The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
iSCSI node 4-99
configuring 4-50, 4-51
enforcing access control 4-13
iSCSI 4-11, 4-12
access controlzoning based access controliSCSI
zoning based access control 4-13
configuring for iSCSI 4-12
configuring for iSCSI 4-12
advertised interfaces 4-39
setting time intervals 5-20
clearing entries 5-27
displaying entries 5-27
clearing 7-9
displaying 7-11
CHAP option 4-72
configuring local with Device Manager 4-52
iSCSI setup 4-71
local 4-52
MD5 5-22
mechanism 4-50
mutual CHAPmutual CHAP authentication 4-53
restricting iSLB initiatorinitiator authentication
restricting iSLB initiators 4-64
simple text 5-22
See also simple text authentication
autogenerated iSCSI targetiSCSI
autogenerated target 4-13
configuring Gigabit Ethernet interfaces 6-6, 7-5
configuring 2-34
interoperability mode 2-9
SAN extenders 2-10
configuring in FCIP profiles 2-30
iSLB config distribution 4-21
CHAP authentication 4-13, 4-19, 4-72
configuring for iSCSI 4-72
CHAP challenge 4-53
CHAP response 4-53
CHAP user name 4-52
Cisco Discovery Protocol 6-10
Cisco Transport Controller. See CTC
cloud discovery. See iSNS cloud discovery
congestion window monitoring. See CWM
IPS modules 6-5
description 2-24
launching 2-24
Cut-through routing mode 4-15
cut-thru routing mode 4-16
configuring in FCIP profiles 2-29
default gateways. See IPv4 default gateways
default networks. See IPv4 default networks
differentiated services code point. See DSCP
direct memory access devices. See DMA-bridges
displaying statistics 6-17
default settings 5-8
displaying information 5-30
configuring 5-7
defining 5-24
Domain Name System servers. See DNS servers
iSCSI 4-2
configuring 2-11
dynamic initiator mode parameter
distributed with CFS 4-21
converting 4-59
convert dynamic initiator to static 4-43
dynamic mapping 4-5, 4-18
static mappingstatic mapping 4-4
verifying using Device Manager (procedure) 2-39
entity status inquiry. See ESI
configuring 2-12
trunking configuration 2-24
non-resp threshold 4-79
displaying 6-17
configuring 6-14
description 6-9
iSCSI 4-28
redundancy 2-7
explicit fabric logout 4-8
Extended Link Protocol. See ELP
CHAP 4-73
CHAP 4-73
releasing 4-69
FCIP 4-1
checking trunk status (procedure) 2-24
compression 2-18
configuring ?? to 2-39, ?? to 2-39
configuring using FCIP Wizard ?? to 2-22
default parameters 2-19
discarding packets 2-33
enabling 2-21
Gigabit Ethernet ports 6-4, 7-2
high availability 2-5 to ??
IPS modules 2-2
IP storage services support 6-1, 6-2
link failures 2-6
MPS-14/2 module 2-2
tape acceleration 2-14 to 2-44
time stamps 2-33
VE ports 2-2
verifying ELP (procedure) 2-39
verifying interfaces (procedure) 2-39
virtual ISLs 2-2
VRRP 2-7
write acceleration 2-12
configuring 2-37
configuring (procedure) 2-22
description 2-18
displaying information 2-44
configuring advanced features ?? to 2-35
configuring peers 2-9
configuring QoS 2-11
creating 2-9
displaying information 2-39
parameters 2-5
B port interoperability mode 2-9
configuring 2-23
configuring peers 2-9
configuring QoS 2-11
description 2-3
endpoints 2-3
initiating IP connections 2-32
TCP connections 2-3
configuring 2-25
configuring IP addresses 2-31
configuring listener ports 2-25
configuring TCP parameters 2-26 to 2-31, ?? to 2-39
creating 2-23
description 2-4
displaying information 2-38
configuring 2-36
description 2-14 to 2-18
displaying information 2-42
configuring buffer size 2-30
configuring CWM 2-29
configuring keepalive timeouts 2-26
configuring maximum jitter 2-30
configuring maximum retransmissions 2-27
configuring minimum retransmit timeouts 2-26
configuring PMTUs 2-27
configuring SACKs 2-28
configuring window management 2-28
displaying 2-31, 2-39
configuring 2-35
configuring (procedure) 2-22
description 2-12
displaying information 2-41
routing requests 4-4
Fibre Channel 4-1
iSCSI targets 4-4 to 4-107
default settings 2-19, 3-4, 5-8, 6-11, 7-4, 8-13
Fibre Channel over IP. See FCIP
dynamic importing 4-37, 4-38
dynamic mapping 4-37, 4-38
Fibre Channel zoning-based access control 4-13
load balancing (example) 2-6
configuring MTU size 6-6, 7-6
IPS modules 6-5
IPv4 example configuration 6-5
Gigabit Ethernet interface example 4-26
configuring 6-4 to 6-10
configuring auto-negotiation 6-6, 7-5
configuring high availability 6-8 to ??
