Table Of Contents
Symbols - Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Z
Index
Symbols
* (asterisk)
autolearned entries 46-21
port security wildcard 46-17
port security wildcards 46-17
Numerics
12-port 4-Gbps switching modules
BB_credit buffers 22-12
configuration guidelines 22-20
default settings 22-31
See also switching modules
16-port switching modules
configuring BB_credits 20-20
LEDs 20-14
See also switching modules
24-port 4-Gbps switching modules
bandwidth fairness 22-26
configuration guidelines 22-19
default settings 22-31
example configurations 22-11
oversubscription 22-23
shared resources 22-7
See also switching modules
32-port switching modules
configuring BB_credits 20-20
PortChannel configuration guidelines 23-2
SPAN guidelines 62-6
See also switching modules
3DES encryption
IKE 44-7
IPsec 44-6
48-port 4-Gbps switching modules
bandwidth fairness 22-26
configuration guidelines 22-19
default settings 22-31
example configurations 22-10
oversubscription 22-23
shared resources 22-7
See also switching modules
4-port 10-Gbps switching modules
BB_credit buffers 22-13
configuration guidelines 22-20
default settings 22-31
See also switching modules
A
AAA
authentication process 41-6
authorization process 41-6
configuring information 7-47
default settings 41-30
description 41-1
DHCHAP authentication 45-10
distributing with CFS (procedure) 41-24
enabling server distribution 41-22
local services 41-26
remote services 41-4
service configuration options 41-4
setting authentication 41-26
starting a distribution session 41-22
AAA authentication
configuring 50-28, 50-29
AAA servers
groups 41-4
monitoring 41-5
remote authentication 41-4
access control
enforcingiSCSI
enforcing access control 50-27
iSCSI 50-26
Access Control Lists. See IPv4-ACLs; IPv6-ACLs
access controlzoning based access controliSCSI
zoning based access control 50-27
accounting
viewing lists 7-9
ACL based access control
configuring for iSCSI 50-26
ACLs
configuring for iSCSI 50-26
active zone sets
considerations 30-5
enabling distribution 30-25
adapters
Fibre Channel-to-Ethernet 9-2
adminDown tooltip 69-13
administrative speeds
configuring 20-12
administrative states
description 20-7
setting 20-11
administrator passwords
default 2-5
recovering 39-19
Admin tab
description 7-38
Advanced Encrypted Standard encryption. See AES encryption
advertised interfaces 50-12
advertisement packets
setting time intervals 51-11
AES encryption
description 40-4
IKE 44-6
IPsec 44-6
SNMP support 40-4
AES-XCBC-MAC
IPsec 44-6
AFIDs
configuring 29-12, 29-13
configuring default 29-12
description 29-4, 29-7, 29-15
aliases
switching between global device aliases and FC aliases 31-6
switching between global device aliases and fcaliases 3-8
using as enclosure names 5-20
using with Fabric Manager 3-8
ALPA caches
clearing B-2
description 20-19
displaying contents B-2
ANSI T11 FC-GS-3
support 2-16
applications
management 2-17
application virtual targets. See AVTs
ARP caches
clearing B-2
displaying B-2
authentication
CHAP option 50-57
configuring local with Device Manager 50-30
Fabric Manager Web Services 4-5
fabric security 45-1
guidelines 41-4
iSCSI setup 50-56
local 41-3, 50-30
MD5 51-12
mechanism 50-29
mutual CHAPmutual CHAP authentication 50-30
remote 41-3, 41-4
restricting iSLB initiatorinitiator authentication
restrictingiSLB
restricting iSLB initiators 1
simple text 51-12
user IDs 41-3
See also MD5 authentication
See also simple text authentication
authentication, authorization, and accounting. See AAA
autogenerated iSCSI targetiSCSI
autogenerated target 50-28
auto-negotiation
configuring Gigabit Ethernet interfaces 52-5, 53-3
autonomous fabric ID
See AFIDs
autonomous fabric identifiers. See AFIDs
AutoNotify
description 64-2
destination profile (note) 64-5
registration requirements 64-2
service contract requirements 64-3
auto port mode
description 20-7
interface configuration 20-3
autosensing speed
Generation 2 switching modules 20-13
auto-topology
configuration guidelines 29-10
IVR 29-6
modifying (procedure) 29-12
AVTs
description 57-2
B
bandwidth fairness
disabling 22-27
enabling 22-26
Generation 2 switching modules 22-26
BB_credit buffers
12-port 4-Gbps switching module allocations 22-12
12-port 4-Gbps switching module considerations 22-13
24-port 4-Gbps switching module allocations 22-11
24-port 4-Gbps switching module considerations 22-11, 22-12
48-port 4-Gbps switching module considerations 22-9
4-port 10-Gbps switching module allocations 22-13
4-port 10-Gbps switching module considerations 22-13, 22-14
allocation defaults (table) 22-9
BB_credits
configuring 20-20
description 20-20
FICON port swapping 36-32
reason codes 20-9, C-1
beacon modes
configuring 20-15
description 20-15
identifying LEDs 20-14
Berkeley Packet Filter library. See BPF library
bit errors
reasons 20-15
bit error thresholds
configuring 20-15
description 20-15
bitErrRTThresExceeded tooltip 69-13
bootflash:
description 16-2, 16-3
file system 15-2
recovering from corruption B-1
space requirements 15-3
system images 16-2
boot variables
synchronizing 17-3
border switches
description 29-4
IVR configuration guidelines 29-15
BPF library
description 68-21
See also libpcap freeware
B port mode
description 20-6
interface modes 20-6
B ports
configuring 48-27
interoperability mode 48-25
SAN extenders 48-26
bridge port mode. See B port mode
bridge ports. See B ports
broadcast
in-band addresses default 19-13
routing 32-14
Brocade
native interop mode 37-8
buffer pools
Generation 2 switching modules 22-8
buffer sizes
configuring in FCIP profiles 48-21
buffer-to-buffer credits. See BB_credits
build fabric frames
description 25-3
bundleMisCfg tooltip 69-13
C
Call Home
alert groups64-6to 64-8
AutoNotify feature 64-2
CFS support 13-2
configuration distribution 64-14
configuring64-3to 64-15
configuring e-mail options 64-11
configuring for EMC 64-16
contact information 64-3
database merge guidelines 64-15
default settings 64-19
description 64-1
destination profiles64-5to 64-6
duplicate message throttle 64-13
enabling 64-13
features 64-2
inventory notifications 64-11
message format options 64-2
RMON-based alerts 64-10
syslog-based alerts 64-9
testing communications 64-16
Call Home alert groups
configuring 64-6
customizing messages 64-7
description 64-6
Call Home destination profiles
attributes 64-5
description 64-5
Call Home messages
configuring levels 64-8
format options 64-2
Call Home notifications
full-txt format for syslog 64-17
XML format for RMON 64-18
XML format for syslog 64-17
CAs
authenticating 43-10
certificate download example 43-19
configuring43-6to 43-17
creating a trust point 43-8
default settings 43-37
deleting digital certificates 43-16
description43-1to 43-5
enrollment using cut-and-paste 43-4
example configuration43-17to 43-36
Fabric Manager Web Services 7-5
identity 43-2
maintaining 43-14
maximum limits 43-36
monitoring 43-14
multiple 43-4
multiple trust points 43-3
peer certificates 43-5
purpose 43-2
CDP
configuring12-12to 12-13
configuring hold times 12-13
configuring refresh time interval globally 12-13
disabling globally 12-12
disabling on interfaces 12-13
packet transmission interval 12-12
certificate authorities. See CAs
certificate revocation lists. See CRLs
CFS
application requirements 13-5
configuring for NTP 12-8
default settings 13-19
description13-1to 13-4
disabling on a switch 13-4
displaying configuration information 13-9
distribution modes 13-4
distribution over IP 13-10
distribution scopes 13-3
enabling on a switch 13-4
example configuration using Device Manager 13-19
example configuration using Fabric Manager 13-16
example using Fabric Manager 12-8
feature description 13-2
iSLB config distribution 50-46
merge support 13-9
merge support (procedure) 13-18
protocol description 13-3
SAN-OS features supported 13-2
saving configurations 13-8
CFS applications
clearing session locks 13-8
committing changes 13-7
discarding changes 13-8
enabling 13-6
enabling (procedure) 13-6
fabric locking 13-7
CFS over IP
default settings 13-19
description 13-10
CFS regions
assigning features 13-13
creating 13-13
deleting 13-15
description 13-12
moving a feature 13-14
removing a feature 13-15
usisng Fabric Manager 13-13
channelAdminDown tooltip 69-13
channelConfigurationInProgress tooltip 69-13
channelOperSuspended tooltip 69-13
CHAP authentication 50-28, 50-43, 50-57
CHAP challenge 50-30
CHAP response 50-30
CHAP user name 50-30
CIM
configuring 37-1, B-3
description 37-1
support 2-16
CIM servers
default settings 68-25
Cisco Access Control Server. See Cisco ACS
Cisco ACS
configuring for RADIUS41-26to 41-30
configuring for TACACS+41-26to 41-30
cisco-av-pair
specifying for SNMPv3 41-13
Cisco Discovery Protocol. See CDP
Cisco Fabric Service. See CFS
Cisco MDS 9000 Family
connecting a terminal 12-11
description 1-1
initial setup2-2to 2-12
starting a switch 2-1
Cisco MDS 9100 Series
Cisco MDS 9120 switches 1-4
Cisco MDS 9124 switches 1-4
Cisco MDS 9140 switches 1-4
description 1-4
high availability 17-1
overview 1-4
Cisco MDS 9120 switches
description 1-4
Cisco MDS 9140 switches
description 1-4
Cisco MDS 9200 Series
Cisco MDS 9216A switches 1-3, 1-4
Cisco MDS 9216i switches 1-3
Cisco MDS 9216 switches 1-4
connecting a terminal 12-11
description 1-3
high availability 17-1
Cisco MDS 9216
supervisor modules 19-2
Cisco MDS 9216A switches
description 1-3, 1-4
Cisco MDS 9216i switches
configuring extended BB_credits 20-22
description 1-3
Cisco MDS 9216 switches
description 1-4
Cisco MDS 9500 Series
Cisco MDS 9506 Directors 1-2
Cisco MDS 9509 Directors 1-2
Cisco MDS 9513 Directors 1-2
description 1-2
high availability 17-1
Cisco MDS 9506 Directors
description 1-2
Cisco MDS 9509 Directors
description 1-2
supervisor modules 19-1
Cisco MDS 9513 Directors
description 1-2
supervisor modules 19-1
Cisco MDS SAN-OS
software images 15-1
Cisco SAN-OS features
changed (table) i-liii
new (table) i-liii
Cisco Traffic Analyzer
configuring with Performance Manager 60-9
description 9-3
installing (procedure) 9-3
statistics reports 68-3
troubleshooting tools 68-2
using for troubleshooting 68-2
using with Fabric Manager 9-2
Cisco Transport Controller. See CTC
Cisco vendor ID
description 41-13
class maps
configuring for data traffic 66-6
creating 66-7
CLI
accessing D-2
description 1-6
Fabric Manager alternative 1-6
firewall 4-2
clients
disconnecting 7-44
viewing 7-44
clock modules
managing B-2
cloud discovery. See iSNS cloud discovery
code pages
FICON text string formatting 36-19
COM1 ports
configuring B-1
command-line interface. See CLI
command schedulers
configuring B-2
command scripts
executing B-2
Common Information Model. See CIM
common roles
deleting (procedure) 39-3
communities
adding 7-45
removing 7-46
CompactFlash
devices 16-3
slot0: 15-2
company IDs
FC ID allocations 37-7, 68-24
configuration
overview1-6to 1-9
saving automatically for FICON 36-23
saving to NVRAM 16-8
software tools 1-5
configuration files
backing up 16-9
copying (procedure) 16-8
displaying B-2
downloading 16-8
FICON 36-29
saving (procedures) 16-8
saving across the fabric 16-9
configuration limits
description (table) i-lxx, E-1
configurations
changing initial 2-12
