Index
iSCSI node 4-156
configuring 4-90
enforcing access control 4-89
iSCSI 4-86, 4-88
access controlzoning based access controliSCSI
zoning based access control 4-89
configuring for iSCSI 4-88
configuring for iSCSI 4-88
setting time intervals 5-188
clearing entries 5-178
displaying entries 5-178
clearing 7-219
displaying 7-219
CHAP option 4-135
iSCSI setup 4-134
local 4-91
MD5 5-189
mechanism 4-91
mutual CHAPmutual CHAP authentication 4-92
restricting iSLB initiatorinitiator authentication
restricting iSLB initiators 4-116
simple text 5-189
See also simple text authentication
autogenerated iSCSI targetiSCSI
autogenerated target 4-90
configuring Gigabit Ethernet interfaces 7-213
configuring 2-35
interoperability mode 2-33
SAN extenders 2-34
configuring in FCIP profiles 2-28
iSLB config distribution 4-123
CHAP authentication 4-90, 4-115
configuring for iSCSI 4-135
CHAP challenge 4-92
CHAP response 4-92
CHAP user name 4-92
Cisco Discovery Protocol. See CDP
Cisco Transport Controller. See CTC
cloud discovery. See iSNS cloud discovery
congestion window monitoring. See CWM
IPS modules 6-200
description 2-22
launching 2-22
Cut-through routing mode 4-95
configuring in FCIP profiles 2-27
default gateways. See IPv4 default gateways
default networks. See IPv4 default networks
differentiated services code point. See DSCP
direct memory access devices. See DMA-bridges
displaying statistics 6-206
default settings 5-195
displaying information 5-194
configuring 5-193
defining 5-194
Domain Name System servers. See DNS servers
iSCSI 4-68
configuring 2-36
dynamic initiator mode parameter
distributed with CFS 4-123
converting 4-110
convert dynamic initiator to static 4-81
dynamic mapping 4-72, 4-110
static mappingstatic mapping 4-72
verifying using Device Manager (procedure) 2-22
entity status inquiry. See ESI
configuring 2-37
trunking configuration 2-22
non-resp threshold 4-154
displaying 6-206
adding Gigabit Ethernet interfaces 6-205
configuring 6-204
description 6-203
iSCSI 4-133
redundancy 2-10
explicit fabric logout 4-78
Extended Link Protocol. See ELP
CHAP 4-135
CHAP 4-135
FCIP 4-67
advanced features 2-42
checking trunk status (procedure) 2-22
compression 2-53
configuring 2-12 to 2-30, ?? to 2-30
configuring using FCIP Wizard ?? to 2-18
default parameters 2-55
discarding packets 2-33
enabling 2-12
Gigabit Ethernet ports 7-211
high availability 2-8 to ??
IPS modules 2-6
IP storage services support 6-197
link failures 2-9
MPS-14/2 module 2-6
tape acceleration 2-46 to 2-53
time stamps 2-33
VE ports 2-6
verifying ELP (procedure) 2-22
verifying interfaces (procedure) 2-22
virtual ISLs 2-6
VRRP 2-10
write acceleration 2-42
configuring 2-54
configuring (procedure) 2-15
description 2-53
displaying information 2-54
configuring advanced features 2-30 to 2-37, ?? to 2-37
configuring peers 2-30
configuring QoS 2-36
creating 2-30
displaying information 2-38
parameters 2-8
B port interoperability mode 2-33
configuring 2-18
configuring peers 2-30
configuring QoS 2-36
creating 2-21
description 2-7
endpoints 2-7
initiating IP connections 2-32
TCP connections 2-7
configuring 2-24
configuring IP addresses 2-31
configuring listener ports 2-24
configuring TCP parameters 2-24 to 2-29, ?? to 2-30
creating 2-19
description 2-8
displaying information 2-20
configuring 2-51
description 2-46 to 2-51
displaying information 2-52
configuring buffer size 2-28
configuring CWM 2-27
configuring keepalive timeouts 2-25
configuring maximum jitter 2-28
configuring maximum retransmissions 2-25
configuring minimum retransmit timeouts 2-24
configuring PMTUs 2-25
configuring SACKs 2-26
configuring window management 2-26
displaying 2-29, 2-30
configuring 2-45
configuring (procedure) 2-15
description 2-42
displaying information 2-45
routing requests 4-70
Fibre Channel 4-67
iSCSI targets 4-72 to ??
