Table Of Contents
Symbols - Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - Z
Index
Symbols
* (asterisk)
autolearned entries 32-11
host time stamp 24-47
IKE version 1 tunnel 30-33
iSCSI node 35-66
port security wildcard 32-9
Numerics
14/2-port Multiprotocol Services module. See MPS-14/2 module
16-port switching modules
asset tags 11-18
configuring BB_credits 11-13
LEDs 11-18
port groups 11-18
See also switching modules
32-port switching modules
configuration guidelines 11-8
configuring BB_credits 11-13
PortChannel configuration guidelines 13-3
SPAN guidelines 43-7
See also switching modules
A
AAA
authorization and authentication process 28-20
setting authentication 28-19
usage 1-13, 28-1
Access Control Lists. See ACLs
accounting 28-22
ACL based access control
configuring for iSCSI 35-21
ACLs
adding entries 29-6
applying 29-7
clearing counters 29-9
configuration guidelines 29-2
creating 29-5
crypto 30-11 to 30-15
defining 29-5
operands 29-5
reading log dumps 29-7
removing entries 29-6
activation
fabric binding 24-39
active equals saved command 24-19, 24-25
active zone sets
considerations 19-8
distributing 19-12
adding
IP addresses 36-18
adding ACL entries 29-6
address-allocation cache 14-16
Address Resolution Protocol. See ARP
administrative speed
configuring 11-12
administrative states
description 11-6
administrator passwords
default 4-6
recovering 26-17
requirements (note) 4-7
advertisement packets
setting time intervals 36-19
AFID databases
configuring 18-15
verifying contents 18-16
AF IDs
description 18-11
aggregated flow statistics 21-15
aliases
configuring 19-6
ALPA allocation 11-32
ALPA caches
clearing 11-12
configuring 11-11
displaying contents 11-11
area FCID
configuring 14-11
ARP
clearing and viewing entries 36-10
IP services 1-8
ARP caches
clearing 37-11
displaying 37-11
ASMs
Cisco SAN-OS release upgrade and downgrade considerations 10-36
default settings 10-38
installing ASM-SFN boot images for VSFN 10-29 to 10-34
managing 10-34
replacing considerations 10-34
supported features 10-20
ASM-SFN boot images
verifying 10-30
ASM-SFN boot variable
configuring 10-33
verifying configuration 10-33
asset tags
16-port switching modules 11-18
assigning
domain IDs 14-4
FC IDs 21-9
global keys 28-6
host key 28-6
authentication
CHAP option 35-46
iSCSI setup 35-45
See also MD5 authentication
See also simple text authentication
authentication, authorization, and accounting. See AAA
automatic synchronization
conditions 8-5
auto mode
configuring 11-11
description 11-6
auto-negotiation
configuring Gigabit Ethernet interfaces 37-6
autonomous fabric IDs. see AF IDs 18-11
AutoNotify
destination profile (note) 45-5
registration 45-2
service contract 45-3
auto port mode
interface configuration 11-3
B
basic input/output system. See BIOS
BB_credits
configuring 11-12
port swapping 24-26
reason codes 11-7
beacon modes
configuring 11-17
identifying LEDs 11-18
Berkeley Packet Filter. See BPF
BIOS
boot sequence 6-28
recovering corrupted bootflash 6-30
recovery sequence 6-29
setup (figure) 6-32
BIOS upgrades 6-23
blocking ports 24-27
boot
sequence 6-29
bootflash
copying to 6-20
device 6-20
file system 6-2
recovering corrupted 6-28 to 6-29
space requirements 6-2
bootflash:. See internal bootflash:
bootloader
nondisruptive upgrades 6-21
skipping phases 6-34, 6-37
boot variables
configuring automatic copying to standby supervisor modules 8-4
disruptive upgrades 6-25
synchronizing 8-4
BPF
library 49-13
See also libpcap freeware
B port mode
description 11-5
interface modes 11-5
B ports
configuring 33-17
interoperability mode 33-16
SAN extenders 33-17
bridge port mode. See B port mode
bridge ports. See B ports
broadcast
in-band addresses default 10-38
routing 21-10
buffer sizes
configuring in FCIP profiles 33-11
buffer-to-buffer credits
See BB_credits
build fabric frames
description 14-3
C
cache. See address-allocation cache
Call Home
configuring 45-3 to 45-14
description 1-10
message format options 45-2
periodic inventory notification 45-11
capture filters 49-13
CDP
clearing 4-33
configuring 4-32 to 4-37
configuring hold time 4-33
configuring refresh time interval globally 4-33
configuring version 4-33
disabling globally 4-32
disabling on an interface 4-32
displaying information 4-34
packet transmission 4-32
CFS
application requirements 5-5
clearing session locks 5-7
committing changes 5-6
default settings 5-12
description 5-2
disabling on a switch 5-5
discarding changes 5-6
displaying information 5-8
distribution modes 5-4
distribution scopes 5-4
enabling 5-5
fabric locking 5-6
feature description 5-3
merge support 5-7
protocol description 5-3
SAN-OS features supported 5-2
saving configurations 5-7
CHAP authentication 35-46
CIM
configuring 11-22
CIM servers
configuring security 11-22
displaying information 11-27
cisco-av-pair
specifying SNMPv3 28-8
Cisco Discovery Protocol. See CDP
Cisco Fabric Services. See CFS
Cisco MDS 9000 Family
initial setup 4-2 to 4-14
starting a switch 4-2
Cisco MDS 9000 System Debug Server 50-8
Cisco MDS 9100 Series
high availability 1-5, 8-1
overview 1-2
Cisco MDS 9120
overview 1-2
Cisco MDS 9140
overview 1-2
Cisco MDS 9200 Series
high availability 1-5, 8-2
overview 1-2
supervisor modules 1-11
Cisco MDS 9216A switches
overview 1-2
Cisco MDS 9216i switches
configuring extended BB_credits 11-15
overview 1-2
Cisco MDS 9216 switches
high availability 8-1
overview 1-2
Cisco MDS 9500 Series
high availability 1-4, 8-1
overview 1-3
Cisco MDS 9506 Directors
overview 1-3
supervisor modules 1-11
Cisco MDS 9509 Directors
overview 1-3
supervisor modules 1-11
Cisco MDS SAN-OS
downgrading 6-25
software images 6-1
clearing
DPVM database 17-5
FIB statistics 21-16
FICON device allegiance 24-27
FSPF counters 21-9
CLI
