Index

Symbols

* (asterisk)

iSCSI node 4-156

A

AAA authentication

configuring 4-90

access control

enforcingiSCSI

enforcing access control 4-89

iSCSI 4-86, 4-88

access controlzoning based access controliSCSI

zoning based access control 4-89

ACL based access control

configuring for iSCSI 4-88

ACLs

configuring for iSCSI 4-88

advertisement packets

setting time intervals 5-188

ARP

clearing entries 5-178

displaying entries 5-178

ARP caches

clearing 7-219

displaying 7-219

authentication

CHAP option 4-135

iSCSI setup 4-134

local 4-91

MD5 5-189

mechanism 4-91

mutual CHAPmutual CHAP authentication 4-92

restricting iSLB initiatorinitiator authentication

restrictingiSLB

restricting iSLB initiators 4-116

simple text 5-189

See also MD5 authentication

See also simple text authentication

autogenerated iSCSI targetiSCSI

autogenerated target 4-90

auto-negotiation

configuring Gigabit Ethernet interfaces 7-213

B

B ports

configuring 2-35

interoperability mode 2-33

SAN extenders 2-34

bridge ports. See B ports

buffer sizes

configuring in FCIP profiles 2-28

C

CDP

configuring

CFS

iSLB config distribution 4-123

CHAP authentication 4-90, 4-115

configuring for iSCSI 4-135

CHAP challenge 4-92

CHAP response 4-92

CHAP user name 4-92

Cisco Discovery Protocol. See CDP

Cisco Transport Controller. See CTC

cloud discovery. See iSNS cloud discovery

congestion window monitoring. See CWM

core dumps

IPS modules 6-200

CTC

description 2-22

launching 2-22

Cut-through routing mode 4-95

CWM

configuring in FCIP profiles 2-27

D

default gateways. See IPv4 default gateways

default networks. See IPv4 default networks

differentiated services code point. See DSCP

direct memory access devices. See DMA-bridges

DMA-bridges

displaying statistics 6-206

DNS

default settings 5-195

DNS hosts

displaying information 5-194

DNS servers

configuring 5-193

domain names

defining 5-194

Domain Name System servers. See DNS servers

drivers

iSCSI 4-68

DSCP

configuring 2-36

dynamic initiator mode parameter

distributed with CFS 4-123

dynamic iSCSI initiator

converting 4-110

convert to staticiSCSI

convert dynamic initiator to static 4-81

dynamic mapping 4-72, 4-110

dynamic mappingiSCSI

dynamic mappingiSCSI

static mappingstatic mapping 4-72

E

ELP

verifying using Device Manager (procedure) 2-22

entity status inquiry. See ESI

E ports

configuring 2-37

trunking configuration 2-22

ESI

non-resp threshold 4-154

Ethernet MAC statistics

displaying 6-206

Ethernet PortChannels

adding Gigabit Ethernet interfaces 6-205

configuring 6-204

description 6-203

iSCSI 4-133

redundancy 2-10

explicit fabric logout 4-78

Extended Link Protocol. See ELP

external RADIUS server

CHAP 4-135

external RADIUS servers

CHAP 4-135

F

FCIP 4-67

advanced features 2-42

checking trunk status (procedure) 2-22

compression 2-53

configuring 2-12 to 2-30, ?? to 2-30

configuring using FCIP Wizard ?? to 2-18

default parameters 2-55

discarding packets 2-33

enabling 2-12

Gigabit Ethernet ports 7-211

high availability 2-8 to ??

IPS modules 2-6

IP storage services support 6-197

link failures 2-9

MPS-14/2 module 2-6

tape acceleration 2-46 to 2-53

time stamps 2-33

VE ports 2-6

verifying ELP (procedure) 2-22

verifying interfaces (procedure) 2-22

virtual ISLs 2-6

VRRP 2-10

write acceleration 2-42

FCIP compression

configuring 2-54

configuring (procedure) 2-15

description 2-53

displaying information 2-54

FCIP interfaces

configuring advanced features 2-30 to 2-37, ?? to 2-37

configuring peers 2-30

configuring QoS 2-36

creating 2-30

displaying information 2-38

parameters 2-8

FCIP links

B port interoperability mode 2-33

configuring 2-18

configuring peers 2-30

configuring QoS 2-36

creating 2-21

description 2-7

endpoints 2-7

initiating IP connections 2-32

TCP connections 2-7

FCIP listener ports

configuring 2-24

FCIP peers

configuring IP addresses 2-31

FCIP profiles

configuring listener ports 2-24

configuring TCP parameters 2-24 to 2-29, ?? to 2-30

creating 2-19

description 2-8

displaying information 2-20

FCIP tape acceleration

configuring 2-51

description 2-46 to 2-51

displaying information 2-52

FCIP TCP parameters

configuring buffer size 2-28

configuring CWM 2-27

configuring keepalive timeouts 2-25

configuring maximum jitter 2-28

configuring maximum retransmissions 2-25

configuring minimum retransmit timeouts 2-24

configuring PMTUs 2-25

configuring SACKs 2-26

configuring window management 2-26

displaying 2-29, 2-30

FCIP write acceleration

configuring 2-45

configuring (procedure) 2-15

description 2-42

displaying information 2-45

FCP

routing requests 4-70

Fibre Channel 4-67

iSCSI targets 4-72 to ??

