Table Of Contents
Symbols - Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - Z
Index
Symbols
*(wildcard)
port security authorization 18-5
Numerics
16-port modules
BB_credits 10-12
LEDs 10-15
preserving configurations 7-7
See also switching modules
32-port modules
BB_credits 10-12
configuration guidelines 10-8, 12-2
preserving configurations 7-7
SPAN guidelines 28-6
See also switching modules
A
AAA
authorization and authentication process 16-16
setting authentication 16-15
usage 1-10, 16-1
user accountability 16-24
access control
iSCSI enforcement 22-63
iSCSI mechanisms 22-61
Access Control Lists
See ACLs
access-group configuration 20-10
accounting 16-24
ACLs
adding entries 20-8
clearing counters 20-11
configuration guidelines 20-5
creating 20-7
defining 20-8
log dump 20-9
operands 20-8
removing entries 20-9
activating
IVR topology 14-7
active
states 5-6
zones 13-8
zone sets 13-12
adding
IP addresses 20-21
ports to a PortChannel 12-6
SNMP communities 16-34
switches 4-4
adding ACL entries 20-8
address-allocation cache 24-15
Address Resolution Protocol
See ARP
administrative speed
configuring 10-11
administrative states
description 10-6
administrator passwords
configuring 4-9
configuring switch 4-3
creating additional accounts 4-5
default 4-5
recovering 16-26
requirements (note) 4-6
advertisement packets
setting time intervals 20-22
aggregated flow statistics 19-14
aliases
configuring 13-6
ALPA 10-29
applying ACLs 20-9
area FCID
configuring 24-11
ARP
clearing and viewing entries 20-13
IP services 1-6
ARP caches
clearing 22-10
managing 22-10
asset tag 10-15
assigning
alias names 13-6
contact information 23-2
domain IDs 24-4
FC IDs 19-9
global keys 16-6
host key 16-6
users 16-34
zone members 13-5
authentication
CHAP option 22-86
global overide 22-65
iSCSI setup 22-85
See MD5 authentication
See simple text authentication
authentication, authorization, and accounting
See AAA
automatic synchronization
conditions 5-6
autonomous fabric ID 14-6
AutoNotify
destination profile (note) 23-5
registration 23-3
service contract 23-2
auto port mode
configuring 10-10
description 10-5
interface configuration 10-2
B
basic input/output system
See BIOS
BB_credits
configuring 10-11
reason codes 10-7
beacon mode
configuring 10-14
identifying LEDs 10-15
LEDs 7-11
Berkeley Packet Filter
See BPF
BIOS
boot sequence 6-24
recovering corrupted bootflash 6-25
recovery sequence 6-24
setup (figure) 6-27
BIOS upgrades 6-20
boot
sequence 6-24
variable synchronization 5-4
bootflash
copying to 6-17
description 2-18
device 6-17
file system 6-2
initializing 2-19
recovering corrupted6-24to 6-25
space requirements 6-2
See also internal bootflash
bootloader
nondisruptive upgrades 6-18
skipping phases 6-29
bootup diagnostics 7-4
boot variables
disruptive upgrades 6-21
border switch 14-3
BPF
library 29-16
See also libpcap freeware
B ports
functionality 10-5
interface modes 10-2, 10-5
broadcast
in-band addresses default 7-14
routing 19-10
buffer-to-buffer credits
See BB_credits
build fabric frames 24-3
C
cache
See address-allocation cache
Call Home
configuring23-3to 23-9
Call Home
functionality 1-7
message format options 23-2
capture filters 29-16
CDP
clearing 4-37
configuring 4-36
configuring globally 4-37
displaying 4-38
hold time 4-37
packet transmission 4-36
CHAP authentication 22-86
chassis
types 7-1
checks
See compatibility checks