configuring NPV 21-7
congestion control methods. See FCC; edge quench congestion control
congestion window monitoring. See CWM
connectivity
troubleshooting tool 5-22
verifying 68-7
console logging
configuring 63-4
console ports
parameters 2-2
console sessions
message logging severity levels 63-4
console settings
configuring B-1
Contiguous Domain ID Assignments
About 25-15
contract IDs
description 64-23
control traffic
disabling QoS 66-4
enabling for QoS 66-4
Control Unit Port. See CUP in-band management
control virtual targets. See CVTs
core dumps
IPS modules B-2
core files
clearing directory 70-4
displaying information 70-3
saving to CompactFlash B-3
CRLs
configuring 43-15
configuring revocation checking methods 43-12
description 43-5
downloading example 43-34
generation example 43-33
importing example43-36, ??to 43-36
crossbars
compatibility with Generation 1 modules 18-10
description 18-8
management 18-7
removal considerations 18-8
crypto IPv4-ACLs
any keyword 44-25
configuration guidelines 44-22
creating 44-25
mirror images 44-24
crypto map entries
global lifetime values 44-37
setting SA lifetimes 44-31
crypto maps
auto-peer option 44-32
configuration guidelines 44-29
configuring perfect forward secrecy 44-35
entries for IPv4-ACLs 44-28
perfect forward secrecy 44-34
SA lifetime negotiations 44-30
SAs between peers 44-28
crypto map sets
applying to interfaces 44-36
CTC
description 48-18
launching 48-18
CUP in-band management
blocking restriction 36-25
description 36-37
current VSANs
description 29-3
custom reports
creating a template 7-33
listing by template 7-35
modifying a template 7-36
Custom tab
description 7-33
Cut-through routing mode 50-33
cut-thru routing mode 50-34
CVTs
creating 57-4
deleting 57-5
description 57-2
CWM
configuring in FCIP profiles 48-20
D
D_S_TOV
default setting 68-25
errors when setting 69-7
modifying 68-15
data
management 2-17
database files
resolving lock errors 7-38
Data Encryption Standard encryption. See DES encryption
data traffic
class maps 66-6
comparing VSANs and QoS 66-5
defining service policies 66-8
DWRR queues 66-8
enforcing service policies 66-8
example configuration 66-10
data virtual targets. See DVTs
dates
configuring 12-3
daylight saving time
adjusting for B-1
dead time intervals
configuring for FSPF 32-8
description 32-8
dedicated rate mode
description 22-6
migrating from shared rate mode 22-19
migrating to shared rate mode 22-19
default gateways. See IPv4 default gateways
default networks
configuring 2-6, 2-10
default networks. See IPv4 default networks
default users
description 2-3
default VSANs
description 26-8
default zones
configuring 30-20
configuring policies 30-35
configuring QoS priorities 30-34
description 30-19
interoperability 37-9
policies 30-19
deficit weighted round robin schedulers. See DWRR schedulers
deniedDueToPortBinding tooltip 69-13
DES encryption
IKE 44-7
IPsec 44-6
desktops
shortcuts not visible 69-4
destination IDs
exchange based 23-5
flow based 23-4
in-order delivery 32-15
path selection 26-11
device alias database
committing changes 31-5
discarding changes 31-5
distribution to fabric 31-3
merging 31-7
device aliases
CFS support 13-2
clearing statistics 31-6
comparison with zones (table) 31-2
default settings 31-8
description 31-1
features 31-1
modifying the database 31-2
requirements 31-2
zone alias conversion 31-5
device IDs
Call Home format 64-24
Device Manager
color definitions 6-6
connection failures 69-10
context menus 6-7
description 1-6, 2-15, 6-1
disk images not visible 69-7
downgrading 69-4
FAQs 69-1
icons 6-4
installation failures 69-6, 69-7
label definitions 6-6
launching (procedure) 6-2
login failure recovery 69-6
managing ports 6-7
performance monitoring 60-1
PortChannels 6-7
preferences 6-8
setting preferences 6-8
tabs 6-5
troubleshooting tools 68-1
trunking 6-7
upgrade failures 69-4
upgrading 69-4
using interface (figure) 6-3
viewing license information 10-16
viewing port status 6-6
viewing supervisor modules 6-7
viewing switch modules 6-7
viewing system messages 63-11
devices
discovery 59-1
management 2-17
modifying groupings (procedure) 5-20
searching in Fabric Manager 69-22
DH
IKE 44-6
DHCHAP
AAA authentication 45-10
authentication modes 45-5
compatibility with other SAN-OS features 45-3
configuring45-2to 45-10
configuring AAA authentication 45-10
default settings 45-10
description 45-2
enabling 45-4
group settings 45-7
hash algorithms 45-6
licensing 45-2
passwords for local switches 45-7
passwords for remote devices 45-8
timeout values 45-9
See also FC-SP
differentiated services code point. See DSCP
Diffie-Hellman Challenge Handshake Authentication Protocol. See DHCHAP
Diffie-Hellman protocol. See DH
digital certificates
configuration example43-17to 43-19
configuring43-6to 43-17
default settings 43-37
deleting from CAs 43-16
description43-1to 43-5
exporting 43-5, 43-14
generating requests for identity certificates 43-12
importing 43-5, 43-14
installing identity certificates 43-13
IPsec44-7to 44-10
maintaining 43-14
maximum limits 43-36
monitoring 43-14
peers 43-5
purpose 43-2
requesting identity certificate example 43-24
revocation example 43-30
digital signature algorithm. See DSA key pairs
DirectX
installing 69-6
Distributed Services Time Out Value. See D_S_TOV
DNS
configuring 2-6, 2-10
configuring IP addresses 2-7
default settings 51-13
DNS servers
configuring 51-12
documentation
additional publications i-lxxi
related documents i-lxxi
domainAddrAssignFailureIsolation tooltip 69-14
domain ID
CFS support 13-2
domain IDs
allowed lists 25-11
assignment failures 20-10
configuring allowed lists 25-11
configuring CFS distribution25-12to 25-15
configuring fcalias members 30-20
contiguous assignments 25-15
description 25-8
distributing 25-2
duplicates causing errors 69-12
enabling contiguous assignments 25-15
failures C-2
interoperability 37-9
IVR configuration guidelines 29-14
non-unique and IVR NAT 29-5
preferred 25-10
static 25-10
unique 29-14
domainInvalidRCFReceived tooltip 69-14
domain manager
isolation 20-10
domainManagerDisabled tooltip 69-14
domainMaxReTxFailure tooltip 69-14
domain names
configuring 2-6
domainOtherSideEportIsolation tooltip 69-14
domainOverlapIsolation tooltip 69-14
domains
overlap isolations C-2
DPVM
CFS support 13-2
default settings 28-14
description 28-1
enabling 28-2
requirements 28-2
using DPVM Setup Wizard (procedure) 28-2
wizard 5-22
DPVM databases
autolearned entries 28-7
clearing 28-8
comparing differences 28-13
configuring CFS distribution28-8to 28-12
copying 28-13
description 28-3
enabling autolearning 28-7
merging guidelines 28-12
drill down reports
description 7-1
drivers
iSCSI 50-2
drop latency time
configuring 32-18
dsa key pairs
generating 39-15
DSCP
configuring 48-28
DVTs
creating 57-6, 57-9
deleting 57-8
description 57-2
DWRR queues
changing weights 66-9
DWRR schedulers
description 66-5
dynamic bandwidth management
description 22-6
dynamic iSCSI initiator
converting 50-40
convert to staticiSCSI
convert dynamic initiator to static 50-19
dynamic mapping 50-8, 50-39
dynamic mappingiSCSI
dynamic mappingiSCSI
static mappingstatic mapping 50-7
Dynamic Port VSAN Membership. See DPVM
E
E_D_TOV
default setting 68-25
errors when setting 69-7
modifying 68-15
EBCDIC
FICON string format 36-19
edge quench congestion control
description 66-2
edge switches
description 29-4
edge VSANs
description 29-3
EFMD
fabric binding 47-1
EISLs
PortChannel links 23-1
ELP
verifying using Device Manager (procedure) 48-17
elpFailureClassFParamErr tooltip 69-14
elpFailureClassNParamErr tooltip 69-14
elpFailureInvalidFlowCTLParam tooltip 69-14
elpFailureInvalidPayloadSize tooltip 69-14
elpFailureInvalidPortName tooltip 69-14
elpFailureInvalidTxBBCredit tooltip 69-14
elpFailureIsolation tooltip 69-14
elpFailureLoopbackDetected tooltip 69-14
elpFailureRatovEdtovMismatch tooltip 69-14
elpFailureRevMismatch tooltip 69-14
ELP failures
reason codes C-2
elpFailureUnknownFlowCTLCode tooltip 69-14
e-mail addresses
assigning for Call Home 64-4
e-mail notifications
Call Home 64-1
EMC
configuring Call Home 64-16
enclosure names
aliases 5-20
end devices
viewing storage port traffic and errors 7-14
end-to-end connectivity
troubleshooting 68-5
enhanced ISLs. See EISLs
enhanced zones
advantages over basic zones 30-40
changing from basic zones 30-41
creating attribute groups 30-42
default settings 30-45
description 30-40
enabling 30-42
merging databases 30-42
enterprise package licenses
description 10-4
entity status inquiry. See ESI
EPLD images
configuring B-2
E port mode
classes of service 20-4
description 20-4
ePortProhibited tooltip 69-14
E ports
32-port guidelines 20-3
32-port switching module configuration guidelines 23-3
configuring 20-12, 48-28
fabric binding checking 47-2
FCS support 65-1
FSPF topologies 32-2
isolation 20-10, C-2
recovering from link isolations 30-27
SPAN sources 62-3
trunking configuration 24-3
eppFailure tooltip 69-14
Error Detect Time Out Value. See E_D_TOV
errorDisabled tooltip 69-14
error messages
gen error messages 69-7
error reports
clearing previous B-3
escFailureIsolation tooltip 69-15
ESC failures
reason codes C-2
ESI
non-resp threshold 50-72
ESI retry count 50-72
Ethereal freeware
analyzer 68-18
URL 68-17
Ethernet
reducing traffic 68-2
Ethernet PortChannels
adding Gigabit Ethernet interfaces 52-10
configuring 52-10
description 52-9
iSCSI 50-55
redundancy 48-6
evaluation
stop in Device Manager 10-17
events
displaying using Device Manager 59-4
displaying using Fabric Manager 59-4
displaying using Fabric Manager Web Services 59-4
viewing 7-9
Exchange Fabric Membership Data. See EFMD 47-1
exchange IDs
in-order delivery 32-15
path selection 26-11
exchange link parameter. See ELP
exchange link parameter failures. See ELP failures
expansion port mode. See E port mode
expiry alerts
licenses 10-15
explicit fabric logout 50-16
extended BB_credits
configuring 20-23
description 20-21
Generation 2 switching modules 22-15
licensing 22-15
Extended Binary-Coded Decimal Interchange Code. See EBCDIC 36-19
Extended Link Protocol. See ELP
external CompactFlash
formatting B-2
external loopback tests
description 70-7
performing 70-7
external RADIUS server
CHAP 50-57
external RADIUS servers
CHAP 50-57
F
fabric
editing monitoring 7-42
Fabric Analyzer
configuring 68-19
description 68-17
Ethereal freeware 68-17
libpcap freeware 68-17
using display filters B-3
fabric binding
activation 47-4
checking for Ex ports 47-2
clearing statistics 47-6
compatibility with DHCHAP 45-3
configuration47-3to 47-6
default settings 47-9
deleting database 47-6
description47-1to 47-2
EFMD 47-1
enforcement 47-2
forceful activation 47-5
licensing requirements 47-1
port security comparison 47-1
saving configurations 47-5
verifying configuration47-6to 47-9
fabricBindingDBMismatch tooltip 69-15
fabricBindingDomainInvalid tooltip 69-15
fabricBindingNoRspFromPeer tooltip 69-15
fabricBindingSWWNNotFound tooltip 69-15
Fabric Configuration Server. See FCS
Fabric Configuration Servers. See FCSs
Fabric-Device Management Interface. See FDMI
fabric lock
releasing 50-49
fabric login. See FLOGI
fabric loop port mode. See FL port mode
Fabric Manager
authentication4-1to ??
