Cisco MDS 9000 Family Fabric Manager Configuration Guide, Release 3.4(1a)
Index

Table Of Contents

Symbols - Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Z

Index

Symbols

* (asterisk)

autolearned entries 46-21

port security wildcard 46-17

port security wildcards 46-17

Numerics

12-port 4-Gbps switching modules

BB_credit buffers 22-12

configuration guidelines 22-20

default settings 22-31

See also switching modules

16-port switching modules

configuring BB_credits 20-20

LEDs 20-14

See also switching modules

24-port 4-Gbps switching modules

bandwidth fairness 22-26

configuration guidelines 22-19

default settings 22-31

example configurations 22-11

oversubscription 22-23

shared resources 22-7

See also switching modules

32-port switching modules

configuring BB_credits 20-20

PortChannel configuration guidelines 23-2

SPAN guidelines 62-6

See also switching modules

3DES encryption

IKE 44-7

IPsec 44-6

48-port 4-Gbps switching modules

bandwidth fairness 22-26

configuration guidelines 22-19

default settings 22-31

example configurations 22-10

oversubscription 22-23

shared resources 22-7

See also switching modules

4-port 10-Gbps switching modules

BB_credit buffers 22-13

configuration guidelines 22-20

default settings 22-31

See also switching modules

A

AAA

authentication process 41-6

authorization process 41-6

configuring information 7-47

default settings 41-30

description 41-1

DHCHAP authentication 45-10

distributing with CFS (procedure) 41-24

enabling server distribution 41-22

local services 41-26

remote services 41-4

service configuration options 41-4

setting authentication 41-26

starting a distribution session 41-22

AAA authentication

configuring 50-28, 50-29

AAA servers

groups 41-4

monitoring 41-5

remote authentication 41-4

access control

enforcingiSCSI

enforcing access control 50-27

iSCSI 50-26

Access Control Lists. See IPv4-ACLs; IPv6-ACLs

access controlzoning based access controliSCSI

zoning based access control 50-27

accounting

viewing lists 7-9

ACL based access control

configuring for iSCSI 50-26

ACLs

configuring for iSCSI 50-26

active zone sets

considerations 30-5

enabling distribution 30-25

adapters

Fibre Channel-to-Ethernet 9-2

adminDown tooltip 69-13

administrative speeds

configuring 20-12

administrative states

description 20-7

setting 20-11

administrator passwords

default 2-5

recovering 39-19

Admin tab

description 7-38

Advanced Encrypted Standard encryption. See AES encryption

advertised interfaces 50-12

advertisement packets

setting time intervals 51-11

AES encryption

description 40-4

IKE 44-6

IPsec 44-6

SNMP support 40-4

AES-XCBC-MAC

IPsec 44-6

AFIDs

configuring 29-12, 29-13

configuring default 29-12

description 29-4, 29-7, 29-15

aliases

switching between global device aliases and FC aliases 31-6

switching between global device aliases and fcaliases 3-8

using as enclosure names 5-20

using with Fabric Manager 3-8

ALPA caches

clearing B-2

description 20-19

displaying contents B-2

ANSI T11 FC-GS-3

support 2-16

applications

management 2-17

application virtual targets. See AVTs

ARP caches

clearing B-2

displaying B-2

authentication

CHAP option 50-57

configuring local with Device Manager 50-30

Fabric Manager Web Services 4-5

fabric security 45-1

guidelines 41-4

iSCSI setup 50-56

local 41-3, 50-30

MD5 51-12

mechanism 50-29

mutual CHAPmutual CHAP authentication 50-30

remote 41-3, 41-4

restricting iSLB initiatorinitiator authentication

restrictingiSLB

restricting iSLB initiators     1

simple text 51-12

user IDs 41-3

See also MD5 authentication

See also simple text authentication

authentication, authorization, and accounting. See AAA

autogenerated iSCSI targetiSCSI

autogenerated target 50-28

auto-negotiation

configuring Gigabit Ethernet interfaces 52-5, 53-3

autonomous fabric ID

See AFIDs

autonomous fabric identifiers. See AFIDs

AutoNotify

description 64-2

destination profile (note) 64-5

registration requirements 64-2

service contract requirements 64-3

auto port mode

description 20-7

interface configuration 20-3

autosensing speed

Generation 2 switching modules 20-13

auto-topology

configuration guidelines 29-10

IVR 29-6

modifying (procedure) 29-12

AVTs

description 57-2

B

bandwidth fairness

disabling 22-27

enabling 22-26

Generation 2 switching modules 22-26

BB_credit buffers

12-port 4-Gbps switching module allocations 22-12

12-port 4-Gbps switching module considerations 22-13

24-port 4-Gbps switching module allocations 22-11

24-port 4-Gbps switching module considerations 22-11, 22-12

48-port 4-Gbps switching module considerations 22-9

4-port 10-Gbps switching module allocations 22-13

4-port 10-Gbps switching module considerations 22-13, 22-14

allocation defaults (table) 22-9

BB_credits

configuring 20-20

description 20-20

FICON port swapping 36-32

reason codes 20-9, C-1

beacon modes

configuring 20-15

description 20-15

identifying LEDs 20-14

Berkeley Packet Filter library. See BPF library

bit errors

reasons 20-15

bit error thresholds

configuring 20-15

description 20-15

bitErrRTThresExceeded tooltip 69-13

bootflash:

