Table Of Contents
Symbols - Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Z
Master Index
The following MDS NX-OS configuration guide abbreviations are used in the Master Index.
•
DMM - Data Mobility Manager Configuration Guide
•
IOA- I/O Accelerator Configuration Guide
•
Fabric - Fabric Configuration Guide
•
IVR - Inter-VSAN Routing Configuration Guide
•
Intf - Interfaces Configuration Guide
•
Ipsvc- IP Services Configuration Guide
•
Sec- Security Configuration Guide
•
Sysmgnt - System Management Configuration Guide
•
Limits - Configuration Limits
•
SME - Storage Media Encryption Guide
Symbols
* (asterisk)
autolearned entries sec:9-14
first operational port Intf:5-21
host time stamps Fabric:11-30
port security wildcard sec:9-10
port security wildcards sec:9-10
+153646 Fabric:11-38
+840266 Fabric:11-36
Numerics
12-port 4-Gbps switching modules
configuration guidelines Intf:3-18
default settings Intf:3-40
16-port switching modules
LEDs Intf:2-16
24-port 4-Gbps switching modules
bandwidth fairness Intf:3-32
configuration guidelines Intf:3-17
default settings Intf:3-40
example configurations Intf:3-37, Intf:3-39
oversubscription Intf:3-26
shared resources Intf:3-9
24-port 8-Gbps switching modules
default settings Intf:3-41
32-port switching modules
SPAN guidelines sysmgnt:11-6
3DES encryption
IKE sec:7-7
IPsec sec:7-6
4/44-port 8-Gbps switching modules
default settings Intf:3-41
48-port 4-Gbps switching modules
bandwidth fairness Intf:3-32
configuration guidelines Intf:3-17
default settings Intf:3-40
example configurations Intf:3-38, Intf:3-39
oversubscription Intf:3-26
shared resources Intf:3-9
48-port 8-Gbps switching modules
default settings Intf:3-41
example configurations Intf:3-36
4-port 10-Gbps switching modules
configuration guidelines Intf:3-18
default settings Intf:3-40
A
AAA
authentication process sec:4-7
authorization process sec:4-7
configuring accounting servicessec:4-53to sec:4-54
default settings sec:4-58
description sec:4-1
DHCHAP authentication sec:8-9
displaying error-enabled status sec:4-6
enabling server distribution sec:4-46
local services sec:4-52
remote services sec:4-4
setting authentication sec:4-52
starting a distribution session sec:4-46
AAA servers
groups sec:4-4
monitoring sec:4-6
remote authentication sec:4-4
about DMM DMM:1-1
Access Control Lists. See IPv4-ACLs; IPv6-ACLs
accounting
configuring servicessec:4-53to sec:4-54
ACL adjacency sharing
disabling for downgrading Intf:3-35
active-passive arrays DMM:3-15
active zone sets
considerations Fabric:5-4
enabling distribution Fabric:5-15
address allocation cache
description sysmgnt:9-22
administrative speeds
configuring Intf:2-14
administrative states
description Intf:2-8
setting Intf:2-12
administrator passwords
recovering (procedure sec:3-22
advanced
IVR configuration IVR:2-1
IVR zone zones and zone sets IVR:2-17
Advanced Encrypted Standard encryption. See AES encryption
advertisement packets
setting time intervals 5:4-13
AES encryption
description sysmgnt:7-4
IKE sec:7-7
IPsec sec:7-6
SNMP support sysmgnt:7-4
AES-XCBC-MAC
IPsec sec:7-7
AFIDs
configuring default IVR:2-6
configuring individual IVR:2-7
description IVR:1-4, IVR:2-5, IVR:2-9
guidelines IVR:2-6
verifying database configuration IVR:2-7
ALPA caches
allocation Intf:2-31
clearing Intf:2-32
description Intf:2-30
displaying contents Intf:2-32
inserting entries manually Intf:2-32
ARP caches
clearing 7:7-9
displaying 7:7-9
Array-Specific Library. See ASL
ASL DMM:4-3
authentication
fabric security sec:8-1
guidelines sec:4-4
local sec:4-3
MD5 5:4-14
simple text 5:4-14
user IDs sec:4-3
See also simple text authentication
authentication, authorization, and accounting. See AAA
authorization
role-based sec:3-1
rule placement order sec:3-4
Auto mode
configuration IVR:1-12
auto mode
configuring Intf:2-13
auto-negotiation
configuring Gigabit Ethernet interfaces 7:7-3
autonomous fabric ID
autonomous fabric identifiers. See AFIDs
AutoNotify
description sysmgnt:4-5
auto port mode
description Intf:2-7
interface configuration Intf:2-3
autosensing speed
Generation 2 switching modules Intf:2-15
auto topology mode
configuration guidelines IVR:1-9
enabling IVR:1-12
B
bandwidth fairness
disabling Intf:3-33
enabling Intf:3-32
Generation 2 switching modules Intf:3-32
basic
IVR configuration IVR:1-1
basic configuration
task list IVR:1-6
BB_credits
FICON port swapping Fabric:11-37
reason codes Intf:2-9
beacon modes
configuring Intf:2-17
identifying LEDs Intf:2-16
best practices DMM:6-1
bit errors
reasons Intf:2-18
bit error thresholds
configuring Intf:2-17
description Intf:2-17
border switches
description IVR:1-4
IVR configuration guidelines IVR:2-9
B port mode
description Intf:2-7
interface modes Intf:2-7
B ports
configuring 2:2-21
interoperability mode 2:2-19
SAN extenders 2:2-20
bridge port mode. See B port mode
broadcast
routing Fabric:7-12
Brocade
native interop mode Fabric:12-14
buffer sizes
configuring in FCIP profiles 2:2-16
buffer-to-buffer credits. See BB_credits
build fabric frames
description sysmgnt:9-3
C
Call Home
alert groupssysmgnt:4-10to sysmgnt:4-13
AutoNotify feature sysmgnt:4-5
CFS support sysmgnt:2-2
configuration distribution sysmgnt:4-21
configuringsysmgnt:4-6to sysmgnt:4-23
configuring e-mail options sysmgnt:4-16
configuring SMTP servers sysmgnt:4-17
contact information sysmgnt:4-7
database merge guidelines sysmgnt:4-23
default settings sysmgnt:4-44
description sysmgnt:4-1
destination profilessysmgnt:4-8to sysmgnt:4-10
duplicate message throttle sysmgnt:4-20
enabling sysmgnt:4-21
features sysmgnt:4-2
inventory notifications sysmgnt:4-19
message format options sysmgnt:4-3
RMON-based alerts sysmgnt:4-15
syslog-based alerts sysmgnt:4-14
testing communications sysmgnt:4-23
Call Home alert groups
configuring sysmgnt:4-10, sysmgnt:4-11
customizing messages sysmgnt:4-12
description sysmgnt:4-10
verifying customization configuration sysmgnt:4-13
Call Home contacts
assigning information sysmgnt:4-7
Call Home destination profiles
attributes sysmgnt:4-8
configuring sysmgnt:4-9
displaying sysmgnt:4-24
Call Home messages
configuring levels sysmgnt:4-14
format options sysmgnt:4-3
Call Home notifications
full-txt format for syslog sysmgnt:4-27
XML format for RMON sysmgnt:4-31
XML format for syslog sysmgnt:4-28
CAs
authenticating sec:6-8
certificate download example sec:6-19
creating a trust point sec:6-8
default settings sec:6-39
deleting digital certificates sec:6-14
displaying configuration sec:6-16
enrollment using cut-and-paste sec:6-4
example configurationsec:6-16to sec:6-38
identity sec:6-2
maintaining sec:6-13
maximum limits sec:6-38
monitoring sec:6-13
multiple sec:6-4
multiple trust points sec:6-3
peer certificates sec:6-5
purpose sec:6-2
CDP
certificate authorities. See CAs
certificate revocation lists. See CRLs
CFS
application requirements sysmgnt:2-5
default settings sysmgnt:2-19
disabling on a switch sysmgnt:2-4
displaying status on a switch sysmgnt:2-5
distribution modes sysmgnt:2-3
distribution over IP sysmgnt:2-11
distribution scopes sysmgnt:2-3
enabling on a switch sysmgnt:2-4
feature description sysmgnt:2-2
logging configuration distribution sysmgnt:3-10
merge support sysmgnt:2-9
protocol description sysmgnt:2-3
SAN-OS features supported sysmgnt:2-2
saving configurations sysmgnt:2-8
verifying CFS merge status sysmgnt:2-9
CFS applications
clearing session locks sysmgnt:2-8
committing changes sysmgnt:2-7
discarding changes sysmgnt:2-8
enabling sysmgnt:2-5
fabric locking sysmgnt:2-6
verifying lock status sysmgnt:2-7
verifying registration status sysmgnt:2-6
CFS over IP
configuring IP multicast addresses sysmgnt:2-13
configuring static IP peers sysmgnt:2-14
default settings sysmgnt:2-19
description sysmgnt:2-11
enabling sysmgnt:2-12
verifying configuration sysmgnt:2-13
verifying multicast address sysmgnt:2-14, sysmgnt:2-15
CFS regions
assigning features sysmgnt:2-18
creating sysmgnt:2-18
description sysmgnt:2-16
displaying sysmgnt:2-19
moving a feature sysmgnt:2-18
removing a feature sysmgnt:2-19
using CLI sysmgnt:2-18
CIM
configuring Fabric:12-1
description Fabric:12-1
displaying information Fabric:12-3
CIM servers
displaying information Fabric:12-3, Fabric:12-5
Cisco Access Control Server. See Cisco ACS
Cisco ACS
configuring for RADIUSsec:4-55to sec:4-58
configuring for TACACS+sec:4-55to sec:4-58
cisco-av-pair
specifying for SNMPv3 sec:4-29
Cisco Discovery Protocol. See CDP
Cisco SME
required engines IOA:B-5
Cisco vendor ID
description sec:4-28
CLI command reference DMM:A-1
clusters
quorum IOA:B-1
reviving IOA:B-8
code pages
FICON text string formatting Fabric:11-20
commands
CLI DMM:7-1