browser support 2-19
Cisco Traffic Analyzer 9-2
connection failures 69-10
corrupted jar file errors 69-21
description 1-6, 2-13
detachable tables 5-12
downgrading 69-4
downloading software 2-18
error recovery 69-7
FAQs 69-1
FCIP 69-19
installation failures 69-6, 69-7
installing 2-18
integrating with other tools 2-38
ISL statistics 60-3
Java support 2-19
launching troubleshooting 69-3
login failure recovery 69-6
missing Information pane 69-9
mixed software environments 69-21
network discovery 5-19
preinstallation tasks 2-18
problems with map changes 69-8
running behind firewalls 2-38
running with multiple NICs 69-19
searching for devices 69-22
setting preferences 5-18
shows as disabled service 69-6
support operating systems 2-19
uninstalling 2-40
unlicensed features 3-2
upgrade failures 69-4
upgrading 2-36, 69-4
viewing license information 10-16
Fabric Manager authentication
description 4-1
discovery best practices 4-3
Web Server support 4-5
Fabric Manager Clients
advanced mode 5-2
description 2-14, 5-1
displaying physical attributes 5-10
Fabric pane 5-12
filtering 5-10
Information pane 5-11
launching 5-2
main menu 5-7
setting preferences 5-18
status bar 5-18
toolbar icons (table) 5-8
troubleshooting tools 5-22
using interface (figure) 5-6
wizards 5-21
Fabric Manager features
changed (table) i-liii
new (table) i-liii
Fabric Manager Server
authentication 4-2
configuring preferences 7-45
continuously monitoring fabrics 3-3
database failed to start 69-10
description 2-14, 3-1
disk space requirements 3-1
fabric discovery 4-3
features 3-1
full fabric rediscovery 3-8
installation overview 3-2
installing 3-2
installing Fabric Manager Web Server (procedure) 3-3
licensing 3-3, 10-17
local host error messages 69-19
modifying settings 3-6
passwords 3-7
performing administrative tasks 7-38
performing configuration tasks 7-38
polling periods 3-8
properties files 3-5
Red Hat Linux support 3-1
Solaris support 3-1
troubleshooting tools 68-1
user names 3-7
viewing logs 7-56
Windows support 3-1
Fabric Manager Server package license
description 10-6
Fabric Manager Web Server
authentication 4-5
configuring RADIUS authentication 4-5
configuring TACACS+ authentication 4-5
description 2-15
viewing system messages 63-11
Fabric Manager Web Services
configuring communities 7-45
configuring users 7-47
description 7-1
exporting performance data 7-3
initial screen 7-8
installing 7-3
launching 7-7
navigating 7-2
printing 7-3
recovering passwords 7-39
TCP ports 7-4, 7-5
using with SSL 7-5
fabric port mode. See F port mode
fabric pWWNs
zone membership 30-2
fabric reconfiguration
fcdomain phase 25-2
fabrics
discovery 5-19
management 2-17
monitoring 3-3
See also build fabric frames
fabrics. See RCFs; build fabric frames
fabric security
authentication 45-1
default settings 45-10
Fabric Shortest Path First. See FSPF
FabricWare
events D-2
Fabric Manager support (table) D-3
Fibre Channel support D-1
installing Fabric Manager Web Services 7-3
roles D-2
security D-2
SNMP traps D-2
syslog traps D-2
zoning support D-2
fabric WWNs. See fWWNs
fan module LEDs
failure status 18-11
fan modules
description 18-11
displaying status 18-11
failures 18-11
FAQs
Device Manager 69-1
Fabric Manager 69-1
fault tolerant fabrics
example (figure) 32-2
fcaliases
adding members 30-21
cloning 30-31
configuring for zones 30-20
creating 30-21
renaming 30-30
using with Fabric Manager 3-8
FCC
assigning priority 66-3
benefits 66-1
default settings 66-12
description 66-1
enabling 66-2
frame handling 66-2
logging facility 63-2
process 66-2
fcdomains
autoreconfigured merged fabrics 25-7
configuring CFS distribution25-12to 25-15
default settings 25-22
description 25-2
disabling 25-6
domain IDs 25-8
dsiplaying statistics 25-22
enabling 25-6
enabling autoreconfiguration 25-8
incoming RCFs 25-6
initiation 25-5
overlap isolation 20-10
restarts 25-3
switch priorities 25-5
FC-GS-3 requests
device grouping support 5-20
FC ID allocation
FICON implementation 36-14
FC IDs
allocating 25-2, 37-7, 68-24
allocating company IDs 68-24
allocating default company ID lists 37-7
allocating for FICON 36-14
allocation for HBAs 37-7
configuring fcalias members 30-20
description 25-16
persistent25-17to ??
FCIP 50-1
advanced features 48-29
checking trunk status (procedure) 48-17
compatibility with DHCHAP 45-3
compression 48-37
configuring48-7to ??
configuring using FCIP Wizard48-8to 48-15
default parameters 48-38
discarding packets 48-25
enabling 48-8
FICON support 36-5
Gigabit Ethernet ports 52-4, 53-1
high availability48-4to 48-7
IPS modules 48-2
IP storage services support 52-1
link failures 48-5
MPS-14/2 module 48-2
reserving ports for FICON 36-13
restrictions 69-19
specifying number of TCP connections 48-25
tape acceleration48-32to ??
time stamps 48-25
VE ports 48-2
verifying ELP (procedure) 48-17
verifying interfaces (procedure) 48-17
virtual ISLs 48-2
VRRP 48-6
write acceleration 48-29
FCIP compression
configuring (procedure) 48-12
description 48-37
FCIP interfaces
configuring advanced features48-21to 48-28
configuring peers 48-22
configuring QoS 48-28
configuring special frames 48-24
creating 48-22
parameters 48-4
SPAN sources 62-3
FCIP links
B port interoperability mode 48-25
configuring 48-15
configuring peers 48-22
configuring QoS 48-28
creating 48-16
description 48-3
endpoints 48-3
initiating IP connections 48-25
TCP connections 48-3
FCIP peers
configuring IP addresses 48-22
enabling special frames 48-24
fcipPortAdminCfgChange tooltip 69-15
fcipPortKeepAliveTimerExpire tooltip 69-15
fcipPortMaxReTx tooltip 69-15
fcipPortPersistTimerExpire tooltip 69-15
fcipPortSrcAdminDown tooltip 69-15
fcipPortSrcLinkDown tooltip 69-15
FCIP profiles
configuring TCP parameters48-19to ??
creating 48-16
description 48-4
fcipSrcModuleNotOnline tooltip 69-15
fcipSrcPortRemoved tooltip 69-15
FCIP tape acceleration
configuring 48-36
description48-32to 48-36
FCIP TCP parameters
configuring buffer size 48-21
configuring CWM 48-20
configuring keepalive timeouts 48-19
configuring maximum jitter 48-21
configuring maximum retransmissions 48-19
configuring minimum retransmit timeouts 48-19
configuring PMTUs 48-20
configuring SACKs 48-20
configuring window management 48-20
FCIP write acceleration
configuring 48-31
configuring (procedure) 48-12
description 48-29
FC Logical Interface Tables 50-21
fcotChksumErr tooltip 69-15
fcotNotPresent tooltip 69-15
fcotVendorNotSupported tooltip 69-15
FCP
intermixing protocols 36-5
routing requests 50-3
fcping. See Ping Tool
FCS
description 65-1
logging facility 63-2
significance 65-2
FC-SP
authentication 45-1
enabling 45-4
enabling on ISLs 45-10
See also DHCHAP
fcspAuthenfailure tooltip 69-15
FCSs
default settings 65-6
description 65-1
displaying information65-3to ??
fctimers
CFS support 13-2
configuring CFS B-3
distribution 37-4
fctrace. See traceroute
FDMI
description 34-4
displaying database information 34-4
Federal Information Processing Standards. See FIPS
Fibre Channel 50-1
configuring time out values 68-15
iSCSI targets50-7to 50-13
sWWNs for fabric binding 47-4
time out values37-2to 37-5
TOVs 37-2
Fibre Channel Analyzers
configuring using SPAN 62-12
Fibre Channel analyzers
capturing frames locally B-3
clearing configured information B-3
monitoring without SPAN 62-10
sending frames to remote IP addresses B-3
Fibre Channel Congestion Control. See FCC
Fibre Channel domains. See fcdomains
Fibre Channel interface
default settings 20-26
Fibre Channel interfaces
administrative states 20-7
BB_credits 20-20
characteristics20-2to 20-11
configuring beacon modes 20-15
configuring bit error thresholds 20-15
configuring frame encapsulation 20-13
configuring port modes 20-12
configuring receive data field sizes 20-13
configuring speeds 20-12
deleting from PortChannels 23-16
disabling 20-11
enabling 20-11
extended BB_credits 20-21
graceful shutdown 20-11
modes20-3to 20-7
operational states 20-7
performance buffers 20-21
reason codes 20-8
states 20-7
taking out of service on Generation 2 switching modules 22-28
troubleshooting operational states 20-9
See also interfaces 20-7
Fibre Channel over IP. See FCIP
Fibre Channel Protocol. See FCP
Fibre Channel Security Protocol. See FC-SP
Fibre Channel targets
dynamic importing 50-9
dynamic mapping 50-9
Fibre Channel traffic
analyzing 68-2
SPAN sources 62-3
statistics 68-3
Fibre Channel write acceleration
default settings 56-3
description 56-1
enabling 56-2
estimating number of write buffers 56-1
licensing 56-1
modifying number of write buffers 56-2
Fibre Channel zoning-based access control 50-27
Fibre Connection. See FICON
FICON
advantages on MDS switches36-3to 36-7
automatic configuration save 36-23
basic configuration 36-16
calculating flow load balance (procedure) 36-39
cascading 36-7
configuration files36-28to 36-31
configuring36-15to 36-24
configuring ports36-24to 36-28
CUP in-band management 36-37
default settings 36-42
description36-1to 36-7
displaying information36-40to 36-42
fabric binding requirements 47-3
Fabric Manager Client support 5-2
FC4 protocols 36-2
FC ID allocations 36-14
FCIP support 36-5
host timestamp control 36-22
implemented ports 36-11
installed ports 36-12
manually enabling 36-18
MDS-supported features 36-5
PortChannel support 36-5
port numbering36-8to 36-14
port swapping36-31to 36-33
RLIRs36-27to 36-28
saving configuration changes 36-23
suspending a VSAN 36-19
sWWNs for fabric binding 47-4
tape acceleration36-33to 36-37
text string formatting codes 36-19
unimplemented port 36-11
VSAN offline state 36-19
ficonBeingEnabled tooltip 69-15
FICON configuration files
applying to running configuration 36-29
copying 36-31
description 36-29
displaying 36-30
editing 36-30
view latest information 36-30
ficonNoPortnumber tooltip 69-15
ficonNotEnabled tooltip 69-15
FICON port numbers
assigning to slots 36-13
default numbering scheme 36-8
FCIP interfaces 36-13
implemented addresses 36-11
installed ports 36-12
logical interfaces 36-13
numbering guidelines 36-12
PortChannel interfaces 36-13
port swapping 36-11
reserved numbering scheme 36-11
unimplemented addresses 36-11
uninstalled ports 36-12
FICON ports
assigning address names using Device Manager 36-27
blocking 36-25
displaying address information 36-41
prohibiting 36-26
swapping configurations 36-33
FICON port swapping
configuring (procedure) 36-33
guidelines 36-32
FICON tape acceleration
configuration considerations 36-35
configuring 36-35
description 36-33
ficonVsanDown tooltip 69-15
FICP
wizard 5-21
field replaceable units. See FRUs
files
compressing B-2
displaying contents B-1
displaying last lines B-2
uncompressing B-2
file systems
formatting 16-2
volatile: 16-2
File Transfer Protocol. See FTP
filtering
end port groups 5-16
switch groups 5-16
filters
capture 68-21
defining displays 68-21
permitted 68-22
selective viewing 68-20
FIPS
configuration guidelines 38-2
self-tests 38-3
firewalls
configuring 2-14
running with Fabric Manager 2-38
firstPortNotUp tooltip 69-15
firstPortUpAsEport tooltip 69-15
Flash devices
bootflash: 16-2
formatting 16-2
overview 16-1
FLOGI
description 34-1
displaying details 34-1
logging facility 63-2
flows
performance statistics 8-1
viewing performance information 7-16
flow statistics
counting 8-4
description 8-4
FL port mode
classes of service 20-5
description 20-5
FL ports
configuring 20-12
description 20-5
DPVM support 28-7
nonparticipating code 20-10
nonparticipating codes C-2
persistent FC IDs 25-17
SPAN sources 62-3
See also Fx ports
F port mode
classes of service 20-5
description 20-5
F ports
configuring 20-12
description 20-5
DPVM support 28-7
SPAN sources 62-3
See also Fx ports
FPSF
load balancing (example) 48-5
frame encapsulation
configuring 20-13
frames
configuring MTU size 52-5, 53-3
viewing 68-20
frequently asked questions. See FAQs
FSPF
computing link cost 32-7
configuring globally32-4to 32-6
configuring Hello time intervals 32-7
configuring link cost 32-6
configuring on interfaces32-6to 32-10
dead time intervals 32-8
default settings 32-19
description 32-2
disabling on interfaces 32-9
disabling routing protocols 32-6
displaying databases 32-10
fail-over with PortChannels 32-3
fault tolerant fabrics 32-2
flow statistics8-3to 32-19
in-order delivery32-15to 32-19
interoperability 37-10
link state record defaults 32-4
multicast root switches 32-14
path selection protocol D-1
reconvergence times 32-2
redundant links 32-3
retransmitting intervals 32-8
routing services 32-1
support 2-16
topology examples32-2to 32-4
FSPF multicast roots
configuring switches 32-14
FSPF routes
configuring 32-12
description 32-12
FSPF routing
multicast 32-14
FTP
logging facility 63-2
support 2-15
full zone sets
considerations 30-5
enabling distribution 30-25
fWWNs
configuring fcalias members 30-20
Fx ports
32-port default 20-3
configuring 20-12
description 20-6
FCS 65-1
FCS support 65-1
interface modes 20-6
VSAN membership 26-4
See also F ports; FL ports 20-6
G
Generation 1 switching modules
combining with Generation 2 switching modules??to 22-18
extended BB_credits 20-22
port index allocations 22-16
QoS behavior 66-8
Generation 2 switching modules
buffer groups22-8to 22-14
combining with Generation 1 switching modules??to 22-18
configuring22-18to ??
configuring port speeds 22-21
configuring rate modes 22-22
default settings 22-31
description22-1to ??