configuring IPv6 addresses 8-14
configuring MTU frame sizes 6-6, 7-6
configuring promiscuous mode 6-6, 7-7
configuring static IPv4 routing 7-8
configuring VRRP 6-12
default parameters 7-4
displaying statistics ?? to 6-19
subinterfaces 6-7, 7-3
subnet requirements 6-7, 7-3
verifying connectivity 7-10
Gigabit Ethernet subinterfaces
configuring VLANs 7-7
paramter distributed 4-21
HA solution example 4-25
HBA port 4-7, 4-10
hexadecimal fields 8-11
Ethernet PortChannel 4-28
Ethernet PortChannels 2-7
Fibre Channel PortChannels 2-8
VRRP 2-7, 4-27
VRRPVRRP-based high availability 4-27
displaying statistics 6-19
IPv6 8-6
IPv6 header format, figure 8-7
IPFC 5-5
statically mapped iSCSI 4-17
default settings 2-19, 3-4, 5-8, 6-11, 7-4, 8-13
Internet Control Message Protocol. See ICMP
Internet Storage Name Service. See iSNS
active mode 2-32
initiating 2-32
passive mode 2-33
configuring VSAN interfaces 5-11
description 5-5
enabling IPv4 routing 5-11
example configuration ?? to 5-33
IPS core dumps. See core dumps
configuring with FCIP Wizard (procedure) 2-22
configuring CDP 6-10
core dumps 6-5
FCIP 2-2
partial core dumps 6-5
port modes 6-4, 7-2
software upgrades 6-3
supported features 6-1, 6-2
description 6-4
IPS ports 4-5
modes 7-2
multiple connections 4-26
default parameters 6-11
IP Storage services modules. See IPS modules
configuring management interfaces 5-9
configuring virtual routers 5-17
default settings 7-4
displaying statistics 7-11
transitioning to IPv6 8-12
adding for VRRP 5-18
configuring in VSANs 5-11
configuring IPv6 and IPV6 protocol stacks 8-15
IPv6 protocol stacks 8-10
configuring 5-10, 5-11
description 5-3
IP static routing 5-3
static routes (tip) 5-4
verifying configuration 5-25
description 5-4
configuring Gigabit Ethernet interfaces 7-8
disabling 5-11
displaying route tables 7-10
enabling 5-11
verifying configuration 5-26
configuring 5-12
description 5-5
verifying configuration 5-26
address types 8-3
configuring addressing 8-11, 8-14
configuring IPv4 and IPv6 addresses 8-15
configuring management interfaces 5-9
configuring neighbor discovery parameters 8-16
configuring virtual routers 5-18
description ?? to 8-11
displaying information 8-20
dual IPv4 and IPv6 protocol stack applications, figure 8-11
dual IPv4 and IPv6 protocol stacks 8-10
dual IPv4 and IPv6 protocol stack technique, figure 8-10
enabling routing 8-11, 8-14
enhancements over IPv4 8-1
ICMP 8-6
neighbor discovery 8-7
path MTU discovery 8-7
router advertisement messages 8-9
router discovery 8-9
stateless autoconfiguration 8-9
transitioning from IPv4 8-12
verifying basic connectivity 8-21
verifying configuration 8-21
adding for VRRP 5-19
configuring 8-11, 8-14
configuring IPv4 and IPV6 protocol stacks 8-15
formats 8-2
link-local type 8-4
multicast type 8-5
prefix format 8-3
unicast type 8-3
IPv6 enhancements over IPv4 8-1
advertisement messages 8-7
description 8-7
neighbor solicitation message, figure 8-8
solicitation messages 8-7
enabling 8-11, 8-14
displaying the route table 8-19
formats 4-5
formats 4-5
enforcing access control 4-13
access control 4-11 to 4-13
add initiator to zone database 4-47, 4-48
advanced VSAN membershipadvanced VSAN membership 4-11
checking for WWN conflicts 4-43
configuring ?? to 4-29
configuring AAA authentication 4-50, 4-51
configuring ACLs 4-12
configuring VRRP 4-27
creating virtual targets 4-38
default parameters 4-33
discovery phase 4-13
displaying global information 4-90
displaying statistics 4-87
drivers 4-2
enabling 4-2, 4-35
error 4-7
Fibre Channel targets 4-4 to 4-107
Gigabit Ethernet ports 6-4, 7-2
gateway device 4-8
HA with host without multi-path software 4-24
initiator idle timeoutinitiator idle timeout
configuring with Fabric Manager 4-40
initiator name 4-52
initiator targets 4-37
IPS module support 6-2
IQNs 4-6
login redirect 4-18
LUN mapping for targets 4-119 to 4-125
MPS-14/2 module support 6-2
multiple IPS ports 4-26
PortChannel-based high availability 4-28
PortChannel-based high availabilityEthernet PortChannel-based high availability 4-28
protocol 4-2
requests and responses 4-4
restrict an initiator to a specific user name for CHAP authentication 4-52
routing 4-2
routing modes chartrouting modes chart for iSCSI 4-16
session creation 4-13
session limits 4-7
statically mapped initiators 4-17
