Cisco nexus 5000 series release notes release 4.1(3)n1(1) (ol-16601-01 h0, july 2009) (26 pages)
Summary of Contents for Cisco AP775A - Nexus Converged Network Switch 5010
Page 1
Cisco Nexus 5000 Series Switch CLI Software Configuration Guide First Published: 07/17/2009 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-16597-01...
Page 2
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE.
C O N T E N T S New and Changed Information for the Cisco Nexus 5000 Series Preface xliii Audience xliii Document Organization xliii Document Conventions xliv Related Documentation Obtaining Documentation and Submitting a Service Request xlvi Overview Information About Cisco Nexus 5000 Series Switches New Technologies in the Cisco Nexus 5000 Series Fibre Channel over Ethernet Data Center I/O Consolidation...
Page 4
Contents Call Home Online Diagnostics Switch Management Simple Network Management Protocol Role-Based Access Control Configuration Methods Configuring with CLI, XML Management Interface, or SNMP Configuring with Cisco Data Center Network Manager Configuring with Cisco MDS Fabric Manager Network Security Features Virtual Device Contexts Licensing Typical Deployment Topologies...
Page 5
Contents User-Defined Persistent CLI Variables Using Command Aliases Defining Command Aliases Command Scripts Executing Commands Specified in a Script Using CLI Variables in Scripts Setting the Delay Time Initial Switch Configuration Configuring the Switch Image Files on the Switch Starting the Switch Boot Sequence Console Settings Upgrading the Switch Software...
Page 6
Contents Discarding NTP Configuration Changes Releasing Fabric Session Lock Database Merge Guidelines NTP Session Status Verification Management Interface Configuration About the mgmt0 Interface Configuring the Management Interface Displaying Management Interface Configuration Shutting Down the Management Interface Managing the Switch Configuration Displaying the Switch Configuration Saving a Configuration Clearing a Configuration...
Page 7
Contents Uninstalling Licenses Updating Licenses Grace Period Alerts License Transfers Between Switches Verifying the License Configuration LAN Switching Configuring Ethernet Interfaces Information About Ethernet Interfaces About the Interface Command About the Unidirectional Link Detection Parameter UDLD Overview Default UDLD Configuration UDLD Aggressive and Nonaggressive Modes About Interface Speed About the Cisco Discovery Protocol...
Page 8
Contents Configuring a VLAN Creating and Deleting a VLAN Entering the VLAN Submode and Configuring the VLAN Adding Ports to a VLAN Verifying VLAN Configuration Configuring Private VLANs Information About Private VLANs Primary and Secondary VLANs in Private VLANs Private VLAN Ports Primary, Isolated, and Community Private VLANs Associating Primary and Secondary VLANs Private VLAN Promiscuous Trunks...
Page 9
Contents Configuring Access and Trunk Interfaces Configuring a LAN Interface as an Ethernet Access Port Configuring Access Host Ports Configuring Trunk Ports Configuring the Native VLAN for 802.1Q Trunking Ports Configuring the Allowed VLANs for Trunking Ports Configuring Native 802.1Q VLANs Verifying Interface Configuration Configuring EtherChannels Information About EtherChannels...
Page 10
Contents Cisco Nexus 5000 Series Switch vPC Topology Single Homed Fabric Extender vPC Topology Dual Homed Fabric Extender vPC Topology vPC Domain Peer-Keepalive Link and Messages Compatibility Parameters for vPC Peer Links Configuration Parameters That Must Be Identical Configuration Parameters That Should Be Identical vPC Peer Links vPC Peer Link Overview Manually Configured vPC Features...
Page 11
Contents Information About Rapid PVST+ Understanding STP STP Overview Understanding How a Topology is Created Understanding the Bridge ID Bridge Priority Value Extended System ID STP MAC Address Allocation Understanding BPDUs Election of the Root Bridge Creating the Spanning Tree Topology Understanding Rapid PVST+ Rapid PVST+ Overview Rapid PVST+ BPDUs...
Page 12
Contents Enabling Rapid PVST+ per VLAN Configuring the Root Bridge ID Configuring a Secondary Root Bridge Configuring the Rapid PVST+ Port Priority Configuring the Rapid PVST+ Pathcost Method and Port Cost Configuring the Rapid PVST+ Bridge Priority of a VLAN Configuring the Rapid PVST+ Hello Time for a VLAN Configuring the Rapid PVST+ Forward Delay Time for a VLAN Configuring the Rapid PVST+ Maximum Age Time for a VLAN...
Page 13
Contents Specifying the Configuration on an MST Region Mapping and Unmapping VLANs to MST Instances Mapping Secondary VLANs to Same MSTI as Primary VLANs for Private VLANs Configuring the Root Bridge Configuring a Secondary Root Bridge Configuring the Port Priority Configuring the Port Cost Configuring the Switch Priority Configuring the Hello Time...
Page 14
Contents Enabling BPDU Guard on Specified Interfaces Enabling BPDU Filtering Globally Enabling BPDU Filtering on Specified Interfaces Enabling Loop Guard Globally Enabling Loop Guard or Root Guard on Specified Interfaces Verifying STP Extension Configuration Configuring the MAC Address Table Information About MAC Addresses Configuring MAC Addresses Configuring a Static MAC Address Configuring the Aging Time for the MAC Table...
Page 15
Contents AAA Service Configuration Options Authentication and Authorization Process for User Login Prerequisites for Remote AAA Information about AAA Guidelines and Limitations Configuring AAA Configuring Console Login Authentication Methods Configuring Default Login Authentication Methods Enabling Login Authentication Failure Messages Enabling MSCHAP Authentication Configuring AAA Accounting Default Methods Using AAA Server VSAs About VSAs...
Page 16
Contents Configuring the RADIUS Transmission Retry Count and Timeout Interval for a Server Configuring Accounting and Authentication Attributes for RADIUS Servers Configuring Periodic RADIUS Server Monitoring Configuring the Dead-Time Interval Manually Monitoring RADIUS Servers or Groups Verifying RADIUS Configuration Displaying RADIUS Server Statistics Example RADIUS Configuration Default RADIUS Settings Configuring TACACS+...
Page 17
Contents Verifying TACACS+ Configuration Example TACACS+ Configuration Default TACACS+ Settings Configuring SSH and Telnet Configuring SSH and Telnet Information About SSH and Telnet SSH Server SSH Client SSH Server Keys Telnet Server Guidelines and Limitations for SSH Configuring SSH Generating SSH Server Keys Specifying the SSH Public Keys for User Accounts Specifying the SSH Public Keys in Open SSH Format Specifying the SSH Public Keys in IETF SECSH Format...
Page 18
Contents Rules Source and Destination Protocols Implicit Rules Additional Filtering Options Sequence Numbers Logical Operators and Logical Operation Units Configuring IP ACLs Creating an IP ACL Changing an IP ACL Removing an IP ACL Changing Sequence Numbers in an IP ACL Applying an IP ACL as a Port ACL Verifying IP ACL Configurations Displaying and Clearing IP ACL Statistics...
Page 19
Contents Default ACL Settings System Management Using Cisco Fabric Services Using Cisco Fabric Services Information About CFS CFS Distribution CFS Distribution Modes Uncoordinated Distribution Coordinated Distribution Unrestricted Uncoordinated Distributions Disabling or Enabling CFS Distribution on a Switch Verifying CFS Distribution Status CFS Distribution over IP CFS Distribution over Fibre Channel CFS Distribution Scopes...
Page 20
Contents Configuring CFS over IP Enabling CFS over IPv4 Enabling CFS over IPv6 Verifying the CFS Over IP Configuration Configuring IP Multicast Address for CFS over IP Configuring IPv4 Multicast Address for CFS Configuring IPv6 Multicast Address for CFS Verifying IP Multicast Address Configuration for CFS over IP Displaying CFS Distribution Information Default CFS Settings Configuring User Accounts and RBAC...
Page 21
Contents Verifying a Session Committing a Session Saving a Session Discarding a Session Session Manager Example Configuration Verifying Session Manager Configuration Configuring Online Diagnostics Information About Online Diagnostics Online Diagnostics Overview Bootup Diagnostics Health Monitoring Diagnostics Expansion Module Diagnostics Configuring Online Diagnostics Verifying Online Diagnostics Configuration Default GOLD Settings Configuring System Message Logging...
Page 22
Contents Call Home Message Levels Obtaining Smart Call Home Prerequisites for Call Home Configuration Guidelines and Limitations Configuring Call Home Procedures for Configuring Call Home Configuring Contact Information Creating a Destination Profile Modifying a Destination Profile Associating an Alert Group with a Destination Profile Adding show Commands to an Alert Group Configuring E-Mail Configuring Periodic Inventory Notification...
Page 23
Contents Assigning SNMPv3 Users to Multiple Roles Creating SNMP Communities Configuring SNMP Notification Receivers Configuring the Notification Target User Enabling SNMP Notifications Configuring Link Notifications Disabling Link Notifications on an Interface Enabling One-Time Authentication for SNMP over TCP Assigning SNMP Switch Contact and Location Information Configuring the Context to Network Entity Mapping Verifying SNMP Configuration Default SNMP Settings...
Page 24
Contents DCBX Feature Negotiation Lossless Ethernet Logical Link Up/Down Converged Network Adapters FCoE Topologies Directly Connected CNA Topology Remotely Connected CNA Topology FCoE Best Practices Directly Connected CNA Best Practice Remotely Connected CNA Best Practice Licensing Requirements for FCoE Configuring FCoE Enabling FCoE Disabling FCoE Disabling LAN Traffic on an FCoE Link...
Page 25
Contents System Classes Default System Classes Policy Types Link-Level Flow Control Priority Flow Control Trust Boundaries Ingress Queuing Policies Ingress Classification Policies Egress Queuing Policies QoS for Multicast Traffic Policy for Fibre Channel Interfaces QoS for Traffic Directed to the CPU QoS Configuration Guidelines and Limitations Configuring System Classes Configuring Class Maps...
Page 26
Contents Configuring Priority Flow Control Configuring Link-Level Flow Control Verifying QoS Configuration Example QoS Configurations QoS Example 1 QoS Example 2 QoS Example 3 SAN Switching Configuring Fibre Channel Interfaces Configuring Fibre Channel Interfaces Information About Fibre Channel Interfaces Licensing Requirements for Fibre Channel Physical Fibre Channel Interfaces Virtual Fibre Channel Interfaces Interface Modes...
Page 27
Contents Configuring Receive Data Field Size Understanding Bit Error Thresholds Configuring Buffer-to-Buffer Credits Configuring Global Attributes for Fibre Channel Interfaces Configuring Switch Port Attribute Default Values About N Port Identifier Virtualization Enabling N Port Identifier Virtualization Verifying Fibre Channel Interfaces Verifying SFP Transmitter Types Verifying Interface Information Verifying BB_Credit Information...
Page 28
Contents Locking the Fabric Committing Changes Discarding Changes Clearing a Fabric Lock Displaying CFS Distribution Status Displaying Pending Changes Displaying Session Status About Contiguous Domain ID Assignments Enabling Contiguous Domain ID Assignments FC IDs About Persistent FC IDs Enabling the Persistent FC ID Feature Persistent FC ID Configuration Guidelines Configuring Persistent FC IDs About Unique Area FC IDs for HBAs...
Page 30
Contents Deleting SAN Port Channels Interfaces in a SAN Port Channel About Interface Addition to a SAN Port Channel Compatibility Check Suspended and Isolated States Adding an Interface to a SAN Port Channel Forcing an Interface Addition About Interface Deletion from a SAN Port Channel Deleting an Interface from a SAN Port Channel SAN Port Channel Protocol About Channel Group Creation...
Page 31
Contents About Load Balancing Configuring Load Balancing About Interop Mode Displaying Static VSAN Configuration Default VSAN Settings Configuring and Managing Zones Configuring and Managing Zones Information About Zoning Zoning Features Zoning Example Zone Implementation Active and Full Zone Set Configuration Guidelines Configuring Zones Configuring Zones Example Zone Sets...
Page 32
Contents About Enhanced Zoning Changing from Basic Zoning to Enhanced Zoning Changing from Enhanced Zoning to Basic Zoning Enabling Enhanced Zoning Modifying the Zone Database Releasing Zone Database Locks Merging the Database Configuring Zone Merge Control Policies Default Zone Policies Configuring System Default Zoning Settings Verifying Enhanced Zone Information Compacting the Zone Database...
Page 33
Contents Default Device Alias Settings Configuring Fibre Channel Routing Services and Protocols Configuring Fibre Channel Routing Services and Protocols Information About FSPF FSPF Examples Fault Tolerant Fabric Example Redundant Link Example FSPF Global Configuration About SPF Computational Hold Times About Link State Records Configuring FSPF on a VSAN Resetting FSPF to the Default Configuration Enabling or Disabling FSPF...
Page 34
Contents Displaying the In-Order Delivery Status Configuring the Drop Latency Time Displaying Latency Information Flow Statistics Configuration About Flow Statistics Counting Aggregated Flow Statistics Counting Individual Flow Statistics Clearing FIB Statistics Displaying Flow Statistics Default FSPF Settings Managing FLOGI, Name Server, FDMI, and RSCN Databases Managing FLOGI, Name Server, FDMI, and RSCN Databases Information About Fabric Login Name Server Proxy...
Page 35
Contents Discarding the RSCN Timer Configuration Changes Clearing a Locked Session Displaying RSCN Configuration Distribution Information Default RSCN Settings Discovering SCSI Targets Discovering SCSI Targets Information About SCSI LUN Discovery About Starting SCSI LUN Discovery Starting SCSI LUN Discovery About Initiating Customized Discovery Initiating Customized Discovery Displaying SCSI LUN Information Advanced Fibre Channel Features and Concepts...
Page 36
Contents Default Settings for Advanced Features Configuring FC-SP and DHCHAP Configuring FC-SP and DHCHAP Information About Fabric Authentication DHCHAP DHCHAP Compatibility with Fibre Channel Features About Enabling DHCHAP Enabling DHCHAP About DHCHAP Authentication Modes Configuring the DHCHAP Mode About the DHCHAP Hash Algorithm Configuring the DHCHAP Hash Algorithm About the DHCHAP Group Settings Configuring the DHCHAP Group Settings...
Page 37
Contents Port Security Activation Activating Port Security Database Activation Rejection Forcing Port Security Activation Database Reactivation Auto-Learning About Enabling Auto-Learning Enabling Auto-Learning Disabling Auto-Learning Auto-Learning Device Authorization Authorization Scenario Port Security Manual Configuration WWN Identification Guidelines Adding Authorized Port Pairs Port Security Configuration Distribution Enabling Port Security Distribution Locking the Fabric...
Page 38
Contents Configuring Fabric Binding Enabling Fabric Binding About Switch WWN Lists Configuring Switch WWN List About Fabric Binding Activation and Deactivation Activating Fabric Binding Forcing Fabric Binding Activation Copying Fabric Binding Configurations Clearing the Fabric Binding Statistics Deleting the Fabric Binding Database Verifying Fabric Binding Information Default Fabric Binding Settings Configuring Fabric Configuration Servers...
Page 39
Contents Configuring SPAN Configuring SPAN SPAN Sources Characteristics of Source Ports SPAN Destinations Characteristics of Destination Ports Configuring SPAN Creating and Deleting a SPAN Session Configuring the Destination Port Configuring an Ethernet Destination Port Configuring Fibre Channel Destination Port Configuring Source Ports Configuring Source Port Channels, VLANs, or VSANs Configuring the Description of a SPAN Session Activating a SPAN Session...
New and Changed Information for the Cisco Nexus 5000 Series This chapter provides release specific information for each new and changed feature in the Cisco Nexus 5000 Series Switch CLI Software Configuration Guide . To check for additional information about Cisco NX-OS Release 4.1(3)N1(1), see the Cisco Nexus 5000 Series and Cisco Nexus 2000 Series Release Notes, 31/July/2009 available at the following Cisco website: http://www.cisco.com/en/US/products/ps9670/prod_release_notes_list.html.
Page 42
New and Changed Information for the Cisco Nexus 5000 Series Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
Preface This preface describes the audience, organization, and conventions of the . It also provides information on how to obtain related documentation. • Audience, page xliii • Document Organization, page xliii • Document Conventions, page xliv • Related Documentation, page xlv Audience This guide is for experienced network administrators who are responsible for configuring and maintaining n5k switches.
Preface Document Conventions Part or Chapter Description System Management, page 297 Describes how to configure CFS, RBAC, System Message Logging, Call Home, SNMP, RMON, network management interfaces, storm control, and SPAN. Fibre Channel over Ethernet, page 391 Describes how to configure FCoE and virtual interfaces.
Preface Related Documentation Convention Description string A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks. Screen examples use the following conventions: Convention Description Terminal sessions and information the switch displays are in screen font. screen font Information you must enter is in boldface screen font.
Obtaining Documentation and Submitting a Service Request Related Documentation Cisco Nexus 2000 Series Fabric Extender Hardware Installation Guide Cisco MDS 9000 and Nexus 5000 Series Fabric Manager Software Configuration Guide, Cisco Fabric Manager Release 4.1 Obtaining Documentation and Submitting a Service Request For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html.
C H A P T E R Overview This chapter describes the Cisco Nexus 5000 Series switches. It includes the following sections: • Information About Cisco Nexus 5000 Series Switches, page 1 • New Technologies in the Cisco Nexus 5000 Series, page 1 •...
Data Center I/O Consolidation New Technologies in the Cisco Nexus 5000 Series a lossless transport layer; as a data storage protocol, it is unacceptable to lose a single data packet. Native Fibre Channel implements a lossless service at the transport layer using a buffer-to-buffer credit system. For FCoE traffic, the Ethernet link must provide a lossless service.
Virtual Interfaces New Technologies in the Cisco Nexus 5000 Series The server OS is not aware of the FCoE encapsulation (see the following figure). At the switch, the incoming Ethernet port separates the Ethernet and Fibre Channel traffic (using EtherType to differentiate the frames). Ethernet frames and Fibre Channel frames are switched to their respective network-side interfaces.
Chassis Cisco Nexus 5000 Series Switch Hardware Cisco Nexus 5000 Series Switch Hardware Chassis The Cisco Nexus 5000 Series includes the Cisco Nexus 5010 and Cisco Nexus 5020 switches. The Cisco Nexus 5010 switch is a 1 RU chassis and the Cisco Nexus 5020 switch is a 2 RU chassis designed for rack mounting.
Fibre Channel Interfaces Cisco Nexus 5000 Series Switch Software All of the 10-Gigabit Ethernet ports support FCoE. Each port can be used as a downlink (connected to a server) or as an uplink (to the data center LAN). Fibre Channel Interfaces Fibre Channel ports are optional on the Cisco Nexus 5000 Series switch.
Switched Port Analyzer • Distributed device alias service • SAN port channels Cisco Nexus 5000 Series switches provide quality of service (QoS) capabilities such as traffic prioritization and bandwidth allocation on egress interfaces. The default QoS configuration on the switch provides lossless service for Fibre Channel and FCoE traffic. QoS can be configured to provide additional classes of service for Ethernet traffic.
Switch Management Online Diagnostics Online Diagnostics Cisco generic online diagnostics (GOLD) is a suite of diagnostic facilities to verify that hardware and internal data paths are operating as designed. Boot-time diagnostics, continuous monitoring, and on-demand and scheduled tests are part of the Cisco GOLD feature set. GOLD allows rapid fault isolation and continuous system monitoring.
Network Security Features Typical Deployment Topologies Network Security Features Cisco NX-OS Release 4.1 includes the following security features: • Authentication, authorization, and accounting (AAA) and TACACS+ • RADIUS • Secure Shell (SSH) Protocol Version 2 • Simple Network Management Protocol Version 3 (SNMPv3) •...
Page 55
Overview Typical Deployment Topologies In the example configuration, the Cisco Nexus 5000 Series switch has Ethernet uplinks to two Catalyst switches. If STP is enabled in the data center LAN, the links to one of the switches will be STP active and the links to the other switch will be STP blocked.
Fabric Extender Deployment Topology Typical Deployment Topologies Fabric Extender Deployment Topology The following figure shows a simplfied configuration using the Cisco Nexus 2000 Series Fabric Extender in combination with the Cisco Nexus 5000 Series switch to provide a simplified and cost-effective 1-Gigabit TOR solution.
Data Center I/O Consolidation Topology Supported Standards Data Center I/O Consolidation Topology The following figure shows a typical I/O consolidation scenario for the Cisco Nexus 5000 Series switch. Figure 4: I/O Consolidation Topology The Cisco Nexus 5000 Series switch connects to the server ports using FCoE. Ports on the server require converged network adapters.
Page 58
Overview Supported Standards Table 2: IEEE Compliance Standard Description 802.1D MAC Bridges 802.1s Multiple Spanning Tree Protocol 802.1w Rapid Spanning Tree Protocol 802.3ad Link aggregation with LACP 802.3ae 10-Gigabit Ethernet 802.1Q VLAN Tagging 802.1p Class of Service Tagging for Ethernet frames Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Using the Command-Line Interface This chapter describes how to use the command-line interface of the Cisco Nexus 5000 Series switch. It contains the following sections: • Accessing the Command Line Interface, page 15 •...
Accessing the Command Line Interface SSH Connection Step 2 At the switch login prompt, enter your username and password. The Cisco Nexus 5000 Series switch initiates authentication. If no password has been configured, press Note Return Step 3 Exit the session when finished. exit switch# This example shows how to make a Telnet connection to a switch:...
Using the CLI Using CLI Command Modes Using the CLI Using CLI Command Modes Switches in the Cisco Nexus 5000 Series have two main command modes: user EXEC mode and configuration mode. The commands available to you depend on the mode you are in. To obtain a list of available commands in either mode, type a question mark (?) at the system prompt.
Using the CLI Listing the Commands Used with Each Command Mode Listing the Commands Used with Each Command Mode You can display the commands available in any command mode by typing a question mark (?) at the switch prompt. CLI Command Hierarchy CLI commands are organized hierarchically, with commands that perform similar functions grouped under the same level.
Page 65
Using the CLI EXEC Mode Commands The following commands are available in EXEC mode: switch# ? attach Connect to a specific linecard callhome callhome commands Change current directory check run consistency check on external storage device clear Reset functions CLI commands clock Manage the system clock configure...
Using the CLI Configuration Mode Commands Configuration Mode Commands Configuration mode allows you to make changes to the existing configuration. When you save the configuration, these commands are saved across switch reboots. Once you are in configuration mode, you can enter interface configuration mode, zone configuration mode, and a variety of protocol-specific modes.
Page 67
Using the CLI Configuration Mode Commands The following commands are available in configuration mode: switch# configure terminal switch(config)# ? Configure aaa functions banner Configure banner message boot Configure boot variables callhome Enter the callhome configuration mode Configure CDP parameters CFS configuration commands class-map Configure class-map Configure CLI aliases...
Using Commands Listing Commands and Syntax track Object tracking configuration commands trunk Configure Switch wide trunk protocol username Configure user information. vlan Vlan commands Configure VRF parameters vsan Enter the vsan configuration mode Set secondary base MAC addr and range for additional WWNs xml agent zone Zone configuration commands...
Using Commands Using Keyboard Shortcuts If you enter the zone member command, you can undo the results: switch(config)# zone name test vsan 1 switch(config-zone)# member pwwn 12:12:12:12:12:12:12:12 switch(config-zone)# no member pwwn 12:12:12:12:12:12:12:12 WARNING: Zone is empty. Deleting zone test. Exit the submode. switch(config-zone)# •...
Using CLI Variables Using Keyboard Shortcuts Command Description Ctrl-G Exit Ctrl-Z Ctrl-L Clear session The following table describes the commonly used configuration submodes. Table 5: Common Configuration Submodes Submode Name From Configuration Mode, Enter: Submode Prompt switch(config-callhome)# Call home callhome switch(config-fcs-register)# FCS Registration fcs register...
Using CLI Variables User-Defined Persistent CLI Variables The variables defined in the parent shell are available for use in the child run-script command process. • Passed as command line arguments to the run-script command. CLI variables have the following characteristics: •...
Using Command Aliases Executing Commands Specified in a Script Using Command Aliases Command alias support has the following characteristics: • Command aliases are global for all user sessions. • Command aliases are saved across reboots. • Commands being aliased must be typed in full without abbreviation. •...
Command Scripts Using CLI Variables in Scripts You cannot create the script file at the switch prompt. You can create the script file on an external machine Note and copy it to the bootflash: directory. This section assumes that the script file resides in the bootflash: directory.
Command Scripts Setting the Delay Time The following example shows how to use CLI session variables in a script file used by the run-script command: switch# cli var name testinterface fc 1/1 switch# show file bootflash:test1.vsh show interface $(testvar) switch# run-script bootflash:test1.vsh `show interface $(testvar)` fc2/1 is down (SFP not present) Hardware is Fibre Channel...
C H A P T E R Initial Switch Configuration This chapter describes the command-line interface (CLI) and CLI command modes of Cisco Nexus 5000 Series switches. It includes the following sections: • Configuring the Switch, page 29 Configuring the Switch Image Files on the Switch The Cisco Nexus 5000 Series switches have the following images: •...
Configuring the Switch Boot Sequence Boot Sequence When the switch boots, the golden BIOS validates the checksum of the upgradeable BIOS. If the checksum is valid, then control is transferred to the upgradeable BIOS image. The upgradeable BIOS launches the kickstart image, which then launches the system image.
Configuring the Switch Console Settings Related Topics • Troubleshooting, page 681 Console Settings The loader, kickstart, and system images have the following factory default console settings: • Speed—9600 baud • Databits—8 bits per byte • Stopbits—1 bit • Parity—none These settings are stored on the switch, and all three images use the stored console settings. To change a console setting, use the line console command in configuration mode.
Page 78
Configuring the Switch Upgrading the Switch Software Example: switch# dir bootflash: 4681 Nov 24 02:43:52 2008 config 13176836 Nov 24 07:19:36 2008 gdb.1 49152 Jan 12 18:38:36 2009 lost+found/ 310556 Dec 23 02:53:28 2008 20058112 Nov 07 02:35:22 2008 n5000-uk9-kickstart.4.0.1a.N1.0.62.bin 20217856 Jan 12 18:26:54 2009 n5000-uk9-kickstart.4.0.1a.N2.0.140.bin...
Configuring the Switch Downgrading from a Higher Release Example: switch# show version Cisco Nexus Operating System (NX-OS) Software TAC support: http://www.cisco.com/tac Copyright (c) 2002-2009, Cisco Systems, Inc. All rights reserved. The copyrights to certain works contained herein are owned by other third parties and are used and distributed under license.
Page 80
Configuring the Switch Downgrading from a Higher Release Procedure Step 1 Locate the image files you will use for the downgrade by entering the dir bootflash: command. If the image files are not stored on the bootflash memory, download the files from Cisco.com: a) Log in to Cisco.com to access the Software Download Center.
Configuring the Switch Initial Configuration Initial Configuration Configuration Prerequisites The following procedure is a review of the tasks you should have completed during hardware installation. These tasks must be completed before you can configure the switch. Before you can configure a switch, follow these steps: Procedure Step 1 Verify the following physical connections for the new Cisco Nexus 5000 Series switch:...
Configuring the Switch Default Login If a password is weak (short, easy-to-decipher), your password configuration is rejected. Note Be sure to configure a strong password. • If you are using an IPv4 address for the management interface, you need the following information: ◦...
Page 83
Configuring the Switch Configuring the Switch If you do not want to answer a previously configured question, or if you want to skip answers to any questions, press Enter. If a default answer is not available (for example, switch name), the switch uses what was previously configured and skips to the next question.