dynamic bandwidth management 22-6
extended BB_credits 20-23, 22-15
installing in Generation 1 chassis 15-15
out-of-service interfaces 22-7
port groups 22-2
port index allocations 22-16
port rate modes 22-4
QoS behavior 66-8
recovering from powered-down state 22-17
releasing shared resources 22-29
taking interfaces out of service 22-28
Gigabit Ethernet
IPv4 example configuration 52-4
Gigabit Ethernet interface example 50-53
Gigabit Ethernet interfaces
configuring52-4to 52-10
configuring auto-negotiation 52-5, 53-3
configuring CDP 12-12
configuring high availability52-8to 52-10
configuring IPv4 53-2
configuring IPv6 addresses 54-12
configuring MTU frame sizes 52-5, 53-3
configuring promiscuous mode 52-6, 53-4
configuring VRRP 52-9
default parameters 53-6
IPv4-ACL guidelines 53-6
subinterfaces 52-6, 53-5
subnet requirements 52-6, 53-5
viewing performance information 7-18
Gigabit Ethernet subinterfaces
configuring VLANs 53-5
global keys
assigning for RADIUS 41-8
H
hardware
default settings 18-12
displaying inventory 18-1
displaying temperatures 18-11
overview 1-1
viewing list 7-9
hardware failures
configuring actions B-3
hard zoning
description 30-25
HA solution example 50-52
HBA port 50-15, 50-20
HBA ports
configuring area FCIDs 25-19
HBAs
device aliases 31-1
FC ID allocations 37-7, 68-24
Health tab
description 7-8
Hello time intervals
configuring for FSPF 32-8
description 32-7
high availability
automatic synchronization 17-4
compatibility with DHCHAP 45-3
description 17-1
Ethernet PortChannel 50-55
Ethernet PortChannels 48-6
Fibre Channel PortChannels 48-7
licensing 10-8
process restartability 17-3
protection against link failures 17-1
software upgrades 15-5
supervisor module switchover mechanism 17-2
switchover characteristics 17-2
synchronizing supervisor modules 17-3
VRRP 48-6, 50-54
VRRPVRRP-based high availability 50-54
historical data
preserving 69-18
host control
FICON 36-21
host names
configuring for digital certificates 43-6
hosts
performance statistics 8-1
HTTP
port used 2-39
support 2-16
HTTP proxy servers
configuring 69-20
HTTPS
support 2-16
hwFailure tooltip 69-15
I
IBM PPRC
FICON support 36-5
ICMP
IPv6 54-6
ICMP packets
IPv6 header format, figure 54-6
type value 42-4
icons
Device Manager 6-4
IDs
Cisco vendor ID 41-13
contract IDs 64-23
login IDs 2-5
serial IDs 64-24, 64-26, 64-28
server IDs 64-24
site IDs 64-23
IKE
algorithms for authentication 44-6
default settings 43-37, 44-39
description 44-3
initializing 44-13
refreshing SAs 44-20
terminology 44-5
transforms for encryption 44-6
viewing configuration (procedure) 44-11
IKE domains
clearing 44-20
description 44-13
IKE initiators
configuring version 44-18
IKE peers
configuring keepalive times 44-17
IKE policies
configuring negotiation parameters 44-15
negotiation 44-14
IKE tunnels
clearing 44-20
description 44-13
images
See kickstart images; software images; system images
Software Installation Wizard 15-8
images. See kickstart images; software images; system images
in-band access
configuring 2-9
IPFC 2-12
in-band management
configuring 2-8, 2-10
CUP 36-37
Ethernet connection 2-17
IPFC 51-5
IPFC connection 2-17
logical interface 2-8
incomAdminRxBBCreditPerBuf tooltip 69-16
incompatibleAdminMode tooltip 69-16
incompatibleAdminRxBBCredit tooltip 69-16
incompatibleAdminRxBufferSize tooltip 69-16
incompatibleadminSpeed tooltip 69-16
indirect link failures
recovering 67-1
initialization string
configuring B-1
initializing tooltip 69-16
initiators
statically mapped iSCSI 50-35
in-order delivery
configuring drop latency time 32-18
enabling for VSANs 32-18
enabling globally 32-18
guidelines 32-17
reordering network frames 32-15
reordering PortChannel frames 32-17
install all command
failure cases 15-7
Intelligent Storage Services
description 58-1
disabling (procedure) 55-5, 58-3
disabling with force option 55-6, 58-3
enabling (procedure) 55-3, 58-2
Fibre Channel write acceleration56-1to 56-3
SCSI flow services55-1to 55-8
SCSI flow statistics55-1to 55-8
interfaceRemoved tooltip 69-16
interfaces
adding to PortChannels 23-13, 23-14
assigning to VSANs 26-8
configuring data field size 20-13
configuring fcalias members 30-20
default settings 20-26
deleting from PortChannels 23-16
forced addition to PortChannels 23-15
isolated states 23-14
nonoperational reason codes C-1
reason codes C-1
SFP types 20-16
suspended states 23-14
VSAN membership 26-7
interface statistics
description 20-17
gathering 20-17
internal bootflash:
Flash devicesFlash devices 16-3
initializing 16-2
kickstart images 16-2
recovering from corruption 16-2
internal loopback tests
description 70-7
performing 70-7
Internet Control Message Protocol. See ICMP
Internet Explorer
Fabric Manager support 2-19
Internet Key Exchange. See IKE
Internet Storage Name Service. See iSNS
interoperability
configuring interop mode 1 37-11
description 37-8
verifying status 37-12
VSANs 26-12
interop modes
configuring mode 1 37-11
default settings 37-13
description 37-8
Inter-VSAN Routing. See IVR
Inter-VSAN Routing zones. See IVR zones
Inter-VSAN Routing zone sets. See IVR zone sets
invalidAttachment tooltip 69-16
invalidConfig tooltip 69-16
invalidFabricBindExh tooltip 69-16
inventories
managing 59-3
viewing details for switches 7-24
viewing details for VSANs 7-23
viewing information 7-31
viewing ISL information 7-28
viewing module details 7-26
viewing switch licenses 7-25
viewing zone information 7-30
Inventory tab
description 7-23
IOD. See in-order delivery
IP-ACLs
wizard 5-22
See also IPv4-ACLs; IPv6-ACLs
IP addresses
management interfaces 2-2
IP connections
active mode 48-25
initiating 48-25
passive mode 48-25
IP domain names
configuring for digital certificates 43-6
IPFC
configuration guidelines 51-5
description 51-5
errors caused by configuration 69-8
in-band access 2-12
in-band management 2-17
logging facility 63-2
IP filters
contents 42-2
restricting IP traffic 42-1
using IP-ACL Wizard (procedure) 42-5
IP routing
enabling 2-6, 2-10
IPsec
algorithms for authentication 44-6
configuring with FCIP Wizard (procedure) 48-9
crypto IPv4-ACLs44-21to 44-25
default settings 44-39
description 44-2
digital certificate support44-7to 44-10
enabling with FCIP Wizard (procedure) 44-10
fabric setup requirements 44-4
global lifetime values 44-37
hardware compatibility 44-4
licensing requirements 44-3
maintenance 44-37
prerequisites 44-3
RFC implementations 44-1
terminology 44-5
transform sets 44-25
transforms for encryption 44-6
unsupported features 44-4
viewing configuration (procedure) 44-11
IP security. See IPsec
IPS modules
CDP support 52-10
core dumps B-2
FCIP 48-2
port modes 52-4, 53-1
software upgrades 52-3
supported features 52-1
IPS port mode
description 52-4
IPS ports 50-8
modes 53-1
multiple connections 50-53
SPAN sources 62-3
IP storage services
default parameters 52-10
IP Storage services modules. See IPS modules
IPv4
configuring Gigabit Ethernet interfaces 53-2
default settings 53-6
description 53-1
transitioning to IPv6 54-15
IPv4-ACLs
adding entries 42-7
applying to interfaces 42-9, 42-10
configuration guidelines 42-2
creating complex IPv4-ACLs (procedure) 42-6
creating with IP-ACL Wizard (procedure) 42-5
crypto44-21to 44-25
crypto map entries 44-28
example configuration 42-11
FabricWare support D-2
guidelines for Gigabit Ethernet interfaces 53-6
reading dump logs 42-8
removing entries 42-8
IPv4 addresses
configuring fcalias members 30-20
configuring IPv6 and IPV6 protocol stacks 54-13
IPv6 protocol stacks 54-10
IPv4 default gateways
configuring 2-10, 12-11, 51-3
configuring mgmt0 interfaces 20-23
description 51-3
static routes (tip) 51-4
IPv4 default networks
description 51-4
IPv6
address types 54-3
configuring addressing 54-11
configuring IPv4 and IPv6 addresses 54-13
configuring management interfaces 51-3
default settings 54-15
description54-1to 54-11
dual IPv4 and IPv6 protocol stack applications, figure 54-11
dual IPv4 and IPv6 protocol stacks 54-10
dual IPv4 and IPv6 protocol stack technique, figure 54-10
enabling routing 54-11
enhancements over IPv4 54-1
ICMP 54-6
IPv6-ACL guidelines 54-14
neighbor discovery 54-7
path MTU discovery 54-7
router advertisement messages 54-9
router discovery 54-9
stateless autoconfiguration 54-9
static routes 54-13
transitioning from IPv4 54-15
IPv6-ACLs
guidelines for IPv6 54-14
IPv6 addresses
configuring 54-11
configuring fcalias members 30-2, 30-20
configuring IPv4 and IPV6 protocol stacks 54-13
formats 54-2
link-local type 54-4
multicast type 54-5
prefix format 54-3
unicast type 54-3
IPv6 neighbor discovery
advertisement messages 54-7
description 54-7
neighbor solicitation message, figure 54-8
solicitation messages 54-7
IPv6 routing
enabling 54-11
IPv6 static routes
configuring 54-13
IQN
formats 50-8
IQNs
formats 50-8
ISCSI
enforcing access control 50-27
iSCSI
access control50-24to 50-28
add initiator to zone database 50-25
advanced VSAN membershipadvanced VSAN membership 50-24
checking for WWN conflicts 50-19
compatible drivers 50-2
configuring50-1, 50-1to??, 50-4, ??to 50-56
configuring AAA authentication 50-28, 50-29
configuring ACLs 50-26
configuring VRRP 50-54
creating virtual targets 50-10
default parameters 50-75
discovery phase 50-27
drivers 50-2
enabling 50-4
error 50-15
Fabric Manager Client support 5-2
Fibre Channel targets50-7to 50-13
Gigabit Ethernet ports 52-4, 53-1
GW flagiSCSI
gateway device 50-16
HA with host without multi-path software 50-51
initiator idle timeoutinitiator idle timeout
iSCSIinitiator idle timeout
configuring with Fabric Manager 1
initiator name 50-30
initiator targets 50-6
IPS module support 52-2
IQNs 50-14
login redirect 50-37
LUN mapping for targets50-62to ??
MPS-14/2 module support 52-2
multiple IPS ports 50-53
PortChannel-based high availability 50-55
PortChannel-based high availabilityEthernet PortChannel-based high availability 50-55
protocol 50-2
requests and responses 50-3
restrict an initiator to a specific user name for CHAP authentication 50-30
routing 50-2
routing modes chartrouting modes chart for iSCSI 50-34
session creation 50-27
session limits 50-15
statically mapped initiators 50-35
tables in Fabric Manager 50-19
targets in Device Manager 50-9
transparent initiator mode 50-15
transparent mode initiator50-58to ??
users with local authentication 50-30
using iSCSI Wizard (procedure)50-5to 50-7
VSAN membership 50-22
VSAN membership example 50-23
VSAN membership for iSCSI interfaces 50-22, 50-23
wizard 5-22
zone name 50-7
iSCSI authentication
configuring 50-28, 50-43
configuring RADIUS (procedure) 50-31
external RADIUS servers 50-57
global override 50-29
local authentication 50-30
mechanisms 50-29
restricting on initiators 50-30
scenarios 50-56
setup guidelines 50-56
iSCSI-based access control 50-26
iSCSI devices
example membership in VSANs 50-23
iscsi-gw 50-20
iSCSI high availability
configuring50-50to 50-56
ISCSI hosts
VSAN membership 50-22
iSCSI hosts
initiator identification 50-14
initiator presentation modes 50-14
initiator presentation modesinitiator presentation modes 50-14
iSCSI initiators
configuring static IP address mapping 50-18
dynamic mapping 50-17
idle timeout 50-16
making dynamic WWN mapping static 50-19
proxy mode 50-20
statically mapped (procedure) 50-18
static mapping 50-17
transparent mode 50-15
WWN assignments 50-17
iSCSI interfaces
configuring50-14, 50-14to ??
configuring listener ports 50-32
configuring listener portsiSCSI
listener port 50-32
configuring QoS 50-32
configuring routing mode50-33to ??
configuring routing modesiSCS
configuring routing modesrouting modes 50-33
configuring TCP tuning parameters 50-32
creating 50-5
creatingiSCSI
creating interfaces 50-5
SPAN sources 62-3
VSAN membership 50-23
iSCSI LUs 50-8
iSCSI protocol 50-1
iSCSI server load balancing 50-35
iSCSI Server Load Balancing. See iSLB
iSCSI sessions
authenticationiSCSI
session authenticationauthentication
iSCSI session 1
iSCSI targets
advertising 50-12
dynamic importing 50-8
dynamic mapping 50-8
examples 50-12
secondary access 50-52
static importing 50-10
static importingstatic mappingiSCSI targets
static mapping 50-10
transparent failover 50-50
iSLB
activating zones 50-41, 50-42
auto-zoning 50-46
CFS support 13-2
committing configuration changescommitting configuration changes
iSLB 50-48
configuration distribution50-46to ??, 50-47
configuration limits 50-36
configuration prerequisites 50-36
configuring 50-35
configuring initiators and targets 50-41
configuring VRRP 50-45
configuring with Device Manager 50-37
configuring zones 50-41, 50-42
default settings 50-76
distributing configuration using CF 50-46
dynamic initiator mapping 50-40
enabling configuration distribution 50-47
initiator WWN assignment 50-35
load balancing algorithm50-45to ??