tables in Fabric Manager 4-44
targets in Device Manager 4-38
transparent initiator mode 4-7
transparent mode initiator 4-111 to 4-116
users with local authentication 4-52
using iSCSI Wizard (procedure) 4-37
VSAN membership 4-11
VSAN membership example 4-107
VSAN membership for iSCSI interfaces 4-11, 4-46
zone name 4-37
CHAP option 4-72
configuring 4-13, 4-19
configuring mechanisms 4-51
configuring RADIUS (procedure) 4-54
external RADIUS servers 4-73
global override 4-50
local authentication 4-52
mechanisms 4-50
restricting on initiators 4-52
scenarios 4-71
setup guidelines 4-71
iSCSI-based access control 4-11, 4-12
example membership in VSANs 4-107
iscsi-gw 4-10
configuring 4-23 to 4-29
initiator identification 4-6
assigning WWNs 4-42
configuring dynamic IP address mapping 4-41
configuring static IP address mapping 4-41
displaying information 4-91 to 4-94
displaying proxy information 4-88
dynamic mapping 4-9
making dynamic WWN mapping static 4-43
proxy mode 4-9
statically mapped (procedure) 4-41
static mapping 4-9
transparent mode 4-7
WWN assignments 4-8
configuring 4-6, 4-6 to 4-55
configuring listener ports 4-14
configuring listener portsiSCSI
listener port 4-14
configuring QoS 4-55
configuring routing mode 4-15 to 4-55
configuring routing modesrouting modes 4-15
configuring TCP tuning parameters 4-14
creating 4-36
creating interfaces 4-36
displaying information 4-86
iSCSI LUs 4-5
iSCSI protocol 4-1
iSCSI server load balancing 4-17
iSCSI Server Load Balancing. See iSLB
authentication 4-13 to 4-54
session authenticationauthentication
iSCSI session 4-13
displaying information 4-90
advertising 4-39
dynamic importing 4-5
dynamic mapping 4-5
secondary access 4-25
static importing 4-6
static importingstatic mappingiSCSI targets
static mapping 4-6
transparent failover 4-23, 4-23 to 4-71, ?? to 4-71
displaying information 4-95
displaying information 4-95
activating zones 4-18, 4-61
auto-zoning 4-22
committing configuration changescommitting configuration changes
iSLB 4-68
configuration distribution 4-21 to ??, 4-67
configuring 4-56
configuring initiators and targets 4-18, 4-61
configuring VRRP 4-66
configuring with Device Manager 4-56
configuring zones 4-18, 4-61
default settings 4-34
distributing configuration using CF 4-21
dynamic initiator mapping 4-59
enabling configuration distribution 4-67
initiator WWN assignment 4-56
load balancing algorithm 4-21 to 4-110
maximum initiators 4-32
static initiator configurationinitiator configuration
static iSLB 4-17
VSAN membership 4-59
zone set activation failed 4-63
default settings 4-34
iSLB auto-zone feature 4-33
iSLB initiators 4-18
assigning WWNs 4-18
configuring ?? to 4-19
configuring IP addresses 4-57
configuring names 4-57
configuring static name mapping 4-58
description 4-17
dynamic initiator mapping 4-59
VSAN membership 4-59
configuring 4-61
description 4-18, 4-61
maximum sessions per IPS port 4-32, 4-33
displaying information 4-95
enabling 4-66
iSLB with CFS distribution 4-33
enabling 4-78
client registration 4-31
cloud discovery 4-105
configuring 4-31
configuring servers ?? to 4-31, 4-77 to ??
description 4-29
ESI 4-79
description 4-30
creating profiles 4-75
verifying configuration 4-97
CFS distribution 4-82
description 4-31
displaying statistics 4-105
verifying configuration 4-104
verifying membership 4-105
verifying status 4-105
creating 4-75
verifying configuration 4-97
configuration distribution 4-78
description 4-30
displaying configurations 4-98 to 4-104
enabling 4-78
configuring estimated maximum in FCIP profiles 2-30
configuring in FCIP profiles 2-26
forwarding 4-15
description 8-4
format, figure 8-5
Ethernet PortChannel aggregation 6-9
load balancing 4-17, 4-18
FSPF (example) 2-6
PortChannels (example) 2-5
weighted 4-60
load metric 4-60
lock the fabric 4-22
LUN 4-5
trespass for storage port failover 4-71
LUN mapping 4-25
iSCSI 4-119 to 4-125
explicit access control 4-9
mapping and assignment 4-10
LUs 4-4, 4-5
configuring 5-9
configuring for IPv4 5-9
configuring for IPv6 5-9
default settings 2-19, 3-4, 5-8, 6-11, 7-4, 8-13
configuring in FCIP profiles 2-27
VRRP 5-22
merge status conflicts 4-23
configuring IPv4 addresses 5-9
configuring IPv6 addresses 5-9
default settings 2-19, 3-4, 5-8, 6-11, 7-4, 8-13
local IPv4 routing 5-4