description 16-2, 16-3

file system 15-2

recovering from corruption B-1

space requirements 15-3

system images 16-2

boot variables

synchronizing 17-3

border switches

description 29-4

IVR configuration guidelines 29-15

BPF library

description 68-21

See also libpcap freeware

B port mode

description 20-6

interface modes 20-6

B ports

configuring 48-27

interoperability mode 48-25

SAN extenders 48-26

bridge port mode. See B port mode

bridge ports. See B ports

broadcast

in-band addresses default 19-13

routing 32-14

Brocade

native interop mode 37-8

buffer pools

Generation 2 switching modules 22-8

buffer sizes

configuring in FCIP profiles 48-21

buffer-to-buffer credits. See BB_credits

build fabric frames

description 25-3

bundleMisCfg tooltip 69-13

C

Call Home

alert groups64-6to 64-8

AutoNotify feature 64-2

CFS support 13-2

configuration distribution 64-14

configuring64-3to 64-15

configuring e-mail options 64-11

configuring for EMC 64-16

contact information 64-3

database merge guidelines 64-15

default settings 64-19

description 64-1

destination profiles64-5to 64-6

duplicate message throttle 64-13

enabling 64-13

features 64-2

inventory notifications 64-11

message format options 64-2

RMON-based alerts 64-10

syslog-based alerts 64-9

testing communications 64-16

Call Home alert groups

configuring 64-6

customizing messages 64-7

description 64-6

Call Home destination profiles

attributes 64-5

description 64-5

Call Home messages

configuring levels 64-8

format options 64-2

Call Home notifications

full-txt format for syslog 64-17

XML format for RMON 64-18

XML format for syslog 64-17

CAs

authenticating 43-10

certificate download example 43-19

configuring43-6to 43-17

creating a trust point 43-8

default settings 43-37

deleting digital certificates 43-16

description43-1to 43-5

enrollment using cut-and-paste 43-4

example configuration43-17to 43-36

Fabric Manager Web Services 7-5

identity 43-2

maintaining 43-14

maximum limits 43-36

monitoring 43-14

multiple 43-4

multiple trust points 43-3

peer certificates 43-5

purpose 43-2

CDP

configuring12-12to 12-13

configuring hold times 12-13

configuring refresh time interval globally 12-13

disabling globally 12-12

disabling on interfaces 12-13

packet transmission interval 12-12

certificate authorities. See CAs

certificate revocation lists. See CRLs

CFS

application requirements 13-5

configuring for NTP 12-8

default settings 13-19

description13-1to 13-4

disabling on a switch 13-4

displaying configuration information 13-9

distribution modes 13-4

distribution over IP 13-10

distribution scopes 13-3

enabling on a switch 13-4

example configuration using Device Manager 13-19

example configuration using Fabric Manager 13-16

example using Fabric Manager 12-8

feature description 13-2

iSLB config distribution 50-46

merge support 13-9

merge support (procedure) 13-18

protocol description 13-3

SAN-OS features supported 13-2

saving configurations 13-8

CFS applications

clearing session locks 13-8

committing changes 13-7

discarding changes 13-8

enabling 13-6

enabling (procedure) 13-6

fabric locking 13-7

CFS over IP

default settings 13-19

description 13-10

CFS regions

assigning features 13-13

creating 13-13

deleting 13-15

description 13-12

moving a feature 13-14

removing a feature 13-15

usisng Fabric Manager 13-13

channelAdminDown tooltip 69-13

channelConfigurationInProgress tooltip 69-13

channelOperSuspended tooltip 69-13

CHAP authentication 50-28, 50-43, 50-57

CHAP challenge 50-30

CHAP response 50-30

CHAP user name 50-30

CIM

configuring 37-1, B-3

description 37-1

support 2-16

CIM servers

default settings 68-25

Cisco Access Control Server. See Cisco ACS

Cisco ACS

configuring for RADIUS41-26to 41-30

configuring for TACACS+41-26to 41-30

cisco-av-pair

specifying for SNMPv3 41-13

Cisco Discovery Protocol. See CDP

Cisco Fabric Service. See CFS

Cisco MDS 9000 Family

connecting a terminal 12-11

description 1-1

initial setup2-2to 2-12

starting a switch 2-1

Cisco MDS 9100 Series

Cisco MDS 9120 switches 1-4

Cisco MDS 9124 switches 1-4

Cisco MDS 9140 switches 1-4

description 1-4

high availability 17-1

overview 1-4

Cisco MDS 9120 switches

description 1-4

Cisco MDS 9140 switches

description 1-4

Cisco MDS 9200 Series

Cisco MDS 9216A switches 1-3, 1-4

Cisco MDS 9216i switches 1-3

Cisco MDS 9216 switches 1-4

connecting a terminal 12-11

description 1-3

high availability 17-1

Cisco MDS 9216

supervisor modules 19-2

Cisco MDS 9216A switches

description 1-3, 1-4

Cisco MDS 9216i switches

configuring extended BB_credits 20-22

description 1-3

Cisco MDS 9216 switches

description 1-4

Cisco MDS 9500 Series

Cisco MDS 9506 Directors 1-2

Cisco MDS 9509 Directors 1-2

Cisco MDS 9513 Directors 1-2

description 1-2

high availability 17-1

Cisco MDS 9506 Directors

description 1-2

Cisco MDS 9509 Directors

description 1-2

supervisor modules 19-1

Cisco MDS 9513 Directors

description 1-2

supervisor modules 19-1

Cisco MDS SAN-OS

software images 15-1

Cisco SAN-OS features

changed (table) i-liii

new (table) i-liii

Cisco Traffic Analyzer

configuring with Performance Manager 60-9

description 9-3

installing (procedure) 9-3

statistics reports 68-3

troubleshooting tools 68-2

using for troubleshooting 68-2

using with Fabric Manager 9-2

Cisco Transport Controller. See CTC

Cisco vendor ID

description 41-13

class maps

configuring for data traffic 66-6

creating 66-7

CLI

accessing D-2

description 1-6

Fabric Manager alternative 1-6

firewall 4-2

clients

disconnecting 7-44

viewing 7-44

clock modules

managing B-2

cloud discovery. See iSNS cloud discovery

code pages

FICON text string formatting 36-19

COM1 ports

configuring B-1

command-line interface. See CLI

command schedulers

configuring B-2

command scripts

executing B-2

Common Information Model. See CIM

common roles

deleting (procedure) 39-3

communities

adding 7-45

removing 7-46

CompactFlash

devices 16-3

slot0: 15-2

company IDs

FC ID allocations 37-7, 68-24

configuration

overview1-6to 1-9

saving automatically for FICON 36-23

saving to NVRAM 16-8

software tools 1-5

configuration files

backing up 16-9

copying (procedure) 16-8

displaying B-2

downloading 16-8

FICON 36-29

saving (procedures) 16-8

saving across the fabric 16-9

configuration limits

description (table) i-lxx, E-1

configurations

changing initial 2-12

configuring NPV 21-7

congestion control methods. See FCC; edge quench congestion control

congestion window monitoring. See CWM

connectivity

troubleshooting tool 5-22

verifying 68-7

console logging

configuring 63-4

console ports

parameters 2-2

console sessions

message logging severity levels 63-4

console settings

configuring B-1

Contiguous Domain ID Assignments

About 25-15

contract IDs

description 64-23

control traffic

disabling QoS 66-4

enabling for QoS 66-4

Control Unit Port. See CUP in-band management

control virtual targets. See CVTs

core dumps

IPS modules B-2

core files

clearing directory 70-4

displaying information 70-3

saving to CompactFlash B-3

CRLs

configuring 43-15

configuring revocation checking methods 43-12

description 43-5

downloading example 43-34

generation example 43-33

importing example43-36, ??to 43-36

crossbars

compatibility with Generation 1 modules 18-10

description 18-8

management 18-7

removal considerations 18-8

crypto IPv4-ACLs

any keyword 44-25

configuration guidelines 44-22

creating 44-25

mirror images 44-24

crypto map entries

global lifetime values 44-37

setting SA lifetimes 44-31

crypto maps

auto-peer option 44-32

configuration guidelines 44-29

configuring perfect forward secrecy 44-35

entries for IPv4-ACLs 44-28

perfect forward secrecy 44-34

SA lifetime negotiations 44-30

SAs between peers 44-28

crypto map sets

applying to interfaces 44-36

CTC

description 48-18

launching 48-18

CUP in-band management

blocking restriction 36-25

description 36-37

current VSANs

description 29-3

custom reports

creating a template 7-33

listing by template 7-35

modifying a template 7-36

Custom tab

description 7-33

Cut-through routing mode 50-33

cut-thru routing mode 50-34

CVTs

creating 57-4

deleting 57-5

description 57-2

CWM

configuring in FCIP profiles 48-20

D

D_S_TOV

default setting 68-25

errors when setting 69-7

modifying 68-15

data

management 2-17

database files

resolving lock errors 7-38

Data Encryption Standard encryption. See DES encryption

data traffic

class maps 66-6

comparing VSANs and QoS 66-5

defining service policies 66-8

DWRR queues 66-8

enforcing service policies 66-8

example configuration 66-10

data virtual targets. See DVTs

dates

configuring 12-3

daylight saving time

adjusting for B-1

dead time intervals

configuring for FSPF 32-8

description 32-8

dedicated rate mode

description 22-6

migrating from shared rate mode 22-19

migrating to shared rate mode 22-19

default gateways. See IPv4 default gateways

default networks

configuring 2-6, 2-10

default networks. See IPv4 default networks

default users

description 2-3

default VSANs

description 26-8

default zones

configuring 30-20

configuring policies 30-35

configuring QoS priorities 30-34

description 30-19

interoperability 37-9

policies 30-19

deficit weighted round robin schedulers. See DWRR schedulers

deniedDueToPortBinding tooltip 69-13

DES encryption

IKE 44-7

IPsec 44-6

desktops

shortcuts not visible 69-4

destination IDs

exchange based 23-5

flow based 23-4

in-order delivery 32-15

path selection 26-11

device alias database

committing changes 31-5

discarding changes 31-5

distribution to fabric 31-3

merging 31-7

device aliases

CFS support 13-2

clearing statistics 31-6

comparison with zones (table) 31-2

default settings 31-8

description 31-1

features 31-1

modifying the database 31-2

requirements 31-2

zone alias conversion 31-5

device IDs

Call Home format 64-24

Device Manager

color definitions 6-6

connection failures 69-10

context menus 6-7

description 1-6, 2-15, 6-1

disk images not visible 69-7

downgrading 69-4

FAQs 69-1

icons 6-4

installation failures 69-6, 69-7

label definitions 6-6

launching (procedure) 6-2

login failure recovery 69-6

managing ports 6-7

performance monitoring 60-1

PortChannels 6-7

preferences 6-8

setting preferences 6-8

tabs 6-5

troubleshooting tools 68-1

trunking 6-7

upgrade failures 69-4

upgrading 69-4

using interface (figure) 6-3

viewing license information 10-16

viewing port status 6-6

viewing supervisor modules 6-7

viewing switch modules 6-7

viewing system messages 63-11

devices

discovery 59-1

management 2-17

modifying groupings (procedure) 5-20

searching in Fabric Manager 69-22

DH

IKE 44-6

DHCHAP

AAA authentication 45-10

authentication modes 45-5

compatibility with other SAN-OS features 45-3

configuring45-2to 45-10

configuring AAA authentication 45-10

default settings 45-10

description 45-2

enabling 45-4

group settings 45-7

hash algorithms 45-6

licensing 45-2

passwords for local switches 45-7

passwords for remote devices 45-8

timeout values 45-9

See also FC-SP

differentiated services code point. See DSCP

Diffie-Hellman Challenge Handshake Authentication Protocol. See DHCHAP

Diffie-Hellman protocol. See DH

digital certificates

configuration example43-17to 43-19

configuring43-6to 43-17

default settings 43-37

deleting from CAs 43-16

description43-1to 43-5

exporting 43-5, 43-14

generating requests for identity certificates 43-12

importing 43-5, 43-14

installing identity certificates 43-13

IPsec44-7to 44-10

maintaining 43-14

maximum limits 43-36

monitoring 43-14

peers 43-5

purpose 43-2

requesting identity certificate example 43-24

revocation example 43-30

digital signature algorithm. See DSA key pairs

DirectX

installing 69-6

Distributed Services Time Out Value. See D_S_TOV

DNS

configuring 2-6, 2-10

configuring IP addresses 2-7

default settings 51-13

DNS servers

configuring 51-12

documentation

additional publications i-lxxi

related documents i-lxxi

domainAddrAssignFailureIsolation tooltip 69-14

domain ID

CFS support 13-2

domain IDs

allowed lists 25-11

assignment failures 20-10

configuring allowed lists 25-11

configuring CFS distribution25-12to 25-15

configuring fcalias members 30-20

contiguous assignments 25-15

description 25-8

distributing 25-2

duplicates causing errors 69-12

enabling contiguous assignments 25-15

failures C-2

interoperability 37-9

IVR configuration guidelines 29-14

non-unique and IVR NAT 29-5

preferred 25-10

static 25-10

unique 29-14

domainInvalidRCFReceived tooltip 69-14

domain manager

isolation 20-10

domainManagerDisabled tooltip 69-14

domainMaxReTxFailure tooltip 69-14

domain names

configuring 2-6

domainOtherSideEportIsolation tooltip 69-14

domainOverlapIsolation tooltip 69-14

domains

overlap isolations C-2

DPVM

CFS support 13-2

default settings 28-14

description 28-1

enabling 28-2

requirements 28-2

using DPVM Setup Wizard (procedure) 28-2

wizard 5-22

DPVM databases

autolearned entries 28-7

clearing 28-8

comparing differences 28-13

configuring CFS distribution28-8to 28-12

copying 28-13

description 28-3

enabling autolearning 28-7

merging guidelines 28-12

drill down reports

description 7-1

drivers

iSCSI 50-2

drop latency time

configuring 32-18

dsa key pairs

generating 39-15

DSCP

configuring 48-28

DVTs

creating 57-6, 57-9

deleting 57-8

description 57-2

DWRR queues

changing weights 66-9

DWRR schedulers

description 66-5

dynamic bandwidth management

description 22-6

dynamic iSCSI initiator

converting 50-40

convert to staticiSCSI

convert dynamic initiator to static 50-19

dynamic mapping 50-8, 50-39

dynamic mappingiSCSI

dynamic mappingiSCSI

static mappingstatic mapping 50-7

Dynamic Port VSAN Membership. See DPVM

E

E_D_TOV

default setting 68-25

errors when setting 69-7

modifying 68-15

EBCDIC

FICON string format 36-19

edge quench congestion control

description 66-2

edge switches

description 29-4

edge VSANs

description 29-3

EFMD

fabric binding 47-1

EISLs

PortChannel links 23-1

ELP

verifying using Device Manager (procedure) 48-17

elpFailureClassFParamErr tooltip 69-14

elpFailureClassNParamErr tooltip 69-14

elpFailureInvalidFlowCTLParam tooltip 69-14

elpFailureInvalidPayloadSize tooltip 69-14

elpFailureInvalidPortName tooltip 69-14

elpFailureInvalidTxBBCredit tooltip 69-14

elpFailureIsolation tooltip 69-14

elpFailureLoopbackDetected tooltip 69-14

elpFailureRatovEdtovMismatch tooltip 69-14

elpFailureRevMismatch tooltip 69-14

ELP failures

reason codes C-2

elpFailureUnknownFlowCTLCode tooltip 69-14

e-mail addresses

assigning for Call Home 64-4

e-mail notifications

Call Home 64-1

EMC

configuring Call Home 64-16

enclosure names

aliases 5-20

end devices

viewing storage port traffic and errors 7-14

end-to-end connectivity

troubleshooting 68-5

enhanced ISLs. See EISLs

enhanced zones

advantages over basic zones 30-40

changing from basic zones 30-41

creating attribute groups 30-42

default settings 30-45

description 30-40

enabling 30-42

merging databases 30-42

enterprise package licenses

description 10-4

entity status inquiry. See ESI

EPLD images

configuring B-2

E port mode

classes of service 20-4

description 20-4

ePortProhibited tooltip 69-14

E ports

32-port guidelines 20-3

32-port switching module configuration guidelines 23-3

configuring 20-12, 48-28

fabric binding checking 47-2

FCS support 65-1

FSPF topologies 32-2

isolation 20-10, C-2

recovering from link isolations 30-27

SPAN sources 62-3

trunking configuration 24-3

eppFailure tooltip 69-14

Error Detect Time Out Value. See E_D_TOV

errorDisabled tooltip 69-14

error messages

gen error messages 69-7

error reports

clearing previous B-3

escFailureIsolation tooltip 69-15

ESC failures

reason codes C-2

ESI

non-resp threshold 50-72

ESI retry count 50-72

Ethereal freeware

analyzer 68-18

URL 68-17

Ethernet

reducing traffic 68-2

Ethernet PortChannels

adding Gigabit Ethernet interfaces 52-10

configuring 52-10

description 52-9

iSCSI 50-55

redundancy 48-6

evaluation

stop in Device Manager 10-17

events

displaying using Device Manager 59-4

displaying using Fabric Manager 59-4

displaying using Fabric Manager Web Services 59-4

viewing 7-9

Exchange Fabric Membership Data. See EFMD 47-1

exchange IDs

in-order delivery 32-15

path selection 26-11

exchange link parameter. See ELP

exchange link parameter failures. See ELP failures

expansion port mode. See E port mode

expiry alerts

licenses 10-15

explicit fabric logout 50-16

extended BB_credits

configuring 20-23

description 20-21

Generation 2 switching modules 22-15

licensing 22-15

Extended Binary-Coded Decimal Interchange Code. See EBCDIC 36-19

Extended Link Protocol. See ELP

external CompactFlash

formatting B-2

external loopback tests

description 70-7

performing 70-7

external RADIUS server

CHAP 50-57

external RADIUS servers

CHAP 50-57

F

fabric

editing monitoring 7-42

Fabric Analyzer

configuring 68-19

description 68-17

Ethereal freeware 68-17

libpcap freeware 68-17

using display filters B-3

fabric binding

activation 47-4

checking for Ex ports 47-2

clearing statistics 47-6

compatibility with DHCHAP 45-3

configuration47-3to 47-6

default settings 47-9

deleting database 47-6

description47-1to 47-2

EFMD 47-1

enforcement 47-2

forceful activation 47-5

licensing requirements 47-1

port security comparison 47-1

saving configurations 47-5

verifying configuration47-6to 47-9

fabricBindingDBMismatch tooltip 69-15

fabricBindingDomainInvalid tooltip 69-15

fabricBindingNoRspFromPeer tooltip 69-15

fabricBindingSWWNNotFound tooltip 69-15

Fabric Configuration Server. See FCS

Fabric Configuration Servers. See FCSs

Fabric-Device Management Interface. See FDMI

fabric lock

releasing 50-49

fabric login. See FLOGI

fabric loop port mode. See FL port mode

Fabric Manager

authentication4-1to ??