Delete DMM:5-49
GUI DMM:5-48
Modify DMM:5-49
Start DMM:5-49
Stop DMM:5-49
Verify DMM:5-48
command scheduler
configuring sysmgnt:5-2
default settings sysmgnt:5-11
defining jobs sysmgnt:5-4
deleting jobs sysmgnt:5-6
description sysmgnt:5-1
enabling sysmgnt:5-3
execution logs sysmgnt:5-9
specifying schedulessysmgnt:5-6to sysmgnt:5-9
verifying execution status sysmgnt:5-9
See also execution logs; jobs; schedules
Common Information Model. See CIM
common roles
configuring sec:3-9
common users
mapping CLI to SNMP sec:3-10
company IDs
FC ID allocations Fabric:12-11
configuration
saving automatically for FICON Fabric:11-22
configuration files
FICON Fabric:11-33
configuration limits IVR:1-4
description (table) limits:12-1
Configuring DMM:5-20, DMM:5-27
configuring IP connectivity DMM:2-4
configuring NPV Intf:6-9
congestion window monitoring. See CWM
console logging
configuring sysmgnt:3-4
console sessions
message logging severity levels sysmgnt:3-4
contact information
assigning for Call Home sysmgnt:4-7
Contiguous Domain ID Assignments
About sysmgnt:9-14
contract IDs
description sysmgnt:4-37
Control Unit Port. See CUP in-band management
core dumps
IPS modules 6:6-4
Creating DMM:5-12
CRLs
configuring sec:6-14
configuring revocation checking methods sec:6-9
description sec:6-5
downloading example sec:6-34
generation example sec:6-33
crypto IPv4-ACLs
any keyword sec:7-20
configuration guidelines sec:7-17
creating sec:7-21
creating crypto map entries sec:7-24
mirror images sec:7-19
crypto map entries
configuring global lifetime values sec:7-29
global lifetime values sec:7-28
setting SA lifetimes sec:7-25
crypto maps
auto-peer option sec:7-26
configuration guidelines sec:7-24
configuring autopeer option sec:7-26
configuring perfect forward secrecy sec:7-27
creating entries sec:7-24
entries for IPv4-ACLs sec:7-23
perfect forward secrecy sec:7-27
SA lifetime negotiations sec:7-25
SAs between peers sec:7-23
crypto map sets
applying to interfaces sec:7-27
CUP in-band management
blocking restriction Fabric:11-25
description Fabric:11-42
displaying information Fabric:11-43
placing CUPs in zones Fabric:11-43
current VSANs
description IVR:1-3
CWM
configuring in FCIP profiles 2:2-15
D
Data Encryption Standard encryption. See DES encryption
data migration
lifecycle DMM:1-6
planning DMM:4-1
software requirements DMM:1-9
Data Migration Status display DMM:5-3
data migration wizards DMM:5-2
dead time intervals
configuring for FSPF Fabric:7-8
description Fabric:7-7
dedicated rate mode
description Intf:3-6
migrating from shared rate mode Intf:3-16, Intf:3-17
migrating to shared rate mode Intf:3-16, Intf:3-17
default gateways. See IPv4 default gateways
default networks. See IPv4 default networks
default settings
EEM sysmgnt:6-13
default VSANs
description Fabric:2-9
default zones
configuring access permissions Fabric:5-11
configuring QoS priorities Fabric:5-20
description Fabric:5-10
interoperability Fabric:12-14
policies Fabric:5-10
delayed server reconfiguration DMM:1-6
DES encryption
IKE sec:7-7
IPsec sec:7-6
destination IDs
exchange based Intf:5-5
flow based Intf:5-4
in-order delivery Fabric:7-13
path selection Fabric:2-11
destination profiles
configuring sysmgnt:4-8
device alias database
committing changes Fabric:6-6
disabling distribution Fabric:6-7
discarding changes Fabric:6-6
distribution to fabric Fabric:6-5
enabling distribution Fabric:6-7
merging Fabric:6-9
overriding fabric lock Fabric:6-7
device aliases
CFS support sysmgnt:2-2
clearing statistics Fabric:6-9
comparison with zones (table) Fabric:6-4
creating Fabric:6-5
default settings Fabric:6-12
description Fabric:6-1
displaying informationFabric:6-9to Fabric:6-11
features Fabric:6-3
modifying the database Fabric:6-4
requirements Fabric:6-3
device allegiance
FICON Fabric:11-22
device IDs
Call Home format sysmgnt:4-37
DH
IKE sec:7-7
DHCHAP
AAA authentication sec:8-9
authentication modes sec:8-4
compatibility with other SAN-OS features sec:8-3
configuring AAA authentication sec:8-9
default settings sec:8-13
description sec:8-2
displaying security information sec:8-10
enabling sec:8-4
group settings sec:8-6
hash algorithms sec:8-5
licensing sec:8-2
passwords for local switches sec:8-7
passwords for remote devices sec:8-8
sample configurationsec:8-11to sec:8-12
timeout values sec:8-9
differentiated services code point. See DSCP
Diffie-Hellman Challenge Handshake Authentication Protocol. See DHCHAP
Diffie-Hellman protocol. See DH
digital certificates
default settings sec:6-39
deleting from CAs sec:6-14
generating requests for identity certificates sec:6-10
installing identity certificates sec:6-11
maintaining sec:6-13
maximum limits sec:6-38
monitoring sec:6-13
peers sec:6-5
purpose sec:6-2
requesting identity certificate example sec:6-24
revocation example sec:6-30
SSH support sec:3-20
digital signature algorithm. See DSA key pairs
direct memory access devices. See DMA-bridges
DMA-bridges
displaying statistics 6:6-10
DMM
best practices DMM:6-1
command reference DMM:A-1
configuring migration rate DMM:2-21
server-based migration DMM:1-4
topologies DMM:3-1
DNS
default settings 5:4-15
DNS servers
configuring 5:4-14
domain ID
CFS support sysmgnt:2-2
domain IDs
allowed lists sysmgnt:9-10
assignment failures Intf:2-10
configuring allowed lists sysmgnt:9-11
configuring CFS distributionsysmgnt:9-11to sysmgnt:9-14
configuring fcalias members Fabric:5-11
contiguous assignments sysmgnt:9-14
description sysmgnt:9-8
distributing sysmgnt:9-2
enabling contiguous assignments sysmgnt:9-14
interoperability Fabric:12-14
IVR configuration guidelines IVR:2-8
non-unique and IVR NAT IVR:1-10
preferred sysmgnt:9-9
static sysmgnt:9-9
unique IVR:2-8
domain manager
fast restart feature sysmgnt:9-4
isolation Intf:2-10
downgrading
disabling ACL adjacency sharing Intf:3-35
DPVM
CFS support sysmgnt:2-2
default settings Fabric:4-14
description Fabric:4-1
displaying configurations Fabric:4-10
enabling Fabric:4-2
requirements Fabric:4-2
sample configurationFabric:4-11to Fabric:4-14
DPVM databases
autolearned entries Fabric:4-4
clearing Fabric:4-5
comparing differences Fabric:4-9
copying Fabric:4-9
description Fabric:4-3
displaying Fabric:4-11
enabling autolearning Fabric:4-5
merging guidelines Fabric:4-8
drop latency time
configuring for FSPF in-order delivery Fabric:7-16
displaying information Fabric:7-17
DSA key-pairs
generating sec:3-16
dsa key pairs
generating sec:3-16
DSCP
configuring 2:2-22
dynamic bandwidth management
description Intf:3-8
Dynamic Port VSAN Membership. See DPVM
E
EBCDIC
FICON string format Fabric:11-20
edge switches
description IVR:1-4
edge VSANs
description IVR:1-3
EEM
actions sysmgnt:6-4
activating a script policy sysmgnt:6-10
configuring action statements sysmgnt:6-8
configuring event statements sysmgnt:6-7
default settings sysmgnt:6-13
defining an environment variable sysmgnt:6-12
defining a policy sysmgnt:6-6
defining script policies sysmgnt:6-10
environment variables sysmgnt:6-4
event logs sysmgnt:6-2
events sysmgnt:6-3
example configuration sysmgnt:6-13
guidelines sysmgnt:6-5
high availability sysmgnt:6-5
licensing requirements sysmgnt:6-5
limitations sysmgnt:6-5
override policy sysmgnt:6-2
override policy (note) sysmgnt:6-2
override policy actions (note) sysmgnt:6-4
overriding a system policy sysmgnt:6-11
parameter substitution sysmgnt:6-4
policies sysmgnt:6-2
prerequisites sysmgnt:6-5
registering a script policy sysmgnt:6-10
script policies sysmgnt:6-4
system policies sysmgnt:6-2
verifying configuration sysmgnt:6-12
EEM overriding a system policy (example) sysmgnt:6-13
EFMD
fabric binding sec:10-1
EISLs
PortChannel links Intf:5-2
e-mail addresses
assigning for Call Home sysmgnt:4-7
e-mail notifications
Call Home sysmgnt:4-1
embedded event manager. See EEM
enabling DMM DMM:2-8
enclosures
configuring DMM:4-5
encrypted passwords
user accounts sec:3-13
enhanced zones
advantages over basic zones Fabric:5-31
broadcast frames Fabric:5-37
changing from basic zones Fabric:5-32
configuring default full database distribution Fabric:5-38
configuring default switch-wide zone policies Fabric:5-38
creating attribute groups Fabric:5-34
default settings Fabric:5-43
description Fabric:5-31
displaying informationFabric:5-39to Fabric:5-41
enabling Fabric:5-33
merging databases Fabric:5-35
modifying database Fabric:5-34
E port mode
classes of service Intf:2-4
description Intf:2-4
E ports
32-port guidelines Intf:2-2
32-port switching module configuration guidelines Intf:5-8
configuring Intf:2-13, 2:2-22
fabric binding checking sec:10-2
FCS support sysmgnt:10-1
FSPF topologies Fabric:7-2
isolation Intf:2-10
