- Preface
- Product Overview
- Installing Cisco Fabric Manager
- Fabric Manager Server
- Authentication in Fabric Manager
- Fabric Manager Client
- Device Manager
- Using Cisco Fabric Services
- Configuring Ethernet Interfaces
- Configuring Virtual Interfaces
- Configuring Fibre Channel Interfaces
- Configuring N-Port Virtualization
- Configuring Domain Parameters
- Configuring VSAN Trunking
- Configuring and Managing VSANs
- Configuring and Managing Zones
- Distributing Device Alias Services
- Configuring Fibre Channel Routing Services and Protocols
- Managing FLOGI, Name Server, FDMI, and RSCN Databases
- Configuring SPAN
- Discovering SCSI Targets
- Configuring SAN PortChannels
- Advanced Features and Concepts
- Configuring FC-SP and DHCHAP
- Configuring Port Security
- Configuring Fabric Binding
- Configuring Fabric Configuration Servers
- Configuring Port Tracking
- Network Monitoring
- Performance Manager
- Nexus 5000 Management Software FAQ
- Troubleshooting Your Fabric
- Index
Index
Symbols
* (asterisk)
autolearned entries 24-18
port security wildcards 24-13
A
AAA
DHCHAP authentication 23-9
active zone sets
considerations 16-4
enabling distribution 16-21
administrative states
description 10-5
setting 10-9
authentication
fabric security 23-1
auto port mode
description 10-4
B
BB_credits
configuring 10-12
description 10-6
reason codes 10-6
bit errors
reasons 10-11
Brocade
native interop mode 22-8
buffer-to-buffer credits. See BB_credits
build fabric frames
description 11-3
C
company IDs
FC ID allocations 22-6
configuring NPV 12-4
D
dead time intervals
description 18-7
default zones
configuring 16-16
configuring access permissions 16-16
configuring policies 16-12
description 16-16
interoperability 22-9
policies 16-16
destination IDs
exchange based 14-3
flow based 14-3
in-order delivery 18-12
path selection 15-11
device alias databases
committing changes 17-6
discarding changes 17-7
locking the fabric 17-5
merging 17-8
device aliases
comparison with zones (table) 17-2
creating (procedure) 17-5
default settings 17-9
description 17-1
displaying information17-8to ??
enhanced mode 17-3
features 17-1
import legacy zone aliases 17-7
modifying databases 17-2
requirements 17-2
using 17-7
zone alias conversion 17-7
DHCHAP
AAA authentication 23-9
authentication modes 23-4
configuring23-2to ??
configuring AAA authentication 23-9
default settings 23-10
displaying security information 23-9
group settings 23-6
hash algorithms 23-5
passwords for local switches 23-7
passwords for remote devices 23-8
timeout values 23-8
See also FC-SP 23-1
Diffie-Hellman Challenge Handshake Authentication Protocol. See DHCHAP
documentation
additional publications 1-iv
related documents 1-iv
domain IDs
allowed lists 11-10
assignment failures 10-7
configuring allowed lists 11-11
configuring CFS distribution 11-11
configuring fcalias members 16-17
description 11-8
distributing 11-1
enabling contiguous assignments 11-14
interoperability 22-8
preferred 11-10
static 11-10
domain manager
fast restart feature 11-4
isolation 10-7
drop latency time
configuring 18-15
E
EFMD
fabric binding 25-1
fabric binding initiation 25-3
EISLs
port channel links 14-1
enhanced zones
changing from basic zones 16-29
description 16-29
enabling 16-31
modifying database 16-31
E port mode
classes of service 10-3
description 10-3
E ports
fabric binding checking 25-2
FCS support 26-1
FSPF topologies 18-1
isolation 10-7
recovering from link isolations 16-23
trunking configuration 13-3
Exchange Fabric Membership Data. See EFMD
exchange IDs
in-order delivery 18-12
path selection 15-11
exchange link parameter. See ELP
expansion port mode. See E port mode
F
fabric binding
activation 25-5
checking for E ports 25-2
checking for TE ports 25-2
clearing statistics 25-9
compatibility with DHCHAP 23-3