Fibre Channel over IP. See FCIP
dynamic importing 4-73
dynamic mapping 4-73
Fibre Channel zoning-based access control 4-89
load balancing (example) 2-9
configuring MTU size 7-213
IPS modules 6-200
Gigabit Ethernet interface example 4-131
configuring ?? to 6-205
configuring auto-negotiation 7-213
configuring high availability 6-201 to 6-205
configuring IPv4 7-212
configuring IPv6 addresses 8-232
configuring MTU frame sizes 7-213
configuring promiscuous mode 7-214
configuring static IPv4 routing 7-217
configuring VRRP 6-202
default parameters 7-220
displaying statistics 6-205 to 6-209
IPv4-ACL guidelines 7-217
subinterfaces 7-216
subnet requirements 7-216
verifying connectivity 7-214
Gigabit Ethernet subinterfaces
configuring VLANs 7-216
paramter distributed 4-123
HA solution example 4-129
HBA port 4-77, 4-82
Ethernet PortChannel 4-133
Ethernet PortChannels 2-10
Fibre Channel PortChannels 2-11
VRRP 2-10, 4-132
VRRPVRRP-based high availability 4-132
displaying statistics 6-208
IPv6 8-226
IPv6 header format, figure 8-226
IPFC 5-172
statically mapped iSCSI 4-107
Internet Control Message Protocol. See ICMP
Internet Storage Name Service. See iSNS
active mode 2-32
initiating 2-32
passive mode 2-32
configuration guidelines 5-172
configuring VSAN interfaces 5-172
description 5-172
enabling IPv4 routing 5-173
example configuration 5-173 to 5-176
IPS core dumps. See core dumps
CDP support 6-205
core dumps 6-200
FCIP 2-6
partial core dumps 6-200
port modes 7-211
software upgrades 6-199
supported features 6-197
IPS ports 4-72
modes 7-211
multiple connections 4-131
default parameters 6-209
IP Storage services modules. See IPS modules
configuring Gigabit Ethernet interfaces 7-212
configuring management interfaces 5-169
configuring virtual routers 5-185
default settings 7-220
description 7-211
displaying statistics 7-219
transitioning to IPv6 8-239
guidelines for Gigabit Ethernet interfaces 7-217
adding for VRRP 5-186
configuring in VSANs 5-172
configuring IPv6 and IPV6 protocol stacks 8-233
IPv6 protocol stacks 8-230
configuring 5-170, 5-171
description 5-170
IP static routing 5-170
static routes (tip) 5-171
verifying configuration 5-170
description 5-170
configuring Gigabit Ethernet interfaces 7-217
disabling 5-173
displaying route tables 7-217
enabling 5-173
verifying configuration 5-173
configuring 5-177
description 5-177
verifying configuration 5-177
address types 8-223
configuring addressing 8-231
configuring IPv4 and IPv6 addresses 8-233
configuring management interfaces 5-169
configuring neighbor discovery parameters 8-235
configuring virtual routers 5-185
default settings 8-240
description 8-221 to 8-231
displaying information 8-239
dual IPv4 and IPv6 protocol stack applications, figure 8-231
dual IPv4 and IPv6 protocol stacks 8-230
dual IPv4 and IPv6 protocol stack technique, figure 8-230
enabling routing 8-231
enhancements over IPv4 8-221
ICMP 8-226
IPv6-ACL guidelines 8-238
neighbor discovery 8-227
path MTU discovery 8-227
router advertisement messages 8-229
router discovery 8-229
stateless autoconfiguration 8-229
static routes 8-237
transitioning from IPv4 8-239
verifying basic connectivity 8-233
verifying configuration 8-233
guidelines for IPv6 8-238
adding for VRRP 5-186
configuring 8-231
configuring IPv4 and IPV6 protocol stacks 8-233
formats 8-222
link-local type 8-224
multicast type 8-225
prefix format 8-223
unicast type 8-223
advertisement messages 8-227
description 8-227
neighbor solicitation message, figure 8-228
solicitation messages 8-227
enabling 8-231
configuring 8-237
displaying the route table 8-237
formats 4-72
formats 4-72
enforcing access control 4-89
access control 4-86 to 4-90
add initiator to zone database 4-88
advanced VSAN membershipadvanced VSAN membership 4-86
checking for WWN conflicts 4-82
configuring 4-67, 4-67 to ??, 4-70, ?? to 4-134
configuring AAA authentication 4-90, 4-91
configuring ACLs 4-88
configuring VRRP 4-132
default parameters 4-165
discovery phase 4-89
displaying global information 4-101
displaying statistics 4-98
drivers 4-68
enabling 4-68, 4-71
error 4-77
Fibre Channel targets 4-72 to ??