Fibre Channel over IP. See FCIP

Fibre Channel targets

dynamic importing 4-73

dynamic mapping 4-73

Fibre Channel zoning-based access control 4-89

FPSF

load balancing (example) 2-9

frames

configuring MTU size 7-213

full core dumps

IPS modules 6-200

G

Gigabit Ethernet interface example 4-131

Gigabit Ethernet interfaces

configuring ?? to 6-205

configuring auto-negotiation 7-213

configuring high availability 6-201 to 6-205

configuring IPv4 7-212

configuring IPv6 addresses 8-232

configuring MTU frame sizes 7-213

configuring promiscuous mode 7-214

configuring static IPv4 routing 7-217

configuring VRRP 6-202

default parameters 7-220

displaying statistics 6-205 to 6-209

IPv4-ACL guidelines 7-217

subinterfaces 7-216

subnet requirements 7-216

verifying connectivity 7-214

Gigabit Ethernet subinterfaces

configuring VLANs 7-216

global authentication

paramter distributed 4-123

H

HA solution example 4-129

HBA port 4-77, 4-82

high availability

Ethernet PortChannel 4-133

Ethernet PortChannels 2-10

Fibre Channel PortChannels 2-11

VRRP 2-10, 4-132

VRRPVRRP-based high availability 4-132

I

ICMP

displaying statistics 6-208

IPv6 8-226

ICMP packets

IPv6 header format, figure 8-226

in-band management

IPFC 5-172

initiators

statically mapped iSCSI 4-107

Internet Control Message Protocol. See ICMP

Internet Storage Name Service. See iSNS

IP connections

active mode 2-32

initiating 2-32

passive mode 2-32

IPFC

configuration guidelines 5-172

configuring VSAN interfaces 5-172

description 5-172

enabling IPv4 routing 5-173

example configuration 5-173 to 5-176

IPS core dumps. See core dumps

IPS modules

CDP support 6-205

core dumps 6-200

FCIP 2-6

partial core dumps 6-200

port modes 7-211

software upgrades 6-199

supported features 6-197

IPS ports 4-72

modes 7-211

multiple connections 4-131

IP storage services

default parameters 6-209

IP Storage services modules. See IPS modules

IPv4

configuring Gigabit Ethernet interfaces 7-212

configuring management interfaces 5-169

configuring virtual routers 5-185

default settings 7-220

description 7-211

displaying statistics 7-219

transitioning to IPv6 8-239

IPv4-ACLs

guidelines for Gigabit Ethernet interfaces 7-217

IPv4 addresses

adding for VRRP 5-186

configuring in VSANs 5-172

configuring IPv6 and IPV6 protocol stacks 8-233

IPv6 protocol stacks 8-230

IPv4 default gateways

configuring 5-170, 5-171

description 5-170

IP static routing 5-170

static routes (tip) 5-171

verifying configuration 5-170

IPv4 default networks

description 5-170

IPv4 routing

configuring Gigabit Ethernet interfaces 7-217

disabling 5-173

displaying route tables 7-217

enabling 5-173

verifying configuration 5-173

IPv4 static routing

configuring 5-177

description 5-177

verifying configuration 5-177

IPv6

address types 8-223

configuring addressing 8-231

configuring IPv4 and IPv6 addresses 8-233

configuring management interfaces 5-169

configuring neighbor discovery parameters 8-235

configuring virtual routers 5-185

default settings 8-240

description 8-221 to 8-231

displaying information 8-239

dual IPv4 and IPv6 protocol stack applications, figure 8-231

dual IPv4 and IPv6 protocol stacks 8-230

dual IPv4 and IPv6 protocol stack technique, figure 8-230

enabling routing 8-231

enhancements over IPv4 8-221

ICMP 8-226

IPv6-ACL guidelines 8-238

neighbor discovery 8-227

path MTU discovery 8-227

router advertisement messages 8-229

router discovery 8-229

stateless autoconfiguration 8-229

static routes 8-237

transitioning from IPv4 8-239

verifying basic connectivity 8-233

verifying configuration 8-233

IPv6-ACLs

guidelines for IPv6 8-238

IPv6 addresses

adding for VRRP 5-186

configuring 8-231

configuring IPv4 and IPV6 protocol stacks 8-233

formats 8-222

link-local type 8-224

multicast type 8-225

prefix format 8-223

unicast type 8-223

IPv6 neighbor discovery

advertisement messages 8-227

description 8-227

neighbor solicitation message, figure 8-228

solicitation messages 8-227

IPv6 routing

enabling 8-231

IPv6 static routes

configuring 8-237

displaying the route table 8-237

IQN

formats 4-72

IQNs

formats 4-72

ISCSI

enforcing access control 4-89

iSCSI

access control 4-86 to 4-90

add initiator to zone database 4-88

advanced VSAN membershipadvanced VSAN membership 4-86

checking for WWN conflicts 4-82

configuring 4-67, 4-67 to ??, 4-70, ?? to 4-134

configuring AAA authentication 4-90, 4-91

configuring ACLs 4-88

configuring VRRP 4-132

default parameters 4-165

discovery phase 4-89

displaying global information 4-101

displaying statistics 4-98

drivers 4-68

enabling 4-68, 4-71

error 4-77

Fibre Channel targets 4-72 to ??