maximum initiators 50-36
static initiator configurationinitiator configuration
static iSLB 50-35
VSAN membership 50-40
zone set activation failed 50-42
iSlb
default settings 50-76
iSLB auto-zone feature 50-36
iSLB initiators 50-37
activating zones 50-42
assigning WWNs 50-39
configuring50-39to 50-43
configuring load balancing metrics 50-40
configuring zones 50-42
dynamic initiator mapping 50-40
VSAN membership 50-40
iSLB initiator targets
activating zones 50-42
configuring zones 50-42
description 50-41
iSLB sessions
authentication 50-43
authenticationiSLB
sessions authentication 50-43
maximum per IPS portiSLB
maximum sessions per IPS port 50-36
iSLB with CFS distribution 50-36
ISLs
graph past 24 hours performance 7-21
performance statistics 8-1
PortChannel links 23-1
statistics 60-3
viewing detailed inventory information 7-28
viewing performance information 7-15
iSMS servers
enabling 50-71
iSNS
CFS support 13-2
client registration 50-72
cloud discovery 50-73
configuring 50-73
configuring servers50-71to 50-73
description 50-67
ESI 50-72
iSNS cloud discovery
automatic 50-75
CFS distribution 50-75
description 50-73
enabling 50-74
initiating on-demand 50-74
iSNS profiles
creating 50-68
iSNS servers
configuration distribution 50-71
configuring ESI retry count 50-72
enabling 50-71
example scenario 50-70
isolated VSANs
description 26-8
displaying membership 26-9
IVR
activating topologies 29-17
AF IDs 29-15
auto-topology 29-6
border switch 29-4
border switch, guidelines 29-15
border switch configuration guidelines 29-15
border switches 29-4
configuring (procedure) 29-15
configuring logging levels 29-21
configuring without auto topology 29-13
configuring without IVR NAT 29-13
current VSANs 29-3
database merge guidelines 29-31
default settings 29-34
default zone policy 29-22
description 29-2
domain ID configuration guidelines 29-14
domain ID guidelines 29-14
edge switch 29-4
edge switches 29-4
edge VSANs 29-3
Fabric Manager Client support 5-2
features 29-3
Fibre Channel header modifications 29-4
FICON support B-2
interoperability 29-7
logging 29-21
modifying 29-9
native VSANs 29-3
paths 29-3
persistent FC IDs 29-19
read-only zoning 29-31
SDV limitations 27-8
service groups B-2
sharing resources 29-2
terminology 29-3
transit VSAN configuration guidelines 29-14
transit VSANs 29-3
virtual domains 29-18
VSAN topologies 29-6
wizard 5-21
zone communication 29-22
zones29-3, 29-22to ??
zone sets 29-3
Zone Wizard 29-7
IVR databases
merge guidelines 29-31
IVR logging
configuring levels 29-21
IVR NAT
auto-topology 29-6
border switch, guidelines 29-10
configuration guidelines 29-10
description 29-5
load balancing 29-5
modifying (procedure) 29-12
transit VSANs, guidelines 29-10
IVR persistent FC IDs
configuring 29-20
persistent 29-19
IVR topologies
CFS support 13-2
clearing manual entries 29-17
creating manually 29-15
manually activating 29-17
migrating from automatic mode to user-configured mode 29-18
recovering 29-29
IVR virtual domains
configuring 29-19
description 29-18
IVR zones
activating with force option 29-26
automatic creation 29-23
clearing database 29-31
configuring29-24to ??
configuring LUNs 29-30
configuring QoS attributes 29-30
configuring with IVR Zone Wizard 29-7
description 29-3, 29-22
differences with zones (table) 29-22
downgrading considerations 29-31
LUN zoning 29-30
maximum number of members 29-4
maximum number of zones 29-4
recovering the full database 29-28
renaming 29-30
IVR zone sets
configuring29-24to ??
description 29-3, 29-22
downgrading considerations 29-31
maximum number 29-4
renaming 29-30
J
Java
execution failures 69-6
java.lang.ArrayIndexOutOfBoundsException errorArrayIndexOutOfBoundsException error 69-7
Java RMI
ports used 2-39
Java Runtime Environment. See JRE
Java Web Start
checking installation 69-3
clearing the cache 69-6
Fabric Manager support 2-19
hangs on the download dialog 69-5
not detected 69-4
running from command line 69-5
setting up on *.jnlp files 69-5
jitter
configuring estimated maximum in FCIP profiles 48-21
JNLP
verifying settings 69-3
JRE
Fabric Manager requirements 7-4
jumbo frames. See MTUs
K
keepalive timeouts
configuring in FCIP profiles 48-19
kernel core dumps
configuring B-3
kickstart images
description 15-2
KICKSTART variable 15-1
selecting for supervisor modules 15-2
Konqueror
configuring for Java Web Start 69-5
L
latency
forwarding 50-33
LEDs
beacon mode states 20-14
speed 20-14
license key files
description 10-2
installing 10-10
obtaining 10-9
updating 10-9
licenses
backing up files B-1
claim certificate 10-2
description 10-1
displaying information 10-16
enterprise package 10-4
expiry alerts 10-15
extended BB_credits 20-22, 22-15
Fabric Manager 69-23
Fabric Manager Server 10-17
Fabric Manager Server package 10-6
factory-installed 10-9
feature-based 10-3
features supported (table) 10-4
grace period alerts 10-15
grace period expiration 10-15
high availability 10-8
identifying features in use 10-13
installation options 10-8
installing manually 10-9
installing using Device Manager 10-12
installing using License Wizard 10-11
installing with License Wizard 10-11
key files10-9to 10-13
mainframe package 10-6
module-based 10-3
moving between switches B-1
obtaining 10-9
on-demand port activation 11-1
One-Click License Install failed 69-9
PAK 10-2
SAN extension package 10-5
Storage Services Enabler package 10-7
terminology 10-1
transferring between switches 10-16
uninstalling 10-14
unsupported features B-1
updating 10-14
viewing in Device Manager 10-16
viewing in Fabric Manager 10-16
viewing in Fabric Manager Web Services 10-17
viewing switch information 7-25
viewing with Fabric Manager Web Server (procedure) 10-17
wizard 5-22
limits
description (table) i-lxx, E-1
line cards. See switching modules; services modules
link costs
configuring for FSPF 32-7
description 32-6
linkFailCreditLossB2B tooltip 69-16
linkFailCreditLoss tooltip 69-16
linkFailDebounceTimeout tooltip 69-16
linkFailLineCardPortShutdown tooltip 69-16
linkFailLinkReset tooltip 69-16
linkFailLIPF8Rcvd tooltip 69-16
linkFailLIPRcvdB2B tooltip 69-16
linkFailLossOfSignal tooltip 69-16
linkFailLossOfSync tooltip 69-16
linkFailLRRcvdB2B tooltip 69-16
linkFailNOSRcvd tooltip 69-16
linkFailOLSRcvd tooltip 69-16
linkFailOPNyRETB2B tooltip 69-16
linkFailOPNyTMOB2B tooltip 69-16
linkFailPortInitFail tooltip 69-16
linkFailPortUnusable tooltip 69-16
linkFailRxQOverFlow tooltip 69-16
linkFailTooManyINTR tooltip 69-16
link failures
protection against 17-1
reason codes C-1
recovering 67-1
linkFailure tooltip 69-16
Link Incident Records. See LIRs
link-local addresses
description 54-4
format, figure 54-4
link redundancy
Ethernet PortChannel aggregation 52-9
Linux 2-31
Fabric Manager support 2-19
installing Fabric Manager Web Services 7-4
install scripts 2-31
LIRs
description 36-27
load balancing 50-35, 50-37
attributes 26-11
attributes for VSANs 26-5
configuring 26-11
description 23-4, 26-11
FSPF (example) 48-5
PortChannels 23-1
PortChannels (example) 48-5
weighted 50-40
load metric 50-40
lock the fabric 50-48
log files
configuring 63-6
default names 63-6
description 70-3
sizes 63-6
logging
default settings 63-11
disabling 63-3
enabling 63-3
message severity levels 63-3
logical unit numbers. See LUNs
logins
failure recovery 69-6
SSH 41-4
Telnet 41-4
logs
increasing log window size 69-10
RMON 61-18
SNMP events 40-12
viewing information 7-56
viewing using Device Manager 59-4
viewing using Fabric Manager Web Server 59-3
loopbackDiagFailure tooltip 69-17
loopbackIsolation tooltip 69-17
loopback tests
configuring frequency B-3
external 70-7
loops
monitoring B-3
LUN 50-8
trespass for storage port failover 50-53
LUN mapping 50-52
iSCSI50-62to ??
LUNs
explicit access control 50-20
IVR zoning 29-30
mapping and assignment 50-20
LUN zoning
configuring 30-37
description 30-36
LUs 50-7, 50-8
M
MAC addresses
configuring secondary 37-6, 68-23
mainframe package licenses
description 10-6
mainframes
FICON parameters 36-22
VSAN clock 36-22
management
role-based 5-21
management access
configuring in-band2-8to 2-12
configuring out-of-band2-4to 2-8
description 2-12
in-band 2-3
out-of-band 2-3
management interfaces
configuring 20-23, 20-24, 51-3
configuring for IPv6 51-3
default settings 20-26
features 20-24
IP addresses 2-2
See also mgmt0 interfaces
management protocols
supported (table) 2-15
map preferences
Automatically Save Layout default 5-19
Detach Overview Window default 5-19
Display End Device Labels default 5-19
Display End Devices default 5-19
Display Unselected VSAN Members default 5-19
Expand Loops default 5-19
Expand Multiple Links default 5-19
Layout New Devices Automatically default 5-19
Open New Device Manager Each Time default 5-19
Override Preferences for Non-default Layout default 5-19
Select Switch or Link from Table default 5-19
Use Quick Layout when Switch has >=30 End Devices default 5-19
maps
black squares 69-13
brown squares 69-13
clearing license orange X 69-23
clearing topologies 69-21
color definitions 69-13
default preferences 5-19
freezing the layout look 69-12
green squares with mode 69-13
grouping end devices 5-20
highlighting 5-14
icon descriptions 5-12
light gray squares 69-13
module warnings 69-13
no squares 69-13
orange crosses 69-13
orange squares with mode 69-13
purging down elements 5-15
red crosses 69-13
red line through switches 69-13
red squares 69-13
refreshing 5-15
saving 5-14
shows two switches when only one 69-12
tab descriptions 5-13
upgrade software without losing map settings 69-18
viewing large 5-14
Visio diagrams 5-15
maps module failuresmaps
fan failuresmaps
power supply failures 69-13
maximum retransmissions
configuring in FCIP profiles 48-19
McAfee Internet Suite 6.0 Professional
Device Manager installation failures 69-7
Fabric Manager installation failures 69-7
McData
native interop mode 37-8
MD5 authentication
IKE 44-7
IPsec 44-6
VRRP 51-12
merged fabrics
autoreconfigured 25-7
merge status conflictsiSLB
merge status conflictsCFS
merge status conflicts 50-49
Message Authentication Code using AES. See AES-XCBC-MAC
Message Digest 5. See MD5 authentication
messages
selecting severity level 7-44
mgmt0
out-of-band management 2-17
mgmt0 interfaces
configuring 12-10, 20-23, 20-24
configuring out-of-band access 2-6
default settings 20-26
features 20-24
local IPv4 routing 51-5
out-of-band access 2-12
Microsoft Challenge Handshake Authentication Protocol. See MSCHAP
minimum retransmit timeouts
configuring in FCIP profiles 48-19
modems
configuring settings B-1
module configurations
preserving B-2
purging B-2
saving to NVRAM 19-7
modules
configuring message logging 63-5
connecting to B-2
displaying temperatures 18-11
preserving the configuration 19-7
replacing 15-15
resetting 19-5
state descriptions 19-4
temperature monitoring 18-10
verifying status 12-2, 19-3
module tests
configuring B-3
monitoring traffic
SPAN 62-6
Mozilla
configuring for Java Web Start 69-5
MPS-14/2 modules 50-1, 50-2, 50-3, 50-5, 50-20, 50-27
CDP support 52-10
configuring extended BB_credits 20-22
FCIP 48-2
port modes 52-4, 53-1
software upgrades 52-3
supported features 52-1
MSCHAP
description 41-25
MTU frame sizes
configuring Gigabit Ethernet interfaces 52-5
MTUs
configuring frame sizes 53-3
configuring size
path discovery for IPv6 54-7
multicast addresses
IPv6 alternative to broadcast addresses 54-6
IPv6 format, figure 54-5
IPv6 solicited-node format, figure 54-6
multicast root switches
configuring 32-14
description 32-14
multi-path software example 50-51
multiple fabrics 59-3
managing 69-23
multiple VSANs
configuring 51-7
Multiprotocol Services modules. See MPS-14/2 modules
mutual CHAP authentication
configuring for iSCSI 50-30
configuring for iSLB 50-43
configuring for iSLBI 50-43
N
name servers
displaying database entries 34-3
interoperability 37-10
LUN information 35-1
proxy feature 34-2
registering proxies 34-2
rejecting duplicate pWWNs 34-3
NASB
configuring (procedure) 58-5
default settings 58-6
NAT. See IVR NAT
native VSANs
description 29-3
Network-Accelerated Serverless Backup. See NASB.
