B -
C -
D -
E -
F -
G -
H -
L -
M -
N -
O -
P -
R -
S -
T -
V -
Index
B
bootup diagnostics 13-2
boundary clock 4-2
C
Call Home
e-mail notifications 1-4
CDP
clearing cache 5-7
clearing statistics 5-7
configuring timers, example 5-8
default settings 5-4
defined with LLDP 18-2
description 5-1
disabling the feature 5-5
enabling globally 5-4
enabling on an interface 5-5
guidelines 5-3
licensing requirements 5-3
limitations 5-3
MIBs (table) 5-8
optional parameters 5-7
prerequisites 5-3
TLV fields 5-2
verifying configuration 5-7
version 5-4
virtualization 5-3
VLAN ID 5-2
VTP 5-2
CFS
connectivity in a mixed fabric 2-3
coordinated distributions 2-3
default settings 2-6
description 2-1
disabling on a switch 2-31
distribution 2-2
distribution modes 2-3
enabling on a switch 2-31
features supported 2-2
guidelines 2-5
high availability 2-5
licensing requirements 2-5
limitations 2-5
locking the network 2-4
merge support 2-4
MIBs (table) 2-33
NTP 3-2, 3-14
prerequisites 2-5
releasing session lock 3-16
uncoordinated distributions 2-3
unrestricted uncoordinated distributions 2-3
verifying configuration 2-32
virtualization 2-5
CFS applications
clearing session locks 2-29
committing changes 2-27
discarding changes 2-30
enabling 2-7
enabling distribution for Call Home configurations 2-7
enabling distribution for device alias configurations 2-8
enabling distribution for DPVM configurations 2-9
enabling distribution for FC domain configurations 2-10
enabling distribution for FC port security configurations 2-11
enabling distribution for FC timer configurations 2-12
enabling distribution for IVR configurations 2-13
enabling distribution for NTP configurations 2-14
enabling distribution for RADIUS configurations 2-15
enabling distribution for RSCN configurations 2-16
enabling distribution for TACACS+ configurations 2-17
enabling distribution for user role configurations 2-18
fabric locking 2-27
CFS distribution mode, specifying 2-19
CFS over Ethernet (CFSoE), description 2-2
CFS over Fibre Channel (CFSoFC), description 2-2
CFS over IP (CFSoIP)
configuring IP multicast addresses 2-20
description 2-2
CFS regions
configuring 2-22
creating 2-22
deleting 2-26
description 2-4
moving an application to/from 2-23
removing an application 2-25
checkpoints
system 8-2
Cisco discovery protocol
See CDP
Cisco Fabric Service. See CFS
clock manager
PTP 4-3
command scheduler
execution logs 10-2
configuration limits
description (table) C-1
configuration methods 1-2
D
default settings
CDP 5-4
EEM 14-7
NetFlow 19-5
NTP 3-4, 5-4, 16-7, 17-5
OBFL 15-3
online diagnostics 13-6
PTP 4-5
RMON 12-3
rollback 8-4
Scheduler 10-3
Smart Call Home 7-9
SNMP 11-7
system messages 6-3
device discovery protocol 18-2
diagnostics
bootup 13-2
on demand 13-5
runtime 13-3
documentation
additional publications i-xxv
conventions i-xxv
obtaining i-xxvii
E
EEM
actions 14-4
activating a script policy 14-15
allow CLI commands to execute 14-14
configuration examples B-4
configuring action statements 14-13
configuring event statements 14-10
default settings 14-7
defining an environment variable 14-7
defining a policy 14-8
defining script policies 14-14
description14-1to 14-5
environment variables 14-5
event correlation 14-5
event correlation (example) 14-21
event logs 14-2
events 14-3, B-3
example configuration 14-21
guidelines 14-6
high availability 14-5
licensing requirements 14-6
limitations 14-6
override policy 14-2
override policy (note) 14-3
override policy actions (note) 14-4
overriding a system policy 14-15
parameter substitution 14-5
policies 14-2
prerequisites 14-6
registering a script policy 14-15
SNMP support 11-5
system policies 14-2, B-1
using to monitor syslog messages 14-19