configuring in FCIP profiles 2-26
MPS-14/2 modules 4-1, 4-2, 4-3, 4-10, 4-13, 4-36
FCIP 2-2
port modes 6-4, 7-2
software upgrades 6-4
supported features 6-1, 6-2
configuring Gigabit Ethernet interfaces 6-6
configuring frame sizes 7-6
path discovery for IPv6 8-7
IPv6 alternative to broadcast addresses 8-6
IPv6 format, figure 8-5
IPv6 solicited-node format, figure 8-6
multi-path software example 4-24
configuring 5-14
Multiprotocol Services modules. See MPS-14/2 modules
configuring for iSCSI 4-53
configuring for iSLB 4-65
configuring for iSLBI 4-65
configuring parameters 8-16
verifying configuration 8-19
None authentication 4-13
time-stamp option 2-33
configuring 5-12
description 5-5
discarding in FCIP 2-33
pass-thru routing mode 4-15, 4-16
PDU 4-15
configuring in FCIP profiles 2-27
interfaces 4-39
subinterfaces 4-39
configuring for FCIP high availability 2-5
IQN formats 4-5
load balancing (example) 2-5
member combinations 6-9
redundancy 2-8
IPS 6-4, 7-2
virtual E 2-2
configuring Gigabit Ethernet interfaces 6-6, 7-7
protocol 4-1
VRRP 4-5
configuring proxy initiator 4-44, 4-45
proxy initiator mode 4-7, 4-12
configuring 4-10
zoning 4-45
proxy initiator mode 4-9
Pv6 address formats 8-11
converting dynamic to static 4-43
DSCP value 2-11
configuring 4-55
RADIUS 4-74
AAA authentication 4-13, 4-19
configuring an iSCSI RADIUS serveriSCSI
configuring a RADIUS server 4-54
Ethernet PortChannels 2-7, 2-8
Fibre Channel PortChannels 2-8
VRRP 2-7
IPv6 8-9
RSCNs 4-40
configuring in FCIP profiles 2-28
assigning SCSI read/write commands 3-8, 3-10
configuring 3-3
configuring data patterns 3-11
configuring nWWNs 3-7
configuring virtual N ports 3-7
data patterns 3-4
initialization 3-7
tuning guidelines 3-2
verifying configuration 3-12
routing requests 4-2
security parameter index. See SPI
selective acknowledgments. See SACKs
configuring virtual routers 5-22
statically imported iSCSI targets 4-25
converting 4-59
static mapped iSCSI targetiSCSI
static mapped target 4-13
static mapping 4-18
static WWN mapping 4-12
store-and-forward routing mode 4-15, 4-16
configuring IPv4 routes 5-12
requirements 6-7, 7-3
in-band 5-5
VRRP 2-7
AAA authentication 4-19
target discovery 4-31
FCIP profiles 2-4
configuring in FCIP profiles 2-26 to 2-31, ?? to 2-39
displaying 6-18
TCP tuning parameters 4-14
transient failure 4-40
transparent initiator mode 4-7
transparent initiator modeiSCSI
transparent initiator mode 4-9
CTC 2-24
link state 2-24
FCIP interface 2-5
description 2-2
FCIP 2-2
virtual Fibre Channel host 4-3
description 2-2
virtual router IDs. See VR IDs
Virtual Router Redundancy Protocol. See VRRP
Virtual Router Redundancy Protocolprotocols
Virtual Router Redundancy 4-17
adding 5-17
adding primary IP addresses 5-18
authentication 5-22
configuring for IPv4 5-17
configuring for IPv6 5-18
default settings 5-8
deleting 5-17
initiating 5-17
setting priorities 5-19
configuring on Gigabit Ethernet subinterfaces 7-7
description 6-6, 7-2
configuring for IPv4 5-17
configuring for IPv6 5-17
description 5-6
mapping 5-6
VRRP 4-17
algorithm for selecting Gigabit Ethernet interfaces 4-21 to 4-110
backup switches 5-6
clearing statistics 5-29
configuring advertisement time intervals 5-20
configuring for Gigabit Ethernet interfaces 6-12
configuring for iSLB 4-66
configuring virtual routers 5-17
configuring VR IDs for IPv4 5-17
configuring VR IDs for IPv6 5-17
default settings 5-8
description 5-5, 6-8
displaying information 5-27 to 5-29
displaying statistics 5-29
group members 6-8
initiating virtual routers 5-17
IQN formats 4-5
iSCSI parameter change impact 4-21
iSLB 4-19 to 4-96
master switches 5-6
MD5 authentication 5-22
primary IP address 5-18
priority preemption 5-21
security authentication 5-22
setting priorities 5-19
setting priority 5-19
simple text authentication 5-22
VRRP group 4-46
VRRP–I f iSCSI login redirect 4-18
configuring IPv4 addresses 5-11
verifying configuration 5-26
configuring multiple IPv4 subnets 5-14
example membership for iSCSI devices 4-107
gateway switches 5-4
IPv4 static routing 5-5
iSLB 4-59
iSLB initiators 4-59
traffic routing between 5-1
VRRP 5-6
configuring in FCIP profiles 2-28
static binding 4-10
configuring and activating for iSLB 4-18, 4-61
iSLB 4-18, 4-61
configuring for iSCSI 4-11
