- New and Changed Information
- Preface
- A Commands
- Advanced Services Modules Commands
- B Commands
- C Commands
- Caching Services Module Commands
- CLI Overview
- D Commands
- Debug Commands
- E Commands
- F Commands
- G Commands
- H Commands
- I Commands
- J Commands
- K Commands
- L Commands
- M Commands
- N Commands
- O Commands
- P Commands
- Q Commands
- R Commands
- S Commands
- Show Commands
- T Commands
- U Commands
- V Commands
- W Commands
- Z Commands
- 10G-speed-mode
- 16G-speed-mode
- aaa accounting default
- aaa accounting logsize
- aaa authentication dhchap default
- aaa authentication iscsi default
- aaa authentication login ascii-authentication
- aaa authentication login chap enable
- aaa authentication login console fallback error local
- aaa authentication login console group
- aaa authentication login console local
- aaa authentication login console none
- aaa authentication login default fallback error local
- aaa authentication login default group
- aaa authentication login default local
- aaa authentication login default none
- aaa authentication login error-enable
- aaa authentication login invalid-username-log
- aaa authentication login mschap
- aaa authentication login mschapv2 enable
- aaa authorization
- aaa authorization ssh-certificate
- aaa authorization ssh-publickey
- aaa group server
- abort
- action cli
- action counter
- action event-default
- action exception log
- action forceshut
- action overbudgetshut
- action policy-default
- action reload
- add-session vsan
- add-step dynamic
- add-step static
- add-tgt vsan
- add-vi vsan
- action snmp-trap
- action syslog
- active equals saved
- alert-group
- arp
- attach
- attachpriv
- attributes (DMM job configuration submode)
- attribute failover auto
- attribute qos
- authentication
- authentication (IKE policy configuration submode)
- auth-mechanism plain
- autonomous-fabric-id (IVR topology database configuration)
- autonomous-fabric-id (IVR service group configuration)
- autonomous-fabric-id database
- auto-volgrp
A Commands
The commands in this chapter apply to the Cisco MDS 9000 Family of multilayer directors and fabric switches. All commands are shown here in alphabetical order regardless of command mode. See “About the CLI Command Modes” section to determine the appropriate mode for each command.
10G-speed-mode
To enable 10 gig speed mode, use the 10G-speed-mode command. To disable this feature, use the no form of the command.
Syntax Description
Defaults
Command Modes
Command History
|
|
Usage Guidelines
Examples
The following example shows how to enable the 10 Gig speed mode:
Related Commands
|
|
---|---|
16G-speed-mode
To enable 2, 4, 8 and 16G speed mode, use the 16G-speed-mode command. To disable this feature, use the no form of the command.
Syntax Description
Defaults
Command Modes
Command History
|
|
Usage Guidelines
Examples
The following example shows how to enable the 16 Gig speed mode:
Related Commands
|
|
---|---|
aaa accounting default
To configure the default accounting method, use the aaa accounting default command. To revert to the default local accounting, use the no form of the command.
aaa accounting default { group group-name [ none ] | none } | local [ none ] | none }
no aaa accounting default { group group-name [ none ] | none } | local [ none ] | none }
Syntax Description
Specifies the group authentication method. The group name is a maximum of 127 characters. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Specify the currently configured command preceded by a no in order to revert to the factory default.
Examples
The following example enables accounting to be performed using remote TACACS+ servers which are members of the group called TacServer, followed by the local accounting method:
The following example turns off accounting:
The following example reverts to the local accounting (default):
Related Commands
|
|
---|---|
aaa accounting logsize
To set the size of the local accounting log file, use the aaa accounting logsize command to set the size of the local accounting log file. To revert to the default log file size of 250000 bytes, use the no form of the command.
aaa accounting logsize integer
Syntax Description
The size limit of the local accounting log file in bytes from 0 to 250000. |
Defaults
Command Modes
Command History
|
|
Usage Guidelines
Examples
The following example shows the log file size configured at 29000 bytes:
Related Commands
|
|
---|---|
aaa authentication dhchap default
To configure DHCHAP authentication method, use the aaa authentication dhchap default command in configuration mode. To revert to defaults, use the no form of the command.
aaa authentication dhchap default { group group-name [ none ] | none } | local [ none ] | none }}
no aaa authentication dhchap default { group group-name [ none ] | none } | local [ none ] | none }
Syntax Description
Specifies the group name authentication method. The group name is a maximum of 127 characters. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
By default, DHCHAP authentication is tried against the on-switch ( local) database.
The option local is implied after a group. To override this behavior, specify the none option after the server group.
Authentication is tried against the list of databases in the order specified in the command. An authentication response stops the search. No response from any server in a server group is not a response, so searching continues through the list.
Examples
The following example enables all DHCHAP authentication to be performed using remote TACACS+ servers which are members of the group called TacServers, followed by the local authentication:
The following example reverts to the local authentication method (default):
Related Commands
|
|
---|---|
aaa authentication iscsi default
To configure the iSCSI authentication method, use the aaa authentication iscsi default command in configuration mode. To negate the command or revert to factory defaults, use the no form of this command.
aaa authentication iscsi default { group group-name [ none ] | none } | local [ none ] | none }}
no aaa authentication iscsi default { group group-name [ none ] | none } | local [ none ] | none }}
Syntax Description
Specifies the group name. The group name is a maximum of 127 characters. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
By default, iSCSI authentication is tried against the on-switch ( local) database.
The option local is implied after a group. To override this behavior, specify the none option after the server group.
Authentication is tried against the list of databases in the order specified in the command. An authentication response stops the search. No response from any server in a server group is not a response, so searching continues through the list.
Examples
The following example enables all iSCSI authentication to be performed using remote TACACS+ servers which are members of the group called TacServers, followed by the local authentication:
The following example reverts to the local authentication method (default):
Related Commands
|
|
---|---|
aaa authentication login ascii-authentication
To enable ASCII authentication, use the aaa authentication login ascii-authentication command. To disable this feature, use the no form of the command.
aaa authentication login ascii-authentication
no aaa authentication login ascii-authentication
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
aaa authentication login password-aging enable command changed to aaa authentication login ascii-authentication. |
Usage Guidelines
Password aging notification is initiated when the user authenticates to a Cisco MDS 9000 switch with a TACACS+ account. The user is notified when a password is about to expire or has expired. If the password has expired, the user is prompted to change the password.
Note As of Cisco MDS SAN-OS Release 3.2(1), only TACACS+ supports password aging notification. If you try to use RADIUS servers by enabling this feature, RADIUSs will generate a SYSLOG message and authentication will fall back to the local database. Cisco ACS TACACS+ server must have chpass enabled as well.
- Password change—You can change your password by entering a blank password.
- Password aging notification—Notifies password aging. Notification happens only if the AAA server is configured and MSCHAP and MSCHAPv2 is disabled.
- Password change after expiration—Initiates password change after the old password expires. Initiation happens from the AAA server.
Note Password aging notification fails if you do not disable MSCHAP and MSCHAPv2 authentication.
Examples
The following example shows how to enable ASCII authentication:
Related Commands
|
|
---|---|
aaa authentication login chap enable
To enable CHAP authentication for login, use the aaa authentication login chap enable command. To disable CHAP authentication, use the no form of the command.
aaa authentication login chap enable
no aaa authentication login chap enable
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to enable CHAP authentication for login:
Related Commands
|
|
---|---|
aaa authentication login console fallback error local
To configure the console login methods, use the aaa authentication login console command. To disable the console login methods, use the no form of the command.
aaa authentication login console fallback error local
no aaa authentication login console fallback error local
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to control authentication search after all authentication groups fail to respond. This could occur if network connectivity were interrupted.
Examples
The following example shows how to configure the console methods:
Related Commands
|
|
---|---|
aaa authentication login console group
To configure the console login methods, use the aaa authentication login console command. To disable the console login methods, use the no form of the command.
aaa authentication login console group group-name0 [group-name1 [none] [group-name2 [none][group-name3 [none] [group-name4 [none] [group-name5 [none] [group-name6 [none] [group-name7 [none]]]]]]]
no aaa authentication login console group group-name0 [group-name1 [none] [group-name2 [none][group-name3 [none] [group-name4 [none] [group-name5 [none] [group-name6 [none] [group-name7 [none]]]]]]]
Syntax Description
Specifies the group name. The group name is a maximum of 127 characters. |
|
(Optional) Disable authentication checking. All registered users are permitted but passwords are not checked. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Authentication is tried against the list of authentication groups in the order specified in the command. A response from an authentication server stops the search. No response from any server in a server group is not a response so searching continues through the list.
Examples
The following example shows how to configure the console methods:
Related Commands
|
|
---|---|
aaa authentication login console local
To configure the console login methods, use the aaa authentication login console command. To disable the console login methods, use the no form of the command.
aaa authentication login console local
no aaa authentication login console local
Syntax Description
Specifies to use the local user database for authentication. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to configure the console methods:
Related Commands
|
|
---|---|
aaa authentication login console none
To configure the console login methods, use the aaa authentication login console command. To disable the console login methods, use the no form of the command.
aaa authentication login console none
no aaa authentication login console none
Syntax Description
Disable authentication checking. All registered users are permitted but passwords are not checked. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to configure the console methods:
Related Commands
|
|
---|---|
aaa authentication login default fallback error local
To configure default login methods, use the aaa authentication login default command. To disable default login methods, use the no form of the command.
aaa authentication login default fallback error local
no aaa authentication login default fallback error local
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to control authentication search after all authentication groups fail to respond. This could occur if network connectivity were interrupted.
Examples
The following example shows how to configure default methods:
Related Commands
|
|
---|---|
aaa authentication login default group
To configure default login methods, use the aaa authentication login default command. To disable default login methods, use the no form of the command.
aaa authentication login default group group-name0 [group-name1 [none] [group-name2 [none][group-name3 [none] [group-name4 [none] [group-name5 [none] [group-name6 [none] [group-name7 [none]]]]]]]
no aaa authentication login default group group-name0 [group-name1 [none] [group-name2 [none][group-name3 [none] [group-name4 [none] [group-name5 [none] [group-name6 [none] [group-name7 [none]]]]]]]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Authentication is tried against the list of authentication groups in the order specified in the command. A response from an authentication server stops the search. No response from any server in a server group is not a response so searching continues through the list.
Examples
The following example shows how to configure default methods:
Related Commands
|
|
---|---|
aaa authentication login default local
To configure default login methods, use the aaa authentication login default command. To disable default login methods, use the no form of the command.
aaa authentication login default local
no aaa authentication login default local
Syntax Description
Specifies to use the local user database for authentication. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to configure default methods:
Related Commands
|
|
---|---|
aaa authentication login default none
To configure default login methods, use the aaa authentication login default command. To disable default login methods, use the no form of the command.
aaa authentication login default none
no aaa authentication login default none
Syntax Description
Disable authentication checking. All registered users are permitted but passwords are not checked. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to configure default methods:
Related Commands
|
|
---|---|
aaa authentication login error-enable
To enable the display of error message on login failures, use the aaa authentication login error-enable command. To disable the display of error message, use the no form of the command.
aaa authentication login error-enable
no aaa authentication login error-enable
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to enable to display the error message on login failures:
Related Commands
|
|
---|---|
aaa authentication login invalid-username-log
To enable invalid username login, use the aaa authentication login invalid-username-log command. To disable invalid username login, use the no form of the command.
aaa authentication login invalid-username-log
no aaa authentication login invalid-username-log
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to enable invalid username login:
Related Commands
|
|
---|---|
aaa authentication login mschap
To enable MS-CHAP authentication between the switch and authentication servers, use the aaa authentication login mschap command. To disable MS-CHAP authentication between the switch and authentication servers, use the no form of the command.
aaa authentication login mschap enable
no aaa authentication login mschap enable
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to enable MSCHAP authentication for login:
Related Commands
|
|
---|---|
aaa authentication login mschapv2 enable
To enable MS-CHAPv2 authentication between the switch and authentication servers, use the aaa authentication login mschapv2 enable command. To disable MS-CHAPv2 authentication between the switch and authentication servers, use the no form of the command.
aaa authentication login mschapv2 enable
no aaa authentication login mschapv2 enable
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
MS-CHAPv2 cannot be configured when MS-CHAP or ASCII authentication is configured and also when a TACACS group is configured for authentication.
Examples
The following example shows how to enable MS-CHAPv2 authentication for login:
Related Commands
|
|
---|---|
aaa authorization
To configure authorization for a function, use the aaa authorization command. To disable authorization for a function, use the no form of the command.
aaa authorization {commands | config-commands}{default} {{[group group-name] | [local]} |{[group group-name] | [none]}}
no aaa authorization {commands | config-commands}{default}{{[group group-name] | [local]} |{[group group-name] | [none]}}
Syntax Description
Specifies authorization for all commands under config mode L2 and L3. |
|
Defaults
Authorization is disabled for all actions (equivalent to the method keyword none). If the aaa authorization command for a particular authorization type is entered without a specifies named method list. The default method list is automatically applied to all interfaces or lines (where this authorization type applies for except those that have a named method list explicitly defined. A defined method list overrides the default method list if no default method list is defined, then no authorization takes place.
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to configure authorization for a configuration command function:
The following example shows how to configure authorization for a command function:
Related Commands
|
|
---|---|
aaa authorization ssh-certificate
To configure SSH certificate authorization, use the aaa authorization ssh-certificate command. To disable this feature, use the no form of the command.
aaa authorization ssh-certificate default [group | local]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
Related Commands
|
|
---|---|
aaa authorization ssh-publickey
To configure SSH public key authorization, use the aaa authorization ssh-publickey command. To disable this feature, use the no form of the command.
aaa authorization ssh-publickey default [group | local]
no aaa authorization ssh-publickey default [group | local]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
|
|
---|---|
aaa group server
To configure one or more independent server groups, use the aaa group server command in configuration mode. To remove the server group, use the no form of this command to remove the server group.
aaa group server { radius | tacacs+ | ldap } group-name server server-name no server server-name
no aaa group server { radius | tacacs+ | ldap } group-name server server-name
Syntax Description
Identifies the specified group of servers with a user-defined name. The name is limited to 64 alphanumeric characters. |
|
Specifies the server name to add or remove from the server group. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
You can configure these server groups at any time but they only take effect when you apply them to a AAA service using the aaa authentication login or the aaa accounting commands.
Examples
The following example shows how to configure LDAP server group name:
Related Commands
|
|
---|---|
abort
To discard a Call Home configuration session in progress, use the abort command in Call Home configuration submode.
Syntax Description
Defaults
Command Modes
Call Home configuration submode
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to discard a Call Home configuration session in progress:
Related Commands
|
|
---|---|
action cli
To configure a VSH command string to be executed when an Embedded Event Manager (EEM) applet is triggered, use the action cli command. To disable the VSH command string, use the no form of the command.
action number [.number2] cli command1 [command2...] [local]
no action number [.number2] cli command1 [command2...] [local]
Syntax Description
Number can be any number up to 16 digits. The range for number2 is from 0 to 9. |
|
(Optional) Specifies the action that is to be executed in the same module on which the event occurs. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to configure a CLI command:
Related Commands
|
|
---|---|
action counter
To specify a setting or modify a named counter when an Embedded Event Manager (EEM) applet is triggered, use the action counter command. To restore the default value to the counter, use the no form of the command.
action number [.number2] counter name counter value val op {dec | inc | nop | set}
no action number [.number2] counter name counter value val op {dec | inc | nop | set}
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to set or modify the counter when the EEM counter applet is triggered:
Related Commands
|
|
---|---|
action event-default
To execute the default action for the associated event, use the action event-default command. To disable the default action, use the no form of the command.
action number [.number2] event-default
no action number [.number2] event-default
Syntax Description
Number can be any number up to 16 digits. The range for number2 is from 0 to 9. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If you want to allow the triggered event to process any default actions, you must configure the EEM policy to allow the event default action statement. For example, if you match a CLI command in a match statement, you must add the event-default action statement to the EEM policy or EEM will not allow the CLI command to execute.
Examples
The following example shows how to specify that the default action of the event be performed when an EEM applet is triggered:
Related Commands
|
|
---|---|
action exception log
To log an exception if the specific conditions are encountered when an Embedded Event Manager (EEM) applet is triggered, use the action exception log command.
action number [.number2] exception log module module syserr error devid id errtype type errcode code phylayer layer ports list harderror error [desc string]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to log an EEM applet exception:
Related Commands
|
|
---|---|
action forceshut
To configure a forced shutdown of a module, a crossbar, ASCII, or the entire switch when an Embedded Event Manager (EEM) applet is triggered, use the action forceshut command.
action number [.number2] forceshut [module slot | xbar xbar-number] reset-reason string
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to log an EEM applet exception:
Related Commands
|
|
---|---|
action overbudgetshut
To configure the shutdown of a module or the entire switch due to an overbudget power condition when an Embedded Event Manager (EEM) applet is triggered, use the action overbudgetshut command.
action number [.number2] overbudgetshut [module slot [- slot]]
Syntax Description
Number can be any number up to 16 digits. The range for number2 is from 0 to 9. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to configure a power overbudget shutdown of module 3-5 when an EEM applet is triggered:
Related Commands
|
|
---|---|
action policy-default
To enable the default actions of the policy being overridden, use the action policy-default command.
action number [.number2] policy-default
Syntax Description
Number can be any number up to 16 digits. The range for number2 is from 0 to 9. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to enable the default action of a policy being overridden when an EEM applet is triggered:
Related Commands
|
|
---|---|
action reload
To configure the reloading or to reload the switch software when an Embedded Event Manager (EEM) applet is triggered, use the action reload command. To remove the software reload configuration, use the no form of this command.
action number [.number2] reload [module slot [- slot]]
Syntax Description
Number can be any number up to 16 digits. The range for number2 is from 0 to 9. |
|
(Optional) Specifies the slot range. The range is from 1 to 10, or a substituted parameter. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to enable the default action of a policy being overridden when an EEM applet is triggered:
Related Commands
|
|
---|---|
add-session vsan
To add sessions to a job, use the add-session vsan command in configuration mode.
add-session vsan vsan-id pwwn tgt-pwwn all-luns | lun lun-id algorithm name/id
Syntax Description
Specifies the algorithm that should be used for the session. |
Defaults
Command Modes
Configuration Secure Erase job submode
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to add a VI to a specific Secure Erase job:
Related Commands
|
|
---|---|
add-step dynamic
To add a dynamic pattern step to a specific algorithm, use the add-step dynamic command in configuration mode.
Syntax Description
(Optional) Specifies that the pattern is generated using a random number generator. |
|
(Optional) Specifies that the pattern is complimentary to the previous pattern. |
Defaults
Command Modes
Configuration Secure Erase algorithm submode
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to add a dynamic pattern step to a specific algorithm:
Related Commands
|
|
---|---|
add-step static
To add a static pattern step to a specific algorithm, use the add-step static command in configuration mode.
Syntax Description
Specifies the static pattern step. The pattern is to write ranges from 1 to 512 bytes and can consist of only characters 0 to 9 and A to F. |
Defaults
Command Modes
Configuration Secure Erase algorithm submode
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to add a static step to a specific algorithm:
Related Commands
|
|
---|---|
add-tgt vsan
To define target enclosure and add multiple target ports for a specific Secure Erase job, use the add-tgt vsan command in configuration mode.
add-tgt vsan vsan-id pwwn target port pwwn
Syntax Description
Specifies the VSAN ID of the target port added to a Secure Erase job. |
|
Specifies the port world-wide name (pWWN) of the target port. |
Defaults
Command Modes
Configuration Secure Erase job submode
Command History
|
|
---|---|
Usage Guidelines
The target ports added to a specific job can be part of a different VSAN. The Secure Erase application creates VIs in a specific VSAN.
Note VIs and targets from different VSANs can be added to a job. A storage array may have multiple storage ports belonging to a different VSAN. You can create one job for one storage array.
Examples
The following example shows how to define a target enclosure and add multiple target ports for a specific Secure Erase job:
Related Commands
|
|
---|---|
add-vi vsan
To add a VI to a specific Secure Erase job, use the add-vi vsan command in configuration mode.
add-vi vsan vsan-id all | pwwn VI pwwn
Syntax Description
Defaults
Command Modes
Configuration Secure Erase job submode
Command History
|
|
---|---|
Usage Guidelines
You must add at least one VI in each VSAN where a Secure Erase target is present.
All VIs that are part of the same job and the VSAN must have same target view. The same set of targets and LUNs must be exposed for all VIs in the same VSAN.
Note VI-CPP can not be added to a job. To know the WWN of the VI-CPP, please run the show isapi virtual-nport database command on SSM module.
Examples
The following example shows how to add all VIs to a given Secure Erase job:
Related Commands
|
|
---|---|
action snmp-trap
To specify the generation of a Simple Network Management Protocol (SNMP) trap when an Embedded Event Manager (EEM) applet is triggered, use the action snmp-trap command. To disable the SNMP trap, use the no form of this command.
action number[.number2] snmp-trap {[intdata1 integer [intdata2 integer] [strdata string]]}
no action number[.number2] snmp-trap {[intdata1 integer [intdata2 integer] [strdata string]]}
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to specify an SNMP trap to generate when an EEM applet is triggered:
Related Commands
|
|
---|---|
action syslog
To configure a syslog message to generate when an Embedded Event Manager (EEM) applet is triggered, use the action syslog command. To disable the syslog message, use the no form of this command.
action number[.number2] syslog [priority prio-val] msg error-message
no action number[.number2] syslog [priority prio-val] msg error-message
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to configure a syslog message to save when an EEM applet is triggered:
Related Commands
|
|
---|---|
active equals saved
To automatically write any changes to the block, prohibit or port an address name to the IPL file, use the active equals saved command. To disable the configuration or to revert to factory defaults, use the no form of the command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Enabling active equals saved ensures that you do not have to perform the copy running-config startup-config command to save the FICON configuration as well as the running configuration. If your switch or fabric consists of multiple FICON-enabled VSANs, and one of these VSANs has active equals saved enabled, changes made to the non-FICON configuration causes all FICON-enabled configurations to be saved to the IPL file.
The following example enables the automatic save feature for a VSAN:
The following example disables the automatic save feature for this VSAN:
Related Commands
|
|
---|---|
Saves the running configuration to the startup configuration. |
|
alert-group
To customize a Call Home alert group with user-defined show commands, use the alert-group command in Call Home configuration submode. To remove the customization, user the no form of the command.
alert-group event-type user-def-cmd command
no alert-group event-type user-def-cmd command
Syntax DescriptionT
Displays events relate to syslog messages filed by the the port manager. |
|
Configures a CLI command for an alert-group. The maximum size is 512. |
Defaults
Command Modes
Call Home configuration submode
Command History
|
|
---|---|
Usage Guidelines
The user-def-cmd argument allows you to define a command whose outputs should be attached to the Call Home message being sent. Only show commands can be specified and they must be associated with an alert group. Five commands can be specified per alert group. Invalid commands are rejected.
Note Make sure the destination profiles for the non-Cisco-TAC alert group, with a predefined show command, and the Cisco-TAC alert group are not the same.
Examples
The following example configures a user-defined command, called show license usage, for an alert group license:
The following example removes a user-defined command, called show license usage, for an alert group license:
Related Commands
|
|
---|---|
Sends a dummy test message to the configured destination(s). |
|
arp
To enable the Address Resolution Protocol (ARP) for the switch, use the arp command.To disable ARP for the switch, use the no form of the command.
Syntax Description
Specifies the name of the host. Maximum length is 20 characters. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example disables the Address Resolution Protocol configured for the host with the IP address 10.1.1.1:
Related Commands
|
|
---|---|
attach
To connect to a specific module, use the attach command in EXEC mode.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
You can use the attach module command to view the standby supervisor module information, but you cannot configure the standby supervisor module using this command.
You can also use the attach module command on the switching module portion of the Cisco MDS 9216 supervisor module, which resides in slot 1 of this two-slot switch.
To disconnect, use the exit command at the module-number#
prompt, or type $ . to forcibly abort the attach session.
Examples
The following example connects to the module in slot 2. Note that after you connect to the image on the module using the attach module command, the prompt changes to module-number#:
Related Commands
|
|
---|---|
attachpriv
To connect to a specific ILC line card as a privilege, use the attachpriv command in EXEC mode.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to connect to a specific ILC line card as a privilege:
Related Commands
|
|
---|---|
attributes (DMM job configuration submode)
To set the attributes of a data migration job, use the attributes command in DMM job configuration submode. To remove the attributes of a data migration job, use the no form of the command.
attributes job_type { 1 | 2 } job_mode { 1 | 2 } job_rate { 1 | 2 | 3 | 4 } job_method {1|2}
no attributes job_type { 1 | 2 } job_mode { 1 | 2 } job_rate { 1 | 2 | 3 | 4 } job_method {1|2}
Syntax Description
Defaults
Command Modes
Command History
|
|
Usage Guidelines
Examples
The following example sets the job type to storage, the job mode to online, and the job rate to fast:
Related Commands
|
|
---|---|
attribute failover auto
To configure an automatic fallback failover for a virtual device, use the attribute failover auto command. To revert to the default, use the no form of the command.
attribute failover auto [fallback]
no attribute failover auto [fallback]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to configure an automatic failover for a specific virtual device:
The following example shows how to configure an attribute of a virtual device:
attribute qos
To configure a QoS attribute, use the attribute qos command in Inter-VSAN Routing (IVR) zone configuration submode. To disable this feature, use the no form of this command.
attribute qos { high | low | medium }
no attribute qos { high | low | medium}
Syntax Description
Configures frames matching zone to get low priority (default). |
|
Defaults
Command Modes
IVR zone configuration submode
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to configure an IVR zone QoS attribute to low priority:
Related Commands
|
|
---|---|
authentication
To change the authentication behavior, use the authentication command. To disable this feature, use the no form of the command.
authentication {compare [password-attribute password-attribute] | bind-first [append-with-baseDN string]}
no authentication {compare [password-attribute password-attribute] | bind-first [append-with-baseDN string]}
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The password-attribute keyword provdes a method for chaning the attribute type of password.
Examples
Related Commandss
|
|
---|---|
authentication (IKE policy configuration submode)
To configure the authentication method for an IKE protocol policy, use the authentication command in IKE policy configuration submode. To revert to the default authentication method, use the no form of the command.
authentication { pre-share | rsa-sig}
no authentication {pre-share | rsa-sig}
Syntax Description
Defaults
Command Modes
IKE policy configuration submode.
Command History
|
|
Usage Guidelines
To use this command, enable the IKE protocol using the crypto ike enable command. In addition, you must configure the identity authentication mode using the fully qualified domain name (FQDN) before you can use RSA signatures for authentication. Use the identity hostname command for this purpose.
Examples
The following example shows how to configure the authentication method using the preshared key:
The following example shows how to configure the authentication method using the RSA signatures:
The following example shows how to revert to the default authentication method (preshared key):
Related Commands
|
|
---|---|
auth-mechanism plain
To set the authentication mechanism as plain, use the auth-mechanism plain command in configuration mode. To disable this feature, use the no form of the command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to set the authentication mechanism as plain:
Related Commandss
|
|
---|---|
autonomous-fabric-id (IVR topology database configuration)
To configure an autonomous fabric ID (AFID) into the Inter-VSAN Routing (IVR) topology database, use the autonomous-fabric-id command. To remove the fabric ID, use the no form of the command.
autonomous-fabric-id fabric-id switch-wwn swwn vsan-ranges vsan-id
no autonomous-fabric-id fabric-id switch-wwn swwn vsan-ranges vsan-id
Syntax Description
Defaults
Command Modes
IVR topology database configuration submode
Command History
|
|
---|---|
Usage Guidelines
The following rules apply to configuring AFIDs to VSANs:
- The default AFID of a VSAN is 1.
- Each VSAN belongs to one and only one AFID.
- A switch can be a member of multiple AFIDs.
- AFIDs at a switch must not share any VSAN identifier (for example, a VSAN at a switch can belong to only one AFID).
- A VSAN identifier can be reused in different AFIDs, without merging the VSANs, as long as those AFIDs do not share a switch.
You can have up to 64 VSANs (or 128 VSANs for Cisco MDS SAN-OS Release 2.1(1a) or later) in an IVR topology. Specify the IVR topology using the following information:
- The switch WWNs of the IVR-enabled switches.
- A minimum of two VSANs to which the IVR-enabled switch belongs.
- The autonomous fabric ID (AFID), which distinguishes two VSANs that are logically and physically separate, but have the same VSAN number. Cisco MDS SAN-OS Release 1.3(1) and NX-OS Release 4.1(1b) supports only one default AFID (AFID 1) and does not support non-unique VSAN IDs in the network. As of Cisco MDS SAN-OS Release 2.1(1a), you can specify up to 64 AFIDs.
Note Two VSANs with the same VSAN number but different fabric IDs are counted as two VSANs out of the 128 total VSANs allowed in the fabric.
Examples
The following command enters the configuration mode, enables the IVR feature, enters the VSAN topology database, and configures the pWWN-VSAN association for VSANs 2 and 2000:
Related Commands
|
|
---|---|
autonomous-fabric-id (IVR service group configuration)
To configure an autonomous fabric ID (AFID) into an IVR service group, use the autonomous-fabric-id command in IVR service group configuration submode. To remove the autonomous fabric ID, use the no form of the command.
autonomous-fabric-id afid vsan-ranges vsan-id
no autonomous-fabric-id afid vsan-ranges vsan-id
Syntax Description
Configures up to five ranges of VSANs to be added to the service group. The range is 1 to 4093. |
Defaults
Command Modes
IVR service group configuration submode
Command History
|
|
---|---|
Usage Guidelines
Before configuring an IVR service group, you must enable the following:
- IVR using the ivr enable command
- IVR distribution using the ivr distribute command
- Automatic IVR topology discovery using the ivr vsan-topology auto command
To change to IVR service group configuration submode, use the ivr service-group activate command.
Examples
The following command enters the IVR service group configuration submode and configures AFID 10 to be in IVR service group serviceGroup1:
Related Commands
|
|
---|---|
Configures an IVR service group and changes to IVR service group configuration submode. |
|
autonomous-fabric-id database
To configure an autonomous fabric ID (AFID) database, use the autonomous-fabric-id database command. To remove the fabric AFID database, use the no form of the command.
no autonomous-fabric-id database
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
You must configure the IVR VSAN topology to auto mode, using the ivr vsan-topology auto command, before you can use the autonomous-fabric-id database command to modify the database. The autonomous-fabric-id database command also enters AFID database configuration submode.
Note In user-configured VSAN topology mode, the AFIDs are specified in the IVR VSAN topology configuration itself and a separate AFID configuration is not needed.
Examples
The following example shows how to create an AFID database and enters AFID database configuration submode:
Related Commands
|
|
---|---|
Configures a VSAN topology for Inter-VSAN Routing (IVR) to auto configuration mode. |
|
Configures a switch WWN in the autonomous fabric ID (AFID) database |
|
auto-volgrp
To configure the automatic volume grouping, use the auto-volgrp command. To disable this feature, use the no form of the command.
Syntax Description
Defaults
Command Modes
Cisco SME cluster configuration submode
Command History
|
|
Usage Guidelines
If Cisco SME recognizes that the tape’s barcode does not belong to an existing volume group, then a new volume group is created when automatic volume grouping is enabled.
Examples
The following example enables automatic volume grouping:
The following example disables automatic volume grouping:
Related Commands
|
|
---|---|