Sign In
Upload
Manuals
Brands
Cisco Manuals
Network Router
N5010P-N2K-BE
User Manuals: Cisco N5010P-N2K-BE Network Router
Manuals and User Guides for Cisco N5010P-N2K-BE Network Router. We have
1
Cisco N5010P-N2K-BE Network Router manual available for free PDF download: Software Configuration Manual
Cisco N5010P-N2K-BE Software Configuration Manual (704 pages)
NX-OS Software Configuration Guide
Brand:
Cisco
| Category:
Network Router
| Size: 9.37 MB
Table of Contents
Table of Contents
3
Document Conventions
34
Obtaining Documentation and Submitting a Service Request
35
Related Documentation
35
CHAPTER 1 Product Overview
37
Cisco Nexus 5000 Series Switch Hardware
39
Ethernet Interfaces
40
Fabric Extender
40
Fibre Channel Interfaces
40
Management Interfaces
40
Cisco Nexus 5000 Series Switch Software
40
Ethernet Switching
41
Fcoe and Fibre Channel Switching
41
Switch Management
42
Network Security Features
43
Virtual Device Contexts
44
Typical Deployment Topologies
44
Ethernet Tor Switch Topology
44
Fabric Extender Deployment Topology
45
I/O Consolidation Topology
47
Supported Standards
48
Configuration Fundamentals
49
New Technologies in the Cisco Nexus 5000 Series
37
I/O Consolidation
38
Virtual Interfaces
39
Expansion Modules
39
Using the Command-Line Interface
51
CHAPTER 2 Using the Command-Line Interface2-1
51
Accessing the Command Line Interface
51
Using the CLI
52
Using CLI Command Modes
52
CLI Command Hierarchy
53
Using the CLI
53
EXEC Mode Commands
54
Configuration Mode Commands
55
Using Commands
56
Entering Command Sequences
57
Listing Commands and Syntax
57
Undoing or Reverting to Default Values or Conditions
57
Using Keyboard Shortcuts
58
Using CLI Variables
59
User-Defined Persistent CLI Variables
59
Using Command Aliases
60
Command Scripts
61
Executing Commands Specified in a Script
61
Using CLI Variables in Scripts
62
Setting the Delay Time
63
Configuring the Switch
65
CHAPTER 3 Configuring the Switch3-1
65
Defining Command Aliases
61
Image Files on the Switch
65
Boot Sequence
66
Starting the Switch
66
Image Files on the Switch
66
Console Settings
67
Upgrading the Switch
68
Downgrading from a Higher Release
70
Initial Configuration
71
Configuration Prerequisites
71
Initial Setup
72
Preparing to Configure the Switch
72
Configuring the Switch
73
Default Login
73
Changing the Initial Configuration
76
Accessing the Switch
76
Additional Switch Configuration
76
Assigning a Switch Name
77
Configuring Date, Time, and Time Zone
77
Adjusting for Daylight Saving Time or Summer Time
78
NTP Configuration
79
About NTP
79
NTP Configuration Guidelines
80
Configuring NTP
81
NTP CFS Distribution
81
Management Interface Configuration
83
About the Mgmt0 Interface
83
Configuring the Management Interface
84
Displaying Management Interface Configuration
84
Shutting down the Management Interface
85
Managing the Switch Configuration
85
Displaying the Switch Configuration
85
Saving a Configuration
85
Using Switch File Systems
86
Clearing a Configuration
86
Setting the Current Directory
86
Creating a Directory
87
Deleting an Existing Directory
87
Displaying the Current Directory
87
Listing the Files in a Directory
87
Copying Files
88
Deleting Files
88
Moving Files
88
Compressing and Uncompressing Files
89
Displaying File Contents
89
Saving Command Output to a File
89
Managing Licenses
91
CHAPTER 4 Managing Licenses
92
Licensing Model
92
License Installation
93
Obtaining a Factory-Installed License
93
Performing a Manual Installation
94
Obtaining the License Key File
94
Installing the License Key File
94
Backing up License Files
96
Identifying License Features in Use
96
Uninstalling Licenses
96
Updating Licenses
98
Grace Period Alerts
98
License Transfers between Switches
99
Verifying the License Configuration
100
LAN Switching
101
Configuring Ethernet Interfaces
103
CHAPTER 5 Configuring Ethernet Interfaces5-1
103
Information about Ethernet Interfaces
103
About the Interface Command
103
About the Unidirectional Link Detection Parameter
104
Configuring Ethernet Interfaces
104
This Section Includes the Following Topics
104
About Interface Speed
106
About the Cisco Discovery Protocol
106
About the Debounce Timer Parameters
106
About MTU Configuration
107
Configuring Ethernet Interfaces
107
Configuring the UDLD Mode
107
Configuring Interface Speed
108
Configuring the Cisco Discovery Protocol
109
Configuring the Debounce Timer
110
Configuring the Description Parameter
111
Disabling and Restarting Ethernet Interfaces
111
Displaying Interface Information