configuring zoning based access control 4-11
Index
iSCSI node 4-99
configuring 4-50, 4-51
enforcing access control 4-13
iSCSI 4-11, 4-12
access controlzoning based access controliSCSI
zoning based access control 4-13
configuring for iSCSI 4-12
configuring for iSCSI 4-12
advertised interfaces 4-39
setting time intervals 5-20
clearing entries 5-27
displaying entries 5-27
clearing 7-9
displaying 7-11
CHAP option 4-72
configuring local with Device Manager 4-52
iSCSI setup 4-71
local 4-52
MD5 5-22
mechanism 4-50
mutual CHAPmutual CHAP authentication 4-53
restricting iSLB initiatorinitiator authentication
restricting iSLB initiators 4-64
simple text 5-22
See also simple text authentication
autogenerated iSCSI targetiSCSI
autogenerated target 4-13
configuring Gigabit Ethernet interfaces 6-6, 7-5
configuring 2-34
interoperability mode 2-9
SAN extenders 2-10
configuring in FCIP profiles 2-30
iSLB config distribution 4-21
CHAP authentication 4-13, 4-19, 4-72
configuring for iSCSI 4-72
CHAP challenge 4-53
CHAP response 4-53
CHAP user name 4-52
Cisco Discovery Protocol 6-10
Cisco Transport Controller. See CTC
cloud discovery. See iSNS cloud discovery
congestion window monitoring. See CWM
IPS modules 6-5
description 2-24
launching 2-24
Cut-through routing mode 4-15
cut-thru routing mode 4-16
configuring in FCIP profiles 2-29
default gateways. See IPv4 default gateways
default networks. See IPv4 default networks
differentiated services code point. See DSCP
direct memory access devices. See DMA-bridges
displaying statistics 6-17
default settings 5-8
displaying information 5-30
configuring 5-7
defining 5-24
Domain Name System servers. See DNS servers
iSCSI 4-2
configuring 2-11
dynamic initiator mode parameter
distributed with CFS 4-21
converting 4-59
convert dynamic initiator to static 4-43
dynamic mapping 4-5, 4-18
static mappingstatic mapping 4-4
verifying using Device Manager (procedure) 2-39
entity status inquiry. See ESI
configuring 2-12
trunking configuration 2-24
non-resp threshold 4-79
displaying 6-17
configuring 6-14
description 6-9
iSCSI 4-28
redundancy 2-7
explicit fabric logout 4-8
Extended Link Protocol. See ELP
CHAP 4-73
CHAP 4-73
releasing 4-69
FCIP 4-1
checking trunk status (procedure) 2-24
compression 2-18
configuring ?? to 2-39, ?? to 2-39
configuring using FCIP Wizard ?? to 2-22
default parameters 2-19
discarding packets 2-33
enabling 2-21
Gigabit Ethernet ports 6-4, 7-2
high availability 2-5 to ??
IPS modules 2-2
IP storage services support 6-1, 6-2
link failures 2-6
MPS-14/2 module 2-2
tape acceleration 2-14 to 2-44
time stamps 2-33
VE ports 2-2
verifying ELP (procedure) 2-39
verifying interfaces (procedure) 2-39
virtual ISLs 2-2
VRRP 2-7
write acceleration 2-12
configuring 2-37
configuring (procedure) 2-22
description 2-18
displaying information 2-44
configuring advanced features ?? to 2-35
configuring peers 2-9
configuring QoS 2-11
creating 2-9
displaying information 2-39
parameters 2-5
B port interoperability mode 2-9
configuring 2-23
configuring peers 2-9
configuring QoS 2-11
description 2-3
endpoints 2-3
initiating IP connections 2-32
TCP connections 2-3
configuring 2-25
configuring IP addresses 2-31
configuring listener ports 2-25
configuring TCP parameters 2-26 to 2-31, ?? to 2-39
creating 2-23
description 2-4
displaying information 2-38
configuring 2-36
description 2-14 to 2-18
displaying information 2-42
configuring buffer size 2-30
configuring CWM 2-29
configuring keepalive timeouts 2-26
configuring maximum jitter 2-30
configuring maximum retransmissions 2-27
configuring minimum retransmit timeouts 2-26
configuring PMTUs 2-27
configuring SACKs 2-28
configuring window management 2-28
displaying 2-31, 2-39
configuring 2-35
configuring (procedure) 2-22
description 2-12
displaying information 2-41
routing requests 4-4
Fibre Channel 4-1
iSCSI targets 4-4 to 4-107
default settings 2-19, 3-4, 5-8, 6-11, 7-4, 8-13
Fibre Channel over IP. See FCIP
dynamic importing 4-37, 4-38
dynamic mapping 4-37, 4-38
Fibre Channel zoning-based access control 4-13
load balancing (example) 2-6
configuring MTU size 6-6, 7-6
IPS modules 6-5
IPv4 example configuration 6-5
Gigabit Ethernet interface example 4-26
configuring 6-4 to 6-10
configuring auto-negotiation 6-6, 7-5
configuring high availability 6-8 to ??