verifying configuration 14-20
virtualization support 14-5
VSH script policies 14-4
EEM overriding a system policy (example) 14-21
embedded event manager. See EEM
encapsulated remote switched port analyzer. See ERSPAN
ERSPAN
ACL configuration example 17-16
activating a session 17-12
configuring a destination session 17-9
configuring a session (example) 17-16
configuring a source session 17-6
configuring multicast best effort mode for a session 17-14
description 17-1
destinations 17-2
feature history 17-18
guidelines 17-4
high availability 17-3
licensing requirements 17-4
limitations 17-4
multicast best effort mode (example) 17-17
multiple sessions 17-3
prerequisites 17-4
session limits 17-4
sessions 17-2
session sources 17-6
shutting down a session 17-12
sources 17-2
verifying configuration 17-15
virtualization support 17-3
executing a session 9-5
exporter map 19-2
F
feature history
ERSPAN 17-18
features, new and changed (table) i-xix
G
GOLD. See online diagnostics
H
health monitoring diagnostics 13-3
high availability
CDP 5-3
CFS 2-5
EEM 14-5
ERSPAN 17-3
LLDP 18-3
NetFlow 19-3
NTP 3-3, 5-3
online diagnostics 13-5
PTP 4-3
RMON 12-2
rollback 8-2
SNMP 11-6
SPAN 16-4
L
licensing requirements
CDP 5-3
CFS 2-5
EEM 14-6
ERSPAN 17-4
LLDP 18-3
NetFlow 19-4
NTP 3-3
OBFL 15-2
online diagnostics 13-5
PTP 4-4
RMON 12-3
rollback 8-3
Scheduler 10-3
session manager 9-2
Smart Call Home 7-8
SNMP 11-6
SPAN 16-5
system messages 6-3
limits
description (table) C-1
LLDP
configuring optional parameters 18-7
configuring timers 18-7
default settings 18-4
defined 18-2
description 18-1
enabling or disabling globally 18-5
enabling or disabling on an interface 18-6
example configuration 18-9
guidelines 18-4
high availability 18-3
licensing requirements 18-3
limitations 18-4
verifying configuration 18-9
virtualization support 18-3
M
MIBs
CDP 5-8
CFS 2-33
description 11-2
location to download 11-29
NTP 3-19, 5-8
PTP 4-11
RMON 12-8
Smart Call Home 7-39
SNMP 11-29
monitor map 19-3
MTU truncation, configuring for SPAN sessions 16-16
multibest best effort mode
configuring for a SPAN session 16-19
multicast best effort mode
configuring for an ERSPAN session 17-14
multicast best mode
ERSPAN configuration example 17-17
N
NetFlow
applying a monitor map to an interface 19-13
applying a monitor map to a VLAN 19-14
applying a sampler map to an interface 19-13
configuring Bridged NetFlow 19-14
configuring NetFlow 19-5
configuring timeouts 19-17
creating a monitor map 19-11
creating an export map 19-9
creating a record map 19-6
creating a sampler map 19-12
default settings 19-5
description19-1to 19-4
disabling 19-6
enabling 19-6
example configuration 19-19
exporter map 19-2
export formats 19-3
flows 19-1
full mode 19-2
high availability 19-3
keys 19-1
licensing requirements 19-4
monitor map 19-3
record map 19-2
sampled mode 19-2
sampler map 19-3
specifying collect parameters 19-8
specifying match parameters 19-8
verifying configuration 19-18
virtualization support 19-4
Netflow
configuring Layer 2 keys 19-15
Network Time Protocol. See NTP
NTP
access groups 3-11
as a time server 3-2
authentication keys 3-10
CFS 3-2, 3-14
clearing a session 3-17
clearing statistics 3-17
clock manager 3-2
committing configuration changes 3-15
configuration examples 3-17
configuring access restrictions 3-11
configuring authentication 3-10
configuring peer 3-7
configuring server 3-7
configuring the device as an authoritative server 3-6
default settings 3-4, 5-4, 16-7, 17-5
description 3-1
disabling 3-5
discarding configuration changes 3-16
enabling 3-5
feature history 3-19
guidelines 3-3
high availability 3-3, 5-3
licensing requirements 3-3
limitations 3-3
logging 3-13
MIBs (table) 3-19, 5-8