112
Default Physical Ethernet Settings
114
Chapter 6 Configuring Vlans
117
Information about Vlans
117
Understanding Vlans
117
Understanding VLAN Ranges
118
Creating, Deleting, and Modifying Vlans
119
Configuring a VLAN
120
Creating and Deleting a VLAN
120
Entering the VLAN Submode and Configuring the VLAN
121
Adding Ports to a VLAN
122
Verifying VLAN Configuration
122
About Private Vlans
125
Primary and Secondary Vlans in Private Vlans
126
Understanding Private VLAN Ports
127
Understanding Broadcast Traffic in Private Vlans
129
Understanding Private VLAN Port Isolation
129
Chapter 7 Configuring Private Vlans
125
Configuring a Private VLAN
129
Configuration Guidelines for Private Vlans
130
Enabling Private Vlans
130
Associating Secondary Vlans with a Primary Private VLAN
131
Configuring a VLAN as a Private VLAN
131
Configuring an Interface as a Private VLAN Host Port
132
Configuring an Interface as a Private VLAN Promiscuous Port
133
Verifying Private VLAN Configuration
134
Information about Rapid PVST+
137
CHAPTER 8 Configuring Rapid PVST+8-1
138
Information about Rapid PVST
138
Understanding STP
138
Understanding the Bridge ID
139
Understanding Bpdus
140
Understanding Rapid Pvst+
142
Understanding Rapid PVST
142
Figure
144
Proposal and Agreement Handshake
144
Rapid PVST+ Bpdus
144
Protocol Timers
145
Port Roles
146
Port States
147
Synchronization of Port Roles
149
Detecting Unidirectional Link Failure
150
Port Cost
151
Port Priority
152
Rapid PVST+ and IEEE 802.1Q Trunks
152
Rapid PVST+ Interoperation with Legacy 802.1D STP
152
Configuring Rapid Pvst+
153
Configuring Rapid PVST
153
Enabling Rapid PVST
153
Enabling Rapid PVST+ Per VLAN
154
Configuring the Root Bridge ID
155
Configuring a Secondary Root Bridge
156
Configuring the Rapid PVST+ Port Priority
157
Configuring the Rapid PVST+ Pathcost Method and Port Cost
157
Configuring the Rapid PVST+ Bridge Priority of a VLAN
158
Configuring the Rapid PVST+ Hello Time for a VLAN
159
Configuring the Rapid PVST+ Forward Delay Time for a VLAN
159
Configuring the Rapid PVST+ Maximum Age Time for a VLAN
159
Specifying the Link Type
160
Restarting the Protocol
161
Rapid PVST+ Interoperation with 802.1S MST
153
Verifying Rapid PVST+ Configurations
161
Configuring Mst
163
CHAPTER 9 Configuring MST
164
Information about MST
164
MST Overview
164
MST Regions
164
MST Bpdus
165
MST Configuration Information
165
IST, CIST, and CST
166
Boundary Ports
169
Hop Count
169
Detecting Unidirectional Link Failure
170
Port Cost and Port Priority
170
Configuring MST
171
Interoperability with IEEE 802.1D
171
Interoperability with Rapid PVST+: Understanding PVST Simulation
171
Mst Configuration Guidelines
172
Enabling MST
172
Entering MST Configuration Mode
173
Specifying the MST Name
174
Specifying the Configuration on an MST Region
175
Specifying the MST Configuration Revision Number
175
Mapping and Unmapping Vlans to MST Instances
177
Configuring the Root Bridge
178
Mapping Secondary Vlans to same MSTI as Primary Vlans for Private Vlans
178
Configuring a Secondary Root Bridge
179
Configuring the Port Priority
180
Configuring the Port Cost
181
Configuring the Switch Priority
182
Configuring the Hello Time
183
Configuring the Forwarding-Delay Time
184
Configuring the Maximum-Aging Time
184
Configuring the Maximum-Hop Count
184
Configuring PVST Simulation Globally
185
Configuring PVST Simulation Per Port
185
Specifying the Link Type
186
Restarting the Protocol
187
Verifying MST Configurations
187
Configuring Stp Extensions
189
Information about STP Extensions
189
CHAPTER 10 Configuring STP Extensions
190
Information about STP Extensions
190
Understanding Bridge Assurance
190
Understanding STP Port Types
190
Understanding BPDU Guard
191
Understanding BPDU Filtering
191
Understanding Loop Guard
192
Configuring Stp Extensions
193
STP Extensions Configuration Guidelines
193
Understanding Root Guard
193
Configuring Spanning Tree Port Types Globally
194
Configuring Spanning Tree Edge Ports on Specified Interfaces
195
Configuring Spanning Tree Network Ports on Specified Interfaces
195
Enabling BPDU Guard Globally
196
Enabling BPDU Guard on Specified Interfaces
197
Enabling BPDU Filtering Globally
198
Enabling BPDU Filtering on Specified Interfaces
198
Enabling Loop Guard Globally
200
Enabling Loop Guard or Root Guard on Specified Interfaces
200
Verifying STP Extension Configuration
201
Configuring Etherchannels
203
Information about Etherchannels
203
CHAPTER 11 Configuring Etherchannels11-1
204
