Page 1
Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1) First Published: July 02, 2012 Last Modified: July 02, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)
Page 2
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. http:// Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks .
Page 3
Adding a Switch to a Switch Profile Adding or Modifying Switch Profile Commands Importing a Switch Profile Importing Configurations in a vPC Topology Verifying Commands in a Switch Profile Isolating a Peer Switch Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 4
Configuration Examples for Pre-Provisioning Using Cisco Fabric Services C H A P T E R 5 Information About CFS CFS Distribution CFS Distribution Modes Uncoordinated Distribution Coordinated Distribution Unrestricted Uncoordinated Distributions Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 5
Configuring IPv4 Multicast Address for CFS Configuring IPv6 Multicast Address for CFS Verifying the IP Multicast Address Configuration for CFS over IP Displaying CFS Distribution Information Default Settings for CFS Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 6
Changing User Role Interface Policies Changing User Role VLAN Policies Changing User Role VSAN Policies Verifying the User Accounts and RBAC Configuration Configuring User Accounts Default Settings for the User Accounts and RBAC Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 7
Configuring System Message Logging Configuring System Message Logging to Terminal Sessions Configuring System Message Logging to a File Configuring Module and Facility Messages Logging Configuring Logging Timestamps Configuring the ACL Logging Cache Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 8
Verifying the Smart Call Home Configuration Sample Syslog Alert Notification in Full-Text Format Sample Syslog Alert Notification in XML Format Configuring Rollback C H A P T E R 1 2 Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1) viii...
Page 9
Guidelines and Limitations for SNMP Default SNMP Settings Configuring SNMP Configuring SNMP Users Enforcing SNMP Message Encryption Assigning SNMPv3 Users to Multiple Roles Creating SNMP Communities Filtering SNMP Requests Configuring SNMP Notification Receivers Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 10
Information About SPAN SPAN Sources Characteristics of Source Ports SPAN Destinations Characteristics of Destination Ports Guidelines and Limitations for SPAN Creating or Deleting a SPAN Session Configuring an Ethernet Destination Port Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 11
Configuration Example for an ERSPAN Source Session Configuration Example for an IP Address as the Source for an ERSPAN Session Configuration Example for Truncated ERSPAN Additional References Related Documents Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 12
Contents Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
• Obtaining Documentation and Submitting a Service Request, page xvii Audience This publication is for experienced network administrators who configure and maintain Cisco Nexus devices and Cisco Nexus 2000 Series Fabric Extenders. Document Conventions Command descriptions use the following conventions:...
Means reader be careful. In this situation, you might do something that could result in equipment damage Caution or loss of data. Related Documentation The entire Cisco NX-OS 5000 Series documentation set is available at the following URL: http://www.cisco.com/en/US/products/ps9670/tsd_products_support_series_home.html Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 15
• Security Configuration Guide • System Management Configuration Guide • Unicast Routing Configuration Guide Maintain and Operate Guides Cisco Nexus 5000 Series NX-OS Operations Guides for various features are available at http://www.cisco.com/ en/US/products/ps9670/prod_maintenance_guides_list.html. Installation and Upgrade Guides These guides are available at the following URL: http://www.cisco.com/en/US/products/ps9670/prod_installation_guides_list.html...
• TrustSec Command Reference • Unicast Routing Command Reference • vPC Command Reference Technical References The Cisco Nexus 5000 and Cisco Nexus 2000 MIBs Reference is available at http://www.cisco.com/en/US/ docs/switches/datacenter/nexus5000/sw/mib/reference/NX5000_MIBRef.html. Error and System Messages The Nexus 5000 Series NX-OS System Message Reference is available at http://www.cisco.com/en/US/docs/...
Obtaining Documentation and Submitting a Service Request For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html...
Page 18
Preface Obtaining Documentation and Submitting a Service Request Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1) xviii...
C H A P T E R New and Changed Information This chapter provides release-specific information for each new and changed feature in the Cisco Nexus 3000 Series NX-OS Fundamentals Configuration Guide. • New and Changed Information for this Release, page 1 New and Changed Information for this Release The following table provides an overview of the significant changes to this guide for this current release.
Page 20
New and Changed Information New and Changed Information for this Release Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Pre-provisioning allows users to synchronize the configuration for an interface that is online with one peer but offline with another peer. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 22
System message logging is based on RFC 3164. For more information about the system message format and the messages that the device generates, see the Cisco NX-OS System Messages Reference. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 23
(sometimes called port mirroring or port monitoring) selects network traffic for analysis by a network analyzer. The network analyzer can be a Cisco SwitchProbe, a Fibre Channel Analyzer, or other Remote Monitoring (RMON) probes. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 24
The ERSPAN source session copies traffic from the source ports or source VLANs and forwards the traffic using routable GRE-encapsulated packets to the ERSPAN destination session. The ERSPAN destination session switches the traffic to the destinations. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Information About Switch Profiles Information About Switch Profiles Several applications require consistent configuration across Cisco Nexus Series switches in the network. For example, with a Virtual Port Channel (vPC), you must have identical configurations. Mismatched configurations can cause errors or misconfigurations that can result in service disruptions.
