Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
Release 8.x
First Published: 2017-05-05
Last Modified: 2019-07-25
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
© 2019 Cisco Systems, Inc. All rights reserved.
CONTENTS
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
iii
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
iv
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
v
Contents
Committing Changes 39
Discarding Changes 39
Fabric Lock Override 39
Displaying System Message Logging Information 39
Additional References 45
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
vi
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
vii
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
viii
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
ix
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
x
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xi
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xii
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xiii
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xiv
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xv
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xvi
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xvii
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xviii
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xix
Contents
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xx
Preface
This preface describes the audience, organization of, and conventions used in the Cisco MDS 9000 Series
Configuration Guides. It also provides information on how to obtain related documentation, and contains the
following chapters:
• Audience, on page xxi
• Document Conventions, on page xxi
• Related Documentation, on page xxii
• Communications, Services, and Additional Information, on page xxii
Audience
To use this installation guide, you need to be familiar with electronic circuitry and wiring practices, and
preferably be an electronic or electromechanical technician.
Document Conventions
This document uses the following conventions:
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.
Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or
loss of data.
Warning This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work
on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard
practices for preventing accidents. Use the statement number provided at the end of each warning to locate
its translation in the translated safety warnings that accompanied this device. Statement 1071.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xxi
Preface
Related Documentation
Related Documentation
The documentation set for the Cisco MDS 9000 Series Switches includes the following documents.
Release Notes
http://www.cisco.com/c/en/us/support/storage-networking/mds-9000-nx-os-san-os-software/
products-release-notes-list.html
Regulatory Compliance and Safety Information
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/mds9000/hw/regulatory/compliance/RCSI.html
Compatibility Information
http://www.cisco.com/c/en/us/support/storage-networking/mds-9000-nx-os-san-os-software/
products-device-support-tables-list.html
Installation and Upgrade
http://www.cisco.com/c/en/us/support/storage-networking/mds-9000-nx-os-san-os-software/
products-installation-guides-list.html
Configuration
http://www.cisco.com/c/en/us/support/storage-networking/mds-9000-nx-os-san-os-software/
products-installation-and-configuration-guides-list.html
CLI
http://www.cisco.com/c/en/us/support/storage-networking/mds-9000-nx-os-san-os-software/
products-command-reference-list.html
Troubleshooting and Reference
http://www.cisco.com/c/en/us/support/storage-networking/mds-9000-nx-os-san-os-software/
tsd-products-support-troubleshoot-and-alerts.html
To find a document online, use the Cisco MDS NX-OS Documentation Locator at:
http://www.cisco.com/c/en/us/td/docs/storage/san_switches/mds9000/roadmaps/doclocater.html
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xxii
Preface
Preface
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xxiii
Preface
Preface
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
xxiv
CHAPTER 1
New and Changed Information
• Change Summary, on page 1
Change Summary
Feature Name Description Release Where Documented
Configuring HBA Link Support for the HBA Link 8.3(1) Configuring HBA Link
Diagnostics Diagnostics feature in Diagnostics, on page 223
N-port virtualisation mode
has been added to the
following platform:
• Cisco MDS 9396S
Multilayer Fabric
Switch
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
1
New and Changed Information
Change Summary
Configuring HBA Link The HBA Link 8.2(1) Configuring HBA Link
Diagnostics Diagnostics feature helps Diagnostics, on page 223
in validating the health of
links between Host Bus
Adapters (HBAs) and
Cisco MDS switches in a
network.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
2
CHAPTER 2
System Management Overview
You can use the system management features to monitor and manage a switch using Cisco MDS NX-OS
software. These features include Call Home, SNMP, RMON, SPAN, and the Embedded Event Manager
(EEM).
• Cisco Fabric Services, on page 3
• System Messages, on page 3
• Call Home, on page 4
• Scheduler, on page 4
• System Processes and Logs, on page 4
• Embedded Event Manager, on page 4
• SNMP, on page 5
• RMON, on page 5
• Domain Parameters, on page 5
• SPAN, on page 5
• Fabric Configuration Server, on page 5
• Uniform Timestamps, on page 6
System Messages
System messages are monitored remotely by accessing the switch through Telnet, SSH, or the console port,
or by viewing the logs on a system message logging server. Log messages are not saved across system reboots.
For information about configuring system messages, see Configuring System Message Logging, on page 27.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
3
System Management Overview
Call Home
Call Home
Call Home provides e-mail-based notification of critical system events. A versatile range of message formats
are available for optimal compatibility with pager services, standard e-mail, or XML-based automated parsing
applications. Common uses of this feature may include direct paging of a network support engineer, e-mail
notification to a Network Operations Center, and utilization of Cisco Smart Call Home services for direct
case generation with the Technical Assistance Center.
For information about configuring Call Home, see .
Scheduler
The Cisco MDS command scheduler feature helps you schedule configuration and maintenance jobs in any
switch in the Cisco MDS 9000 Family switches.You can use this feature to schedule jobs on a one-time basis
or periodically. The Cisco NX-OS command scheduler provides a facility to schedule a job (set of CLI
commands) or multiple jobs at a specified time in the future. The jobs can be executed once at a specified
time in the future or at periodic intervals.
For information on configuring the Cisco MDS command scheduler feature, see Scheduling Maintenance
Jobs, on page 111.
For information on configuring EEM, see About Embedded Event Manager, on page 159.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
4
System Management Overview
SNMP
SNMP
Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange
of management information between network devices. In all Cisco MDS 9000 Family switches, three SNMP
versions are available: SNMPv1, SNMPv2c, and SNMPv3. The CLI and SNMP use common roles in all
switches in the Cisco MDS 9000 Family. You can use SNMP to modify a role that was created using the CLI
and vice versa.
Users, passwords, and roles for all CLI and SNMP users are the same. A user configured through the CLI can
access the switch using SNMP (for example, the DCNM-SAN or the Device Manager) and vice versa.
For information on configuring SNMP, see Configuring SNMP, on page 233.
RMON
RMON is an Internet Engineering Task Force (IETF) standard monitoring specification that allows various
network agents and console systems to exchange network monitoring data. You can use the RMON alarms
and events to monitor Cisco MDS 9000 Family switches running the Cisco SAN-OS Release 2.0(1b) or later
or Cisco Release NX-OS 4.1(3) or later software.
For information on configuring RMON, see Configuring RMON, on page 177.
Domain Parameters
The Fibre Channel domain (fcdomain) feature performs principal switch selection, domain ID distribution,
FC ID allocation, and fabric reconfiguration functions as described in the FC-SW-2 standards. The domains
are configured on a per-VSAN basis. If you do not configure a domain ID, the local switch uses a random
ID.
For information on configuring the Fibre Channel domain feature, see Configuring Domain Parameters, on
page 259.
SPAN
The Switched Port Analyzer (SPAN) feature is specific to switches in the Cisco MDS 9000 Family. It monitors
network traffic through a Fibre Channel interface. Traffic through any Fibre Channel interface can be replicated
to a special port called the SPAN destination port (SD port). Any Fibre Channel port in a switch can be
configured as an SD port. Once an interface is in SD port mode, it cannot be used for normal data traffic. You
can attach a Fibre Channel analyzer to the SD port to monitor SPAN traffic.
For information on SPAN feature, see Monitoring Network Traffic Using SPAN, on page 287.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
5
System Management Overview
Uniform Timestamps
on the switch through an N port. In the Cisco MDS 9000 Family switch environment, multiple VSANs
constitute a fabric, where one instance of the FCS is present per VSAN.
For information on configuring FCS, see Configuring Fabric Configuration Server, on page 325.
Uniform Timestamps
While debugging issues on a switch, it is critical to arrange logs in chronological order to understand the
sequence of events that resulted in the issue. MDS logs use different time formats and it is tedious to merge
and sort them to understand the timeline of events. The Uniform Timestamps feature allows onboard syslogs,
accounting logs, and logs of various MDS software components to use a uniform timestamp format. This
allows quick merging and sorting of multiple logs together to build a complex timeline onboard the switch.
Logs can also be exported from the switch (by using the show tech-support command and so on) and processed
easily by hand, scripts, or data-mining applications.
This feature enables RFC 5424 format timestamps. This format is supported by many other devices and
vendors so that logs can also be merged with other products to build an end to end timeline through a fabric.
Ensure that clocks on all the devices are synchronized before attempting this.
This feature does not change the format of syslogs that are exported to an external syslog server via the syslog
protocol.
For more information, see the system timestamp format command in the Cisco MDS 9000 Series Command
Reference, Release 8.x.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
6
CHAPTER 3
Using the CFS Infrastructure
Cisco Fabric Services (CFS) provides a common infrastructure for automatic configuration synchronization
in the fabric. It provides the transport function as well as a rich set of common services to the applications.
CFS has the ability to discover CFS-capable switches in the fabric and discover application capabilities in all
CFS-capable switches.
• Information About CFS, on page 7
• Guidelines and Limitations, on page 14
• Default Settings, on page 14
• Configuring CFS, on page 15
• Configuring CFS Regions, on page 20
• Verifying CFS Configurations, on page 22
• Additional References, on page 26
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
7
Using the CFS Infrastructure
CFS Features
• IVR topology
• SAN device virtualization
• TACACS+ and RADIUS
• User and administrator roles
• Port security
• iSNS
• Call Home
• Syslog
• fctimer
• SCSI flow services
• Saved startup configurations using the Fabric Startup Configuration Manager (FSCM)
• Allowed domain ID lists
• RSCN timer
• iSLB
CFS Features
CFS has the following features:
• Peer-to-peer protocol with no client-server relationship at the CFS layer.
• Three scopes of distribution.
• Logical scope—The distribution occurs within the scope of a VSAN.
• Physical scope—The distribution spans the entire physical topology.
• Over a selected set of VSANs—Some applications, such as Inter-VSAN Routing (IVR), require
configuration distribution over some specific VSANs. These applications can specify to CFS the
set of VSANs over which to restrict the distribution.
• Three modes of distribution.
• Coordinated distributions—Only one distribution is allowed in the fabric at any given time.
• Uncoordinated distributions—Multiple parallel distributions are allowed in the fabric except when
a coordinated distribution is in progress.
• Unrestricted uncoordinated distributions—Multiple parallel distributions are allowed in the fabric
in the presence of an existing coordinated distribution. Unrestricted uncoordinated distributions are
allowed to run in parallel with all other types of distributions.
• Supports a merge protocol that facilitates the merge of application configuration during a fabric merge
event (when two independent fabrics merge).
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
8
Using the CFS Infrastructure
CFS Protocol
CFS Protocol
The CFS functionality is independent of the lower layer transport. Currently, in Cisco MDS switches, the
CFS protocol layer resides on top of the Fiber Channel 2 (FC2) layer and is peer-to-peer with no client-server
relationship. CFS uses the FC2 transport services to send information to other switches. CFS uses a proprietary
SW_ILS (0x77434653) protocol for all CFS packets. CFS packets are sent to or from the switch domain
controller addresses.
CFS can also use IP to send information to other switches.
Applications that use CFS are completely unaware of the lower layer transport.
Uncoordinated Distribution
Uncoordinated distributions are used to distribute information that is not expected to conflict with that from
a peer. An example is local device registrations such as iSNS. Parallel uncoordinated distributions are allowed
for an application.
Coordinated Distribution
Coordinated distributions can have only one application distribution at a given time. CFS uses locks to enforce
this. A coordinated distribution is not allowed to start if locks are taken for the application anywhere in the
fabric. A coordinated distribution consists of three stages:
1. A fabric lock is acquired.
2. The configuration is distributed and committed.
3. The fabric lock is released.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
9
Using the CFS Infrastructure
Unrestricted Uncoordinated Distributions
Note Some applications are not compatible with their instances running on different platforms. Therefore, Cisco
recommends that you carefully read the client guidelines for CFS distribution before committing the
configuration.
For more information on CFS for the Cisco Nexus 5000 Series and Cisco MDS 9000 switches, see the Cisco
Nexus 5000 Series NX-OS System Management Configuration Guide and the Cisco MDS 9000 Family
NX-OS System Management Configuration Guide, respectively.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
10
Using the CFS Infrastructure
Committing Changes
Committing Changes
A commit operation saves the pending database for all application peers and releases the lock for all switches.
In general, the commit function does not start a session; only a lock function starts a session. However, an
empty commit is allowed if configuration changes are not previously made. In this case, a commit operation
results in a session that acquires locks and distributes the current database.
When you commit configuration changes to a feature using the CFS infrastructure, you receive a notification
about one of the following responses:
• One or more external switches report a successful status—The application applies the changes locally
and releases the fabric lock.
• None of the external switches report a successful state—The application considers this state a failure and
does not apply the changes to any switch in the fabric. The fabric lock is not released.
Note Once the feature commit is done the running configuration has been modified on all switches participating
in the feature's distribution. You can then use the copy running-config startup-config fabric command to
save the running-config to the startup-config on all the switches in the fabric.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
11
Using the CFS Infrastructure
CFS Distribution over IP
Note The switch attempts to distribute information over Fibre Channel first and then over the IP network if the first
attempt over Fibre Channel fails. CFS does not send duplicate messages if distribution over both IP and Fibre
Channel is enabled.
Note CFS cannot distribute over both IPv4 and IPv6 from the same switch.
• Keepalive mechanism to detect network topology changes using a configurable multicast address.
• Compatibility with Cisco MDS SAN-OS Release 2.x.
• Distribution for logical scope applications is not supported because the VSAN implementation is limited
to Fibre Channel.
Figure 1: Network Example 1 with Fibre Channel and IP Connections, on page 12 shows a network with both
Fibre Channel and IP connections. Node A forwards an event to node B over Fibre Channel. Node B forwards
the event node C and node D using unicast IP. Node C forwards the event to node E using Fibre Channel.
Figure 1: Network Example 1 with Fibre Channel and IP Connections
Figure 2: Network Example 2 with Fibre Channel and IP Connections, on page 12 is the same as Figure 1:
Network Example 1 with Fibre Channel and IP Connections, on page 12 except that node D and node E are
connected using Fibre Channel. All processes is the same in this example because node B has node C and
node D the distribution list for IP. Node C does not forward to node D because node D is already in the
distribution list from node B.
Figure 2: Network Example 2 with Fibre Channel and IP Connections
Figure 3: Network Example 3 with Fibre Channel and IP Connections, on page 13 is the same as Figure 2:
Network Example 2 with Fibre Channel and IP Connections, on page 12 except that node D and node E are
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
12
Using the CFS Infrastructure
Static IP Peers for CFS
connected using IP. Both node C and node D forward the event to E because the node E is not in the distribution
list from node B.
Figure 3: Network Example 3 with Fibre Channel and IP Connections
Note You can only configure a CFS region on physical switches in a SAN. You cannot configure a CFS region in
a VSAN.
Example CFS Scenario: Call Home is an application that triggers alerts to Network Administrators when a
situation arises or something abnormal occurs. When the fabric covers many geographies and with multiple
Network Administrators who are each responsible for a subset of switches in the fabric, the Call Home
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
13
Using the CFS Infrastructure
Guidelines and Limitations
application sends alerts to all Network Administrators regardless of their location. For the Call Home application
to send message alerts selectively to Network Administrators, the physical scope of the application has to be
fine tuned or narrowed down, which is achieved by implementing CFS regions.
CFS regions are identified by numbers ranging from 0 through 200. Region 0 is reserved as the default region,
and contains every switch in the fabric. You can configure regions from 1 through 200. The default region
maintains backward compatibility. If there are switches on the same fabric running releases of SAN-OS before
Release 3.2(1), only features in Region 0 are supported when those switches are synchronized. Features from
other regions are ignored when those switches are synchronized.
If the feature is moved, that is, assigned to a new region, its scope is restricted to that region; it ignores all
other regions for distribution or merging purposes. The assignment of the region to a feature has precedence
in distribution over its initial physical scope.
You can configure a CFS region to distribute configurations for multiple features. However, on a given switch,
you can configure only one CFS region at a time to distribute the configuration for a given feature. Once you
assign a feature to a CFS region, its configuration cannot be distributed within another CFS region.
Default Settings
Table 1: Default CFS Parameters , on page 14 lists the default settings for CFS configurations.
Parameters Default
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
14
Using the CFS Infrastructure
Configuring CFS
Parameters Default
Configuring CFS
This section describes the configuration process.
Note When CFS is globally disabled on a switch, CFS operations are restricted to the switch and all CFS commands
continue to function as if the switch were physically isolated.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
15
Using the CFS Infrastructure
Committing Changes
Committing Changes
You can commit changes for a specified feature by entering the commit command for that feature.
Discarding Changes
If you discard configuration changes, the application flushes the pending database and releases locks in the
fabric. Both the abort and commit functions are only supported from the switch from which the fabric lock
is acquired.
You can discard changes for a specified feature by using the abort command for that feature.
Caution If you do not commit the changes, they are not saved to the running configuration.
The CISCO-CFS-MIB contains SNMP configuration information for any CFS-related functions. Refer to the
Cisco MDS 9000 Family MIB Quick Reference for more information on this MIB.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
16
Using the CFS Infrastructure
Enabling CFS over IP
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
17
Using the CFS Infrastructure
Configuring IP Multicast Address for CFS over IPv4
You can configure a CFS over IP multicast address value for either IPv4 or IPv6. The default IPv4 multicast
address is 239.255.70.83 and the default IPv6 multicast address is ff15:efff:4653.
Procedure
Configures the IPv4 multicast address for CFS distribution over IPv4. The ranges of valid IPv4 addresses are
239.255.0.0 through 239.255.255.255 and 239.192/16 through 239.251/16.
Reverts to the default IPv4 multicast address for CFS distribution over IPv4. The default IPv4 multicast
address for CFS is 239.255.70.83.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
18
Using the CFS Infrastructure
Configuring Static IP Peers for CFS
Configures the IPv6 multicast address for CFS distribution over IPv6. The range of valid IPv6 addresses is
ff15::/16 (ff15::0000:0000 through ff15::ffff:ffff) and ff18::/16 (ff18::0000:0000 through ff18::ffff:ffff).
Reverts to the default IPv6 multicast address for CFS distribution over IPv6. The default IPv6 multicast
address for CFS over IP is ff15::efff:4653.
Procedure
WARNING: This mode will stop dynamic discovery and rely only on the static peers. For this
mode to be in effect, at least one static peer will need to be configured.
Do you wish to continue? (y/n) [n] y
switch(config-cfs-static)#
Enters CFS static peers configuration mode and disables dynamic discovery of peers using multicast forwarding.
For this to take effect, at least one static peer needs to be configured in Step 3.
WARNING: This will remove all existing peers and start dynamic discovery.
Do you wish to continue? (y/n) [n] y
Disables CFS static peer discovery and enables dynamic peer discovery using multicast forwarding on all
switches.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
19
Using the CFS Infrastructure
Configuring CFS Regions
Adds the IP address to the static peers list and marks the switch as CFS-capable. To display the static IP peers
list, use the show cfs static peers command.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
20
Using the CFS Infrastructure
Moving an Application to a Different CFS Region
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
21
Using the CFS Infrastructure
Deleting CFS Regions
Procedure
Procedure
Command Purpose
show cfs status Displays the status of CFS distribution on the switch.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
22
Using the CFS Infrastructure
Verifying CFS Distribution Status
Command Purpose
show cfs application Displays the applications that are currently registered with CFS.
show cfs lock Displays all the locks that are currently acquired by any application.
show cfs region brief Displays brief information about the CFS regions.
show cfs region Displays detailed information about the CFS regions.
For detailed information about the fields in the output from these commands, refer to the Cisco MDS 9000
Family Command Reference .
Note The show cfs application command only displays applications registered with CFS. Conditional services that
use CFS do not appear in the output unless these services are running.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
23
Using the CFS Infrastructure
Verifying CFS Lock Status
The show cfs application name command displays the details for a particular application. It displays the
enabled/disabled state, timeout as registered with CFS, merge capability (if it has registered with CFS for
merge support), and the distribution scope.
The show cfs lock name command displays the lock details similar for the specified application.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
24
Using the CFS Infrastructure
Verifying IP Multicast Address Configuration for CFS over IP
To display the status of static IP peers discovery, use the show cfs static peers command.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
25
Using the CFS Infrastructure
Additional References
Additional References
For additional information related to implementing CFS, see the following section:
MIBs
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
26
CHAPTER 4
Configuring System Message Logging
This chapter describes how to configure system message logging on Cisco MDS 9000 Family switches.
• Information About System Message Logging, on page 27
• Guidelines and Limitations, on page 32
• Default Settings, on page 32
• Configuring System Message Logging, on page 33
• Additional References, on page 45
Note When the switch first initializes, the network is not connected until initialization completes. Therefore, messages
are not redirected to a system message logging server for a few seconds.
Log messages are not saved across system reboots. However, a maximum of 100 log messages with a severity
level of critical and below (levels 0, 1, and 2) are saved in NVRAM.
Table 2: Internal Logging Facilities , on page 27 describes some samples of the facilities supported by the
system message logs.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
27
Configuring System Message Logging
Information About System Message Logging
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
28
Configuring System Message Logging
Information About System Message Logging
vhbad Virtual host base adapter daemon Cisco MDS 9000 Family specific
Table 3: Error Message Severity Levels , on page 29 describes the severity levels supported by the system
message logs.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
29
Configuring System Message Logging
System Message Logging
Note Refer to the Cisco MDS 9000 Family System Messages Reference for details on the error log message format.
SFP Diagnostics
The error message related to SFP failures is written to the syslog. You can listen to the syslog for events
related to SFP failures. The values, low or high alarm, and the warning are checked for the following parameters:
• TX Power
• RX Power
• Temperature
• Voltage
• Current
The SFP notification trap indicates the current status of the alarm and warning monitoring parameters for all
the sensors based on the digital diagnostic monitoring information. This notification is generated whenever
there is a change in the status of at least one of the monitoring parameters of the sensors on the transceiver in
an interface.
The CISCO-INTERFACE-XCVR-MONITOR-MIB contains the SFP notification trap information. Refer to
the Cisco MDS 9000 Family MIB Quick Reference for more information on this MIB.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
30
Configuring System Message Logging
System Message Logging Configuration Distribution
The single system message logging daemon (syslogd) sends the information based on the configured facility
option. If no facility is specified, local7 is the default outgoing facility.
The internal facilities are listed in Table 2: Internal Logging Facilities , on page 27 and the outgoing logging
facilities are listed in Table 4: Outgoing Logging Facilities , on page 31.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
31
Configuring System Message Logging
Fabric Lock Override
Tip The changes are only available in the volatile directory and are subject to being discarded if the switch is
restarted.
Caution If the merged database contains more that three servers, the merge will fail.
Default Settings
Table 5: Default System Message Log Settings , on page 32 lists the default settings for system message
logging.
Parameters Default
System message logging to the console Enabled for messages at the critical severity level.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
32
Configuring System Message Logging
Configuring System Message Logging
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
33
Configuring System Message Logging
Configuring Console Severity Level
Note The current critical (default) logging level is maintained if the console baud speed is 9600 baud (default). All
attempts to change the console logging level generates an error message. To increase the logging level (above
critical), you must change the console baud speed to 38400 baud.
To configure the severity level for the console session, follow these steps:
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
34
Configuring System Message Logging
Configuring Module Logging
Reverts monitor logging to the factory set default severity level of 5 (notifications). Logging messages with
a severity level of 5 or above are displayed on the console.
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
35
Configuring System Message Logging
Sending Log Files
Note Use the show logging info command to display the default logging levels for the facilities listed in
Table 2: Internal Logging Facilities , on page 27.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
36
Configuring System Message Logging
Configuring System Message Logging Servers
Procedure
The switch sends messages according to the specified facility types and severity levels. The local1 keyword
specifies the UNIX logging facility used. The messages from the switch are generated by user processes. The
debug keyword specifies the severity level of the condition being logged. You can set UNIX systems to
receive all messages from the switch.
Step 2 Create the log file by entering these commands at the UNIX shell prompt:
$ touch /var/log/ myfile .log
$ chmod 666 /var/log/ myfile .log
Step 3 Make sure the system message logging daemon reads the new changes by entering this command:
$ kill -HUP ~cat /etc/syslog.pid~
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
37
Configuring System Message Logging
Configuring System Message Logging Server IPv6 Addresses
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
38
Configuring System Message Logging
Committing Changes
Committing Changes
To commit the system message logging server configuration changes, follow these steps:
Procedure
Discarding Changes
To discard the system message logging server configuration changes, follow these steps:
Procedure
Command Purpose
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
39
Configuring System Message Logging
Displaying System Message Logging Information
Command Purpose
For detailed information about the fields in the output from these commands, refer to the Cisco MDS 9000
Family Command Reference .
Use the show logging command to display the current system message logging configuration . See Examples
Current System Message Logging, on page 40 to Server Information, on page 45.
Note When using the show logging command, output is displayed only when the configured logging levels for the
switch are different from the default levels.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
40
Configuring System Message Logging
Displaying System Message Logging Information
news 3 3
uucp 3 3
cron 3 3
authpriv 3 7
ftp 3 3
local0 3 3
local1 3 3
local2 3 3
local3 3 3
local4 3 3
local5 3 3
local6 3 3
local7 3 3
vsan 2 2
fspf 3 3
fcdomain 2 2
module 5 5
sysmgr 3 3
zone 2 2
vni 2 2
ipconf 2 2
ipfc 2 2
xbar 3 3
fcns 2 2
fcs 2 2
acl 2 2
tlport 2 2
port 5 5
flogi 2 2
port_channel 5 5
wwn 3 3
fcc 2 2
qos 3 3
vrrp_cfg 2 2
ntp 2 2
platform 5 5
vrrp_eng 2 2
callhome 2 2
mcast 2 2
rdl 2 2
rscn 2 2
bootvar 5 2
securityd 2 2
vhbad 2 2
rib 2 2
vshd 5 5
0(emergencies) 1(alerts) 2(critical)
3(errors) 4(warnings) 5(notifications)
6(information) 7(debugging)
Feb 14 09:50:57 excal-113 %TTYD-6-TTYD_MISC: TTYD TTYD started
Feb 14 09:50:58 excal-113 %DAEMON-6-SYSTEM_MSG: precision = 8 usec
...
Use the show logging nvram command to view the log messages saved in NVRAM. Only log
messages with a severity level of critical and below (levels 0, 1, and 2) are saved in NVRAM.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
41
Configuring System Message Logging
Displaying System Message Logging Information
Log File
The following example displays the log file:
Logging Facility
The following example displays the logging facility:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
42
Configuring System Message Logging
Displaying System Message Logging Information
local5 3 3
local6 3 3
local7 3 3
vsan 2 2
fspf 3 3
fcdomain 2 2
module 5 5
sysmgr 3 3
zone 2 2
vni 2 2
ipconf 2 2
ipfc 2 2
xbar 3 3
fcns 2 2
fcs 2 2
acl 2 2
tlport 2 2
port 5 5
flogi 2 2
port_channel 5 5
wwn 3 3
fcc 2 2
qos 3 3
vrrp_cfg 2 2
ntp 2 2
platform 5 5
vrrp_eng 2 2
callhome 2 2
mcast 2 2
rdl 2 2
rscn 2 2
bootvar 5 2
securityd 2 2
vhbad 2 2
rib 2 2
vshd 5 5
0(emergencies) 1(alerts) 2(critical)
3(errors) 4(warnings) 5(notifications)
6(information) 7(debugging)
Logging Information
The following example displays the logging information:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
43
Configuring System Message Logging
Displaying System Message Logging Information
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
44
Configuring System Message Logging
Additional References
Server Information
The following example displays the server information:
Additional References
For additional information related to implementing system message logging, see the following section:
MIBs
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
45
Configuring System Message Logging
Additional References
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
46
CHAPTER 5
Configuring Call Home
Call Home provides e-mail-based notification of critical system events. A versatile range of message formats
are available for optimal compatibility with pager services, standard e-mail, or XML-based automated parsing
applications.
Note Cisco Autonotify is upgraded to a new capability called Smart Call Home. Smart Call Home has significant
functionality improvement over Autonotify and is available across the Cisco product range. For detailed
information on Smart Call Home, see the Smart Call Home page at this location:
http://www.cisco.com/go/smartcall/ .
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
47
Configuring Call Home
Call Home Features
The Call Home functionality is available directly through the Cisco MDS 9000 Series switches and the Cisco
Nexus 5000 Series switches. It provides multiple Call Home messages, each with separate potential destinations.
You can define your own destination profiles in addition to predefined profiles; you can configure up to 50
e-mail addresses for each destination profile. Flexible message delivery and format options make it easy to
integrate specific support requirements.
The Call Home feature offers the following advantages:
• Fixed set of predefined alerts for trigger events on the switch.
• Automatic execution and attachment of relevant command output.
• Multiple concurrent message destinations. You can configure up to 50 e-mail destination addresses for
each destination profile.
• Multiple message categories including system, environment, switching module hardware, supervisor
module, hardware, inventory, syslog, RMON, and test.