Information about Etherchannels
204
Compatibility Requirements
204
Configuring Etherchannels
204
Understanding Etherchannels
204
Load Balancing Using Etherchannels
205
Understanding LACP
206
Configuring Etherchannels
209
Creating an Etherchannel
209
Adding a Port to an Etherchannel
210
Configuring Load Balancing Using Etherchannels
211
Configuring Port-Channel Port Modes
212
Enabling LACP
212
Configuring the LACP Port Priority
213
Configuring the LACP System Priority and System ID
213
Verifying Port-Channel Configuration
214
CHAPTER 12 Configuring Access and Trunk Interfaces
215
Information about Access and Trunk Interfaces
215
Understanding Access and Trunk Interfaces
215
Understanding IEEE 802.1Q Encapsulation
216
Understanding Access Vlans
217
Understanding the Native VLAN ID for Trunk Ports
217
Configuring a LAN Interface as an Ethernet Access Port
218
Configuring Access and Trunk Interfaces
218
Understanding Allowed Vlans
218
Configuring Access Host Ports
219
Configuring the Native VLAN for 802.1Q Trunking Ports
220
Configuring Trunk Ports
220
Configuring the Allowed Vlans for Trunking Ports
221
Verifying Interface Configuration
222
CHAPTER 13 Configuring the MAC Address Table13-1
223
Configuring MAC Addresses
223
Configuring a Static MAC Address
224
Configuring the Aging Time for the MAC Table
224
Clearing Dynamic Addresses from the MAC Table
225
Information about MAC Addresses
223
Verifying the MAC Address Configuration
225
Chapter 14 Configuring IGMP Snooping
227
Information about IGMP Snooping
227
Igmpv1 and Igmpv2
228
IGMP Forwarding
229
IGMP Snooping Querier
229
Igmpv3
229
Configuring IGMP Snooping Parameters
230
Verifying IGMP Snooping Configuration
232
CHAPTER 15 Configuring Traffic Storm Control15-1
235
Information about Traffic Storm Control
235
Guidelines and Limitations
236
Configuring Traffic Storm Control
237
Verifying Traffic Storm Control Configuration
237
Displaying Traffic Storm Control Counters
237
Traffic Storm Control Example Configuration
238
Default Settings
238
Switch Security Features
239
CHAPTER 16 Configuring AAA
241
Information about AAA
241
AAA Security Services
241
Benefits of Using AAA
242
AAA Server Groups
243
AAA Service Configuration Options
243
Remote AAA Services
243
Authentication and Authorization Process for User Login
244
Prerequisites for Remote AAA
245
AAA Guidelines and Limitations
246
Configuring Console Login Authentication Methods
246
Configuring Default Login Authentication Methods
248
Enabling Login Authentication Failure Messages
248
Enabling MSCHAP Authentication
249
Configuring AAA Accounting Default Methods
250
Using AAA Server Vsas with Nexus 5000 Series Switches
251
Displaying and Clearing the Local AAA Accounting Log
252
Default Settings
253
CHAPTER 17 Configuring RADIUS17-1
255
Example AAA Configuration
253
Verifying AAA Configuration
253
Information about RADIUS
255
RADIUS Network Environments
255
RADIUS Operation
256
RADIUS Server Monitoring
257
Vendor-Specific Attributes
257
Configuring RADIUS Servers
258
Configuring RADIUS Server Hosts
259
Configuring Global Preshared Keys
260
Configuring RADIUS Server Preshared Keys
260
Configuring RADIUS Server Groups
261
Allowing Users to Specify a RADIUS Server at Login
262
Configuring the Global RADIUS Transmission Retry Count and Timeout Interval
263
Configuring the RADIUS Transmission Retry Count and Timeout Interval for a Server
263
Configuring Accounting and Authentication Attributes for RADIUS Servers
264
Configuring Periodic RADIUS Server Monitoring
265
Configuring the Dead-Time Interval
266
Displaying RADIUS Server Statistics
267
Manually Monitoring RADIUS Servers or Groups
267
Verifying RADIUS Configuration
267
Default Settings
268
Example RADIUS Configuration
268
Information about TACACS
269
Guidelines and Limitations
258
Prerequisites for RADIUS
258
CHAPTER 18 Configuring Tacacs
269
TACACS+ Advantages
270
User Login with TACACS
270
Default TACACS+ Server Encryption Type and Preshared Key
271
TACACS+ Server Monitoring
271
Prerequisites for TACACS
272
Guidelines and Limitations
272
Configuring TACACS
272
TACACS+ Server Configuration Process
272
Configuring TACACS+ Server Hosts
273
Enabling TACACS
273
Configuring Global Preshared Keys
274
Configuring TACACS+ Server Groups
275
Configuring TACACS+ Server Preshared Keys
275
Specifying a TACACS+ Server at Login
276
Configuring the Global TACACS+ Timeout Interval
277
Configuring the Timeout Interval for a Server
277
Configuring TCP Ports
278
Configuring Periodic TACACS+ Server Monitoring