For example, the following command can only be configured in global configuration mode: switchport private-vlan association trunk primary-vlan secondary-vlan • Shutdown/no shutdown • System QoS Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Prerequisites for Switch Profiles Switch profiles have the following prerequisites: • You must enable Cisco Fabric Series over IP (CFSoIP) distribution over mgmt0 on both switches by entering the cfs ipv4 distribute command. • You must configure a switch profile with the same name on both peer switches by entering the config sync and switch-profile commands.
If there is a commit failure, the commands remain in the switch profile buffer. You can then make necessary corrections and try the commit again. • Cisco recommends that you enable pre-provisioning for all Generic Expansion Modules (GEMs) and Cisco Nexus Fabric Extender modules whose interface configurations are synchronized using the configuration synchronization feature.
Follow these guidelines when adding switches: • Switches are identified by their IP address. • Destination IPs are the IP addresses of the switches that you want to synchronize. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
You can verify the commands that are included in a switch profile by entering the verify command in switch profile mode. Procedure Command or Action Purpose Step 1 config sync Enters configuration synchronization mode. Example: switch# config sync switch(config-sync)# Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
4 Undo the changes that were made to the switch profile in Step 2 and commit. 5 Add the peer switch back to the switch profile. Deleting a Switch Profile You can delete a switch profile by selecting the all-config or the local-config option: Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Copies the running configuration to the startup configuration. Example: switch# copy running-config startup-config Deleting a Switch from a Switch Profile You can delete a switch from a switch profile. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Synchronizing Configurations After Switch Reboot If a Cisco Nexus Series switch reboots while a new configuration is being committed on a peer switch using a switch profile, complete the following steps to synchronize the peer switches after reload: Procedure Step 1 Reapply configurations that were changed on the peer switch during the reboot.
Displays the startup configuration for the switch profile on the local switch. For detailed information about the fields in the output from these commands, see the Cisco Nexus 5000 Series Command Reference. Configuration Examples for Switch Profiles...
View the buffered commands. Example: switch(config-sync-sp-if)# show switch-profile switch-profile buffer ---------------------------------------------------------- Seq-no Command ---------------------------------------------------------- class-map type qos match-all c1 match cos 2 class-map type qos match-all c2 match cos 5 Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
This example shows how to configure the switch profile buffer, the buffer-move configuration, and the buffer-delete configuration: switch# configure sync Enter configuration commands, one per line. End with CNTL/Z. switch(config-sync)# switch-profile sp Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Enter configuration commands, one per line. End with CNTL/Z. switch(config-sync)# switch-profile sp Switch-Profile started, Profile ID is 1 switch(config-sync-sp)# import interface Ethernet1/3 switch(config-sync-sp-import)# show switch-profile sp buffer ---------------------------------------------------------- Seq-no Command Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Migrating Cisco NX-OS Release 5.0(2)N1(1) in a Fabric Extender A-A Topology Example This examples shows the tasks used to migrate to Cisco NX-OS Release 5.0(2)N1(1) in a Fabric Extender A-A topology. For details on the tasks, see the appropriate sections in this chapter.
Enter the sync-peers destination IP-address command to configure the peer switch on both switches. Step 8 Enter the show switch-profile name status command to ensure both switches are synchronized. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
For more information about supported hardware for your software version, refer to the release notes. Upgrades and Downgrades When upgrading from Cisco NX-OS Release 4.2(1)N2(1) and earlier releases to Cisco NX-OS Release 5.0(2)N1(1), there are no configuration implications. When upgrading from a release that supports pre-provisioning to another release that supports the feature including InService Software Upgrades (ISSU), pre-provisioned configurations are retained across the upgrade.
Step 3 provision model model Selects the module that you want to pre-provision. Example: switch(config-slot)# provision model N2K-C2248T switch(config-slot)# Step 4 Exits slot configuration mode. exit Example: switch(config-slot)# exit switch# Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Displays the startup configuration including the pre-provisioned configuration. Configuration Examples for Pre-Provisioning The following example shows how to enable pre-provisioning on slot 110 on the Cisco Nexus 2232P Fabric Extender and how to pre-provision interface configuration commands on the Ethernet 110/1/1 interface. switch# configure terminal...
Ethernet101/1/2 service-policy input test interface Ethernet101/1/3 service-policy input test This example shows how to remove all pre-provisioned modules from a slot: switch(config)# slot 2 switch(config-slot)# no provision model switch(config-slot)# Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
CFS-capable switches in the network and to discover feature capabilities in all CFS-capable switches. Cisco Nexus Series switches support CFS message distribution over Fibre Channel and IPv4 or IPv6 networks. If the switch is provisioned with Fibre Channel ports, CFS over Fibre Channel is enabled by default while CFS over IP must be explicitly enabled.
(when two independent SAN fabrics merge). CFS Distribution The CFS distribution functionality is independent of the lower layer transport. Cisco Nexus Series switches support CFS distribution over IP and over Fibre Channel. Features that use CFS are unaware of the lower layer transport.