Gigabit Ethernet ports 7-211

GW flagiSCSI

gateway device 4-78

HA with host without multi-path software 4-128

initiator idle timeoutinitiator idle timeout

iSCSIinitiator idle timeout

configuring with Fabric Manager 4-78

initiator name 4-92

IPS module support 6-198

IQNs 4-76

login redirect 4-108, 4-109

LUN mapping for targets 4-141 to 4-147

MPS-14/2 module support 6-198

multiple IPS ports 4-131

PortChannel-based high availability 4-133

PortChannel-based high availabilityEthernet PortChannel-based high availability 4-133

protocol 4-67, 4-68

requests and responses 4-70

restrict an initiator to a specific user name for CHAP authentication 4-92

routing 4-67, 4-68

routing modes chartrouting modes chart for iSCSI 4-96

session creation 4-90

statically mapped initiators 4-107

transparent initiator mode 4-77

transparent mode initiator 4-136 to 4-141

users with local authentication 4-91

VSAN membership 4-84

VSAN membership example 4-85

VSAN membership for iSCSI interfaces 4-84

iSCSI authentication

CHAP option 4-135

configuring 4-90, 4-115

configuring mechanisms 4-91

external RADIUS servers 4-135

global override 4-91

local authentication 4-91

mechanisms 4-91

restricting on initiators 4-92

scenarios 4-134

setup guidelines 4-134

iSCSI-based access control 4-86, 4-88

iSCSI devices

example membership in VSANs 4-85

iscsi-gw 4-83

iSCSI high availability

configuring 4-127 to 4-134

iSCSI hosts

initiator identification 4-76

iSCSI initiators

assigning WWNs 4-80

configuring dynamic IP address mapping 4-79

configuring static IP address mapping 4-80

displaying information 4-103 to 4-106

displaying proxy information 4-100

dynamic mapping 4-79

making dynamic WWN mapping static 4-81

proxy mode 4-82

static mapping 4-80

transparent mode 4-77

verifying configuration 4-112

WWN assignments 4-79

iSCSI interfaces

configuring 4-76, 4-76 to 4-97

configuring listener ports 4-94

configuring listener portsiSCSI

listener port 4-94

configuring QoS 4-95

configuring routing mode 4-95 to 4-97

configuring routing modesiSCS

configuring routing modesrouting modes 4-95

configuring TCP tuning parameters 4-94

creating 4-71

creatingiSCSI

creating interfaces 4-71

displaying information 4-97

iSCSI LUs 4-72

iSCSI protocol 4-67

iSCSI server load balancing 4-106

iSCSI Server Load Balancing. See iSLB

iSCSI sessions

authentication 4-90 to 4-93

displaying information 4-101

iSCSI targets

advertising 4-74

dynamic importing 4-72

dynamic mapping 4-72

secondary access 4-129

static importing 4-73

static importingstatic mappingiSCSI targets

static mapping 4-73

transparent failover 4-127 to 4-131

iSCSI users

displaying information 4-106

iSCSI virtual targets

displaying information 4-106

iSLB

activating zones 4-113

auto-zoning 4-123

committing configuration changescommitting configuration changes

iSLB 4-124

configuration distribution 4-123 to ??, 4-123

configuration prerequisites 4-108

configuring 4-106

configuring initiators and targets 4-113

configuring VRRP 4-122

configuring zones 4-113

default settings 4-166

distributing configuration using CF 4-123

dynamic initiator mapping 4-110

enabling configuration distribution 4-124

initiator WWN assignment 4-106

load balancing algorithm 4-119 to 4-121

maximum initiators 4-108

static initiator configurationinitiator configuration

static iSLB 4-107

VSAN membership 4-111

zone set activation failed 4-114

iSlb

default settings 4-166

iSLB initiators 4-108

assigning WWNs 4-110

configuring 4-109 to 4-117

configuring IP addresses 4-109

configuring names 4-109

configuring static name mapping 4-109

description 4-108

dynamic initiator mapping 4-110

VSAN membership 4-111

iSLB initiator targets

configuring 4-113

description 4-113

iSLB sessions

maximum per IPS portiSLB

maximum sessions per IPS port 4-108

iSLB VRRP

displaying information 4-122

enabling 4-122

verifying configuration 4-122

iSMS servers

enabling 4-153

iSNS

client registration 4-154

cloud discovery 4-161, 4-165

configuring 4-155

configuring servers 4-152 to 4-155

description 4-147

ESI 4-154

iSNS client

description 4-147

iSNS clients

creating profiles 4-148

verifying configuration 4-149

iSNS cloud discovery

CFS distribution 4-164

description 4-162

displaying statistics 4-165

verifying configuration 4-163

verifying membership 4-164

verifying status 4-164

iSNS profiles

creating 4-148

verifying configuration 4-149

iSNS servers

configuration distribution 4-153

description 4-151

displaying configurations 4-155 to 4-161

enabling 4-153

example scenario 4-151

J

jitter

configuring estimated maximum in FCIP profiles 2-28

jumbo frames. See MTUs

K

keepalive timeouts

configuring in FCIP profiles 2-25

L

latency

forwarding 4-95

link-local addresses

description 8-224

format, figure 8-224

link redundancy

Ethernet PortChannel aggregation 6-203

load balancing 4-107, 4-108, 4-109

FSPF (example) 2-9

PortChannels (example) 2-9

weighted 4-112

load metric 4-112

lock the fabric 4-124

LUN 4-72

LUN mapping 4-129

iSCSI 4-141 to 4-147

LUNs

explicit access control 4-82

mapping and assignment 4-82

LUs 4-72

M

management interfaces

configuring for IPv4 5-169

configuring for IPv6 5-169

maximum retransmissions

configuring in FCIP profiles 2-25

MD5 authentication

VRRP 5-189

merge status conflictsiSLB

merge status conflictsCFS

merge status conflicts 4-126