recovering from link isolations Fabric:5-15
SPAN sources sysmgnt:11-3
error reason codes DMM:6-12
Ethernet MAC statistics
displaying 6:6-10
Ethernet PortChannels
adding Gigabit Ethernet interfaces 6:6-9
configuring 6:6-8
description 6:6-7
redundancy 2:2-6
Exchange Fabric Membership Data. See EFMD sec:10-1
exchange IDs
in-order delivery Fabric:7-13
path selection Fabric:2-11
exchange link parameter. See ELP
execution logs
clearing log files sysmgnt:5-10
configuring sysmgnt:5-10
description sysmgnt:5-9
displaying configuration sysmgnt:5-10
displaying log file contents sysmgnt:5-10
existing storage
about DMM:1-2
configuring DMM:4-2
expansion port mode. See E port mode
Extended Binary-Coded Decimal Interchange Code. See EBCDIC Fabric:11-20
F
fabric binding
activation sec:10-4
checking for Ex ports sec:10-2
clearing statistics sec:10-6
compatibility with DHCHAP sec:8-3
configurationsec:10-3to sec:10-6
default settings sec:10-9
deleting database sec:10-6
descriptionsec:10-1to sec:10-2
EFMD sec:10-1
enforcement sec:10-2
forceful activation sec:10-5
licensing requirements sec:10-1
port security comparison sec:10-1
saving configurations sec:10-5
verifying configurationsec:10-6to sec:10-9
Fabric Configuration Server. See FCS
Fabric Configuration Servers. See FCSs
Fabric-Device Management Interface. See FDMI
fabric loop port mode. See FL port mode
Fabric Manager IVR:1-7
fabric port mode. See F port mode
fabric pWWNs
zone membership Fabric:5-2
fabric reconfiguration
fcdomain phase sysmgnt:9-2
fabrics
fabrics. See RCFs; build fabric frames
fabric security
authentication sec:8-1
default settings sec:8-13
Fabric Shortest Path First. See FSPF
facility logging
configuring message severity levels sysmgnt:3-6
fault tolerant fabrics
example (figure) Fabric:7-2
fcaliases
cloning Fabric:5-18
configuring for zones Fabric:5-11
creating Fabric:5-11
renaming Fabric:5-18
FCC
logging facility sysmgnt:3-2
fcdomains
autoreconfigured merged fabrics sysmgnt:9-7
configuring CFS distributionsysmgnt:9-11to sysmgnt:9-14
default settings sysmgnt:9-22
description sysmgnt:9-2
disabling sysmgnt:9-6
displaying informationsysmgnt:9-19to sysmgnt:9-22
domain IDs sysmgnt:9-8
domain manager fast restart sysmgnt:9-4
enabling sysmgnt:9-6
enabling autoreconfiguration sysmgnt:9-7
incoming RCFs sysmgnt:9-6
initiation sysmgnt:9-5
overlap isolation Intf:2-10
restarts sysmgnt:9-3
switch priorities sysmgnt:9-5
FC ID
configuring IVR:2-16
features and benefits IVR:2-14
guidelines IVR:2-15
FC ID allocation
FICON implementation Fabric:11-14
FC IDs
allocating Fabric:12-11, sysmgnt:9-2
allocating default company ID lists Fabric:12-11
allocating for FICON Fabric:11-14
allocation for HBAs Fabric:12-11
configuring fcalias members Fabric:5-11
description sysmgnt:9-14
FCIP
advanced features 2:2-24
compatibility with DHCHAP sec:8-3
compression 2:2-34
default parameters 2:2-36
discarding packets 2:2-19
enabling 2:2-8
FICON support Fabric:11-4
Gigabit Ethernet ports 7:7-1
IPS modules 2:2-2
IP storage services support 6:6-1
link failures 2:2-5
MPS-14/2 module 2:2-2
reserving ports for FICON Fabric:11-13
sample IPsec configurationsec:7-34to sec:7-38
tape acceleration2:2-28to 2:2-34
time stamps 2:2-19
VE ports 2:2-2
virtual ISLs 2:2-2
VRRP 2:2-6
write acceleration 2:2-25
FCIP compression
configuring 2:2-35
description 2:2-34
displaying information 2:2-35
FCIP interfaces
binding to FICON port numbers Fabric:11-24
configuring peers 2:2-17
configuring QoS 2:2-22
creating 2:2-17
displaying information 2:2-22
parameters 2:2-4
SPAN sources sysmgnt:11-3
FCIP links
B port interoperability mode 2:2-19
configuring 2:2-8
configuring peers 2:2-17
configuring QoS 2:2-22
creating 2:2-10
description 2:2-3
endpoints 2:2-3
initiating IP connections 2:2-18
TCP connections 2:2-3
FCIP listener ports
configuring 2:2-11
FCIP peers
configuring IP addresses 2:2-18
FCIP profiles
configuring listener ports 2:2-11
creating 2:2-9
description 2:2-4
displaying information 2:2-9
FCIP tape acceleration
configuring 2:2-32
displaying information 2:2-33
FCIP TCP parameters
configuring buffer size 2:2-16
configuring CWM 2:2-15
configuring keepalive timeouts 2:2-12
configuring maximum jitter 2:2-15
configuring maximum retransmissions 2:2-13
configuring minimum retransmit timeouts 2:2-12
configuring PMTUs 2:2-13
configuring SACKs 2:2-13
configuring window management 2:2-14
FCIP write acceleration
configuring 2:2-27
description 2:2-25
displaying information 2:2-27
FCP
intermixing protocols Fabric:11-5
FC Redirect DMM:3-1
FCS
description sysmgnt:10-1
logging facility sysmgnt:3-2
significance sysmgnt:10-2
FC-SP
authentication sec:8-1
enabling sec:8-4
FCSs
configuring names sysmgnt:10-3
default settings sysmgnt:10-7
description sysmgnt:10-1
fctimers
CFS support sysmgnt:2-2
displaying configured values Fabric:12-9
distribution Fabric:12-7
FDMI
description Fabric:9-6
displaying database information Fabric:9-6
Federal Information Processing Standards. See FIPS
Fiber Channel interfaces
configuring system default port mode f Intf:2-13
Fibre Channel
sWWNs for fabric binding sec:10-4
time out valuesFabric:12-5to Fabric:12-9
Fibre Channel Analyzers
configuring using SPAN sysmgnt:11-13
Fibre Channel analyzers
monitoring without SPAN sysmgnt:11-11
Fibre Channel domains. See fcdomains
Fibre Channel header modifications IVR:1-5
Fibre Channel interface
default settings Intf:2-45
Fibre Channel interfaces
administrative states Intf:2-8
characteristicsIntf:2-2to Intf:2-12
configuring Intf:2-11
configuring auto port mode Intf:2-13
configuring beacon modes Intf:2-17
configuring bit error thresholds Intf:2-17
configuring descriptions Intf:2-15
configuring frame encapsulation Intf:2-16
configuring port modes Intf:2-13
configuring speeds Intf:2-14
deleting from PortChannels Intf:5-15
disabling Intf:2-12
displaying capabilities on Generation 2 switching modules Intf:3-15
displaying informationIntf:2-20to Intf:2-27
displaying VSAN membership Fabric:2-8
enabling Intf:2-12
graceful shutdown Intf:2-12
modesIntf:2-3to Intf:2-7
operational states Intf:2-8
reason codes Intf:2-8
states Intf:2-7
taking out of service on Generation 2 switching modules Intf:3-33
troubleshooting operational states Intf:2-9
See also interfaces Intf:2-7
Fibre Channel over IP. See FCIP
Fibre Channel Protocol. See FCP
Fibre Channel Security Protocol. See FC-SP
Fibre Channel traffic
SPAN sources sysmgnt:11-3
FICON
advantages on MDS switchesFabric:11-3to Fabric:11-7
automatic configuration save Fabric:11-23
basic configuration Fabric:11-16
cascading Fabric:11-7
clearing device allegiance Fabric:11-22
configuration files Fabric:11-32
configuring<$11-22 Fabric:11-15
configuring portsFabric:11-24to Fabric:11-32
CUP in-band management Fabric:11-42
default settings Fabric:11-51
descriptionFabric:11-1to Fabric:11-7
displaying informationFabric:11-44to Fabric:11-51
fabric binding requirements sec:10-3
FC4 protocols Fabric:11-2
FC ID allocations Fabric:11-14
FCIP support Fabric:11-4
host timestamp control Fabric:11-21
implemented ports Fabric:11-11
installed ports Fabric:11-11
manually enabling Fabric:11-19
MDS-supported features Fabric:11-5
PortChannel support Fabric:11-4
port numberingFabric:11-7to Fabric:11-14
port swappingFabric:11-36to Fabric:11-38
prohibited ports Fabric:11-48
RLIRs Fabric:11-27
saving configuration changes Fabric:11-22
sWWNs for fabric binding sec:10-4
text string formatting codes Fabric:11-20
unimplemented port Fabric:11-11
VSAN offline state Fabric:11-42
FICON configuration files
applying to running configuration Fabric:11-33
copying Fabric:11-35
description Fabric:11-33
displaying Fabric:11-34
displaying information Fabric:11-46
editing Fabric:11-33
FICON port numbers
assigning to slots Fabric:11-12
default numbering scheme Fabric:11-8
displaying assignments Fabric:11-12
FCIP interfaces Fabric:11-13
implemented addresses Fabric:11-11
installed ports Fabric:11-11
logical interfaces Fabric:11-13
numbering guidelines Fabric:11-12
PortChannel interfaces Fabric:11-13
port swapping Fabric:11-10
reserved numbering scheme Fabric:11-11
unimplemented addresses Fabric:11-11
uninstalled ports Fabric:11-11
FICON ports
assigning address names Fabric:11-27
binding to FCIP interfaces Fabric:11-24
binding to PortChannels Fabric:11-24
blocking Fabric:11-25
configuring prohibiting default state Fabric:11-26
displaying address information Fabric:11-45
displaying administrative states Fabric:11-48
prohibiting Fabric:11-25
swapping configurations Fabric:11-37
FICON port swapping
guidelines Fabric:11-37
FICON tape acceleration
configuration considerations Fabric:11-40
configuring Fabric:11-40
