines 29-36
FICON tape acceleration
configuration considerations 29-39
configuring 29-39
description 29-38
files
compressing 2-32
copying 2-30
deleting 2-31
displaying checksums 2-28
displaying contents 2-31
displaying last lines 2-32
moving 2-29
uncompressing 2-32
file systems
accessing standby supervisor modules 9-8
creating directories 2-29
deleting directories 2-29
displaying current directory 2-28
formatting 2-25
listing files 2-29
redirection 2-32
setting current directory 2-27
specifying 2-27
volatile: 2-25
File Transfer Protocol. See FTP
FIPS
configuration guidelines 31-2
self-tests 31-2
Flash devices
bootflash: 2-25
description 2-24
external CompactFlash 2-25
formatting 2-25
FLOGI
description 27-1
displaying details 27-1
logging facility 54-2
flow statistics
clearing 26-19
counting 26-18
description 26-18
displaying 26-19
FL port mode
classes of service 13-4
description 13-4
FL ports
configuring 13-13
description 13-4
DPVM support 22-4
fctrace 59-1
nonparticipating code 13-10
persistent FC IDs 18-15
SPAN sources 53-3
See also Fx ports
F port mode
classes of service 13-4
description 13-4
F ports
configuring 13-13
description 13-4
DPVM support 22-4
SPAN sources 53-3
See also Fx ports
FPSF
load balancing (example) 41-5
frame encapsulation
configuring 13-16
frames
configuring MTU size 46-3
FSCN
displaying databases 28-3
FSPF
clearing counters 26-9
clearing VSAN counters 26-6
computing link cost 26-7
configuring globally26-4to 26-6
configuring Hello time intervals 26-7
configuring link cost 26-6
configuring on a VSAN 26-5
configuring on interfaces26-6to 26-9
dead time intervals 26-7
default settings 26-22
description 26-2
disabling 26-6
disabling on interfaces 26-9
disabling routing protocols 26-6
displaying database information 26-20
displaying global information 26-20
displaying information??to 26-22
enabling 26-6
fail-over with PortChannels 26-3
fault tolerant fabrics 26-2
flow statistics26-18to 26-20
in-order delivery26-13to 26-18
interoperability 30-14
link state record defaults 26-4
multicast root switches 26-12
reconvergence times 26-2
redundant links 26-3
resetting configuration 26-5
resetting to defaults 26-5
retransmitting intervals 26-8
routing services 26-1
topology examples26-2to 26-4
FSPF multicast roots
configuring switches 26-12
FSPF routes
configuring 26-10
description 26-10
FSPF routing
multicast 26-12
FTP
logging facility 54-2
full core dumps
IPS modules 45-4
full zone sets
considerations 24-5
enabling distribution 24-14
fWWNs
configuring fcalias members 24-10
Fx ports
32-port default 13-2
configuring 13-13
description 13-6
FCS 56-1
FCS support 56-1
interface modes 13-6
VSAN membership 20-4
See also F ports; FL ports 13-6
G
Generation 1 switching modules
combining with Generation 2 switching modules??to 15-20
extended BB_credits 13-35
port index allocations 15-16
QoS behavior 57-10
Generation 2 switching modules
buffer groups15-8to 15-14
combining with Generation 1 switching modules??to 15-20
configuring15-20to ??
configuring port speeds 15-23
configuring rate modes 15-24
default settings 15-38
description15-1to ??
disabling ACL adjacency sharing 15-35
displaying port resources 15-33
dynamic bandwidth management 15-6
example configurations15-36to 15-37
extended BB_credits 13-36, 15-15
installing in Generation 1 chassis 8-40
interface capabilities 15-20
out-of-service interfaces 15-7
port groups 15-2
port index allocations 15-16
port rate modes 15-4
QoS behavior 57-10
recovering from powered-down state 15-18
releasing shared resources 15-34
taking interfaces out of service 15-33
Gigabit Ethernet interface example 43-63
Gigabit Ethernet interfaces
configuring??to 45-9
configuring auto-negotiation 46-3
configuring CDP 5-36
configuring high availability45-5to 45-9
configuring IPv4 46-2
configuring IPv6 addresses 47-12
configuring MTU frame sizes 46-3
configuring promiscuous mode 46-4
configuring static IPv4 routing 46-7
configuring VRRP 45-6
default parameters 46-10
displaying statistics45-9to 45-13
IPv4-ACL guidelines 46-7
subinterfaces 46-6
subnet requirements 46-6
verifying connectivity 46-4
Gigabit Ethernet subinterfaces
configuring VLANs 46-6
global keys
assigning for RADIUS 34-10
H
hardware
default settings 11-21
displaying inventory 11-1
displaying temperatures 11-16
overview 1-1
hard zoning
description 24-13
HA solution example 43-61
HBA port 43-11, 43-16
HBA ports
configuring area FCIDs 18-17
HBAs
device aliases 25-1
FC ID allocations 30-10
Hello time intervals
configuring for FSPF 26-7
description 26-7
help
from the CLI 2-10
high availability
automatic synchronization 10-5
compatibility with DHCHAP 38-3
description 10-1
displaying status 10-5
Ethernet PortChannel 43-65
Ethernet PortChannels 41-6
Fibre Channel PortChannels 41-7
licensing 3-8
process restartability 10-4
protection against link failures 10-1
software upgrades 8-5
supervisor module switchover mechanism 10-2
switchover characteristics 10-2
synchronizing supervisor modules 10-4
VRRP 41-6, 43-64
VRRPVRRP-based high availability 43-64
host control
FICON 29-19
host keys
assigning 34-8
host names
configuring for digital certificates 36-6
I
IBM PPRC
FICON support 29-4
ICMP
displaying statistics 45-12
IPv6 47-6
ICMP packets
IPv6 header format, figure 47-6
type value 35-4
IDs
Cisco vendor ID 34-15
contract IDs 55-28
serial IDs 55-29, 55-33
site IDs 55-28
IKE
algorithms for authentication 37-6
default settings 36-38, 37-41
description 37-3
displaying configurations 37-30
enabling 37-11
initializing 37-10
refreshing SAs 37-16
terminology 37-5
transforms for encryption 37-6
IKE domains
clearing 37-16
configuring 37-11
description 37-11
IKE initiators
configuring version 37-16
displaying configuration 37-30
IKE peers
configuring keepalive times 37-15
displaying keepalive configuration 37-30
IKE policies
configuring lifetime associations 37-15
configuring negotiation parameters 37-13
displaying current policies 37-30
negotiation 37-11
IKE tunnels
clearing 37-16
description 37-11
images
See kickstart images; software images; system images
images. See kickstart images; software images; system images
in-band management
CUP 29-40
IPFC 44-6
indirect link failures
recovering 58-1
initiators
statically mapped iSCSI 43-40
initiator-target-LUNs. See ITLs
in-order delivery
configuring drop latency time 26-17
displaying status 26-16
enabling for VSANs 26-16
enabling globally 26-16
guidelines 26-15
reordering network frames 26-13
reordering PortChannel frames 26-15
install all command
benefits 8-7
examples 8-12
failure cases 8-8