accessing submodes 2-3
command modes 2-3
command prompt 2-2
command scripts 2-27
description 1-15
Fabric Manager alternative 1-15
setting delay time 2-28
clock
mainframe 24-17
clock modules
description 9-11
displaying status 9-11
CMOS
configuration 6-32
saving changes 6-33
code page
FICON options 24-16
COM1 ports
configuring settings 4-27
verifying settings 4-27
command-line interface. See CLI
commands
saving output to files 2-26
command scheduler
description 1-14
overview 15-1
Common Information Model. See CIM
CompactFlash
devices 6-20
disk 6-2
slot 0 6-20
CompactFlash. See external CompactFlash
Company ID
FC ID allocation 25-7
computing routes 21-1
conditional receive
RLIR 24-47
configuration
backing up current 7-7
restoring redundancy mode 7-8
rolling back to previous 7-7
saving to NVRAM 7-4
configuration files
displaying 7-2
distributing to fabric 7-5
downloading 7-2
FICON 24-23
saving 7-3
configuring
unique area FCIDs 14-12
congestion control methods. See FCC; edge quench congestion control
congestion window monitoring. See CWM
connecting a modem
COM 1 4-28
console 4-28
console ports
configuring settings 4-26
verifying settings 4-26
console session
logging severity levels 44-4
contact information
assigning 45-3
control traffic
disabling 47-4
Control Unit Port. See CUP
core dumps
IPS module 37-19
kernel 50-8
cores 50-6
CUP
blocking restriction 24-21
in-band management 24-1, 24-27
current directory
displaying 2-23
setting 2-22
customized
targets 23-4
CWM
configuring in FCIP profiles 33-10
D
data field sizes
configuring 11-16, 11-18
date
configuring 4-16
daylight saving time
adjusting for 4-17
dead time interval 21-6
default gateway
BIOS setup configuration 6-32
configuring 4-24
recovering loader> prompt 6-34, 6-38
recovering switch(boot)# prompt 6-35
default gateways
configuring mgmt0 interfaces 11-20
default user
description 4-4
default VSAN
description 16-5
default zones
description 19-11
interoperability 25-10
deleting
FSPF configurations 21-5
deny conditions 29-1, 29-5
destination IDs
exchange based 13-6
flow based 13-5
frame identification 47-2
frame loop back 49-1
in-order delivery 21-11, 47-2
load balancing 1-8
path selection 16-6
destination profiles
configuring 45-4
device alias database
committing changes 20-4
discarding changes 20-4
locking the fabric 20-3
merging 20-5
device aliases
clearing statistics 20-6
comparison with zones (table) 20-2
default settings 20-10
description 20-1
displaying information 20-6 to 20-9
distribution to fabric 20-5
features 20-2
modifying the database 20-3
overriding fabric lock 20-4
requirements 20-2
zone alias conversion 20-5
device allegiance
FICON 24-27
device IDs
Call Home format 45-21, 45-22
report capacity 23-1
Device Manager
description 1-15
differentiated services code point. See DSCP
digital signature algorithm. See DSA key pairs
Dijkstra's algorithm 21-2
direct memory access. See DMA-bridge
directories
creating 2-24
deleting 2-24
display current 2-23
disabling routing protocols 21-5
discovered
LUNs 23-4
targets 23-3
display filters
selective viewing 49-9
disruptive
upgrades 6-4
distribution tree 21-10
DMA-bridge
displaying statistics 37-13
documentation
additional publications lii
related documents lii
domain ID
IVR guidelines 18-4
domain IDs
assignment failures 11-8
configuring 14-4
configuring zone members 19-4
distributing 14-2
interoperability 25-9
preferred 14-5
static 14-5
unique 18-6
domain manager
isolation 11-8
domain names
defining 36-23
Domain Name System servers. See DNS servers
domain overlap
isolation 11-8
downgrading
Cisco MDS SAN-OS releases 6-25
DPVM
default settings 17-12
description 1-6, 17-2
displaying configurations 17-9
enabling 17-2
requirements 17-2
sample configuration 17-10 to 17-12
DPVM databases
activating config databases 17-4
autolearned entries 17-4
comparing 17-8
configuring distribution 17-5 to 17-7
copying 17-7
description 17-3
displaying 17-9
enabling autolearning 17-5
merging guidelines 17-7
drivers
iSCSI 35-2
drop latency time
configuring 21-13
dsa key pairs
generating 26-14
DSCP
configuring 33-18
duplicate messages
throttling 45-12
Dynamic Port VSAN Membership. See DPVM
dynamic VSANs. See DPVM
E
EBCDIC
FICON string format 24-16
edge quench congestion control
description 47-2
EFMD
fabric binding 24-37
egress port 43-13, 43-26
EISL
trunking 1-8
EISLs
PortChannel links 13-2
e-mail notification
Call Home 45-1
Enhanced ISL. See EISL
enhanced zones
advantages over basic zones 19-28
broadcast frames 19-32
changing from basic zones 19-28
configuring default policies 19-32
creating attribute 19-30
default settings 19-36
description 19-27
displaying information 19-34
enabling 19-29
merging databases 19-31
modifying database 19-30
enterprise package licenses
description 3-3
EPLD images
downgrading 10-18
upgrading 10-15
E port mode
classes of service 11-3
description 11-3
E ports
32-port guidelines 11-9
32-port switching module configuration guidelines 13-3
configuring 11-11, 33-18
FSPF topology 21-2
isolation 11-8
recovering from isolation 19-13
SPAN 43-4
trunking 1-8
trunking configuration 12-2
error messages
description 44-1
error state 6-39
ESI
non-resp threshold 35-64
Ethereal freeware
analyzer 49-6
information 49-4
Ethernet MAC statistics
displaying 37-12
Ethernet PortChannel aggregation
description 37-17
Ethernet PortChannels
adding Gigabit Ethernet interfaces 37-19
redundancy 33-32
Exchange Fabric Membership Data
see EFMD 24-37
exchange IDs
in-order delivery 21-11
load balancing 1-8, 49-1
path selection 16-6
exchange link parameter. See ELP
expansion port mode. See E port mode
extended BB_credits
configuring 11-14
Extended Binary-Coded Decimal Interchange Code
see EBCDIC 24-16
external CompactFlash
description 2-20
formatting 2-21