• Secure messages transport directly from your device or through an HTTP proxy server or a downloadable
transport gateway (TG). You can use a TG aggregation point to support multiple devices, or in cases
where security requires that your devices not be connected directly to the Internet.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
48
Configuring Call Home
About Smart Call Home
Note Beginning from the Cisco MDS Release 7.3(0)D1(1), all the alerts are classified under the type, Environment
and sub type, Minor.
Low touch The registration process is considerably streamlined. Requires the customer to
registration Customers no longer need to know their device serial request Cisco to add each
number or contract information. They can register devices specific serial number to the
without manual intervention from Cisco by sending a database.
message from those devices. The procedures are outlined
at www.cisco.com/go/smartcall.
Recommendations Smart Call Home provides recommendations for known Autonotify raises SRs for a
issues including those for which SRs are raised and for set of failure scenarios but no
which SRs are not appropriate but for which customers recommendations are
might want to still take action on. provided for these.
Device report Device report includes full inventory and configuration No.
details. Once available, the information in these reports
will be mapped to field notices, PSIRTs, EoX notices,
configuration best practices and bugs.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
49
Configuring Call Home
Obtaining Smart Call Home
History report The history report is available to look up any message and A basic version is available
its contents, including show commands, message that does not include contents
processing, analysis results, recommendations and service of message.
request numbers for all messages sent over the past three
months.
Cisco device Device Support will be extended across the Cisco product Deprecated in favor of Smart
support range. See the supported products table at Call Home in October 2008.
www.cisco.com/go/smartcall.
For detailed information on Smart Call Home, including quick start configuration and registration steps, see
the Smart Call Home page at this location:
http://www.cisco.com/go/smartcall/
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
50
Configuring Call Home
Customized Alert Group Messages
Using the predefined Call Home alert groups you can generate notification messages when certain events
occur on the switch. You can customize predefined alert groups to execute additional show commands when
specific events occur and to notify you of output other than from the predefined show commands.
Syslog-Based Alerts
You can configure the switch to send certain syslog messages as Call Home messages. The messages are sent
based on the mapping between the destination profile and the alert group mapping, and on the severity level
of the generated syslog message.
To receive a syslog-based Call Home alert, you must associate a destination profile with the syslog alert groups
(currently there is only one syslog alert group—syslog-group-port) and configure the appropriate message
level.
The syslog-group-port alert group selects syslog messages for the port facility. The Call Home application
maps the syslog severity level to the corresponding Call Home severity level (see Table 7: Event Triggers ,
on page 54). For example, if you select level 5 for the Call Home message level, syslog messages at levels
0, 1, and 2 are included in the Call Home log.
Whenever a syslog message is generated, the Call Home application sends a Call Home message depending
on the mapping between the destination profile and the alert group mapping and based on the severity level
of the generated syslog message. To receive a syslog-based Call Home alert, you must associate a destination
profile with the syslog alert groups (currently there is only one syslog alert group—syslog-group-port) and
configure the appropriate message level (see Table 7: Event Triggers , on page 54).
Note Call Home does not change the syslog message level in the message text. The syslog message texts in the
Call Home log appear as they are described in the Cisco MDS 9000 Series System Messages Reference.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
51
Configuring Call Home
RMON-Based Alerts
RMON-Based Alerts
You can configure the switch to send Call Home notifications corresponding to RMON alert triggers. All
RMON-based Call Home messages have their message level set to NOTIFY (2). The RMON alert group is
defined for all RMON-based Call Home alerts. To receive an RMON-based Call Home alert, you must associate
a destination profile with the RMON alert group.
Note The Call Home HTTP configuration can be distributed over CFS on the switches running NX-OS Release
4.2(1) and later. The Call Home HTTP configuration cannot be distributed to switches that support the
nondistributable HTTP configuration. Switches running lower versions than NX-OS Release 4.2(1) and later
will ignore the HTTP configuration.
Note The new configuration process is not related to the old configuration. However, if the SMTP servers are
configured using both the old and new schemes, the older configuration is of the highest priority.
Multiple SMTP servers can be configured on any MDS 9000 Series switch, Cisco Nexus 5000 Series switches,
and Cisco Nexus 7000 Series switches running Release 5.0(1a) or later.
The new configuration will only be distributed to switches that have multiple SMTP servers. The older switches
in the fabric will ignore the new configuration received over CFS.
In a mixed fabric that has CFS enabled, the switches running NX-OS Release 5.0 can configure new
functionalities and distribute the new configuration to other switches with Release 5.0 in the fabric over CFS.
However, if an existing switch running NX-OS Release 4.x upgrades to Release 5.0, the new configurations
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
52
Configuring Call Home
Periodic Inventory Notification
will not be distributed to that switch as a CFS merge is not triggered on an upgrade. There are two options to
upgrade:
• Apply new configuration only when all the switches in the fabric support them (Recommended option)
• Do an empty commit from an existing NX-OS Release 5.0 switch which has the new configuration
Note The switch priority and the Syscontact name are not distributed.
Tip The changes are only available in the volatile directory and are subject to being discarded if the switch is
restarted.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
53
Configuring Call Home
Clearing Call Home Name Server Database
Event Triggers
This section discusses Call Home trigger events. Trigger events are divided into categories, with each category
assigned CLI commands to execute when the event occurs. The command output is included in the transmitted
message. Table 7: Event Triggers , on page 54 lists the trigger events.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
54
Configuring Call Home
Event Triggers
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
55
Configuring Call Home
Call Home Message Levels
System Events generated by failure of a software system that is critical show tech-supportshow system
to unit operation. redundancy status
show module
show version
show tech-support platform
show tech-support sysmgr
show hardware
show sprom all
Environmental Events related to power, fan, and environment sensing show moduleshow environment
elements such as temperature alarms.
show module
show version
show environment
show logging logfile | tail -n 200
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
56
Configuring Call Home
Call Home Message Levels
Line Card Hardware Events related to standard or intelligent line card hardware. show tech-support
show module
show version
show tech-support platform
show tech-support sysmgr
show hardware
show sprom all
Inventory Inventory status is provided whenever a unit is cold booted, show version
or when FRUs are inserted or removed. This is considered a
show module
noncritical event, and the information is used for status and
show version entitlement.
show hardware
show inventory
show system uptime
show sprom all
show license usage
Call Home messages (sent for syslog alert groups) have the syslog severity level mapped to the Call Home
message level (see the Syslog-Based Alerts, on page 51).
This section discusses the severity levels for a Call Home message when using one or more switches in the
Cisco MDS 9000 Series and the Cisco Nexus 5000 Series. Call Home message levels are preassigned per
event type.
Severity levels range from 0 to 9, with 9 having the highest urgency. Each syslog level has keywords and a
corresponding syslog level as listed in Table 9: Severity and Syslog Level Mapping , on page 58.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
57
Configuring Call Home
Message Contents
Note Call Home does not change the syslog message level in the message text. The syslog message texts in the
Call Home log appear as they are described in the Cisco MDS 9000 Series System Messages Reference.
Note Call Home severity levels are not the same as system message logging severity levels (see the Cisco MDS
9000 Series System Messages Reference).
Critical (6) Critical Alert (1) Critical conditions, immediate attention needed.
Notify (2) Notification Notice (5) Basic notification and informational messages. Possibly
independently insignificant.
Normal (1) Normal Information Normal event signifying return to normal state.
(6)
Message Contents
The following contact information can be configured on the switch:
• Name of the contact person
• Phone number of the contact person
• E-mail address of the contact person
• Mailing address to which replacement parts must be shipped, if required
• Site ID of the network where the site is deployed
• Contract ID to identify the service contract of the customer with the service provider
Table 10: Short Text Messages , on page 59 describes the short text formatting option for all message types.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
58
Configuring Call Home
Message Contents
Alarm urgency level Error level such as that applied to system message
Table 11: Reactive Event Message Format , on page 59, Table 12: Inventory Event Message Format , on page
62, and Table 13: User-Generated Test Message Format , on page 64 display the information contained in
plain text and XML messages.
Data Item(Plain text and Description(Plain text and XML) XML Tag (XML only)
XML)
Time stamp Date and time stamp of event in ISO time notation: /mml/header/time - ch:EventTime
YYYY-MM-DDTHH:MM:SS.
Note The time zone or daylight savings time (DST)
offset from UTC has already been added or
subtracted. T is the hardcoded limiter for the
time.
Message name Name of message. Specific event names are listed in the /mml/header/name
Event Triggers, on page 54.
Severity level Severity level of message (see Table 9: Severity and /mml/header/level - aml-block:Severity
Syslog Level Mapping , on page 58).
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
59
Configuring Call Home
Message Contents
Data Item(Plain text and Description(Plain text and XML) XML Tag (XML only)
XML)
Device ID Unique device identifier (UDI) for end device generating /mml/ header/deviceId
message. This field should empty if the message is
non-specific to a fabric switch. Format is type@Sid@seria
l, where:
• type is the product model number from backplane
SEEPROM.
• @ is a separator character.
• Sid is “C,” identifying the serial ID as a chassis serial
number.
• serial is the number identified by the Sid field.
Example: DS-C9509@C@12345678
Customer ID Optional user-configurable field used for contract info or /mml/header/customerID - ch:CustomerId
other ID by any support service.
Contract ID Optional user-configurable field used for contract info or /mml/header/contractId - ch:ContractId>
other ID by any support service.
Server ID If the message is generated from the fabric switch, it is /mml/header/serverId - -blank-
the unique device identifier (UDI) of the switch.
Format is type@Sid@serial , where:
• type is the product model number from backplane
SEEPROM.
• @ is a separator character.
• Sid is “C,” identifying the serial ID as a chassis serial
number.
• serial is the number identified by the Sid field.
Example: DS-C9509@C@12345678
Device name Node that experienced the event. This is the host name of /mml/body/sysName - ch:SystemInfo/Name
the device.
Contact name Name of person to contact for issues associated with the /mml/body/sysContact -
node experiencing the event. ch:SystemInfo/Contact
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
60
Configuring Call Home
Message Contents
Data Item(Plain text and Description(Plain text and XML) XML Tag (XML only)
XML)
Contact e-mail E-mail address of person identified as contact for this unit. /mml/body/sysContacte-mail -
ch:SystemInfo/Contacte-mail
Contact phone number Phone number of the person identified as the contact for /mml/body/sysContactPhoneNumber -
this unit. ch:SystemInfo/ContactPhoneNumber
Street address Optional field containing street address for RMA part /mml/body/sysStreetAddress -
shipments associated with this unit. ch:SystemInfo/StreetAddress
Model name Model name of the switch. This is the specific model as /mml/body/chassis/name -
part of a product Series name. rme:Chassis/Model
Affected FRU name Name of the affected FRU generating the event message. /mml/body/fru/name -
rme:chassis/Card/Model
FRU slot Slot number of FRU generating the event message. /mml/body/fru/slot -
rme:chassis/Card/LocationWithinContainer
Command output name The exact name of the issued command. /mml/attachments/attachment/name -
aml-block:Attachment/Name
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
61
Configuring Call Home
Message Contents
Data Item(Plain text and Description(Plain text and XML) XML Tag (XML only)
XML)
Command output text Output of command automatically executed Table 8: Event /mml/attachments/attachment/atdata -
Categories and Executed Commands , on page 56). aml-block:Attachment/Data
Data Item(Plain text and Description(Plain text and XML) XML Tag(XML only)
XML)
Time stamp Date and time stamp of event in ISO time notation: /mml/header/time - ch:EventTime
YYYY-MM-DDTHH:MM:SS.
Note The time zone or daylight savings time (DST)
offset from UTC has already been added or
subtracted. T is the hardcoded limiter for the
time.
Severity level Severity level of inventory event is level 2 (see Table 9: /mml/header/level - aml-block:Severity
Severity and Syslog Level Mapping , on page 58).
Source ID Product type for routing at Cisco. Specifically “MDS /mml/header/source - ch-inv:Series
9000.”
Device ID Unique Device Identifier (UDI) for end device generating /mml/ header /deviceId
message. This field should empty if the message is
non-specific to a fabric switch. Format is type@Sid@seria
l, where:
• type is the product model number from backplane
SEEPROM.
• @ is a separator character.
• Sid is “C,” identifying the serial ID as a chassis serial
number.
• serial is the number identified by the Sid field.
Example: DS-C9509@C@12345678
Customer ID Optional user-configurable field used for contact info or /mml/header/customerID - ch-inv:CustomerId
other ID by any support service.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
62
Configuring Call Home
Message Contents
Data Item(Plain text and Description(Plain text and XML) XML Tag(XML only)
XML)
Contract ID Optional user-configurable field used for contact info or /mml/header/contractId - ch-inv:ContractId>
other ID by any support service.
Server ID If the message is generated from the fabric switch, it is /mml/header/serverId - -blank-
the Unique device identifier (UDI) of the switch.
Format is type@Sid@seria l, where:
• type is the product model number from backplane
SEEPROM.
• @ is a separator character.
• Sid is “C,” identifying the serial ID as a chassis serial
number.
• serial is the number identified by the Sid field.
Example: DS-C9509@C@12345678
Contact name Name of person to contact for issues associated with the /mml/body/sysContact -
node experiencing the event. ch-inv:SystemInfo/Contact
Contact e-mail E-mail address of person identified as contact for this unit. /mml/body/sysContacte-mail -
ch-inv:SystemInfo/Contacte-mail
Contact phone number Phone number of the person identified as the contact for /mml/body/sysContactPhoneNumber -
this unit. ch-inv:SystemInfo/ContactPhoneNumber
Street address Optional field containing street address for RMA part /mml/body/sysStreetAddress -
shipments associated with this unit. ch-inv:SystemInfo/StreetAddress
Model name Model name of the unit. This is the specific model as part /mml/body/chassis/name - rme:Chassis/Model
of a product Series name.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
63
Configuring Call Home
Message Contents
Data Item(Plain text and Description(Plain text and XML) XML Tag(XML only)
XML)
FRU name Name of the affected FRU generating the event message. /mml/body/fru/name -
rme:chassis/Card/Model
Command output name The exact name of the issued command. /mml/attachments/attachment/name -
aml-block:Attachment/Name
Command output text Output of command automatically executed after event /mml/attachments/attachment/atdata -
categories (see Event Triggers, on page 54). aml-block:Attachment/Data
Data Item(Plain text and Description(Plain text and XML) XML Tag(XML only)
XML)
Time stamp Date and time stamp of event in ISO time notation: /mml/header/time - ch:EventTime
YYYY-MM-DDTHH:MM:SS.
Note The time zone or daylight savings time (DST) offset
from UTC has already been added or subtracted. T
is the hardcoded limiter for the time.
Message name Name of message. Specifically test message for test type /mml/header/name
message. Specific event names listed in the Event Triggers, on
page 54).
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
64
Configuring Call Home
Message Contents
Data Item(Plain text and Description(Plain text and XML) XML Tag(XML only)
XML)
Message group This field should be ignored by the receiving Call Home /mml/header/group
processing application, but may be populated with either
“proactive” or “reactive.”
Severity level Severity level of message, test Call Home message (see Table /mml/header/level - aml-block:Severity
9: Severity and Syslog Level Mapping , on page 58).
Device ID Unique device identifier (UDI) for end device generating /mml/ header /deviceId
message. This field should empty if the message is nonspecific
to a fabric switch. Format is type@Sid@seria l, where:
• type is the product model number from backplane
SEEPROM.
• @ is a separator character.
• Sid is “C” identifying the serial ID as a chassis serial
number.
• serial is the number identified by the Sid field.
Example: DS-C9509@C@12345678
Customer ID Optional user-configurable field used for contract info or other /mml/header/customerID - ch:CustomerId
ID by any support service.
Contract ID Optional user-configurable field used for contract info or other /mml/header/contractId - ch:ContractId
ID by any support service.
Site ID Optional user-configurable field used for Cisco-supplied site /mml/header/siterId - ch:SiteId
ID or other data meaningful to alternate support service.
Server ID If the message is generated from the fabric switch, it is the /mml/header/serverId - -blank-
Unique device identifier (UDI) of the switch.
Format is type@Sid@seria l, where:
• type is the product model number from backplane
SEEPROM.
• @ is a separator character.
• Sid is “C” identifying the serial ID as a chassis serial
number.
• serial is the number identified by the Sid field.
Example: “DS-C9509@C@12345678
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
65
Configuring Call Home
Guidelines and Limitations
Data Item(Plain text and Description(Plain text and XML) XML Tag(XML only)
XML)
Contact name Name of person to contact for issues associated with the node /mml/body/sysContact -
experiencing the event. ch:SystemInfo/Contact
Contact e-mail E-mail address of person identified as contact for this unit. /mml/body/sysContacte-mail -
ch:SystemInfo/Contacte-mail
Contact phone number Phone number of the person identified as the contact for this /mml/body/sysContactPhoneNumber -
unit. ch:SystemInfo/ContactPhoneNumber
Street address Optional field containing street address for RMA part shipments /mml/body/sysStreetAddress -
associated with this unit. ch:SystemInfo/StreetAddress
Model name Model name of the switch. This is the specific model as part of /mml/body/chassis/name -
a product Series name. rme:Chassis/Model
Chassis part number Top assembly number of the chassis. For example, /mml/body/fru/partNo -
800-xxx-xxxx. rme:chassis/Card/PartNumber
Command output text Output of command automatically executed after event /mml/attachments/attachment/atdata -
categories listed in Table 8: Event Categories and Executed aml-block:Attachment/Data
Commands , on page 56.
Command output name The exact name of the issued command. /mml/attachments/attachment/name -
aml-block:Attachment/Name
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
66
Configuring Call Home
Call Home Configuration Guidelines
• The e-mail addresses and alert groups for the destination profiles.
• Other configuration information (for example, message throttling, periodic inventory) from the
switch that existed in the dominant switch before the merge.
Default Settings
Table 14: Default Call Home Default Settings , on page 67 lists the default Call Home settings.
Parameters Default
Destination message size for a message sent in full text format. 500,000
Destination message size for a message sent in short text format. 4000
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
67
Configuring Call Home
Configuring Call Home
Parameters Default
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
68
Configuring Call Home
Configuring Contact Information Using DCNM-SAN
switch(config)# callhome
switch(config-callhome)#
Step 4 Assign the customer’s e-mail address. Up to 128 alphanumeric characters are accepted in e-mail address
format:
switch(config-callhome)# e-mail-contact [email protected]
Note You can use any valid e-mail address. You cannot use spaces.
Step 5 Assign the customer’s phone number. Up to 20 alphanumeric characters are accepted in international format:
switch(config-callhome)# phone-contact +1-800-123-4567
Note You cannot use spaces. Be sure to use the + prefix before the number.
Step 6 Assign the customer’s street address where the equipment is located. Up to 256 alphanumeric characters are
accepted in free format:
switch(config-callhome)# streetaddress 1234 Picaboo Street, Any city, Any state, 12345
Step 7 Assign the switch priority, with 0 being the highest priority and 7 the lowest:
switch(config-callhome)# switch-priority 0
Tip Use this field to create a hierarchical management structure.
Procedure
Step 1 Expand Events and select Call Home from the Physical Attributes pane.
You see the Call Home tabs in the Information pane.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
69
Configuring Call Home
Enabling Call Home Function
Step 2 In Device Manager, click Admin > Events > Call Home.
Step 3 Click the General tab, then assign contact information and enable the Call Home feature. Call Home is not
enabled by default. You must enter an e-mail address that identifies the source of Call Home notifications.
Step 4 Click the Destination(s) tab to configure the destination e-mail addresses for Call Home notifications. You
can identify one or more e-mail addresses that will receive Call Home notifications.
Note Switches can forward events (SNMP traps/informs) up to 10 destinations.
1. Click the Create tab to create a new destination. You will see the create destination window.
2. Enter the profile name, ID, and type of destination. You can select email or http in the Type field.
If you select email, you can enter the e-mail address in the EmailAddress field. The HttpUrl field is
disabled.
If you select http, you can enter the HTTP URL in the HttpUrl field. The EmailAddress field is disabled.
3. Click Create to complete the destination profile creation.
Step 5 Click the e-mail Setup tab to identify the SMTP server. Identify a message server to which your switch has
access. This message server will forward the Call Home notifications to the destinations.
Step 6 In DCNM-SAN, click the Apply Changes icon. In Device Manager, click Apply.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
70
Configuring Call Home
Enabling Call Home Function Using DCNM-SAN
When you disable the Call Home function, all input events are ignored.
Procedure
Note If you use the Cisco Smart Call Home service, the XML destination profile is required.
Note Steps 3, 4, and 5 in this procedure can be skipped or configured in any order.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
71
Configuring Call Home
Configuring a Destination Profile
Procedure
Step 3 Configure an email address or maximum destination message size for the predefined full-txt-destination
profile:
switch(config-callhome)# destination-profile full-txt-destination {e-mail-addr email-address | message-size
msg-size-in-bytes}
The e-mail addresses in this destination profile receives messages in full-txt format. The full-text format
provides the complete, detailed explanation of the failure.
Tip Use a standard e-mail address that does not have any text size restrictions.
The valid range is 0 to 1,000,000 bytes and the default is 500,000. A value of 0 implies that a message of any
size can be sent.
Note The maximum size of each individual attachment inside the message is 250,000 bytes. If any
attachment is more than this maximum size, then the output captured in the attachment will be
truncated.
Step 4 Configure an e-mail address or maximum destination message size for the predefined short-txt-destination
profile:
switch(config-callhome)# destination-profile short-txt-destination {e-mail-addr email-address |
message-size msg-size-in-bytes}
The e-mail addresses in this destination profile receive messages in short-txt format. This format provides the
basic explanation of the failure in the Call Home message.
Tip Use a pager-related e-mail address for this option.
The valid range is 0 to 1,000,000 bytes and the default is 4000. A value of 0 implies that a message of any
size can be sent.
Note The maximum size of each individual attachment inside the message is 250,000 bytes. If any
attachment is more than this maximum size, then the output captured in the attachment will be
truncated.
Step 5 Configure an e-mail address or maximum destination message size for the predefined XML-destination profile:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
72
Configuring Call Home
Configuring a Predefined Destination Profile Using DCNM-SAN
The valid range is 0 to 1,000,000 bytes and the default is 500,000. A value of 0 implies that a message of any
size can be sent.
Note The maximum size of each individual attachment inside the message is 250,000 bytes. If any
attachment is more than this maximum size, then the output captured in the attachment will be
truncated.
Procedure
Step 1 Expand Events and select Call Home in the Physical Attributes pane.
The Destination tab is disabled until you click the Profiles tab. The profiles have to be loaded for the destination
tab to be populated.
Step 3 Set the profile name, message format, message size, and severity level.
Step 4 Click in the Alert Groups column and select or remove an alert group.
Step 5 Click Apply Changes icon to create this profile on the selected switches.
Note Steps 4, 5, and 6 in this procedure can be skipped or configured in any order.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
73
Configuring Call Home
Configuring a New Destination Profile Using DCNM-SAN
Step 4 Configure the e-mail address for the user-defined destination profile (test) sent in default XML format:
switch(config-callhome)# destination-profile test e-mail-addr email-address
Step 5 Configure a maximum message size for the destination e-mail addresses in the user-defined destination profile
(test) sent in default XML format:
switch(config-callhome)# destination-profile test message-size msg-size
The valid range is 0 to 1,000,000 bytes and the default is 500,000. A value of 0 implies that a message of any
size can be sent.
Step 6 Configure message-format for the user-defined destination profile (test) to be full text or short text format:
switch(config-callhome)# destination-profile test format {full-txt | short-txt}
Procedure
Step 1 Expand Events and select Call Home in the Physical Attributes pane.
Note The Destination tab is disabled until you click the Profiles tab. The profiles have to be loaded for
the destination tab to be populated.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
74
Configuring Call Home
Associating an Alert Group with a Destination Profile
The alert group feature allows you to select the set of Call Home alerts to be received by a destination profile
(either predefined or user-defined). You can associate multiple alert groups with a destination profile.
To associate an alert group with a destination profile, follow these steps:
Procedure
Step 3 (Optional) Configure user-defined destination profile (test1) or predefined short-text destination profile to
receive all user-generated Call Home test notifications:
switch(config-callhome)# destination-profile {test1 | short-txt-destination} alert-group test
Step 4 (Optional) Configure user-defined destination profile (test1) to receive Call Home notifications for all events
or predefined short-text destination profile to receive Call Home notifications for default events:
switch(config-callhome)# destination-profile {test1 | short-txt-destination} alert-group all
Step 5 (Optional) Configure user-defined destination profile (test1) or predefined short-text destination profile to
receive Call Home notifications for events that are meant only for Cisco TAC or the auto-notify service:
switch(config-callhome)# destination-profile {test1 | xml-destination} alert-group Cisco-TAC
Step 6 (Optional) Configure user-defined destination profile (test1) or predefined short-text destination profile to
receive Call Home notifications for software crash events:
switch(config-callhome)# destination-profile {test1 | xml-destination} alert-group Crash
Step 7 (Optional) Configure user-defined destination profile (test1) or predefined short-text destination profile to
receive Call Home notifications for power, fan, and temperature-related events:
switch(config-callhome)# destination-profile {test1 | short-txt-destination} alert-group environmental
Step 8 (Optional) Configure user-defined destination profile (test1) or predefined short-text destination profile to
receive Call Home notifications for inventory status events:
switch(config-callhome)# destination-profile {test1 | short-txt-destination} alert-group inventory
Step 9 (Optional) Configure user-defined destination profile (test1) or predefined short-text destination profile to
receive Call Home notifications for licensing events:
switch(config-callhome)# destination-profile {test1 | short-txt-destination} alert-group License
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
75
Configuring Call Home
Associating Alert Group Using DCNM-SAN
Step 10 (Optional) Configure user-defined destination profile (test1) or predefined short-text destination profile to
receive Call Home notifications for module-related events:
switch(config-callhome)# destination-profile {test1 | short-txt-destination} alert-group linecard-hardware
Step 11 (Optional) Configure user-defined destination profile (test1) or predefined short-text destination profile to
receive Call Home notifications for supervisor-related events:
switch(config-callhome)# destination-profile {test1 | short-txt-destination} alert-group
supervisor-hardware
Step 12 (Optional) Configure user-defined destination profile (test1) or predefined short-text destination profile to
receive Call Home notifications for software-related events:
switch(config-callhome)# destination-profile {test1 | short-txt-destination} alert-group system
Procedure
Step 1 Expand Events and select Call Home in the Physical Attributes pane.
Step 2 Click the Profiles tab in the Information pane.
You see the Call Home profiles for multiple switches.
Step 3 Click the Alert Groups column in the row for the profile you want to associate.
You see the alert groups drop-down menu.
Note Make sure the destination profiles for a non-Cisco-TAC alert group, with a predefined show command, and
the Cisco-TAC alert group are not the same.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
76
Configuring Call Home
Customizing Alert Group Messages Using DCNM-SAN
Procedure
Step 4 (Optional) Remove the user-defined show command from the alert group:
switch(config-callhome)# no alert-group license user-def-cmd show license usage
Procedure
Step 1 Expand Events and select Call Home in the Physical Attributes pane.
Step 2 Click the User Defined Command tab in the Information pane.
You see the User Defined Command information.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
77
Configuring Call Home
Setting the Call Home Message Levels
Procedure
Step 3 (Optional) Configure the message level urgency as 5 (level) and above for the user-defined profile (test1):
switch(config-callhome)# destination-profile test message-level level
Step 4 Remove a previously configured urgency level and reverts it to the default of 0 (all messages are sent):
switch(config-callhome)# no destination-profile oldtest message-level level
Procedure
Step 3 Configure the predefined destination profile (short-txt-destination) to receive Call Home Notifications
corresponding to syslog messages for the port facility:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
78
Configuring Call Home
Configuring the Syslog-Based Alerts Using DCNM-SAN
Step 4 (Optional) Configure the predefined destination-profile (short-txt-destination) to send a Call Home message
for syslog messages whose severity levels map to Call Home severity level of 5 or greater:
switch(config-callhome)# destination-profile short-txt-destination message-level level
The default is message level 0 (all syslog messages).
Procedure
Step 5 Select the switches for which you want to send alerts.
Step 6 Enter the name of the profile in the Name field.
Step 7 Choose the message format, message size, and message severity level.
Step 8 Check the syslogGroupPort check box in the AlertGroups section.
Step 9 Click Create to create the profile for the syslog-based alerts.
Step 10 Close the dialog box.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
79
Configuring Call Home
Configuring RMON Alerts Using DCNM-SAN
Step 3 (Optional) Configure a destination message profile (rmon_group) to send Call Home notifications for configured
RMON messages:
switch(config-callhome)# destination-profile
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
80
Configuring Call Home
Configuring General E-Mail Options
Procedure
Step 4 Configure the reply-to e-mail address to which all responses should be sent:
switch(config-callhome)# transport
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
81
Configuring Call Home
Configuring HTTPS Support
Procedure
Step 3 (Optional) Configure the predefined full-txt-destination profile with an HTTPS URL address:
switch(config-callhome)# destination-profile full-txt-destination http
The Call Home message in full-txt format is uploaded at the configured HTTPS URL address.