Gigabit Ethernet ports 7-211
gateway device 4-78
HA with host without multi-path software 4-128
initiator idle timeoutinitiator idle timeout
configuring with Fabric Manager 4-78
initiator name 4-92
IPS module support 6-198
IQNs 4-76
login redirect 4-108, 4-109
LUN mapping for targets 4-141 to 4-147
MPS-14/2 module support 6-198
multiple IPS ports 4-131
PortChannel-based high availability 4-133
PortChannel-based high availabilityEthernet PortChannel-based high availability 4-133
protocol 4-67, 4-68
requests and responses 4-70
restrict an initiator to a specific user name for CHAP authentication 4-92
routing 4-67, 4-68
routing modes chartrouting modes chart for iSCSI 4-96
session creation 4-90
statically mapped initiators 4-107
transparent initiator mode 4-77
transparent mode initiator 4-136 to 4-141
users with local authentication 4-91
VSAN membership 4-84
VSAN membership example 4-85
VSAN membership for iSCSI interfaces 4-84
CHAP option 4-135
configuring 4-90, 4-115
configuring mechanisms 4-91
external RADIUS servers 4-135
global override 4-91
local authentication 4-91
mechanisms 4-91
restricting on initiators 4-92
scenarios 4-134
setup guidelines 4-134
iSCSI-based access control 4-86, 4-88
example membership in VSANs 4-85
iscsi-gw 4-83
configuring 4-127 to 4-134
initiator identification 4-76
assigning WWNs 4-80
configuring dynamic IP address mapping 4-79
configuring static IP address mapping 4-80
displaying information 4-103 to 4-106
displaying proxy information 4-100
dynamic mapping 4-79
making dynamic WWN mapping static 4-81
proxy mode 4-82
static mapping 4-80
transparent mode 4-77
verifying configuration 4-112
WWN assignments 4-79
configuring 4-76, 4-76 to 4-97
configuring listener ports 4-94
configuring listener portsiSCSI
listener port 4-94
configuring QoS 4-95
configuring routing mode 4-95 to 4-97
configuring routing modesrouting modes 4-95
configuring TCP tuning parameters 4-94
creating 4-71
creating interfaces 4-71
displaying information 4-97
iSCSI LUs 4-72
iSCSI protocol 4-67
iSCSI server load balancing 4-106
iSCSI Server Load Balancing. See iSLB
authentication 4-90 to 4-93
displaying information 4-101
advertising 4-74
dynamic importing 4-72
dynamic mapping 4-72
secondary access 4-129
static importing 4-73
static importingstatic mappingiSCSI targets
static mapping 4-73
transparent failover 4-127 to 4-131
displaying information 4-106
displaying information 4-106
activating zones 4-113
auto-zoning 4-123
committing configuration changescommitting configuration changes
iSLB 4-124
configuration distribution 4-123 to ??, 4-123
configuration prerequisites 4-108
configuring 4-106
configuring initiators and targets 4-113
configuring VRRP 4-122
configuring zones 4-113
default settings 4-166
distributing configuration using CF 4-123
dynamic initiator mapping 4-110
enabling configuration distribution 4-124
initiator WWN assignment 4-106
load balancing algorithm 4-119 to 4-121
maximum initiators 4-108
static initiator configurationinitiator configuration
static iSLB 4-107
VSAN membership 4-111
zone set activation failed 4-114
default settings 4-166
iSLB initiators 4-108
assigning WWNs 4-110
configuring 4-109 to 4-117
configuring IP addresses 4-109
configuring names 4-109
configuring static name mapping 4-109
description 4-108
dynamic initiator mapping 4-110
VSAN membership 4-111
configuring 4-113
description 4-113
maximum sessions per IPS port 4-108
displaying information 4-122
enabling 4-122
verifying configuration 4-122
enabling 4-153
client registration 4-154
cloud discovery 4-161, 4-165
configuring 4-155
configuring servers 4-152 to 4-155
description 4-147
ESI 4-154
description 4-147
creating profiles 4-148
verifying configuration 4-149
CFS distribution 4-164
description 4-162
displaying statistics 4-165
verifying configuration 4-163
verifying membership 4-164
verifying status 4-164
creating 4-148
verifying configuration 4-149
configuration distribution 4-153
description 4-151
displaying configurations 4-155 to 4-161
enabling 4-153
example scenario 4-151
configuring estimated maximum in FCIP profiles 2-28
configuring in FCIP profiles 2-25
forwarding 4-95
description 8-224
format, figure 8-224
Ethernet PortChannel aggregation 6-203
load balancing 4-107, 4-108, 4-109