Cisco Discovery Protocol
See CDP
Cisco MDS 9000 System Debug Server 31-8
Cisco MDS 9120 Directors
overview 1-1
Cisco MDS 9140 Directors
overview 1-1
Cisco MDS 9200 Series
LEDs 7-9
mgmt0 LEDs 7-10
Cisco MDS 9216 switches
high availability 1-4, 5-2
modules 1-9, 7-1
overview 1-1
supervisor module 7-5
Cisco MDS 9500 Series
high availability 1-4, 5-1
LEDs 7-10
overview 1-2
Cisco MDS 9506 Directors
modules 1-9, 7-1
overview 1-1, 1-3
Cisco MDS 9509 Directors
modules 1-9, 7-1
overview 1-1, 1-3
claim certificate 3-2
clearing
FIB statistics 19-15
FSPF counters 19-9
IVZ database 14-14
zone sets 13-15
CLI
accessing submodes 2-3
alternative 1-11
command modes 2-3
updating SNMPv3 passwords 16-34
client
CIM 10-19
clock modules
monitoring status 8-11
CMOS
configuration 6-27
saving changes 6-28
COM 1
configuring 4-31
command-line interface
See CLI
commands
saving output to files 2-23
Common Information Model. See CIM
CompactFlash
devices 2-18, 2-19, 6-17
disk 6-2
slot 0 6-17
compatibility checks 12-7
computing routes 19-1
Configuring
ALPA caches 10-10
configuring
FCIP links 22-22
IVR 14-5
unique area FCIDs 24-11
congestion control methods
See edge quench congestion control
See FCC
connecting a modem
COM 1 4-32
console 4-32
consistent switch states 12-6
console session
severity levels 26-5
control frames 22-20
control traffic
disabling 25-4
core dumps
IPS module 22-18
kernel 31-8
cores 31-6
counted licenses 3-2
creating
IVR topology 14-6
creating SNMP roles 16-32
cross-VSAN communication 14-9
customized
targets 27-4
D
databases
See zone databases
data field
configuring size 10-13
data frames 22-20
dead time interval 19-7
default gateway
BIOS setup configuration 6-27
configuring mgmt0 Ethernet interfaces 10-18
recovering loader> prompt 6-29
recovering switch(boot)# prompt 6-30
default groups 16-33
default zones
description 13-11
interoperability 29-21
deleting
FSPF configurations 19-5
PortChannels 12-6
deny conditions 20-5, 20-7
destination IDs
exchange based 12-5
flow based 12-4
frame identification 25-2
frame loop back 29-4
in-order delivery 19-10, 25-2
load balancing 1-6, 12-1
path selection 9-6
destination profiles
configuring 23-5
device IDs
Call Home format 23-15, 23-16
copying files 16-34
report capacity 27-1
Device View
description 1-11
digital signature algorithm
See DSA key pairs
Dijkstra's algorithm 19-2
direct memory access
See DMA-bridge
disabling routing protocols 19-5
discovered
LUNs 27-4
targets 27-3
display filters
selective viewing 29-12
disruptive
upgrades 6-4
distribution tree 19-10
DMA-bridge 22-12
documentation
related documents xli
domain ID
IVR guidelines 14-4
domain IDs
configuring 24-4
distributing 24-2
failure 10-7
interoperability 29-21
preferred 24-5
range 2-27
static 24-5
unique 14-5
domain manager
isolation 10-7
domain names
defining 20-25
Domain Name System servers
See DNS servers
domain overlap
isolation 10-7
drop latency time
configuring 19-13
dsa key pairs
generating 16-28
E
edge
switch 14-3
VSAN 14-3
edge quench congestion control
description 25-2
egress port 28-12, 28-25
EISL
functionality 1-6
PortChannel links 12-1
ELP failure 10-7
e-mail notification
Call Home 23-1
enabling
IVR 14-6
enforcing licenses 3-1
Enterprise package 3-3
environmental monitors 7-9, 7-10
E ports
32-port guidelines 10-8, 12-2
classes of service 10-3
configuring 10-10
FSPF topology 19-2