279
Configuring the Dead-Time Interval
280
Disabling TACACS
280
Manually Monitoring TACACS+ Servers or Groups
280
Displaying TACACS+ Statistics
281
Verifying TACACS+ Configuration
281
Example TACACS+ Configuration
281
Default Settings
282
Configuring Ssh and Telnet
283
CHAPTER 19 Configuring SSH and Telnet19-1
283
Information about SSH and Telnet
283
SSH Server
283
SSH Client
284
SSH Server Keys
284
Telnet Server
284
Prerequisites for SSH
284
Configuring SSH
285
Generating SSH Server Keys
285
Specifying the SSH Public Keys for User Accounts
286
Clearing SSH Hosts
288
Deleting SSH Server Keys
288
Disabling the SSH Server
288
Starting SSH Sessions to Remote Devices
288
Clearing SSH Sessions
289
Guidelines and Limitations
285
Configuring Telnet
289
Enabling the Telnet Server
289
Clearing Telnet Sessions
290
Starting Telnet Sessions to Remote Devices
290
SSH Example Configuration
291
Verifying the SSH and Telnet Configuration
291
Default Settings
292
SSH Server
292
Telnet Server
292
CHAPTER 20 Configuring Acls
293
Information about Acls
293
IP ACL Types and Applications
293
Rules
294
Configuring IP Acls
296
Changing an IP ACL
297
Creating an IP ACL
297
Removing an IP ACL
298
Applying an IP ACL as a Port ACL
299
Changing Sequence Numbers in an IP ACL
299
Applying an IP ACL as a VACL
300
Verifying IP ACL Configurations
300
Displaying and Clearing IP ACL Statistics
301
Configuring MAC Acls
301
Changing a MAC ACL
302
Creating a MAC ACL
302
Removing a MAC ACL
303
Applying a MAC ACL as a Port ACL
304
Changing Sequence Numbers in a MAC ACL
304
Applying a MAC ACL as a VACL
305
Displaying and Clearing MAC ACL Statistics
305
Verifying MAC ACL Configurations
305
Information about VLAN Acls
306
Vacls and Access Maps
306
Vacls and Actions
306
Configuring Vacls
307
Creating or Changing a VACL
307
Statistics
307
Applying a VACL to a VLAN
308
Removing a VACL
308
Displaying and Clearing VACL Statistics
309
Verifying VACL Configuration
309
Default Settings
310
System Management
311
CHAPTER 21 Using Cisco Fabric Services21-1
313
Information about CFS
313
CFS Distribution
314
CFS Distribution Modes
314
Enabling/Disabling CFS Distribution on a Switch
315
CFS Distribution over IP
316
Verifying CFS Distribution Status
316
CFS Distribution over Fibre Channel
317
CFS Distribution Scopes
317
CFS Merge Support
318
CFS Support for Applications
318
CFS Application Requirements
318
Enabling CFS for an Application
319
Committing Changes
320
Locking the Network
320
Discarding Changes
321
Saving the Configuration
321
CFS Regions
321
About CFS Regions
322
Example Scenario
322
Managing CFS Regions
322
Clearing a Locked Session
321
Configuring CFS over IP
324
Enabling CFS over IP
324
Configuring IP Multicast Address for CFS over IP
325
Verifying the CFS over IP Configuration
325
Verifying IP Multicast Address Configuration for CFS over IP
326
Displaying CFS Distribution Information
326
Default Settings
328
CHAPTER 22 Configuring User Accounts and RBAC22-1
329
Information about User Accounts and RBAC
329
About User Accounts
329
About User Roles
330
Characteristics of Strong Passwords
330
About Rules
331
About User Role Policies
331
Configuring User Accounts
332
Guidelines and Limitations
332
Configuring RBAC
333
Creating User Roles and Rules
333
Changing User Role Interface Policies
335
Creating Feature Groups
335
Changing User Role VLAN Policies
336
Changing User Role VSAN Policies
336
Example User Accounts and RBAC Configuration
337
Verifying User Accounts and RBAC Configuration
337
Default Settings
338
Chapter 23 Configuring Session Manager
339
Configuration Guidelines and Limitations
339
Configuring Session Manager
339
Configuring Acls in a Session
340
Creating a Session
340
Committing a Session
341
Discarding a Session
341
Saving a Session
341
Session Manager Example Configuration
341
Verifying a Session
341
Information about Session Manager
339
Verifying Session Manager Configuration
342
CHAPTER 24 Configuring Online Diagnostics24-1
343
Information about Online Diagnostics
343
Bootup Diagnostics
343
Online Diagnostics Overview
343
Health Monitoring Diagnostics
344
Expansion Module Diagnostics
345
Configuring Online Diagnostics
346
Default Settings
346
Verifying Online Diagnostics Configuration
346
Chapter 25 Configuring System Message Logging
349
Information about System Message Logging
349
Configuring System Message Logging to Terminal Sessions
350
Syslog Servers
350
Configuring System Message Logging to a File
351