browser support 2-19

Cisco Traffic Analyzer 9-2

connection failures 69-10

corrupted jar file errors 69-21

description 1-6, 2-13

detachable tables 5-12

downgrading 69-4

downloading software 2-18

error recovery 69-7

FAQs 69-1

FCIP 69-19

installation failures 69-6, 69-7

installing 2-18

integrating with other tools 2-38

ISL statistics 60-3

Java support 2-19

launching troubleshooting 69-3

login failure recovery 69-6

missing Information pane 69-9

mixed software environments 69-21

network discovery 5-19

preinstallation tasks 2-18

problems with map changes 69-8

running behind firewalls 2-38

running with multiple NICs 69-19

searching for devices 69-22

setting preferences 5-18

shows as disabled service 69-6

support operating systems 2-19

uninstalling 2-40

unlicensed features 3-2

upgrade failures 69-4

upgrading 2-36, 69-4

viewing license information 10-16

Fabric Manager authentication

description 4-1

discovery best practices 4-3

Web Server support 4-5

Fabric Manager Clients

advanced mode 5-2

description 2-14, 5-1

displaying physical attributes 5-10

Fabric pane 5-12

filtering 5-10

Information pane 5-11

launching 5-2

main menu 5-7

setting preferences 5-18

status bar 5-18

toolbar icons (table) 5-8

troubleshooting tools 5-22

using interface (figure) 5-6

wizards 5-21

Fabric Manager features

changed (table) i-liii

new (table) i-liii

Fabric Manager Server

authentication 4-2

configuring preferences 7-45

continuously monitoring fabrics 3-3

database failed to start 69-10

description 2-14, 3-1

disk space requirements 3-1

fabric discovery 4-3

features 3-1

full fabric rediscovery 3-8

installation overview 3-2

installing 3-2

installing Fabric Manager Web Server (procedure) 3-3

licensing 3-3, 10-17

local host error messages 69-19

modifying settings 3-6

passwords 3-7

performing administrative tasks 7-38

performing configuration tasks 7-38

polling periods 3-8

properties files 3-5

Red Hat Linux support 3-1

Solaris support 3-1

troubleshooting tools 68-1

user names 3-7

viewing logs 7-56

Windows support 3-1

Fabric Manager Server package license

description 10-6

Fabric Manager Web Server

authentication 4-5

configuring RADIUS authentication 4-5

configuring TACACS+ authentication 4-5

description 2-15

viewing system messages 63-11

Fabric Manager Web Services

configuring communities 7-45

configuring users 7-47

description 7-1

exporting performance data 7-3

initial screen 7-8

installing 7-3

launching 7-7

navigating 7-2

printing 7-3

recovering passwords 7-39

TCP ports 7-4, 7-5

using with SSL 7-5

fabric port mode. See F port mode

fabric pWWNs

zone membership 30-2

fabric reconfiguration

fcdomain phase 25-2

fabrics

discovery 5-19

management 2-17

monitoring 3-3

See also build fabric frames

fabrics. See RCFs; build fabric frames

fabric security

authentication 45-1

default settings 45-10

Fabric Shortest Path First. See FSPF

FabricWare

events D-2

Fabric Manager support (table) D-3

Fibre Channel support D-1

installing Fabric Manager Web Services 7-3

roles D-2

security D-2

SNMP traps D-2

syslog traps D-2

zoning support D-2

fabric WWNs. See fWWNs

fan module LEDs

failure status 18-11

fan modules

description 18-11

displaying status 18-11

failures 18-11

FAQs

Device Manager 69-1

Fabric Manager 69-1

fault tolerant fabrics

example (figure) 32-2

fcaliases

adding members 30-21

cloning 30-31

configuring for zones 30-20

creating 30-21

renaming 30-30

using with Fabric Manager 3-8

FCC

assigning priority 66-3

benefits 66-1

default settings 66-12

description 66-1

enabling 66-2

frame handling 66-2

logging facility 63-2

process 66-2

fcdomains

autoreconfigured merged fabrics 25-7

configuring CFS distribution25-12to 25-15

default settings 25-22

description 25-2

disabling 25-6

domain IDs 25-8

dsiplaying statistics 25-22

enabling 25-6

enabling autoreconfiguration 25-8

incoming RCFs 25-6

initiation 25-5

overlap isolation 20-10

restarts 25-3

switch priorities 25-5

FC-GS-3 requests

device grouping support 5-20

FC ID allocation

FICON implementation 36-14

FC IDs

allocating 25-2, 37-7, 68-24

allocating company IDs 68-24

allocating default company ID lists 37-7

allocating for FICON 36-14

allocation for HBAs 37-7

configuring fcalias members 30-20

description 25-16

persistent25-17to ??

FCIP 50-1

advanced features 48-29

checking trunk status (procedure) 48-17

compatibility with DHCHAP 45-3

compression 48-37

configuring48-7to ??

configuring using FCIP Wizard48-8to 48-15

default parameters 48-38

discarding packets 48-25

enabling 48-8

FICON support 36-5

Gigabit Ethernet ports 52-4, 53-1

high availability48-4to 48-7

IPS modules 48-2

IP storage services support 52-1

link failures 48-5

MPS-14/2 module 48-2

reserving ports for FICON 36-13

restrictions 69-19

specifying number of TCP connections 48-25

tape acceleration48-32to ??

time stamps 48-25

VE ports 48-2

verifying ELP (procedure) 48-17

verifying interfaces (procedure) 48-17

virtual ISLs 48-2

VRRP 48-6

write acceleration 48-29

FCIP compression

configuring (procedure) 48-12

description 48-37

FCIP interfaces

configuring advanced features48-21to 48-28

configuring peers 48-22

configuring QoS 48-28

configuring special frames 48-24

creating 48-22

parameters 48-4

SPAN sources 62-3

FCIP links

B port interoperability mode 48-25

configuring 48-15

configuring peers 48-22

configuring QoS 48-28

creating 48-16

description 48-3

endpoints 48-3

initiating IP connections 48-25

TCP connections 48-3

FCIP peers

configuring IP addresses 48-22

enabling special frames 48-24

fcipPortAdminCfgChange tooltip 69-15

fcipPortKeepAliveTimerExpire tooltip 69-15

fcipPortMaxReTx tooltip 69-15

fcipPortPersistTimerExpire tooltip 69-15

fcipPortSrcAdminDown tooltip 69-15

fcipPortSrcLinkDown tooltip 69-15

FCIP profiles

configuring TCP parameters48-19to ??

creating 48-16

description 48-4

fcipSrcModuleNotOnline tooltip 69-15

fcipSrcPortRemoved tooltip 69-15

FCIP tape acceleration

configuring 48-36

description48-32to 48-36

FCIP TCP parameters

configuring buffer size 48-21

configuring CWM 48-20

configuring keepalive timeouts 48-19

configuring maximum jitter 48-21

configuring maximum retransmissions 48-19

configuring minimum retransmit timeouts 48-19

configuring PMTUs 48-20

configuring SACKs 48-20

configuring window management 48-20

FCIP write acceleration

configuring 48-31

configuring (procedure) 48-12

description 48-29

FC Logical Interface Tables 50-21

fcotChksumErr tooltip 69-15

fcotNotPresent tooltip 69-15

fcotVendorNotSupported tooltip 69-15

FCP

intermixing protocols 36-5

routing requests 50-3

fcping. See Ping Tool

FCS

description 65-1

logging facility 63-2

significance 65-2

FC-SP

authentication 45-1

enabling 45-4

enabling on ISLs 45-10

See also DHCHAP

fcspAuthenfailure tooltip 69-15

FCSs

default settings 65-6

description 65-1

displaying information65-3to ??

fctimers

CFS support 13-2

configuring CFS B-3

distribution 37-4

fctrace. See traceroute

FDMI

description 34-4

displaying database information 34-4

Federal Information Processing Standards. See FIPS

Fibre Channel 50-1

configuring time out values 68-15

iSCSI targets50-7to 50-13

sWWNs for fabric binding 47-4

time out values37-2to 37-5

TOVs 37-2

Fibre Channel Analyzers

configuring using SPAN 62-12

Fibre Channel analyzers

capturing frames locally B-3

clearing configured information B-3

monitoring without SPAN 62-10

sending frames to remote IP addresses B-3

Fibre Channel Congestion Control. See FCC

Fibre Channel domains. See fcdomains

Fibre Channel interface

default settings 20-26

Fibre Channel interfaces

administrative states 20-7

BB_credits 20-20

characteristics20-2to 20-11

configuring beacon modes 20-15

configuring bit error thresholds 20-15

configuring frame encapsulation 20-13

configuring port modes 20-12

configuring receive data field sizes 20-13

configuring speeds 20-12

deleting from PortChannels 23-16

disabling 20-11

enabling 20-11

extended BB_credits 20-21

graceful shutdown 20-11

modes20-3to 20-7

operational states 20-7

performance buffers 20-21

reason codes 20-8

states 20-7

taking out of service on Generation 2 switching modules 22-28

troubleshooting operational states 20-9

See also interfaces 20-7

Fibre Channel over IP. See FCIP

Fibre Channel Protocol. See FCP

Fibre Channel Security Protocol. See FC-SP

Fibre Channel targets

dynamic importing 50-9

dynamic mapping 50-9

Fibre Channel traffic

analyzing 68-2

SPAN sources 62-3

statistics 68-3

Fibre Channel write acceleration

default settings 56-3

description 56-1

enabling 56-2

estimating number of write buffers 56-1

licensing 56-1

modifying number of write buffers 56-2

Fibre Channel zoning-based access control 50-27

Fibre Connection. See FICON

FICON

advantages on MDS switches36-3to 36-7

automatic configuration save 36-23

basic configuration 36-16

calculating flow load balance (procedure) 36-39

cascading 36-7

configuration files36-28to 36-31

configuring36-15to 36-24

configuring ports36-24to 36-28

CUP in-band management 36-37

default settings 36-42

description36-1to 36-7

displaying information36-40to 36-42

fabric binding requirements 47-3

Fabric Manager Client support 5-2

FC4 protocols 36-2

FC ID allocations 36-14

FCIP support 36-5

host timestamp control 36-22

implemented ports 36-11

installed ports 36-12

manually enabling 36-18

MDS-supported features 36-5

PortChannel support 36-5

port numbering36-8to 36-14

port swapping36-31to 36-33

RLIRs36-27to 36-28

saving configuration changes 36-23

suspending a VSAN 36-19

sWWNs for fabric binding 47-4

tape acceleration36-33to 36-37

text string formatting codes 36-19

unimplemented port 36-11

VSAN offline state 36-19

ficonBeingEnabled tooltip 69-15

FICON configuration files

applying to running configuration 36-29

copying 36-31

description 36-29

displaying 36-30

editing 36-30

view latest information 36-30

ficonNoPortnumber tooltip 69-15

ficonNotEnabled tooltip 69-15

FICON port numbers

assigning to slots 36-13

default numbering scheme 36-8

FCIP interfaces 36-13

implemented addresses 36-11

installed ports 36-12

logical interfaces 36-13

numbering guidelines 36-12

PortChannel interfaces 36-13

port swapping 36-11

reserved numbering scheme 36-11

unimplemented addresses 36-11

uninstalled ports 36-12

FICON ports

assigning address names using Device Manager 36-27

blocking 36-25

displaying address information 36-41

prohibiting 36-26

swapping configurations 36-33

FICON port swapping

configuring (procedure) 36-33

guidelines 36-32

FICON tape acceleration

configuration considerations 36-35

configuring 36-35

description 36-33

ficonVsanDown tooltip 69-15

FICP

wizard 5-21

field replaceable units. See FRUs

files

compressing B-2

displaying contents B-1

displaying last lines B-2

uncompressing B-2

file systems

formatting 16-2

volatile: 16-2

File Transfer Protocol. See FTP

filtering

end port groups 5-16

switch groups 5-16

filters

capture 68-21

defining displays 68-21

permitted 68-22

selective viewing 68-20

FIPS

configuration guidelines 38-2

self-tests 38-3

firewalls

configuring 2-14

running with Fabric Manager 2-38

firstPortNotUp tooltip 69-15

firstPortUpAsEport tooltip 69-15

Flash devices

bootflash: 16-2

formatting 16-2

overview 16-1

FLOGI

description 34-1

displaying details 34-1

logging facility 63-2

flows

performance statistics 8-1

viewing performance information 7-16

flow statistics

counting 8-4

description 8-4

FL port mode

classes of service 20-5

description 20-5

FL ports

configuring 20-12

description 20-5

DPVM support 28-7

nonparticipating code 20-10

nonparticipating codes C-2

persistent FC IDs 25-17

SPAN sources 62-3

See also Fx ports

F port mode

classes of service 20-5

description 20-5

F ports

configuring 20-12

description 20-5

DPVM support 28-7

SPAN sources 62-3

See also Fx ports

FPSF

load balancing (example) 48-5

frame encapsulation

configuring 20-13

frames

configuring MTU size 52-5, 53-3

viewing 68-20

frequently asked questions. See FAQs

FSPF

computing link cost 32-7

configuring globally32-4to 32-6

configuring Hello time intervals 32-7

configuring link cost 32-6

configuring on interfaces32-6to 32-10

dead time intervals 32-8

default settings 32-19

description 32-2

disabling on interfaces 32-9

disabling routing protocols 32-6

displaying databases 32-10

fail-over with PortChannels 32-3

fault tolerant fabrics 32-2

flow statistics8-3to 32-19

in-order delivery32-15to 32-19

interoperability 37-10

link state record defaults 32-4

multicast root switches 32-14

path selection protocol D-1

reconvergence times 32-2

redundant links 32-3

retransmitting intervals 32-8

routing services 32-1

support 2-16

topology examples32-2to 32-4

FSPF multicast roots

configuring switches 32-14

FSPF routes

configuring 32-12

description 32-12

FSPF routing

multicast 32-14

FTP

logging facility 63-2

support 2-15

full zone sets

considerations 30-5

enabling distribution 30-25

fWWNs

configuring fcalias members 30-20

Fx ports

32-port default 20-3

configuring 20-12

description 20-6

FCS 65-1

FCS support 65-1

interface modes 20-6

VSAN membership 26-4

See also F ports; FL ports 20-6

G

Generation 1 switching modules

combining with Generation 2 switching modules??to 22-18

extended BB_credits 20-22

port index allocations 22-16

QoS behavior 66-8

Generation 2 switching modules

buffer groups22-8to 22-14

combining with Generation 1 switching modules??to 22-18

configuring22-18to ??

configuring port speeds 22-21

configuring rate modes 22-22

default settings 22-31

description22-1to ??