copying to config database 25-6
copying to configuration file (procedure) 25-8
creating config database (procedure) 25-7
default settings 25-10
deleting databases 25-9
deleting from config database (procedure) 25-7
description 25-1
EFMD 25-1
enabling 25-3
enforcement 25-2
forceful activation 25-6
initiation process 25-3
licensing requirements 25-1
port security comparison 25-1
saving to config database 25-6
sWWN lists 25-4
viewing active databases (procedure) 25-8
viewing EFMD statistics (procedure) 25-8
viewing violations (procedure) 25-8
Fabric Configuration Servers. See FCSs
Fabric-Device Management Interface. See FDMI
fabric port mode. See F port mode
fabric pWWNs
zone membership 16-2
fabric reconfiguration
fcdomain phase 11-1
fabrics
fabrics. See RCFs;build fabric frames 11-3
fabric security
authentication 23-1
default settings 23-10
Fabric Shortest Path First. See FSPF
fault tolerant fabrics
example (figure) 18-2
fcaliases
adding members 16-18
cloning 16-27
configuring for zones 16-17
creating 16-17
renaming 16-26
using 17-7
fcdomains
autoreconfigured merged fabrics 11-7
configuring CFS distribution 11-11
default settings 11-21
description 11-1
displaying information 11-20
domain IDs 11-8
domain manager fast restart 11-4
enabling autoreconfiguration 11-7
incoming RCFs 11-6
initiation 11-5
overlap isolation 10-7
restarts 11-2
FC IDs
allocating default company ID lists 22-6
allocation for HBAs 22-6
configuring fcalias members 16-17
description 11-15
FC-SP
authentication 23-1
enabling 23-4
enabling on ISLs 23-9
See also DHCHAP 23-1
FCSs
characteristics 26-2
configuring names 26-2
default settings 26-6
description 26-1
displaying fabric ports using Device Manager 26-5
displaying information26-3to ??
fctimers
displaying configured values 22-5
distribution 22-4
FDMI
displaying database information 19-4
Fibre Channel
sWWNs for fabric binding 25-4
timeout values22-1to ??
Fibre Channel domains. See fcdomains
Fibre Channel interfaces
administrative states 10-5
BB_credits 10-6
configuring 10-8
configuring descriptions 10-9, 10-10
configuring frame encapsulation 10-10
deleting from port channels 14-14
disabling 10-9
displaying information 10-14
enabling 10-9
operational states 10-5
reason codes 10-5
states 10-4
See also interfaces 10-4
Fibre Channel Security Protocol. See FC-SP
FLOGI
description 19-1
F port mode
classes of service 10-4
description 10-3
F ports
description 10-3
frame encapsulation
configuring 10-10
FSPF
clearing VSAN counters 18-5
computing link cost 18-6
configuring globally18-3to ??
configuring Hello time intervals 18-6
configuring on a VSAN 18-4
configuring on interfaces18-5to ??
dead time intervals 18-7
default settings 18-16
description 18-1
disabling 18-5
disabling on interfaces 18-8
disabling routing protocols 18-5
enabling 18-5
fault tolerant fabrics 18-2
in-order delivery 18-12
interoperability 22-9
link state record defaults 18-3
reconvergence times 18-2
redundant links 18-2
resetting configuration 18-5
resetting to defaults 18-4
retransmitting intervals 18-7
routing services 18-1
topology examples 18-2
FSPF routes
configuring 18-11
description 18-11
full zone sets
considerations 16-4
enabling distribution 16-21
fWWNs
configuring fcalias members 16-17
Fx ports
VSAN membership 15-4
H
hard zoning
description 16-21
HBA ports
configuring area FCIDs 11-17
HBAs
FC ID allocations 22-6
Hello time intervals
configuring for FSPF 18-6
description 18-6
I
indirect link failures
recovering 27-1
in-order delivery
displaying status 18-15
enabling globally 18-14
guidelines 18-14
reordering port channel frames 18-13
interfaces
adding to port channels 14-12, 14-13
assigning to VSANs 15-8
configuring data field size 10-11
configuring descriptions 10-9, 10-10
configuring fcalias members 16-17
default settings 10-14
deleting from port channels 14-14