Configuring Module and Facility Messages Logged
352
Configuring Syslog Servers
353
Configuring Syslog Server Configuration Distribution
355
Displaying and Clearing Log Files
356
System Message Logging Example Configuration
357
Verifying System Message Logging Configuration
357
Default Settings
358
CHAPTER 26 Configuring Smart Call Home26-1
359
Information about Call Home
359
Call Home Overview
359
Call Home Alert Groups
360
Destination Profiles
360
Call Home Message Levels
362
Obtaining Smart Call Home
363
Configuration Guidelines and Limitations
363
Prerequisites for Call Home
363
Configuring Call Home
364
Configuring Contact Information
364
Guidelines for Configuring Call Home
364
Creating a Destination Profile
366
Modifying a Destination Profile
366
Associating an Alert Group with a Destination Profile
367
Adding Show Commands to an Alert Group
368
Configuring E-Mail
368
Configuring Periodic Inventory Notification
369
Disabling Duplicate Message Throttle
370
Enabling or Disabling Call Home
370
Testing Call Home Communications
371
Verifying Call Home Configuration
371
Call Home Example Configuration
372
Default Settings
372
Additional References
373
Message Formats
373
Sample Syslog Alert Notification in Full-Text Format
376
Sample Syslog Alert Notification in XML Format
377
CHAPTER 27 Configuring SNMP27-1
381
Information about SNMP
381
SNMP Functional Overview
381
SNMP Notifications
382
Snmpv3
382
Configuring SNMP
382
Configuring SNMP Users
385
Enforcing SNMP Message Encryption
385
Assigning Snmpv3 Users to Multiple Roles
386
Configuring SNMP Notification Receivers
386
Creating SNMP Communities
386
Configuring the Notification Target User
387
Enabling SNMP Notifications
388
Configuring Linkup/Linkdown Notifications
389
Disabling Up/ down Notifications on an Interface
390
Enabling One-Time Authentication for SNMP over TCP
390
Assigning SNMP Switch Contact and Location Information
391
SNMP Example Configuration
391
Verifying SNMP Configuration
391
Default Settings
392
CHAPTER 28 Configuring RMON28-1
393
Information about RMON
393
RMON Alarms
393
RMON Events
394
Configuration Guidelines and Limitations
394
Configuring RMON
395
Configuring RMON Alarms
395
Configuring RMON Events
396
RMON Example Configuration
396
Verifying RMON Configuration
396
Default Settings
397
Fibre Channel over Ethernet
399
CHAPTER 29 Configuring Fcoe
401
Information about Fcoe
401
Licensing Requirements
401
Converged Network Adapters
402
DCBX Capabilities
402
DCBX Feature Negotiation
403
DCE Bridging Capability Exchange Protocol
403
Ethernet Frame Formats
404
Configuring Fcoe
404
Enabling Fcoe
405
Enabling Fcoe on Ethernet Interfaces
405
Configuring IEEE 802.3X Link-Level Flow Control
406
Configuring Priority Flow Control
406
Configuring LLDP
407
Configuring Global LLDP Commands
407
Configuring Interface LLDP Commands
408
Verifying Fcoe Configuration
408
Chapter 30 Configuring Virtual Interfaces
411
Guidelines and Limitations
411
Information about Virtual Interfaces
411
Configuring Virtual Interfaces
412
Creating a Virtual Fibre Channel Interface
412
Mapping Vsans to Vlans
412
Deleting a Virtual Fibre Channel Interface
413
Verifying Virtual Interface Information
414
Quality of Service
417
CHAPTER 31 Configuring Qos
419
Information about Qos
419
Mqc
420
System Classes
420
Default System Classes
421
Link-Level Flow Control
421
Priority Flow Control
421
Mtu
422
Trust Boundaries
422
Egress Policies
423
Ingress Policies
423
Qos for Multicast Traffic
423
Policy for Fibre Channel Interfaces
424
Qos for Traffic Directed to the CPU
424
Configuration Guidelines and Limitations
424
Configuring PFC and LLC
425
Configuring Priority Flow Control
425
Configuring IEEE 802.3X Link-Level Flow Control
426
Configuring System Classes
426
Configuring Class Maps
427
Configuring Policy Maps
427
Creating the System Service Policy
429
Enabling Jumbo MTU
429
System Class Example
429
Verifying Jumbo MTU
430
Configuring Qos on Interfaces
431
Configuring Ingress Policies
431
Configuring Untagged Cos
431
Configuring Egress Policies
432
SAN Switching
435
CHAPTER 32 Configuring Fibre Channel Interfaces32-1
437
Information about Fibre Channel Interfaces
437
Licensing Requirements
437
Interface Modes
438
Physical Fibre Channel Interfaces
438
Virtual Fibre Channel Interfaces
438
Interface States
441
Buffer-To-Buffer Credits
443
Configuring Fibre Channel Interfaces
443
Configuring a Fibre Channel Interface
444
Configuring Interface Modes
445
Setting the Interface Administrative State
445
