Cisco MDS NX-OS Installation - Implementation Guide
Cisco MDS NX-OS Installation - Implementation Guide
Introduction
This document details the procedure to configure and implement new switches and fabrics with Cisco MDS
NX-OS on Cisco MDS 9000 Family of Fibre Channel Switch and Director Class products.
Change Summary
Versio Date Change / Summary
n Updated by
01 09/28/2010 Yew Oon Sian Initial document
02 04/19/2011 Yew Oon Sian Removed Even Fabric Configuration in the example to
avoid confusion
03 06/09/2011 Yew Oon Sian Added default parameters to configuration template
04 08/17/2011 Yew Oon Sian Added Compatibility Check and Troubleshooting section
05 29/Nov/2011 Michael E Smith Removed references to SAN-OS 3.x
06 6/Nov/2012 Sebastian Luque Corrected configuration backup. Included a comment to
reference an example
07 14/Jun/2013 Cancilla, Bret A. Changed to OASIS format
Start a Switch
Use this port to create a local management connection to set the IP address and other initial
configuration settings before connecting the switch to the network for the first time.
To connect the console port to a computer terminal, the computer must support VT100 terminal
emulation. The terminal emulation software – frequently an application such as HyperTerminal or
PuTTY – makes communication between the switch and computer possible during setup and
configuration.
1. Configure the terminal emulator program to match the following default port characteristics:
9,600 baud
8 data bits
1 stop bit
No parity
2. Connect the supplied console cable (normally blue color) to the console port and to the
computer serial port.
The setup utility allows building an initial configuration file using the System Configuration Dialog.
The setup starts automatically when a device has no configuration file in NVRAM.
Press [Ctrl+C] at any prompt to skip the remaining configuration options and proceed with what is
configured up to that point, except for the administrator password.
Press [Enter] to skip answers to any questions. If a default answer is not available (ex:, the device
hostname), the device uses what was previously configured and skips to the next question.
Prerequisites
Before setting up a switch, the tasks below should be completed.
Switches names should follow three letter site code, three letter function code, sequential
number, i.e. sssFCfnn (HCFFCX01).
Where the function code is one of the following registered functions (FCH, FCX, FCS,
and FCE are targeted to sites with more than 2500 host potential):
FCH – FC Host Edge switches (Hosts/initiators only)
FCX – FC Core switches (ISLs/PortChannel between FCH/FCS/FCE only. No
initiators/targets)
FCS – FC Storage Edge switches (storage/targets only)
FCE – FC Edge switches (for the Edge – Core Model. Host/Storage initiators/targets)
FCF – FC Fabric (for site with less than 2500 hosts)
If in doubt contact storage engineering.
Domain Name
Switch IP Address and Subnet Mask
Gateway
DNS
2. Obtain the License Key file.
3. Create a touch file on the target TFTP server in tftpboot directory named <switchname>_cfg.txt
with rwxrwxrwx permissions (chmod 777).
4. Switch’s IP address must be registered with SMTP services in order to make callhome email
feature work. Refer to SMTP External Messaging Service site on
http://intrattd.na.xom.com/EMGS/ITHELP/solutions/email/smtpservices/smtp_service.html or
contact [email protected] to verify registration.
5. Pick an NTP server in the same region as the switch with “w32tm /monitor /domain:<domain>”
command.
6. The MDS Active Directory groups (EMIT.MDS.ADM.GBL.RWXD.GG and
EMIT.MDS.OPER.GBL.RX.GG) control access to the switches.
NOTE: The owner of the group will grant approval/disapproval of requests for users joining that
Active Directory group. Any user that is part of those Active Directory groups will gain the level of
access predefined for that group (such as network-admin or network-operator).
1. After powering-up the switch, it will boot automatically until it prompts to enter password for
administrator. Enter the new password.
Enter the password for “admin:” <admin-password>
Confirm the password for “admin:” <admin-password>
Password should contain characters from at least three of the following classes: lower case
letters, upper case letters, digits and special characters.