prerequisites 3-3
releasing CFS session lock 3-16
source interface 3-13
source IP address 3-13
stratum 3-2
trusted keys 3-11
verifying configuration 3-16
virtualization 3-3, 5-3
O
OBFL
clearing statistics 15-7
default settings 15-3
description 15-1
enabling 15-3
example configuration 15-7
guidelines 15-3
licensing requirements 15-2
limitations 15-3
prerequisites 15-2
verifying configuration 15-6
virtualization support 15-2
on-board failure logging. See OBFL
on demand diagnostics 13-5
online diagnostics
activating a diagnostics test 13-7
bootup 13-2
clearing the test results 13-10
configuring the bootup diagnostic level 13-7
default settings 13-6
description13-1to 13-5
example configuration 13-12
feature history (table) 13-13
guidelines 13-6
health monitoring 13-3
high availability 13-5
licensing requirements 13-5
limitations 13-6
on demand 13-5
prerequisites 13-6
runtime 13-3
setting a diagnostic test as inactive 13-9
simulating a test result 13-11
starting an on-demand test 13-9
stopping an on-demand test 13-9
verifying configuration 13-11
virtualization support 13-5
VRFs 13-5
ordinary clock 4-2
P
Pong, description 4-3
Precision Time Protocol. See PTP
PTP
configuration examples 4-9
configuring globally 4-5
configuring on an interface 4-7
default settings 4-5
description 4-2
device types 4-2
feature history 4-11
guidelines 4-4
high availability 4-3
licensing requirements 4-4
limitations 4-4
MIBs (table) 4-11
prerequisites 4-4
process 4-3
verifying configuration 4-9
virtualization 4-4
R
record map 19-2
related documents i-xxv
RMON
alarms 12-2
configuring alarms 12-4
configuring events 12-6
default settings 12-3
description 12-1
events 12-2
example configuration 12-7
guidelines 12-3
high availability 12-2
licensing requirements 12-3
limitations 12-3
MIBs 12-8
prerequisites 12-3
verifying configuration 12-7
virtualization support 12-3
VRFs 12-3
rollback
checkpoint copy 8-2
creating a checkpoint copy 8-4
default settings 8-4
description 8-1
example configuration 8-7
guidelines 8-3
high availability 8-2
implementing a rollback 8-5
licensing requirements 8-3
limitations 8-3
prerequisites 8-3
reverting to checkpoint file 8-5
verifying configuration 8-6
virtualization support 8-3
runtime diagnostics 13-3
S
sampler map 19-3
Scheduler
authentication 10-2
clearing the logfile 10-11
configuring 10-4
configuring authentication 10-6
configuring logfile 10-5
default settings 10-3
defining a timetable 10-9
defining jobs 10-7
deleting a job 10-8
description 10-1
disabling the feature 10-12
enabling the feature 10-4
guidelines 10-3
high availability 10-2
licensing requirements 10-3
limitations 10-3
prerequisites 10-3
verifying configuration 10-13
virtualization support 10-2
scheduler
execution logs 10-2
session manager 9-5
committing a session 9-5
configuring ACLs 9-4
configuring an ACL session (example) 9-6
creating a session 9-3
description 9-1
discarding a session 9-6
guidelines 9-2
high availability 9-2
licensing requirements 9-2
limitations 9-2
prerequisites 9-2
saving a session 9-6
verifying configuration 9-6
verifying the session 9-5
virtualization support 9-2
Simple Network Management Protocol. See SNMP
Smart Call Home
alert groups 7-3
benefits 7-2
configuring an HTTP proxy server 7-22
configuring contact information 7-10
configuring e-mail 7-19
configuring inventory notification 7-19, 7-24
configuring VRFs to send messages using HTTP 7-21
database merge guidelines 7-7
default settings 7-9
description 7-1
destination profiles
associating an alert group 7-16
attributes 7-14
creating 7-12
description 7-2
modifying 7-14
predefined 7-2
disabling 7-25
disabling duplicate message throttle 7-25
enabling 7-25