displaying information 10-14
forced addition to port channels 14-13
isolated states 14-13
suspended states 14-13
interface statistics
description 10-13
interoperability
configuring interop mode 1 22-8
VSANs 15-12
interop modes
configuring mode 1 22-8
default settings 22-12
description 22-8
ISLs
port channel links 14-1
isolated VSANs
description 15-8
displaying membership 15-9
L
link costs
configuring for FSPF 18-6
link failures
recovering 27-1
load balancing
attributes 15-11
attributes for VSANs 15-5
configuring 15-11
port channels 14-1
logical unit numbers. See LUNs
M
MAC addresses
configuring secondary 22-5
McData
native interop mode 22-8
merged fabrics
autoreconfigured 11-7
N
name servers
interoperability 22-9
LUN information 21-1
rejecting duplicate pWWNs 19-3
NL ports
hard zoning 16-21
NP links 12-2
N ports
hard zoning 16-21
zone enforcement 16-21
zone membership 16-2
NPV, configuring 12-4
NPV mode 12-2
NL ports 26-1
Nx ports
FCS support 26-1
O
operational states
description 10-5
P
passwords
persistent FC IDs
configuring 11-16
description 11-15
enabling 11-16
PLOGI
name server 19-3
PortChannel Protocol
converting autocreated groups to manually configured 14-17
port channel Protocol
autocreation 14-16
creating channel group 14-15
description 14-15
port channel protocol
configuring autocreation 14-17
enabling autocreation 14-17
PortChannels
default settings 14-19
verifying configurations14-19to ??
port channels
adding interfaces 14-12, 14-13
administratively down 10-7
comparison with trunking 14-2
compatibility checks 14-12
compatibility with DHCHAP 23-3
configuration guidelines 14-6
configuring 14-12
creating 14-10
deleting 14-11
deleting interfaces 14-14
description 14-1
forcing interface additions 14-13
in-order guarantee 18-14
interface states 14-13
interoperability 22-9
link changes 18-13
link failures 18-2
load balancing 14-2
misconfiguration error detection 14-6
port modes
auto 10-4
port security
activating 24-7
activation 24-2
activation rejection 24-7
adding authorized pairs 24-14
auto-learning 24-2
compatibility with DHCHAP 23-3
configuration guidelines 24-3
configuring CFS distribution24-15to 24-18
configuring manually without auto-learning 24-12
deactivating 24-7
default settings 24-21
deleting entries from database (procedure) 24-15
disabling 24-5
displaying settings (procedure) 24-9
displaying statistics (procedure) 24-9
displaying violations (procedure) 24-10
enabling 24-5
enforcement mechanisms 24-2
fabric binding comparison 25-1
forcing activation 24-7
license requirement 24-1
preventing unauthorized accesses 24-1
WWN identification 24-13
port security auto-learning
authorization examples 24-12
description 24-2
device authorization 24-11
disabling 24-11
enabling 24-10
guidelines for configuring with CFS 24-3
guidelines for configuring without CFS 24-4
port security databases
copying active to config (procedure) 24-9
interactions 24-18
manual configuration guidelines 24-4
merge guidelines 24-18
reactivating 24-8
scenarios 24-19
port tracking
default settings 27-7
description 27-1
enabling 27-3
guidelines 27-2
monitoring ports in a VSAN 27-6
multiple ports 27-5
port world wide names. See pWWNs
principal switches
assigning domain ID 11-9
pWWNs
configuring fcalias members 16-17
rejecting duplicates 19-3
zone membership 16-2
R
RCFs
description 11-3
incoming 11-6
rejecting incoming 11-6
reason codes
description 10-5
reconfigure fabric frames. See RCFs
redundancy
VSANs 15-4
redundant physical links
example (figure) 18-2
Registered State Change Notifications. See RSCNs
related documents 1-iv
retransmitting intervals
configuring for FSPF 18-7
description 18-7
route costs
computing 18-6
RSCNs
default settings 19-8
displaying information 19-5
suppressing domain format SW-RSCNs 19-7
RSCN timers
configuring 19-8