interface modes 10-2
isolation 10-7
recovering from isolation 13-13
SPAN 28-3
trunking 1-6
trunking configuration 11-3
error disabled code 10-7
error messages
description 26-2
error state 6-32
ESC failure 10-7
Ethereal freeware
analyzer 29-8
information 29-7
Ethernet PortChannels
configuring 22-15
evaluation license 3-2
exchange IDs
in-order delivery 19-10
load balancing 1-6, 12-1, 29-4
path selection 9-6
exchange link parameter
See ELP failure
expiry alerts
licenses 3-10
exporting
zone databases 13-13
extended ISL
See EISL
external RADIUS server
CHAP 22-86
external server
configuring 31-9
F
fabric
See build fabric frames
See reconfigure fabric frames
Fabric Analyzer
capture range 2-27
configuring 29-9
description 29-7
frame range 2-27
Fabric Configuration Server
See FCS
fabric login
See FLOGI
Fabric Manager
description 1-9
Device View 1-11
Fabric View 1-11
fabric names
setting 24-8
fabric pWWNs
configuring zones 13-5
zone membership 13-2
fabric reconfiguration
fcdomain phase 24-2
fabric shortest path first
See FSPF
Fabric View
description 1-11
fail over protection 22-14
fan modules
monitoring status 8-11
fan trays
overview 1-2
fault tolerant fabric
example (figure) 19-2
FC aliases
configuring zones 13-5
fcanalyzer
clearing hosts 29-11
displaying filters 29-12
FCC
benefits 25-2
default settings 25-12
enabling 25-3
frame handling 25-2
logging facility 26-2
fcdomain
configuring 24-1
default settings 24-16
FC IDs
address format 2-27
allocating 24-2, 29-19
allocating areas 29-19
configuring zones 13-5
FCIP
configuring 22-19
default parameters 22-101
Gigabit Ethernet ports 22-4
interfaces 22-20, 22-21
IPS module 22-2, 22-19
IP storage 22-1
links 22-20
profiles 22-20, 22-21
TCP connections 22-20
Fcot not present 10-7
fcping
invoking 29-5
FCS
configuring 30-3
description 30-2
logging facility 26-2
significance 30-3
fctrace
invoking 29-4
feature-based licensing 3-3
Fibre Channel analyzers 28-10
Fibre Channel Congestion Control
See FCC
Fibre Channel domain
See fcdomain
Fibre Channel over IP
See FCIP
Fibre Channel traffic
SPAN sources 28-3
file system
formatting 2-19
redirection 2-23
volatile 2-20
File Transfer Protocol
See FTP
filters
capture 29-16
defining display 29-13
FLOGI
displaying details 15-1
logging facility 26-2
flow statistics 19-14
FL ports
classes of service 10-4
configuring 10-10
fctrace 29-4
interface modes 10-2
nonparticipating code 10-8
persistent FC IDs 24-10
SPAN 28-3
FM Server package 3-4
F ports
classes of service 10-3
configuring 10-10
interface modes 10-2
SPAN 28-3
frames
control 22-20
data 22-20
encapsulation 10-13, 28-8
flow 1-8
MTU 22-6
reordering 19-10
FSPF
alternative paths 19-1
clearing counters 19-9
computing link cost 19-6
configuring globally 19-4
configuring on interfaces 19-6
default settings 19-20
disabling on interfaces 19-7
disabling routing protocols 19-5
hold time range 2-27, 19-1
interoperability 29-22
link state protocol 19-2
reconvergence time 19-2
routing services 19-1
topologies example 19-2
FTP
logging facility 26-2, 26-7
full core dumps
IPS modules 22-18
full zone set
considerations 13-8
distribution 13-12
Fx ports
32-port default 10-8
configuring 10-10
FCS 30-2
interface modes 10-5
G
Gigabit Ethernet
configuring 22-5
default parameters 22-101
IP routing 22-8
major interfaces 22-8
ports 22-4
subinterfaces 22-8
global iSCSI information
displaying 22-74
grace period 3-2
H
hardware
displaying inventory 8-2
status description 7-4
hard zoning 13-10
HA-standby 5-4, 7-3
HBA ports
configuring area FCIDs 24-11
hello time interval 19-6
hidden routes 19-16
high availability
Ethernet PortChannel 22-85
features 22-82
functionality 1-4, 5-2
licensing 3-4
process restartability 5-4
software upgrade 6-4
status 5-6
VRRP 22-84
VRRP features 22-14
host ID
licensing 3-2
I
ICMP packets
type value 20-7
ICMP statistics
displaying 22-14
identical passwords
CLI and SNMP 16-34
IDs
Cisco.com IDs 23-3
contract IDs 23-4, 23-15
customer IDs 23-4
image version and IDs 6-2
login IDs 4-5
process IDs 4-26, 31-2, 31-6
profile IDs 23-5
region ID 19-5
serial IDs 23-16
server IDs 23-16
site IDs 23-4, 23-15
See destination IDs
See device IDs
See domain IDs
See exchange IDs
See FC IDs
See port IDs
See source IDs
See user IDs
See VR IDs
See VSAN IDs
images
See kickstart images
See software images
See system images
importing database 13-13
inactive code 10-7
inconsistent switch states 12-6
incremental licenses 3-2
ingress port 28-11
initiator access list 22-62
in-order delivery 19-10
enabling 19-12
in-order guarantee 19-11
install all
command benefits 6-5
command examples 6-9
command failure cases 6-6
command function 6-5
command requirements 6-3
command usage 6-7
remote location path (caution) 6-12
installing
licenses 3-4
insufficient power 7-4
interface
adding to PortChannels 12-7
configuring FSPF 19-6
suspended states 12-7
interfaces
characteristics 10-2
configuring 10-9
data field size 10-13
default settings 10-32
description 10-11
modes 10-9
reason codes 10-6
states 10-6
internal bootflash
description 2-18
flash devices 2-18
See also bootflash
internal switch states
description 5-7
interoperability
configuring 29-21
verifying status 29-23
inter-switch links
See ISL
Inter-VSAN Routing
see IVR
invoking fcping 29-5
IOD
See in-order delivery
IP Access Control Lists
See ACLs
IP address
address format 2-27
SMTP server 23-9
IP addresses
configuring in VSANs 20-12
IPFC
logging facility 26-3
IP features
default settings 20-26, 21-49
IP forwarding
disabling 20-12
IP over Fibre Channel
See IPFC
IP routing
Gigabit Ethernet interface 22-8
static 1-6
IPS core dumps
See core dumps
IP services
default settings 20-25
IPS module
CDP 4-36
CDP support 22-18
functions 22-2
port mode 22-4
IPS modules
core dumps 22-18
IPS Ports
multiple connections 22-83
IPS ports 22-2
IPS services module
See IPS module
IPS statistics
displaying 22-80
IP statistics
displaying 22-12
IP storage
VRRP 22-15
iSCSI
default parameters 22-102
Gigabit Ethernet ports 22-4
IPS module 22-2
iSCSI authentication 22-64
iSCSI discovery 22-63
iSCSI host
multiple VSANs 22-57
iSCSI hosts
configuring accessibility 22-62
iSCSI initiators
assigning WWNs 22-57
displaying 22-76
dynamic mapping 22-55
identifying 22-55
iSCSI interfaces
displaying 22-68
iSCSI session creation 22-63
iSCSI sessions
displaying 22-75
iSCSI targets
access control 22-61
secondary access 22-51
iSCSI user information
displaying 22-82
iSCSI virtual targets
displaying 22-80
ISL
PortChannel links 12-1
isolation
reason codes 10-7
IVR
path 14-3
sharing resources 14-2
zone 14-3
zonesets 14-3
J
jumbo frames
see MTU frame size
K
kernel core dumps 31-8
configuring 31-9
kickstart images
downloading 2-19
KICKSTART variable 6-1
loading system images 6-24
overview 6-2
recovering corrupted 6-29
recovery 6-30
recovery interruption 6-25
L
LEDs
identifying beacon 10-15
Link 10-15
speed 10-15
status 10-15
libpcap freeware 29-7
license
terminology 3-2
licenses
factory-installed 3-5
licensing
installing 1-4, 3-1
link cost 19-2
link end points 22-20
link failure 10-7
high availability 5-2
link redundancy
Ethernet PortChannels 22-15
load balancing 12-1
attributes 9-6
guarantee 9-7
mechanisms 12-4
local capture 29-9
log files 31-6
configuring 26-6
logging
default settings 26-12
severity levels 26-4
system messages 26-2
logging levels
IVR 14-14
logical unit numbers
See LUNs
loop monitoring 29-20
loop port 29-20
LSR 19-18
LUNs
address format 2-27
displaying discovered, example 27-4
M
MAC= keyword 20-9
MAC address
format 2-27
Mainframe package 3-4
major threshold 7-9
Management Information Base
See MIB
management module 7-9
management redundancy
high availability 5-2
manual assignment 22-56
mapping
iSCSI hosts 22-55
MD5 authentication 20-23
membership
IVR zones 14-9
memory test 6-24, 6-25
mgmt0 interfaces
autosensing port 4-20, 10-18
configuring 10-18
configuring ethernet ports 20-3
overview 10-1
recovery from switch(boot)# prompt 6-30
minor threshold 7-9
modify existing users 16-33
module
configuring logging 26-5
module-based licensing 3-3
module configuration
sample scenarios 7-7
module status 10-1
module temperature 8-10
monitoring traffic 28-7, 28-17
MTU frame size 22-6
multicast routing 19-10
multi-pid option 15-8
N
name server
interoperability 29-22
name server proxy 15-3
native VSAN 14-3
network administrator 2-25, 16-3
network operator 2-25, 16-3
Network Time Protocol
See NTP
network traffic
monitoring 28-7, 28-17
next hop domain ID 19-9
NL ports
fctrace 29-4
interface modes 10-5
zone enforcement 13-10
node-locked license 3-2
node WWNs
See nWWNs
nondisruptive
restart 5-2
upgrades 6-4
nonparticipating code 10-8
non-trunking ISL 11-2
nonvolatile storage 7-7
N ports
fctrace 29-4
zone enforcement 13-10
zone membership 13-2
NTP
logging facility 26-3
nWWNs
address format 2-27
Nx ports
hard zoning 13-10
O
offline code 10-7
one-step upgrade
install all command 6-4
reload command 6-4
operational interfaces
viewing PortChannels 12-10
operational state 10-10
operational state setting
description 10-6
originator exchange IDs
See exchange IDs
out-of-order delivery 19-10
P
partial core dumps
IPS module 22-18
password recovery 16-26
path discovery 29-4
permanent license 3-2
permit conditions 20-5, 20-7
permitted filters 29-17
persistent FC ID 24-9
persistent FC IDs
displaying 24-14
physical interfaces 22-12
policy
IVR zones 14-9
port aggregation 5-2
PortChannel
configuring FC routes 19-9
functionality 1-6
high availability 5-2
in-order guarantee 19-11
link changes 19-11
link failure 19-3
load balancing 1-6
logging facility 26-3
membership 12-8
range 2-27
reason codes 10-8
PortChannels
adding Gigabit Ethernet interfaces 22-16
adding interfaces 12-6
configuring 12-5
default settings 12-12
deleting 12-6
examples 12-2
forcing additions 12-7
guidelines 12-9
interoperability 29-22
member combinations 22-16
SPAN 28-4
trunking comparison 12-3
port group 10-8, 10-12, 10-15, 12-2
port IDs
configuring zones 13-5
port mode
IPS 22-2, 22-4
port modes
auto 10-5
ports
virtual E 22-20
Port world wide name
See pWWN
port WWNs
See pWWNs
power supplies 1-2, 1-3, 7-9, 7-10
configuring 8-6
displaying configuration 8-6