Globally disables CFS distribution (CFS over Fibre Channel or IP) for all applications on the switch. Step 3 switch(config)# cfs distribute (Optional) Enables CFS distribution on the switch. This is the default. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
• Keepalive mechanism to detect network topology changes using a configurable multicast address. • Compatibility with Cisco MDS 9000 Family switches running release 2.x or later. The following figure (Network Example 1) shows a network with both Fibre Channel and IP connections.
CFS packets. CFS packets are sent to or from the switch domain controller addresses. CFS Distribution Scopes Different applications on the Cisco Nexus Series switches need to distribute the configuration at various levels. The following levels are available when using CFS distribution over Fibre Channel: •...
When you commit the changes, the pending database overwrites the configuration database (also known as the active database or the effective database). Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
CFS, merge capability (if it has registered with CFS for merge support), and the distribution scope. switch# show cfs application name fscm Enabled : Yes Timeout : 100s Merge Capable : No Scope : Physical-fc Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
The commit function does not start a session; only a lock function starts a session. However, an empty commit is allowed if configuration changes are not previously made. In this case, a commit operation results in a session that acquires locks and distributes the current database. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
When a network spans a vast geography, you might need to localize or restrict the distribution of certain profiles among a set of switches based on their physical proximity. CFS regions allow you to create multiple Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Enters configuration mode. Step 2 switch(config)# cfs region region-id Creates a region. Assigning Applications to CFS Regions You can assign an application on a switch to a region. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
The following example shows how to move an application into Region 2 that was originally assigned to Region 1: switch# configure terminal switch(config)# cfs region 2 switch(config-cfs-region)# ntp Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Configuring CFS over IP Enabling CFS over IPv4 You can enable or disable CFS over IPv4. CFS cannot distribute over both IPv4 and IPv6 from the same switch. Note Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
The following example show how to verify the CFS over IP configuration, use the show cfs status command. switch# show cfs status Distribution : Enabled Distribution over IP : Enabled - mode IPv4 IPv4 multicast address : 239.255.70.83 IPv6 multicast address : ff15::efff:4653 Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Configures the IPv6 multicast address for CFS distribution mcast-address ipv4-address over IPv6. The range of valid IPv6 addresses is ff15::/16 (ff15::0000:0000 through ff15::ffff:ffff) and ff18::/16 (ff18::0000:0000 through ff18::ffff:ffff). Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
The following example show cfs peers name command output displays all the application peers (all switches in which that application is registered). The local switch is indicated as Local. switch# show cfs peers name port-security Scope : Logical [VSAN 1] ----------------------------------------------------------- Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
IPv4 multicast address 239.255.70.83 IPv6 multicast address ff15::efff:4653 The CISCO-CFS-MIB contains SNMP configuration information for any CFS-related functions. See the Cisco Nexus 5000 and Nexus 2000 MIBs Reference available at the following URL: http://www.cisco.com/en/US/ docs/switches/datacenter/nexus5000/sw/mib/reference/NX5000_MIBRef.html. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Synchronization is achieved by exchanging PTP timing messages, with the members using the timing information to adjust their clocks to the time of their master in the hierarchy. PTP operates within a logical scope called a PTP domain. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
PTP message or an associated follow-up message. PTP operates only in boundary clock mode. Cisco recommends deployment of a Grand Master Clock Note (GMC) upstream, with servers containing clocks requiring synchronization connected to the switch.
PTP requires no license. Any feature not included in a license package is bundled with the Cisco NX-OS system images and is provided at no extra charge to you. For a complete explanation of the Cisco NX-OS licensing scheme, see the Cisco NX-OS Licensing Guide.
You can enable or disable PTP globally on a device. You can also configure various PTP clock parameters to help determine which clock in the network has the highest priority to be selected as the grandmaster. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 81
This example shows how to configure PTP globally on the device, specify the source IP address for PTP communications, and configure a preference level for the clock: switch# configure terminal switch(config)# feature ptp switch(config)# ptp source 10.10.10.1 switch(config)# ptp priority1 1 switch(config)# ptp priority2 1 Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Configures the minimum interval allowed between PTP seconds delay-request messages when the port is in the master state. The range is from -1 to 6 seconds. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 83
Announce receipt time out: 2 Peer mean path delay: 0 Announce interval(log mean): 3 Sync interval(log mean): -1 Delay Mechanism: End to End Peer delay request interval(log mean): 0 switch(config-if)# Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Displays the properties of the PTP parent and grandmaster clock. show ptp port interface ethernet slot/port Displays the status of the PTP port on the switch. show ptp time-property Displays the PTP clock time properties. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Configuring User Accounts Default Settings for the User Accounts and RBAC, page 80 Information About User Accounts and RBAC Cisco Nexus Series switches use role-based access control (RBAC) to define the amount of access that each user has when the user logs into the switch.