configuring IPv6 addresses 8-14
configuring MTU frame sizes 6-6, 7-6
configuring promiscuous mode 6-6, 7-7
configuring static IPv4 routing 7-8
configuring VRRP 6-12
default parameters 7-4
displaying statistics ?? to 6-19
subinterfaces 6-7, 7-3
subnet requirements 6-7, 7-3
verifying connectivity 7-10
Gigabit Ethernet subinterfaces
configuring VLANs 7-7
paramter distributed 4-21
HA solution example 4-25
HBA port 4-7, 4-10
hexadecimal fields 8-11
Ethernet PortChannel 4-28
Ethernet PortChannels 2-7
Fibre Channel PortChannels 2-8
VRRP 2-7, 4-27
VRRPVRRP-based high availability 4-27
displaying statistics 6-19
IPv6 8-6
IPv6 header format, figure 8-7
IPFC 5-5
statically mapped iSCSI 4-17
default settings 2-19, 3-4, 5-8, 6-11, 7-4, 8-13
Internet Control Message Protocol. See ICMP
Internet Storage Name Service. See iSNS
active mode 2-32
initiating 2-32
passive mode 2-33
configuring VSAN interfaces 5-11
description 5-5
enabling IPv4 routing 5-11
example configuration ?? to 5-33
IPS core dumps. See core dumps
configuring with FCIP Wizard (procedure) 2-22
configuring CDP 6-10
core dumps 6-5
FCIP 2-2
partial core dumps 6-5
port modes 6-4, 7-2
software upgrades 6-3
supported features 6-1, 6-2
description 6-4
IPS ports 4-5
modes 7-2
multiple connections 4-26
default parameters 6-11
IP Storage services modules. See IPS modules
configuring management interfaces 5-9
configuring virtual routers 5-17
default settings 7-4
displaying statistics 7-11
transitioning to IPv6 8-12
adding for VRRP 5-18
configuring in VSANs 5-11
configuring IPv6 and IPV6 protocol stacks 8-15
IPv6 protocol stacks 8-10
configuring 5-10, 5-11
description 5-3
IP static routing 5-3
static routes (tip) 5-4
verifying configuration 5-25
description 5-4
configuring Gigabit Ethernet interfaces 7-8
disabling 5-11
displaying route tables 7-10
enabling 5-11
verifying configuration 5-26
configuring 5-12
description 5-5
verifying configuration 5-26
address types 8-3
configuring addressing 8-11, 8-14
configuring IPv4 and IPv6 addresses 8-15
configuring management interfaces 5-9
configuring neighbor discovery parameters 8-16
configuring virtual routers 5-18
description ?? to 8-11
displaying information 8-20
dual IPv4 and IPv6 protocol stack applications, figure 8-11
dual IPv4 and IPv6 protocol stacks 8-10
dual IPv4 and IPv6 protocol stack technique, figure 8-10
enabling routing 8-11, 8-14
enhancements over IPv4 8-1
ICMP 8-6
neighbor discovery 8-7
path MTU discovery 8-7
router advertisement messages 8-9
router discovery 8-9
stateless autoconfiguration 8-9
transitioning from IPv4 8-12
verifying basic connectivity 8-21
verifying configuration 8-21
adding for VRRP 5-19
configuring 8-11, 8-14
configuring IPv4 and IPV6 protocol stacks 8-15
formats 8-2
link-local type 8-4
multicast type 8-5
prefix format 8-3
unicast type 8-3
IPv6 enhancements over IPv4 8-1
advertisement messages 8-7
description 8-7
neighbor solicitation message, figure 8-8
solicitation messages 8-7
enabling 8-11, 8-14
displaying the route table 8-19
formats 4-5
formats 4-5
enforcing access control 4-13
access control 4-11 to 4-13
add initiator to zone database 4-47, 4-48
advanced VSAN membershipadvanced VSAN membership 4-11
checking for WWN conflicts 4-43
configuring ?? to 4-29
configuring AAA authentication 4-50, 4-51
configuring ACLs 4-12
configuring VRRP 4-27
creating virtual targets 4-38
default parameters 4-33
discovery phase 4-13
displaying global information 4-90
displaying statistics 4-87
drivers 4-2
enabling 4-2, 4-35
error 4-7
Fibre Channel targets 4-4 to 4-107
Gigabit Ethernet ports 6-4, 7-2
gateway device 4-8
HA with host without multi-path software 4-24
initiator idle timeoutinitiator idle timeout
configuring with Fabric Manager 4-40
initiator name 4-52
initiator targets 4-37
IPS module support 6-2
IQNs 4-6
login redirect 4-18
LUN mapping for targets 4-119 to 4-125
MPS-14/2 module support 6-2
multiple IPS ports 4-26
PortChannel-based high availability 4-28
PortChannel-based high availabilityEthernet PortChannel-based high availability 4-28
protocol 4-2
requests and responses 4-4
restrict an initiator to a specific user name for CHAP authentication 4-52
routing 4-2
routing modes chartrouting modes chart for iSCSI 4-16
session creation 4-13
session limits 4-7
statically mapped initiators 4-17
