A -
B -
C -
D -
E -
F -
G -
H -
I -
K -
L -
M -
N -
O -
P -
Q -
R -
S -
T -
U -
V -
Z
Index
A
access control rule 1-5
access logs 1-5
ACL 1-11
action
drop packet 1-12, 6-3
inspection 1-12, 6-3
log 1-12, 6-3
permit 1-12, 6-3
active-standby mode 1-3
active-standby pair 1-5
administrator
network 1-11
security 1-11, 1-12
attribute
custom 1-11, 6-6, 6-7
neutral 1-12, 6-3
port-profile 6-6
virtual infrastructure 6-6
B
backing up files 4-18
banner message
configuring 4-2
C
capacity planning 1-3
Cisco Nexus 1000V Series switch 1-1
Cisco NX-OS 1-1
Cisco VNMC 6-1
Cisco VSG deployment scenarios 1-8
Cisco VSG in the layer 3 mode 1-8
capability l3-vn-service 1-8, 3-6
configuration 1-14
configuring the port profile on the VSM 3-3
configuring vmknics 3-4
VEM interface 1-8
vmknics 1-8
VXLAN 1-8
CLI
Cisco VSG 2-1
command modes 2-2
EXEC command mode 2-3
prompt 2-1
cloud environments 1-1
command
directing output to a file 4-25
no form 2-7
special characters 2-5
command-line interface (See CLI) 2-1
command mode
summary 2-4
command modes 2-2
command shortcuts 2-5
compliance 1-2
compute infrastructure 1-2
configuration
clearing 4-12
data0 interface 2-4
displaying 4-3
global 2-4
rolling back to previous 4-26
running 2-4
saving 4-11
startup 2-4
zone 2-4
configuration files
backing up 4-18
copying 4-18
deleting 4-21
downloading 4-18
context-sensitive help 2-7
copying files 4-18
current directory
changing 4-14
displaying 4-14
custom attributes 1-5, 1-11, 1-13, 1-14, 6-6, 6-7
D
data0 interface
configuration 2-4
data interface 6-2
debug 1-13
dedicated server 1-3
directories
creating 4-19
deleting 4-20, 4-21
display current 4-14
listing files 4-15
moving files 4-21
drop packet 1-12, 6-3
E
environment
structured 1-5
VM 1-5
ESX 1-11
ESX host 6-2
Ethernet 1-11
F
failure, switchover 5-10
features, new and changed (table) iv-xiii
files
compressing 4-22
copying or backing up 4-18
deleting 4-21
displaying checksums 4-29
displaying contents 4-27
displaying last lines 4-29
moving 4-21
uncompressing 4-22
file systems
changing directories 4-14
creating directories 4-19
deleting directories 4-20
displaying current directory 4-14
listing files 4-15
specifying 4-13
firewall policy 1-11, 1-13, 6-7
firewall policy objects 6-1
firewall rule 1-12, 6-3
G
global configuration 2-4
H
heart-beat mechanism 1-9
help 2-7
context-sensitive 2-7
high availability 1-3
displaying status 5-17
host 1-12, 6-3
hypervisor 1-2, 1-10
I
inspection 1-12, 6-4
interface
management 1-11
IP address 1-12, 6-3
VSG 1-11
K
keyboard shortcuts 2-5
L
line-card modules 1-10
log 1-12, 6-3
logical modular switch 1-10
M
management interface 1-11
master-slave relationship 1-9
message and transaction service. See MTS
MTS
description 5-4
N
network administrator 1-11
neutral attribute 1-12, 6-3
NX-OS 1-1
NX-OS high availability
description 5-1
O
object group 1-12, 6-3
operational segregation 1-3
P
permit 1-12, 6-3
persistent storage service. See PSS
physical line-card modules 1-10
policy
ACL 1-11
engine 1-12
QoS 1-11
policy decision 1-2
policy enforcement 1-2
policy engine 1-12
policy evaluation 1-12, 1-13, 6-3
policy name 1-12, 1-13, 6-4
policy object 1-13
action 1-13, 6-4
condition 1-13, 6-4
object group 1-13, 6-4
rule 1-13, 6-4
zone 1-13, 6-4
port group 1-11
port profile 1-5, 1-11, 1-13, 6-7
VM 1-11
port-profile attributes 6-6
primary role, VSM 5-7
primary VSG 1-3
PSS
global and local synchronization 5-4
private and shared 5-4
Q
QoS 1-11
R
related documents iii-xi
Reset 1-12
restartability
infrastructure 5-3
role, VSM
primary 5-7
secondary 5-7
standalone 5-7
rule condition 1-12, 6-3
rule policy object 6-3
rules 1-12, 6-3
running configuration 2-4
S
secondary role, VSM 5-7
security administrator 1-11
security operations team 1-3
security policies 1-1
security profile 1-5, 1-11, 6-7
security profile templates 1-1
security services 1-11
segmentation
VM 1-11
service firewall log 1-13
soft switch 1-10
standalone role, VSM 5-7
standby VSG 1-3
startup configuration 2-4
structured environment 1-5
subnet 1-12, 6-3
supervisor module
role
secondary 5-7
supervisor modules
replacing standby supervisor 5-16
role
primary 5-7
standalone 5-7
switchovers 5-10
guidelines 5-9
syntax error isolation 2-7
T
tenant traffic 1-11
traffic 1-5
external-to-zone 1-5
policy-based 1-5
zone-to-external 1-5
zone-to-zone 1-5
trust-zone
definition 1-5
trust zones 1-1, 1-2
U
users
displaying 4-30
sending messages 4-31
using help 2-7
V
vApp 1-5
vCenter 1-12, 6-3
VEM 1-2
vEthernet 1-11
virtual data center 1-1, 1-2, 1-5
Virtual Ethernet Module. See VEM 1-2
virtual Ethernet port 1-5
virtual infrastructure attributes 6-6
virtualization 1-5
virtual machine. See VM 1-1
Virtual Network Management Center (See Cisco VNMC) 6-1
virtual network service datapath 1-2
virtual port 1-11
Virtual Security Gateway (See Cisco VSG) 1-1
Virtual Supervisor Module 1-5
virtual switch 1-5
VLAN 1-5
Data 1-9
HA 1-9
Management 1-9
management 6-2
Service 1-9
VM 1-1
port profile 1-11
segmentation 1-11
VM Data VLAN 1-9
Vmotion 1-11
vMotion 1-5
VM-to-VM communication 1-9
VMware 1-2
VMware vCenter Server 1-11
VMware Virtual Center 1-5
vNIC 1-3
volatile:
switch reboots 4-15
vPath 1-2, 1-11
VSG
firewall policy object 6-2
IP address 1-11
VSG CLI 2-1
VSG Layer 2 configuration
vPath ping command 3-9
VSG layer 2 configuration 1-13
VSG Layer 3 configuration
administrator 1-14
policy object 1-14
VM port profile 1-14
vPath ping command 3-11
VSG layer 3 configuration 1-14
firewall policy 1-14
VSM 1-10
VSMs
manual switchover 5-10
vSphere 1-2, 1-5
vSwitch 6-2
Z
zone 1-12, 6-3
configuration 2-4
zone attribute 1-12, 6-3
zone membership 1-5
zone-to-zone traffic 1-5