• Configuration and management of SAN features such as: ◦ FC-SP ◦ FC-PORT-SECURITY ◦ FCoE ◦ FCoE-NPV ◦ FPORT-CHANNEL-TRUNK ◦ PORT-TRACK ◦ FABRIC-BINDING • Configuration and management for the following of EXEC mode commands: ◦ DEBUG Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
A command or group of commands defined in a regular expression. Feature Commands that apply to a function provided by the Cisco Nexus 5000 Series switch. Enter the show role feature command to display the feature names available for this parameter.
Page 88
Read and write permissions for port security-related commands Read and write permissions for Remote Domain Loopback (RDL) related commands rmon Read and write permissions for RMON-related commands Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
If a command rule permits access to specific resources (interfaces, VLANs, or VSANs), the user is permitted to access these resources, even if the user is not listed in the user role policies associated with that user. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
• xfs Caution The Cisco Nexus 5000 Series switch does not support all numeric usernames, even if those usernames were created in TACACS+ or RADIUS. If an all numeric username exists on an AAA server and is entered during login, the switch rejects the login request.
Guidelines and Limitations for User Accounts If a password is trivial (such as a short, easy-to-decipher password), the Cisco Nexus 5000 Series switch rejects the password. Be sure to configure a strong password for each user account. A strong password has the following characteristics: •...
Copies the running configuration to the startup configuration. The following example shows how to configure a user account: switch# configure terminal switch(config)# username NewUser password 4Ty18Rnt switch(config)# exit switch# show user-account Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Repeat this command for as many rules as needed. Step 7 switch(config-role)# description text (Optional) Configures the role description. You can include spaces in the description. Step 8 switch(config-role)# end Exits role configuration mode. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
This example shows how to create a feature group: switch# configure terminal switch(config) # role feature-group group1 switch(config) # exit switch# show role feature-group switch# copy running-config startup-config switch# Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
3/1 switch(config-role-interface)# permit interface vfc 30/1 Changing User Role VLAN Policies You can change a user role VLAN policy to limit the VLANs that the user can access. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Repeat this command for as many VSANs as needed. Step 5 switch(config-role-vsan) # exit Exits role VSAN policy configuration mode. Step 6 switch# show role (Optional) Displays the role configuration. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
The following table lists the default settings for user accounts and RBAC parameters. Table 6: Default User Accounts and RBAC Parameters Parameters Default User account password Undefined. User account expiry date None. Interface policy All interfaces are accessible. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 99
Configuring User Accounts Default Settings for the User Accounts and RBAC Parameters Default VLAN policy All VLANs are accessible. VFC policy All VFCs are accessible. VETH policy All VETHs are accessible. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 100
Configuring User Accounts and RBAC Configuring User Accounts Default Settings for the User Accounts and RBAC Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
• Configuration session—Creates a list of commands that you want to implement in session manager mode. • Validation—Provides a basic semantic check on your configuration. Cisco NX-OS returns an error if the semantic check fails on any part of the configuration.
The name can be any alphanumeric string. Step 2 switch(config-s)# ip access-list name Creates an ACL. Step 3 switch(config-s-acl)# permit protocol source (Optional) destination Adds a permit statement to the ACL. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
(Optional) Saves the session to a file. The location can be in bootflash or volatile. Discarding a Session To discard a session, use the following command in session mode: Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Displays the contents of the configuration session. show configuration session status [name] Displays the status of the configuration session. show configuration session summary Displays a summary of all the configuration sessions. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Online diagnostics provide verification of hardware components during switch bootup or reset, and they monitor the health of the hardware during normal switch operation. Cisco Nexus Series switches support bootup diagnostics and runtime diagnostics. Bootup diagnostics include disruptive tests and nondisruptive tests that run during system bootup and system reset.
Bootup diagnostics log any failures to the onboard failure logging (OBFL) system. Failures also trigger an LED display to indicate diagnostic test states (on, off, pass, or fail). You can configure Cisco Nexus 5000 Series switches to either bypass the bootup diagnostics or run the complete set of bootup diagnostics.
Table 11: Expansion Module Health Monitoring Diagnostics Diagnostic Description Monitors port and system status LEDs. Temperature Sensor Monitors temperature sensor readings. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Displays the results of the diagnostics tests. Default Settings for Online Diagnostics The following table lists the default settings for online diagnostics parameters. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
3164. For more information about the system message format and the messages that the device generates, see the Cisco NX-OS System Messages Reference. By default, the Cisco Nexus 5000 Series switch outputs messages to terminal sessions. By default, the switch logs system messages to a log file.
You can configure the Cisco Nexus Series switch to sends logs to up to eight syslog servers. To support the same configuration of syslog servers on all switches in a fabric, you can use Cisco Fabric Services (CFS) to distribute the syslog server configuration.
Enables the switch to log messages to the console session [severity-level] based on a specified severity level or higher (a lower number value indicates a higher severity level). Severity levels range from 0 to 7: Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 114
Displays the console logging configuration. Step 8 switch# show logging monitor (Optional) Displays the monitor logging configuration. Step 9 switch# copy running-config (Optional) Copies the running configuration to the startup configuration. startup-config Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Configuring Module and Facility Messages Logging You can configure the severity level and time-stamp units of messages logged by modules and facilities. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 117
Resets the logging severity level for the specified facility to [facility severity-level] its default level. If you do not specify a facility and severity level, the switch resets all facilities to their default levels. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
The following example shows how to configure the severity level of module and specific facility messages: switch# configure terminal switch(config)# logging module 3 switch(config)# logging level aaa 2 Configuring Logging Timestamps You can configure the time-stamp units of messages logged by the Cisco Nexus Series switch. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode.