tables in Fabric Manager 4-44
targets in Device Manager 4-38
transparent initiator mode 4-7
transparent mode initiator 4-111 to 4-116
users with local authentication 4-52
using iSCSI Wizard (procedure) 4-37
VSAN membership 4-11
VSAN membership example 4-107
VSAN membership for iSCSI interfaces 4-11, 4-46
zone name 4-37
CHAP option 4-72
configuring 4-13, 4-19
configuring mechanisms 4-51
configuring RADIUS (procedure) 4-54
external RADIUS servers 4-73
global override 4-50
local authentication 4-52
mechanisms 4-50
restricting on initiators 4-52
scenarios 4-71
setup guidelines 4-71
iSCSI-based access control 4-11, 4-12
example membership in VSANs 4-107
iscsi-gw 4-10
configuring 4-23 to 4-29
initiator identification 4-6
assigning WWNs 4-42
configuring dynamic IP address mapping 4-41
configuring static IP address mapping 4-41
displaying information 4-91 to 4-94
displaying proxy information 4-88
dynamic mapping 4-9
making dynamic WWN mapping static 4-43
proxy mode 4-9
statically mapped (procedure) 4-41
static mapping 4-9
transparent mode 4-7
WWN assignments 4-8
configuring 4-6, 4-6 to 4-55
configuring listener ports 4-14
configuring listener portsiSCSI
listener port 4-14
configuring QoS 4-55
configuring routing mode 4-15 to 4-55
configuring routing modesrouting modes 4-15
configuring TCP tuning parameters 4-14
creating 4-36
creating interfaces 4-36
displaying information 4-86
iSCSI LUs 4-5
iSCSI protocol 4-1
iSCSI server load balancing 4-17
iSCSI Server Load Balancing. See iSLB
authentication 4-13 to 4-54
session authenticationauthentication
iSCSI session 4-13
displaying information 4-90
advertising 4-39
dynamic importing 4-5
dynamic mapping 4-5
secondary access 4-25
static importing 4-6
static importingstatic mappingiSCSI targets
static mapping 4-6
transparent failover 4-23, 4-23 to 4-71, ?? to 4-71
displaying information 4-95
displaying information 4-95
activating zones 4-18, 4-61
auto-zoning 4-22
committing configuration changescommitting configuration changes
iSLB 4-68
configuration distribution 4-21 to ??, 4-67
configuring 4-56
configuring initiators and targets 4-18, 4-61
configuring VRRP 4-66
configuring with Device Manager 4-56
configuring zones 4-18, 4-61
default settings 4-34
distributing configuration using CF 4-21
dynamic initiator mapping 4-59
enabling configuration distribution 4-67
initiator WWN assignment 4-56
load balancing algorithm 4-21 to 4-110
maximum initiators 4-32
static initiator configurationinitiator configuration
static iSLB 4-17
VSAN membership 4-59
zone set activation failed 4-63
default settings 4-34
iSLB auto-zone feature 4-33
iSLB initiators 4-18
assigning WWNs 4-18
configuring ?? to 4-19
configuring IP addresses 4-57
configuring names 4-57
configuring static name mapping 4-58
description 4-17
dynamic initiator mapping 4-59
VSAN membership 4-59
configuring 4-61
description 4-18, 4-61
maximum sessions per IPS port 4-32, 4-33
displaying information 4-95
enabling 4-66
iSLB with CFS distribution 4-33
enabling 4-78
client registration 4-31
cloud discovery 4-105
configuring 4-31
configuring servers ?? to 4-31, 4-77 to ??
description 4-29
ESI 4-79
description 4-30
creating profiles 4-75
verifying configuration 4-97
CFS distribution 4-82
description 4-31
displaying statistics 4-105
verifying configuration 4-104
verifying membership 4-105
verifying status 4-105
creating 4-75
verifying configuration 4-97
configuration distribution 4-78
description 4-30
displaying configurations 4-98 to 4-104
enabling 4-78
configuring estimated maximum in FCIP profiles 2-30
configuring in FCIP profiles 2-26
forwarding 4-15
description 8-4
format, figure 8-5
Ethernet PortChannel aggregation 6-9
load balancing 4-17, 4-18
FSPF (example) 2-6
PortChannels (example) 2-5
weighted 4-60
load metric 4-60
lock the fabric 4-22
LUN 4-5
trespass for storage port failover 4-71
LUN mapping 4-25
iSCSI 4-119 to 4-125
explicit access control 4-9
mapping and assignment 4-10
LUs 4-4, 4-5
configuring 5-9
configuring for IPv4 5-9
configuring for IPv6 5-9
default settings 2-19, 3-4, 5-8, 6-11, 7-4, 8-13
configuring in FCIP profiles 2-27
VRRP 5-22
merge status conflicts 4-23
configuring IPv4 addresses 5-9
configuring IPv6 addresses 5-9
default settings 2-19, 3-4, 5-8, 6-11, 7-4, 8-13
local IPv4 routing 5-4