remote location path (caution) 8-17
requirements 8-5
usage 8-8
Intelligent Storage Services
Fibre Channel write acceleration49-1to 49-4
installing SSI boot images12-18to 12-27
SCSI flow services48-1to 48-10
SCSI flow statistics48-1to 48-10
traffic disruption 12-20
upgrading SSI boot images 12-19
interfaces
adding to PortChannels 17-11
assigning to VSANs 20-7
configuring descriptions 13-15
configuring fcalias members 24-10
default settings 13-40
deleting from PortChannels 17-13
displaying information13-20to 13-27
displaying SFP information 13-26
forced addition to PortChannels 17-12
isolated states 17-11
suspended states 17-11
VSAN membership 20-7
internal bootflash:. See bootflash:
internal loopback tests
description 60-17
performing 60-17
Internet Control Message Protocol. See ICMP
Internet Key Exchange. See IKE
Internet Storage Name Service. See iSNS
interoperability
configuring interop mode 1 30-15
description 30-12
verifying status 30-16
VSANs 20-11
interop modes
configuring mode 1 30-15
default settings 30-19
description 30-12
Inter-VSAN Routing. See IVR
Inter-VSAN Routing zones. See IVR zones
Inter-VSAN Routing zone sets. See IVR zone sets
inventories
configuring notifications 55-15
IOD. See in-order delivery
IP addresses
configuring Cisco Fabric Analyzer 59-8
SMTP server 55-14
IP connections
active mode 41-20
initiating 41-20
passive mode 41-20
IP domain names
configuring for digital certificates 36-6
IPFC
configuration guidelines 44-6
configuring VSAN interfaces 44-7
description 44-6
enabling IPv4 routing 44-7
example configuration44-8to 44-10
logging facility 54-2
IP filters
contents 35-2
restricting IP traffic 35-1
IP Network Simulator tool 59-22
IPS core dumps. See core dumps
IPsec
algorithms for authentication 37-6
crypto IPv4-ACLs37-16to 37-21
default settings 37-41
description 37-2
digital certificate support37-7to 37-10
displaying configurations37-31to 37-35
fabric setup requirements 37-4
global lifetime values 37-29
hardware compatibility 37-4
licensing requirements 37-3
maintenance 37-28
prerequisites 37-3
RFC implementations 37-1
sample FCIP configuration37-35to 37-39
sample iSCSI configuration37-39to 37-41
terminology 37-5
transform sets 37-21
transforms for encryption 37-6
unsupported features 37-4
IP security. See IPsec
IPS modules
CDP support 45-9
core dumps 45-4
FCIP 41-2
partial core dumps 45-4
port modes 46-1
software upgrades 45-3
supported features 45-1
IPS ports 43-6
modes 46-1
multiple connections 43-63
SPAN sources 53-3
IP storage services
default parameters 45-13
IP Storage services modules. See IPS modules
IPv4
configuring Gigabit Ethernet interfaces 46-2
configuring management interfaces 44-3
configuring virtual routers 44-19
default settings 46-10
description 46-1
displaying statistics 46-9
transitioning to IPv6 47-19
IPv4-ACLs
adding entries 35-7
applying to interfaces 35-9
clearing counters 35-12
configuration guidelines 35-2
creating 35-5
crypto37-16to 37-21
crypto map entries 37-23
defining filters 35-6
displaying configuration 35-8
guidelines for Gigabit Ethernet interfaces 46-7
operands 35-6
reading dump logs 35-9
removing entries 35-7
verifying interface configuration 35-11
IPv4 addresses
adding for VRRP 44-20
configuring fcalias members 24-10
configuring in VSANs 44-7
configuring IPv6 and IPV6 protocol stacks 47-13
IPv6 protocol stacks 47-10
IPv4 default gateways
configuring 5-26, 44-4, 44-5
configuring mgmt0 interfaces 13-37
description 44-3
IP static routing 44-4
static routes (tip) 44-5
verifying configuration 44-4
IPv4 default networks
description 44-4
IPv4 routing
configuring Gigabit Ethernet interfaces 46-7
disabling 44-7
displaying route tables 46-7
enabling 44-7
verifying configuration 44-7
IPv4 static routing
configuring 44-11
description 44-11
verifying configuration 44-11
IPv6
address types 47-3
configuring addressing 47-11
configuring IPv4 and IPv6 addresses 47-13
configuring management interfaces 44-3
configuring neighbor discovery parameters 47-15
configuring virtual routers 44-19
default settings 47-20
description47-1to 47-11
displaying information 47-19
dual IPv4 and IPv6 protocol stack applications, figure 47-11
dual IPv4 and IPv6 protocol stacks 47-10
dual IPv4 and IPv6 protocol stack technique, figure 47-10
enabling routing 47-11
enhancements over IPv4 47-1
ICMP 47-6
IPv6-ACL guidelines 47-18
neighbor discovery 47-7
path MTU discovery 47-7
router advertisement messages 47-9
router discovery 47-9
stateless autoconfiguration 47-9
static routes 47-17
transitioning from IPv4 47-19
verifying basic connectivity 47-13
verifying configuration 47-13
IPv6-ACLs
defining 35-6
guidelines for IPv6 47-18
operands 35-7
IPv6 addresses
adding for VRRP 44-20
configuring 47-11
configuring fcalias members 24-2, 24-10
configuring IPv4 and IPV6 protocol stacks 47-13
formats 47-2
link-local type 47-4
multicast type 47-5
prefix format 47-3
unicast type 47-3
IPv6 neighbor discovery
advertisement messages 47-7
description 47-7
neighbor solicitation message, figure 47-8
solicitation messages 47-7
IPv6 routing
enabling 47-11
IPv6 static routes
configuring 47-17
displaying the route table 47-17
IQN
formats 43-6
IQNs
formats 43-6
ISCSI
enforcing access control 43-22
iSCSI
access control43-19to 43-23
add initiator to zone database 43-21
advanced VSAN membershipadvanced VSAN membership 43-19
checking for WWN conflicts 43-15
compatible drivers 43-2
configuring43-1, 43-1to??, 43-4, ??to 43-66
configuring AAA authentication 43-23, 43-24
configuring ACLs 43-21
configuring VRRP 43-64
default parameters 43-96
discovery phase 43-22
displaying global information 43-34
displaying statistics 43-31
drivers 43-2
enabling 43-4
error 43-10
Fibre Channel targets43-5to 43-9
Gigabit Ethernet ports 46-1
GW flagiSCSI
gateway device 43-11
HA with host without multi-path software 43-60
initiator idle timeoutinitiator idle timeout
iSCSIinitiator idle timeout
configuring with Fabric Manager 1
initiator name 43-25
IPS module support 45-2
IQNs 43-9
login redirect 43-41
LUN mapping for targets43-73to 43-79
MPS-14/2 module support 45-2
multiple IPS ports 43-63
PortChannel-based high availability 43-65
PortChannel-based high availabilityEthernet PortChannel-based high availability 43-65
protocol 43-2
requests and responses 43-3
restrict an initiator to a specific user name for CHAP authentication 43-25
routing 43-2
routing modes chartrouting modes chart for iSCSI 43-29
sample IPsec configuration37-39to 37-41
session creation 43-23
statically mapped initiators 43-40
transparent initiator mode 43-11