dynamic bandwidth management 22-6

extended BB_credits 20-23, 22-15

installing in Generation 1 chassis 15-15

out-of-service interfaces 22-7

port groups 22-2

port index allocations 22-16

port rate modes 22-4

QoS behavior 66-8

recovering from powered-down state 22-17

releasing shared resources 22-29

taking interfaces out of service 22-28

Gigabit Ethernet

IPv4 example configuration 52-4

Gigabit Ethernet interface example 50-53

Gigabit Ethernet interfaces

configuring52-4to 52-10

configuring auto-negotiation 52-5, 53-3

configuring CDP 12-12

configuring high availability52-8to 52-10

configuring IPv4 53-2

configuring IPv6 addresses 54-12

configuring MTU frame sizes 52-5, 53-3

configuring promiscuous mode 52-6, 53-4

configuring VRRP 52-9

default parameters 53-6

IPv4-ACL guidelines 53-6

subinterfaces 52-6, 53-5

subnet requirements 52-6, 53-5

viewing performance information 7-18

Gigabit Ethernet subinterfaces

configuring VLANs 53-5

global keys

assigning for RADIUS 41-8

H

hardware

default settings 18-12

displaying inventory 18-1

displaying temperatures 18-11

overview 1-1

viewing list 7-9

hardware failures

configuring actions B-3

hard zoning

description 30-25

HA solution example 50-52

HBA port 50-15, 50-20

HBA ports

configuring area FCIDs 25-19

HBAs

device aliases 31-1

FC ID allocations 37-7, 68-24

Health tab

description 7-8

Hello time intervals

configuring for FSPF 32-8

description 32-7

high availability

automatic synchronization 17-4

compatibility with DHCHAP 45-3

description 17-1

Ethernet PortChannel 50-55

Ethernet PortChannels 48-6

Fibre Channel PortChannels 48-7

licensing 10-8

process restartability 17-3

protection against link failures 17-1

software upgrades 15-5

supervisor module switchover mechanism 17-2

switchover characteristics 17-2

synchronizing supervisor modules 17-3

VRRP 48-6, 50-54

VRRPVRRP-based high availability 50-54

historical data

preserving 69-18

host control

FICON 36-21

host names

configuring for digital certificates 43-6

hosts

performance statistics 8-1

HTTP

port used 2-39

support 2-16

HTTP proxy servers

configuring 69-20

HTTPS

support 2-16

hwFailure tooltip 69-15

I

IBM PPRC

FICON support 36-5

ICMP

IPv6 54-6

ICMP packets

IPv6 header format, figure 54-6

type value 42-4

icons

Device Manager 6-4

IDs

Cisco vendor ID 41-13

contract IDs 64-23

login IDs 2-5

serial IDs 64-24, 64-26, 64-28

server IDs 64-24

site IDs 64-23

IKE

algorithms for authentication 44-6

default settings 43-37, 44-39

description 44-3

initializing 44-13

refreshing SAs 44-20

terminology 44-5

transforms for encryption 44-6

viewing configuration (procedure) 44-11

IKE domains

clearing 44-20

description 44-13

IKE initiators

configuring version 44-18

IKE peers

configuring keepalive times 44-17

IKE policies

configuring negotiation parameters 44-15

negotiation 44-14

IKE tunnels

clearing 44-20

description 44-13

images

See kickstart images; software images; system images

Software Installation Wizard 15-8

images. See kickstart images; software images; system images

in-band access

configuring 2-9

IPFC 2-12

in-band management

configuring 2-8, 2-10

CUP 36-37

Ethernet connection 2-17

IPFC 51-5

IPFC connection 2-17

logical interface 2-8

incomAdminRxBBCreditPerBuf tooltip 69-16

incompatibleAdminMode tooltip 69-16

incompatibleAdminRxBBCredit tooltip 69-16

incompatibleAdminRxBufferSize tooltip 69-16

incompatibleadminSpeed tooltip 69-16

indirect link failures

recovering 67-1

initialization string

configuring B-1

initializing tooltip 69-16

initiators

statically mapped iSCSI 50-35

in-order delivery

configuring drop latency time 32-18

enabling for VSANs 32-18

enabling globally 32-18

guidelines 32-17

reordering network frames 32-15

reordering PortChannel frames 32-17

install all command

failure cases 15-7

Intelligent Storage Services

description 58-1

disabling (procedure) 55-5, 58-3

disabling with force option 55-6, 58-3

enabling (procedure) 55-3, 58-2

Fibre Channel write acceleration56-1to 56-3

SCSI flow services55-1to 55-8

SCSI flow statistics55-1to 55-8

interfaceRemoved tooltip 69-16

interfaces

adding to PortChannels 23-13, 23-14

assigning to VSANs 26-8

configuring data field size 20-13

configuring fcalias members 30-20

default settings 20-26

deleting from PortChannels 23-16

forced addition to PortChannels 23-15

isolated states 23-14

nonoperational reason codes C-1

reason codes C-1

SFP types 20-16

suspended states 23-14

VSAN membership 26-7

interface statistics

description 20-17

gathering 20-17

internal bootflash:

Flash devicesFlash devices 16-3

initializing 16-2

kickstart images 16-2

recovering from corruption 16-2

internal loopback tests

description 70-7

performing 70-7

Internet Control Message Protocol. See ICMP

Internet Explorer

Fabric Manager support 2-19

Internet Key Exchange. See IKE

Internet Storage Name Service. See iSNS

interoperability

configuring interop mode 1 37-11

description 37-8

verifying status 37-12

VSANs 26-12

interop modes

configuring mode 1 37-11

default settings 37-13

description 37-8

Inter-VSAN Routing. See IVR

Inter-VSAN Routing zones. See IVR zones

Inter-VSAN Routing zone sets. See IVR zone sets

invalidAttachment tooltip 69-16

invalidConfig tooltip 69-16

invalidFabricBindExh tooltip 69-16

inventories

managing 59-3

viewing details for switches 7-24

viewing details for VSANs 7-23

viewing information 7-31

viewing ISL information 7-28

viewing module details 7-26

viewing switch licenses 7-25

viewing zone information 7-30

Inventory tab

description 7-23

IOD. See in-order delivery

IP-ACLs

wizard 5-22

See also IPv4-ACLs; IPv6-ACLs

IP addresses

management interfaces 2-2

IP connections

active mode 48-25

initiating 48-25

passive mode 48-25

IP domain names

configuring for digital certificates 43-6

IPFC

configuration guidelines 51-5

description 51-5

errors caused by configuration 69-8

in-band access 2-12

in-band management 2-17

logging facility 63-2

IP filters

contents 42-2

restricting IP traffic 42-1

using IP-ACL Wizard (procedure) 42-5

IP routing

enabling 2-6, 2-10

IPsec

algorithms for authentication 44-6

configuring with FCIP Wizard (procedure) 48-9

crypto IPv4-ACLs44-21to 44-25

default settings 44-39

description 44-2

digital certificate support44-7to 44-10

enabling with FCIP Wizard (procedure) 44-10

fabric setup requirements 44-4

global lifetime values 44-37

hardware compatibility 44-4

licensing requirements 44-3

maintenance 44-37

prerequisites 44-3

RFC implementations 44-1

terminology 44-5

transform sets 44-25

transforms for encryption 44-6

unsupported features 44-4

viewing configuration (procedure) 44-11

IP security. See IPsec

IPS modules

CDP support 52-10

core dumps B-2

FCIP 48-2

port modes 52-4, 53-1

software upgrades 52-3

supported features 52-1

IPS port mode

description 52-4

IPS ports 50-8

modes 53-1

multiple connections 50-53

SPAN sources 62-3

IP storage services

default parameters 52-10

IP Storage services modules. See IPS modules

IPv4

configuring Gigabit Ethernet interfaces 53-2

default settings 53-6

description 53-1

transitioning to IPv6 54-15

IPv4-ACLs

adding entries 42-7

applying to interfaces 42-9, 42-10

configuration guidelines 42-2

creating complex IPv4-ACLs (procedure) 42-6

creating with IP-ACL Wizard (procedure) 42-5

crypto44-21to 44-25

crypto map entries 44-28

example configuration 42-11

FabricWare support D-2

guidelines for Gigabit Ethernet interfaces 53-6

reading dump logs 42-8

removing entries 42-8

IPv4 addresses

configuring fcalias members 30-20

configuring IPv6 and IPV6 protocol stacks 54-13

IPv6 protocol stacks 54-10

IPv4 default gateways

configuring 2-10, 12-11, 51-3

configuring mgmt0 interfaces 20-23

description 51-3

static routes (tip) 51-4

IPv4 default networks

description 51-4

IPv6

address types 54-3

configuring addressing 54-11

configuring IPv4 and IPv6 addresses 54-13

configuring management interfaces 51-3

default settings 54-15

description54-1to 54-11

dual IPv4 and IPv6 protocol stack applications, figure 54-11

dual IPv4 and IPv6 protocol stacks 54-10

dual IPv4 and IPv6 protocol stack technique, figure 54-10

enabling routing 54-11

enhancements over IPv4 54-1

ICMP 54-6

IPv6-ACL guidelines 54-14

neighbor discovery 54-7

path MTU discovery 54-7

router advertisement messages 54-9

router discovery 54-9

stateless autoconfiguration 54-9

static routes 54-13

transitioning from IPv4 54-15

IPv6-ACLs

guidelines for IPv6 54-14

IPv6 addresses

configuring 54-11

configuring fcalias members 30-2, 30-20

configuring IPv4 and IPV6 protocol stacks 54-13

formats 54-2

link-local type 54-4

multicast type 54-5

prefix format 54-3

unicast type 54-3

IPv6 neighbor discovery

advertisement messages 54-7

description 54-7

neighbor solicitation message, figure 54-8

solicitation messages 54-7

IPv6 routing

enabling 54-11

IPv6 static routes

configuring 54-13

IQN

formats 50-8

IQNs

formats 50-8

ISCSI

enforcing access control 50-27

iSCSI

access control50-24to 50-28

add initiator to zone database 50-25

advanced VSAN membershipadvanced VSAN membership 50-24

checking for WWN conflicts 50-19

compatible drivers 50-2

configuring50-1, 50-1to??, 50-4, ??to 50-56

configuring AAA authentication 50-28, 50-29

configuring ACLs 50-26

configuring VRRP 50-54

creating virtual targets 50-10

default parameters 50-75

discovery phase 50-27

drivers 50-2

enabling 50-4

error 50-15

Fabric Manager Client support 5-2

Fibre Channel targets50-7to 50-13

Gigabit Ethernet ports 52-4, 53-1

GW flagiSCSI

gateway device 50-16

HA with host without multi-path software 50-51

initiator idle timeoutinitiator idle timeout

iSCSIinitiator idle timeout

configuring with Fabric Manager     1

initiator name 50-30

initiator targets 50-6

IPS module support 52-2

IQNs 50-14

login redirect 50-37

LUN mapping for targets50-62to ??

MPS-14/2 module support 52-2

multiple IPS ports 50-53

PortChannel-based high availability 50-55

PortChannel-based high availabilityEthernet PortChannel-based high availability 50-55

protocol 50-2

requests and responses 50-3

restrict an initiator to a specific user name for CHAP authentication 50-30

routing 50-2

routing modes chartrouting modes chart for iSCSI 50-34

session creation 50-27

session limits 50-15

statically mapped initiators 50-35

tables in Fabric Manager 50-19

targets in Device Manager 50-9

transparent initiator mode 50-15

transparent mode initiator50-58to ??

users with local authentication 50-30

using iSCSI Wizard (procedure)50-5to 50-7

VSAN membership 50-22

VSAN membership example 50-23

VSAN membership for iSCSI interfaces 50-22, 50-23

wizard 5-22

zone name 50-7

iSCSI authentication

configuring 50-28, 50-43

configuring RADIUS (procedure) 50-31

external RADIUS servers 50-57

global override 50-29

local authentication 50-30

mechanisms 50-29

restricting on initiators 50-30

scenarios 50-56

setup guidelines 50-56

iSCSI-based access control 50-26

iSCSI devices

example membership in VSANs 50-23

iscsi-gw 50-20

iSCSI high availability

configuring50-50to 50-56

ISCSI hosts

VSAN membership 50-22

iSCSI hosts

initiator identification 50-14

initiator presentation modes 50-14

initiator presentation modesinitiator presentation modes 50-14

iSCSI initiators

configuring static IP address mapping 50-18

dynamic mapping 50-17

idle timeout 50-16

making dynamic WWN mapping static 50-19

proxy mode 50-20

statically mapped (procedure) 50-18

static mapping 50-17

transparent mode 50-15

WWN assignments 50-17

iSCSI interfaces

configuring50-14, 50-14to ??

configuring listener ports 50-32

configuring listener portsiSCSI

listener port 50-32

configuring QoS 50-32

configuring routing mode50-33to ??

configuring routing modesiSCS

configuring routing modesrouting modes 50-33

configuring TCP tuning parameters 50-32

creating 50-5

creatingiSCSI

creating interfaces 50-5

SPAN sources 62-3

VSAN membership 50-23

iSCSI LUs 50-8

iSCSI protocol 50-1

iSCSI server load balancing 50-35

iSCSI Server Load Balancing. See iSLB

iSCSI sessions

authenticationiSCSI

session authenticationauthentication

iSCSI session     1

iSCSI targets

advertising 50-12

dynamic importing 50-8

dynamic mapping 50-8

examples 50-12

secondary access 50-52

static importing 50-10

static importingstatic mappingiSCSI targets

static mapping 50-10

transparent failover 50-50

iSLB

activating zones 50-41, 50-42

auto-zoning 50-46

CFS support 13-2

committing configuration changescommitting configuration changes

iSLB 50-48

configuration distribution50-46to ??, 50-47

configuration limits 50-36

configuration prerequisites 50-36

configuring 50-35

configuring initiators and targets 50-41

configuring VRRP 50-45

configuring with Device Manager 50-37

configuring zones 50-41, 50-42

default settings 50-76

distributing configuration using CF 50-46

dynamic initiator mapping 50-40

enabling configuration distribution 50-47

initiator WWN assignment 50-35

load balancing algorithm50-45to ??