mgmt0 interfaces

configuring IPv4 addresses 5-169

configuring IPv6 addresses 5-169

local IPv4 routing 5-171

minimum retransmit timeouts

configuring in FCIP profiles 2-24

MPS-14/2 modules 4-67, 4-68, 4-69, 4-71, 4-83, 4-89

CDP support 6-205

FCIP 2-6

port modes 7-211

software upgrades 6-199

MTUs

configuring frame sizes 7-213

configuring size

path discovery for IPv6 8-227

multicast addresses

IPv6 alternative to broadcast addresses 8-226

IPv6 format, figure 8-225

IPv6 solicited-node format, figure 8-226

multi-path software example 4-128

multiple VSANs

configuring 5-180

Multiprotocol Services modules. See MPS-14/2 modules

mutual CHAP authentication

configuring for iSCSI 4-92

configuring for iSLB 4-116

configuring for iSLBI 4-116

N

neighbor discovery

configuring parameters 8-235

verifying configuration 8-236

None authentication 4-90

NTP

time-stamp option 2-33

O

overlay VSANs

configuring 5-178

description 5-178

P

packets

discarding in FCIP 2-33

pass-thru routing mode 4-95

path MTUs. See PMTUs

PDU 4-95

PMTUs

configuring in FCIP profiles 2-25

PortChannel

interfaces 4-74

subinterfaces 4-74

PortChannels

configuring for FCIP high availability 2-9

IQN formats 4-72

load balancing (example) 2-9

member combinations 6-203

redundancy 2-11

port modes

IPS 7-211

ports

virtual E 2-6

promiscuous mode

configuring Gigabit Ethernet interfaces 7-214

protocol 4-67

protocols

VRRP 4-72

proxy initiator

configuringiSCSI

configuring proxy initiator 4-83

proxy initiator mode 4-76, 4-87

configuring 4-83

zoning 4-84

proxy initiator modeiSCSI

proxy initiator mode 4-82

Q

QoS

DSCP value 2-36

QoS values

configuring 4-95

R

RADIUS

AAA authentication 4-90, 4-116

redundancy

Ethernet PortChannels 2-10, 2-11

Fibre Channel PortChannels 2-11

VRRP 2-10

router discovery

IPv6 8-229

RSCNs 4-78

S

SACKs

configuring in FCIP profiles 2-26

SAN extension tuner

assigning SCSI read/write commands 3-61, 3-63

configuring 3-58

configuring data patterns 3-64

configuring nWWNs 3-60

configuring virtual N ports 3-61

data patterns 3-59

default settings 3-66

description 3-57

initialization 3-60

license requirements 3-59

tuning guidelines 3-58

verifying configuration 3-65

SCSI

routing requests 4-68

security parameter index. See SPI

selective acknowledgments. See SACKs

SPI

configuring virtual routers 5-189

statically imported iSCSI targets 4-129

static iSLB initiator

converting 4-110

static mapped iSCSI targetiSCSI

static mapped target 4-90

static mapping 4-110

static WWN mapping 4-87

store-and-forward routing mode 4-95

subnet masks

configuring IPv4 routes 5-177

subnets

requirements 7-216

switch management

in-band 5-172

switchovers

VRRP 2-10

T

TACACS+

AAA authentication 4-116

target discovery 4-155

TCP connections

FCIP profiles 2-8

TCP parameters

configuring in FCIP profiles 2-24 to 2-29, ?? to 2-30

TCP statistics

displaying 6-207

TCP tuning parameters 4-94

transient failure 4-78

transparent initiator mode 4-76

transparent initiator modeiSCSI

transparent initiator mode 4-82

troubleshooting

CTC 2-22

trunking

link state 2-22

trunking mode

FCIP interface 2-8

V

VE ports

description 2-6

FCIP 2-6

virtual E ports. See VE ports

virtual Fibre Channel host 4-69

virtual ISLs

description 2-6

Virtual LANs. See VLANs

virtual router IDs. See VR IDs

Virtual Router Redundancy Protocol. See VRRP

Virtual Router Redundancy Protocolprotocols

Virtual Router Redundancy 4-107

virtual routers

adding 5-185

adding primary IP addresses 5-186

authentication 5-189

configuring for IPv4 5-185

configuring for IPv6 5-185

default settings 5-195

deleting 5-185

initiating 5-185

setting priorities 5-187

VLANs

configuring on Gigabit Ethernet subinterfaces 7-216

description 7-215

VR IDs

configuring for IPv4 5-185

configuring for IPv6 5-185

description 5-183

mapping 5-183

VRRP 4-107

algorithm for selecting Gigabit Ethernet interfaces 4-119 to 4-121

backup switches 5-183

clearing statistics 5-193

configuring advertisement time intervals 5-188

configuring for Gigabit Ethernet interfaces 6-202

configuring for iSLB 4-122

configuring virtual routers 5-185

configuring VR IDs for IPv4 5-185

configuring VR IDs for IPv6 5-185

default settings 5-195

description 5-183, 6-201

displaying information 5-191 to 5-193

displaying statistics 5-193

group members 6-201

initiating virtual routers 5-185

IQN formats 4-72

iSCSI parameter change impact 4-119

iSLB 4-117 to 4-123

master switches 5-183

MD5 authentication 5-189

primary IP address 5-186

priority preemption 5-188

security authentication 5-189

setting priorities 5-187

setting priority 5-187

simple text authentication 5-189

VRRP group 4-85

VRRP–I f iSCSI login redirect 4-108, 4-109

VSAN interfaces

configuring IPv4 addresses 5-172

verifying configuration 5-173

VSANs

configuring multiple IPv4 subnets 5-180

example membership for iSCSI devices 4-85

gateway switches 5-171

IPv4 static routing 5-177

iSLB 4-111

iSLB initiators 4-111

overlaid routes 5-178

traffic routing between 5-167

VRRP 5-183

W

window management

configuring in FCIP profiles 2-26

WWNs

static binding 4-82

Z

zones

configuring and activating for iSLB 4-113

iSLB 4-113

zoning based access control

configuring for iSCSI 4-87

configuring for iSCSIiSCSI

configuring zoning based access control 4-87

Index

Symbols

* (asterisk)