• Create an IP access list with at least one access control entry (ACE) configured for logging. • Configure the ACL logging cache. • Configure the ACL log match level. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Message Logging to a File, on page Step 3 switch(config)# copy (Optional) Saves the change persistently through reboots and restarts by running-config startup-config copying the running configuration to the startup configuration. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Cisco Nexus Series software that you are using. The command references available for Nexus 5000 can be found here: http://www.cisco.com/en/US/products/ps9670/prod_ command_reference_list.html. Debugging is a CLI facility but the debug syslogs are Note not sent to the server. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
(*) for all. These facility designators allow you to control the destination of messages based on their origin. Check your configuration before using a Note local facility. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
$ kill -HUP ~cat /etc/syslog.pid~ Configuring syslog Server Configuration Distribution You can distribute the syslog server configuration to other switches in the network by using the Cisco Fabric Services (CFS) infrastructure. After you enable syslog server configuration distribution, you can modify the syslog server configuration and view the pending changes before committing the configuration for distribution.
(Optional) Copies the running configuration to the startup configuration. startup-config Displaying and Clearing Log Files You can display or clear messages in the log file and the NVRAM. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Displays detailed information about the IP access list cache. show logging ip access-list status Displays the status of the IP access list cache. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 126
Displays the logging status. show logging timestamp Displays the logging time-stamp units configuration. show running-config acllog Displays the running configuration for the ACL log file. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Technical Assistance Center. If you have a service contract directly with Cisco, you can register your devices for the Smart Call Home service. Smart Call Home provides fast resolution of system problems by analyzing Smart Call Home messages sent from your devices and providing background information and recommendations.
You can also configure a destination profile to allow periodic inventory update messages by using the inventory alert group that will send out periodic messages daily, weekly, or monthly. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Smart Call Home Alert Groups An alert group is a predefined subset of Smart Call Home alerts that are supported in all Cisco Nexus 5000 Series switches. Alert groups allow you to select the set of Smart Call Home alerts that you want to send to a predefined or custom destination profile.
0 (the switch sends all messages). Smart Call Home messages that are sent for syslog alert groups have the syslog severity level mapped to the Smart Call Home message level. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
• Short text message format • Common fields for all full text and XML messages • Inserted fields for a reactive or proactive event message • Inserted fields for an inventory event message Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 132
Name of message type, such as /aml/header/type reactive or proactive. Message group Name of alert group, such as /aml/header/group syslog. Severity level Severity level of message. /aml/header/level Source ID Product type for routing. /aml/header/source Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 133
ID by any support service. Site ID Optional user-configurable field /aml/ header/siteID used for Cisco-supplied site ID or other data meaningful to alternate support service. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 134
Serial number Chassis serial number of the unit. /aml/body/chassis/serialNo Chassis part number Top assembly number of the /aml/body/chassis/partNo chassis. Fields specific to a particular alert group message are inserted here. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 135
Table 21: Inserted Fields for an Inventory Event Message Data Item (Plain Text and XML) Description (Plain Text and XML) XML Tag (XML Only) Chassis hardware version Hardware version of the chassis. /aml/body/chassis/hwVersion Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Prerequisites for Smart Call Home • E-mail server connectivity. • Access to contact name (SNMP server contact), phone, and street address information. • IP connectivity between the switch and the e-mail server. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
• SMARTnet contract number for your switch • Your e-mail address • Your Cisco.com ID Procedure Step 1 In a browser, navigate to the Smart Call Home Web page. http://www.cisco.com/go/smartcall/ Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Spaces are accepted. Step 7 switch(config-callhome)# (Optional) contract-id contract-number Configures the contract number for this switch from the service agreement. The contract-number can be up to 255 alphanumeric characters. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
You must create a user-defined destination profile and configure the message format for that new destination profile. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters global configuration mode. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
• Message size—The allowed length of a Call Home message sent to the e-mail addresses in this destination profile. You cannot modify or delete the CiscoTAC-1 destination profile. Note Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 141
5 switch(config-callhome)# destination-profile full-text-destination message-size 10000 switch(config-callhome)# What to Do Next Associate an alert group with a destination profile. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
You can assign a maximum of five user-defined CLI show commands to an alert group. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters global configuration mode. Step 2 switch(config)# callhome Enters Smart Call Home configuration mode. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Saves the change persistently through reboots and startup-config restarts by copying the running configuration to the startup configuration. This example shows how to add the show ip routing command o the Cisco-TAC alert group: switch# configuration terminal switch(config)# callhome switch(config-callhome)# alert-group Configuration user-def-cmd show ip routing...