description Fabric:11-38, Fabric:11-40, Fabric:11-42
FICON tape read acceleration
configuring Fabric:11-41
File Transfer Protocol. See FTP
configuration guidelines sec:2-1
self-tests sec:2-2
FLOGI
description Fabric:9-1
displaying details Fabric:9-1
logging facility sysmgnt:3-2
flow statistics
clearing Fabric:7-18
counting Fabric:7-18
description Fabric:7-17
displaying Fabric:7-18
FL port mode
classes of service Intf:2-5
description Intf:2-5
FL ports
configuring Intf:2-13
description Intf:2-5
DPVM support Fabric:4-4
nonparticipating code Intf:2-10
persistent FC IDs sysmgnt:9-15
SPAN sources sysmgnt:11-3
F port mode
classes of service Intf:2-5
description Intf:2-5
F ports
configuring Intf:2-13
description Intf:2-5
DPVM support Fabric:4-4
SPAN sources sysmgnt:11-3
FPSF
load balancing (example) 2:2-5
frame encapsulation
configuring Intf:2-16
frames
configuring MTU size 7:7-3
FSCN
displaying databases Fabric:10-3
FSPF
clearing counters Fabric:7-9
clearing VSAN counters Fabric:7-6
computing link cost Fabric:7-7
configuring globallyFabric:7-4to Fabric:7-6
configuring Hello time intervals Fabric:7-7
configuring link cost Fabric:7-6
configuring on a VSAN Fabric:7-5
configuring on interfacesFabric:7-6to Fabric:7-9
dead time intervals Fabric:7-7
default settings Fabric:7-21
description Fabric:7-2
disabling Fabric:7-6
disabling on interfaces Fabric:7-9
disabling routing protocols Fabric:7-6
displaying database information Fabric:7-20
displaying global information Fabric:7-19
enabling Fabric:7-6
fail-over with PortChannels Fabric:7-3
fault tolerant fabrics Fabric:7-2
flow statisticsFabric:7-17to Fabric:7-19
in-order deliveryFabric:7-13to Fabric:7-17
interoperability Fabric:12-15
link state record defaults Fabric:7-4
multicast root switches Fabric:7-12
reconvergence times Fabric:7-2
redundant links Fabric:7-3
resetting configuration Fabric:7-5
resetting to defaults Fabric:7-5
retransmitting intervals Fabric:7-8
routing services Fabric:7-1
topology examplesFabric:7-2to Fabric:7-4
FSPF multicast roots
configuring switches Fabric:7-12
FSPF routes
configuring Fabric:7-10
description Fabric:7-10
FSPF routing
multicast Fabric:7-12
FTP
logging facility sysmgnt:3-2
full core dumps
IPS modules 6:6-4
full zone sets
considerations Fabric:5-4
enabling distribution Fabric:5-15
fWWNs
configuring fcalias members Fabric:5-11
Fx ports
32-port default Intf:2-3
configuring Intf:2-13
description Intf:2-7
FCS sysmgnt:10-1
FCS support sysmgnt:10-1
interface modes Intf:2-7
VSAN membership Fabric:2-4
See also F ports; FL ports Intf:2-7
G
Generation 1 switching modules
port index allocations Intf:3-10
Generation 2 switching modules
configuring port speeds Intf:3-19
configuring rate modes Intf:3-21
default settings Intf:3-40
descriptionIntf:3-1to Intf:3-3
disabling ACL adjacency sharing Intf:3-35
displaying port resources Intf:3-34
dynamic bandwidth management Intf:3-8
example configurationsIntf:3-36to Intf:3-40
interface capabilities Intf:3-15
out-of-service interfaces Intf:3-8
port groups Intf:3-3
port index allocations Intf:3-10
port rate modes Intf:3-4
recovering from powered-down state Intf:3-12
releasing shared resources Intf:3-34
taking interfaces out of service Intf:3-33
Generation 3 switching modules
default settings Intf:3-41
Gigabit Ethernet interfaces
configuring auto-negotiation 7:7-3
configuring high availability6:6-5to 6:6-9
configuring IPv4 7:7-2
configuring IPv6 addresses 8:8-19
configuring MTU frame sizes 7:7-3
configuring promiscuous mode 7:7-4
configuring static IPv4 routing 7:7-7
configuring VRRP 6:6-6
default parameters 7:7-10
displaying statistics6:6-9to 6:6-13
IPv4-ACL guidelines 7:7-7
subinterfaces 7:7-6
subnet requirements 7:7-6
verifying connectivity 7:7-4
Gigabit Ethernet subinterfaces
configuring VLANs 7:7-6
global keys
assigning for RADIUS sec:4-24
guidelines for deploying DMM DMM:2-3
H
hard zoning
description Fabric:5-14
HBA ports
configuring area FCIDs sysmgnt:9-17
HBAs
device aliases Fabric:6-1
FC ID allocations Fabric:12-11
Hello time intervals
configuring for FSPF Fabric:7-7
description Fabric:7-7
heterogeneous SANs DMM:3-1
high availability
compatibility with DHCHAP sec:8-3
EEM sysmgnt:6-5
Ethernet PortChannels 2:2-6
Fibre Channel PortChannels 2:2-7
VRRP 2:2-6
homogeneous SANs DMM:3-1
host control
FICON Fabric:11-20
host keys
assigning sec:4-22
host names
configuring for digital certificates sec:6-6
I
IBM PPRC
FICON support Fabric:11-4
ICMP
displaying statistics 6:6-12
IPv6 8:8-13
ICMP packets
IPv6 header format, figure 8:8-13
type value sec:5-4
IDs
Cisco vendor ID sec:4-28
contract IDs sysmgnt:4-37
serial IDs sysmgnt:4-37, sysmgnt:4-42
site IDs sysmgnt:4-36
IKE
algorithms for authentication sec:7-7
default settings sec:6-39, sec:7-40
description sec:7-3
displaying configurations sec:7-29
enabling sec:7-11
initializing sec:7-10
refreshing SAs sec:7-16
terminology sec:7-5
transforms for encryption sec:7-7
IKE domains
clearing sec:7-16
configuring sec:7-11
description sec:7-11
IKE initiators
configuring version sec:7-16
displaying configuration sec:7-30
IKE peers
configuring keepalive times sec:7-15
displaying keepalive configuration sec:7-29
IKE policies
configuring lifetime associations sec:7-15
configuring negotiation parameters sec:7-13
displaying current policies sec:7-30
negotiation sec:7-11
IKE tunnels
clearing sec:7-16
description sec:7-11
in-band management
CUP Fabric:11-42
IPFC 5:4-7
in-order delivery
configuring drop latency time Fabric:7-16
displaying status Fabric:7-15
enabling for VSANs Fabric:7-15
enabling globally Fabric:7-15
guidelines Fabric:7-14
reordering network frames Fabric:7-13
reordering PortChannel frames Fabric:7-14
installing DMM DMM:2-1
interfaces
adding to PortChannels Intf:5-13, Intf:5-14
assigning to VSANs Fabric:2-7
configuring descriptions Intf:2-15
configuring fcalias members Fabric:5-11
default settings Intf:2-45
deleting from PortChannels Intf:5-15
displaying informationIntf:2-20to Intf:2-27
displaying SFP information Intf:2-26
forced addition to PortChannels Intf:5-14
isolated states Intf:5-13
suspended states Intf:5-13
VSAN membership Fabric:2-7
Internet Control Message Protocol. See ICMP
Internet Key Exchange. See IKE
interoperability
configuring interop mode 1 Fabric:12-16
description Fabric:12-13
VSANs Fabric:2-11
interop modes
configuring mode 1 Fabric:12-16
default settings Fabric:12-20
description Fabric:12-13
Inter-VSAN Routing zones. See IVR zones
Inter-VSAN Routing zone sets. See IVR zone sets
inventories
configuring notifications sysmgnt:4-20
IP addresses
SMTP server sysmgnt:4-17
IP configuration DMM:2-4
IP connections
active mode 2:2-18
initiating 2:2-18
passive mode 2:2-18
IP domain names
configuring for digital certificates sec:6-6
IPFC
configuration guidelines 5:4-7
description 5:4-7
logging facility sysmgnt:3-2
IP filters
contents sec:5-2
restricting IP traffic sec:5-1, sec:5-2
IPS core dumps. See core dumps
IPsec
algorithms for authentication sec:7-6
crypto IPv4-ACLssec:7-16to sec:7-21
default settings sec:7-40
description sec:7-2
digital certificate supportsec:7-7to sec:7-10
displaying configurationssec:7-30to sec:7-34
fabric setup requirements sec:7-5
global lifetime values sec:7-28
hardware compatibility sec:7-4
licensing requirements sec:7-4
maintenance sec:7-28
prerequisites sec:7-4
RFC implementations sec:7-1, sec:7-2
sample FCIP configurationsec:7-34to sec:7-38
sample iSCSI configurationsec:7-38to sec:7-40
terminology sec:7-5
transform sets sec:7-21
transforms for encryption sec:7-6
unsupported features sec:7-5
IPS modules
CDP support 6:6-9
core dumps 6:6-4
FCIP 2:2-2
partial core dumps 6:6-4
port modes 7:7-1
software upgrades 6:6-3
supported features 6:6-1
IPS ports
modes 7:7-1
SPAN sources sysmgnt:11-3
IP storage services
default parameters 6:6-13
IP Storage services modules. See IPS modules
IPv4
configuring Gigabit Ethernet interfaces 7:7-2
default settings 7:7-10
description 7:7-1
displaying statistics 7:7-9
transitioning to IPv6 8:8-26
IPv4-ACLs
adding entries sec:5-7
applying to interfaces sec:5-10, sec:5-12
clearing counters sec:5-13
configuration guidelines sec:5-2
cryptosec:7-16to sec:7-21
crypto map entries sec:7-23
defining filters sec:5-6
displaying configuration sec:5-8
guidelines for Gigabit Ethernet interfaces 7:7-7
operands sec:5-7
reading dump logs sec:5-9
removing entries sec:5-8
verifying interface configuration sec:5-12
IPv4 addresses
configuring fcalias members Fabric:5-11
configuring IPv6 and IPV6 protocol stacks 8:8-20
IPv6 protocol stacks 8:8-17
IPv4 default gateways
configuring 5:4-3
configuring mgmt0 interfaces Intf:2-43
description 5:4-3
static routes (tip) 5:4-6