guidelines 8-6
modes 4-28, 8-6
power usage
displaying details 8-5
preempt option 20-22
preferred domain IDs 24-5
preshared key 16-6
principal switch 24-4, 24-5
selecting 24-1
private device 10-29
process ID 31-6
Process Logs 31-4
process restartability 5-4
product authorization key 3-2
proof of purchase 3-2
protocol analysis 29-7
pWWNs
address format 2-27
configuring zones 13-5
zone membership 13-2
Q
QoS
default settings 25-12
displaying information 25-4, 25-10
enabling 25-6
enabling control traffic 25-4
logging facilities 26-3
priority queuing 1-8
quality of service
See QoS
R
R_A_TOV time 10-7
RADIUS
AAA solutions 1-10, 16-1
configured parameters 16-8
secret key 1-10, 16-1
setting preshared key 16-6
specifying servers 16-6
specifying time-out 16-7
rebooting switch 7-6
reconfigure fabric 10-7
reconfigure fabric frames 24-3
reconvergence time
FSPF 19-2
recovering passwords 16-26
recovery sequence 6-25
redundancy states 5-6
redundant physical links 19-3
Registered State Change Notification
See RSCN
remote capture 29-9, 29-11
remote capture daemon 29-8
Remote Capture Protocol
See RPCAP
Remote Monitoring
See RMON
retransmit intervals 19-8
roles
additional 16-3
route cost
computing 19-6
route table 22-9
routing
See broadcast routing
See IP routing
RPCAP
Ethereal communication 29-8
rsa1 key pairs
generating 16-28
rsa key pairs
generating 16-28
RSCN
logging facility 26-3
RSPAN
default settings 28-29
run time checks 19-8
S
SAN extension package 3-3
SAN operating system
See SAN-OS
SAN-OS 6-1
schema
CIM 10-19
SCSI LUNs
discovering targets 27-1
SD ports
bidirectional traffic 28-12
configuring 10-10, 28-7, 28-22
interface modes 10-2, 10-4
secondary MAC address 29-18
Secure Shell
See SSH
security control
local 16-2, 16-15
remote 16-2, 16-5, 16-10
security features
default settings 16-38, 17-12, 18-12
security parameter index
See SPI
See MAC address
See also WWNs
selective purging
persistent FC IDs 24-13
server
configuring CIMs 10-19
severity levels
logging 26-5
shutdown state 10-8, 12-2
Simple Network Management Protocol
See SNMP
simple text authentication 20-23
simulating
Call Home 23-10
slot0
formatting 2-19
small computer system interface
See SCSI
SMARTnet 23-3
SMTP
server address 23-9
SNMP
access control 16-30
access groups 16-31
CLI configuration 16-30
community strings 16-30
configuring from CLI 16-34
counter Information 16-37
displaying information 16-37
read-write access 16-34
server contact 23-2
versions 16-30
SNMP manager
FCS 30-3
SNMPv3
security features 16-30
software image
default setting 6-33
error state 6-24
recognizing errors 6-32
software images
bootflash corruption 6-24
compatibility issues 6-18
corruption 6-24
recovery procedure 6-24
space requirement 6-3
synchronizing 5-4
upgrade requirements 6-2
upgrading 6-1
variables 6-1
software upgrades
disruptive 6-7
high availability 5-2
manual, dual supervisor 6-17
mechanisms 6-4
quick 6-21
soft zoning 13-10
source IDs
Call Home event format 23-16
exchange based 12-5
flow based 12-4
frame identification 25-2
frame loop back 29-4
in-order delivery 19-10
load balancing 1-6, 12-1
path selection 9-6
SPAN
configuring sessions 28-5
default settings 28-14
egress source 28-3
encapsulating frames 28-8
FC analyzers 28-10
ingress source 28-2
monitoring traffic 1-8, 28-2
source configuration 28-4
sources 28-4
specification
CIM 10-19
speed
LEDs 7-11