Step 4 (Optional) Configure the predefined CiscoTAC-1 profile with an HTTPS URL address:
switch(config-callhome)# destination-profile CiscoTAC-1 http
The Call Home message in XML format is uploaded at the configured HTTPS URL address.
Step 5 (Optional) Configure the user-defined destination profile with an HTTPS URL address:
switch(config-callhome)# destination-profile test1 http
The Call Home message in the configured format is uploaded at the configured HTTPS URL address.
Procedure
Step 3 (Optional) Enable predefined destination profile CiscoTAC-1 for HTTP transport method:
switch(config-callhome)# destination-profile CiscoTAC-1 transport-method http
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
82
Configuring Call Home
Configuring an HTTP Proxy Server
Note For user-defined destination profiles, e-mail is the default. You can enable either or both transport
mechanisms. If you disable both methods, e-mail will be enabled.
Step 4 (Optional) Disable predefined destination profile CiscoTAC-1 for e-mail transport-method:
switch(config-callhome)# no destination-profile CiscoTAC-1 transport-method email
Step 5 (Optional) Enable predefined full-txt-destination profile for HTTP transport method:
switch(config-callhome)# destination-profile full-txt transport-method http
Procedure
Step 3 Configure the HTTP proxy server domain name server (DNS) name, IPv4 address, or IPv6 address:
switch(config-callhome)# transport http proxy server 192.0.2.1
Optionally configures the port number. The port range is from 1 to 65535. The default port number is 8080.
Step 4 Enable Smart Call Home to send all HTTP messages through the HTTP proxy server:
switch(config-callhome)# transport http proxy enable
Note You can execute this command only after the proxy server address has been configured.
Step 5 (Optional) Display the transport-related configuration for Smart Call Home:
switch(config-callhome)# show callhome transport
Note The default value for full text destination and for XML is 1 MB.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
83
Configuring Call Home
Configuring Call Home Wizard
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
84
Configuring Call Home
Configuring SMTP Server and Ports
• Check the merger status of CFS on the switch. If a merger failure is found, the wizard clears up the merge
failure in the backend process while running the wizard.
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
85
Configuring Call Home
Configuring Multiple SMTP Server Support
Step 3 Configure the DNS, IPv4 address, or IPv6 address of the SMTP server to reach the server:
switch(config-callhome)# transport email smtp-server 192.168.1.1
switch(config-callhome)# transport email smtp-server 192.168.1.1 port 30
The port usage defaults to 25 if no port is specified.
Note The port number is optional and, if required, may be changed depending on the server location.
Procedure
Based on the configuration above, the SMTP servers would be contacted in this order:
10.1.1.174 (priority 0)
192.0.2.10 (priority 4)
172.21.34.193 (priority 50 - default)
64.72.101.213 (priority 60)
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
86
Configuring Call Home
Enabling Periodic Inventory Notifications
The transport email mail-server command is distributed only to devices running Cisco NX-OS Release
5.0(1a) or later. The transport email smtp-server command is distributed only to devices running earlier
software releases.
Procedure
Step 4 Configure the periodic inventory notification message to be sent every 15 days:
switch(config-callhome)# periodic-inventory notification interval 15
Default to using the factory default of sending a Call Home message every 7 days:
switch(config-callhome)# no periodic-inventory notification interval 15
This value ranges from 1 to 30 days.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
87
Configuring Call Home
Configuring Duplicate Message Throttle
Step 2 Expand Events and select Call Home in the Physical Attributes pane.
You will see the Call Home information in the Information pane.
Step 3 Click the Periodic Inventory tab.
You will see the Call Home periodic inventory information.
Step 4 Select a switch in the Information pane.
Step 5 Check the Enable check box.
Step 6 Enter the number of days for which you want the inventory checked.
Step 7 Click the Apply Changes icon.
To enable message throttling in a Cisco MDS 9000 Series switch or a Cisco Nexus 5000 Series switch, follow
these steps:
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
88
Configuring Call Home
Configuring Duplicate Message Throttle Using DCNM-SAN
Procedure
Procedure
Step 3 Enable Call Home configuration distribution to all switches in the fabric:
switch(config-callhome)# distribute
Acquires a fabric lock and stores all future configuration changes in the pending database.
Step 4 Disables (default) Call Home configuration distribution to all switches in the fabric.
switch(config-callhome)# no distribute
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
89
Configuring Call Home
Discarding the Call Home Configuration Changes
Procedure
Step 3 Distribute the configuration changes to all switches in the fabric and release the lock:
switch(config-callhome)# commit
Overwrites the effective database with the changes made to the pending database.
Procedure
Step 3 Discard the configuration changes in the pending database and release the fabric lock:
switch(config-callhome)# abort
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
90
Configuring Call Home
Fabric Lock Override
Procedure
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
91
Configuring Call Home
Configuring Delayed Traps
cefcFRURemoved all
cefcFanTrayStatusChange all
cefcFRUInserted all
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
92
Configuring Call Home
Enabling the Delayed Trap Feature Using DCNM-SAN
Procedure
Procedure
Step 1 Expand Events and select SNMP Traps in the Physical Attributes pane.
In the table above the map layout in DCNM-SAN, click the Delayed Traps tab.
Step 2 Check the Enable check box for the switches on which you want to enable delayed traps.
Step 3 Enter the timer value in the Delay column.
Step 4 Click Apply to save your changes.
Note If no value is entered, the default value of 4 minutes is used.
Procedure
Step 1 In Device Manager, choose Admin > Events > Filters > Delayed Traps.
You can see the Events Filters information in the Information pane.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
93
Configuring Call Home
Viewing Event Filter Notification
Step 4 To disable Delayed Traps, uncheck the Enable check box and click Apply.
callhome enabled
Callhome Information:
contact person name:who@where
contact person's e-mail:[email protected]
contact person's phone number:310-408-4000
street addr:1234 Picaboo Street, Any city, Any state, 12345
site id:Site1ManhattanNewYork
customer id:Customer1234
contract id:Cisco1234
switch priority:0
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
94
Configuring Call Home
Displaying Call Home Information
message format:full-txt
message-level:0
e-mail addresses configured:
alert groups configured:
all
short-txt destination profile information
maximum message size:4000
message format:short-txt
message-level:0
e-mail addresses configured:
alert groups configured:
all
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
95
Configuring Call Home
Displaying Call Home Information
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
96
Configuring Call Home
Displaying Call Home Information
phone-contact +1-800-000-0000
streetaddress 12345 Cisco Way, San Jose, CA
destination-profile Inventory
destination-profile Inventory format full-txt
destination-profile Inventory transport-method email
no destination-profile Inventory transport-method http
destination-profile Inventory message-size 1000000
destination-profile Inventory message-level 0
destination-profile Service
destination-profile Service format full-txt
destination-profile Service transport-method email
no destination-profile Service transport-method http
destination-profile Service message-size 1000000
destination-profile Service message-level 0
destination-profile dest1
destination-profile dest1 format XML
destination-profile dest1 transport-method email
no destination-profile dest1 transport-method http
destination-profile dest1 message-size 500000
destination-profile dest1 message-level 0
destination-profile full_txt
destination-profile full_txt format full-txt
destination-profile full_txt transport-method email
no destination-profile full_txt transport-method http
destination-profile full_txt message-size 1000000
destination-profile full_txt message-level 0
destination-profile httpProf
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
97
Configuring Call Home
Displaying Delayed Trap Information
The following example shows the output when the timer value is set to any other value other than 4 minutes:
Displays the Delayed Trap Information with a Timer Value Other Than 4 Minutes
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
98
Configuring Call Home
Monitoring Call Home
switch# callhome
switch(config-callhome)# transport email mail-server 192.168.10.23 port 4
switch# config t
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
99
Configuring Call Home
Sample Syslog Alert Notification in XML Format
<aml-session:To>http://tools.cisco.com/neddce/services/DDCEService</aml-session:To>
<aml-session:Path>
<aml-session:Via>http://www.cisco.com/appliance/uri</aml-session:Via>
</aml-session:Path>
<aml-session:From>http://www.cisco.com/appliance/uri</aml-session:From>
<aml-session:MessageId>1004:FOX090306QT:3E55A81A</aml-session:MessageId>
</aml-session:Session>
</soap-env:Header>
<soap-env:Body>
<aml-block:Block xmlns:aml-block="http://www.cisco.com/2004/01/aml-block">
<aml-block:Header>
<aml-block:Type>http://www.cisco.com/2005/05/callhome/syslog</aml-block:Type>
<aml-block:CreationDate>2003-02-21 04:16:18 GMT+00:00</aml-block:CreationDate>
<aml-block:Builder>
<aml-block:Name>MDS</aml-block:Name>
<aml-block:Version>4.1</aml-block:Version>
</aml-block:Builder>
<aml-block:BlockGroup>
<aml-block:GroupId>1005:FOX090306QT:3E55A81A</aml-block:GroupId>
<aml-block:Number>0</aml-block:Number>
<aml-block:IsLast>true</aml-block:IsLast>
<aml-block:IsPrimary>true</aml-block:IsPrimary>
<aml-block:WaitForPrimary>false</aml-block:WaitForPrimary>
</aml-block:BlockGroup>
<aml-block:Severity>6</aml-block:Severity>
</aml-block:Header>
<aml-block:Content>
<ch:CallHome xmlns:ch="http://www.cisco.com/2005/05/callhome" version="1.0">
<ch:EventTime>2003-02-21 04:16:18 GMT+00:00</ch:EventTime>
<ch:MessageDescription>LICENSE_VIOLATION 2003 Feb 21 04:16:18 switch %$ %DAEMON-3-SYSTEM_MSG:
<<%LICMGR-3-LOG_LICAPP_NO_LIC>> License file is missing for feature
SAN_EXTN_OVER_IP</ch:MessageDescription>
<ch:Event>
<ch:Type>syslog</ch:Type>
<ch:SubType>LICENSE_VIOLATION</ch:SubType>
<ch:Brand>Cisco</ch:Brand>
<ch:Series>MDS9000</ch:Series>
</ch:Event>
<ch:CustomerData>
<ch:UserData>
<ch:e-mail>[email protected]</ch:e-mail>
</ch:UserData>
<ch:ContractData>
<ch:CustomerId>eeranna</ch:CustomerId>
<ch:SiteId>Bangalore</ch:SiteId>
<ch:ContractId>123</ch:ContractId>
<ch:DeviceId>DS-C9216I-K9@C@FOX090306QT</ch:DeviceId>
</ch:ContractData>
<ch:SystemInfo>
<ch:Name>switch</ch:Name>
<ch:Contact>Eeranna</ch:Contact>
<ch:Contacte-mail>[email protected]</ch:Contacte-mail>
<ch:ContactPhoneNumber>+91-80-310-1718</ch:ContactPhoneNumber>
<ch:StreetAddress>#71, Miller's Road</ch:StreetAddress> </ch:SystemInfo>
</ch:CustomerData> <ch:Device> <rme:Chassis xmlns:rme="http://www.cisco.com/rme/4.0">
<rme:Model>DS-C9216I-K9</rme:Model>
<rme:HardwareVersion>1.0</rme:HardwareVersion>
<rme:SerialNumber>FOX090306QT</rme:SerialNumber>
</rme:Chassis>
</ch:Device>
</ch:CallHome>
</aml-block:Content>
<aml-block:Attachments>
<aml-block:Attachment type="inline">
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
100
Configuring Call Home
Sample Syslog Alert Notification in XML Format
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
101
Configuring Call Home
Sample RMON Notification in XML Format
2003 Feb 21 04:12:27 switch %PORT-5-IF_DOWN_ADMIN_DOWN: %$VSAN 1%$ Interface fc1/11 is down
(Administratively down)
2003 Feb 21 04:12:27 switch %PORT-5-IF_DOWN_ADMIN_DOWN: %$VSAN 1%$ Interface fc1/12 is down
(Administratively down)
2003 Feb 21 04:12:27 switch %PORT-5-IF_DOWN_ADMIN_DOWN: %$VSAN 1%$ Interface fc1/13 is down
(Administratively down)
2003 Feb 21 04:12:27 switch %PORT-5-IF_DOWN_ADMIN_DOWN: %$VSAN 1%$ Interface fc1/14 is down
(Administratively down)
2003 Feb 21 04:12:30 switch %PLATFORM-2-MOD_DETECT: Module 2 detected (Serial number
JAB0923016X) Module-Type IP Storage Services Module Model DS-X9304-SMIP
2003 Feb 21 04:12:30 switch %MODULE-2-MOD_UNKNOWN: Module type [25] in slot 2 is not supported
2003 Feb 21 04:12:45 switch %VSHD-5-VSHD_SYSLOG_CONFIG_I: Configured from vty by root on
console0
2003 Feb 21 04:14:06 switch %VSHD-5-VSHD_SYSLOG_CONFIG_I: Configured from vty by admin on
console0
2003 Feb 21 04:15:12 switch %VSHD-5-VSHD_SYSLOG_CONFIG_I: Configured from vty by admin on
console0
2003 Feb 21 04:15:52 switch %SYSMGR-3-BASIC_TRACE: core_copy: PID 1643 with message Core
not generated by system for licmgr(0). WCOREDUMP(9) returned zero .
2003 Feb 21 04:15:52 switch %SYSMGR-2-SERVICE_CRASHED: Service \"licmgr\" (PID 2272)
hasn't caught signal 9 (no core).
2003 Feb 21 04:16:18 switch %LICMGR-3-LOG_LIC_FILE_MISSING: License file(s) missing for
feature ENTERPRISE_PKG.
2003 Feb 21 04:16:18 switch %LICMGR-3-LOG_LIC_FILE_MISSING: License file(s) missing for
feature SAN_EXTN_OVER_IP.
2003 Feb 21 04:16:18 switch %LICMGR-3-LOG_LIC_FILE_MISSING: License file(s) missing for
feature ENTERPRISE_PKG.
2003 Feb 21 04:16:18 switch %LICMGR-3-LOG_LIC_FILE_MISSING: License file(s) missing for
feature SAN_EXTN_OVER_IP.
2003 Feb 21 04:16:18 switch %CALLHOME-2-EVENT: LICENSE_VIOLATION
2003 Feb 21 04:16:18 switch %CALLHOME-2-EVENT: LICENSE_VIOLATION
2003 Feb 21 04:16:18 switch %CALLHOME-2-EVENT: LICENSE_VIOLATION
2003 Feb 21 04:16:18 switch %CALLHOME-2-EVENT: LICENSE_VIOLATION ]]> </aml-block:Data>
</aml-block:Attachment> <aml-block:Attachment type="inline"> <aml-block:Name>show license
usage</aml-block:Name> <aml-block:Data encoding="plain">
<![CDATA[Feature Ins Lic Status Expiry Date Comments
Count
--------------------------------------------------------------------------------
DMM_184_PKG No 0 Unused Grace expired
FM_SERVER_PKG No - Unused Grace expired
MAINFRAME_PKG No - Unused Grace expired
ENTERPRISE_PKG Yes - Unused never license missing
DMM_FOR_SSM_PKG No 0 Unused Grace expired
SAN_EXTN_OVER_IP Yes 8 Unused never 8 license(s) missing
PORT_ACTIVATION_PKG No 0 Unused -
SME_FOR_IPS_184_PKG No 0 Unused Grace expired
STORAGE_SERVICES_184 No 0 Unused Grace expired
SAN_EXTN_OVER_IP_18_4 No 0 Unused Grace expired
SAN_EXTN_OVER_IP_IPS2 No 0 Unused Grace expired
SAN_EXTN_OVER_IP_IPS4 No 0 Unused Grace expired
STORAGE_SERVICES_SSN16 No 0 Unused Grace expired
10G_PORT_ACTIVATION_PKG No 0 Unused -
STORAGE_SERVICES_ENABLER_PKG No 0 Unused Grace expired
--------------------------------------------------------------------------------
**** WARNING: License file(s) missing. **** ]]> </aml-block:Data> </aml-block:Attachment>
</aml-block:Attachments> </aml-block:Block> </soap-env:Body> </soap-env:Envelope>
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
102
Configuring Call Home
Sample RMON Notification in XML Format
<aml-session:Session xmlns:aml-session="http://www.cisco.com/2004/01/aml-session"
soap-env:mustUnderstand="true"
soap-env:role="http://www.w3.org/2003/05/soap-envelope/role/next">
<aml-session:To>http://tools.cisco.com/neddce/services/DDCEService</aml-session:To>
<aml-session:Path>
<aml-session:Via>http://www.cisco.com/appliance/uri</aml-session:Via>
</aml-session:Path>
<aml-session:From>http://www.cisco.com/appliance/uri</aml-session:From>
<aml-session:MessageId>1086:FHH0927006V:48BA26BD</aml-session:MessageId>
</aml-session:Session>
</soap-env:Header>
<soap-env:Body>
<aml-block:Block xmlns:aml-block="http://www.cisco.com/2004/01/aml-block">
<aml-block:Header>
<aml-block:Type>http://www.cisco.com/2005/05/callhome/diagnostic</aml-block:Type>
<aml-block:CreationDate>2008-08-31 05:06:05 GMT+00:00</aml-block:CreationDate>
<aml-block:Builder>
<aml-block:Name>MDS</aml-block:Name>
<aml-block:Version>4.1</aml-block:Version>
</aml-block:Builder>
<aml-block:BlockGroup>
<aml-block:GroupId>1087:FHH0927006V:48BA26BD</aml-block:GroupId>
<aml-block:Number>0</aml-block:Number>
<aml-block:IsLast>true</aml-block:IsLast>
<aml-block:IsPrimary>true</aml-block:IsPrimary>
<aml-block:WaitForPrimary>false</aml-block:WaitForPrimary>
</aml-block:BlockGroup>
<aml-block:Severity>2</aml-block:Severity>
</aml-block:Header>
<aml-block:Content>
<ch:CallHome xmlns:ch="http://www.cisco.com/2005/05/callhome" version="1.0">
<ch:EventTime>2008-08-31 05:06:05 GMT+00:00</ch:EventTime>
<ch:MessageDescription>RMON_ALERT WARNING(4) Falling:iso.3.6.1.4.1.9.9.305.1.1.1.0=1 <=
89:1, 4</ch:MessageDescription>
<ch:Event>
<ch:Type>environment</ch:Type>
<ch:SubType>minor</ch:SubType>
<ch:Brand>Cisco</ch:Brand>
<ch:Series>MDS9000</ch:Series>
</ch:Event>
<ch:CustomerData>
<ch:UserData>
<ch:e-mail>[email protected]</ch:e-mail>
</ch:UserData>
<ch:ContractData>
<ch:CustomerId>12ss</ch:CustomerId>
<ch:SiteId>2233</ch:SiteId>
<ch:ContractId>rrr55</ch:ContractId>
<ch:DeviceId>DS-C9513@C@FHH0927006V</ch:DeviceId>
</ch:ContractData>
<ch:SystemInfo>
<ch:Name>sw172-22-46-174</ch:Name>
<ch:Contact>Mani</ch:Contact>
<ch:Contacte-mail>[email protected]</ch:Contacte-mail>
<ch:ContactPhoneNumber>+1-800-304-1234</ch:ContactPhoneNumber>
<ch:StreetAddress>1234 wwee</ch:StreetAddress>
</ch:SystemInfo>
</ch:CustomerData>
<ch:Device>
<rme:Chassis xmlns:rme="http://www.cisco.com/rme/4.0">
<rme:Model>DS-C9513</rme:Model>
<rme:HardwareVersion>0.205</rme:HardwareVersion>
<rme:SerialNumber>FHH0927006V</rme:SerialNumber>
</rme:Chassis>
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
103
Configuring Call Home
Field Descriptions for Call Home
</ch:Device>
</ch:CallHome>
</aml-block:Content>
</aml-block:Block>
</soap-env:Body>
</soap-env:Envelope>
Contact The contact person for this switch, together with information on how to contact this
person.
PhoneNumber The phone number of the contact person. The phone number must start with '+' and
contains only numeric characters except for space and '-'. Some valid phone numbers
are +44 20 8332 9091 +45 44886556 +81-46-215-4678 +1-650-327-2600.
EmailAddress The e-mail address of the contact person. Some valid e-mail addresses are
[email protected], [email protected], [email protected].
ContractId A string, in whatever format is appropriate, to identify the support contract between
the customer and support partner.
DeviceServicePriority The service priority of the device. This determines how fast the device has to be
serviced.
Related Topics
Information About Call Home, on page 47
E-mailAddress The e-mail address associated this destination profile. Some examples are [email protected],
[email protected], [email protected].
Related Topics
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
104
Configuring Call Home
Call Home SMTP Servers
From The e-mail address that is to be used in the From field when sending the e-mail using
SMTP. Some examples are [email protected], [email protected],
[email protected].
ReplyTo The e-mail address that is to be used in the Reply-To field when sending the e-mail
using SMTP. Some examples are [email protected], [email protected],
[email protected].
Related Topics
General E-Mail Options Using HTTPS Support, on page 52
FailureCause The failure cause for the last Call Home test invocation.
Interval Time frame for sending the periodic software inventory Call Home message.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
105
Configuring Call Home
Call Home User Defined Command
Field Description
Throttling If checked, enables the message throttling mechanism implemented on the system, to limit
Enable the number of Call Home messages for an alert type within a time frame. The maximum
is 30 in a 2-hour time frame, and any further messages for that alert type are discarded.
Enable If checked, enables the sending of periodic software inventory Call Home messages on
the system.
Related Topics
Call Home Alert Groups, on page 50
Call Home Message Level Feature, on page 51
User Defined Command Configures user-defined commands for the Call Home alert group types.
Delayed Traps
Field Description
MaxMsgSize Maximum message size that can be sent to destination pointed to by this destination profile.
MsgLevel Threshold level, used for filtering alert messages sent to a destination. Callhome alert message
with severity level lower than the configured threshold level would not be sent. The default
threshold level is debug (1), which means all the alert messages will be sent.
AlertGroups The list of configured alert groups for this destination profile.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
106
Configuring Call Home
Event Destinations Security (Advanced)
Field Description
Security Name The SNMP parameters to be used when generating messages to be sent to this address.
Security Model Is used when generating SNMP messages using this entry.
Inform This expected maximum round-trip time for communicating with the address.
Timeout
RetryCount The number of retries to be attempted when a response is not received for a generated
message.
MPModel The message processing model to be used when generating SNMP messages using this entry.
SecurityModel The security model to be used when generating SNMP messages using this entry.
SecurityName Identifies the principal on whose behalf SNMP messages will be generated using this entry.
SecurityLevel The level of security to be used when generating SNMP messages using this entry.
FSPF - Nbr State Changes Specifies whether or not the local switch should issue notification when
the local switch learns of a change in the neighbor's state (state in the
FSPF neighbor finite state machine) on an interface on a VSAN.
Domain Mgr - ReConfig Fabrics Specifies whether or not the local switch should issue a notification on
sending or receiving ReConfigureFabric (RCF) on a VSAN.
Zone Server - Request Rejects Specifies if the zone server should issue a notification on rejects.
Zone Server - Merge Failures Specifies if the zone server should issue a notification on merge failures.
Zone Server - Merge Successes Specifies if the zone server should issue a notification on merge
successes.
Zone Server - Default Zone Behavior Specifies if the zone server should issue a notification if the propagation
Change policy changes.
Zone Server - Unsupp Mode Specifies if the zone server should issue a notification on unsupp mode
changes
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
107
Configuring Call Home
Event Filters Interfaces
Field Description
FabricConfigServer - Request Specifies if the fabric configuration server should issue a notification
Rejects on rejects.
RSCN - ILS Request Rejects Specifies if the RSCN module should generate notifications when a
SW_RSCN request is rejected.
RSCN - ILS RxRequest Rejects Specifies if the RSCN module should generate notifications when a
SW_RSCN request is rejected.
RSCN - ELS Request Rejects Specifies if the RSCN module should generate notifications when a
SCR or RSCN request is rejected.
FRU Changes A false value will prevent field replaceable unit (FRU) notifications
from being generated by this system.
SNMP - Community Auth Failure Indicates whether the SNMP entity is permitted to generate
authenticationFailure traps.
VRRP Indicates whether the VRRP-enabled router will generate SNMP traps
for events defined in this MIB.
Port/Fabric Security Specifies if the system should generate notifications when a port/fabric
security issue arises.
Name Server If checked, the name server generates a notification when a request is
rejected. If false, the notification is not generated.
EnableLinkTrap Indicates whether linkUp/linkDown traps should be generated for this interface.
Enabled Check to enable notification of the control. Shows the status of the control.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
108
Configuring Call Home
Additional References
Note You see the Descr column only on switches that run Cisco NX-OS Release 5.0 or later.
Additional References
For additional information related to implementing Call Home, see the following section:
MIBs
Call Home HTTP Proxy Server 5.2 Added the Call Home HTTP Proxy Server support details.
Call Home Wizard 5.2 Added the Call Home Wizard configuration details.
Call Home HTTP Proxy Server 5.2 Added the Call Home HTTP Proxy Server support details.
Added Verifying Callhome Transport commands.
Multiple SMTP Server Support 5.0(1a) Added Multiple SMTP Server Support details.
Added Verifying Callhome Transport commands.
Notification Enhancements 5.0(1a) Added the enhancement in Notification in the Event Filter Using Device
Manager.
Call Home 4.1(1b) Added the HTTPS support for Call Home.
Call Home - Delayed Traps for EMC Call Home 4.1(1a) Added the delayed traps enhancements for EMC Call Home.
configuration window in DCNM-SAN.
Call Home Destination tab 4.2(1) Added the enhancement in Destination tab.
Call Home HTTPs support 4.2(1) Added Call Home HTTPs enhancement.
EMC Email Home 3.3(3) EMC Email Home configuration information was added to this chapter.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
109
Configuring Call Home
Feature History for Call Home
EMC Call Home 3.0(1) Enables the forwarding of traps as XML data using email, according to
EMC specifications.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
110
CHAPTER 6
Scheduling Maintenance Jobs
The Cisco MDS command scheduler feature helps you schedule configuration and maintenance jobs in any
switch in the Cisco MDS 9000 Family. You can use this feature to schedule jobs on a one-time basis or
periodically.
• Information About the Command Scheduler, on page 111
• Licensing Requirements for Command Scheduler, on page 112
• Guidelines and Limitations, on page 112
• Default Settings , on page 112
• Configuring the Command Scheduler, on page 113
• Specifying a Schedule, on page 116
• Specifying a One-Time Schedule, on page 118
• Deleting a Schedule, on page 119
• Removing an Assigned Job, on page 119
• Deleting a Schedule Time, on page 119
• Configuring Execution Logs, on page 120
• Clearing the Execution Log File Contents, on page 120
• Verifying Scheduler Configuration, on page 120
• Configuration Examples for Scheduler, on page 123
Scheduler Terminology
The following terms are used in this chapter:
• Job—A job is a set of NX-OS CLI commands (EXEC and config mode) that are executed as defined in
the schedule.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
111
Scheduling Maintenance Jobs
Licensing Requirements for Command Scheduler
• Schedule—A schedule determines the time when the assigned jobs must be executed. Multiple jobs can
be assigned to a schedule. A schedule executes in one of two modes: one-time or periodic.
• Periodic mode—A job is executed at the user-specified periodic intervals, until it is deleted by the
administrator. The following types of periodic intervals are supported:
• Daily—The job is executed once a day.
• Weekly—The job is executed once a week.
• Monthly—The job is executed once a month.
• Delta—The job is executed beginning at the specified start time and thereafter at user-specified
intervals (days:hours:minutes).
• One-time mode—The job is executed once at a user-specified time.
Default Settings
Table 17: Default Command Scheduler Parameters , on page 113 lists the default settings for command
scheduling parameters.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
112
Scheduling Maintenance Jobs
Configuring the Command Scheduler
Parameters Default
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
113
Scheduling Maintenance Jobs
Examples
Examples
To display the command schedule status, use the show scheduler config command.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
114
Scheduling Maintenance Jobs
Defining a Job
Defining a Job
To define a job, you must specify the job name. This action places you in the job definition (config-job )
submode. In this submode, you can define the sequence of CLI commands that the job has to perform. Be
sure to exit the config-job submode to complete the job definition.
• Job configuration files created using MDS NX-OS or SAN-OS releases before Cisco MDS NX-OS
Release 4.1(1b) are not supported. However, you can edit the job configuration file and combine the
commands within a job into a single line using a semicolon (;).
• You must exit the config-job submode for the job definition to be complete.
• You cannot modify or remove a command after exiting the config-job submode. To make changes, you
must explicitly delete the defined job name and then reconfigure the job with new commands.
To define a job for the command scheduler, follow these steps:
Procedure
Specifies a sequence of actions for the specified job. The defined commands are checked for validity and
stored for future use.
Note Be sure you exit the config-job submode.