IPv4 default networks
description 5:4-6
IPv4 routing
configuring Gigabit Ethernet interfaces 7:7-7
displaying route tables 7:7-7
IPv6
address types 8:8-10
configuring addressing 8:8-18
configuring IPv4 and IPv6 addresses 8:8-20
configuring management interfaces 5:4-3
configuring neighbor discovery parameters 8:8-22
default settings 8:8-27
displaying information 8:8-26
dual IPv4 and IPv6 protocol stack applications, figure 8:8-18
dual IPv4 and IPv6 protocol stacks 8:8-17
dual IPv4 and IPv6 protocol stack technique, figure 8:8-17
enabling routing 8:8-18
enhancements over IPv4 8:8-8
ICMP 8:8-13
IPv6-ACL guidelines 8:8-25
neighbor discovery 8:8-14
path MTU discovery 8:8-14
router advertisement messages 8:8-16
router discovery 8:8-16
stateless autoconfiguration 8:8-16
static routes 8:8-24
transitioning from IPv4 8:8-26
verifying basic connectivity 8:8-20
verifying configuration 8:8-20
IPv6-ACLs
defining sec:5-7
guidelines for IPv6 8:8-25
operands sec:5-7
IPv6 addresses
configuring 8:8-18
configuring fcalias members Fabric:5-2, Fabric:5-11
configuring IPv4 and IPV6 protocol stacks 8:8-20
formats 8:8-9
link-local type 8:8-11
multicast type 8:8-12
prefix format 8:8-10
unicast type 8:8-10
IPv6 neighbor discovery
advertisement messages 8:8-14
description 8:8-14
neighbor solicitation message, figure 8:8-15
solicitation messages 8:8-14
IPv6 routing
enabling 8:8-18
IPv6 static routes
configuring 8:8-24
displaying the route table 8:8-24
iSCSI
Gigabit Ethernet ports 7:7-1
IPS module support 6:6-2
MPS-14/2 module support 6:6-2
sample IPsec configurationsec:7-38to sec:7-40
iSCSI interfaces
SPAN sources sysmgnt:11-3
iSLB
CFS support sysmgnt:2-2
ISLs
PortChannel links Intf:5-2
iSNS
CFS support sysmgnt:2-2
isolated VSANs
description Fabric:2-9
displaying membership Fabric:2-9
IVR
activating topologies IVR:2-11
AF IDs IVR:2-9
basic configuration IVR:1-1
basic configuration task list IVR:1-6
border switch IVR:1-4
border switch, guidelines IVR:2-9
border switch configuration guidelines IVR:2-9
border switches IVR:1-4
configuration limits IVR:1-4
configuration task lists IVR:1-6, IVR:2-1
configuring
advanced IVR:2-2
basic IVR:1-6
configuring logging levels IVR:1-22
configuring without auto topology IVR:2-7
configuring without IVR NAT IVR:2-7
guidelines IVR:2-8
current VSANs IVR:1-3
database merge guidelines IVR:1-22
databases IVR:1-8
default settings IVR:1-28
default zone policy IVR:1-15
domain ID configuration guidelines IVR:2-8
domain ID guidelines IVR:2-8
edge switch IVR:1-4
edge switches IVR:1-4
edge VSANs IVR:1-3
enabling IVR:1-7
enabling distribution with CFS IVR:1-7
features IVR:1-2
Fibre Channel header modifications IVR:1-5
interoperability IVR:1-6
logging IVR:1-22
native VSANs IVR:1-3
paths IVR:1-3
persistent FC IDs IVR:2-14
read-only zoning IVR:2-20
SDV limitations Fabric:3-12
service groupsIVR:2-2to IVR:2-5
terminology IVR:1-3
transit VSAN configuration guidelines IVR:2-8
transit VSANs IVR:1-4
virtual domains IVR:1-13
VSAN topologies IVR:1-5
zone communication IVR:1-15
zone configuration guidelines IVR:2-18
zonesIVR:1-3, IVR:1-15to IVR:1-16
zone sets IVR:1-3
Zone Wizard IVR:1-7
IVR databases
active IVR:1-8
configured IVR:1-8
merge guidelines IVR:1-22
pending IVR:1-8
IVR logging
configuring levels IVR:1-22
IVR logging levels
verifying configuration IVR:1-22
IVR manual configuration
guidelines IVR:2-9
IVR NAT
border switch, guidelines IVR:1-11
configuration guidelines IVR:1-9
description IVR:1-10
enabling auto-discovery IVR:1-12
load balancing IVR:1-10
requirements IVR:1-10
transit VSANs, guidelines IVR:1-11
IVR persistent FC IDs
configuring IVR:2-16
persistent IVR:2-14
verifying configuration IVR:2-16
IVR service groups
activation IVR:2-3
characteristics IVR:2-2
clearing IVR:2-5
configuring IVR:2-4
copying active IVR:2-5
default IVR:2-3
description IVR:1-4
IVR configuration guidelines IVR:2-2
verifying configuration IVR:2-5
IVR topologies
activating a manually configured topology IVR:2-11
adding IVR-enabled switches IVR:2-12
CFS support sysmgnt:2-2
clearing manual entries IVR:2-13
configuring manually IVR:2-10
copying active topologies IVR:2-13
enabling automatic discovery IVR:1-12
migrating from IVR auto topology mode to IVR manual topology mode IVR:2-14
verifying configuration IVR:2-13
IVR virtual domains
clearing IVR:1-14
configuring IVR:1-13
description IVR:1-13
verifying configuration IVR:1-14
IVR zones
activating with force option IVR:1-18
advanced
description IVR:2-17
automatic creation IVR:1-15
clearing database IVR:1-21, IVR:2-20
configuring LUNs IVR:2-18
configuring with IVR Zone Wizard IVR:1-7
description IVR:1-3, IVR:1-14, IVR:1-15
differences with zones (table) IVR:1-15
maximum number of members IVR:1-4
maximum number of zones IVR:1-4
renaming IVR:2-19
verifying configuration IVR:1-19
verifying QoS configuration IVR:2-19
IVR zone sets
activating IVR:1-19
advanced configuration
description IVR:2-17
deactivating IVR:1-19
maximum number IVR:1-4
renaming IVR:2-19
verifying configuration IVR:1-19
IVR Zone Wizard IVR:1-7
J
jitter
configuring estimated maximum in FCIP profiles 2:2-15
job creation errors DMM:5-7, DMM:5-14, DMM:5-34
jobs
assigning to a schedule sysmgnt:5-6, sysmgnt:5-7
command scheduler sysmgnt:5-1
defining sysmgnt:5-4
deleting sysmgnt:5-6
removing from a schedule sysmgnt:5-8
verifying definition sysmgnt:5-5
job status values DMM:5-46
K
keepalive timeouts
configuring in FCIP profiles 2:2-12
L
LEDs
beacon mode states Intf:2-16
speed Intf:2-17
licenses
for fixed slot - MDS 9222i Switch DMM:2-2
for MSM-18/4 module-MDS 9200 Series with SSM DMM:2-2
licensing requirements
EEM sysmgnt:6-5
limits
description (table) limits:12-1
link costs
configuring for FSPF Fabric:7-7
description Fabric:7-6
Link Incident Records. See LIRs
link-local addresses
description 8:8-11
format, figure 8:8-11
link redundancy
Ethernet PortChannel aggregation 6:6-7
LIRs
description Fabric:11-27
load balancing
attributes Fabric:2-11
attributes for VSANs Fabric:2-5
configuring Fabric:2-11
description Fabric:2-11, Intf:5-4
FSPF (example) 2:2-5
guarantees Fabric:2-11
PortChannels Intf:5-2
PortChannels (example) 2:2-5
logging
default settings sysmgnt:3-16
disabling sysmgnt:3-4
enabling sysmgnt:3-4
message severity levels sysmgnt:3-3
Logical Unit Number
logical unit numbers. See LUNs
logins
SSH sec:4-5
Telnet sec:4-5
LUN DMM:1-3
LUNs
displaying automatically discovered SCSI targets Fabric:10-4
displaying customized discovered SCSI targets Fabric:10-4
displaying discovered SCSI targets Fabric:10-3
LUN zoning
configuring Fabric:5-23
description Fabric:5-22
M
MAC addresses
configuring secondary Fabric:12-11
mainframes
FICON parameters Fabric:11-21
VSAN clock Fabric:11-21
management interfaces
configuring Intf:2-43, 5:4-3
configuring for IPv6 5:4-3
default settings Intf:2-45
displaying information Intf:2-44
features Intf:2-43
master switch election IOA:B-1
four-switch cluster scenarios IOA:B-4
three-switch cluster scenarios IOA:B-3
maximum retransmissions
configuring in FCIP profiles 2:2-13
McData
native interop mode Fabric:12-14
MD5 authentication
IKE sec:7-7
IPsec sec:7-6
VRRP 5:4-14
merged fabrics
autoreconfigured sysmgnt:9-7
Message Authentication Code using AES. See AES-XCBC-MAC
Message Digest 5. See MD5 authentication
mgmt0 interfaces
configuring Intf:2-43
default settings Intf:2-45
features Intf:2-43
local IPv4 routing 5:4-7
Microsoft Challenge Handshake Authentication Protocol. See MSCHAP
migration jobs
Method 1
overview DMM:1-5
Method 2
deleting DMM:5-50
finishing DMM:5-50, DMM:5-51, DMM:7-20
finishing, cli command DMM:7-17
finishing, command DMM:5-48
overview DMM:1-5
Method 3
server-based DMM:5-11
storage-based DMM:5-22
minimum retransmit timeouts
configuring in FCIP profiles 2:2-12
modules
configuring message logging sysmgnt:3-6
monitor sessions
message logging severity levels sysmgnt:3-6
MPS-14/2 modules
CDP support 6:6-9
FCIP 2:2-2
port modes 7:7-1
software upgrades 6:6-3
MSCHAP
description sec:4-50
MSM
configuring DMM:4-2
MTUs
configuring frame sizes 7:7-3
path discovery for IPv6 8:8-14
multicast addresses
IPv6 alternative to broadcast addresses 8:8-13
IPv6 format, figure 8:8-12
IPv6 solicited-node format, figure 8:8-13
multicast root switches
configuring Fabric:7-12
description Fabric:7-12
multiple VSANs
configuring 5:4-9
Multiprotocol Services modules. See MPS-14/2 modules
N
name servers
displaying database entries Fabric:9-4
interoperability Fabric:12-15
LUN information Fabric:10-1
proxy feature Fabric:9-3
registering proxies Fabric:9-3
rejecting duplicate pWWNs Fabric:9-4
native VSANs
description IVR:1-3
neighbor discovery
configuring parameters 8:8-22