2. When prompted to enter basic configuration dialog, enter no to skip the dialog.
Would you like to enter the basic configuration dialog (yes/no): no
3. Configure the out-of-band (mgmt 0) management. In this example, we are configuring the
management port with IP address 172.19.26.39/27.
switch# configure terminal
Verify the software image version. Refer to NetApp FAS-V Series Firmware and Software Versions,
SAN-CLARiiON: Flarecode, Firmware, and Software Versions, SAN-Symmetrix: Microcode, Drivers,
and Software Versions, and Fibre Channel over Ethernet (FCoE) Requirements Document for
current certified version.
! TACACS+ Configuration
feature tacacs+
! Callhome Configuration
snmp-server contact Enterprise Storage Operations @ +1-713-656-4357
(option 4)
snmp-server location SiteX, CountryX
snmp-server community ECCSANADMINRO group network-operator
snmp-server community ECCSANADMINRW group network-admin
callhome
contract-id 1234567
customer-id 1234567
switch-priority 4
site-id 1234567
email-contact [email protected]
phone-contact +1-800-446-3272
streetaddress SiteAddress
distribute
destination-profile full_txt message-level 3
destination-profile short_txt message-level 4
destination-profile xml message-level 3
destination-profile short_txt email-addr GSC-EMIT-STORAGE-
[email protected]
transport email smtp-server smtp.na.xom.com port 25
transport email from [email protected]
transport email reply-to [email protected]
enable
periodic-inventory notification interval 30
periodic-inventory notification timeofday YY:ZZ
commit
! VSAN Configuration
vsan database
vsan 1 suspend
vsan 101 name “MV_Odd”
vsan 801 name “Virtualization_801”
vsan 3800 name “Links”
device-alias mode enhanced
fcdomain distribute
fcdomain priority 64 vsan 101
fcdomain domain nn static vsan 101
fcdomain priority 64 vsan 801
fcdomain domain nn static vsan 801
fcdomain priority 64 vsan 3800
fcdomain domain nn static vsan 3800
fcdomain commit vsan 101
! Scheduler Configuration
scheduler job name daily_run_backup
copy running-config tftp://144.201.242.109/(hostname)_cfg.txt
exit
scheduler schedule name daily_backup
job name daily_run_backup
time daily YY:ZZ
end
TACACS+ Configuration:
Callhome Configuration:
VSAN Configuration:
The template is to be used for Odd Fabric, change the following for Even Fabric:
vsan 102 name “MV_Even”
vsan 802 name “Virtualization_802”
WARNING: If this is not the first switch in the fabric, remove all “fcdomain priority” commands.
fcdomain priority 64 vsan 801
Refer to Domain ID spreadsheet for Domain ID reserved for the new switch. Use the same
Domain ID for all VSANs within the switch.
fcdomain domain nn static vsan 101 fcdomain domain 33 static
vsan 101
fcdomain domain nn static vsan 801 fcdomain domain 33 static
vsan 801
fcdomain domain nn static vsan 3800 fcdomain domain 33 static
vsan 3800
The template is to be used for Odd Fabric, change the above for Even Fabric.
Scheduler Configuration:
For more information on Backup Schedule configuration, refer to OASIS Document Cisco MDS 9000
License Key
After all the PAKs are entered, a display should appear, similar to the following example:
3. To download the license file, click on the download button and save the file to the local
computer.
NOTE: The license key file is digitally signed to only authorize use on the requested switch. The
requested features are also enabled once the Cisco NX-OS software on the specified switch
accesses the license key file. Install the license key in the specified MDS switch without making any
modifications.
NOTE: It is recommended to save a backup of the installed license files. The backup file should
always be .tar extension.
CETMDS81# copy licenses bootflash:CETMDS81_Licenses.tar
Backing up license done
Scheduling – Schedule the upgrade when the fabric is stable and steady. Ensure that everyone
who has access to the switch or the network is not configuring the switch or the network during
this upgrade, because all configurations will be disallowed at this time.
Hardware – Avoid power interruptions to the hardware during any installation procedures;
power interruption problems can corrupt the software image.
Connectivity – Connectivity to remote servers to retrieve software images requires a
configured IP address for the management Ethernet port on the switch (interface mgmt0) and
make sure that the switch has a route to the remote server.