transparent mode initiator43-68to 43-73
users with local authentication 43-24
VSAN membership 43-17
VSAN membership example 43-18
VSAN membership for iSCSI interfaces 43-17
iSCSI authentication
CHAP option 43-67
configuring 43-23, 43-48
configuring mechanisms 43-24
external RADIUS servers 43-67
global override 43-24
local authentication 43-24
mechanisms 43-24
restricting on initiators 43-25
scenarios 43-66
setup guidelines 43-66
iSCSI-based access control 43-21
iSCSI devices
example membership in VSANs 43-18
iscsi-gw 43-16
iSCSI high availability
configuring43-59to 43-66
ISCSI hosts
VSAN membership 43-17
iSCSI hosts
initiator identification 43-9
initiator presentation modes 43-10
initiator presentation modesinitiator presentation modes 43-10
iSCSI initiators
assigning WWNs 43-14
configuring dynamic IP address mapping 43-13
configuring static IP address mapping 43-13, 43-14
displaying information43-36to 43-39
displaying proxy information 43-33
dynamic mapping 43-12
idle timeout 43-12
making dynamic WWN mapping static 43-14
proxy mode 43-16
static mapping 43-13
transparent mode 43-11
verifying configuration 43-45
WWN assignments 43-12
iSCSI interfaces
configuring43-9, 43-9to 43-30
configuring listener ports 43-27
configuring listener portsiSCSI
listener port 43-27
configuring QoS 43-28
configuring routing mode43-28to 43-30
configuring routing modesiSCS
configuring routing modesrouting modes 43-28
configuring TCP tuning parameters 43-27
creating 43-5
creatingiSCSI
creating interfaces 43-5
displaying information 43-30
SPAN sources 53-3
VSAN membership 43-18
iSCSI LUs 43-6
iSCSI protocol 43-1
iSCSI server load balancing 43-39
iSCSI Server Load Balancing. See iSLB
iSCSI sessions
authentication43-23to 43-26
displaying information 43-34
iSCSI targets
advertising 43-7
dynamic importing 43-6
dynamic mapping 43-6
examples 43-8
secondary access 43-61
static importing 43-7
static importingstatic mappingiSCSI targets
static mapping 43-7
transparent failover43-59to 43-63
iSCSI users
displaying information 43-39
iSCSI virtual targets
displaying information 43-39
iSLB
activating zones 43-45, 43-46
auto-zoning 43-55
CFS support 7-2
committing configuration changescommitting configuration changes
iSLB 43-56
configuration distribution43-55to ??, 43-55
configuration prerequisites 43-41
configuring 43-39
configuring initiators and targets 43-45
configuring VRRP 43-54
configuring zones 43-45, 43-46
default settings 43-97
distributing configuration using CF 43-55
dynamic initiator mapping 43-43
enabling configuration distribution 43-56
initiator WWN assignment 43-39
load balancing algorithm43-51to 43-53
static initiator configurationinitiator configuration
static iSLB 43-40
VSAN membership 43-44
zone set activation failed 43-47
iSlb
default settings 43-97
iSLB initiators 43-41
activating zones 43-46
assigning WWNs 43-43
configuring43-41to 43-49
configuring IP addresses 43-42
configuring load balancing metrics 43-45
configuring names 43-42
configuring static name mapping 43-42
configuring zones 43-46
description 43-41
dynamic initiator mapping 43-43
VSAN membership 43-44
iSLB initiator targets
activating zones 43-46
configuring 43-46
configuring zones 43-46
description 43-45
iSLB sessions
authentication 43-48
authenticationiSLB
sessions authentication 43-48
iSLB VRRP
displaying information 43-54
enabling 43-54
verifying configuration 43-54
ISLs
PortChannel links 17-1
iSMS servers
enabling 43-85
iSNS
CFS support 7-2
client registration 43-86
cloud discovery 43-93, 43-96
configuring 43-87
configuring servers43-84to 43-87
description 43-79
ESI 43-85
iSNS client
description 43-79
iSNS clients
creating profiles 43-80
verifying configuration 43-81
iSNS cloud discovery
automatic 43-95
CFS distribution 43-95
description 43-93
displaying statistics 43-96
enabling 43-94
initiating on-demand 43-95
verifying configuration 43-95
verifying membership 43-96
verifying status 43-96
iSNS profiles
creating 43-80
verifying configuration 43-81
iSNS servers
configuration distribution 43-85
configuring ESI retry count 43-85
description 43-83
displaying configurations43-87to 43-93
enabling 43-85
example scenario 43-83
isolated VSANs
description 20-8
displaying membership 20-9
ITLs
description 50-9
removing 50-9
IVR
activating topologies 23-20
AF IDs 23-19
auto-topology 23-6
border switch 23-4
border switch, guidelines 23-18
border switch configuration guidelines 23-18
border switches 23-4
configuration distribution with CFS 23-10
configuration task lists 23-8
configuring23-8to 23-27
configuring logging levels 23-27
configuring without auto topology 23-17
configuring without IVR NAT 23-17
current VSANs 23-3
database merge guidelines 23-36
databases 23-10
default settings 23-44
default zone policy 23-28
description 23-2
domain ID configuration guidelines 23-18
domain ID guidelines 23-18
edge switch 23-4
edge switches 23-4
edge VSANs 23-3
enabling 23-9
example configuration23-39to 23-44
features 23-3
Fibre Channel header modifications 23-4
interoperability 23-8
logging 23-27
native VSANs 23-3
paths 23-3
persistent FC IDs 23-25
read-only zoning 23-36
SDV limitations 21-10
service groups23-14to 23-16
sharing resources 23-2
terminology 23-3
transit VSAN configuration guidelines 23-18
transit VSANs 23-3
virtual domains 23-23
VSAN topologies 23-6
zone communication 23-28
zones23-3, 23-28to 23-30
zone sets 23-3
IVR databases
active 23-10
configured 23-10
merge guidelines 23-36
pending 23-10
IVR logging
configuring levels 23-27
IVR logging levels
verifying configuration 23-27
IVR NAT
auto-topology 23-6
border switch, guidelines 23-12
configuration guidelines 23-12
description 23-5
enabling 23-14
load balancing 23-5
transit VSANs, guidelines 23-12
IVR persistent FC IDs
configuring 23-26
persistent 23-25
verifying configuration 23-26
IVR service groups
activation 23-8
characteristics 23-7
clearing 23-15
configuring 23-14
copying active 23-15
default 23-7
description 23-4, 23-14
IVR configuration guidelines 23-13
verifying configuration 23-15
IVR topologies
adding IVR-enabled switches 23-21
CFS support 7-2
clearing manual entries 23-22
configuring automatic discovery 23-13
configuring manually23-19to 23-23
copying active topologies 23-22
manually activating 23-20
migrating from automatic mode to user-configured mode 23-23
verifying configuration 23-22
IVR virtual domains
clearing 23-24
configuring 23-24
description 23-23
verifying configuration 23-24
IVR zones
activating with force option 23-31
automatic creation 23-29
clearing database 23-36
configuring23-30to ??