Page 84
Configuring the Switch Configuring the Switch Example: Enter the password for user_name: user-password Step 6 Enter yes (yes is the default) to create an SNMP read-only community string. Example: Configure read-only SNMP community string (yes/no) [n]:yes SNMP community string: snmp_community Step 7 Enter a name for the switch.
Page 85
Configuring the Switch Configuring the Switch Example: Configure NTP server? (yes/no) [n]: yes NTP server IP address: ntp_server_IP_address Step 13 Enter yes (yes is the default) to configure basic Fibre Channel configurations. Example: Enter basic FC configurations (yes/no) [n]: yes Step 14 Enter shut (shut is the default) to configure the default Fibre Channel switch port interface to the shut (disabled) state.
Configuring the Switch Changing the Initial Configuration Step 19 Enter yes (yes is default) to use and save this configuration: Example: Use this configuration and save it? (yes/no) [y]: yes If you do not save the configuration at this point, none of your changes are updated the next time Caution the switch is rebooted.
Configuring the Switch Configuring Date and Time This guide refers to a switch in the Cisco Nexus 5000 Series switch as switch , and it uses the switch# Note prompt. To change the name of the switch, perform this task: Procedure Command or Action Purpose...
Configuring the Switch Adjusting for Daylight Saving Time or Summer Time Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# clock timezone Sets the time zone. timezone is the three letter time zone (PST for Pacific Standard), the hours offset from UTC timezone hours_offset minutes_offset...
Configuring the Switch NTP Configuration Command or Action Purpose Step 4 switch(config)# exit Returns to EXEC mode. Step 5 switch# show running-config | include Verifies the time zone configuration. summer-time The following example adjusts the daylight savings time for the U.S. Pacific daylight time by 60 minutes starting the second Sunday in March at 2 a.m.
Configuring the Switch Configuring NTP server. You would configure peer association between these two sets, which forces the clock to be more reliable. • If you only have one server, it is better for all the switches to have a client association with that server. Not even a server down time will affect well-configured switches in the network.
Configuring the Switch NTP CFS Distribution Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# ntp server {ip-address | Forms an association with a server. ipv6-address | dns-name} Step 3 switch(config)# ntp peer {ip-address | Forms an association with a peer.
Configuring the Switch Discarding NTP Configuration Changes commit the NTP configuration changes without implementing the session feature, the NTP configurations are distributed to all the switches in the fabric. To commit the NTP configuration changes, perform this task: Procedure Command or Action Purpose Step 1 switch# configure terminal...
Configuring the Switch Management Interface Configuration Management Interface Configuration The management interface on the switch allows multiple simultaneous Telnet, SSH, or SNMP sessions. You can remotely configure the switch through the management interface (mgmt0), but first you must configure some IP parameters so that the switch is reachable. You can manually configure the management interface from the CLI through the console port.
Configuring the Switch Displaying Management Interface Configuration b) switch(config-vrf)# ipv6 route ipv6-prefix[/ length] ipv6-nexthop-address Configures the IPv6 address of the next hop. Step 8 switch(config-vrf)# exit Returns to EXEC mode. Step 9 (Optional) switch# copy running-config startup-config Saves your configuration changes to the file system. In some cases, a switch interface might be administratively shut down.
Configuring the Switch Saving a Configuration from the startup configuration, enter the show startup-config command to view the ASCII version of the current startup configuration that was used to boot the switch if a copy running-config startup-config command was not entered after the reboot. Use the show startup-config command to view the contents of the current startup configuration.
Configuring the Switch Listing the Files in a Directory Listing the Files in a Directory The dir command displays the contents of the current directory or the specified directory. The syntax for this command is dir directory or dir filename. This example shows how to list the files on the default volatile file system: switch# dir volatile: Usage for volatile://sup-local...
Configuring the Switch Copying Files This example moves a file from the current directory level: switch# move samplefile mystorage/samplefile If the current directory is bootflash:mydir, this command moves bootflash:mydir/samplefile to bootflash:mydir/mystorage/samplefile. Copying Files The copy command copies a file between file systems within a switch. Note Use the dir command to ensure that enough space is available in the target file system.
Configuring the Switch Compressing and Uncompressing Files Compressing and Uncompressing Files The gzip command compresses (zips) the specified file using LZ77 coding. This example directs the output of the show tech-support command to a file (Samplefile), and then zips the file and displays the difference in the space used up in the volatile directory: switch# show tech-support >...
C H A P T E R Managing Licenses This chapter describes how to manage licenses on Cisco Nexus 5000 Series switches. It contains the following sections: • Licensing Terminology, page 53 • Licensing Model, page 54 • Licence Installation, page 55 •...
Licensing Model • License enforcement—A mechanism that prevents a feature from being used without first obtaining a license. • Node-locked license—A license that can only be used on a particular switch using the switch’s unique host ID. • Host IDs—A unique chassis serial number that is specific to each switch. •...
Licence Installation Obtaining a Factory-Installed License Feature License Features N5000-AS and system features, except features explicitly listed in the Storage Services Package. Nexus 5010 Storage Protocols Services License • N5010-SS includes the following services for N5010-SSK9 one NX5010 system: • Native Fibre Channel •...
Obtaining the License Key File Performing a Manual Installation Performing a Manual Installation All Cisco Nexus 5000 Series licenses are factory-installed. Manual installation is not required. Obtaining the License Key File To obtain new or updated license key files, perform this task: Procedure Step 1 Use the show license host-id command to obtain the serial number for your switch.
Backing Up License Files Performing a Manual Installation Procedure Step 1 Log into the switch through the console port. Step 2 Perform the installation by entering the install license command from the switch console. switch# install license bootflash:license_file.lic Installing license ..done If you provide a target name for the license key file, the file is installed with the specified name.
Identifying License Features in Use Performing a Manual Installation We recommend backing up your license files immediately after installing them and just before running a write erasecommand. If you erase any existing licenses, you can only install them using the install license command. Caution Identifying License Features in Use When a Cisco NX-OS software feature is enabled, it can activate a license grace period.
Updating Licenses Performing a Manual Installation Procedure Step 1 Save your running configuration to a remote server using the copy command Step 2 Enter the show license brief command in EXEC mode to view a list of all installed license key files and identify the file to be uninstalled.
Grace Period Alerts Performing a Manual Installation c) Get the product authorization key (PAK) from either the claim certificate or the proof of purchase document. d) Locate the website URL from either the claim certificate or the proof of purchase document. e) Access the specified URL that applies to your switch and enter the switch serial number and the PAK.
License Transfers Between Switches Performing a Manual Installation countdown for a license package, you must disable every feature in that license package. Use the show license usage license-name command to determine which applications to disable. switch# show license usage FC_FEATURES_PKG Application ----------- -----------...
Page 108
Verifying the License Configuration Performing a Manual Installation Displays information for all installed license files. Step 2 switch# show license file Displays information for a specific license file. Step 3 switch# show license host-id Displays the host ID for the physical switch. Step 4 switch# show license usage Displays the usage information for installed licenses.
C H A P T E R Configuring Ethernet Interfaces This section describes the configuration of the Ethernet interfaces on a Cisco Nexus 5000 Series switch. It contains the following sections: • Information About Ethernet Interfaces, page 65 • Configuring Ethernet Interfaces, page 69 •...
Information About Ethernet Interfaces About the Unidirectional Link Detection Parameter switch(config)# interface ethernet [chassis/]slot/port • Chassis ID is an optional entry to address the ports of a connected Fabric Extender. The chassis ID is configured on a physical Ethernet or EtherChannel interface on the switch to identify the Fabric Extender discovered via the interface.
Information About Ethernet Interfaces Default UDLD Configuration The following figure shows an example of a unidirectional link condition. Device B successfully receives traffic from Device A on the port. However, Device A does not receive traffic from Device B on the same port.
Information About Ethernet Interfaces About Interface Speed • One side of a link remains up while the other side of the link is down In these cases, the UDLD aggressive mode disables one of the ports on the link, which prevents traffic from being discarded.
Configuring Ethernet Interfaces About MTU Configuration You can enable the debounce timer for each interface and specify the delay time in milliseconds. Caution When you enable the port debounce timer the link up and link down detections are delayed, resulting in a loss of traffic during the debounce period.
Configuring Ethernet Interfaces Configuring the Cisco Discovery Protocol The following example shows how to set the speed for a 1-Gigabit Ethernet port: switch# configure terminal switch(config)# interface ethernet 1/4 switch(config-if)# speed 1000 This command can only be applied to a physical Ethernet interface. If the interface and transceiver speed is mismatched, the SFP validation failed message is displayed when Note you enter the show interface ethernet slot/port command.
Configuring Ethernet Interfaces Enabling or Disabling CDP Command or Action Purpose Step 5 switch(config)# [no] cdp timer (Optional) seconds Sets the transmission frequency of CDP updates in seconds. The range is 5 to 254; the default is 60 seconds. Use the no form of the command to return to its default setting.
Configuring Ethernet Interfaces Configuring the Description Parameter Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# interface type slot/port Enters interface configuration mode for the specified interface. Step 3 switch(config-if)# link debounce time Enables the debounce timer for the amount of time milliseconds (1 to 5000 milliseconds) specified.
Displaying Interface Information Disabling and Restarting Ethernet Interfaces network servers through all dynamic routing protocols. When shut down, the interface is not included in any routing updates. To disable an interface, perform this task: Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode.
Page 121
Displaying Interface Information Disabling and Restarting Ethernet Interfaces The show interface command is invoked from EXEC mode and displays the interface configurations. Without any arguments, this command displays the information for all the configured interfaces in the switch. The following example shows how to display the physical Ethernet interface: switch# show interface ethernet 1/1 Ethernet1/1 is up Hardware is 1000/10000 Ethernet, address is 000d.eca3.5f08 (bia 000d.eca3.5f08)
Page 122
Displaying Interface Information Disabling and Restarting Ethernet Interfaces The following example shows how to display the physical Ethernet transceiver: switch# show interface ethernet 1/1 transceiver Ethernet1/1 sfp is present name is CISCO-EXCELIGHT part number is SPP5101SR-C1 revision is A serial number is ECL120901AV nominal bitrate is 10300 MBits/sec Link length supported for 50/125mm fiber is 82 m(s) Link length supported for 62.5/125mm fiber is 26 m(s)
Displaying Interface Information Default Physical Ethernet Settings Default Physical Ethernet Settings The following table lists the default settings for all physical Ethernet interfaces: Parameter Default Setting Debounce Enable, 100 milliseconds Duplex Auto (full-duplex) Encapsulation ARPA 1500 bytes Port Mode Access Speed Auto (10000) 2 MTU cannot be changed per-physical Ethernet interface.
Page 124
Displaying Interface Information Default Physical Ethernet Settings Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring VLANs This chapter describes how to configure VLANs on the Cisco Nexus 5000 Series switch. It contains the following sections: • Configuring VLANs, page 79 Configuring VLANs You can use virtual LANs (VLANs) to divide the network into separate logical areas. VLANs can also be considered as broadcast domains.
Configuring VLANs Understanding VLAN Ranges The following figure shows VLANs as logical networks. In this diagram, the stations in the engineering department are assigned to one VLAN, the stations in the marketing department are assigned to another VLAN, and the stations in the accounting department are assigned to yet another VLAN. Figure 8: VLANs as Logically Defined Networks VLANs are usually associated with IP subnetworks.
Configuring VLANs Creating, Deleting, and Modifying VLANs Table 9: VLAN Ranges VLANs Numbers Range Usage Normal Cisco default. You can use this VLAN, but you cannot modify or delete it. 2—1005 Normal You can create, use, modify, and delete these VLANs. 1006—4094 Extended You can create, name, and use...
Configuring VLANs Configuring a VLAN • VLAN name • Shutdown or not shutdown When you delete a specified VLAN, the ports associated to that VLAN are shut down and no traffic flows. However, the system retains all the VLAN-to-port mapping for that VLAN, and when you reenable, or recreate, the specified VLAN, the system automatically reinstates all the original ports to that VLAN.
Configuring VLANs Entering the VLAN Submode and Configuring the VLAN You can also create and delete VLANs in the VLAN configuration submode. Note Entering the VLAN Submode and Configuring the VLAN To configure or modify the VLAN for the following parameters, you must be in the VLAN configuration submode: •...
Configuring VLANs Adding Ports to a VLAN Adding Ports to a VLAN After you have completed the configuration of a VLAN, assign ports to it. To add ports, perform this task: Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode.
C H A P T E R Configuring Private VLANs This chapter describes how to configure private VLANs on the Cisco Nexus 5000 Series switch. It contains the following sections: • Information About Private VLANs, page 87 • Guidelines and Limitations for Private VLANs, page 92 •...
Information About Private VLANs Primary and Secondary VLANs in Private VLANs promiscuous port in its primary VLAN. Hosts on community VLANs can communicate among themselves and with their associated promiscuous port but not with ports in other community VLANs. Figure 9: Private VLAN Domain You must first create the VLAN before you can convert it to a private VLAN, either primary or secondary.
Information About Private VLANs Primary, Isolated, and Community Private VLANs • Promiscuous—A promiscuous port belongs to the primary VLAN. The promiscuous port can communicate with all interfaces, including the community and isolated host ports, that belong to those secondary VLANs associated to the promiscuous port and associated with the primary VLAN. You can have several promiscuous ports in a primary VLAN.
Information About Private VLANs Associating Primary and Secondary VLANs The following figure shows the traffic flows within a private VLAN, along with the types of VLANs and types of ports. Figure 10: Private VLAN Traffic Flows Note The private VLAN traffic flows are unidirectional from the host ports to the promiscuous ports. Traffic received on primary VLAN enforces no separation and forwarding is done as in normal VLAN.
Information About Private VLANs Private VLAN Promiscuous Trunks You can associate a secondary VLAN with only one primary VLAN. Note For an association to be operational, the following conditions must be met: • The primary VLAN must exist and be configured as a primary VLAN. •...
Guidelines and Limitations for Private VLANs Broadcast Traffic in Private VLANs Broadcast Traffic in Private VLANs Broadcast traffic from ports in a private VLAN flows in the following ways: • The broadcast traffic flows from a promiscuous port to all ports in the primary VLAN (which includes all the ports in the community and isolated VLANs).
Configuring a Private VLAN Configuring a VLAN as a Private VLAN The private VLAN commands do not appear until you enable the private VLAN feature. Note Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# feature private-vlan Enables the private VLAN feature on the switch.
Configuring a Private VLAN Associating Secondary VLANs with a Primary Private VLAN This example shows how to assign VLAN 5 to a private VLAN as the primary VLAN: switch# configure terminal switch(config)# vlan 5 switch(config-vlan)# private-vlan primary This example shows how to assign VLAN 100 to a private VLAN as a community VLAN: switch# configure terminal switch(config)# vlan 100 switch(config-vlan)# private-vlan community...
Configuring a Private VLAN Configuring an Interface as a Private VLAN Host Port Command or Action Purpose Step 2 switch(config)# vlan primary-vlan-id Enters the number of the primary VLAN that you are working in for the private VLAN configuration. Step 3 switch(config-vlan)# private-vlan Associates the secondary VLANs with the association {[add] secondary-vlan-list |...
Configuring a Private VLAN Configuring an Interface as a Private VLAN Promiscuous Port Command or Action Purpose Step 5 switch(config-if)# no switchport (Optional) private-vlan host-association Removes the private VLAN association from the port. This example shows how to configure Ethernet port 1/12 as a host port for a private VLAN and associate it to primary VLAN 5 and secondary VLAN 101: switch# configure terminal switch(config)# interface ethernet 1/12...
Configuring a Private VLAN Configuring a Promiscuous Trunk Port Configuring a Promiscuous Trunk Port In a private VLAN domain, promiscuous trunks are part of the primary VLAN. Promiscuous trunk ports can carry multiple primary VLANs. Multiple secondary VLANs under a given primary VLAN can be mapped to a promiscuous trunk port.
Configuring a Private VLAN Configuring the Allowed VLANs for PVLAN Trunking Ports Before You Begin Ensure that the private VLAN feature is enabled. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# interface type Selects the port to configure as a private VLAN isolated trunk port.
Configuring a Private VLAN Configuring Native 802.1Q VLANs on Private VLANs Command or Action Purpose Step 2 switch(config)# interface type Selects the port to configure as a private VLAN host port. [chassis/]slot/port This port can be on a Fabric Extender (identified by the chassis option).
Verifying Private VLAN Configuration Configuring Native 802.1Q VLANs on Private VLANs Command or Action Purpose Step 4 switch(config-if)# no switchport (Optional) private-vlan trunk native {vlan vlan-id} Removes the native VLAN ID from the private VLAN trunk. Verifying Private VLAN Configuration To display private VLAN configuration information, use the following commands: Command Purpose...
C H A P T E R Configuring Access and Trunk Interfaces Ethernet interfaces can be configured either as access ports or trunk ports. Trunks carry the traffic of multiple VLANs over a single link and allow you to extend VLANs across the network. Note Cisco NX-OS supports only IEEE 802.1Q-type VLAN trunk encapsulation.
Information About Access and Trunk Interfaces Understanding IEEE 802.1Q Encapsulation The following figure shows how you can use trunk ports in the network. The trunk port carries traffic for two or more VLANs. Figure 11: Devices in a Trunking Environment In order to correctly deliver the traffic on a trunk port with several VLANs, the device uses the IEEE 802.1Q encapsulation or tagging method.
Information About Access and Trunk Interfaces Understanding Access VLANs To correctly deliver the traffic on a trunk port with several VLANs, the device uses the IEEE 802.1Q encapsulation (tagging) method that uses a tag that is inserted into the frame header. This tag carries information about the specific VLAN to which the frame and packet belong.
Information About Access and Trunk Interfaces Understanding the Native VLAN ID for Trunk Ports Understanding the Native VLAN ID for Trunk Ports A trunk port can carry untagged packets simultaneously with the 802.1Q tagged packets. When you assign a default port VLAN ID to the trunk port, all untagged traffic travels on the default port VLAN ID for the trunk port, and all untagged traffic is assumed to belong to this VLAN.
Configuring Access and Trunk Interfaces Configuring a LAN Interface as an Ethernet Access Port The vlan dot1q tag native command is enabled on global basis. Note Configuring Access and Trunk Interfaces Configuring a LAN Interface as an Ethernet Access Port You can configure an Ethernet interface as an access port.
Configuring Access and Trunk Interfaces Configuring Trunk Ports Before You Begin Ensure that you are configuring the correct interface; it must be an interface that is connnected to an end station. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode.
Configuring Access and Trunk Interfaces Configuring the Native VLAN for 802.1Q Trunking Ports This example shows how to set an interface as an Ethernet trunk port: switch# configure terminal switch(config)# interface ethernet 1/3 switch(config-if)# switchport mode trunk Related Topics • Understanding IEEE 802.1Q Encapsulation, page 102 Configuring the Native VLAN for 802.1Q Trunking Ports If you do not configure this parameter, the trunk port uses the default VLAN as the native VLAN ID.
Configuring Access and Trunk Interfaces Configuring Native 802.1Q VLANs Command or Action Purpose configurable. By default, all VLANs are allowed on all trunk interfaces. You cannot add internally allocated VLANs as Note allowed VLANs on trunk ports. The system returns a message if you attempt to list an internally allocated VLAN as an allowed VLAN.
Verifying Interface Configuration Configuring Native 802.1Q VLANs The following example shows how to enable 802.1Q tagging on the switch: switch# configure terminal switch(config)# vlan dot1q tag native switch(config)# exit switch# show vlan dot1q tag native vlan dot1q native tag is enabled Verifying Interface Configuration To display access and trunk interface configuration information, perform one of these tasks: Command...
C H A P T E R Configuring EtherChannels This chapter describes how to configure EtherChannels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of EtherChannels in Cisco NX-OS. It contains the following sections: •...
Information About EtherChannels Compatibility Requirements Cisco NX-OS does not support Port Aggregation Protocol (PAgP) for EtherChannels. Note An EtherChannel bundles individual links into a channel group to create a single logical link that provides the aggregate bandwidth of up to 16 physical links. If a member port within an EtherChannel fails, traffic previously carried over the failed link switches to the remaining member ports within the EtherChannel.
Information About EtherChannels Load Balancing Using EtherChannels Use the show port-channel compatibility-parameters command to see the full list of compatibility checks that Cisco NX-OS uses. You can only add interfaces configured with the channel mode set to on to static EtherChannels. You can also only add interfaces configured with the channel mode as active or passive to EtherChannels that are running LACP.
Information About EtherChannels Understanding LACP • Source TCP/UDP port number • Source and destination TCP/UDP port number The following table shows the criteria used for each configuration: Table 10: EtherChannel Load-Balancing Criteria Configuration Layer 2 Criteria Layer 3 Criteria Layer 4 Criteria Destination MAC Destination MAC Destination MAC...
Information About EtherChannels LACP ID Parameters The following figure shows how individual links can be combined into LACP EtherChannels and channel groups as well as function as individual links. Figure 13: Individual Links Combined into an EtherChannel With LACP, you can bundle up to 16 interfaces in a channel group. When you delete the EtherChannel, Cisco NX-OS automatically deletes the associated channel group.
Information About EtherChannels Channel Modes ◦ Port physical characteristics, such as the data rate, the duplex capability, and the point-to-point or shared medium state ◦ Configuration restrictions that you establish Channel Modes Individual interfaces in EtherChannels are configured with channel modes. When you run static EtherChannels, with no protocol, the channel mode is always set to on.
Configuring EtherChannels LACP Marker Responders • A port in active mode can form an EtherChannel successfully with another port that is in active mode. • A port in active mode can form an EtherChannel with another port in passive mode. •...
Configuring EtherChannels Adding a Port to an EtherChannel Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# interface port-channel Specifies the port-channel interface to configure, and enters the interface configuration mode. The range is channel-number from 1 to 4096.
Configuring EtherChannels Configuring Load Balancing Using EtherChannels This example shows how to add an Ethernet interface 1/4 to channel group 1: switch# configure terminal switch (config)# interface ethernet 1/4 switch(config-if)# switchport mode trunk switch(config-if)# channel-group 1 Related Topics • Enabling LACP, page 120 Configuring Load Balancing Using EtherChannels You can configure the load-balancing algorithm for EtherChannels that applies to the entire device.
Configuring EtherChannels Enabling LACP Enabling LACP LACP is disabled by default; you must enable LACP before you begin LACP configuration. You cannot disable LACP while any LACP configuration is present. LACP learns the capabilities of LAN port groups dynamically and informs the other LAN ports. Once LACP identifies correctly matched Ethernet links, it facilitates grouping the links into an EtherChannel.
Configuring EtherChannels Configuring the LACP System Priority and System ID Command or Action Purpose Step 4 switch(config-if)# no channel-group Returns the port mode to on for the specified interface. number mode This example shows how to set the LACP-enabled interface to active port-channel mode for Ethernet interface 1/4 in channel group 5: switch# configure terminal switch (config)# interface ethernet 1/4...
Verifying EtherChannel Configuration Configuring the LACP Port Priority Command or Action Purpose Step 2 switch(config)# interface type Specifies the interface to configure, and enters the slot/port interface configuration mode. Step 3 switch(config-if)# lacp port-priority Configures the port priority for use with LACP. Valid priority values are 1 through 65535, and higher numbers have lower priority.
C H A P T E R Configuring Virtual Port Channels This chapter describes how to configure virtual port channels (vPCs) on Cisco Nexus 5000 Series switches. It contains the following sections: • Information About vPCs, page 123 • vPC Guidelines and Limitations, page 134 •...
Page 170
Information About vPCs vPC Overview you to create redundancy by enabling multiple parallel paths between nodes and load balancing traffic where alternative paths exist. Figure 14: vPC Architecture You configure the EtherChannels by using one of the following: • No protocol •...
Information About vPCs Terminology A vPC provides the following benefits: • Allows a single device to use an EtherChannel across two upstream devices • Eliminates Spanning Tree Protocol (STP) blocked ports • Provides a loop-free topology • Uses all available uplink bandwidth •...
Information About vPCs Supported vPC Topologies • EtherChannel host interface—An EtherChannel downlink connection from the Fabric Extender host interface to a server port. In Release 4.1(3)N1(1), an EtherChannel host interface consists of only one host interface Note and can be configured either as a Link Aggregation Control Protocol (LACP) or non-LACP EtherChannel.
Information About vPCs Dual Homed Fabric Extender vPC Topology topology that is shown in the following figure provides the vPC functionality to dual homed servers with 1-Gigabit Ethernet uplink interfaces. Figure 16: Single Homed Fabric Extender vPC Topology The Cisco Nexus 5000 Series switch can support up to 12 configured single homed Fabric Extenders (576 ports) with this topology however only 480 dual homed host servers can be configured in a vPCs with this configuration.
Information About vPCs vPC Domain The Cisco Nexus 5000 Series switch can support up to 12 configured dual homed Fabric Extenders with this topology. A maximum of 480 single homed servers can be connected to this configuration. vPC Domain You can use the vPC domain ID to identify the vPC peer links and the ports that are connected to the vPC downstream switches.
Information About vPCs Compatibility Parameters for vPC Peer Links default VRF, an SVI must be created to act as the source and destination addresses for the vPC peer-keepalive messages. Ensure that both the source and destination IP addresses used for the peer-keepalive messages are unique in your network and these IP addresses are reachable from the VRF associated with the vPC peer-keepalive link.
Information About vPCs Configuration Parameters That Should Be Identical • STP region configuration for Multiple Spanning Tree (MST) • Enable or disable state per VLAN • STP global settings: ◦ Bridge Assurance setting ◦ Port type setting—We recommend that you set all vPC interfaces as network ports ◦...
Information About vPCs vPC Peer Links link. You must create all VLANs on both the primary and secondary vPC switches, or the VLAN will be suspended. • Private VLAN configuration • All ACL configurations and parameters • Quality of service (QoS) configuration and parameters—Local parameters; global parameters must be identical •...
Information About vPCs Manually Configured vPC Features You must ensure that the two switches connected by the vPC peer link have certain identical operational Note and configuration parameters. When you configure the vPC peer link, the vPC peer switches negotiate that one of the connected switches is the primary switch and the other connected switch is the secondary switch.
Information About vPCs vPC Number • We recommend that you configure Unidirectional Link Detection (UDLD) on both sides of the vPC peer link. vPC Number Once you have created the vPC domain ID and the vPC peer link, you can create EtherChannels to attach the downstream switch to each vPC peer switch.
vPC Guidelines and Limitations CFSoE You must configure a list of parameters to be identical on the vPC peer switches on both sides of the vPC peer link. STP is distributed; that is, the protocol continues running on both vPC peer switches. However, the configuration on the vPC peer switch elected as the primary switch controls the STP process for the vPC interfaces on the secondary vPC peer switch.
Configuring vPCs Enabling vPCs • Only EtherChannels can be in vPCs. A vPC can be configured on a normal EtherChannel (switch-to-switch vPC topology), on an EtherChannel fabric interface (fabric extender vPC topology), and on an EtherChannel host interface (host interface vPC topology). Refer to the Cisco Nexus 2000 Series Fabric Extender Software Configuration Guide Note for information about Fabric Extender host and fabric interfaces.
Configuring vPCs Creating a vPC Domain When you disable the vPC feature, the Cisco Nexus 5000 Series switch clears all the vPC configurations. Note Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# no feature vpc Disables vPCs on the switch.
Configuring vPCs Configuring a vPC Keepalive Link Command or Action Purpose Step 4 switch# copy running-config (Optional) startup-config Copies the running configuration to the startup configuration. This example shows how to create a vPC domain: switch# configure terminal switch(config)# vpc domain 5 Configuring a vPC Keepalive Link You can configure the destination IP for the peer-keepalive link that carries the keepalive messages.