verifying configuration 8:8-23
network administrators
additional roles sec:4-3
permissions sec:4-3
network operators
permissions sec:4-3
new storage
about DMM:1-2
configuring DMM:4-2
NL ports
hard zoning Fabric:5-14
interface modes Intf:2-7
zone enforcement Fabric:5-14
node world wide names. See nWWNs
nonparticipating codes
description Intf:2-10
NPIV
description Intf:6-1
enabling Intf:6-2
NP links Intf:6-5
N port identifier virtualization. See NPIV
N ports
hard zoning Fabric:5-14
zone enforcement Fabric:5-14
zone membership Fabric:5-2
NL ports
NP-ports Intf:6-5
NPV, configuring Intf:6-9
NPV mode Intf:6-4
NTP
CFS support sysmgnt:2-2
logging facility sysmgnt:3-2
time-stamp option 2:2-19
nWWNs
DPVM Fabric:4-1
Nx ports
FCS support sysmgnt:10-1
O
Online Certificate Status Protocol. See OCSP
operational states
configuring on Fibre Channel interfaces Intf:2-13
description Intf:2-8
OSCP
support sec:6-5
out-of-service interfaces
description Intf:3-8
overlay VSANs
configuring 5:4-8
description 5:4-8
oversubscription
disabling restrictions Intf:3-28
enabling restrictions Intf:3-31
Generation 2 switching modules Intf:3-26
ratios Intf:3-26
P
packets
discarding in FCIP 2:2-19
passwords
encrypted sec:3-13
recovering (procedure) sec:3-22
strong characteristics sec:3-12
paths
manually selecting DMM:5-8
persistent domain ID
FICON VSANs sec:10-3
persistent FC IDs
configuring IVR:2-16, sysmgnt:9-16
description IVR:2-14, sysmgnt:9-15
displaying sysmgnt:9-20
enabling sysmgnt:9-16
purging sysmgnt:9-19
PKI
enrollment support sec:6-4
PLOGI
name server Fabric:9-4
PMTUs
configuring in FCIP profiles 2:2-13
port addresses
FICON Fabric:11-10
PortChannel modes
description Intf:5-6
PortChannel Protocol
autocreation Intf:5-18
configuring autocreation Intf:5-18
converting autocreated groups to manually configured Intf:5-19
creating channel group Intf:5-16
description Intf:5-15
enabling autocreation Intf:5-18
PortChannels
adding interfaces Intf:5-13, Intf:5-14
administratively down Intf:2-10
binding to FICON port numbers Fabric:11-24
comparison with trunking Intf:5-3
compatibility checks Intf:5-13
compatibility with DHCHAP sec:8-3
configuration guidelines Intf:5-10
configuring Fibre Channel routes Fabric:7-11
configuring for FCIP high availability 2:2-5
creating Intf:5-11
default settings Intf:5-25
deleting Intf:5-12
deleting interfaces Intf:5-15
description Intf:5-1
examples Intf:5-2
FICON support Fabric:11-4
forcing interface additions Intf:5-14
Generation 2 switching module interfaces Intf:3-12
in-order guarantee Fabric:7-14
interface states Intf:5-13
interoperability Fabric:12-15
link changes Fabric:7-14
link failures Fabric:7-3
load balancing Intf:5-4
load balancing (example) 2:2-5
logging facility sysmgnt:3-2
member combinations 6:6-7
misconfiguration error detection Intf:5-11
redundancy 2:2-7
reserving ports for FICON Fabric:11-13
SPAN sources sysmgnt:11-3
verifying configurationsIntf:5-21to Intf:5-24
port groups
description Intf:3-3
Generation 2 Fibre Channel switching modules Intf:3-3
Generation 3 Fibre Channel switching modules Intf:3-7
port indexes
description Intf:3-10
port modes
auto Intf:2-7
descriptionIntf:2-3to Intf:2-7
IPS 7:7-1
port numbers. See FICON port numbers
port rate modes
configuring Intf:3-21
dedicated Intf:3-6
description Intf:3-4
oversubscribed Intf:3-7
shared Intf:3-7
ports
virtual E 2:2-2
VSAN membership Fabric:2-7
port security
activating sec:9-6
activation sec:9-3
activation rejection sec:9-6
adding authorized pairs sec:9-11
auto-learning sec:9-2
CFS support sysmgnt:2-2
cleaning up databases sec:9-17
compatibility with DHCHAP sec:8-3
configuration guidelines sec:9-3
configuring CFS distributionsec:9-12to sec:9-14
copying databases sec:9-16
database interactions sec:9-15
database merge guidelines sec:9-14
data scenarios sec:9-15
deactivating sec:9-6
default settings sec:9-20
deleting databases sec:9-17
disabling sec:9-5
displaying configurationsec:9-18, sec:9-18to sec:9-20
enabling sec:9-5
enforcement mechanisms sec:9-2
fabric binding comparison sec:10-1
forcing activation sec:9-6
license requirement sec:9-2
manual configuration guidelines sec:9-5
preventing unauthorized accesses sec:9-2
unauthorized accesses prevented sec:9-2
WWN identification sec:9-10
port security auto-learning
description sec:9-2
device authorization sec:9-8
disabling sec:9-8
distributing configuration sec:9-13
enabling sec:9-7
guidelines for configuring with CFS sec:9-4
guidelines for configuring without CFS sec:9-4
port security databases
cleaning up sec:9-17
copying sec:9-16
deleting sec:9-17
displaying configurationsec:9-18to sec:9-19
displaying violations sec:9-20
interactions sec:9-15
manual configuration guidelines sec:9-5
merge guidelines sec:9-14
reactivating sec:9-7
scenarios sec:9-15
port speeds
configuring Intf:2-14
configuring on Generation 2 switching module interfaces Intf:3-19
displaying configuration Intf:3-20
port swapping. See FICON port swapping
port world wide names. See pWWNs
post-migration DMM:5-51
preshared keys
RADIUS sec:4-24
TACACS+ sec:4-32
principal switches
assigning domain ID sysmgnt:9-9
configuring sysmgnt:9-10
private devices
TL ports Intf:2-31
profiles
configuring sec:3-2
modifying sec:3-3
prohibited ports
FICON Fabric:11-48
promiscuous mode
configuring Gigabit Ethernet interfaces 7:7-4
proxies
registering for name servers Fabric:9-3
Public Key Infrastructure. See PKI
pWWNs
configuring fcalias members Fabric:5-11
DPVM Fabric:4-1
rejecting duplicates Fabric:9-4
zone membership Fabric:5-2
Q
QoS
DSCP value 2:2-22
logging facilities sysmgnt:3-2
R
RADIUS
AAA protocols sec:4-1
assigning host keys sec:4-22
CFS merge guidelines sec:4-49
CFS support sysmgnt:2-2
clearing configuration distribution sessions sec:4-48
configuring Cisco ACSsec:4-55to sec:4-58
configuring server groups sec:4-43
configuring server monitoring parameters sec:4-25
configuring test idle timer sec:4-27
configuring test user name sec:4-27
default settings sec:4-59
description sec:4-21
discarding configuration distribution changes sec:4-48
displaying configured parameters sec:4-29
enabling configuration distribution sec:4-46
sending test messages for monitoring sec:4-27
setting preshared keys sec:4-24
specifying serverssec:4-22to sec:4-23
specifying server timeout sec:4-24
starting a distribution session sec:4-46
rate modes
configuring on Generation 2 switching module interfaces Intf:3-21
verifying configuration Intf:3-21
RCFs
description sysmgnt:9-3
incoming sysmgnt:9-6
rejecting incoming sysmgnt:9-6
read-only zones
configuration guidelines Fabric:5-24
configuring Fabric:5-24
default settings Fabric:5-43
description Fabric:5-24
reason codes
description Intf:2-8
reconfigure fabric frames. See RCFs
recovery
from powered-down state Intf:3-12
redundancy
Ethernet PortChannels 2:2-6, 2:2-7
Fibre Channel PortChannels 2:2-7
VRRP 2:2-6
VSANs Fabric:2-4
redundant physical links
example (figure) Fabric:7-3
Registered Link Incident Reports. See RLIRs
Registered State Change Notifications. See RSCNs
retransmitting intervals
configuring for FSPF Fabric:7-8
description Fabric:7-8
RLIRs
clearing information Fabric:11-32
conditional receive Fabric:11-30
description Fabric:11-27
displaying informationFabric:11-28to Fabric:11-32
specifying preferred host Fabric:11-27
RMON
alarms sysmgnt:8-1
default settings sysmgnt:8-4
displaying information sysmgnt:8-4
enabling alarms sysmgnt:8-2
enabling events sysmgnt:8-3
events sysmgnt:8-1
role databases
clearing distribution sessions sec:3-7
committing changes to fabric sec:3-6
disabling distribution sec:3-7
discarding database changes sec:3-6
enabling distribution sec:3-7
roles
authentication sec:3-1
CFS support sysmgnt:2-2
configuring sec:3-2
configuring rules sec:3-2
default permissions sec:4-3
default setting sec:3-24
displaying information sec:3-7
distributing configurationssec:3-5to sec:3-9
modifying profiles sec:3-3
user profiles sec:4-3
roles database
displaying information sec:3-7
roles databases
description sec:3-6
locking in the fabric sec:3-6
merge guidelines sec:3-7
route costs
computing Fabric:7-6
router discovery
IPv6 8:8-16
routing
multicast Fabric:7-12
routing protocols
disabling Fabric:7-6
RSA key-pairs
deleting sec:6-15
description sec:6-3
displaying configuration sec:6-16
generating sec:6-6
multiple sec:6-4
rsa key pairs
generating sec:3-16
RSCNs
clearing statistics Fabric:9-10
default settings Fabric:9-15
description Fabric:9-8
displaying information Fabric:9-8
logging facility sysmgnt:3-2
multiple port IDs Fabric:9-9
suppressing domain format SW-RSCNs Fabric:9-10
RSCN timers
CFS support sysmgnt:2-2