configuring LUNs 23-34
configuring QoS attributes 23-35
description 23-3, 23-28
differences with zones (table) 23-28
downgrading considerations 23-36
LUN zoning 23-34
maximum number of members 23-4
maximum number of zones 23-4
renaming 23-36
verifying configuration 23-32
verifying QoS configuration 23-35
IVR zone sets
activating 23-32
configuring23-30to 23-32
deactivating 23-32
description 23-3, 23-28
downgrading considerations 23-36
maximum number 23-4
renaming 23-36
verifying configuration 23-32
J
jitter
configuring estimated maximum in FCIP profiles 41-16
jobs
assigning to a schedule 19-6, 19-8
command scheduler 19-1
defining 19-4
deleting 19-6
removing from a schedule 19-9
verifying definition 19-5
jumbo frames. See MTUs
K
keepalive timeouts
configuring in FCIP profiles 41-13
kernel core dumps
configuring external servers 60-11
configuring for modules 60-11
description 60-10
displaying information 60-11
kickstart images
description 8-2
KICKSTART variable 8-1
selecting for supervisor modules 8-2
L
latency
forwarding 43-28
LEDs
beacon mode states 13-16
speed 13-17
license key files
backing up 3-12
description 3-2
installing 3-10
installing to remote locations 3-12
obtaining 3-10
updating 3-10
licenses
claim certificate 3-2
description 3-1
displaying host IDs 3-10
displaying information 3-11, 3-16
enterprise package 3-4
expiry alerts 3-15
extended BB_credits 13-35, 15-15
Fabric Manager Server package 3-6
factory-installed 3-9
feature-based 3-3
features supported (table) 3-4
grace period alerts 3-15
grace period expiration 3-15
high availability 3-8
identifying features in use 3-12
installation options 3-8
installing manually 3-9
key files3-10to 3-12
mainframe package 3-6
module-based 3-3
obtaining 3-9
on-demand port activation 4-1
PAK 3-2
SAN extension package 3-5
Storage Services Enabler package 3-7
terminology 3-1
transferring between switches 3-16
uninstalling 3-13
updating 3-14
limits
description (table) A-1
line cards. See switching modules; services modules
link costs
configuring for FSPF 26-7
description 26-6
link failures
protection against 10-1
recovering 58-1
Link Incident Records. See LIRs
link-local addresses
description 47-4
format, figure 47-4
link redundancy
Ethernet PortChannel aggregation 45-7
LIRs
description 29-27
load balancing 43-40, 43-41
attributes 20-10
attributes for VSANs 20-5
configuring 20-11
description 17-4, 20-10
FSPF (example) 41-5
guarantees 20-11
PortChannels 17-1
PortChannels (example) 41-5
weighted 43-45
load metric 43-45
lock the fabric 43-56
log files
configuring 54-6
copying manually 60-7
copying periodically 60-7
default names 54-6
description 60-5
displaying information 60-6
sizes 54-6
logging
default settings 54-15
disabling 54-4
enabling 54-4
message severity levels 54-3
logical unit numbers. See LUNs
logins
SSH 34-4
Telnet 34-4
loopback tests
configuring frame lengths 60-14
configuring frequency 60-13
external 60-17, 60-18
SERDES 60-19
loop monitoring 59-14
default settings 59-31
description 59-14
enabling 59-15
verifying configuration 59-15
LUN 43-6
LUN mapping 43-61
iSCSI43-73to 43-79
LUNs
displaying automatically discovered SCSI targets 28-4
displaying customized discovered SCSI targets 28-4
displaying discovered SCSI targets 28-3
explicit access control 43-16
IVR zoning 23-34
mapping and assignment 43-16
LUN zoning
configuring 24-22
description 24-21
LUs 43-5, 43-6
M
MAC addresses
configuring secondary 30-10
mainframe package licenses
description 3-6
mainframes
FICON parameters 29-20
VSAN clock 29-20
management access
description 5-14
in-band5-4, 5-10to 5-14
obtaining remote access 5-25
out-of-band5-4, 5-6to 5-10
using force option during shutdown 5-26
management interfaces
configuring 13-37, 13-38
configuring for IPv4 44-3
configuring for IPv6 44-3
default settings 13-40
displaying information 13-39
features 13-38
See also mgmt0 interfaces
maximum retransmissions
configuring in FCIP profiles 41-14
McData
native interop mode 30-13
MD5 authentication
IKE 37-7
IPsec 37-6
VRRP 44-23
merged fabrics
autoreconfigured 18-6
Message Authentication Code using AES. See AES-XCBC-MAC
Message Digest 5. See MD5 authentication
mgmt0 interfaces
configuring 5-25, 13-37, 13-38
configuring IPv4 addresses 44-3
configuring IPv6 addresses 44-3
default settings 13-40
features 13-38
local IPv4 routing 44-5
Microsoft Challenge Handshake Authentication Protocol. See MSCHAP
minimum retransmit timeouts
configuring in FCIP profiles 41-13
modems
configuration guidelines 5-31
configuring5-30to 5-35
configuring default initialization strings 5-33
configuring user-specified initialization strings 5-34
connecting on COM1 ports 5-30
connecting on console ports 5-30
enabling connections 5-32
initialization strings 5-32
initializing connection on a powered-on switch 5-34
verifying connection configuration 5-35
module configuration
purging 12-8
module configurations
saving to NVRAM 12-7
modules
configuring kernel core dumps 60-11
configuring message logging 54-5
displaying temperatures 11-16
preserving the configuration 12-7
purging configurations 12-8
replacing 8-41
resetting 12-6
state descriptions 12-4
temperature monitoring 11-15
testing health 60-15
verifying status 5-15, 12-4
monitoring traffic
RSPAN 53-20
SPAN 53-6
monitor sessions
message logging severity levels 54-4
MPS-14/2 modules 43-1, 43-2, 43-3, 43-5, 43-16, 43-22
CDP support 45-9
configuring extended BB_credits 13-35
FCIP 41-2
port modes 46-1
software upgrades 45-3
supported features 45-1
upgrading software 8-11
MSCHAP
description 34-33
MTUs
configuring frame sizes 46-3
configuring size
path discovery for IPv6 47-7
multicast addresses
IPv6 alternative to broadcast addresses 47-6
IPv6 format, figure 47-5
IPv6 solicited-node format, figure 47-6
multicast root switches
configuring 26-12
description 26-12
multi-path software example 43-60
multiple VSANs
configuring 44-14
Multiprotocol Services modules. See MPS-14/2 modules
mutual CHAP authentication
configuring for iSCSI 43-25
configuring for iSLB 43-48
configuring for iSLBI 43-48
N
name servers
displaying database entries 27-4
interoperability 30-14
LUN information 28-1
proxy feature 27-3
registering proxies 27-3
rejecting duplicate pWWNs 27-4
NASB
default settings 51-6
displaying information 51-4
enabling 51-3
target rediscovery 51-4
NAT. See IVR NAT
native VSANs
description 23-3
neighbor discovery
configuring parameters 47-15
verifying configuration 47-16
Network-Accelerated Serverless Backup. See NASB.
Network Address Translation. See IVR NAT
network administrators
additional roles 34-3
permissions 2-3, 34-3
network operators
permissions 2-3, 34-3
Network Time Protocol. See NTP
NL ports
fctrace 59-1
hard zoning 24-13
interface modes 13-6
zone enforcement 24-13
node world wide names. See nWWNs
nondisruptive upgrades
methods 8-5
None authentication 43-23
nonparticipating codes
description 13-10
NPIV
description 13-7
enabling 13-15
NP links 14-4
N port identifier virtualization. See NPIV
N ports
fctrace 59-1
hard zoning 24-13
zone enforcement 24-13
zone membership 24-2
See also Nx ports
NL ports
See also Nx ports
NP-ports 14-4
NPV, configuring 14-8
NPV mode 14-3
NTP
CFS support 7-2
configuration guidelines 5-19
configuring5-19to 5-24
configuring CFS distribution 5-23
logging facility 54-2
time-stamp option 41-21
nWWNs
DPVM 22-1
Nx ports
FCS support 56-1
See also N ports; NL ports
O
OBFL
configuring for modules 60-24
configuring for the switch 60-23
description 60-22
displaying configuration status 60-24, 60-25
displaying logs 60-26
OHMS
description 60-12
initiation 60-13
interpreting current status 60-19
on-board failure logging. See OBFL
On-Demand Port activation license
acquiring for ports 4-11
configuring4-10to 4-12
default configuration 4-4
description 4-1
example configuration 4-13
making ports eligible 4-11
port licensing 4-2
port naming conventions 4-2
Online Certificate Status Protocol. See OCSP
Online Health Management System. See OHMS
operational states
configuring on Fibre Channel interfaces 13-13
description 13-7
OSCP
support 36-5
out-of-service interfaces
description 15-7
overlay VSANs
configuring 44-13
description 44-12
oversubscription
disabling restrictions 15-28
enabling restrictions 15-31
Generation 2 switching modules 15-26
ratios 15-26
P
packets
discarding in FCIP 41-21
pass-thru routing mode 43-28
passwords
administrator 5-3
default for administrators 5-6
DHCHAP 38-6, 38-7
encrypted 32-12
recovering (procedure) 32-19
requirements for administrators 5-7
setting administrator default 5-6, 5-10
strong characteristics 32-11
path MTUs. See PMTUs
PDU 43-28
performance buffers
configuring 13-34
description 13-34
persistent domain ID
FICON VSANs 40-3
persistent FC IDs
configuring 18-16
description 18-15, 23-25
displaying 18-20
enabling 18-15
purging 18-19
ping commands
verifying connectivity 2-15
PKI
enrollment support 36-4
PLOGI
name server 27-4
PMTUs
configuring in FCIP profiles 41-14
port addresses
FICON 29-10
PortChannel
interfaces 43-7
subinterfaces 43-7
PortChannel modes
description 17-8
PortChannel Protocol
autocreation 17-15
configuring autocreation 17-16
converting autocreated groups to manually configured 17-17
creating channel group 17-14
description 17-13
enabling autocreation 17-16
PortChannels
32-port switching module configuration guidelines 17-2
adding interfaces 17-11
administratively down 13-10
binding to FICON port numbers 29-24
comparison with trunking 17-3
compatibility checks 17-11
compatibility with DHCHAP 38-3
configuration guidelines 17-8
configuring17-6to ??