Configuring vPCs Creating a vPC Peer Link This example shows how to configure the destination IP address for the vPC-peer-keepalive link: switch# configure terminal switch(config)# vpc domain 5 switch(config-vpc-domain)# peer-keepalive destination 10.10.10.42 Creating a vPC Peer Link You can create a vPC peer link by designating the EtherChannel that you want on each switch as the peer link for the specified vPC domain.
Configuring vPCs Creating an EtherChannel Host Interface This example shows how to check that the required configurations are compatible across all the vPC interfaces: switch# show vpc consistency-parameters global Legend: Type 1 : vPC will be suspended in case of mismatch Name Type Local Value...
Configuring vPCs Moving Other EtherChannels into a vPC Ensure that the connected Fabric Extender is online. You must configure both switches on either side of the vPC peer link with the following procedure. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode.
Configuring vPCs Manually Configuring a vPC Domain MAC Address Command or Action Purpose A vPC can be configured on a normal EtherChannel Note (physical vPC topology), on an EtherChannel fabric interface (fabric extender vPC topology), and on an EtherChannel host interface (host interface vPC topology) Step 3 switch(config-if)# vpc number...
Configuring vPCs Manually Configuring the System Priority Command or Action Purpose Step 4 switch# show vpc role (Optional) Displays the vPC system MAC address. Step 5 switch# copy running-config (Optional) Copies the running configuration to the startup startup-config configuration. This example shows how to configure a vPC domain MAC address: switch# configure terminal switch(config)# vpc domain 5 switch(config-if)# system-mac 23fb.4ab5.4c4e...
Configuring vPCs Manually Configuring a vPC Peer Switch Role Command or Action Purpose Step 5 switch# copy running-config (Optional) startup-config Copies the running configuration to the startup configuration. This example shows how to configure a vPC peer link: switch# configure terminal switch(config)# vpc domain 5 switch(config-if)# system-priority 4000 Manually Configuring a vPC Peer Switch Role...
Verifying the vPC Configuration Manually Configuring a vPC Peer Switch Role This example shows how to configure a vPC peer link: switch# configure terminal switch(config)# vpc domain 5 switch(config-if)# role priority 4000 Verifying the vPC Configuration Use the following commands to display vPC configuration information: Command Purpose switch# show feature...
vPC Example Configurations Dual Homed Fabric Extender vPC Configuration Example vPC Example Configurations Dual Homed Fabric Extender vPC Configuration Example The following example shows how to configure the dual homed Fabric Extender vPC topology using the management VRF to carry the peer-keepalive messages on switch NX-5000-1 as shown in following figure: Figure 18: vPC Configuration Example Before You Begin Ensure that the Cisco Nexus 2000 Series Fabric Extender NX-2000-100 is attached and online.
vPC Example Configurations Single Homed Fabric Extender vPC Configuration Example Step 5 Configure the fabric EtherChannel links for the Fabric Extender NX-2000-100. NX-5000-1(config)# interface ethernet 1/20 NX-5000-1(config-if)# channel-group 100 NX-5000-1(config-if)# exit NX-5000-1(config)# interface port-channel 100 NX-5000-1(config-if)# switchport mode fex-fabric NX-5000-1(config-if)# vpc 100 NX-5000-1(config-if)# fex associate 100 NX-5000-1(config-if)# exit Step 6...
Page 193
vPC Example Configurations Single Homed Fabric Extender vPC Configuration Example Before You Begin Ensure that the Cisco Nexus 2000 Series Fabric Extenders NX-2000-100 and NX-2000-101 are attached and online. Procedure Step 1 Enable vPC and LACP. NX-5000-1# configure terminal NX-5000-1(config)# feature lacp NX-5000-1(config)# feature vpc Step 2 Enable SVI interfaces, create the VLAN and SVI to be used by the vPC peer-keepalive link.
C H A P T E R Configuring Rapid PVST+ Rapid per VLAN Spanning Tree (Rapid PVST+) is an updated implementation of STP that allows you to create one spanning tree topology for each VLAN. Rapid PVST+ is the default Spanning Tree Protocol (STP) mode on the switch.
Information About Rapid PVST+ Understanding STP Understanding STP STP Overview For an Ethernet network to function properly, only one active path can exist between any two stations. STP operation is transparent to end stations, which cannot detect whether they are connected to a single LAN segment or a switched LAN of multiple segments.
Information About Rapid PVST+ Bridge Priority Value Bridge Priority Value The bridge priority is a 4-bit value when the extended system ID is enabled. In Cisco NX-OS, the extended system ID is always enabled; you cannot be disable the extended system Note Related Topics •...
Information About Rapid PVST+ Understanding BPDUs • 16384 • 20480 • 24576 • 28672 • 32768 • 36864 • 40960 • 45056 • 49152 • 53248 • 57344 • 61440 STP uses the extended system ID plus a MAC address to make the bridge ID unique for each VLAN. If another bridge in the same spanning tree domain does not run the MAC address reduction feature, it Note could achieve root bridge ownership because its bridge ID may fall between the values specified by the...
Information About Rapid PVST+ Election of the Root Bridge • The shortest distance to the root bridge is calculated for each switch based on the path cost. • A designated bridge for each LAN segment is selected. This is the switch closest to the root bridge through which frames are forwarded to the root.
Information About Rapid PVST+ Understanding Rapid PVST+ to a port that has a higher number than the current root port can cause a root-port change. The goal is to make the fastest link the root port. For example, assume that one port on Switch B is a fiber-optic link, and another port on Switch B (an unshielded twisted-pair [UTP] link) is the root port.
Page 201
Information About Rapid PVST+ Rapid PVST+ Overview • Point-to-point links—If you connect a port to another port through a point-to-point link and the local port becomes a designated port, it negotiates a rapid transition with the other port by using the proposal-agreement handshake to ensure a loop-free topology.
Information About Rapid PVST+ Rapid PVST+ BPDUs Rapid PVST+ BPDUs Rapid PVST+ and 802.1w use all six bits of the flag byte to add the role and state of the port that originates the BPDU, and the proposal and agreement handshake. The following figure shows the use of the BPDU flags in Rapid PVST+.
Information About Rapid PVST+ Proposal and Agreement Handshake Proposal and Agreement Handshake As shown in the following figure, switch A is connected to switch B through a point-to-point link, and all of the ports are in the blocking state. Assume that the priority of switch A is a smaller numerical value than the priority of switch B.
Information About Rapid PVST+ Protocol Timers Related Topics • Summary of Port States, page 161 Protocol Timers The following table describes the protocol timers that affect the Rapid PVST+ performance. Table 15: Rapid PVST+ Protocol Timers Variable Description Hello timer Determines how often each switch broadcasts BPDUs to other switches.
Information About Rapid PVST+ Port States In a stable topology with consistent port roles throughout the network, Rapid PVST+ ensures that every root port and designated port immediately transition to the forwarding state while all alternate and backup ports are always in the blocking state. Designated ports start in the blocking state. The port state controls the operation of the forwarding and learning processes.
Information About Rapid PVST+ Blocking State When you enable Rapid PVST+, every port in the software, VLAN, and network goes through the blocking state and the transitory states of learning at power up. If properly configured, each LAN port stabilizes to the forwarding or blocking state.
Information About Rapid PVST+ Disabled State • Forwards frames switched from another port for forwarding. • Incorporates the end station location information into its address database. • Receives BPDUs and directs them to the system module. • Processes BPDUs received from the system module. •...
Information About Rapid PVST+ Processing Superior BPDU Information If a designated port is in the forwarding state and is not configured as an edge port, it transitions to the blocking state when the Rapid PVST+ forces it to synchronize with new root information. In general, when the Rapid PVST+ forces a port to synchronize with root information and the port does not satisfy any of the above conditions, its port state is set to blocking.
Information About Rapid PVST+ Detecting Unidirectional Link Failure Detecting Unidirectional Link Failure The software checks the consistency of the port role and state in the received BPDUs to detect unidirectional link failures that could cause bridging loops. When a designated port detects a conflict, it keeps its role, but reverts to a discarding state because disrupting connectivity in case of inconsistency is preferable to opening a bridging loop.
Information About Rapid PVST+ Port Priority You can assign lower cost values to LAN interfaces that you want STP to select first and higher cost values to LAN interfaces that you want STP to select last. If all LAN interfaces have the same cost value, STP puts the LAN interface with the lowest LAN interface number in the forwarding state and blocks other LAN interfaces.
Configuring Rapid PVST+ Rapid PVST+ Interoperation with 802.1s MST This method of operation is required only for 802.1D switches. The 802.1w BPDUs do not have the TCA bit set. • Protocol migration—For backward compatibility with 802.1D switches, 802.1w selectively sends 802.1D configuration BPDUs and TCN BPDUs on a per-port basis.
Configuring Rapid PVST+ Enabling Rapid PVST+ per VLAN Command or Action Purpose Step 2 switch(config)# spanning-tree Enables Rapid PVST+ on the switch. Rapid PVST+ is the mode rapid-pvst default spanning tree mode. Changing the spanning tree mode disrupts traffic Note because all spanning tree instances are stopped for the previous mode and started for the new mode.
Configuring Rapid PVST+ Configuring the Root Bridge ID This example shows how to enable STP on a VLAN: switch# configure terminal switch(config)# spanning-tree vlan 5 Configuring the Root Bridge ID The software maintains a separate instance of STP for each active VLAN in Rapid PVST+. For each VLAN, the switch with the lowest bridge ID becomes the root bridge for that VLAN.
Configuring Rapid PVST+ Configuring a Secondary Root Bridge This example shows how to configure the switch as the root bridge for a VLAN: switch# configure terminal switch(config)# spanning-tree vlan 5 root primary diameter 4 Configuring a Secondary Root Bridge When you configure a software switch as the secondary root, the STP bridge priority is modified from the default value (32768) so that the switch is likely to become the root bridge for the specified VLANs if the primary root bridge fails (assuming the other switches in the network use the default bridge priority of 32768).
Configuring Rapid PVST+ Configuring the Rapid PVST+ Bridge Priority of a VLAN Command or Action Purpose The default is auto , which sets the port cost on both the pathcost calculation method and the media speed. This example shows how to configure the access port cost of an Ethernet interface: switch# configure terminal switch (config)# spanning-tree pathcost method long switch (config)# interface ethernet 1/4...
Configuring Rapid PVST+ Configuring the Rapid PVST+ Forward Delay Time for a VLAN Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# spanning-tree vlan Configures the hello time of a VLAN. The hello time value can be from 1 to 10 seconds.
Verifying Rapid PVST+ Configurations Specifying the Link Type Specifying the Link Type Rapid connectivity (802.1w standard) is established only on point-to-point links. By default, the link type is controlled from the duplex mode of the interface. A full-duplex port is considered to have a point-to-point connection;...
Page 219
Verifying Rapid PVST+ Configurations Restarting the Protocol Command Purpose switch# show running-config spanning-tree [all] Displays the current spanning tree configuration. switch# show spanning-tree [options] Displays selected detailed information for the current spanning tree configuration. This example shows how to display spanning tree status: switch# show spanning-tree brief VLAN0001 Spanning tree enabled protocol rstp...
Page 220
Verifying Rapid PVST+ Configurations Restarting the Protocol Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring Multiple Spanning Tree Multiple Spanning Tree (MST), which is the IEEE 802.1s standard, allows you to assign two or more VLANs to a spanning tree instance. MST is not the default spanning tree mode; Rapid per VLAN Spanning Tree (Rapid PVST+) is the default mode.
Information About MST MST Regions MST provides rapid convergence through explicit handshaking as each MST instance uses the IEEE 802.1w standard, which eliminates the 802.1D forwarding delay and quickly transitions root bridge ports and designated ports to the forwarding state. MAC address reduction is always enabled while you are using MST.
Information About MST MST Configuration Information that one BPDU that the IST sends. Because the MST BPDU carries information for all instances, the number of BPDUs that need to be processed to support MSTIs is significantly reduced. Figure 27: MST BPDU with M-Records for MSTIs MST Configuration Information The MST configuration that must be identical on all switches within a single MST region is configured by the user.
Information About MST Spanning Tree Operation Within an MST Region • An IST is the spanning tree that runs in an MST region. MST establishes and maintains additional spanning trees within each MST region; these spanning trees are called, multiple spanning tree instances (MSTIs). Instance 0 is a special instance for a region, known as the IST.
Information About MST MST Terminology The IST connects all the MST switches in the region and appears as a subtree in the CIST that encompasses the entire switched domain. The root of the subtree is the CIST regional root. The MST region appears as a virtual switch to adjacent STP switches and MST regions.
Information About MST Hop Count parameters require the external qualifiers and not the internal or regional qualifiers. The MST terminology is as follows: • The CIST root is the root bridge for the CIST, which is the unique instance that spans the whole network. •...
Information About MST Detecting Unidirectional Link Failure that are internal to a region to share a segment with a port that belongs to a different region, creating the possibility of receiving both internal and external messages on a port (see the following figure). Figure 29: MST Boundary Ports At the boundary, the roles of MST ports do not matter;...
Information About MST Port Cost and Port Priority Port Cost and Port Priority Spanning tree uses port costs to break a tie for the designated port. Lower values indicate lower port costs, and spanning tree chooses the least costly path. Default port costs are taken from the bandwidth of the interface, as follows: •...
Configuring MST Interoperability with Rapid PVST+: Understanding PVST Simulation Interoperability with Rapid PVST+: Understanding PVST Simulation MST interoperates with Rapid PVST+ with no need for user configuration. The PVST simulation feature enables this seamless interoperability. Note PVST simulation is enabled by default. That is, by default, all interfaces on the switch interoperate between MST and Rapid PVST+.
Configuring MST Specifying the MST Name Command or Action Purpose Step 3 switch(config-mst)# exit or • The first form commits all the changes and exits MST switch(config-mst)# abort configuration mode. • The second form exits the MST configuration mode without committing any of the changes. Step 4 switch(config)# no (Optional)
Configuring MST Specifying the Configuration on an MST Region Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# spanning-tree mst Enters MST configuration submode. configuration Step 3 switch(config-mst)# revision version Specifies the revision number for the MST region. The range is from 0 to 65535, and the default value is 0.
Configuring MST Mapping and Unmapping VLANs to MST Instances Command or Action Purpose Step 4 switch(config-mst)# name Specifies the instance name. The name string has a maximum name length of 32 characters and is case sensitive. Step 5 switch(config-mst)# revision Specifies the configuration revision number.
Configuring MST Configuring the Root Bridge This example shows how to automatically map all the secondary VLANs to the same MSTI as their associated primary VLANs in all private VLANs: switch# configure terminal switch(config)# spanning-tree mst configuration switch(config-mst)# private-vlan synchronize Configuring the Root Bridge You can configure the switch to become the root bridge.
Configuring MST Configuring a Secondary Root Bridge This example shows how to configure the switch as the root switch for MSTI 5: switch# configure terminal switch(config)# spanning-tree mst 5 root primary Configuring a Secondary Root Bridge You can execute this command on more than one switch to configure multiple backup root bridges. Enter the same network diameter and hello-time values that you used when you configured the primary root bridge with the spanning-tree mst root primary configuration command.
Configuring MST Configuring the Port Cost Command or Action Purpose Step 2 switch(config)# interface {{type Specifies an interface to configure, and enters interface slot/port} | {port-channel configuration mode. number}} Step 3 switch(config-if)# spanning-tree Configures the port priority as follows: mst instance-id port-priority •...
Configuring MST Configuring the Switch Priority Command or Action Purpose • For instance-id, you can specify a single instance, a range of instances separated by a hyphen, or a series of instances separated by a comma. The range is from 1 to 4094.
Configuring MST Configuring the Hello Time Configuring the Hello Time You can configure the interval between the generation of configuration messages by the root bridge for all instances on the switch by changing the hello time. Note Exercise care when using this command. For most situations, we recommend that you enter the spanning-tree mst instance-id root primary and the spanning-tree mst instance-id root secondary configuration commands to modify the hello time.
Configuring MST Configuring the Maximum-Aging Time Configuring the Maximum-Aging Time The maximum-aging timer is the number of seconds that a switch waits without receiving spanning tree configuration messages before attempting a reconfiguration. You set the maximum-aging timer for all MST instances on the switch with one command (the maximum age time only applies to the IST).
Configuring MST Configuring PVST Simulation Per Port Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# no spanning-tree Disables all interfaces on the switch from automatically interoperating with connected switch that is running in Rapid mst simulate pvst global PVST+ mode.
Configuring MST Specifying the Link Type This example shows how to prevent the specified interfaces from automatically interoperating with a connecting switch that is not running MST: switch# configure terminal switch(config)# interface ethernet 1/4 switch(config-if)# spanning-tree mst simulate pvst disable Specifying the Link Type Rapid connectivity (802.1w standard) is established only on point-to-point links.
Verifying MST Configurations Restarting the Protocol This example shows how to restart MST on the Ethernet interface on slot 2, port 8: switch# clear spanning-tree detected-protocol interface ethernet 2/8 Verifying MST Configurations To display MST configuration information, perform one of the following tasks: Command Purpose switch# show running-config spanning-tree [all]...
Page 244
Verifying MST Configurations Restarting the Protocol Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring STP Extensions This chapter describes the configuration of extensions to the Spanning Tree Protocol (STP) on Cisco Nexus 5000 Series switches. It includes the following sections: • About STP Extensions, page 199 About STP Extensions Cisco has added extensions to STP that make convergence more efficient.
About STP Extensions Spanning Tree Network Ports If you configure a port connected to another switch as an edge port, you might create a bridging loop. Note Spanning Tree Network Ports Network ports are connected only to switches or bridges. Bridge Assurance is enabled only on network ports. If you mistakenly configure ports that are connected to hosts or other edge devices, as spanning tree Note network ports, those ports will automatically move into the blocking state.
About STP Extensions Understanding BPDU Filtering When enabled globally, BPDU Guard applies to all operational spanning tree edge interfaces. Note Understanding BPDU Filtering You can use BPDU Filtering to prevent the switch from sending or even receiving BPDUs on specified ports. When configured globally, BPDU Filtering applies to all operational spanning tree edge ports.
About STP Extensions Understanding Loop Guard Understanding Loop Guard Loop Guard protects networks from loops that are caused by the following: • Network interfaces that malfunction • Busy CPUs • Anything that prevents the normal forwarding of BPDUs An STP loop occurs when a blocking port in a redundant topology erroneously transitions to the forwarding state.
About STP Extensions Configuring STP Extensions Configuring STP Extensions STP Extensions Configuration Guidelines When configuring STP extensions, follow these guidelines: • Configure all access and trunk ports connected to hosts as edge ports. • Bridge Assurance runs only on point-to-point spanning tree network ports. You must configure each side of the link for this feature.
About STP Extensions Configuring Spanning Tree Edge Ports on Specified Interfaces Command or Action Purpose If you configure interfaces connected to hosts as network Note ports, those ports automatically move into the blocking state. This example shows how to configure all access and trunk ports connected to hosts as spanning tree edge ports: switch# configure terminal switch(config)# spanning-tree port type edge default...
About STP Extensions Configuring Spanning Tree Network Ports on Specified Interfaces Command or Action Purpose Step 2 switch(config)# interface type Specifies the interface to configure, and enters the interface slot/port configuration mode. Step 3 switch(config-if)# spanning-tree Configures the specified access interfaces to be spanning edge ports.
About STP Extensions Enabling BPDU Guard Globally Command or Action Purpose Step 3 switch(config-if)# spanning-tree Configures the specified interfaces to be spanning network port type network ports. If you enable Bridge Assurance, it automatically runs on network ports. By default, spanning tree ports are normal port types.
About STP Extensions Enabling BPDU Filtering Globally • no spanning-tree bpduguard—Enables BPDU Guard on the interface if it is an operational edge port and if the spanning-tree port type edge bpduguard default command is configured. Before You Begin Ensure that STP is configured. Procedure Command or Action Purpose...
About STP Extensions Enabling BPDU Filtering on Specified Interfaces Ensure that you have configured some spanning tree edge ports. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# spanning-tree port type Enables BPDU Filtering by default on all edge bpdufilter default operational spanning tree edge ports.
About STP Extensions Enabling Loop Guard Globally Command or Action Purpose Step 2 switch(config)# interface type Specifies the interface to configure, and enters the slot/port interface configuration mode. Step 3 switch(config-if)# spanning-tree Enables or disables BPDU Filtering for the specified bpdufilter {enable | disable} spanning tree edge interface.
About STP Extensions Enabling Loop Guard or Root Guard on Specified Interfaces Enabling Loop Guard or Root Guard on Specified Interfaces You can enable either Loop Guard or Root Guard on specified interfaces. Enabling Root Guard on a port means that port cannot become a root port, and LoopGuard prevents alternate or root ports from becoming the designated port because of a failure that could lead to a unidirectional link.
C H A P T E R Configuring the MAC Address Table All Ethernet interfaces on Cisco Nexus 5000 Series switches maintain media access control (MAC) address tables. This chapter describes the configuration of the MAC address tables. It includes the following sections: •...
Configuring MAC Addresses Configuring the Aging Time for the MAC Table You can also configure a static MAC address in interface configuration mode or VLAN configuration Note mode. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config-)# mac-address-table static Specifies a static address to add to the MAC...
Verifying the MAC Address Configuration Clearing Dynamic Addresses from the MAC Table This example shows how to set the aging time for entries in the MAC address table to 600 seconds (10 minutes): switch# configure terminal switch(config)# mac-address-table aging-time 600 Clearing Dynamic Addresses from the MAC Table You can clear all dynamic entries in the MAC address table.
Page 260
Verifying the MAC Address Configuration Clearing Dynamic Addresses from the MAC Table Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring IGMP Snooping Internet Group Management Protocol (IGMP) snooping streamlines multicast traffic handling for VLANs. By examining (snooping) IGMP membership report messages from interested hosts, multicast traffic is limited to the subset of VLAN interfaces on which the hosts reside. This chapter describes the configuration of IGMP snooping on Cisco Nexus 5000 Series switches.
Information About IGMP Snooping IGMPv1 and IGMPv2 The following figure shows an IGMP snooping switch that is located between the host and the IGMP router. The IGMP snooping switch snoops the IGMP membership reports and leave messages and forwards them only when necessary to the connected IGMP routers.
Information About IGMP Snooping IGMPv3 IGMPv3 The IGMPv3 snooping implementation on the switch forwards IGMPv3 reports to allow the upstream multicast router do source-based filtering. By default, the software tracks hosts on each VLAN port. The explicit tracking feature provides a fast leave mechanism.
Configuring IGMP Snooping Parameters IGMP Forwarding Configuring IGMP Snooping Parameters To manage the operation of the IGMP snooping process, you can configure the optional IGMP snooping parameters described in the following table. Table 19: IGMP Snooping Parameters Parameter Description IGMP snooping Enables IGMP snooping on a per-VLAN basis.
Page 265
Configuring IGMP Snooping Parameters IGMP Forwarding Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# ip igmp snooping Globally enables IGMP snooping. The default is enabled. If the global setting is disabled, then all VLANs Note are treated as disabled, whether they are enabled or not.
C H A P T E R Configuring Traffic Storm Control This chapter describes how to configure traffic storm control on Cisco Nexus 5000 Series switches. It contains the following sections: • Information About Traffic Storm Control, page 221 • Traffic Storm Guidelines and Limitations, page 222 •...
Traffic Storm Guidelines and Limitations The following figure shows the broadcast traffic patterns on an Ethernet interface during a specified time interval. In this example, traffic storm control occurs between times T1 and T2 and between T4 and T5. During those intervals, the amount of broadcast traffic exceeded the configured threshold.
Configuring Traffic Storm Control Verifying Traffic Storm Control Configuration • Specify the level as a percentage of the total interface bandwidth: ◦ The level can be from 0 to 100. ◦ The optional fraction of a level can be from 0 to 99. ◦...
Traffic Storm Control Example Configuration Verifying Traffic Storm Control Configuration Command Purpose switch# show running-config interface Displays the traffic storm control configuration. Traffic Storm Control Example Configuration The following example shows how to configure traffic storm control: switch# configure terminal switch(config)# interface ethernet 1/4 switch(config-if)# storm-control broadcast level 40 switch(config-if)# storm-control multicast level 40...
P A R T Switch Security Features • Configuring Authentication, Authorization, and Accounting, page 227 • Configuring RADIUS, page 241 • Configuring TACACS+, page 255 • Configuring SSH and Telnet, page 269 • Configuring Access Control Lists, page 279...
C H A P T E R Configuring Authentication, Authorization, and Accounting This chapter describes how to configure authentication, authorization, and accounting (AAA) on Cisco Nexus 5000 Series switches. It contains the following sections: • Information About AAA, page 227 •...
Information About AAA Benefits of Using AAA • Authentication—Identifies users, including login and password dialog, challenge and response, messaging support, and, encryption depending on the security protocol that you select. Authentication is the process of verifying the identity of the person or device accessing the Cisco Nexus 5000 Series switches.
Information About AAA AAA Server Groups AAA Server Groups You can specify remote AAA servers for authentication, authorization, and accounting using server groups. A server group is a set of remote AAA servers that implement the same AAA protocol. The purpose of a server group is to provide for failover servers in case a remote AAA server fails to respond.
Information About AAA Authentication and Authorization Process for User Login Table 22: AAA Authentication Methods for AAA Services AAA Service AAA Methods Console login authentication Server groups, local, and none User login authentication Server groups, local, and none User management session accounting Server groups and local For console login authentication, user login authentication, and user management session accounting, the Note...
Prerequisites for Remote AAA Authentication and Authorization Process for User Login • If your username and password are successfully authenticated locally, the Cisco Nexus 5000 Series switch logs you in and assigns you the roles configured in the local database. Figure 33: Authorization and Authentication Flow for User Login Note "No more server groups left"...
Information about AAA Guidelines and Limitations Configuring Console Login Authentication Methods • The preshared secret key is configured on the Cisco Nexus 5000 Series switch and on the remote AAA servers. • The remote server responds to AAA requests from the Cisco Nexus 5000 Series switch. Related Topics •...
Configuring AAA Configuring Default Login Authentication Methods Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# aaa Configures login authentication methods for the console. authentication login console The group-list argument consists of a space-delimited list of {group group-list [none] | local group names.
Configuring AAA Enabling MSCHAP Authentication Command or Action Purpose Step 5 switch# copy running-config (Optional) startup-config Copies the running configuration to the startup configuration. Enabling MSCHAP Authentication Microsoft Challenge Handshake Authentication Protocol (MSCHAP) is the Microsoft version of CHAP. You can use MSCHAP for user logins to a Cisco Nexus 5000 Series switch through a remote authentication server (RADIUS or TACACS+).
Configuring AAA Using AAA Server VSAs Command or Action Purpose • named-group —Uses a named subset of TACACS+ or RADIUS servers for accounting. The local method uses the local database for accounting. The default method is local , which is used when no server groups are configured or when all the configured server group do not respond.
Displaying and Clearing the Local AAA Accounting Log Specifying Switch User Roles and SMNPv3 Parameters on AAA Servers • accountinginfo—Stores additional accounting information in addition to the attributes covered by a standard RADIUS accounting protocol. This attribute is sent only in the VSA portion of the Account-Request frames from the RADIUS client on the switch, and it can only be used with the accounting protocol-related PDUs.
Example AAA Configuration Specifying Switch User Roles and SMNPv3 Parameters on AAA Servers Procedure Command or Action Purpose Step 1 show aaa accounting Displays AAA accounting configuration. Step 2 show aaa authentication [login Displays AAA authentication information. {error-enable | mschap}] Step 3 show aaa groups Displays the AAA server group configuration.