recovering from corruption 2-21
supported devices 2-22
external RADIUS server
CHAP 35-46
external server
configuring 50-9
F
fabric
See reconfigure fabric frames; build fabric frames
See build fabric frames
Fabric Analyzer
configuring 49-6
description 49-4
fabric binding
configuration 24-37
default settings 24-50
enforcement 24-38
forceful activation 24-40
port security comparison 24-37
Fabric Configuration Server. See FCS
Fabric-Device Management Interface. See FDMI
fabric login. See FLOGI
fabric loop port mode. See FL port mode
Fabric Manager
description 1-12, 1-15
Fabric Manager Server package license
description 3-5
fabric names
setting 14-8
fabric port mode. See F port mode
fabric pWWNs
configuring zone members 19-4
zone membership 19-2
fabric reconfiguration
fcdomain phase 14-2
fabric security
default settings 31-12
fan modules
description 9-10
displaying status 9-11
fault tolerant fabric
example (figure) 21-2
FC aliases
configuring zone members 19-4
fcaliases
cloning 19-20
renaming 19-20
fcanalyzer
clearing hosts 49-8
displaying filters 49-9
FCC
benefits 47-2
default settings 47-14
enabling 47-3
frame handling 47-2
logging facility 44-2
fcdomain
configuring 14-1
default settings 14-16
FC ID allocation
FICON implementation 24-10
FC IDs
allocating 14-2, 25-7
allocating Company IDs 25-7
configuring zone members 19-4
last byte 24-16
FCIP
configuring 33-2 to 33-24
configuring compression 33-23
configuring tape acceleration 33-21 to 33-23
configuring write acceleration 33-19 to 33-21
default parameters 33-33
discarding packets 33-14
displaying information 33-24
FICON support 24-4
Gigabit Ethernet ports 37-4
high availability 33-30 to 33-33
interfaces 33-4
IPS module 33-2
IPS module support 37-2
IP storage services support 37-1
link failures 33-31
MPS-14/2 module support 37-2
specifying TCP connections 33-14
virtual ISLs 33-2
FCIP interfaces
binding to port numbers 24-20
configuring advanced features 33-12 to 33-18
creating 33-12
FCIP links
B port interoperability mode 33-16
configuring 33-5
configuring peers 33-12
configuring QoS 33-18
creating 33-6
description 33-3
end points 33-3
initiating IP connections 33-14
TCP connections 33-3
FCIP profiles
configuring listener ports 33-7
configuring TCP parameters 33-7 to 33-12
creating 33-5
description 33-4
FCP
intermixing protocols 24-4
routing requests 35-3
fcping
invoking 49-3
FCS
configuring 46-2
description 46-1
logging facility 44-2
significance 46-2
fctrace
invoking 49-1
FDMI
displaying 22-5
Fibre Channel
iSCSI targets 35-5 to 35-9
Fibre Channel analyzers 43-10
Fibre Channel Congestion Control. See FCC
Fibre Channel domain. See fcdomain
Fibre Channel interfaces
characteristics 11-2 to 11-20
configuring 11-9
configuring auto mode 11-11
configuring BB_credits 11-12
configuring beacon modes 11-17
configuring data field sizes 11-16, 11-18
configuring extended BB_credits 11-14
configuring frame encapsulation 11-16
configuring performance buffers 11-14
configuring port mode 11-11
default settings 11-34
displaying VSAN membership 16-10
modes 11-3 to 11-6, 11-10
states 11-6 to 11-9
Fibre Channel over IP. See FCIP
Fibre Channel PortChannels
redundancy 33-32
Fibre Channel Protocol. See FCP
Fibre Channel targets
dynamic importing 35-6
Fibre Channel traffic
SPAN sources 43-4
Fibre Channel write acceleration
default settings 38-10, 39-3, 40-8, 41-6
description 39-1
displaying configuration 38-6, 39-2
enabling 39-2
FICON
advantages 24-3
automatic save 24-19
configuration files 24-23
configuring 24-1
default settings 24-49
FC4 protocols 24-2
FCIP support 24-4
MDS-supported features 24-5
PortChannel support 24-4
port numbering 24-7
prohibited ports 24-33
setting up 24-12
VSAN offline state 24-27
files
copying 2-25, 7-6
deleting 7-9
displaying checksums 2-23
displaying contents 2-25
displaying last lines 2-27
moving 2-24
file systems
accessing standby supervisor modules 7-9
creating directories 2-24
deleting directories 2-24
displaying current directory 2-23
error recovery 6-34, 6-36
formatting 2-21
listing files 2-23
redirection 2-26
setting current directory 2-22
volatile: 2-20
File Transfer Protocol. See FTP
filters
capture 49-13
defining display 49-10
Flash devices
external CompactFlash 2-20
formatting 2-21
internal bootflash: 2-20
overview 2-20
FLOGI
displaying details 22-1
logging facility 44-2
flow statistics 21-15
FL port mode
classes of service 11-4
description 11-4
FL ports
configuring 11-11
fctrace 49-1
nonparticipating code 11-8
persistent FC IDs 14-9
SPAN 43-4
F port mode
classes of service 11-4
description 11-4
F ports
configuring 11-11
SPAN 43-4
FPSF
load balancing 33-31
frame encapsulation
configuring 11-16
frames
configuring MTU size 37-6
encapsulation 43-9
reordering 21-11
FSPF
alternative paths 21-1
clearing counters 21-9
computing link cost 21-6
configuring globally 21-4
configuring on interfaces 21-6
default settings 21-21, 36-24
disabling on interfaces 21-7
disabling routing protocols 21-5
hello time intervals 21-6
hold time range 21-1
interoperability 25-10
link state protocol 21-2
reconvergence time 21-2
routing services 21-1
topologies example 21-2
FTP
logging facility 44-2, 44-7
full core dumps
IPS modules 37-19
full zones
default settings 19-36
full zone sets
considerations 19-8
distributing 19-12
Fx ports
32-port default 11-9
configuring 11-11
description 11-5
FCS 46-1
interface modes 11-5
G
Gigabit Ethernet
default parameters 37-20
Gigabit Ethernet interfaces
configuring 37-4 to 37-19
configuring auto-negotiation 37-6
configuring high availability 37-15 to 37-19
configuring MTU frame size 37-6
configuring promiscuous mode 37-7
configuring static IP routing 37-9
displaying statistics 37-12 to 37-15
subinterfaces 37-8
subnet requirements 37-8