configuring Fibre Channel routes 26-11
configuring for FCIP high availability 41-5
creating 17-8
default settings 17-20
deleting 17-10
deleting interfaces 17-13
description 17-1
examples 17-2
FICON support 29-4
forcing interface additions 17-12
Generation 2 switching module interfaces 15-18
high availability 10-1
in-order guarantee 26-15
interface states 17-11
interoperability 30-14
IQN formats 43-6
link changes 26-15
link failures 26-3
load balancing 17-4
load balancing (example) 41-5
logging facility 54-2
member combinations 45-7
misconfiguration error detection 17-8
redundancy 41-7
reserving ports for FICON 29-12
show tech-support port-channel command 59-19
SPAN sources 53-3
verifying configurations17-17to 17-20
port groups
assigning extended BB_credits 13-35
description 15-2
Generation 2 Fibre Channel switching modules 15-2
port indexes
description 15-16
port modes
auto 13-6
description13-3to 13-6
IPS 46-1
port numbers. See FICON port numbers
port rate limiting
configuring 57-14
default 57-14
description 57-14
hardware restrictions 57-14
port rate modes
configuring 15-24
dedicated 15-6
description 15-4
oversubscribed 15-6
shared 15-6
See also rate modes
ports
aggregation 10-1
on-demand port activation licensing 4-1
virtual E 41-2
VSAN membership 20-7
port security
activating 39-5
activation 39-3
activation rejection 39-6
adding authorized pairs 39-11
auto-learning 39-2
CFS support 7-2
cleaning up databases 39-17
compatibility with DHCHAP 38-3
configuration guidelines 39-3
configuring CFS distribution39-11to 39-14
copying databases 39-16
database interactions 39-14
database merge guidelines 39-14
data scenarios 39-15
deactivating 39-5
default settings 39-20
deleting databases 39-17
disabling 39-5
displaying configuration39-18, 39-18to 39-20
enabling 39-5
enforcement mechanisms 39-2
fabric binding comparison 40-1
forcing activation 39-6
license requirement 39-2
preventing unauthorized accesses 39-1
unauthorized accesses prevented 39-1
WWN identification 39-10
port security auto-learning
description 39-2
device authorization 39-8
disabling 39-8
distributing configuration 39-13
enabling 39-7
guidelines for configuring with CFS 39-3
guidelines for configuring without CFS 39-4
port security databases
cleaning up 39-17
copying 39-16
deleting 39-17
displaying configuration39-18to 39-19
displaying violations 39-20
interactions 39-14
manual configuration guidelines 39-4
merge guidelines 39-14
reactivating 39-7
scenarios 39-15
port speeds
configuring 13-14
configuring on Generation 2 switching module interfaces 15-23
displaying configuration 15-23
port swapping. See FICON port swapping
port tracking
default settings 58-8
description 58-1
displaying information 58-6
enabling 58-3
guidelines 58-2
monitoring ports in a VSAN 58-5
multiple ports 58-4
shutting down ports forcefully 58-5
port world wide names. See pWWNs
power cycling
modules 12-7
powering off
switching modules 12-9
power supplies
configuration guidelines11-11to 11-13
configuring modes 11-10
default state 11-21
displaying configuration 11-11
modes 9-7
power usage
displaying 11-10
preshared keys
RADIUS 34-10
TACACS+ 34-18
principal switches
assigning domain ID 18-9
configuring 18-10
private devices
TL ports 13-31
processes
displaying logs 60-3
nondisruptive restarts 10-1
restartability 10-4
profiles
configuring 32-2
modifying 32-3
prohibited ports
FICON 29-46
promiscuous mode
configuring Gigabit Ethernet interfaces 46-4
protocol 43-1
protocols
VRRP 43-6
proxies
registering for name servers 27-3
proxy initiator
configuringiSCSI
configuring proxy initiator 43-17
proxy initiator mode 43-10, 43-20
configuring 43-16
zoning 43-17
proxy initiator modeiSCSI
proxy initiator mode 43-16
Public Key Infrastructure. See PKI
pWWNs
configuring fcalias members 24-10
DPVM 22-1
rejecting duplicates 27-4
zone membership 24-2
Q
QoS
class maps 57-7
comparison with VSANs 57-6
control traffic support 57-4
creating class maps 57-7
data traffic support57-5to ??
default settings 57-14
description 57-1
displaying information 57-4, 57-10
DSCP value 41-24
DWRR queues 57-9
enabling control traffic 57-4
enabling for data traffic 57-7
example data traffic configuration 57-12
logging facilities 54-2
port rate limiting 57-14
service policies 57-8, 57-9
QoS values
configuring 43-28
R
RADIUS
AAA authentication 43-23, 43-48
AAA protocols 34-1
assigning host keys 34-8
CFS merge guidelines 34-32
CFS support 7-2
configuring Cisco ACS34-37to 34-40
configuring server groups 34-27
configuring server monitoring parameters 34-12
default settings 34-41
description 34-8
discarding configuration distribution changes 34-31
displaying configured parameters 34-16
enabling configuration distribution 34-29
sending test messages for monitoring 34-14
setting preshared keys 34-10
specifying server at user login 34-14
specifying servers34-8to 34-10
specifying server timeout 34-11
starting a distribution session 34-30
rate limiting
default settings 57-14
rate modes
configuring on Generation 2 switching module interfaces 15-24
verifying configuration 15-25
See also port rate modes
RCFs
description 18-3
incoming 18-6
rejecting incoming 18-6
read-only zones
configuration guidelines 24-23
configuring 24-23
default settings 24-41
description 24-23
reason codes
description 13-8
rebooting
switches 12-6
receive buffer groups. See buffer groups
receive data field sizes
configuring 13-16
reconfigure fabric frames. See RCFs
recovery
from powered-down state 15-18
redundancy
Ethernet PortChannels 41-6, 41-7
Fibre Channel PortChannels 41-7
VRRP 41-6
VSANs 20-4
redundancy mode
restoring 9-7
redundancy states
value descriptions 10-5
redundant physical links
example (figure) 26-3
Registered Link Incident Reports. See RLIRs
Registered State Change Notifications. See RSCNs
reloading
switches 12-6
Remote SPAN. See RSPAN
removing sessions 50-8
Resource Manager Essentials. See RME
retransmitting intervals
configuring for FSPF 26-8
description 26-8
RLIRs
clearing information 29-32
conditional receive 29-30
description 29-27
displaying information29-28to 29-31
specifying preferred host 29-27
RME
support 1-6
RMON
alarms 52-1
default settings 52-4
description 52-1
displaying information 52-4
enabling alarms 52-2
enabling events 52-2
events 52-1
role databases
clearing distribution sessions 32-6
committing changes to fabric 32-5
disabling distribution 32-6
discarding database changes 32-5
enabling distribution 32-6
roles
authentication 32-1
CFS support 7-2
configuring 32-2
configuring rules 32-2
default permissions 34-3
defaults 2-3
default setting 32-21
displaying information 32-6
distributing configurations32-4to 32-8
modifying profiles 32-3
user profiles 34-3
See also command roles
roles database
displaying information 32-6
roles databases
description 32-5
locking in the fabric 32-5
merge guidelines 32-6
route costs
computing 26-6
router discovery
IPv6 47-9
routing
multicast 26-12
See also broadcast routing
See also IP routing
routing protocols
disabling 26-6
RSA 1 key pairs
generating 32-15
rsa1 key pairs
generating 32-15
RSA key-pairs
deleting 36-15
description 36-2
displaying configuration 36-15
exporting 36-5, 36-13
generating 36-6
importing 36-5, 36-13
multiple 36-4
rsa key pairs
generating 32-15
RSCNs 43-12
clearing statistics 27-10
default settings 27-14
description 27-7
displaying information 27-8
logging facility 54-2
multiple port IDs 27-9
suppressing domain format SW-RSCNs 27-9
RSCN timers
CFS support 7-2
configuration distribution using CFS27-11to 27-14
configuring 27-10
displaying configuration 27-11
RSPAN
advantages 53-18
configuration guidelines 53-19
configuring 53-20