Configuring Port Speeds
446
Configuring the Interface Description
446
Configuring Receive Data Field Size
447
Configuring SD Port Frame Encapsulation
447
Understanding Bit Error Thresholds
447
Configuring Buffer-To-Buffer Credits
448
Configuring Global Attributes for Fibre Channel Interfaces
449
Configuring Switch Port Attribute Default Values
449
About N Port Identifier Virtualization
450
Enabling N Port Identifier Virtualization
450
Verifying Fibre Channel Interfaces
451
Verifying Interface Information
451
Verifying SFP Transmitter Types
451
Verifying Bb_Credit Information
453
Default Settings
453
Chapter 33 Configuring Domain Parameters
455
Information about Fibre Channel Domains
455
About Domain Manager Fast Restart
457
About Domain Restart
457
Restarting a Domain
457
Enabling Domain Manager Fast Restart
458
About Switch Priority
458
Configuring Switch Priority
458
About Fcdomain Initiation
459
Disabling or Reenabling Fcdomains
459
Configuring Fabric Names
459
About Incoming Rcfs
459
Rejecting Incoming Rcfs
460
About Autoreconfiguring Merged Fabrics
460
Enabling Autoreconfiguration
460
Domain Ids
460
About Domain Ids
461
About Allowed Domain ID Lists
463
Specifying Static or Preferred Domain Ids
463
About CFS Distribution of Allowed Domain ID Lists
464
Configuring Allowed Domain ID Lists
464
Enabling Distribution
464
Committing Changes
465
Discarding Changes
465
Locking the Fabric
465
Clearing a Fabric Lock
466
Displaying CFS Distribution Status
466
Displaying Pending Changes
466
About Contiguous Domain ID Assignments
467
Displaying Session Status
467
Enabling Contiguous Domain ID Assignments
467
FC Ids
467
About Persistent FC Ids
468
Enabling the Persistent FC ID Feature
468
Configuring Persistent FC Ids
469
Persistent FC ID Configuration Guidelines
469
About Unique Area FC Ids for Hbas
470
Configuring Unique Area FC Ids for an HBA
470
About Persistent FC ID Selective Purging
471
Purging Persistent FC Ids
472
Verifying Fcdomain Information
472
Default Settings
473
Chapter 34 Configuring N Port Virtualization
475
Information about NPV
475
NPV Overview
475
NPV Mode
476
Server Interfaces
476
FLOGI Operation
477
NP Uplinks (External Interfaces)
477
NPV Traffic Management
478
NPV Traffic Management Guidelines
479
Guidelines and Limitations
479
Configuring NPV
480
Enabling NPV
480
Configuring NPV Interfaces
481
Configuring NPV Traffic Management
481
Verifying NPV
482
Verifying NPV Traffic Management
483
Chapter 35 Configuring VSAN Trunking
485
Information about VSAN Trunking
485
VSAN Trunking Mismatches
486
VSAN Trunking Protocol
486
Configuring VSAN Trunking
487
About Trunk Mode
487
Enabling or Disabling the VSAN Trunking Protocol
487
Guidelines and Restrictions
487
About Trunk-Allowed VSAN Lists
488
Configuring Trunk Mode
488
Configuring an Allowed-Active List of Vsans
490
Displaying VSAN Trunking Information
490
Default Settings
491
Chapter 36 Configuring SAN Port Channels
493
Information about SAN Port Channels
493
Understanding Load Balancing
494
Understanding Port Channels and VSAN Trunking
494
Configuring SAN Port Channels
496
SAN Port Channel Configuration Guidelines
497
About SAN Port Channel Modes
498
Creating a SAN Port Channel
498
About SAN Port Channel Deletion
499
Deleting SAN Port Channels
500
Interfaces in a SAN Port Channel
500
About Interface Addition to a SAN Port Channel
501
Adding an Interface to a SAN Port Channel
501
About Interface Deletion from a SAN Port Channel
502
Forcing an Interface Addition
502
Deleting an Interface from a SAN Port Channel
503
Port Channel Protocol
503
About Channel Group Creation
504
Autocreation Guidelines
505
About Manually Configured Channel Groups
506
Converting to Manually Configured Channel Groups
506
Enabling and Configuring Autocreation
506
Verifying SAN Port Channel Configuration
507
Default Settings
508
Chapter 37 Configuring and Managing Vsans
509
Information about Vsans
509
VSAN Topologies
509
VSAN Advantages
511
Vsans Versus Zones
512
Configuring Vsans
513
About VSAN Creation
514
Creating Vsans Statically
514
About Port VSAN Membership
515
Assigning Static Port VSAN Membership
515
Displaying VSAN Static Membership
515
About the Default VSAN
516
About the Isolated VSAN
516
Displaying Isolated VSAN Membership
516
About Static VSAN Deletion
517
Operational State of a VSAN
517
About Load Balancing
518
Configuring Load Balancing
518
Deleting Static Vsans
518
About Interop Mode
519
Default Settings
519
Displaying Static VSAN Configuration
519
Chapter 38 Configuring and Managing Zones