FSPF (example) 2-9
PortChannels (example) 2-9
weighted 4-112
load metric 4-112
lock the fabric 4-124
LUN 4-72
LUN mapping 4-129
iSCSI 4-141 to 4-147
explicit access control 4-82
mapping and assignment 4-82
LUs 4-72
configuring for IPv4 5-169
configuring for IPv6 5-169
configuring in FCIP profiles 2-25
VRRP 5-189
merge status conflicts 4-126
configuring IPv4 addresses 5-169
configuring IPv6 addresses 5-169
local IPv4 routing 5-171
configuring in FCIP profiles 2-24
MPS-14/2 modules 4-67, 4-68, 4-69, 4-71, 4-83, 4-89
CDP support 6-205
FCIP 2-6
port modes 7-211
software upgrades 6-199
configuring frame sizes 7-213
path discovery for IPv6 8-227
IPv6 alternative to broadcast addresses 8-226
IPv6 format, figure 8-225
IPv6 solicited-node format, figure 8-226
multi-path software example 4-128
configuring 5-180
Multiprotocol Services modules. See MPS-14/2 modules
configuring for iSCSI 4-92
configuring for iSLB 4-116
configuring for iSLBI 4-116
configuring parameters 8-235
verifying configuration 8-236
None authentication 4-90
time-stamp option 2-33
configuring 5-178
description 5-178
discarding in FCIP 2-33
pass-thru routing mode 4-95
PDU 4-95
configuring in FCIP profiles 2-25
interfaces 4-74
subinterfaces 4-74
configuring for FCIP high availability 2-9
IQN formats 4-72
load balancing (example) 2-9
member combinations 6-203
redundancy 2-11
IPS 7-211
virtual E 2-6
configuring Gigabit Ethernet interfaces 7-214
protocol 4-67
VRRP 4-72
configuring proxy initiator 4-83
proxy initiator mode 4-76, 4-87
configuring 4-83
zoning 4-84
proxy initiator mode 4-82
DSCP value 2-36
configuring 4-95
AAA authentication 4-90, 4-116
Ethernet PortChannels 2-10, 2-11
Fibre Channel PortChannels 2-11
VRRP 2-10
IPv6 8-229
RSCNs 4-78
configuring in FCIP profiles 2-26
assigning SCSI read/write commands 3-61, 3-63
configuring 3-58
configuring data patterns 3-64
configuring nWWNs 3-60
configuring virtual N ports 3-61
data patterns 3-59
default settings 3-66
description 3-57
initialization 3-60
license requirements 3-59
tuning guidelines 3-58
verifying configuration 3-65
routing requests 4-68
security parameter index. See SPI
selective acknowledgments. See SACKs
configuring virtual routers 5-189
statically imported iSCSI targets 4-129
converting 4-110
static mapped iSCSI targetiSCSI
static mapped target 4-90
static mapping 4-110
static WWN mapping 4-87
store-and-forward routing mode 4-95
configuring IPv4 routes 5-177
requirements 7-216
in-band 5-172
VRRP 2-10
AAA authentication 4-116
target discovery 4-155
FCIP profiles 2-8
configuring in FCIP profiles 2-24 to 2-29, ?? to 2-30
displaying 6-207
TCP tuning parameters 4-94
transient failure 4-78
transparent initiator mode 4-76
transparent initiator modeiSCSI
transparent initiator mode 4-82
CTC 2-22
link state 2-22
FCIP interface 2-8
description 2-6
FCIP 2-6
virtual Fibre Channel host 4-69
description 2-6
virtual router IDs. See VR IDs
Virtual Router Redundancy Protocol. See VRRP
Virtual Router Redundancy Protocolprotocols
Virtual Router Redundancy 4-107
adding 5-185
adding primary IP addresses 5-186
authentication 5-189
configuring for IPv4 5-185
configuring for IPv6 5-185
default settings 5-195
deleting 5-185
initiating 5-185
setting priorities 5-187
configuring on Gigabit Ethernet subinterfaces 7-216
description 7-215
configuring for IPv4 5-185
configuring for IPv6 5-185
description 5-183
mapping 5-183
VRRP 4-107
algorithm for selecting Gigabit Ethernet interfaces 4-119 to 4-121
backup switches 5-183
clearing statistics 5-193
configuring advertisement time intervals 5-188
configuring for Gigabit Ethernet interfaces 6-202
configuring for iSLB 4-122
configuring virtual routers 5-185
configuring VR IDs for IPv4 5-185
configuring VR IDs for IPv6 5-185
default settings 5-195
description 5-183, 6-201
displaying information 5-191 to 5-193
displaying statistics 5-193
group members 6-201
initiating virtual routers 5-185
IQN formats 4-72
iSCSI parameter change impact 4-119
iSLB 4-117 to 4-123
master switches 5-183
MD5 authentication 5-189
primary IP address 5-186
priority preemption 5-188
security authentication 5-189
setting priorities 5-187
setting priority 5-187
simple text authentication 5-189
VRRP group 4-85
VRRP–I f iSCSI login redirect 4-108, 4-109
configuring IPv4 addresses 5-172