Configures periodic inventory messages. periodic-inventory notification The interval days range is from 1 to 30 days. [interval days] [timeofday time] The default is 7 days. The timeofday time is in HH:MM format. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
This example shows how to disable duplicate message throttling: switch# configuration terminal switch(config)# callhome switch(config-callhome)# no duplicate-message throttle switch(config-callhome)# Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Smart Call Home testing fails when the message level for the destination profile is set to 3 or higher. Important Procedure Command or Action Purpose Step 1 switch# configure terminal Enters global configuration mode. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Displays the running configuration for Smart Call Home. callhome-all] switch# show startup-config callhome Displays the startup configuration for Smart Call Home. switch# show tech-support callhome Displays the technical support output for Smart Call Home. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 149
00:01:05: %SYS-5-CONFIG_I: Configured from memory by console 00:01:09: %SYS-5-RESTART: System restarted --Cisco IOS Software, s72033_rp Software (s72033_rp-ADVENTERPRISEK9_DBG-VM), Experimental Version 12.2(20070421:012711) Copyright (c) 1986-2007 by Cisco Systems, Inc. Compiled Thu 26-Apr-07 15:54 by xxx Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 150
Cisco DCOS Software, c6slc Software (c6slc-SPDBG-VM), Experimental Version 4.0 (20080421:012711)Copyright (c) 1986-2008 by Cisco Systems, Inc. Compiled Thu 26-Apr-08 16:40 by username1 00:00:25: DFC1: Currently running ROMMON from F2 region Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 151
00:06:59: %OIR-SP-6-DOWNGRADE_EARL: Module 8 DFC installed is not identical to system PFC and will perform at current system operating mode. 00:07:06: %OIR-SP-6-INSCARD: Card inserted in slot 8, interfaces are now online Router#]]> </aml-block:Data> </aml-block:Attachment> </aml-block:Attachments> </aml-block:Block> </soap-env:Body> </soap-env:Envelope> Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 152
Configuring Smart Call Home Sample Syslog Alert Notification in XML Format Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
You can create a checkpoint copy of the current running configuration at any time. Cisco NX-OS saves this checkpoint as an ASCII file which you can use to roll back the running configuration to the checkpoint configuration at a future time.
Configuring Rollback Creating a Checkpoint • Beginning in Cisco NX-OS Release 5.0(2)N1(1), you can start a checkpoint filename with the word auto. • Beginning in Cisco NX-OS Release 5.0(2)N1(1), you can name a checkpoint file summary or any abbreviation of the word summary.
This example shows how to create a checkpoint file and then implements an atomic rollback to a user checkpoint name: switch# checkpoint stable switch# rollback running-config checkpoint stable atomic Verifying the Rollback Configuration To display the rollback configuration, perform one of the following tasks: Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 156
| startup-config | file dest-file} show rollback log [exec | verify] Displays the contents of the rollback log. Use the clear checkpoint database command to delete all checkpoint files. Note Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
A name server may also store information about other parts of the domain tree. To map domain names to IP addresses in Cisco NX-OS, you must first identify the host names, then specify a name server, and enable the DNS service.
High Availability Cisco NX-OS supports stateless restarts for the DNS client. After a reboot or supervisor switchover, Cisco NX-OS applies the running configuration. Prerequisites for DNS Clients The DNS client has the following prerequisites: •...
Example: NX-OS uses to resolve this domain name server if it switch(config)# ip domain-list mycompany.com cannot be resolved in the VRF that you configured this switch(config)# domain name under. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 160
This example shows how to configure a default domain name and enable DNS lookup: switch# config t switch(config)# vrf context management switch(config)# ip domain-name mycompany.com switch(config)# ip name-server 172.68.0.10 switch(config)# ip domain-lookup Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
• An SNMP agent—The software component within the managed device that maintains the data for the device and reports these data, as needed, to managing systems. The Cisco Nexus 5000 Series switch supports the agent and MIB. To enable the SNMP agent, you must define the relationship between the manager and the agent.
SNMP Notifications Cisco NX-OS does not support SNMP sets for Ethernet MIBs. Note The Cisco Nexus 5000 Series switch supports SNMPv1, SNMPv2c and SNMPv3. Both SNMPv1 and SNMPv2c use a community-based form of security. Cisco NX-OS supports SNMP over IPv6.
HMAC-MD5 or Provides HMAC-SHA authentication based on the Hash-Based Message Authentication Code (HMAC) Message Digest 5 (MD5) algorithm or the HMAC Secure Hash Algorithm (SHA). Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
• HMAC-MD5-96 authentication protocol • HMAC-SHA-96 authentication protocol Cisco NX-OS uses Advanced Encryption Standard (AES) as one of the privacy protocols for SNMPv3 message encryption and conforms with RFC 3826. The priv option offers a choice of DES or 128-bit AES encryption for SNMP security encryption. The priv option along with the aes-128 token indicates that this privacy password is for generating a 128-bit AES key.The AES priv password can have a minimum of eight characters.