521
Information about Zoning
521
Zoning Features
522
Zoning Example
523
Active and Full Zone Set Configuration Guidelines
524
Zone Implementation
524
Configuring Zones
527
Zone Sets
528
Activating a Zone Set
529
About FC Alias Creation
530
About the Default Zone
530
Configuring the Default Zone Access Permission
530
Creating FC Aliases
531
Creating Zone Sets and Adding Member Zones
532
Zone Enforcement
533
Zone Set Distribution
533
About Recovering from Link Isolation
534
Enabling a One-Time Distribution
534
Enabling Full Zone Set Distribution
534
Importing and Exporting Zone Sets
535
Zone Set Duplication
536
Copying Zone Sets
536
Renaming Zones, Zone Sets, and Aliases
536
Clearing the Zone Server Database
537
Cloning Zones, Zone Sets, FC Aliases, and Zone Attribute Groups
537
Enhanced Zoning
538
About Enhanced Zoning
539
Changing from Basic Zoning to Enhanced Zoning
540
Changing from Enhanced Zoning to Basic Zoning
540
Enabling Enhanced Zoning
540
Modifying the Zone Database
541
Releasing Zone Database Locks
541
Merging the Database
542
Configuring System Default Zoning Settings
543
Configuring Zone Merge Control Policies
543
Default Zone Policies
543
Verifying Enhanced Zone Information
544
Verifying Zone Information
538
Compacting the Zone Database
544
Zone and Zone Set Analysis
544
Default Settings
545
Chapter 39 Distributing Device Alias Services
547
Information about Device Aliases
547
Device Alias Features
547
Device Alias Requirements
548
Zone Aliases Versus Device Aliases
548
Device Alias Databases
548
Creating Device Aliases
549
Changing Device Alias Mode Guidelines
550
Device Alias Modes
550
About Device Alias Distribution
551
Configuring Device Alias Modes
551
Locking the Fabric
551
Committing Changes
552
Discarding Changes
552
Disabling and Enabling Device Alias Distribution
553
Fabric Lock Override
553
About Legacy Zone Alias Configuration
554
Importing a Zone Alias
554
Database Merge Guidelines
554
Verifying Device Alias Configuration
555
Default Settings
556
Chapter 40 Configuring Fibre Channel Routing Services and Protocols
557
Information about FSPF
557
FSPF Examples
558
FSPF Global Configuration
559
About SPF Computational Hold Times
559
About Link State Records
560
Configuring FSPF on a VSAN
560
Clearing FSPF Counters for the VSAN
561
Enabling or Disabling FSPF
561
Resetting FSPF to the Default Configuration
561
FSPF Interface Configuration
561
About FSPF Link Cost
562
About Hello Time Intervals
562
Configuring FSPF Link Cost
562
Configuring Hello Time Intervals
562
About Dead Time Intervals
563
About Retransmitting Intervals
563
Configuring Dead Time Intervals
563
About Disabling FSPF for Specific Interfaces
564
Configuring Retransmitting Intervals
564
Disabling FSPF for Specific Interfaces
564
Clearing FSPF Counters for an Interface
565
FSPF Routes
565
About Fibre Channel Routes
565
Configuring Fibre Channel Routes
566
In-Order Delivery
566
About Reordering Network Frames
567
About Reordering SAN Port Channel Frames
567
About Enabling In-Order Delivery
568
Enabling In-Order Delivery Globally
568
Configuring the Drop Latency Time
569
Displaying the In-Order Delivery Status
569
Enabling In-Order Delivery for a VSAN
569
Displaying Latency Information
570
Flow Statistics Configuration
570
About Flow Statistics
571
Clearing FIB Statistics
571
Counting Aggregated Flow Statistics
571
Counting Individual Flow Statistics
571
Displaying Flow Statistics
572
Default Settings
572
Chapter 41 Managing FLOGI, Name Server, FDMI, and RSCN Databases
575
Information about Fabric Login
575
Name Server Proxy
576
About Registering Name Server Proxies
576
About Rejecting Duplicate Pwwns
576
Registering Name Server Proxies
576
About Name Server Database Entries
577
Displaying Name Server Database Entries
577
Rejecting Duplicate Pwwns
577
Fdmi
578
Rscn
578
About RSCN Information
579
About the Multi-Pid Option
579
Displaying RSCN Information
579
Clearing RSCN Statistics
580
Configuring the Multi-Pid Option
580
Suppressing Domain Format SW-Rscns
580
Configuring the RSCN Timer
581
Verifying the RSCN Timer Configuration
581
RSCN Timer Configuration Distribution
582
Default Settings
584
CHAPTER 42 Discovering SCSI Targets42-1
585
Information about SCSI LUN Discovery
585
About Starting SCSI LUN Discovery
585
About Initiating Customized Discovery
586
Starting SCSI LUN Discovery
586
Displaying SCSI LUN Information
587
CHAPTER 43 Advanced Fibre Channel Features and Concepts
589
Fibre Channel Timeout Values
589