configuring in FCIP profiles 2-26
MPS-14/2 modules 4-1, 4-2, 4-3, 4-10, 4-13, 4-36
FCIP 2-2
port modes 6-4, 7-2
software upgrades 6-4
supported features 6-1, 6-2
configuring Gigabit Ethernet interfaces 6-6
configuring frame sizes 7-6
path discovery for IPv6 8-7
IPv6 alternative to broadcast addresses 8-6
IPv6 format, figure 8-5
IPv6 solicited-node format, figure 8-6
multi-path software example 4-24
configuring 5-14
Multiprotocol Services modules. See MPS-14/2 modules
configuring for iSCSI 4-53
configuring for iSLB 4-65
configuring for iSLBI 4-65
configuring parameters 8-16
verifying configuration 8-19
None authentication 4-13
time-stamp option 2-33
configuring 5-12
description 5-5
discarding in FCIP 2-33
pass-thru routing mode 4-15, 4-16
PDU 4-15
configuring in FCIP profiles 2-27
interfaces 4-39
subinterfaces 4-39
configuring for FCIP high availability 2-5
IQN formats 4-5
load balancing (example) 2-5
member combinations 6-9
redundancy 2-8
IPS 6-4, 7-2
virtual E 2-2
configuring Gigabit Ethernet interfaces 6-6, 7-7
protocol 4-1
VRRP 4-5
configuring proxy initiator 4-44, 4-45
proxy initiator mode 4-7, 4-12
configuring 4-10
zoning 4-45
proxy initiator mode 4-9
Pv6 address formats 8-11
converting dynamic to static 4-43
DSCP value 2-11
configuring 4-55
RADIUS 4-74
AAA authentication 4-13, 4-19
configuring an iSCSI RADIUS serveriSCSI
configuring a RADIUS server 4-54
Ethernet PortChannels 2-7, 2-8
Fibre Channel PortChannels 2-8
VRRP 2-7
IPv6 8-9
RSCNs 4-40
configuring in FCIP profiles 2-28
assigning SCSI read/write commands 3-8, 3-10
configuring 3-3
configuring data patterns 3-11
configuring nWWNs 3-7
configuring virtual N ports 3-7
data patterns 3-4
initialization 3-7
tuning guidelines 3-2
verifying configuration 3-12
routing requests 4-2
security parameter index. See SPI
selective acknowledgments. See SACKs
configuring virtual routers 5-22
statically imported iSCSI targets 4-25
converting 4-59
static mapped iSCSI targetiSCSI
static mapped target 4-13
static mapping 4-18
static WWN mapping 4-12
store-and-forward routing mode 4-15, 4-16
configuring IPv4 routes 5-12
requirements 6-7, 7-3
in-band 5-5
VRRP 2-7
AAA authentication 4-19
target discovery 4-31
FCIP profiles 2-4
configuring in FCIP profiles 2-26 to 2-31, ?? to 2-39
displaying 6-18
TCP tuning parameters 4-14
transient failure 4-40
transparent initiator mode 4-7
transparent initiator modeiSCSI
transparent initiator mode 4-9
CTC 2-24
link state 2-24
FCIP interface 2-5
description 2-2
FCIP 2-2
virtual Fibre Channel host 4-3
description 2-2
virtual router IDs. See VR IDs
Virtual Router Redundancy Protocol. See VRRP
Virtual Router Redundancy Protocolprotocols
Virtual Router Redundancy 4-17
adding 5-17
adding primary IP addresses 5-18
authentication 5-22
configuring for IPv4 5-17
configuring for IPv6 5-18
default settings 5-8
deleting 5-17
initiating 5-17
setting priorities 5-19
configuring on Gigabit Ethernet subinterfaces 7-7
description 6-6, 7-2
configuring for IPv4 5-17
configuring for IPv6 5-17
description 5-6
mapping 5-6
VRRP 4-17
algorithm for selecting Gigabit Ethernet interfaces 4-21 to 4-110
backup switches 5-6
clearing statistics 5-29
configuring advertisement time intervals 5-20
configuring for Gigabit Ethernet interfaces 6-12
configuring for iSLB 4-66
configuring virtual routers 5-17
configuring VR IDs for IPv4 5-17
configuring VR IDs for IPv6 5-17
default settings 5-8
description 5-5, 6-8
displaying information 5-27 to 5-29
displaying statistics 5-29
group members 6-8
initiating virtual routers 5-17
IQN formats 4-5
iSCSI parameter change impact 4-21
iSLB 4-19 to 4-96
master switches 5-6
MD5 authentication 5-22
primary IP address 5-18
priority preemption 5-21
security authentication 5-22
setting priorities 5-19
setting priority 5-19
simple text authentication 5-22
VRRP group 4-46
VRRP–I f iSCSI login redirect 4-18
configuring IPv4 addresses 5-11
verifying configuration 5-26
configuring multiple IPv4 subnets 5-14
example membership for iSCSI devices 4-107
gateway switches 5-4
IPv4 static routing 5-5
iSLB 4-59
iSLB initiators 4-59
traffic routing between 5-1
VRRP 5-6
configuring in FCIP profiles 2-28
static binding 4-10
configuring and activating for iSLB 4-18, 4-61
iSLB 4-18, 4-61
configuring for iSCSI 4-11
configuring zoning based access control 4-11