Gigabit Ethernet subinterfaces
configuring VLANs 37-8
graceful shutdown
description 1-5
guidelines
port swapping 24-26
H
hardware
displaying inventory 9-2
displaying temperature 9-10
hard zoning
description 19-10
HBA ports
configuring area FCIDs 14-11
HBAs
device aliases 20-1
Hello time intervals
configuring 21-6
hidden routes 21-17
high availability
description 1-4, 8-1
displaying status 8-5
Ethernet PortChannel 35-45
Ethernet PortChannels 33-32
Fibre Channel PortChannels 33-32
Gigabit Ethernet features 37-15
licensing 3-5
process restartability 8-4
protection against link failure 8-1
software upgrade 6-4
switchover characteristics 8-2
VRRP 33-31, 35-44
host control
FICON 24-17
I
ICMP packets
type value 29-4
ICMP statistics
displaying 37-15
IDs
Cisco.com IDs 45-2
contract IDs 45-3, 45-21
customer IDs 45-3
image version and IDs 6-2
login IDs 4-7
process IDs 7-6, 50-1, 50-6
profile IDs 45-5
region ID 21-5
serial IDs 45-22
server IDs 45-22
site IDs 45-3, 45-21
See also destination IDs
See also exchange IDs
See also port IDs
See also source IDs
See also user IDs
See also VR IDs
IKE
algorithms 30-6
configuring an IPsec domain 30-7
default settings 30-36
description 30-3
initializing 30-7
refreshing SAs 30-11
transforms 30-6
IKE domains
clearing 30-11
IKE policies
configuring parameters 30-9
negotiation 30-7
IKE tunnels
clearing 30-11
description 30-7
images
See kickstart images; software images; system images
implemented port 24-8
in-band management
CUP 24-27
ingress port 43-11
in-order delivery 21-10
enabling 21-10, 21-12, 21-13
in-order guarantee 21-11
install all
command examples 6-11
install all command
benefits 6-5
examples 6-11, 6-13
failure cases 6-6
function 6-5
remote location path (caution) 6-15
requirements 6-3
usage 6-7
installed port 24-9
Intelligent Storage Services
installing SSI boot images 10-20 to 10-29
traffic disruption 10-21
interfaces
adding to PortChannels 13-8
administrative states 11-6
configuring 11-9
configuring data field size 11-17, 11-19
configuring descriptions 11-12
configuring FSPF 21-6
configuring zone members 19-5
default settings 11-34
displaying information 11-23 to 11-33
isolated states 13-10
modes 11-10
operational states 11-6
reason codes 11-7
suspended states 13-10
troubleshooting operational states 11-7
internal bootflash:
description 2-20
initializing 2-21
kickstart images 2-21
recovering from corruption 2-21
system images 2-21
internal switch states
description 8-6
Internet Key Exchange. See IKE
interoperability
configuring 25-9
verifying status 25-12
Inter-Switch Links. See ISL
Inter-VSAN Routing. See IVR
Inter-VSAN zones. See IVZs
Inter-VSAN zone sets. See IVZSs
invoking fcping 49-3
IOD. See in-order delivery
IP Access Control Lists.See ACLs
IP addresses
configuring in VSANs 36-5
SMTP server 45-10
IP connections
active mode 33-14
initiating 33-14
IPFC
example configuration 36-6 to 36-9
logging facility 44-2
IP forwarding
disabling 36-5
IP over Fibre Channel. See IPFC
IP routing
configuring on Gigabit Ethernet interfaces 37-9
displaying the route table 37-9
static 1-8
IPS core dumps. See core dumps
IPsec
algorithms 30-5
compatibility 30-4
configuring 30-11
crypto ACLs 30-11 to 30-15
default settings 30-36
description 30-2
prerequisites 30-3
transforms 30-5
IP Security. See IPsec
IP services
default settings 36-23
IPS modules
CDP support 37-19
configuring CDP 4-32
core dumps 37-19
partial core dumps 37-19
port modes 37-4
supported features 37-1
IPS port mode
description 37-4
IPS ports
multiple connections 35-42
IP statistics
displaying 37-13
IP Storage services modules. See IPS modules
IQN
formats 35-5
iSCSI
access control 35-19 to 35-22
checking for WWN conflicts 35-15
configuring 35-1 to 35-45
configuring VRRP 35-44
default parameters 35-72
displaying global information 35-33
drivers 35-2
Gigabit Ethernet ports 37-4
IPS module support 37-2
MPS-14/2 module support 37-2
PortChannel-based high availability 35-45
requests and responses 35-3
iSCSI authentication
configuring 35-22
global override 35-23
scenarios 35-45
setup guidelines 35-45
iSCSI high availability
configuring 35-38 to 35-45
ISCSI hosts
VSAN membership 35-17
iSCSI hosts
initiator identification 35-10
initiator presentation modes 35-11
iSCSI initiators
assigning WWNs 35-14
configuring static IP address mapping 35-14
displaying information 35-34 to 35-37
iSCSI interfaces
configuring 35-10 to 35-29
configuring listener ports 35-26
configuring routing mode 35-27
configuring TCP tuning parameters 35-26
creating 35-4
displaying information 35-29
VSAN membership 35-18
iSCSI proxy initiators
displaying information 35-31
iSCSI sessions
authentication 35-22 to 35-25
displaying information 35-33
iSCSI targets
advertising 35-8
dynamic importing 35-5
examples 35-8
secondary access 35-40
static importing 35-7
transparent failover 35-38
iSCSI users
displaying information 35-38
iSCSI virtual targets
displaying information 35-38
ISLs
PortChannel links 13-2
iSMS servers
enabling 35-64
iSNS
configuring 35-58 to 35-65
displaying configurations 35-66 to 35-72
ESI 35-64
iSNS profiles
creating 35-59
iSNS servers
configuration distribution 35-64
isolated VSAN
description 16-5
displaying membership 16-5
IVR
activating topologies 18-12
adding virtual domains 18-16
AF IDs 18-11
border switches 18-4
configuration distribution with CFS 18-6
configuring 18-5
configuring logging levels 18-30
current VSANs 18-3
database merge guidelines 18-29
default settings 18-36
description 18-2
edge switches 18-4
edge VSANs 18-3
enabling 18-6
example configuration 18-31 to 18-35
features 18-3
interoperability 18-28
NAT 18-10
paths 18-3
read-only zoning 18-28
sharing resources 18-2
terminology 18-3
transit VSANs 18-3
unique domain ID guidelines 18-4