maximum initiators 50-36

static initiator configurationinitiator configuration

static iSLB 50-35

VSAN membership 50-40

zone set activation failed 50-42

iSlb

default settings 50-76

iSLB auto-zone feature 50-36

iSLB initiators 50-37

activating zones 50-42

assigning WWNs 50-39

configuring50-39to 50-43

configuring load balancing metrics 50-40

configuring zones 50-42

dynamic initiator mapping 50-40

VSAN membership 50-40

iSLB initiator targets

activating zones 50-42

configuring zones 50-42

description 50-41

iSLB sessions

authentication 50-43

authenticationiSLB

sessions authentication 50-43

maximum per IPS portiSLB

maximum sessions per IPS port 50-36

iSLB with CFS distribution 50-36

ISLs

graph past 24 hours performance 7-21

performance statistics 8-1

PortChannel links 23-1

statistics 60-3

viewing detailed inventory information 7-28

viewing performance information 7-15

iSMS servers

enabling 50-71

iSNS

CFS support 13-2

client registration 50-72

cloud discovery 50-73

configuring 50-73

configuring servers50-71to 50-73

description 50-67

ESI 50-72

iSNS cloud discovery

automatic 50-75

CFS distribution 50-75

description 50-73

enabling 50-74

initiating on-demand 50-74

iSNS profiles

creating 50-68

iSNS servers

configuration distribution 50-71

configuring ESI retry count 50-72

enabling 50-71

example scenario 50-70

isolated VSANs

description 26-8

displaying membership 26-9

IVR

activating topologies 29-17

AF IDs 29-15

auto-topology 29-6

border switch 29-4

border switch, guidelines 29-15

border switch configuration guidelines 29-15

border switches 29-4

configuring (procedure) 29-15

configuring logging levels 29-21

configuring without auto topology 29-13

configuring without IVR NAT 29-13

current VSANs 29-3

database merge guidelines 29-31

default settings 29-34

default zone policy 29-22

description 29-2

domain ID configuration guidelines 29-14

domain ID guidelines 29-14

edge switch 29-4

edge switches 29-4

edge VSANs 29-3

Fabric Manager Client support 5-2

features 29-3

Fibre Channel header modifications 29-4

FICON support B-2

interoperability 29-7

logging 29-21

modifying 29-9

native VSANs 29-3

paths 29-3

persistent FC IDs 29-19

read-only zoning 29-31

SDV limitations 27-8

service groups B-2

sharing resources 29-2

terminology 29-3

transit VSAN configuration guidelines 29-14

transit VSANs 29-3

virtual domains 29-18

VSAN topologies 29-6

wizard 5-21

zone communication 29-22

zones29-3, 29-22to ??

zone sets 29-3

Zone Wizard 29-7

IVR databases

merge guidelines 29-31

IVR logging

configuring levels 29-21

IVR NAT

auto-topology 29-6

border switch, guidelines 29-10

configuration guidelines 29-10

description 29-5

load balancing 29-5

modifying (procedure) 29-12

transit VSANs, guidelines 29-10

IVR persistent FC IDs

configuring 29-20

persistent 29-19

IVR topologies

CFS support 13-2

clearing manual entries 29-17

creating manually 29-15

manually activating 29-17

migrating from automatic mode to user-configured mode 29-18

recovering 29-29

IVR virtual domains

configuring 29-19

description 29-18

IVR zones

activating with force option 29-26

automatic creation 29-23

clearing database 29-31

configuring29-24to ??

configuring LUNs 29-30

configuring QoS attributes 29-30

configuring with IVR Zone Wizard 29-7

description 29-3, 29-22

differences with zones (table) 29-22

downgrading considerations 29-31

LUN zoning 29-30

maximum number of members 29-4

maximum number of zones 29-4

recovering the full database 29-28

renaming 29-30

IVR zone sets

configuring29-24to ??

description 29-3, 29-22

downgrading considerations 29-31

maximum number 29-4

renaming 29-30

J

Java

execution failures 69-6

java.lang.ArrayIndexOutOfBoundsException errorArrayIndexOutOfBoundsException error 69-7

Java RMI

ports used 2-39

Java Runtime Environment. See JRE

Java Web Start

checking installation 69-3

clearing the cache 69-6

Fabric Manager support 2-19

hangs on the download dialog 69-5

not detected 69-4

running from command line 69-5

setting up on *.jnlp files 69-5

jitter

configuring estimated maximum in FCIP profiles 48-21

JNLP

verifying settings 69-3

JRE

Fabric Manager requirements 7-4

jumbo frames. See MTUs

K

keepalive timeouts

configuring in FCIP profiles 48-19

kernel core dumps

configuring B-3

kickstart images

description 15-2

KICKSTART variable 15-1

selecting for supervisor modules 15-2

Konqueror

configuring for Java Web Start 69-5

L

latency

forwarding 50-33

LEDs

beacon mode states 20-14

speed 20-14

license key files

description 10-2

installing 10-10

obtaining 10-9

updating 10-9

licenses

backing up files B-1

claim certificate 10-2

description 10-1

displaying information 10-16

enterprise package 10-4

expiry alerts 10-15

extended BB_credits 20-22, 22-15

Fabric Manager 69-23

Fabric Manager Server 10-17

Fabric Manager Server package 10-6

factory-installed 10-9

feature-based 10-3

features supported (table) 10-4

grace period alerts 10-15

grace period expiration 10-15

high availability 10-8

identifying features in use 10-13

installation options 10-8

installing manually 10-9

installing using Device Manager 10-12

installing using License Wizard 10-11

installing with License Wizard 10-11

key files10-9to 10-13

mainframe package 10-6

module-based 10-3

moving between switches B-1

obtaining 10-9

on-demand port activation 11-1

One-Click License Install failed 69-9

PAK 10-2

SAN extension package 10-5

Storage Services Enabler package 10-7

terminology 10-1

transferring between switches 10-16

uninstalling 10-14

unsupported features B-1

updating 10-14

viewing in Device Manager 10-16

viewing in Fabric Manager 10-16

viewing in Fabric Manager Web Services 10-17

viewing switch information 7-25

viewing with Fabric Manager Web Server (procedure) 10-17

wizard 5-22

limits

description (table) i-lxx, E-1

line cards. See switching modules; services modules

link costs

configuring for FSPF 32-7

description 32-6

linkFailCreditLossB2B tooltip 69-16

linkFailCreditLoss tooltip 69-16

linkFailDebounceTimeout tooltip 69-16

linkFailLineCardPortShutdown tooltip 69-16

linkFailLinkReset tooltip 69-16

linkFailLIPF8Rcvd tooltip 69-16

linkFailLIPRcvdB2B tooltip 69-16

linkFailLossOfSignal tooltip 69-16

linkFailLossOfSync tooltip 69-16

linkFailLRRcvdB2B tooltip 69-16

linkFailNOSRcvd tooltip 69-16

linkFailOLSRcvd tooltip 69-16

linkFailOPNyRETB2B tooltip 69-16

linkFailOPNyTMOB2B tooltip 69-16

linkFailPortInitFail tooltip 69-16

linkFailPortUnusable tooltip 69-16

linkFailRxQOverFlow tooltip 69-16

linkFailTooManyINTR tooltip 69-16

link failures

protection against 17-1

reason codes C-1

recovering 67-1

linkFailure tooltip 69-16

Link Incident Records. See LIRs

link-local addresses

description 54-4

format, figure 54-4

link redundancy

Ethernet PortChannel aggregation 52-9

Linux 2-31

Fabric Manager support 2-19

installing Fabric Manager Web Services 7-4

install scripts 2-31

LIRs

description 36-27

load balancing 50-35, 50-37

attributes 26-11

attributes for VSANs 26-5

configuring 26-11

description 23-4, 26-11

FSPF (example) 48-5

PortChannels 23-1

PortChannels (example) 48-5

weighted 50-40

load metric 50-40

lock the fabric 50-48

log files

configuring 63-6

default names 63-6

description 70-3

sizes 63-6

logging

default settings 63-11

disabling 63-3

enabling 63-3

message severity levels 63-3

logical unit numbers. See LUNs

logins

failure recovery 69-6

SSH 41-4

Telnet 41-4

logs

increasing log window size 69-10

RMON 61-18

SNMP events 40-12

viewing information 7-56

viewing using Device Manager 59-4

viewing using Fabric Manager Web Server 59-3

loopbackDiagFailure tooltip 69-17

loopbackIsolation tooltip 69-17

loopback tests

configuring frequency B-3

external 70-7

loops

monitoring B-3

LUN 50-8

trespass for storage port failover 50-53

LUN mapping 50-52

iSCSI50-62to ??

LUNs

explicit access control 50-20

IVR zoning 29-30

mapping and assignment 50-20

LUN zoning

configuring 30-37

description 30-36

LUs 50-7, 50-8

M

MAC addresses

configuring secondary 37-6, 68-23

mainframe package licenses

description 10-6

mainframes

FICON parameters 36-22

VSAN clock 36-22

management

role-based 5-21

management access

configuring in-band2-8to 2-12

configuring out-of-band2-4to 2-8

description 2-12

in-band 2-3

out-of-band 2-3

management interfaces

configuring 20-23, 20-24, 51-3

configuring for IPv6 51-3

default settings 20-26

features 20-24

IP addresses 2-2

See also mgmt0 interfaces

management protocols

supported (table) 2-15

map preferences

Automatically Save Layout default 5-19

Detach Overview Window default 5-19

Display End Device Labels default 5-19

Display End Devices default 5-19

Display Unselected VSAN Members default 5-19

Expand Loops default 5-19

Expand Multiple Links default 5-19

Layout New Devices Automatically default 5-19

Open New Device Manager Each Time default 5-19

Override Preferences for Non-default Layout default 5-19

Select Switch or Link from Table default 5-19

Use Quick Layout when Switch has >=30 End Devices default 5-19

maps

black squares 69-13

brown squares 69-13

clearing license orange X 69-23

clearing topologies 69-21

color definitions 69-13

default preferences 5-19

freezing the layout look 69-12

green squares with mode 69-13

grouping end devices 5-20

highlighting 5-14

icon descriptions 5-12

light gray squares 69-13

module warnings 69-13

no squares 69-13

orange crosses 69-13

orange squares with mode 69-13

purging down elements 5-15

red crosses 69-13

red line through switches 69-13

red squares 69-13

refreshing 5-15

saving 5-14

shows two switches when only one 69-12

tab descriptions 5-13

upgrade software without losing map settings 69-18

viewing large 5-14

Visio diagrams 5-15

maps module failuresmaps

fan failuresmaps

power supply failures 69-13

maximum retransmissions

configuring in FCIP profiles 48-19

McAfee Internet Suite 6.0 Professional

Device Manager installation failures 69-7

Fabric Manager installation failures 69-7

McData

native interop mode 37-8

MD5 authentication

IKE 44-7

IPsec 44-6

VRRP 51-12

merged fabrics

autoreconfigured 25-7

merge status conflictsiSLB

merge status conflictsCFS

merge status conflicts 50-49

Message Authentication Code using AES. See AES-XCBC-MAC

Message Digest 5. See MD5 authentication

messages

selecting severity level 7-44

mgmt0

out-of-band management 2-17

mgmt0 interfaces

configuring 12-10, 20-23, 20-24

configuring out-of-band access 2-6

default settings 20-26

features 20-24

local IPv4 routing 51-5

out-of-band access 2-12

Microsoft Challenge Handshake Authentication Protocol. See MSCHAP

minimum retransmit timeouts

configuring in FCIP profiles 48-19

modems

configuring settings B-1

module configurations

preserving B-2

purging B-2

saving to NVRAM 19-7

modules

configuring message logging 63-5

connecting to B-2

displaying temperatures 18-11

preserving the configuration 19-7

replacing 15-15

resetting 19-5

state descriptions 19-4

temperature monitoring 18-10

verifying status 12-2, 19-3

module tests

configuring B-3

monitoring traffic

SPAN 62-6

Mozilla

configuring for Java Web Start 69-5

MPS-14/2 modules 50-1, 50-2, 50-3, 50-5, 50-20, 50-27

CDP support 52-10

configuring extended BB_credits 20-22

FCIP 48-2

port modes 52-4, 53-1

software upgrades 52-3

supported features 52-1

MSCHAP

description 41-25

MTU frame sizes

configuring Gigabit Ethernet interfaces 52-5

MTUs

configuring frame sizes 53-3

configuring size

path discovery for IPv6 54-7

multicast addresses

IPv6 alternative to broadcast addresses 54-6

IPv6 format, figure 54-5

IPv6 solicited-node format, figure 54-6

multicast root switches

configuring 32-14

description 32-14

multi-path software example 50-51

multiple fabrics 59-3

managing 69-23

multiple VSANs

configuring 51-7

Multiprotocol Services modules. See MPS-14/2 modules

mutual CHAP authentication

configuring for iSCSI 50-30

configuring for iSLB 50-43

configuring for iSLBI 50-43

N

name servers

displaying database entries 34-3

interoperability 37-10

LUN information 35-1

proxy feature 34-2

registering proxies 34-2

rejecting duplicate pWWNs 34-3

NASB

configuring (procedure) 58-5

default settings 58-6

NAT. See IVR NAT

native VSANs

description 29-3

Network-Accelerated Serverless Backup. See NASB.