Example:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
115
Scheduling Maintenance Jobs
Deleting a Job
Step 4 exit
Example:
switch(config-job)# exit
switch(config)#
Deleting a Job
To delete a job for the command scheduler, follow these steps:
Procedure
Specifying a Schedule
After defining jobs, you can create schedules and assign jobs to the schedule. Subsequently, you can configure
the time of execution. The execution can be one-time or periodic depending on your requirements. If the time
for the schedule is not configured, then it will never be executed.
You can specify a periodic job execution at the specified (daily, weekly, monthly, or delta) intervals.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
116
Scheduling Maintenance Jobs
Examples
To specify a periodic job for the command scheduler, follow these steps:
Procedure
Examples
The following examples are for reference:
Command Purpose
switch(config-schedule)# time daily 23:00 Executes the specified jobs at 11 p.m. every day.
switch(config-schedule)# time weekly Sun:23:00 Specifies a weekly execution every Sunday at 11 p.m.
switch(config-schedule)# time monthly 28:23:00 Specifies a monthly execution at 11 p.m on the 28th
of each month. If you specify the date as either 29,
30, or 31, the command is automatically executed on
the last day of each month.
switch(config-schedule)# time start now repeat Specifies a job to be executed every 48 hours
48:00 beginning 2 minutes from now —if today is September
24, 2004, and the time is now 2:00 p.m., the command
begins executing at 2 minutes past 2:00 p.m. on
September 24, 2004, and continues to execute every
48 hours after that.
switch(config-schedule)# time start 14:00 repeat If today is September 24, 2004, (Friday), this
14:00:00 command specifies the job to be executed every
alternate Friday at 2 p.m. (every 14 days).
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
117
Scheduling Maintenance Jobs
Specifying a One-Time Schedule
The most significant fields in the time parameter are optional. If you omit the most significant fields, the
values are assumed to be the same as the current time. For example, if the current time is September 24, 2004,
22:00 hours, then the commands are executed as follows:
• The time start 23:00 repeat 4:00:00 command implies a start time of September 24, 2004, 23:00 hours.
• The time daily 55 command implies every day at 22:55 hours.
• The time weekly 23:00 command implies every Friday at 23:00 hours.
• The time monthly 23:00 command implies the 24th of every month at 23:00 hours.
Note If the time interval configured for any schedule is smaller than the time taken to execute its assigned job(s),
then the subsequent schedule execution occurs only after the configured interval amount of time has elapsed
following the completion time of the last iteration of the schedule. For example, a schedule is executed at
1-minute intervals and a job assigned to it takes 2 minutes to complete. If the first schedule is at 22:00 hours,
the job finishes at 22:02 after which the 1-minute interval is observed, and the next execution occurs at 22:03
and finishes at 22:05.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
118
Scheduling Maintenance Jobs
Deleting a Schedule
Deleting a Schedule
To delete a schedule, follow these steps:
Procedure
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
119
Scheduling Maintenance Jobs
Configuring Execution Logs
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
120
Scheduling Maintenance Jobs
Verifying the Command Scheduler Configuration
Command Purpose
show scheduler logfile Displays the execution log for all jobs executed in the system
clear scheduler logfile Clear the contents of the scheduler execution log file
For detailed information about the fields in the output from these commands, refer to the Cisco MDS 9000
Family Command Reference .
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
121
Scheduling Maintenance Jobs
Displaying Execution Log File Contents
To display the scheduler password configuration for remote users, use the show running-config command.
Note The scheduler remote user passwords are always displayed in encrypted form in the show running-config
command output. The encrypted option (7) in the command exists to support applying the ASCII configuration
to the switch.
To display the execution log file configuration, use the show scheduler config command.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
122
Scheduling Maintenance Jobs
Configuration Examples for Scheduler
end
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
123
Scheduling Maintenance Jobs
Configuration Examples for Scheduler
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
124
CHAPTER 7
Monitoring System Processes and Logs
This chapter provides details on monitoring the health of the switch.
• Information About System Processes and Logs, on page 125
• Default Settings, on page 130
• Core and Log Files, on page 130
• Configuring System Health, on page 132
• Configuring On-Board Failure Logging, on page 138
• Verifying System Processes and Logs Configuration, on page 141
• Configuring Alerts, Notifications, and Monitoring of Counters, on page 153
• Additional References, on page 157
• Feature History for System Processes and Logs, on page 157
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
125
Monitoring System Processes and Logs
First and Last Core
Tip The timestamp on the restored last core file displays the time when the supervisor booted up not when the
last core was actually dumped. To obtain the exact time of the last core dump, check the corresponding log
file with the same PID.
To view the last core information, enter the show cores command in EXEC mode.
To view the time of the actual last core dump, enter the show process log command in EXEC mode.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
126
Monitoring System Processes and Logs
Loopback Test Configuration Frequency
• Reloads the switch if a standby supervisor module does not exist in the switch.
• Provides CLI support to view, test, and obtain test run statistics or change the system health test
configuration on the switch.
• Performs tests to focus on the problem area.
Each module is configured to run the test relevant to that module. You can change the default parameters of
the test in each module as required.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
127
Monitoring System Processes and Logs
Tests for a Specified Module
Tip The test will not run if system health is disabled in any combination. If system health is disabled to run tests,
the test status shows up as disabled.
Tip If the specific module or interface is enabled to run tests, but is not running the tests due to system health
being disabled, then tests show up as enabled (not running).
Note In Cisco MDS 9700 Series Switches, iSCSI ports are not applicable.
Tip The management port test cannot be run on a standby supervisor module.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
128
Monitoring System Processes and Logs
On-Board Failure Logging
Status Description
Enabled You have currently enabled the test in this module and the test is not running.
Running You have enabled the test and the test is currently running in this module.
Failing This state is displayed if a failure is imminent for the test running in this module—possibility
of test recovery exists in this state.
Failed The test has failed in this module—and the state cannot be recovered.
Stopped The test has been internally stopped in this module by the Cisco NX-OS software.
Internal failure The test encountered an internal failure in this module. For example, the system health
application is not able to open a socket as part of the test procedure.
Diags failed The startup diagnostics has failed for this module or interface.
On demand The system health external-loopback or the system health internal-loopback tests are currently
running in this module. Only these two commands can be issued on demand.
Suspended Only encountered in the MDS 9100 Series due to one oversubscribed port moving to a E or
TE port mode. If one oversubscribed port moves to this mode, the other three oversubscribed
ports in the group are suspended.
The status of each test in each module is visible when you display any of the show system health commands.
See the Displaying System Health , on page 148.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
129
Monitoring System Processes and Logs
Default Settings
Default Settings
Table 19: Default System Health and Log Settings , on page 130 lists the default system health and log settings.
Parameters Default
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
130
Monitoring System Processes and Logs
Copying Files Periodically
Copies cores (if any) of a process with PID 1524 generated on slot 51 or slot 72 to the TFTP server at IPv4
address 1.1.1.1.
Note You can also use IPv6 addresses to identify the TFTP server.
Procedure
Examples
If the core file for the specified process ID (PID) is not available, you see the following response:
1
Cisco MDS 9506 or Cisco MDS 9509 switch
2
Cisco MDS 9513 Director
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
131
Monitoring System Processes and Logs
Clearing the Core Directory
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
132
Monitoring System Processes and Logs
Configuring Loopback Test Configuration Frequency
Procedure
Configures the loopback frequency to 50 seconds. The default loopback frequency is 5 seconds. The valid
range is from 5 to 255 seconds.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
133
Monitoring System Processes and Logs
Configuring Hardware Failure Action
Procedure
Procedure
System health failure action for module 1 loopback test is now disabled.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
134
Monitoring System Processes and Logs
Performing Test Run Requirements
Prevents the switch from taking action on failures determined by the loopback test in module 1.
Procedure
Note The various options for each test are described in the next step. Each command can be configured
in any order. The various options are presented in the same step for documentation purposes.
The following example clears the error history for the specified module:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
135
Monitoring System Processes and Logs
Performing Internal Loopback Tests
The following example clears the management test error history for the specified module:
Use the EXEC-level system health internal-loopback command to explicitly run this test on demand (when
requested by the user) within ports for the entire module and override the frame count configured on the
switch.
Use the EXEC-level system health internal-loopback command to explicitly run this test on demand (when
requested by the user) within ports for the entire module and override the frame length configured on the
switch.
Note If the test fails to complete successfully, the software analyzes the failure and prints the following error:
External loopback test on interface fc 7/2 failed. Failure reason: Failed to loopback, analysis complete Failed
device ID 3 on module 1
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
136
Monitoring System Processes and Logs
Performing External Loopback Tests
Use the EXEC-level system health external-loopback source interface destination interface interface
command to run this test on demand between two ports on the switch.
Use the EXEC-level system health external-loopback interface frame-count command to run this test on
demand for external devices connected to a switch that is part of a long-haul network and override the frame
count configured on the switch.
Use the EXEC-level system health external-loopback interface frame-length command to run this test on
demand for external devices connected to a switch that is part of a long-haul network and override the frame
length configured on the switch.
Use the system health external-loopback interface force command to shut down the required interface
directly without a back out confirmation.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
137
Monitoring System Processes and Logs
Performing Serdes Loopbacks
Note If the test fails to complete successfully, the software analyzes the failure and prints the following error:
External loopback test on interface fc 7/2 failed. Failure reason: Failed to loopback, analysis complete Failed
device ID 3 on module 1
Use the EXEC-level system health serdes-loopback command to explicitly run this test on demand (when
requested by the user) within ports for the entire module and override the frame count configured on the
switch.
Use the EXEC-level system health serdes-loopback command to explicitly run this test on demand (when
requested by the user) within ports for the entire module and override the frame length configured on the
switch.
Note If the test fails to complete successfully, the software analyzes the failure and prints the following error:
External loopback test on interface fc 3/1 failed. Failure reason: Failed to loopback, analysis complete Failed
device ID 3 on module 3.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
138
Monitoring System Processes and Logs
Configuring OBFL for the Switch
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
139
Monitoring System Processes and Logs
Clearing the Module Counters
Procedure
Note The module counters cannot be cleared using Device Manager or DCNM-SAN.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
140
Monitoring System Processes and Logs
Resetting Counters for All Modules
ModuleX#
Attaches module 1 to the chasiss.
Procedure
Command Purpose
show system cores Display the currently configured scheme for copying cores
show system health loopback frame-length Verifies the loopback frequency configuration
For detailed information about the fields in the output from these commands, refer to the Cisco MDS 9000
Family Command Reference.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
141
Monitoring System Processes and Logs
Displaying System Processes
Where:
• ProcessId = Process ID
• State = process state.
• D = uninterruptible sleep (usually I/O).
• R = runnable (on run queue).
• S = sleeping.
• T = traced or stopped.
• Z = defunct (“zombie”) process.
• NR = not running.
• ER = should be running but currently not-running.
• PC = current program counter in hex format.
• Start_cnt = number of times a process has been started (or restarted).
• TTY = terminal that controls the process. A hyphen usually means a daemon not running on any particular
TTY.
• Process Name = name Name of the process.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
142
Monitoring System Processes and Logs
Displaying System Processes
Where:
• MemAllocated = Sum of all the dynamically allocated memory that this process has received
from the system, including memory that may have been returned
• Runtime CPU Time (ms) = CPU time the process has used, expressed in
milliseconds.microseconds
• Invoked = number of times the process has been invoked.
• uSecs = microseconds of CPU time on average for each process invocation.
• 1Sec = CPU utilization in percentage for the last one second.
Where:
• Normal-exit = whether or not the process exited normally.
• Stack-trace = whether or not there is a stack trace in the log.
• Core = whether or not there exists a core file.
• Log-create-time = when the log file got generated.
Service: fspf
Description: FSPF Routing Protocol Application
Started at Sat Jan 5 03:23:44 1980 (545631 us)
Stopped at Sat Jan 5 04:25:57 1980 (819598 us)
Uptime: 1 hours 2 minutes 2 seconds
Start type: SRV_OPTION_RESTART_STATELESS (23)
Death reason: SYSMGR_DEATH_REASON_FAILURE_SIGNAL (2)
Exit code: signal 9 (no core)
CWD: /var/sysmgr/work
Virtual Memory:
CODE 08048000 - 0809A100
DATA 0809B100 - 0809B65C
BRK 0809D988 - 080CD000
STACK 7FFFFD20
TOTAL 23764 KB
Register Set:
EBX 00000005 ECX 7FFFF8CC EDX 00000000
ESI 00000000 EDI 7FFFF6CC EBP 7FFFF95C
EAX FFFFFDFE XDS 8010002B XES 0000002B
EAX 0000008E (orig) EIP 2ACE133E XCS 00000023
EFL 00000207 ESP 7FFFF654 XSS 0000002B
Stack: 1740 bytes. ESP 7FFFF654, TOP 7FFFFD20
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
143
Monitoring System Processes and Logs
Displaying System Status
Where:
• MemAlloc = total memory allocated by the process.
• StackBase/Ptr = process stack base and current stack pointer in hex format.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
144
Monitoring System Processes and Logs
Displaying System Status
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
145
Monitoring System Processes and Logs
Displaying Core Status
• In a Cisco MDS 9200 Series switch, this command clears the reset-reason information stored
in NVRAM in the active supervisor module.
System Uptime
The following example displays system uptime:
Use the show system resources command to display system-related CPU and memory statistics (see
System Related CPU and Memory Information, on page 146).
Where:
• Load average—Displays the number of running processes. The average reflects the system load
over the past 1, 5, and 15 minutes.
• Processes—Displays the number of processes in the system, and how many are actually running
when the command is issued.
• CPU states—Displays the CPU usage percentage in user mode, kernel mode, and idle time in
the last one second.
• Memory usage—Displays the total memory, used memory, free memory, memory used for
buffers, and memory used for cache in KB. Buffers and cache are also included in the used
memory statistics.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
146
Monitoring System Processes and Logs
Displaying Core Status
All Cores Available for Upload from the Active Supervisor Module
The following example displays all cores available for upload from the active supervisor module:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
147
Monitoring System Processes and Logs
Verifying First and Last Core Status
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
148
Monitoring System Processes and Logs
Displaying System Health
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
149
Monitoring System Processes and Logs
Displaying System Health
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
150
Monitoring System Processes and Logs
Verifying Loopback Test Configuration Frame Length
Note Interface-specific counters will remain at zero unless the module-specific loopback test reports errors
or failures.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
151
Monitoring System Processes and Logs
Displaying the OBFL for a Module
system-health Enabled
stack-trace Enabled
Command Purpose
show logging onboard boot-uptime Displays the boot and uptime information.
show logging onboard cpu-hog Displays information for CPU hog events.
show logging onboard module slot Displays OBFL information for a specific module.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
152
Monitoring System Processes and Logs
Displaying the Module Counters Information
Command Purpose
show logging onboard starttime Displays OBFL logs from a specified start time.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
153
Monitoring System Processes and Logs
Obtaining RAM Usage Information
ceExtProcessorRam OBJECT-TYPE
SYNTAX Unsigned32
UNITS "bytes"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Total number of bytes of RAM available on the
Processor."
::= { ceExtPhysicalProcessorEntry 1 }
ifHCInOctets
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
154
Monitoring System Processes and Logs
Monitoring Transceiver Thresholds
cIfXcvrMonStatusChangeNotif NOTIFICATION-TYPE
OBJECTS {
ifName,
cIfXcvrMonDigitalDiagTempAlarm,
cIfXcvrMonDigitalDiagTempWarning,
cIfXcvrMonDigitalDiagVoltAlarm,
cIfXcvrMonDigitalDiagVoltWarning,
cIfXcvrMonDigitalDiagCurrAlarm,
cIfXcvrMonDigitalDiagCurrWarning,
cIfXcvrMonDigitalDiagRxPwrAlarm,
cIfXcvrMonDigitalDiagRxPwrWarning,
cIfXcvrMonDigitalDiagTxPwrAlarm,
cIfXcvrMonDigitalDiagTxPwrWarning,
cIfXcvrMonDigitalDiagTxFaultAlarm
}
STATUS current
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
155
Monitoring System Processes and Logs
Configuring Supervisor Switchover Notification
ciscoRFSwactNotif NOTIFICATION-TYPE
OBJECTS {
cRFStatusUnitId,
sysUpTime,
cRFStatusLastSwactReasonCode
}
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
156
Monitoring System Processes and Logs
Monitoring User Authentication Failures
Additional References
For additional information related to implementing System Processes and Logs, see the following section:
MIBs
Common Information Model 3.3(1a) Added commands for displaying Common Information Model.
On-line system health maintenance 3.0(1) Includes the following OHMS enhancements:
(OHMS) enhancements
• Configuring the global frame length for loopback test for all modules on
the switch.
• Specifying frame count and frame length on for the loopback test on a
specific module.
• Configuring source and destination ports for external loopback tests.
• Providing serdes loopback test to check hardware.
On-board failure logging (OBFL) 3.0(1) Describes OBFL, how to configure it for Generation 2 modules, and how to
display the log information.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
157
Monitoring System Processes and Logs
Feature History for System Processes and Logs
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
158
CHAPTER 8
About Embedded Event Manager
This chapter describes how to configure the EEM to detect and handle critical events on a device.
• Feature History for EEM, on page 159
• Information About EEM, on page 159
• Licensing Requirements for EEM, on page 164
• Prerequisites for EEM, on page 164
• Guidelines and Limitations, on page 164
• Default Settings, on page 165
• Configuring Embedded Event Manager, on page 165
• Verifying the EEM Configuration, on page 175
• Configuration Examples for EEM , on page 175
• Additional References, on page 176
Embedded Event Manager (EEM) 4.1(3) New chapter on configuring Embedded Event Manager (EEM) has been added.
EEM—Zone, FCNS, and FLOGI 6.2(11) This feature enables users to configure custom limits for default Zone, FCNS, and
FLOGI system policies.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
159
About Embedded Event Manager
EEM Overview
EEM Overview
EEM consists of three major components:
• Event statements—Events to monitor from another Cisco NX-OS component that may require some
action, workaround, or notification.
• Action statements —Actions that EEM can take, such as sending an e-mail, or disabling an interface, to
recover from an event.
• Policies—A combination of an event statement and an action statement. When the specified event occurs,
the configured action is executed.
Policies
An EEM policy consists of an event statement and one or more action statements. The event statement defines
the event to look for as well as the filtering characteristics for the event. The action statement defines the
action EEM takes when the event occurs.
Figure 5: EEM Policy Statements, on page 160 shows the two basic statements in an EEM policy.
Figure 5: EEM Policy Statements
You can configure EEM policies using the CLI or using a VSH script.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
160
About Embedded Event Manager
Policies
• __zone_zonesets_max_per_sw : Syslog warning when Zoneset count exceeds the max limit of 1000
for the switch.
Note All the above three FLOGI policies are over ridable.
Note User should not configure an event for a different component's policy.
You can create user policies to suit your network. Actions defined by the user policies are executed along
with the actions defined by the system policies. To configure a user policy, see the Defining a User Policy
Using the CLI, on page 165.
You can also override some system policies. The override policies replace the system policies. You can
override the event or the actions.
Use the show event manager system-policy command to view the preconfigured system policies and determine
which policies that you can override.
To configure an overriding policy, see the Overriding a Policy, on page 173.
Note You should use the show running-config eem command to check the configuration of each policy. An override
policy that consists of an event statement and no action statement triggers no action and no notification of
failures.
Note Your override policy should always include an event statement. An override policy without an event statement
overrides all possible events in the system policy.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
161
About Embedded Event Manager
Event Statements
Event Statements
An event is any device activity for which some action, such as a workaround or a notification, should be taken.
In many cases, these events are related to faults in the device such as when an interface or a fan malfunctions.
Figure 6: EEM Overview, on page 162 EEM defines event filters so only critical events or multiple occurrences
of an event within a specified time period trigger an associated action.
shows events that are handled by EEM.
Figure 6: EEM Overview
Event statements specify the event that triggers a policy to run. You can configure only one event statement
per policy.
EEM schedules and runs policies on the basis of event statements. EEM examines the event and action
commands and runs them as defined.
Action Statements
Action statements describe the action triggered by a policy. Each policy can have multiple action statements.
If no action is associated with a policy, EEM still observes events but takes no actions.
EEM supports the following actions in action statements:
• Execute any CLI commands.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
162
About Embedded Event Manager
VSH Script Policies
• Update a counter.
• Log an exception.
• Force the shut down of any module.
• Reload the device.
• Shut down specified modules because the power is over budget.
• Generate a syslog message.
• Generate a Call Home event.
• Generate an SNMP notification.
• Use the default action for the system policy.
Note If you want to allow the triggered event to process the default actions also, you must explicitly configure an
EEM action with event-default or policy-default, based on the type of policy. For example, if you match a
CLI command in a match statement, you must add the event-default action statement to the EEM policy. If
the event-default action statement is not added, EEM will not allow the CLI command to execute.
Note Verify that your action statements within your user policy or overriding policy do not negate each other or
adversely affect the associated system policy.
Environment Variables
You can define environment variables for EEM that are available for all policies. Environment variables are
useful for configuring common values that you can use in multiple policies. For example, you can create an
environment variable for the IP address of an external e-mail server.
You can use an environment variable in action statements by using the parameter substitution format.
Action Statement
The following example shows a sample action statement to force a module 1 shutdown, with a reset
reason of “EEM action.”
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
163
About Embedded Event Manager
EEM Event Correlation
You can reuse this environment variable in any policy. For more information on environment variables,
see the Defining an Environment Variable, on page 174.
High Availability
Cisco NX-OS supports stateless restarts for EEM. After a reboot or supervisor switchover, Cisco NX-OS
applies the running configuration.
NX-OS EEM requires no license. Any feature not included in a license package is bundled with the Cisco
NX-OS system images and is provided at no extra charge to you.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
164
About Embedded Event Manager
Default Settings
• When more than one event statement is included in an EEM policy, each event statement must have a
tag keyword with a unique tag argument.
Default Settings
Table 22: Default EEM Parameters , on page 165 lists the default settings for EEM parameters.
Parameters Default
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
165
About Embedded Event Manager
Configuring Event Statements
Configures an action statement for the policy. See the Configuring Action Statements, on page 169.
Repeat Step 5 for multiple action statements.
Command Purpose
event cli [tag tag_name match expression ] [count repeats Triggers an event if you enter a CLI command
|time seconds ] that matches the regular expression.
The tag tag_name keyword-argument pair
identifies this specific event when multiple
events are included in the policy.
The repeats range is from 1 to 65000. The time
range, in seconds, is from 0 to 4294967295,
where 0 indicates no time limit.
event counter name counter entry-val entry entry-op Triggers an event if the counter crosses the entry
{eq|ge|gt|le|lt|ne }[exit-val exit exit-op exit threshold (based on the entry operation—greater
{eq|ge|gt|le|lt|ne }] than, less than, and so on.) The event resets
immediately. Optionally, you can configure the
event to reset after the counter passes the exit
threshold. The counter name can be any
case-sensitive, alphanumeric string up to 28
characters. The entry and exit value ranges are
from 0 to 2147483647.
event fanabsent [fan number ] time seconds Triggers an event if a fan is removed from the
device for more than the configured time, in
seconds. The fan number range is dependent on
different switches (for example for 9513 switches
the range is from1 to 2, for 9506/9509 switches
the range is 1). The seconds range is from 10 to
64000.
event fanbad [fan number ] time seconds Triggers an event if a fan fails for more than the
configured time, in seconds. The fan number
range is dependent on different switches (for
example for 9513 switches the range is from1 to
2, for 9506/9509 switches the range is 1). The
seconds range is from 10 to 64000.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
166
About Embedded Event Manager
Configuring Event Statements
Command Purpose
event module-failure type failure-type module { slot | all Triggers an event if a module experiences the
{ slot | count repeats [time seconds] failure type configured.
The slot range is dependent on different switches
(for example for 9513 switches the range is
from1 to 13, for 9509 switches the range is 1 to
9). The repeats range is from 0 to 4294967295.
The seconds range is from 0 to 4294967295.
event oir {fan | module | powersupply} {anyoir | insert Triggers an event if the configured device
| remove [number]} element (fan, module, or power supply) is
inserted or removed from the device. You can
optionally configure a specific fan, module, or
power supply number. The number range is as
follows:
• Fan number is dependent on different
switches.
• Module number is dependent on different
switches.
• Power supply number range is from 1 to 2.
event policy-default count repeats [time seconds ] Uses the event configured in the system policy.
Use this option for overriding policies.
The repeats range is from 1 to 65000. The
seconds range is from 0 to 4294967295.
event snmp oid oid get-type{exact | next} entry-op {eq Triggers an event if the SNMP OID crosses the
| ge | gt | le | lt |ne} entry-val entry [exit-comb {and | or}] entry threshold (based on the entry
exit-op {eq | ge | gt | le | lt |ne} exit-val exitexit-time operation—greater than, less than, and so on.)
timepolling-interval interval The event resets immediately, or optionally you
can configure the event to reset after the counter
passes the exit threshold. The OID is in dotted
decimal notation. The entry and exit value ranges
are from 0 to 18446744073709551615. The time
range is from 0 to 2147483647. The interval
range is from 1 to 2147483647.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
167
About Embedded Event Manager
Configuring Event Statements
Command Purpose
event syslog {occurs occurs number | pattern syslog Triggers an event based on a message logged in
pattern | period time intervals | priority syslog priority | the syslog logfile.
tag tag_name }
occurs occurs number-Specifies the number of
occurrences. The range is from 1 to 65000.
pattern syslog pattern-Specifies the syslog
pattern. Normal regular expression pattern
matching is used. The maximum size is 256
alphanumerical characters.
period time intervals-Specifies the maximum
time interval between messages. The range is
from 0 to 4294967295 seconds.
priority syslog priority-Specifies the syslog
priority.
• alerts—Specifies the alert log message
• critical—Specifies the critical log message
• debugging—Specifies the debugging
message
• emergencies—Specifies the emergency log
message
• errors—Specifies the error log message
• informational—Specifies the informational
log message
• notification—Specifies the notification log
message
• pattern—Specifies the pattern matching
• warnings—Specifies the warning message
event temperature [module slot ] [sensor sensor number Triggers an event if the temperature sensor
]threshold {any | major | minor} exceeds the configured threshold. The slot range
is dependent on different switches. The sensor
range is from 1 to 8 on MDS modules, but
current MDS modules use the range from 1 to 3
only, some modules use the range from 1 to 2.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
168
About Embedded Event Manager
Configuring Action Statements
Command Purpose
action number add variable-name Adds variable values to the action command when an EEM applet is
triggered. To undo the add action, use the no form of this command.
action number append Appends a variable value to an existing variable string when an EEM
variable-name applet is triggered. To undo the append action, use the no form of this
command.
action number break Exits from a loop of action when an EEM applet is triggered. To disable
the break action, use the no form of this command.
action number cli command Executes the configured VSH CLI commands when an EEM applet is
command-name triggered. To disable the CLI command action, use the no form of this
command. Valid value for the VSH command name is 256 characters.
From Cisco MDS NX-OS Release 8.1(1) the command keyword was
added. The command keyword specifies the message to be sent to the
Cisco NX-OS CLI. Add the command name within double quotation
marks.
action number cli local Executes the configured VSH CLI commands when an EEM applet is
command command-name triggered. To disable the CLI command action, use the no form of this
command. Valid value for the VSH command name is 256 characters.
From Cisco MDS NX-OS Release 8.1(1), the command keyword was
added. The command keyword specifies the message to be sent to the
Cisco NX-OS CLI. Add the command name within double quotation
marks.
action number comment string Specifies an action of adding comments to an applet when an EEM applet
is triggered. To disable the comment action, use the no form of this
command. Valid value for string sequence is 256 characters.
action number continue Specifies an action of continuing with loop of actions when an EEM
applet is triggered. To disable the comment action, use the no form of
this command.
action number [. number ] Modifies the counter by the configured value and operation. The action
counter name counter value val label is in the format number1.number2.
op {dec | inc | nop | set}
number can be any number up to 16 digits. The range for number2 is
from 0 to 9.
The counter name can be any case-sensitive, alphanumeric string up to
28 characters. The val can be an integer from 0 to 2147483647 or a
substituted parameter.
action number decrement Specifies the action of decrementing the value of a variable, when an
decrement-name EEM applet is triggered. To remove the action from the applet, use the
no form of this command.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
169
About Embedded Event Manager
Configuring Action Statements
Command Purpose
action number divide divide-name Divides the dividend value by the given divisor value when an EEM
applet is triggered. To remove the calculation process, use the no form
of this command.
action number eem Specifies the EEM action command when an EEM applet is triggered.