verifying logging level configuration 18-31
zone communication 18-20
zones 18-3
zonesets 18-3
IVR NAT
load balancing 18-9
IVR service groups
configuring 18-27
description 18-27
verifying configuration 18-28
IVR static FC IDs
configuring 18-18
verifying configuration 18-19
IVR topologies
clearing 18-14
configuring 18-10 to 18-14
configuring automatic discovery 18-13
description 18-10
manually creating 18-11
migrating from automatic mode to user-configured mode 18-14
verifying configuration 18-14
IVR virtual domains
verifying configuration 18-17
IVZs
automatic creation 18-21
clearing database 18-25
configuring 18-22 to 18-27
configuring LUNs 18-23
configuring QoS attributes 18-24
description 18-3, 18-20
differences with zones (table) 18-20
LUN zoning 18-23
verifying configuration 18-25
verifying QoS configuration 18-24
IVZSs
activating with force option 18-24
configuring 18-22 to 18-27
description 18-3, 18-20
verifying configuration 18-25
J
jitter
configuring estimated maximum in FCIP profiles 33-11
jumbo frames. See MTUs
K
keepalive timeouts
configuring in FCIP profiles 33-8
kernel core dumps 50-8
configuring 50-9
kickstart images
KICKSTART variable 6-1
loading system images 6-28
overview 6-2
recovering corrupted 6-34
recovery 6-35
recovery interruption 6-29
L
last byte
FC IDs 24-16
LEDs
link 11-18
speed 11-18
status 11-18
libpcap freeware 49-4
licenses
description 3-1
displaying information 3-12
enterprise package 3-3
extended BB_credits 11-15
Fabric Manager Server package 3-5
factory-installed 3-6
feature-based 3-3
grace period expiration 3-11
high availability 3-5
identifying features in use 3-9 to 3-11
installation options 3-6
installing key files 3-8
installing manually 3-6
mainframe package 3-4
module-based 3-3
obtaining key files 3-7
SAN extension package 3-4
Storage Services Enabler package 3-5
terminology 3-2
transferring between switches 3-12
licensing
description 1-4
link cost 21-2
link failure
protection against 8-1
link redundancy
Ethernet PortChannels 37-17
load balancing
attributes 16-6
description 13-4
FSPF 33-31
guarantee 16-7
PortChannels 13-2, 33-30
loader
loading kickstart 6-28
local capture 49-6
locking mechanism
FICON files 24-23
log files 50-6
configuring 44-6
logging
default settings 44-14
severity levels 44-3
system messages 44-1
logical unit numbers. See LUNs
loop monitoring 49-14
loop port 49-14
LSR 21-19, 21-20
LUNs
displaying discovered, example 23-4
IVR zoning 18-23
LUN zoning
description 19-17
M
MAC= keyword 29-6
mainframe
FICON parameters 24-17
VSAN clock 24-17
mainframe package licenses
description 3-4
management
redundancy 8-2
management access
description 4-14
in-band 4-5, 4-10 to 4-14
obtaining 4-23
out-of-band 4-5, 4-6 to 4-10
using force option 4-23
Management Information Base. See MIB
management interfaces
configuring 11-20
default settings 11-34
features 11-21
management interfaces. See mgmt0 interfaces
manually enabling
FICON 24-15
maximum retransmissions
configuring in FCIP profiles 33-9
MD5 authentication 36-20
memory test 6-29, 6-30
mgmt0 interfaces
autosensing port 4-22
configuring 4-22, 11-20
configuring ethernet ports 36-3
configuring speed 11-12
default settings 11-34
features 11-21
recovery from switch(boot)# prompt 6-35
MIB
RMON support 1-12
minimum retransmit timeouts
configuring in FCIP profiles 33-8
modem connections
configuration guidelines 4-28
configuring 4-28 to 4-31
configuring default initialization strings 4-30
configuring user-specified initialization strings 4-30
enabling 4-28
initialization strings 4-29
initializing on power-on switch 4-31
verifying configuration 4-31
module configuration
purging 10-10
saving to NVRAM 10-9
modules
configuring logging 44-5
displaying temperatures 9-10
preserving the configuration 10-9
purging configurations 10-10
replacing 6-27
resetting 10-7
state descriptions 10-4
temperature monitoring 9-9
verifying status 4-16, 10-4
monitoring traffic 43-7, 43-18
monitor session
logging severity levels 44-5
MPS-14/2 module
configuring extended BB_credits 11-15
functions 6-10
overview 1-3
MPS-14/2 modules
CDP support 37-19
port modes 37-4
supported features 37-1
MTU frame size
configuring Gigabit Ethernet interfaces 37-6
MTUs
configuring size
multicast routing 21-10
Multiprotocol Services module. See MPS-14/2 module
Multiprotocol Services modules. See MPS-14/2 modules
mutual CHAP authentication
configuring for iSCSI 35-24
N
name server
interoperability 25-10
name servers
displaying database 22-3
proxy feature 22-2
registering proxies 22-3
NAT
description 18-8
enabling 18-10
Network Address Translation. See NAT
network administrators
additional roles 28-3
permissions 2-3, 28-3
network operators
permissions 2-3, 28-3
Network Time Protocol. See NTP
network traffic
monitoring 43-7, 43-18
next hop domain ID 21-9
NL ports
fctrace 49-1
interface modes 11-6
zone enforcement 19-10
nondisruptive
upgrades 6-4
nonparticipating codes
description 11-8
N ports
fctrace 49-1
zone enforcement 19-10
zone membership 19-2
NTP
committing configuration changes 4-21
configuration guidelines 4-19
configuring 4-18
configuring CFS distribution 4-20
database merge guidelines 4-22
discarding configuration changes 4-21
logging facility 44-2
releasing fabric session lock 4-22
time-stamp option 33-15
verifying session status 4-22
Nx ports
hard zoning 19-10
O
of 33-18
one-step upgrade
install all command 6-4
reload command 6-4
operational interfaces
viewing PortChannels 13-17
operational states
description 11-6
setting 11-11
originator exchange IDs. See exchange IDs
out-of-order delivery 21-11
P
packets
discarding in FCIP 33-14
passive mode
IP connection 33-14
password recovery 26-18
passwords
administrator 4-4
setting administrator default 4-6, 4-11
strong characteristics 26-10