Software Images – Ensure that the specified system and kickstart images are compatible with
each other.
Save Current Configuration – Save running-config to startup-config (NVRAM).
Backup Configuration – Keep a copy of the configuration outside of switch (FTP, TFTP, etc.)
Save Tech-Support – Keep a copy of the tech-support detail file.
Redundancy – Perform software image upgrade, “One Switch at a Time.”
Prepare for Software Image Upgrade on a Switch with Storage Services Module
(SSM) Installed
If the switch has SSM installed, ensure that the admin mode on the SSM interfaces is correctly
configured.
1. Verify the operational mode for each interface on the SSM using the command below.
CETMDS81# show interface fc9/1 – 32 brief
----------------------------------------------------------------------
Interface Vsan Admin Admin Status SFP Oper Oper Port
Mode Trunk Mode Speed Channel
Mode (Gbps)
----------------------------------------------------------------------
fc9/1 3 auto -- up -- F 2 --
. . .
2. Change the configuration of the first interface of the port groups when the admin mode is auto.
These are the interfaces: 1, 5, 9, 13, 17, 21, 25, and 29. Do not leave the port mode for these
interfaces set to auto.
If the current operating port mode is F or FL, set the admin mode to FX.
CETMDS81(config)# interface fc9/1
CETMDS81(config-if)# switchport mode fx
If the current operating port mode is E or TE, set the admin mode to E.
If the first interface in the port group has admin mode E or is operating in E port mode,
change the admin state of remaining ports to shutdown.
CETMDS81(config)# interface fc9/30 - 32
CETMDS81(config-if)# shutdown
NOTE: Only the first port in a port group is available for traffic in E port mode. Shutting down
the other three interfaces in the port group disrupts the traffic on those interfaces.
4. Save the configuration.
1. Prepare the new image files and check its file sizes. Calculate the total size of both files.
For example:
m9100-s2ek9-kickstart-mz.4.2.3.bin (kickstart image) file size: 18,678,784 bytes
m9100-s2ek9-mz.4.2.3.bin (system image) file size: 52,766,038 bytes
2. Display the details of the currently installed images, by entering the following command.
KLLMDS01# show version
. . .
Software
BIOS: version 1.0.16
kickstart: version 3.3(2)
system: version 3.3(2)
If you have an SSM module installed, the output will be similar as below. Take note on the
location of SSI image, e.g. modflash://9-1/
In this example, 77,186,048 bytes are free, so the directory can accommodate the two new
images. If the total size of new images is bigger than free space, delete unwanted files by using
the command:
NOTE: Do not delete current images. If there is insufficient space for both the current images
and new images, copy the current images to the TFTP server. Only after the current images
are copied onto the TFTP server, they may be deleted.
5. From the CLI, determine the software version for both system and kickstart images. Use the
show version command to determine that the system and kickstart image versions match and
are compatible.
KLLMDS01# show version image bootflash:m9100-s2ek9-kickstart-
mz.3.3.2.bin
image name: m9100-s2ek9-kickstart-mz.3.3.2.bin
kickstart: version 3.3(2)
compiled: 10/3/2008 11:00:00 [11/07/2008 09:17:47]
If you have SSM module installed, determine the SSI image version.
6. Use the PING command to ensure the TFTP/FTP server can be contacted. Copy the new
system and kickstart images from the TFTP/FTP server to bootflash: and verify the results.
KLLMDS01# ping 172.19.26.35
64 bytes from 172.19.26.35: icmp_seq=1 ttl=128 time=0.158 ms
. . .
If you have an SSM module installed, copy the SSI image to modflash:, e.g. modflash://9-1/
If you have an SSM module installed, verified the SSI image has been copied.
CETMDS81# dir modflash://9-1
. . .
15277810 Jul 05 11:23:56 2010 m9000-ek9-ssi-mz.3.3.2.bin
19194301 Jul 05 11:27:20 2010 m9000-ek9-ssi-mz.4.2.3.bin
. . .
7. Verify the MD5 checksum of the copied files to ensure its integrity. Refer the MD5 hash from
GES-L-2395.