To remove the EEM action command, use the no form of this command.
action number else Specifies the beginning of an else conditional action block in an if/else
conditional action block when an EEM applet is triggered. To remove
the else conditional action block, use the no form of this command.
action number elseif Specifies the beginning of an elseif conditional action block in an if/else
conditional action block when an EEM applet is triggered. To remove
the else conditional action block, use the no form of this command.
action number end Specifies the end of a conditional action block in the if/else and while
conditional action block when an EEM applet is triggered. To remove
the end conditional action block, use the no form of this command.
action number [. number ] Executes the default action for the associated event. The action label is
event-default in the format number1.number2.
number can be any number up to 16 digits. The range for number2 is
from 0 to 9.
action number exit Exits from the running applet configuration when an EEM applet is
triggered. To cancel the process of immediate exit from the running
applet, use the no form of this command.
action number file {close | delete Configures the EEM applet file operations, use the action file command
| gets | open | puts | read | write} in applet configuration mode. To disable the configuration, use the no
form of this command.
action number foreach Specifies the iteration of an input string using the delimiter as a tokenizing
foreach-name pattern. To remove iteration of the input string, use the no form of this
command.
action number if if-name Identifies the beginning of an if conditional block when an EEM applet
is triggered, use the action if command in applet configuration mode. To
remove the if conditional action block, use the no form of this command.
action number increment Specifies the action of incrementing the value of a variable, when an
increment-name EEM applet is triggered. To remove the action from the applet, use the
no form of this command.
action number multiply Specifies the action of multiplying the variable value with a specified
multiply-name given integer value when an EEM applet is triggered. To remove the
calculation process, use the no form of this command.
action number overbudgetshut Forces one or more modules or the entire system to shut down because
[module module-name] of a power overbudget issue.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
170
About Embedded Event Manager
Configuring Action Statements
Command Purpose
action number policy-default Executes the default action for the policy that you are overriding. To
remove the action policy command from the configuration, use the no
form of this command.
action number publish-event Specifies the action of publishing an application-specific event when the
event specified for an EEM applet is triggered. To remove the action of
publishing an application-specific event, use the no form of this command.
action number puts Enables the action of printing data directly to the local TTY when an
EEM applet is triggered. To disable this function, use the no form of this
command.
action number Matches a regular expression pattern on an input string when an EEM
regexpregexp-name applet is triggered. To disable this function, use the no form of this
command.
action number reload Forces one or more modules or the entire system to reload.
action number setset-name Sets the value of a variable when an EEM applet is triggered. To remove
the value of an EEM applet variable, use the no form of this command.
action number [. number2 ] Sends an SNMP trap with the configured data. number can be any number
snmp-trap {[intdata1 data up to 16 digits. The range for number2 is from 0 to 9.
[intdata2 data [strdata string]]]}
The data arguments can by any number up to 80 digits. The string can
be any alphanumeric string up to 80 characters.
action number string Specifies the string action command for an EEM applet. To remove the
action of string operation, use the no form of this command.
action number wait wait-value Specifies the wait time for an action for an EEM applet. To disable this
function, use the no form of this command.
action number while Identifies the beginning of a loop of a conditional block when an EEM
while-number applet is triggered. To disable this function, use the no form of this
command.
action number [. number2] Logs an exception if the specific conditions are encountered when an
exceptionlog module module EEM applet is triggered.
syserr error devid id errtype type
errcode code phylayer layer
ports list harderror error [desc
string]
action number [. number number2 Forces a module, crossbar, or the entire system to shut down. The action
] forceshut [module slot | xbar label is in the format number1.number2.
xbar number ] reset-reason
number can be any number up to 16 digits. The range for number2 is
seconds
from 0 to 9.
The slot range is dependent on different switches. The xbar-number range
is from 1 to 2 and is only available on MDS 9513 modules.
The reset reason is a quoted alphanumeric string up to 80 characters.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
171
About Embedded Event Manager
Defining a Policy Using a VSH Script
Command Purpose
action number [. number ] Forces one or more modules or the entire system to shut down because
overbudgetshut [module slot [- of a power overbudget issue.
slot ]]
number can be any number up to 16 digits. The range for number2 is
from 0 to 9.
The slot range is dependent on different switches.
action number [. number ] Executes the default action for the policy that you are overriding. The
policy-default action label is in the format number1.number2.
number can be any number up to 16 digits. The range for number2 is
from 0 to 9.
action number [. number ] reload Forces one or more modules or the entire system to reload.
[module slot [- slot ]]
number can be any number up to 16 digits. The range for number2 is
from 0 to 9.
The slot range is dependent on different switches.
action number [. number2 ] syslog Sends a customized syslog message at the configured priority.number
[priority prio-val ] msg error can be any number up to 16 digits. The range for number2 is from 0 to
message 9.
The error-message can be any quoted alphanumeric string up to 80
characters.
Note If you want to allow the triggered event to process the default actions also, you must explicitly configure an
EEM action with event-default or policy-default, based on the type of policy. For example, if you match a
CLI command in a match statement, you must add the event-default action statement to the EEM policy or
EEM will not allow the CLI command to execute. You can bypass all CLI-based EEM policies using the
terminal event-manager bypass command. To revert use the terminal no event-manager bypass command.
Procedure
Step 1 In a text editor, list the CLI commands that define the policy.
Step 2 Name the text file and save it.
Step 3 Copy the file to the following system directory:
bootflash://eem/user_script_policies
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
172
About Embedded Event Manager
Registering and Activating a VSH Script Policy
Procedure
Overriding a Policy
To override a system policy, follow these steps:
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
173
About Embedded Event Manager
Defining an Environment Variable
• Deleting an overridden policy does not remove the default system policy.
• You can modify an overridden policy by changing the respective Zone, FCNS, or FLOGI limit values.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
174
About Embedded Event Manager
Verifying the EEM Configuration
Command Purpose
show event manager environment [variable-name Displays information about the event manager
| all] environment variables.
show event manager event-types [event | all | Displays information about the event manager event
module slot ] types.
show event manager history events [detail] Displays the history of events for all policies.
[maximum num-events] [severity {catastrophic |
minor | moderate | severe}]
show event manager policy internal [policy-name] Displays information about the configured policies.
[inactive]
show event manager policy-state policy-name Displays information about policy state, including
thresholds.
show event manager script system Displays information about the script policies.
[policy-name}all]
show event manager system-policy [all] Displays information about the predefined system
policies.
The following example modifies an overridden policy by changing the number of FCNS database entries to
1500. It also generates both the configured and the default syslog messages of the default system policy
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
175
About Embedded Event Manager
Additional References
action 1.0 syslog priority warnings msg FCNS DB entries have reached the EEM limit
The following example creates an EEM policy that allows the CLI command to execute but triggers an SNMP
notification when a user enters configuration mode on the device:
Note You must add the event-default action statement to the EEM policy or EEM will not allow the CLI command
to execute.
The following example shows how to confiure a VSH command string to be executed when an EEM applet
is triggered:
Additional References
For additional information related to implementing EEM, see the following section:
MIBs
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
176
CHAPTER 9
Configuring RMON
RMON is an Internet Engineering Task Force (IETF) standard monitoring specification that allows various
network agents and console systems to exchange network monitoring data. You can use the RMON alarms
and events to monitor Cisco MDS 9000 Family switches running the Cisco SAN-OS Release 2.0(1b) or later
or Cisco NX-OS Release 4.1(3) or later software.
• Information About RMON, on page 177
• Default Settings, on page 179
• Configuring RMON, on page 179
• Verifying the RMON Configuration, on page 181
• Additional References, on page 182
• Feature History for RMON, on page 182
For agent and management information, see the Cisco MDS 9000 Family MIB Quick Reference.
For information on an SNMP-compatible network management station, see the System Management
Configuration Guide, Cisco DCNM for SAN.
For SNMP security-related CLI configurations, see .
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
177
Configuring RMON
RMON Configuration Using Threshold Manager
Tip We recommend an additional, generic RMON console application on the network management station (NMS)
to take advantage of RMON's network management capabilities. Refer to the System Management Configuration
Guide, Cisco DCNM for SAN.
Note To configure any type of RMON alarm (absolute or delta, rising or falling threshold) click More on the
Threshold Manager dialog box. You should be familiar with how RMON defines these concepts before
configuring these advanced alarm types. Refer to the RMON-MIB (RFC 2819) for information on how to
configure RMON alarms.
Note You must also configure SNMP on the switch to access RMON MIB objects.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
178
Configuring RMON
Default Settings
The range for the rising threshold and falling threshold values is -2147483647 to 2147483647.
Caution The falling threshold must be less than the rising threshold.
Default Settings
Table 23: Default RMON Settings , on page 179 lists the default settings for all RMON features in any switch.
Parameters Default
Configuring RMON
RMON is disabled by default, and no events or alarms are configured in the switch.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
179
Configuring RMON
Configuring the RMON Alarm
Procedure
Procedure
Step 2 switch(config)# rmon event 2 log trap eventtrap description CriticalErrors owner Test2
Creates RMON event number 2 to define CriticalErrors and generates a log entry when the event is triggered
by the alarm. The user Test2 owns the row that is created in the event table by this command. This example
also generates an SNMP trap when the event is triggered.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
180
Configuring RMON
Verifying the RMON Configuration
Command Purpose
For detailed information about the fields in the output from these commands, refer to the Cisco MDS 9000
NX-OS Command Reference.
Use the show rmon and show snmp commands to display configured RMON and SNMP information (see
Configured RMON Alarms, on page 181 and Configured RMON Events, on page 182).
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
181
Configuring RMON
Additional References
Note High capacity RMON alarms can be configured using the CISCO-HC-ALARM-MIB. See the Cisco
MDS 9000 Series MIB Quick Reference.
Additional References
For additional information related to implementing RMON, see the following section:
MIBs
RMON high capacity alarms 3.0(1) Provides the show rmon high capacity alarms command to display RMON high capacity
alarm values.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
182
CHAPTER 10
Configuring Online Diagnostics
Beginning with Cisco MDS NX-OS Release 6.2, the Cisco MDS 9700 Family supports the GOLD (Generic
Online Diagnostics) feature. GOLD is a diagnostic service which is also supported on the Cisco Nexus 7000
and 7700 series switches. This chapter describes how to configure the GOLD feature on a Cisco MDS 9700
Family switch.
• Information About Online Diagnostics, on page 183
• Licensing Requirements for Online Diagnostics , on page 190
• Default Settings, on page 190
• Configuring Online Diagnostics, on page 191
• Verifying the Online Diagnostics, on page 197
• Configuration Examples for Online Diagnostics, on page 198
• Additional References, on page 198
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
183
Configuring Online Diagnostics
Bootup Diagnostics
Bootup Diagnostics
Bootup diagnostics run during bootup and detect faulty hardware before a Cisco MDS 9700 Family switch
brings a module online. For example, if there is a faulty module in the device, the appropriate bootup diagnostics
test fails indicating the fault.
Table 25: Bootup Diagnostics , on page 184 describes the bootup diagnostic tests for a linecard and a supervisor.
Linecard
OBFL C**N**X**T* Verifies the integrity of the OBFL (Onboard Failure Logging)
flash.
BootupPortLoopback CP*N**XE*T* PortLoopback test that runs only during module bootup.
Note Beginning from the Cisco MDS NX-OS Release
6.2(11), BootupPortLoopback failure for FC ports
(on the Cisco MDS 48-Port 16-Gbps Fibre Channel
module) puts the failed ports in a diagfailure mode.
Supervisor
OBFL C**N**X**T* Verifies the integrity of the OBFL (Onboard Failure Logging)
flash.
When the show module command is executed, the result of bootup diagnostics is displayed as Online Diag
Status. The result of individual test is displayed when the show diagnostic result command is executed for
appropriate module and test ID or test name.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
184
Configuring Online Diagnostics
Health Monitoring Diagnostics
The Cisco MDS 9700 Family switch can be configured to either bypass the bootup diagnostics or run the
complete set of bootup diagnostics. See the Setting the Bootup Diagnostic Level, on page 191.
Supervisor
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
185
Configuring Online Diagnostics
Health Monitoring Diagnostics
Table 26: Health Monitoring Diagnostics, on page 186 describes the health monitoring diagnostics for the
Cisco MDS 48-Port 16-Gbps Fibre Channel module.
Linecard
ASICRegisterCheck 1 minute ***N******A Verifies read or write access to scratch registers for
the ASICs on a module.
PrimaryBootROM 30 minutes ***N******A Verifies the integrity of the primary boot device on
a module.
SecondaryBootROM 30 minutes ***N******A Verifies the integrity of the secondary boot device
on a module.
SnakeLoopback 20 minutes *P*N***E** Verifies connectivity from sup to all the ports in the
Linecard. It checks the integrity of the data path up
to the MAC component in a progressive manner (a
single run of tests covers all the ports). It runs on all
the ports irrespective of their states.
This is a non-disruptive test.
IntPortLoopback 5 minutes *P*N***E*** Verifies connectivity from sup to all the ports in the
Linecard (one port at a time). It checks the integrity
of the data path up to the MAC component. This test
runs in Health Monitoring (HM) mode as well as it
can be triggered in “on-demand mode.”
This test is Non-disruptive.
Note The IntPortLoopback test is supported
beginning from the Cisco MDS NX-OS
Release 6.2(7).
RewriteEngine 1 minute *P*N***E**A Verifies the integrity of each link on the fabric
Loopback module from sup to linecard.
Table 27: Health Monitoring Diagnostics , on page 186 describes the health monitoring diagnostics for the
Cisco MDS 48-Port 10-Gbps Fibre Channel over Ethernet Module.
Linecard
ASICRegisterCheck 1 minute ***N******A Verifies read or write access to scratch registers for
the ASICs on a module.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
186
Configuring Online Diagnostics
On-Demand Diagnostics
PrimaryBootROM 30 minutes ***N******A Verifies the integrity of the primary boot device on
a module.
SecondaryBootROM 30 minutes ***N******A Verifies the integrity of the secondary boot device
on a module.
PortLoopback 15 minutes *P*D***E**A Verifies connectivity from sup to all the ports in the
linecard. It checks the integrity of the data path up
to PHY. This test runs in Health Monitoring (HM)
mode as well as it can be triggered in “on-demand
mode.” It runs only on ports which are down
(administratively).
This is a disruptive test.
Note The PortLoopback test runs only on ports
which are administratively down.
RewriteEngine 1 minute *P*N***E**A Verifies the integrity of each link between linecards
Loopback or sup and linecard through fabric modules.
SnakeLoopback 20 minutes *P*N***E** Verifies connectivity from sup to all the ports in the
linecard. It checks the integrity of the data path up
to the MAC component in a progressive manner. It
runs on all the ports irrespective of their states.
This is a non-disruptive test.
On-Demand Diagnostics
All the Health Monitoring tests can be evoked on demand also. On-demand diagnostics runs only when
invoked by the user.
Cisco MDS 48-Port 16-Gbps Fibre Channel module—There are only 2 tests which can be invoked in on-demand
mode only, see Table 28: On-Demand Diagnostics, on page 188.
Cisco MDS 48-Port 10-Gbps Fibre Channel over Ethernet Module—There are no tests which can be invoked
only in on-demand mode.
Note The data paths (PHY and SFP) which are not verified by other Health Monitoring tests can be verified by the
PortLoopback and ExtPortLoopback tests.
You can run on-demand diagnostics whenever required. See the Starting or Stopping an On-Demand Diagnostic
Test, on page 194 for more information.
On Cisco MDS 48-Port 16-Gbps Fibre Channel module, both the PortLoopback and ExtPortLoopback tests
are available in on-demand mode only as they are disruptive.
Table 28: On-Demand Diagnostics, on page 188 describes the on-demand diagnostics (for linecard only) on
the Cisco MDS 48-Port 16-Gbps Fibre Channel module.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
187
Configuring Online Diagnostics
Recovery Actions on Specified Health Monitoring Diagnostics
Linecard
PortLoopback *P*D**XE*** Verifies connectivity from sup to all the ports in the linecard. It checks
the integrity of the data path up to PHY. This test is available only in
“on-demand mode.” The test runs on all the ports irrespective of the port
state.
Note Portloopback test is equivalent to the Serdes Loopback test
of OHMS.
ExtPortLoopback *P*D**XE*** Identifies hardware errors in the entire data path up to PHY including
the SFP.
Note Connect a loopback plug to loop the Tx of the port to the Rx
of the port before running the test. If the loopback plug is not
connected this test fails.
Caution The PortLoopback and ExtPortLoopback tests are disruptive as they bring down the port for the purpose of
diagnostic operation.
Note Restart the Health Monitoring tests on failed instances by clearing the test result, deactivating, and then activate
the test on the same module. For more information see Clearing Diagnostic Results, on page 196, Deactivating
a Health Monitoring Diagnostic Test, on page 193, and Activating a Health Monitoring Diagnostic Test, on
page 192.
Beginning with the Cisco MDS NX-OS Release 6.2(11), the system can be configured to take corrective
(recovery) actions in addition to the default actions after reaching the threshold number of consecutive failures
for any of the following Health Monitoring tests:
• PortLoopback test (supported only on Cisco MDS 48-Port 10-Gbps FCoE Module)
• RewriteEngineLoopback test
• StandbyFabricLoopback test
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
188
Configuring Online Diagnostics
Corrective (recovery) Action for Supervisor
Note After reload, when the standby supervisor comes online, the Health Monitoring Diagnostics starts by default.
Note One retry means a complete cycle of reloading the standby supervisor followed by threshold number of
consecutive failures of StandbyFabricLoopback test.
Corrective (Recovery) Action for Cisco MDS 48-Port 16-Gbps Fibre Channel Module
The corrective action for each test is as follows:
• Internal PortLoopback test—The system brings down the failed ports and puts them in a diagfailure state.
• RewriteEngineLoopback test—The system takes different corrective action depending on the faulty
component (supervisor or fabric):
• On a chassis with a standby supervisor (which is in ha-standby state), if the system detects a fault
with the active supervisor, the system triggers a switchover and switches over to the standby
supervisor. If there is no standby supervisor in the chassis, the system does not take any action.
Note As the PortLoopback test is available only in on-demand mode on the Cisco MDS 48-Port 16-Gbps Fibre
Channel Module, it does not support corrective actions.
Note From the Cisco MDS NX-OS Release 6.2(13), RewriteEngineLoopback test and corrective actions for
RewriteEngineLookpback test are supported on the Cisco MDS 48-Port 16-Gbps Fibre Channel Module.
Corrective (Recovery) Action for Cisco MDS 48-Port 10-Gbps FCoE Module
• PortLoopback test—The system brings down the failed ports and puts them in an error disabled state.
• RewriteEngineLoopback test—The system takes different corrective action depending on the faulty
component (supervisor or fabric):
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
189
Configuring Online Diagnostics
High Availability
• On a chassis with a standby supervisor (which is in ha-standby state), if the system detects a fault
with the active supervisor, the system triggers a “switchover” and switches over to the standby
supervisor. If there is no standby supervisor in the chassis, the system does not take any action.
Note If the standby supervisor present in the chassis is powered down in response to the corrective action (associated
with StandbyFabricLoopback test), the system does not take any action.
High Availability
A key part of high availability is detecting hardware failures and taking corrective action in a live system.
GOLD contributes to the high availability of the system by detecting hardware failures and providing feedback
to software components to make switchover decisions.
Cisco MDS 9700 Family switches support stateless restart for GOLD by applying the running configuration
after a reboot. After supervisor switchover, GOLD resumes diagnostics from the new active supervisor.
Cisco Online diagnostics require no license. Any feature not included in a license package is bundled
NX-OS with the Cisco NX-OS system images and is provided at no extra charge to you. For a complete
explanation of the Cisco NX-OS licensing scheme, see the Cisco MDS 9000 Family NX-OS
Licensing Guide.
Default Settings
Table 29: Default Online Diagnostic Parameters , on page 190 lists the default settings for online diagnostic
parameters.
Parameters Default
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
190
Configuring Online Diagnostics
Configuring Online Diagnostics
Procedure
Configures the bootup diagnostic level to trigger diagnostics when the device boots:
• complete—Performs all bootup diagnostics. The default is complete.
• bypass—Does not perform any bootup diagnostics.
(Optional) Displays the bootup diagnostic level (bypass or complete) that is currently in place on the device.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
191
Configuring Online Diagnostics
Displaying the List of Available Tests
(Optional) Displays the list of information about the diagnostics and their attributes on a given module.
slot—The module number on which the test is activated.
Step 2 diagnostic monitor interval module slot test [test-id | name | all] hour hour min minutes second sec
Example:
(Optional) Configures the interval at which the specified test is run. If no interval is set, the test runs at the
interval set previously, or the default interval.
The arguments are as follows:
• slot—The module number on which the test is activated.
• test-id—Unique identification number for the test.
• name—Predefined name of the test.
• hour —The range is from 0 to 23 hours.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
192
Configuring Online Diagnostics
Deactivating a Health Monitoring Diagnostic Test
Note Inactive tests keep their current configuration but do not run at the scheduled interval.
Command Purpose
no diagnostic monitor module slot test [test-id | Deactivates the specified test.
name | all]
The arguments are as follows:
Examples:
• slot—The module number on which the test is
activated.
switch(config)# no diagnostic monitor
interval module 8 test 3
• test-id—Unique identification number for the test.
• name—Predefined name of the test.
switch(config)# no diagnostic monitor
interval module 8 test SecondaryBootROM
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
193
Configuring Online Diagnostics
Starting or Stopping an On-Demand Diagnostic Test
Note It is recommended to manually start a disruptive diagnostic test during a scheduled network maintenance
time.
Procedure
(Optional) Configures the number of times that the on-demand test runs. The range is from 1 to 999. The
default is 1.
Step 4 diagnostic start module slot test [test-id | name | all | non-disruptive][port port-number | all]
Example:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
194
Configuring Online Diagnostics
Starting an On-Demand Diagnostic Test in On-demand Mode
• port— The tests can be invoked on a single port or range of ports or all ports.
Starts the selected test on a module and displays the result on the completion of the test.
Note This command is introduced from the Cisco MDS NX-OS Release 6.2(11c).
For more information, see Starting an On-Demand Diagnostic Test in On-demand Mode, on page 195.
(Optional) Displays all the tests which are running and queued up with information about the testing mode
for that module.
When the tests are not running or enqueued on the given module, the status is displayed as NA.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
195
Configuring Online Diagnostics
Clearing Diagnostic Results
• In contrast to the diagnostic start module command, the diagnostic run module command blocks the
current CLI session till the completion of test. After the completion of the test the CLI session is unblocked,
and the result is displayed on the same console.
Note The CLI session will be blocked till the completion of test or for a maximum of 15 seconds. If the test is not
completed within the time frame of 15 seconds, then GOLD unblocks the CLI session and allows the test to
run in the background till completion.
Note Only one test can be invoked on a particular module using the diagnostic run module command. If the user
attempts to invoke another test on the same module, it displays an error and the test is not invoked.
• The diagnostic start module command requires the user to execute the show diagnostic result command
in order to display the test result. As the test runs in the background (the current CLI session is not
blocked), the user needs to issue show diagnostic result command to view the result, whereas the test
result is implicitly displayed on the same console when the diagnostic run module command is executed.
• The results displayed through the diagnostic run command are more intuitive than those from the show
diagnostic results command.
Note The maximum number of ports recommended for the diagnostic run module command is 5.
Command Purpose
diagnostic clear result module [slot |all] test {test-id | all Clears the test result for the specified test.
}
Example:
Note Simulating a failure after enabling corrective actions will result in triggering an action (see Corrective action)
on the component where the failure was simulated.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
196
Configuring Online Diagnostics
Enabling Corrective (Recovery) Actions
Command Purpose
diagnostic test simulation module slot test test-id {fail | random-fail | success } Simulates a test result.
[port number | all]
Example:
To clear the simulated diagnostic test result, use the following command:
Command Purpose
diagnostic test simulation module slot test test-id clear Clears the simulated test result.
Example:
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
197
Configuring Online Diagnostics
Configuration Examples for Online Diagnostics
Command Purpose
show diagnostic content module {slot | all} Displays information about diagnostic test content for a
module.
show diagnostic description module slot test Displays the diagnostic description.
[test-name | all]
show diagnostic events [error | info] Displays diagnostic events by error and information event
type.
show diagnostic result module slot [test Displays information about the results of a diagnostic.
[test-name | all]] [detail]
show diagnostic simulation module slot Displays information about a simulated diagnostic.
show diagnostic status module slot Displays the test status for all tests on a module.
show diagnostic eem action Displays the status of the corrective (recovery) action.
Additional References
For additional information related to implementing online diagnostics, see the following sections:
Related Documents
Online diagnostics CLI commands Cisco MDS 9000 Family Command Reference
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
198
Configuring Online Diagnostics
Additional References
Support for RewriteEngine Loopback on Cisco MDS 48-Port 16-Gbps Fibre Channel 6.2(13) This feature was introduced.
Module
Support for ExtPortLoopback test on Cisco MDS 48-Port 16-Gbps Fibre Channel Module 6.2(11c) This feature was introduced.
Support for corrective (recovery) actions in Cisco MDS 48-Port 16-Gbps Fibre Channel 6.2(11) This feature was introduced.
Module
PortLoopback testing to bring up sequence of FC ports 6.2(11) This feature was introduced.
Support for corrective actions in Cisco MDS 48-Port 10 Gigabit Fibre Channel over Ethernet 6.2(11) This feature was introduced.
Module
GOLD support for RNG 10Gbps FCoE module 6.2(7) This feature was introduced.
IntPortLoopback on Cisco MDS 48-Port 16-Gbps Fibre Channel Module 6.2(7) This feature was introduced.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
199
Configuring Online Diagnostics
Additional References
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
200
CHAPTER 11
Configuring Interswitch Link Diagnostics
Beginning with the Cisco MDS NX-OS Release 7.3(0)D1(1), the Cisco MDS 9700 and 9500 series switches
support the Interswitch Link (ISL) Diagnostics feature. This chapter describes how to configure the ISL
Diagnostics on the Cisco MDS 9500 and 9700 Series switches.
• Information About ISL Diagnostics, on page 201
• Configuring ISL Diagnostics, on page 210
• Debugging ISL Diagnostics, on page 219
• Additional References, on page 221
ISL diagnostics is supported on the following FC modules of the Cisco MDS Switches:
• 16-Gbps modules on Cisco MDS 9700 Series Switches
• DS-X9448-768K9
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
201
Configuring Interswitch Link Diagnostics
Latency Test
Note The ISL diagnostic support on the modules is limited to the generator and reflector ports only.
• The diagnostic tests can be performed between two supported modules of different switch families on
either side.
ISL diagnostics is not supported on the following FC modules of the Cisco MDS Switches:
• DS-X9224-96K9
• DS-X9248-96K9
• DS-X9248-48K9
• DS-X9304-18K9
• DS-X9334-K9
Note • ISL diagnostics are not supported on other non-MDS switches such as Nexus 2000 and Nexus 5000.
• ISL diagnostics are not supported on Cisco MDS 9148S 16G Multilayer Fabric Switch and Cisco MDS
9250i Multiservice Fabric Switch.
• ISL diagnostics are not supported on any of the FCoE and IPS modules of the Cisco MDS Switches.
• ISL diagnostics are not supported on FEC-enabled links.
Latency Test
Latency test measures the latency of an ISL between two Cisco MDS switches.
The frame is looped back by the reflector switch port to the generator switch where the timestamps are captured.
Timestamps allow the latency of the link to be measured in both directions as well as the latency of the reflector
port. The cable length is calculated using only the link latencies. The accuracy of the reported cable length is
+/- 2 meters. On Cisco MDS switches, the cable length (for latency test) is validated up to 50 meters of the
cable length.
Note When a latency test is executed, there should not be any other traffic running on the same link.
Figure 7: Latency Test, on page 203 shows the details for the latency test.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
202
Configuring Interswitch Link Diagnostics
Single Hop Traffic Test
Note When a single hop test is executed, there should not be any other traffic running on the same link.
Figure 8: Single Hop Traffic Test, on page 203 shows the details for Single Hop Traffic Test:
Figure 8: Single Hop Traffic Test
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
203
Configuring Interswitch Link Diagnostics
Multihop End-to-End Traffic Test
Note The intermediate switches in the fabric can have any interface or link, for example, FC, FCoE, IPS, and so
on, between them, as long as a route exists between the generator and the reflector port.
Fibre channel (FC) frames are generated at the generator switch port and transmitted to the first hop link.
These frames traverse intermediate switches until they reach the reflector switch. The reflector switch then
switches the frames and returns them to the generator switch. Based on the number of packets received on
the generator switch, the efficiency of the ISL is displayed.
The Multihop traffic test is based on the domain IDs of the generator and reflector switches.
Note When a Multihop traffic test is executed, there should not be any other traffic running on both the generator
and the reflector ports; however, there can be traffic running over the ISLs that is used by the Multihop traffic
test.
Figure 9: Multihop End-to-End Traffic Test , on page 204 shows the details for Multihop End-to-End Traffic
Test:
Figure 9: Multihop End-to-End Traffic Test
Pathtrace
The Pathtrace feature builds on the Traceroute feature to provide information about interfaces, such as ingress
and egress interface names and the number of transmitted and received frames and errors, at each hop in the
path between 2 devices in a fabric. Pathtrace provides an end-to-end view of the shortest path without the
need to connect to individual switches and check the Fabric Shortest Path First (FSPF) topology hop by hop.