configuration distribution using CFSFabric:9-12to Fabric:9-15
configuring Fabric:9-11
displaying configuration Fabric:9-12
RSPAN
advantages sysmgnt:11-17
configuring explicit paths sysmgnt:11-25
default settings sysmgnt:11-30
description sysmgnt:11-16
displaying information sysmgnt:11-28
example configurationsysmgnt:11-19to sysmgnt:11-24
explicit paths sysmgnt:11-24
monitoring traffic (example)sysmgnt:11-26to sysmgnt:11-28
referencing explicit paths sysmgnt:11-26
tunnels sysmgnt:11-17
rules
configuring sec:3-2
runtime checks
static routes Fabric:7-10
S
SACKs
configuring in FCIP profiles 2:2-13
SAN extension tuner
assigning SCSI read/write commands 3:3-5, 3:3-7
configuring 3:3-2
configuring data patterns 3:3-8
configuring nWWNs 3:3-4
configuring virtual N ports 3:3-5
data patterns 3:3-3
default settings 3:3-10
description 3:3-1
initialization 3:3-4
license requirements 3:3-3
tuning guidelines 3:3-2
verifying configuration 3:3-9
SAs
displaying for IKE sec:7-30
displaying global lifetime values sec:7-34
establishing between IPsec peers sec:7-23
global lifetime values sec:7-29
lifetime negotiations sec:7-25
refreshing sec:7-16
setting lifetime sec:7-25
scalability
VSANs Fabric:2-4
schedule
changing DMM:5-49
scheduler. See command scheduler
schedules
assigning jobs sysmgnt:5-6, sysmgnt:5-7
command scheduler sysmgnt:5-1
deleting sysmgnt:5-8
deleting schedule time sysmgnt:5-9
one-time sysmgnt:5-7
periodic sysmgnt:5-6
specifyingsysmgnt:5-6to sysmgnt:5-9
specifying execution time sysmgnt:5-6
verifying configuration sysmgnt:5-8
SCSI flow services
CFS support sysmgnt:2-2
SCSI LUNs
customized discovery Fabric:10-2
discovering targets Fabric:10-1
displaying information Fabric:10-2
starting discoveries Fabric:10-2
SD port mode
description Intf:2-6
interface modes Intf:2-6
SD ports
bidirectional traffic sysmgnt:11-14
characteristics sysmgnt:11-5
configuring Intf:2-13
configuring for monitoring sysmgnt:11-6
configuring for RSPAN sysmgnt:11-24
configuring for SPAN monitoring sysmgnt:11-6
configuring SPAN sysmgnt:11-14
encapsulating frames sysmgnt:11-10
monitoring bidirectional traffic sysmgnt:11-14
RSPAN sysmgnt:11-16
SDV
IVR limitations Fabric:3-12
secondary MAC addresses
configuring Fabric:12-11
Secure Hash Algorithm. See SHA-1
security
accounting sec:4-4
managing on the switch sec:4-2
security associations. See SAs
security control
remote AAA servers sec:4-21
security parameter index. See SPI
Selecting DMM:5-15, DMM:5-17, DMM:5-18
selective acknowledgments. See SACKs
serial IDs
description sysmgnt:4-37
server-based job
selecting ports DMM:5-4
server groups
configuring sec:4-42
server IDs
description sysmgnt:4-38
Server Lunmap Discovery Tool. See SLD
server MSM-18/4 module
selecting DMM:5-15
sessions
configuring DMM:5-9
session state values DMM:5-47
SFPs
displaying transmitter types Intf:2-26
transmitter types Intf:2-19
SHA-1
IKE sec:7-7
IPsec sec:7-7
shared rate mode
description Intf:3-7
migrating from dedicated rate mode Intf:3-16, Intf:3-17
migrating to dedicated rate mode Intf:3-16, Intf:3-17
oversubscription Intf:3-26
Single-fabric Topology IOA:B-5
site IDs
description sysmgnt:4-36
SLD DMM:4-3
small computer system interface. See SCSI
SME
supported single-fabric topology IOA:B-5
SNMP
access control sysmgnt:7-2
access groups sysmgnt:7-4
adding communities sysmgnt:7-7
assigning contact sysmgnt:7-2
assigning contact names sysmgnt:4-7
assigning location sysmgnt:7-2
configuring LinkUp/LinkDown notifications sysmgnt:7-13
configuring notification target users sysmgnt:7-13
configuring users from CLI sysmgnt:7-5
counter Information sysmgnt:7-18
creating roles sec:3-10
creating users sysmgnt:7-4
default settings sysmgnt:7-19
deleting communities sysmgnt:7-7
displaying information sysmgnt:8-4
displaying notification status sysmgnt:7-11
displaying security information sysmgnt:7-17
enabling SNMP notifications sysmgnt:7-10
encryption-based privacy sysmgnt:7-4
FICON control Fabric:11-22
group-based access sysmgnt:7-4
mapping CLI operations sec:3-10
modifying users sysmgnt:7-4
read-only access sysmgnt:7-7
read-write access sysmgnt:7-7
security features sec:4-2
server contact name sysmgnt:4-6
user synchronization with CLI sysmgnt:7-3
Version 3 security features sysmgnt:7-2
versions supported sysmgnt:7-1
See also SNMPv1; SNMPv2c; SNMPv3
SNMP manager
FCS sysmgnt:10-2
SNMPv1
community strings sysmgnt:7-2
description sysmgnt:7-2
SNMPv2
community strings sysmgnt:7-2
SNMPv2c
configuring notifications sysmgnt:7-8
description sysmgnt:7-2
SNMPv3
assigning multiple roles sysmgnt:7-7
CLI user managementSNMPv3
AAA integration sysmgnt:7-3
configuring notifications sysmgnt:7-9
description sysmgnt:7-2
enforcing message encryption sysmgnt:7-6
restricting switch access sysmgnt:7-3
security features sysmgnt:7-2
specifying cisco-av-pair sec:4-29
See also SNMP sysmgnt:7-2
soft zoning
description Fabric:5-14
source IDs
Call Home event format sysmgnt:4-37
exchange based Intf:5-5
flow based Intf:5-4
in-order delivery Fabric:7-13
path selection Fabric:2-11
SPAN
configuration guidelines sysmgnt:11-6
configuring Fibre Channel analyzers sysmgnt:11-12
configuring SD ports sysmgnt:11-6, sysmgnt:11-14
configuring sessions sysmgnt:11-5
conversion behavior sysmgnt:11-10
default settings sysmgnt:11-30
description sysmgnt:11-1
displaying information sysmgnt:11-14
egress sources sysmgnt:11-2
encapsulating frames sysmgnt:11-10
FC analyzers sysmgnt:11-11
filters sysmgnt:11-5
monitoring traffic sysmgnt:11-1
SD ports sysmgnt:11-5
sessions sysmgnt:11-5
sources sysmgnt:11-2, sysmgnt:11-4
sources for monitoring sysmgnt:11-2
VSAN sources sysmgnt:11-4
SPAN destination port mode. See SD port mode
SPAN filters
configuring sysmgnt:11-7, sysmgnt:11-8
description sysmgnt:11-5
guidelines sysmgnt:11-5
SPAN sessions
configuring sysmgnt:11-6
description sysmgnt:11-5
reactivating sysmgnt:11-9
suspending sysmgnt:11-9
VSAN filters sysmgnt:11-5
SPAN sources
configuring interfaces sysmgnt:11-13
egress sysmgnt:11-2
ingress sysmgnt:11-2
interface types sysmgnt:11-3
IPS ports sysmgnt:11-3
VSANs configuration guidelines sysmgnt:11-4
SPAN tunnel port mode. See ST port mode
SPF
computational hold times Fabric:7-4
SPI
configuring virtual routers 5:4-14
SSH
clearing hosts sec:3-18
default service sec:3-15
description sec:3-16
digital certificate authentication sec:3-20
displaying status sec:3-19
enabling sec:3-19
generating server key-pairs sec:3-16
logins sec:4-5
overwriting server key-pairs sec:3-17
protocol status sec:3-19
specifying keys sec:3-16
SSH key pairs
overwriting sec:3-17
SSH sessions
message logging sysmgnt:3-4
static routes
runtime checks Fabric:7-10
storage devices
access control Fabric:5-1
storage ports
including in a job DMM:3-12
ST port mode
description Intf:2-7
interface modes Intf:2-7
limitations Intf:2-7
ST ports
configuring for RSPAN sysmgnt:11-21
interface modes Intf:2-7
RSPAN sysmgnt:11-16
RSPAN characteristics sysmgnt:11-18
subnet masks
configuring mgmt0 interfaces Intf:2-43
subnets
requirements 7:7-6
supported topologies
single-fabric IOA:B-5
Switched Port Analyzer. See SPAN
switch management
in-band 5:4-7
switchovers
VRRP 2:2-6
switch ports
configuring attribute default values Intf:2-18
switch priorities
configuring sysmgnt:9-5
default sysmgnt:9-5
description sysmgnt:9-5
switch security
default settings sec:3-24, sec:4-58
sWWNs
configuring for fabric binding sec:10-3
syslog
CFS support sysmgnt:2-2
configuration distribution sysmgnt:3-10
fabric merge guidelines sysmgnt:3-11
system messages
configuring logging sysmgnt:3-4
configuring logging servers sysmgnt:3-7
default settings sysmgnt:3-16
displaying informationsysmgnt:3-11to sysmgnt:3-16
logging server sysmgnt:3-1
severity levels sysmgnt:3-3
T
TACACS+
AAA protocols sec:4-1
CFS merge guidelines sec:4-49
CFS support sysmgnt:2-2
clearing configuration distribution sessions sec:4-48
configuring Cisco ACSsec:4-55to sec:4-58
configuring server groups sec:4-44
default settings sec:4-59
description sec:4-32
discarding configuration distribution changes sec:4-48
displaying information sec:4-41
enabling sec:4-32
enabling configuration distribution sec:4-46
global keys sec:4-32
sending test messages for monitoring sec:4-38
setting default server timeout sec:4-35
setting global secret keys sec:4-34
setting preshared key sec:4-32
setting server addresses sec:4-33
setting server monitoring parameters sec:4-36
setting timeout value sec:4-35
specifying server at login sec:4-39
starting a distribution session sec:4-46
validating sec:4-39
TCP connections
FCIP profiles 2:2-4
TCP ports
IPv4-ACLs sec:5-4
TCP statistics
displaying 6:6-11
Telnet
enabling sec:3-19
logins sec:4-5