KLLMDS01# show file bootflash:m9100-s2ek9-kickstart-mz.4.2.3.bin
md5sum
5af1849ef6e650b34b91f92576cf72bb
If you have SSM module installed, determine the new SSI image version.
9. Use the show install all impact command to view the effect of updating the system from the
running image to a specified software image version. Enter this command:
KLLMDS01# show install all impact kickstart bootflash:m9100-s2ek9-
kickstart-mz.4.2.3.bin system bootflash:m9100-s2ek9-mz.4.2.3.bin
. . .
Compatibility check is done:
Module bootable Impact Install-type Reason
------ -------- -------------- ------------ ------
1 yes non-disruptive reset
. . .
If you have SSM module installed, include SSI image in the command as below.
NOTE: If the new images have incompatibilities with features that are either used or configured
on the installed release, the system response will provide the reason in the particular module.
For example, “running-config is not supported by new image”, “Incompatible image”, etc.
10. Use the show incompatibility system command to obtain further information on what needs to be
disabled in order to perform a non-disruptive installation. You can use this command to verify
once more to make sure no compatibility issue will occurred during installation.
KLLMDS01# show incompatibility system bootflash:m9100-s2ek9-
mz.4.2.3.bin
No incompatible configurations
Upgrade software using the install all command. When asked to continue, type “Y”.
KLLMDS01# install all kickstart bootflash:m9100-s2ek9-kickstart-
mz.4.2.3.bin system bootflash:m9100-s2ek9-mz.4.2.3.bin
. . .
Do you want to continue with the installation (y/n)? [n] y
If you have SSM module installed, include SSI image in the command as below.
NOTE: On dual supervisor systems, open console windows for both active and standby
supervisors and observe the system switchover between supervisors during the install all
process. On MDS switches with a single supervisor, this will be a disruptive upgrade.
11. On single supervisor systems, verify the system version after reboot. On dual supervisors
systems, you need to access to the previous standby supervisor, because it is now an active
supervisor after system switchover.
NOTE: It takes a little bit longer for MDS 9500 Series to upgrade because all the modules will
be upgraded in sequence. At this time, configuration will be locked as upgrade is in progress.
Consideration
When downgrading software image, consider the following:
Scheduling – Schedule the upgrade when the fabric is stable and steady. Ensure that
everyone who has access to the switch or the network is not configuring the switch or the
network during this upgrade, because all configurations will be disallowed at this time.
Hardware – Avoid power interruptions to the hardware during any installation procedures;
power interruption problems can corrupt the software image.
Connectivity – Connectivity to remote servers to retrieve software images requires a
configured IP address for the management Ethernet port on the switch (interface mgmt0)
and make sure the switch has a route to the remote server.
Software Images – Ensure that the specified system and kickstart images are compatible
with each other.
1. Configure the terminal emulator program to match the following default port characteristics:
2. Follow Steps 1 – 8 from Upgrading Software Image via Terminal section.
3. Issue the show incompatibility system <image-filename> command to determine if you need to
disable any features not supported by the older release.
KLLMDS01# show incompatibility system bootflash: m9100-s2ek9-mz.3.3.2.bin
4. If it returns any incompatible messages, disable the impacted features before proceed.
5. Save the configuration using the copy running-config startup-config command.
6. Follow Steps 10 – 13 from Upgrading Software Image via Terminal section.
Trunking
Trunking, also known as VSAN trunking, is a feature specific to switches in the Cisco MDS 9000
Family. Trunking enables interconnect ports to transmit and receive frames in more than one VSAN,
over the same physical link. Trunking is supported on E ports and F ports.
Trunking E Ports
Trunking E ports enable interconnected ports to transmit and receive frames in more than one
VSAN, over the same physical link, using enhanced ISL (EISL) frame format.
Trunking F Ports
Trunking F ports allow interconnected ports to transmit and receive tagged frames in more than one
VSAN, over the same physical link. The most possible trunking scenarios will be between MDS core
switches and NPV switches.
Trunking Misconfiguration
If the VSANs are not configured correctly, issues with the connection may occur. It is important to
ensure that both ends of a trunking link belong to the same port VSAN. On certain switches or fabric
switches where the port VSANs is different, one end returns an error and the other end is not
connected.