Pathtrace is used to trace the path from a switch on which the pathtrace command is run, to a destination
device or all the devices in a destination domain. The Pathtrace feature works with the Fibre Channel, Fibre
Channel over Ethernet (FCoE), and Fibre Channel over IP (FCIP) interfaces. Pathtrace collects information
about the available paths within the fabric and provides information for devices along the shortest path.
Pathtrace displays the source interface, destination interface, cost, speed, and other statistics when used with
the detail keyword. The pathtrace command can also be used to display the reverse path information (from
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
204
Configuring Interswitch Link Diagnostics
Guidelines and Limitations for Pathtrace
destination back to the source). If the destination cannot be reached, Pathtrace displays the device on which
the connectivity terminated.
The statistics displayed for various types of interfaces are:
• Fibre Channel interface—The statistics are displayed for the associated Fibre Channel interfaces.
• Virtual Fibre Channel (VFC) interface—The statistics are displayed for the associated Ethernet interfaces.
• Fibre Channel port channel—The statistics are displayed for port channels.
• VFC port channel—The statistics are displayed for VFC port channels.
• FCIP interface or FCIP port channel—The statistics are displayed for the FCIP interfaces or FCIP port
channels.
Pathtrace Multipath
The Pathtrace Multipath feature builds on the Pathtrace feature to collect and display all Equal-Cost Multi-Path
(ECMP) paths and statistics between source and destination switches. This feature provides information for
all the links between the 2 endpoints to be displayed, including individual equal-cost links of a port channel.
This feature can aid in troubleshooting difficult situations, for example, when a single link in a port channel
has errors and the remaining do not.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
205
Configuring Interswitch Link Diagnostics
Using Pathtrace or Pathtrace Multipath
• Pathtrace Multipath is supported on F ports that are connected to Qlogic and Emulex host bus adapters
(HBAs).
The following example shows how to trace both the forward path and the return path between a switch in
which the command is executed and an edge device, using the edge device's FCID:
The following example shows how to display detailed information about the interfaces (both the forward path
and the return path) between a switch in which the command is executed and an edge device, using the edge
device's FCID:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
206
Configuring Interswitch Link Diagnostics
Using Pathtrace or Pathtrace Multipath
-------------------------------------------------------------------------------
Stats for egress port: fc1/1
TxRt(B/s): 1424
RxRt(B/s): 1528
TxB_B: 0
RxB_B: 32
TxFrame: 711
RxFrame: 649
Errors: 0
Discard: 15
CRC: 0
-------------------------------------------------------------------------------
Hop 2 Domain In-Port Out-Port Speed Cost Switchname
202 embedded fc1/6 4G 250 switch2
-------------------------------------------------------------------------------
Stats for egress port: fc1/6
TxRt(B/s): 3632
RxRt(B/s): 2952
TxB_B: 32
RxB_B: 32
TxFrame: 137476
RxFrame: 137467
Errors: 0
Discard: 0
CRC: 0
-------------------------------------------------------------------------------
Hop 3 Domain In-Port Out-Port Speed Cost Switchname
111 fc1/6 embedded - - switch1
-------------------------------------------------------------------------------
Stats for egress port: embedded
TxRt(B/s): -
RxRt(B/s): -
TxB_B: -
RxB_B: -
TxFrame: -
RxFrame: -
Errors: -
Discard: -
CRC: -
NOTE: The stats are displayed for the egress interface only
The following example shows how to trace all the links (including equal-cost parallel links) in the paths
between all the edge devices in a domain and a switch in which the command is executed:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
207
Configuring Interswitch Link Diagnostics
Using Pathtrace or Pathtrace Multipath
- -
----------------------------------------------------------------------------------------------------------------------
HOP 2 switch2(fc1/3)(E)*End Device
-----------------------------------------------------------------------------------------------------------------------
Interface Spd(G) Tx(B/s) Rx(B/s) TxB2B RxB2B Errors Discards CRC
TxWait(1s/1m/1h/72h) FibDrops ZoneDrops
-----------------------------------------------------------------------------------------------------------------------
(E)fc1/3 4.0 0 0 16 64 0 0 0 0%/0%/0%/0%
- -
.......................................................................................................................
PATH 2 switch1 switch2
Domain 236 235
.......................................................................................................................
-----------------------------------------------------------------------------------------------------------------------
HOP 1 switch1(fc1/12)(E)-------(I)(fc1/11)switch2
-----------------------------------------------------------------------------------------------------------------------
Interface Spd(G) Tx(B/s) Rx(B/s) TxB2B RxB2B Errors Discards CRC
TxWait(1s/1m/1h/72h) FibDrops ZoneDrops
----------------------------------------------------------------------------------------------------------------------
(E)fc1/12 8.0 64 180 64 64 0 0 0 0%/0%/0%/0%
- -
(I)fc1/11 8.0 180 64 64 64 0 0 0 0%/0%/0%/0%
- -
----------------------------------------------------------------------------------------------------------------------
HOP 2 switch2(fc1/3)(E)*End Device
----------------------------------------------------------------------------------------------------------------------
Interface Spd(G) Tx(B/s) Rx(B/s) TxB2B RxB2B Errors Discards CRC
TxWait(1s/1m/1h/72h) FibDrops ZoneDrops
-----------------------------------------------------------------------------------------------------------------------
(E)fc1/3 4.0 0 0 16 64 0 0 0 0%/0%/0%/0%
- -
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
208
Configuring Interswitch Link Diagnostics
Using Pathtrace or Pathtrace Multipath
--------------------------------------------------------------------------------------
(E)vfc69 10.0 165604 153648 697 700
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
209
Configuring Interswitch Link Diagnostics
Configuring ISL Diagnostics
Note • In the output, embedded indicates that the respective port is an HBA interface on an edge device.
• Some of the terminologies used in the multipath outputs are defined in the following table:
Term Description
FCIP
vFC
Procedure
Step 1 Enable the test interface on the reflector switch for testing latency by setting it to loopback mode using the
following command:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
210
Configuring Interswitch Link Diagnostics
Configuring Latency Test on Other Supported Platforms
Step 2 Configure the generator switch to run the test and display the results:
switch A# diagnostic isl latency-test interface interface id
Step 3 To disable the reflector port for latency testing configure the following command on the reflector switch:
switch B# diagnostic isl reflector latency_test loop-back interface interface id disable
Latency Test
This example shows how to enable a port on a reflector switch for latency testing:
This example shows how to disable a port on a reflector switch for latency testing:
Procedure
Step 1 Enable the test interface on the reflector switch for testing latency by setting it to loopback mode using the
following command:
switch B# system health isl reflector latency_test loop-back interface interface id enable
Step 2 Configure the generator switch to run the test and display the results:
switch A# system health isl latency-test interface interface id
Step 3 To disable the reflector port for latency testing configure the following command on the reflector switch:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
211
Configuring Interswitch Link Diagnostics
Configuring a Single Hop Traffic Test on Cisco MDS 9700 Series Switches
switch B# system health isl reflector latency_test loop-back interface interface id disable
Latency Test
This example shows how to enable a port on a reflector switch for latency testing:
switch B# system health isl reflector latency_test loop-back interface fc4/25 enable
Reflector Configuration Successful.
---------------------------------------------------------
Latency test Result for port: fc1/13
Latency in the switch (in ns): 5504
Latency in the cable (in ns): 664
Length of the cable (accuracy +/- 2m): 4.816514 m
---------------------------------------------------------
This example shows how to disable a port on a reflector switch for latency testing:
switch B# system health isl reflector latency_test loop-back interface fc4/25 disable
Reflector Configuration Successful.
Configuring a Single Hop Traffic Test on Cisco MDS 9700 Series Switches
To configure a Single Hop Traffic Test between the generator switch and the reflector switch, perform the
following tasks:
Procedure
Step 1 Enable the test interface on the reflector switch for Single Hop Traffic Test by setting it to loopback mode
using the following command:
switch B# diagnostic isl reflector traffic_test loop-back interface interface id enable
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
212
Configuring Interswitch Link Diagnostics
Configuring a Single Hop Traffic Test on Cisco MDS 9700 Series Switches
• Configure the interface on the generator switch to run the traffic test for a given duration, frame size,
and rate (link speed) parameters:
switch A# diagnostic isl generator interface interface id start duration seconds rate value frame_size
min minimum size max maximum size step num
Step 3 To stop the Single Hop Traffic Test or to display the test result on the generator switch use the following
command:
switch A# diagnostic isl generator interface interface id stop
Step 4 To disable the reflector port for Single Hop Traffic Test configure the following command on the reflector
switch:
switch B# diagnostic isl reflector traffic_test loop-back interface interface id disable
This example shows how to run a traffic test on the generator switch for a particular duration, speed,
and frame size parameters:
switch A# diagnostic isl generator interface fc4/5 start duration 100 rate 25% frame_size
min 16 max 517 step 1
This example shows how to run and stop a traffic test stop and display the results for duration
parameter:
This example shows the results of the Single Hop Traffic Test:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
213
Configuring Interswitch Link Diagnostics
Configuring a Single Hop Traffic Test on Other Supported Platforms
Procedure
Step 1 Enable the test interface on the reflector switch for Single Hop Traffic Test by setting it to loopback mode
using the following command:
switch B# system health isl reflector traffic_test loop-back interface interface id enable
Step 3 To stop the Single Hop Traffic Test or to display the test results on the generator switch use the following
command:
switch A# system health isl generator interface interface id stop
Step 4 To disable the reflector port for Single Hop Traffic Test configure the following command on the reflector
switch:
switch B# system health isl reflector traffic_test loop-back interface interface id disable
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
214
Configuring Interswitch Link Diagnostics
Configuring a Multihop Traffic Test on Cisco MDS 9700 Series Switches
switch B# system health isl reflector traffic_test loop-back interface fc9/37 enable
Reflector Configuration Successful.
This example shows how to run and stop a traffic test and display the result for duration parameter
on a generator switch:
switch A# system health isl generator interface fc12/16 start duration 100
Waiting for sync to be achieved on the link .....
Link initialized successfully. Starting the test.
switch B# system health isl reflector traffic_test loop-back interface fc9/37 disable
Reflector Configuration Successful.
This example shows the results of the Single Hop Traffic Test:
switch B# show system health isl result interface fc 1/18
---------------------------------------------------------
Single hop Traffic test Result for port: fc1/18
Packets Transmitted: 1019885186
Packets Recieved: 1019885186
ISL traffic Efficiency (percent): 100.0000
---------------------------------------------------------
Note For a given VSAN, source domain, and destination domain, there can be only one test running.
Procedure
Step 1 Enable the test interface on the reflector switch by setting it to loopback mode for a given VSAN and domain
ID of the generator switch for Multihop Traffic Test:
switch B# diagnostic isl multi_hop reflector loop-back interface interface id vsan vsan id source-domain
source id enable
To obtain the source domain use the following command on the reflector switch:
switch B# show fcdomain domain-list vsan vsan id
Step 2 Configure the interface on the generator switch to run the Multihop Traffic Test for a given VSAN, destination
domain (domain ID of the reflector switch), frame count, link speed, and frame size parameters:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
215
Configuring Interswitch Link Diagnostics
Configuring a Multihop Traffic Test on Cisco MDS 9700 Series Switches
switch A# diagnostic isl multi_hop generator interface interface id vsan vsan id dest-domain dest id start
frame-count number rate value frame_size min minimum size max maximum size step num
Configure the interface on the generator switch to run the Multihop Traffic Test for a given VSAN, destination
domain (domain ID of the reflector switch), duration, rate (link speed), and frame size parameters:
switch A# diagnostic isl multi_hop generator interface interface id vsan vsan id dest-domain dest id start
duration seconds rate value frame_size min minimum size max maximum size step num
To obtain the destination domain use the following command on the generator switch:
switch A# show fcdomain domain-list vsan vsan id
Step 3 To stop the Multihop Traffic Test or to display the test results on the generator switch use the following
command:
switch A# diagnostic isl multi_hop generator interface interface id vsan vsan id dest-domain dest id stop
Step 4 To disable the reflector port for Mutlihop Traffic Test configure the following command on the reflector
switch:
switch B# diagnostic isl multi_hop reflector loop-back interface interface id vsan vsan id source-domain
source id disable
This example shows how to enable the test interface on the reflector switch by setting it to loopback
mode for a given VSAN and domain ID of the generator switch for Multihop Traffic Test:
switch B# diagnostic isl multi_hop reflector loop-back interface fc9/36 vsan 1 source_domain
239 enable
This example shows how to run, stop, and display the results of the traffic test on the generator switch
for frame count parameter:
switch A# diagnostic isl multi_hop generator interface fc4/10 vsan 1 dest_domain 133 start
duration 100
switch A# diagnostic isl multi_hop generator interface fc4/10 vsan 1 dest_domain 133 stop
Generator is stopped. Clean-up in progress.
Please wait....
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
216
Configuring Interswitch Link Diagnostics
Configuring a Multihop Traffic Test on Other Supported Platforms
---------------------------------------------------------
Traffic test Result for port: fc4/10
Packets Transmitted: 6291024
Packets Recieved: 6291024
ISL traffic Efficiency (percent): 100.0000
---------------------------------------------------------
switch B# diagnostic isl multi_hop reflector loop-back interface fc9/36 vsan 1 source_domain
239 disable
This example shows how to run a traffic test on the generator switch for a particular duration, speed
and frame size parameters:
switch A# diagnostic isl multi_hop generator interface fc4/10 vsan 1 dest_domain 133 start
duration 100 rate 16G frame_size min 16 max 517 step 1
switch#diagnostic isl multi_hop generator interface fc 1/7 vsan 1 dest_domain 194 stop
Generator is stopped. Clean-up in progress.
Please wait....
---------------------------------------------------------
Traffic test Result for port: fc1/7
Packets Transmitted: 52415159
Packets Recieved: 52415159
ISL traffic Efficiency (percent): 100.0000
---------------------------------------------------------
---------------------------------------------------------
Multi hop Traffic test Result for port: fc4/17
Packets Transmitted: 6131424
Packets Recieved: 6131424
ISL traffic Efficiency (percent): 100.0000
---------------------------------------------------------
Procedure
Step 1 Enable the test interface on the reflector switch by setting it to loopback mode for a given VSAN and domain
ID of the generator switch for Multihop Traffic Test:
switch B# system health isl multi_hop generator interface interface id vsan vsan id source-domain source
id enable
To obtain the source domain use the following command on the reflector switch:
switch B# show fcdomain domain-list vsan vsan id
Step 2 Configure the interface on the generator switch to run the Multihop Traffic Test for a given VSAN, destination
domain (domain ID of the reflector switch), frame count, link speed, and frame size parameters:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
217
Configuring Interswitch Link Diagnostics
Configuring a Multihop Traffic Test on Other Supported Platforms
switch A# system health isl multi_hop generator interface interface id vsan vsan id dest-domain dest id
start frame-count number rate value frame_size min minimum size max maximum size step num
Configure the interface on the generator switch to run the Multihop Traffic Test for a given VSAN, destination
domain (domain ID of the reflector switch), duration, rate (link speed), and frame size parameters:
switch A# system health isl multi_hop generator interface interface id vsan vsan id dest-domain dest id
start duration seconds rate value frame_size min minimum size max maximum size step num
To obtain the destination domain use the following command on the generator switch:
switch A# show fcdomain domain-list vsan vsan id
Step 3 To stop the Multihop Traffic Test or to display the test result on the generator switch use the following
command:
switch A# system health isl multi_hop generator interface interface id vsan vsan id dest-domain dest id
stop
Step 4 To disable the reflector port for Mutlihop Traffic Test configure the following command on the reflection
switch:
switch B# system health isl multi_hop reflector loop-back interface interface id vsan vsan id source-domain
source id disable
This example shows how to enable loop back to the generator switch interface present in a VSAN
from the reflector switch for a Multihop Traffic Test:
switch B# system health isl multi_hop reflector loop-back interface fc9/36 vsan 1
source_domain 239 enable
This example shows how to start, stop, and display the results of the traffic test on the generator
switch for frame count parameter:
switch A# system health isl multi_hop generator interface fc3/18 vsan 1 dest_domain 2 start
frame-count 1000000
switch A# system health isl multi_hop generator interface fc3/18 vsan 1 dest_domain 2 stop
Generator is stopped. Clean-up in progress.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
218
Configuring Interswitch Link Diagnostics
Debugging ISL Diagnostics
Please wait....
---------------------------------------------------------
Traffic test Result for port: fc3/18
Packets Transmitted: 1000000
Packets Recieved: 1000000
ISL traffic Efficiency (percent): 100.0000
---------------------------------------------------------
switch B# system health isl multi_hop reflector loop-back interface fc9/36 vsan 1
source_domain 239 disable
This example shows how to run a traffic test on the generator switch for a particular duration, speed
and frame size parameters:
switch A# system health isl multi_hop generator interface fc4/5 vsan 1 dest_domain 133 start
duration 100 rate 16G frame_size min 16 max 517 step 1
Command Reference
Cisco MDS 9700 Switches [Cisco MDS NX-OS Release 8.2(1) and earlier]
show diagnostic isl status index start index num Displays the status of configured ISL diagnostic tests
number per port.
show diagnostic isl status index start 0 num
10
Status of isl_diag tests in progress:
----------------------------------------------------------
Index Interface Mode <Gen/Ref>
Test
----------------------------------------------------------
0 fc1/1 Reflector
Latency Test
1 fc2/7 Reflector SH
Traffic Test
2 fc2/48 Generator MH
Traffic Test
----------------------------------------------------------
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
219
Configuring Interswitch Link Diagnostics
Debugging ISL Diagnostics
Command Reference
Cisco MDS 9700 Switches [Cisco MDS NX-OS Release 8.3(1) and later]
show diagnostic isl status Displays the status of configured ISL diagnostic tests
switch# show diagnostic isl status
per port.
Status of isl_diag tests in progress:
----------------------------------------------------------
Index Interface Mode <Gen/Ref>
Test
----------------------------------------------------------
0 fc2/41 Reflector SH
Traffic Test
----------------------------------------------------------
show diagnostic isl result interface interface id Displays the results of the Single Hop or Multihop
switch# show diagnostic isl result interface
Traffic Tests
fc 5/3
---------------------------------------------------------
Single hop Traffic test Result for port: fc5/3
Packets Transmitted: 30621868
Packets Recieved: 30621868
ISL traffic Efficiency (percent): 100.0000
---------------------------------------------------------
Cisco MDS 9396S, Cisco MDS 9396T, Cisco MDS 9148T, Cisco MDS 9132T [Cisco MDS NX-OS Release
8.3(1) and later]
show system health isl result interface interface id Displays the results of the Single Hop or Multihop
switch# show system health isl result interface
Traffic Tests.
fc 1/18
---------------------------------------------------------
show system health isl status Displays the status of ISL Diagnostics tests that are
switch# show system health isl status
in progress.
Status of isl_diag tests in progress:
----------------------------------------------------------
Index Interface Mode <Gen/Ref>
Test
----------------------------------------------------------
0 fc1/51 Reflector SH
Traffic Test
----------------------------------------------------------
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
220
Configuring Interswitch Link Diagnostics
Additional References
Additional References
For additional information related to implementing online diagnostics, see the following sections:
Related Documents
InterSwitch Link Diagnostics CLI commands Cisco MDS 9000 Family Command Reference
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
221
Configuring Interswitch Link Diagnostics
Additional References
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
222
CHAPTER 12
Configuring HBA Link Diagnostics
• Overview, on page 223
• Supported Platforms, on page 223
• Guidelines and Limitations, on page 224
• HBA Link Diagnostics Tests, on page 224
• Configuring HBA Link Diagnostics, on page 226
• Troubleshooting HBA Link Diagnostics, on page 231
Overview
The HBA Link Diagnostics feature helps in validating the health of links between Host Bus Adapters (HBAs)
and Cisco MDS switches in a network.
Servers connect to Storage Area Networks (SANs) through hardware devices called HBAs. This connectivity
comprises of many optical and electrical components that may develop faults during their lifetime. This feature
allows identification of faulty cables, transceivers, ASICs, drivers, firmware issues or software issues, thereby
eliminating dropped frames and ensuring reliable I/O operations of the server.
Supported Platforms
HBA Link Diagnostics is supported on the following platforms:
• Cisco MDS 48-Port 16-Gbps Fibre Channel Switching Module: DS-X9448-768K9
• Cisco MDS 48-Port 32-Gbps Fibre Channel Switching Module: DS-X9648-1536K9
• Cisco MDS 24/10 SAN Extension Module (FC ports only): DS-X9334-K9
• Cisco MDS 9132T Multilayer Fabric Switch
• Cisco MDS 9148T Multilayer Fabric Switch
• Cisco MDS 9396S Multilayer Fabric Switch
• Cisco MDS 9396T Multilayer Fabric Switch
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
223
Configuring HBA Link Diagnostics
Guidelines and Limitations
• In Cisco MDS NX-OS Release 8.2(1), the HBA Link Diagnostics feature is supported only in switch
mode on the Cisco MDS 9396S Multilayer Fabric Switch, the HBA Link Diagnostics feature in N port
virtualization (NPV) mode is not supported.
• Staring from Cisco MDS NX-OS Release 8.3(1), HBA link diagnostics tests can be run on interfaces in
port mode F only.
• When link diagnostics tests are running, the generator and host bus adapter (HBA) ports cannot be used
for regular Fibre Channel (FC) traffic or for other tests, such as, Inter Switch Link (ISL) Diagnostics.
• There must be at least one free or unused port in the switch available to be used as the traffic generator
port. This port needs to be in admin shutdown status during the HBA link diagnostic tests.
• Upon chassis reload, switch over, or module reload of the module hosting the generator or diagnostic
ports, the diagnostic tests will be aborted.
• When more than one loopback test fails, only the lowest level failure is reported. We recommend that
you first fix the reported failure, and then rerun the tests.
• The port LEDs on the diagnostic port are solid green color even when traffic tests are running.
• The maximum line rate of the diagnostic port that can be tested depends on the generator port's capability
and the user specified line rate. For example, if the diagnostic port is running on a 32 Gbps switching
module and the generator port is running on a 16 Gbps switching module, and the rate of traffic generation
is set to 50%, then the maximum line rate supported by the diagnostic port is 8 Gbps.
• HBA link diagnostics tests are not supported on FEC-enabled links at 16 Gbps.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
224
Configuring HBA Link Diagnostics
Latency Test
Two ports, a diagnostic port and a generator port, are required to run the tests. The diagnostic port is the port
on which the tests are run. The generator port generates traffic required to run the tests. If the generator port
is not explicitly specified by the user while starting the diagnostics tests, then any port that is in admin shutdown
status is selected as the generator port.
The following are the different types of link diagnostics tests available on Cisco MDS switches:
• Latency Test
• Loopback Traffic Tests
Both the link diagnostics tests can be run at different supported levels. For more information, see the Levels
of HBA Link Diagnostics Tests section.
Latency Test
The Latency test measures the round-trip latency of the link between the HBA and the Cisco MDS switch.
The test frame is looped back by the HBA port to the generator switch port where timestamps are captured.
Timestamps allow the latency of the link to be measured in both directions as well as the latency of the HBA
port.
The latency test with optical loopback helps in determining the cable length. The cable length calculations
are not applicable to any other latency tests. The accuracy of the reported cable length is within +/- 5 meters.
The following figure denotes the different levels of HBA link diagnostics tests:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
225
Configuring HBA Link Diagnostics
Remote Switched
Remote Switched
Frames are looped back by the peer device at the highest layer supported by diagnostics in the stack (FC-2 or
above). This functionality is implemented in the FC driver on the peer server CPU.
MAC
Frames are looped back by the peer device at the MAC (FC-1) layer of the peer HBA. This functionality is
implemented in the firmware code on the HBA.
Electrical
Frames are looped back by the peer device at the electrical stage of the transceiver (FC-0) of the peer HBA.
This functionality is implemented by the peer HBA firmware programming the local transceiver for electrical
loopback.
Note The electrical loopback level does not support Latency test.
Optical
A frame loopback is done in the optical part of the transceiver (FC-0) at the HBA side. The optical loopback
is achieved by programming the transceiver from the firmware layer of the HBA.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
226
Configuring HBA Link Diagnostics
Configuring Link Diagnostic Mode on a Port
When link testing is finished, move the port connected to the HBA back to service.
Procedure
Step 3 Gracefully shut down the interface and administratively disable the traffic flow
switch(config-if)# shutdown
Note Configurations done through ASCII files will not enter link diagnostic mode if the interface is not
in admin shut state.
Step 5 (Optional) Unconfigure the link diagnostic mode on the specified port:
switch(config-if)# no switchport link-diag
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
227
Configuring HBA Link Diagnostics
Running Link Diagnostic Tests on a Port
Example
Note • The diagnostic port will be in initializing state when it is configured using the configurations
listed in "Configuring Link Diagnostic Mode on a Port" section.
• Unconfigure and reconfigure the link diagnostic mode on the switch whenever there is a change
in the HBA such as driver load, unload, HBA port reset, and so on.
The following running configuration shows how to enable link diagnostic mode on an interface.
Replace the placeholders with relevant values for your setup.
configure terminal
interface fc <1/1>
shutdown
switchport link-diag
no shutdown
end
The following running configuration shows how to unconfigure the link diagnostic mode on an
interface. Replace the placeholders with relevant values for your setup.
configure terminal
interface fc <1/1>
shutdown
no switchport link-diag
no shutdown
end
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
228
Configuring HBA Link Diagnostics
Running Link Diagnostic Tests on a Port
Note • By default, tests are run at all supported levels if it is not explicitly selected using the level
remote levels option.
• The generator port is autoselected if it is not explicitly configured using the gen-interface fc
slot/port option. For more information about this command, see the Cisco MDS 9000 Series
Command Reference.
• User specified frame-count count may not match the actual number of transmitted frames
due to in-switch drops.
• Avoid clearing counters or statistics on interfaces where link diagnostic tests are running.
• On interfaces where link diagnostic tests are running, new configurations that are attempted
will be successful only after the completion of the link diagnostic tests.
The following command outputs display the result of the tests that are running on a diagnostic port:
switch# show diagnostic result interface fc7/28 test link-diag
PWWN of peer port: 21:00:00:24:ff:17:09:ac
Status: Supported (Reflector)
Reflector loopback capabilities: Xcvr-optical Electrical
Time of Test: Thu Sep 14 00:20:11 2017
Total time taken: 30 seconds
===================|=================|=================|===========================|==================|=================
| | | Discards |
Latency (ns) |
Loopback Level | Tx Frames | Rx Frames | IN | OUT |BAD
WORDS|In-Switch|External| Status
===================|=================|=================|========|========|=========|=========|========|=================
Remote-Switched(R) | 0| 0| 0| 0| 0|
0| 0| -NA-
Mac(R) | 0| 0| 0| 0| 0|
0| 0| -NA-
Xcvr-optical(R) | s 1000000| 1000000| 0| 0| 0|
2136| 632| Success
Electrical(R) | 20000| 20000| -NA- |
-NA-| -NA-| Success
========================================================================================================================
The following command output displays the link diagnostics capabilities of the peer device:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
229
Configuring HBA Link Diagnostics
Aborting Link Diagnostic Tests on a Port
Procedure
The following command output displays the result of the aborted tests on a diagnostic port:
switch# show diagnostic result interface fc1/23 test link-diag
PWWN of peer port: 10:00:00:90:fa:c7:e1:e9
Status: Supported (Reflector)
Reflector loopback capabilities: Remote-switched MAC Xcvr-optical
Time of Test: Wed Sep 20 12:54:59 2017
Total time taken: 10 seconds
===================|=================|=================|===========================|==================|=================
| | | Discards |
Latency (ns) |
Loopback Level | Tx Frames | Rx Frames | IN | OUT |BAD
WORDS|In-Switch|External| Status
===================|=================|=================|========|========|=========|=========|========|=================
Remote-Switched(R) | 0| 0| 0| 0| 0|
0| 0| -NA-
Mac(R) | 0| 0| 0| 0| 0|
0| 0| -NA-
Xcvr-optical(R) | 439| 439| -NA- |
0| 0| Stopped
Electrical(R) | 0| 0| 0| 0| 0|
0| 0| -NA-
========================================================================================================================
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
230
Configuring HBA Link Diagnostics
Troubleshooting HBA Link Diagnostics
• To check if an interface is being used as the generator port, use the show interface fc slot/port command.