Timer Configuration Across All Vsans
590
Timer Configuration Per-VSAN
590
About Fctimer Distribution
591
Committing Fctimer Changes
591
Enabling or Disabling Fctimer Distribution
591
Database Merge Guidelines
592
Discarding Fctimer Changes
592
Fabric Lock Override
592
Verifying Configured Fctimer Values
593
World Wide Names
593
Configuring a Secondary MAC Address
594
Link Initialization WWN Usage
594
Verifying WWN Information
594
FC ID Allocation for Hbas
595
Default Company ID List
595
Verifying the Company ID Configuration
596
About Interop Mode
597
Switch Interoperability
597
Configuring Interop Mode 1
599
Verifying Interoperating Status
600
Default Settings
603
Information about Fabric Authentication
605
Dhchap
606
DHCHAP Compatibility with Fibre Channel Features
607
About DHCHAP Authentication Modes
608
About Enabling DHCHAP
608
About the DHCHAP Hash Algorithm
609
Configuring the DHCHAP Mode
609
About the DHCHAP Group Settings
610
About the DHCHAP Password
610
Configuring the DHCHAP Group Settings
610
Configuring the DHCHAP Hash Algorithm
610
About Password Configuration for Remote Devices
611
Configuring DHCHAP Passwords for the Local Switch
611
About the DHCHAP Timeout Value
612
Configuring DHCHAP Passwords for Remote Devices
612
Configuring the DHCHAP Timeout Value
612
Configuring DHCHAP AAA Authentication
613
Displaying Protocol Security Information
613
Sample Configuration
613
Default Settings
615
Configuring Port Security
617
About Auto-Learning
618
Port Security Enforcement
618
Port Security Activation
619
CHAPTER 44 Configuring FC-SP and DHCHAP44-1
605
CHAPTER 45 Configuring Port Security
619
Enabling Port Security
621
Port Security Activation
621
Activating Port Security
622
Database Activation Rejection
622
Forcing Port Security Activation
622
Database Reactivation
623
Auto-Learning
623
About Enabling Auto-Learning
624
Auto-Learning Device Authorization
624
Disabling Auto-Learning
624
Authorization Scenario
625
Port Security Manual Configuration
626
WWN Identification Guidelines
626
Adding Authorized Port Pairs
627
Committing the Changes
629
Discarding the Changes
629
Locking the Fabric
629
Database Interaction
631
Database Scenarios
631
Copying the Port Security Database
633
Clearing the Port Security Database
634
Deleting the Port Security Database
634
Information about Fabric Binding
637
Licensing Requirements
637
Fabric Binding Enforcement
638
Port Security Versus Fabric Binding
638
CHAPTER 46 Configuring Fabric Binding
639
Enabling Fabric Binding
639
About Switch WWN Lists
640
Configuring Switch WWN List
640
Activating Fabric Binding
641
Forcing Fabric Binding Activation
641
Copying Fabric Binding Configurations
641
Clearing the Fabric Binding Statistics
642
Deleting the Fabric Binding Database
642
Verifying Fabric Binding Information
642
Default Settings
643
CHAPTER 47 Configuring Fabric Configuration Servers47-1
645
Information about FCS
645
FCS Characteristics
646
FCS Name Specification
646
Displaying FCS Information
647
Default Settings
648
Information about Port Tracking
649
CHAPTER 48 Configuring Port Tracking
650
Enabling Port Tracking
651
About Configuring Linked Ports
651
Operationally Binding a Tracked Port
651
About Tracking Multiple Ports
652
Tracking Multiple Ports
653
About Monitoring Ports in a VSAN
653
Default Port Tracking Settings
655
Troubleshooting
657
CHAPTER 49 Configuring SPAN49-1
659
SPAN Sources
659
Characteristics of Source Ports
659
SPAN Destinations
660
Characteristics of Destination Ports
660
Configuring SPAN
660
Configuring the Destination Port
661
Creating and Deleting a SPAN Session
661
Configuring Source Ports
663
Displaying SPAN Information
665
Suspending or Activating a SPAN Session
665
Recovering a Lost Password
667
Chapter 50 Troubleshooting
668
Using Ethanalyzer
669
Using Ethanalyzer
670
Troubleshooting Fibre Channel
671
Fctrace
672
Troubleshooting Fibre Channel
672
Fcping
674
Show Tech-Support Command
675
Show Tech-Support Brief Command
676
Show Tech-Support Fc Command
678
Show Tech-Support Platform Command
680
Configuration Limits
683
Chapter 51 Configuration Limits
684
Advertisement
Advertisement
Related Products
Cisco N540-24Q8L2DD-SYS
Cisco N540-Front Haul
Cisco N540-FH-AGG-SYS
Cisco N540-6Z18G-SYS-D
Cisco N540-ACC-SYS
Cisco N540-28Z4C-SYS-D
Cisco N540X-12Z16G-SYS-D
Cisco N540X-I6Z4G8Q2C-D
Cisco N5K-C5010P-BF - Nexus 5010 Switch
Cisco N540X-12Z16G-SYS-A
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Network Hardware
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL