A -
C -
D -
E -
F -
G -
H -
I -
L -
M -
N -
O -
P -
R -
S -
T -
V -
X -
Z
Index
A
access control rule 1-3
access logs 1-3
API 1-8
attribute
custom 1-3
C
Cisco Nexus 1000V
registration 5-2
Cisco Nexus 1000V Series switch 3-3
Cisco NX-OS 3-2
Cisco Virtual Network Management Center (see VNMC) 1-4
Cisco Virtual Security Gateway (see VSG) 1-4
Cisco VNMC 1-6, 3-11
policy set 2-47
registration 5-1
Cisco VSG
bootflash 5-1
CLI 2-49, 5-2
HA primary 3-4
HA secondary 3-4
registration 5-1
secondary 3-10
standalone 3-4
standby 3-10
context-aware rule set 1-3
CPU speed 3-2
custom attributes 1-3
D
datastore 3-3, 3-4, 3-5
Deployment Configuration window 3-4
distributed virtual switch 1-2
distributed virtual switch (see DVS) 3-2
DNS 4-3, A-2
domain name 4-3, A-2
E
E1000 3-1
End User License Agreement 3-4
error message 4-1
ESX 2-2, 2-6, 3-1, 3-2, 3-6
ESXi 2-2, 2-6, 3-1, 3-2
F
firewall policies 3-11
G
gateway 4-3
global policy-engine logging 2-51
H
HA 1-9, 3-8
HA ID 3-5, 3-9
HA pair 3-5, 3-9
HA primary 3-4
HA secondary 3-4
high availability (see HA) 1-9
hostname 3-3, 4-3, A-2
Hypervisor 1-2
I
inventory folder 3-3
IP address 3-3, 4-3, A-2
ISO 3-3, 3-8, 4-1, 4-4, A-3
ISO file 3-6
L
Linux 3-1, 3-6
logging level 6 2-50
logical trust zone 1-3
M
management address 3-5
management gateway 3-5
manual installation 3-4
multitenancy 1-6
N
netmask 4-3
NIC 3-1, 3-2, 3-7
E1000 3-1
VMXNET3 3-1
null value 4-1
O
object configuration 1-7
Open Virtual Appliance or Application (see Ova) 3-2
Open Virtual Machine Format (see OVF) 3-2
optical disk media (see ISO) 4-1
OVA 3-2, 3-3, 3-8, 4-1, A-1
OVA file 2-2
OVF 3-2
OVF template 2-2, 3-4, 4-1, 4-4, A-2
P
packet processing 1-2
packets 1-5
password 3-5, 3-8, 4-3, 5-1, A-2
policy agent 5-1
policy-based traffic monitoring 1-3
policy enforcement 1-2
policy-engine logging 2-50
policy-engine statistics 2-6, 2-53
policy evaluation 1-2
policy set 2-47
port profile 1-4, 1-8, 2-6, 2-52, 3-3
port profile name 3-3
port profile policies 1-5
R
red error message 4-1
Red Hat Enterprise Linux (See RHEL) 4-5
Red Hat Enterprise Linux (see RHEL) 1-6
related documents i-vii, 2-6
RHEL 1-6
rule
permit all 2-43
permit-all 2-43
S
SaaS 1-6
SCSI 3-1, 3-7
security policy 1-8, 2-44
security profile 1-3, 1-4, 1-8
security profiles 1-5
security template 1-7
shared secret password 4-3, 5-1
Software-as-a-Service (see SaaS) 1-6
standby Cisco VSG 3-10
switch uplink port 3-3
system requirements 1-8
T
template-based configuration 1-8
tenant 1-3
traffic 2-6, 2-53
trust zone 1-1
V
vApp 1-2, 1-3
vCenter 1-4, 3-2
registration 5-2, 5-3
vDC 1-3
VEM 1-2, 3-2
virtual appliance 1-2, 1-6
Virtual Center (see vCenter) 1-4
virtual data center 1-6
virtual data center (see vDC) 1-3
virtual ethernet module (see VEM) 1-2
virtualization 1-4
virtual machine (see VM) 1-1
virtual network interface card (see vNIC) 1-2
virtual network service data path (see vPath) 1-2
virtual processor 3-7
Virtual Supervisor Module (see VSM) 1-4
VLAN 1-3, 3-3
HA 1-5
management 1-5
service 1-5
VM 1-1, 3-1, 3-2, 4-1
vMotion 1-4, 3-2
VMware 1-2, 1-3, 2-2, 2-6, 3-1, 3-6
VMXNET3 3-1
vNIC 1-2
data 1-5
HA 1-5
management 1-5
VNMC
API 1-8
architecture 1-6, 1-7
VNMC (see Cisco VNMC) 1-6
vPath 1-2, 1-3, 1-5, 3-2
VSG 3-2
VSM 1-4, 1-8, 3-2
vSphere 1-2, 1-3, 3-2, 3-4, 3-6
Installer A-1
X
XML 1-7
XML API 1-7
Z
zone-based access control 1-1
zone-based enforcement 1-3
zone membership 1-3, 1-4
zone scaling 1-2