Page 286
Default AAA Settings Specifying Switch User Roles and SMNPv3 Parameters on AAA Servers Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring RADIUS This chapter contains the following sections: • Configuring RADIUS, page 241 Configuring RADIUS Information About RADIUS The Remote Access Dial-In User Service (RADIUS) distributed client/server system allows you to secure networks against unauthorized access. In the Cisco implementation, RADIUS clients run on Cisco Nexus 5000 Series switches and send authentication and accounting requests to a central RADIUS server that contains all user authentication and network service access information.
Configuring RADIUS RADIUS Operation • Networks that support authentication profiles. Using the RADIUS server in your network, you can configure AAA authentication and set up per-user profiles. Per-user profiles enable the Nexus 5000 Series switch to better manage ports using their existing RADIUS solutions and to efficiently manage shared resources to offer different service-level agreements.
Configuring RADIUS Vendor-Specific Attributes a RADIUS server changes to the dead or alive state, a Simple Network Management Protocol (SNMP) trap is generated and the Cisco Nexus 5000 Series switch displays an error message that a failure is taking place. Figure 34: RADIUS Server States The monitoring interval for alive servers and dead servers are different and can be configured by the user.
Configuring RADIUS Prerequisites for RADIUS • roles—Lists all the roles to which the user belongs. The value field is a string that lists the role names delimited by white space. • accountinginfo—Stores accounting information in addition to the attributes covered by a standard RADIUS accounting protocol.
Configuring RADIUS Configuring RADIUS Server Hosts Configuring RADIUS Server Hosts You must configure the IPv4 or IPv6 address or the host name for each RADIUS server that you want to use for authentication. All RADIUS server hosts are added to the default RADIUS server group. You can configure up to 64 RADIUS servers.
Configuring RADIUS Configuring RADIUS Server Preshared Keys Command or Action Purpose Step 4 switch# show radius-server (Optional) Displays the RADIUS server configuration. The preshared keys are saved in encrypted form in Note the running configuration. Use the show running-config command to display the encrypted preshared keys.
Configuring RADIUS Configuring RADIUS Server Groups The following example shows how to configure a preshared keys for a RADIUS server: switch# configure terminal switch(config)# radius-server host 10.10.1.1 key 0 PlIjUhYg switch(config)# exit switch# show radius-server switch# copy running-config startup-config Configuring RADIUS Server Groups You can specify one or more remote AAA servers for authentication using server groups.
Configuring RADIUS Allowing Users to Specify a RADIUS Server at Login The following example shows how to configure a RADIUS server group: switch# configure terminal switch(config)# aaa group server radius RadServer switch(config-radius)# server 10.10.1.1 switch(config-radius)# deadtime 30 switch(config-radius)# use-vrf management switch(config-radius)# exit switch(config)# show radius-server group switch(config)# copy running-config startup-config...
Configuring RADIUS Configuring the RADIUS Transmission Retry Count and Timeout Interval for a Server Command or Action Purpose Step 3 switch(config)# radius-server timeout Specifies the transmission timeout interval for seconds RADIUS servers. The default timeout interval is 5 seconds and the range is from 1 to 60 seconds. Step 4 switch(config)# exit Exits configuration mode.
Configuring RADIUS Configuring Accounting and Authentication Attributes for RADIUS Servers The following example shows how to configure RADIUS transmission retry count and timeout interval for a server: switch# configure terminal switch(config)# radius-server host server1 retransmit 3 switch(config)# radius-server host server1 timeout 10 switch(config)# exit switch# show radius-server switch# copy running-config startup-config...
Configuring RADIUS Configuring Periodic RADIUS Server Monitoring The following example shows how to configure the accounting and authentication attributes for a RADIUS server: switch# configure terminal switch(config)# radius-server host 10.10.1.1 acct-port 2004 switch(config)# radius-server host 10.10.1.1 accounting switch(config)# radius-server host 10.10.2.2 auth-port 2005 switch(config)# radius-server host 10.10.2.2 authentication switch(config)# exit switch# show radius-server...
Configuring RADIUS Verifying RADIUS Configuration Procedure Command or Action Purpose Step 1 switch# test aaa server radius {ipv4-address | Sends a test message to a RADIUS server to confirm availability. ipv6-address | server-name} [vrf vrf-name] username password Step 2 switch# test aaa group group-name username Sends a test message to a RADIUS server password group to confirm availability.
Configuring RADIUS Example RADIUS Configuration Example RADIUS Configuration The following example shows how to configure RADIUS: switch# configure terminal switch(config)# radius-server key 7 "ToIkLhPpG" switch(config)# radius-server host 10.10.1.1 key 7 "ShMoMhTl" authentication accounting switch(config)# aaa group server radius RadServer switch(config-radius)# server 10.10.1.1 switch(config-radius)# exit switch(config-radius)# use-vrf management Default RADIUS Settings...
C H A P T E R Configuring TACACS+ This chapter contains the following sections: • About Configuring TACACS+, page 255 About Configuring TACACS+ Information About TACACS+ The Terminal Access Controller Access Control System Plus (TACACS+) security protocol provides centralized validation of users attempting to gain access to a Cisco Nexus 5000 Series switch.
About Configuring TACACS+ User Login with TACACS+ User Login with TACACS+ When a user attempts a Password Authentication Protocol (PAP) login to a Cisco Nexus 5000 Series switch using TACACS+, the following actions occur: 1 When the Cisco Nexus 5000 Series switch establishes a connection, it contacts the TACACS+ daemon to obtain the username and password.
About Configuring TACACS+ TACACS+ Server Monitoring TACACS+ Server Monitoring An unresponsive TACACS+ server can delay the processing of AAA requests. A Cisco Nexus 5000 Series switch can periodically monitor an TACACS+ server to check whether it is responding (or alive) to save time in processing AAA requests.
About Configuring TACACS+ Configuring TACACS+ • You can configure a maximum of 64 TACACS+ servers on the Cisco Nexus 5000 Series switch. Configuring TACACS+ TACACS+ Server Configuration Process To configure TACACS+ servers, perform this task: Procedure Step 1 Enable TACACS+. Step 2 Establish the TACACS+ server connections to the Cisco Nexus 5000 Series switch.
About Configuring TACACS+ Configuring TACACS+ Server Hosts Configuring TACACS+ Server Hosts To access a remote TACACS+ server, you must configure the IPv4 or IPv6 address or the hostname for the TACACS+ server on the Cisco Nexus 5000 Series switch. All TACACS+ server hosts are added to the default TACACS+ server group.You can configure up to 64 TACACS+ servers.
About Configuring TACACS+ Configuring TACACS+ Server Preshared Keys Command or Action Purpose Step 2 switch(config)# tacacs-server key Specifies a preshared key for all TACACS+ servers. You [0 | 7] key-value can specify a clear text ( 0 ) or encrypted ( 7 ) preshared key.
About Configuring TACACS+ Configuring TACACS+ Server Groups Command or Action Purpose The preshared keys are saved in encrypted form Note in the running configuration. Use the show running-config command to display the encrypted preshared keys. Step 5 switch# copy running-config (Optional) Copies the running configuration to the startup startup-config...
About Configuring TACACS+ Specifying a TACACS+ Server at Login Command or Action Purpose Step 6 switch(config)# show tacacs-server (Optional) groups Displays the TACACS+ server group configuration. Step 7 switch(config)# copy running-config (Optional) Copies the running configuration to the startup startup-config configuration.
About Configuring TACACS+ Configuring the Timeout Interval for a Server To specify a TACACS+ global timeout interval, perform this task: Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# tacacs-server timeout Specifies the timeout interval for TACACS+ servers. seconds The default timeout interval is 5 second and the range is from 1 to 60 seconds.
About Configuring TACACS+ Configuring Periodic TACACS+ Server Monitoring To configure TCP ports, perform this task: Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# tacacs-server host Specifies the UDP port to use for TACACS+ {ipv4-address | ipv6-address | host-name} accounting messages.The default TCP port is 49.
About Configuring TACACS+ Configuring the Dead-Time Interval Command or Action Purpose Step 2 switch(config)# tacacs-server host Specifies parameters for server monitoring. The default {ipv4-address | ipv6-address | username is test and the default password is test. The host-name} test {idle-time minutes | default value for the idle timer is 0 minutes and the password password [idle-time minutes] valid range is 0 to 1440 minutes.
About Configuring TACACS+ Manually Monitoring TACACS+ Servers or Groups Command or Action Purpose Step 3 switch(config)# exit Exits configuration mode. Step 4 switch# show tacacs-server (Optional) Displays the TACACS+ server configuration. Step 5 switch# copy running-config (Optional) Copies the running configuration to the startup startup-config configuration.
About Configuring TACACS+ Displaying TACACS+ Statistics Displaying TACACS+ Statistics To display the statistics the Cisco Nexus 5000 Series switch maintains for TACACS+ activity, perform this task: Procedure Command or Action Purpose Step 1 switch# show tacacs-server statistics {hostname | Displays the TACACS+ statistics. ipv4-address | ipv6-address} For detailed information about the fields in the output from this command, see the Cisco Nexus 5000 Series Command Reference.
Page 314
About Configuring TACACS+ Default TACACS+ Settings Table 26: Default TACACS+ Parameters Parameters Default TACACS+ Disabled Dead timer interval 0 minutes Timeout interval 5 seconds Idle timer interval 0 minutes Periodic server monitoring username test Periodic server monitoring password test Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring SSH and Telnet This chapter contains the following sections: • Configuring SSH and Telnet, page 269 Configuring SSH and Telnet Information About SSH and Telnet SSH Server The Secure Shell Protocol (SSH) server feature enables a SSH client to make a secure, encrypted connection to a Cisco Nexus 5000 Series switch.
Configuring SSH and Telnet Telnet Server Be sure to have an SSH server key-pair with the appropriate version before enabling the SSH service. You can generate the SSH server key-pair according to the SSH client version used. The SSH service accepts three types of key-pairs for use by SSH version 2: •...
Configuring SSH and Telnet Specifying the SSH Public Keys for User Accounts Command or Action Purpose Step 3 switch(config)# exit Exits global configuration mode. Step 4 switch# show ssh key (Optional) Displays the SSH server keys. Step 5 switch# copy running-config (Optional) Copies the running configuration to the startup startup-config...
Configuring SSH and Telnet Specifying the SSH Public Keys in IETF SECSH Format The following example shows how to specify an SSH public keys in open SSH format: switch# configure terminal switch(config)# username User1 sshkey ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEAri3mQy4W1AV9Y2t2hrEWgbUEYz CfTPO5B8LRkedn56BEy2N9ZcdpqE6aqJLZwfZcTFEzaAAZp9AS86dgBAjsKGs7UxnhGySr8ZELv+DQBsDQH6rZt0KR+2Da8hJD4Z XIeccWk0gS1DQUNZ300xstQsYZUtqnx1bvm5Ninn0McNinn0Mc= switch(config)# exit switch# show user-account switch# copy running-config startup-config The username command example above is a single line that has been broken for legibility.
Configuring SSH and Telnet Starting SSH Sessions to Remote Devices Procedure Command or Action Purpose Step 1 switch# copy server-file bootflash: Downloads the file containing the SSH key in PEM-formatted Public Key Certificate form from a filename server. The server can be FTP, SCP, SFTP, or TFTP Step 2 switch# configure terminal Enters configuration mode.
Configuring SSH and Telnet Deleting SSH Server Keys To disable the SSH server to prevent SSH access to the switch, perform this task: Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# no feature ssh Disables the SSH server.
Configuring SSH and Telnet SSH Example Configuration Procedure Command or Action Purpose Step 1 switch# show users Displays user session information. Step 2 switch# clear line vty-line Clears a user SSH session. SSH Example Configuration The following example shows how to configure SSH: Procedure Step 1 Generate an SSH server key.
Configuring SSH and Telnet Configuring Telnet Configuring Telnet Enabling the Telnet Server By default, the Telnet server is enabled. You can disable the Telnet server on your Cisco Nexus 5000 Series switch. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode.
Configuring SSH and Telnet Clearing Telnet Sessions The following example shows starting a Telnet session to connect to a remote device: switch# telnet 10.10.1.1 Trying 10.10.1.1... Connected to 10.10.1.1. Escape character is '^]'. switch login: Clearing Telnet Sessions To clear Telnet sessions from the Cisco Nexus 5000 Series switch, perform this task: Procedure Command or Action Purpose...
Page 324
Configuring SSH and Telnet Default SSH Settings Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring Access Control Lists This chapter contains the following sections: • Information About ACLs, page 279 • Configuring IP ACLs, page 283 • Configuring MAC ACLs, page 287 • Example Configuration for MAC ACLs, page 291 •...
Information About ACLs Application Order Table 28: Security ACL Applications Application Supported Interfaces Types of ACLs Supported Port ACL An ACL is considered a port ACL IPv4 ACLs when you apply it to one of the IPv6 ACLs following: MAC ACLs •...
Information About ACLs Additional Filtering Options All IPv4 ACLs include the following implicit rule: deny ip any any This implicit rule ensures that the switch denies unmatched IP traffic. Additional Filtering Options You can identify traffic by using additional options. IPv4 ACLs support the following additional filtering options: •...
Information About ACLs Logical Operators and Logical Operation Units • Adding new rules between existing rules—By specifying the sequence number, you specify where in the ACL a new rule should be positioned. For example, if you need to insert a rule between rules numbered 100 and 110, you could assign a sequence number of 105 to the new rule.
Configuring IP ACLs Creating an IP ACL Configuring IP ACLs Creating an IP ACL You can create an IPv4 or IPv6 ACL on the switch and add rules to it. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode.
Configuring IP ACLs Removing an IP ACL Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# {ip | ipv6} Enters IP ACL configuration mode for the ACL that you specify by name. access-list name Step 3 switch(config-acl)# Creates a rule in the IP ACL.
Configuring IP ACLs Changing Sequence Numbers in an IP ACL Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# no {ip | ipv6} access-list Removes the IP ACL that you specified by name from the running configuration.
Configuring IP ACLs Verifying IP ACL Configurations Some configuration parameters when applied to an EtherChannel are not reflected on the configuration Note of the member ports. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# interface {ethernet Enters interface configuration mode for the [chassis/]slot/port | port-channel...
Configuring MAC ACLs Creating a MAC ACL The mac access-list is applicable to non-IPv4 and non-IPv6 traffic only. Note Procedure Command or Action Purpose Step 1 switch# show {ip | ipv6} access-lists Displays IP ACL configuration. If the IP ACL includes name the statistics command, then the show ip access-lists and show ipv6 access-list command output includes the...
Configuring MAC ACLs Changing a MAC ACL The following example shows how to create a MAC ACL and add rules to it: switch# configure terminal switch(config)# mac access-list acl-mac-01 switch(config-mac-acl)# permit 00c0.4f00.0000 0000.00ff.ffff any switch(config-mac-acl)# statistics Changing a MAC ACL In an existing MAC ACL, you can add and remove rules.
Configuring MAC ACLs Removing a MAC ACL The following example shows how to change a MAC ACL: switch# configure terminal switch(config)# mac access-list acl-mac-01 switch(config-mac-acl)# 100 permit mac 00c0.4f00.00 0000.00ff.ffff any switch(config-mac-acl)# statistics Removing a MAC ACL You can remove a MAC ACL from the switch. Be sure that you know whether the ACL is applied to an interface.
Configuring MAC ACLs Applying a MAC ACL as a Port ACL Command or Action Purpose Step 4 switch# copy running-config (Optional) startup-config Copies the running configuration to the startup configuration. Related Topics • Rules, page 280 Applying a MAC ACL as a Port ACL You can apply a MAC ACL as a port ACL to any of the following interface types: •...
Example Configuration for MAC ACLs Displaying and Clearing MAC ACL Statistics Procedure Command or Action Purpose Step 1 switch# show mac access-lists Displays the MAC ACL configuration Step 2 switch# show running-config Displays ACL configuration, including MAC ACLs and the interfaces that ACLs are applied to. Step 3 switch# show running-config Displays the configuration of the interface to which...
Configuring VACLs VACLs and Actions VACLs and Actions In access map configuration mode, you use the action command to specify one of the following actions: • Forward—Sends the traffic to the destination determined by normal operation of the switch. • Drop—Drops the traffic. Statistics The switch can maintain global statistics for each rule in a VACL.
Configuring VACLs Removing a VACL Command or Action Purpose The no option stops the switch from maintaining global statistics for the VACL. Step 7 switch(config-access-map)# show (Optional) Displays ACL configuration. running-config Step 8 switch(config-access-map)# copy (Optional) running-config startup-config Copies the running configuration to the startup configuration.
Configuring VACLs Verifying VACL Configuration Command or Action Purpose Step 3 switch(config)# show running-config (Optional) Displays ACL configuration. Step 4 switch(config)# copy running-config (Optional) Copies the running configuration to the startup startup-config configuration. Verifying VACL Configuration To display VACL configuration information, perform one of the following tasks: Procedure Command or Action Purpose...
Example Configuration for VACL Displaying and Clearing VACL Statistics Example Configuration for VACL This example shows how to configure a VACL to forward traffic permitted by an IP ACL named acl-ip-01 and how to apply the VACL to VLANs 50 through 82: switch# configure terminal switch(config)# vlan access-map acl-ip-map switch(config-access-map)# match ip address acl-ip-01...
Page 342
Default ACL Settings Displaying and Clearing VACL Statistics Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
P A R T System Management • Using Cisco Fabric Services, page 299 • Configuring User Accounts and RBAC, page 315 • Configuring Session Manager, page 325 • Configuring Online Diagnostics, page 329 • Configuring System Message Logging, page 335 •...
C H A P T E R Using Cisco Fabric Services This chapter contains the following sections: • Using Cisco Fabric Services, page 299 Using Cisco Fabric Services Cisco Nexus 5000 Series switches provide Cisco Fabric Services (CFS) capability, which simplifies provisioning by automatically distributing configuration information to all switches in the network.
Using Cisco Fabric Services CFS Distribution ◦ Unrestricted uncoordinated distributions: Multiple parallel distributions are allowed in the network in the presence of an existing coordinated distribution. Unrestricted uncoordinated distributions are allowed to run in parallel with all other types of distributions. The following features are supported for CFS distribution over IP: •...
Using Cisco Fabric Services Unrestricted Uncoordinated Distributions Coordinated distribution has two variants: • CFS driven —The stages are executed by CFS in response to an feature request without intervention from the feature. • Feature driven—The stages are under the complete control of the feature. Coordinated distributions are used to distribute information that can be manipulated and distributed from multiple switches, for example, the port security configuration.
Page 348
Using Cisco Fabric Services CFS Distribution over IP The switch attempts to distribute information over Fibre Channel first and then over the IP network if the Note first attempt over Fibre Channel fails. CFS does not send duplicate messages if distribution over both IP and Fibre Channel is enabled.
Using Cisco Fabric Services CFS Distribution over Fibre Channel The following figure (Network Example 3) is the same as the previous figure except that node D and node E are connected using IP. Both node C and node D forward the event to E because the node E is not in the distribution list from node B.
Using Cisco Fabric Services CFS Support for Applications CFS supports a protocol that reduces the number of merges required to one by handling the complexity of the merge at the CFS layer. This protocol runs per application per scope. The protocol involves selecting one switch in a fabric as the merge manager for that fabric.
Using Cisco Fabric Services Locking the Network The show cfs application command only displays applications registered with CFS. Conditional services Note that use CFS do not appear in the output unless these services are running. switch# show cfs application ---------------------------------------------- Application Enabled Scope...
Using Cisco Fabric Services Committing Changes Application: port-security Scope : Logical ----------------------------------------------------------- VSAN Domain IP Address User Name User Type ----------------------------------------------------------- 10.76.100.167 admin CLI/SNMP v3 10.76.100.167 admin CLI/SNMP v3 Total number of entries = 2 The show cfs lock name command displays the lock details for the specified application: switch# show cfs lock name ntp Scope : Physical...
Using Cisco Fabric Services Clearing a Locked Session Clearing a Locked Session You can clear locks held by an application from any switch in the network to recover from situations where locks are acquired and not released. This function requires Admin permissions. Exercise caution when using this function to clear locks in the network.
Using Cisco Fabric Services Assigning Applications to CFS Regions Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# cfs region region-id Creates a region. Assigning Applications to CFS Regions You can assign an application on a switch to a region. Procedure Command or Action Purpose...
Using Cisco Fabric Services Removing an Application from a Region The following example shows how to move an application into Region 2 that was originally assigned to Region 1: switch# configure terminal switch(config)# cfs region 2 switch(config-cfs-region)# ntp Removing an Application from a Region Removing an application from a region is the same as moving the application back to the default region (Region 0).
Using Cisco Fabric Services Enabling CFS over IPv6 Procedure Command or Action Purpose Step 1 switch# configure Enters configuration mode. Step 2 switch(config)# cfs ipv4 distribute Globally enables CFS over IPv6 for all applications on the switch. Step 3 switch(config)# no cfs ipv4 distribute (Optional) Disables (default) CFS over IPv6 on the switch.
Using Cisco Fabric Services Configuring IPv4 Multicast Address for CFS Configuring IPv4 Multicast Address for CFS You can configure a CFS over IP multicast address value for IPv4. The default IPv4 multicast address is 239.255.70.83. Procedure Command or Action Purpose Step 1 switch# configure Enters configuration mode.
Using Cisco Fabric Services Displaying CFS Distribution Information Displaying CFS Distribution Information The show cfs merge status name command displays the merge status for a given application. The following example displays the output for an application distributing in logical scope. It shows the merge status in all valid VSANs on the switch.
Page 359
Using Cisco Fabric Services Displaying CFS Distribution Information Physical Fabric ------------------------------------------------- Switch WWN IP Address ------------------------------------------------- 20:00:00:05:30:00:6b:9e 10.76.100.167 [Local] 20:00:00:0e:d7:00:3c:9e 10.76.100.169 Total number of entries = 2 The show cfs peers name command displays all the peers for which a particular application is registered with CFS.
Using Cisco Fabric Services Default CFS Settings Default CFS Settings The following table lists the default settings for CFS configurations. Table 32: Default CFS Parameters Parameters Default CFS distribution on the switch Enabled. Database changes Implicitly enabled with the first configuration change. Application distribution Differs based on application.
C H A P T E R Configuring User Accounts and RBAC This chapter contains the following sections: • Configuring User Accounts and RBAC, page 315 Configuring User Accounts and RBAC This section describes how to configure user accounts and role-based access control (RBAC) on the Cisco Nexus 5000 Series switch.
Configuring User Accounts and RBAC Characteristics of Strong Passwords Characteristics of Strong Passwords A strong password has the following characteristics: • At least eight characters long • Does not contain many consecutive characters (such as "abcd") • Does not contain many repeating characters (such as "aaabbb") •...
Configuring User Accounts and RBAC About Rules If you belong to multiple roles, you can execute a combination of all the commands permitted by these Note roles. Access to a command takes priority over being denied access to a command. For example, suppose a user has RoleA, which denied access to the configuration commands.
Configuring User Accounts and RBAC Configuring User Accounts • You can assign a maximum of 64 user roles to a user account. Note A user account must have at least one user role. Configuring User Accounts You can create a maximum of 256 user accounts on a Cisco Nexus 5000 Series switch. User accounts have the following attributes: •...
Configuring User Accounts and RBAC Configuring RBAC The following example shows how to configure a user account: switch# configure terminal switch(config)# username NewUser password 4Ty18Rnt switch(config)# exit switch# show user-account Configuring RBAC Creating User Roles and Rules Each user role can have up to 256 rules. You can assign a user role to more that one user account. The rule number you specify determines the order in which the rules are applied.
Configuring User Accounts and RBAC Creating Feature Groups Command or Action Purpose Step 8 switch# show role (Optional) Displays the user role configuration. Step 9 switch# copy running-config (Optional) Copies the running configuration to the startup startup-config configuration. The following example shows how to create user roles and specify rules: switch# configure terminal switch(config)# role name UserA switch(config-role)# rule deny command clear users...
Configuring User Accounts and RBAC Changing User Role VLAN Policies Command or Action Purpose Step 2 switch(config)# role name role-name Specifies a user role and enters role configuration mode. Step 3 switch(config-role)# interface policy Enters role interface policy configuration mode. deny Step 4 switch(config-role-interface)# permit...
Configuring User Accounts and RBAC Changing User Role VSAN Policies Command or Action Purpose Repeat this command for as many VLANs as needed. Step 5 switch# show role (Optional) Displays the role configuration. Step 6 switch# copy running-config (Optional) Copies the running configuration to the startup startup-config configuration.
Configuring User Accounts and RBAC Default User Account and RBAC Settings Command Purpose switch# show startup-config security Displays the user account configuration in the startup configuration. switch# show running-config security [all] Displays the user account configuration in the running configuration. The all keyword displays the default values for the user accounts.
Page 370
Configuring User Accounts and RBAC Default User Account and RBAC Settings Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring Session Manager This chapter contains the following sections: • Configuring Session Manager, page 325 Configuring Session Manager This section describes how to configure the Session Manager features in Cisco NX-OS. Information About Session Manager Session Manager allows you to implement your configuration changes in batch mode.
Configuring Session Manager Configuring Session Manager • You can configure a maximum of 20,000 commands across all sessions. Configuring Session Manager Creating a Session You can create up to 32 configuration sessions. To create a configuration session, perform this task: Procedure Command or Action Purpose...
Configuring Session Manager Verifying a Session Verifying a Session To verify a session, use the following command in session mode: Command Purpose switch(config-s)# verify [verbose] Verifies the commands in the configuration session. Committing a Session To commit a session, use the following command in session mode: Command Purpose switch(config-s)# commit [verbose]...
Page 374
Configuring Session Manager Verifying Session Manager Configuration Command Purpose switch# show configuration session [name] Displays the contents of the configuration session. switch# show configuration session status [name] Displays the status of the configuration session. switch# show configuration session summary Displays a summary of all the configuration sessions. Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring Online Diagnostics This chapter describes how to configure the generic online diagnostics (GOLD) feature. It contains the following sections: • Information About Online Diagnostics, page 329 • Configuring Online Diagnostics, page 332 •...
Information About Online Diagnostics Health Monitoring Diagnostics Diagnostic Description NVRAM Verifies the integrity of the NVRAM. In band port Tests connectivity of the inband port to the supervisor. Management port Tests the management port. Memory Verifies the integrity of the DRAM. Bootup diagnostics also include a set of tests that are common with health monitoring diagnostics.
Information About Online Diagnostics Expansion Module Diagnostics Diagnostic Description Forwarding engine Tests the forwarding engine ASICs. Forwarding engine port Tests the ports on the forwarding engine ASICs. Front port Tests the components (such as PHY and MAC) on the front ports. Expansion Module Diagnostics During switch bootup or reset, the bootup diagnostics include tests for the in-service expansion modules in the switch.
Configuring Online Diagnostics Expansion Module Diagnostics Configuring Online Diagnostics You can configure the bootup diagnostics to run the complete set of tests, or you can bypass all bootup diagnostic tests for a faster module boot up time. Note We recommend that you set the bootup online diagnostics level to complete. We do not recommend bypassing the bootup online diagnostics.
C H A P T E R Configuring System Message Logging This chapter describes how to configure system message logging on the Cisco Nexus 5000 Series switch and contains the following sections: • Information About System Message Logging, page 335 •...
Configuring System Message Logging syslog Servers Level Description 5 – notification Normal but significant condition 6 – informational Informational message only 7 – debugging Appears during debugging only The switch logs the most recent 100 messages of severity 0, 1, or 2 to the NVRAM log. You cannot configure logging to the NVRAM.