path discovery 49-1
path MTU. See PMTU
performance buffers
configuring 11-14
periodic inventory notification 45-11
permit conditions 29-1, 29-5
permitted filters 49-13
persistent domain ID
FICON VSANs 24-39
persistent FC IDs
description 14-9, 18-17
displaying 14-15
PMTUs
configuring in FCIP profiles 33-9
port addresses
assigning names 24-22
FICON 24-8
port blocking 24-21
PortChannel
interfaces 35-8
subinterfaces 35-8
PortChannels
32-port switching module configuration guidelines 13-3
adding interfaces 13-8
binding to port number 24-20
comparison with trunking 13-4
compatibility checks 13-10
configuration guidelines 13-11
configuring 13-6
configuring FC routes 21-9
configuring for FCIP high availability 33-30
default settings 13-20
deleting 13-8
description 1-8, 13-2
examples 13-2
FICON support 24-4
forcing interface additions 13-9
guidelines 13-11
high availability 8-1
in-order guarantee 21-12
interoperability 25-10
IQN formats 35-5
link changes 21-11
link failures 21-3
load balancing 1-8, 13-4, 33-30
logging facility 44-2
member combinations 37-17
misconfiguration error detection 13-11
misconfiguration examples 13-13
reason codes 11-8
SPAN 43-4
valid example configurations 13-12
port groups
16-port switching modules 11-18
assigning extended BB_credits 11-15
port IDs
configuring zone members 19-4
port modes
auto 11-6
description 11-3 to 11-6
IPS 37-4
port numbers
binding to FCIP interfaces 24-20
binding to PortChannels 24-20
FICON 24-8
ports
aggregation 8-1
prohibiting 24-21
virtual E 33-2
VSAN membership 16-6
port security
default settings 32-18
fabric binding comparison 24-37
port swapping
FICON 24-25
guidelines 24-26
port tracking
default settings 15-9, 48-8
description 1-14
displaying information 15-8, 48-6
overview 48-1
port world wide names. See pWWNs
power supplies
configuring 9-6
default state 9-12
displaying configuration 9-6
guidelines 9-6 to 9-8
modes 7-8
power usage
displaying 9-5
preferred domain IDs 14-5
preshared key 28-6
principal switches
assigning domain ID 14-4
configuring 14-5
selecting 14-1
private device 11-32
processes
nondisruptive restarts 8-1
restartability 8-4
process ID 50-6
Process Logs 50-3
process restartability 8-4
prohibited ports
FICON 24-33
promiscuous mode
configuring Gigabit Ethernet interfaces 37-7
protocol analysis 49-4
proxies
registering 22-3
pWWNs
configuring zone members 19-4
rejecting duplicates 22-3
zone membership 19-2
Q
QoS
default settings 47-14
displaying information 47-4, 47-10
DSCP value 33-18
enabling 47-7
enabling control traffic 47-4
logging facilities 44-2
priority queuing 1-10
quality of service. See QoS
R
RADIUS
AAA solutions 1-13, 28-1
configured parameters 28-9
secret key 1-13, 28-1
setting preshared key 28-6
specifying servers 28-6
specifying time-out 28-7
read-only zones
configuration guidelines 19-19
default settings 19-36
description 19-19
reconfigure fabric frames
description 14-3
reconvergence time
FSPF 21-2
recovering passwords 26-17
recovery sequence 6-30
redundancy
Ethernet PortChannels 33-32
Fibre Channel PortChannels 33-32
VRRP 33-31
redundancy states
value descriptions 8-6
redundant physical links 21-3
Registered Link Incident Report. See RLIR
Registered State Change Notifications. See RSCNs
remote capture 49-6, 49-8
remote capture daemon 49-5
Remote Capture Protocol. See RPCAP
Remote Monitoring. See RMON
Remote SPAN. See RSPAN
retransmit intervals 21-7
RLIR
FICON-enabled switches 24-45
Sending LIRs 24-1
RMON
default settings 42-3
description 1-12
displaying information 42-3
MIB support 1-12
role-based access
description 1-13
roles
defaults 2-3
route cost
computing 21-6
routing
multicast 21-10
See also broadcast routing
See also IP routing
RPCAP
Ethereal communication 49-6
rsa1 key pairs
generating 26-14
rsa key pairs
generating 26-14
RSCN
logging facility 44-2
RSCNs
clearing statistics 22-9
displaying notifications 22-7
multiple port IDs 22-8
suppressing 22-9
RSPAN
default settings 43-31
description 1-11
running configuration files
saving to startup configuration file 7-4
run time checks 21-8
S
SACKs
configuring in FCIP profiles 33-9
SAN extension package licenses
description 3-4
SAN extension tuner
assigning SCSI read/write commands 34-5
configuring 34-3
configuring nWWNs 34-5
configuring virtual N ports 34-5
data patterns 34-7
default settings 34-9
description 1-14, 34-2
displaying tuning configuration 34-8
initialization 34-3
license requirements 34-2
tuning guidelines 34-3
SAN operating system. See Cisco MDS SAN-OS
SAN Tap
description 40-1 to 40-4
displaying information 40-5, 41-4
enabling 40-4
proxy mode-1 40-3
proxy mode-2 40-4
transparent mode 40-2
SCP
copying images 6-20
scripts
setting delay time 2-28
SCSI
routing requests 35-2
SCSI flow configuration client
description 38-3
SCSI flow data path support
description 38-3
SCSI flow manager
description 38-2
SCSI Flow Services
configuring 38-3
default settings 38-10, 39-3, 40-8, 41-6
description 38-1
displaying 38-6, 39-2
Fibre Channel write acceleration 39-1
functional architecture (figure) 38-2
SCSI flow configuration client 38-3
SCSI flow data path support 38-3
SCSI flow manager 38-2
SCSI flow statistics
default settings 38-10, 39-3, 40-8, 41-6
description 38-5
displaying 38-6, 39-2
enabling 38-6
SCSI LUNs
discovering targets 23-1
SD port mode
description 11-5
interface modes 11-5
SD ports
bidirectional traffic 43-13
configuring 11-11, 43-7, 43-23
secondary MAC address 25-6
secure access
description 1-13
Secure Shell. See SSH
security control
local 28-2, 28-19
remote 28-2, 28-5, 28-10
security management
description 1-12
security parameter index. See SPI
selective acknowledgments. See SACKs
selective purging
persistent FC IDs 14-13
serial numbers
displaying 9-4
services module