Telnet sessions
message logging sysmgnt:3-4
TE port mode
classes of service Intf:2-6
description Intf:2-6
TE ports
fabric binding checking sec:10-2
FCS support sysmgnt:10-1, sysmgnt:10-2
FSPF topologies Fabric:7-2
interoperability Fabric:12-15
recovering from link isolations Fabric:5-15
SPAN sources sysmgnt:11-3
trunking restrictions Intf:4-3
TF port mode
classes of service Intf:2-6
description Intf:2-6
timestamps
FICON host control Fabric:11-21
TL port mode
classes of service Intf:2-5
description Intf:2-5
TL ports
ALPA caches Intf:2-30
configuring Intf:2-13, Intf:2-30
description Intf:2-28
displaying information Intf:2-31
FCS sysmgnt:10-1, sysmgnt:10-2
FCS support sysmgnt:10-1, sysmgnt:10-2
logging facility sysmgnt:3-2
private devices Intf:2-31
SPAN sources sysmgnt:11-3
virtual devices Intf:2-31
topologies
about DMM:3-1
guidelines DMM:3-3
Method 3 DMM:3-5
one-fabric DMM:3-10
three-fabric DMM:3-6
two-fabric DMM:3-7
TOVs
configuring across all VSANs Fabric:12-6
configuring for a VSAN Fabric:12-6
default settings Fabric:12-20
interoperability Fabric:12-14
ranges Fabric:12-5
traffic isolation
VSANs Fabric:2-4
transform sets
configuring for IPsec sec:7-22
creating crypto map entries sec:7-24
description sec:7-21
transit VSANs
configuration guidelines IVR:1-11
IVR configuration guidelines IVR:2-8
translative loop port mode. See TL port mode
Triple DES. See 3DEC encryption
troubleshooting
checklist DMM:6-2
deleting a cluster IOA:B-6, IOA:B-7
deleting an offline switch IOA:B-5
reviving a cluster IOA:B-8
trunking
comparison with PortChannels Intf:5-3
configuration guidelines Intf:4-4
configuring modes Intf:4-8
default settings Intf:4-14
description Intf:4-1
displaying information Intf:4-13
interoperability Fabric:12-14
link state Intf:4-8
merging traffic Intf:4-4
restrictions Intf:4-3
trunking E port mode. See TE port mode
trunking F port mode. See TF port mode
trunking mode
FCIP interface 2:2-4
trunking ports
associated with VSANs Fabric:2-7
trunking protocol
default settings Intf:4-14
default state Intf:4-7
description Intf:4-7
detecting port isolation Intf:4-4
disabling Intf:4-8
enabling Intf:4-8
trunk mode
administrative default Intf:2-19
configuring Intf:4-8, Intf:4-9
default settings Intf:4-14
status Intf:4-9
trunk ports
displaying information Intf:4-14
trust points
creating sec:6-8
description sec:6-2
multiple sec:6-3
saving configuration across reboots sec:6-12
TrustSec FC Link Encryption sec:11-2
Best Practices sec:11-9
enabling sec:11-2
ESP Modes sec:11-6
ESP Settings sec:11-4
Information sec:11-7
Security Association Parameters sec:11-3
Security Associations sec:11-3
Supported Modules sec:11-2
Terminology sec:11-1
U
UDP ports
IPv4-ACLs sec:5-4
unique area FC IDs
configuring sysmgnt:9-17
description sysmgnt:9-17
user accounts
configuringsec:3-11to sec:3-15
configuring profiles sec:3-2
configuring roles sec:3-2
displaying information sec:3-14
password characteristics sec:3-12
user IDs
authentication sec:4-3
user profiles
role information sec:4-3
users
CFS support sysmgnt:2-2
configuring sec:3-13
deleting sec:3-13
description sec:3-12
displaying account information sec:3-14
logging out other users sec:3-14
SNMP support sysmgnt:7-4
V
vendor-specific attributes. See VSAs
VE ports
description 2:2-2
FCIP 2:2-2
verifying new zone
server-based DMM:5-19
storage-based DMM:5-29
virtual devices
TL ports Intf:2-31
virtual initiator
configuring DMM:7-3
virtual ISLs
description 2:2-2
virtual router IDs. See VR IDs
Virtual Router Redundancy Protocol. See VRRP
virtual routers
adding 5:4-12
adding primary IP addresses 5:4-13
authentication 5:4-14
default settings 5:4-15
deleting 5:4-12
initiating 5:4-13
setting priorities 5:4-13
virtual target
about DMM:1-3
VLANs
configuring on Gigabit Ethernet subinterfaces 7:7-6
description 7:7-5
VR IDs
description 5:4-11
mapping 5:4-11
VRRP
backup switches 5:4-11
configuring advertisement time intervals 5:4-13
configuring for Gigabit Ethernet interfaces 6:6-6
configuring virtual routers 5:4-12
default settings 5:4-15
group members 6:6-5
initiating virtual routers 5:4-13
logging facility sysmgnt:3-3
master switches 5:4-11
MD5 authentication 5:4-14
primary IP address 5:4-13
priority preemption 5:4-13
security authentication 5:4-14
setting priorities 5:4-13
setting priority 5:4-13
simple text authentication 5:4-14
VSAN IDs
allowed list Intf:4-14
description Fabric:2-5
multiplexing traffic Intf:2-6
range Fabric:2-4
VSAN membership Fabric:2-4
VSAN interfaces
configuring Intf:2-44
creating Intf:2-45
description Intf:2-45
displaying information Intf:2-45
VSAN policies
default roles sec:3-24
licensing sec:3-4
modifying sec:3-5
VSANs
advantages Fabric:2-3
allowed-active Intf:4-4
allowed list sysmgnt:11-4
broadcast addresses Fabric:7-12
cache contents sysmgnt:9-22
clocks Fabric:11-21
comparison with zones (table) Fabric:2-4
compatibility with DHCHAP sec:8-3
configuringFabric:2-6to Fabric:2-7
configuring allowed-active lists Intf:4-12
configuring FSPF Fabric:7-4
configuring multiple IPv4 subnets 5:4-9
configuring policies sec:3-4
default settings Fabric:2-12
default VSANs Fabric:2-9
deleting Fabric:2-9
descriptionFabric:2-1to Fabric:2-4
displaying configuration Fabric:2-11
displaying membership Fabric:2-8
displaying usage Fabric:2-12
domain ID automatic reconfiguration sysmgnt:9-7
fabric optimization for FICON Fabric:11-3
FC IDs Fabric:2-1
FCS sysmgnt:10-1
FCS support sysmgnt:10-1
features Fabric:2-1
FICON-enabled Fabric:2-11, Fabric:11-42
flow statistics Fabric:7-17
FSPF Fabric:7-5
FSPF connectivity Fabric:7-2
gateway switches 5:4-6
interop mode Fabric:12-14
IPv4 static routing 5:4-7
isolated Fabric:2-9
load balancing Fabric:2-11
load balancing attributes Fabric:2-5
loop devices Intf:2-31
mismatches Intf:2-10
multiple zones Fabric:5-4
names Fabric:2-5
name server Fabric:9-3
operational states Fabric:2-9
overlaid routes 5:4-8
policies sec:3-4
port membership Fabric:2-7
SPAN filters sysmgnt:11-5
SPAN source sysmgnt:11-4
SPAN sources sysmgnt:11-4
states Fabric:2-5
TE port mode Intf:2-6
TF port mode Intf:2-6
timer configuration Fabric:12-6
TOVs Fabric:12-6
traffic isolation Fabric:2-3
traffic routing between 5:4-1
transit IVR:2-11
trunk-allowed Intf:4-4
trunking ports Fabric:2-7
VRRP 5:4-11
VSAs
communicating attributes sec:4-28
protocol options sec:4-29
W
window management
configuring in FCIP profiles 2:2-14
WWNs
configuring Fabric:12-9
displaying information Fabric:12-10
link initialization Fabric:12-10
port security sec:9-10
secondary MAC addresses Fabric:12-11
suspended connections Intf:2-10
X
XRC
FICON support Fabric:11-4
Z
zone attribute groups
cloning Fabric:5-18
zone databases
release locks Fabric:5-34
zones
access control Fabric:5-7
adding to zone sets Fabric:5-12
analyzing Fabric:5-42
assigning LUNs to storage subsystems Fabric:5-23
backing up (procedure) Fabric:5-17
changing from enhanced zones Fabric:5-33
cloning Fabric:5-18
compacting for downgrading Fabric:5-41
comparison with device aliases (table) Fabric:6-4
comparison with VSANs (table) Fabric:2-4
configuration guidelines IVR:2-18
configuringFabric:5-6to Fabric:5-7
configuring aliases Fabric:5-11
configuring broadcasting Fabric:5-21
configuring fcaliases Fabric:5-11
CUPs Fabric:11-43
default policies Fabric:5-2
default settings Fabric:5-43
differences with IVR zones IVR:1-15
displaying informationFabric:5-25to Fabric:5-31
enforcing restrictions Fabric:5-14
exporting databases Fabric:5-15
features Fabric:5-1, Fabric:5-3
importing databases Fabric:5-15
IVR communication IVR:1-15
logging facility sysmgnt:3-3
LUN-based Fabric:5-22
membership using pWWNs Fabric:2-4
merge failures Intf:2-10
read-only for IVR IVR:2-20
renaming Fabric:5-18
restoring (procedure) Fabric:5-17
See also hard zoning; soft zoning
zone server databases
clearing Fabric:5-18
zone sets
activating Fabric:5-10
adding member zones Fabric:5-12
analyzing Fabric:5-42
cloning Fabric:5-18
configuringFabric:5-7to Fabric:5-10
considerations Fabric:5-4
copying Fabric:5-16
creating Fabric:5-8, Fabric:5-12
default settings Fabric:5-43
displaying informationFabric:5-25to Fabric:5-31
distributing configuration Fabric:5-14
enabling distribution Fabric:5-14
exporting Fabric:5-16
exporting databases Fabric:5-15
features Fabric:5-1
importing Fabric:5-16
importing databases Fabric:5-15
one-time distribution Fabric:5-15
recovering from link isolations Fabric:5-15
renaming Fabric:5-18
See also active zone sets; full zone sets
zone traffic priorities
configuring Fabric:5-19
description Fabric:5-19
zoning
configuring broadcasting Fabric:5-21
description Fabric:5-1
example Fabric:5-2
implementation Fabric:5-3