Page 383
Configuring System Message Logging Configuring System Message Logging to Terminal Sessions Command or Action Purpose value indicates a higher severity level). Severity levels range from 0 to 7: • 0 – emergency • 1 – alert • 2 – critical •...
Configuring System Message Logging Configuring System Message Logging to a File Command or Action Purpose Step 9 switch# copy running-config (Optional) startup-config Copies the running configuration to the startup configuration. The following example shows how to configure a logging level of 3 for the console: switch# configure terminal switch(config)# logging console 3 The following example shows how to display the console logging configuration:...
Configuring System Message Logging Configuring Logging Timestamps Command or Action Purpose Step 6 switch# show logging module (Optional) Displays the module logging configuration. Step 7 switch# show logging level (Optional) [facility] Displays the logging level configuration and the system default level by facility.
Configuring System Message Logging Configuring syslog Servers Configuring syslog Servers You can configure up to three syslog servers that reference remote systems where you want to log system messages. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# logging server host Configures a syslog server at the specified host name or...
Configuring System Message Logging Configuring syslog on a UNIX or Linux System Configuring syslog on a UNIX or Linux System You can configure a syslog server on a UNIX or Linux system by adding the following line to the /etc/syslog.conf file: facility.level <five tab characters>...
Page 390
Configuring System Message Logging Configuring syslog Server Configuration Distribution After you enable syslog server configuration distribution, you can modify the syslog server configuration and view the pending changes before committing the configuration for distribution. As long as distribution is enabled, the switch maintains pending changes to the syslog server configuration. If the switch is restarted, the syslog server configuration changes that are kept in volatile memory may be Note lost.
Verifying System Message Logging Configuration Displaying and Clearing Log Files Related Topics • Information About CFS, page 299 Displaying and Clearing Log Files You can display or clear messages in the log file and the NVRAM. Procedure Command or Action Purpose Step 1 switch# show logging last...
C H A P T E R Configuring Smart Call Home This chapter contains the following sections: • Configuring Smart Call Home, page 349 Configuring Smart Call Home Information About Call Home Call Home provides e-mail-based notification of critical system events. Cisco Nexus 5000 Series switches provide a range of message formats for optimal compatibility with pager services, standard e-mail, or XML-based automated parsing applications.
Configuring Smart Call Home Destination Profiles • Multiple concurrent message destinations. You can configure up to 50 e-mail destination addresses for each destination profile. Destination Profiles A destination profile includes the following information: • One or more alert groups—The group of alerts that trigger a specific Call Home message if the alert occurs.
Page 397
Configuring Smart Call Home Call Home Alert Groups Alert Group Description Executed Commands show tech-support platform callhome Supervisor hardware Events related to supervisor show diagnostic result module all modules. detail show moduleshow version show tech-support platform callhome Linecard hardware Events related to standard or show diagnostic result module all intelligent switching modules.
Configuring Smart Call Home Call Home Message Levels You can add show commands only to full text and XML destination profiles. Short text destination profiles do not support additional show commands because they only allow 128 bytes of text. Related Topics •...
Configuring Smart Call Home Obtaining Smart Call Home Call Home Level Keyword syslog Level Description Debugging Debug (7) Debugging messages. Obtaining Smart Call Home If you have a service contract directly with Cisco Systems, you can register your devices for the Smart Call Home service.
Configuring Smart Call Home Configuration Guidelines and Limitations Configuration Guidelines and Limitations Call Home has the following configuration guidelines and limitations: • If there is no IP connectivity or if the interface in the VRF to the profile destination is down, the switch cannot send the Call Home message.
Configuring Smart Call Home Creating a Destination Profile Command or Action Purpose Step 5 switch(config-callhome)# Configures the phone number in international phone phone-contact number format for the primary person responsible for the international-phone-number device. Up to 17 alphanumeric characters are accepted in international format.
Configuring Smart Call Home Modifying a Destination Profile Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode. Step 2 switch(config)# callhome Enters callhome configuration mode. Step 3 switch(config-callhome)# destination-profile Creates a new destination profile and sets the message format for the profile.
Configuring Smart Call Home Associating an Alert Group with a Destination Profile Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode. Step 2 switch(config)# callhome Enters callhome configuration mode. Step 3 switch(config-callhome)# Configures an e-mail address for a user-defined or destination-profile {name | predefined destination profile.
Configuring Smart Call Home Adding show Commands to an Alert Group Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode. Step 2 switch(config)# callhome Enters callhome configuration mode. Step 3 switch(config-callhome)# destination-profile Associates an alert group with this destination profile.
Configuring Smart Call Home Configuring E-Mail Command or Action Purpose Step 5 switch# copy running-config (Optional) startup-config Saves this configuration change. This example shows how to add the show ip routing command o the Cisco-TAC alert group: switch# configuration terminal switch(config)# callhome switch(config-callhome)# alert-group Configuration user-def-cmd "show ip routing"...
Configuring Smart Call Home Configuring Periodic Inventory Notification This example shows how to configure the e-mail options for Call Home messages: switch# configuration terminal switch(config)# callhome switch(config-callhome)# transport email smtp-server 192.0.2.10 use-vrf Red switch(config-callhome)# transport email from person@example.com switch(config-callhome)# transport email reply-to person@example.com Configuring Periodic Inventory Notification You can configure the switch to periodically send a message with an inventory of all software services currently enabled and running on the device along with hardware inventory information.
Configuring Smart Call Home Testing Call Home Communications Command Purpose switch(config-callhome)# enable Enables Call Home. Disabled by default. You can disable Call Home in the callhome configuration mode. Command Purpose switch(config-callhome)# no enable Disables Call Home. Disabled by default You can enable Call Home distribution using CFS in the callhome configuration mode. Command Purpose switch(config-callhome)# distribute...
Configuring Smart Call Home Verifying Call Home Configuration Verifying Call Home Configuration To display Call Home configuration information, perform one of the following tasks: Command Purpose switch# show callhome Displays the status for Call Home. switch# show callhome destination-profile name Displays one or more Call Home destination profiles.
Configuring Smart Call Home Additional References Parameters Default Destination message size for a message sent in short 4000 text format. SMTP server port number if no port is specified. Alert group association with profile. All for full-text-destination and short-text-destination profiles. The cisco-tac alert group for the CiscoTAC-1 destination profile.
Page 410
Configuring Smart Call Home Call Home Message Formats Table 47: Common Fields for All Full Text and XML Messages Data Item(Plain Text Description(Plain XML Tag (XML Only) and XML) Text and XML) Time stamp Date and time stamp /aml/header/time of event in ISO time notation: YYYY-MM-DD HH:MM:SS...
Page 411
Configuring Smart Call Home Call Home Message Formats Data Item(Plain Text Description(Plain XML Tag (XML Only) and XML) Text and XML) • @ is a separator character. • Sid is C, identifying the serial ID as a chassis serial number. •...
Page 412
Configuring Smart Call Home Call Home Message Formats Data Item(Plain Text Description(Plain XML Tag (XML Only) and XML) Text and XML) The format is type@Sid@serial: • type is the product model number from backplane IDPROM. • @ is a separator character.
Page 413
Configuring Smart Call Home Call Home Message Formats Data Item(Plain Text Description(Plain XML Tag (XML Only) and XML) Text and XML) as the contact for this unit. Street address Optional field that /aml/body/sysStreetAddress contains the street address for RMA part shipments associated with this unit.
Page 414
Configuring Smart Call Home Call Home Message Formats Table 48: Inserted Fields for a Reactive or Proactive Event Message Data Item(Plain Text and XML) Description(Plain Text and XML) XML Tag (XML Only) Chassis hardware version Hardware version of chassis. /aml/body/chassis/hwVersion Supervisor module software Top-level software version.
Configuring Smart Call Home Sample syslog Alert Notification in Full-Text Format The following table describes the user-generated test message format for full text or XML. Table 50: Inserted Fields for a User-Generated Test Message Data Item(Plain Text and XML) Description(Plain Text and XML) XML Tag(XML Only) Process ID Unique process ID.
Page 417
Configuring Smart Call Home Sample syslog Alert Notification in XML Format </aml-block:Content> <aml-block:Attachments> <aml-block:Attachment type="inline"> <aml-block:Name>show logging</aml-block:Name> <aml-block:Data encoding="plain"> <![CDATA[ Syslog logging: enabled (0 messages dropped, 0 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled) Console logging: level debugging, 53 messages logged, xml disabled, filtering disabled Monitor logging: level debugging, 0 messages logged, xml disabled, filtering disabled...
Page 418
Configuring Smart Call Home Sample syslog Alert Notification in XML Format Copyright (c) 1986-2007 by Cisco Systems, Inc. Compiled Thu 26-Apr-07 18:00 by xxx 00:03:18: %SYS-SP-6-BOOTTIME: Time taken to reboot after reload = 339 seconds 00:03:18: %OIR-SP-6-INSPS: Power supply inserted in slot 1 00:03:18: %C6KPWR-SP-4-PSOK: power supply 1 turned on.
Page 419
Configuring Smart Call Home Sample syslog Alert Notification in XML Format Copyright (c) 1986-2008 by Cisco Systems, Inc. Compiled Thu 26-Apr-08 17:20 by username1 00:00:31: DFC8: Currently running ROMMON from S (Gold) region 00:04:59: %DIAG-SP-6-RUN_MINIMUM: Module 2: Running Minimal Diagnostics... 00:05:12: %DIAG-SP-6-RUN_MINIMUM: Module 8: Running Minimal Diagnostics...
Page 420
Configuring Smart Call Home Sample syslog Alert Notification in XML Format Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring SNMP This chapter describes the configuration of the Simple Network Management Protocol (SNMP) on Cisco Nexus 5000 Series switches and contains the following sections: • Information About SNMP, page 375 • Configuration Guidelines and Limitations, page 379 •...
Information About SNMP SNMP Notifications The Cisco Nexus 5000 Series switch supports SNMPv1, SNMPv2c and SNMPv3. Both SNMPv1 and SNMPv2c use a community-based form of security. SNMP is defined in RFC 3410 (http://tools.ietf.org/html/rfc3410), RFC 3411 (http://tools.ietf.org/html/rfc3411), RFC 3412 (http://tools.ietf.org/html/rfc3412), RFC 3413 (http://tools.ietf.org/html/rfc3413), RFC 3414 (http://tools.ietf.org/html/rfc3414), RFC 3415 (http://tools.ietf.org/html/rfc3415), RFC 3416 (http://tools.ietf.org/html/rfc3416), RFC 3417 (http://tools.ietf.org/html/rfc3417), RFC 3418 (http://tools.ietf.org/html/rfc3418), and RFC 3584...
Information About SNMP User-Based Security Model User-Based Security Model The following table identifies what the combinations of security models and levels mean. Table 51: SNMP Security Models and Levels Model Level Authentication Encryption What Happens noAuthNoPriv Community string Uses a community string match for authentication.
Information About SNMP CLI and SNMP User Synchronization • Message origin authentication—Ensures that the claimed identity of the user on whose behalf received data was originated is confirmed. • Message confidentiality—Ensures that information is not made available or disclosed to unauthorized individuals, entities, or processes.
Configuration Guidelines and Limitations Group-Based SNMP Access Group-Based SNMP Access Because group is a standard SNMP term used industry-wide, roles are referred to as groups in this SNMP Note section. SNMP access rights are organized by groups. Each group in SNMP is similar to a role through the CLI. Each group is defined with three accesses: read access, write access, and notification access.
Configuring SNMP Assigning SNMPv3 Users to Multiple Roles You can enforce SNMP message encryption for a specific user. Command Purpose switch(config)# snmp-server user name enforcePriv Enforces SNMP message encryption for this user. You can enforce SNMP message encryption for all users. Command Purpose switch(config)# snmp-server globalEnforcePriv...
Configuring SNMP Configuring the Notification Target User Command Purpose switch(config)# snmp-server host ip-address {traps Configures a host receiver for SNMPv2c traps or | informs} version 2c community [udp_port number] informs. The community can be any alphanumeric string up to 255 characters. The UDP port number range is from 0 to 65535.
Configuring SNMP Enabling SNMP Notifications The following example shows how to configure a notification target user: switch(config)# snmp-server user NMS auth sha abcd1234 priv abcdefgh engineID 00:00:00:63:00:01:00:a1:ac:15:10:03 Enabling SNMP Notifications You can enable or disable notifications. If you do not specify a notification name, Cisco NX-OS enables all notifications.
Configuring SNMP Configuring Link Notifications Related Commands CISCO-RSCN-MIB snmp-server enable traps rscn snmp-server enable traps rscn els snmp-server enable traps rscn ils CISCO-ZS-MIB snmp-server enable traps zone snmp-server enable traps zone default-zone-behavior-change snmp-server enable traps zone merge-failure snmp-server enable traps zone merge-success snmp-server enable traps zone request-reject snmp-server enable traps zone unsupp-mem The license notifications are enabled by default.
Configuring SNMP Disabling Link Notifications on an Interface • IEFT extended—Cisco NX-OS sends only the IETF-defined notifications (linkUp, linkDown defined in IF-MIB), if ifLinkUpDownTrapEnable (defined in IF-MIB) is enabled for that interface. Cisco NX-OS adds additional varbinds specific to Cisco Systems in addition to the varbinds defined in the IF-MIB. This is the default setting.
Configuring SNMP Assigning SNMP Switch Contact and Location Information Assigning SNMP Switch Contact and Location Information You can assign the switch contact information, which is limited to 32 characters (without spaces), and the switch location. Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode.
Verifying SNMP Configuration Configuring the Context to Network Entity Mapping Verifying SNMP Configuration To display SNMP configuration information, perform one of the following tasks: Command Purpose switch# show snmp Displays the SNMP status. switch# show snmp community Displays the SNMP community strings. switch# show snmp engineID Displays the SNMP engineID.
C H A P T E R Configuring RMON This chapter contains the following sections: • Configuring RMON, page 387 Configuring RMON Information About RMON RMON is an Internet Engineering Task Force (IETF) standard monitoring specification that allows various network agents and console systems to exchange network monitoring data. The Cisco NX-OS supports RMON alarms, events and logs to monitor Cisco Nexus 5000 Series switches An RMON alarm monitors a specific management information base (MIB) object for a specified interval, triggers an alarm at a specified threshold value (threshold), and resets the alarm at another threshold value.
Configuring RMON RMON Events • Rising threshold—The value at which the Cisco Nexus 5000 Series switch triggers a rising alarm or resets a falling alarm. • Falling threshold—The value at which the Cisco Nexus 5000 Series switch triggers a falling alarm or resets a rising alarm.
Configuring RMON Configuring RMON Events • The owner of the alarm. Ensure you have configured an SNMP user and enabled SNMP notifications. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# rmon alarm index mib-object Creates an RMON alarm.
Configuring RMON Verifying RMON Configuration Command or Action Purpose Step 2 switch(config)# rmon event index Configures an RMON event. The description [description string] [log] [trap] [owner string and owner name can be any alphanumeric string. name] Step 3 switch(config)# show rmon {alarms | (Optional) hcalarms} Displays information about RMON alarms or...
C H A P T E R Configuring FCoE This chapter describes how to configure Fibre Channel over Ethernet (FCoE) on Cisco Nexus 5000 Series switches. It contains the following sections: • Information About FCoE, page 393 • FCoE Topologies, page 398 •...
Information About FCoE FIP Virtual Link Instantiation • FIP—The Converged Enhanced Ethernet Data Center Bridging Exchange (CEE-DCBX) protocol supports T11-compliant Gen-2 CNAs. • Pre-FIP—The Cisco, Intel, Nuova Data Center Bridging Exchange (CIN-DCBX) protocol supports Gen-1 converged network adapters (CNAs). The Cisco Nexus 5000 Series switch detects the capabilities of the attached CNA and switches to the correct FIP mode.
Information About FCoE FIP Ethernet Frame Format FIP Ethernet Frame Format FIP is encapsulated in an Ethernet packet with a dedicated EtherType, 0x8914. The packet has a 4-bit version field. Along with the source and destination MAC addresses, the FIP packet also contains a FIP operation code and a FIP operation subcode.
Information About FCoE DCBX Feature Negotiation • CIN-DCBX—The Cisco, Intel, Nuova DCBX is supported on Gen-1 converged network adapters (CNAs). CIN-DCBX is used to perform link detection in addition to other functions. DCBX runs on the physical Ethernet link between the Cisco Nexus 5000 Series switch and the CNA. By default, DCBX is enabled on Ethernet interfaces.
Information About FCoE Lossless Ethernet Lossless Ethernet Standard Ethernet is a best-effort medium which means that it lacks any form of flow control. In the event of congestion or collisions, Ethernet will drop packets. The higher level protocols detect the missing data and retransmit the dropped packets.
FCoE Topologies Directly Connected CNA Topology To reduce configuration errors and simplify administration, the switch distributes the configuration data to all the connected adapters. FCoE Topologies Directly Connected CNA Topology The Cisco Nexus 5000 Series switch can be deployed as a Fibre Channel Forwarder (FCF) as shown in the following figure.
FCoE Topologies Remotely Connected CNA Topology between the CNA and the FCF. Make sure that you configure the FCoE VLAN on the directly connected links only. Remotely Connected CNA Topology The Cisco Nexus 5000 Series switch can be deployed as a Fibre Channel Forwarder (FCF) for remotely connected CNAs, but not as a FIP Snooping Bridge, as shown in the following figure.
FCoE Best Practices Directly Connected CNA Best Practice FCoE Best Practices Directly Connected CNA Best Practice The following figure shows a best practices topology for an access network using directly connected CNAs with Cisco Nexus 5000 Series switches. Figure 41: Directly Connected CNA Follow these configuration best practices for the deployment topology in the preceding figure: 1 You must configure a unique dedicated VLAN at every converged access switch to carry traffic for each Virtual Fabric (VSAN) in the SAN (for example, VLAN 1002 for VSAN 1, VLAN 1003 for VSAN 2,...
Page 447
FCoE Best Practices Directly Connected CNA Best Practice 4 You must not configure the FCoE VLANs as members of Ethernet links that are not designated to carry FCoE traffic because you want to ensure the scope of the STP for the FCoE VLANs is limited to UF links only.
FCoE Best Practices Remotely Connected CNA Best Practice Remotely Connected CNA Best Practice The following figure shows a best practices topology for an access network using remotely connected CNAs with Cisco Nexus 5000 Series switches. Figure 42: Remotely Connected CNAs Follow these configuration best practices for the deployment topology in the preceding figure: 1 You must configure a unique dedicated VLAN at every converged access switch to carry traffic for each Virtual Fabric (VSAN) in the SAN (for example, VLAN 1002 for VSAN 1, VLAN 1003 for VSAN 2,...
Licensing Requirements for FCoE Enabling FCoE A unified fabric link carries both Ethernet and FCoE traffic. Note 3 You must configure the CNAs and the blade switches as spanning-tree edge ports. 4 A blade switch must connect to exactly one Cisco Nexus 5000 Series converged access switch, preferably over an EtherChannel, to avoid disruption due to STP reconvergence on events such as provisioning new links or blade switches.
Configuring FCoE Disabling FCoE All the Fibre Channel features of the Cisco Nexus 5000 Series switch are packaged in the FC Plugin. Note When you enable FCoE, the switch software checks for the FC_FEATURES_PKG license. If it finds the license, the software loads the plugin. If the license is not found, the software loads the plugin with a grace period of 180 days.
Configuring FCoE Disabling LAN Traffic on an FCoE Link Disabling LAN Traffic on an FCoE Link You can disable LAN traffic on an FCoE link. DCBX allows the switch to send a LAN Logical Link Status (LLS) message to a directly-connected CNA. Enter the shutdown lan command to send an LLS-Down message to the CNA.
Configuring FCoE Configuring the Fabric Priority Configuring the Fabric Priority The Cisco Nexus 5000 Series switch advertises its priority. The priority is used by the CNAs in the fabric to determine the best switch to connect to. Procedure Command or Action Purpose Step 1 switch# configure terminal...
Configuring LLDP Configuring Global LLDP Commands Configuring LLDP Configuring Global LLDP Commands You can set global LLDP settings. These settings include the length of time before discarding LLDP information received from peers, the length of time to wait before performing LLDP initialization on any interface, and the rate at which LLDP packets are sent.
Verifying FCoE Configuration Configuring Interface LLDP Commands Command or Action Purpose This example shows how to set an interface to transmit LLDP packets: switch# configure terminal switch(config)# interface ethernet 1/2 switch(config-if)# lldp transmit This example shows how to configure an interface to disable LLDP: switch# configure terminal switch(config)# interface ethernet 1/2 switch(config-if)# no lldp transmit...
Page 455
Verifying FCoE Configuration Configuring Interface LLDP Commands This example shows how to display LLDP interface information: switch# show lldp interface ethernet 1/2 tx_enabled: TRUE rx_enabled: TRUE dcbx_enabled: TRUE Port MAC address: 00:0d:ec:a3:5f:48 Remote Peers Information No remote peers exist This example shows how to display LLDP neighbor information: switch# show lldp neighbors LLDP Neighbors Remote Peers Information on interface Eth1/40...
C H A P T E R Configuring FCoE VLANs and Virtual Interfaces This chapter describes how to configure Fibre Channel over Ethernet (FCoE) VLANs and virtual interfaces on Cisco Nexus 5000 Series switches. It contains the following sections: • Information About Virtual Interfaces, page 411 •...
Configuring Virtual Interfaces Mapping a VSAN to a VLAN ◦ The Ethernet or EtherChannel interface must be a trunk port (use the switchport mode trunk command). ◦ The FCoE VLAN that corresponds to a virtual Fibre Channel’s VSAN must be in the allowed VLAN list.
Verifying the Virtual Interface Associating a Virtual Fibre Channel Interface to a VSAN This example shows how to bind a virtual Fibre Channel interface to an Ethernet interface: switch# configure terminal switch(config)# interface vfc 4 switch(config-if)# bind interface ethernet 1/4 This example shows how to bind a virtual Fibre Channel interface to create a vPC: switch# configure terminal switch(config)# interface vfc 3...
Page 461
Verifying the Virtual Interface Associating a Virtual Fibre Channel Interface to a VSAN Command Purpose switch# show interface vfc vfc-id Displays the detailed configuration of the specified Fibre Channel interface. switch# show interface brief Displays the status of all interfaces. switch# show vlan fcoe Displays the mapping of FCoE VLANs to VSANs.
Mapping VSANs to VLANs Example Configuration Associating a Virtual Fibre Channel Interface to a VSAN This example shows how to display the status of all the interfaces on the switch (some output has been removed for brevity): switch# show interface brief ------------------------------------------------------------------------------- Interface Vsan...
Page 463
Mapping VSANs to VLANs Example Configuration Associating a Virtual Fibre Channel Interface to a VSAN Step 2 Create a virtual Fibre Channel interface and bind it to a physical Ethernet interface. switch(config)# interface vfc 4 switch(config-if)# bind interface ethernet 1/4 switch(config-if)# exit Step 3 Enable the associated VLAN and map the VLAN to a VSAN.
Page 464
Mapping VSANs to VLANs Example Configuration Associating a Virtual Fibre Channel Interface to a VSAN Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring QoS This chapter describes how to configure quality of service (QoS) on Cisco Nexus 5000 Series switches. It contains the following sections: • Information About QoS, page 421 • QoS Configuration Guidelines and Limitations, page 429 •...
Information About QoS The Cisco Modular QoS CLI (MQC) provides a standard set of commands for configuring QoS. You can use MQC to define additional traffic classes and to configure QoS policies for the whole system and for individual interfaces. Configuring a QoS policy with MQC consists of the following steps: 1 Define traffic classes.
Information About QoS Default System Classes the switch distributes the system class parameter values to all its attached network adapters using the Data Center Bridging Exchange (DCBX) protocol. If service policies are configured at the interface level, the interface-level policy always takes precedence over system class configuration or defaults.
Page 470
Information About QoS Policy Types ◦ Policy—The actions that are performed on the matching traffic are as follows: A network-qos policy can only be attached to the system qos target. Note ◦ MTU—The MTU that needs to be enforced for the traffic that is mapped to a system class. Each system class has a default MTU and the system class MTU is configurable.
Information About QoS Link-Level Flow Control • Type qos—A type qos policy is used to classify traffic that is based on various Layer 2, Layer 3, and Layer 4 fields in the frame and to map it to system classes. Some configuration parameters when applied to an EtherChannel are not reflected on Note the configuration of the member ports.
Information About QoS Ethernet interfaces use PFC to provide lossless service to no-drop system classes. PFC implements pause frames on a per-class basis and uses the IEEE 802.1p CoS value to identify the classes that require lossless service. In the switch, each system class has an associated IEEE 802.1p CoS value that is assigned by default or configured on the system class.
Information About QoS Ingress Queuing Policies • All Fibre Channel and virtual Fibre Channel interfaces are automatically classified into the FCoE system class. • By default, all Ethernet interfaces are trusted interfaces. A packet tagged with an 802.1p CoS value is classified into a system class using the value in the packet.
Information About QoS QoS for Multicast Traffic If you add a system class, a queue is assigned to the class. You must reconfigure the bandwidth allocation on all affected interfaces. Bandwidth is not dedicated automatically to user-defined system classes. You can configure a strict priority queue. This queue is serviced before all other queues except the control traffic queue (which carries control rather than data traffic).
QoS Configuration Guidelines and Limitations QoS for Traffic Directed to the CPU QoS for Traffic Directed to the CPU The switch automatically applies QoS policies to traffic that is directed to the CPU to ensure that the CPU is not flooded with packets. Control traffic, such as BPDU frames, is given higher priority to ensure delivery. QoS Configuration Guidelines and Limitations Switch resources (such as buffers, virtual output queues, and egress queues) are partitioned based on the default and user-defined system classes.
Configuring System Classes Configuring ACL Classification Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# class-map [type Creates or accesses a named object that represents the specified class of traffic. Class-map names can contain alphabetic, {network-qos | qos | queuing}] class-name hyphen, or underscore characters, are case sensitive, and can...
Configuring System Classes Configuring CoS Classification Command or Action Purpose Step 4 switch(config-cmap-qos)# no match (Optional) access-group name acl-name Removes the match from the traffic class. This example shows how to classify traffic by matching packets based on existing ACLs: switch# configure terminal switch(config)# class-map type qos class_acl switch(config-cmap-qos)# match access-group name acl-01...
Configuring System Classes Configuring DSCP Classification Use the show class-map command to display the CoS value class-map configuration: switch# show class-map class_cos Configuring DSCP Classification You can classify traffic based on the Differentiated Services Code Point (DSCP) value in the DiffServ field of the IP header (either IPv4 or IPv6).
Configuring System Classes Configuring IP RTP Classification Value List of DSCP Values CS6 (precedence 6) dscp (110000)—decimal value CS7 (precedence 7) dscp (111000)—decimal value default Default dscp (000000)—decimal value 0 EF dscp (101110)—decimal value 46 Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode.
Configuring System Classes Configuring Precedence Classification Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# class-map type qos Creates a named object that represents a class of traffic. Class-map names can contain alphabetic, hyphen, or class-name underscore characters, are case sensitive, and can be up to 40 characters.
Configuring System Classes Configuring Protocol Classification Value List of Precedence Values priority Priority precedence (1) routine Routine precedence (0) Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# class-map type qos Creates a named object that represents a class of traffic.
Configuring System Classes Configuring QoS Group Classification Argument Description netbios NetBIOS Extended User Interface (NetBEUI) Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# class-map type qos Creates a named object that represents a class of class-name traffic.