iSCSI node 4-156

A

AAA authentication

configuring 4-90

access control

enforcingiSCSI

enforcing access control 4-89

iSCSI 4-86, 4-88

access controlzoning based access controliSCSI

zoning based access control 4-89

ACL based access control

configuring for iSCSI 4-88

ACLs

configuring for iSCSI 4-88

advertisement packets

setting time intervals 5-188

ARP

clearing entries 5-178

displaying entries 5-178

ARP caches

clearing 7-219

displaying 7-219

authentication

CHAP option 4-135

iSCSI setup 4-134

local 4-91

MD5 5-189

mechanism 4-91

mutual CHAPmutual CHAP authentication 4-92

restricting iSLB initiatorinitiator authentication

restrictingiSLB

restricting iSLB initiators 4-116

simple text 5-189

See also MD5 authentication

See also simple text authentication

autogenerated iSCSI targetiSCSI

autogenerated target 4-90

auto-negotiation

configuring Gigabit Ethernet interfaces 7-213

B

B ports

configuring 2-35

interoperability mode 2-33

SAN extenders 2-34

bridge ports. See B ports

buffer sizes

configuring in FCIP profiles 2-28

C

CDP

configuring

CFS

iSLB config distribution 4-123

CHAP authentication 4-90, 4-115

configuring for iSCSI 4-135

CHAP challenge 4-92

CHAP response 4-92

CHAP user name 4-92

Cisco Discovery Protocol. See CDP

Cisco Transport Controller. See CTC

cloud discovery. See iSNS cloud discovery

congestion window monitoring. See CWM

core dumps

IPS modules 6-200

CTC

description 2-22

launching 2-22

Cut-through routing mode 4-95

CWM

configuring in FCIP profiles 2-27

D

default gateways. See IPv4 default gateways

default networks. See IPv4 default networks

differentiated services code point. See DSCP

direct memory access devices. See DMA-bridges

DMA-bridges

displaying statistics 6-206

DNS

default settings 5-195

DNS hosts

displaying information 5-194

DNS servers

configuring 5-193

domain names

defining 5-194

Domain Name System servers. See DNS servers

drivers

iSCSI 4-68

DSCP

configuring 2-36

dynamic initiator mode parameter

distributed with CFS 4-123

dynamic iSCSI initiator

converting 4-110

convert to staticiSCSI

convert dynamic initiator to static 4-81

dynamic mapping 4-72, 4-110

dynamic mappingiSCSI

dynamic mappingiSCSI

static mappingstatic mapping 4-72

E

ELP

verifying using Device Manager (procedure) 2-22

entity status inquiry. See ESI

E ports

configuring 2-37

trunking configuration 2-22

ESI

non-resp threshold 4-154

Ethernet MAC statistics

displaying 6-206

Ethernet PortChannels

adding Gigabit Ethernet interfaces 6-205

configuring 6-204

description 6-203

iSCSI 4-133

redundancy 2-10

explicit fabric logout 4-78

Extended Link Protocol. See ELP

external RADIUS server

CHAP 4-135

external RADIUS servers

CHAP 4-135

F

FCIP 4-67

advanced features 2-42

checking trunk status (procedure) 2-22

compression 2-53

configuring 2-12 to 2-30, ?? to 2-30

configuring using FCIP Wizard ?? to 2-18

default parameters 2-55

discarding packets 2-33

enabling 2-12

Gigabit Ethernet ports 7-211

high availability 2-8 to ??

IPS modules 2-6

IP storage services support 6-197

link failures 2-9

MPS-14/2 module 2-6

tape acceleration 2-46 to 2-53

time stamps 2-33

VE ports 2-6

verifying ELP (procedure) 2-22

verifying interfaces (procedure) 2-22

virtual ISLs 2-6

VRRP 2-10

write acceleration 2-42

FCIP compression

configuring 2-54

configuring (procedure) 2-15

description 2-53

displaying information 2-54

FCIP interfaces

configuring advanced features 2-30 to 2-37, ?? to 2-37

configuring peers 2-30

configuring QoS 2-36

creating 2-30

displaying information 2-38

parameters 2-8

FCIP links

B port interoperability mode 2-33

configuring 2-18

configuring peers 2-30

configuring QoS 2-36

creating 2-21

description 2-7

endpoints 2-7

initiating IP connections 2-32

TCP connections 2-7

FCIP listener ports

configuring 2-24

FCIP peers

configuring IP addresses 2-31

FCIP profiles

configuring listener ports 2-24

configuring TCP parameters 2-24 to 2-29, ?? to 2-30

creating 2-19

description 2-8

displaying information 2-20

FCIP tape acceleration

configuring 2-51

description 2-46 to 2-51

displaying information 2-52

FCIP TCP parameters

configuring buffer size 2-28

configuring CWM 2-27

configuring keepalive timeouts 2-25

configuring maximum jitter 2-28

configuring maximum retransmissions 2-25

configuring minimum retransmit timeouts 2-24

configuring PMTUs 2-25

configuring SACKs 2-26

configuring window management 2-26

displaying 2-29, 2-30

FCIP write acceleration

configuring 2-45

configuring (procedure) 2-15

description 2-42

displaying information 2-45

FCP

routing requests 4-70

Fibre Channel 4-67

iSCSI targets 4-72 to ??