configuring explicit paths 53-27
default settings 53-32
description 53-17
displaying information 53-30
example configuration53-20to 53-26
explicit paths 53-26
monitoring traffic 53-20
monitoring traffic (example)53-28to 53-30
referencing explicit paths 53-28
tunnels 53-18
rules
configuring 32-2
runtime checks
static routes 26-10
S
SACKs
configuring in FCIP profiles 41-14
SAN extension package licenses
description 3-5
SAN extension tuner
assigning SCSI read/write commands 42-5, 42-7
configuring 42-2
configuring data patterns 42-8
configuring nWWNs 42-4
configuring virtual N ports 42-5
data patterns 42-3
default settings 42-10
description 42-1
initialization 42-4
license requirements 42-3
tuning guidelines 42-2
verifying configuration 42-9
SAN operating system. See Cisco MDS SAN-OS
SANTap 50-8
configuring DVTs 50-5
default settings 50-9
description50-1to 50-3
displaying information50-6to 50-8
enabling 50-4
removing appliance generated entities 50-8
SAs
clearing databases 37-29
displaying for IKE 37-31
displaying global lifetime values 37-35
establishing between IPsec peers 37-23
global lifetime values 37-30
lifetime negotiations 37-25
refreshing 37-16
setting lifetime 37-25
scalability
VSANs 20-4
scheduler. See command scheduler
schedules
assigning jobs 19-6, 19-8
command scheduler 19-1
deleting 19-8
deleting schedule time 19-9
one-time 19-7
periodic 19-6
specifying19-6to 19-9
specifying execution time 19-7
verifying configuration 19-8
SCP
copying images 8-26
scripts. See command scripts
SCSI
routing requests 43-2
SCSI flow configuration clients
description 48-3
SCSI flow data path support
description 48-3
SCSI flow managers
description 48-2
SCSI flow services
CFS support 7-2
configuring48-3to??, 48-3to 48-5
configuring identifiers 48-5
default settings 48-10
description 48-1
displaying 48-7
enabling 48-3
enabling configuration distribution 48-4
functional architecture (figure) 48-2
SCSI flow configuration clients 48-3
SCSI flow data path support 48-3
SCSI flow managers 48-2
SCSI flow statistics
clearing 48-6
default settings 48-10
description 48-5
displaying 48-7
enabling 48-6
SCSI LUNs
customized discovery 28-2
discovering targets 28-1
displaying information 28-2
starting discoveries 28-2
SD port mode
description 13-5
interface modes 13-5
SD ports
bidirectional traffic 53-15
characteristics 53-5
configuring 13-13
configuring for monitoring 53-6, 53-8
configuring for RSPAN 53-26
configuring for SPAN monitoring 53-6, 53-8
configuring SPAN 53-15
encapsulating frames 53-11
monitoring bidirectional traffic 53-15
RSPAN 53-17
SDV
IVR limitations 21-10
secondary MAC addresses
configuring 30-10
Secure Hash Algorithm. See SHA-1
Secure Shell Protocol
See SSH
Secure Shell Protocol. See SSH
security
accounting 34-3
managing on the switch 34-1
security associations. See SAs
security control
local 34-2, 34-34
remote 34-2, 34-17
remote AAA servers 34-8
security parameter index. See SPI
selective acknowledgments. See SACKs
sensors
temperature monitoring 11-15
SERDES loopback tests
performing 60-19
serial IDs
description 55-29
serial numbers
displaying 11-9
server IDs
description 55-29
service policies
applying 57-9
defining 57-8
enforcement 57-9
services modules
description 12-3
managing 12-1
power cycling 12-7
purging configurations 12-8
replacing 8-41
resetting 12-6
state descriptions 12-4
verifying status 12-4
setup
assigning information 5-5
configuring out-of-band access5-6to 5-10
initial procedure description5-2to 5-14
options 5-4
SFPs
displaying transmitter types 13-26
transmitter types 13-19
SHA-1
IKE 37-7
IPsec 37-6
shared rate mode
description 15-6
migrating from dedicated rate mode 15-21
migrating to dedicated rate mode 15-21
oversubscription 15-26
show commands
directing output to a file 2-20
site IDs
description 55-28
slot0:
description 2-25
formatting 2-26
small computer system interface. See SCSI
SMTP
server address 55-13
SNMP
access control 33-2
access groups 33-4
adding communities 33-7
assigning contact 33-2
assigning contact names 55-6
assigning location 33-2
configuring LinkUp/LinkDown notifications 33-12
configuring notification target users 33-12
configuring users from CLI 33-5
counter Information 33-15
creating roles 32-9
creating users 33-4
default settings 33-17
deleting communities 33-7
displaying information 52-4
displaying notification status 33-11
displaying security information 33-15
enabling SNMP notifications 33-10
encryption-based privacy 33-5
FICON control 29-21
group-based access 33-4
mapping CLI operations 32-9
modifying users 33-4
read-only access 33-7
read-write access 33-7
security features 34-2
server contact name 55-5
user synchronization with CLI 33-3
Version 3 security features 33-2
versions supported 33-1
See also SNMPv1; SNMPv2c; SNMPv3
SNMP manager
FCS 56-2
SNMPv1
community strings 33-2
description 33-2
See also SNMP
SNMPv2
community strings 33-2
SNMPv2c
configuring notifications 33-8
description 33-2
See also SNMP
SNMPv3
assigning multiple roles 33-7
CLI user managementSNMPv3
AAA integration 33-3
configuring notifications 33-9
description 33-2
enforcing message encryption 33-6
restricting switch access 33-4
security features 33-1, 33-2
specifying cisco-av-pair 34-15
See also SNMP 33-2
software configuration
overview1-6to 1-8
software images
compatibility considerations 8-28
default settings 8-42
selecting for supervisor modules 8-2
space requirements 8-5
synchronizing 10-4
upgrade prerequisites8-3to 8-5
upgrading SAN-OS images 8-1
variables 8-1
software upgrades
automated with install all command 8-7
BIOS images 8-29
disruptive 8-5
install all command 8-5
manual, dual supervisor modules8-26to 8-31
mechanisms 8-5
nondisruptive 10-1
quick 8-31
verifying status 8-20
soft zoning
description 24-13
See also zoning
source IDs
Call Home event format 55-29
exchange based 17-5
flow based 17-4
in-order delivery 26-13
path selection 20-10
SPAN
configuration guidelines 53-6
configuring53-6to 53-12
configuring Fibre Channel analyzers 53-13
configuring SD ports 53-6, 53-8, 53-15
conversion behavior 53-11
default settings 53-32
description 53-2
displaying information 53-15
egress sources 53-2
encapsulating frames 53-11
Fibre Channel analyzers 53-12
filters 53-5
monitoring traffic 53-2
SD ports 53-5
sessions 53-5
sources 53-4
sources for monitoring 53-2
VSAN sources 53-4
SPAN destination port mode. See SD port mode
SPAN filters
configuring 53-9
description 53-5
guidelines 53-5
SPAN sessions
configuring 53-7, 53-8
description 53-5
reactivating 53-11
suspending 53-11
VSAN filters 53-5
SPAN sources
configuring interfaces 53-14
egress 53-2
ingress 53-2
interface types 53-3
IPS ports 53-3
VSANs configuration guidelines 53-4
SPAN tunnel port mode. See ST port mode
special frames
enabling for FCIP 41-19
SPF
computational hold times 26-4
SPI
configuring virtual routers 44-23
SSH
clearing hosts 32-17
description 32-15
digital certificate authentication 32-19
displaying status 32-18
enabling 32-18
generating server key-pairs 32-15
logins 34-4
overwriting server key-pairs 32-16
protocol status 32-18
specifying keys 32-15
SSH key pairs
overwriting 32-16
SSH sessions
message logging 54-4
SSI boot images
configuring with install ssi command 12-25
configuring with SSI boot variable 12-23
verifying 12-20
SSI boot variables
verifying configuration 12-26
SSMs
Cisco SAN-OS release upgrade and downgrade considerations 12-29
default settings 12-31
features 12-18
Fibre Channel write acceleration49-1to 49-4
installing image for Intelligent Storage Services12-18to 12-27
managing 12-28
NASB51-1to 51-6
recovery after replacing CompactFlash 12-28
replacing considerations 12-28
SANTap50-1to ??