Configuring System Classes Configuring Policy Maps Command or Action Purpose qos-groups 0 and 1 are reserved for default Note classes and cannot be configured. Step 4 switch(config-cmap-que)# no match (Optional) qos-group qos-group-value Removes the match from the traffic class. This example shows how to classify traffic based on the value of the QoS group: switch# configure terminal switch(config)# class-map type queuing class_qos_group switch(config-cmap-que)# match qos-group 4...
Configuring System Classes Configuring Type Network QoS Policies Command or Action Purpose The three policy-map configuration modes are as follows: • network-qos—Network-wide (global) mode. CLI prompt: switch(config-pmap-nq)# • qos—Classification mode; this is the default mode. CLI prompt: switch(config-pmap-qos)# • queuing—Queuing mode. CLI prompt: switch(config-pmap-que)# Step 3 switch(config)# no policy-map...
Page 485
Configuring System Classes Configuring Type Network QoS Policies Command or Action Purpose Step 3 switch(config-pmap-nq)# class Associates a class map with the policy map, and enters type network-qos class-name configuration mode for the specified system class. The associated class map must be the same type as Note the policy map type.
Configuring System Classes Configuring Type Queuing Policies Command or Action Purpose Step 13 switch(config-pmap-c-nq)# no set (Optional) cos cos-value Disables the marking operation in this class. This example shows how to define a type network-qos policy map: switch# configure terminal switch(config)# policy-map type network-qos policy-que1 switch(config-pmap-nq)# class type network-qos class-que1 switch(config-pmap-c-nq)# mtu 5000...
Configuring System Classes Configuring Type QoS Policies Command or Action Purpose Step 7 switch(config-pmap-c-que)# no (Optional) priority Removes the strict priority queuing from the traffic in this class. This example shows how to define a type queuing policy map: switch# configure terminal switch(config)# policy-map type queuing policy-queue1 switch(config-pmap-que)# class type queuing class-queue1 switch(config-pmap-c-que)# bandwidth 20...
Configuring System Classes Attaching the System Service Policy Attaching the System Service Policy You can use the service-policy command to associate the system class policy map as the service policy for the system. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode.
Page 489
Configuring System Classes Restoring the Default System Service Policies Command or Action Purpose Step 2 switch(config)# system qos Enters system class configuration mode. Step 3 switch(config-sys-qos)# service-policy type Resets the classification mode policy map. qos input default-in-policy This policy-map configuration is for system qos input or interface input only: Step 4 switch(config-sys-qos)# service-policy type...
Configuring System Classes Enabling the Jumbo MTU Enabling the Jumbo MTU You can enable the jumbo MTU for the whole switch by setting the MTU to its maximum size (9216 bytes) in the policy map for the default Ethernet system class (class-default). This example shows how to configure the default Ethernet system class to support the jumbo MTU: switch(config)# policy-map type network-qos jumbo switch(config-pmap-nq)# class type network-qos class-default...
Configuring QoS on Interfaces Configuring Untagged CoS This example shows how to display detailed jumbo MTU information for Ethernet 1/2 (the relevant part of the output is shown in bold font): switch# show interface ethernet 1/2 counters detailed Rx Packets: 1547805598 Rx Unicast Packets: 1547805596 Rx Jumbo Packets: 1301767362 Rx Bytes: 7181776513802...
Configuring QoS on Interfaces Configuring Interface Service Policy Configuring Interface Service Policy An input qos policy is a service policy applied to incoming traffic on an Ethernet interface for classification. For type queuing, the output policy is applied to all outgoing traffic that matches the specified class. When you configure an input queuing policy on an interface or EtherChannel, the switch sends the configuration data to the adapter using the DCBX protocol.
Configuring Priority Flow Control and Link-Level Flow Control Configuring Priority Flow Control Configuring Priority Flow Control and Link-Level Flow Control Cisco Nexus 5000 Series switches support priority flow control (PFC) and Link-Level Flow Control (LLC) on Ethernet interfaces. The Ethernet interface can operate in two different modes: FCoE mode or standard Ethernet mode.
Verifying QoS Configuration Configuring Link-Level Flow Control Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Step 2 switch(config)# interface type slot/port Specifies the interface to be changed. Step 3 switch(config-if)# flowcontrol [receive {on | Enables LLC for the selected interface. Set receive and/or transmit on or off.
Page 495
Verifying QoS Configuration Configuring Link-Level Flow Control This example shows how to display the class maps defined on the switch: switch# show class-map Type qos class-maps =================== class-map type qos c1 match cos 0,7 class-map type qos c2 match protocol ldp match ip rtp 2000-65535 match dscp 10,12 match precedence 6-7...
Page 496
Verifying QoS Configuration Configuring Link-Level Flow Control class-map type network-qos class-default match qos-group 0 This example shows how to display the policy maps defined on the switch: switch# show policy-map Type qos policy-maps ==================== policy-map type qos p1 class type qos c1 set qos-group 2 class type qos c3 set qos-group 4...
Page 497
Verifying QoS Configuration Configuring Link-Level Flow Control policy-map type network-qos p1 class type network-qos c1 match qos-group 2 mtu 5000 class type network-qos c2 match qos-group 3 mtu 9216 queue-limit 30000 bytes class type network-qos c3 match qos-group 4 mtu 8000 class type network-qos c4 match qos-group 5 pause no-drop...
Page 498
Verifying QoS Configuration Configuring Link-Level Flow Control Class-map (qos): c1 (match-any) Match: cos 0,7 set qos-group 2 Class-map (qos): c2 (match-any) Match: protocol ldp Match: ip rtp 2000-65535 Match: dscp 10,12 Match: precedence 6-7 Match: protocol dhcp Match: protocol arp set qos-group 3 Class-map (qos): c3 (match-any)
Page 499
Verifying QoS Configuration Configuring Link-Level Flow Control Class-map (queuing): c4 (match-any) Match: qos-group 5 bandwidth percent 40 Class-map (queuing): class-fcoe (match-any) Match: qos-group 1 bandwidth percent 10 Class-map (queuing): class-default (match-any) Match: qos-group 0 bandwidth percent 5 This example shows how to display the queue configuration and statistics: switch# show queuing interface ethernet 1/1 Interface Ethernet1/1 TX Queuing qos-group...
Example QoS Configurations QoS Example 1 qos-group q-size: 30080, MTU: 9216 drop-type: drop, xon: 0, xoff: 188 Statistics: Pkts received over the port Ucast pkts sent to the cross-bar Mcast pkts sent to the cross-bar Ucast pkts received from the cross-bar Pkts sent to the port Pkts discarded on ingress : 0 (0)
Example QoS Configurations QoS Example 2 Procedure Command or Action Purpose (config)# class-map type qos cmap-qos-acl Step 1 Set up the ingress classification policy (config-cmap-qos)# match access-group ACL-CoS (the access control list was defined (config-cmap-qos)# exit previously). (config)# policy-map type qos pmap-qos-acl (config-pmap-qos)# class cmap-qos-acl (config-pmap-c-qos)# set qos-group 4 (config-pmap-c-qos)# exit...
Page 502
Example QoS Configurations QoS Example 2 Procedure Command or Action Purpose (config)# class-map type qos cmap-qos-bandwidth Step 1 Set up the ingress classification (config-cmap-qos)# match access-group ACL-bandwidth policy. (config-cmap-qos)# exit (config)# policy-map type qos pmap-qos-eth1-1 (config-pmap-qos)# class cmap-qos-bandwidth (config-pmap-c-qos)# set qos-group 2 (config-pmap-c-qos)# exit (config-pmap-qos)# exit Step 2...
Example QoS Configurations QoS Example 3 Command or Action Purpose Step 5 Attach the bandwidth policy to (config)# interface ethernet 1/3 (config-if)# service-policy type queuing output the egress interface. pmap-que-eth1-2 (config-if)# exit (config)# class-map type network-qos cmap-nq-bandwidth Step 6 Allocate the system class for (config-cmap-nq)# match qos-group 2 qos-group 2.
Page 504
Example QoS Configurations QoS Example 3 Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
P A R T SAN Switching • Configuring Fibre Channel Interfaces, page 461 • Configuring Domain Parameters, page 479 • Configuring N Port Virtualization, page 497 • Configuring VSAN Trunking, page 507 • Configuring SAN Port Channel, page 515 • Configuring and Managing VSANs, page 531 •...
C H A P T E R Configuring Fibre Channel Interfaces This chapter contains the following sections: • Configuring Fibre Channel Interfaces, page 461 Configuring Fibre Channel Interfaces Information About Fibre Channel Interfaces Licensing Requirements for Fibre Channel On Cisco Nexus 5000 Series switches, Fibre Channel capability is included in the Storage Protocol Services license.
Configuring Fibre Channel Interfaces Virtual Fibre Channel Interfaces Virtual Fibre Channel Interfaces Fibre Channel over Ethernet (FCoE) encapsulation allows a physical Ethernet cable to simultaneously carry Fibre Channel and Ethernet traffic. In Cisco Nexus 5000 Series switches, an FCoE-capable physical Ethernet interface can carry traffic for one virtual Fibre Channel interface.
Page 509
Configuring Fibre Channel Interfaces E Port Interfaces are automatically assigned VSAN 1 by default. Note Each interface has an associated administrative configuration and an operational status: • The administrative configuration does not change unless you modify it. This configuration has various attributes that you can configure in administrative mode.
Configuring Fibre Channel Interfaces SD Port Related Topics • Configuring VSAN Trunking, page 507 SD Port In SPAN destination port (SD port) mode, an interface functions as a switched port analyzer (SPAN). The SPAN feature monitors network traffic that passes though a Fibre Channel interface. This monitoring is done using a standard Fibre Channel analyzer (or a similar switch probe) that is attached to an SD port.
Configuring Fibre Channel Interfaces Reason Codes Operational State Description be up, and the interface initialization must be completed. Down Interface cannot transmit or receive (data) traffic. Trunking Interface is operational in TE mode. Reason Codes Reason codes are dependent on the operational state of the interface. The following table describes the reason codes for operational states.
Page 512
Configuring Fibre Channel Interfaces Reason Codes Reason Code (long version) Description Applicable Modes Offline The switch software waits for the specified R_A_TOV time before retrying initialization. Inactive The interface VSAN is deleted or is in a suspended state. To make the interface operational, assign that port to a configured and active VSAN.
Configuring Fibre Channel Interfaces Buffer-to-Buffer Credits Reason Code (long version) Description Applicable Modes Isolation due to domain manager The fcdomain feature is disabled. disabled Isolation due to zone merge failure The zone merge operation failed. Isolation due to VSAN mismatch The VSANs at both ends of an ISL are different.
Configuring Fibre Channel Interfaces Configuring Fibre Channel Interfaces The receive BB_credit values depend on the port mode. For physical Fibre Channel interfaces, the default Note value is 16 for F mode and E mode interfaces. This value can be changed as required. The maximum value is 64.
Configuring Fibre Channel Interfaces Configuring Port Speeds Command or Action Purpose Step 4 switch(config-if)# no switchport Clears the description of the interface. description Configuring Port Speeds Port speed can be configured on a physical Fibre Channel interface but not on a virtual Fibre Channel interface. By default, the port speed for an interface is automatically calculated by the switch.
Configuring Fibre Channel Interfaces Configuring Receive Data Field Size Configuring Receive Data Field Size You can configure the receive data field size for native Fibre Channel interfaces (but not for virtual Fibre Channel interfaces). If the default data field size is 2112 bytes, the frame length will be 2148 bytes. To configure the receive data field size, perform this task: Procedure Command or Action...
Configuring Fibre Channel Interfaces Configuring Global Attributes for Fibre Channel Interfaces Configuring Global Attributes for Fibre Channel Interfaces Configuring Switch Port Attribute Default Values You can configure attribute default values for various switch port attributes. These attributes will be applied globally to all future switch port configurations, even if you do not individually specify them at that time.
Configuring Fibre Channel Interfaces Enabling N Port Identifier Virtualization Enabling N Port Identifier Virtualization To enable or disable NPIV on the switch, perform this task: Before You Begin You must globally enable NPIV for all VSANs on the switch to allow the NPIV-enabled applications to use multiple N port identifiers.
Page 521
Configuring Fibre Channel Interfaces Verifying Interface Information The following example shows how to display all interfaces: switch# show interface fc3/1 is up fc3/3 is up Ethernet1/3 is up mgmt0 is up vethernet1/1 is up vfc 1 is up The following example shows how to display multiple specified interfaces: switch# show interface fc3/1 , fc3/3 fc3/1 is up fc3/3 is up...
Configuring Fibre Channel Interfaces Verifying BB_Credit Information The following example shows the interface display when showing the running configuration for a specific interface: switch# show running configuration fc3/5 interface fc3/5 switchport speed 2000 switchport mode E channel-group 11 force no shutdown Verifying BB_Credit Information The following example shows how to display the BB_credit information for all Fibre Channel interfaces: switch# show interface bbcredit...
Page 523
Configuring Fibre Channel Interfaces Default Fibre Channel Interface Settings Parameters Default Interface speed Administrative state Shutdown (unless changed during initial setup) Trunk mode Trunk-allowed VSANs Interface VSAN Default VSAN (1) EISL encapsulation Data field size Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring Domain Parameters This chapter contains the following sections: • Configuring Domain Parameters, page 479 Configuring Domain Parameters The Fibre Channel domain (fcdomain) feature performs principal switch selection, domain ID distribution, FC ID allocation, and fabric reconfiguration functions as described in the FC-SW-2 standards. The domains are configured on a per-VSAN basis.
Configuring Domain Parameters About Domain Restart The following figure illustrates an example fcdomain configuration. Figure 45: Sample fcdomain Configuration About Domain Restart Fibre Channel domains can be started disruptively or nondisruptively. If you perform a disruptive restart, reconfigure fabric (RCF) frames are sent to other switches in the fabric and data traffic is disrupted on all the switches in the VSAN (including remotely segmented ISLs).
Configuring Domain Parameters Restarting a Domain You can apply most of the configurations to their corresponding runtime values. Each of the following sections provide further details on how the fcdomain parameters are applied to the runtime values. The fcdomain restart command applies your changes to the runtime settings. Use the disruptive option to apply most of the configurations to their corresponding runtime values, including preferred domain IDs.
Configuring Domain Parameters About Switch Priority Command or Action Purpose Step 4 switch(config)# no fcdomain optimize Disables (default) domain manager fast restart fast-restart vsan vsan-id in the specified VSAN. About Switch Priority By default, the configured priority is 128. The valid range to set the priority is between 1 and 254. Priority 1 has the highest priority.
Configuring Domain Parameters Configuring Fabric Names Command or Action Purpose Step 3 switch(config)# fcdomain vsan vsan-id Enables the fcdomain configuration in the specified VSAN. Configuring Fabric Names To set the fabric name value for a disabled fcdomain, perform this task: Procedure Command or Action Purpose...
Configuring Domain Parameters About Autoreconfiguring Merged Fabrics Command or Action Purpose Step 4 switch(config-if)# no fcdomain rcf-reject Disables (default) the RCF filter on the vsan vsan-id specified interface in the specified VSAN. About Autoreconfiguring Merged Fabrics By default, the autoreconfigure option is disabled. When you join two switches belonging to two different stable fabrics that have overlapping domains, the following situations can occur: •...
Page 531
Configuring Domain Parameters About Domain IDs The 0 (zero) value can be configured only if you use the preferred option. Note If you do not configure a domain ID, the local switch sends a random ID in its request. We recommend that you use static domain IDs.
Configuring Domain Parameters Specifying Static or Preferred Domain IDs • When the assigned and requested domain IDs are the same, the preferred and static options are not relevant, and the assigned domain ID becomes the runtime domain ID. • When the assigned and requested domain IDs are different, the following cases apply: ◦...
Configuring Domain Parameters About Allowed Domain ID Lists Command or Action Purpose Step 2 switch(config)# fcdomain domain Configures the switch in the specified VSAN to accept domain-id static vsan vsan-id only a specific value and moves the local interfaces in the specified VSAN to an isolated state if the requested domain ID is not granted.
Configuring Domain Parameters About CFS Distribution of Allowed Domain ID Lists Command or Action Purpose Step 3 switch(config)# no fcdomain allowed Reverts to the factory default of allowing domain domain-id range vsan vsan-id IDs from 1 through 239 in the specified VSAN. About CFS Distribution of Allowed Domain ID Lists You can enable the distribution of the allowed domain ID list configuration information to all Cisco SAN switches in the fabric using the Cisco Fabric Services (CFS) infrastructure.
Configuring Domain Parameters Committing Changes Committing Changes To apply the pending domain configuration changes to other SAN switches in the VSAN, you must commit the changes. The pending configuration changes are distributed and, on a successful commit, the configuration changes are applied to the active configuration in the SAN switches throughout the VSAN and the fabric lock is released.
Configuring Domain Parameters FC IDs Command or Action Purpose The contiguous-allocation option takes Note immediate effect at runtime. You do not need to restart the fcdomain. Step 3 switch(config)# no fcdomain Disables the contiguous allocation option and reverts contiguous-allocation vsan vsan-id it to the factory default in the specified VSAN.
Configuring Domain Parameters Enabling the Persistent FC ID Feature Enabling the Persistent FC ID Feature To enable the persistent FC ID feature, perform this task: Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode. Step 2 switch(config)# fcdomain fcid persistent Activates (default) persistency of FC IDs in vsan vsan-id...
Configuring Domain Parameters About Unique Area FC IDs for HBAs Command or Action Purpose Step 4 switch(config-fcid-db)# vsan vsan-id Configures a device WWN (11:22:11:22:33:44:33:44) wwn 11:22:11:22:33:44:33:44 fcid with the FC ID 0x070123 in the specified VSAN in dynamic mode. fcid dynamic Step 5 switch(config-fcid-db)# vsan vsan-id Configures a device WWN (11:22:11:22:33:44:33:44)
Configuring Domain Parameters About Persistent FC ID Selective Purging switch(config-if)# shutdown switch(config-if)# end Step 3 Verify that the FC ID feature is enabled using the show fcdomain vsan command. switch# show fcdomain vsan 1 Local switch configuration information: State: Enabled FCID persistence: Disabled If this feature is disabled, continue to the next step to enable the persistent FC ID.
Configuring Domain Parameters Purging Persistent FC IDs Purging Persistent FC IDs To purge persistent FC IDs, perform this task: Procedure Command or Action Purpose Step 1 switch# purge fcdomain fcid vsan vsan-id Purges all dynamic and unused FC IDs in the specified VSAN.
Configuring Domain Parameters Default Fibre Channel Domain Settings The following example shows how to display frame and other fcdomain statistics for a specified VSAN or SAN port channel: switch# show fcdomain statistics vsan 1 VSAN Statistics Number of Principal Switch Selections: 5 Number of times Local Switch was Principal: 0 Number of 'Build Fabric's: 3 Number of 'Fabric Reconfigurations': 0...
C H A P T E R Configuring N Port Virtualization This chapter contains the following sections: • Configuring N Port Virtualization, page 497 Configuring N Port Virtualization Information About NPV NPV Overview By default, Cisco Nexus 5000 Series switches operate in fabric mode. In this mode, the switch provides standard Fibre Channel switching capability and features.
Configuring N Port Virtualization NPV Mode The figure below shows an interface-level view of an NPV configuration. Figure 47: NPV Interface Configuration NPV Mode In NPV mode, the edge switch relays all traffic to the core switch, which provides the Fibre Channel switching capabilities.
Configuring N Port Virtualization FLOGI Operation An NP uplink is a connection from an NP port on the edge switch to an F port on the core switch. When an NP uplink is established, the edge switch sends a fabric login message (FLOGI) to the core switch, and then (if the FLOGI is successful) it registers itself with the name server on the core switch.
Configuring N Port Virtualization NPV Traffic Management • The same device might log in using different fWWNs on the core switch (depending on the NPV link it uses) and may need to be zoned using different fWWNs. Related Topics • Configuring and Managing Zones, page 543 NPV Traffic Management Automatic Uplink Selection...
Configuring N Port Virtualization NPV Traffic Management Guidelines NPV Traffic Management Guidelines When deploying NPV traffic management, follow these guidelines: • Use NPV traffic management only when automatic traffic engineering does not meet your network requirements. • You do not need to configure traffic maps for all server interfaces. By default, NPV will use automatic traffic management.
Configuring N Port Virtualization Configuring NPV • Both servers and targets can be connected to the switch when in NPV mode. • Fibre Channel switching is not performed in the edge switch; all traffic is switched in the core switch. •...
Configuring N Port Virtualization Configuring a Server Interface Command or Action Purpose Step 3 switch(config-if)# switchport mode NP Configures the interface as an NP port. Step 4 switch(config-if)# no shutdown Brings up the interface. Configuring a Server Interface To configure a server interface, perform this task: Procedure Command or Action Purpose...
Configuring N Port Virtualization Verifying NPV To enable disruptive load balancing, perform this task: Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode on the NPV. Step 2 switch(config)# npv auto-load-balance Enables disruptive load balancing on the disruptive switch.
Configuring N Port Virtualization Verifying NPV Traffic Management Server Interfaces: ================== Interface: vfc3/1, VSAN: 1, NPIV: No, State: Up Number of Server Interfaces: 1 To view fcns database entries for NPV edge switches, you must enter the show fcns database command Note on the core switch.
Page 552
Configuring N Port Virtualization Verifying NPV Traffic Management Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring VSAN Trunking This chapter contains the following sections: • Configuring VSAN Trunking, page 507 Configuring VSAN Trunking Information About VSAN Trunking VSAN trunking enables interconnect ports to transmit and receive frames in more than one VSAN, over the same physical link, using enhanced ISL (EISL) frame format (see the following figure).
Configuring VSAN Trunking VSAN Trunking Mismatches VSAN Trunking Mismatches If you misconfigure VSAN configurations across E ports, issues can occur such as the merging of traffic in two VSANs (causing both VSANs to mismatch). The VSAN trunking protocol validates the VSAN interfaces at both ends of an ISL to avoid merging VSANs (see the following figure).
Configuring VSAN Trunking Configuring VSAN Trunking Configuring VSAN Trunking Guidelines and Restrictions When configuring VSAN trunking, note the following guidelines: • We recommend that both ends of a VSAN trunking ISL belong to the same port VSAN. On platforms or fabric switches where the port VSANs are different, one end returns an error, and the other is not connected.
Configuring VSAN Trunking Configuring Trunk Mode The preferred configuration on the Cisco Nexus 5000 Series switches is that one side of the trunk is set to auto and the other is set to on. When connected to a third-party switch, the trunk mode configuration has no effect. The ISL is always Note in a trunking disabled state.
Page 557
Configuring VSAN Trunking About Trunk-Allowed VSAN Lists three switches are allowed-active. However, only the common set of allowed-active VSANs at the ends of the ISL become operational as shown in below. Figure 51: Default Allowed-Active VSAN Configuration You can configure a selected set of VSANs (from the allowed-active list) to control access to the VSANs specified in a trunking ISL.
Configuring VSAN Trunking Configuring an Allowed-Active List of VSANs Consequently, VSAN 2 can only be routed from switch 1 through switch 3 to switch 2. Figure 52: Operational and Allowed VSAN Configuration Configuring an Allowed-Active List of VSANs To configure an allowed-active list of VSANs for an interface, perform this task: Procedure Command or Action Purpose...
Configuring VSAN Trunking Displaying VSAN Trunking Information Displaying VSAN Trunking Information The show interface command is invoked from the EXEC mode and displays VSAN trunking configurations for a TE port. Without any arguments, this command displays the information for all of the configured interfaces in the switch.
C H A P T E R Configuring SAN Port Channel This chapter contains the following sections: • Configuring SAN Port Channels, page 515 Configuring SAN Port Channels SAN port channels refer to the aggregation of multiple physical interfaces into one logical interface to provide higher aggregated bandwidth, load balancing, and link redundancy.
Configuring SAN Port Channels Understanding Load Balancing • A SAN port channel enables several physical links to be combined into one aggregated logical link. • An industry standard E port can link to other vendor switches and is referred to as inter-switch link (ISL), as shown on the left side of the figure below.
Page 563
Configuring SAN Port Channels Understanding Load Balancing The following figure illustrates how flow-based load balancing works. When the first frame in a flow is received on an interface for forwarding, link 1 is selected. Each subsequent frame in that flow is sent over the same link.
Configuring SAN Port Channels Configuring SAN Port Channels particular exchange are sent on the same link. For exchange 1, no frame uses link 2. For the next exchange, link 2 is chosen by the hash algorithm. Now all frames in exchange 2 use link 2. Figure 56: SID1, DID1, and Exchange-Based Load Balancing Configuring SAN Port Channels SAN port channels are created with default values.
Configuring SAN Port Channels SAN Port Channel Configuration Guidelines The following figure shows examples of invalid configurations. Assuming that the links are brought up in the 1, 2, 3, 4 sequence, links 3 and 4 will be operationally down as the fabric is misconfigured. Figure 58: Misconfigured Configurations SAN Port Channel Configuration Guidelines Before configuring a SAN port channel, consider the following guidelines:...
Configuring SAN Port Channels Creating a SAN Port Channel If all three conditions are not met, the faulty link is disabled. Enter the show interface command for that interface to verify that the SAN port channel is functioning as required. Creating a SAN Port Channel To create a SAN port channel, perform this task: Procedure...
Configuring SAN Port Channels About SAN Port Channel Deletion On Mode Active Mode When you add or modify a port channel member port When you add or modify a port channel interface, the configuration, you must explicitly disable (shut) and SAN port channel automatically recovers.
Configuring SAN Port Channels Deleting SAN Port Channels Command or Action Purpose Step 3 switch(config-if)# channel mode active Configures the Active mode. Step 4 switch(config-if)# no channel mode active Reverts to the default On mode. Example of Configuring Active Modes The following example shows how to configure active mode: switch(config)# interface san-port-channel 1 switch(config-if)# channel mode active...
Configuring SAN Port Channels Suspended and Isolated States • Capability parameters (type of interface, Fibre Channel at both ends). • Administrative compatibility parameters (speed, mode, port VSAN, allowed VSAN, and port security). • Operational parameters (speed and remote switch’s WWN). A port addition procedure fails if the capability and administrative parameters in the remote switch are incompatible with the capability and administrative parameters in the local switch.
Configuring SAN Port Channels About Interface Deletion from a SAN Port Channel After the members are forcefully added, regardless of the mode (Active and On) used, the ports at either end are gracefully brought down, indicating that no frames are lost when the interface is going down. To force the addition of a port to a SAN port channel, perform this task: Procedure Command or Action...
Configuring SAN Port Channels About Channel Group Creation Cisco SAN switches support a protocol to exchange SAN port channel configurations, which simplifies port channel management with incompatible ISLs. An additional autocreation mode enables ISLs with compatible parameters to automatically form channel groups without manual intervention. The port channel protocol is enabled by default.
Configuring SAN Port Channels Autocreation Guidelines Table 71: Channel Group Configuration Differences User-Configured Channel Group Autocreated Channel Group Manually configured by the user. Created automatically when compatible links come up between two compatible switches, if channel group autocreation is enabled in all ports at both ends. Member ports cannot participate in autocreation of None of these ports are members of a user-configured channel groups.
Configuring SAN Port Channels Enabling and Configuring Autocreation • An autocreated SAN port channel is not persistent through a reboot. An autocreated SAN port channel can be manually configured to appear the same as a persistent SAN port channel. Once the SAN port channel is made persistent, the autocreation feature is disabled in all member ports.
Configuring SAN Port Channels Converting to Manually Configured Channel Groups Converting to Manually Configured Channel Groups You can convert autocreated channel group to a user-configured channel group using the san-port-channel channel-group-number persistent EXEC command. If the SAN port channel does not exist, this command is not executed.