verifying configuration 5-173
configuring multiple IPv4 subnets 5-180
example membership for iSCSI devices 4-85
gateway switches 5-171
IPv4 static routing 5-177
iSLB 4-111
iSLB initiators 4-111
overlaid routes 5-178
traffic routing between 5-167
VRRP 5-183
configuring in FCIP profiles 2-26
static binding 4-82
configuring and activating for iSLB 4-113
iSLB 4-113
configuring for iSCSI 4-87
configuring zoning based access control 4-87
Index
iSCSI node 4-156
configuring 4-90
enforcing access control 4-89
iSCSI 4-86, 4-88
access controlzoning based access controliSCSI
zoning based access control 4-89
configuring for iSCSI 4-88
configuring for iSCSI 4-88
setting time intervals 5-188
clearing entries 5-178
displaying entries 5-178
clearing 7-219
displaying 7-219
CHAP option 4-135
iSCSI setup 4-134
local 4-91
MD5 5-189
mechanism 4-91
mutual CHAPmutual CHAP authentication 4-92
restricting iSLB initiatorinitiator authentication
restricting iSLB initiators 4-116
simple text 5-189
See also simple text authentication
autogenerated iSCSI targetiSCSI
autogenerated target 4-90
configuring Gigabit Ethernet interfaces 7-213
configuring 2-35
interoperability mode 2-33
SAN extenders 2-34
configuring in FCIP profiles 2-28
iSLB config distribution 4-123
CHAP authentication 4-90, 4-115
configuring for iSCSI 4-135
CHAP challenge 4-92
CHAP response 4-92
CHAP user name 4-92
Cisco Discovery Protocol. See CDP
Cisco Transport Controller. See CTC
cloud discovery. See iSNS cloud discovery
congestion window monitoring. See CWM
IPS modules 6-200
description 2-22
launching 2-22
Cut-through routing mode 4-95
configuring in FCIP profiles 2-27
default gateways. See IPv4 default gateways
default networks. See IPv4 default networks
differentiated services code point. See DSCP
direct memory access devices. See DMA-bridges
displaying statistics 6-206
default settings 5-195
displaying information 5-194
configuring 5-193
defining 5-194
Domain Name System servers. See DNS servers
iSCSI 4-68
configuring 2-36
dynamic initiator mode parameter
distributed with CFS 4-123
converting 4-110
convert dynamic initiator to static 4-81
dynamic mapping 4-72, 4-110
static mappingstatic mapping 4-72
verifying using Device Manager (procedure) 2-22
entity status inquiry. See ESI
configuring 2-37
trunking configuration 2-22
non-resp threshold 4-154
displaying 6-206
adding Gigabit Ethernet interfaces 6-205
configuring 6-204
description 6-203
iSCSI 4-133
redundancy 2-10
explicit fabric logout 4-78
Extended Link Protocol. See ELP
CHAP 4-135
CHAP 4-135
FCIP 4-67
advanced features 2-42
checking trunk status (procedure) 2-22
compression 2-53
configuring 2-12 to 2-30, ?? to 2-30
configuring using FCIP Wizard ?? to 2-18
default parameters 2-55
discarding packets 2-33
enabling 2-12
Gigabit Ethernet ports 7-211
high availability 2-8 to ??
IPS modules 2-6
IP storage services support 6-197
link failures 2-9
MPS-14/2 module 2-6
tape acceleration 2-46 to 2-53
time stamps 2-33
VE ports 2-6
verifying ELP (procedure) 2-22
verifying interfaces (procedure) 2-22
virtual ISLs 2-6
VRRP 2-10
write acceleration 2-42
configuring 2-54
configuring (procedure) 2-15
description 2-53
displaying information 2-54
configuring advanced features 2-30 to 2-37, ?? to 2-37
configuring peers 2-30
configuring QoS 2-36
creating 2-30
displaying information 2-38
parameters 2-8
B port interoperability mode 2-33
configuring 2-18
configuring peers 2-30
configuring QoS 2-36
creating 2-21
description 2-7
endpoints 2-7
initiating IP connections 2-32
TCP connections 2-7
configuring 2-24
configuring IP addresses 2-31
configuring listener ports 2-24
configuring TCP parameters 2-24 to 2-29, ?? to 2-30
creating 2-19
description 2-8
displaying information 2-20
configuring 2-51
description 2-46 to 2-51
displaying information 2-52
configuring buffer size 2-28
configuring CWM 2-27
configuring keepalive timeouts 2-25
configuring maximum jitter 2-28
configuring maximum retransmissions 2-25
configuring minimum retransmit timeouts 2-24
configuring PMTUs 2-25
configuring SACKs 2-26
configuring window management 2-26
displaying 2-29, 2-30
configuring 2-45
configuring (procedure) 2-15
description 2-42
displaying information 2-45
routing requests 4-70
Fibre Channel 4-67
iSCSI targets 4-72 to ??