WARNING: Ensure that Domain IDs of VSANs on both switches (and/or all switches) that going to
be connected are not the same. Static Domain ID should be assigned to each switch before enabling
trunking. Reconfigure Domain ID as necessary if found overlapped.
Enable Trunking
To enable trunking, follow these steps:
1. Refer to Cisco MDS Best Practices for standard VSAN number assignment on connection type.
2. Assign ports that are going to be used for ISL to the specified VSAN on both switches. In this
example, we will be assigning two ports to VSAN 3800.
KLLMDS01# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
KLLMDS01(config)# vsan database
KLLMDS01(config-vsan-db)# vsan 3800 interface fc1/23
KLLMDS01(config-vsan-db)# vsan 3800 interface fc1/24
KLLMDS01(config-vsan-db)# exit
KLLMDS01(config)#
3. Configure the ports to be TE_port. Configure this on both switches and change the port
description accordingly. Identify the VSANs that allowed getting through the trunk. In this
example, we will allow VSAN 801 and VSAN 3800 to get through.
KLLMDS01(config)# interface fc1/23
KLLMDS01(config-if)# switchport description ISL_to_KLLMDS03_fc1/23
KLLMDS01(config-if)# switchport mode E
KLLMDS01(config-if)# switchport trunk allowed vsan 801
KLLMDS01(config-if)# switchport trunk allowed vsan add 3800
KLLMDS01(config-if)# switchport trunk mode on
KLLMDS01(config-if)# no shutdown
KLLMDS01(config-if)# exit
KLLMDS01(config)# interface fc1/24
KLLMDS01(config-if)# switchport description ISL_to_KLLMDS03_fc1/24
KLLMDS01(config-if)# switchport mode E
KLLMDS01(config-if)# switchport trunk allowed vsan 801
KLLMDS01(config-if)# switchport trunk allowed vsan add 3800
KLLMDS01(config-if)# switchport trunk mode on
KLLMDS01(config-if)# no shutdown
KLLMDS01(config-if)# end
KLLMDS01#
PortChannel
PortChannel refers to the aggregation of multiple physical fibre channel interfaces into one logical interface
to provide higher aggregated bandwidth, load balancing, and link redundancy. PortChannel can connect to
interfaces across switching modules, so a failure of a switching module cannot bring down the PortChannel
link.
Recommendation: Establish a PortChannel that aggregates two links, with each link connected to a
different switching module. If the switching module goes down, traffic is not affected.
Create a PortChannel
To create a PortChannel, follow these steps:
1. Enter configuration mode and configure the specified PortChannel. The configuration process
must be repeated on both switches. Change the switch port description accordingly. Remember
to use the same PortChannel number on both switches. Do not repeat the PortChannel number
within the physical fabric.
KLLMDS01# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
KLLMDS01(config)# interface port-channel 1
KLLMDS01(config-if)# channel mode active
KLLMDS01(config-if)# switchport mode E
KLLMDS01(config-if)# switchport trunk allowed vsan 801
KLLMDS01(config-if)# switchport trunk allowed vsan add 3800
KLLMDS01(config-if)# switchport trunk mode on
KLLMDS01(config-if)# switchport description PortChannel_to_KLLMDS03
KLLMDS01(config-if)# exit
KLLMDS01(config)#
2. Assign PortChannel interface to the specified VSAN on both switches. In this example, we will
be assigning two ports to VSAN 3800. Refer to Cisco MDS Best Practices for standard VSAN
number assignment on connection type.
KLLMDS01(config)# vsan database
KLLMDS01(config-vsan-db)# vsan 3800 interface port-channel 1
KLLMDS01(config-vsan-db)# exit
KLLMDS01(config)#
3. Add members to a PortChannel and enable it. The configuration process must be repeated on
both switches. In this example, we are adding the two existing ISL connections to the
PortChannel.
KLLMDS01(config)# interface fc1/23-24
KLLMDS01(config-if)# channel-group 1 force
KLLMDS01(config-if)# exit
Verification
To verify if PortChannel is up and running, issue command below:
NOTE: FCIP is supported on the MDS 9222i switch, MSM-18+4 module, MDS 9216i switch, MPS-14/2
module, and IPS modules on MDS 9200 switches and 9500 Directors.