Fibre Channel over IP. See FCIP

Fibre Channel targets

dynamic importing 4-73

dynamic mapping 4-73

Fibre Channel zoning-based access control 4-89

FPSF

load balancing (example) 2-9

frames

configuring MTU size 7-213

full core dumps

IPS modules 6-200

G

Gigabit Ethernet interface example 4-131

Gigabit Ethernet interfaces

configuring ?? to 6-205

configuring auto-negotiation 7-213

configuring high availability 6-201 to 6-205

configuring IPv4 7-212

configuring IPv6 addresses 8-232

configuring MTU frame sizes 7-213

configuring promiscuous mode 7-214

configuring static IPv4 routing 7-217

configuring VRRP 6-202

default parameters 7-220

displaying statistics 6-205 to 6-209

IPv4-ACL guidelines 7-217

subinterfaces 7-216

subnet requirements 7-216

verifying connectivity 7-214

Gigabit Ethernet subinterfaces

configuring VLANs 7-216

global authentication

paramter distributed 4-123

H

HA solution example 4-129

HBA port 4-77, 4-82

high availability

Ethernet PortChannel 4-133

Ethernet PortChannels 2-10

Fibre Channel PortChannels 2-11

VRRP 2-10, 4-132

VRRPVRRP-based high availability 4-132

I

ICMP

displaying statistics 6-208

IPv6 8-226

ICMP packets

IPv6 header format, figure 8-226

in-band management

IPFC 5-172

initiators

statically mapped iSCSI 4-107

Internet Control Message Protocol. See ICMP

Internet Storage Name Service. See iSNS

IP connections

active mode 2-32

initiating 2-32

passive mode 2-32

IPFC

configuration guidelines 5-172

configuring VSAN interfaces 5-172

description 5-172

enabling IPv4 routing 5-173

example configuration 5-173 to 5-176

IPS core dumps. See core dumps

IPS modules

CDP support 6-205

core dumps 6-200

FCIP 2-6

partial core dumps 6-200

port modes 7-211

software upgrades 6-199

supported features 6-197

IPS ports 4-72

modes 7-211

multiple connections 4-131

IP storage services

default parameters 6-209

IP Storage services modules. See IPS modules

IPv4

configuring Gigabit Ethernet interfaces 7-212

configuring management interfaces 5-169

configuring virtual routers 5-185

default settings 7-220

description 7-211

displaying statistics 7-219

transitioning to IPv6 8-239

IPv4-ACLs

guidelines for Gigabit Ethernet interfaces 7-217

IPv4 addresses

adding for VRRP 5-186

configuring in VSANs 5-172

configuring IPv6 and IPV6 protocol stacks 8-233

IPv6 protocol stacks 8-230

IPv4 default gateways

configuring 5-170, 5-171

description 5-170

IP static routing 5-170

static routes (tip) 5-171

verifying configuration 5-170

IPv4 default networks

description 5-170

IPv4 routing

configuring Gigabit Ethernet interfaces 7-217

disabling 5-173

displaying route tables 7-217

enabling 5-173

verifying configuration 5-173

IPv4 static routing

configuring 5-177

description 5-177

verifying configuration 5-177

IPv6

address types 8-223

configuring addressing 8-231

configuring IPv4 and IPv6 addresses 8-233

configuring management interfaces 5-169

configuring neighbor discovery parameters 8-235

configuring virtual routers 5-185

default settings 8-240

description 8-221 to 8-231

displaying information 8-239

dual IPv4 and IPv6 protocol stack applications, figure 8-231

dual IPv4 and IPv6 protocol stacks 8-230

dual IPv4 and IPv6 protocol stack technique, figure 8-230

enabling routing 8-231

enhancements over IPv4 8-221

ICMP 8-226

IPv6-ACL guidelines 8-238

neighbor discovery 8-227

path MTU discovery 8-227

router advertisement messages 8-229

router discovery 8-229

stateless autoconfiguration 8-229

static routes 8-237

transitioning from IPv4 8-239

verifying basic connectivity 8-233

verifying configuration 8-233

IPv6-ACLs

guidelines for IPv6 8-238

IPv6 addresses

adding for VRRP 5-186

configuring 8-231

configuring IPv4 and IPV6 protocol stacks 8-233

formats 8-222

link-local type 8-224

multicast type 8-225

prefix format 8-223

unicast type 8-223

IPv6 neighbor discovery

advertisement messages 8-227

description 8-227

neighbor solicitation message, figure 8-228

solicitation messages 8-227

IPv6 routing

enabling 8-231

IPv6 static routes

configuring 8-237

displaying the route table 8-237

IQN

formats 4-72

IQNs

formats 4-72

ISCSI

enforcing access control 4-89

iSCSI

access control 4-86 to 4-90

add initiator to zone database 4-88

advanced VSAN membershipadvanced VSAN membership 4-86

checking for WWN conflicts 4-82

configuring 4-67, 4-67 to ??, 4-70, ?? to 4-134

configuring AAA authentication 4-90, 4-91

configuring ACLs 4-88

configuring VRRP 4-132

default parameters 4-165

discovery phase 4-89

displaying global information 4-101

displaying statistics 4-98

drivers 4-68

enabling 4-68, 4-71

error 4-77

Fibre Channel targets 4-72 to ??