Network Address Translation. See IVR NAT
network administrator roles
FabricWare D-2
network administrators
additional roles 41-3
permissions 41-3
network monitoring
device discovery 59-1
mapping topologies 59-1
network operator roles
FabricWare D-2
network operators
permissions 41-3
Network Time Protocol. See NTP
NICs
manually specifying for Device Manager 69-20
manually specifying for Fabric Manager Client 69-20
manually specifying for Fabric Manager Server 69-20
NL ports
hard zoning 30-25
interface modes 20-7
zone enforcement 30-25
node world wide names. See nWWNs
nondisruptive upgrades
methods 15-5
None authentication 50-28
nonparticipating codes
description 20-10
nonParticipating tooltip 69-17
nonvolatile storage
bootflash: 16-2
notifications
adding forwards 7-43
conditions for sending 7-53
removing forwards 7-44
NPIV
configuring B-2
NP links 21-3
N-Port identifier virtualization. See NPIV
N ports
hard zoning 30-25
zone enforcement 30-25
zone membership 30-2
See also Nx ports
NL ports
See also Nx ports
NP-ports 21-3
NPV
wizard 5-22
NPV, configuring 21-7
NPV mode 21-3
ntop freeware
batch files 9-5
modifying launch scripts 9-5
NTP
CFS support 13-2
configuration guidelines 12-5
configuring12-4to 12-10
configuring CFS distribution 12-8
configuring with CFS 12-8
logging facility 63-2
time-stamp option 48-25
NTP peers
deleting 12-7
editing 12-6
NTP servers
configuring 2-7
deleting 12-7
editing 12-6
nWWNs
DPVM 28-1
Nx ports
FCS support 65-1
See also N ports; NL ports
O
offline tooltip 69-17
OHMS
configuring B-3
description 70-6
ohmsExtLBTest tooltip 69-17
On-Demand Port activation license
acquiring for ports 11-6
checking status of licenses 11-4
configuring11-4to ??
description 11-1
making ports eligible 11-5
port licensing 11-2
port naming conventions 11-2
Online Certificate Status Protocol. See OCSP
Online Health Management System. See OHMS
Opera
configuring for Java Web Start 69-5
operational states
configuring on Fibre Channel interfaces 20-12
description 20-7
OSCP
support 43-5
other tooltip 69-17
out-of-band access
mgmt0 interfaces 2-12
out-of-band management
configuring 2-4, 2-10
Ethernet connection 2-17
out-of-service interfaces
description 22-7
overlay VSANs
configuring 51-6
description 51-6
oversubscription
diagnosing with Device Manager 68-14
disabling restrictions 22-24
enabling restrictions 22-25
Generation 2 switching modules 22-23
ratios 22-23
P
PAA
description 68-2
troubleshooting tools 68-2
PAA-2s
Cisco Traffic Analyzer 9-3
description 9-2
PAAs
compared with PAA-2s 9-3
packets
discarding in FCIP 48-25
parentDown tooltip 69-17
pass-thru routing mode 50-33, 50-34
passwords
administrator 2-2
assigning using Fabric Manager 5-21
DHCHAP 45-7, 45-8
recovering 7-39
setting administrator default 2-4, 2-9
path MTUs. See PMTUs
pcAnyWhere
replacing with DirectX 69-6
stopping 69-6
PDU 50-33
peerFCIPPortClosedConnection tooltip 69-17
peerFCIPPortResetConnection tooltip 69-17
performance
configuring collections 7-50
customizing reports 7-33
custom monitoring 7-21
data 8-3
event triggers 8-2
graphs 60-6
historical monitoring 60-4
host-optimized port groups 60-6
ISL statistics (procedure) 60-3
monitoring 8-1
monitoring in Device Manager (procedure) 60-1
per-port monitoring (procedure) 60-2
real-time monitoring 60-1
summary reports 60-6
tables 60-6
using thresholds 8-2, 60-4
viewing future predictions 7-20
viewing summaries 7-13
performance buffers
configuring 20-21
description 20-21
performance collections
adding 7-50
configuring thresholds 7-53
removing 7-51
Performance Manager
architecture 8-1
authentication 4-4
configuring data collection 8-3
configuring flows 8-3
configuring with Traffic Analyzer 60-9
creating collections 60-4
creating flows 60-4
data collection 8-2
data interpolation 8-2
description 2-15
shows as disabled service 69-6
thresholds 60-4
using thresholds 8-2
verifying collections 3-3
viewing reports 60-5
wizard for configuring 60-5
Performance Manager reports
exporting as CSV 60-8
exporting as XML 60-7
generating top 10 60-7
viewing events 60-6
viewing graphs 60-6
viewing host-optimized port group performance 60-6
viewing summary reports 60-6
viewing tables 60-6
Performance tab
description 7-12
persistent domain ID
FICON VSANs 47-3
persistent FC IDs
configuring 25-17
description 25-17, 29-19
enabling 25-17
purging 25-21
Ping Tool
troubleshooting tools 68-7
PKI
enrollment support 43-4
PLOGI
name server 34-3
PMTUs
configuring in FCIP profiles 48-20
polling periods
changing 3-7
port addresses
FICON 36-11
Port Analyzer Adapters. See PAAs
Port Analyzer Adapters 2. See PAA-2s
portBindFailure tooltip 69-17
portBlocked tooltip 69-17
PortChannel
interfaces 50-12
subinterfaces 50-12
portChannelMembersDown tooltip 69-17
PortChannel modes
description 23-11
PortChannel Protocol
autocreation 23-18
configuring autocreation 23-19
converting autocreated groups to manually configured 23-19
creating channel group 23-17
description 23-16
enabling autocreation 23-19
PortChannels
32-port switching module configuration guidelines 23-2
adding interfaces 23-13, 23-14
administratively down 20-10
comparison with trunking 23-3
compatibility checks 23-14
compatibility with DHCHAP 45-3
configuration guidelines 23-8
configuring23-6to ??
configuring auto-create 2-11
configuring for FCIP high availability 48-5
configuring using Device Manager 6-7
creation dialog box too small 69-8
default settings 23-20
deleting 23-12
deleting interfaces 23-16
description 23-1
down states C-2
examples 23-2
FICON support 36-5
forcing interface additions 23-15
Generation 2 switching module interfaces 22-17
high availability 17-1
incompatible modes C-2
incompatible remote switch C-2
incompatible speeds C-2
in-order guarantee 32-17
interface states 23-14
interoperability 37-9
IQN formats 50-8
link changes 32-17
link failures 32-3
load balancing 23-4
load balancing (example) 48-5
logging facility 63-2
member combinations 52-9
misconfiguration error detection 23-8
redundancy 48-7
reserving ports for FICON 36-13
SPAN sources 62-3
verifying configurations 23-20
wizard 5-21
portFabricBindFailure tooltip 69-17
portGracefulShutdown tooltip 69-17
port groups
assigning extended BB_credits 20-22
description 22-2
Generation 2 Fibre Channel switching modules 22-2
host-optimized performance 60-6
port indexes
description 22-16
port modes
auto 20-7
description20-3to 20-7
IPS 52-4, 53-1
port rate limiting
configuring 66-11
default 66-12
description 66-11
hardware restrictions 66-11
port rate modes
configuring 22-22
dedicated 22-6
description 22-4
oversubscribed 22-6
shared 22-6
See also rate modes
ports
aggregation 17-1
disabling using Device Manager 6-7
enabling using Device Manager 6-7
on-demand port activation licensing 11-1
virtual E 48-2
VSAN membership 26-7
Port Security
wizard 5-22
port security
activating 46-10
activation 46-3
activation rejection 46-11
auto-learning 46-2
CFS support 13-2
cleaning up databases 46-24
compatibility with DHCHAP 45-3
configuration guidelines 46-3
configuring CFS distribution46-19to 46-21
deactivating 46-10
default settings 46-25
deleting entries from database (procedure) 46-18
disabling 46-9
displaying settings (procedure) 46-13
displaying statistics (procedure) 46-13
displaying violations (procedure) 46-13
enabling 46-9
enforcement mechanisms 46-2
fabric binding comparison 47-1
forcing activation 46-11
license requirement 46-2
manual configuration guidelines 46-4
preventing unauthorized accesses 46-1
unauthorized accesses prevented 46-1
WWN identification 46-17
port security auto-learning
description 46-2
device authorization 46-15
disabling 46-15
distributing configuration 46-20
enabling 46-14
guidelines for configuring with CFS 46-3
guidelines for configuring without CFS 46-4
port security databases
cleaning up 46-24
copying 46-23
copying active to config (procedure) 46-12
deleting 46-24
interactions 46-22
manual configuration guidelines 46-4
merge guidelines 46-21
reactivating 46-12
scenarios 46-22
port speeds
configuring 20-12
configuring on Generation 2 switching module interfaces 22-21
port swapping. See FICON port swapping
port tracking
default settings 67-6
description 67-1
enabling 67-3
guidelines 67-2
monitoring ports in a VSAN 67-6
multiple ports 67-5
shutting down ports forcefully 67-6
portVsanMismatchIsolation tooltip 69-17
port world wide names. See pWWNs
power cycling
modules 19-6
powering off
switching modules 19-8
power supplies
configuration guidelines18-5to 18-7
configuring modes 18-4
configuring power attributes 18-5
default state 18-12
displaying configuration 18-5
power usage
displaying 18-3
preferences
Confirm Deletion default 5-18
default 5-18
Device Manager 6-8
Export Tables with Format default 5-18
Fabric Manager Clients 5-18
Show CFS Warnings default 5-18
Show Device Name by default 5-18
Show End Device Using default 5-18
Show Shortened iSCSI Names default 5-18
Show Timestamps as Date/Time default 5-18
Show WorldWideName (WWN) Vendor default 5-18
Telnet Path default 5-18
Use Secure Shell instead of Telnet default 5-18
preshared keys
RADIUS 41-8
TACACS+ 41-15
principal switches
assigning domain ID 25-10
processes
nondisruptive restarts 17-1
restartability 17-3
product IDs
displaying 18-1
promiscuous mode
configuring Gigabit Ethernet interfaces 52-6, 53-4
protocol 50-1
Protocol Analyzer
description 68-2
troubleshooting tools 68-2
using for troubleshooting 68-3
protocols
analyzing 68-17
VRRP 50-8
proxies
registering for name servers 34-2
proxy initiator
configuringiSCSI
configuring proxy initiator 50-21
proxy initiator mode 50-14, 50-25
configuring 50-20
zoning 50-22
proxy initiator modeiSCSI
proxy initiator mode 50-20
Public Key Infrastructure. See PKI
pWWNs
configuring fcalias members 30-20
converting dynamic to static 50-19
DPVM 28-1
rejecting duplicates 34-3
zone membership 30-2
Q
QoS
class maps 66-6
comparison with VSANs 66-5
control traffic support 66-3
creating class maps 66-7
data traffic support66-4to 66-10
default settings 66-12
description 66-1
DSCP value 48-28
DWRR queues 66-8
enabling control traffic 66-3
example data traffic configuration 66-10
logging facilities 63-2
port rate limiting 66-11
service policies 66-8
wizard 5-22
QoS values
configuring 50-32
R
R_A_TOV
default setting 68-25
modifying 68-15
RADIUS 50-57
AAA authentication 50-28, 50-43
AAA protocols 41-1
CFS merge guidelines 41-24
CFS support 13-2
clearing configuration distribution sessions 41-24
configuring an iSCSI RADIUS serveriSCSI
configuring a RADIUS server 50-31
configuring Cisco ACS41-26to 41-30
configuring test idle timer 41-11
configuring test user name 41-11
default settings 41-31
description 41-7
discarding configuration distribution changes 41-23
enabling configuration distribution 41-22
FabricWare support D-2
setting preshared keys 41-8
specifying server at user login 41-12
specifying time-out 41-9
starting a distribution session 41-22
rate limiting
default settings 66-12
rate modes
configuring on Generation 2 switching module interfaces 22-22
See also port rate modes
rcfInProgres tooltip 69-17
RCFs
description 25-3
incoming 25-6
rejecting incoming 25-7
read-only zones
configuration guidelines 30-38
configuring 30-39
default settings 30-45
description 30-38
reason codes
description 20-8
description (table) C-1
receive buffer groups. See buffer groups
receive data field sizes
configuring 20-13
reconfigure fabric frames. See RCFs
recovering passwords 39-19
recovery
from powered-down state 22-17
passwords 7-39
Red Hat Linux
Fabric Manager Server 3-1
redundancy
Ethernet PortChannels 48-6, 48-7
Fibre Channel PortChannels 48-7
VRRP 48-6
VSANs 26-4
redundancy states
value descriptions 17-4
redundant physical links
example (figure) 32-3
Registered Link Incident Reports. See RLIRs
Registered State Change Notifications. See RSCNs
reloading
switches 19-5
remote AAA server
delayed authentication 4-2
Remote Capture Protocol. See RPCAP
remote file systems
accessing B-2
remote SPAN
configuring B-2
Resource Allocation Time Out Value. See R_A_TOV
Resource Manager Essentials. See RME
resources
management 2-17
retransmitting intervals
configuring for FSPF 32-9
description 32-8
RLIRs
description 36-27
displaying information (procedure) 36-27
RME
support 1-6
RMON
alarms 61-1
configuring using Threshold Manager 61-1
default settings 61-19
defining an event (procedure) 61-17
description 61-1
enabling alarms 61-2
enabling alarms (procedure) 61-8, 61-10, 61-14
events 61-1
setting alarms (procedure) 61-3, 61-4, 61-5
viewing alarms (procedure) 61-18
viewing logs (procedure) 61-18
role-based management
controlling access 5-21
roles
adding web services roles 7-48
CFS support 13-2