SCSI flow services48-1to 48-10
SCSI flow statistics48-1to 48-10
SSI boot image updating considerations 12-19
upgrading image for Intelligent Storage Services 12-19
standby supervisor modules
accessing file systems 9-8
boot alert 8-40
boot variable version 8-40
copying boot variables 10-4
managing bootflash: 8-40
monitoring 10-2
synchronizing 10-4
startup
description 5-2
startup configuration files
unlocking 9-5
statically imported iSCSI targets 43-61
static iSLB initiator
converting 43-43
static mapped iSCSI targetiSCSI
static mapped target 43-23
static mapping 43-43
static routes
runtime checks 26-10
static WWN mapping 43-20
storage devices
access control 24-1
permanent 2-25
temporary 2-25
Storage Services Enabler package licenses
description 3-7
store-and-forward routing mode 43-28
ST port mode
description 13-6
interface modes 13-6
limitations 13-6
ST ports
configuring for RSPAN 53-22
interface modes 13-6
RSPAN 53-17
RSPAN characteristics 53-19
subnet masks
configuring IPv4 routes 44-11
configuring mgmt0 interfaces 13-37
default setting 12-31
subnets
requirements 46-6
summer time
adjusting for 5-17
Supervisor-1 modules
migrating from Supervisor-2 modules (note) 8-33
modem initialization strings 5-32
selecting software images 8-2
Supervisor-2 modules
description 1-2
Generation 1 chassis 8-40
migrating from Supervisor-1 modules8-32to 8-40
modem initialization strings 5-32
select software images 8-2
USB ports 1-2
supervisor modules
active state 12-5
default settings 12-31
description 1-2, 12-1
displaying information 12-6
high availability 10-2
managing standby bootflash: 8-40
manual switchovers 10-2
migrating to Supervisor-2 modules8-32to 8-40
redundancy 10-1
replacing 8-32, 8-41
replacing considerations 12-28
resetting 12-6
standby boot alert 8-40
standby state 10-6, 12-5
standby supervisor boot variable version 8-40
state descriptions 10-6, 12-4
switchover mechanisms 10-2
switchovers after failures 10-1
synchronizing 10-4
verifying status 12-4
See also Supervisor 1 modules; Supervisor 2 modules
Switched Port Analyzer. See SPAN
switches
displaying power usage 11-10
displaying serial numbers 11-9
internal states 10-6
rebooting 12-6
reloading 12-6
switching modules
accessing 12-6
description 12-3
managing 12-1
power cycling 12-7
powering off 12-9
preserving configuration 12-8
purging configurations 12-8
reloading 12-7
replacing 8-41
resetting 12-6
state descriptions 12-4
verifying status 12-4
switch management
in-band 5-4, 44-6
out-of-band 5-4
switch names
assigning 5-15
switchover mechanism
warm state 12-5
switchovers
characteristics 10-2
guidelines 10-3
initiating manually 10-2
supervisor modules 10-1
VRRP 41-6
switch ports
configuring attribute default values 13-19
switch priorities
configuring 18-5
default 18-5
description 18-5
switch security
default settings 32-21, 34-40
sWWNs
configuring for fabric binding 40-3
syslog
CFS support 7-2
configuration distribution 54-8
fabric merge guidelines 54-10
system health
clearing error reports 60-16
configuring failure actions 60-14
default settings 60-26
displaying 60-20
displaying status 60-20
interpreting current status 60-19
testing modules 60-15
test run requirements 60-15
system images
description 8-2
selecting for supervisor modules 8-2
SYSTEM variable 8-1
system messages
configuring log files 54-6
configuring logging 54-3
configuring logging servers 54-6
default settings 54-15
displaying information54-10to 54-15
logging server 54-1
severity levels 54-3
system processes
displaying60-1to 60-4
displaying status60-4to 60-5
system statistics
CPU and memory 60-5
T
TACACS+
AAA authentication 43-48
AAA protocols 34-1
CFS merge guidelines 34-32
CFS support 7-2
configuring Cisco ACS34-37to 34-40
configuring server groups 34-28
default settings 34-41
description 34-17
discarding configuration distribution changes 34-31
displaying information 34-25
enabling 34-18
enabling configuration distribution 34-29
global keys 34-18
sending test messages for monitoring 34-23
setting global secret keys 34-20
setting preshared key 34-18
setting server addresses 34-18
setting server monitoring parameters 34-21
setting timeout value 34-20
specifying server at login 34-24
starting a distribution session 34-30
tape acceleration
FICON29-38to ??
target discovery 43-86
TCP connections
FCIP profiles 41-4
specifying number 41-20
TCP parameters
configuring in FCIP profiles41-13to41-17, ??to 41-18
TCP ports
IPv4-ACLs 35-3
TCP statistics
displaying 45-11
TCP tuning parameters 43-27
Telnet
default service 32-14
enabling 32-18
logins 34-4
Telnet server connections
description 5-27
disabling 5-28
Telnet sessions
message logging 54-4
temperatures
displaying 11-16
major thresholds 11-16
minor thresholds 11-16
monitoring hardware 11-15
TE port mode
classes of service 13-5
description 13-5
TE ports
fabric binding checking 40-2
FCS support 56-1, 56-2
fctrace 59-1
FSPF topologies 26-2
interoperability 30-14
recovering from link isolations 24-14
SPAN sources 53-3
trunking restrictions 16-1
terminal parameters
configuring2-17to 2-19
displaying settings 2-19
screen length 2-19
screen width 2-19
session timeout 2-17
terminal timeout 2-18
type 2-19
time
configuring 5-16
setting delay in CLI 2-34
time out values. See TOVs
timestamps
FICON host control 29-20
time zones
configuring 5-16
TL port mode
classes of service 13-5
description 13-5
TL ports
ALPA caches 13-30
configuring 13-13
description 13-29
displaying information 13-30
FCS 56-1, 56-2
FCS support 56-1, 56-2
logging facility 54-2
private devices 13-31
SPAN sources 53-3
virtual devices 13-31
tools
software configuration 1-5
TOVs
configuring across all VSANs 30-5
configuring for a VSAN 30-5
default settings 30-19
interoperability 30-13
ranges 30-4
traceroute commands
verifying routes 2-16
tracked ports
binding operationally 58-3
traffic isolation
VSANs 20-4
transform sets
configuring for IPsec 37-22
creating crypto map entries 37-24
description 37-21
transient failure 43-12
transit VSANs
configuration guidelines 23-12
description 23-3, 23-20
IVR configuration guidelines 23-18
translative loop port mode. See TL port mode
transparent initiator mode 43-10
transparent initiator modeiSCSI
transparent initiator mode 43-16
Triple DES. See 3DEC encryption
troubleshooting
Cisco Fabric Analyzer 59-4
collecting output for technical support 59-15
fcping 59-3
fctrace 59-1
loop monitoring 59-14
show tech-support command59-15to 59-22
SSM recovery 12-28
verifying switch connectivity 59-4
trunk-allowed VSAN lists
description16-4to 16-6
trunking
comparison with PortChannels 17-3
configuration guidelines 16-2
configuring modes 16-3
default settings 16-7
description 16-1
displaying information 16-6
interoperability 30-13
link state 16-3
merging traffic 16-2
restrictions 16-1
trunking E port mode. See TE port mode
trunking mode
FCIP interface 41-4
trunking ports
associated with VSANs 20-7
trunking protocol
default settings 16-7, 16-8