Configuring SAN Port Channels Default Settings for SAN Port Channels Autocreated SAN port channels are indicated explicitly to help differentiate them from the manually created SAN port channels. The following example shows how to display an autocreated port channel: switch# show interface fc2/1 fc2/1 is trunking Hardware is Fibre Channel, FCOT is short wave laser Port WWN is 20:0a:00:0b:5f:3b:fe:80...
Page 576
Configuring SAN Port Channels Default Settings for SAN Port Channels Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring and Managing VSANs This chapter contains the following sections: • Configuring and Managing VSANs, page 531 Configuring and Managing VSANs You can achieve higher security and greater stability in Fibre Channel fabrics by using virtual SANs (VSANs). VSANs provide isolation among devices that are physically connected to the same fabric.
Page 578
Configuring and Managing VSANs VSAN Topologies The following figure shows a fabric with three switches, one on each floor. The geographic location of the switches and the attached devices is independent of their segmentation into logical VSANs. No communication between VSANs is possible. Within each VSAN, all members can talk to one another. Figure 60: Logical VSAN Segmentation The application servers or storage arrays can be connected to the switch using Fibre Channel or virtual Fibre Channel interfaces.
Page 579
Configuring and Managing VSANs VSAN Topologies The following figure shows a physical Fibre Channel switching infrastructure with two defined VSANs: VSAN 2 (dashed) and VSAN 7 (solid). VSAN 2 includes hosts H1 and H2, application servers AS2 and AS3, and storage arrays SA1 and SA4. VSAN 7 connects H3, AS1, SA2, and SA3. Figure 61: Example of Two VSANs The four switches in this network are interconnected by VSAN trunk links that carry both VSAN 2 and VSAN 7 traffic.
Configuring and Managing VSANs VSAN Advantages • VSANs can meet the needs of a particular department or application. VSAN Advantages VSANs offer the following advantages: • Traffic isolation—Traffic is contained within VSAN boundaries and devices reside only in one VSAN ensuring absolute separation between user groups, if desired.
Configuring and Managing VSANs Configuring VSANs VSAN Characteristic Zone Characteristic VSANs encompass the entire fabric. Zones are configured at the fabric edge. The following figure shows the possible relationships between VSANs and zones. In VSAN 2, three zones are defined: zone A, zone B, and zone C. Zone C overlaps both zone A and zone B as permitted by Fibre Channel standards.
Configuring and Managing VSANs About VSAN Creation • VSAN name—This text string identifies the VSAN for management purposes. The name can be from 1 to 32 characters long and it must be unique across all VSANs. By default, the VSAN name is a concatenation of VSAN and a four-digit string representing the VSAN ID.
Configuring and Managing VSANs Assigning Static Port VSAN Membership • Dynamically—Assigning VSANs based on the device WWN. This method is referred to as dynamic port VSAN membership (DPVM). Cisco Nexus 5000 Series switches do not support DPVM. VSAN trunking ports have an associated list of VSANs that are part of an allowed list. Related Topics •...
Configuring and Managing VSANs About the Default VSAN san-port-channel 3 vfc3/1 vsan 2 interfaces: fc2/3 vfc4/1 vsan 7 interfaces: vsan 100 interfaces: vsan 4094(isolated vsan) interfaces: The following example displays static membership information for the specified interface: switch # show vsan membership interface fc2/1 fc2/1 vsan:1 allowed list:1-4093...
Configuring and Managing VSANs About Static VSAN Deletion About Static VSAN Deletion When an active VSAN is deleted, all of its attributes are removed from the running configuration. VSAN-related information is maintained by the system software as follows: • VSAN attributes and port membership details are maintained by the VSAN manager. This feature is affected when you delete a VSAN from the configuration.
Configuring and Managing VSANs About Interop Mode About Interop Mode Interoperability enables the products of multiple vendors to connect with each other. Fibre Channel standards guide vendors to create common external Fibre Channel interfaces. Related Topics • Switch Interoperability, page 614 Displaying Static VSAN Configuration The following example shows how to display information about a specific VSAN: switch# show vsan 100...
Page 588
Configuring and Managing VSANs Default VSAN Settings Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring and Managing Zones This chapter contains the following sections: • Configuring and Managing Zones, page 543 Configuring and Managing Zones Zoning enables you to set up access control between storage devices or user groups. If you have administrator privileges in your fabric, you can create zones to increase network security and to prevent data loss or corruption.
Page 590
Configuring and Managing Zones Zoning Features ◦ A zone can be a member of more than one zone set. ◦ A zone switch can have a maximum of 500 zone sets. • Zoning can be administered from any switch in the fabric. ◦...
Configuring and Managing Zones Zoning Example Zoning Example The following figure shows a zone set with two zones, zone 1 and zone 2, in a fabric. Zone 1 provides access from all three hosts (H1, H2, H3) to the data residing on storage systems S1 and S2. Zone 2 restricts the data on S3 to access only by H3.
Configuring and Managing Zones Active and Full Zone Set Configuration Guidelines • Hard zoning cannot be disabled. • Name server queries are soft-zoned. • Only active zone sets are distributed. • Unzoned devices cannot access each other. • A zone or zone set with the same name can exist in each VSAN. •...
Page 593
Configuring and Managing Zones Active and Full Zone Set Configuration Guidelines If one zone set is active and you activate another zone set, the currently active zone set is automatically Note deactivated. You do not need to explicitly deactivate the currently active zone set before activating a new zone set.
Page 594
Configuring and Managing Zones Active and Full Zone Set Configuration Guidelines The following figure shows a zone being added to an activated zone set. Figure 66: Active and Full Zone Sets Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
Configuring and Managing Zones Configuring Zones Configuring Zones To configure a zone and assign a zone name, perform this task: Procedure Command or Action Purpose Step 1 switch# configuration Enters configuration mode. terminal Step 2 switch(config)# zone name Configures a zone in the specified VSAN. zone-name vsan vsan-id All alphanumeric characters or one of the following Note...
Configuring and Managing Zones Zone Sets Use the show wwn switch command to retrieve the sWWN. If you do not provide a sWWN, the software automatically uses the local sWWN. The following examples show how to configure zone members: switch(config)# zone name MyZone vsan 2 pWWN example: switch(config-zone)# member pwwn 10:00:00:23:45:67:89:ab Fabric pWWN example:...
Configuring and Managing Zones Activating a Zone Set Zones provide a method for specifying access control, while zone sets are a grouping of zones to enforce access control in the fabric. Either zone set A or zone set B can be activated (but not together). Zone sets are configured with the names of the member zones and the VSAN (if the zone set is in a configured VSAN).
Configuring and Managing Zones Configuring the Default Zone Access Permission The default zone members are explicitly listed when the default policy is configured as permit or when a zone set is active. When the default policy is configured as deny, the members of this zone are not explicitly enumerated when you view the active zone set.
Configuring and Managing Zones Creating FC Aliases Example Command or Action Purpose Step 2 switch(config)# fcalias name Configures an alias name (AliasSample). AliasSample vsan vsan-id Step 3 switch(config-fcalias)# member type Configures a member for the specified fcalias value (AliasSample) based on the type (pWWN, fabric pWWN, FC ID, domain ID, or interface) and value specified.
Configuring and Managing Zones Creating Zone Sets and Adding Member Zones Device alias example: switch(config-fcalias)# member device-alias devName Creating Zone Sets and Adding Member Zones To create a zone set to include several zones, perform this task: Procedure Command or Action Purpose Step 1 switch# configuration terminal...
Configuring and Managing Zones Zone Set Distribution Hard zoning enforces zoning restrictions on every frame, and prevents unauthorized access. Note Cisco Nexus 5000 Series switches support both hard and soft zoning. Zone Set Distribution You can distribute full zone sets using one of two methods: one-time distribution using the zoneset distribute vsan command at the EXEC mode level or full zone set distribution using the zoneset distribute full vsan command at the configuration mode level.
Configuring and Managing Zones About Recovering from Link Isolation The one-time distribution of the full zone set is supported in interop 2 and interop 3 modes, and not in Note interop 1 mode. Use the show zone status vsan vsan-id command to check the status of the one-time zone set distribution request.
Configuring and Managing Zones Importing and Exporting Zone Sets Importing and Exporting Zone Sets To import or export the zone set information from or to an adjacent switch, perform this task: Procedure Command or Action Purpose Step 1 switch# zoneset import interface fc Imports the zone set from the adjacent switch slot/port vsan vsan-id connected through the specified interface for the VSAN...
Configuring and Managing Zones Renaming Zones, Zone Sets, and Aliases Command or Action Purpose Step 2 switch# zone copy vsan vsan-id active-zoneset Copies the active zone in the specified VSAN scp://guest@myserver/tmp/active_zoneset.txt to a remote location using SCP. Renaming Zones, Zone Sets, and Aliases To rename a zone, zone set, fcalias, or zone-attribute-group, perform this task: Procedure Command or Action...
Configuring and Managing Zones Clearing the Zone Server Database Command or Action Purpose Step 6 switch(config)# zoneset activate name newname Activates the zone set and updates the new vsan vsan-id zone name in the active zone set. Clearing the Zone Server Database You can clear all configured information in the zone server database for the specified VSAN.
Configuring and Managing Zones Enhanced Zoning Enhanced Zoning The zoning feature complies with the FC-GS-4 and FC-SW-3 standards. Both standards support the basic zoning functionalities explained in the previous section and the enhanced zoning functionalities described in this section. About Enhanced Zoning The following table lists the advantages of the enhanced zoning feature in all switches in the Cisco Nexus 5000 Series.
Configuring and Managing Zones Changing from Basic Zoning to Enhanced Zoning Basic Zoning Enhanced Zoning Enhanced Zoning Advantages be misunderstood by the non-Cisco switches. The fWWN-based zone Supports fWWN-based The fWWN-based member type is membership is only supported in membership in the standard interop standardized.
Configuring and Managing Zones Modifying the Zone Database Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode. Step 2 switch(config)# zone mode enhanced vsan Enables enhanced zoning in the specified VSAN. vsan-id Step 3 switch(config)# no zone mode enhanced vsan Disables enhanced zoning in the specified vsan-id VSAN.
Configuring and Managing Zones Merging the Database If session locks remain on remote switches after using the no zone commit vsan command, you can use the clear zone lock vsan command on the remote switches. switch# clear zone lock vsan 2 We recommend using the no zone commit vsan command first to release the session lock in the fabric.
Configuring and Managing Zones Configuring Zone Merge Control Policies Configuring Zone Merge Control Policies To configure merge control policies, perform this task: Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode. Step 2 switch(config)# zone merge-control restrict Configures a restricted merge control setting vsan vsan-id for this VSAN.
Configuring and Managing Zones Verifying Enhanced Zone Information Command or Action Purpose Step 3 switch(config)# no system default zone Configures deny (default) as the default zoning default-zone permit policy for new VSANs on the switch. Step 4 switch(config)# system default zone Enables full zone database distribution as the default for new VSANs on the switch.
Configuring and Managing Zones Default Basic Zone Settings The following example shows how to display full zoning analysis: switch# show zone analysis vsan 1 The following example shows how to display active zoning analysis: switch# show zone analysis active vsan 1 See the Cisco Nexus 5000 Series Switch Command Reference for the description of the information displayed in the command output.
C H A P T E R Distributing Device Alias Services This chapter contains the following sections: • Distributing Device Alias Services, page 567 Distributing Device Alias Services Switches in the Cisco Nexus 5000 Series support Distributed Device Alias Services (device aliases) on a fabric-wide basis.
Distributing Device Alias Services Device Alias Requirements Related Topics • Device Alias Modes, page 569 • Using Cisco Fabric Services, page 299 Device Alias Requirements Device aliases have the following requirements: • You can only assign device aliases to pWWNs. •...
Distributing Device Alias Services Creating Device Aliases • Effective database—The database currently used by the fabric. • Pending database—Your subsequent device alias configuration changes are stored in the pending database. If you modify the device alias configuration, you need to commit or discard the changes as the fabric remains locked during this period.
Distributing Device Alias Services Changing Device Alias Mode Guidelines track of the device alias membership changes and enforce them accordingly. The primary benefit of operating in enhanced mode is that you have a single point of change. Whenever you change device alias modes, the change is distributed to other switches in the network only if device alias distribution is enabled or on.
Distributing Device Alias Services About Device Alias Distribution Viewing the Device Alias Mode Setting To view the current device alias mode setting, enter the show device-alias status command. switch# show device-alias status Fabric Distribution: Enabled Database:- Device Aliases 0 Mode: Basic Locked By:- User "admin"...
Distributing Device Alias Services Discarding Changes Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode. Step 2 switch(config)# device-alias commit Commits the changes made to the currently active session. Discarding Changes If you discard the changes made to the pending database, the following events occur: •...
Distributing Device Alias Services Disabling and Enabling Device Alias Distribution To display the status of the clear operation, use the show device-alias status command. switch# show device-alias status Fabric Distribution: Enabled Database:- Device Aliases 24 Status of the last CFS operation issued from this switch: ========================================================== Operation: Clear Session<--------------------Lock released by administrator Status: Success<-----------------------------Successful status of the operation...
Distributing Device Alias Services Importing a Zone Alias • Each zone alias has only one member. • The member type is pWWN. If any name or definition conflict exists, the zone aliases are not imported. Ensure that you copy any required zone aliases to the device alias database as required by your configuration. When an import operation is complete, the modified alias database is distributed to all other switches in the physical fabric when you perform the commit operation.
Distributing Device Alias Services Default Device Alias Settings Procedure Command or Action Purpose Step 1 switch# show zoneset [active] Displays the device aliases in the zone set information. Step 2 switch# show device-alias database Displays the device alias database. [pending | pending-diffs] Step 3 switch# show device-alias {pwwn pwwn-id Displays the device alias information for the...
Page 622
Distributing Device Alias Services Default Device Alias Settings Parameters Default Database in use Effective database. Database to accept changes Pending database. Device alias fabric lock state Locked with the first device alias task. Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring Fibre Channel Routing Services and Protocols This chapter contains the following sections: • Configuring Fibre Channel Routing Services and Protocols, page 577 Configuring Fibre Channel Routing Services and Protocols Fabric Shortest Path First (FSPF) is the standard path selection protocol used by Fibre Channel fabrics. The FSPF feature is enabled by default on the E mode and TE mode Fibre Channel interfaces on Cisco Nexus 5000 Series switches.
Configuring Fibre Channel Routing Services and Protocols FSPF Examples • Uses a topology database to keep track of the state of the links on all switches in the fabric and associates a cost with each link. • Guarantees a fast reconvergence time in case of a topology change. Uses the standard Dijkstra algorithm, but there is a static dynamic option for a more robust, efficient, and incremental Dijkstra algorithm.
Configuring Fibre Channel Routing Services and Protocols FSPF Global Configuration failure of a link in a SAN port channel does not trigger a route change, which reduces the risks of routing loops, traffic loss, or fabric downtime for route reconfiguration. Figure 70: Fault Tolerant Fabric with Redundant Links For example, if all links are of equal speed and no SAN port channels exist, the FSPF calculates four equal paths from A to C: A1-E-C, A2-E-C, A3-D-C, and A4-D-C.
Configuring Fibre Channel Routing Services and Protocols Configuring FSPF on a VSAN Table 83: LSR Default Settings LSR Option Default Description Acknowledgment interval 5 seconds The time a switch waits for an (RxmtInterval) acknowledgment from the LSR before retransmission. Refresh time (LSRefreshTime) 30 minutes The time a switch waits before sending an LSR refresh...
Configuring Fibre Channel Routing Services and Protocols Enabling or Disabling FSPF Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode. Step 2 switch(config)# no fspf config vsan vsan-id Deletes the FSPF configuration for the specified VSAN. Enabling or Disabling FSPF To enable or disable FSPF routing protocols, perform this task: Procedure...
Configuring Fibre Channel Routing Services and Protocols Configuring FSPF Link Cost Configuring FSPF Link Cost To configure FSPF link cost, perform this task: Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode. Step 2 switch(config)# interface fc slot/port Configures the specified interface, or if already configured, enters configuration mode for the specified interface.
Configuring Fibre Channel Routing Services and Protocols Configuring Dead Time Intervals This value must be the same in the ports at both ends of the ISL. Note Caution An error is reported at the command prompt if the configured dead time interval is less than the hello time interval.
Configuring Fibre Channel Routing Services and Protocols About Disabling FSPF for Specific Interfaces Command or Action Purpose Step 3 switch(config-if)# fspf Specifies the retransmit time interval for retransmit-interval value vsan unacknowledged link state updates in the specified VSAN. The default is 5 seconds. vsan-id About Disabling FSPF for Specific Interfaces You can disable the FSPF protocol for selected interfaces.
Configuring Fibre Channel Routing Services and Protocols FSPF Routes FSPF Routes FSPF routes traffic across the fabric, based on entries in the FSPF database. These routes can be learned dynamically, or configured statically. About Fibre Channel Routes Each port implements forwarding logic, which forwards frames based on its FC ID. Using the FC ID for the specified interface and domain, you can configure the specified route (for example, FC ID 111211 and domain ID 3) in the switch with domain ID 1 (see the following figure).
Configuring Fibre Channel Routing Services and Protocols In-Order Delivery Command or Action Purpose Step 5 switch(config)#fcroute fcid interface Adds a static route to the RIB. If this is an active route fc slot/port domain domain-id metric and the FIBFIB = Forwarding Information Base records are free, it is also added to the FIB.
Configuring Fibre Channel Routing Services and Protocols About Reordering SAN Port Channel Frames • Frames in the network are delivered in the order in which they are transmitted. • Frames that cannot be delivered in order within the network latency drop period are dropped inside the network.
Configuring Fibre Channel Routing Services and Protocols Enabling In-Order Delivery Globally Enabling In-Order Delivery Globally To ensure that the in-order delivery parameters are uniform across all VSANs on the switch, enable in-order delivery globally. Only enable in-order delivery globally if this is a requirement across your entire fabric. Otherwise, enable IOD only for the VSANs that require this feature.
Configuring Fibre Channel Routing Services and Protocols Displaying the In-Order Delivery Status Displaying the In-Order Delivery Status Use the show in-order-guarantee command to display the present configuration status: switch# show in-order-guarantee global inorder delivery configuration:guaranteed VSAN specific settings vsan 1 inorder delivery:guaranteed vsan 101 inorder delivery:not guaranteed vsan 1000 inorder delivery:guaranteed vsan 1001 inorder delivery:guaranteed...
Configuring Fibre Channel Routing Services and Protocols Flow Statistics Configuration Flow Statistics Configuration Flow statistics count the ingress traffic in the aggregated statistics table. You can collect two kinds of statistics: • Aggregated flow statistics to count the traffic for a VSAN. •...
Configuring Fibre Channel Routing Services and Protocols Clearing FIB Statistics Clearing FIB Statistics Use the clear fcflow stats command to clear the aggregated flow counter. The following example clears the aggregated flow counters: switch# clear fcflow stats aggregated index 1 The following example clears the flow counters for source and destination FC IDs: switch# clear fcflow stats index 1 Displaying Flow Statistics...
Page 638
Configuring Fibre Channel Routing Services and Protocols Default FSPF Settings Parameters Default Hello interval 20 seconds. Dead interval 80 seconds. Distribution tree information Derived from the principal switch (root node). Routing table FSPF stores up to 16 equal cost paths to a given destination.
C H A P T E R Managing FLOGI, Name Server, FDMI, and RSCN Databases This chapter contains the following sections: • Managing FLOGI, Name Server, FDMI, and RSCN Databases, page 593 Managing FLOGI, Name Server, FDMI, and RSCN Databases Information About Fabric Login In a Fibre Channel fabric, each host or disk requires an FC ID.
Managing FLOGI, Name Server, FDMI, and RSCN Databases Name Server Proxy Name Server Proxy The name server functionality maintains a database containing the attributes for all hosts and storage devices in each VSAN. Name servers allow a database entry to be modified by a device that originally registered the information.
Managing FLOGI, Name Server, FDMI, and RSCN Databases About Name Server Database Entries About Name Server Database Entries The name server stores name entries for all hosts in the FCNS database. The name server permits an Nx port to register attributes during a PLOGI (to the name server) to obtain attributes of other hosts. These attributes are deregistered when the Nx port logs out either explicitly or implicitly.
Managing FLOGI, Name Server, FDMI, and RSCN Databases Displaying FDMI • Host operating system (OS) name and version number All FDMI entries are stored in persistent storage and are retrieved when the FDMI process is started. Displaying FDMI The following example shows how to display all HBA details for a specified VSAN: switch# show fdmi database detail vsan 1 RSCN The Registered State Change Notification (RSCN) is a Fibre Channel service that informs hosts about changes...
Managing FLOGI, Name Server, FDMI, and RSCN Databases Configuring the multi-pid Option D2, and H belong to the same zone. If disks D1 and D2 are online at the same time, one of the following actions applies: • The multi-pid option is disabled on switch 1— Two RSCNs are generated to host H: one for the disk D1 and another for disk D2.
Managing FLOGI, Name Server, FDMI, and RSCN Databases Configuring the RSCN Timer The following example shows how to clear the RSCN statistics for the specified VSAN: switch# clear rscn statistics vsan 1 After clearing the RSCN statistics, you can view the cleared counters by entering the show rscn statistics command: switch# show rscn statistics vsan 1 Configuring the RSCN Timer...
Managing FLOGI, Name Server, FDMI, and RSCN Databases RSCN Timer Configuration Distribution RSCN Timer Configuration Distribution Because the timeout value for each switch is configured manually, a misconfiguration occurs when different switches time out at different times. This means different N-ports in a network can receive RSCNs at different times.
Managing FLOGI, Name Server, FDMI, and RSCN Databases Discarding the RSCN Timer Configuration Changes Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode. Step 2 switch(config)# rscn commit vsan timeout Commits the RSCN timer changes. Discarding the RSCN Timer Configuration Changes If you discard (abort) the changes made to the pending database, the configuration database remains unaffected and the lock is released.
Managing FLOGI, Name Server, FDMI, and RSCN Databases Default RSCN Settings The pending database includes both existing and modified configuration. Note switch# show rscn pending rscn event-tov 2000 ms vsan 1 rscn event-tov 2000 ms vsan 2 rscn event-tov 300 ms vsan 10 The following example shows how to display the difference between pending and active configurations: switch# show rscn pending-diff vsan 10 - rscn event-tov 2000 ms vsan 10...
Page 648
Managing FLOGI, Name Server, FDMI, and RSCN Databases Default RSCN Settings Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Discovering SCSI Targets This chapter contains the following sections: • Discovering SCSI Targets, page 603 Discovering SCSI Targets Information About SCSI LUN Discovery Small Computer System Interface (SCSI) targets include disks, tapes, and other storage devices. These targets do not register logical unit numbers (LUNs) with the name server.
Discovering SCSI Targets About Initiating Customized Discovery Procedure Command or Action Purpose Step 1 switch# discover scsi-target {custom-list | local | remote Discovers SCSI targets for the specified operating system (OS). | vsan vsan-id fcid fc-id} os {aix | hpux | linux | solaris | windows} [lun | target] Examples of Starting SCSI LUN Discovery The following example discovers local SCSI targets for all operating systems (OSs):...
Page 651
Discovering SCSI Targets Displaying SCSI LUN Information The following example displays the discovered targets: switch# show scsi-target status discovery completed This command takes several minutes to complete, especially if the fabric is large or if several devices are Note slow to respond. The following example displays the FCNS database: switch# show fcns database The following example displays the SCSI target disks:...
Page 652
Discovering SCSI Targets Displaying SCSI LUN Information Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Advanced Fibre Channel Features and Concepts This chapter contains the following sections: • Advanced Fibre Channel Features and Concepts, page 607 Advanced Fibre Channel Features and Concepts Fibre Channel Timeout Values You can modify Fibre Channel protocol-related timer values for the switch by configuring the following timeout values (TOVs): •...
Advanced Fibre Channel Features and Concepts Timer Configuration Per-VSAN If a VSAN is not specified when you change the timer value, the changed value is applied to all VSANs Note in the switch. To configure Fibre Channel timers across all VSANs, perform this task: Procedure Command or Action Purpose...
Advanced Fibre Channel Features and Concepts About fctimer Distribution About fctimer Distribution You can enable per-VSAN fctimer fabric distribution for all Cisco SAN switches in the fabric. When you perform fctimer configurations, and distribution is enabled, that configuration is distributed to all the switches in the fabric.
Advanced Fibre Channel Features and Concepts Discarding fctimer Changes Discarding fctimer Changes After making the configuration changes, you can choose to discard the changes by discarding the changes instead of committing them. In either case, the lock is released. To discard the fctimer configuration changes, perform this task: Procedure Command or Action Purpose...
Advanced Fibre Channel Features and Concepts Verifying Configured fctimer Values Verifying Configured fctimer Values Use the show fctimer command to display the configured fctimer values. The following example displays the configured global TOVs: switch# show fctimer F_S_TOV D_S_TOV E_D_TOV R_A_TOV ---------------------------------------- 5000 ms 5000 ms...
Advanced Fibre Channel Features and Concepts Verifying WWN Information Verifying WWN Information Use the show wwn commands to display the status of the WWN configuration. The following example displays the status of all WWNs: switch# show wwn status Type Configured Available Resvd.
Advanced Fibre Channel Features and Concepts Default Company ID List Some HBAs do not discover targets that have FC IDs with the same domain and area. The switch software maintains a list of tested company IDs that do not exhibit this behavior. These HBAs are allocated with single FC IDs.
Advanced Fibre Channel Features and Concepts Verifying the Company ID Configuration Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode. Step 2 switch(config)# fcid-allocation area company-id Adds a new company ID to the default list. value Step 3 switch(config)# no fcid-allocation area Deletes a company ID from the default...
Advanced Fibre Channel Features and Concepts About Interop Mode For more information on configuring interoperability for Cisco Nexus 5000 Series switches, see the Cisco Note MDS 9000 Family Switch-to-Switch Interoperability Configuration Guide About Interop Mode Cisco NX-OS software supports the following four interop modes: •...
Page 662
Advanced Fibre Channel Features and Concepts About Interop Mode Switch Feature Changes if Interoperability Is Enabled D_S_TOV Verify that the Distributed Services Time Out Value timers match exactly. E_D_TOV Verify that the Error Detect Time Out Value timers match exactly. R_A_TOV Verify that the Resource Allocation Time Out Value timers match exactly.
Advanced Fibre Channel Features and Concepts Configuring Interop Mode 1 Switch Feature Changes if Interoperability Is Enabled continues to use src-id, dst-id, and ox-id to load balance across multiple ISL links. Domain reconfiguration disruptive This is a switch-wide impacting event. Brocade and McData require the entire switch to be placed in offline mode and/or rebooted when changing domain IDs.
Advanced Fibre Channel Features and Concepts Verifying Interoperating Status The Cisco Nexus 5000 Series, Brocade, and McData FC Error Detect (ED_TOV) and Resource Note Allocation (RA_TOV) timers default to the same values. They can be changed if needed. The RA_TOV default is 10 seconds, and the ED_TOV default is 2 seconds.
Page 665
Advanced Fibre Channel Features and Concepts Verifying Interoperating Status Software BIOS: version 1.2.0 loader: version N/A kickstart: version 4.0(1a)N1(1) system: version 4.0(1a)N1(1) BIOS compile time: 06/19/08 kickstart image file is: bootflash:/n5000-uk9-kickstart.4.0.1a.N1.latest.bin kickstart compile time: 11/25/2008 6:00:00 [11/25/2008 14:17:12] system image file is: bootflash:/n5000-uk9.4.0.1a.N1.latest.bin system compile time: 11/25/2008 6:00:00 [11/25/2008 14:59:49]...