SPI
configuring virtual router 20-23
SSH
default service 16-27
force option 16-28
host key pair 16-28
protocol status 16-29
session 6-17
SSH session
message logging 26-4
Standard package 3-3
standby module
monitoring 5-2
standby supervisor 5-4
stateful
HA-switchover 5-3
static domain IDs 24-5
static mapping
iSCSI initiators 22-56
pWWN assignment 22-56
static routes 9-8
run time checks 19-8
status
LEDs 7-11
storage
permanent and temporary 2-18
storage devices
access control 13-1
ST ports
configuring 28-19
interface modes 10-2, 10-5
subnet mask
BIOS setup configuration 6-27
configuring IP routes 20-13
configuring mgmt0 4-20, 20-2
configuring mgmt0 interfaces 10-18
configuring switch 4-3
default setting 7-14
initial configuration 4-6, 4-10
loader> prompt recovery 6-29
switch(boot)# prompt recovery 6-30
subnetwork requirements 22-8
subordinate switch 24-7
supervisor module
CDP support 22-18
default settings 7-13
supervisor modules
active 1-9, 5-2
active state 5-6, 5-7, 7-4
default settings 7-13
high availability 5-2
major threshold 7-10
recovering password 6-31
resetting 7-6
standby module 1-9
standby state 5-7, 7-4
standby status 7-3
states 5-7
switch options 1-9
switchover 5-3
viewing information 7-5
suspended state 12-7
switch
dual supervisor 6-31
reliability service 1-4
reloading 7-6
role-based access 1-10
secure access 1-10
security management 1-10
single supervisor 6-30
SNMPv3 access 1-10
verifying modules 7-3
switchability
high availability 5-2
switched port analyzer
See SPAN
switching module
16-port 7-7
32-port 7-7
LEDs 7-9
power cycle 7-6
powering off 7-8
reloading 7-6
status 7-3
viewing states 7-3
switching modules
connecting to 7-5
LEDs 7-9
LEDs (table) 7-11
managing 7-1
powering off 7-8
preserving configuration 7-7
progression states 7-3
reloading 7-6
reset 5-3
resetting 7-6
states 7-1
thresholds 8-9
switchover mechanism 5-6, 5-7
HA 5-7, 7-3, 7-4
warm 7-3, 7-4
switchport
auto-negotiate 22-5
promiscuous mode 22-6
switch priority
configuring 24-6
range 2-27
switch redundancy states 5-6
switch states 12-6
syslog messages
See system messages
syslogs
viewing 1-9
syslog server 26-2
configuring 26-6
system assignment 22-56
system health
status 31-15
system image 2-19
reading configuration 6-24
recovery interruption 6-25
system images 6-2
SYSTEM variable 6-1
system messages
configuring 26-4
default settings 26-12
displaying configuration 26-8
logging 26-2
system processes
displaying 31-2
status 31-5
system statistics
CPU and memory 31-6
system switchover
guidelines 5-3
mechanisms 5-3
T
target disks 27-3
TCP connections
FCIP profiles 22-21
TCP ports
ACLs 20-6
TCP statistics
displaying 22-13
Telnet
default service 16-27
session 6-17
Telnet session
message logging 26-4
temporary storage 2-18
TE port
trunking 1-6
TE ports
classes of service 10-4
fctrace 29-4
FSPF topology 19-2
interface modes 10-2
interoperability 29-22
recovering from isolation 13-13
SPAN 28-3
trunking restrictions 11-1
TFTP
boot 6-27
copying images 6-17
server 6-27
TFTP server 31-6
threshold
major and minor 8-9
time interval
configuring 19-6
time out value
See TOV
Timers
range 2-27
TL Ports
logging facility 26-3
TL ports
classes of service 10-4
configuring 10-10
displaying 10-29
FCS 30-2, 30-3
interface modes 10-2
SPAN 28-3
TOV
interoperability 29-21
ranges 29-2
transit VSAN 14-3
transit VSANs 14-7
guidelines 14-4