Gigabit Ethernet ports 7-211

GW flagiSCSI

gateway device 4-78

HA with host without multi-path software 4-128

initiator idle timeoutinitiator idle timeout

iSCSIinitiator idle timeout

configuring with Fabric Manager 4-78

initiator name 4-92

IPS module support 6-198

IQNs 4-76

login redirect 4-108, 4-109

LUN mapping for targets 4-141 to 4-147

MPS-14/2 module support 6-198

multiple IPS ports 4-131

PortChannel-based high availability 4-133

PortChannel-based high availabilityEthernet PortChannel-based high availability 4-133

protocol 4-67, 4-68

requests and responses 4-70

restrict an initiator to a specific user name for CHAP authentication 4-92

routing 4-67, 4-68

routing modes chartrouting modes chart for iSCSI 4-96

session creation 4-90

statically mapped initiators 4-107

transparent initiator mode 4-77

transparent mode initiator 4-136 to 4-141

users with local authentication 4-91

VSAN membership 4-84

VSAN membership example 4-85

VSAN membership for iSCSI interfaces 4-84

iSCSI authentication

CHAP option 4-135

configuring 4-90, 4-115

configuring mechanisms 4-91

external RADIUS servers 4-135

global override 4-91

local authentication 4-91

mechanisms 4-91

restricting on initiators 4-92

scenarios 4-134

setup guidelines 4-134

iSCSI-based access control 4-86, 4-88

iSCSI devices

example membership in VSANs 4-85

iscsi-gw 4-83

iSCSI high availability

configuring 4-127 to 4-134

iSCSI hosts

initiator identification 4-76

iSCSI initiators

assigning WWNs 4-80

configuring dynamic IP address mapping 4-79

configuring static IP address mapping 4-80

displaying information 4-103 to 4-106

displaying proxy information 4-100

dynamic mapping 4-79

making dynamic WWN mapping static 4-81

proxy mode 4-82

static mapping 4-80

transparent mode 4-77

verifying configuration 4-112

WWN assignments 4-79

iSCSI interfaces

configuring 4-76, 4-76 to 4-97

configuring listener ports 4-94

configuring listener portsiSCSI

listener port 4-94

configuring QoS 4-95

configuring routing mode 4-95 to 4-97

configuring routing modesiSCS

configuring routing modesrouting modes 4-95

configuring TCP tuning parameters 4-94

creating 4-71

creatingiSCSI

creating interfaces 4-71

displaying information 4-97

iSCSI LUs 4-72

iSCSI protocol 4-67

iSCSI server load balancing 4-106

iSCSI Server Load Balancing. See iSLB

iSCSI sessions

authentication 4-90 to 4-93

displaying information 4-101

iSCSI targets

advertising 4-74

dynamic importing 4-72

dynamic mapping 4-72

secondary access 4-129

static importing 4-73

static importingstatic mappingiSCSI targets

static mapping 4-73

transparent failover 4-127 to 4-131

iSCSI users

displaying information 4-106

iSCSI virtual targets

displaying information 4-106

iSLB

activating zones 4-113

auto-zoning 4-123

committing configuration changescommitting configuration changes

iSLB 4-124

configuration distribution 4-123 to ??, 4-123

configuration prerequisites 4-108

configuring 4-106

configuring initiators and targets 4-113

configuring VRRP 4-122

configuring zones 4-113

default settings 4-166

distributing configuration using CF 4-123

dynamic initiator mapping 4-110

enabling configuration distribution 4-124

initiator WWN assignment 4-106

load balancing algorithm 4-119 to 4-121

maximum initiators 4-108

static initiator configurationinitiator configuration

static iSLB 4-107

VSAN membership 4-111

zone set activation failed 4-114

iSlb

default settings 4-166

iSLB initiators 4-108

assigning WWNs 4-110

configuring 4-109 to 4-117

configuring IP addresses 4-109

configuring names 4-109

configuring static name mapping 4-109

description 4-108

dynamic initiator mapping 4-110

VSAN membership 4-111

iSLB initiator targets

configuring 4-113

description 4-113

iSLB sessions

maximum per IPS portiSLB

maximum sessions per IPS port 4-108

iSLB VRRP

displaying information 4-122

enabling 4-122

verifying configuration 4-122

iSMS servers

enabling 4-153

iSNS

client registration 4-154

cloud discovery 4-161, 4-165

configuring 4-155

configuring servers 4-152 to 4-155

description 4-147

ESI 4-154

iSNS client

description 4-147

iSNS clients

creating profiles 4-148

verifying configuration 4-149

iSNS cloud discovery

CFS distribution 4-164

description 4-162

displaying statistics 4-165

verifying configuration 4-163

verifying membership 4-164

verifying status 4-164

iSNS profiles

creating 4-148

verifying configuration 4-149

iSNS servers

configuration distribution 4-153

description 4-151

displaying configurations 4-155 to 4-161

enabling 4-153

example scenario 4-151

J

jitter

configuring estimated maximum in FCIP profiles 2-28

jumbo frames. See MTUs

K

keepalive timeouts

configuring in FCIP profiles 2-25

L

latency

forwarding 4-95

link-local addresses

description 8-224

format, figure 8-224

link redundancy

Ethernet PortChannel aggregation 6-203

load balancing 4-107, 4-108, 4-109

FSPF (example) 2-9

PortChannels (example) 2-9

weighted 4-112

load metric 4-112

lock the fabric 4-124

LUN 4-72

LUN mapping 4-129

iSCSI 4-141 to 4-147

LUNs

explicit access control 4-82

mapping and assignment 4-82

LUs 4-72

M

management interfaces

configuring for IPv4 5-169

configuring for IPv6 5-169

maximum retransmissions

configuring in FCIP profiles 2-25

MD5 authentication

VRRP 5-189

merge status conflictsiSLB

merge status conflictsCFS