default permissions 41-3
deleting (procedure) 39-3
privileges 5-21
removing web services roles 7-50
user profiles 41-3
round-trip response time
monitoring 9-3
route costs
computing 32-6
router discovery
IPv6 54-9
routing
multicast 32-14
See also broadcast routing
See also IP routing
RPCAP
Ethereal communication 68-18
RRD
configuring database 7-54
rsa1 key pairs
generating 39-15
RSA key-pairs
deleting 43-16
description 43-2
exporting 43-5, 43-14
generating 43-6
importing 43-5, 43-14
multiple 43-4
rsa key pairs
generating 39-15
RSCNs 50-16
clearing statistics 34-7
default settings 34-8
description 34-5
displaying information 34-5
logging facility 63-2
multiple port IDs 34-6
RSCN timers
CFS support 13-2
RSPAN
configuring B-2
running configuration files
saving to startup configuration file 16-8
runtime checks
static routes 32-12
S
SACKs
configuring in FCIP profiles 48-20
SAN extension package licenses
description 10-5
SAN extension tuner
configuring 49-2, B-2
data patterns 49-3
default settings 49-6
description 49-1
license requirements 49-3
tuning guidelines 49-2
SAN operating system. See Cisco MDS SAN-OS
SANTap
creating CVTs 57-4
creating DVTs 57-6, 57-9
default settings 57-10
deleting CVT 57-5
deleting DVTs 57-8
description57-1to 57-3
enabling 57-3
SAs
establishing between IPsec peers 44-28
lifetime negotiations 44-30
refreshing 44-20
setting lifetime 44-31
scalability
VSANs 26-4
schedulers. See command schedulers
SCP
support 2-15
scripts
FMServer.sh 2-31
SCSI
displaying LUN discovery results 35-3
monitoring frame counts 9-3
monitoring I/Os per second 9-3
monitoring read throughput 9-3
monitoring traffic throughput 9-3
routing requests 50-2
traffic reports 68-3
SCSI flow configuration clients
description 55-3
SCSI flow data path support
description 55-3
SCSI flow managers
description 55-2
SCSI flow services
CFS support 13-2
configuring55-3to??, 55-3to 55-6
configuring (procedure) 55-4
default settings 55-8
description 55-1
functional architecture (figure) 55-2
SCSI flow configuration clients 55-3
SCSI flow data path support 55-3
SCSI flow managers 55-2
SCSI flow statistics
clearing (procedure) 55-8
default settings 55-8
description 55-6
enabling 55-7
SCSI LUNs
customized discovery 35-2
discovering targets 35-1
displaying information 35-3
starting discoveries 35-2
SCSI sessions
monitoring status 9-3
SCSI traffic
analysis 68-2
analyzing at LUN level 68-2
SD port mode
description 20-6
interface modes 20-6
SD ports
bidirectional traffic 62-12
characteristics 62-5
Cisco Traffic Analyzer 9-4
configuring 20-12
configuring for SPAN monitoring 62-6
monitoring bidirectional traffic 62-12
SDV
IVR limitations 27-8
secondary MAC addresses
configuring 37-6
Secure Hash Algorithm. See SHA-1
Secure Shell Protocol
See SSH
Secure Shell Protocol. See SSH
security
accounting 41-3
managing on the switch 41-1
security associations. See SAs
security control
local 41-2
remote 41-2, 41-14
remote AAA servers 41-7
security parameter index. See SPI
selective acknowledgments. See SACKs
sensors
temperature monitoring 18-10
serial console ports
accessing switches 2-12
serial IDs
description 64-24
serial numbers
displaying 18-1, 18-3
server groups
configuring 41-20
service policies
defining 66-8
enforcement 66-8
services
restarting 7-39
starting 7-39
stopping 7-39
services modules
description 19-3
managing 19-1
power cycling 19-6
replacing 15-15
resetting 19-5
state descriptions 19-4
verifying status 19-3
setup command
using 2-12
SFPs
displaying transmitter types 20-16
not present reason codes C-1
transmitter types 20-16
SFTP
support 2-15
SHA-1
IKE 44-7
IPsec 44-6
shared rate mode
description 22-6
migrating from dedicated rate mode 22-19
migrating to dedicated rate mode 22-19
oversubscription 22-23
shell scripts
$HOME/.cisco_mds9000/bin directory 69-4
DeviceManager.sh 69-4
FabricManager.sh 69-4
for uninstalling Fabric Manager 2-40
shortcuts
not visible on desktops 69-4
site IDs
description 64-23
small computer system interface. See SCSI
SMARTnet
Call Home AutoNotify registration 64-2
SMTP
assigning contact names 64-4
server address 64-11
SNMP
access control 40-2
access groups 40-3
adding communities 40-7
assigning contact 40-2
assigning location 40-2
configuring event security 40-12
configuring event security (procedure) 40-12
configuring notification target users 40-11
creating users 40-4
default settings 40-13
deleting communities 40-7
deleting community strings (procedure) 40-8
enabling access 2-6
enabling SNMP notifications 40-10
encryption-based privacy 40-4
FICON control 36-22
group-based access 40-3
modifying users 40-4
port used 2-39
proxy services 2-14
read-only access 40-7
read-write access 40-7
security features 41-2
server contact name 64-3
users with multiple roles (procedure) 40-6
user synchronization with CLI 40-3
Version 3 security features 40-1, 40-2
versions supported 40-1
viewing event log 40-12
See also SNMPv1; SNMPv2c; SNMPv3
SNMP_TRAP
port used 2-39
SNMP community strings
configuring 2-9
SNMP manager
FCS 65-2
SNMP preferences
Enable Audible Alert when Event Received default 5-19
Retry request 1 time(s) after 5 sec timeout default 5-19
Trace SNMP packets in Log default 5-19
SNMPv1
community strings 40-2
description 40-2
FabricWare support D-2
support 2-16
See also SNMP
SNMPv2
community strings 40-2
FabricWare support D-2
SNMPv2c
configuring notifications 40-9
description 40-2
support 2-16
See also SNMP
SNMPv3
assigning multiple roles 40-6
CLI user managementSNMPv3
AAA integration 40-2
configuring notifications 40-10
description 40-2
enforcing message encryption 40-5
restricting switch access 40-3
security features 40-2
specifying cisco-av-pair 41-13
support 2-16
See also SNMP 40-2
software configuration
overview1-6to 1-9
software images
default settings 15-16
selecting for supervisor modules 15-2
space requirements 15-4
synchronizing 17-4
upgrade prerequisites15-3to 15-5
upgrading SAN-OS images 15-1
variables 15-1
software installation
Software Installation Wizard 15-8
software upgrades
disruptive 15-5
mechanisms 15-5
nondisruptive 17-1
Software Installation Wizard 15-8
soft zoning
description 30-25
See also zoning
Solaris 2-31
Fabric Manager Server 3-1
installing Fabric Manager Web Services 7-4
install scripts 2-31
source IDs
Call Home event format 64-24
exchange based 23-5
flow based 23-4
in-order delivery 32-15
path selection 26-11
SPAN
configuration guidelines 62-6
configuring62-6to 62-10
configuring Fibre Channel analyzers 62-11
configuring on switch ports 9-4
conversion behavior 62-9
default settings 62-13
description 62-2
egress sources 62-2
Fibre Channel analyzers 62-10
filters 62-5
monitoring traffic 9-1, 62-2
SD ports 62-5
sessions 62-5
sources 62-4
sources for monitoring 62-2
VSAN sources 62-4
SPAN destination port mode. See SD port mode
SPAN filters
description 62-5
guidelines 62-5
SPAN ports
viewing detailed traffic information 7-19
SPAN sessions
deleting using Device Manager 62-9
description 62-5
VSAN filters 62-5
SPAN sources
editing with Device Manager 62-8
egress 62-2
ingress 62-2
interface types 62-3
IPS ports 62-3
VSANs configuration guidelines 62-4
SPAN traffic
real-time analysis 68-2
SPAN tunnel port mode. See ST port mode
special frames
enabling for FCIP 48-24
SPF
computational hold times 32-4
SPI
configuring virtual routers 51-12
srcPortNotBound tooltip 69-17
SSH
default service 39-17
enabling 2-7, 2-10
FabricWare support D-2
host key pair 39-15
logins 41-4
port used 2-39
support 2-15
SSH key pair
overwriting 39-17
SSH sessions
message logging 63-3
SSI boot images
configuring B-2
SSL certificates
using with Fabric Manager Web Services 7-5
SSMs
configuring Intelligent Storage Services 57-1
default settings 19-13
disabling Intelligent Storage Services (procedure) 55-5, 58-3
enabling Intelligent Storage Services (procedure) 55-3, 58-2
Fibre Channel write acceleration56-1to 56-3
managing B-2
NASB58-1to 58-7
provisioning 58-2
provisioning Intelligent Storage Services (procedure) 55-3
SANTap57-1to ??
SCSI flow services55-1to 55-8
SCSI flow statistics55-1to 55-8
standby supervisor modules
boot alert 15-14
boot variable version 15-14
copying image to B-2
managing bootflash: 15-14
monitoring 17-2
synchronizing 17-4
startup configuration files
saving running configuration file 16-8
unlocking B-2
statically imported iSCSI targets 50-52
static iSLB initiator
converting 50-40
static mapped iSCSI targetiSCSI
static mapped target 50-27
static mapping 50-39
static routes
configuring 2-6
runtime checks 32-12
static WWN mapping 50-25
statistics
SCSI I/O 9-3
supervisor modules 19-4
storage devices
access control 30-1
performance statistics 8-1
permanent 16-2
temporary 16-2
Storage Services Enabler package licenses
description 10-7
storage traffic
viewing performance information 7-16
store-and-forward routing mode 50-33, 50-34
ST port mode
description 20-6
interface modes 20-6
limitations 20-6
ST ports
interface modes 20-6
subnet masks
configuring mgmt0 interfaces 20-23
configuring switches 2-2
default setting 19-13
initial configuration 2-6, 2-10
subnets
requirements 52-6, 53-5
summary reports
description 7-1
Sun JRE
Fabric Manager support 2-19
Supervisor-1 modules
selecting software images 15-2
Supervisor-2 modules
description 1-2
Generation 1 chassis 15-15
select software images 15-2
USB ports 1-2
supervisor modules
active state 19-5
capturing local traffic 68-18
default settings 19-12
description 1-2, 19-1
high availability 17-1
managing standby bootflash: 15-14
manual switchovers 17-2
redundancy 17-1
replacing 15-14, 15-15
resetting 19-5
standby boot alert 15-14
standby state 17-4, 19-5
standby supervisor boot variable version 15-14
state descriptions 17-4, 19-4
statistics 19-4
switchover mechanisms 17-2
switchovers after failures 17-1
synchronizing 17-3
upgrading a dual supervisor switch B-1
verifying status 19-3
viewing using Device Manager 6-7
See also Supervisor 1 modules; Supervisor 2 modules
suspendedByMode tooltip 69-17
suspendedBySpeed tooltip 69-17
suspendedByWWN tooltip 69-17
swFailure tooltip 69-17
Switched Port Analyzer. See SPAN
switches
accessing 2-12
comparing configurations 68-4
displaying power usage 18-3
displaying serial numbers 18-3
initial setup 2-2
internal states 17-4
reloading 19-5
starting 2-1
starting up B-1
status of device health 68-3
upgrading with dual supervisors B-1
viewing license information 7-25
switching modules
description 19-3
managing 19-1
power cycling 19-6
powering off 19-8
preserving configuration 19-7
replacing 15-15
resetting 19-5
state descriptions 19-4
verifying status 19-3
viewing using Device Manager 6-7
switch management
architecture 2-16
in-band 2-17, 51-5
out-of-band 2-17
switch names
assigning 12-1
switchover mechanism
warm state 19-5
switchovers
characteristics 17-2
guidelines 17-3
initiating manually 17-2
supervisor modules 17-1
VRRP 48-6
switch port interfaces
configuring default 2-11
switch ports
configuring attribute default values 20-16
configuring trunk modes 2-11
switch priorities
configuring 25-5
default 25-5
description 25-5
switch security
default settings 39-23, 41-30
sWWNs
configuring for fabric binding 47-3
syslog
CFS support 13-2
port used 2-39
viewing information 7-10
viewing registration information 7-42
viewing with Events tab 7-8
syslog servers
verifying using Fabric Manager Web Services 63-10
system health
default settings 70-7
initiating B-3
system images
description 15-2
selecting for supervisor modules 15-2
SYSTEM variable 15-1
system messages
configuring log files 63-6
configuring logging 63-3
configuring logging servers 63-7
default settings 63-11
monitoring 63-1
severity levels 63-3
viewing 7-10
viewing from Device Manager 63-11
viewing from Fabric Manager Web Server 63-11
viewing using Device Manager 59-4
viewing using Fabric Manager Web Server 59-3
viewing with Events tab 7-8
system processes
displaying 70-1
T
tables
filtering 7-3
navigating 7-3
searching for information 7-3
TACACS+
AAA authentication 50-43
AAA protocols 41-1
CFS merge guidelines 41-24
CFS support 13-2
clearing configuration distribution sessions 41-24
configuring Cisco ACS41-26to 41-30
default settings 41-31
description 41-14
discarding configuration distribution changes 41-23
displaying server statistics 41-18
enabling configuration distribution 41-22
global keys 41-15
setting default server encryption 41-15
setting default server timeout 41-15
setting preshared key 41-15
specifying server at login 41-18
starting a distribution session 41-22
validating 41-17
tape acceleration
FICON36-33to 36-37
target discovery 50-72
TCP connections
FCIP profiles 48-4
specifying number 48-25
TCP parameters
configuring in FCIP profiles48-19to ??