trivial authentication 16-2, 16-15
troubleshooting
collecting output 29-27
error messages 26-2
trunk-allowed list
configuring 11-4
Trunking
PortChannels comparison 12-3
trunking
configuration guidelines 11-6
functionality 1-6
interoperability 29-21
link state 11-3
restrictions 11-1
trunking ports 9-5
trunking protocol 11-2, 11-6
default 11-2
default settings 11-8
trunk mode
administrative default 10-16
configuring 11-3
default settings 11-8
status 11-3
trunk ports
displaying information 11-7
U
UDP ports
ACLs 20-6
uninstalling
permanent licenses 3-8
updating
licenses 3-9
upgrades
See disruptive upgrades
See nondisruptive upgrades
upgrading
software6-17to 6-21
upgrading BIOS
See BIOS upgrades
user ID
authentication 16-3
user IDs
security management 1-10
user profiles 16-3
users
creating 16-32
V
VE ports 22-20
virtual devices 10-29
virtual E ports
See VE ports 22-20
virtual Fibre Channel hosts
mapping 22-55
virtual ISL 22-20
Virtual LANs
See VLANs
virtual N port
dynamic mapping 22-55
Virtual Router Redundancy Protocol
See VRRP
virtual SANs
See VSANs
VLANs
configuring 22-7
VLAN tags 22-8
VR IDs
configuring 20-20
mapping 20-19
VRRP
characteristics 20-19
clearing statistics 20-25
configuring 22-15
configuring Gigabit Ethernet 22-14
group members 22-15
logging facility 26-3
master and backup 20-19
primary IP 20-21
priority tracking 20-23
security authentication 20-23
setting priority 20-21
tracking priority 20-23
VSA
communicating attributes 16-8
protocol options 16-8
VSAN
address format 2-27
configuring 1-5
domain IDs 24-7
functionality 1-5
gateway switch 20-3
overlaid routes 20-4
reason codes 10-7
redundancy 1-5
scalability 1-5
traffic isolation 1-5
VSAN IDs
allowed list 11-8
attributes 9-6
configuring FICON 21-3
FCS registration 2-8
membership 9-4
multiplexing traffic 10-4
name 9-10
range 9-5
trunking 12-3
VSANs
allowed-active 11-1, 11-4
allowed list 28-4
allowed-list 11-8
attributes 9-6, 9-8
availability 9-1
broadcast address 19-10
cache contents 24-15
configuring 9-1, 9-6
configuring domains 24-1
configuring FSPF 19-4
configuring overlay 20-17
database submode 2-8
default setting 9-10
default VSAN 9-5
deleting 9-8
FCIDs 9-2
FCS 30-2
features 9-2
flow statistics 19-14
FSPF connectivity 19-2
functionality 1-5
interface 10-19, 10-32
interop mode 29-21
IP addresses 20-12
IPFC interface 29-4
isolated VSAN 9-5
logical interface 4-9
loop devices 10-29
membership 9-5, 9-9
merging traffic 11-6
mismatch 10-7, 11-2
multiple zones 9-4, 13-8
name 9-6
name server 15-3
overlaid routes 20-15
port granularity 9-3
port isolation 11-6
Rules and features 16-19
sate 9-6
scalability 9-1
SPAN source 28-2, 28-4
static routing 20-13
TOVs 29-2
traffic isolation 9-1, 9-3
traffic routing 20-1
trunk allowed 10-32
trunk-allowed 11-1, 11-2
trunk-allowed list 11-4
trunking port 10-4
trunking ports 9-5
usage 9-9
VRRP 20-19
VRRP submode 2-8
VSAN trunking
See trunking
W
world wide names
See WWNs
WWN
address pool 22-55
WWNs
configuring 29-18
displaying configurations 29-19
suspended connection 10-8
See also nWWNs
See also pWWNs
Z
zone database 13-14
zones
access control 13-7
accesses between devices 1-5
configuring 13-5
configuring guidelines 13-8
default policy 13-2, 13-11
default settings 13-23, 14-20
enforcing 13-10
examples 13-3
functionality 1-5
logging facility 26-3
See also default zones
See also hard zoning
See also soft zoning