Licensing Requirements for SNMP This feature does not require a license. Any feature not included in a license package is bundled with the Cisco NX-OS system images and is provided at no extra charge to you. For a complete explanation of the Cisco NX-OS licensing scheme, see the Cisco NX-OS Licensing Guide.
Configuring SNMP Configuring SNMP Users The commands used to configure SNMP users in Cisco NX-OS are different from those used to configure Note users in Cisco IOS. Procedure Command or Action Purpose Step 1 configure terminal Enters global configuration mode.
You can configure SNMP to require authentication or encryption for incoming requests. By default the SNMP agent accepts SNMPv3 messages without authentication and encryption. When you enforce privacy, Cisco NX-OS responds with an authorization error for any SNMPv3 PDU request using security level parameter of either noAuthNoPriv or authNoPriv.
The ACL applies to both IPv4 and IPv6 over UDP and TCP. After creating the ACL, assign the ACL to the SNMP community. For more information on creating ACLs, see the NX-OS Security Configuration Guide for the Cisco Nexus Series software that you are using. The security configuration guides available for Nexus 5000 can be found here: http://www.cisco.com/en/US/products/ps9670/products_installation_and_configuration_...
Create an ACL to assign to the SNMP community. Assign the ACL to the SNMP community. Configuring SNMP Notification Receivers You can configure Cisco NX-OS to generate SNMP notifications to multiple host receivers. You can configure a host receiver for SNMPv1 traps in a global configuration mode. Command...
192.0.2.1 informs version 3 auth NMS Configuring SNMP Notification Receivers with VRFs You can configure Cisco NX-OS to use a configured VRF to reach the host receiver. SNMP adds entries into the cExtSnmpTargetVrfTable of the CISCO-SNMP-TARGET-EXT-MIB when you configure the VRF reachability and filtering options for an SNMP notification receiver.
Configuring SNMP Filtering SNMP Notifications Based on a VRF Filtering SNMP Notifications Based on a VRF You can configure Cisco NX-OS filter notifications based on the VRF in which the notification occurred. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters global configuration mode.
2/1 To the following example configures a source interface responsible for receiving all SNMP notifications: switch# config t switch(config) # snmp-server host 192.0.2.1 source-interface ethernet 2/1 Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
The following SNMPv2 example shows how to configure and inband access to the community comm which is not mapped: switch# config t Enter configuration commands, one per line. End with CNTL/Z. switch(config)# snmp-server context def vrf default switch(config)# snmp-server community comm group network-admin switch(config)# Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Enabling SNMP Notifications You can enable or disable notifications. If you do not specify a notification name, Cisco NX-OS enables all notifications. Note The snmp-server enable traps CLI command enables both traps and informs, depending on the configured notification host receivers.
Page 175
Enables the ENTITY-MIB SNMP notifications. [fru] switch(config)# snmp-server enable traps license Enables the license SNMP notification. switch(config)# snmp-server enable traps Enables the port security SNMP notifications. port-security Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
(cieLinkUp, cieLinkDown) defined in CISCO-IF-EXTENSION-MIB.my, if ifLinkUpDownTrapEnable (defined in IF-MIB) is enabled for that interface. Cisco NX-OS adds additional varbinds specific to Cisco Systems in addition to the varbinds defined in the IF-MIB for the linkUp and linkDown notifications.
Configures sysContact, the SNMP contact name. Step 3 switch(config)# snmp-server location Configures sysLocation, the SNMP location. name Step 4 switch# show snmp (Optional) Displays information about one or more destination profiles. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Displays the SNMP notifications enabled or disabled. switch# show snmp user Displays SNMPv3 users. Feature History for SNMP Table 27: Feature History for SNMP Feature Name Releases Information IPv6 support 5.2(1)N1(1) This feature was introduced. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 180
Configuring SNMP Feature History for SNMP Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
You can use alarms with RMON events to generate a log entry or an SNMP notification when the RMON alarm triggers. RMON is disabled by default and no events or alarms are configured in Cisco Nexus 5000 Series. You can configure your RMON alarms and events by using the CLI or an SNMP-compatible network management...
Configuring RMON RMON Events • Sampling interval—The interval that the Cisco Nexus 5000 Series switch uses to collect a sample value of the MIB object. • The sample type—Absolute samples take the current snapshot of the MIB object value. Delta samples take two consecutive samples and calculate the difference between them.
Taking delta samples, last value was 0 Rising threshold is 5, assigned to event 1 Falling threshold is 0, assigned to event 0 On startup enable rising or falling alarm Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Displays information about RMON hcalarms. switch# show rmon logs Displays information about RMON logs. Default RMON Settings The following table lists the default settings for RMON parameters. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
The Switched Port Analyzer (SPAN) feature (sometimes called port mirroring or port monitoring) selects network traffic for analysis by a network analyzer. The network analyzer can be a Cisco SwitchProbe, a Fibre Channel Analyzer, or other Remote Monitoring (RMON) probes.
SPAN Sources SPAN Sources SPAN sources refer to the interfaces from which traffic can be monitored. The Cisco Nexus Series device supports Ethernet, Fibre Channel, virtual Fibre Channel, port channels, SAN port channels, VSANs and VLANs as SPAN sources. With VLANs or VSANs, all supported interfaces in the specified VLAN or VSAN are included as SPAN sources.