merge status conflicts 4-126

mgmt0 interfaces

configuring IPv4 addresses 5-169

configuring IPv6 addresses 5-169

local IPv4 routing 5-171

minimum retransmit timeouts

configuring in FCIP profiles 2-24

MPS-14/2 modules 4-67, 4-68, 4-69, 4-71, 4-83, 4-89

CDP support 6-205

FCIP 2-6

port modes 7-211

software upgrades 6-199

MTUs

configuring frame sizes 7-213

configuring size

path discovery for IPv6 8-227

multicast addresses

IPv6 alternative to broadcast addresses 8-226

IPv6 format, figure 8-225

IPv6 solicited-node format, figure 8-226

multi-path software example 4-128

multiple VSANs

configuring 5-180

Multiprotocol Services modules. See MPS-14/2 modules

mutual CHAP authentication

configuring for iSCSI 4-92

configuring for iSLB 4-116

configuring for iSLBI 4-116

N

neighbor discovery

configuring parameters 8-235

verifying configuration 8-236

None authentication 4-90

NTP

time-stamp option 2-33

O

overlay VSANs

configuring 5-178

description 5-178

P

packets

discarding in FCIP 2-33

pass-thru routing mode 4-95

path MTUs. See PMTUs

PDU 4-95

PMTUs

configuring in FCIP profiles 2-25

PortChannel

interfaces 4-74

subinterfaces 4-74

PortChannels

configuring for FCIP high availability 2-9

IQN formats 4-72

load balancing (example) 2-9

member combinations 6-203

redundancy 2-11

port modes

IPS 7-211

ports

virtual E 2-6

promiscuous mode

configuring Gigabit Ethernet interfaces 7-214

protocol 4-67

protocols

VRRP 4-72

proxy initiator

configuringiSCSI

configuring proxy initiator 4-83

proxy initiator mode 4-76, 4-87

configuring 4-83

zoning 4-84

proxy initiator modeiSCSI

proxy initiator mode 4-82

Q

QoS

DSCP value 2-36

QoS values

configuring 4-95

R

RADIUS

AAA authentication 4-90, 4-116

redundancy

Ethernet PortChannels 2-10, 2-11

Fibre Channel PortChannels 2-11

VRRP 2-10

router discovery

IPv6 8-229

RSCNs 4-78

S

SACKs

configuring in FCIP profiles 2-26

SAN extension tuner

assigning SCSI read/write commands 3-61, 3-63

configuring 3-58

configuring data patterns 3-64

configuring nWWNs 3-60

configuring virtual N ports 3-61

data patterns 3-59

default settings 3-66

description 3-57

initialization 3-60

license requirements 3-59

tuning guidelines 3-58

verifying configuration 3-65

SCSI

routing requests 4-68

security parameter index. See SPI

selective acknowledgments. See SACKs

SPI

configuring virtual routers 5-189

statically imported iSCSI targets 4-129

static iSLB initiator

converting 4-110

static mapped iSCSI targetiSCSI

static mapped target 4-90

static mapping 4-110

static WWN mapping 4-87

store-and-forward routing mode 4-95

subnet masks

configuring IPv4 routes 5-177

subnets

requirements 7-216

switch management

in-band 5-172

switchovers

VRRP 2-10

T

TACACS+

AAA authentication 4-116

target discovery 4-155

TCP connections

FCIP profiles 2-8

TCP parameters

configuring in FCIP profiles 2-24 to 2-29, ?? to 2-30

TCP statistics

displaying 6-207

TCP tuning parameters 4-94

transient failure 4-78

transparent initiator mode 4-76

transparent initiator modeiSCSI

transparent initiator mode 4-82

troubleshooting

CTC 2-22

trunking

link state 2-22

trunking mode

FCIP interface 2-8

V

VE ports

description 2-6

FCIP 2-6

virtual E ports. See VE ports

virtual Fibre Channel host 4-69

virtual ISLs

description 2-6

Virtual LANs. See VLANs

virtual router IDs. See VR IDs

Virtual Router Redundancy Protocol. See VRRP

Virtual Router Redundancy Protocolprotocols

Virtual Router Redundancy 4-107

virtual routers

adding 5-185

adding primary IP addresses 5-186

authentication 5-189

configuring for IPv4 5-185

configuring for IPv6 5-185

default settings 5-195

deleting 5-185

initiating 5-185

setting priorities 5-187

VLANs

configuring on Gigabit Ethernet subinterfaces 7-216

description 7-215

VR IDs

configuring for IPv4 5-185

configuring for IPv6 5-185

description 5-183

mapping 5-183

VRRP 4-107

algorithm for selecting Gigabit Ethernet interfaces 4-119 to 4-121

backup switches 5-183

clearing statistics 5-193

configuring advertisement time intervals 5-188

configuring for Gigabit Ethernet interfaces 6-202

configuring for iSLB 4-122

configuring virtual routers 5-185

configuring VR IDs for IPv4 5-185

configuring VR IDs for IPv6 5-185

default settings 5-195

description 5-183, 6-201

displaying information 5-191 to 5-193

displaying statistics 5-193

group members 6-201

initiating virtual routers 5-185

IQN formats 4-72

iSCSI parameter change impact 4-119

iSLB 4-117 to 4-123

master switches 5-183

MD5 authentication 5-189

primary IP address 5-186

priority preemption 5-188

security authentication 5-189

setting priorities 5-187

setting priority 5-187

simple text authentication 5-189

VRRP group 4-85

VRRP–I f iSCSI login redirect 4-108, 4-109

VSAN interfaces

configuring IPv4 addresses 5-172

verifying configuration 5-173

VSANs

configuring multiple IPv4 subnets 5-180

example membership for iSCSI devices 4-85

gateway switches 5-171

IPv4 static routing 5-177

iSLB 4-111

iSLB initiators 4-111

overlaid routes 5-178

traffic routing between 5-167

VRRP 5-183

W

window management

configuring in FCIP profiles 2-26

WWNs

static binding 4-82

Z

zones

configuring and activating for iSLB 4-113

iSLB 4-113

zoning based access control

configuring for iSCSI 4-87

configuring for iSCSIiSCSI

configuring zoning based access control 4-87