Network Address Translation. See IVR NAT

network administrator roles

FabricWare D-2

network administrators

additional roles 41-3

permissions 41-3

network monitoring

device discovery 59-1

mapping topologies 59-1

network operator roles

FabricWare D-2

network operators

permissions 41-3

Network Time Protocol. See NTP

NICs

manually specifying for Device Manager 69-20

manually specifying for Fabric Manager Client 69-20

manually specifying for Fabric Manager Server 69-20

NL ports

hard zoning 30-25

interface modes 20-7

zone enforcement 30-25

node world wide names. See nWWNs

nondisruptive upgrades

methods 15-5

None authentication 50-28

nonparticipating codes

description 20-10

nonParticipating tooltip 69-17

nonvolatile storage

bootflash: 16-2

notifications

adding forwards 7-43

conditions for sending 7-53

removing forwards 7-44

NPIV

configuring B-2

NP links 21-3

N-Port identifier virtualization. See NPIV

N ports

hard zoning 30-25

zone enforcement 30-25

zone membership 30-2

See also Nx ports

NL ports

See also Nx ports

NP-ports 21-3

NPV

wizard 5-22

NPV, configuring 21-7

NPV mode 21-3

ntop freeware

batch files 9-5

modifying launch scripts 9-5

NTP

CFS support 13-2

configuration guidelines 12-5

configuring12-4to 12-10

configuring CFS distribution 12-8

configuring with CFS 12-8

logging facility 63-2

time-stamp option 48-25

NTP peers

deleting 12-7

editing 12-6

NTP servers

configuring 2-7

deleting 12-7

editing 12-6

nWWNs

DPVM 28-1

Nx ports

FCS support 65-1

See also N ports; NL ports

O

offline tooltip 69-17

OHMS

configuring B-3

description 70-6

ohmsExtLBTest tooltip 69-17

On-Demand Port activation license

acquiring for ports 11-6

checking status of licenses 11-4

configuring11-4to ??

description 11-1

making ports eligible 11-5

port licensing 11-2

port naming conventions 11-2

Online Certificate Status Protocol. See OCSP

Online Health Management System. See OHMS

Opera

configuring for Java Web Start 69-5

operational states

configuring on Fibre Channel interfaces 20-12

description 20-7

OSCP

support 43-5

other tooltip 69-17

out-of-band access

mgmt0 interfaces 2-12

out-of-band management

configuring 2-4, 2-10

Ethernet connection 2-17

out-of-service interfaces

description 22-7

overlay VSANs

configuring 51-6

description 51-6

oversubscription

diagnosing with Device Manager 68-14

disabling restrictions 22-24

enabling restrictions 22-25

Generation 2 switching modules 22-23

ratios 22-23

P

PAA

description 68-2

troubleshooting tools 68-2

PAA-2s

Cisco Traffic Analyzer 9-3

description 9-2

PAAs

compared with PAA-2s 9-3

packets

discarding in FCIP 48-25

parentDown tooltip 69-17

pass-thru routing mode 50-33, 50-34

passwords

administrator 2-2

assigning using Fabric Manager 5-21

DHCHAP 45-7, 45-8

recovering 7-39

setting administrator default 2-4, 2-9

path MTUs. See PMTUs

pcAnyWhere

replacing with DirectX 69-6

stopping 69-6

PDU 50-33

peerFCIPPortClosedConnection tooltip 69-17

peerFCIPPortResetConnection tooltip 69-17

performance

configuring collections 7-50

customizing reports 7-33

custom monitoring 7-21

data 8-3

event triggers 8-2

graphs 60-6

historical monitoring 60-4

host-optimized port groups 60-6

ISL statistics (procedure) 60-3

monitoring 8-1

monitoring in Device Manager (procedure) 60-1

per-port monitoring (procedure) 60-2

real-time monitoring 60-1

summary reports 60-6

tables 60-6

using thresholds 8-2, 60-4

viewing future predictions 7-20

viewing summaries 7-13

performance buffers

configuring 20-21

description 20-21

performance collections

adding 7-50

configuring thresholds 7-53

removing 7-51

Performance Manager

architecture 8-1

authentication 4-4

configuring data collection 8-3

configuring flows 8-3

configuring with Traffic Analyzer 60-9

creating collections 60-4

creating flows 60-4

data collection 8-2

data interpolation 8-2

description 2-15

shows as disabled service 69-6

thresholds 60-4

using thresholds 8-2

verifying collections 3-3

viewing reports 60-5

wizard for configuring 60-5

Performance Manager reports

exporting as CSV 60-8

exporting as XML 60-7

generating top 10 60-7

viewing events 60-6

viewing graphs 60-6

viewing host-optimized port group performance 60-6

viewing summary reports 60-6

viewing tables 60-6

Performance tab

description 7-12

persistent domain ID

FICON VSANs 47-3

persistent FC IDs

configuring 25-17

description 25-17, 29-19

enabling 25-17

purging 25-21

Ping Tool

troubleshooting tools 68-7

PKI

enrollment support 43-4

PLOGI

name server 34-3

PMTUs

configuring in FCIP profiles 48-20

polling periods

changing 3-7

port addresses

FICON 36-11

Port Analyzer Adapters. See PAAs

Port Analyzer Adapters 2. See PAA-2s

portBindFailure tooltip 69-17

portBlocked tooltip 69-17

PortChannel

interfaces 50-12

subinterfaces 50-12

portChannelMembersDown tooltip 69-17

PortChannel modes

description 23-11

PortChannel Protocol

autocreation 23-18

configuring autocreation 23-19

converting autocreated groups to manually configured 23-19

creating channel group 23-17

description 23-16

enabling autocreation 23-19

PortChannels

32-port switching module configuration guidelines 23-2

adding interfaces 23-13, 23-14

administratively down 20-10

comparison with trunking 23-3

compatibility checks 23-14

compatibility with DHCHAP 45-3

configuration guidelines 23-8

configuring23-6to ??