The following characteristics set Fibre Channel PortChannel solutions apart from other solutions:
FSPF
FPSF-based load balancing configuration also provides high availability. This configuration requires
two IP addresses on each SAN island, and addresses IP and FCIP link failures.
The following characteristics set FSPF solutions apart from other solutions:
Prerequisites
Before setting up an FCIP link, obtain all the IP addresses for both local and remote switches from
Network. Interface “B” and “C” should be configured as part of prerequisites.
Configure FCIP
To create a FCIP tunnel, follow the steps below. In this example, we are using following information:
1. Configure Gigabit Ethernet interface that going to be used as FCIP on both switches. In this
example, interface “A”.
CETMDS81# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CETMDS81(config)# interface GigabitEthernet1/1
CETMDS81(config-if)# use-profile 1
Use this command to assign the peer IP address information to the FCIP interface. In this
example, interface “D”.
CETMDS81(config-if)# no shutdown
CETMDS81(config-if)# end
CETMDS81#
To display all configured FCIP profiles, invoke the command below. The output shows the Profile
IDs, their associated IP address, and TCP port.
To drill down and display additional TCP parameters for each FCIP profile, invoke the command
below. The output shows the current values for the TCP parameters of that profile.
Assuming the peer switch has completed and enabled its FCIP tunnel, you can verify that the FCIP
interface is operational using the command below.
To display active link properties, invoke command below. The output displays typical FC ISL
information plus FCIP specific parameters related to the TCP/IP connection.
1. Perform Steps 1 – 2 in Create a PortChannel section. DO NOT repeat the PortChannel number
within the physical fabric.
2. Add FCIP interfaces to a PortChannel. Invoke the following command sequence.
CETMDS81# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
CETMDS81(config)# interface fcip 1-2
CETMDS81(config-if)# channel-group 2 force
CETMDS81(config-if)# end
CETMDS81#
1. Measure the round trip time from source to target by issuing commands below.
CETMDS81# show fcip summary
----------------------------------------------------------------------
Tun prof Eth-if peer-ip Status T W T Enc Comp Bandwidth rtt
E A A max/min (us)
----------------------------------------------------------------------
1 1 GE1/1 169.254.209.66 TRNK Y N N N M1 1000M/500M 1000
Autonomous Fabric ID
The autonomous fabric ID (AFID) distinguishes segmented VSANs (that is, two VSANs that are
logically and physically separate but have the same VSAN number). Cisco MDS NX-OS supports
AFIDs from 1 through 64.
Enable IVR
The IVR feature must be enabled in all border switches in the fabric that participate in the IVR.
IVR zones
IVR zone sets
IVR VSAN topology
IVR active topology and zone set (activating these features in one switch propagates the
configuration to all other distribution-enabled switches in the fabric)
AFID database
IVR NAT
Without Network Address Translation (NAT), IVR requires unique domain IDs for all switches in the
fabric; this include unique domain IDs for all VSANs within the same switch.
IVR NAT allows setting up IVR in a fabric without needing unique domain IDs on every switch in the
IVR path. IVR utilizes the switches in other VSANs by using local VSAN for the destination IDs in the
Besides defining the IVR zone membership, specify a set of transit VSANs to provide
connectivity between two edge VSANs:
If two edge VSANs in an IVR zone overlap, then a transit VSAN is not required to provide
connectivity.
If two edge VSANs in an IVR zone do not overlap, one or more transit VSANs to provide
connectivity. Two edge VSANs in an IVR zone will not overlap if IVR is not enabled on a
switch that is a member of both the source and destination edge VSANs.
Traffic between the edge VSANs only traverses through the shortest IVR path.
Transit VSAN information is common to all IVR zone sets. Sometimes, a transit VSAN can
also act as an edge VSAN in another IVR zone.
1. Use command below to obtain the switch WWNs of the IVR-enabled switches. Invoke the
command on both switches.