• switch# show interface fc 1/2
fc1/2 is down (Administratively down)
Hardware is Fibre Channel, SFP is short wave laser w/o OFC (SN)
Port WWN is 20:02:8c:60:4f:0d:20:80
Admin port mode is auto, trunk mode is on
snmp link state traps are enabled
Port vsan is 1
Receive data field Size is 2112
Beacon is turned off
Logical type is Unknown(0)
Link Diagnostics generator port
5 minutes input rate 0 bits/sec,0 bytes/sec, 0 frames/sec
5 minutes output rate 0 bits/sec,0 bytes/sec, 0 frames/sec
0 frames input,0 bytes
0 discards,0 errors
0 invalid CRC/FCS,0 unknown class
0 too long,0 too short
0 frames output,0 bytes
0 discards,0 errors
0 input OLS,0 LRR,0 NOS,0 loop inits
0 output OLS,0 LRR, 0 NOS, 0 loop inits
Last clearing of "show interface" counters : never
• To check the link diagnostics tests that are running on the switch, use the show diagnostic test link-diag
status command.
switch# show diagnostic test link-diag status
---------------------------------------------------------------------------------------------------------------------
Index Diag-Interface Gen-Interface Link-diag Status
----------------------------------------------------------------------------------------------------------------------
Remote-Switched(R) MAC(R)
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
231
Configuring HBA Link Diagnostics
Troubleshooting HBA Link Diagnostics
Electrical(R) Xcvr-optical(R)
----------------------------------------------------------------------------------------------------------------------
1 fc2/9 fc2/1 NA Running
NA NA
• To collect information for Cisco technical support for this feature, use the show tech-support link-diag
command.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
232
CHAPTER 13
Configuring SNMP
The CLI and SNMP use common roles in all switches in the Cisco MDS 9000 Family. You can use SNMP
to modify a role that was created using the CLI and vice versa.
Users, passwords, and roles for all CLI and SNMP users are the same. A user configured through the CLI can
access the switch using SNMP (for example, the Cisco DCNM-SAN or the Device Manager) and vice versa.
• Information About SNMP Security, on page 233
• Default Settings, on page 238
• Configuring SNMP, on page 238
• Verifying SNMP Configuration, on page 254
• Additional References, on page 258
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
233
Configuring SNMP
SNMP Version 1 and Version 2c
SNMP Version 3
SNMP Version 3 (SNMPv3) is an interoperable standards-based protocol for network management. SNMPv3
provides secure access to devices by a combination of authenticating and encrypting frames over the network.
The security features provided in SNMPv3 are:
• Message integrity—Ensures that a packet has not been tampered with in-transit.
• Authentication—Determines the message is from a valid source.
• Encryption—Scrambles the packet contents to prevent it from being seen by unauthorized sources.
SNMPv3 provides for both security models and security levels. A security model is an authentication strategy
that is set up for a user and the role in which the user resides. A security level is the permitted level of security
within a security model. A combination of a security model and a security level determines which security
mechanism is employed when handling an SNMP packet.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
234
Configuring SNMP
SNMPv3 CLI User Management and AAA Integration
Note When the passphrase/password is specified in localized key/encrypted format, the password is not synchronized.
• Existing SNMP users continue to retain the auth and priv passphrases without any changes.
• If the management station creates an SNMP user in the usmUserTable, the corresponding CLI user is
created without any password (login is disabled) and will have the network-operator role.
Note Because group is a standard SNMP term used industry-wide, we refer to role(s) as group(s) in this SNMP
section.
SNMP access rights are organized by groups. Each group in SNMP is similar to a role through the CLI. Each
group is defined with three accesses: read access, write access, and notification access. Each access can be
enabled or disabled within each group.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
235
Configuring SNMP
Creating and Modifying Users
You can begin communicating with the agent once your user name is created, your roles are set up by your
administrator, and you are added to the roles.
Tip All updates to the CLI security database and the SNMP user database are synchronized. You can use the
SNMP password to log into either DCNM-SAN or Device Manager. However, after you use the CLI password
to log into DCNM-SAN or Device Manager, you must use the CLI password for all future logins. If a user
exists in both the SNMP database and the CLI database before upgrading to Cisco MDS SAN-OS Release
2.0(1b), then the set of roles assigned to the user becomes the union of both sets of roles after the upgrade.
Note For an SNMPv3 operation using the external AAA server, user configurations in the external AAA server
require AES to be the privacy protocol to use SNMP PDU encryption.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
236
Configuring SNMP
EngineID
EngineID
An SNMP engineID is used to identify an entity independent of its source address. The entity consists of an
SNMP engine and SNMP applications. The engineID is important when protocol data units (PDUs) must
traverse proxies or Network Address Translator (NAT), or when the source entity itself has a dynamically
assigned transport address or multiple source addresses.
In SNMPv3, engineIDs are also used for encoding and decoding secure PDUs. This is a requirement of the
SNMPv3 user-based security model (USM).
There are two types of engineIDs, local and remote. On Cisco MDS 9000 Series switches, only remote
engineIDs can be configured. The local engineID is automatically generated by the switch based on the MAC
address and does not change.
Note For more information on the varbinds defined in the IF-MIB specific to the Cisco Systems implementation,
refer to the Cisco MDS 9000 Family MIB Quick Reference.
Switch-level Trap Setting Interface-level Trap Setting Trap Generated for Interface Links?
Enabled Disabled No
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
237
Configuring SNMP
Default Settings
Switch-level Trap Setting Interface-level Trap Setting Trap Generated for Interface Links?
Disabled Enabled No
Disabled Disabled No
Default Settings
Table 34: Default SNMP Settings , on page 238 lists the default settings for all SNMP features in any switch.
Parameters Default
Password None
Configuring SNMP
SNMP is an application layer protocol that facilitates the exchange of management information between
network devices.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
238
Configuring SNMP
Configuring SNMP Users from the CLI
Note When the passphrase or password is specified in the localizedkey or encrypted format, the password is not
synchronized. If a configuration file is copied to the device, the passwords will not be set correctly if the
configuration file was generated at a different device. Explicitly configure the desired passwords after copying
the configuration into the device.
To create or modify SNMP users from the CLI, follow these steps:
Procedure
Step 4 switch(config)# snmp-server user Bill network-admin auth sha abcd1234 priv abcdefgh
Creates or modifies the settings for a user (Bill) in the network-admin role using the HMAC-SHA-96
authentication level and privacy encryption parameters.
Step 7 switch(config)# snmp-server user user1 network-admin auth md5 0xab0211gh priv 0x45abf342
localizedkey
Specifies the password to be in localized key format (RFC 2574). The localized key is provided in hexadecimal
format (for example, 0xacbdef).
Step 8 switch(config)# snmp-server user user2 auth md5 asdgfsadf priv aes-128 asgfsgkhkj
Configures the user2 with the MD5 authentication protocol and AES-128 privacy protocol.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
239
Configuring SNMP
Creating or Modifying Passwords
Procedure
Step 2 switch(config)# snmp-server user user1 role1 auth md5 0xab0211gh priv 0x45abf342 localizedkey
Specifies the password to be in localized key format using the DES option for security encryption.
Step 3 switch(config)# snmp-server user user1 role2 auth sha 0xab0211gh priv aes-128 0x45abf342 localizedkey
Specifies the password to be in localized key format using the 128-bit AES option for security encryption
Note The snmp-server user command takes the engineID as an additional parameter. The engineID
creates the notification target user (see the Configuring the Notification Target User , on page 249).
If the engineID is not specified, the local user is created.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
240
Configuring SNMP
Enforcing SMNPv3 Message Encryption Globally
Note You can only use this command for previously existing users configured with both auth and priv
keys. When the user is configured to enforce privacy, for any SNMPv3 PDU request using
securityLevel parameter of either noAuthNoPriv or authNoPriv, the SNMP agent responds with
authorizationError.
Procedure
Note Only users belonging to a network-admin role can assign roles to other users.
To configure multiple roles for SNMPv3 users from the CLI, follow these steps:
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
241
Configuring SNMP
Adding Communities
Adding Communities
You can configure read-only or read-write access for SNMPv1 and SNMPv2 users. Refer to RFC 2576.
To create an SNMPv1 or SNMPv2c community, follow these steps:
Procedure
Note Switches can forward events (SNMP traps and informs) up to 10 destinations. When you try to configure the
eleventh target host for SNMP, the following message is displayed:
• You must enable the RMON traps in the SNMP configuration. For more information, refer to Configuring
RMON, on page 177.
• Use the SNMP-TARGET-MIB to obtain more information on the destinations to which notifications are
to be sent either as traps or as informs. Refer to the Cisco MDS 9000 Family MIB Quick Reference.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
242
Configuring SNMP
Configuring SNMPv2c Notifications
Tip The SNMPv1 option is not available with the snmp-server host p-address informs command.
Procedure
Step 2 switch(config)# snmp-server host 171.71.187.101 traps version 2c private udp-port 1163
Configures the specified host to receive SNMPv2c traps using SNMPv2c community string (private).
Step 3 switch(config)# no snmp-server host 171.71.187.101 traps version 2c private udp-port 2162
Prevents the specified host from receiving SNMPv2c traps on the configured UDP port using SNMPv2c
community string (private).
Step 4 switch(config)# snmp-server host 171.71.187.101 informs version 2c private udp-port 1163
Configures the specified host to receive SNMPv2c informs using SNMPv2c community string (private).
Step 5 switch(config)# no snmp-server host 171.71.187.101 informs version 2c private udp-port 2162
Prevents the specified host from receiving SNMPv2c informs on the configured UDP port using SNMPv2c
community string (private).
Procedure
Step 2 switch(config)# snmp-server host 2001:0DB8:800:200C::417A traps version 2c private udp-port 1163
Configures the specified host to receive SNMPv2c traps using SNMPv2c community string (private).
Step 3 switch(config)# no snmp-server host 2001:0DB8:800:200C::417A traps version 2c private udp-port 2162
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
243
Configuring SNMP
Configuring SNMPv2c Notifications using DNS Name
Prevents the specified host from receiving SNMPv2c traps on the configured UDP port using SNMPv2c
community string (private).
Step 4 switch(config)# snmp-server host 2001:0DB8:800:200C::417A informs version 2c private udp-port 1163
Configures the specified host to receive SNMPv2c informs using SNMPv2c community string (private).
Procedure
Step 2 switch(config)# snmp-server host myhost.cisco.com traps version 2c private udp-port 1163
Configures the specified host to receive SNMPv2c traps using SNMPv2c community string (private).
Step 3 switch(config)# no snmp-server host myhost.cisco.com traps version 2c private udp-port 2162
Prevents the specified host from receiving SNMPv2c traps on the configured UDP port using SNMPv2c
community string (private).
Step 4 switch(config)# snmp-server host myhost.cisco.com informs version 2c private udp-port 1163
Configures the specified host to receive SNMPv2c informs using SNMPv2c community string (private).
Step 5 switch(config)# no snmp-server host myhost.cisco.com informs version 2c private udp-port 2162
Prevents the specified host from receiving SNMPv2c informs on the configured UDP port using SNMPv2c
community string (private).
Note Switches can forward events (SNMP traps and informs) up to 10 destinations.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
244
Configuring SNMP
Configuring SNMPv3 Notifications using IPv6
Procedure
Step 2 switch(config)# snmp-server host 16.20.11.14 traps version 3 noauth testuser udp-port 1163
Configures the specified host to receive SNMPv3 traps using SNMPv3 user (testuser) and securityLevel of
noAuthNoPriv.
Step 3 switch(config)# snmp-server host 16.20.11.14 informs version 3 auth testuser udp-port 1163
Configures the specified host to receive SNMPv3 informs using SNMPv3 user (testuser) and securityLevel
of AuthNoPriv.
Step 4 switch(config)# snmp-server host 16.20.11.14 informs version 3 priv testuser udp-port 1163
Configures the specified host to receive SNMPv3 informs using SNMPv3 user (testuser) and securityLevel
of AuthPriv.
Step 5 switch(config)# no snmp-server host 172.18.2.247 informs version 3 testuser noauth udp-port 2162
Prevents the specified host from receiving SNMPv3 informs.
Procedure
Step 2 switch(config)# snmp-server host 2001:0DB8:800:200C::417A traps version 3 noauth testuser udp-port
1163
Configures the specified host to receive SNMPv3 traps using SNMPv3 user (testuser) and securityLevel of
noAuthNoPriv.
Step 3 switch(config)# snmp-server host 2001:0DB8:800:200C::417A informs version 3 auth testuser udp-port
1163
Configures the specified host to receive SNMPv3 informs using SNMPv3 user (testuser) and securityLevel
of AuthNoPriv.
Step 4 switch(config)# snmp-server host 2001:0DB8:800:200C::417A informs version 3 priv testuser udp-port
1163
Configures the specified host to receive SNMPv3 informs using SNMPv3 user (testuser) and securityLevel
of AuthPriv.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
245
Configuring SNMP
Configuring SNMPv3 Notifications using DNS Name
Procedure
Step 2 switch(config)# snmp-server host myhost.cisco.com traps version 3 noauth testuser udp-port 1163
Configures the specified host to receive SNMPv3 traps using SNMPv3 user (testuser) and securityLevel of
noAuthNoPriv.
Step 3 switch(config)# snmp-server host myhost.cisco.com informs version 3 auth testuser udp-port 1163
Configures the specified host to receive SNMPv3 informs using SNMPv3 user (testuser) and securityLevel
of AuthNoPriv.
Step 4 switch(config)# snmp-server host myhost.cisco.com informs version 3 priv testuser udp-port 1163
Configures the specified host to receive SNMPv3 informs using SNMPv3 user (testuser) and securityLevel
of AuthPriv.
Step 5 switch(config)# no snmp-server host myhost.cisco.com informs version 3 testuser noauth udp-port 2162
Prevents the specified host from receiving SNMPv3 informs.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
246
Configuring SNMP
Enabling SNMP Notifications
Command Purpose
snmp-server aaa exclusive-behavior enable Enables the AAA exclusive behavior in SNMPv3
servers to authenticate users based on location.
Depending on the location of the user and whether
the AAA server is enabled, the exclusive behavior is
as follows:
• If the user is a local user and the AAA server is
enabled, queries for the user will fail with an
“Unknown user” message.
• If the user is a remote AAA user and the AAA
server is disabled, queries for the user will fail
with an “Unknown user” message.
• If the user is both a local user and a remote
AAA user and the AAA server is enabled, the
queries with remote credentials will succeed, and
queries with local credentials will fail with an
“Incorrect password” message. If the AAA server
is disabled, queries with local remote credentials
will succeed, and queries with remote credentials
will fail with an “Incorrect password” message.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
247
Configuring SNMP
Enabling SNMP Notifications
CISCO-RSCN-MIB Click the FC tab and check RSCN ILS, and RCSN ELS.
CISCO-ZS-MIB Click the FC tab and check Zone Rejects, Zone Merge
Failures, Zone Merge Successes, Zone Default Policy
Change, and Zone Unsuppd Mode.
• Individual traps - You can use snmp-server enable traps command with the feature name to enable traps
at the individual level.
Note The snmp-server enable traps CLI command enables both traps and informs, depending on how you configured
SNMP. See the notifications displayed with the snmp-server host CLI command.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
248
Configuring SNMP
Configuring the Notification Target User
Procedure
Step 2 switch(config)# snmp-server user testusr auth md5 xyub20gh priv xyub20gh engineID
00:00:00:63:00:01:00:a1:ac:15:10:03
Configures the notification target user with the specified credentials for the SNMP manager with the specified
engine ID.
Step 3 switch(config)# no snmp-server user testusr auth md5 xyub20gh priv xyub20gh engineID
00:00:00:63:00:01:00:a1:ac:15:10:03
Removes the notification target user.
The credentials of the notification target user are used for encrypting the SNMPv3 inform notification messages
to the configured SNMPmanager (as in the snmp-server host command).
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
249
Configuring SNMP
Configuring LinkUp/LinkDown Notifications for Switches
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
250
Configuring SNMP
Configuring LinkUp/LinkDown Notifications for Switches
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
251
Configuring SNMP
Configuring Up/Down SNMP Link-State Traps for Interfaces
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
252
Configuring SNMP
Modifying the AAA Synchronization Time
Procedure
Step 2 snmp-server aaa-user cache-timeout seconds Configures how long the AAA synchronized
user configuration stays in the local cache. The
Example:
range is from 1 to 86400 seconds. The default
switch(config)# snmp-server aaa-user is 60000.
cache-timeout 1200
Step 3 (Optional) copy running-config startup-config Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config
startup-config
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
253
Configuring SNMP
Verifying SNMP Configuration
Command Purpose
show interface Displays the SNMP link-state trap configuration for a particular interface
show snmp trap Displays all the notifications and their status
show snmp Displays configured SNMP information, counter information for SNMP contact,
location, and packet settings.
For detailed information about the fields in the output from these commands, refer to the Cisco MDS 9000
Family Command Reference .
To view the SNMP link-state trap configuration for a particular interface, enter the show interface command.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
254
Configuring SNMP
Displaying SNMP Traps
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
255
Configuring SNMP
Displaying SNMP Security Information
vsan : vsanStatusChange No
vsan : vsanPortMembershipChange No
fspf : fspfNbrStateChangeNotify No
upgrade : UpgradeOpNotifyOnCompletion No
upgrade : UpgradeJobStatusNotify No
feature-control : FeatureOpStatusChange No
vrrp : cVrrpNotificationNewMaster No
fdmi : cfdmiRejectRegNotify No
snmp : authentication No
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
256
Configuring SNMP
Displaying SNMP Security Information
...
171.31.58.97 2162 v2c auth trap public
...
The show snmp command displays counter information for SNMP contact, location, and packet
settings. This command provides information that is used entirely by the Cisco MDS 9000 Family
DCNM-SAN (refer to the System Management Configuration Guide, Cisco DCNM for SAN). See
the following example:
SNMP Information
The following example displays SNMP information:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
257
Configuring SNMP
Additional References
Additional References
For additional information related to implementing SNMP, see the following sections:
MIBs
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
258
CHAPTER 14
Configuring Domain Parameters
The Fibre Channel domain (fcdomain) feature performs principal switch selection, domain ID distribution,
FC ID allocation, and fabric reconfiguration functions as described in the FC-SW-2 standards.
• Information About Fibre Channel Domains, on page 259
• Guidelines and Limitations, on page 268
• Default Settings, on page 268
• Configuring Fibre Channel Domains, on page 269
• Configuring Domain IDs, on page 273
• Configuring FC IDs, on page 277
• Verifying FC Domain Configuration, on page 281
Caution Changes to fcdomain parameters should not be performed on a daily basis. These changes should be made
by an administrator or individual who is completely familiar with switch operations.
Figure 12: Sample fcdomain Configuration, on page 260 shows a sample fcdomain configuration.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
259
Configuring Domain Parameters
Domain Restart
Domain Restart
Fibre Channel domains can be started disruptively or nondisruptively. If you perform a disruptive restart,
reconfigure fabric (RCF) frames are sent to other switches in the fabric and data traffic is disrupted on all the
switches in the VSAN (including remotely segmented ISLs). If you perform a nondisruptive restart, build
fabric (BF) frames are sent to other switches in the fabric and data traffic is disrupted only on the switch.
If you are attempting to resolve a domain ID conflict, you must manually assign domain IDs. A disruptive
restart is required to apply most configuration changes, including manually assigned domain IDs. Nondisruptive
domain restarts are acceptable only when changing a preferred domain ID into a static one (and the actual
domain ID remains the same).
Note It is not recommended to use disruptive restart followed by VSAN suspend/no-suspend, since it is used only
for recovery purpose when normal restart does not solve the problem.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
260
Configuring Domain Parameters
Domain Manager All Optimization
Note A static domain is specifically configured by the user and may be different from the runtime domain. If the
domain IDs are different, the runtime domain ID changes to take on the static domain ID after the next restart,
either disruptive or nondisruptive.
Tip If a VSAN is in interop mode, you cannot restart the fcdomain for that VSAN disruptively.
You can apply most of the configurations to their corresponding runtime values. Each of the following sections
provide further details on how the fcdomain parameters are applied to the runtime values.
The fcdomain restart command applies your changes to the runtime settings. Use the disruptive option to
apply most of the configurations to their corresponding runtime values, including preferred domain IDs (see
the Domain IDs, on page 263).
Note You cannot enable all the optimizations such as Selective Restart, Fast Restart, and Scale Restart in VSANs
where Interop mode is enabled (non-native modes). Also you cannot move a VSAN where the optimizations
are enabled into Interop mode 1 to 4.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
261
Configuring Domain Parameters
Domain Manager Selective Restart
flooded by the principal switch once the domain identifier allocation phase is completed. This feature
optimization cannot be supported in interop mode.
Scale Restart will be enabled by default in all native VSANs. It will not be enabled in interop VSANs.
Switch Priority
Any new switch can become the principal switch when it joins a stable fabric. During the principal switch
selection phase, the switch with the highest priority becomes the principal switch. If two switches have the
same configured priority, the switch with the lower WWN becomes the principal switch.
The priority configuration is applied to runtime when the fcdomain is restarted (see the Domain Restart, on
page 260). This configuration is applicable to both disruptive and nondisruptive restarts.
fcdomain Initiation
By default, the fcdomain feature is enabled on each switch. If you disable the fcdomain feature in a switch,
that switch can no longer participate with other switches in the fabric. The fcdomain configuration is applied
to runtime through a disruptive restart.
Incoming RCFs
You can choose to reject RCF request frames on a per-interface, per-VSAN basis. By default, the RCF reject
option is disabled (that is, RCF request frames are not automatically rejected).
The RCF reject option takes immediate effect at runtime through a disruptive restart (see the Domain Restart,
on page 260)
You can configure the rcf-reject option on a per-interface, per-VSAN basis. By default, the rcf-reject option
is disabled (that is, RCF request frames are not automatically rejected).
The rcf-reject option takes effect immediately. No fcdomain restart is required.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
262
Configuring Domain Parameters
Domain IDs
Domain IDs
Domain IDs uniquely identify a switch in a VSAN. A switch may have different domain IDs in different
VSANs. The domain ID is part of the overall FC ID.
The configured domain ID can be preferred or static. By default, the configured domain ID is 0 (zero) and
the configured type is preferred.
Note The 0 (zero) value can be configured only if you use the preferred option.
If you do not configure a domain ID, the local switch sends a random ID in its request. We recommend that
you use static domain IDs.
When a subordinate switch requests a domain, the following process takes place (see Figure 13: Configuration
Process Using the preferred Option, on page 264):
1. The local switch sends a configured domain ID request to the principal switch.
2. The principal switch assigns the requested domain ID if available. Otherwise, it assigns another available
domain ID.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
263
Configuring Domain Parameters
Domain IDs
If you change the configured domain ID, the change is only accepted if the new domain ID is included in all
the allowed domain ID lists currently configured in the VSAN. Alternatively, you can also configure
zero-preferred domain ID.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
264
Configuring Domain Parameters
Specifying Static or Preferred Domain IDs
Tip When the FICON feature is enabled in a given VSAN, the domain ID for that VSAN remains in the static
state. You can change the static ID value but you cannot change it to the preferred option.
Note In an IVR without NAT configuration, if one VSAN in the IVR topology is configured with static domain
IDs, then the other VSANs (edge or transit) in the topology should also be configured with static domain IDs.
In an IVR NAT configuration, if one VSAN in the IVR topology is configured with static domain IDs, then
the IVR domains that can be exported to that VSAN must also be assigned static domains.
Caution You must enter the fcdomain restart command if you want to apply the configured domain changes to the
runtime domain.
Caution You must restart the fcdomain if you want to apply the configured domain changes to the runtime domain.
Note If you have configured an allowed domain ID list, the domain IDs that you add must be in that range for the
VSAN. See the Configuring Allowed Domain ID Lists, on page 274.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
265
Configuring Domain Parameters
Contiguous Domain ID Assignments
configuration is distributed to the entire VSAN, you avoid possible misconfiguration and the likelihood that
two switches in the same VSAN have configured incompatible allowed domains.
Use CFS to distribute the allowed domain ID list to ensure consistency in the allowed domain ID lists on all
switches in the VSAN.
Note We recommend configuring the allow domain ID list and committing it on the principle switch.
For more information about CFS, see Using the CFS Infrastructure, on page 7.
Committing Changes
To apply the pending domain configuration changes to other MDS switches in the VSAN, you must commit
the changes. The pending configuration changes are distributed and, on a successful commit, the configuration
changes are applied to the active configuration in the MDS switches throughout the VSAN and the fabric lock
is released.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
266
Configuring Domain Parameters
FC IDs
FC IDs
When an N or NL port logs into a Cisco MDS 9000 Family switch, it is assigned an FC ID. By default, the
persistent FC ID feature is enabled. If this feature is disabled, the following consequences apply:
• An N or NL port logs into a Cisco MDS 9000 Family switch. The WWN of the requesting N or NL port
and the assigned FC ID are retained and stored in a volatile cache. The contents of this volatile cache
are not saved across reboots.
• The switch is designed to preserve the binding FC ID to the WWN on a best-effort basis. For example,
if one N port disconnects from the switch and its FC ID is requested by another device, this request is
granted and the WWN with the initial FC ID association is released.
• The volatile cache stores up to 4000 entries of WWN to FC ID binding. If this cache is full, a new (more
recent) entry overwrites the oldest entry in the cache. In this case, the corresponding WWN to FC ID
association for the oldest entry is lost.
• The switch connection behavior differs between N ports and NL ports:
• N ports receive the same FC IDs if disconnected and reconnected to any port within the same switch
(as long as it belongs to the same VSAN).
• NL ports receive the same FC IDs only if connected back to the same port on the switch to which
they were originally connected.
Persistent FC IDs
When persistent FC IDs are enabled, the following consequences apply:
• The currently in use FC IDs in the fcdomain are saved across reboots.
• The fcdomain automatically populates the database with dynamic entries that the switch has learned
about after a device (host or disk) is plugged into a port interface.
Persistent FC ID Configuration
When the persistent FC ID feature is enabled, you can enter the persistent FC ID submode and add static or
dynamic entries in the FC ID database. By default, all added entries are static. Persistent FC IDs are configured
on a per-VSAN basis. Follow these requirements to manually configure a persistent FC ID:
• Ensure that the persistent FC ID feature is enabled in the required VSAN.
• Ensure that the required VSAN is an active VSAN—persistent FC IDs can only be configured on active
VSANs.
• Verify that the domain part of the FC ID is the same as the runtime domain ID in the required VSAN.
If the software detects a domain mismatch, the command is rejected.
• Verify that the port field of the FC ID is 0 (zero) when configuring an area.
Note FICON uses a different scheme for allocating FC IDs based in the front panel port number. This scheme takes
precedence over FC ID persistence in FICON VSANs.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
267
Configuring Domain Parameters
About Unique Area FC IDs for HBAs
Note Read this section only if the HBA port and the storage port are connected to the same switch.
Some HBA ports require a different area ID than storage ports when they are both connected to the same
switch. For example, if the storage port FC ID is 0x6f7704, the area for this port is 77. In this case, the HBA
port’s area can be anything other than 77. The HBA port’s FC ID must be manually configured to be different
from the storage port’s FC ID.
Switches in the Cisco MDS 9000 Family facilitate this requirement with the FC ID persistence feature. You
can use this feature to preassign an FC ID with a different area to either the storage port or the HBA port.
Default Settings
Table 37: Default FC domain Parameters, on page 268 lists the default settings for all the FC domain parameters.
Parameters Default
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
268
Configuring Domain Parameters
Configuring Fibre Channel Domains
Parameters Default
Priority 128.
rcf-reject Disabled.
Persistent FC ID Enabled.
Restarting a Domain
Domain Configuration Scenarios:
Switch Configuration
Irrespective of how the switches in VSAN 6 are configured, fcdomain restart disruptive vsan 6 causes all
devices of all switches in VSAN 6 to log out, causing data traffic disruption.
Configured domain and the runtime domain are the same
Assuming that the configured domain and the runtime domain are the same on all switches, fcdomain restart
vsan 6 does not cause any devices in VSAN 6 to log out.
Configured domain and runtime domain are not the same
Assuming that on some switches in VSAN 6 the configured domain and the runtime domain are not the same,
fcdomain restart vsan 6 causes the devices in VSAN 6 attached to the switches whose statically configured
and runtime domain differ to log out, causing data traffic disruption.
To restart the fabric disruptively or nondisruptively, follow these steps:
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
269
Configuring Domain Parameters
Enabling Domain Manager All Optimization
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
270
Configuring Domain Parameters
Enabling Domain Manager Scale Restart
Enables domain manager fast restart on the range of VSANs from VSAN 7 to VSAN 10.
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
271
Configuring Domain Parameters
Configuring Switch Priority
Note By default, the configured priority is 128. The valid range to set the priority is between 1 and 254. Priority 1
has the highest priority. Value 255 is accepted from other switches, but cannot be locally configured.
To configure the priority for the principal switch, follow these steps:
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
272
Configuring Domain Parameters
Rejecting Incoming RCFs
Procedure
Enabling Autoreconfiguration
To enable automatic reconfiguration in a specific VSAN (or range of VSANs), follow these steps:
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
273
Configuring Domain Parameters
Specifying Static or Preferred Domain IDs
The configured domain ID can be preferred or static. By default, the configured domain ID is 0 (zero) and
the configured type is preferred.
Note Within a VSAN all switches should have the same domain ID type (either static or preferred). If a configuration
is mixed (some switches with static domain types and others with preferred), then you may experience link
isolation.