purging configurations 10-10
services modules
description 10-3
managing 10-1
monitoring states 10-1
power cycling 10-7
replacing 6-27
resetting 10-7
state descriptions 10-4
verifying status 10-4
severity levels
logging 44-5
SFPs
transmitter types 11-20
Simple Network Management Protocol. See SNMP
simple text authentication 36-20
simulating
Call Home 45-14
slot0:
formatting 2-21
small computer system interface. See SCSI
SMARTnet 45-2
SMTP
server address 45-10
SNMP
access control 27-2
access groups 27-4
adding communities 27-7
community strings 27-2
configuring from CLI 27-5
counter Information 27-14
creating roles 26-9
creating users 27-4
default groups 27-4
default settings 27-15
displaying information 27-13, 42-3
FICON control 24-18
read-write access 27-7
server contact 45-3
SNMPv3 access 1-13
Version 3 security features 27-2
versions supported 27-2
SNMP manager
FCS 46-2
SNMPv3
specifying cisco-av-pair 28-8
software images
bootflash corruption 6-28
compatibility issues 6-21
corruption 6-29
default setting 6-40
error state 6-29
recognizing errors 6-39
recovery procedure 6-29
space requirement 6-3
synchronizing 8-4
upgrade requirements 6-2
upgrading 6-1
variables 6-1
software upgrades
disruptive 6-7
manual, dual supervisor 6-19
mechanisms 6-4
nondisruptive 8-1
quick 6-25
soft zoning
description 19-10
source IDs
Call Home event format 45-22
exchange based 13-6
flow based 13-5
frame identification 47-2
frame loop back 49-1
in-order delivery 21-11
load balancing 1-8
path selection 16-6
SPAN
configuring sessions 43-5
default settings 43-30
description 1-11
egress source 43-3
encapsulating frames 43-9
FC analyzers 43-10
ingress source 43-3
monitoring traffic 1-11, 43-2
source configuration 43-4
sources 43-4
SPAN destination port mode. See SD port mode
SPAN tunnel port mode. See ST port mode
special frames
enabling 33-13
SPI
configuring virtual router 36-20
SSH
default service 26-13
host key pair 26-14
protocol status 26-16
session 6-19
SSH key pair
overwriting 26-15
SSH session
message logging 44-4
SSI boot images
configuring with install ssi command 10-27
configuring with SSI boot variable 10-25
verifying 10-22
SSI boot variables
verifying configuration 10-28
SSMs
Cisco SAN-OS release upgrade and downgrade considerations 10-36
configuring Intelligent Storage Services 38-1 to 38-10, 39-1 to 39-4, 40-1 to 40-4, 41-1 to 41-6
default settings 10-38
installing ASM-SFN boot images for VSFN 10-29 to 10-34
installing images for Intelligent Storage Services 10-20 to 10-29
managing 10-34
overview 1-3
recovery after replacing CompactFlash 10-35
replacing considerations 10-34
SSI boot image updating considerations 10-21
supported features 10-20
standby modules
monitoring 8-2
standby supervisor modules
accessing file systems 7-9
copying boot variables 8-4
synchronizing 8-4
startup configuration files
saving running configuration file 7-4
unlocking 7-5
static domain IDs 14-5
static routes
run time checks 21-8
storage devices
access control 19-1
permanent 2-20
temporary 2-20
Storage Services Enabler package licenses
description 3-5
Storage Services Modules. See SSMs
ST port mode
description 11-5
ST ports
configuring 43-20
interface modes 11-5
subnet mask
BIOS setup configuration 6-32
configuring IP routes 36-10
configuring mgmt0 4-22, 36-2
configuring switch 4-4
default setting 10-38
initial configuration 4-8, 4-12
loader> prompt recovery 6-34, 6-37
switch(boot)# prompt recovery 6-35
subnet masks
configuring mgmt0 interfaces 11-20
subnets
requirements 37-8
subordinate switch 14-7
summer time
adjusting for 4-17
supervisor module
CDP support 37-19
supervisor modules
active 8-2
active mode 1-11
active state 8-6, 10-5
default settings 10-38
description 10-1
displaying information 10-6
high availability 8-2
manual switchovers 8-2
recovering password 6-37
redundancy 8-1
replacing considerations 10-34
resetting 10-7
standby mode 1-11
standby state 8-6, 10-5
state descriptions 8-6, 10-4
switch options 1-11
switchover mechanisms 8-2
switchovers after failure 8-2
synchronizing 8-4
verifying status 10-4
supervisors
replacing 6-27
Switched Port Analyzer. See SPAN
switches
displaying serial numbers 9-4
display power usage 9-5
dual supervisor 6-37
rebooting 10-7
reliability service 1-5
reloading 10-7
single supervisor 6-35
switching modules
accessing 10-6
description 10-3
managing 10-1
monitoring states 10-1
power cycling 10-7
powering off 10-10
preserving configuration 10-9
purging configurations 10-10
reloading 10-7
resetting 10-7
state descriptions 10-4
verifying status 10-4
switch modules
replacing 6-27
switch names
assigning 4-15
switchover mechanism
warm state 10-5
switchovers
characteristics 8-2
guidelines 8-3
manually initiating 8-2
supervisor modules 8-2
VRRP 33-31
switch ports
configuring attribute default values 11-19
switch priority
configuring 14-6
switch security
default settings 26-19, 28-27
syslog messages. See system messages
syslogs
viewing 1-12
system health
status 50-15
system images 6-2
reading configuration 6-28
recovery interruption 6-29
SYSTEM variable 6-1
system message logging server 44-1
configuring 44-6
system messages
accessing 44-1
configuring 44-3
default settings 44-14
displaying configuration 44-9
system processes
displaying 50-1
status 50-4
system statistics
CPU and memory 50-5
T
TACACS+
AAA solutions 1-13
starting a distribution session 28-17
target disks 23-3
TCP connections
FCIP profiles 33-4
specifying 33-14
TCP parameters
configuring in FCIP profiles 33-7 to 33-12
TCP ports
ACLs 29-3
TCP statistics
displaying 37-14
Telnet
default service 26-13
session 6-19
Telnet server connections
disabling 4-25
telnet server connections
description 4-25
Telnet session
message logging 44-4
temperatures
displaying 9-10