Fibre Channel over IP. See FCIP
dynamic importing 4-73
dynamic mapping 4-73
Fibre Channel zoning-based access control 4-89
load balancing (example) 2-9
configuring MTU size 7-213
IPS modules 6-200
Gigabit Ethernet interface example 4-131
configuring ?? to 6-205
configuring auto-negotiation 7-213
configuring high availability 6-201 to 6-205
configuring IPv4 7-212
configuring IPv6 addresses 8-232
configuring MTU frame sizes 7-213
configuring promiscuous mode 7-214
configuring static IPv4 routing 7-217
configuring VRRP 6-202
default parameters 7-220
displaying statistics 6-205 to 6-209
IPv4-ACL guidelines 7-217
subinterfaces 7-216
subnet requirements 7-216
verifying connectivity 7-214
Gigabit Ethernet subinterfaces
configuring VLANs 7-216
paramter distributed 4-123
HA solution example 4-129
HBA port 4-77, 4-82
Ethernet PortChannel 4-133
Ethernet PortChannels 2-10
Fibre Channel PortChannels 2-11
VRRP 2-10, 4-132
VRRPVRRP-based high availability 4-132
displaying statistics 6-208
IPv6 8-226
IPv6 header format, figure 8-226
IPFC 5-172
statically mapped iSCSI 4-107
Internet Control Message Protocol. See ICMP
Internet Storage Name Service. See iSNS
active mode 2-32
initiating 2-32
passive mode 2-32
configuration guidelines 5-172
configuring VSAN interfaces 5-172
description 5-172
enabling IPv4 routing 5-173
example configuration 5-173 to 5-176
IPS core dumps. See core dumps
CDP support 6-205
core dumps 6-200
FCIP 2-6
partial core dumps 6-200
port modes 7-211
software upgrades 6-199
supported features 6-197
IPS ports 4-72
modes 7-211
multiple connections 4-131
default parameters 6-209
IP Storage services modules. See IPS modules
configuring Gigabit Ethernet interfaces 7-212
configuring management interfaces 5-169
configuring virtual routers 5-185
default settings 7-220
description 7-211
displaying statistics 7-219
transitioning to IPv6 8-239
guidelines for Gigabit Ethernet interfaces 7-217
adding for VRRP 5-186
configuring in VSANs 5-172
configuring IPv6 and IPV6 protocol stacks 8-233
IPv6 protocol stacks 8-230
configuring 5-170, 5-171
description 5-170
IP static routing 5-170
static routes (tip) 5-171
verifying configuration 5-170
description 5-170
configuring Gigabit Ethernet interfaces 7-217
disabling 5-173
displaying route tables 7-217
enabling 5-173
verifying configuration 5-173
configuring 5-177
description 5-177
verifying configuration 5-177
address types 8-223
configuring addressing 8-231
configuring IPv4 and IPv6 addresses 8-233
configuring management interfaces 5-169
configuring neighbor discovery parameters 8-235
configuring virtual routers 5-185
default settings 8-240
description 8-221 to 8-231
displaying information 8-239
dual IPv4 and IPv6 protocol stack applications, figure 8-231
dual IPv4 and IPv6 protocol stacks 8-230
dual IPv4 and IPv6 protocol stack technique, figure 8-230
enabling routing 8-231
enhancements over IPv4 8-221
ICMP 8-226
IPv6-ACL guidelines 8-238
neighbor discovery 8-227
path MTU discovery 8-227
router advertisement messages 8-229
router discovery 8-229
stateless autoconfiguration 8-229
static routes 8-237
transitioning from IPv4 8-239
verifying basic connectivity 8-233
verifying configuration 8-233
guidelines for IPv6 8-238
adding for VRRP 5-186
configuring 8-231
configuring IPv4 and IPV6 protocol stacks 8-233
formats 8-222
link-local type 8-224
multicast type 8-225
prefix format 8-223
unicast type 8-223
advertisement messages 8-227
description 8-227
neighbor solicitation message, figure 8-228
solicitation messages 8-227
enabling 8-231
configuring 8-237
displaying the route table 8-237
formats 4-72
formats 4-72
enforcing access control 4-89
access control 4-86 to 4-90
add initiator to zone database 4-88
advanced VSAN membershipadvanced VSAN membership 4-86
checking for WWN conflicts 4-82
configuring 4-67, 4-67 to ??, 4-70, ?? to 4-134
configuring AAA authentication 4-90, 4-91
configuring ACLs 4-88
configuring VRRP 4-132
default parameters 4-165
discovery phase 4-89
displaying global information 4-101
displaying statistics 4-98
drivers 4-68
enabling 4-68, 4-71
error 4-77
Fibre Channel targets 4-72 to ??