TCP ports
IPv4-ACLs 42-3
TCP tuning parameters 50-32
Telnet
default service 39-14
enabling 2-7, 2-10
logins 41-4
port used 2-39
support 2-15
Telnet server connections
description 12-11
disabling 12-11
Telnet sessions
message logging 63-3
temperatures
displaying 18-11
major thresholds 18-10
minor thresholds 18-10
monitoring hardware 18-10
templates
creating for custom reports 7-33
modifying custom report templates 7-36
TE port mode
classes of service 20-6
description 20-6
TE ports
fabric binding checking 47-2
FCS support 65-1, 65-2
FSPF topologies 32-2
interoperability 37-9
recovering from link isolations 30-27
SPAN sources 62-3
trunking restrictions 24-1
terminals
configuring settings B-1
TFTP
port used 2-39
support 2-15
Threshold Manager
configuring RMON 61-1
thresholds
baselines for performance 8-2
time
configuring 12-3
time delays
setting B-2
timeouts
configuring with Fabric Manager 68-15
time out values. See TOVs
timers
configuring 68-15
timer values
modifying 68-14
timestamps
FICON host control 36-22
time zones
configuring 12-3
TL port mode
classes of service 20-5
description 20-5
TL ports
ALPA caches 20-19
configuring 20-12, 20-19
description 20-18
FCS 65-1, 65-2
FCS support 65-1, 65-2
logging facility 63-2
SPAN sources 62-3
tools
software configuration 1-5
tooManyInvalidFLOGIs tooltip 69-17
topologies
clearing maps 69-21
mapping 59-1
topology map
mapping multiple fabrics 59-3
topology maps
custom 59-2
description 59-1
enclosures 59-3
saving custom layouts (procedure) 59-2
tovMismatch tooltip 69-17
TOVs
configuring across all VSANs 37-2
configuring for a VSAN 37-3
default settings 37-13, 68-25
interoperability 37-9
ranges 37-2, 68-14
traceroute
description 68-7
troubleshooting connectivity 68-7
tracked ports
binding operationally 67-3
traffic
local captures 68-19
managing using Cisco Traffic Analyzer 9-2
monitoring using Cisco Traffic Analyzer 9-2
remote captures 68-18, 68-19
text-based captures 68-18
viewing captured frames 68-20
Traffic Analyzer. See Cisco Traffic Analyzer
traffic isolation
VSANs 26-4
transform sets
description 44-25
transient failure 50-16
transit VSANs
configuration guidelines 29-10
description 29-3, 29-17
IVR configuration guidelines 29-14
translative loop port mode. See TL port mode
transparent initiator mode 50-14
transparent initiator modeiSCSI
transparent initiator mode 50-20
traps
viewing registration information 7-42
Triple DES. See 3DEC encryption
troubleshooting
analyzing switch health 68-3
analyzing zone merges 68-8
CTC 48-18
Fabric Manager tools 5-22
locating other switches 68-13
monitoring oversubscription 68-14
show tech command 68-9
testing end-to-end connectivity 68-5
tools 68-1
using Fabric Configuration tool (procedure) 68-4
using Ping Tool 68-7
using traceroute (procedure) 68-7
with Cisco Traffic Analyzer 68-2
with Protocol Analyzer 68-3
troubleshooting reports
Cisco Traffic Analyzer 68-2
trunk-allowed VSAN lists
description24-4to 24-6
trunking
comparison with PortChannels 23-3
configuration guidelines 24-2
configuring modes 24-3
configuring using Device Manager 6-7
default settings 24-6
description 24-1
interoperability 37-9
link state 24-3
merging traffic 24-2
restrictions 24-1
trunking E port mode. See TE port mode
trunking mode
FCIP interface 48-4
trunking ports
associated with VSANs 26-8
trunking protocol
default settings 24-6
default state 24-2
description 24-2
detecting port isolation 24-2
trunk mode
configuring 24-3
default settings 24-6
status 24-3
trunkNotFullyActive tooltip 69-18
trust points
creating 43-8
description 43-2
multiple 43-3
saving configuration across reboots 43-14
U
UDP ports
IPv4-ACLs 42-3
UDP traffic
blocking 2-14
unique area FC IDs
configuring 25-19
description 25-19
UNIX
install scripts 2-31
launching Fabric Manager Web Services 7-7
UNIX issues
parent menus disappear 69-11
too many open files error 69-11
web browser cannot find web server 69-11
upgradeInProgress tooltip 69-18
upgrades. See disruptive upgrades; nondisruptive upgrades; software upgrades
upgrading
switches B-1
user accounts
creating additional at setup 2-5
User-based roles
FabricWare support D-2
user IDs
authentication 41-3
user profiles
role information 41-3
users
adding 7-47
CFS support 13-2
default 2-3
deleting (procedure) 39-14
removing 7-48
SNMP support 40-4
V
vendor-specific attributes. See VSAs
VE ports
description 48-2
FCIP 48-2
virtual E ports. See VE ports
virtual Fibre Channel host 50-3
virtual ISLs
description 48-2
Virtual LANs. See VLANs
virtual LANs. See VLANs
virtual router IDs. See VR IDs
Virtual Router Redundancy Protocol. See VRRP
Virtual Router Redundancy Protocolprotocols
Virtual Router Redundancy 50-35
virtual routers
adding 51-10
adding primary IP addresses 51-11
authentication 51-12
default settings 51-13
deleting 51-10
initiating 51-11
setting priorities 51-11
virtual SANs. See VSANs
Visio diagrams
saving maps as 5-15
VLANs
configuring on Gigabit Ethernet subinterfaces 53-5
description 52-6, 53-4
volatile:
description 16-2
VR IDs
description 51-9
mapping 51-9
VRRP 50-35
algorithm for selecting Gigabit Ethernet interfaces50-45to ??
backup switches 51-9
configuring advertisement time intervals 51-11
configuring for Gigabit Ethernet interfaces 52-9
configuring for iSLB 50-45
configuring virtual routers 51-10
default settings 51-13
description 51-9, 52-8
group members 52-8
initiating virtual routers 51-11
IQN formats 50-8
iSCSI parameter change impact 50-45
iSLB50-43to ??
logging facility 63-2
master switches 51-9
MD5 authentication 51-12
primary IP address 51-11
priority preemption 51-11
security authentication 51-12
setting priorities 51-11
setting priority 51-11
simple text authentication 51-12
VRRP group 50-23
VRRP-I f iSCSI login redirect 50-37
VSAN IDs
allowed list 24-6
description 26-5
multiplexing traffic 20-6
range 26-4
VSAN membership 26-4
vsanInactive tooltip 69-18
VSAN interfaces
configuring 20-24
creating 20-25
description 20-24
VSAN membership
iSCSI hosts 50-22
iSCSI hostsiSCSI
VSAN membership for hosts 50-22
iSCSI interfaces 50-23
vsanMismatchIsolation tooltip 69-18
VSANs
advantages 26-3
allowed-active 24-1
allowed list 62-4
broadcast addresses 32-14
clocks 36-22
comparison with QoS 66-5
comparison with zones (table) 26-4
compatibility with DHCHAP 45-3
configuring26-6to ??
configuring allowed-active lists 24-6
configuring FSPF 32-4
configuring multiple IPv4 subnets 51-7
configuring trunk-allowed lists24-4to 24-6
default settings 26-12
default VSANs 26-8
deleting 26-9
description26-1to 26-4
domain ID automatic reconfiguration 25-8
example membership for iSCSI devices 50-23
fabric optimization for FICON 36-3
FC IDs 26-1
FCS 65-1
FCS support 65-1
features 26-1
FICON-enabled 26-12
flow statistics 8-3
FSPF connectivity 32-2
gateway switches 51-4
interop mode 37-9
IP routing 42-1
IPv4 static routing 51-6
iSLB 50-40
iSLB initiators 50-40
isolated 26-8
load balancing 26-11
load balancing attributes 26-5
mismatches 20-10, C-2
multiple zones 30-5
names 26-5
name server 34-2
operational states 26-9
overlaid routes 51-6
port membership 26-7
port tracking 67-6
Rules and features 39-4
SPAN filters 62-5
SPAN source 62-4
SPAN sources 62-4
states 26-5
suspending for FICON 36-19
TE port mode 20-6
timer configuration 37-3
traffic isolation 26-3
traffic routing between 51-1
transit 29-17
trunk-allowed 24-1
trunking ports 26-8
VRRP 51-9
wizard 5-21
VSAN trunking. See trunking
VSAs
communicating attributes 41-13
protocol options 41-13
W
window management
configuring in FCIP profiles 48-20
Windows
Fabric Manager Server 3-1
Fabric Manager support 2-19
installing Fabric Manager Web Services 7-4
Windows issues
blue screen 69-10
Device Manager window content disappears 69-11
Fabric Manager window content disappears 69-11
icons disappear from desktop 69-11
printing causes an application crash 69-10
SCP/SFTP failures 69-11
text fields are too small 69-10
Windows XP hangs 69-10
Windows workstations
modifying 2-14
wizards
DPVM Wizard 5-22
FCIP Wizard 5-21
IP ACL Wizard 5-22
iSCSI Wizard 5-22
IVR Zone Wizard 5-21
License Install Wizard 5-22
NPV Wizard 5-22
PortChannel Wizard 5-21
Port Security Wizard 5-22
QoS Wizard 5-22
Quick Config Wizard 30-7
Software Install Wizard 5-22
VSAN Wizard 5-21
Zone Edit Tool Wizard 5-21
world wide names. See WWNs
WWNs
configuring 37-5, 68-23
displaying configurations 68-24
displaying information 37-6
link initialization 37-6
port security 46-17
secondary MAC addresses 37-6
static binding 50-20
suspended connection C-2
suspended connections 20-10
X
XML
support 2-16
XRC
FICON support 36-5
Z
zone aliases
conversion to device aliases 31-5
zone attribute groups
cloning 30-31
zone configurations
test for compatibility 68-8
zone databases
migrating a non-MDS database 30-32
zone members
adding to zones 30-14
converting to pWWN members 30-23
displaying information 30-19
zoneMergeFailureIsolation tooltip 69-18
zone policies
configuring 2-11
zoneRemoteNoRespIsolation tooltip 69-18
zones
access control 30-16
adding zone members 30-14
analyzing merges 68-8
assigning LUNs to storage subsystems 30-38
backing up (procedure) 30-29
changing from enhanced zones 30-41
cloning 30-31
compacting for downgrading 30-44
comparison with device aliases (table) 31-2
comparison with VSANs (table) 26-4
configuring30-10to 30-24
configuring aliases 30-20
configuring and activating for iSLB 50-41
configuring broadcasting 30-35
configuring fcaliases 30-20
default policies 30-2
default settings 30-45
differences with IVR zones (table) 29-22
displayed as bold 69-9
editing full zone databases 30-11
enforcing restrictions 30-25
exporting databases 30-27
features 30-1, 30-3
importing databases 30-27
iSLB 50-41, 50-42
IVR communication 29-22
logging facility 63-3
LUN-based 30-36
membership using pWWNs 26-4
merge failures 20-10
read-only for IVR 29-31
renaming 30-30
restoring (procedure) 30-29
troubleshooting tools 5-22
viewing information 30-39
viewing inventory information 7-30
wizard 5-21
See also default zones
See also enhanced zones
See also hard zoning; soft zoning
See also LUN zoning
See also read-only zones
See also zoning; zone sets
zone server databases
clearing 30-32
zone sets
activating 30-17
cloning 30-31
configuring30-15to 30-20
considerations 30-5
copying 30-28
creating 30-16
default settings 30-45
distributing configuration 30-25
enabling distribution 30-25
exporting 30-27
exporting databases 30-27
features 30-1
importing 30-27
importing databases 30-27
one-time distribution 30-26
recovering from link isolations 30-27
renaming 30-30
viewing information 30-39
See also active zone sets
See also active zone sets; full zone sets
See also zones; zoning
zone traffic priorities
description 30-33
zoning
configuring broadcasting 30-35
description 30-1
example 30-2
FabricWare support D-2
implementation 30-3
Quick Config Wizard30-7to 30-10
See also LUN zoning
See also zones; zone sets
zoning based access control
configuring for iSCSI 50-25
configuring for iSCSIiSCSI
configuring zoning based access control 50-25