configuring auto-create 2-11

configuring for FCIP high availability 48-5

configuring using Device Manager 6-7

creation dialog box too small 69-8

default settings 23-20

deleting 23-12

deleting interfaces 23-16

description 23-1

down states C-2

examples 23-2

FICON support 36-5

forcing interface additions 23-15

Generation 2 switching module interfaces 22-17

high availability 17-1

incompatible modes C-2

incompatible remote switch C-2

incompatible speeds C-2

in-order guarantee 32-17

interface states 23-14

interoperability 37-9

IQN formats 50-8

link changes 32-17

link failures 32-3

load balancing 23-4

load balancing (example) 48-5

logging facility 63-2

member combinations 52-9

misconfiguration error detection 23-8

redundancy 48-7

reserving ports for FICON 36-13

SPAN sources 62-3

verifying configurations 23-20

wizard 5-21

portFabricBindFailure tooltip 69-17

portGracefulShutdown tooltip 69-17

port groups

assigning extended BB_credits 20-22

description 22-2

Generation 2 Fibre Channel switching modules 22-2

host-optimized performance 60-6

port indexes

description 22-16

port modes

auto 20-7

description20-3to 20-7

IPS 52-4, 53-1

port rate limiting

configuring 66-11

default 66-12

description 66-11

hardware restrictions 66-11

port rate modes

configuring 22-22

dedicated 22-6

description 22-4

oversubscribed 22-6

shared 22-6

See also rate modes

ports

aggregation 17-1

disabling using Device Manager 6-7

enabling using Device Manager 6-7

on-demand port activation licensing 11-1

virtual E 48-2

VSAN membership 26-7

Port Security

wizard 5-22

port security

activating 46-10

activation 46-3

activation rejection 46-11

auto-learning 46-2

CFS support 13-2

cleaning up databases 46-24

compatibility with DHCHAP 45-3

configuration guidelines 46-3

configuring CFS distribution46-19to 46-21

deactivating 46-10

default settings 46-25

deleting entries from database (procedure) 46-18

disabling 46-9

displaying settings (procedure) 46-13

displaying statistics (procedure) 46-13

displaying violations (procedure) 46-13

enabling 46-9

enforcement mechanisms 46-2

fabric binding comparison 47-1

forcing activation 46-11

license requirement 46-2

manual configuration guidelines 46-4

preventing unauthorized accesses 46-1

unauthorized accesses prevented 46-1

WWN identification 46-17

port security auto-learning

description 46-2

device authorization 46-15

disabling 46-15

distributing configuration 46-20

enabling 46-14

guidelines for configuring with CFS 46-3

guidelines for configuring without CFS 46-4

port security databases

cleaning up 46-24

copying 46-23

copying active to config (procedure) 46-12

deleting 46-24

interactions 46-22

manual configuration guidelines 46-4

merge guidelines 46-21

reactivating 46-12

scenarios 46-22

port speeds

configuring 20-12

configuring on Generation 2 switching module interfaces 22-21

port swapping. See FICON port swapping

port tracking

default settings 67-6

description 67-1

enabling 67-3

guidelines 67-2

monitoring ports in a VSAN 67-6

multiple ports 67-5

shutting down ports forcefully 67-6

portVsanMismatchIsolation tooltip 69-17

port world wide names. See pWWNs

power cycling

modules 19-6

powering off

switching modules 19-8

power supplies

configuration guidelines18-5to 18-7

configuring modes 18-4

configuring power attributes 18-5

default state 18-12

displaying configuration 18-5

power usage

displaying 18-3

preferences

Confirm Deletion default 5-18

default 5-18

Device Manager 6-8

Export Tables with Format default 5-18

Fabric Manager Clients 5-18

Show CFS Warnings default 5-18

Show Device Name by default 5-18

Show End Device Using default 5-18

Show Shortened iSCSI Names default 5-18

Show Timestamps as Date/Time default 5-18

Show WorldWideName (WWN) Vendor default 5-18

Telnet Path default 5-18

Use Secure Shell instead of Telnet default 5-18

preshared keys

RADIUS 41-8

TACACS+ 41-15

principal switches

assigning domain ID 25-10

processes

nondisruptive restarts 17-1

restartability 17-3

product IDs

displaying 18-1

promiscuous mode

configuring Gigabit Ethernet interfaces 52-6, 53-4

protocol 50-1

Protocol Analyzer

description 68-2

troubleshooting tools 68-2

using for troubleshooting 68-3

protocols

analyzing 68-17

VRRP 50-8

proxies

registering for name servers 34-2

proxy initiator

configuringiSCSI

configuring proxy initiator 50-21

proxy initiator mode 50-14, 50-25

configuring 50-20

zoning 50-22

proxy initiator modeiSCSI

proxy initiator mode 50-20

Public Key Infrastructure. See PKI

pWWNs

configuring fcalias members 30-20

converting dynamic to static 50-19

DPVM 28-1

rejecting duplicates 34-3

zone membership 30-2

Q

QoS

class maps 66-6

comparison with VSANs 66-5

control traffic support 66-3

creating class maps 66-7

data traffic support66-4to 66-10

default settings 66-12

description 66-1

DSCP value 48-28

DWRR queues 66-8

enabling control traffic 66-3

example data traffic configuration 66-10

logging facilities 63-2

port rate limiting 66-11

service policies 66-8

wizard 5-22

QoS values

configuring 50-32

R

R_A_TOV

default setting 68-25

modifying 68-15

RADIUS 50-57

AAA authentication 50-28, 50-43

AAA protocols 41-1

CFS merge guidelines 41-24

CFS support 13-2

clearing configuration distribution sessions 41-24

configuring an iSCSI RADIUS serveriSCSI

configuring a RADIUS server 50-31

configuring Cisco ACS41-26to 41-30

configuring test idle timer 41-11

configuring test user name 41-11

default settings 41-31

description 41-7

discarding configuration distribution changes 41-23

enabling configuration distribution 41-22

FabricWare support D-2

setting preshared keys 41-8

specifying server at user login 41-12

specifying time-out 41-9

starting a distribution session 41-22

rate limiting

default settings 66-12

rate modes

configuring on Generation 2 switching module interfaces 22-22

See also port rate modes

rcfInProgres tooltip 69-17

RCFs

description 25-3

incoming 25-6

rejecting incoming 25-7

read-only zones

configuration guidelines 30-38

configuring 30-39

default settings 30-45

description 30-38

reason codes

description 20-8

description (table) C-1

receive buffer groups. See buffer groups

receive data field sizes

configuring 20-13

reconfigure fabric frames. See RCFs

recovering passwords 39-19

recovery

from powered-down state 22-17

passwords 7-39

Red Hat Linux

Fabric Manager Server 3-1

redundancy

Ethernet PortChannels 48-6, 48-7

Fibre Channel PortChannels 48-7

VRRP 48-6

VSANs 26-4

redundancy states

value descriptions 17-4

redundant physical links

example (figure) 32-3

Registered Link Incident Reports. See RLIRs

Registered State Change Notifications. See RSCNs

reloading

switches 19-5

remote AAA server

delayed authentication 4-2

Remote Capture Protocol. See RPCAP

remote file systems

accessing B-2

remote SPAN

configuring B-2

Resource Allocation Time Out Value. See R_A_TOV

Resource Manager Essentials. See RME

resources

management 2-17

retransmitting intervals

configuring for FSPF 32-9

description 32-8

RLIRs

description 36-27

displaying information (procedure) 36-27

RME

support 1-6

RMON

alarms 61-1

configuring using Threshold Manager 61-1

default settings 61-19

defining an event (procedure) 61-17

description 61-1

enabling alarms 61-2

enabling alarms (procedure) 61-8, 61-10, 61-14

events 61-1

setting alarms (procedure) 61-3, 61-4, 61-5

viewing alarms (procedure) 61-18

viewing logs (procedure) 61-18

role-based management

controlling access 5-21

roles

adding web services roles 7-48

CFS support 13-2

default permissions 41-3

deleting (procedure) 39-3

privileges 5-21

removing web services roles 7-50

user profiles 41-3

round-trip response time

monitoring 9-3

route costs

computing 32-6

router discovery

IPv6 54-9

routing

multicast 32-14

See also broadcast routing

See also IP routing

RPCAP

Ethereal communication 68-18

RRD

configuring database 7-54

rsa1 key pairs

generating 39-15

RSA key-pairs

deleting 43-16

description 43-2

exporting 43-5, 43-14

generating 43-6

importing 43-5, 43-14

multiple 43-4

rsa key pairs

generating 39-15

RSCNs 50-16

clearing statistics 34-7

default settings 34-8

description 34-5

displaying information 34-5

logging facility 63-2

multiple port IDs 34-6

RSCN timers

CFS support 13-2

RSPAN

configuring B-2

running configuration files

saving to startup configuration file 16-8

runtime checks

static routes 32-12

S

SACKs

configuring in FCIP profiles 48-20

SAN extension package licenses

description 10-5

SAN extension tuner

configuring 49-2, B-2

data patterns 49-3

default settings 49-6

description 49-1

license requirements 49-3

tuning guidelines 49-2

SAN operating system. See Cisco MDS SAN-OS

SANTap

creating CVTs 57-4

creating DVTs 57-6, 57-9

default settings 57-10

deleting CVT 57-5

deleting DVTs 57-8

description57-1to 57-3

enabling 57-3

SAs

establishing between IPsec peers 44-28

lifetime negotiations 44-30

refreshing 44-20

setting lifetime 44-31

scalability

VSANs 26-4

schedulers. See command schedulers

SCP

support 2-15

scripts

FMServer.sh 2-31

SCSI

displaying LUN discovery results 35-3

monitoring frame counts 9-3

monitoring I/Os per second 9-3

monitoring read throughput 9-3

monitoring traffic throughput 9-3

routing requests 50-2

traffic reports 68-3

SCSI flow configuration clients

description 55-3

SCSI flow data path support

description 55-3

SCSI flow managers

description 55-2

SCSI flow services

CFS support 13-2

configuring55-3to??, 55-3to 55-6

configuring (procedure) 55-4

default settings 55-8

description 55-1

functional architecture (figure) 55-2

SCSI flow configuration clients 55-3

SCSI flow data path support 55-3

SCSI flow managers 55-2

SCSI flow statistics

clearing (procedure) 55-8

default settings 55-8

description 55-6

enabling 55-7

SCSI LUNs

customized discovery 35-2

discovering targets 35-1

displaying information 35-3

starting discoveries 35-2

SCSI sessions

monitoring status 9-3

SCSI traffic

analysis 68-2

analyzing at LUN level 68-2

SD port mode

description 20-6

interface modes 20-6

SD ports

bidirectional traffic 62-12

characteristics 62-5

Cisco Traffic Analyzer 9-4

configuring 20-12

configuring for SPAN monitoring 62-6

monitoring bidirectional traffic 62-12

SDV

IVR limitations 27-8

secondary MAC addresses

configuring 37-6

Secure Hash Algorithm. See SHA-1

Secure Shell Protocol

See SSH

Secure Shell Protocol. See SSH

security

accounting 41-3

managing on the switch 41-1

security associations. See SAs

security control

local 41-2

remote 41-2, 41-14

remote AAA servers 41-7

security parameter index. See SPI

selective acknowledgments. See SACKs

sensors

temperature monitoring 18-10

serial console ports

accessing switches 2-12

serial IDs

description 64-24

serial numbers

displaying 18-1, 18-3

server groups

configuring 41-20

service policies

defining 66-8

enforcement 66-8

services

restarting 7-39

starting 7-39

stopping 7-39

services modules

description 19-3

managing 19-1

power cycling 19-6

replacing 15-15

resetting 19-5

state descriptions 19-4

verifying status 19-3

setup command

using 2-12

SFPs

displaying transmitter types 20-16

not present reason codes C-1

transmitter types 20-16

SFTP

support 2-15

SHA-1

IKE 44-7

IPsec 44-6

shared rate mode

description 22-6

migrating from dedicated rate mode 22-19

migrating to dedicated rate mode 22-19

oversubscription 22-23

shell scripts

$HOME/.cisco_mds9000/bin directory 69-4

DeviceManager.sh 69-4

FabricManager.sh 69-4

for uninstalling Fabric Manager 2-40

shortcuts

not visible on desktops 69-4

site IDs

description 64-23

small computer system interface. See SCSI

SMARTnet

Call Home AutoNotify registration 64-2

SMTP

assigning contact names 64-4

server address 64-11

SNMP

access control 40-2

access groups 40-3

adding communities 40-7

assigning contact 40-2

assigning location 40-2

configuring event security 40-12

configuring event security (procedure) 40-12

configuring notification target users 40-11

creating users 40-4

default settings 40-13

deleting communities 40-7

deleting community strings (procedure) 40-8

enabling access 2-6

enabling SNMP notifications 40-10

encryption-based privacy 40-4

FICON control 36-22

group-based access 40-3

modifying users 40-4

port used 2-39

proxy services 2-14

read-only access 40-7

read-write access 40-7

security features 41-2

server contact name 64-3

users with multiple roles (procedure) 40-6

user synchronization with CLI 40-3

Version 3 security features 40-1, 40-2

versions supported 40-1

viewing event log 40-12

See also SNMPv1; SNMPv2c; SNMPv3

SNMP_TRAP

port used 2-39

SNMP community strings

configuring 2-9

SNMP manager

FCS 65-2

SNMP preferences

Enable Audible Alert when Event Received default 5-19

Retry request 1 time(s) after 5 sec timeout default 5-19

Trace SNMP packets in Log default 5-19

SNMPv1

community strings 40-2

description 40-2

FabricWare support D-2

support 2-16

See also SNMP

SNMPv2

community strings 40-2

FabricWare support D-2

SNMPv2c

configuring notifications 40-9

description 40-2

support 2-16

See also SNMP

SNMPv3

assigning multiple roles 40-6

CLI user managementSNMPv3

AAA integration 40-2

configuring notifications 40-10

description 40-2

enforcing message encryption 40-5

restricting switch access 40-3

security features 40-2

specifying cisco-av-pair 41-13

support 2-16

See also SNMP 40-2

software configuration

overview1-6to 1-9

software images

default settings 15-16

selecting for supervisor modules 15-2

space requirements 15-4

synchronizing 17-4

upgrade prerequisites15-3to 15-5

upgrading SAN-OS images 15-1

variables 15-1

software installation

Software Installation Wizard 15-8

software upgrades

disruptive 15-5

mechanisms 15-5

nondisruptive 17-1

Software Installation Wizard 15-8

soft zoning

description 30-25

See also zoning

Solaris 2-31

Fabric Manager Server 3-1

installing Fabric Manager Web Services 7-4

install scripts 2-31

source IDs

Call Home event format 64-24

exchange based 23-5

flow based 23-4

in-order delivery 32-15

path selection 26-11

SPAN

configuration guidelines 62-6

configuring62-6to 62-10

configuring Fibre Channel analyzers 62-11

configuring on switch ports 9-4

conversion behavior 62-9

default settings 62-13

description 62-2

egress sources 62-2

Fibre Channel analyzers 62-10

filters 62-5

monitoring traffic 9-1, 62-2

SD ports 62-5

sessions 62-5

sources 62-4

sources for monitoring 62-2

VSAN sources 62-4

SPAN destination port mode. See SD port mode

SPAN filters

description 62-5

guidelines 62-5

SPAN ports

viewing detailed traffic information 7-19

SPAN sessions

deleting using Device Manager 62-9

description 62-5

VSAN filters 62-5

SPAN sources

editing with Device Manager 62-8

egress 62-2

ingress 62-2

interface types 62-3

IPS ports 62-3

VSANs configuration guidelines 62-4

SPAN traffic

real-time analysis 68-2

SPAN tunnel port mode. See ST port mode

special frames

enabling for FCIP 48-24

SPF

computational hold times 32-4

SPI

configuring virtual routers 51-12

srcPortNotBound tooltip 69-17

SSH

default service 39-17

enabling 2-7, 2-10

FabricWare support D-2

host key pair 39-15

logins 41-4

port used 2-39

support 2-15

SSH key pair

overwriting 39-17

SSH sessions

message logging 63-3

SSI boot images

configuring B-2

SSL certificates

using with Fabric Manager Web Services 7-5

SSMs

configuring Intelligent Storage Services 57-1

default settings 19-13

disabling Intelligent Storage Services (procedure) 55-5, 58-3

enabling Intelligent Storage Services (procedure) 55-3, 58-2

Fibre Channel write acceleration56-1to 56-3

managing B-2

NASB58-1to 58-7

provisioning 58-2

provisioning Intelligent Storage Services (procedure) 55-3

SANTap57-1to ??

SCSI flow services55-1to 55-8

SCSI flow statistics55-1to 55-8

standby supervisor modules

boot alert 15-14

boot variable version 15-14

copying image to B-2

managing bootflash: 15-14

monitoring 17-2

synchronizing 17-4

startup configuration files

saving running configuration file 16-8

unlocking B-2

statically imported iSCSI targets 50-52

static iSLB initiator

converting 50-40

static mapped iSCSI targetiSCSI

static mapped target 50-27

static mapping 50-39

static routes

configuring 2-6

runtime checks 32-12

static WWN mapping 50-25

statistics

SCSI I/O 9-3

supervisor modules 19-4

storage devices

access control 30-1

performance statistics 8-1

permanent 16-2

temporary 16-2

Storage Services Enabler package licenses

description 10-7

storage traffic

viewing performance information 7-16

store-and-forward routing mode 50-33, 50-34

ST port mode

description 20-6

interface modes 20-6

limitations 20-6

ST ports

interface modes 20-6

subnet masks

configuring mgmt0 interfaces 20-23

configuring switches 2-2

default setting 19-13

initial configuration 2-6, 2-10

subnets

requirements 52-6, 53-5

summary reports

description 7-1

Sun JRE

Fabric Manager support 2-19

Supervisor-1 modules

selecting software images 15-2

Supervisor-2 modules

description 1-2

Generation 1 chassis 15-15

select software images 15-2

USB ports 1-2

supervisor modules

active state 19-5

capturing local traffic 68-18

default settings 19-12

description 1-2, 19-1

high availability 17-1

managing standby bootflash: 15-14

manual switchovers 17-2

redundancy 17-1

replacing 15-14, 15-15

resetting 19-5

standby boot alert 15-14

standby state 17-4, 19-5

standby supervisor boot variable version 15-14

state descriptions 17-4, 19-4

statistics 19-4

switchover mechanisms 17-2

switchovers after failures 17-1

synchronizing 17-3

upgrading a dual supervisor switch B-1

verifying status 19-3

viewing using Device Manager 6-7

See also Supervisor 1 modules; Supervisor 2 modules

suspendedByMode tooltip 69-17

suspendedBySpeed tooltip 69-17

suspendedByWWN tooltip 69-17

swFailure tooltip 69-17

Switched Port Analyzer. See SPAN

switches

accessing 2-12

comparing configurations 68-4

displaying power usage 18-3

displaying serial numbers 18-3

initial setup 2-2

internal states 17-4

reloading 19-5

starting 2-1

starting up B-1

status of device health 68-3

upgrading with dual supervisors B-1

viewing license information 7-25

switching modules

description 19-3

managing 19-1

power cycling 19-6

powering off 19-8

preserving configuration 19-7

replacing 15-15

resetting 19-5

state descriptions 19-4

verifying status 19-3

viewing using Device Manager 6-7

switch management

architecture 2-16

in-band 2-17, 51-5

out-of-band 2-17

switch names

assigning 12-1

switchover mechanism

warm state 19-5

switchovers

characteristics 17-2

guidelines 17-3

initiating manually 17-2

supervisor modules 17-1

VRRP 48-6

switch port interfaces

configuring default 2-11

switch ports

configuring attribute default values 20-16

configuring trunk modes 2-11

switch priorities

configuring 25-5

default 25-5

description 25-5

switch security

default settings 39-23, 41-30

sWWNs

configuring for fabric binding 47-3

syslog

CFS support 13-2

port used 2-39

viewing information 7-10

viewing registration information 7-42

viewing with Events tab 7-8

syslog servers

verifying using Fabric Manager Web Services 63-10

system health

default settings 70-7

initiating B-3

system images

description 15-2

selecting for supervisor modules 15-2

SYSTEM variable 15-1

system messages

configuring log files 63-6

configuring logging 63-3

configuring logging servers 63-7

default settings 63-11

monitoring 63-1

severity levels 63-3

viewing 7-10

viewing from Device Manager 63-11

viewing from Fabric Manager Web Server 63-11

viewing using Device Manager 59-4

viewing using Fabric Manager Web Server 59-3

viewing with Events tab 7-8

system processes

displaying 70-1

T

tables

filtering 7-3

navigating 7-3

searching for information 7-3

TACACS+

AAA authentication 50-43

AAA protocols 41-1

CFS merge guidelines 41-24

CFS support 13-2

clearing configuration distribution sessions 41-24

configuring Cisco ACS41-26to 41-30

default settings 41-31

description 41-14

discarding configuration distribution changes 41-23

displaying server statistics 41-18

enabling configuration distribution 41-22

global keys 41-15

setting default server encryption 41-15

setting default server timeout 41-15

setting preshared key 41-15

specifying server at login 41-18

starting a distribution session 41-22

validating 41-17

tape acceleration

FICON36-33to 36-37

target discovery 50-72

TCP connections

FCIP profiles 48-4

specifying number 48-25

TCP parameters

configuring in FCIP profiles48-19to ??