Gigabit Ethernet ports 7-211
gateway device 4-78
HA with host without multi-path software 4-128
initiator idle timeoutinitiator idle timeout
configuring with Fabric Manager 4-78
initiator name 4-92
IPS module support 6-198
IQNs 4-76
login redirect 4-108, 4-109
LUN mapping for targets 4-141 to 4-147
MPS-14/2 module support 6-198
multiple IPS ports 4-131
PortChannel-based high availability 4-133
PortChannel-based high availabilityEthernet PortChannel-based high availability 4-133
protocol 4-67, 4-68
requests and responses 4-70
restrict an initiator to a specific user name for CHAP authentication 4-92
routing 4-67, 4-68
routing modes chartrouting modes chart for iSCSI 4-96
session creation 4-90
statically mapped initiators 4-107
transparent initiator mode 4-77
transparent mode initiator 4-136 to 4-141
users with local authentication 4-91
VSAN membership 4-84
VSAN membership example 4-85
VSAN membership for iSCSI interfaces 4-84
CHAP option 4-135
configuring 4-90, 4-115
configuring mechanisms 4-91
external RADIUS servers 4-135
global override 4-91
local authentication 4-91
mechanisms 4-91
restricting on initiators 4-92
scenarios 4-134
setup guidelines 4-134
iSCSI-based access control 4-86, 4-88
example membership in VSANs 4-85
iscsi-gw 4-83
configuring 4-127 to 4-134
initiator identification 4-76
assigning WWNs 4-80
configuring dynamic IP address mapping 4-79
configuring static IP address mapping 4-80
displaying information 4-103 to 4-106
displaying proxy information 4-100
dynamic mapping 4-79
making dynamic WWN mapping static 4-81
proxy mode 4-82
static mapping 4-80
transparent mode 4-77
verifying configuration 4-112
WWN assignments 4-79
configuring 4-76, 4-76 to 4-97
configuring listener ports 4-94
configuring listener portsiSCSI
listener port 4-94
configuring QoS 4-95
configuring routing mode 4-95 to 4-97
configuring routing modesrouting modes 4-95
configuring TCP tuning parameters 4-94
creating 4-71
creating interfaces 4-71
displaying information 4-97
iSCSI LUs 4-72
iSCSI protocol 4-67
iSCSI server load balancing 4-106
iSCSI Server Load Balancing. See iSLB
authentication 4-90 to 4-93
displaying information 4-101
advertising 4-74
dynamic importing 4-72
dynamic mapping 4-72
secondary access 4-129
static importing 4-73
static importingstatic mappingiSCSI targets
static mapping 4-73
transparent failover 4-127 to 4-131
displaying information 4-106
displaying information 4-106
activating zones 4-113
auto-zoning 4-123
committing configuration changescommitting configuration changes
iSLB 4-124
configuration distribution 4-123 to ??, 4-123
configuration prerequisites 4-108
configuring 4-106
configuring initiators and targets 4-113
configuring VRRP 4-122
configuring zones 4-113
default settings 4-166
distributing configuration using CF 4-123
dynamic initiator mapping 4-110
enabling configuration distribution 4-124
initiator WWN assignment 4-106
load balancing algorithm 4-119 to 4-121
maximum initiators 4-108
static initiator configurationinitiator configuration
static iSLB 4-107
VSAN membership 4-111
zone set activation failed 4-114
default settings 4-166
iSLB initiators 4-108
assigning WWNs 4-110
configuring 4-109 to 4-117
configuring IP addresses 4-109
configuring names 4-109
configuring static name mapping 4-109
description 4-108
dynamic initiator mapping 4-110
VSAN membership 4-111
configuring 4-113
description 4-113
maximum sessions per IPS port 4-108
displaying information 4-122
enabling 4-122
verifying configuration 4-122
enabling 4-153
client registration 4-154
cloud discovery 4-161, 4-165
configuring 4-155
configuring servers 4-152 to 4-155
description 4-147
ESI 4-154
description 4-147
creating profiles 4-148
verifying configuration 4-149
CFS distribution 4-164
description 4-162
displaying statistics 4-165
verifying configuration 4-163
verifying membership 4-164
verifying status 4-164
creating 4-148
verifying configuration 4-149
configuration distribution 4-153
description 4-151
displaying configurations 4-155 to 4-161
enabling 4-153
example scenario 4-151
configuring estimated maximum in FCIP profiles 2-28
configuring in FCIP profiles 2-25
forwarding 4-95
description 8-224
format, figure 8-224
Ethernet PortChannel aggregation 6-203
load balancing 4-107, 4-108, 4-109
FSPF (example) 2-9
PortChannels (example) 2-9
weighted 4-112
load metric 4-112
lock the fabric 4-124
LUN 4-72
LUN mapping 4-129
iSCSI 4-141 to 4-147
explicit access control 4-82
mapping and assignment 4-82
LUs 4-72