Page 666
Advanced Fibre Channel Features and Concepts Verifying Interoperating Status interface fc2/2 no shutdown interface fc2/3 interface fc2/4 <snip> interface mgmt0 ip address 6.1.1.96 255.255.255.0 switchport encap default no shutdown vsan database vsan 1 interop boot system bootflash:/nx5000-system-23e.bin boot kickstart bootflash:/nx5000-kickstart-23e.bin callhome fcdomain domain 100 preferred vsan 1 ip route 6.1.1.0 255.255.255.0 6.1.1.1...
Page 667
Advanced Fibre Channel Features and Concepts Verifying Interoperating Status Example: switch# show fcdomain vsan 1 The local switch is a Subordinated Switch. Local switch run time information: State: Stable Local switch WWN: 20:01:00:05:30:00:51:1f Running fabric name: 10:00:00:60:69:22:32:91 Running priority: 128 Current domain ID: 0x64(100) <---------------verify domain id Local switch configuration information: State: Enabled...
Page 668
Advanced Fibre Channel Features and Concepts Verifying Interoperating Status --------- ----------------------- Step 7 Verify the next hop and destination for the switch. Example: switch# show fspf internal route vsan 1 FSPF Unicast Routes --------------------------- VSAN Number Dest Domain Route Cost Next hops ----------------------------------------------- 0x61(97)
Advanced Fibre Channel Features and Concepts Default Settings for Advanced Features Default Settings for Advanced Features The following table lists the default settings for the features included in this chapter. Table 88: Default Settings for Advanced Features Parameters Default CIM server Disabled CIM server security protocol HTTP...
Page 670
Advanced Fibre Channel Features and Concepts Default Settings for Advanced Features Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Configuring FC-SP and DHCHAP This chapter contains the following sections: • Configuring FC-SP and DHCHAP, page 625 Configuring FC-SP and DHCHAP Fibre Channel Security Protocol (FC-SP) capabilities provide switch-to-switch and host-to-switch authentication to overcome security challenges for enterprise-wide fabrics. Diffie-Hellman Challenge Handshake Authentication Protocol (DHCHAP) is an FC-SP protocol that provides authentication between Cisco Nexus 5000 Series switches and other devices.
Configuring FC-SP and DHCHAP DHCHAP Cisco Nexus 5000 Series switches support authentication features to address physical security (see the following figure). Figure 74: Switch and Host Authentication Fibre Channel Host Bus Adapters (HBAs) with appropriate firmware and drivers are required for host-switch Note authentication.
Configuring FC-SP and DHCHAP DHCHAP Compatibility with Fibre Channel Features DHCHAP is a mandatory password-based, key-exchange authentication protocol that supports both switch-to-switch and host-to-switch authentication. DHCHAP negotiates hash algorithms and DH groups before performing authentication. It supports MD5 and SHA-1 algorithm-based authentication. To configure DHCHAP authentication using the local password database, perform this task: Procedure Step 1...
Configuring FC-SP and DHCHAP About DHCHAP Authentication Modes About DHCHAP Authentication Modes The DHCHAP authentication status for each interface depends on the configured DHCHAP port mode. When the DHCHAP feature is enabled in a switch, each Fibre Channel interface or FCIP interface may be configured to be in one of four DHCHAP port modes: •...
Configuring FC-SP and DHCHAP About the DHCHAP Hash Algorithm Command or Action Purpose Step 2 switch(config)# interface fc Selects a range of interfaces and enters the interface slot/port - slot/port configuration mode. Step 3 switch(config-if)# fcsp on Sets the DHCHAP mode for the selected interfaces to be in the on state.
Configuring FC-SP and DHCHAP About the DHCHAP Group Settings Command or Action Purpose Step 2 switch(config)# fcsp dhchap hash [md5] Configures the use of the the MD5 or SHA-1 hash [sha1] algorithm. Step 3 switch(config)# no fcsp dhchap hash Reverts to the factory default priority list of the MD5 hash algorithm followed by the SHA-1 hash sha1 algorithm.
Configuring FC-SP and DHCHAP Configuring DHCHAP Passwords for the Local Switch All passwords are restricted to 64 alphanumeric characters and can be changed, but not deleted. Note We recommend using RADIUS or TACACS+ for fabrics with more than five switches. If you need to use a local password database, you can continue to do so using Configuration 3 and using the Cisco MDS 9000 Family Fabric Manager to manage the password database.
Configuring FC-SP and DHCHAP About the DHCHAP Timeout Value About the DHCHAP Timeout Value During the DHCHAP protocol exchange, if the Cisco Nexus 5000 Series switch does not receive the expected DHCHAP message within a specified time interval, authentication failure is assumed. The time ranges from 20 (no authentication is performed) to 1000 seconds.
Configuring FC-SP and DHCHAP Sample Configuration Sample Configuration This section provides the steps to configure the example illustrated in the following figure. Figure 75: Sample DHCHAP Authentication To configure the authentication setup shown in the above figure, perform this task: Procedure Step 1 Obtain the device name of the Cisco Nexus 5000 Series switch in the fabric.
Configuring FC-SP and DHCHAP Default Fabric Security Settings Example: switch# show fcsp dhchap database DHCHAP Local Password: Non-device specific password:******* Other Devices' Passwords: Password for device with WWN:20:00:00:05:30:00:38:5e is ******* Step 7 Display the DHCHAP configuration in the Fibre Channel interface. Example: switch# show fcsp interface fc2/4 fc2/4...
C H A P T E R Configuring Port Security This chapter contains the following sections: • Configuring Port Security, page 635 Configuring Port Security Cisco Nexus 5000 Series switches provide port security features that reject intrusion attempts and report these intrusions to the administrator.
Configuring Port Security About Auto-Learning Each N and xE port can be configured to restrict a single port or a range of ports. Enforcement of port security policies are done on every activation and when the port tries to come up. The port security feature uses two databases to accept and implement configuration changes.
Configuring Port Security Configuring Port Security After the database is activated, subsequent device login is subject to the activated port bound WWN pairs, excluding the auto-learned entries. You must disable auto-learning before the auto-learned entries become activated. When you activate the port security feature, auto-learning is also automatically enabled. You can choose to activate the port security feature and disable auto-learning.
Configuring Port Security Configuring Port Security with Auto-Learning without CFS Configuring Port Security with Auto-Learning without CFS To configure port security using auto-learning without CFS, perform this task: Procedure Step 1 Enable port security. Step 2 Activate port security on each VSAN, which turns on auto-learning by default. Step 3 Wait until all switches and all hosts are automatically learned.
Configuring Port Security Port Security Activation Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode. Step 2 switch(config)# port-security enable Enables port security on that switch. Step 3 switch(config)# no port-security enable Disables (default) port security on that switch.
Configuring Port Security Database Reactivation If you force the activation, existing devices are logged out if they violate the active database. Note You can view missing or conflicting entries using the port-security database diff active vsan command in EXEC mode. To forcefully activate the port security database, perform this task: Procedure Command or Action...
Configuring Port Security Auto-Learning Auto-Learning About Enabling Auto-Learning The state of the auto-learning configuration depends on the state of the port security feature: • If the port security feature is not activated, auto-learning is disabled by default. • If the port security feature is activated, auto-learning is enabled by default (unless you explicitly disabled this option).
Configuring Port Security Authorization Scenario Table 91: Authorized Auto-Learning Device Requests Condition Device (pWWN, nWWN, Requests Connection to Authorization sWWN) Configured with one or A configured switch port Permitted more switch ports Any other switch port Denied Not configured A switch port that is not Permitted if auto-learning configured enabled...
Page 689
Configuring Port Security Authorization Scenario Device Connection Authorization Condition Reason Request P2, N2, F1 Permitted No conflict. P3, N2, F1 Denied F1 is bound to P1/P2. P1, N3, F1 Permitted Wildcard match for N3. P1, N1, F3 Permitted Wildcard match for F3. P1, N4, F5 Denied P1 is bound to F1.
Configuring Port Security Port Security Manual Configuration Port Security Manual Configuration To configure port security on a Cisco Nexus 5000 Series switch, perform this task: Procedure Step 1 Identify the WWN of the ports that need to be secured. Step 2 Secure the fWWN to an authorized nWWN or pWWN.
Configuring Port Security Port Security Configuration Distribution Procedure Command or Action Purpose Step 1 switch# configuration terminal Enters configuration mode. Step 2 switch(config)# port-security database vsan Enters the port security database mode for the specified VSAN. vsan-id Step 3 switch(config)# no port-security database Deletes the port security configuration database vsan vsan-id from the specified VSAN.
Configuring Port Security Locking the Fabric For example, if you activate port security, follow up by disabling auto-learning, and finally commit the changes in the pending database, then the net result of your actions is the same as entering a port-security activate vsan vsan-id no-auto-learn command.
Configuring Port Security Discarding the Changes Discarding the Changes If you discard (abort) the changes made to the pending database, the configuration remains unaffected and the lock is released. To discard the port security configuration changes for the specified VSAN, perform this task: Procedure Command or Action Purpose...
Configuring Port Security Port Security Database Merge Guidelines Scenario Actions Distribution = OFF Distribution = ON 3. You issue a commit. Not applicable configuration database = {A,B, E} active database = {A,B, E, C*, D*} pending database = empty A and B exist in the 1.
Configuring Port Security Database Interaction Related Topics • CFS Merge Support, page 303 Database Interaction The following table lists the differences and interaction between the active and configuration databases. Table 94: Active and Configuration Port Security Databases Active Database Configuration Database Read-only.
Configuring Port Security Database Scenarios Database Scenarios the follwowing figure illustrates various scenarios showing the active database and the configuration database status based on port security configurations. Figure 76: Port Security Database Scenarios Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
Configuring Port Security Copying the Port Security Database Copying the Port Security Database We recommend that you copy the active database to the config database after disabling auto-learning. This action will ensure that the configuration database is in synchronization with the active database. If distribution is enabled, this command creates a temporary copy (and consequently a fabric lock) of the configuration database.
Configuring Port Security Displaying Port Security Configuration Use the port-security clear vsan command to clear the pending session in the VSAN from any switch in the VSAN. switch# clear port-security session vsan 5 Displaying Port Security Configuration The show port-security database commands display the configured port security information. You can optionally specify a fWWN and a VSAN, or an interface and a VSAN in the show port-security command to view the output of the activated port security.
C H A P T E R Configuring Fabric Binding This chapter contains the following sections: • Configuring Fabric Binding, page 653 Configuring Fabric Binding Information About Fabric Binding The fabric binding feature ensures that ISLs are only enabled between specified switches in the fabric. Fabric binding is configured on a per-VSAN basis.
Configuring Fabric Binding Fabric Binding Enforcement Fabric Binding Port Security to a Fibre Channel device (a host or another switch), also identified by a WWN. By binding these two devices, you lock these two ports into a group (or list). Requires activation on a per VSAN basis.
Configuring Fabric Binding Enabling Fabric Binding Procedure Step 1 Enable the fabric configuration feature. Step 2 Configure a list of sWWNs and their corresponding domain IDs for devices that are allowed to access the fabric. Step 3 Activate the fabric binding database. Step 4 Copy the fabric binding active database to the fabric binding configuration database.
Configuring Fabric Binding About Fabric Binding Activation and Deactivation Command or Action Purpose Step 2 switch(config)# fabric-binding database Enters the fabric binding submode for the vsan vsan-id specified VSAN. Step 3 switch(config)# no fabric-binding database Deletes the fabric binding database for the vsan vsan-id specified VSAN.
Configuring Fabric Binding Forcing Fabric Binding Activation Forcing Fabric Binding Activation If the database activation is rejected due to one or more conflicts listed in the previous section, you may decide to proceed with the activation by using the force option. To forcefully activate the fabric binding database, perform this task: Procedure Command or Action...
Configuring Fabric Binding Deleting the Fabric Binding Database Deleting the Fabric Binding Database Use the no fabric-binding command in configuration mode to delete the configured database for a specified VSAN. switch(config)# no fabric-binding database vsan 10 Verifying Fabric Binding Information To display fabric binding information, perform one of the following tasks Procedure Command or Action...
C H A P T E R Configuring Fabric Configuration Servers This chapter contains the following sections: • Configuring Fabric Configuration Servers, page 661 Configuring Fabric Configuration Servers Information About FCS The Fabric Configuration Server (FCS) provides discovery of topology attributes and maintains a repository of configuration information of fabric elements.
Configuring Fabric Configuration Servers FCS Characteristics not known to both of them. FCS operations can be done only on those switches that are visible in the VSAN. M2 can send FCS requests only for VSAN 2 even though S3 is also a part of VSAN 1. Figure 77: FCSs in a VSAN Environment FCS Characteristics FCSs have the following characteristics:...
Configuring Fabric Configuration Servers FCS Name Specification FCS Name Specification You can specify if the unique name verification is for the entire fabric (globally) or only for locally (default) registered platforms. Note Set this command globally only if every switch in the fabric belong to the Cisco MDS 9000 Family or Cisco Nexus 5000 Series of switches.
C H A P T E R Configuring Port Tracking This chapter contains the following sections: • Configuring Port Tracking, page 665 Configuring Port Tracking Cisco Nexus 5000 Series switches offer the port tracking feature on physical Fibre Channel interfaces (but not on virtual Fibre Channel interfaces).
Configuring Port Tracking Configuring Port Tracking In the following figure, when the direct link 1 to the host fails, recovery can be immediate. However, when the ISL 2 fails between the two switches, recovery depends on TOVs, RSCNs, and other factors. Figure 78: Traffic Recovery Using Port Tracking The port tracking feature monitors and detects failures that cause topology changes and brings down the links connecting the attached devices.
Configuring Port Tracking Enabling Port Tracking • Do not track a linked port back to itself (for example, Port fc2/2 to Port fc2/4 and back to Port fc2/2) to avoid recursive dependency. Enabling Port Tracking The port tracking feature is disabled by default in Cisco Nexus 5000 Series switches. When you enable this feature, port tracking is globally enabled for the entire switch.
Configuring Port Tracking About Tracking Multiple Ports About Tracking Multiple Ports You can control the operational state of the linked port based on the operational states of multiple tracked ports. When more than one tracked port is associated with a linked port, the operational state of the linked port will be set to down only if all the associated tracked ports are down.
Configuring Port Tracking Monitoring Ports in a VSAN The specified VSAN does not have to be the same as the port VSAN of the linked port. Monitoring Ports in a VSAN To monitor a tracked port in a specific VSAN, perform this task : Procedure Command or Action Purpose...
Configuring Port Tracking Displaying Port Tracking Information Displaying Port Tracking Information The show commands display the current port tracking settings for the switch. The following example shows how to display tracked port configuration for a specific interface: switch# show interface fc2/1 fc2/1 is down (Administratively down) Hardware is Fibre Channel, FCOT is short wave laser w/o OFC (SN) Port WWN is 20:01:00:05:30:00:0d:de...
C H A P T E R Configuring SPAN This chapter contains the following sections: • Configuring SPAN, page 673 Configuring SPAN The Switched Port Analyzer (SPAN) feature (sometimes called port mirroring or port monitoring) selects network traffic for analysis by a network analyzer. The network analyzer can be a Cisco SwitchProbe, a Fibre Channel Analyzer, or other Remote Monitoring (RMON) probes.
Configuring SPAN SPAN Destinations • Cannot be a destination port. • Each source port can be configured with a direction (ingress, egress, or both) to monitor. For VLAN, VSAN, port channel, and SAN port channel sources, the monitored direction can only be ingress and applies to all physical ports in the group.
Configuring SPAN Configuring SPAN Configuring SPAN Creating and Deleting a SPAN Session You create a SPAN session by assigning a session number using the monitor command. If the session already exists, any additional configuration is added to that session. Procedure Command or Action Purpose Step 1...
Configuring SPAN Configuring Fibre Channel Destination Port The following example shows configuring an Ethernet SPAN destination port: switch# configure terminal switch(config)# interface ethernet 1/3 switch(config-if)# switchport monitor switch(config-if)# exit switch(config)# monitor session 2 switch(config-monitor)# destination interface ethernet 1/3 Configuring Fibre Channel Destination Port The SPAN destination port can only be a physical port on the switch.
Configuring SPAN Configuring Source Port Channels, VLANs, or VSANs Procedure Command or Action Purpose Step 1 switch(config-monitor)# source Configures sources and the traffic direction in which to duplicate packets. You can enter a range of Ethernet, Fibre interface type slot/port [rx | tx | both] Channel, or virtual Fibre Channel ports.
Configuring SPAN Activating a SPAN Session Procedure Command or Action Purpose Step 1 switch(config-monitor)# description description Applies a descriptive name to the SPAN session. The following example shows configuring a description of a SPAN session: switch# configure terminal switch(config)# monitor session 2 switch(config-monitor)# description monitoring ports fc2/2-fc2/4 Activating a SPAN Session The default is to keep the session state shut.
Configuring SPAN Displaying SPAN Information Displaying SPAN Information To display SPAN information, perform this task: Procedure Command or Action Purpose Step 1 switch# show monitor [session {all | session-number | Displays the SPAN configuration. range session-range} [brief]] This example shows how to display SPAN session information: switch# show monitor SESSION STATE...
Page 726
Configuring SPAN Displaying SPAN Information Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
C H A P T E R Troubleshooting • Troubleshooting, page 681 Troubleshooting Recovering a Lost Password This section describes how to recover a lost network administrator password using the console port of the switch. You can recover the network administrator password using one of two methods: •...
Troubleshooting Power Cycling the Switch Example: switch# configure terminal switch(config)# username admin password <new password> switch(config)# exit Step 3 Save the configuration. Example: switch# copy running-config startup-config Power Cycling the Switch If you cannot start a session on the switch that has network-admin privileges, you must recover the network administrator password by power cycling the switch.
Troubleshooting Using Ethanalyzer Example: switch(boot)# dir bootflash: Step 5 Load the Cisco NX-OS system software image. Example: In the following example, the system image filename is nx-os.bin: switch(boot) # load bootflash:nx-os.bin Step 6 Log in to the switch using the new administrator password. Example: switch login: admin Password: <new password>...
Page 730
Troubleshooting Using Ethanalyzer Command or Action Purpose Step 4 switch# ethanalyzer local interface Limits the length of the frame to capture. interface limit-frame-size Step 5 switch# ethanalyzer local interface Filters the types of packets to capture. interface capture-filter Step 6 switch# ethanalyzer local interface Filters the types of captured packets to display.
Page 731
Troubleshooting Using Ethanalyzer This example shows detailed captured data for one HSRP packet: switch(config)# ethanalyzer local interface mgmt capture-filter "tcp port 23" limit-captured-frames 1 Capturing on eth0 Frame 1 (60 bytes on wire, 60 bytes captured) Arrival Time: Jan 25, 2005 08:49:49.250719000 [Time delta from previous captured frame: 1106642989.250719000 seconds] [Time delta from previous displayed frame: 1106642989.250719000 seconds] [Time since reference or first frame: 1106642989.250719000 seconds]...
Troubleshooting Troubleshooting Fibre Channel Troubleshooting Fibre Channel fctrace The fctrace feature provides the following capabilities: • Trace the route followed by data traffic. • Compute inter-switch (hop-to-hop) latency. You can invoke fctrace by providing the FC ID, the N port WWN, or the device alias of the destination. The trace frame is routed normally through the network until it reaches the far edge of the fabric.
Troubleshooting fcping This example shows invoking fctrace using the device alias of the destination N port. switch# fctrace device-alias disk1 vsan 1 Route present for : 22:00:00:0c:50:02:ce:f8 20:00:00:05:30:00:31:1e(0xfffca9) fcping The fcping feature verifies reachability of a node by checking its end-to-end connectivity. You can invoke the fcping feature by providing the FC ID, the destination port WWN, or the device alias information.
Troubleshooting Verifying Switch Connectivity This example shows invoking fcping for the specified device alias of the destination: switch# fcping device-alias disk1 vsan 1 28 bytes from 22:00:00:0c:50:02:ce:f8 time = 1883 usec 28 bytes from 22:00:00:0c:50:02:ce:f8 time = 493 usec 28 bytes from 22:00:00:0c:50:02:ce:f8 time = 277 usec 28 bytes from 22:00:00:0c:50:02:ce:f8 time = 391 usec 28 bytes from 22:00:00:0c:50:02:ce:f8 time = 319 usec 5 frames sent, 5 frames received, 0 timeouts...
Troubleshooting show tech-support Command show tech-support Command The show tech-support command is useful when collecting a large amount of information about the switch for troubleshooting purposes. The output of this command can be provided to technical support representatives when reporting a problem. The show tech-support command displays the output of several show commands at once.
Page 736
Troubleshooting show tech-support Command • show interface brief • show interface • show running-config • show startup-config • show ip route • show arp • show monitor session all • show accounting log • show process • show process cpu •...
Troubleshooting show tech-support brief Command • show aclmgr status • show aclmgr internal dictionaries • show aclmgr internal log • show aclmgr internal ppf • show aclmgr internal state-cache • show access-lists • show platform software ethpm internal info all •...
Page 738
Troubleshooting show tech-support brief Command This example shows how to display a condensed view of the switch configurations: switch# show tech-support brief Switch Name : switch Switch Type Kickstart Image : 4.0(0) bootflash:///nuova-or-kickstart-nsg.4.0.0.001.bin System Image : 4.0(0) bootflash:/nuova-or-system-nsg.4.0.0.001.binnms-or-47 IP Address/Mask : 172.16.24.47/24 Switch WWN : 20:00:00:0d:ec:6b:cd:c0...
Troubleshooting show tech-support fc Command ------------------------------------------------------------------------------- mgmt0 172.16.24.47 1500 show tech-support fc Command Use the show tech-support fc command to obtain information about the FC configuration on your switch. The output of the show tech-support fc command includes the output of the following commands: •...
Page 740
Troubleshooting show tech-support fc Command • show fcs ie • show fctimer • show flogi database • show flogi internal info • show fspf • show fspf database • show tech-support rscn • show rscn internal vsan 1-4093 • show rscn internal event-history •...
Troubleshooting show tech-support platform Command • show zone analysis vsan 1-4093 • show zone ess vsan 1-4093 • show zone internal vsan 1-4093 • show zone internal change event-history vsan 1-4093 • show zone internal ifindex-table vsan 1-4093 • show zone internal merge event-history vsan 1-4093 •...
Page 742
Troubleshooting show tech-support platform Command • show platform fwm info ppf • show platform fwm info pss all • show platform hardware fwm info vlan all • show platform hardware fwm info pif all • show platform hardware fwm info lif all •...
Troubleshooting Default Settings for Troubleshooting Features • show system internal rib system-attributes • show system internal rib unicast • show system internal rib vsan-attributes • show system internal fcfwd fwidxmap if_index • show system internal fcfwd idxmap interface-to-port • show system internal fcfwd pcmap •...
Page 744
Troubleshooting Default Settings for Troubleshooting Features Cisco Nexus 5000 Series Switch CLI Software Configuration Guide OL-16597-01...
A P P E N D I X Appendix • Configuration Limits, page 699 Configuration Limits The features supported by the Cisco Nexus 5000 Series switch have maximum configuration limits. Some of these limits apply only when one or more Cisco Nexus 2000 Series Fabric Extender units are attached to the switch.
Page 746
Appendix Configuration Limits Table 102: Fibre Channel Environments Parameter Limit Device Aliases per fabric 8,000 Switches per physical fabric or VSAN Domains per VSAN Native FC Links per switch 16—Requires two N5K-M1008 expansion modules. FLOGIs or FDISCs per NPV port group Zones per virtual or physical F port (includes all VSANs) Zone sets per switch (includes all VSANs)
Page 747
Appendix Configuration Limits Table 103: General Parameters Parameter Limit Maximum Fabric Extenders per Cisco Nexus 5000 12 units Series switch Maximum Fabric Extenders dual-homed to a vPC 12 units Cisco Nexus 5000 Series switch pair Maximum number of hosts connected to Fabric 480 hosts Extenders connected to Cisco Nexus 5000 Series switches...
Page 749
I N D E X * (asterisk) AAA services first operational port[asterisk (asterisk) configuration options first operational port] remote accounting description active zone sets 1-Gigabit Ethernet considerations 10-Gigabit Ethernet enabling distribution address allocation cache description administrative speeds configuring administrative states accounting description authentication...
Page 750
Index BPDU guard default settings (continued) bridge ID rollback broadcast storms default users Brocade description native interop mode default VSANs buffer-to-buffer credits description build fabric frames default zones description description interoperability policies destination IDs exchange based flow based call home in-order delivery smart call home feature path selection...
Page 751
Index diagnostics (continued) enhanced zones (continued) runtime changing from basic zones Diffie-Hellman Challenge Handshake Authentication Protocol configuring default full database distribution documentation configuring default policies additional publications configuring default switch-wide zone policies obtaining description xlvi domain IDs modifying database allowed lists ethanalyzer assignment failures EtherChannel...
Page 752
Index fabric binding (continued) FCoE 1, 405 verifying status disable LAN traffic viewing active databases (procedure) fcping viewing EFMD statistics (procedure) default settings viewing violations (procedure) verifying switch connectivity Fabric Configuration Servers FCSs fabric login characteristics fabric port mode configuring names fabric pWWNs default settings zone membership...
Page 753
Index FSPF clearing counters hard zoning clearing VSAN counters description computing link cost HBA ports configuring globally configuring area FCIDs configuring Hello time intervals health monitoring diagnostics configuring link cost information configuring on a VSAN Hello time intervals configuring on interfaces configuring for FSPF dead time intervals description...
Page 755
Index MSTP (continued) MST region (continued) passwords hop-count mechanism administrator supported spanning-tree instances DHCHAP multicast storms setting administrator default strong characteristics persistent FC IDs configuring description N port identifier virtualization displaying N ports enabling FCS support purging fctrace PLOGI hard zoning name server zone enforcement port channeling...
Page 756
Index port security databases cleaning up RADIUS copying configuring servers copying active to config (procedure) configuring timeout intervals deleting configuring transmission retry counts displaying configuration default settings interactions example configurations manual configuration guidelines network environments merge guidelines RADIUS servers reactivating configuring timeout interval scenarios configuring transmission retry count...
Page 757
Index RSCN (continued) SCSI LUNs displaying information customized discovery multiple port IDs discovering targets suppressing domain format SW-RSCNs displaying information switch RSCN starting discoveries RSCN timers SD port mode configuration distribution using CFS description configuring interface modes RSTP 154, 158, 162, 175 SD ports active topology configuring...
Page 758
Index SNMPv3 (continued) specifying parameters for AAA servers TACACS+ soft zoning advantages over RADIUS description configuring source IDs configuring global timeout interval call home event format description exchange based displaying statistics flow based example configurations in-order delivery field descriptions path selection global preshared keys SPAN limitations...
Page 759
Index troubleshooting (continued) verifying switch connectivity trunk mode defined administrative default vendor-specific attributes configuring 509, 510 verifying NPV default settings virtual device contexts trunk ports Virtual Fibre Channel interfaces displaying information default settings trunk-allowed VSAN lists VLANs description extended range trunking reserved range comparison with port channels...
Page 760
Index VSANs (continued) zone sets (continued) timer configuration creating displaying information traffic isolation distributing configuration trunk-allowed enabling distribution trunking ports exporting VSAs exporting databases format features protocol options importing support description importing databases one-time distribution recovering from link isolations renaming viewing information zones world wide names...
Need help?
Do you have a question about the AP775A - Nexus Converged Network Switch 5010 and is the answer not in the manual?
Questions and answers