major thresholds 9-9
minor thresholds 9-9
monitoring hardware 9-9
TE port mode
classes of service 11-5
description 11-5
TE ports
fctrace 49-1
FSPF topology 21-2
interoperability 25-10
recovering from isolation 19-13
SPAN 43-4
trunking 1-8
trunking restrictions 12-1
TFTP
boot 6-32
servers 6-32, 50-6
throttling
duplicate messages 45-12
time
configuring 4-16
time out value. See TOV
time zones
configuring 4-17
TL port mode
classes of service 11-4
description 11-4
TL ports
configuring 11-11
displaying 11-32
FCS 46-1, 46-2
logging facility 44-2
SPAN 43-4
translation guidelines 11-33
TOV
interoperability 25-9
ranges 25-2
translative loop port mode. See TL port mode
trivial authentication 28-19
troubleshooting
collecting output 49-14
error messages 44-1
SSM recovery 10-35
trunk-allowed VSAN lists
configuring 12-3
trunking
comparison with PortChannels 13-4
configuration guidelines 12-6
default settings 12-8
description 1-8, 12-1
interoperability 25-10
link state 12-2
restrictions 12-1
trunking E port mode. See TE port mode
trunking ports
associated with VSANs 16-7
trunking protocol
default 12-2
default settings 12-8
description 12-2
trunk mode
administrative default 11-19
default settings 12-8
status 12-2
trunk ports
displaying information 12-7
U
UDP ports
ACLs 29-3
unblocking ports 24-27
unimplemented port 24-8
uninstalled ports 24-9
uninstalling
permanent licenses 3-9
updating
licenses 3-10
upgrades
disruptive 6-25
See also disruptive upgrades
See also nondisruptive upgrades
upgrading
software 6-19 to 6-25
upgrading BIOS. See BIOS upgrades
user accounts
creating additional 4-7
user authentication
description 1-13
user IDs
authentication 28-2
security management 1-13
user profiles 28-3
users
SNMP support 27-4
V
VE ports
description 33-2
virtual devices 11-32
virtual E ports. See VE ports 33-2
virtual ISLs
description 33-2
Virtual LANs. See VLANs
Virtual Router Redundancy Protocol. See VRRP
virtual SANs. See VSANs
VLANs
configuring on Gigabit Ethernet subinterfaces 37-8
description 37-7
volatile:
description 2-20
switch reboots 2-22
VR IDs
configuring 36-17
mapping 36-16
VRRP
characteristics 36-16
clearing statistics 36-22
configuring for Gigabit Ethernet interfaces 37-16
configuring Gigabit Ethernet 37-16
description 37-16
group members 37-16
IQN formats 35-5
logging facility 44-3
master and backup 36-16
primary IP address 36-18
priority preemption 36-20
priority tracking 36-21
security authentication 36-20
setting priority 36-19
tracking priority 36-20
VSA
communicating attributes 28-7
protocol options 28-8
VSAN IDs
allowed list 12-8
attributes 16-6
configuring FICON 24-4
membership 16-4
multiplexing traffic 11-5
range 16-5
VSAN interfaces
configuring 11-22
displaying information 11-27
VSAN membership
iSCSI hosts 35-17
iSCSI interfaces 35-18
VSANs
advantages 16-1
allowed-active 12-1
allowed list 43-4
allowed-list 12-8
broadcast address 21-10
cache contents 14-16
clock 24-17
comparison with zones (table) 16-4
configuration overview 1-6
configuring 16-7 to 16-10
configuring domains 14-1
configuring FSPF 21-4
configuring overlay 36-14
configuring trunk-allowed lists 12-3
current 18-3
default settings 16-10
default VSAN 16-5
deleting 16-8
description 1-6, 16-2 to 16-7
displaying membership 16-10
displaying usage 16-9
domain IDs 14-7
edge 18-3
fabric optimization 24-3
FCIDs 16-2
FCS 46-1
features 16-2
flow statistics 21-15
FSPF connectivity 21-2
gateway switch 36-4
guidelines for transit VSANs 18-5
interface 11-35
interop mode 25-10
IP addresses 36-5
IPFC interface 49-1
isolated VSAN 16-5
loop devices 11-32
merging traffic 12-6
mismatch 12-2
mismatches 11-8
multiple zones 19-8
name 16-6
name server 22-2
operational state 16-6
overlaid routes 36-4, 36-12
port isolation 12-6
port membership 16-6
redundancy 1-6, 16-1
Rules and features 26-2
scalability 1-6, 16-1
SPAN source 43-3, 43-4
static routing 36-10
TE port mode 11-5
TOVs 25-2
traffic isolation 1-6, 16-1, 16-3
traffic routing 29-1, 36-1
transit 18-3, 18-12
trunk allowed 11-35
trunk-allowed 12-1, 12-2
trunking ports 16-7
VRRP 36-16
VSAN trunking. See trunking
VSFN
installing the ASM-SFN boot image 10-29 to 10-34
W
window management
configuring in FCIP profiles 33-9
world wide names. See WWNs
WWNs
configuring 25-5
displaying configurations 25-6
suspended connections 11-8
Z
zone aliases
conversion to device aliases 20-5
zone attribute groups
cloning 19-20
renaming 19-20
zones
access control 19-7
changing from enhanced zones 19-29
cloning 19-20
comparison with device aliases (table) 20-2
comparison with VSANs (table) 16-4
configuring 19-4
configuring aliases 19-6
configuring broadcasting 19-16
default policies 19-11
default policy 19-2
default settings 19-36
description 1-7
differences with IVZs (table) 18-20
displaying information 19-21 to 19-27
enforcing restrictions 19-10
example 19-3
exporting databases 19-13
features 19-2
implementation 19-4
importing databases 19-13
IVR communication 18-20
logging facility 44-3
LUN-based 19-17
merge failures 11-8
placing CUP in 24-28
read-only for IVR 18-28
renaming 19-20
See also default zones
see also enhanced zones
See also hard zoning
see also LUN zoning
see also read-only zones
See also soft zoning
zone servers
clearing database 19-15
zone sets
accesses between devices 1-7
cloning 19-20
considerations 19-8
copying 19-14
creating 19-7
default settings 19-36
displaying information 19-21 to 19-27
distributing 19-11, 19-12
exporting 19-14
exporting databases 19-13
importing 19-14
importing databases 19-13
one-time distribution 19-12
recovering from isolation 19-13
renaming 19-20
See also active zone sets
See also full zone sets
zone traffic priorities
configuring 19-15
description 19-15
zoning based access control
configuring for iSCSI 35-19