When a new domain ID is configured, the new configuration has to be applied by manually restarting the
domain using the fcdomain restart command; if a discrepancy is detected between the configured domain ID
and the runtime domain ID during the subsequent fabric merge, the link will be isolated.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
274
Configuring Domain Parameters
Enabling Allowed Domain ID Distribution
Procedure
Step 2 switch# fcdomain allowed 50-110 vsan 4 Configures the list to allow switches with the
domain ID 50 through 110 in VSAN 4.
switch# no fcdomain allowed 50-110 vsan 4
Reverts to the factory default of allowing
domain IDs from 1 through 239 in VSAN 5.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
275
Configuring Domain Parameters
Committing Changes
Committing Changes
To commit pending domain configuration changes and release the lock, follow these steps:
Procedure
Discarding Changes
At any time, you can discard the pending changes to the domain configuration and release the fabric lock. If
you discard (abort) the pending changes, the configuration remains unaffected and the lock is released.
To discard pending domain configuration changes and release the lock, follow these steps:
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
276
Configuring Domain Parameters
Configuring FC IDs
Configuring FC IDs
When an N or NL port logs into a Cisco MDS 9000 Family switch, it is assigned an FC ID.
Note • FC IDs are enabled by default. This change of default behavior from releases prior to Cisco MDS SAN-OS
Release 2.0(1b) prevents FC IDs from being changed after a reboot. You can disable this option for each
VSAN.
• Persistent FC IDs with loop-attached devices (FL ports) must remain connected to the same port in which
they were configured.
• Due to differences in Arbitrated Loop Physical Address (ALPA) support on devices, FC ID persistency
for loop-attached devices is not guaranteed.
• For Cisco MDS 9124, 9134, 9148, 9148S, and 9250i switches, ensure that you allocate a complete FCID
area per interface and that the last byte to the right of the FCID (port_id) is always zero for these platforms
(except for an MDS 9148 running in the NPIV mode connected to an NPV switch). Hence, you cannot
configure static FCIDs with non-zero port_ids. For example, the following will not work on MDS 9124,
9134, 9148, 9148S, and 9250i:
vsan 1000 wwn 33:e8:00:05:30:00:16:df fcid 0x070128
It should be changed to vsan 1000 wwn 33:e8:00:05:30:00:16:df fcid 0x070100.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
277
Configuring Domain Parameters
Configuring Persistent FC IDs
Procedure
Note The procedure in this example uses a switch domain of 111(6f hex). The HBA port connects to interface fc1/9
and the storage port connects to interface fc 1/10 in the same switch.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
278
Configuring Domain Parameters
Configuring Unique Area FC IDs for an HBA
Procedure
Step 1 Obtain the port WWN (Port Name field) ID of the HBA using the show flogi database command.
Note Both FC IDs in this setup have the same area 77 assignment.
Example:
Step 3 Verify that the FC ID feature is enabled using the show fcdomain vsan command.
If this feature is disabled, continue with this procedure to enable the persistent FC ID.
If this feature is already enabled, skip to step 7.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
279
Configuring Domain Parameters
Purging Persistent FC IDs
Step 5 Assign a new FC ID with a different area allocation. In this example, we replace 77 with ee.
Step 7 Verify the pWWN ID of the HBA using the show flogi database command.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
280
Configuring Domain Parameters
Verifying FC Domain Configuration
Command Purpose
show fcdomain status Displays the status of CFS distribution for allowed domain ID
lists.
show fcdomain session-status vsan Displays the status of the distribution session.
show fcdomain domain-list Displays the list of domain IDs of all switches.
show fcdomain allowed vsan Displays the list of allowed domain IDs configured on this switch.
show fcdomain fcid persistent Displays all existing, persistent FC IDs for a specified VSAN.
show fcdomain statistics Displays frame and other fcdomain statistics for a specified
VSAN or PortChannel.
show fcdomain address-allocation cache Displays the valid address allocation cache.
For detailed information about the fields in the output from these commands, refer to the Cisco MDS 9000
Family Command Reference .
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
281
Configuring Domain Parameters
Displaying Session Status
You can display the differences between the pending configuration and the current configuration using the
show fcdomain pending-diff command.
Note In the following example, the fcdomain feature is disabled. Consequently, the runtime fabric name
is the same as the configured fabric name.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
282
Configuring Domain Parameters
Displaying fcdomain Information
Note If a scale-restart feature was enabled and the other optimization modes were disabled when
downgrading from Cisco MDS 6.2(9) release or later to 6.2(7) or older releases, the optimize mode
will be a blank instead of disabled
fcdomain Lists
Use the show fcdomain domain-list command to display the list of domain IDs of all switches
belonging to a specified VSAN. This list provides the WWN of the switches owning each domain
ID. The following example shows the following:
• A switch with WWN of 20:01:00:05:30:00:47:df is the principal switch and has domain 200.
• A switch with WWN of 20:01:00:0d:ec:08:60:c1 is the local switch (the one where you typed
the CLI command to show the domain-list) and has domain 99.
• The IVR manager obtained virtual domain 97 using 20:01:00:05:30:00:47:df as the WWN for
a virtual switch.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
283
Configuring Domain Parameters
Displaying fcdomain Information
Tip Ensure that the requested domain ID passes the Cisco NX-OS software checks, if interop 1 mode
is required in this switch.
VSAN Statistics
Number of Principal Switch Selections: 5
Number of times Local Switch was Principal: 0
Number of 'Build Fabric's: 3
Number of 'Fabric Reconfigurations': 0
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
284
Configuring Domain Parameters
Displaying fcdomain Information
Interface Statistics:
Transmitted Received
----------- --------
EFPs 13 9
DIAs 7 7
RDIs 0 0
ACCs 21 25
RJTs 1 1
BFs 2 2
RCFs 4 4
Error 0 0
Total 48 48
Total Retries: 0
Total Frames: 96
----------- --------
FC ID Information
Use the show fcdomain address-allocation command to display FC ID allocation statistics including
a list of assigned and free FC IDs. See the following example:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
285
Configuring Domain Parameters
Displaying fcdomain Information
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
286
CHAPTER 15
Monitoring Network Traffic Using SPAN
This chapter describes the Switched Port Analyzer (SPAN) features provided in switches in the Cisco MDS
9000 Family.
• Information About SPAN, on page 287
• Guidelines and Limitations, on page 299
• Default SPAN and RSPAN Settings, on page 302
• Configuring SPAN, on page 302
• Configuring the Source Switch , on page 309
• Configuring All Intermediate Switches , on page 312
• Configuring the Destination Switch , on page 313
• Verifying SPAN Configuration, on page 316
• Configuration Examples for RSPAN, on page 321
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
287
Monitoring Network Traffic Using SPAN
SPAN Sources
SPAN Sources
SPAN sources refer to the interfaces from which traffic can be monitored. You can also specify VSAN as a
SPAN source, in which case, all supported interfaces in the specified VSAN are included as SPAN sources.
When a VSAN as a source is specified, then all physical ports and PortChannels in that VSAN are included
as SPAN sources. You can choose the SPAN traffic in the ingress direction, the egress direction, or both
directions for any source interface:
• Ingress source (Rx)—Traffic entering the switch fabric through this source interface is spanned or copied
to the SD port (see Figure 15: SPAN Traffic from the Ingress Direction, on page 288).
• Egress source (Tx)—Traffic exiting the switch fabric through this source interface is spanned or copied
to the SD port (see Figure 16: SPAN Traffic from Egress Direction, on page 288).
Note You can configure SPAN for Ethernet traffic using Cisco switches or routers connected to the Cisco MDS
9000 Family IPS modules.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
288
Monitoring Network Traffic Using SPAN
Allowed Source Interface Types
Note In Cisco MDS 9700 Series Switches, iSCSI ports are not applicable for the Allowed Source Interface Types.
VSAN as a Source
SPAN sources refer to the interfaces from which traffic can be monitored. When a VSAN as a source is
specified, then all physical ports and PortChannels in that VSAN are included as SPAN sources. A TE port
is included only when the port VSAN of the TE port matches the source VSAN. A TE port is excluded even
if the configured allowed VSAN list may have the source VSAN, but the port VSAN is different.
You cannot configure source interfaces (physical interfaces, PortChannels, or sup-fc interfaces) and source
VSANs in the same SPAN session.
SPAN Sessions
Each SPAN session represents an association of one destination with a set of source(s) along with various
other parameters that you specify to monitor the network traffic. One destination can be used by one or more
SPAN sessions. You can configure up to 16 SPAN sessions in a switch. Each session can have several source
ports and one destination port.
To activate any SPAN session, at least one source and the SD port must be up and functioning. Otherwise,
traffic is not directed to the SD port.
Tip A source can be shared by two sessions, however, each session must be in a different direction—one ingress
and one egress.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
289
Monitoring Network Traffic Using SPAN
Specifying Filters
You can temporarily deactivate (suspend) any SPAN session. The traffic monitoring is stopped during this
time.
Note On a Cisco MDS 9250i Multiservice Fabric switch, packet drops will occur if the SPAN port cannot keep up
with incoming frame bursts. To avoid these packet drops, the speed of the SPAN destination port should be
equal to the maximum speed of the source ports. However, when the source is an FCIP interface, the speed
of the SPAN destination port should be more than 10G because the FCIP interface is running over a 10G
Ethernet physical interface.
Specifying Filters
You can perform VSAN-based filtering to selectively monitor network traffic on specified VSANs. You can
apply this VSAN filter to all sources in a session (see ). Only VSANs present in the filter are spanned.
You can specify session VSAN filters that are applied to all sources in the specified session. These filters are
bidirectional and apply to all sources configured in the session. Each SPAN session represents an association
of one destination with a set of source(s) along with various other parameters that you specify to monitor the
network traffic.
SD Port Characteristics
An SD port has the following characteristics:
• Ignores BB_credits.
• Allows data traffic only in the egress (Tx) direction.
• Does not require a device or an analyzer to be physically connected.
• Supports only 1 Gbps or 2 Gbps speeds. The auto speed option is not allowed.
• Multiple sessions can share the same destination ports.
• If the SD port is shut down, all shared sessions stop generating SPAN traffic.
• The outgoing frames can be encapsulated in Extended Inter-Switch Link (EISL) format.
• The SD port does not have a port VSAN.
• SD ports cannot be configured using Storage Services Modules (SSMs).
• The port mode cannot be changed if it is being used for a SPAN session.
Note • If you need to change an SD port mode to another port mode, first remove the SD port from all sessions
and then change the port mode using the switchport mode command.
• In Cisco MDS 9700 Series Switches, the SD Port supports only 2 Gbps, 4 Gbps, 8 Gbps, and 16 Gbps
speeds. The auto speed option is not allowed
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
290
Monitoring Network Traffic Using SPAN
SPAN Conversion Behavior
• If source interfaces and source VSANs are configured in a given session, then all the source VSANs are
removed from that session.
For example, before Cisco MDS SAN-OS Release 1.0(4):
Session 1 (active)
Destination is fc1/9
No session filters configured
Ingress (rx) sources are
vsans 10-11
fc1/3,
Egress (tx) sources are
fc1/3,
Session 1 (active)
Destination is fc1/9
No session filters configured
Ingress (rx) sources are
fc1/3,
Egress (tx) sources are
fc1/3,
Session 1 had both source interfaces and source VSANs before the upgrade. After the upgrade, the source
VSANs were removed (rule 1).
• If interface level VSAN filters are configured in source interfaces, then the source interfaces are also
removed from the session. If this interface is configured in both directions, it is removed from both
directions.
For example, before Cisco MDS SAN-OS Release 1.0(4):
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
291
Monitoring Network Traffic Using SPAN
Monitoring Traffic Using Fibre Channel Analyzers
Session 2 (active)
Destination is fc1/9
No session filters configured
Ingress (rx) sources are
vsans 12
fc1/6 (vsan 1-20),
Egress (tx) sources are
fc1/6 (vsan 1-20),
Note The deprecated configurations are removed from persistent memory once a switchover or a new startup
configuration is implemented.
Session 2 had a source VSAN 12 and a source interface fc1/6 with VSAN filters specified in Cisco MDS
SAN-OS Release 1.0(4). When upgraded to Cisco MDS SAN-OS Release 1.1(1) the following changes are
made:
• • The source VSAN (VSAN 12) is removed (rule 1).
• The source interface fc1/6 had VSAN filters specified—it is also removed (rule 2).
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
292
Monitoring Network Traffic Using SPAN
Monitoring with SPAN
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
293
Monitoring Network Traffic Using SPAN
Single SD Port to Monitor Traffic
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
294
Monitoring Network Traffic Using SPAN
SD Port Configuration
To use this setup, the analyzer should have the capability of distinguishing ingress and egress traffic for all
captured frames.
SD Port Configuration
The SD port in the destination switch enables the FC analyzer to receive the RSPAN traffic from the Fibre
Channel tunnel. Figure 20: RSPAN Tunnel Configuration, on page 295 depicts an RSPAN tunnel configuration,
now that tunnel destination is also configured.
Figure 20: RSPAN Tunnel Configuration
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
295
Monitoring Network Traffic Using SPAN
Creating VSAN Interfaces
Note This example assumes that VSAN 5 is already configured in the VSAN database.
Remote SPAN
Note Remote SPAN is not supported on the Cisco Fabric Switch for HP c-Class BladeSystem, Cisco Fabric Switch
for IBM BladeSystem, Cisco Fabric Switch 9250i, and Cisco Fabric Switch 9100S.
The Remote SPAN (RSPAN) feature enables you to remotely monitor traffic for one or more SPAN sources
distributed in one or more source switches in a Fibre Channel fabric. The SPAN destination (SD) port is used
for remote monitoring in a destination switch. A destination switch is usually different from the source
switch(es) but is attached to the same Fibre Channel fabric. You can replicate and monitor traffic in any remote
Cisco MDS 9000 Family switch or director, just as you would monitor traffic in a Cisco MDS source switch.
The RSPAN feature is nonintrusive and does not affect network traffic switching for those SPAN source ports.
Traffic captured on the remote switch is tunneled across a Fibre Channel fabric which has trunking enabled
on all switches in the path from the source switch to the destination switch. The Fibre Channel tunnel is
structured using trunked ISL (TE) ports. In addition to TE ports, the RSPAN feature uses two other interface
types (see Figure 23: RSPAN Transmission, on page 297):
• SD ports—A passive port from which remote SPAN traffic can be obtained by the FC analyzer.
• ST ports—A SPAN tunnel (ST) port is an entry point port in the source switch for the RSPAN Fibre
Channel tunnel. ST ports are special RSPAN ports and cannot be used for normal Fibre Channel traffic.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
296
Monitoring Network Traffic Using SPAN
Advantages of Using RSPAN
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
297
Monitoring Network Traffic Using SPAN
ST Port Configuration
ST Port Configuration
Note In Cisco MDS 9700 Series Switches, SPAN tunnel port (ST port) is not supported.
Once the FC tunnel is created, be sure to configure the ST port to bind it to the FC tunnel at the source switch.
The FC tunnel becomes an RSPAN tunnel once the binding and mapping is complete.
Figure 25: Binding the FC Tunnel, on page 298 depicts a basic FC tunnel configuration.
Figure 25: Binding the FC Tunnel
ST Port Characteristics
ST ports have the following characteristics:
• ST ports perform the RSPAN encapsulation of the FC frame.
• ST ports do not use BB_credits.
• One ST port can only be bound to one FC tunnel.
• ST ports cannot be used for any purpose other than to carry RSPAN traffic.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
298
Monitoring Network Traffic Using SPAN
Creating Explicit Paths
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
299
Monitoring Network Traffic Using SPAN
Guidelines to Configure VSANs as a Source
• The number of source ports must be less than or equal to 16. However, we recommend that you configure
a maximum of only two source ports per SPAN or monitor session.
• You can configure a maximum of three SPAN sessions with one egress (Tx) port.
• In a 32-port switching module, you must configure the same session in all four ports in one port group
(unit). If you wish, you can also configure only two or three ports in this unit.
Note This is not applicable for Cisco MDS 9700 Series Switches.
• SPAN frames are dropped if the sum of the bandwidth of the sources exceeds the speed of the destination
port.
• Frames dropped by a source port are not spanned.
• SPAN does not capture pause frames in a Fibre Channel over Ethernet (FCoE) network because pause
frames sent from the virtual expansion (VE) port are generated and terminated by the outermost MAC
layer. For more information on FCoE, see the Cisco NX-OS FCoE Configuration Guide for Cisco Nexus
7000 and Cisco MDS 9500.
• In case of an IVR configuration and topology, SPAN cannot capture the egress (Tx) of the source port.
To span the complete traffic flow, add the source ports taking part in the flow in ingress (Rx) direction.
Consider FC1/1, in the above illustration, as the SPAN source port. In this case, traffic egressing (Tx)
from FC1/1 will not be spanned. Only packets entering (Rx) FC1/1 will be spanned. To capture the
complete flow, span FC1/1 (Rx) and FC1/2 (Rx) in a single session going to a single destination.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
300
Monitoring Network Traffic Using SPAN
Guidelines to Specifying Filters
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
301
Monitoring Network Traffic Using SPAN
Default SPAN and RSPAN Settings
Note If the IP address is in the same subnet as the VSAN, the VSAN interface does not have to be configured for
all VSANs on which the traffic is spanned.
• A single Fibre Channel switch port must be dedicated for the ST port functionality.
• Do not configure the port to be monitored as the ST port.
• The FC tunnel’s IP address must reside in the same subnet as the VSAN interface.
Parameters Default
If filters are not specified SPAN traffic includes traffic through a specific interface from all active VSANs.
Encapsulation Disabled.
Table 39: Default RSPAN Configuration Parameters , on page 302 lists the default settings for RSPAN
parameters.
Parameters Default
FC tunnel Disabled
Configuring SPAN
The SPAN feature is specific to switches in the Cisco MDS 9000 Family. It monitors network traffic through
a Fibre Channel interface.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
302
Monitoring Network Traffic Using SPAN
Configuring SD Ports for SPAN
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
303
Monitoring Network Traffic Using SPAN
Configuring SPAN Session
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
304
Monitoring Network Traffic Using SPAN
Configuring SPAN Filter
Procedure
Note While using Generation 2 fabric switches, you cannot create an additional active SPAN session when you
already have one.
You can specify multiple SPAN source interfaces in Rx and Tx directions. However, the direction should be
explicitly mentioned at the end of the command. The SPAN will reject any source interface configuration that
fails to mention the direction.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
305
Monitoring Network Traffic Using SPAN
Configuring Egress SPAN Session
Procedure
Examples
This example shows how to configure Cisco MDS 9124 for Multiple SPAN Interfaces
Generation 2 Fabric Switches support VSAN filters for one VSAN only in the egress direction; this restriction
does not apply to the ingress direction. For example, if you have an interface that is a TE port, with an active
VSAN of 1 to 5, and you specify a VSAN filter for VSAN 2, then only the traffic on VSAN 2 will be filtered.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
306
Monitoring Network Traffic Using SPAN
Suspending and Reactivating SPAN Sessions
However, if you specify the VSAN filter for VSANs 1 to 2, then traffic from all VSANs (1 to 5) is filtered,
which makes the filter useless.
Procedure
Encapsulating Frames
The frame encapsulation feature is disabled by default. If you enable the encapsulation feature, all outgoing
frames are encapsulated.
The switchport encap eisl command only applies to SD port interfaces. If encapsulation is enabled, you see
a new line ( Encapsulation is eisl ) in the show interface SD_port_interface command output.
To encapsulate outgoing frames (optional), follow these steps:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
307
Monitoring Network Traffic Using SPAN
Configuring Fibre Channel Analyzers Using SPAN
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
308
Monitoring Network Traffic Using SPAN
To configure Fibre Channel Analyzers using SPAN for the example in , follow these steps:
Procedure
Step 1 Configure SPAN on interface fc1/1 in the ingress (Rx) direction to send traffic on SD port fc2/1 using session
1.
Step 2 Configure SPAN on interface fc1/1in the egress (Tx) direction to send traffic on SD port fc2/2 using session
2.
Step 3 Physically connect fc2/1 to port 1 on the Fibre Channel analyzer.
Step 4 Physically connect fc2/2 to port 2 on the Fibre Channel analyzer.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
309
Monitoring Network Traffic Using SPAN
Creating VSAN Interfaces
Procedure
Enabling FC Tunnels
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
310
Monitoring Network Traffic Using SPAN
Initiating the FC Tunnel
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
311
Monitoring Network Traffic Using SPAN
Configuring an RSPAN Session
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
312
Monitoring Network Traffic Using SPAN
Enabling IP Routing
Note This example assumes that VSAN 5 is already configured in the VSAN database.
To create a VSAN interface in the destination switch for the scenario in , follow these steps:
Procedure
Enabling IP Routing
The IP routing feature is disabled by default. Be sure to enable IP routing in each switch (including the source
and destination switches) in the end-to-end path in the fabric. This procedure is required to set up the FC
tunnel.
Note This example assumes that VSAN 5 is already configured in the VSAN database.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
313
Monitoring Network Traffic Using SPAN
Configuring the SD Port
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
314
Monitoring Network Traffic Using SPAN
Creating Explicit Paths
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
315
Monitoring Network Traffic Using SPAN
Referencing the Explicit Path
Procedure
To use this setup, the analyzer should have the capability of distinguishing ingress and egress traffic for all
captured frames.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
316
Monitoring Network Traffic Using SPAN
Displaying SPAN Information
Command Purpose
show interface fc1/11 Displays Detailed Information for the ST Port Interface
For detailed information about the fields in the output from these commands, refer to the Cisco MDS 9000
Family Command Reference .
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
317
Monitoring Network Traffic Using SPAN
Displaying SPAN Information
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
318
Monitoring Network Traffic Using SPAN
Displaying RSPAN Information
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
319
Monitoring Network Traffic Using SPAN
Displaying RSPAN Information
FC Tunnel Status
The following example displays FC tunnel status:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
320
Monitoring Network Traffic Using SPAN
Configuration Examples for RSPAN
10.20.1.3 strict
Explicit path name: User2
10.20.50.1 strict
10.20.50.4 loose
FC Tunnel Interface
The following example displays the FC Tunnel Interface:
Note RSPAN can be combined with the local SPAN feature so SD ports forward local SPAN traffic along with
remote SPAN traffic. Various SPAN source and tunnel scenarios are described in this section.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
321
Monitoring Network Traffic Using SPAN
Single Source with Multiple RSPAN Tunnels
Figure 29: RSPAN Scenario with One Source Switch, One Destination Switch, and One Tunnel
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
322
Monitoring Network Traffic Using SPAN
Multiple Sources with Multiple RSPAN Tunnels
Figure 31: RSPAN Scenario with Two Source Switches, a Destination Switch, and Multiple Tunnels
This configuration is useful for remote monitoring purposes. For example, the administrator may be at the
destination switch and can remotely monitor the two source switches.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
323
Monitoring Network Traffic Using SPAN
Multiple Sources with Multiple RSPAN Tunnels
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
324
CHAPTER 16
Configuring Fabric Configuration Server
This chapter describes the Fabric Configuration Server (FCS) feature provided in the Cisco MDS 9000 Family
of directors and switches.
• Information About FCS, on page 325
• Default Settings, on page 327
• Configuring FCS, on page 327
• Verifying FCS Configuration, on page 329
• Additional References, on page 332
Each object has its own set of attributes and values. A null value may also be defined for some attributes.
In the Cisco MDS 9000 Family switch environment, multiple VSANs constitute a fabric, where one instance
of the FCS is present per VSAN.
As of Cisco NX-OS Release 4.1(1), FCS supports the discovery of virtual devices. The fcs virtual-device-add
command, issued in FCS configuration submode, allows you to discover virtual devices in a particular VSAN
or in all VSANs. The devices that are zoned for IVR must be discovered with this command and have request
domain_ID (RDI) enabled, before activating the IVR zone set.
If you have attached a management application to a switch, all the frames directed towards the FCS in the
switch are part of the port VSAN in the switch port (Fx port). Your view of the management application is
limited only to this VSAN. However, information about other VSANs that this switch is part of can be obtained
either through the SNMP or CLI.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
325
Configuring Fabric Configuration Server
Significance of FCS
In Figure 32: FCSs in a VSAN Environment, on page 326 Management Application 1 (M1) is connected
through an F port with port VSAN ID 1, and Management Application 2 (M2) is connected through an F port
with port VSAN ID 2. M1 can query the FCS information of switches S1 and S3, and M2 can query switches
S3 and S4. Switch S2 information is not known to both of them. FCS operations can be done only on those
switches that are visible in the VSAN. Note that M2 can send FCS requests only for VSAN 2 even though
S3 is also a part of VSAN 1.
Figure 32: FCSs in a VSAN Environment
Significance of FCS
This section lists the significance of FCSs.
• FCSs support network management including the following:
• N port management application can query and obtain information about fabric elements.
• SNMP manager can use the FCS management information base (MIB) to start discovery and obtain
information about the fabric topology.
• FCSs support TE and TL ports in addition to the standard F and E ports.
• FCS can maintain a group of modes with a logical name and management address when a platform
registers with it. FCSs maintain a backup of all registrations in secondary storage and update it with
every change. When a restart or switchover happens, FCSs retrieve the secondary storage information
and rebuild its database.
• SNMP manager can query FCSs for all IEs, ports, and platforms in the fabric.
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
326
Configuring Fabric Configuration Server
Default Settings
Default Settings
Table 40: Default FCS Settings , on page 327 lists the default FCS settings.
Parameters Default
Configuring FCS
The Fabric Configuration Server (FCS) provides discovery of topology attributes and maintains a repository
of configuration information of fabric elements.
Note Set this command globally only if all switches in the fabric belong to the Cisco MDS 9000 Family.
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
327
Configuring Fabric Configuration Server
Registering Platform Attributes
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
328
Configuring Fabric Configuration Server
Verifying FCS Configuration
Command Purpose
show fcs ie vsan 1 Displays a List of All IEs for a Specific VSAN.
show fcs ie nwwn 20:01:00:05:30:00:16:df Displays Interconnect Element Object Information for a
vsan 1 Specific nWWN
show fcs platform name SamplePlatform vsan Displays Information for a Specific Platform
1
show fcs platform vsan 1 Displays a List of Platforms for a Specified VSAN
show fcs port vsan 24 Displays a List of Switch Ports in a Specified VSAN
show fcs port pwwn 20:51:00:05:30:00:16:de Displays Port Information for a Specified pWWN
vsan 24
For detailed information about the fields in the output from these commands, refer to the Cisco MDS 9000
Family Command Reference .
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
329
Configuring Fabric Configuration Server
Displaying FCS Elements
Switch Ports:
-------------------------------------------------------------------
Interface pWWN Type Attached-pWWNs
-------------------------------------------------------------------
fc2/1 20:41:00:05:30:00:16:de TE 20:01:00:05:30:00:20:de
fc2/2 20:42:00:05:30:00:16:de Unknown None
fc2/17 20:51:00:05:30:00:16:de TE 20:0a:00:05:30:00:20:de
FCS Local Database in VSAN: 5
------------------------------
Switch WWN : 20:05:00:05:30:00:12:5f
Switch Domain Id : 0xef(239)
Switch Mgmt-Addresses : http://172.22.90.171/eth-ip
snmp://172.22.90.171/eth-ip
http://10.10.15.10/vsan-ip
snmp://10.10.15.10/vsan-ip
Fabric-Name : 20:05:00:05:30:00:12:5f
Switch Logical-Name : 172.22.90.171
Switch Information List : [Cisco Systems*DS-C9509**20:00:00:05:30:00:12:5e]
Switch Ports:
-------------------------------------------------------------------
Interface pWWN Type Attached-pWWNs
-------------------------------------------------------------------
fc3/1 20:81:00:05:30:00:12:5e TE 22:01:00:05:30:00:12:9e
fc3/2 20:82:00:05:30:00:12:5e TE 22:02:00:05:30:00:12:9e
fc3/3 20:83:00:05:30:00:12:5e TE 22:03:00:05:30:00:12:9e
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
330
Configuring Fabric Configuration Server
Displaying FCS Elements
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
331
Configuring Fabric Configuration Server
Additional References
Attached-Port-WWNs:
20:0a:00:05:30:00:20:de
Port State = Online
FCS Statistics
The following example displays FCS statistics:
Additional References
For additional information related to implementing FCS, see the following section:
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
332
Configuring Fabric Configuration Server
Additional References
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
333
Configuring Fabric Configuration Server
Additional References
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
334
CHAPTER 17
Configuring Port Pacing
This chapter describes how to configure Port Pacer.
• Information About Port Pacing, on page 335
• Guidelines and Limitations, on page 335
• Configuring Port Pacer, on page 336
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
335
Configuring Port Pacing
Configuring Port Pacer
Note Port pacing configuration is supported only for admin port mode F.
Port pacing command is a system wide command applicable for all admin port mode F ports.
To enable the port pacer, perform these steps:
Procedure
Procedure
Cisco MDS 9000 Series System Management Configuration Guide, Release 8.x
336