CETMDS81# show wwn switch
Switch WWN is 20:00:00:0d:ec:20:07:00
CETMDS81(config-ivr-topology-db)# exit
CETMDS81(config)#
3. Activate VSAN topology. Invoke the command on both switches.
CETMDS81(config)# ivr vsan-topology activate
To commit IVR configuration changes, issue the command below in the configuration mode.
To discard IVR configuration changes, issue the command below in the configuration mode.
To use administrative privileges and release a locked session, issue command below.
If the Cisco switch is not configured for NPIV mode, the FCF function on the QFX3500 may not come
up and complete the Fabric login process.
Verify whether the FC port is up and has completed the fabric login:
NP-Port: fc-0/0/0.0
State: online
Sessions: 15
LB state: ON
LB weight: 8
Ref-count: 16
Flags: UP LB C3
NP-Port: fc-0/0/1.0
State: online
Sessions: 0
LB state: OFF
LB weight: 0
Ref-count: 1
Flags: UP C3 NPIV-UNSUPPORTED
Online – Link is up & FC port logged in still may be problems – see flags
Down – Physical link is down
Isolated – something occurred during the port’s login process preventing the link from
establishing correctly.
Examples:
EA: Europe & Africa 0:00 Schedule Type : Run every day at 6 Hrs 0 Mins
ME: Middle East 21:00 Last Execution Time : Thu Jan 1 6:00:00 2007
Login Banner show banner ExxonMobil owns and maintains this computer system. Your use of this
motd and other ExxonMobil computer systems signifies your agreement that you
Line returns prior to 72nd column so that formatting is correct.
will use the systems for business purposes only in accordance with
Documented in Cisco MDS 9000 Series Initialization & SAN-OS
ExxonMobil policies and standards. Except as otherwise provided by
Upgrade Guide
applicable law, your use of those systems is not covered by any right of
privacy. ExxonMobil from time to time monitors the use of its systems
to detect security problems, improper uses of the systems and for other
Default switch port settings show system System default port state is down
default System default trunk mode is on
IT Controls Manager (ITCM) Controls Listing ID CL-386995 and
switchport
CL-387076 System default link failure syslog logging level is 5
Default zone settings show system system default zone default-zone deny
default zone system default zone distribute full
Documented in Cisco MDS NX-OS Installation/Implementation
Guide and Cisco MDS NX-OS Operations Guide system default zone mode enhanced
transport-method:email
cisco-tac
message format:full-txt
message-level:3
transport-method:email
all
message format:short-txt
message-level:4
transport-method:email
all
public network-operator
private network-admin
Role: priv-15
IT Controls Manager (ITCM) Controls Listing ID CL-387180, CL-
387183, and CL-387242 Role: priv-14
Role: priv-13
Role: priv-12
Role: priv-11
Role: priv-10
Role: priv-9
Role: priv-8
Role: priv-7
Role: priv-6
Role: priv-5
Role: priv-4
Role: priv-3
Role: priv-2
Role: priv-1
Role: priv-0
Role: default-role
IP address of relevant FMS, OCI and SCOM servers show snmp -------------------------------------------------------------------
host Host Port Version Level Type SecName
OCI Server FMS Servers SCOM ProdZ
-------------------------------------------------------------------
Symmetrix HOEFMS09 hoeomm07.na.xom.com
10.216.181.70 1164 v2c noauth trap public
DALOCI02 (10.128.2.85) 10.128.5.73 10.215.156.122 2162 v2c noauth trap public
(10.216.181.70) HOEFMS10 hoeomm08.na.xom.com 10.215.156.157 2162 v2c noauth trap public
(10.216.180.111) HOEFMS13
HOEOCI02 (10.128.17.77)
(10.215.187.121) HOEFMS14
EA/AF/ME/AP HOEFMS15
HOEOCI03 (10.128.5.167)
(10.215.187.22) HOEFMS16
(10.128.5.184)
HOEFMS17
(10.128.5.164)
Documented in NetApp OnCommand Insight (OCI) Operations
Guide
xsconfig
(switch local account ) User Auth Priv(enforce) Groups
______________________________________________________________
______________________________________________________________
scheduler 1 enabled
Documented in Cisco MDS 9000 Series Initialization & SAN-OS
Upgrade Guide sshServer 1 enabled
tacacs 1 enabled