TCP ports

IPv4-ACLs 42-3

TCP tuning parameters 50-32

Telnet

default service 39-14

enabling 2-7, 2-10

logins 41-4

port used 2-39

support 2-15

Telnet server connections

description 12-11

disabling 12-11

Telnet sessions

message logging 63-3

temperatures

displaying 18-11

major thresholds 18-10

minor thresholds 18-10

monitoring hardware 18-10

templates

creating for custom reports 7-33

modifying custom report templates 7-36

TE port mode

classes of service 20-6

description 20-6

TE ports

fabric binding checking 47-2

FCS support 65-1, 65-2

FSPF topologies 32-2

interoperability 37-9

recovering from link isolations 30-27

SPAN sources 62-3

trunking restrictions 24-1

terminals

configuring settings B-1

TFTP

port used 2-39

support 2-15

Threshold Manager

configuring RMON 61-1

thresholds

baselines for performance 8-2

time

configuring 12-3

time delays

setting B-2

timeouts

configuring with Fabric Manager 68-15

time out values. See TOVs

timers

configuring 68-15

timer values

modifying 68-14

timestamps

FICON host control 36-22

time zones

configuring 12-3

TL port mode

classes of service 20-5

description 20-5

TL ports

ALPA caches 20-19

configuring 20-12, 20-19

description 20-18

FCS 65-1, 65-2

FCS support 65-1, 65-2

logging facility 63-2

SPAN sources 62-3

tools

software configuration 1-5

tooManyInvalidFLOGIs tooltip 69-17

topologies

clearing maps 69-21

mapping 59-1

topology map

mapping multiple fabrics 59-3

topology maps

custom 59-2

description 59-1

enclosures 59-3

saving custom layouts (procedure) 59-2

tovMismatch tooltip 69-17

TOVs

configuring across all VSANs 37-2

configuring for a VSAN 37-3

default settings 37-13, 68-25

interoperability 37-9

ranges 37-2, 68-14

traceroute

description 68-7

troubleshooting connectivity 68-7

tracked ports

binding operationally 67-3

traffic

local captures 68-19

managing using Cisco Traffic Analyzer 9-2

monitoring using Cisco Traffic Analyzer 9-2

remote captures 68-18, 68-19

text-based captures 68-18

viewing captured frames 68-20

Traffic Analyzer. See Cisco Traffic Analyzer

traffic isolation

VSANs 26-4

transform sets

description 44-25

transient failure 50-16

transit VSANs

configuration guidelines 29-10

description 29-3, 29-17

IVR configuration guidelines 29-14

translative loop port mode. See TL port mode

transparent initiator mode 50-14

transparent initiator modeiSCSI

transparent initiator mode 50-20

traps

viewing registration information 7-42

Triple DES. See 3DEC encryption

troubleshooting

analyzing switch health 68-3

analyzing zone merges 68-8

CTC 48-18

Fabric Manager tools 5-22

locating other switches 68-13

monitoring oversubscription 68-14

show tech command 68-9

testing end-to-end connectivity 68-5

tools 68-1

using Fabric Configuration tool (procedure) 68-4

using Ping Tool 68-7

using traceroute (procedure) 68-7

with Cisco Traffic Analyzer 68-2

with Protocol Analyzer 68-3

troubleshooting reports

Cisco Traffic Analyzer 68-2

trunk-allowed VSAN lists

description24-4to 24-6

trunking

comparison with PortChannels 23-3

configuration guidelines 24-2

configuring modes 24-3

configuring using Device Manager 6-7

default settings 24-6

description 24-1

interoperability 37-9

link state 24-3

merging traffic 24-2

restrictions 24-1

trunking E port mode. See TE port mode

trunking mode

FCIP interface 48-4

trunking ports

associated with VSANs 26-8

trunking protocol

default settings 24-6

default state 24-2

description 24-2

detecting port isolation 24-2

trunk mode

configuring 24-3

default settings 24-6

status 24-3

trunkNotFullyActive tooltip 69-18

trust points

creating 43-8

description 43-2

multiple 43-3

saving configuration across reboots 43-14

U

UDP ports

IPv4-ACLs 42-3

UDP traffic

blocking 2-14

unique area FC IDs

configuring 25-19

description 25-19

UNIX

install scripts 2-31

launching Fabric Manager Web Services 7-7

UNIX issues

parent menus disappear 69-11

too many open files error 69-11

web browser cannot find web server 69-11

upgradeInProgress tooltip 69-18

upgrades. See disruptive upgrades; nondisruptive upgrades; software upgrades

upgrading

switches B-1

user accounts

creating additional at setup 2-5

User-based roles

FabricWare support D-2

user IDs

authentication 41-3

user profiles

role information 41-3

users

adding 7-47

CFS support 13-2

default 2-3

deleting (procedure) 39-14

removing 7-48

SNMP support 40-4

V

vendor-specific attributes. See VSAs

VE ports

description 48-2

FCIP 48-2

virtual E ports. See VE ports

virtual Fibre Channel host 50-3

virtual ISLs

description 48-2

Virtual LANs. See VLANs

virtual LANs. See VLANs

virtual router IDs. See VR IDs

Virtual Router Redundancy Protocol. See VRRP

Virtual Router Redundancy Protocolprotocols

Virtual Router Redundancy 50-35

virtual routers

adding 51-10

adding primary IP addresses 51-11

authentication 51-12

default settings 51-13

deleting 51-10

initiating 51-11

setting priorities 51-11

virtual SANs. See VSANs

Visio diagrams

saving maps as 5-15

VLANs

configuring on Gigabit Ethernet subinterfaces 53-5

description 52-6, 53-4

volatile:

description 16-2

VR IDs

description 51-9

mapping 51-9

VRRP 50-35

algorithm for selecting Gigabit Ethernet interfaces50-45to ??

backup switches 51-9

configuring advertisement time intervals 51-11

configuring for Gigabit Ethernet interfaces 52-9

configuring for iSLB 50-45

configuring virtual routers 51-10

default settings 51-13

description 51-9, 52-8

group members 52-8

initiating virtual routers 51-11

IQN formats 50-8

iSCSI parameter change impact 50-45

iSLB50-43to ??

logging facility 63-2

master switches 51-9

MD5 authentication 51-12

primary IP address 51-11

priority preemption 51-11

security authentication 51-12

setting priorities 51-11

setting priority 51-11

simple text authentication 51-12

VRRP group 50-23

VRRP-I f iSCSI login redirect 50-37

VSAN IDs

allowed list 24-6

description 26-5

multiplexing traffic 20-6

range 26-4

VSAN membership 26-4

vsanInactive tooltip 69-18

VSAN interfaces

configuring 20-24

creating 20-25

description 20-24

VSAN membership

iSCSI hosts 50-22

iSCSI hostsiSCSI

VSAN membership for hosts 50-22

iSCSI interfaces 50-23

vsanMismatchIsolation tooltip 69-18

VSANs

advantages 26-3

allowed-active 24-1

allowed list 62-4

broadcast addresses 32-14

clocks 36-22

comparison with QoS 66-5

comparison with zones (table) 26-4

compatibility with DHCHAP 45-3

configuring26-6to ??

configuring allowed-active lists 24-6

configuring FSPF 32-4

configuring multiple IPv4 subnets 51-7

configuring trunk-allowed lists24-4to 24-6

default settings 26-12

default VSANs 26-8

deleting 26-9

description26-1to 26-4

domain ID automatic reconfiguration 25-8

example membership for iSCSI devices 50-23

fabric optimization for FICON 36-3

FC IDs 26-1

FCS 65-1

FCS support 65-1

features 26-1

FICON-enabled 26-12

flow statistics 8-3

FSPF connectivity 32-2

gateway switches 51-4

interop mode 37-9

IP routing 42-1

IPv4 static routing 51-6

iSLB 50-40

iSLB initiators 50-40

isolated 26-8

load balancing 26-11

load balancing attributes 26-5

mismatches 20-10, C-2

multiple zones 30-5

names 26-5

name server 34-2

operational states 26-9

overlaid routes 51-6

port membership 26-7

port tracking 67-6

Rules and features 39-4

SPAN filters 62-5

SPAN source 62-4

SPAN sources 62-4

states 26-5

suspending for FICON 36-19

TE port mode 20-6

timer configuration 37-3

traffic isolation 26-3

traffic routing between 51-1

transit 29-17

trunk-allowed 24-1

trunking ports 26-8

VRRP 51-9

wizard 5-21

VSAN trunking. See trunking

VSAs

communicating attributes 41-13

protocol options 41-13

W

window management

configuring in FCIP profiles 48-20

Windows

Fabric Manager Server 3-1

Fabric Manager support 2-19

installing Fabric Manager Web Services 7-4

Windows issues

blue screen 69-10

Device Manager window content disappears 69-11

Fabric Manager window content disappears 69-11

icons disappear from desktop 69-11

printing causes an application crash 69-10

SCP/SFTP failures 69-11

text fields are too small 69-10

Windows XP hangs 69-10

Windows workstations

modifying 2-14

wizards

DPVM Wizard 5-22

FCIP Wizard 5-21

IP ACL Wizard 5-22

iSCSI Wizard 5-22

IVR Zone Wizard 5-21

License Install Wizard 5-22

NPV Wizard 5-22

PortChannel Wizard 5-21

Port Security Wizard 5-22

QoS Wizard 5-22

Quick Config Wizard 30-7

Software Install Wizard 5-22

VSAN Wizard 5-21

Zone Edit Tool Wizard 5-21

world wide names. See WWNs

WWNs

configuring 37-5, 68-23

displaying configurations 68-24

displaying information 37-6

link initialization 37-6

port security 46-17

secondary MAC addresses 37-6

static binding 50-20

suspended connection C-2

suspended connections 20-10

X

XML

support 2-16

XRC

FICON support 36-5

Z

zone aliases

conversion to device aliases 31-5

zone attribute groups

cloning 30-31

zone configurations

test for compatibility 68-8

zone databases

migrating a non-MDS database 30-32

zone members

adding to zones 30-14

converting to pWWN members 30-23

displaying information 30-19

zoneMergeFailureIsolation tooltip 69-18

zone policies

configuring 2-11

zoneRemoteNoRespIsolation tooltip 69-18

zones

access control 30-16

adding zone members 30-14

analyzing merges 68-8

assigning LUNs to storage subsystems 30-38

backing up (procedure) 30-29

changing from enhanced zones 30-41

cloning 30-31

compacting for downgrading 30-44

comparison with device aliases (table) 31-2

comparison with VSANs (table) 26-4

configuring30-10to 30-24

configuring aliases 30-20

configuring and activating for iSLB 50-41

configuring broadcasting 30-35

configuring fcaliases 30-20

default policies 30-2

default settings 30-45

differences with IVR zones (table) 29-22

displayed as bold 69-9

editing full zone databases 30-11

enforcing restrictions 30-25

exporting databases 30-27

features 30-1, 30-3

importing databases 30-27

iSLB 50-41, 50-42

IVR communication 29-22

logging facility 63-3

LUN-based 30-36

membership using pWWNs 26-4

merge failures 20-10

read-only for IVR 29-31

renaming 30-30

restoring (procedure) 30-29

troubleshooting tools 5-22

viewing information 30-39

viewing inventory information 7-30

wizard 5-21

See also default zones

See also enhanced zones

See also hard zoning; soft zoning

See also LUN zoning

See also read-only zones

See also zoning; zone sets

zone server databases

clearing 30-32

zone sets

activating 30-17

cloning 30-31

configuring30-15to 30-20

considerations 30-5

copying 30-28

creating 30-16

default settings 30-45

distributing configuration 30-25

enabling distribution 30-25

exporting 30-27

exporting databases 30-27

features 30-1

importing 30-27

importing databases 30-27

one-time distribution 30-26

recovering from link isolations 30-27

renaming 30-30

viewing information 30-39

See also active zone sets

See also active zone sets; full zone sets

See also zones; zoning

zone traffic priorities

description 30-33

zoning

configuring broadcasting 30-35

description 30-1

example 30-2

FabricWare support D-2

implementation 30-3

Quick Config Wizard30-7to 30-10

See also LUN zoning

See also zones; zone sets

zoning based access control

configuring for iSCSI 50-25

configuring for iSCSIiSCSI

configuring zoning based access control 50-25