default state 16-2
description 16-2
detecting port isolation 16-2
trunk mode
administrative default 13-19
configuring 16-3, 16-4
default settings 16-7
status 16-3
trunk ports
displaying information 16-7
trust points
creating 36-8
description 36-2
multiple 36-3
saving configuration across reboots 36-12
U
UDP ports
IPv4-ACLs 35-3
unique area FC IDs
configuring 18-17
description 18-17
upgrades. See disruptive upgrades; nondisruptive upgrades; software upgrades
user accounts
configuring32-10to 32-14
configuring profiles 32-2
configuring roles 32-2
displaying information 32-13
password characteristics 32-11
user IDs
authentication 34-3
user profiles
role information 34-3
user roles. See roles
users
CFS support 7-2
configuring 32-12
deleting 32-12
description 32-11
displaying 2-14
displaying account information 32-13
logging out other users 32-13
sending messages 2-14
SNMP support 33-4
V
variables. See CLI variables
vendor-specific attributes. See VSAs
VE ports
description 41-2
FCIP 41-2
virtual devices
TL ports 13-31
virtual E ports. See VE ports
virtual Fibre Channel host 43-3
virtual ISLs
description 41-2
Virtual LANs. See VLANs
virtual router IDs. See VR IDs
Virtual Router Redundancy Protocol. See VRRP
Virtual Router Redundancy Protocolprotocols
Virtual Router Redundancy 43-40
virtual routers
adding 44-19
adding primary IP addresses 44-20
authentication 44-23
configuring for IPv4 44-19
configuring for IPv6 44-19
default settings 44-29
deleting 44-19
initiating 44-19
setting priorities 44-21
virtual SANs. See VSANs
VLANs
configuring on Gigabit Ethernet subinterfaces 46-6
description 46-5
volatile:
description 2-25
switch reboots 2-28
VR IDs
configuring for IPv4 44-19
configuring for IPv6 44-19
description 44-17
mapping 44-17
VRRP 43-40
algorithm for selecting Gigabit Ethernet interfaces43-51to 43-53
backup switches 44-17
clearing statistics 44-27
configuring advertisement time intervals 44-22
configuring for Gigabit Ethernet interfaces 45-6
configuring for iSLB 43-54
configuring virtual routers 44-19
configuring VR IDs for IPv4 44-19
configuring VR IDs for IPv6 44-19
default settings 44-29
description 44-17, 45-5
displaying information44-25to 44-27
displaying statistics 44-27
group members 45-5
initiating virtual routers 44-19
IQN formats 43-6
iSCSI parameter change impact 43-51
iSLB43-49to 43-55
logging facility 54-2
master switches 44-17
MD5 authentication 44-23
primary IP address 44-20
priority preemption 44-22
security authentication 44-23
setting priorities 44-21
setting priority 44-21
simple text authentication 44-23
VRRP group 43-18
VRRP-I f iSCSI login redirect 43-41
VSAN IDs
allowed list 16-8
description 20-5
multiplexing traffic 13-5
range 20-4
VSAN membership 20-4
VSAN interfaces
configuring 13-39
configuring IPv4 addresses 44-7
creating 13-40
description 13-39
displaying information 13-40
verifying configuration 44-7
VSAN membership
iSCSI hosts 43-17
iSCSI hostsiSCSI
VSAN membership for hosts 43-17
iSCSI interfaces 43-18
VSAN policies
default roles 32-21
licensing 32-3
modifying 32-4
VSANs
advantages 20-3
allowed-active 16-1
allowed list 53-4
broadcast addresses 26-12
cache contents 18-22
clocks 29-20
comparison with QoS 57-6
comparison with zones (table) 20-4
compatibility with DHCHAP 38-3
configuring20-6to ??
configuring allowed-active lists 16-6
configuring FSPF 26-4
configuring multiple IPv4 subnets 44-14
configuring policies 32-3
configuring trunk-allowed lists16-4to ??
default settings 20-12
default VSANs 20-8
deleting 20-9
description20-1to 20-4
displaying configuration 20-11
displaying membership 20-7, 20-8
displaying usage 20-12
domain ID automatic reconfiguration 18-7
example membership for iSCSI devices 43-18
fabric optimization for FICON 29-3
FC IDs 20-1
FCS 56-1
FCS support 56-1
features 20-1
FICON-enabled 20-11, 29-40
flow statistics 26-18
FSPF 26-5
FSPF connectivity 26-2
gateway switches 44-5
interop mode 30-13
IPFC interfaces 59-1
IP routing 35-1
IPv4 static routing 44-11
iSLB 43-44
iSLB initiators 43-44
isolated 20-8
load balancing 20-10
load balancing attributes 20-5
loop devices 13-31
mismatches 13-10
multiple zones 24-5
names 20-5
name server 27-3
operational states 20-9
overlaid routes 44-12
policies 32-3
port membership 20-7
port tracking 58-5
show tech-support vsan command 59-20
SPAN filters 53-5
SPAN source 53-4
SPAN sources 53-4
states 20-5
TE port mode 13-5
timer configuration 30-5
TOVs 30-5
traffic isolation 20-3
traffic routing between 44-1
transit 23-20
trunk-allowed 16-1
trunking ports 20-7
VRRP 44-17
VSAN trunking. See trunking
VSAs
communicating attributes 34-14
protocol options 34-15
W
window management
configuring in FCIP profiles 41-15
world wide names. See WWNs
WWNs
configuring 30-8
displaying information 30-9
link initialization 30-9
port security 39-10
secondary MAC addresses 30-10
static binding 43-16
suspended connections 13-10
X
XRC
FICON support 29-4
Z
zone attribute groups
cloning 24-17
zone databases
release locks 24-33
zones
access control 24-8
adding to zone sets 24-11
analyzing 24-40
assigning LUNs to storage subsystems 24-22
changing from enhanced zones 24-32
cloning 24-17
compacting for downgrading 24-40
comparison with device aliases (table) 25-2
comparison with VSANs (table) 20-4
configuring24-6to 24-11
configuring aliases 24-10
configuring and activating for iSLB 43-45
configuring broadcasting 24-20
configuring fcaliases 24-10
CUPs 29-41
default policies 24-2
default settings 24-41
differences with IVR zones (table) 23-28
displaying information24-24to 24-30
enforcing restrictions 24-13
exporting databases 24-15
features 24-1, 24-3
importing databases 24-15
iSLB 43-45, 43-46
IVR communication 23-28
logging facility 54-3
LUN-based 24-21
membership using pWWNs 20-4
merge failures 13-10
read-only for IVR 23-36
renaming 24-17
show tech-support zone command 59-18
See also default zones
See also enhanced zones
See also hard zoning; soft zoning
See also LUN zoning
See also read-only zones
See also zoning; zone sets
zone server databases
clearing 24-17
zone sets
activating 24-9
adding member zones 24-11
analyzing 24-40
cloning 24-17
configuring24-7to 24-10
considerations 24-5
copying 24-16
creating 24-11
default settings 24-41
displaying information24-24to 24-30
distributing configuration 24-13
enabling distribution 24-14
exporting 24-15
exporting databases 24-15
features 24-1
importing 24-15
importing databases 24-15
one-time distribution 24-14
recovering from link isolations 24-14
renaming 24-17
See also active zone sets
See also active zone sets; full zone sets
See also zones; zoning
zone traffic priorities
configuring 24-18
description 24-18
zoning
configuring broadcasting 24-20
description 24-1
example 24-2
implementation 24-3
See also LUN zoning
See also zones; zone sets
zoning based access control
configuring for iSCSI 43-20
configuring for iSCSIiSCSI
configuring zoning based access control 43-20