• For VLAN or VSAN SPAN sources, all active ports in the source VLAN or VSAN are included as source ports. SPAN Destinations SPAN destinations refer to the interfaces that monitors source ports. The Cisco Nexus Series device supports Ethernet and Fibre Channel interfaces as SPAN destinations. Source SPAN...
Copies the running configuration to the startup configuration. This example shows how to configure MTU truncation for a SPAN session: switch# configure terminal switch(config) # monitor session 3 switch(config-monitor) # mtu Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Configuring Fibre Channel Destination Port The SPAN destination port can only be a physical port on the switch. Note You can configure a Fibre Channel port as a SPAN destination port. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
You can enter a range of Ethernet, Fibre Channel, or virtual Fibre Channel ports. You can specify the traffic direction to duplicate as ingress (rx), egress (tx), or both. By default, the direction is both. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
VSANs and VLANs. The monitored direction can be ingress, egress, or both and applies to all physical ports in the group. The Cisco Nexus 5000 Series switch supports two active SPAN sessions. The Cisco Nexus 5548 Switch Note supports four active SPAN sessions. When you configure more than two SPAN sessions, the first two sessions are active.
The default is to keep the session state shut. You can open a session that duplicates packets from sources to destinations. Procedure Command or Action Purpose Step 1 switch# configure terminal Enters global configuration mode. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
By default, the session state is shut. Note The Cisco Nexus switch supports two active SPAN sessions. The Cisco Nexus 5548 Switch supports four active SPAN sessions. When you configure more than two SPAN sessions, the first two sessions are active.
Page 197
2 session 2 --------------- type : local state : up source intf : fc3/1 : fc3/1 both : fc3/1 source VLANs source VSANs destination ports : Eth3/1 Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 198
Configuring SPAN Displaying SPAN Information Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
(GRE)-encapsulated traffic, and an ERSPAN destination session. You separately configure ERSPAN source sessions and destination sessions on different switches. The implementation of ERSPAN on Cisco Nexus 5000 Series switches supports source sessions only, not destination sessions. You can monitor traffic on one or more source ports.
VLAN, and trunk ports can be configured as source ports and mixed with nontrunk source ports. • Source VLANs—A source VLAN is a virtual local area network (VLAN) that is monitored for traffic analysis. Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Although you can create up to 18 ERSPAN sessions, you can run only two ERSPAN or SPAN sessions simultaneously on a Cisco Nexus 5000 Series switch and only four ERSPAN or SPAN sessions on a Cisco Nexus 5500 Series switch. You can shut down any unused ERSPAN sessions.
• ERSPAN traffic can exit the switch through a Layer 2 interface, Layer 3 interface, port channel, or FabricPath core port. • The Cisco Nexus 5000 series switch cannot reach a destination IP address of a remote switch through a virtual Ethernet port or FEX port. This functionality is not supported.
Configuring ERSPAN Default Settings • ERSPAN can monitor ingress traffic on a source VSAN only on Cisco Nexus 5010 and 5020 switches. • ERSPAN cannot monitor egress traffic on source VLANs and VSANs on any Cisco Nexus 5000 Series switch.
Page 204
1 Step 6 source vsan number On Cisco Nexus 5000 Series switches, specifies the VSAN ID number. The range is 1 to 4093. On Cisco Nexus 5500 Series switches, you cannot configure source VSANs. Example: switch(config-erspan-src)# source vsan 1...
You must configure an IP address to be used as the source of the ERSPAN traffic. Procedure Command or Action Purpose Step 1 configure terminal Enters global configuration mode. Example: switch# configure terminal switch(config)# Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
ID is globally unique for both session erspan-source types. switch(config-erspan-src)# The session ID (configured by the span-session number argument) and the session type (configured by the erspan-source keyword) cannot be changed once entered. To Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
You can shut down ERSPAN sessions to discontinue the copying of packets from sources to destinations. Because only two ERSPAN sessions on the Cisco Nexus 5000 Series switch and four ERSPAN sessions on the Cisco Nexus 5500 Series switchcan be running simultaneously, you can shut down a session in order to free hardware resources to enable another session.
Page 208
(Optional) Displays the running ERSPAN configuration. Example: switch(config-erspan-src)# show running-config monitor Step 10 show startup-config monitor (Optional) Displays the ERSPAN startup configuration. Example: switch(config-erspan-src)# show startup-config monitor Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Configuration Example for an IP Address as the Source for an ERSPAN Session This example shows how to configure an IP address as the source for an ERSPAN session: switch# configure terminal Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1)
Page 215
RBAC SAN admin smart call home user roles user accounts RBAC VRFs 152, 153 user roles and rules, creating configuring SNMP notification receivers with RBAC filtering SNMP notifications Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1) IN-5...
Page 216
Index Cisco Nexus 5000 Series NX-OS System Management Configuration Guide, Release 5.2(1)N1(1) IN-6...