configuring for IPv4 5-169
configuring for IPv6 5-169
configuring in FCIP profiles 2-25
VRRP 5-189
merge status conflicts 4-126
configuring IPv4 addresses 5-169
configuring IPv6 addresses 5-169
local IPv4 routing 5-171
configuring in FCIP profiles 2-24
MPS-14/2 modules 4-67, 4-68, 4-69, 4-71, 4-83, 4-89
CDP support 6-205
FCIP 2-6
port modes 7-211
software upgrades 6-199
configuring frame sizes 7-213
path discovery for IPv6 8-227
IPv6 alternative to broadcast addresses 8-226
IPv6 format, figure 8-225
IPv6 solicited-node format, figure 8-226
multi-path software example 4-128
configuring 5-180
Multiprotocol Services modules. See MPS-14/2 modules
configuring for iSCSI 4-92
configuring for iSLB 4-116
configuring for iSLBI 4-116
configuring parameters 8-235
verifying configuration 8-236
None authentication 4-90
time-stamp option 2-33
configuring 5-178
description 5-178
discarding in FCIP 2-33
pass-thru routing mode 4-95
PDU 4-95
configuring in FCIP profiles 2-25
interfaces 4-74
subinterfaces 4-74
configuring for FCIP high availability 2-9
IQN formats 4-72
load balancing (example) 2-9
member combinations 6-203
redundancy 2-11
IPS 7-211
virtual E 2-6
configuring Gigabit Ethernet interfaces 7-214
protocol 4-67
VRRP 4-72
configuring proxy initiator 4-83
proxy initiator mode 4-76, 4-87
configuring 4-83
zoning 4-84
proxy initiator mode 4-82
DSCP value 2-36
configuring 4-95
AAA authentication 4-90, 4-116
Ethernet PortChannels 2-10, 2-11
Fibre Channel PortChannels 2-11
VRRP 2-10
IPv6 8-229
RSCNs 4-78
configuring in FCIP profiles 2-26
assigning SCSI read/write commands 3-61, 3-63
configuring 3-58
configuring data patterns 3-64
configuring nWWNs 3-60
configuring virtual N ports 3-61
data patterns 3-59
default settings 3-66
description 3-57
initialization 3-60
license requirements 3-59
tuning guidelines 3-58
verifying configuration 3-65
routing requests 4-68
security parameter index. See SPI
selective acknowledgments. See SACKs
configuring virtual routers 5-189
statically imported iSCSI targets 4-129
converting 4-110
static mapped iSCSI targetiSCSI
static mapped target 4-90
static mapping 4-110
static WWN mapping 4-87
store-and-forward routing mode 4-95
configuring IPv4 routes 5-177
requirements 7-216
in-band 5-172
VRRP 2-10
AAA authentication 4-116
target discovery 4-155
FCIP profiles 2-8
configuring in FCIP profiles 2-24 to 2-29, ?? to 2-30
displaying 6-207
TCP tuning parameters 4-94
transient failure 4-78
transparent initiator mode 4-76
transparent initiator modeiSCSI
transparent initiator mode 4-82
CTC 2-22
link state 2-22
FCIP interface 2-8
description 2-6
FCIP 2-6
virtual Fibre Channel host 4-69
description 2-6
virtual router IDs. See VR IDs
Virtual Router Redundancy Protocol. See VRRP
Virtual Router Redundancy Protocolprotocols
Virtual Router Redundancy 4-107
adding 5-185
adding primary IP addresses 5-186
authentication 5-189
configuring for IPv4 5-185
configuring for IPv6 5-185
default settings 5-195
deleting 5-185
initiating 5-185
setting priorities 5-187
configuring on Gigabit Ethernet subinterfaces 7-216
description 7-215
configuring for IPv4 5-185
configuring for IPv6 5-185
description 5-183
mapping 5-183
VRRP 4-107
algorithm for selecting Gigabit Ethernet interfaces 4-119 to 4-121
backup switches 5-183
clearing statistics 5-193
configuring advertisement time intervals 5-188
configuring for Gigabit Ethernet interfaces 6-202
configuring for iSLB 4-122
configuring virtual routers 5-185
configuring VR IDs for IPv4 5-185
configuring VR IDs for IPv6 5-185
default settings 5-195
description 5-183, 6-201
displaying information 5-191 to 5-193
displaying statistics 5-193
group members 6-201
initiating virtual routers 5-185
IQN formats 4-72
iSCSI parameter change impact 4-119
iSLB 4-117 to 4-123
master switches 5-183
MD5 authentication 5-189
primary IP address 5-186
priority preemption 5-188
security authentication 5-189
setting priorities 5-187
setting priority 5-187
simple text authentication 5-189
VRRP group 4-85
VRRP–I f iSCSI login redirect 4-108, 4-109
configuring IPv4 addresses 5-172
verifying configuration 5-173
configuring multiple IPv4 subnets 5-180
example membership for iSCSI devices 4-85
gateway switches 5-171
IPv4 static routing 5-177
iSLB 4-111
iSLB initiators 4-111
overlaid routes 5-178
traffic routing between 5-167
VRRP 5-183
configuring in FCIP profiles 2-26
static binding 4-82
configuring and activating for iSLB 4-113
iSLB 4-113
configuring for iSCSI 4-87
configuring zoning based access control 4-87