runtime checks
static routes 18-11
S
scalability
VSANs 15-4
SCSI LUNs
customized discovery 21-2
discovering targets 21-1
displaying information 21-3
starting discoveries 21-1
SD port mode
description 10-4
interface modes 10-4
secondary MAC addresses
configuring 22-5
small computer system interface. See SCSI
soft zoning
description 16-21
source IDs
exchange based 14-3
flow based 14-3
in-order delivery 18-12
path selection 15-11
SPAN destination port mode. See SD port mode
static routes
runtime checks 18-11
storage devices
access control 16-1
switch priorities
configuring 11-4
default 11-4
sWWNs
configuring for fabric binding 25-4
T
TE port mode
classes of service 10-4
description 10-4
TE ports
fabric binding checking 25-2
FSPF topologies 18-1
interoperability 22-9
recovering from link isolations 16-23
trunking restrictions 13-1
TOVs
configuring for a VSAN 22-3
default settings 22-12
interoperability 22-8
ranges 22-1
tracked ports
binding operationally 27-3
traffic isolation
VSANs 15-4
trunk-allowed VSAN lists
trunking
comparison with port channels 14-2
configuration guidelines 13-1
description 13-1
displaying information 13-6
interoperability 22-8
link state 13-3
merging traffic 13-2
restrictions 13-1
trunking E port mode. See TE port mode
trunking ports
associated with VSANs 15-8
trunking protocol
default settings 13-7
default state 13-2
description 13-2
detecting port isolation 13-2
trunk mode
configuring 13-3
U
unique area FC IDs
configuring 11-17
description 11-17
V
VSAN IDs
allowed list 13-7
description 15-5
multiplexing traffic 10-4
range 15-4
VSAN membership 15-4
VSANs
advantages 15-3
allowed-active 13-1
comparison with zones (table) 15-4
compatibility with DHCHAP 23-3
configuring 15-6
configuring allowed-active lists 13-6
configuring FSPF 18-3
configuring trunk-allowed lists13-4to 13-6
default settings 15-12
deleting 15-9
displaying configuration 15-12
domain ID automatic reconfiguration 11-7
FC IDs 15-1
FCS support 26-1
features 15-1
FSPF 18-4
FSPF connectivity 18-1
interop mode 22-9
isolated 15-8
load balancing attributes 15-5
mismatches 10-7
multiple zones 16-5
names 15-5
name server 19-2
port tracking 27-6
states 15-5
TE port mode 10-4
timer configuration 22-3
traffic isolation 15-3
trunk-allowed 13-1
trunking ports 15-8
W
WWNs
displaying information 22-5
port security 24-13
secondary MAC addresses 22-5
suspended connections 10-7
Z
zone aliases
conversion to device aliases 17-7
importing 17-7
zone attribute groups
cloning 16-27
zone databases
migrating a non-MDS database 16-28
zone members
adding to zones 16-10
converting to pWWN members 16-20
displaying information 16-15
zones
access control 16-13
adding to zone sets 16-20
adding zone members 16-10
backing up (procedure) 16-25
changing from enhanced zones 16-30
cloning 16-27
comparison with device aliases (table) 17-2
comparison with VSANs (table) 15-4
configuring 16-20
configuring aliases 16-17
configuring fcaliases 16-17
default policies 16-2
displaying information16-28to ??
editing full zone databases 16-7
enforcing restrictions 16-20
exporting databases 16-23
importing databases 16-23
membership using pWWNs 15-4
merge failures 10-7
renaming 16-26
restoring (procedure) 16-25
See also hard zoning;soft zoning 16-21
See also zoning;zone sets 16-2
zone server databases
clearing 16-28
zone sets
activating 16-13
adding member zones 16-20
cloning 16-27
considerations 16-4
copying 16-24
displaying information16-28to ??
distributing configuration 16-21
enabling distribution 16-21
exporting 16-23
exporting databases 16-23
features 16-1
importing 16-23
importing databases 16-23
one-time distribution 16-22
renaming 16-26
See also active zone sets;full zone sets 16-5
See also zones;zoning 16-2
zoning
description 16-1
example 16-3
implementation 16-4
See also zones;zone sets 16-1