event triggers (table) 7-27
example configuration 7-27
guidelines 7-8
high availability 7-7
licensing requirements 7-8
limitations 7-8
mapping message levels to syslog levels (table) 7-5
message formats
full text (table) 7-29, 7-30
full-text format, example 7-32
inventory events (table) 7-31
options 7-2
proactive events (table) 7-31
reactive events (table) 7-31
short text (table) 7-29
XML (table) 7-29, 7-30
XML format, example 7-35
message levels 7-5
MIBs 7-39
modifying an alert group 7-17
prerequisites 7-8
registration requirements 7-6
sending a test message 7-26
SMARTnet registration 7-6
verifying configuration 7-26
virtualization support 7-7
SNMP
agent 11-2
assigning contact 11-23
assigning location 11-23
assigning multiple user roles 11-9
authentication 11-4
configuring a user 11-8
configuring context to network entity mapping 11-24
context mapping 11-6
contexts 11-5
creating communities 11-10
default settings 11-7
description11-1to 11-6
disabling protocol 11-26
display ifIndex values 11-23
EEM support 11-5
enabling one-time authentication 11-23
enforcing encryption 11-9
engine ID format 11-8
example configuration 11-27
feature history (table) 11-29
filtering SNMP requests 11-10
group-based access 11-5
guidelines 11-7
high availability 11-6
licensing requirements 11-6
limitations 11-7
manager 11-2
MIBs 11-2
MIBs supported 11-29
multiple instance support 11-5
notifications
configuring LinkUp/LinkDown notifications 11-22
configuring notification receivers 11-11
configuring notification receivers with VRFs 11-13
configuring source interface for 11-12
configuring the notification target user 11-12
description 11-2
enabling individual notifications 11-16
informs 11-2
trap 11-2
notification source interface 11-12
prerequisites 11-6
RFCs 11-2
RMON 12-1
user synchronization with CLI 11-4
versions
security models and levels 11-3
SNMPv3 11-2
USM 11-4
virtualization support 11-6
VRFs 11-6
SNMP requests
filtering 11-10
source rate limit, configuring for SPAN sessions 16-17
SPAN
configuring an RSPAN VLAN 16-14
configuring a PVLAN source in a session (example) 16-22
configuring a session 16-8
configuring a session (example) 16-21
configuring a source rate limit for each session 16-17
configuring a virtual SPAN session 16-11
configuring a virtual SPAN session (example) 16-21
configuring MTU truncation for each session 16-16
configuring the multicast best effort mode for a session 16-19
description 16-1
enabling a session 16-15
guidelines 16-5
high availability 16-4
licensing requirements 16-5
limitations 16-5
multiple sessions 16-4
prerequisites 16-5
session destinations 16-8
session limits 16-5
sessions 16-3
session sources 16-8
shutting down a session 16-15
subinterface restriction 16-8
verifying configuration 16-20
virtualization support 16-4
virtual SPAN sessions 16-3
switched port analyzer. See SPAN
syslog
as EEM publisher 14-19
See system messages
system checkpoints 8-2
system messages
clearing a log file 6-11
configuring (example) 6-12
configuring a syslog server 6-8
configuring a syslog server on a Linux system 6-10
configuring a syslog server on a UNIX system 6-10
configuring severity level to log 6-7
configuring timestamp 6-7
default settings 6-3
description 6-1
displaying a log file 6-10
guidelines 6-3
licensing requirements 6-3
list of messages 6-12
logging to a file 6-5
logging to a terminal session 6-4
logging to the console port 6-4
RFC 6-1
severity levels (table) 6-2
syslog server 6-2
verifying configuration 6-11
virtualization support 6-2
T
TLVs
defined 18-2
supported by LLDP 18-8
transparent clock 4-2
trap. See SNMP
troubleshooting 1-7
V
virtualization
CFS 2-5
NTP 3-3
PTP 4-4
virtualization support
LLDP 18-3
VTP
CDP 5-2